2. Computer Security: Risks and Safeguards Computer security risk - Any event or action that has the potential of causing a loss of computer equipment, software, data and information, or processing capability Any illegal act involving a computer generally is referred to as a computer crime Computer Viruses New virus programs found every day Boot sector virus File virus Worm Trojan horse Macro virus Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 2
5. Computer Security: Risks and Safeguards Virus Detection and Removal Antivirus programs Popular antivirus programs Many options to using antivirus software Rescue disk Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 5
6. Computer Security: Risks and Safeguards Possessed Objects and Biometric Devices A possessed object is any item that you must carry to gain access to a computer Badges, cards, smart cards, and keys Personal Identification Number (PIN) Biometric devices authenticate a person’s identity with a physical characteristic Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 6
7. Computer Security: Risks and Safeguards Firewall A security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network Proxy server Personal firewall Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 7
9. Computer Security: Risks and Safeguards Hardware Theft and Vandalism Cable lock devices Portable equipment warrants special considerations Computer vandalism Cutting cables Deleting software Smashing computer Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 9
10. Ethics and the Information Age Computer ethics Moral guidelines that govern the use of computers, networks, and information systems Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 10
11. Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 11
12. Ethics and the Information Age Information Privacy The right of individuals and organizations to deny or restrict the collection and use of information about them Unauthorized collection and use of information Electronic profiles Federal and state laws Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 12
13. Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 13
14. Ethics and the Information Age Phishing Email attempting to obtain personal and financial information Spam An unsolicited e-mail mess or newsgroup posting sent to many recipients or newsgroups at once Average user receives more than 1,000 spam e-mail messages each year Anti-spam campaigns Anti-spam program Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 14
15. Ethics and the Information Age Employee and Student Monitoring Use of computers to observe, record, view, and review an individual’s use of a computer Policies of computer use Acceptable Use Policy (AUP) Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 15
16. Ethics and the Information Age Copyright Laws Copyright Act of 1976 Illegal copying Fair use Copyright information on Web pages Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 16
17. Ethics and the Information Age Copyright Laws Teacher and student Web pages Copyright laws do protect these pages Public domain Web sites CDs and DVDs with images, graphics, audio, and video clips Guidelines for creating Web pages Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 17
18. Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 18
19. Internet Ethics and Objectionable Materials Three categories of objectionable material Pornographic material Racist literature, gambling Incorrect or inappropriate material Inaccurate information Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 19
20. Internet Ethics and Objectionable Materials Recent Government Actions Children’s Internet Protection Act Protects children from obscene, pornographic, and other information considered to be harmful to minors Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 20
21. Internet Ethics and Objectionable Materials Parental Controls Rating systems ICRA Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 21
22. Internet Ethics and Objectionable Materials Parental Controls Filtering software programs Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 22
23. Internet Ethics and Objectionable Materials Parental Controls Filtering software Check Internet browser’s history Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 23
24. Internet Ethics and Objectionable Materials Educational Controls Curriculum pages Acts as guides for students Sites are pre-evaluated by teachers Eliminates typing mistakes when typing URLs Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 24
25. Internet Ethics and Objectionable Materials Educational Controls Teacher observation Final measure to prevent students from accessing objectionable and inappropriate materials Instruct students on use of Back button on the browser Understanding of ethical concepts Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 25
26. Health Issues Computers and Health Issues Musculoskeletal Disorder (MSD) Repetitive Strain Injury (RSI) Carpal Tunnel Syndrome (CTS) Hand Exercises Computer Vision Syndrome (CVS) Techniques to ease eyestrain Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 26
27. Health Issues Ergonomics An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 27
28. Emerging Technologies The World Wide Web Most K-12 schools are on the Internet The federal government is committed to high-speed Internet access in every classroom Speed will increase Full-motion video on demand Instant access to Web-based educational programs Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 28
29. Emerging Technologies Assistive Technologies Technologies that modify or adapt the classroom for special learning needs Individuals with Disabilities Act (IDEA) Amendment of 1997 Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 29
30. Emerging Technologies Web- and Video-Enhanced Digital Textbooks Web site is continuously updated and maintained Web-Based Distance Learning All instruction provided via the Web Still evolving Useful for specialized classes not available in all schools Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 30
31. Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 31
32. Emerging Technologies Wireless Technologies Allows teachers and students to connect to a truly global network Wireless computers will ensure that educational technology is used seamlessly and at the point of instruction Small, inexpensive computers ensure that all children have access to their lessons and the World from both home and school Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 32
33. Syllabus Changes NO CLASS AUGUST 3rd Final = July 29th July 20th, 22nd =work on presentation July 27th= Presentations July 29th last class=final Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 33
34. Multimedia Presentations- Find partner Begin brainstorming and planning presentation based on chapter assigned to you. http://may2010edtech.pbworks.com/Multimedia-Presentations Chapter 7: Evaluating Educational Technology and Integration Strategies 34
35. Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 35