Copyright © Allyn & Bacon 2008 Using Technology in the Classroom Gary G. Bitter & Jane M. Legacy Chapter Five This multimedia product and its contents.

Slides:



Advertisements
Similar presentations
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Advertisements

Copyright © Allyn & Bacon 2008 Using Technology in the Classroom Gary G. Bitter & Jane M. Legacy Chapter Four This multimedia product and its contents.
Teachers and The Law 7 th Chapter 17 Who Controls Student Records? Fischer, Schimmel, Stellman PowerPoint Presentation Gerri Spinella Ed.D. Elizabeth McDonald.
Parents and Families Chapter 4
Copyright © Allyn & Bacon 2011 Learning with New Literacies Chapter 2 This multimedia product and its content are protected under copyright law. The following.
10. Staffing the School: Recruitment and Selection Determining Staffing Needs Recruitment Federal Regulations to Prevent Employment Discrimination Federal.
Internet safety By Lydia Snowden.
Copyright © Allyn & Bacon 2004 Chapter 6 Selecting Your Speech Topic This multimedia product and its contents are protected under copyright law. The following.
Tia Dimou.  The internet is a wonderful resource for people of all ages  Users must be cautious and aware of what information they input  Credit card.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 8 Using the Web for Teaching and Learning START This multimedia product and its contents are protected.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 7 The Internet and the World Wide Web START This multimedia product and its contents are protected.
“ Copyright © Allyn & Bacon 2010 Deviance 10e Chapter Fifteen Internet Deviance This multimedia product and its contents are protected under copyright.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Digital Citizen Project Katie Goodall Educational Technology 505.
13. Fiscal Accounting, Budgeting, and Building Management Where Does the Money Come From? The Building and Grounds The Planning and Budgeting Process This.
Security Issues, Ethics, & Emerging Technologies in Education
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Copyright  Pearson Allyn & Bacon 2010 Chapter 13 Creating and Managing a Literacy Program This multimedia product and its contents are protected under.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 11 Issues in Implementing Technology in Schools START This multimedia product and its contents are.
Copyright © Allyn & Bacon 2007 Chapter 4 PLANNING LEARNING ACTIVITIES This multimedia product and its contents are protected under copyright law. The following.
© 2011 Pearson Education, Inc. All rights reserved. Chapter Three: Persist Cornerstone: Creating Success through Positive Change 6 th edition Robert M.
Digital Citizenship Project By Allen Naylor Ed 505.
Digital Citizenship. Topics  Netiquette  Copyright and Fair Use  Plagiarism  Safety on the Internet  Safety on your Computer.
Digital Citizenship By: Amanda Thurber. Netiquette on Social Media Sites According to networketiquette.net, netiquette is the social code of the internet.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Copyright © 2007 Allyn & Bacon Mayer’s Personality: A Systems Approach Part 2: Parts of PersonalityChapter 5: Interior Selves… Interior Selves; Interior.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
Copyright © Allyn & Bacon 2008 Using Technology in the Classroom Gary G. Bitter & Jane M. Legacy This multimedia product and its contents are protected.
11. Restructuring the Deployment of Instructional Personnel
14. Technology Applications for School Management How to Get Started Technology Plans Technology Applications for a School Office Word Processing Desktop.
Copyright © Allyn & Bacon 2008 Using Technology in the Classroom Gary G. Bitter & Jane M. Legacy Chapter Fourteen This multimedia product and its contents.
Copyright © Allyn & Bacon 2008 Using Technology in the Classroom Gary G. Bitter & Jane M. Legacy This multimedia product and its contents are protected.
Copyright © Allyn & Bacon 2008 Using Technology in the Classroom Gary G. Bitter & Jane M. Legacy Chapter Ten This multimedia product and its contents are.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 10 Distance Education: Using Technology to Redefine the Classroom START This multimedia product and.
Copyright © Allyn & Bacon 2008 Using Technology in the Classroom Gary G. Bitter & Jane M. Legacy Chapter Thirteen This multimedia product and its contents.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Chapter 1 Educational Technology in Context: The Big Picture This multimedia product and its contents are protected under copyright law. The following.
By: Mallory Thornton.  Social code of website  Cyber term  Derived from network and etiquette.
Privacy, Security and Ethics
Things Every Computer User Should Know… Jessica Johnsey ED 505- Technology and Education.
16. Legal Rights and Responsibilities of Staff and Students First Amendment Rights Freedom of Expression Student Publications School Library Books Required.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Copyright © Allyn & Bacon 2002 An Introduction to Human Services: Policy and Practice Self Determination §This multimedia product and its contents are.
Copyright © Allyn & Bacon 2007 Power Point Presentations for Each Chapter of SuperVision and Instructional Leadership: A Developmental Approach Carl D.
Copyright © Allyn & Bacon 2004 Chapter 2 The Ethics of Public Speaking This multimedia product and its contents are protected under copyright law. The.
Copyright © 2013, 2010, 2007, 2005 Pearson Education, Inc. All Rights Reserved. Chapter 7 Gathering Supporting Materials This multimedia product and its.
Copyright © Allyn & Bacon 2008 Data-Driven Decisions and School Leadership: Best Practices for School Improvement Theodore J. Kowalski Thomas J. Lasley.
Chapter 8 Directive Control Behaviors
Copyright © Allyn & Bacon 2008 Using Technology in the Classroom Gary G. Bitter & Jane M. Legacy Chapter Twelve This multimedia product and its contents.
5. Creating a Positive Learning Climate Positive Student Control The School as a Culture The Development of a Positive Program The Development of a Positive.
Sociology Now 1 st Edition (Brief) Kimmel/Aronson *This multimedia product and its contents are protected under copyright law. The following are prohibited.
Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
3. Decision Process and Decision Making at the School Site
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Using Technology in the Classroom
Using Technology in the Classroom
8. Special Students and Special Services
An Introduction to Human Services: Policy and Practice
Using Technology in the Classroom
9. Human Resources Development
Using Technology in the Classroom
Chapter 1 Educational Technology in Context: The Big Picture
The Issues with Technology in education
Using Technology in the Classroom
Privacy, Security, and Ethics
Presentation transcript:

Copyright © Allyn & Bacon 2008 Using Technology in the Classroom Gary G. Bitter & Jane M. Legacy Chapter Five This multimedia product and its contents are protected under copyright law. The following are prohibited by law: Any public performance or display, including transmission of any image over a network; Preparation of any derivative work, including the extraction, in whole or in part, of any images; Any rental, lease, or lending of the program

Copyright © Allyn & Bacon 2008 Chapter Five Social, Ethical, Legal, and Human Issues

Copyright © Allyn & Bacon 2008 Focus Questions: How does technology use contribute to social and equity issues in schools? How does technology use contribute to social and equity issues in schools? What are the ethical issues presented by technology in education? What are the ethical issues presented by technology in education? In what ways can computer users avoid computer viruses, spam, scams, and phishing? In what ways can computer users avoid computer viruses, spam, scams, and phishing? Chapter Five

Copyright © Allyn & Bacon 2008 Focus Questions: In what ways can education overcome the ethical, equity, and social concerns about technology in the schools? In what ways can education overcome the ethical, equity, and social concerns about technology in the schools? What effect does cybercrime have on education? What effect does cybercrime have on education? How safe are the social networking sites for students? How safe are the social networking sites for students? How can teachers use social networking in the classroom? How can teachers use social networking in the classroom? Chapter Five

Copyright © Allyn & Bacon 2008 Focus Questions: What is the status of the digital divide? What is the status of the digital divide? List several approaches to ensure privacy, protect assets, confirm identity, and guard against unauthorized access. List several approaches to ensure privacy, protect assets, confirm identity, and guard against unauthorized access. What steps would you take to insure child safety on the WWW? What steps would you take to insure child safety on the WWW? Chapter Five

Copyright © Allyn & Bacon 2008 Focus Questions: What are the implications of cybersafety for a teacher? What are the implications of cybersafety for a teacher? Give examples of activities which violate the copyright law. Give examples of activities which violate the copyright law. What are the most common classroom copyright infractions? What are the most common classroom copyright infractions? How can you make students aware of copyright law? How can you make students aware of copyright law? Chapter Five

Copyright © Allyn & Bacon 2008 Cybercrime, Computer Fraud and Misuse Theft of…  Money  Information  Computer Time  Computer Programs  Identity Chapter Five

Copyright © Allyn & Bacon 2008 Computer Invasion… Viruses Viruses  Backdoor  Trojan horse  Virus  Worm Chapter Five

Copyright © Allyn & Bacon 2008 Computer Invasion… Spam Spam Scams Scams Spyware Spyware Phishing or Identity Theft Phishing or Identity Theft Chapter Five

Copyright © Allyn & Bacon 2008 Maintaining Security… Be cautious Be cautious Social Engineering Social Engineering Passwords Passwords System locks System locks Smart card Smart card Firewalls Firewalls Chapter Five

Copyright © Allyn & Bacon 2008 Individual Privacy… Privacy Act of 1974  No secret personal data record keeping systems  Individual knowledge  Prevent information distribution  Method for correcting  Prevent misuse  Chapter Five

Copyright © Allyn & Bacon 2008 Ethical and Legal Concerns in Education… Children’s Internet Protection Act (CIPA) Children’s Internet Protection Act (CIPA)   Copyright Office of the Library of Congress Copyright Office of the Library of Congress  Educational Fair Use  Chapter Five

Copyright © Allyn & Bacon 2008 Ethical and Legal Concerns in Education… Digital Millennium Copyright Act Digital Millennium Copyright Act Teach Act of 2002 Teach Act of 2002 Child Online Protection Act (COPA) Child Online Protection Act (COPA) Children’s Online Privacy Protection Act (COPPA) Children’s Online Privacy Protection Act (COPPA) Chapter Five

Copyright © Allyn & Bacon 2008 Ethical and Legal Concerns in Education… Plagiarism Plagiarism Information Accuracy Information Accuracy Role-Playing Models Role-Playing Models Cybersafety Cybersafety Social Networking Social Networking Chapter Five

Copyright © Allyn & Bacon 2008 Equity in Education… Gender Gender Access to technology Access to technology Digital Divide Digital Divide Disabilities Disabilities  Web Access initiative of the World Wide Web Consortium  Equal Access to Software and Information (EASI) Chapter Five

Copyright © Allyn & Bacon 2008 Equity in Education… National Coalition for Equity in Education National Coalition for Equity in Education   Chapter Five

Copyright © Allyn & Bacon 2008 The End Prepared by Carolyn Roy Chapter Five