Security Vs. Access Flashcards
1
Q
Inappropriate content: assumptions
A
- Without supervision adolescents well him discover inappropriate sites
- Filter software can fully protect students
2
Q
Inappropriate content: solutions
A
- Blocking software: may cause good sites to be accidentally blocked
- Acceptable use policy: written rules and responsibilities of computer use as well as consequences of misuse
- Direct supervision: either by an adult or via the use of software that tracks the history of users
3
Q
Inappropriate use: recommendation
A
- Teach students how to be responsible consumers of the Internet
- educators need to set the rules about usage and explain what is inappropriate and help them make the right choices
4
Q
Predators: issues
A
- Concern about young children giving too much personal information online
- Despite the fact that online communication has become a medium in sex crimes, these crimes themselves aren’t new. Crime of these natures are called statutory rape and in most states have established criminal laws against them
5
Q
Predators: recommendation:
A
- Communication: explain threats of chat rooms especially about sex and sending personal information to strangers
- Monitoring history and access to passwords: adults need to know about social networks and learn that way of communication
6
Q
Cyber bullying: issues
A
- Mobile communication devices in the hands of the students would mean more incidents of miss use and unwanted student behavior. Data doesn’t support that assumption
7
Q
Cyber bullying: recommendation:
A
- Adults need to educate themselves about mobile Communication devices work and the various capabilities of their use
- Establishing school policies that regulates the use of various features of mobile communication devices which can be beneficial as tools to enhance education like surveys or clickers
- Educate students about the danger of cyber bullying and encourage open communication about reporting incidents
- Parent involvement parents need to be informed about school policies regarding mobile devices and be educated about potential threats
8
Q
Network security: issues
A
- Expense to replace programs or hardware
- confidential information being accessed
- Student safety in terms of being exposed to harmful content on the Internet
- Teacher access to be able to use technology effectively, teachers need sufficient access to the Internet and to students files
9
Q
Network security: recommendation
A
- Sitting Secure remote access virtual private network VPN to allow teachers to access confidential information safely
- Managing desktop use an activity
- Monitor students use
- Filters to blog unauthorized access
- Customize firewall to meet functional needs
10
Q
Inappropriate use of network: issues
A
- Students will be distracted from instruction if using technology on mobile devices
- Students might communicate inappropriate content
- Some parents and administrators don’t see it you occasional by you in using web 2.0 tools
11
Q
Inappropriate use: recommendation
A
- Use AUPs
2. Vicki Davis recommends: Internet safety and privacy information literacy Internet citizenship Internet teamwork intentional Internet activities engaged teachers
12
Q
Copyright infringement issues
A
- Information about teaches rights and student ride to “copyright material is conflicting
- Copyright policies are complex which results in teachers not sharing innovative instructional approaches
- Most educators arenot sure what is fair use
- TEACH ACT signed by President Bush allow teachers to use copyrighted material for the purpose of instruction
13
Q
Copyright infringement: recommendation
A
- Get permission to use copyrighted material
- Use work in the public domain
- Use royalty-free work
- Always give credit to the original creator and a link to the original work
- Education about copyright laws for students and teacher to prevent the utilization of innovative instruction tools
14
Q
Data and identity Theft: issues
A
- Digitizing data poses a threat to the confidentiality of students information and can lead to identity theft
- Data theft most of the time lead to data manipulation and illegal distribution of tests or grades
- Data theft can put schools in violation of state in a federal laws
- Identity theft due to unsecured networks can lead to financial loss to the victims
15
Q
Dayton and identity theft: recommendation:
A
- Computer and network security through restricting access and installing filters and firewalls
- Data encryption from plain text to ciphertext
- Setting user profiles to determine levels of access to keep data secure and not accessible to students
- Installing tracking devices on school equipments
- Provide staff training on how to handle sensitive information
- Establish technology plan that includes data security