T e a c h e r s D i s c o v e r i n g C o m p u t e r s Integrating Technology in the Classroom 3 rd Edition Chapter 8 Security Issues, Ethics, and Emerging.

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

Northside I.S.D. Acceptable Use Policy
Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
Hart District Acceptable Use Policy Acceptable Use Policy.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Ying Wang EDN 303 Fall Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software.
Chapter 11 – Section 4-5.  Techniques use to Access the network  War Driving or access point mapping ▪ Individuals attempt to detect wireless network.
Boyertown Area School District Acceptable Use Policy.
Security Issues, Ethics, and Emerging Technologies in Education
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
CGS 1000 Introduction to Computers and Technology.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Computers Are Your Future Eleventh Edition Chapter 1: Computers & You Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 6 th Edition Security Issues, Ethics, and Emerging Technologies.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Basic Data Communication
Chapter 11 Security and Privacy: Computers and the Internet.
Security Issues and Ethics in Education
Chapter 3 Application Software.
CHAPTER 2 Communications, Networks, the Internet, and the World Wide Web.
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
Computer Programming I
Cyber crime & Security Prepared by : Rughani Zarana.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
Security Issues and Ethics in Education
Security Issues, Ethics, & Emerging Technologies in Education
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
T e a c h e r s D i s c o v e r i n g C o m p u t e r s Integrating Technology in the Classroom 3 rd Edition Chapter 1 Introduction to Integrating Technology.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Chapter 11 Objectives Describe the types of computer security risks
SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 1.
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 5 th Edition Chapter 8 Security Issues, Ethics, and Emerging Technologies.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Summer 2007.
Chapter 3 Application Software. Chapter 3 Objectives Identify the categories of application software Explain how to work with application software Identify.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Security Issues & Ethics in Education By Maud Mushayamunda.
Teachers Discovering Computers Integrating Technology in a Changing World 8th Edition Chapter Eight Security Issues and Ethics in Education.
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Network and Internet Security and Privacy
Computer Programming I
Presentation transcript:

T e a c h e r s D i s c o v e r i n g C o m p u t e r s Integrating Technology in the Classroom 3 rd Edition Chapter 8 Security Issues, Ethics, and Emerging Technologies in Education

2 CHAPTER 8 OBJECTIVES bIdentify security risks that threaten home and school computers bDescribe how computer viruses and malicious software programs work and the steps you can take to prevent viruses bDescribe different ways schools safeguard computers and networks bExplain why computer backup is important and how it is accomplished bDefine what is meant by information privacy and its impact on schools

3 CHAPTER 8 OBJECTIVES bIdentify the components of copyright that impact education bDescribe the ethical issues related to Internet usage and steps schools are taking to address them bIdentify safe and healthy uses of technology resources bDescribe the emerging technologies that will transform traditional classrooms

4 COMPUTER SECURITY: RISKS AND SAFEGUARDS bComputer security risk: Any event or action that has the potential of causing a loss of computer equipment, software, data and information, or processing capability

5 COMPUTER SECURITY: RISKS AND SAFEGUARDS bComputer Viruses New virus programs found every day

6

7 COMPUTER SECURITY: RISKS AND SAFEGUARDS bComputer Viruses Boot sector File Worm Trojan horse Macro

8

9

10 COMPUTER SECURITY: RISKS AND SAFEGUARDS bComputer Viruses Logic bomb Time bomb –Michelangelo virus

11

12 COMPUTER SECURITY: RISKS AND SAFEGUARDS bVirus Detection and Removal Antivirus programs Popular antivirus programs Many options to using antivirus software Rescue disk

13 COMPUTER SECURITY: RISKS AND SAFEGUARDS bUnauthorized Access and Use Crackers and hackers Access controls –Identification –Authentication Selecting a password Protecting your password

14 COMPUTER SECURITY: RISKS AND SAFEGUARDS bFirewall A security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network Proxy server Personal firewall

15

16 COMPUTER SECURITY: RISKS AND SAFEGUARDS bHardware Theft and Vandalism Cable lock devices Portable equipment warrants special considerations Computer vandalism –Cutting cables –Deleting software –Smashing computer

