Ch.8[1]

35
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 5 th Edition Security Issues, Ethics, and Emerging Technologies in Education Chapter 8

description

 

Transcript of Ch.8[1]

Page 1: Ch.8[1]

Teachers Discovering ComputersIntegrating Technology and

Digital Media in the Classroom5th Edition

Security Issues, Ethics, and Emerging Technologies in Education

Chapter 8

Page 2: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 2

Computer Security: Risks and Safeguards

Computer security risk - Any event or action that has the potential of causing a loss of computer equipment, software, data and information, or processing capability

Any illegal act involving a computer generally is referred to as a computer crime

Computer Viruses New virus programs found every day Boot sector virus File virus Worm Trojan horse Macro virus

Page 3: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 3

Page 4: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 4

Page 5: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 5

Computer Security: Risks and Safeguards

Virus Detection and Removal Antivirus programs Popular antivirus

programs Many options to using

antivirus software Rescue disk

Page 6: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 6

Computer Security: Risks and Safeguards

Possessed Objects and Biometric Devices A possessed object is any item that you must carry

to gain access to a computer Badges, cards, smart cards, and keys

Personal Identification Number (PIN) Biometric devices authenticate a person’s identity

with a physical characteristic

Page 7: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 7

Computer Security: Risks and Safeguards

Firewall A security system consisting of hardware and/or

software that prevents unauthorized access to data and information on a network

Proxy server Personal firewall

Page 8: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 8

Page 9: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 9

Computer Security: Risks and Safeguards

Hardware Theft and Vandalism Cable lock devices Portable equipment warrants special

considerations Computer vandalism

Cutting cables Deleting software Smashing computer

Page 10: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 10

Ethics and the Information Age

Computer ethics Moral guidelines that govern the use of computers,

networks, and information systems

Page 11: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 11

Page 12: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 12

Ethics and the Information Age

Information Privacy The right of individuals and organizations to deny

or restrict the collection and use of information about them

Unauthorized collection and use of information Electronic profiles Federal and state laws

Page 13: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 13

Page 14: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 14

Ethics and the Information Age

Phishing Email attempting to obtain personal and financial

information Spam

An unsolicited e-mail mess or newsgroup posting sent to many recipients or newsgroups at once

Average user receives more than 1,000 spam e-mail messages each year

Anti-spam campaigns Anti-spam program

Page 15: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 15

Ethics and the Information Age

Employee and Student Monitoring Use of computers to observe, record, view, and

review an individual’s use of a computer Policies of computer use Acceptable Use Policy (AUP)

Page 16: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 16

Ethics and the Information Age

Copyright Laws Copyright Act of 1976 Illegal copying Fair use

Copyright information on Web pages

Page 17: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 17

Ethics and the Information Age

Copyright Laws Teacher and student

Web pages Copyright laws do

protect these pages Public domain Web

sites CDs and DVDs with

images, graphics, audio, and video clips

Guidelines for creating Web pages

Page 18: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 18

Page 19: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 19

Internet Ethics and Objectionable Materials

Three categories of objectionable material Pornographic material Racist literature, gambling Incorrect or inappropriate material

Inaccurate information

Page 20: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 20

Internet Ethics and Objectionable Materials

Recent Government Actions Children’s Internet Protection Act

Protects children from obscene, pornographic, and other information considered to be harmful to minors

Page 21: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 21

Internet Ethics and Objectionable Materials

Parental Controls Rating systems

ICRA

Page 22: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 22

Internet Ethics and Objectionable Materials

Parental Controls Filtering software

programs

Page 23: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 23

Internet Ethics and Objectionable Materials

Parental Controls Filtering software Check Internet browser’s history

Page 24: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 24

Internet Ethics and Objectionable Materials

Educational Controls Curriculum pages

Acts as guides for students Sites are pre-evaluated by teachers Eliminates typing mistakes when typing URLs

Page 25: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 25

Internet Ethics and Objectionable Materials

Educational Controls Teacher observation

Final measure to prevent students from accessing objectionable and inappropriate materials

Instruct students on use of Back button on the browser

Understanding of ethical concepts

Page 26: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 26

Health Issues

Computers and Health Issues Musculoskeletal Disorder (MSD) Repetitive Strain Injury (RSI) Carpal Tunnel Syndrome (CTS)

Hand Exercises Computer Vision Syndrome (CVS)

Techniques to ease eyestrain

Page 27: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 27

Health Issues

Ergonomics An applied science devoted to incorporating

comfort, efficiency, and safety into the design of items in the workplace

Page 28: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 28

Emerging Technologies

The World Wide Web Most K-12 schools are on the Internet The federal government is committed to high-

speed Internet access in every classroom Speed will increase Full-motion video on demand Instant access to Web-based educational

programs

Page 29: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 29

Emerging Technologies

Assistive Technologies Technologies that modify

or adapt the classroom for special learning needs

Individuals with Disabilities Act (IDEA) Amendment of 1997

Page 30: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 30

Emerging Technologies

Web- and Video-Enhanced Digital Textbooks Web site is continuously updated and maintained

Web-Based Distance Learning All instruction provided via the Web Still evolving Useful for specialized classes not available in all

schools

Page 31: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 31

Page 32: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 32

Emerging Technologies

Wireless Technologies Allows teachers and students to connect to a truly

global network Wireless computers will ensure that educational

technology is used seamlessly and at the point of instruction

Small, inexpensive computers ensure that all children have access to their lessons and the World from both home and school

Page 33: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 33

Syllabus Changes

NO CLASS AUGUST 3rd

Final = July 29th

July 20th, 22nd =work on presentation July 27th= Presentations July 29th last class=final

Page 34: Ch.8[1]

Multimedia Presentations-

1. Find partner

2. Begin brainstorming and planning presentation based on chapter assigned to you.

3. http://may2010edtech.pbworks.com/Multimedia-Presentations

Chapter 7: Evaluating Educational Technology and Integration Strategies34

Page 35: Ch.8[1]

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 35