T e a c h e r s D i s c o v e r i n g C o m p u t e r s Integrating Technology in the Classroom 3 rd Edition Chapter 8 Security Issues, Ethics, and Emerging Technologies in Education
2 CHAPTER 8 OBJECTIVES bIdentify security risks that threaten home and school computers bDescribe how computer viruses and malicious software programs work and the steps you can take to prevent viruses bDescribe different ways schools safeguard computers and networks bExplain why computer backup is important and how it is accomplished bDefine what is meant by information privacy and its impact on schools
3 CHAPTER 8 OBJECTIVES bIdentify the components of copyright that impact education bDescribe the ethical issues related to Internet usage and steps schools are taking to address them bIdentify safe and healthy uses of technology resources bDescribe the emerging technologies that will transform traditional classrooms
4 COMPUTER SECURITY: RISKS AND SAFEGUARDS bComputer security risk: Any event or action that has the potential of causing a loss of computer equipment, software, data and information, or processing capability
5 COMPUTER SECURITY: RISKS AND SAFEGUARDS bComputer Viruses New virus programs found every day
6
7 COMPUTER SECURITY: RISKS AND SAFEGUARDS bComputer Viruses Boot sector File Worm Trojan horse Macro
8
9
10 COMPUTER SECURITY: RISKS AND SAFEGUARDS bComputer Viruses Logic bomb Time bomb –Michelangelo virus
11
12 COMPUTER SECURITY: RISKS AND SAFEGUARDS bVirus Detection and Removal Antivirus programs Popular antivirus programs Many options to using antivirus software Rescue disk
13 COMPUTER SECURITY: RISKS AND SAFEGUARDS bUnauthorized Access and Use Crackers and hackers Access controls –Identification –Authentication Selecting a password Protecting your password
14 COMPUTER SECURITY: RISKS AND SAFEGUARDS bFirewall A security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network Proxy server Personal firewall
15
16 COMPUTER SECURITY: RISKS AND SAFEGUARDS bHardware Theft and Vandalism Cable lock devices Portable equipment warrants special considerations Computer vandalism –Cutting cables –Deleting software –Smashing computer
17 COMPUTER SECURITY: RISKS AND SAFEGUARDS bSoftware Theft Software piracy Software license –Single-user license –Product activation –Shareware and freeware –Site license –Network license –Community site license
18
19 COMPUTER SECURITY: RISKS AND SAFEGUARDS bInformation Theft Encryption –Plain text –Encrypted text –Encryption key
20 COMPUTER SECURITY: RISKS AND SAFEGUARDS bSystem Failure Undervoltage –Brownout –Blackout Overvoltage (powersurge) –Spike Surge protector –Surge protector with phone line protection Uninterruptible power supply (UPS)
21
22 COMPUTER SECURITY: RISKS AND SAFEGUARDS bBackup Procedures Backup –Duplicate of a file, program, or disk that may be used if the original is lost, damaged, or destroyed –Backup procedures policies in schools and school districts –Backup programs
23 ETHICS AND THE INFORMATION AGE bComputer ethics Moral guidelines that govern the use of computers and information systems
24
25 ETHICS AND THE INFORMATION AGE bInformation Privacy The right of individuals and organizations to deny or restrict the collection and use of information about them Unauthorized collection and use of information –Electronic profiles –Federal and state laws
26
27
28 ETHICS AND THE INFORMATION AGE bSpam An unsolicited message or newsgroup posting sent to many recipients or newsgroups at once Average user receives more than 1,000 spam messages each year Anti-spam campaigns Anti-spam program
29 ETHICS AND THE INFORMATION AGE bPrivacy Laws Business or government agencies should only collect information necessary to carry out their functions Restrict data access to those who must use it to perform job duties Release personal information only after agreement to disclosure by individual Must inform the individual when collecting information
30 ETHICS AND THE INFORMATION AGE bEmployee and Student Monitoring Use of computers to observe, record, view, and review an individual’s use of a computer Policies of computer use Acceptable Use Policy (AUP)
31 ETHICS AND THE INFORMATION AGE bCopyright Laws Copyright Act of 1976 Illegal copying Fair use –Copyright information on Web pages
32
33
34 ETHICS AND THE INFORMATION AGE bCopyright Laws Teacher and student Web pages –Copyright laws do protect these pages –Public domain Web sites –CD-ROM with images, graphics, audio, and video clips –Guidelines for creating Web pages
35
36 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bThree categories of objectionable material Pornographic material Racist literature, gambling Incorrect or inappropriate material –Inaccurate information
37 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bRecent Government Actions Dot Kids Implementation and Efficiency Act –Every site designated.kids will be a safe zone for children Children’s Internet Protection Act –Protects children from obscene, pornographic, and other information considered to be harmful to minors
38 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bParental Controls Rating systems –RSACi
39 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bParental Controls Filtering software programs
40 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bParental Controls Check Internet browser’s history
41 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bEducational Controls Filtering software
