Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
complete a
transaction.
Hackers, thieves
and spyware
programmers
realize this and
often try to
intercept your
information
during these
transactions, so
make sure you
are always
dealing with
secure websites
and companies.
First, only provide
your information
to reputable
businesses, then
ensure that the
company's
website uses a
LEVERON H. LAVIA
accounts. Hackers specifically target lowsecurity sites to gain access to large lists of
usernames and corresponding passwords,
knowing that many people use the same
combination of credentials for things like
online banking.
Tip 4: What is spyware? How do I stop it?
Spyware probably poses the biggest threat to
privacy and security on the Internet, yet so
few people really know what it is or how it
works. Put simply, spyware is any piece of
software that records your actions or
information without your knowledge. Some
spyware is fairly benign, tracking browsing
history and keeping the data it receives
anonymous, while other spyware is
specifically designed to get your online
banking credentials so thieves can clean out
your accounts.
Because it's almost impossible to avoid
spyware on your own, having anti-spware
and antivirus programs running on your
computer is a must.
Tip 5: It's not all about spyware and scams
With all this talk about spyware, hackers and
Internet security, it's important to remember
that most people with privacy issues on the
Internet put themselves in that position.
Think about social networking sites and just
how much personal information you have
posted there. If someone were trying to steal
your identity and needed your father's
middle name or where you went to
elementary school two commonly used
security questions you need to think about
how a thief could locate those facts. If you're
concerned about Internet privacy, you have
to consider staying away from social
networking sites, minimizing the information
you put out there, or maximizing privacy
settings on these sites.
Internet security - is a tree branch of
computer security specifically related to the
Internet, often involving browser security but
also network security on a more
LEVERON H. LAVIA
Online Etiquette
PLATFORMS
Social
SOCIAL
SEO
CMS
Online Safety Security Ethics Etiquette
Current State
Generally speaking, before planning can
begin, it is critical that an assessment take
place of the current state of the surrounding
environment. This is especially true when
planning for the implementation of
technology for an educational environment.
In this section we will review what
information a planner must collect and
understand with regards to the current state
of their institution's environment.
Elements to be considered when
documenting the current state of
technology:
1. History of technology planning or
initiative that led to current state:
when was the last plan developed,
what were the recent purchases,
recent initiative, former committee
members, technology leadership, or
any other related information relevant
to the history of technology planning
at the school or district.
2. Mission of educational technology
(implied or stated) at the school or
district level.
EMPOWERMENT TECHNOLOGY
type,
infrastructure
element:
1. Types of hardware currently
deployed:
computers,
projectors, cameras, iPods, etc.
2. Location of currently deployed
hardware: labs, in classrooms,
mobile
carts,
one-to-one
laptops, etc.
LEVERON H. LAVIA
EMPOWERMENT TECHNOLOGY