Presentation is loading. Please wait.

Presentation is loading. Please wait.

Teachers Discovering Computers Integrating Technology in a Changing World 8th Edition Chapter Eight Security Issues and Ethics in Education.

Similar presentations


Presentation on theme: "Teachers Discovering Computers Integrating Technology in a Changing World 8th Edition Chapter Eight Security Issues and Ethics in Education."— Presentation transcript:

1 Teachers Discovering Computers Integrating Technology in a Changing World 8th Edition Chapter Eight Security Issues and Ethics in Education

2 Chapter Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software programs work and the steps you can take to prevent viruses Describe different ways schools safeguard computers and networks Explain why computer backup is important and how it is accomplished 2

3 Chapter Objectives Define what is meant by information privacy and its impact on schools Identify the components of copyright that impact education Describe the ethical issues related to Internet usage and steps schools are taking to address them Identify safe and healthy uses of technology resources 3

4 Computer Security: Risks and Safeguards Computer security risk - Any event or action that has the potential of causing a loss of computer equipment, software, data and information, or processing capability Any illegal act involving a computer generally is referred to as a computer crime Computer Viruses – New virus programs found every day – Boot sector virus – File virus – Macro virus – Worm – Trojan horse 4

5 5

6 6

7 7

8 Computer Security: Risks and Safeguards Computer Viruses – Logic bomb – Time bomb Michelangelo virus 8

9 Discussion: Which of the following would you most likely check for viruses? 1.a previously used flash drive borrowed from a friend 2.a shareware program found in a bin at a flea-market 3.software still in shrink-wrap from a computer store 4.a program downloaded from a bulletin board 5.e-mail from an unfamiliar source Chapter 8: Security Issues and Ethics in Education 9

10 Computer Security: Risks and Safeguards Virus Detection and Removal – Antivirus programs – Popular antivirus programs – Many options to using antivirus software – Rescue disc – Virus hoaxes 10

11 Computer Security: Risks and Safeguards Unauthorized Access and Use – Crackers and hackers – Access controls Identification Authentication – Selecting a password – Protecting your password 11

12 Computer Security: Risks and Safeguards Possessed Objects and Biometric Devices – A possessed object is any item that you must carry to gain access to a computer or computer facility Badges, cards, smart cards, and keys – Personal Identification Number (PIN) – Biometric devices authenticate a person’s identity with a personal characteristic 12

13 Computer Security: Risks and Safeguards Firewall – A security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network – Proxy server – Personal firewall 13

14 Computer Security: Risks and Safeguards 14

15 Computer Security: Risks and Safeguards Hardware Theft and Vandalism – Cable lock devices – Portable equipment warrants special considerations – Computer vandalism Cutting cables Deleting software Smashing computer 15

16 Computer Security: Risks and Safeguards Software Theft – Software piracy – Software license Single-user license Multiple-user Network license Community/State license 16

17 Computer Security: Risks and Safeguards Information Theft – Encryption Plain text Encrypted text – Encryption key 17

18 Computer Security: Risks and Safeguards System Failure – Undervoltage Brownout Blackout – Overvoltage (power surge) Spike – Surge protector Surge protector with phone line protection – Uninterruptible power supply (UPS) 18

19 Computer Security: Risks and Safeguards Backing Up – The Ultimate Safeguard – Backup Duplicate of a file, program, or disk that may be used if the original is lost, damaged, or destroyed Backup procedures policies in schools and school districts Backup programs 19

20 Ethics and the Information Age Computer ethics – Moral guidelines that govern the use of computers, networks, and information systems Unauthorized use of computers Hardware, software, and information theft Information Privacy Copyright Existence of objectionable materials on the Internet 20

21 21

22 Ethics and the Information Age Information Privacy – The right of individuals and organizations to deny or restrict the collection and use of information about them – Unauthorized collection and use of information Electronic profiles Federal and state laws 22

