Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 6 th Edition Security Issues, Ethics, and Emerging Technologies.

Slides:



Advertisements
Similar presentations
Northside I.S.D. Acceptable Use Policy
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
Computer Tech. What is an unsolicited message sent to many recipients Adware Spam Spyware Phishing here here Want to know how spam really.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Discovering Computers & Microsoft Office 2010 Discovering Computers Chapter 5.
Objectives Overview Describe various types of network attacks, and identify ways to safeguard against these attacks, including firewalls and intrusion.
Your Interactive Guide to the Digital World Discovering Computers Part 10 Manage Computing Securely, Safely and Ethically.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Ying Wang EDN 303 Fall Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software.
Chapter 11 – Section 4-5.  Techniques use to Access the network  War Driving or access point mapping ▪ Individuals attempt to detect wireless network.
Chapter 9: Privacy, Crime, and Security
Boyertown Area School District Acceptable Use Policy.
Security Issues, Ethics, and Emerging Technologies in Education
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Security, Privacy, and Ethics Online Computer Crimes.
Discovering Computers Fundamentals, 2012 Edition Living in a Digital World.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics Chapters 13 & 14.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Living in a Digital World Discovering Computers 2011.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Discovering Computers 2010
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 11 Security and Privacy: Computers and the Internet.
Security Issues and Ethics in Education
T e a c h e r s D i s c o v e r i n g C o m p u t e r s Integrating Technology in the Classroom 3 rd Edition Chapter 8 Security Issues, Ethics, and Emerging.
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
Computer Programming I
Your Interactive Guide to the Digital World Discovering Computers 2012.
Chapter 14 Security, Privacy, & Ethical Issues in IS & the Internet.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
Security Issues and Ethics in Education
Security Issues, Ethics, & Emerging Technologies in Education
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Chapter 11 Lecture 21: pp Computer Security, Ethics and Privacy.
Chapter 11 Objectives Describe the types of computer security risks
SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
1 Chapter 10 Security, Safety, Ethics, & Privacy.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 5 th Edition Chapter 8 Security Issues, Ethics, and Emerging Technologies.
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.
Ch. 9&10 RAP SarahBeth Walker. Ergonomics  The study of and development of furniture, tools, & systems that promote productivity in a safe & hearlthy.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Security Issues & Ethics in Education By Maud Mushayamunda.
Discovering Computers Fundamentals, 2010 Edition Living in a Digital World.
Teachers Discovering Computers Integrating Technology in a Changing World 8th Edition Chapter Eight Security Issues and Ethics in Education.
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Computer Programming I
Presentation transcript:

Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 6 th Edition Security Issues, Ethics, and Emerging Technologies in Education Chapter 8

Chapter Objectives  Identify security risks that threaten home and school computers  Describe how computer viruses and malicious software programs work and the steps you can take to prevent viruses  Describe different ways schools safeguard computers and networks  Explain why computer backup is important and how it is accomplished  Define what is meant by information privacy and its impact on schools Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 2

Chapter Objectives  Identify the components of copyright that impact education  Describe the ethical issues related to Internet usage and steps schools are taking to address them  Identify safe and healthy uses of technology resources  Describe the emerging technologies that will transform traditional classrooms Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 3

Computer Security: Risks and Safeguards  Computer security risk - Any event or action that has the potential of causing a loss of computer equipment, software, data and information, or processing capability  Any illegal act involving a computer generally is referred to as a computer crime  Computer Viruses  New virus programs found every day  Boot sector virus  File virus  Macro virus  Worm  Trojan horse Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 4

5

6

7

Computer Security: Risks and Safeguards  Computer Viruses  Logic bomb  Time bomb  Michelangelo virus Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 8

Computer Security: Risks and Safeguards  Virus Detection and Removal  Antivirus programs  Popular antivirus programs  Many options to using antivirus software  Rescue disk Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 9

Computer Security: Risks and Safeguards  Unauthorized Access and Use  Crackers and hackers  Access controls  Identification  Authentication  Selecting a password  Protecting your password Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 10

Computer Security: Risks and Safeguards  Possessed Objects and Biometric Devices  A possessed object is any item that you must carry to gain access to a computer or computer facility  Badges, cards, smart cards, and keys  Personal Identification Number (PIN)  Biometric devices authenticate a person’s identity with a personal characteristic Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 11

Computer Security: Risks and Safeguards  Firewall  A security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network  Proxy server  Personal firewall Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 12

Computer Security: Risks and Safeguards Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 13

Computer Security: Risks and Safeguards  Hardware Theft and Vandalism  Cable lock devices  Portable equipment warrants special considerations  Computer vandalism  Cutting cables  Deleting software  Smashing computer Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 14

Computer Security: Risks and Safeguards  Software Theft  Software piracy  Software license  Single-user license  Multiple-user  Network license  Community/State license Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 15

Computer Security: Risks and Safeguards  Information Theft  Encryption  Plain text  Encrypted text  Encryption key Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 16

Computer Security: Risks and Safeguards  System Failure  Undervoltage  Brownout  Blackout  Overvoltage (power surge)  Spike  Surge protector  Surge protector with phone line protection  Uninterruptible power supply (UPS) Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 17

Computer Security: Risks and Safeguards  Backing Up – The Ultimate Safeguard  Backup  Duplicate of a file, program, or disk that may be used if the original is lost, damaged, or destroyed  Backup procedures policies in schools and school districts  Backup programs Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 18

Ethics and the Information Age  Computer ethics  Moral guidelines that govern the use of computers, networks, and information systems  Unauthorized use of computers  Hardware, software, and information theft  Information Privacy  Copyright  Existence of objectionable materials on the Internet Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 19

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 20

Ethics and the Information Age  Information Privacy  The right of individuals and organizations to deny or restrict the collection and use of information about them  Unauthorized collection and use of information  Electronic profiles  Federal and state laws Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 21

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 22

Ethics and the Information Age  Phishing  attempting to obtain personal and financial information  Spam  An unsolicited mess or newsgroup posting sent to many recipients or newsgroups at once  Average user receives more than 1,000 spam e- mail messages each year  Spam sent through instant messaging is called spim  Spam sent via Internet Telephony is called split Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 23

Ethics and the Information Age  Privacy Laws  Business or government agencies should only collect information necessary to carry out their functions  Restrict data access to those who must use it to perform job duties  Release personal information only after agreement to disclosure by individual  Must inform the individual when collecting information Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 24

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 25

Ethics and the Information Age  Employee and Student Monitoring  Use of computers to observe, record, view, and review an individual’s use of a computer  Policies of computer use  Acceptable Use Policy (AUP) Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 26

Ethics and the Information Age  Copyright Laws  Copyright Act of 1976  Illegal copying  Fair use  Copyright information on Web pages Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 27

Ethics and the Information Age  Copyright Laws  Teacher and student Web pages  Copyright laws do protect these pages  Public domain Web sites  CDs and DVDs with images, graphics, audio, and video clips  Guidelines for creating Web pages Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 28

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 29

Internet Ethics and Objectionable Materials  Three categories of objectionable material  Pornographic material  Racist literature, gambling  Incorrect or inappropriate material  Inaccurate information Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 30

Internet Ethics and Objectionable Materials  Government Actions  Children’s Internet Protection Act  Protects children from obscene, pornographic, and other information considered to be harmful to minors Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 31

Internet Ethics and Objectionable Materials  Parental Controls  Available in Windows and Mac operating systems  Determine proper controls for children in different age groups  Monitor child’s use of computer Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 32

Internet Ethics and Objectionable Materials  Parental Controls  Filtering software programs Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 33

Internet Ethics and Objectionable Materials  Parental Controls  Filtering software  Check Internet browser’s history Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 34

Internet Ethics and Objectionable Materials  Educational Controls  Acceptable Use Policies (AUP)  Use of network is a privilege, not a right  Behave as if you are a guest on the Internet  Rules concerning objectionable sites  Rules concerning copyright issues  Outline proper use of equipment  Online safety and personal information  Consequences of violating rules Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 35

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 36

Internet Ethics and Objectionable Materials  Educational Controls  Curriculum pages  Acts as guides for students  Sites are pre-evaluated by teachers  Eliminates typing mistakes when typing URLs Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 37

Internet Ethics and Objectionable Materials  Educational Controls  Teacher observation  Final measure to prevent students from accessing objectionable and inappropriate materials  Instruct students on use of Back button on the browser  Understanding of ethical concepts Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 38

Green Computing  Involves reducing the use of electricity and the production of environmental waste while using a computer  Society and schools are taking measures to combat it Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 39

Health Issues  Computers and Health Issues  Musculoskeletal Disorder (MSD)  Repetitive Strain Injury (RSI)  Carpal Tunnel Syndrome (CTS)  Hand Exercises  Computer Vision Syndrome (CVS)  Techniques to ease eyestrain Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 40

Health Issues  Ergonomics  An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 41

Emerging Technologies  The Web offers enormous potential for expanding the classroom Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 42

Emerging Technologies  Digital Media Revolution  Continues to profoundly impact the way teachers teach and the way today’s digital students learn  Move from textbooks to a digital curriculum Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 43

Emerging Technologies  The World Wide Web  Most K-12 schools are on the Internet  The federal government is committed to high- speed Internet access in every classroom  Speed will increase  Full-motion video on demand  Instant access to interactive Web-based educational programs Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 44

Emerging Technologies  Netbooks and One-to-One Learning  Netbook computers might revolutionize educational computing  Reduce initial and replacement costs  Reduce the need for hundreds of power outlets  Significantly reduce electrical costs  Significantly reduce the need for networking cables, classroom outlets, and server space  Eliminate the need for special computer desks and separate computer labs  Significantly reduce initial and eliminate replacement costs for textbooks Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 45

Emerging Technologies  Assistive Technologies  Technologies that modify or adapt the classroom for special learning needs  Individuals with Disabilities Act (IDEA) Amendment of 1997 Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 46

Emerging Technologies  Federal Accessibility Initiative  Technology should be available to people with disabilities  Section 508 Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 47

Emerging Technologies  Web- and Video-Enhanced Digital Textbooks  Web site is continuously updated and maintained  Web-Based Distance Learning  All instruction provided via the Web  Used for some advanced placement classes  Useful for specialized classes not available in all schools Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 48

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 49

Emerging Technologies  Wireless Technologies  Allows teachers and students to connect to a truly global high-speed network  Wireless computers will ensure that educational technology is used seamlessly and at the point of instruction  Global wireless access will ensure that all children will have access to educational classroom materials and the world itself from anywhere Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 50

Chapter Summary  Identify security risks that threaten home and school computers  Describe how computer viruses and malicious software programs work and the steps you can take to prevent viruses  Describe different ways schools safeguard computers and networks  Explain why computer backup is important and how it is accomplished  Define what is meant by information privacy and its impact on schools Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 51

Chapter Summary  Identify the components of copyright that impact education  Describe the ethical issues related to Internet usage and steps schools are taking to address them  Identify safe and healthy uses of technology resources  Describe the emerging technologies that will transform traditional classrooms Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 52

Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 6 th Edition Security Issues, Ethics, and Emerging Technologies in Education Chapter 8 Complete