The schools recognize the importance of computer and Internet to support 21st century skills building. We find the Department of Education in the Philippines investing on computer and Internet in the elementary schools. But at the side we find educators commenting on the downside of technology use on the child safety and morals. The education leaders and teachers need not re-invent the wheel to define competency standards on cyber safety, ethics and security.
Security in Learning Management Systems: Designing Collaborative Learning Act...eLearning Papers
Authors: Jorge Miguel Moneo, Santi Caballé, Josep Prieto-Blázquez
The field of research on information technology applications in the design of computer supported collaborative learning (CSCL) activities generates very complex scenarios which must be studied from different approaches. One approach is to consider information security, but not only from a technological point of view.
Digital Intelligence (DQ) is a comprehensive set of technical, cognitive, meta-cognitive, and socio-emotional competencies grounded in universal moral values that enable individuals to face the challenges of digital life and adapt to its demands. Thus, individuals equipped with DQ become wise, competent, and future-ready digital citizens who successfully use, control, and create technology to enhance humanity.
Security in Learning Management Systems: Designing Collaborative Learning Act...eLearning Papers
Authors: Jorge Miguel Moneo, Santi Caballé, Josep Prieto-Blázquez
The field of research on information technology applications in the design of computer supported collaborative learning (CSCL) activities generates very complex scenarios which must be studied from different approaches. One approach is to consider information security, but not only from a technological point of view.
Digital Intelligence (DQ) is a comprehensive set of technical, cognitive, meta-cognitive, and socio-emotional competencies grounded in universal moral values that enable individuals to face the challenges of digital life and adapt to its demands. Thus, individuals equipped with DQ become wise, competent, and future-ready digital citizens who successfully use, control, and create technology to enhance humanity.
Ethics has to do with moral principles that control or influence a person’s behavior. Research ethics has taken a prime position in the process of research. Digital watermarking as a technology that embeds information, in machine-readable form, within the content of a digital media file could raise privacy issues if deployed in ways that fail to take privacy into account. Digital watermarking can be applied to different applications including digital signatures, fingerprinting, broadcast and publication monitoring, authentication, copy control, and secret communication. This paper brings to view various ethical concerns of digital watermarking such as privacy, piracy, deception and anonymity.
The Essential Elements of Digital Literacy for the 21st Century WorkforceTime To Know
Modern workers must acquire these 21st-century skills: creativity, critical thinking, collaboration, communication, information, media, and technology. (see the p21.org famous chart ) However, today we know that skills are not enough to survive in the digital era. What is also needed is digital literacy. Read full article here: https://www.timetoknow.com/next-gen-corporate/essential-digital-literacy-skills-for-the-21st-century-worker/
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSijfcstjournal
Recent advances in computing have caused cyber security to become an increasingly critical issue that
affects our everyday life. Both young and old in society are exposed to benefits and dangers that
accompany technological advance. Cyber security education is a vital part of reducing the risks associated
with cyber-threats. This is particularly important for current and future youth, who are the most
technology-literate generations. Many research studies and competitions have been undertaken around the
world to emphasize and identify the significance of cyber security as a relevant and pressing research area.
Cyber security competitions are great means of raising interest in the young generation and attracting them
to educational programmes in this area. These competitions show the need for cyber security to be taught
as a formal subject in secondary schools to enhance the effectiveness of computer science concepts in cyber
space. This paper presents an effective educational approach, justifying such competitions as a means of
introducing cyber security as a computer science subject for New Zealand secondary school students, and
also presents methods of implementation.
Recapitulating the development initiatives of a robust information security s...IOSR Journals
Abstract: Most current information security systems performance vary with the nature of the filed its being
operating. With an increased emphasizes on the adoption of security tools and technologies, the anomalies and
intrusion are mostly said defined to be detected on system's algorithm, when most systems have well defined
mechanism for rapid reaction and identification of intrusions. However, despite this support for anomaly
detection, this is usually limited and often require a full recompilation of the system to deploy a comprehensive
framework of security governance, strategies and practices employing the policies in implementation.
As a result, the absence of a robust security framework securing both the education and corporate
resources has heightened the tension for a strategic information security solutions which might ends with cost,
complexities and cumbersome to develop. This paper thereby presents an alternative comprehensive system
namely RITS-B which accommodates both the nature of education and organizations without a need to for a
further modification. Implication of the proposed approach at real time depicts its suitability in the arena of
concern.
Keywords: Information Security, Governance, Strategies, Practices, Regional Cultures and Believes.