23 23

24 Ethics and the Information Age Phishing – Email attempting to obtain personal and financial information Spam – An unsolicited e-mail mess or newsgroup posting sent to many recipients or newsgroups at once – Average user receives more than 1,000 spam e-mail messages each year – Spam sent through instant messaging is called spim – Spam sent via Internet Telephony is called split 24

25 Ethics and the Information Age Privacy Laws – Business or government agencies should only collect information necessary to carry out their functions – Restrict data access to those who must use it to perform job duties – Release personal information only after agreement to disclosure by individual – Must inform the individual when collecting information 25

26 26

27 Ethics and the Information Age Employee and Student Monitoring – Use of computers to observe, record, view, and review an individual’s use of a computer – Policies of computer use – Acceptable Use Policy (AUP) 27

28 Ethics and the Information Age Copyright Laws – Copyright Act of 1976 – Illegal copying – Fair use Copyright information on Web pages 28

29 Ethics and the Information Age Copyright Laws – Teacher and student Web pages Copyright laws do protect these pages Public domain Web sites CDs and DVDs with images, graphics, audio, and video clips Guidelines for creating Web pages 29

30 30

31 Internet Ethics and Objectionable Materials Three categories of objectionable material – Pornographic material – Racist literature, gambling – Incorrect or inappropriate material Inaccurate information 31

32 Internet Ethics and Objectionable Materials Government Actions – Children’s Internet Protection Act Protects children from obscene, pornographic, and other information considered to be harmful to minors 32

33 Internet Ethics and Objectionable Materials Parental Controls – Available in Windows and Mac operating systems – Determine proper controls for children in different age groups – Monitor child’s use of computer 33

34 Internet Ethics and Objectionable Materials Parental Controls – Filtering software programs 34

35 Internet Ethics and Objectionable Materials Parental Controls – Filtering software – Check Internet browser’s history 35

36 Internet Ethics and Objectionable Materials Educational Controls – Acceptable Use Policies (AUP) Use of network is a privilege, not a right Behave as if you are a guest on the Internet Rules concerning objectionable sites Rules concerning copyright issues Outline proper use of equipment Online safety and personal information Consequences of violating rules 36

37 37

38 Internet Ethics and Objectionable Materials Educational Controls – Curriculum resource pages Acts as guides for students Sites are pre-evaluated by teachers Eliminates typing mistakes when typing URLs 38

39 Internet Ethics and Objectionable Materials Educational Controls – Teacher observation Final measure to prevent students from accessing objectionable and inappropriate materials Instruct students on use of Back button on the browser Understanding of ethical concepts 39

40 WCC’s Technology Acceptable Use Policy (TAUP) PURPOSE: The purpose of the Wayne Community College’s (WCC) Technology Acceptable Use Procedure (TAUP) is to enhance and support the educational mission of the college. This procedure is subordinate to all applicable laws of the State of North Carolina and the United States of America. All students, faculty, staff and public patrons are responsible for using WCC’s technological resources in an effective, ethical, and lawful manner to ensure that the College maintains confidentiality, integrity, and availability of systems and information assets. PROCEDURE: The goal is to promote educational excellence for all Wayne Community College students, faculty, staff, and patrons by facilitating resource sharing, accessing outside information and research while encouraging technological innovation and worldwide communication. The following guidance on acceptable and unacceptable use is not intended to be all-inclusive in a fast- changing technological environment, but should provide the basis for determination of what is and what is not acceptable regarding technology usage. Chapter 8: Security Issues and Ethics in Education 40

41 WCC’s Technology Acceptable Use Policy (TAUP) Acceptable Use: Use consistent with the Acceptable Use Policy (AUP) for the Microelectronics Center of North Carolina (MCNC). WCC uses MCNC as its Internet Service Provider (ISP) and is therefore subject to its established AUP. MCNC’s AUP is available on its website: https://www.mcnc.org/policies/acceptable-use-policyhttps://www.mcnc.org/policies/acceptable-use-policy. Use related to administrative and other support activities considered consistent with the mission of Wayne Community College. Use for purposes of, or in support of, education and research. 41

