Ch.8[1]

817 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
817
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
42
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Ch.8[1]

  1. 1. Security Issues, Ethics, and Emerging Technologies in Education<br />Chapter 8<br />
  2. 2. Computer Security: Risks and Safeguards<br />Computer security risk - Any event or action that has the potential of causing a loss of computer equipment, software, data and information, or processing capability<br />Any illegal act involving a computer generally is referred to as a computer crime<br />Computer Viruses<br />New virus programs found every day<br />Boot sector virus<br />File virus<br />Worm<br />Trojan horse<br />Macro virus<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />2<br />
  3. 3. Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />3<br />
  4. 4. Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />4<br />
  5. 5. Computer Security: Risks and Safeguards<br />Virus Detection and Removal<br />Antivirus programs<br />Popular antivirus programs<br />Many options to using antivirus software<br />Rescue disk<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />5<br />
  6. 6. Computer Security: Risks and Safeguards<br />Possessed Objects and Biometric Devices<br />A possessed object is any item that you must carry to gain access to a computer<br />Badges, cards, smart cards, and keys<br />Personal Identification Number (PIN)<br />Biometric devices authenticate a person’s identity with a physical characteristic<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />6<br />
  7. 7. Computer Security: Risks and Safeguards<br />Firewall<br />A security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network<br />Proxy server<br />Personal firewall<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />7<br />
  8. 8. Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />8<br />
  9. 9. Computer Security: Risks and Safeguards<br />Hardware Theft and Vandalism<br />Cable lock devices<br />Portable equipment warrants special considerations<br />Computer vandalism<br />Cutting cables<br />Deleting software<br />Smashing computer<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />9<br />
  10. 10. Ethics and the Information Age<br />Computer ethics<br />Moral guidelines that govern the use of computers, networks, and information systems<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />10<br />
  11. 11. Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />11<br />
  12. 12. Ethics and the Information Age<br />Information Privacy<br />The right of individuals and organizations to deny or restrict the collection and use of information about them<br />Unauthorized collection and use of information<br />Electronic profiles<br />Federal and state laws<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />12<br />
  13. 13. Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />13<br />
  14. 14. Ethics and the Information Age<br />Phishing<br />Email attempting to obtain personal and financial information<br />Spam<br />An unsolicited e-mail mess or newsgroup posting sent to many recipients or newsgroups at once<br />Average user receives more than 1,000 spam e-mail messages each year<br />Anti-spam campaigns<br />Anti-spam program<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />14<br />
  15. 15. Ethics and the Information Age<br />Employee and Student Monitoring<br />Use of computers to observe, record, view, and review an individual’s use of a computer<br />Policies of computer use<br />Acceptable Use Policy (AUP)<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />15<br />
  16. 16. Ethics and the Information Age<br />Copyright Laws<br />Copyright Act of 1976<br />Illegal copying<br />Fair use<br />Copyright information on Web pages<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />16<br />
  17. 17. Ethics and the Information Age<br />Copyright Laws<br />Teacher and student Web pages<br />Copyright laws do protect these pages<br />Public domain Web sites<br />CDs and DVDs with images, graphics, audio, and video clips<br />Guidelines for creating Web pages<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />17<br />
  18. 18. Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />18<br />
  19. 19. Internet Ethics and Objectionable Materials<br />Three categories of objectionable material<br />Pornographic material<br />Racist literature, gambling<br />Incorrect or inappropriate material<br />Inaccurate information<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />19<br />
  20. 20. Internet Ethics and Objectionable Materials<br />Recent Government Actions<br />Children’s Internet Protection Act<br />Protects children from obscene, pornographic, and other information considered to be harmful to minors<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />20<br />
  21. 21. Internet Ethics and Objectionable Materials<br />Parental Controls<br />Rating systems<br />ICRA<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />21<br />
  22. 22. Internet Ethics and Objectionable Materials<br />Parental Controls<br />Filtering software programs<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />22<br />
  23. 23. Internet Ethics and Objectionable Materials<br />Parental Controls<br />Filtering software<br />Check Internet browser’s history<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />23<br />
  24. 24. Internet Ethics and Objectionable Materials<br />Educational Controls<br />Curriculum pages<br />Acts as guides for students<br />Sites are pre-evaluated by teachers<br />Eliminates typing mistakes when typing URLs<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />24<br />
  25. 25. Internet Ethics and Objectionable Materials<br />Educational Controls<br />Teacher observation<br />Final measure to prevent students from accessing objectionable and inappropriate materials<br />Instruct students on use of Back button on the browser<br />Understanding of ethical concepts<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />25<br />
  26. 26. Health Issues<br />Computers and Health Issues<br />Musculoskeletal Disorder (MSD)<br />Repetitive Strain Injury (RSI)<br />Carpal Tunnel Syndrome (CTS)<br />Hand Exercises<br />Computer Vision Syndrome (CVS)<br />Techniques to ease eyestrain<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />26<br />
  27. 27. Health Issues<br />Ergonomics<br />An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />27<br />
  28. 28. Emerging Technologies<br />The World Wide Web<br />Most K-12 schools are on the Internet<br />The federal government is committed to high-speed Internet access in every classroom<br />Speed will increase<br />Full-motion video on demand<br />Instant access to Web-based educational programs<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />28<br />
  29. 29. Emerging Technologies<br />Assistive Technologies<br />Technologies that modify or adapt the classroom for special learning needs<br />Individuals with Disabilities Act (IDEA) Amendment of 1997<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />29<br />
  30. 30. Emerging Technologies<br />Web- and Video-Enhanced Digital Textbooks<br />Web site is continuously updated and maintained<br />Web-Based Distance Learning<br />All instruction provided via the Web<br />Still evolving<br />Useful for specialized classes not available in all schools<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />30<br />
  31. 31. Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />31<br />
  32. 32. Emerging Technologies<br />Wireless Technologies<br />Allows teachers and students to connect to a truly global network<br />Wireless computers will ensure that educational technology is used seamlessly and at the point of instruction<br />Small, inexpensive computers ensure that all children have access to their lessons and the World from both home and school<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />32<br />
  33. 33. Syllabus Changes<br />NO CLASS AUGUST 3rd<br />Final = July 29th<br />July 20th, 22nd =work on presentation<br />July 27th= Presentations<br />July 29th last class=final<br />Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />33<br />
  34. 34. Multimedia Presentations-<br />Find partner<br />Begin brainstorming and planning presentation based on chapter assigned to you.<br />http://may2010edtech.pbworks.com/Multimedia-Presentations<br />Chapter 7: Evaluating Educational Technology and Integration Strategies<br />34<br />
  35. 35. Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education<br />35<br />

×