Information Security Management in University Campus Using Cognitive SecurityCSCJournals
Nowadays, most universities offer free Internet connections, access to scientific databases, and advanced computer networks for the members of their community, which generates dynamic and complex scenarios. In this context, it is necessary to define proactive security strategies, as well as the integration of technology and research. This work presents a general vision of the experience adopted by the universities in the field of information security management using cognitive security.
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdfmeetsolanki44
WPGC empowers K-12 organizations with robust cybersecurity solutions. Explore effective strategies to safeguard against evolving threats in the educational landscape
Get training in cyber security & place yourself in good companies through...CCI Training Center
Get Cyber Security Training Program Information, Why Should You Learn?, What Will You Learn? Cyber Security Courses & Place Yourself in Good Companies Through This Courses. https://medium.com/@ccitrainingc/get-training-in-cyber-security-place-yourself-in-good-companies-through-this-course-7bd8aa675a65
Ethics has to do with moral principles that control or influence a person’s behavior. Research ethics has taken a prime position in the process of research. Digital watermarking as a technology that embeds information, in machine-readable form, within the content of a digital media file could raise privacy issues if deployed in ways that fail to take privacy into account. Digital watermarking can be applied to different applications including digital signatures, fingerprinting, broadcast and publication monitoring, authentication, copy control, and secret communication. This paper brings to view various ethical concerns of digital watermarking such as privacy, piracy, deception and anonymity.
The Essential Elements of Digital Literacy for the 21st Century WorkforceTime To Know
Modern workers must acquire these 21st-century skills: creativity, critical thinking, collaboration, communication, information, media, and technology. (see the p21.org famous chart ) However, today we know that skills are not enough to survive in the digital era. What is also needed is digital literacy. Read full article here: https://www.timetoknow.com/next-gen-corporate/essential-digital-literacy-skills-for-the-21st-century-worker/
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSijfcstjournal
Recent advances in computing have caused cyber security to become an increasingly critical issue that
affects our everyday life. Both young and old in society are exposed to benefits and dangers that
accompany technological advance. Cyber security education is a vital part of reducing the risks associated
with cyber-threats. This is particularly important for current and future youth, who are the most
technology-literate generations. Many research studies and competitions have been undertaken around the
world to emphasize and identify the significance of cyber security as a relevant and pressing research area.
Cyber security competitions are great means of raising interest in the young generation and attracting them
to educational programmes in this area. These competitions show the need for cyber security to be taught
as a formal subject in secondary schools to enhance the effectiveness of computer science concepts in cyber
space. This paper presents an effective educational approach, justifying such competitions as a means of
introducing cyber security as a computer science subject for New Zealand secondary school students, and
also presents methods of implementation.
Recapitulating the development initiatives of a robust information security s...IOSR Journals
Abstract: Most current information security systems performance vary with the nature of the filed its being
operating. With an increased emphasizes on the adoption of security tools and technologies, the anomalies and
intrusion are mostly said defined to be detected on system's algorithm, when most systems have well defined
mechanism for rapid reaction and identification of intrusions. However, despite this support for anomaly
detection, this is usually limited and often require a full recompilation of the system to deploy a comprehensive
framework of security governance, strategies and practices employing the policies in implementation.
As a result, the absence of a robust security framework securing both the education and corporate
resources has heightened the tension for a strategic information security solutions which might ends with cost,
complexities and cumbersome to develop. This paper thereby presents an alternative comprehensive system
namely RITS-B which accommodates both the nature of education and organizations without a need to for a
further modification. Implication of the proposed approach at real time depicts its suitability in the arena of
concern.
Keywords: Information Security, Governance, Strategies, Practices, Regional Cultures and Believes.
Information Security Management in University Campus Using Cognitive SecurityCSCJournals
Nowadays, most universities offer free Internet connections, access to scientific databases, and advanced computer networks for the members of their community, which generates dynamic and complex scenarios. In this context, it is necessary to define proactive security strategies, as well as the integration of technology and research. This work presents a general vision of the experience adopted by the universities in the field of information security management using cognitive security.
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdfmeetsolanki44
WPGC empowers K-12 organizations with robust cybersecurity solutions. Explore effective strategies to safeguard against evolving threats in the educational landscape
Get training in cyber security & place yourself in good companies through...CCI Training Center
Get Cyber Security Training Program Information, Why Should You Learn?, What Will You Learn? Cyber Security Courses & Place Yourself in Good Companies Through This Courses. https://medium.com/@ccitrainingc/get-training-in-cyber-security-place-yourself-in-good-companies-through-this-course-7bd8aa675a65
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders Jerry Sakala
This is the document Jerry Sakala used to facilitate Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders. Inspired by The Alberta Digital Policy development guide.
