Presentation is loading. Please wait.

Presentation is loading. Please wait.

Post to Journal View my Friends PagePost to JournalView my Friends Page You are viewing your journal View Recent Comments Manage Entries Invite Friends.

Similar presentations


Presentation on theme: "Post to Journal View my Friends PagePost to JournalView my Friends Page You are viewing your journal View Recent Comments Manage Entries Invite Friends."— Presentation transcript:

1 Post to Journal View my Friends PagePost to JournalView my Friends Page You are viewing your journal View Recent Comments Manage Entries Invite Friends View Recent CommentsManage EntriesInvite Friends Hot Topics Recent Entries Archive Friends User Info February 2007 Recent EntriesArchiveFriendsUser Info SMTWTFS 123 4567891010 1112131415161717 1819202122232424 25262728 Technological Trends and Resources Important issues to know as a University Administrator Megan Hawley Natalie Floeh Rachel Diener Saint Louis University

2 Post to Journal View my Friends PagePost to JournalView my Friends Page You are viewing your journal View Recent Comments Manage Entries Invite Friends View Recent CommentsManage EntriesInvite Friends Hot Topics Recent Entries Archive Friends User Info February 2007 Recent EntriesArchiveFriendsUser Info SMTWTFS 123 4567891010 1112131415161717 1819202122232424 25262728 Internet: A system connecting computers around the world using TCP/IP, which stands for Transmission Control Protocol/Internet Protocol, The Internet consists primarily of the collection of billions of interconnected WebPages that are transferred using HTTP (Hypertext Transfer Protocol), and are collectively known as the World Wide Web.. Blog : a shared on-line journal where people can post diary entries about their personal experiences and hobbies; "postings on a blog are usually in chronological order" Spam: Unsolicited e-mail, often of a commercial nature, sent indiscriminately to multiple mailing lists, individuals, or newsgroups; junk e-mail. Listserv : a list of e-mail addresses to which messages, usually on a specific set of topics, are sent. Cellular phone: a mobile telephone system using low-powered radio transmitters, with each transmitter covering a distinct geographical area (cell), and computer equipment to switch a call from one area to another, thus enabling large-scale car or portable phone service. Network: a system containing any combination of computers, computer terminals, printers, audio or visual display devices, or telephones interconnected by telecommunication equipment or cables: used to transmit or receive information. Computer Virus: A computer program that is designed to replicate itself by copying itself into the other programs stored in a computer. It may be benign or have a negative effect, such as causing a program to operate incorrectly or corrupting a computer's memory. Firewalls: An integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system. Identity theft: the stealing of a person's financial information, esp. credit cards and Social Security number, with the intention of using that data to commit fraud and create a phony persona Important terms to know

3 Post to Journal View my Friends PagePost to JournalView my Friends Page You are viewing your journal View Recent Comments Manage Entries Invite Friends View Recent CommentsManage EntriesInvite Friends Hot Topics Recent Entries Archive Friends User Info February 2007 Recent EntriesArchiveFriendsUser Info SMTWTFS 123 4567891010 1112131415161717 1819202122232424 25262728 Blogs and Blogging Why is this and issue in Higher Education? Millennial students are beginning to enroll in colleges and universities in large numbers. As the most “wired” generation, online communities will become a part of the campus communities (Howe and Strauss, 2003). Blogs and blogging contributes to student development by allowing students to interact with others, express emotions, receive feedback, and reflect on their college experience. What are the problems students and staff face regarding blogs and blogging? Blogs are accessible to the public through services such as myspace, livejournal and blogspot. Anyone can see the information posted in blogs. This exposes students to scrutiny by peers and their supervisors. If students chose to post personal information it could place them in a position where others know too much and could face stalking, identity theft, or unwanted advances. It places the issue of conduct expectations in great importance. Should administrators have the freedom to hold students accountable for the things said in their blogs? Another issue facing administrators is the circulation of false information through blogs. There is no guarantee that information sited from the internet did not come from a blog with no factual basis. If students use space on the University server, meaning they create a website that is connected to the University network, will the university be liable for information posted on that site? All of these issues must be addressed while maintaining professional standards and with student development in mind. The Galileo Academy of Science and Technology sponsors a Li–Blog–ary, where research, reading and writing is promoted using blog software. This has proven to be successful in promoting literacy for the Academy (Huffaker, 2004). Not only can Blogs be effective for students, but teacher as well. For instance, Entry Year Teacher/Mentor Blog, uses a blog to "document, reflect, plan, mentor, analyze and to communicate" between new teachers and mentors, providing guidance and support. This Blog allows daily discussions, advice for lesson planning, or preparing for certification exams, and even ways to save time (Huffaker, 2004). What are possible solutions to these problems? The student handbook should be edited and expectations should be put in place for student conduct online. Students, staff and faculty should be educated about privacy settings and how to ensure that information is kept secret. This information should also focus on what information should never be posted due to identity theft issues. Freshman orientation curriculum should include this information as well to be sure that all incoming students are educated.

