Teachers Discovering Computers Integrating Technology and
Digital Media in the Classroom 6th Edition
Security Issues, Ethics, and Emerging
Technologies in Education
Chapter 8
Chapter Objectives
Identify security risks that threaten home and school computers
Describe how computer viruses and malicious software programs work and the steps you can take to prevent viruses
Describe different ways schools safeguard computers and networks
Explain why computer backup is important and how it is accomplished
Define what is meant by information privacy and its impact on schools
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 2
Chapter Objectives
Identify the components of copyright that impact
education
Describe the ethical issues related to Internet
usage and steps schools are taking to address
them
Identify safe and healthy uses of technology
resources
Describe the emerging technologies that will
transform traditional classrooms
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 3
Computer Security:
Risks and Safeguards
Computer security risk - Any event or action that has the potential of causing a loss of computer equipment, software, data and information, or processing capability
Any illegal act involving a computer generally is referred to as a computer crime
Computer Viruses New virus programs found every day
Boot sector virus
File virus
Macro virus
Worm
Trojan horse
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 4
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 5
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 6
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 7
Computer Security:
Risks and Safeguards
Computer Viruses
Logic bomb
Time bomb
Michelangelo virus
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 8
Computer Security:
Risks and Safeguards
Virus Detection and Removal
Antivirus programs
Popular antivirus programs
Many options to using antivirus software
Rescue disk
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 9
Computer Security:
Risks and Safeguards
Unauthorized Access and
Use
Crackers and hackers
Access controls
Identification
Authentication
Selecting a password
Protecting your
password
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 10
Computer Security:
Risks and Safeguards
Possessed Objects and Biometric Devices
A possessed object is any item that you must carry
to gain access to a computer or computer facility
Badges, cards, smart cards, and keys
Personal Identification Number (PIN)
Biometric devices authenticate a person’s identity
with a personal characteristic
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 11
Computer Security:
Risks and Safeguards
Firewall
A security system consisting of hardware and/or
software that prevents unauthorized access to data
and information on a network
Proxy server
Personal firewall
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 12
Computer Security:
Risks and Safeguards
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 13
Computer Security:
Risks and Safeguards
Hardware Theft and Vandalism
Cable lock devices
Portable equipment warrants special
considerations
Computer vandalism
Cutting cables
Deleting software
Smashing computer
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 14
Computer Security:
Risks and Safeguards
Software Theft
Software piracy
Software license
Single-user license
Multiple-user
Network license
Community/State license
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 15
Computer Security:
Risks and Safeguards
Information Theft
Encryption
Plain text
Encrypted text
Encryption key
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 16
Computer Security:
Risks and Safeguards
System Failure
Undervoltage
Brownout
Blackout
Overvoltage (power surge)
Spike
Surge protector
Surge protector with phone line protection
Uninterruptible power supply (UPS)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 17
Computer Security:
Risks and Safeguards
Backing Up – The Ultimate Safeguard
Backup
Duplicate of a file, program, or disk that may be
used if the original is lost, damaged, or destroyed
Backup procedures policies in schools and school
districts
Backup programs
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 18
Ethics and the Information Age
Computer ethics
Moral guidelines that govern the use of computers,
networks, and information systems
Unauthorized use of computers
Hardware, software, and information theft
Information Privacy
Copyright
Existence of objectionable materials on the Internet
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 19
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 20
Ethics and the Information Age
Information Privacy
The right of individuals and organizations to deny
or restrict the collection and use of information
about them
Unauthorized collection and use of information
Electronic profiles
Federal and state laws
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 21
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 22
Ethics and the Information Age
Phishing
Email attempting to obtain personal and financial information
Spam
An unsolicited e-mail mess or newsgroup posting sent to many recipients or newsgroups at once
Average user receives more than 1,000 spam e-mail messages each year
Spam sent through instant messaging is called spim
Spam sent via Internet Telephony is called split
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 23
Ethics and the Information Age
Privacy Laws
Business or government agencies should only collect information necessary to carry out their functions
Restrict data access to those who must use it to perform job duties
Release personal information only after agreement to disclosure by individual
Must inform the individual when collecting information
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 24
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 25
Ethics and the Information Age
Employee and Student Monitoring
Use of computers to observe, record, view, and
review an individual’s use of a computer
Policies of computer use
Acceptable Use Policy (AUP)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 26
Ethics and the Information Age
Copyright Laws
Copyright Act of 1976
Illegal copying
Fair use
Copyright information on Web pages
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 27
Ethics and the Information Age
Copyright Laws
Teacher and student
Web pages
Copyright laws do
protect these pages
Public domain Web
sites
CDs and DVDs with