Get training in cyber security & place yourself in good companies through...CCI Training Center
Get Cyber Security Training Program Information, Why Should You Learn?, What Will You Learn? Cyber Security Courses & Place Yourself in Good Companies Through This Courses. https://medium.com/@ccitrainingc/get-training-in-cyber-security-place-yourself-in-good-companies-through-this-course-7bd8aa675a65
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
Irene Moetsana-Moeng, Executive Director and Head at Public Sector Agency on Stakeholders in Cybersecurity: Collaborative Defence for Cybersecurity Resilience at Public Sector Cybersecurity Summit 2024
What is the purpose of a digital citizenship program? Who is the audience in schools - teachers, parents, students? This presentation looks at some of the research and discusses the factors to consider when developing a digital citizenship program for your school.
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...AI Publications
In the current digital landscape, cybercriminals continually evolve their techniques to execute successful attacks on businesses, thus posing a great challenge to information technology (IT) professionals. While traditional cybersecurity approaches like layered defense and reactive security have helped IT professionals cope with traditional threats, they are ineffective in dealing with evolving cyberattacks. This paper focuses on the need for a proactive cybersecurity culture among IT professionals to enable them combat evolving threats. The paper emphasis that building a proactive security approach and culture can help among IT professionals anticipate, identify, and mitigate latent threats prior to them exploiting existing vulnerabilities. This paper also points out that as IT professionals use reactive security when dealing with traditional attacks, they can use it collaboratively with proactive security to effectively protect their networks, data, and systems and avoid heavy costs of dealing with cyberattack’s aftermaths and business recovery.
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
This is the most essential programme of the year around the dangers of cybercrime and how to manage safety within the most indispensable digital sphere & technology system. The reason is that, “Looking beyond Internet of Things (IoT) to Internet of Everything there is a potential market that is approximately $14.4 trillion and over 99% of physical devices are still unconnected.” ~Mo Dawson. Your participation give you golden access to a transcending Cyberspace picture, enhanced solution oriented capabilities as an ICT expert or practitioner, Telecommunications Corporates & Companies
Personnel, Aviation ICT Officials, Other Transportation controls network hubs, Business dealer in Cyberspace services provider or supplier, Academicians and researchers, Government Departments & Public service ICT systems Officials & staff, Students, general ICT security involvement and on top of that your enhanced multidimensional scope & prosperity out of this untapped gold mine is guaranteed.
O National Security Alliance’s (InSA) Cyber Council, organização norte-americana de inteligência e segurança, publica o primeiro de vários relatórios destinados a ampliar a visão dos tomadores de decisão da indústria e do governo sobre a importância do desenvolvimento de uma “inteligência cibernética”.
Similar to Ikeepsafe Cyber Safety, Ethics and Security Competencies (20)
Data Privacy Protection Competrency Guide by a Data SubjectJohn Macasio
Data Privacy Protection Competency Guide shares the belief that the valid, verifiable, and actionable demonstration of respect on the data privacy rights of a data subject, and that the privacy and security of personal information are protected, comes from open guidance that presents the share-able practice standards that guide the right content of understanding, decision, and work of data privacy law compliance.
The workplace view of data privacy risks, policy, organization, process, and documentation have to be easily and consistently created and improved with freely available knowledge on the rules and standards of practice.
The directly accountable and responsible in the personal data collection, retention, use, sharing, and disposal have to be engaged to experience the applicability of data privacy rules and standards in their filing system, automation program, and technology services.
Project Management Competency Guide for Digital TransformationJohn Macasio
A project management methodology is necessary to determine, describe, document, and demonstrate the critical success factors and performance indicators that make the project to start, move, and close with valid, verifiable, necessary, acceptable and actionable guidance.
The practice of project management is loaded with a variety of competency frameworks. Each knowledge product on project management represents a view of what succeeds in a project. It includes the determination of how the “right things to do, to be done right.”
Project Management Competency Guide of Digital Transformation examines and applies the practice standards to lead, direct,and control the project outcome/
Teacher Work from Home with Learning Management SystemJohn Macasio
Teacher Works from Home -Distance Online Learning Classroom of Teaching and Learning Tasks.
We make a teacher do the familiar teaching and learner tasks by creating with ease an online classroom where a distance learner meets instruction and content of knowledge acquisition and creation.
We make a teacher recognize the common and basic features of a simple and easy to use the learning management system to do the familiar tasks of teaching and for the learner to acquire knowledge and create evidence of learning.
The teacher manages an online classroom with the agreed “learner learning plan” of achieving the most essential learning competency objectives.