17 COMPUTER SECURITY: RISKS AND SAFEGUARDS bSoftware Theft Software piracy Software license –Single-user license –Product activation –Shareware and freeware –Site license –Network license –Community site license

18

19 COMPUTER SECURITY: RISKS AND SAFEGUARDS bInformation Theft Encryption –Plain text –Encrypted text –Encryption key

20 COMPUTER SECURITY: RISKS AND SAFEGUARDS bSystem Failure Undervoltage –Brownout –Blackout Overvoltage (powersurge) –Spike Surge protector –Surge protector with phone line protection Uninterruptible power supply (UPS)

21

22 COMPUTER SECURITY: RISKS AND SAFEGUARDS bBackup Procedures Backup –Duplicate of a file, program, or disk that may be used if the original is lost, damaged, or destroyed –Backup procedures policies in schools and school districts –Backup programs

23 ETHICS AND THE INFORMATION AGE bComputer ethics Moral guidelines that govern the use of computers and information systems

24

25 ETHICS AND THE INFORMATION AGE bInformation Privacy The right of individuals and organizations to deny or restrict the collection and use of information about them Unauthorized collection and use of information –Electronic profiles –Federal and state laws

26

27

28 ETHICS AND THE INFORMATION AGE bSpam An unsolicited message or newsgroup posting sent to many recipients or newsgroups at once Average user receives more than 1,000 spam messages each year Anti-spam campaigns Anti-spam program

29 ETHICS AND THE INFORMATION AGE bPrivacy Laws Business or government agencies should only collect information necessary to carry out their functions Restrict data access to those who must use it to perform job duties Release personal information only after agreement to disclosure by individual Must inform the individual when collecting information

30 ETHICS AND THE INFORMATION AGE bEmployee and Student Monitoring Use of computers to observe, record, view, and review an individual’s use of a computer Policies of computer use Acceptable Use Policy (AUP)

31 ETHICS AND THE INFORMATION AGE bCopyright Laws Copyright Act of 1976 Illegal copying Fair use –Copyright information on Web pages

32

33

34 ETHICS AND THE INFORMATION AGE bCopyright Laws Teacher and student Web pages –Copyright laws do protect these pages –Public domain Web sites –CD-ROM with images, graphics, audio, and video clips –Guidelines for creating Web pages

35

36 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bThree categories of objectionable material Pornographic material Racist literature, gambling Incorrect or inappropriate material –Inaccurate information

37 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bRecent Government Actions Dot Kids Implementation and Efficiency Act –Every site designated.kids will be a safe zone for children Children’s Internet Protection Act –Protects children from obscene, pornographic, and other information considered to be harmful to minors

38 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bParental Controls Rating systems –RSACi

39 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bParental Controls Filtering software programs

40 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bParental Controls Check Internet browser’s history

41 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bEducational Controls Filtering software

42 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bEducational Controls Acceptable Use Policies (AUP) –Use of network is a privilege, not a right –Behave as if you are a guest on the Internet –Rules concerning objectionable sites –Rules concerning copyright issues –Outline proper use of equipment –Online safety and personal information –Consequences of violating rules

43

44 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bEducational Controls Curriculum pages –Acts as guides for students –Sites are pre-evaluated by teachers –Eliminates typing mistakes when typing URLs

45 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bEducational Controls Teacher observation –Final measure to prevent students from accessing objectionable and inappropriate materials –Instruct students on use of Back button on the browser –Understanding of ethical concepts

46 HEALTH ISSUES bComputers and Health Issues Musculoskeletal Disorder (MSD) Repetitive Strain Injury (RSI) Carpal Tunnel Syndrome (CTS) –Hand Exercises Computer Vision Syndrome (CVS) –Techniques to ease eyestrain

47 HEALTH ISSUES bErgonomics An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace

48 EMERGING TECHNOLOGIES bThe Web offers enormous potential for expanding the classroom

49 EMERGING TECHNOLOGIES bThe World Wide Web Most K-12 schools are on the Internet The federal government is committed to high-speed Internet access in every classroom Speed will increase Full-motion video on demand Instant access to Web-based educational programs

