Presentation is loading. Please wait.

Presentation is loading. Please wait.

Ch 8: Security Issues, Ethics, and Emerging Technologies in Education

Similar presentations


Presentation on theme: "Ch 8: Security Issues, Ethics, and Emerging Technologies in Education"— Presentation transcript:

1 Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Chapter 8 covers several topics. Those being security issues to be aware of as computer users, ethics as educators incorporating technology in the classroom, and emerging technologies that will transform the classroom. Taylor Grizzle

2 Security risks Virus Malicious Software Programs Boot sector virus
File virus Macro virus Malicious Software Programs Worms Trojan horses There are several security risks computer users need to be aware of. Viruses and Malicious software programs are the most frequent and major. There are three different types of viruses boot sector viruses, file viruses, and macro viruses. -A boot sector virus replaces the boot program used to start the computer with a modified, infected version of the boot program. -A file virus inserts virus code into program files; the virus then spreads to any program that accesses the infected file. -A macro virus uses the macro language of an application, such as word processing or spread sheet, to hide virus codes. When you open a document with an infected macro, the macro virus loads into memory. Malicious software programs are variations of computer viruses. A worm is a program that copies itself repeatedly in a computer’s memory or on a network, using up resources and possibly shutting down the computer or network. Creators of worms often play on user psychology to entice people to download and run them. As a result, a number of well known worms have hijacked systems and sent copies of themselves around the world in a matter of hours. -A Trojan horse is a malicious software program that hides within or is designed to look like a legitimate program.

3 How Computer Viruses and Malicious Software Programs Work

4 How Schools Safeguard Computers and Networks
Antivirus Programs Establishing username with pass codes to access computers Installing physical security devices Installing firewalls to deny network access to outsiders -Purchase and install reliable antivirus software -Scan all removable media -Scan all files downloaded from the Internet -Scan all attached files before opening them -Turn off preview -Scan all software before using it -Do not use pirated, illegal copies of copyrighted software -Never start your computer with removable media in the drives -Install a personal firewall program -Backup your files often -Set your antivirus program to scan automatically

5 Computer Backup Definition: duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed Schools have backup procedures that outline a regular plan of copying and backing up important data and programs Easiest way to backup is to copy your important files from your hard disk to a CD, USB flash drive, or portable hard drive.

6 Components of Copyright
Illegal copying or using copyrighted software programs Fair use laws and their application to the use of both printed copyrighted materials and copyrighted materials accessible on the Internet Use of copyrighted materials on teacher and student Web pages

7 Ethical Issues to Internet Usage
Unauthorized use of computers Hardware, software, and information theft Information privacy Copyright Existence of objectionable materials on the Internet Will not use a computer to harm other people Will not interfere with others’ computer work Will not look at others’ computer files Will not use a computer to steal or lie Will not copy or use software without paying for it Will not use others’ computer resources without permission Will not use others’ work Will think about the social impact of the programs he or she creates Will use a computer in a way that shows respect and consideration for other people

8 Emerging Technologies in Traditional Classrooms
Digital Media Revolution World Wide Web Netbooks Assistive Technologies Web- and Video-enhanced textbooks Web-based distance learning Wireless Technologies -To reach and motivate today’s students, teachers must understand this digital media revolution and utilize current and future digital media technologies. Teachers must integrate and adopt digital media technologies and create innovative teaching and learning technologies -The majority of PreK-12 students in most schools will be able to access thousands of full-motion videos on demand. This will allow teachers to bring live video footage of current and historical events into their classrooms. Students can review video productions on their iPods and other similar devices. -Netbooks are computers, just smaller in size but not small in flexibility, usability, or functionality. When every student has a netbook, an entire new world of anytime and anyplace learning possibilities opens up. -Assistive technologies aid in teaching student who have physical, sensory, or cognitive disabilities. Emerging assistive technologies will provide teachers with innovative tools to help students with special needs overcome the disability that blocks or impedes their learning process. -Digitized textbooks provide students with discovery learning avenues and information about thousands of topics form thousands of sources all over the world. The textbooks are enhanced with an extensive Web site that is continuously updated and maintained by a team. -Web-based instructional strategies offer creative solutions for homebound students, home-schooled students, at-risk students, students who are physically challenged, and teacher shortages for specialized positions. -Wireless communications will allow teachers and students to connect their smart phones, netbooks, Tablet PCs, iPods, and other wireless devices to a high speed network. Wireless netbook computers, tablets, mobile labs, and other devices will ensure that educational technology is used seamlessly at the point of instruction. Global wireless access will ensure that all children, regardless of socioeconomic status, will have access to educational classroom materials and the world itself from their homes, their schools, and many other locations throughout their communities.


Download ppt "Ch 8: Security Issues, Ethics, and Emerging Technologies in Education"

Similar presentations


Ads by Google