"Readiness" for an online distance learning communicates with clarity, coherence, completeness, and with consistency the essential requirements to plan-do-check-act the end-result of an agreed learner learning plan.
We share the free to use training presentation on online distance learning "readiness assessment.
We determine and describe the basic "questions of understanding" and "model of capability" that make it simple, easy, and doable to act the learning and teaching tasks with the Internet of education.
Social Media of Online Distance Learning with Networked LearnerJohn Macasio
Meet “social media” as it demonstrates the quick, easy, and simple way of setting up a learning management system that makes use of socially networked digital tools to bring about the online classroom, learning conversation, content presentation, file share, and storage, and activity demonstration.
Social media learning management system with the familiar mobile social web application of the Internet-connected learner, teacher, and parent.
Government Chief Information Officer competencies to lead the value creation with information and communication technology in achieving the goals of sustainable developmennt
Competency Modeling for Business Process ReviewJohn Macasio
Essential framework and tools to understand the value to be created by business process review to communicate continual improvement of the process that enables the objectives of services and product delivery.
The challenge of alignment, integration and change in the development of e-services has gave attention to enterprise architecture. It provide the framework of engagement and thinking tool to define, elaborate, document, agree and communicate the strategic baseline, strategic intent, strategic architecture, strategic change and strategic resources in the development and improvement of e-services within the defined context and perspectives of time, stakeholders, performance, funds, environment, leadership and technology. The shared open presentation is a product of direct engagement with people of decision and work who are enabled to participate the formulation of enterprise architecture that matters to their performance.
Information security awareness at the workplace is critical for that participated and shared accountability on insuring confidentiality, availability and integrity of information in the networked context of information creation, storing, using and sharing. The essential questions of information security has to be clearly elicited, described and analyzed with the people of decision and work. The open presentation is designed to point the searchable knowledge and solution of information security,
The questions of alignment, integration, inter-operation, continual improvement and service quality of information and communications technology program and projects have caused interest in using this thinking and modeling framework called enterprise architecture. The participated and structured elicitation, visualization, analysis and agreement of the enterprise models called - intention, business, information, technology and security - are basic to doing enterprise architecture. Here is an open template to aid the thinking and visualization activities in composing the enterprise architecture of an organization and government agency..
Enterprise Architecture and Information SecurityJohn Macasio
A thinking tool to ask and describe the alignment requirements of business, information, technology and security to improve and secure the management of process, data, application and infrastructure of performance.
E services Strategic Planning with Enterprise ArchitectureJohn Macasio
An open thinking template to guide the elicitation, visualization, analysis and agreement on the strategic intention, architecture requirement and development road map of the enterprise e-services.
E-Services Planning and Enterprise Architecture PrimerJohn Macasio
Basic guidance on doing e-services planning and enterprise architecture to align the value of information and communications technology to the strategic intent and performance goals of the organization
Basic Thinking Tool for E-Services PlanningJohn Macasio
Thinking tool to elicit, elaborate and document the kind of information in composing the e-services plan and architecture of aligning the use of information and communications technology to realize the performance goals of the organization.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Ikeepsafe Cyber Safety, Ethics and Security Competencies
1. A Companion to the Augmented Technology Literacy Standards for Students
INTRODUCTION
The iKeepSafe Digital Citizenship C3
Matrix is designed to assist educators in
TM
integrating the concepts of cyber-safety,
cyber-security, and cyber-ethics (C3) into
existing technology and literacy standards
and curricula. Based on the C3 Framework
created by education and technology expert
Davina Pruitt-Mentle, Ph.D., the C3 Matrix
takes a holistic and comprehensive
approach to preparing students for 21st
century digital communication. Competency
levels for C3 concepts are divided into three
levels: basic, intermediate, and proficient.
Cyber-safety, Cyber-security, Cyber-ethics, (C3) Digital Literacy Skills
The vision guiding the iKeepSafe Digital Citizenship C3 Matrix springs from grade level; rather, they represent progressive levels of cognitive complexity
the vision of Eleanor Roosevelt and the ancient Greeks that the true at which youth should be expected to understand and practice. The levels
purpose of education is to produce citizens. All students must have the were developed utilizing Bloom's Taxonomy of Educational Objectives (2001
awareness, knowledge, opportunity and resources to develop the C3 skills revised edition), a hierarchy of six progressively complex cognitive processes
required for full participation as informed, responsible, ethical and produc- that learners use to attain objectives or perform activities. Bloom’s Taxonomy,
tive citizens. The C3 Matrix provides educators with guidance regarding the preferred system for articulating program objectives, categorizes cognitive
cyber-safety, security, and ethics principles that all students should know skills by increasing order of complexity. From least to most complex these
and be able to apply independently when using technology, technology are: remembering, understanding, applying, analyzing, evaluating,
systems, digital media and information technology, including the Internet. implementing, and creating.
