SlideShare a Scribd company logo
T heTHREAT
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VInappropriate Use of the Network will always be a
concern as long as the computer is connected to the
internet.
VThreats range from email, websites, social
networking, instant messaging, to certain Web 2.0
tools. Inappropriate use of the network is common
through all technology resources mentioned above.
Common Misconceptions
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VThe biggest misconception of inappropriate use of the
network is that everyone is in fear of misusing computer
resources. That is not a fac. Most students, teachers, and
administrators are not concerned of inappropriate use of the
network due to firewall and blocking software that is being
used in the districts. The software on the district’s resources
do protect the students, teachers, administrators and districts
from harm most of the time.
T he realities Of Inappropriate USE
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VDue to the inappropriate use of the network, students are missing out on
the educational opportunities with the use of the Web 2.0 tools because of
concerns and behaviors such as cyberbullying, chatting, and visiting
websites that are not educational.
VStudents are actually more engaged and motivated with the use of the
Web 2.0 tools, but cannot use them in some districts due to this.
VThere are concerns with school employees using the Internet to view
inappropriate website and using a numerous amount of time exchanging
personal emails throughout the work day.
Common Responses
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VAcceptable Use Policies (AUPs): Contracts between the (Internet and computer user)
students and parents, with the district, the school, and the teachers about appropriate
network usage.
VLimited Web 2.0 Use; Many schools are prohibited to use many Web 2.0 tools such as
blogging, personal email, instant messaging, social networking sites, etc.
VFiltering and Blocking Software: Districts are purchasing this software in attempt to
keep the students safe and from accessing inappropriate use of the network.
VMonitoring and Surveillance Software: Many districts also purchase software that
monitors all information that is transmitted through the district’s network.
VRestricting Access: Many districts do not allow teachers to create or use websites and
Web 2.0 tools to be used with their classrooms and students.
A few Recommendations
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
Vicki Davis (2007) shares her six pillars of the Web 2.0 classroom (Robinson, Brown, & Green,
2010):
VInternet safety and privacy: Teachers make it their responsibility to teach students the skills
to be safe and to protect students from harm through careful supervision.
VInformation literacy: Teach students how to maintain privacy.
VInternet citizenship: Teach students to evaluate and respond to information on the web
critically.
VInternet teamwork: Teach students to engage in a responsible way with others online.
VIntentional Internet activities: Teachers will create intentional planned activities for
students learning while using the Internet and Web 2.0 tools.
VAn engaged teacher: The same teachers will be engaged in the student learning throughout
these activities. The teachers should be trusted as professionals to use the district’s network
appropriately and have the necessary resources and bandwidth available with few filters to
interfere in this learning process.
Sources USED
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VRobinson, L., Brown, A., and Green, T. (2010). Security vs. access.
International Society for Technology in Education

More Related Content

What's hot

Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
dlwadsworth
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the Classroom
Mrs.Faust
 
Navigating Social Media
Navigating Social MediaNavigating Social Media
Navigating Social Media
Mark Ness
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
vlbrown
 
Parent engagement cvps
Parent engagement cvpsParent engagement cvps
Parent engagement cvps
jeygenraam
 
Actions model last
Actions model lastActions model last
Actions model last
Amira Squ
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
gfoessett
 
techKNOW leadership for JefCoEd Tech Camp 7.11.13
techKNOW leadership for JefCoEd Tech Camp 7.11.13techKNOW leadership for JefCoEd Tech Camp 7.11.13
techKNOW leadership for JefCoEd Tech Camp 7.11.13
mwilson518
 
Technology in the classroom
Technology in the classroomTechnology in the classroom
Technology in the classroom
miarmenta
 
Digital citizenship project[1]
Digital citizenship project[1]Digital citizenship project[1]
Digital citizenship project[1]
lackl
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 

What's hot (20)

Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the Classroom
 
Navigating Social Media
Navigating Social MediaNavigating Social Media
Navigating Social Media
 
Social Media
Social MediaSocial Media
Social Media
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
 
Parent engagement cvps
Parent engagement cvpsParent engagement cvps
Parent engagement cvps
 
Actions model last
Actions model lastActions model last
Actions model last
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
 
Etl523 pres jj jarick
Etl523 pres jj jarickEtl523 pres jj jarick
Etl523 pres jj jarick
 
Presentation1
Presentation1Presentation1
Presentation1
 
techKNOW leadership for JefCoEd Tech Camp 7.11.13
techKNOW leadership for JefCoEd Tech Camp 7.11.13techKNOW leadership for JefCoEd Tech Camp 7.11.13
techKNOW leadership for JefCoEd Tech Camp 7.11.13
 
Mobile devices
Mobile devicesMobile devices
Mobile devices
 
Back to school - CYBER SAFETY
Back to school - CYBER SAFETYBack to school - CYBER SAFETY
Back to school - CYBER SAFETY
 
Technology in the classroom
Technology in the classroomTechnology in the classroom
Technology in the classroom
 
Week of safe internet
Week of safe internetWeek of safe internet
Week of safe internet
 
Twitter Social Networking And Social Media Oct1509
Twitter Social Networking And Social Media Oct1509Twitter Social Networking And Social Media Oct1509
Twitter Social Networking And Social Media Oct1509
 
