top ten things you should know about cyberethics, cybersafety, and cybersecurity in your classroom...
TRANSCRIPT
Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom
2:15 - 3:00Room 335
Portia Pusey & Davina Pruitt Mentle
#10
Passwords
Fact48% of UK consumers would sell their passwords for under 5£ 30% for under 1 £.http://www.scmagazineuk.com/easter-egg-more-valuable-than-corporate-password-to-employees/article/235285/
You would not sell your password but…
Would you give it away?
What is your password protecting?
• Student and personal identity information• Protected student information• Access • Your reputation
Passwords Remedies
• Create strong passwords• Using different passwords for important
information• Change your password if you have shared your
password• Use a password management software or use
a coded system
#9
Thumb Drives
FactTwo thirds of one “lost and found” thumb drives were infected with malware. http://nakedsecurity.sophos.com/2011/12/07/lost-usb-keys-have-66-percent-chance-of-malware/
What could be on your USB drive?
• Student data• Personal identity information• Lesson plans• School assignments• Pictures• Resume
Thoughts to consider
• Verify that your computer automatically scans for viruses
• Assume that any drive you are handed by someone else is infected
• Apple computers are equally vulnerable and can spread malware too
• Consider encrypting flash drives
#8
Reputations
FactAnyone can make a social networking or web page about you.
What information could someone see?
Manage your Online Reputation
• Positive – Promote yourself like a brand
• Set up alerts• Google Alerts• Me on the Web
• Use Multiple Search Engines• Check
– Technorati (blogs)– Board Tracker (forums)– MonitorThis (20 -rss feeds)– Reputation Defender – Spokeo
http://lifehacker.com/357460/manage-your-online-reputation
14
Control the Message• Flickr (photo sharing): Use your name in the title and description of the image. In
Flickr, you can also add links to comments and HTML. Also, take advantage of tags!• YouTube (video sharing): The title of your video can help a lot. Popular videos are
often ranked high in search results.• Digg (social news): Digg and other social news sites allow you to customize your
profile with your personal information and affiliated websites. There is also room for a short bio where you can emphasize key words.
• Wikipedia (collaborative encyclopedia): Wikipedia is a bit of a tricky one because you're not allowed to edit your own page or your company's page as per their guidelines. However, you can contribute to Wikipedia and use the Talk: page to engage in a discussion.
• Facebook (community): In order to display your profile in the Google results, you will need to change your privacy settings.
• Twitter (micro-blogging): Claim your username on Twitter (before someone else does) and fill out the short bio.
• http://lifehacker.com/357460/manage-your-online-reputation
#7
Bullying and Harassment
FactSchool is the most common place youth report being bullied (31%)http://www.slideshare.net/PewInternet/cyberbullying-2010-what-the-research-tells-us-4009451
No matter where, By any name, the results can be the same
• School Violence• Delinquency• Suicide• Depression• Psychological Problems• Substance Abuse• Weapons• Offline Vicitimization
19
Proactive Approach• Reinforce positive behavior• Encourage Parents to Proactively monitor
– ask to see websites and accounts– search child’s real name, nickname, screen name, friends name,
school, clubs etc.– Check cell phone logs, stored pictures
• Block it– Use block settings
• Document it– List web addresses/emails and dates– Screen shots
• Report it– Local law enforcement– CyberTipLine– ISP of bully /cell phone provider
Steps for Educators
• If you know about it you must do something– Talk to parents– Inform school administration– Involve school counselors– Document your conversations
#6
Wireless Networks
FactYou can be arrested for a crime you did not commit.
School computers, Student Data WiFi
• Connecting to an unsecure wireless network can allow access to your data– Student data?– