Ch.8[1]
-
Upload
leslee -
Category
Technology
-
view
786 -
download
0
description
Transcript of Ch.8[1]
![Page 1: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/1.jpg)
Teachers Discovering ComputersIntegrating Technology and
Digital Media in the Classroom5th Edition
Security Issues, Ethics, and Emerging Technologies in Education
Chapter 8
![Page 2: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/2.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 2
Computer Security: Risks and Safeguards
Computer security risk - Any event or action that has the potential of causing a loss of computer equipment, software, data and information, or processing capability
Any illegal act involving a computer generally is referred to as a computer crime
Computer Viruses New virus programs found every day Boot sector virus File virus Worm Trojan horse Macro virus
![Page 3: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/3.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 3
![Page 4: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/4.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 4
![Page 5: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/5.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 5
Computer Security: Risks and Safeguards
Virus Detection and Removal Antivirus programs Popular antivirus
programs Many options to using
antivirus software Rescue disk
![Page 6: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/6.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 6
Computer Security: Risks and Safeguards
Possessed Objects and Biometric Devices A possessed object is any item that you must carry
to gain access to a computer Badges, cards, smart cards, and keys
Personal Identification Number (PIN) Biometric devices authenticate a person’s identity
with a physical characteristic
![Page 7: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/7.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 7
Computer Security: Risks and Safeguards
Firewall A security system consisting of hardware and/or
software that prevents unauthorized access to data and information on a network
Proxy server Personal firewall
![Page 8: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/8.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 8
![Page 9: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/9.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 9
Computer Security: Risks and Safeguards
Hardware Theft and Vandalism Cable lock devices Portable equipment warrants special
considerations Computer vandalism
Cutting cables Deleting software Smashing computer
![Page 10: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/10.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 10
Ethics and the Information Age
Computer ethics Moral guidelines that govern the use of computers,
networks, and information systems
![Page 11: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/11.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 11
![Page 12: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/12.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 12
Ethics and the Information Age
Information Privacy The right of individuals and organizations to deny
or restrict the collection and use of information about them
Unauthorized collection and use of information Electronic profiles Federal and state laws
![Page 13: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/13.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 13
![Page 14: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/14.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 14
Ethics and the Information Age
Phishing Email attempting to obtain personal and financial
information Spam
An unsolicited e-mail mess or newsgroup posting sent to many recipients or newsgroups at once
Average user receives more than 1,000 spam e-mail messages each year
Anti-spam campaigns Anti-spam program
![Page 15: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/15.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 15
Ethics and the Information Age
Employee and Student Monitoring Use of computers to observe, record, view, and
review an individual’s use of a computer Policies of computer use Acceptable Use Policy (AUP)
![Page 16: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/16.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 16
Ethics and the Information Age
Copyright Laws Copyright Act of 1976 Illegal copying Fair use
Copyright information on Web pages
![Page 17: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/17.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 17
Ethics and the Information Age
Copyright Laws Teacher and student
Web pages Copyright laws do
protect these pages Public domain Web
sites CDs and DVDs with
images, graphics, audio, and video clips
Guidelines for creating Web pages
![Page 18: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/18.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 18
![Page 19: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/19.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 19
Internet Ethics and Objectionable Materials
Three categories of objectionable material Pornographic material Racist literature, gambling Incorrect or inappropriate material
Inaccurate information
![Page 20: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/20.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 20
Internet Ethics and Objectionable Materials
Recent Government Actions Children’s Internet Protection Act
Protects children from obscene, pornographic, and other information considered to be harmful to minors
![Page 21: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/21.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 21
Internet Ethics and Objectionable Materials
Parental Controls Rating systems
ICRA
![Page 22: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/22.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 22
Internet Ethics and Objectionable Materials
Parental Controls Filtering software
programs
![Page 23: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/23.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 23
Internet Ethics and Objectionable Materials
Parental Controls Filtering software Check Internet browser’s history
![Page 24: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/24.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 24
Internet Ethics and Objectionable Materials
Educational Controls Curriculum pages
Acts as guides for students Sites are pre-evaluated by teachers Eliminates typing mistakes when typing URLs
![Page 25: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/25.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 25
Internet Ethics and Objectionable Materials
Educational Controls Teacher observation
Final measure to prevent students from accessing objectionable and inappropriate materials
Instruct students on use of Back button on the browser
Understanding of ethical concepts
![Page 26: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/26.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 26
Health Issues
Computers and Health Issues Musculoskeletal Disorder (MSD) Repetitive Strain Injury (RSI) Carpal Tunnel Syndrome (CTS)
Hand Exercises Computer Vision Syndrome (CVS)
Techniques to ease eyestrain
![Page 27: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/27.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 27
Health Issues
Ergonomics An applied science devoted to incorporating
comfort, efficiency, and safety into the design of items in the workplace
![Page 28: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/28.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 28
Emerging Technologies
The World Wide Web Most K-12 schools are on the Internet The federal government is committed to high-
speed Internet access in every classroom Speed will increase Full-motion video on demand Instant access to Web-based educational
programs
![Page 29: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/29.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 29
Emerging Technologies
Assistive Technologies Technologies that modify
or adapt the classroom for special learning needs
Individuals with Disabilities Act (IDEA) Amendment of 1997
![Page 30: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/30.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 30
Emerging Technologies
Web- and Video-Enhanced Digital Textbooks Web site is continuously updated and maintained
Web-Based Distance Learning All instruction provided via the Web Still evolving Useful for specialized classes not available in all
schools
![Page 31: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/31.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 31
![Page 32: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/32.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 32
Emerging Technologies
Wireless Technologies Allows teachers and students to connect to a truly
global network Wireless computers will ensure that educational
technology is used seamlessly and at the point of instruction
Small, inexpensive computers ensure that all children have access to their lessons and the World from both home and school
![Page 33: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/33.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 33
Syllabus Changes
NO CLASS AUGUST 3rd
Final = July 29th
July 20th, 22nd =work on presentation July 27th= Presentations July 29th last class=final
![Page 34: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/34.jpg)
Multimedia Presentations-
1. Find partner
2. Begin brainstorming and planning presentation based on chapter assigned to you.
3. http://may2010edtech.pbworks.com/Multimedia-Presentations
Chapter 7: Evaluating Educational Technology and Integration Strategies34
![Page 35: Ch.8[1]](https://reader033.fdocuments.net/reader033/viewer/2022061119/5462d419b4af9f6c1c8b4870/html5/thumbnails/35.jpg)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 35