Project description Students commence all university modules with a range of ability levels…however cyber law presents an additional problem as much of.

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
Advertisements

Testing Relational Database
Case Studies M.Sc. in Applied Statistics Dr. Órlaith Burke Michaelmas Term 2012.
Student Getting Started Guide *Updated December 2011 to include information on Integrated Digital Book/MindTap Reader.
Level 2 Cambridge Nationals in ICT. ICT Pathway 3hrs a week Two routes you can take one being Cambridge Nationals and the other being GCSE Computing You.
How-to build, develop and use an online platform
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
On Thursday 14 October 2010, Greater Manchester Police posted details of each incident it dealt with over a 24-hour period on Twitter. The aim was to raise.
E-Safety Support e-Safety Presentation D Flynn and L Findon.
Nov 3, 2008 Advantages for Teachers, Students and Parents.
AudioBoo Because sound is social. Overview Instruct how to create an Audioboo account Demonstrate how to follow a featured boo Learn how to upload a video.
Embedding NVivo in postgraduate social research training Howard Davis & Anne Krayer 6 th ESRC Research Methods Festival 8-10 July 2014.
One World Real Estate Company Technology Plan. New Computers For the Office Eight 13 inch MacBook Pros and three 27 inch iMac desktop computers Macs are.
INTRODUCTION In this presentation definition of ICT and its impacts-economic and social are discussed briefly. The topic of “ICT in education” is dealt.
ACE TESOL Diploma Program – London Language Institute OBJECTIVES You will understand: 1. The difference between a course, curriculum, and syllabus. 2.
INACOL National Standards for Quality Online Teaching, Version 2.
During each stage of the construction a range of media technologies where used, including different hardware and software to produce professional products.
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
Front Independent Learning Reflection (Inc. CPD Personal Development) The ability to reflect on actions and decisions is a necessary skill in many occupations.
EASY TEAM MANAGER By Dave Abineri EASYWARE: PO Box 231, Milford, OHIO (Cincinnati) Phone: (513) Use UP arrow to move to the NEXT slide Use.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
A Tour of the ELES Online Study Skills Handbook for Secondary Schools. This site will help your students improve their results.
 The Shift Towards Digital Branding By Zahra Karim.
INFORMATION SECURITY STUDENT GUIDE. There is only one true way to secure a computer. 1.Cut off all the cables, bury the computer in concrete 2.Put the.
3D Printing Business Venture! The Adventure Game by Ammon Smith For Artists & Business Professionals.
A VERY USEFUL E-LEARNING TOOL FOR TEACHERS, RESEARCHERS, AND STUDENTS.
Seattle Community Network How to use SCN to send and receive . Using the PINE Service Text based .
Making Maths as easy as I…C…T! Amy Blackmore Primary e-Learning Advisor Somerset LA.
Staying Safe Online Keep your Information Secure.
Joint Information Systems Committee Innovative Practice with Mobile and Wireless Technologies Sarah Knight, JISC e-Learning Programme Joint Information.
Introducing The eLearning solution for the Archdiocese of Brisbane Building the capability of our people through flexible learning.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
INTRODUCTION TO OFFICE 365 How To Share and Organize All In One Secure Place Panagiota “Penny” Damianeas Assessment & Testing Specialist.
Business Software What is database software? p. 145 Allows you to create, access, and manage data Add, change, delete, sort, and retrieve data Next.
Halliday James Cognitive Support Technologies Task Prompting Audio/Visual Scheduling Travel Training Non text Simple desktops Emergency location.
Computing Fundamentals Module Lesson 3 — Changing Settings and Customizing the Desktop Computer Literacy BASICS.
Hebrew in the Online Learning Center Student & Family Information.
Empowerment Through Technology Steven Parker. We need to live in both worlds… “…the classroom and the Web. The brave new world of net delivered and assisted.
Archimedes – Supporting problem based learning in SMEs through IT facilitated mentoring Ileana Hamburg Institut Arbeit und Technik (IAT), Gelsenkirchen,
E-Learning By : Amira AL-Qattan E-Learning By : Amira AL-Qattan.
CHAPTER 7 Exploring Microsoft Windows 7. Learning Objectives Identify the parts of the Windows 7 desktop Use common Windows elements Navigate Windows.
+ Publishing Your First Post USING WORDPRESS. + A CMS (content management system) is an application that allows you to publish, edit, modify, organize,
Show My Homework 9 Tips & Tricks to save time *To help you make the most of our service, we’ll publish a new Tips & Tricks every Monday on the SMH blog.blog.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Session: Instructional methods; How to prepare practical exercise/case study 24 th January 2013 Dr. Eliona Kulluri Bimbashi (University of Tirana)
BISHOP BURTON COLLEGE The Stages VLE of Implementation When is something implemented? Installed? Up and running on the network Advertised? to staff.
Best ways to Hack Facebook Account Now a days Facebook becomes the number 1 social networking portal that touches every one’s life. People are now a days.
1 A Look at the Application Authorized users can access Communicator! NXT from any Internet-capable computer via the Web.
The term ‘digital technology’ is used to describe the use of digital resources to effectively find, analyse, create, communicate, and use information.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Component D: Activity D.3: Surveys Department EU Twinning Project.
Main Features of iSafe All-in-One Keylogger Universal keylogger of isafe, Inc. Suitable for home parental control,corporate employee monitoring and cheating.
FUNCTIONAL SKILLS LEVEL ONE Using the Internet. Connecting to the internet Lesson Aims and Objectives find and select reliable information appropriate.
1 Terminal Management System Usage Overview Document Version 1.1.
FOCUS ON OUTCOME, NOT PROCESS
Upon completion of this module, you will be able to:
3.6 Fundamentals of cyber security
How to build a good reputation online
In the Classroom.
Basic Computing for Teachers
Teaching with Instructional Software
What is Maths-Whizz? Virtual tutor for your child online
Is your computer being used against you while you sleep?
Basic Employability Skills
Preparing for and ADMINISTERING the ABMGG IN-TRAINING EXAMINATION
Principles of Learning
Contents Introduction/Contacts Description Of Module (& LOs)
A note about this presentation
Presentation transcript:

