SlideShare a Scribd company logo
1 of 7
Download to read offline
T heTHREAT
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VInappropriate Use of the Network will always be a
concern as long as the computer is connected to the
internet.
VThreats range from email, websites, social
networking, instant messaging, to certain Web 2.0
tools. Inappropriate use of the network is common
through all technology resources mentioned above.
Common Misconceptions
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VThe biggest misconception of inappropriate use of the
network is that everyone is in fear of misusing computer
resources. That is not a fac. Most students, teachers, and
administrators are not concerned of inappropriate use of the
network due to firewall and blocking software that is being
used in the districts. The software on the district’s resources
do protect the students, teachers, administrators and districts
from harm most of the time.
T he realities Of Inappropriate USE
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VDue to the inappropriate use of the network, students are missing out on
the educational opportunities with the use of the Web 2.0 tools because of
concerns and behaviors such as cyberbullying, chatting, and visiting
websites that are not educational.
VStudents are actually more engaged and motivated with the use of the
Web 2.0 tools, but cannot use them in some districts due to this.
VThere are concerns with school employees using the Internet to view
inappropriate website and using a numerous amount of time exchanging
personal emails throughout the work day.
Common Responses
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VAcceptable Use Policies (AUPs): Contracts between the (Internet and computer user)
students and parents, with the district, the school, and the teachers about appropriate
network usage.
VLimited Web 2.0 Use; Many schools are prohibited to use many Web 2.0 tools such as
blogging, personal email, instant messaging, social networking sites, etc.
VFiltering and Blocking Software: Districts are purchasing this software in attempt to
keep the students safe and from accessing inappropriate use of the network.
VMonitoring and Surveillance Software: Many districts also purchase software that
monitors all information that is transmitted through the district’s network.
VRestricting Access: Many districts do not allow teachers to create or use websites and
Web 2.0 tools to be used with their classrooms and students.
A few Recommendations
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
Vicki Davis (2007) shares her six pillars of the Web 2.0 classroom (Robinson, Brown, & Green,
2010):
VInternet safety and privacy: Teachers make it their responsibility to teach students the skills
to be safe and to protect students from harm through careful supervision.
VInformation literacy: Teach students how to maintain privacy.
VInternet citizenship: Teach students to evaluate and respond to information on the web
critically.
VInternet teamwork: Teach students to engage in a responsible way with others online.
VIntentional Internet activities: Teachers will create intentional planned activities for
students learning while using the Internet and Web 2.0 tools.
VAn engaged teacher: The same teachers will be engaged in the student learning throughout
these activities. The teachers should be trusted as professionals to use the district’s network
appropriately and have the necessary resources and bandwidth available with few filters to
interfere in this learning process.
Sources USED
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VRobinson, L., Brown, A., and Green, T. (2010). Security vs. access.
International Society for Technology in Education

More Related Content

What's hot

Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
dlwadsworth
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the Classroom
Mrs.Faust
 
Navigating Social Media
Navigating Social MediaNavigating Social Media
Navigating Social Media
Mark Ness
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
vlbrown
 
Parent engagement cvps
Parent engagement cvpsParent engagement cvps
Parent engagement cvps
jeygenraam
 
Actions model last
Actions model lastActions model last
Actions model last
Amira Squ
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
gfoessett
 
techKNOW leadership for JefCoEd Tech Camp 7.11.13
techKNOW leadership for JefCoEd Tech Camp 7.11.13techKNOW leadership for JefCoEd Tech Camp 7.11.13
techKNOW leadership for JefCoEd Tech Camp 7.11.13
mwilson518
 
Technology in the classroom
Technology in the classroomTechnology in the classroom
Technology in the classroom
miarmenta
 
Digital citizenship project[1]
Digital citizenship project[1]Digital citizenship project[1]
Digital citizenship project[1]
lackl
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 

What's hot (20)

Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the Classroom
 
Navigating Social Media
Navigating Social MediaNavigating Social Media
Navigating Social Media
 
Social Media
Social MediaSocial Media
Social Media
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
 
Parent engagement cvps
Parent engagement cvpsParent engagement cvps
Parent engagement cvps
 
Actions model last
Actions model lastActions model last
Actions model last
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
 
Etl523 pres jj jarick
Etl523 pres jj jarickEtl523 pres jj jarick
Etl523 pres jj jarick
 
Presentation1
Presentation1Presentation1
Presentation1
 
techKNOW leadership for JefCoEd Tech Camp 7.11.13
techKNOW leadership for JefCoEd Tech Camp 7.11.13techKNOW leadership for JefCoEd Tech Camp 7.11.13
techKNOW leadership for JefCoEd Tech Camp 7.11.13
 
Mobile devices
Mobile devicesMobile devices
Mobile devices
 
Back to school - CYBER SAFETY
Back to school - CYBER SAFETYBack to school - CYBER SAFETY
Back to school - CYBER SAFETY
 
Technology in the classroom
Technology in the classroomTechnology in the classroom
Technology in the classroom
 
Week of safe internet
Week of safe internetWeek of safe internet
Week of safe internet
 
Twitter Social Networking And Social Media Oct1509
Twitter Social Networking And Social Media Oct1509Twitter Social Networking And Social Media Oct1509
Twitter Social Networking And Social Media Oct1509
 