4 Post to Journal View my Friends PagePost to JournalView my Friends Page You are viewing your journal View Recent Comments Manage Entries Invite Friends View Recent CommentsManage EntriesInvite Friends Hot Topics Recent Entries Archive Friends User Info February 2007 Recent EntriesArchiveFriendsUser Info SMTWTFS 123 4567891010 1112131415161717 1819202122232424 25262728 Institutional Spam Why is this and issue in Higher Education? This technology allows the administration to get information out to students, staff and faculty in a quick and easy manner. Millennial students depend on email as a source of information which means that universities must develop methods of communicating efficiently through email (Howe and Strauss, 2003). National disasters have proven the need for universities to have a quick way to inform all members of the university about protocol and needs, institutional spam may be the answer to those questions. It is also important to have a level of control over information being communicated to students, staff and faculty from the university. What are the problems students and staff face regardingt institutional spam? Most students have “spam filters” on their email accounts. These filters keep messages that are likely to be junk spam out of their mailboxes. Students must know to expect information from the university through the listserv to ensure that important messages are not filtered out. Students, staff and faculty could also be overwhelmed with information sent through the institution. Those who wish to should have the option to opt out of all but the most critical messages. Finally, without proper controls, too many people could have access to the listserv. This could lead to unimportant information being sent out, or too many messages being sent. Students, staff and faculty would likely begin to ignore messages sent from the university if this becomes the case. A court case centered on SPAM dealt with the University of Texas and the dating service White Buffalo Ventures LLC. The appeals court said the University of Texas at Austin may block spam by White Buffalo. The service challenges the university’s ban, saying that it violated the company’s institutional right to freedom of speech (Foster, 2005). However, a three-judge panel of the U.S. Court of Appeals for the Fifth Circuit, in New Orleans, ruled that the university did not violate White Buffalo's free-speech rights. The panel also said that the federal anti- spam law, known as the CAN-SPAM Act, does not pre-empt the university's policy of blocking commercial e-mail messages (Foster, 2005). What are possible solutions to these problems? There should be a small group of people determined to have control over the listserv. These people would be in control of what messages can be sent to the listserv and how often those messages will go out. A process for opting out of receiving messages should be put in place. Finally clear expectations and desired outcomes for the list serve should be developed. These will ensure that the tool is only used to improve the campus community.

5 Post to Journal View my Friends PagePost to JournalView my Friends Page You are viewing your journal View Recent Comments Manage Entries Invite Friends View Recent CommentsManage EntriesInvite Friends Hot Topics Recent Entries Archive Friends User Info February 2007 Recent EntriesArchiveFriendsUser Info SMTWTFS 123 4567891010 1112131415161717 1819202122232424 25262728 Virus protection and Firewalls Why is this and issue in Higher Education? University networks can be compromised by one computer connecting to the network if that computer introduces a virus. The virus can spread to other computers putting research, personal communications, and privacy at risk. Virus protection requirements are common on university networks to prevent harmful attacks on the network. Firewalls can be used to block inappropriate content that will endanger the network, or is deemed harmful the the campus community. Plans must be in place to ensure that virus protection definitions are up to date and that policies allow for academic freedom as well as conduct expectations. “Due to the continually increasing dependence of University systems on the security and integrity of our computer network, servers and workstations, it has become vitally important that the University be more proactive about identifying and enforcing security standards. In particular, university computers must be properly patched with the latest appropriate updates to reduce the vulnerability of the entire community to malicious attacks. University computers must also have proper virus protection software and current virus definition libraries. These policies apply to all servers and workstations on the University network or performing university functions (University of Kentucky, 2003).” This statement of need from the IT department at the University of Kentucky clearly outlines the need for all universities to develop a plan of action to ensure that their network is kept safe. What are the problems students and staff face regarding virus protection and firewalls? Students using operating systems other than windows such as Mac’s will have difficulty getting onto the network with increased security that is designed for the windows system that is the most popular. Issues of academic freedom will arise with the use of firewalls. Terms and content that is blocked may unintentionally keep useful information off of the network. Upkeep and maintenance of the virus definitions and firewall will need to be a constant concern as new viruses are created regularly. What are possible solutions to these problems? All students, staff and faculty should be required to have some sort of virus protection on their computer before gaining access to the university network. Processes need to be in place for those students, staff and faculty using operating systems other than windows. Finally a committee will need to determine how the firewall will function and what terms will be blocked. Finally, someone must maintain the firewalls and continually update virus definitions to ensure that the network remains safe.

