On National Teacher Day, meet the 2024-25 Kenan Fellows
Inappropriate use of the network ppt
1.
2. T heTHREAT
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VInappropriate Use of the Network will always be a
concern as long as the computer is connected to the
internet.
VThreats range from email, websites, social
networking, instant messaging, to certain Web 2.0
tools. Inappropriate use of the network is common
through all technology resources mentioned above.
3. Common Misconceptions
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VThe biggest misconception of inappropriate use of the
network is that everyone is in fear of misusing computer
resources. That is not a fac. Most students, teachers, and
administrators are not concerned of inappropriate use of the
network due to firewall and blocking software that is being
used in the districts. The software on the district’s resources
do protect the students, teachers, administrators and districts
from harm most of the time.
4. T he realities Of Inappropriate USE
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VDue to the inappropriate use of the network, students are missing out on
the educational opportunities with the use of the Web 2.0 tools because of
concerns and behaviors such as cyberbullying, chatting, and visiting
websites that are not educational.
VStudents are actually more engaged and motivated with the use of the
Web 2.0 tools, but cannot use them in some districts due to this.
VThere are concerns with school employees using the Internet to view
inappropriate website and using a numerous amount of time exchanging
personal emails throughout the work day.
5. Common Responses
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VAcceptable Use Policies (AUPs): Contracts between the (Internet and computer user)
students and parents, with the district, the school, and the teachers about appropriate
network usage.
VLimited Web 2.0 Use; Many schools are prohibited to use many Web 2.0 tools such as
blogging, personal email, instant messaging, social networking sites, etc.
VFiltering and Blocking Software: Districts are purchasing this software in attempt to
keep the students safe and from accessing inappropriate use of the network.
VMonitoring and Surveillance Software: Many districts also purchase software that
monitors all information that is transmitted through the district’s network.
VRestricting Access: Many districts do not allow teachers to create or use websites and
Web 2.0 tools to be used with their classrooms and students.
6. A few Recommendations
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
Vicki Davis (2007) shares her six pillars of the Web 2.0 classroom (Robinson, Brown, & Green,
2010):
VInternet safety and privacy: Teachers make it their responsibility to teach students the skills
to be safe and to protect students from harm through careful supervision.
VInformation literacy: Teach students how to maintain privacy.
VInternet citizenship: Teach students to evaluate and respond to information on the web
critically.
VInternet teamwork: Teach students to engage in a responsible way with others online.
VIntentional Internet activities: Teachers will create intentional planned activities for
students learning while using the Internet and Web 2.0 tools.
VAn engaged teacher: The same teachers will be engaged in the student learning throughout
these activities. The teachers should be trusted as professionals to use the district’s network
appropriately and have the necessary resources and bandwidth available with few filters to
interfere in this learning process.