+ All Categories
Home > Documents > Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Date post: 18-Dec-2015
Category:
Upload: georgia-carr
View: 226 times
Download: 2 times
Share this document with a friend
Popular Tags:
36
Thomson Course Technology Thomson Course Technology Security Issues, Security Issues, Ethics, and Emerging Ethics, and Emerging Technologies in Technologies in Education Education Chapter 8 Chapter 8
Transcript
Page 1: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Security Issues, Ethics, and Security Issues, Ethics, and Emerging Technologies in Emerging Technologies in

EducationEducation

Chapter 8Chapter 8

Page 2: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Computer Security: Computer Security: Risks and SafeguardsRisks and Safeguards

Computer security risk - Any event or Computer security risk - Any event or action that has the potential of causing a action that has the potential of causing a loss of computer equipment, software, loss of computer equipment, software, data and information, or processing data and information, or processing capabilitycapability

Computer VirusesComputer Viruses• New virus programs found every dayNew virus programs found every day• Boot sector virusBoot sector virus• File virusFile virus• WormWorm• Trojan horseTrojan horse• Macro virusMacro virus

Page 3: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Signs of a Virus InfectionSigns of a Virus Infection

Page 4: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Computer Security: Computer Security: Risks and SafeguardsRisks and Safeguards

Computer VirusesComputer Viruses• Logic bombLogic bomb• Time bombTime bomb

Michelangelo virusMichelangelo virus

Page 5: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Computer Security: Computer Security: Risks and SafeguardsRisks and Safeguards

Virus Detection Virus Detection and Removaland Removal• Antivirus programsAntivirus programs• Popular antivirus Popular antivirus

programsprograms• Many options to Many options to

using antivirus using antivirus softwaresoftware

• Rescue diskRescue disk

Page 6: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Computer Security: Computer Security: Risks and SafeguardsRisks and Safeguards

Unauthorized Unauthorized Access and UseAccess and Use• Crackers and Crackers and

hackershackers• Access controlsAccess controls

IdentificationIdentification AuthenticationAuthentication

• Selecting a Selecting a passwordpassword

• Protecting your Protecting your passwordpassword

Page 7: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Computer Security: Computer Security: Risks and SafeguardsRisks and Safeguards

FirewallFirewall• A security system consisting of A security system consisting of

hardware and/or software that prevents hardware and/or software that prevents unauthorized access to data and unauthorized access to data and information on a networkinformation on a network

• Proxy serverProxy server• Personal firewallPersonal firewall

Page 8: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Hardware Theft Hardware Theft and Vandalismand Vandalism• Cable lock devicesCable lock devices• Portable equipment Portable equipment

warrants special warrants special considerationsconsiderations

• Computer Computer vandalismvandalism

Cutting cablesCutting cables Deleting softwareDeleting software Smashing computerSmashing computer

Page 9: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Computer Security: Computer Security: Risks and SafeguardsRisks and Safeguards

Software TheftSoftware Theft• Software piracySoftware piracy• Software licenseSoftware license

Single-user licenseSingle-user license Product activationProduct activation Shareware and Shareware and

freewarefreeware Site licenseSite license Network site licenseNetwork site license Community site Community site

licenselicense

Page 10: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Computer Security: Computer Security: Risks and SafeguardsRisks and Safeguards

System FailureSystem Failure• UndervoltageUndervoltage

BrownoutBrownout BlackoutBlackout

• Overvoltage Overvoltage (powersurge)(powersurge)

SpikeSpike

• Surge protectorSurge protector Surge protector with Surge protector with

phone line phone line protectionprotection

• Uninterruptible Uninterruptible power supply (UPS)power supply (UPS)

Page 11: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Computer Security: Computer Security: Risks and SafeguardsRisks and Safeguards

Backup ProceduresBackup Procedures• BackupBackup

Duplicate of a file, program, or disk that may Duplicate of a file, program, or disk that may be used if the original is lost, damaged, or be used if the original is lost, damaged, or destroyeddestroyed

Backup procedures policies in schools and Backup procedures policies in schools and school districtsschool districts

Backup programsBackup programs

Page 12: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Ethics and the Information AgeEthics and the Information Age

Computer ethicsComputer ethics• Moral guidelines that govern the use of Moral guidelines that govern the use of

computers, networks, and information computers, networks, and information systemssystems

Page 13: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Page 14: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Page 15: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Ethics and the Information AgeEthics and the Information Age

PhishingPhishing• Email attempting to obtain personal and Email attempting to obtain personal and

financial informationfinancial information SpamSpam

• An unsolicited e-mail mess or newsgroup An unsolicited e-mail mess or newsgroup posting sent to many recipients or newsgroups posting sent to many recipients or newsgroups at onceat once

• Average user receives more than 1,000 spam Average user receives more than 1,000 spam e-mail messages each yeare-mail messages each year

• Anti-spam campaignsAnti-spam campaigns• Anti-spam programAnti-spam program

Page 16: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Ethics and the Information AgeEthics and the Information Age

Privacy LawsPrivacy Laws• Business or government agencies Business or government agencies

should only collect information should only collect information necessary to carry out their functionsnecessary to carry out their functions

• Restrict data access to those who must Restrict data access to those who must use it to perform job dutiesuse it to perform job duties

• Release personal information only after Release personal information only after agreement to disclosure by individualagreement to disclosure by individual

• Must inform the individual when Must inform the individual when collecting informationcollecting information

Page 17: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Ethics and the Information AgeEthics and the Information Age

Employee and Student MonitoringEmployee and Student Monitoring• Use of computers to observe, record, Use of computers to observe, record,

view, and review an individual’s use of a view, and review an individual’s use of a computercomputer

• Policies of computer usePolicies of computer use• Acceptable Use Policy (AUP)Acceptable Use Policy (AUP)

Page 18: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Ethics and the Information AgeEthics and the Information Age

Copyright LawsCopyright Laws• Copyright Act of 1976Copyright Act of 1976• Illegal copyingIllegal copying• Fair useFair use

Copyright information on Web pagesCopyright information on Web pages

Page 19: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Ethics and the Information AgeEthics and the Information Age Copyright LawsCopyright Laws

• Teacher and student Teacher and student Web pagesWeb pages

Copyright laws do Copyright laws do protect these pagesprotect these pages

Public domain Web Public domain Web sitessites

CD-ROM with CD-ROM with images, graphics, images, graphics, audio, and video audio, and video clipsclips

Guidelines for Guidelines for creating Web pagescreating Web pages

Page 20: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Page 21: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Internet Ethics Internet Ethics and Objectionable Materialsand Objectionable Materials

Three categories of objectionable Three categories of objectionable materialmaterial• Pornographic materialPornographic material• Racist literature, gamblingRacist literature, gambling• Incorrect or inappropriate materialIncorrect or inappropriate material

Inaccurate informationInaccurate information

Page 22: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Internet Ethics Internet Ethics and Objectionable Materialsand Objectionable Materials

Recent Government ActionsRecent Government Actions• Dot Kids Implementation and Efficiency Dot Kids Implementation and Efficiency

ActAct Every site designated .kids will be a safe Every site designated .kids will be a safe

zone for childrenzone for children

• Children’s Internet Protection ActChildren’s Internet Protection Act Protects children from obscene, Protects children from obscene,

pornographic, and other information pornographic, and other information considered to be harmful to minorsconsidered to be harmful to minors

Page 23: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Internet Ethics Internet Ethics and Objectionable Materialsand Objectionable Materials

Parental ControlsParental Controls• Rating systemsRating systems

ICRAICRA• Filtering software programsFiltering software programs• Check Internet browser’s historyCheck Internet browser’s history

Page 24: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Internet Ethics Internet Ethics and Objectionable Materialsand Objectionable Materials

Educational ControlsEducational Controls• Acceptable Use Policies (AUP)Acceptable Use Policies (AUP)

Use of network is a privilege, not a rightUse of network is a privilege, not a right Behave as if you are a guest on the InternetBehave as if you are a guest on the Internet Rules concerning objectionable sitesRules concerning objectionable sites Rules concerning copyright issuesRules concerning copyright issues Outline proper use of equipmentOutline proper use of equipment Online safety and personal informationOnline safety and personal information Consequences of violating rulesConsequences of violating rules

Page 25: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Internet Ethics Internet Ethics and Objectionable Materialsand Objectionable Materials

Educational ControlsEducational Controls• Curriculum pagesCurriculum pages

Acts as guides for studentsActs as guides for students Sites are pre-evaluated by teachersSites are pre-evaluated by teachers Eliminates typing mistakes when typing URLsEliminates typing mistakes when typing URLs