6 Post to Journal View my Friends PagePost to JournalView my Friends Page You are viewing your journal View Recent Comments Manage Entries Invite Friends View Recent CommentsManage EntriesInvite Friends Hot Topics Recent Entries Archive Friends User Info February 2007 Recent EntriesArchiveFriendsUser Info SMTWTFS 123 4567891010 1112131415161717 1819202122232424 25262728 Privacy protection and Identity theft Why is this and issue in Higher Education? Student, staff and faculty information is being kept online more and more. This bulk of information has made universities a main target of hackers who want to gain as much information as possible in order to profit from their crime. Students state that IT security is a big concern while applying to universities. It is assumed that universities will ensure the safety of information provided when applying. What are the problems students and staff face regarding privacy and identity theft? Information from applications, employment, and registration all includes information that would make it easy for a person’s identity to be stolen. Students, staff and faculty could also be at risk of stalking because their daily class schedules, entering and exiting residence halls, and dining habits can be stored online. According to an article in the Chronicle of Higher Education, the following information is readily available to successful hackers: Name, Social Security number, grades, disciplinary records, course listings, high school records, application information, letters of recommendation, financial aid information, parents’ salaries and tax information, medical information, wireless internet access points, swipe card usage at residence halls and cafeterias, library information, license plate numbers, alumni locations and salaries (Carnevale, 2006) Disasters such as Hurricane Katrina demonstrate how vulnerable university systems are, as well. The complete crash of the system left the Loyola University New Orleans website and databases unavailable for a long period of time. All universities should have emergency plans for disasters of this magnitude. (Kiernan, 2005) What are possible solutions to these problems? The way in which information is stored and the methods used to access that information must be evaluated. Only those with need for specific information should have access to that information. This will ensure that unauthorized people will not gain access to protected information. Levels of information protection should be established with general information being available to many and fewer people having access and information becomes more sensitive. Information about security processes should be posted online to provide assurances to students, parents and applicants that their information will be kept as safe as possible.

7 Post to Journal View my Friends PagePost to JournalView my Friends Page You are viewing your journal View Recent Comments Manage Entries Invite Friends View Recent CommentsManage EntriesInvite Friends Hot Topics Recent Entries Archive Friends User Info February 2007 Recent EntriesArchiveFriendsUser Info SMTWTFS 123 4567891010 1112131415161717 1819202122232424 25262728 Cellular and wireless technologies Why is this and issue in Higher Education? Cell phones are a main source of communications for millennial students. New technologies like text messaging, internet, pictures, and wireless internet access are giving students new ways of communicating and connecting with others. They also introduce new challenges to faculty and administrators. What are the problems students and staff face regarding cellular and wireless technologies? Students are using wireless and cellular technologies to cheat, plagiarize, disrupt class, and to avoid conduct charges. Cellular phones are beginning to replace land line phones in the residence halls causing money to be wasted on a service students are not using. Privacy is being violated by the use of cell phone cameras in inappropriate places (like locker rooms and pools). Pictures of tests are being sent to other students allowing them to cheat. Students with laptop computers are accessing the internet while in class rather than paying attention to their professors. Finally, as cell phones take the place of land line phones it is possible that a lost phone could keep the student from being contacted by university officials. Wireless technology will become more of a prevalent issue as more and more students bring laptop computers to their universities. A January 2005 study at Pennsylvania State University found that 67% of students own desktop computer, 44% own a laptop, 13% use wireless internet, and 88% own a cell phone and other wireless devices (Pennsylvania State University, 2005). These numbers have most likely increased since this study was done. What are possible solutions to these problems? Standards of usage needs to be set for these technologies. Students should know when it is appropriate for cell phones and wireless internet can be used. It needs to be determined if faculty has the right to restrict use of the internet or phones in class, if cell phones can be allowed in judicial or administrative meetings. There should also be set outcomes for the violation of those expectations. Finally the financial feasibility of continuing to offer land line phones in residence hall rooms should be determined to ensure that money is not being wasted on unused technologies. It should also be decided what university employees, particularly those who are required to be be contactable during off hours are provided with. Options include pagers, cell phones, walkie-talkies and others.

