Issues with Computer Use in the Classroom

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

Northside I.S.D. Acceptable Use Policy
Developed by Technology Services 1:1 Laptop Initiative
1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
Digital Citizenship Instruction and Resources Julie Harris Media Specialist Rochester High School Rochester Hills, MI.
The Woodlands High School
Module 2.2 Security, legal and ethical issues Theme: Finding solutions.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Boyertown Area School District Acceptable Use Policy.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Introduction Social Implications & EthicsSocial Implications & Ethics Since the introduction of the Internet, many policies have been introduced as a way.
Issues Raised by ICT.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Fort Bend ISD Acceptable Use Policy Student Training.
Copyright © Allyn & Bacon 2008 Using Technology in the Classroom Gary G. Bitter & Jane M. Legacy Chapter Five This multimedia product and its contents.
INTERNET SAFETY Public Hearing  September 8, 2014.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Chapter 1 Unwrapping the Gift.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Clark County School District (CCSD)
00870B2F.0/Internet%20Safety.jpg.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
By: Tina Hill.  This is the unwritten rules of the different media sites on the internet.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Ethics A Necessity for the new era. Why is Computer Ethics Important? The creation and existence of new questions that older laws cannot answer.
6 th Grade. a. Identify Internet safety and security concerns (Cyber Predators, etc) b. Discuss illegal aspects of software piracy, hacking, and computer.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
Technology in the Classroom By: Amanda Johnson
Warner & Sower1 Chapter 10 Using Technology in the Early Childhood Classroom.
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
The Ethics of Emulation David Gale February 24 th.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Internet Services Web browsing Chat/Messaging Newsgroups Social networking Shopping Information –Text –Pictures –Movies –Music And more! 3.
Teaching and Learning with Technology Chapter 12 Issues in Implementing Technology in Schools ETEC 562 Spring 2004 Sherri Fetter
Digital Citizenship. What is a Digital Citizen? Digital Citizens are people who use technology often and appropriately. Digital Citizens are people who.
Using Computers: Legal and Ethical Issues Objectives and Guidelines We Must Follow.
INTERNET SAFETY.
Privacy and Data Mining What Do “They” Know About You?
1/10/ Ethics and Computing Why is Ethics such an issue with computing in particular? Principles of ethics are the same - theft is theft whether using.
Privacy, Security and Ethics
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Galesburg CUSD #205 Technology Survey Teachers November/December 2009 Online.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
You promise to : Not display offensive messages or pictures Not harass, insult, attack others using the computer Not to access social media sites, i.e.
Online Safety ~ Raising students’ awareness of the risks of Internet use ~
Copyright © 2011 by John Wiley & Sons, Inc. All Rights Reserved Agenda Review chapter nine Chapter quiz Discussion of quiz Opening activity Chapter ten.
Safe Internet Usage in the Classroom Lynne Schalman The Original Teaching Company
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Security Issues & Ethics in Education By Maud Mushayamunda.
A COMPLETE GUIDE FOR DIGITAL CITIZENSHIP BY DELITA CLEMENTS.
WHEN SHARING IS NOT CARING: INTERNET ETHICS By Baikgopodi “Bai” Ditiso Presented at CLTD– 09 May 2016.
Digital Citizenship Grades 4-6
ELEMENTS OF DIGITAL CITIZENSHIP AND CORRESPONDING ISTE STANDARDS
Internet Safety and Acceptable Use Policies.
The Computer as an Educational Tool
Rules To Help You Navigate the Internet Safely
Privacy and Data Mining
Presentation transcript:

Issues with Computer Use in the Classroom What Every Teacher Needs to Know

Ethical Issues Special needs students How hardware & software can help Disabilities Limited English proficiency Gifted and talented students How hardware & software can help

Ethical Issues, continued Socioeconomic equity Gender equity Computer as a tool Software choices MySpace, blogs, podcasting, instant messaging, and other new features

Logistical Issues Time to complete assignments Storage of student work Maximizing student work time in the lab Helpers Rules Traffic patterns in the lab Effective use of computer time

Moral Issues Pornography & other inappropriate sites Prevention Filtered search engines Monitoring use of computers SynchronEyes Blocking/filtering software (Bess, etc.)

Moral Issues, continued Dealing with it AUP Classroom rules Evaluating web information

Societal Issues E-pals Stalkers Hate sites Violence Bullies, cliques, rumors Code words & abbreviations

Legal Issues Plagiarism, copyright law, & citations Software piracy and bootlegging Privacy issues Fraud and marketing schemes Hackers Physical abuse of computers Viruses Identity theft