Copyright © Allyn & Bacon 2008 Using Technology in the Classroom Gary G. Bitter & Jane M. Legacy Chapter Five This multimedia product and its contents are protected under copyright law. The following are prohibited by law: Any public performance or display, including transmission of any image over a network; Preparation of any derivative work, including the extraction, in whole or in part, of any images; Any rental, lease, or lending of the program
Copyright © Allyn & Bacon 2008 Chapter Five Social, Ethical, Legal, and Human Issues
Copyright © Allyn & Bacon 2008 Focus Questions: How does technology use contribute to social and equity issues in schools? How does technology use contribute to social and equity issues in schools? What are the ethical issues presented by technology in education? What are the ethical issues presented by technology in education? In what ways can computer users avoid computer viruses, spam, scams, and phishing? In what ways can computer users avoid computer viruses, spam, scams, and phishing? Chapter Five
Copyright © Allyn & Bacon 2008 Focus Questions: In what ways can education overcome the ethical, equity, and social concerns about technology in the schools? In what ways can education overcome the ethical, equity, and social concerns about technology in the schools? What effect does cybercrime have on education? What effect does cybercrime have on education? How safe are the social networking sites for students? How safe are the social networking sites for students? How can teachers use social networking in the classroom? How can teachers use social networking in the classroom? Chapter Five
Copyright © Allyn & Bacon 2008 Focus Questions: What is the status of the digital divide? What is the status of the digital divide? List several approaches to ensure privacy, protect assets, confirm identity, and guard against unauthorized access. List several approaches to ensure privacy, protect assets, confirm identity, and guard against unauthorized access. What steps would you take to insure child safety on the WWW? What steps would you take to insure child safety on the WWW? Chapter Five
Copyright © Allyn & Bacon 2008 Focus Questions: What are the implications of cybersafety for a teacher? What are the implications of cybersafety for a teacher? Give examples of activities which violate the copyright law. Give examples of activities which violate the copyright law. What are the most common classroom copyright infractions? What are the most common classroom copyright infractions? How can you make students aware of copyright law? How can you make students aware of copyright law? Chapter Five
Copyright © Allyn & Bacon 2008 Cybercrime, Computer Fraud and Misuse Theft of… Money Information Computer Time Computer Programs Identity Chapter Five
Copyright © Allyn & Bacon 2008 Computer Invasion… Viruses Viruses Backdoor Trojan horse Virus Worm Chapter Five
Copyright © Allyn & Bacon 2008 Computer Invasion… Spam Spam Scams Scams Spyware Spyware Phishing or Identity Theft Phishing or Identity Theft Chapter Five
Copyright © Allyn & Bacon 2008 Maintaining Security… Be cautious Be cautious Social Engineering Social Engineering Passwords Passwords System locks System locks Smart card Smart card Firewalls Firewalls Chapter Five
Copyright © Allyn & Bacon 2008 Individual Privacy… Privacy Act of 1974 No secret personal data record keeping systems Individual knowledge Prevent information distribution Method for correcting Prevent misuse Chapter Five
Copyright © Allyn & Bacon 2008 Ethical and Legal Concerns in Education… Children’s Internet Protection Act (CIPA) Children’s Internet Protection Act (CIPA) Copyright Office of the Library of Congress Copyright Office of the Library of Congress Educational Fair Use Chapter Five
Copyright © Allyn & Bacon 2008 Ethical and Legal Concerns in Education… Digital Millennium Copyright Act Digital Millennium Copyright Act Teach Act of 2002 Teach Act of 2002 Child Online Protection Act (COPA) Child Online Protection Act (COPA) Children’s Online Privacy Protection Act (COPPA) Children’s Online Privacy Protection Act (COPPA) Chapter Five
Copyright © Allyn & Bacon 2008 Ethical and Legal Concerns in Education… Plagiarism Plagiarism Information Accuracy Information Accuracy Role-Playing Models Role-Playing Models Cybersafety Cybersafety Social Networking Social Networking Chapter Five
Copyright © Allyn & Bacon 2008 Equity in Education… Gender Gender Access to technology Access to technology Digital Divide Digital Divide Disabilities Disabilities Web Access initiative of the World Wide Web Consortium Equal Access to Software and Information (EASI) Chapter Five
Copyright © Allyn & Bacon 2008 Equity in Education… National Coalition for Equity in Education National Coalition for Equity in Education Chapter Five
Copyright © Allyn & Bacon 2008 The End Prepared by Carolyn Roy Chapter Five