8 Post to Journal View my Friends PagePost to JournalView my Friends Page You are viewing your journal View Recent Comments Manage Entries Invite Friends View Recent CommentsManage EntriesInvite Friends Hot Topics Recent Entries Archive Friends User Info February 2007 Recent EntriesArchiveFriendsUser Info SMTWTFS 123 4567891010 1112131415161717 1819202122232424 25262728 University wide plan of action With new technologies emerging on a nearly daily basis, it will be important for universities to be prepared to understand and implement those technologies. This ability will determine the competitiveness of university recruiting, retention and student, staff and faculty satisfaction. Due to this importance, the university should restructure to include a new division. This division will be headed by the Vice President of Technological Development, Services and Security. This area of the university will go beyond the traditional scope of IT departments that just keep up with and troubleshoot problems, these professionals will help the university to offer cutting edge technology to the university community. Potential mission for the Division of Technological Development, Services and Security Our mission is to provide students, staff and faculty with the best possible services and technology while providing for the safety and security of their information. We do this to advance the academic mission of the University, to remain a competitive university in recruiting and retaining students and to establish our University as a premier technological institution. We will pursue excellence and creativity in all ventures to provide the university community with the best possible technological services.

9 Post to Journal View my Friends PagePost to JournalView my Friends Page You are viewing your journal View Recent Comments Manage Entries Invite Friends View Recent CommentsManage EntriesInvite Friends Hot Topics Recent Entries Archive Friends User Info February 2007 Recent EntriesArchiveFriendsUser Info SMTWTFS 123 4567891010 1112131415161717 1819202122232424 25262728 Proposed organization chart for the Division of Technological Development, Services and Security

10 Post to Journal View my Friends PagePost to JournalView my Friends Page You are viewing your journal View Recent Comments Manage Entries Invite Friends View Recent CommentsManage EntriesInvite Friends Hot Topics Recent Entries Archive Friends User Info February 2007 Recent EntriesArchiveFriendsUser Info SMTWTFS 123 4567891010 1112131415161717 1819202122232424 25262728 Tasks to be completed These tasks are assigned assuming that the Division of Technological Development, Services and Security has been established. However, these tasks must be addressed by someone in the university even without this division. After each task the recommended person to fill this role without the division addition will be noted. Independent committee in charge of special projects: Conduct a feasibility study on offering land line phones to residential students. This should determine the financial, social and safety impacts of keeping or removing phones from the residents halls. Options for “on-call” university staff and faculty should be researched and decisions should be made as to which option provides the highest value to the university. Administrative Assistant to the Director of Online Services: Develop educational programming for students, staff and faculty. This should focus on the safe usage of new technologies being introduced to the university. Ensure that the university community has access to information regarding online service including how to access them, possible problems, and troubleshooting. Administrative Assistant to the Director of Information Technology Services: Determine method for approving content to be included in institutional spam, draft emails to be sent to students, staff and faculty regarding technology. Keep university listservs up to date and functioning. Review online blogs to ensure that all university policies are being maintained and enforced.

11 Post to Journal View my Friends PagePost to JournalView my Friends Page You are viewing your journal View Recent Comments Manage Entries Invite Friends View Recent CommentsManage EntriesInvite Friends Hot Topics Recent Entries Archive Friends User Info February 2007 Recent EntriesArchiveFriendsUser Info SMTWTFS 123 4567891010 1112131415161717 1819202122232424 25262728 Tasks to be completed Associate Director of security maintenance: Establish expectations for students, staff and faculty when registering their computers onto the university network. This should include virus detection software, and exclusions for those using incompatible operating systems. Maintain and update firewall terms and virus definitions. Associate Director of Technology Development: Processes for opting out of institutional spam need to be established and put into action for students, staff and faculty. Determine what controls can be put on the use of cellular and wireless technologies on campus. Specifications should include the use of these technologies in class rooms, locker rooms, closed meetings, and more as established by the associate director. Research new and emerging technologies that can be used to benefit the university community. Develop plans to implement new technologies into general university use. Assistant Director of network protection: Evaluate the way in which information on students, staff and faculty are stored by the universities. Establish levels of security that ensure that only those who need to know information will have access. Sensitive materials should have the highest level of protection.