Although C3 concepts are presented here as separate categories, they are This taxonomy aids curriculum developers, policy makers and instructional
not distinct and/or separable; they are, in fact, interrelated and should be designers in better defining the desired learning level of a target audience
considered as a whole. These principles should be embedded systemically and then developing an appropriate design that will help the learner achieve
throughout students’ K-12 experience, not taught in isolation, and should be desired learning goals. Additionally, this taxonomy aids in crafting behavioral
applied when meeting learning outcomes in the content areas. They can assessment instruments.
also be used as a companion and supplement to the various technology
literacy standards for students created by ISTE, AASL, AECT, and others. What follows is a theoretical framework that can be used to inform a national,
regional, or local agenda. It uses three dimensions, based on practical
The three competency levels outlined in the C3 Matrix are not identified by circumstances and experiences with educating students and teachers, with
Anderson, L. W., & Krathwohl, D. R. (Eds.). (2001). A taxonomy for learning, teaching and assessing: A revision of Bloom's Taxonomy of educational objectives: Complete edition,
New York : Longman.
3. C3 Framework
Promoting Responsible Use
I. Cyber-Ethics
Students recognize and practice responsible and appropriate use while accessing, using, collaborating, and creating technology, technology systems,
digital media and information technology. Students demonstrate an understanding of current ethical and legal standards, the rights and restrictions that
govern technology, technology systems, digital media and information technology within the context of today’s society. Students will:
A. Understand and follow acceptable polices (school, home and community), and understand the personal and societal consequences of inappropri-
ate use.
B. Demonstrate and advocate for ethical and legal behaviors among peers, family, and community.
C. Practice citing sources of text and digital information and make informed decisions about the most appropriate methods for avoiding plagiarism.
D. Make ethical and legal decisions while using technology, technology systems, digital media and information technology when confronted with
usage dilemmas.
E. Exhibit responsibility and Netiquette when communicating digitally.
F. Recognize the signs and emotional effects, the legal consequences and effective solutions for Cyberbullying.
G. Recognize appropriate time and place to use digital tools, techniques and resources.
H. Understand the importance of online identity management and monitoring. Advocate others to understand the importance of Online Reputation
Management.
II. Cyber-Safety
Students practice safe strategies to protect themselves and promote positive physical and psychological well-being when using technology, technology
systems, digital media and information technology including the Internet. Students will:
A. Recognize online risks, to make informed decisions, and take appropriate actions to protect themselves while using technology, technology
systems, digital media and information technology.
B. Make informed decisions about appropriate protection methods and safe practices within a variety of situations.
C. Demonstrate and advocate for safe behaviors among peers, family, and community.
III. Cyber-Security
Students practice secure strategies when using technology, technology systems, digital media and information technology that assure personal protection
and help defend network security. Students will:
A. Recognize online risks, make informed decisions, and take appropriate actions to protect themselves while using technology, technology
systems, digital media and information technology.
B. Make informed decisions about appropriate protection methods and secure practices within a variety of situations.
C. Demonstrate commitment to stay current on security issues, software and effective security practices.
D. Advocate for secure practices and behaviors among peers, family, and community.
Pruitt-Mentle, D. (2000). The C3 framework: Cyberethics, cybersafety and cybersecurity implications for the educational setting. C3 is a trademark
registered with ETPRO. Materials can be used for educational and non-profit use. For other uses, contact Davina Pruitt-Mentle, dpruitt@umd.edu.
4. C3
YBER-SAFETY
Physical and Psychological Well-being:
Students practice safe strategies to protect themselves and promote positive physical and psychological well-being when using technology, technol-
ogy systems, digital media and information technology, including the Internet.
BASIC INTERMEDIATE PROFICIENT
A. Recognize online risks, make Safe and Responsible Practices Safe and Responsible Practices Safe and Responsible Practices
informed decisions, and take Recognize and discuss safety issues
Recognize safety issues* related to Recognize and discuss safety issues
appropriate actions to protect technology, technology systems, digital related to technology, technology related to technology, technology
themselves while using technol- media and information technology systems, digital media and information systems, digital media and information
ogy, technology systems, digital including the Internet (e.g., online technology including the Internet (e.g., technology including the Internet (e.g.,
media and information technology. predator tactics, posting controversial online predator tactics, posting controver- online predator tactics, posting controver-
content). sial content). sial content).
