Security Issues, Ethics, and Emerging Technologies in Education

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
Discovering Computers 2008 Fundamentals Fourth Edition Chapter 10 Computer Security, Ethics, and Privacy.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Discovering Computers & Microsoft Office 2010 Discovering Computers Chapter 5.
Objectives Overview Describe various types of network attacks, and identify ways to safeguard against these attacks, including firewalls and intrusion.
Your Interactive Guide to the Digital World Discovering Computers Part 10 Manage Computing Securely, Safely and Ethically.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Ying Wang EDN 303 Fall Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software.
Chapter 11 – Section 4-5.  Techniques use to Access the network  War Driving or access point mapping ▪ Individuals attempt to detect wireless network.
Boyertown Area School District Acceptable Use Policy.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Security, Privacy, and Ethics Online Computer Crimes.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
VISD Acceptable Use Policy
Living in a Digital World Discovering Computers 2011.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Discovering Computers 2010
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 6 th Edition Security Issues, Ethics, and Emerging Technologies.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 10 Computer Security, Ethics, and Privacy.
Security Issues and Ethics in Education
T e a c h e r s D i s c o v e r i n g C o m p u t e r s Integrating Technology in the Classroom 3 rd Edition Chapter 8 Security Issues, Ethics, and Emerging.
Computer Security, Ethics and Privacy
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
Computer Programming I
Your Interactive Guide to the Digital World Discovering Computers 2012.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Employee Guidelines for Acceptable Use of Technology Resources.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
Security Issues and Ethics in Education
Security Issues, Ethics, & Emerging Technologies in Education
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
Chapter 11 Computer Security, Ethics and Privacy
Chapter 10 Computer Security, Ethics, and Privacy.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Chapter 11 Lecture 21: pp Computer Security, Ethics and Privacy.
Chapter 11 Objectives Describe the types of computer security risks
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
1 Chapter 10 Security, Safety, Ethics, & Privacy.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 5 th Edition Chapter 8 Security Issues, Ethics, and Emerging Technologies.
Chapter 8 Security Issues, Ethics, and Emerging Technologies in Education.
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.
Ch. 9&10 RAP SarahBeth Walker. Ergonomics  The study of and development of furniture, tools, & systems that promote productivity in a safe & hearlthy.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Security Issues & Ethics in Education By Maud Mushayamunda.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Teachers Discovering Computers Integrating Technology in a Changing World 8th Edition Chapter Eight Security Issues and Ethics in Education.
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Computer Programming I
Student User Agreement and Policy 2022
Presentation transcript:

Security Issues, Ethics, and Emerging Technologies in Education Chapter 8 Thomson Course Technology

Computer Security: Risks and Safeguards Computer security risk - Any event or action that has the potential of causing a loss of computer equipment, software, data and information, or processing capability Computer Viruses New virus programs found every day Boot sector virus File virus Worm Trojan horse Macro virus Thomson Course Technology

Signs of a Virus Infection Thomson Course Technology

Computer Security: Risks and Safeguards Computer Viruses Logic bomb Time bomb Michelangelo virus Thomson Course Technology

Computer Security: Risks and Safeguards Virus Detection and Removal Antivirus programs Popular antivirus programs Many options to using antivirus software Rescue disk Thomson Course Technology

Computer Security: Risks and Safeguards Unauthorized Access and Use Crackers and hackers Access controls Identification Authentication Selecting a password Protecting your password Thomson Course Technology

Computer Security: Risks and Safeguards Firewall A security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network Proxy server Personal firewall Thomson Course Technology

Thomson Course Technology Hardware Theft and Vandalism Cable lock devices Portable equipment warrants special considerations Computer vandalism Cutting cables Deleting software Smashing computer Thomson Course Technology

Computer Security: Risks and Safeguards Software Theft Software piracy Software license Single-user license Product activation Shareware and freeware Site license Network site license Community site license Thomson Course Technology

Computer Security: Risks and Safeguards System Failure Undervoltage Brownout Blackout Overvoltage (powersurge) Spike Surge protector Surge protector with phone line protection Uninterruptible power supply (UPS) Thomson Course Technology

Computer Security: Risks and Safeguards Backup Procedures Backup Duplicate of a file, program, or disk that may be used if the original is lost, damaged, or destroyed Backup procedures policies in schools and school districts Backup programs Thomson Course Technology

Ethics and the Information Age Computer ethics Moral guidelines that govern the use of computers, networks, and information systems Thomson Course Technology

Thomson Course Technology

Thomson Course Technology

Ethics and the Information Age Phishing Email attempting to obtain personal and financial information Spam An unsolicited e-mail mess or newsgroup posting sent to many recipients or newsgroups at once Average user receives more than 1,000 spam e-mail messages each year Anti-spam campaigns Anti-spam program Thomson Course Technology

Ethics and the Information Age Privacy Laws Business or government agencies should only collect information necessary to carry out their functions Restrict data access to those who must use it to perform job duties Release personal information only after agreement to disclosure by individual Must inform the individual when collecting information Thomson Course Technology

Ethics and the Information Age Employee and Student Monitoring Use of computers to observe, record, view, and review an individual’s use of a computer Policies of computer use Acceptable Use Policy (AUP) Thomson Course Technology

Ethics and the Information Age Copyright Laws Copyright Act of 1976 Illegal copying Fair use Copyright information on Web pages Thomson Course Technology

Ethics and the Information Age Copyright Laws Teacher and student Web pages Copyright laws do protect these pages Public domain Web sites CD-ROM with images, graphics, audio, and video clips Guidelines for creating Web pages Thomson Course Technology

Thomson Course Technology

Internet Ethics and Objectionable Materials Three categories of objectionable material Pornographic material Racist literature, gambling Incorrect or inappropriate material Inaccurate information Thomson Course Technology

Internet Ethics and Objectionable Materials Recent Government Actions Dot Kids Implementation and Efficiency Act Every site designated .kids will be a safe zone for children Children’s Internet Protection Act Protects children from obscene, pornographic, and other information considered to be harmful to minors Thomson Course Technology

Internet Ethics and Objectionable Materials Parental Controls Rating systems ICRA Filtering software programs Check Internet browser’s history Thomson Course Technology

Internet Ethics and Objectionable Materials Educational Controls Acceptable Use Policies (AUP) Use of network is a privilege, not a right Behave as if you are a guest on the Internet Rules concerning objectionable sites Rules concerning copyright issues Outline proper use of equipment Online safety and personal information Consequences of violating rules Thomson Course Technology

Internet Ethics and Objectionable Materials Educational Controls Curriculum pages Acts as guides for students Sites are pre-evaluated by teachers Eliminates typing mistakes when typing URLs Teacher observation Final measure to prevent students from accessing objectionable and inappropriate materials Instruct students on use of Back button on the browser Understanding of ethical concepts Thomson Course Technology

Thomson Course Technology Health Issues Computers and Health Issues Musculoskeletal Disorder (MSD) Repetitive Strain Injury (RSI) Carpal Tunnel Syndrome (CTS) Hand Exercises Computer Vision Syndrome (CVS) Techniques to ease eyestrain Thomson Course Technology

Thomson Course Technology Health Issues Ergonomics An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace Thomson Course Technology

Emerging Technologies The Web offers enormous potential for expanding the classroom Thomson Course Technology

Emerging Technologies The World Wide Web Most K-12 schools are on the Internet The federal government is committed to high-speed Internet access in every classroom Speed will increase Full-motion video on demand Instant access to Web-based educational programs Thomson Course Technology

Emerging Technologies Educational Software on DVD Information, graphics, animations, video, and interactive links Thomson Course Technology

Emerging Technologies Assistive Technologies Technologies that modify or adapt the classroom for special learning needs Individuals with Disabilities Act (IDEA) Amendment of 1997 Thomson Course Technology

Emerging Technologies Federal Accessibility Initiative Technology should be available to people with disabilities Section 508 WebXACT Text equivalents for all non-text elements Summaries of graphs and charts All information displayed in color available without color Thomson Course Technology

Emerging Technologies Web- and Video-Enhanced Digital Textbooks Web site is continuously updated and maintained Web-Based Distance Learning All instruction provided via the Web Still evolving Useful for specialized classes not available in all schools Thomson Course Technology

Florida Virtual School Thomson Course Technology

Emerging Technologies A World Without Wires Allows teachers and students to connect to a truly global network Wireless computers will ensure that educational technology is used seamlessly and at the point of instruction Small, inexpensive computers ensure that all children have access to their lessons and the World from both home and school Thomson Course Technology

Thomson Course Technology Reference This PowerPoint is an abbreviated version of the one provided for this class by the textbook publisher Thomson Course Technology. Thomson Course Technology