 Wiam Younes & George Semlch Carnegie Mellon University & Robert Morris University.

Slides:



Advertisements
Similar presentations
Non-Classroom Teacher Evaluation Guidelines. The single most influential component of an effective school is the individual teachers within that school.
Advertisements

M & E for K to 12 BEP in Schools
JOSHUA.S. RORE: COMPUTER SCIENCE
School in a Virtual Shoebox Using A Learning Management System in Your School.
Smart Technology Policy for Districts Dennis Small, Director of Educational Technology, OSPI WSSDA Conference November 22, 2013.
What does it mean for school districts?. Protecting Children in the 21 st Century Act Signed into law by Congress in October 2008 Extension of Child Internet.
LIFE SKILLS: ASSESSMENT IN THE THREE STUDY AREAS PERSONAL AND SOCIAL WELL-BEING (PSW) PHYSICAL EDUCATION (PE) CREATIVE ARTS (CA)
KUSD Student Acceptable Use Policy School Board Policy #6633.
Presented By Michelle Decker Elements Laws Classroom It’s our responsibility.
INACOL National Standards for Quality Online Teaching, Version 2.
Accounting 264 Legal Environment of Business. Needs Assessment Problem- The North West Community College needs classes on ethics. What is offered at NWCC.
Year Seven Netbook Project. Aims of the Project To evaluate the impact on learning and teaching of using portable technologies both within and outside.
BY: CHELSEA KUCERA ELED 318 The Legal, Social and Ethical Issues in Technology for the Classroom.
The Family Educational Rights and Privacy Act FERPA Tutorial online:
CONNECTING LEARNERS USING WEB 2.0 TOOLS GERARDO A. SCHOELLER INSTRUCTIONAL TECHNOLOGY Dr. Nicolas Diogo 10/24/2013.
Internet Safety and Meeting eRate Requirements Martin Sieverding August 17, 2011 Wagner, SD.
Does the use of math journals improve students retention and recall of math facts and formulas?
Disruptive Innovation in K12 Education? Using Moodle to Create a Blending Learning Experience for Students.
Dr E Kritzinger – UNISA SACSAW Cyber Awareness Implementation Plan (CAIP) for schools.
PLAN AND ORGANISE ASSESSMENT. By the end of this session, you will have an understanding of what is assessment, competency based assessment, assessment.
INTERNET SAFETY Public Hearing  September 8, 2014.
By Raquel Cantu Lamar University, EDLD 5362, ET8021.
Certificate IV in Project Management Course Structure Course Number Qualification Code BSB41507.
Internet Safety Getting On Board with the Plan. Introduction Technology and the Internet offer valuable resources and tools that enhance learning, but.
MOODLE MAKEOVER Using Moodle for Staff Development.
Instructional Plan Template | Slide 1 AET/515 Instructional Plan Misty Lunsford.
 The Lesson plan is applicable for all prep- secondary levels.  15 Minutes Teaching  25 Minutes learning activities (Student- focused)  Applicable.
Converting from Military to Civilian Employment Presented By Sophia Alexander Stringfield.
Instructional Plan | Slide 1 AET/515 Instructional Plan December 17, 2012 Kevin Houser.
Going Google Name: Marc Hauschildt School: West Liberty High School Blog: marchauschildt.com International Automotive Components.
Grades 4-6 Be SAFE Online! Ceres Unified School District.
Bethune Middle School Technology Plan Presented by: William Carter E7801-Instructional Technology Planning and Management Dr. Regina Merriwether.
Promoting safe and healthy ways of using the internet in the classroom Ms. Sherman.
Internet Safety Curriculum 1. Three Main Goals 2 of the Internet Safety Curriculum Project.
Creating a Positive, 21 st Century School Culture Information provided by the OUSD NoBullying Committee
Curriculum organized by Santa Ana Unified School District Day 4 OUSD Cyber Safe/Cyber Smart created 1/2011 Digital.
Talking to your kids about online safety. Children see parents/people use different types of technology at an early age. Once children reach the age to.
EGUSD Internet Safety 1 Elementary Curriculum. Three Main Goals 2 of the Internet Safety Curriculum Project.
February 28, 2012 Presented By: Eileen Rohan, Superintendent Sean Maher, Network Manager Katie Frank, White Hill Michael Bessonette, Brookside Upper Ron.
Internet Safety Protecting Our Future Presenter TaKecia Barlow.
1 Building a Patient Safety Mentor Program Michele Campbell, RN, MSM, CPHQ FABC Corporate Director Patient Safety and Accreditation Christiana Care Health.
INTRODUCTION TO ONLINE FACILITATION- DAY TWO Anna N Perry.
Acceptable Use Policies and Internet Safety Melissa Borger Jamie Grauel Sam Westbrook Liz Robb Melissa Borger Jamie Grauel Sam Westbrook Liz Robb.
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
My Final Presentation Angie Duvall North Bullitt 11 th Grade Art History.
August 31, The Etowah County School District’s electronic network is available to all students and employees. The goal is to foster learning environments.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Digital Communication By: Jamie Maceri and Joyce Estes.
Blended settings provide effective PBL opportunities Dr. Christine Sabieh, Professor Notre Dame University TESOL 2016 – CALL-IS, Baltimore Panel on Project-Based.
eLearning at Taylors Lakes Secondary College
Information Security Program
Presented By Michelle Decker
Using Technology in Teaching
Interact 2: Communicating
Cabarrus County schools SECURITY, Social Media POLICY AND BYOT
Computer Literacy – Grade 8
Program Evaluation.
SAFE 101 NSC Chapter 29.
Heather Jones Our Lady of Perpetual Help 5th Grade History
Working to Keep our Children Safe in a World Filled with Technology
Teaching Internet Safety
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Technology Policy and School Staff and Faculty
Computer Literacy – Grade 8
Smart Learning concepts to enhance SMART Universities in Africa
Implementing the Child Outcomes Summary Process: Challenges, strategies, and benefits July, 2011 Welcome to a presentation on implementation issues.
Standard 6: Educational Leaders understand the social, legal, and ethical issues related to technology and model responsible decision-making related to.
Implementing the Child Outcomes Summary Process: Challenges, strategies, and benefits July, 2011 Welcome to a presentation on implementation issues.
Student Data Protections & Instructional Academic Reporting
Protecting Student Data
Presentation transcript:

 Wiam Younes & George Semlch Carnegie Mellon University & Robert Morris University

 Adoption of technology in schools  NETS Standard Four for educators  Federal and state compliance requirements - CIPA - FERPA - HIPAA - Data Breach Act  Cyber crimes are on the rise  Cyber citizenry  Determining Cybersecurity education outline  Method of delivery

 Two studies  Pilot 50 participants  Mixed methods - Quantitative (Surveyed 46 participants) - Qualitative (20 in-depth interviews)

The majority of the background survey participants (61%) were teachers, although some participants had more than one role. 4

5

 100% use technology on daily basis in schools.  94% use computers and the internet more than once a day.  54% use mobile phones in education.  80% use the school attendance and grade system more than once a day.  70% use a Learning Management System e.g. Blackboard on daily basis.  74% use Wiki and/or blog on daily basis.  48% use Smart Board once a day. 24% on Safe Browsing 28% on FERPA 9% on the Safe use of mobile devices 4% Protecting personal information online 17% CIPA 44% Cyberbullying

7 The level of C3 training in Allegheny County K-12 schools and the frequency of provided training. 1. Segmented 2. Informal 3. Scattered o “I don’t recall training for teachers and staff on cybersecurity, safety, and ethics topics.” o “Apart from general statements that I make all the time there has been NO formal program of training.” o “No formal training. Policies are discussed in or in staff meetings.” o Cyber School educators “No training; We are sure there is an AUP but we never read it; some one at the school talks to students about acceptable behavior but we don’t know who.”

8

9

Hybrid modality can accommodate:  Training on a range of cybersecurity topics  Differentiated learning  Schools training culture  Optimizing learning  Lead by example  Real life experiences

 Move faculty and staff from understanding how to protect personal identifiable information towards acknowledging their role in protecting their cyberspace.  Incorporate the previous experiences of faculty and staff  Link the benefits of learning to faculty and staff’s role in building holistic responsible citizens  Integrate personal knowledge and real life situations  Eliminate hurdles  Celebrate appropriate behavior and initiatives

 Select the topics  Provide online information or content  Hands on training on the use of anti-virus, manage , secure browsers and running updates  Facilitate peer-led sessions to share best practices  Support students led C3 projects  Support the integration of C3 topics in classrooms

 Twice an academic year  reminders  During peer-led sessions  During hands on training  Occurrence of an event

Select four methods of assessment.  Monitor teachers and staff cybersecurity actions  Conduct a pre and post assessment to assess any increase in the level of knowledge  Encourage teachers to organize cybersecurity events, competitions and presentations  Monitor the number of incidents  Attend classes covering C3 topics  Build an assessment tool at the end of asynchronous content  Collect participants' feedback at the end of hands on training session or peer-led session  Expose learners to a real-life cybersecurity threat  Video tape a group led session for future discussion  Monitor the number of questions and accurate responses in a Chatroom

Let us begin the discussion. Wiam Safe Net Content