It's been quite a while since my last post - For the 2009-10 school year I stepped back into my teacher shoes and got some much needed real-time experience with a class of 5th, 6th and 7th grade boys. They have taught me a great deal! It pleases me to no end to see their seemingly innate attitude towards positive digital citizenship. These boys have grown up with technology and not only do they embrace it as an important part of their lives, they also realize that it IS a place where real people are impacted. However, and it's a BIG "however," there is much they are unaware of, especially when it comes to the kinds of risks that online interaction involves. They seemingly move and click at the speed of light (!) and that just doesn't usually leave enough time to think cautiously.
The other thing I have been painfully reminded of is how difficult it is to truly integrate cyber safety into the curriculum. Yes, it takes some planning, and that means time that I never have enough of. I am very humbled to think of the many teachers who have embraced cyber safety education - Teachers, you have my greatest respect.
Carry on and think about SUMMER vacation!
Wednesday, May 12, 2010
Sunday, November 30, 2008
Defining the Techsafe Teacher
As you prepare to integrate more technology into the classroom, give thought to preparation for the inevitable cyber safety challenges that you will encounter. How will you implement your responsibilities in ensuring that students engage in appropriate and safe technology experiences while in class? And how far should your responsibilities reach?
Food for thought:
The controversial trial of Julie Amero has been the subject of international media coverage. Julie Amero is a former substitute teacher who was previously convicted of four counts of risk of injury to a minor, or impairing the morals of a child. On June 6, 2007, the conviction was vacated and she was granted a new trial.
Julie Amero was substituting for a seventh-grade language class in Norwich, Connecticut. Prior to Ms. Amero’s arrival, the teacher's computer had been accessed by pupils while the regular teacher was out of the room. When Julie took charge, the computer started showing pornographic images in the form of pop-ups.
On January 5, 2007, Amero was convicted in Norwich Superior Court on four counts of risk of injury to a minor, or impairing the morals of a child. Her sentencing was delayed four times after her conviction, with both the prosecution and judge not satisfied that all aspects of the case had been assessed. The felony charges for which she was originally convicted carry a maximum prison sentence of 40 years. On June 6, 200, a New London superior court judge threw out the conviction of Amero, she was granted a new trial and entered a plea of not guilty. It is unclear at this time if the State's Attorney of Connecticut will pursue a second trial.
The Controversy
Amero and her supporters say that the old computer, along with the school network, lacked firewall and anti-spyware protection to prevent inappropriate pop-ups. Although the school did use a filter, it was not licensed for software updates and so did not block newly discovered pornographic websites. Amero’s defense argued that this prevented her from controlling the pop-ups.
One of the important things for you to consider is how could an AUP have helped? A comprehensive AUP should stipulate information for substitutes and other temps using school or classroom computers. It should layout how these temporary or non-permanent personnel are to be instructed on how to handle issues such as this if they arrived.
ALL Ms. Amero should have done was immediately turn off the computer or contact the office for help. NEITHER of which she did.
Just how should we define a Techsafe Teacher? HOW will you implement your responsibilities in ensuring that students engage in appropriate and safe technology experiences while in class? Share your thoughts by blogging on the following:
Food for thought:
The controversial trial of Julie Amero has been the subject of international media coverage. Julie Amero is a former substitute teacher who was previously convicted of four counts of risk of injury to a minor, or impairing the morals of a child. On June 6, 2007, the conviction was vacated and she was granted a new trial.
Julie Amero was substituting for a seventh-grade language class in Norwich, Connecticut. Prior to Ms. Amero’s arrival, the teacher's computer had been accessed by pupils while the regular teacher was out of the room. When Julie took charge, the computer started showing pornographic images in the form of pop-ups.
On January 5, 2007, Amero was convicted in Norwich Superior Court on four counts of risk of injury to a minor, or impairing the morals of a child. Her sentencing was delayed four times after her conviction, with both the prosecution and judge not satisfied that all aspects of the case had been assessed. The felony charges for which she was originally convicted carry a maximum prison sentence of 40 years. On June 6, 200, a New London superior court judge threw out the conviction of Amero, she was granted a new trial and entered a plea of not guilty. It is unclear at this time if the State's Attorney of Connecticut will pursue a second trial.
The Controversy
Amero and her supporters say that the old computer, along with the school network, lacked firewall and anti-spyware protection to prevent inappropriate pop-ups. Although the school did use a filter, it was not licensed for software updates and so did not block newly discovered pornographic websites. Amero’s defense argued that this prevented her from controlling the pop-ups.
One of the important things for you to consider is how could an AUP have helped? A comprehensive AUP should stipulate information for substitutes and other temps using school or classroom computers. It should layout how these temporary or non-permanent personnel are to be instructed on how to handle issues such as this if they arrived.
ALL Ms. Amero should have done was immediately turn off the computer or contact the office for help. NEITHER of which she did.
Just how should we define a Techsafe Teacher? HOW will you implement your responsibilities in ensuring that students engage in appropriate and safe technology experiences while in class? Share your thoughts by blogging on the following:
- What types of cyber safety issues do you envision that you may face and how will you respond to these challenges?
- Have you, or will you, teach classroom acceptable use policies?
- How does your teaching style equate to how you will handle safety and/or security issues that will come up?
Cyber Safety Realities
Computers and the Internet can be a powerful tool for use in an education setting. However, tech savvy teachers must also accept the responsibilities of being tech safe teachers. Students’ horizons are expanded without ever leaving the classroom. It must recognized however, that as you enable your students with skills and opportunities within the educational setting, so are you enabling them to be more independent users of technologies – citizens in a global community. It’s a good thing! But not without challenges.
In the most basic of terms, cyber safety topics can be thought of in two categories: personal safety and cyber security. The major personal safety challenges of socialization in the cyber community include:
Cyber security challenges are most often thought of as those concerning computer viruses and protecting a system from outside threats. However, security issues extend far beyond the threat of the latest worm. They include:
Technology in schools is being supported through a variety of public and private funding opportunities. One of the ways that government has become involved in promoting technology in schools is through the E-rate program.
In October of 2008, Federal legislation was passed that mandates schools receiving E-rate funds to provide Internet safety education. If desired google the topic or research the legislation at E-School News.
Blog about it: In your opinion, will this new legislation have a direct impact on real-life cyber safety issues? Why or why not?
In the most basic of terms, cyber safety topics can be thought of in two categories: personal safety and cyber security. The major personal safety challenges of socialization in the cyber community include:
- Access and/or exchange of inappropriate sites/materials – including sites that are objectionable for racial, sexist, political, and sexual content, those that promote illegal activity such as gambling or the sale of drugs and unreliable resource sites (those that are simply people’s opinions presented as fact, a situation that is not always clearly understood by students).
- Online harassment and bulling through user generated activities: text and IM, social networking, online video, etc.
- Providing/posting too much identifying/personal information – this includes ignorance or disregard for the fact that once information is online, it is difficult or impossible to remove.
- Interaction with cyber predators – including text and email exchanges, web cams, video sharing, etc.
Cyber security challenges are most often thought of as those concerning computer viruses and protecting a system from outside threats. However, security issues extend far beyond the threat of the latest worm. They include:
- Interactive malware infection – including computer viruses brought in via authorized and unauthorized CDs or other portable media (jump drives, etc.)
- Malicious activity including hacking and defacing online environments.
- Access and usage of Intellectual property – including the use and exchange of copyrighted material
Technology in schools is being supported through a variety of public and private funding opportunities. One of the ways that government has become involved in promoting technology in schools is through the E-rate program.
In October of 2008, Federal legislation was passed that mandates schools receiving E-rate funds to provide Internet safety education. If desired google the topic or research the legislation at E-School News.
Blog about it: In your opinion, will this new legislation have a direct impact on real-life cyber safety issues? Why or why not?
Subscribe to:
Posts (Atom)