Use safe practices related to technology, Use safe practices and procedures Use safe practices and procedures
technology systems, digital media and related to technology, technology related to technology, technology
information technology including the systems, digital media and information systems, digital media and information
Internet. technology including the Internet. technology including the Internet.
Recognize and understand the purpose Explain the purpose of technology, Explain the purpose of and analyze the
of protection measures (including filtering technology systems, digital media and use of different protection measures for
systems) for various types of technology, information technology protection technology, technology systems, digital
technology systems, digital media and measures. media and information technology.
information technology.
B. Make informed decisions about Adhere to privacy and safety guidelines, Adhere to privacy and safety guidelines, Adhere to privacy and safety guidelines,
appropriate protection methods policies, and procedures. policies, and procedures. policies, and procedures.
and secure practices within a Discuss the potential for addictive Describe technology and Internet Describe and practice procedures for
variety of situations. behaviors and the excessive use of addictive behaviors. disciplined and productive Internet use
technology and Internet. Describe procedures for exiting an (e.g., balance between time on and off the
Describe procedures for exiting an inappropriate site. Internet).
inappropriate site. Describe procedures for reducing the Describe and practice procedures for
Describe procedures for reducing the chance of being a victim of cyber-bullying. exiting an inappropriate site.
chance of being a victim of cyber-bullying. Describe effective steps to manage and Describe and practice procedures for
Describe procedures for reporting resolve a cyber-bullying situation. reducing the chance of being a victim of
cyber-bullying and other inappropriate Model understanding about current safety cyber-bullying.
behavior or content. needs. Describe and practice effective steps to
manage and resolve a cyber-bullying
situation.
C. Demonstrate and advocate for Model personal safety within a variety of Model personal safety within a variety of
safe behaviors among peers, situations. situations.
family, and community. Demonstrate commitment to stay current on
safety issues and effective protection
practices.
Advocate for safe practices and behaviors
among peers, family, and community.
* Safety issues could include but are not limited to: upload and download of objectionable content, cyber-bullying,
reputation damage, response to unwanted communications from businesses or predators, and Internet addiction.
5. C3
YBER-SECURITY
Digital Security:
Practice secure strategies that assure personal protection and help defend network security.
BASIC INTERMEDIATE PROFICIENT
A. Recognize Secure Practices Secure Practices Secure Practices
security risks, make Understand and discuss security risks and the
Understand security risks and the potential harm of Understand and discuss security risks and
informed decisions, potential harm of intrusive applications related to
intrusive applications related to technology, the potential harm of intrusive applications
and take appropriate technology systems, digital media, and information technology, technology systems, digital media related to technology, technology systems,
actions to protect technology including the Internet (e.g. email viruses, and information technology including the Internet digital media and information technology
themselves while digital propaganda, spy ware, adware, identity theft, (e.g. email viruses, digital propaganda, spy ware, including the Internet (e.g. email viruses,
using technology, phishing/pharming/spoofing scams, spam, social adware, identity theft, digital propaganda, spy ware, adware, identity
technology systems, engineering). phishing/pharming/spoofing scams, spam, social theft, phishing/pharming/spoofing scams,
digital media and Understand effective basic security practices engineering). spam, social engineering).
information technol- related to technology, technology systems, digital Describe and practice effective security Practice effective security practices and
media and information technology including the practices, beyond the basic level, related to analyze new options, beyond the intermediate
ogy.
Internet (e.g., strong passwords, protecting technology, technology systems, digital media level, related to technology, technology
password and user ID, not disclosing important and information technology including the Internet. systems, digital media and information
personal information, minimizing/evaluating pop up Recognize and understand the purpose of technology including the Internet and critically
ads). security protection measures for technology, evaluate digital resources.
Recognize and understand the purpose of technology systems, digital media and informa- Recognize and understand the purpose of
technology, technology systems, digital media and tion technology. security protection measures for technology,
information technology security protection measures. Model understanding about current security technology systems, digital media and
Discuss strategies for managing everyday hardware needs. information technology.
and software problems.
B. Make informed Adhere to security guidelines, policies, and Adhere to security guidelines, policies, and
decisions about procedures. procedures.
appropriate protec- Use effective strategies for managing everyday Describe and practice strategies for managing
tion methods and hardware and software problems. everyday hardware and software problems.