12 Post to Journal View my Friends PagePost to JournalView my Friends Page You are viewing your journal View Recent Comments Manage Entries Invite Friends View Recent CommentsManage EntriesInvite Friends Hot Topics Recent Entries Archive Friends User Info February 2007 Recent EntriesArchiveFriendsUser Info SMTWTFS 123 4567891010 1112131415161717 1819202122232424 25262728 Director of Online Services: Connect with college Deans to determine the rights of faculty members to restrict the use of cellular and wireless technologies in the classroom. Set expectations for the use of listservs to get information out to students, staff and faculty. Develop different listservs intended to reach different populations on campus. Work to develop firewall terminology and settings. This should be done in close council with the Associate Director of security maintenance. Oversee the work being done by the Associate Director of Security Maintenance and the Associate Director of Technology services along with the support staff working in those areas. Report to the Vice President of Technological Development, Services and Security any issues that impacts the university community and should be communicated to upper administrators. Director of Information Technology services: Work with the student conduct office to draft an addition to the student handbook stating expectations of student conduct online, including possible violations for including policy violations or inappropriate behavior online; the use of cellular or wireless technology in ways deemed inappropriate. Set the expectations of when cellular phones and wireless technology can be used by students, staff and faculty. Special consideration should be given to the use of these technologies in classrooms, locker rooms and closed meetings. Develop curriculum for freshman orientation sessions focusing on the safe use of online technologies such as privacy settings on blogs and virus protection. Oversee the work being done by the Associate Director of Network Protection and the Associate Director of Technology services along with the support staff working in those areas. Report to the Vice President of Technological Development, Services and Security any issues that impacts the university community and should be communicated to upper administrators. Tasks to be completed

13 Post to Journal View my Friends PagePost to JournalView my Friends Page You are viewing your journal View Recent Comments Manage Entries Invite Friends View Recent CommentsManage EntriesInvite Friends Hot Topics Recent Entries Archive Friends User Info February 2007 Recent EntriesArchiveFriendsUser Info SMTWTFS 123 4567891010 1112131415161717 1819202122232424 25262728 Vice President of Technological development, services and security: Oversee the projects of each of the Directors and Associate Directors Communicate with other Vice Presidents, Deans, Provosts and the President along with other upper administrators to ensure that all areas are aware of current and developing technologies. Develop a 5 year plan of action to incorporate technology into all aspects of the University Community Create an assessment plan for each Director and Associate Director, this plan should develop methods to gauge how successful the incorporation of technology has been and how useful that technology has been to students, staff and faculty. Communicate with the Board of Trustees to justify the continued use of university finances to develop new technologies. Hold regular staff meetings with Directors to stay updated about the successes and challenges surrounding the implementation and development of new technologies. Tasks to be completed

14 Post to Journal View my Friends PagePost to JournalView my Friends Page You are viewing your journal View Recent Comments Manage Entries Invite Friends View Recent CommentsManage EntriesInvite Friends Hot Topics Recent Entries Archive Friends User Info February 2007 Recent EntriesArchiveFriendsUser Info SMTWTFS 123 4567891010 1112131415161717 1819202122232424 25262728 References Carnevale, Dan (2006, May 12). Colleges’ Online Records Are Treasure to Hackers, Cybersecurity Expert Warns. The Chronicle of Higher Education, 52, 37. Carnevale, Dan (2006, May 12). Colleges’ Online Records Are Treasure to Hackers, Cybersecurity Expert Warns. The Chronicle of Higher Education, 52, 37 Foster, A. (2005, August). Appeals court says university of Texas may block spam. The Chronicle of Higher Education, 51(49). Retrieved February 12, 2007, from http://chronicle.com/weekly/v51/i49/49a03502.htm. Howe, Neil & Strauss, William. (2003). Millennials Go to College. 2-23 Huffaker, D. (2004, June). The educated blogger: Using weblogs to promote literacy in the classroom by David Huffaker. First Monday. Retrieved February 14, 2006 from http://firstmonday.org/issues/issue9_6/huffaker/index.html Kiernan, Vincent (2005, October 28). More Colleges Say Security Is Top Technology Concern, Survey Finds. The Chronicle of Higher Education, 52, 42. Kiernan, Vincent (2005, October 14). Ready for the Next Katrina?. The Chronicle of Higher Education, 52, 31. The Pennsylvania State University. (2005) Introduction to Wireless for Teaching. Retrieved February 14, 2007 from http://tlt.its.psu.edu/suggestions/wireless/ University of Kentucky. (2003) Patch Management and Virus Protection Policy. Retrieved February 14, 2007 from http://www.uky.edu/IT/Policies/Patch_Management_Policy.pdf Young, Jeffrey (2006, October 27). Security Lapses Common at Colleges. The Chronicle of Higher Education, 53, 37.


Download ppt "Post to Journal View my Friends PagePost to JournalView my Friends Page You are viewing your journal View Recent Comments Manage Entries Invite Friends."

Similar presentations


Ads by Google