50

51 EMERGING TECHNOLOGIES bEducational Software on DVD Information, graphics, animations, video, and interactive links bAssistive Technologies Technologies that modify or adapt the classroom for special learning needs Individuals with Disabilities Act (IDEA) Amendment of 1997

52

53 EMERGING TECHNOLOGIES bFederal Accessibility Initiative Technology should be available to people with disabilities Section 508 Bobby –Text equivalents for all non-text elements –Summaries of graphs and charts –All information displayed in color available without color

54

55 EMERGING TECHNOLOGIES bWeb-Enhanced Textbooks Web site is continuously updated and maintained

56 EMERGING TECHNOLOGIES bWeb-Based Distance Learning All instruction provided via the Web Still evolving Useful for specialized classes not available in all schools

57

58 EMERGING TECHNOLOGIES bA World Without Wires Allows teachers and students to connect to a truly global network Wireless computers will ensure that educational technology is used seamlessly and at the point of instruction Small, inexpensive computers ensure that all children have access to their lessons and the World from both home and school

59 CHAPTER SUMMARY bIdentify security risks that threaten home and school computers bDescribe how computer viruses and malicious software programs work and the steps you can take to prevent viruses bDescribe different ways schools safeguard computers and networks bExplain why computer backup is important and how it is accomplished bDefine what is meant by information privacy and its impact on schools

60 CHAPTER SUMMARY bIdentify the components of copyright that impact education bDescribe the ethical issues related to Internet usage and steps schools are taking to address them bIdentify safe and healthy uses of technology resources bDescribe the emerging technologies that will transform traditional classrooms

T e a c h e r s D i s c o v e r i n g C o m p u t e r s Integrating Technology in the Classroom 3 rd Edition Chapter 8 Complete

62

63 A WORLD WITHOUT WIRES bWireless communications technology has been around for more than 100 years, since Guglielmo Marconi sent the first wireless message by using radio waves bWireless technology has transformed the way people work, communicate, and learn

64

65 WIRELESS NETWORKS AND TERMINOLOGY bWireless Personal Area Network (WPAN) A short-range wireless network often based on Bluetooth technology Bluetooth technology uses short-range radio waves to transmit data between two Bluetooth devices –Smart phones –Microphones

66 WIRELESS NETWORKS AND TERMINOLOGY bWireless Local Area Networks (WLAN) A network that uses wireless media, such as radio waves, to connect computers and devices in a limited space – –Wi-Fi Alliance –Wi-Fi –Public Internet access point –Hot spot –Cybercafé –Wi-Fi ZONE –Warchalking

67

68 WIRELESS NETWORKS AND TERMINOLOGY bWireless Metropolitan Area and Wide Area Networks A wireless metropolitan area network (WMAN) is a wireless network designed to cover an urban area A wireless wide area network (WWAN) is a wireless network that covers a wide geographic area and uses a variety of technologies –Radio –Satellite –Mobile telephones

69

70 WIRELESS TECHNOLOGY AND EDUCATION bCampus Computing Project bThe University of Central Florida has made wireless networking available over its entire campus bWireless networks also are becoming common in many K-12 schools and school districts

71 WIRELESS TECHNOLOGY AND EDUCATION bWireless Tablet PC Size of a spiral notebook Combines all the power and speed of a desktop computer with Windows XP Tablet PC software

72

73 WIRELESS TECHNOLOGY AND SOCIETY bWireless Home Networking A wireless home network connects your home computers and peripherals without the use of wires

74

75 WIRELESS TECHNOLOGY AND SOCIETY bService Industry Health-care professionals Police officers Package couriers Retail sales personnel

76 WIRELESS TECHNOLOGY AND SOCIETY bGlobal Positioning Global Positioning System (GPS) devices GPS satellites Provides exact geographic location

77

78 WIRELESS TECHNOLOGY AND SOCIETY bAnyplace, Anytime Connectivity Anyplace, anytime wireless connectivity makes it easy to synchronize files on your handheld computers and notebook computers