images, graphics,
audio, and video
clips
Guidelines for
creating Web pages
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 28
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 29
Internet Ethics
and Objectionable Materials
Three categories of objectionable material
Pornographic material
Racist literature, gambling
Incorrect or inappropriate material
Inaccurate information
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 30
Internet Ethics
and Objectionable Materials
Government Actions
Children’s Internet Protection Act
Protects children from obscene, pornographic, and
other information considered to be harmful to minors
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 31
Internet Ethics
and Objectionable Materials
Parental Controls
Available in Windows
and Mac operating
systems
Determine proper
controls for children in
different age groups
Monitor child’s use of
computer
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 32
Internet Ethics
and Objectionable Materials
Parental Controls
Filtering software
programs
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 33
Internet Ethics
and Objectionable Materials
Parental Controls
Filtering software
Check Internet browser’s history
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 34
Internet Ethics
and Objectionable Materials
Educational Controls
Acceptable Use Policies (AUP)
Use of network is a privilege, not a right
Behave as if you are a guest on the Internet
Rules concerning objectionable sites
Rules concerning copyright issues
Outline proper use of equipment
Online safety and personal information
Consequences of violating rules
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 35
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 36
Internet Ethics
and Objectionable Materials
Educational Controls
Curriculum pages
Acts as guides for students
Sites are pre-evaluated by teachers
Eliminates typing mistakes when typing URLs
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 37
Internet Ethics
and Objectionable Materials
Educational Controls
Teacher observation
Final measure to prevent students from accessing
objectionable and inappropriate materials
Instruct students on use of Back button on the
browser
Understanding of ethical concepts
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 38
Green Computing
Involves reducing the use of electricity and the
production of environmental waste while using a
computer
Society and schools are taking measures to
combat it
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 39
Health Issues
Computers and Health Issues
Musculoskeletal Disorder (MSD)
Repetitive Strain Injury (RSI)
Carpal Tunnel Syndrome (CTS)
Hand Exercises
Computer Vision Syndrome (CVS)
Techniques to ease eyestrain
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 40
Health Issues
Ergonomics
An applied science devoted to incorporating
comfort, efficiency, and safety into the design of
items in the workplace
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 41
Emerging Technologies
The Web offers enormous potential for expanding
the classroom
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 42
Emerging Technologies
Digital Media Revolution
Continues to profoundly impact the way teachers
teach and the way today’s digital students learn
Move from textbooks to a digital curriculum
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 43
Emerging Technologies
The World Wide Web
Most K-12 schools are on the Internet
The federal government is committed to high-
speed Internet access in every classroom
Speed will increase
Full-motion video on demand
Instant access to interactive Web-based
educational programs
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 44
Emerging Technologies
Netbooks and One-to-One Learning
Netbook computers might revolutionize educational
computing
Reduce initial and replacement costs
Reduce the need for hundreds of power outlets
Significantly reduce electrical costs
Significantly reduce the need for networking cables,
classroom outlets, and server space
Eliminate the need for special computer desks and
separate computer labs
Significantly reduce initial and eliminate replacement
costs for textbooks Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 45
Emerging Technologies
Assistive Technologies
Technologies that modify
or adapt the classroom
for special learning needs
Individuals with
Disabilities Act (IDEA)
Amendment of 1997
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 46
Emerging Technologies
Federal Accessibility
Initiative
Technology should be
available to people with
disabilities
Section 508
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 47
Emerging Technologies
Web- and Video-Enhanced Digital Textbooks
Web site is continuously updated and maintained
Web-Based Distance Learning
All instruction provided via the Web
Used for some advanced placement classes
Useful for specialized classes not available in all
schools
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 48
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 49
Emerging Technologies
Wireless Technologies
Allows teachers and students to connect to a truly
global high-speed network
Wireless computers will ensure that educational
technology is used seamlessly and at the point of
instruction
Global wireless access will ensure that all children will
have access to educational classroom materials and
the world itself from anywhere
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 50
Chapter Summary
Identify security risks that threaten home and school computers
Describe how computer viruses and malicious software programs work and the steps you can take to prevent viruses
Describe different ways schools safeguard computers and networks
Explain why computer backup is important and how it is accomplished
Define what is meant by information privacy and its impact on schools
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 51
Chapter Summary
Identify the components of copyright that impact
education
Describe the ethical issues related to Internet
usage and steps schools are taking to address
them
Identify safe and healthy uses of technology
resources
Describe the emerging technologies that will
transform traditional classrooms
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 52
Teachers Discovering Computers Integrating Technology and
Digital Media in the Classroom 6th Edition
Security Issues, Ethics, and Emerging
Technologies in Education
Chapter 8 Complete