• Teacher observationTeacher observation Final measure to prevent students from accessing Final measure to prevent students from accessing

objectionable and inappropriate materialsobjectionable and inappropriate materials Instruct students on use of Back button on the Instruct students on use of Back button on the

browserbrowser Understanding of ethical conceptsUnderstanding of ethical concepts

Page 26: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Health IssuesHealth Issues

Computers and Health IssuesComputers and Health Issues• Musculoskeletal Disorder (MSD)Musculoskeletal Disorder (MSD)• Repetitive Strain Injury (RSI)Repetitive Strain Injury (RSI)• Carpal Tunnel Syndrome (CTS)Carpal Tunnel Syndrome (CTS)

Hand ExercisesHand Exercises

• Computer Vision Syndrome (CVS)Computer Vision Syndrome (CVS) Techniques to ease eyestrainTechniques to ease eyestrain

Page 27: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Health IssuesHealth Issues

ErgonomicsErgonomics• An applied science devoted to An applied science devoted to

incorporating comfort, efficiency, and incorporating comfort, efficiency, and safety into the design of items in the safety into the design of items in the workplaceworkplace

Page 28: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Emerging TechnologiesEmerging Technologies

The Web offers enormous potential The Web offers enormous potential for expanding the classroomfor expanding the classroom

Page 29: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Emerging TechnologiesEmerging Technologies

The World Wide WebThe World Wide Web• Most K-12 schools are on the InternetMost K-12 schools are on the Internet• The federal government is committed to The federal government is committed to

high-speed Internet access in every high-speed Internet access in every classroomclassroom

• Speed will increaseSpeed will increase• Full-motion video on demandFull-motion video on demand• Instant access to Web-based Instant access to Web-based

educational programseducational programs

Page 30: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Emerging TechnologiesEmerging Technologies

Educational Software on DVDEducational Software on DVD• Information, graphics, animations, Information, graphics, animations,

video, and interactive linksvideo, and interactive links

Page 31: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Emerging TechnologiesEmerging Technologies

Assistive Assistive TechnologiesTechnologies• Technologies that Technologies that

modify or adapt the modify or adapt the classroom for classroom for special learning special learning needsneeds

• Individuals with Individuals with Disabilities Act Disabilities Act (IDEA) Amendment (IDEA) Amendment of 1997of 1997

Page 32: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Emerging TechnologiesEmerging Technologies

Federal Accessibility InitiativeFederal Accessibility Initiative• Technology should be available to people Technology should be available to people

with disabilitieswith disabilities• Section 508Section 508• WebXACTWebXACT

Text equivalents for all non-text elementsText equivalents for all non-text elements Summaries of graphs and chartsSummaries of graphs and charts All information displayed in color available All information displayed in color available

without colorwithout color

Page 33: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Emerging TechnologiesEmerging Technologies

Web- and Video-Enhanced Digital Web- and Video-Enhanced Digital TextbooksTextbooks• Web site is continuously updated and Web site is continuously updated and

maintainedmaintained Web-Based Distance LearningWeb-Based Distance Learning

• All instruction provided via the WebAll instruction provided via the Web• Still evolvingStill evolving• Useful for specialized classes not Useful for specialized classes not

available in all schoolsavailable in all schools

Page 34: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Florida Virtual SchoolFlorida Virtual School

Page 35: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

Emerging TechnologiesEmerging Technologies

A World Without WiresA World Without Wires• Allows teachers and students to connect to Allows teachers and students to connect to

a truly global networka truly global network• Wireless computers will ensure that Wireless computers will ensure that

educational technology is used seamlessly educational technology is used seamlessly and at the point of instructionand at the point of instruction

• Small, inexpensive computers ensure that Small, inexpensive computers ensure that all children have access to their lessons all children have access to their lessons and the World from both home and schooland the World from both home and school

Page 36: Thomson Course Technology Security Issues, Ethics, and Emerging Technologies in Education Chapter 8.

Thomson Course TechnologyThomson Course Technology

ReferenceReference

This PowerPoint is an abbreviated This PowerPoint is an abbreviated version of the one provided for this version of the one provided for this class by the textbook publisher class by the textbook publisher Thomson Course Technology.Thomson Course Technology.


Recommended