42 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bEducational Controls Acceptable Use Policies (AUP) –Use of network is a privilege, not a right –Behave as if you are a guest on the Internet –Rules concerning objectionable sites –Rules concerning copyright issues –Outline proper use of equipment –Online safety and personal information –Consequences of violating rules
43
44 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bEducational Controls Curriculum pages –Acts as guides for students –Sites are pre-evaluated by teachers –Eliminates typing mistakes when typing URLs
45 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bEducational Controls Teacher observation –Final measure to prevent students from accessing objectionable and inappropriate materials –Instruct students on use of Back button on the browser –Understanding of ethical concepts
46 HEALTH ISSUES bComputers and Health Issues Musculoskeletal Disorder (MSD) Repetitive Strain Injury (RSI) Carpal Tunnel Syndrome (CTS) –Hand Exercises Computer Vision Syndrome (CVS) –Techniques to ease eyestrain
47 HEALTH ISSUES bErgonomics An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
48 EMERGING TECHNOLOGIES bThe Web offers enormous potential for expanding the classroom
49 EMERGING TECHNOLOGIES bThe World Wide Web Most K-12 schools are on the Internet The federal government is committed to high-speed Internet access in every classroom Speed will increase Full-motion video on demand Instant access to Web-based educational programs
50
51 EMERGING TECHNOLOGIES bEducational Software on DVD Information, graphics, animations, video, and interactive links bAssistive Technologies Technologies that modify or adapt the classroom for special learning needs Individuals with Disabilities Act (IDEA) Amendment of 1997
52
53 EMERGING TECHNOLOGIES bFederal Accessibility Initiative Technology should be available to people with disabilities Section 508 Bobby –Text equivalents for all non-text elements –Summaries of graphs and charts –All information displayed in color available without color
54
55 EMERGING TECHNOLOGIES bWeb-Enhanced Textbooks Web site is continuously updated and maintained
56 EMERGING TECHNOLOGIES bWeb-Based Distance Learning All instruction provided via the Web Still evolving Useful for specialized classes not available in all schools
57
58 EMERGING TECHNOLOGIES bA World Without Wires Allows teachers and students to connect to a truly global network Wireless computers will ensure that educational technology is used seamlessly and at the point of instruction Small, inexpensive computers ensure that all children have access to their lessons and the World from both home and school
59 CHAPTER SUMMARY bIdentify security risks that threaten home and school computers bDescribe how computer viruses and malicious software programs work and the steps you can take to prevent viruses bDescribe different ways schools safeguard computers and networks bExplain why computer backup is important and how it is accomplished bDefine what is meant by information privacy and its impact on schools
60 CHAPTER SUMMARY bIdentify the components of copyright that impact education bDescribe the ethical issues related to Internet usage and steps schools are taking to address them bIdentify safe and healthy uses of technology resources bDescribe the emerging technologies that will transform traditional classrooms
T e a c h e r s D i s c o v e r i n g C o m p u t e r s Integrating Technology in the Classroom 3 rd Edition Chapter 8 Complete
62
63 A WORLD WITHOUT WIRES bWireless communications technology has been around for more than 100 years, since Guglielmo Marconi sent the first wireless message by using radio waves bWireless technology has transformed the way people work, communicate, and learn
64
65 WIRELESS NETWORKS AND TERMINOLOGY bWireless Personal Area Network (WPAN) A short-range wireless network often based on Bluetooth technology Bluetooth technology uses short-range radio waves to transmit data between two Bluetooth devices –Smart phones –Microphones
66 WIRELESS NETWORKS AND TERMINOLOGY bWireless Local Area Networks (WLAN) A network that uses wireless media, such as radio waves, to connect computers and devices in a limited space – –Wi-Fi Alliance –Wi-Fi –Public Internet access point –Hot spot –Cybercafé –Wi-Fi ZONE –Warchalking
67
68 WIRELESS NETWORKS AND TERMINOLOGY bWireless Metropolitan Area and Wide Area Networks A wireless metropolitan area network (WMAN) is a wireless network designed to cover an urban area A wireless wide area network (WWAN) is a wireless network that covers a wide geographic area and uses a variety of technologies –Radio –Satellite –Mobile telephones
69
70 WIRELESS TECHNOLOGY AND EDUCATION bCampus Computing Project bThe University of Central Florida has made wireless networking available over its entire campus bWireless networks also are becoming common in many K-12 schools and school districts
71 WIRELESS TECHNOLOGY AND EDUCATION bWireless Tablet PC Size of a spiral notebook Combines all the power and speed of a desktop computer with Windows XP Tablet PC software
72
73 WIRELESS TECHNOLOGY AND SOCIETY bWireless Home Networking A wireless home network connects your home computers and peripherals without the use of wires
74
75 WIRELESS TECHNOLOGY AND SOCIETY bService Industry Health-care professionals Police officers Package couriers Retail sales personnel
76 WIRELESS TECHNOLOGY AND SOCIETY bGlobal Positioning Global Positioning System (GPS) devices GPS satellites Provides exact geographic location
77
78 WIRELESS TECHNOLOGY AND SOCIETY bAnyplace, Anytime Connectivity Anyplace, anytime wireless connectivity makes it easy to synchronize files on your handheld computers and notebook computers