42 WCC’s Technology Acceptable Use Policy (TAUP) Unacceptable Use: Use of WCC’s technological resources that violates federal, state and local laws or statues. Use inconsistent with MCNC’s AUP. Use of WCC’s technological resources, which provides or assists in gaining unauthorized or inappropriate access to systems, networks, software, or data at WCC or any other sites. Use of the Internet for any illegal activity, including violation of copyrights, patents, trademarks, software licensing, or other contracts. Use of the Internet or other technology for financial or commercial gain, including but not limited to gambling. Use for activities that interfere with the ability of others to use WCC’s technological resources effectively. 42

43 WCC’s Technology Acceptable Use Policy (TAUP) Unacceptable Use: Use for activities that result in the loss of another person’s work or unauthorized access to another person’s work. Use of another person’s account. Divulging passwords to anyone else. Divulging personal, confidential, or sensitive information. Use for distribution of obscene, pornographic, abusive or threatening messages via electronic communications of any means. Use for a defamatory, libelous, or slanderous purpose. Use in a discriminatory manner, to promote discrimination or incite hate. Use for distribution of chain letters or broadcasting to lists of individuals in such a manner that might cause congestion on the network or cause College networks to be blocked by external systems due to “spamming” or other misuse (unsolicited bulk messages or advertising for example). 43

44 WCC’s Technology Acceptable Use Policy (TAUP) Unacceptable Use: Reconfiguring or tampering with the operation of the College’s computer systems and components, networks, and wide area networks to which the college subscribes, including the Internet. This includes any circumvention of IT security systems. Cyberharassment, which includes Cyberbullying, is defined by the National Conference of State Legislatures as follows: “Cyberharassment differs from cyberstalking in that it may generally be defined as not involving a credible threat. Cyberharassment usually pertains to threatening or harassing email messages, instant messages, or to blog entries or websites dedicated solely to tormenting an individual.” Reference North Carolina General Statues 14-196(b) and 14- 458.1. 44

45 WCC’s Technology Acceptable Use Policy (TAUP) Unacceptable Use: Cyberstalking, which is defined by the National Conference of State Legislatures as follows: “Cyberstalking is the use of the Internet, email or other electronic communications to stalk, and generally refers to a pattern of threating or malicious behaviors. Cyberstalkinh may be considered the most dangerous of the three types of Internet harassment, based on a posing credible threat of harm.” Reference N.C. General Statue 14-196.3. Sending malware, viruses, worms, Trojan horses, email bombs, spyware, adware, keyloggers, or other harmful software code. 45

46 WCC’s Technology Acceptable Use Policy (TAUP) Wayne Community College reserves the right and will exercise its responsibility to record and/or monitor its systems for acceptable use. This may include (except where prohibited by law) examination of the content (including private or personal content) stored with email and data files of any users, and examination of the access history of any users while on Wayne Community College systems or devices. WCC makes every effort to protect from threats and vulnerabilities and expects all users of its systems to adhere to all procedures governing use of technology. Violations of this procedure may result in a reduction of access to WCC technological resources or complete denial of access to WCC technological resources. IT staff will communicate all violations to the appropriate Vice President. Violators will be subject to College disciplinary processes and the College may pursue legal action. Action taken by WCC does not preclude the possibility of legal action taken by others. MODIFICATIONS: WCC reserves the right to modify this procedure at any time 46

47 Green Computing Involves reducing the use of electricity and the production of environmental waste while using a computer Society and schools are taking measures to combat it 47

48 Health Issues Computers and Health Issues – Musculoskeletal Disorder (MSD) – Repetitive Strain Injury (RSI) – Carpal Tunnel Syndrome (CTS) Hand Exercises – Computer Vision Syndrome (CVS) Techniques to ease eyestrain 48

49 Health Issues Ergonomics – An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace 49


Download ppt "Teachers Discovering Computers Integrating Technology in a Changing World 8th Edition Chapter Eight Security Issues and Ethics in Education."

Similar presentations


Ads by Google