Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher Amy Ginther Project NEThics Director; Policy Develoment Coordinator.

Slides:



Advertisements
Similar presentations
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Advertisements

Security, Privacy, Copyright, and Other Institutional Policy Implications of Online Learning Rodney J. Petersen, J.D. Policy Analyst & Security Task Force.
Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD.
Cyberethics, Cybersafety, and Cybersecurity (C3): Inspiring Students to “Own It!” Friday 9:00 - 9:45 Room 335 Vernecia Griffin Howard County Public Schools.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
How to keep your kids safe online
A Model for IT Policy Development Marilu Goodyear & Beth Forrest Warner University of Kansas Educause 2001October 29, 2001.
Understanding Issues in Implementing Technology in the Classroom Legal, Ethical, Social, and Human Issues National Educational Technology Standards for.
Internet Safety for You and Your Students A presentation for the North Woods Partnership By Edie Miles February 7, 2007 The quote below is adapted from.
Practical skills for securing a computer (NONTECHNICAL) Rebecca Gould, Director and Professor iTAC October 4, 2006.
American Library Association (ALA) Standard 5: The information literates student understands many of the economic, legal and social issues surrounding.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
Security Awareness: Taking the Medicine and Liking It Shirley C. Payne Director for Security Coordination University of Virginia EDUCAUSE Conference October.
Company LOGO Internet Safety A Community Approach.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Introduction to eChalk For Teachers. What is eChalk? » eChalk’s unique online learning environment provides your school with its own electronic “town.
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
Information and Communication Technologies in the field of general education in Armenia NATIONAL CENTER OF EDUCATIONAL TECHNOLOGIES.
Digital Literacy. Productivity Programs Digital Literacy Courses and Topics Computer Basics Security and Privacy Internet and Web Basics Digital Lifestyle.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
COE Faculty Technology Institute05/24/04 1 Educational Technology Outreach Business Collaboration Cyber Issues.
Chapter 6 Exploring the World Wide Web in the Classroom.
Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher (Part 1) University of Maryland Educational Technology Policy,
IT Update Faculty Senate September 1, 2004 University of Houston Information Technology.
 EDMODO LINDSAY CLEMENTS. Quick Guide What is Edmodo?  Free social network for teachers, students, schools and districts  Provides an engaging platform.
Agenda What is Google Summer of Code ? What are the goals of the program ? How does GSoC work ? Google Summer of Code timeline Student stipends Participating.
Ten Years of ICPL From the Cornell Perspective 1.
Digital Literacy Tour Google/iKeepSafe/YouTube Presenter Introduction Davina Pruitt-Mentle, Ph.D. Ed Tech Policy, Research and Outreach.
Online Safety for Kids PlanetUM Amy Ginther Project NEThics (sm) Office of Information Technology University of Maryland CyberEthics Seminar for Professional.
Toward An Ethical World... Responsible Internet Citizenship: Safety, Security, & Scholarship Rodney J. Petersen Policy Analyst and Security Task Force.
Copyright and Intellectual Property Issues in the Digital Environment Amy Ginther Project NEThics (sm) Office of Information Technology University of Maryland.
Lindsey Cunningham Education and Technology. What is Digital Citizenship? Digital Citizenship is the principle of teaching appropriate and responsible.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
Welcome to Week 3 in the Mrs. DeRita’s computer lab!
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
Digital Citizenship Created By: Kelli Stinson June 2011.
By: Brenna Langham. Netiquette: Some Basic Rules Be careful of the words chosen when writing a statement for others to read! The other person might misinterpret.
Digital Citizenship Project By Allen Naylor Ed 505.
Digital Citizenship. Topics  Netiquette  Copyright and Fair Use  Plagiarism  Safety on the Internet  Safety on your Computer.
DIGITAL CITIZENSHIP PROJECT Susan Abernathy. THINGS TO REMEMBER DURING THE UPCOMING YEAR!
Policy and IT Security Awareness Amy Ginther Policy Develoment Coordinator University of Maryland Information Technology Security Workshop April 2, 2004.
Social Networking Guide Or the web is not a private place.
ELECTRONIC COMMUNICATIONS Standard Grade Computing ELECTRONIC COMMUNICATIONS CHAPTER 10.
Microsoft Office XP Illustrated Introductory, Enhanced Started with Outlook 2002 Getting.
Higher Education Initiatives (with tips for your implementation!) Merri Beth Lavagnino Chief Privacy Officer and Compliance Coordinator Indiana University.
Preparing s Using Etiquette Lesson A4-3.
Introduction to Student Name Student Class.
University and IT Policies: Match or Mis-match? Marilu Goodyear, Vice Provost for Information Services and CIO Jenny Mehmedovic, Coordinator of IT Policy.
Hoover High School Computer Labs San Diego City Schools Network Use Guidelines.
Davina Pruitt-Mentle Educational Technology Outreach College of Education University of Maryland Cyberethics, Cybersafety, and Cybersecurity (C3): Implications.
Center for Cybersecurity Research and Education (CCRE)
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Digital Citizenship Jacinta Little ED 505. Table of Contents Definition of Digital Citizenship………………………… Slides 3-4 Social networking…………………………………………
By: Mr. Jamie Ferguson. Before we begin using our computers for internet use this semester, we will be learning the rules for the classroom. You will.
Why does my Elementary Student Need to Know about Maryland's New CyberSecurity CTE Track? Friday 11: :30 Davina Pruitt Mentle, Ph.D. Educational.
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
Digital Citizenship By LeAnne Noble ED 505. Netiquette Netiquette or “internet etiquette” refers to a set of rules to follow while online. Some of the.
EDUCAUSE/Internet2 Computer & Network Security Task Force Update Dan Updegrove VP for IT, University of Texas at Austin Task Force Co-chair Tempe,
Cosponsoring Organizations EDUCAUSE American Association of Community Colleges American Association of State Colleges and Universities American Council.
Digital Citizenship By: Michelle Hamby ED505. Digital citizenship is the norms of appropriate, responsible technology use. Netiquette Copyright Fair Use.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Technological Awareness for Teens and Young Adults.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Teaching Internet Safety
The Issues with Technology in education
Information Security in Your Office
Presentation transcript:

Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher Amy Ginther Project NEThics Director; Policy Develoment Coordinator University of Maryland MICCA April 27, 2004

Core Academic Values Oblinger, In Computer and Network Security in Higher Education, Luker & Petersen, editors. Community: shared decision making; outreach to connected communities (access to affiliates or other patrons) Autonomy: academic and intellectual freedom; distributed computing Privacy: “the right to open inquiry without having the subject of one’s interest examined or scrutinized by others” (American Library Association, 2002) Fairness: due process

Cyberethics Topics within the Cyberethics framework: Acceptable Use Policy Netiquette Freedom of Speech issues Privacy Intellectual Property Software Licensing Electronic Cheating Access issues

Netiquette issues Examples of breaches of Netiquette: Writing in ALL CAPS Passing around hoaxes Excessive signature files Forwarding messages without permission Being impatient with “newbies” Off topic postings Not checking for FAQ information

Cybersafety Topics within the Cybersafety framework: Protection of personal information— “Google” yourself to see what is knowable about you Password protection Screen names and identities—what do they communicate? Harrassment/Predators Hoax s/$$$ fraud

Cybersecurity Topics within the Cybersecurity framework: (overlap with Cybersafety) Viruses/Trojans— , attachments, MP3s Updating system patches Keeping anti-virus software updated Spyware Eavesdropping

Cybersecurity Awareness Programs Target Audiences: faculty, staff, students, IT professionals Delivery Methods: presentations, ads, articles, quizzes, handouts, videos Message Framework –Knowledge: what to do –Skills: how to do –Attitudes: want to do National Initiatives: –EDUCAUSE Security Education and Awareness –

Awareness Programs Communication tips (Payne, In Luker/Petersen.) –Take the message to the people –Be consistent in the message –Write to short attention spans –Make the message real to each target audience –Make it fun –Repeat, repeat, repeat Some examples:

Resources Computer and Network Security in Higher Education, Mark Luker and Rodney Petersen, editors. Collection of policies and policy development resources:

Contact Information Office of Information Technology University of Maryland, College Park Amy Ginther, Policy Development Coordinator, phone: Gerry Sneeringer, Security Officer, phone: