Presentation is loading. Please wait.

Presentation is loading. Please wait.

T e a c h e r s D i s c o v e r i n g C o m p u t e r s Integrating Technology in the Classroom 3 rd Edition Chapter 8 Security Issues, Ethics, and Emerging.

Similar presentations


Presentation on theme: "T e a c h e r s D i s c o v e r i n g C o m p u t e r s Integrating Technology in the Classroom 3 rd Edition Chapter 8 Security Issues, Ethics, and Emerging."— Presentation transcript:

1 T e a c h e r s D i s c o v e r i n g C o m p u t e r s Integrating Technology in the Classroom 3 rd Edition Chapter 8 Security Issues, Ethics, and Emerging Technologies in Education

2 2 CHAPTER 8 OBJECTIVES bIdentify security risks that threaten home and school computers bDescribe how computer viruses and malicious software programs work and the steps you can take to prevent viruses bDescribe different ways schools safeguard computers and networks bExplain why computer backup is important and how it is accomplished bDefine what is meant by information privacy and its impact on schools

3 3 CHAPTER 8 OBJECTIVES bIdentify the components of copyright that impact education bDescribe the ethical issues related to Internet usage and steps schools are taking to address them bIdentify safe and healthy uses of technology resources bDescribe the emerging technologies that will transform traditional classrooms

4 4 COMPUTER SECURITY: RISKS AND SAFEGUARDS bComputer security risk: Any event or action that has the potential of causing a loss of computer equipment, software, data and information, or processing capability

5 5 COMPUTER SECURITY: RISKS AND SAFEGUARDS bComputer Viruses New virus programs found every day

6 6

7 7 COMPUTER SECURITY: RISKS AND SAFEGUARDS bComputer Viruses Boot sector File Worm Trojan horse Macro

8 8

9 9

10 10 COMPUTER SECURITY: RISKS AND SAFEGUARDS bComputer Viruses Logic bomb Time bomb –Michelangelo virus

11 11

12 12 COMPUTER SECURITY: RISKS AND SAFEGUARDS bVirus Detection and Removal Antivirus programs Popular antivirus programs Many options to using antivirus software Rescue disk

13 13 COMPUTER SECURITY: RISKS AND SAFEGUARDS bUnauthorized Access and Use Crackers and hackers Access controls –Identification –Authentication Selecting a password Protecting your password

14 14 COMPUTER SECURITY: RISKS AND SAFEGUARDS bFirewall A security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network Proxy server Personal firewall

15 15

16 16 COMPUTER SECURITY: RISKS AND SAFEGUARDS bHardware Theft and Vandalism Cable lock devices Portable equipment warrants special considerations Computer vandalism –Cutting cables –Deleting software –Smashing computer

17 17 COMPUTER SECURITY: RISKS AND SAFEGUARDS bSoftware Theft Software piracy Software license –Single-user license –Product activation –Shareware and freeware –Site license –Network license –Community site license

18 18

19 19 COMPUTER SECURITY: RISKS AND SAFEGUARDS bInformation Theft Encryption –Plain text –Encrypted text –Encryption key

20 20 COMPUTER SECURITY: RISKS AND SAFEGUARDS bSystem Failure Undervoltage –Brownout –Blackout Overvoltage (powersurge) –Spike Surge protector –Surge protector with phone line protection Uninterruptible power supply (UPS)

21 21

22 22 COMPUTER SECURITY: RISKS AND SAFEGUARDS bBackup Procedures Backup –Duplicate of a file, program, or disk that may be used if the original is lost, damaged, or destroyed –Backup procedures policies in schools and school districts –Backup programs

23 23 ETHICS AND THE INFORMATION AGE bComputer ethics Moral guidelines that govern the use of computers and information systems

24 24

25 25 ETHICS AND THE INFORMATION AGE bInformation Privacy The right of individuals and organizations to deny or restrict the collection and use of information about them Unauthorized collection and use of information –Electronic profiles –Federal and state laws

26 26

27 27

28 28 ETHICS AND THE INFORMATION AGE bSpam An unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once Average user receives more than 1,000 spam e-mail messages each year Anti-spam campaigns Anti-spam program

29 29 ETHICS AND THE INFORMATION AGE bPrivacy Laws Business or government agencies should only collect information necessary to carry out their functions Restrict data access to those who must use it to perform job duties Release personal information only after agreement to disclosure by individual Must inform the individual when collecting information

30 30 ETHICS AND THE INFORMATION AGE bEmployee and Student Monitoring Use of computers to observe, record, view, and review an individual’s use of a computer Policies of computer use Acceptable Use Policy (AUP)

31 31 ETHICS AND THE INFORMATION AGE bCopyright Laws Copyright Act of 1976 Illegal copying Fair use –Copyright information on Web pages

32 32

33 33

34 34 ETHICS AND THE INFORMATION AGE bCopyright Laws Teacher and student Web pages –Copyright laws do protect these pages –Public domain Web sites –CD-ROM with images, graphics, audio, and video clips –Guidelines for creating Web pages

35 35

36 36 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bThree categories of objectionable material Pornographic material Racist literature, gambling Incorrect or inappropriate material –Inaccurate information

37 37 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bRecent Government Actions Dot Kids Implementation and Efficiency Act –Every site designated.kids will be a safe zone for children Children’s Internet Protection Act –Protects children from obscene, pornographic, and other information considered to be harmful to minors

38 38 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bParental Controls Rating systems –RSACi

39 39 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bParental Controls Filtering software programs

40 40 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bParental Controls Check Internet browser’s history

41 41 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bEducational Controls Filtering software

42 42 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bEducational Controls Acceptable Use Policies (AUP) –Use of network is a privilege, not a right –Behave as if you are a guest on the Internet –Rules concerning objectionable sites –Rules concerning copyright issues –Outline proper use of equipment –Online safety and personal information –Consequences of violating rules

43 43

44 44 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bEducational Controls Curriculum pages –Acts as guides for students –Sites are pre-evaluated by teachers –Eliminates typing mistakes when typing URLs

45 45 INTERNET ETHICS AND OBJECTIONABLE MATERIALS bEducational Controls Teacher observation –Final measure to prevent students from accessing objectionable and inappropriate materials –Instruct students on use of Back button on the browser –Understanding of ethical concepts

46 46 HEALTH ISSUES bComputers and Health Issues Musculoskeletal Disorder (MSD) Repetitive Strain Injury (RSI) Carpal Tunnel Syndrome (CTS) –Hand Exercises Computer Vision Syndrome (CVS) –Techniques to ease eyestrain

47 47 HEALTH ISSUES bErgonomics An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace

48 48 EMERGING TECHNOLOGIES bThe Web offers enormous potential for expanding the classroom

49 49 EMERGING TECHNOLOGIES bThe World Wide Web Most K-12 schools are on the Internet The federal government is committed to high-speed Internet access in every classroom Speed will increase Full-motion video on demand Instant access to Web-based educational programs

50 50

51 51 EMERGING TECHNOLOGIES bEducational Software on DVD Information, graphics, animations, video, and interactive links bAssistive Technologies Technologies that modify or adapt the classroom for special learning needs Individuals with Disabilities Act (IDEA) Amendment of 1997

52 52

53 53 EMERGING TECHNOLOGIES bFederal Accessibility Initiative Technology should be available to people with disabilities Section 508 Bobby –Text equivalents for all non-text elements –Summaries of graphs and charts –All information displayed in color available without color

54 54

55 55 EMERGING TECHNOLOGIES bWeb-Enhanced Textbooks Web site is continuously updated and maintained

56 56 EMERGING TECHNOLOGIES bWeb-Based Distance Learning All instruction provided via the Web Still evolving Useful for specialized classes not available in all schools

57 57

58 58 EMERGING TECHNOLOGIES bA World Without Wires Allows teachers and students to connect to a truly global network Wireless computers will ensure that educational technology is used seamlessly and at the point of instruction Small, inexpensive computers ensure that all children have access to their lessons and the World from both home and school

59 59 CHAPTER SUMMARY bIdentify security risks that threaten home and school computers bDescribe how computer viruses and malicious software programs work and the steps you can take to prevent viruses bDescribe different ways schools safeguard computers and networks bExplain why computer backup is important and how it is accomplished bDefine what is meant by information privacy and its impact on schools

60 60 CHAPTER SUMMARY bIdentify the components of copyright that impact education bDescribe the ethical issues related to Internet usage and steps schools are taking to address them bIdentify safe and healthy uses of technology resources bDescribe the emerging technologies that will transform traditional classrooms

61 T e a c h e r s D i s c o v e r i n g C o m p u t e r s Integrating Technology in the Classroom 3 rd Edition Chapter 8 Complete

62 62

63 63 A WORLD WITHOUT WIRES bWireless communications technology has been around for more than 100 years, since Guglielmo Marconi sent the first wireless message by using radio waves bWireless technology has transformed the way people work, communicate, and learn

64 64

65 65 WIRELESS NETWORKS AND TERMINOLOGY bWireless Personal Area Network (WPAN) A short-range wireless network often based on Bluetooth technology Bluetooth technology uses short-range radio waves to transmit data between two Bluetooth devices –Smart phones –Microphones

66 66 WIRELESS NETWORKS AND TERMINOLOGY bWireless Local Area Networks (WLAN) A network that uses wireless media, such as radio waves, to connect computers and devices in a limited space –802.11 –Wi-Fi Alliance –Wi-Fi –Public Internet access point –Hot spot –Cybercafé –Wi-Fi ZONE –Warchalking

67 67

68 68 WIRELESS NETWORKS AND TERMINOLOGY bWireless Metropolitan Area and Wide Area Networks A wireless metropolitan area network (WMAN) is a wireless network designed to cover an urban area A wireless wide area network (WWAN) is a wireless network that covers a wide geographic area and uses a variety of technologies –Radio –Satellite –Mobile telephones

69 69

70 70 WIRELESS TECHNOLOGY AND EDUCATION bCampus Computing Project bThe University of Central Florida has made wireless networking available over its entire campus bWireless networks also are becoming common in many K-12 schools and school districts

71 71 WIRELESS TECHNOLOGY AND EDUCATION bWireless Tablet PC Size of a spiral notebook Combines all the power and speed of a desktop computer with Windows XP Tablet PC software

72 72

73 73 WIRELESS TECHNOLOGY AND SOCIETY bWireless Home Networking A wireless home network connects your home computers and peripherals without the use of wires

74 74

75 75 WIRELESS TECHNOLOGY AND SOCIETY bService Industry Health-care professionals Police officers Package couriers Retail sales personnel

76 76 WIRELESS TECHNOLOGY AND SOCIETY bGlobal Positioning Global Positioning System (GPS) devices GPS satellites Provides exact geographic location

77 77

78 78 WIRELESS TECHNOLOGY AND SOCIETY bAnyplace, Anytime Connectivity Anyplace, anytime wireless connectivity makes it easy to synchronize files on your handheld computers and notebook computers


Download ppt "T e a c h e r s D i s c o v e r i n g C o m p u t e r s Integrating Technology in the Classroom 3 rd Edition Chapter 8 Security Issues, Ethics, and Emerging."

Similar presentations


Ads by Google