Project description Students commence all university modules with a range of ability levels…however cyber law presents an additional problem as much of the law rests on how technology is applied. So the module has complete beginners to those who are well versed in how to interact with computers in a physical construction sense: (are able to build a computer from scratch) and in a “hacking” sense (can access other computers remotely).

Project aims Bring students to a start point where they are familiar with the basics of computers and networks before commencement of the module. Formal module spec bumpf: Enabling the students to operate in a consequence free environment so that they incrementally develop abilities that will not only enhance their student experience but also provide a skill set that they can demonstrate at interview and subsequently exhibit in the workplace. Put simply: Make them easy to teach…

How is this achieved? Use a combination of real technology: i.e. a computer mock up that can be explored and digital representations of computers within app based learning on phones and tablets. Tasks are set with increasingly challenging “levels” which are tied into social media by timed tweets and scheduled Facebook posts.

Game based learning Students can only progress once a level is completed. Learning proceeds with the parts slowly building from “the basics” to the advanced cutting edge of the area. The stages will be incremental in difficulty with the later stages requiring group work for the task to be completed. This staged delivery can be facilitated by the use of a safe computer environment whereby the computer is set up to reflect a number different types of situations over time.

Recycling Reuse of old computers and monitors from the university alongside delivery through e-learning objects. This re-use of computers and peripherals evidences “doing more with less” which is in line with the recent changes to the university sector as a whole.

JORUM JORUM is the HEA repository for open educational resources. This site contains rights cleared content that can be repurposed. Content once delivered and updated will be deposited here.

What are the challenges the students are set? The challenges are problem based. The installations will start from a fairly easy level i.e. the levels can be quickly progressed through if a student is motivated and/or capable in this area. Each level has a very brief instruction e.g. for level 1: “Find and remove the file entitled: Blackmail_mvh.docx”.

Examples of tasks: LEVEL 1.1 Students try admin or a blank as a password. The student gains access and finds first “secret file” on desktop. This initial hack leads the students to the case of Hacker Gary McKinnon and the Computer Misuse Act Students also learn about the importance of time logs and security cameras.

Examples of tasks: LEVEL 1.2 The students attempt to save or print or open the file, at this point an.exe code is enabled and a webcam takes a photo of the student/students in front of the computer and keeps it in a secure file. Ways round this could include the student placing a piece of black sticky tape in front of the camera, unplugging it or finding the file and deleting it (and emptying the recycle bin!)

Examples of tasks: LEVEL 2.3 In this level the login password is random, but the maintenance log is left at the computer site that reveals a weekly login. Students can address this problem in a variety of ways: The students can use a software keystroke logger or a physical one. The students will be sent an advert for a “company” (the teaching team) that will offer the use of a key stroke logger:

A key stroke logger that records password as they are typed.

Examples of tasks: LEVEL 2.3 Key stroke loggers are explained (both physical and software based). How they are used in firms and the legality of reading employees s at work is explained once the task is completed.

Examples of tasks: LEVEL 12 LEVEL 12 deals with phone hacking and the extraction of data from the raft of operating systems, this launches students into a dynamic, topical and contentious area. Once the information has been retrieved a question is set regarding release: “if you wanted to release this information how would you do it?” from here the public interest defence for whistle blowers, the recent legal struggle relating to Twitter and Parliamentary privilege can be discussed.

Conclusions: Bad bits… The reuse of “old” computers has been problematic. Slow boot up times can put students off especially when they are used to instant boot up from phones, laptops and tablets. The changing technology can hamper students for example computer connectors have all changed. Students need to be familiar with the newest computers and networks to be able to fully engage with the law.

Conclusions: Good bits… Materials are difficult to create but area easier to set up once the first few have been created. Once the materials are “student proof” and are suitable for all levels of student ability then they can be supplemented by staged Twitter and Facebook posts to remind students to engage with the materials. JORUM deposit has begun.