Ed. Tech. 2
Ed. Tech. 2Ed. Tech. 2
Ed. Tech. 2
 
Faculty and staff training
Faculty and staff trainingFaculty and staff training
Faculty and staff training
 
Digital citizenship project[1]
Digital citizenship project[1]Digital citizenship project[1]
Digital citizenship project[1]
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 

Similar to Inappropriate use of the network ppt

Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
spaul6414
 
Parent training keynote_v3
Parent training keynote_v3Parent training keynote_v3
Parent training keynote_v3
bweinert
 
Digital Literacy PDLM
Digital Literacy PDLMDigital Literacy PDLM
Digital Literacy PDLM
linzer85
 
Staff training session
Staff training sessionStaff training session
Staff training session
mander5208
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
mwedwards
 
A2 s watson etl523
A2 s watson etl523A2 s watson etl523
A2 s watson etl523
cinkay
 
Technology Integration Initiative
Technology Integration InitiativeTechnology Integration Initiative
Technology Integration Initiative
hpetrich
 
Social media policy
Social media policySocial media policy
Social media policy
Har1982
 
Fall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting pptFall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting ppt
arhodes
 

Similar to Inappropriate use of the network ppt (20)

Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
 
Parent training keynote_v3
Parent training keynote_v3Parent training keynote_v3
Parent training keynote_v3
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Digital Literacy PDLM
Digital Literacy PDLMDigital Literacy PDLM
Digital Literacy PDLM
 
E safety training
E safety trainingE safety training
E safety training
 
Staff training session
Staff training sessionStaff training session
Staff training session
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
 
Resources
ResourcesResources
Resources
 
A2 s watson etl523
A2 s watson etl523A2 s watson etl523
A2 s watson etl523
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
 
Technology Integration Initiative
Technology Integration InitiativeTechnology Integration Initiative
Technology Integration Initiative
 
Edu current issues
Edu current issuesEdu current issues
Edu current issues
 
Social media policy
Social media policySocial media policy
Social media policy
 
Virtual learning, online learning environment and covid 19 slides
Virtual learning, online learning environment and covid 19  slidesVirtual learning, online learning environment and covid 19  slides
Virtual learning, online learning environment and covid 19 slides
 
The Benefits of Internet Education
The Benefits of Internet EducationThe Benefits of Internet Education
The Benefits of Internet Education
 
Fall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting pptFall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting ppt
 

Recently uploaded

plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
parmarsneha2
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
YibeltalNibretu
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 

Recently uploaded (20)

Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 

Inappropriate use of the network ppt

  • 1.
  • 2. T heTHREAT wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww VInappropriate Use of the Network will always be a concern as long as the computer is connected to the internet. VThreats range from email, websites, social networking, instant messaging, to certain Web 2.0 tools. Inappropriate use of the network is common through all technology resources mentioned above.
  • 3. Common Misconceptions wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww VThe biggest misconception of inappropriate use of the network is that everyone is in fear of misusing computer resources. That is not a fac. Most students, teachers, and administrators are not concerned of inappropriate use of the network due to firewall and blocking software that is being used in the districts. The software on the district’s resources do protect the students, teachers, administrators and districts from harm most of the time.
  • 4. T he realities Of Inappropriate USE wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww VDue to the inappropriate use of the network, students are missing out on the educational opportunities with the use of the Web 2.0 tools because of concerns and behaviors such as cyberbullying, chatting, and visiting websites that are not educational. VStudents are actually more engaged and motivated with the use of the Web 2.0 tools, but cannot use them in some districts due to this. VThere are concerns with school employees using the Internet to view inappropriate website and using a numerous amount of time exchanging personal emails throughout the work day.
  • 5. Common Responses wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww VAcceptable Use Policies (AUPs): Contracts between the (Internet and computer user) students and parents, with the district, the school, and the teachers about appropriate network usage. VLimited Web 2.0 Use; Many schools are prohibited to use many Web 2.0 tools such as blogging, personal email, instant messaging, social networking sites, etc. VFiltering and Blocking Software: Districts are purchasing this software in attempt to keep the students safe and from accessing inappropriate use of the network. VMonitoring and Surveillance Software: Many districts also purchase software that monitors all information that is transmitted through the district’s network. VRestricting Access: Many districts do not allow teachers to create or use websites and Web 2.0 tools to be used with their classrooms and students.
  • 6. A few Recommendations wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww Vicki Davis (2007) shares her six pillars of the Web 2.0 classroom (Robinson, Brown, & Green, 2010): VInternet safety and privacy: Teachers make it their responsibility to teach students the skills to be safe and to protect students from harm through careful supervision. VInformation literacy: Teach students how to maintain privacy. VInternet citizenship: Teach students to evaluate and respond to information on the web critically. VInternet teamwork: Teach students to engage in a responsible way with others online. VIntentional Internet activities: Teachers will create intentional planned activities for students learning while using the Internet and Web 2.0 tools. VAn engaged teacher: The same teachers will be engaged in the student learning throughout these activities. The teachers should be trusted as professionals to use the district’s network appropriately and have the necessary resources and bandwidth available with few filters to interfere in this learning process.
  • 7. Sources USED wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww VRobinson, L., Brown, A., and Green, T. (2010). Security vs. access. International Society for Technology in Education