Ed. Tech. 2
Ed. Tech. 2Ed. Tech. 2
Ed. Tech. 2
 
Faculty and staff training
Faculty and staff trainingFaculty and staff training
Faculty and staff training
 
Digital citizenship project[1]
Digital citizenship project[1]Digital citizenship project[1]
Digital citizenship project[1]
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 

Similar to Inappropriate use of the network ppt

Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
spaul6414
 
Parent training keynote_v3
Parent training keynote_v3Parent training keynote_v3
Parent training keynote_v3
bweinert
 
Digital Literacy PDLM
Digital Literacy PDLMDigital Literacy PDLM
Digital Literacy PDLM
linzer85
 
Staff training session
Staff training sessionStaff training session
Staff training session
mander5208
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
mwedwards
 
A2 s watson etl523
A2 s watson etl523A2 s watson etl523
A2 s watson etl523
cinkay
 
Technology Integration Initiative
Technology Integration InitiativeTechnology Integration Initiative
Technology Integration Initiative
hpetrich
 
Social media policy
Social media policySocial media policy
Social media policy
Har1982
 
Fall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting pptFall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting ppt
arhodes
 

Similar to Inappropriate use of the network ppt (20)

Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
 
Parent training keynote_v3
Parent training keynote_v3Parent training keynote_v3
Parent training keynote_v3
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Digital Literacy PDLM
Digital Literacy PDLMDigital Literacy PDLM
Digital Literacy PDLM
 
E safety training
E safety trainingE safety training
E safety training
 
Staff training session
Staff training sessionStaff training session
Staff training session
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
 
Resources
ResourcesResources
Resources
 
A2 s watson etl523
A2 s watson etl523A2 s watson etl523
A2 s watson etl523
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
 
Technology Integration Initiative
Technology Integration InitiativeTechnology Integration Initiative
Technology Integration Initiative
 
Edu current issues
Edu current issuesEdu current issues
Edu current issues
 
Social media policy
Social media policySocial media policy
Social media policy
 
Virtual learning, online learning environment and covid 19 slides
Virtual learning, online learning environment and covid 19  slidesVirtual learning, online learning environment and covid 19  slides
Virtual learning, online learning environment and covid 19 slides
 
The Benefits of Internet Education
The Benefits of Internet EducationThe Benefits of Internet Education
The Benefits of Internet Education
 
Fall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting pptFall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting ppt
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Inappropriate use of the network ppt

  • 1.
  • 2. T heTHREAT wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww VInappropriate Use of the Network will always be a concern as long as the computer is connected to the internet. VThreats range from email, websites, social networking, instant messaging, to certain Web 2.0 tools. Inappropriate use of the network is common through all technology resources mentioned above.
  • 3. Common Misconceptions wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww VThe biggest misconception of inappropriate use of the network is that everyone is in fear of misusing computer resources. That is not a fac. Most students, teachers, and administrators are not concerned of inappropriate use of the network due to firewall and blocking software that is being used in the districts. The software on the district’s resources do protect the students, teachers, administrators and districts from harm most of the time.
  • 4. T he realities Of Inappropriate USE wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww VDue to the inappropriate use of the network, students are missing out on the educational opportunities with the use of the Web 2.0 tools because of concerns and behaviors such as cyberbullying, chatting, and visiting websites that are not educational. VStudents are actually more engaged and motivated with the use of the Web 2.0 tools, but cannot use them in some districts due to this. VThere are concerns with school employees using the Internet to view inappropriate website and using a numerous amount of time exchanging personal emails throughout the work day.
  • 5. Common Responses wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww VAcceptable Use Policies (AUPs): Contracts between the (Internet and computer user) students and parents, with the district, the school, and the teachers about appropriate network usage. VLimited Web 2.0 Use; Many schools are prohibited to use many Web 2.0 tools such as blogging, personal email, instant messaging, social networking sites, etc. VFiltering and Blocking Software: Districts are purchasing this software in attempt to keep the students safe and from accessing inappropriate use of the network. VMonitoring and Surveillance Software: Many districts also purchase software that monitors all information that is transmitted through the district’s network. VRestricting Access: Many districts do not allow teachers to create or use websites and Web 2.0 tools to be used with their classrooms and students.
  • 6. A few Recommendations wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww Vicki Davis (2007) shares her six pillars of the Web 2.0 classroom (Robinson, Brown, & Green, 2010): VInternet safety and privacy: Teachers make it their responsibility to teach students the skills to be safe and to protect students from harm through careful supervision. VInformation literacy: Teach students how to maintain privacy. VInternet citizenship: Teach students to evaluate and respond to information on the web critically. VInternet teamwork: Teach students to engage in a responsible way with others online. VIntentional Internet activities: Teachers will create intentional planned activities for students learning while using the Internet and Web 2.0 tools. VAn engaged teacher: The same teachers will be engaged in the student learning throughout these activities. The teachers should be trusted as professionals to use the district’s network appropriately and have the necessary resources and bandwidth available with few filters to interfere in this learning process.
  • 7. Sources USED wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww VRobinson, L., Brown, A., and Green, T. (2010). Security vs. access. International Society for Technology in Education