Use effective strategies for securing wireless Describe and practice strategies for securing
secure practices
connections (e.g., connecy to only legitimate wi-fi wireless connections (e.g., connect to only
within a variety of hot spots or turn off wi-fi, turn off file share mode, legitimate wi-fi hot spots or turn off wi-fi, turn off
situations. encrypt sensitive data/ information, use and file share mode, encrypt sensitive data/
update anti-virus software, use a firewall, update information, use and update anti-virus software,
operating system). use a firewall, update operating system.
C. Demonstrate Model secure practices within a variety of Model secure practices within a variety of
commitment to stay digital communities. digital communities.
current on security
issues, software and
effective security
practices.
D. Advocate for Advocate for secure practices and behaviors
secure practices and among peers, family, and community.
behaviors among
peers, family, and
community.
6. C3
YBER-ETHICS
Legal and Ethical Issues:
Students recognize and practice responsible and appropriate use while accessing, using, collaborating, and creating technology, technology systems, digital media
and information technology. Students demonstrate an understanding of current ethical and legal standards, rights and restrictions governing technology, technology
systems, digital media and information technology within the context of today’s society.
BASIC INTERMEDIATE PROFICIENT
A. Understand and Understand and follow acceptable Understand and follow acceptable Understand and follow acceptable use policies
follow acceptable use policies (e.g., school, home, and use policies (e.g., school, home, and (e.g., school, home, and community settings).
use polices (school, community settings). community settings). Demonstrate responsible use of technology,
home and commu- Discuss basic issues related to Demonstrate responsible use of technology systems, digital media and information
nity), and understand responsible use of technology, technology, technology systems, digital technology in different settings (e.g., school, home,
the personal and technology systems, digital media and media and information technology in and community) and describe and analyze
societal conse- information technology, and describe different settings (e.g., school, home, personal and societal consequences of inappropri-
quences of inappro- personal consequences of inappropri- and community settings) and describe ate use.
priate use. ate use*. and analyze personal and societal Make informed choices about acceptable use of
consequences of inappropriate use. technology, technology systems, digital media and
information technology when confronted with usage
dilemmas.
B. Demonstrate and Demonstrate and advocate for legal and ethical
advocate for ethical behaviors among peers, family, and community
and legal behaviors regarding responsible use of technology, technology
among peers, family, systems, digital media and information technology.
and community.
C. Practice citing Understand and follow ethical Understand and follow ethical Understand and follow ethical standards of
sources of text and standards of conduct (e.g., AUP, standards of conduct (e.g., AUP, conduct (e.g., AUP, Student Handbooks, Student
digital information Student Handbooks, Student Code of Student Handbooks, Student Code of Code of Conduct, Honor Codes).
and make informed Conduct, Honor Codes). Conduct, Honor Codes). Discuss definitions and basic concepts and issues
decisions about the Discuss definitions and basic Discuss definitions and basic concepts related to plagiarism/electronic cheating and
most appropriate concepts and issues related to and issues related to describe personal and societal consequences of
methods for avoiding plagiarism/electronic cheating and plagiarism/electronic cheating and plagiarism.
plagiarism. describe personal and societal describe personal and societal Demonstrate appropriate strategies for avoiding
consequences of plagiarism. consequences of plagiarism. plagiarism (e.g., quoting, citing, acknowledging
Demonstrate appropriate strategies Practice citing sources of text and source and/or paraphrasing)
for avoiding plagiarism (e.g., quoting, digital information. Determine the most appropriate method for
citing, acknowledging source and/or Determine and practice the use of avoiding plagiarism and create original work and
paraphrasing). appropriate strategies for avoiding practice citing sources of text and digital informa-
Discuss the importance of respecting plagiarism (e.g., quoting, citing, tion.
the rights of others regarding their acknowledging source and/or Demonstrate and advocate for ethical behaviors
work. paraphrasing). among peers, family, and community.
* Inappropriate use could include, but is not limited to, viewing inappropriate content, using the school’s network for non-educational purposes, or work networks for non-school/work related activities, posting
incorrect/inaccurate information, bullying, participating in hate groups, harassing or sending/posting mean comments, hacking, illegally downloading copyrighted materials/movies/music and/or making and
sharing copies of copyrighted materials, etc..
7. C3
YBER-ETHICS
BASIC INTERMEDIATE PROFICIENT
D. Make ethical Discuss definitions and basic concepts and Discuss definitions and basic concepts and Discuss definitions and basic concepts and issues
and legal issues related to intellectual property, media issues related to intellectual property, media related to intellectual property, media copyright laws,
decisions when copyright laws, private/public domain, fair copyright laws, private/public domain, fair private/public domain, fair use, and file sharing.
confronted with use and file sharing. use, and file sharing. Describe personal and societal consequences of
usage dilemmas Describe personal and societal conse- Describe personal and societal conse- respecting verses ignoring rights, laws and practices
while using quences of respecting verses ignoring rights, quences of respecting verses ignoring such as copyright, private/public domain, fair use,
technology, laws and practices such as copyright, rights, laws and practices such as and file sharing.
technology private/public domain, fair use and file copyright, private/public domain, fair use Describe personal and societal consequences
systems, digital sharing. and file sharing. involving intellectual property rights, media copyright
media and Understand and follow school, home and Understand and follow school, home and laws, private/public domain, fair use, and file sharing.
information community policies on access to information community policies on access to informa- Understand and follow school, home and commu-
technology. resources. tion resources and adhere to local, state, nity policies on access to information resources and
and federal laws. adhere to local, state, and federal laws.
Demonstrate appropriate social and ethical Distinguish the legal implications between personal,
behaviors when using technology and educational, and commercial uses of protected
digital media including the recognition of works.
intellectual property rights, fair use of Demonstrate social and ethical behaviors when
copyrighted material, and legal file sharing using technology and digital media regarding
or downloading of software, music and intellectual property recognition, fair use of
videos. copyrighted material, including file-sharing and
Make ethical and legal use of technology, pirating versus legal downloading of software, music
technology systems, digital media and and videos.
information technology when confronted Make ethical and legal use of technology, technol-
with usage dilemmas. ogy systems, digital media and information technol-
ogy when confronted with usage dilemmas.
Demonstrate and advocate for legal and ethical
behaviors in this domain among peers, family, and
community.
E. Exhibit respon- Recognize personal differences and Recognize personal differences and Recognize personal differences and practice
sibility and practice etiquette within diverse situations. practice etiquette within diverse digital etiquette within diverse digital communities.
netiquette (i.e Recognize positive and negative social and communities. Recognize and analyze positive and negative
appropriate digital ethical behaviors when using technology Recognize positive and negative social and social and ethical behaviors when using technology
communication and digital media and information technol- ethical behaviors when using technology and digital media and information technology.
skills) when ogy. and digital media and information technol-
communicating ogy.
digitally.
8. C3
YBER-ETHICS
BASIC INTERMEDIATE PROFICIENT
F. Recognize the Understand and discuss the signs and Demonstrate a thorough understanding of Demonstrate a thorough understanding of the
signs, emotional solutions for cyber-bullying. the signs, emotional effects, legal conse- signs, emotional effects, legal consequences
effects, legal conse- Recognize appropriate time and place to quences of, and effective solutions for of, and effective solutions for cyber-bullying.
quences of and use digital tools, techniques, and cyber-bullying. Make informed choices when confronted with
effective solutions resources (e.g., when appropriate to use Recognize appropriate time and place to cyber-bullying dilemmas.
for cyber-bullying. lingo and emoticons, when to use cell use digital tools, techniques, and resources Recognize appropriate time and place to use
phone and text message). (e.g., when appropriate to use lingo and digital tools, techniques and resources (e.g.,
Apply proper communication skills when emoticons, when to use cell phone and text when appropriate to use lingo and emoticons,
communicating digitally. message). when to use cell phone and text message).
Apply appropriate communication skills when
communicating digitally.
Practice digital etiquette to support collabora-
tion
Advocate for proper netiquette behaviors
among peers, family, and community.
G. Recognize Understand that content posted to the Understand that content posted to the web Understand that content posted to the web or
appropriate time and web or sent through other digital means or sent through other digital means (e.g., sent through other digital means (e.g., cell
place to use digital (e.g., cell phones, cameras) is acces- cell phones, cameras) is accessible to a phones, cameras) are accessible to a wide
tools, techniques sible to a wide audience and can be wide audience and can be permanently audience and can be permanently archived.
and resources. permanently archived. archived.
H. Understand the Understand the importance of online Understand the importance of online Understand the importance of online reputa-
importance of online reputation management and monitoring reputation management and monitoring tion management and monitoring (ORM).
identity management (ORM). (ORM). Recognize positive and negative uses of
and monitoring Recognize positive and negative uses Recognize positive and negative uses of electronic media/postings as related to ORM.
(ORM). Advocate of electronic postings as related to ORM electronic postings as related to ORM. Demonstrate appropriate strategies for
others to understand Demonstrate appropriate strategies for protecting, monitoring, and/or positively
the importance ORM. protecting, monitoring and/or positively promoting personal identity (i.e. ORM).
promoting personal identity- Online Reputa- Analyze selected electronic media/postings
tion Management and monitoring (ORM). and reflect, as an individual, on the appropri-
ateness of each for effective ORM.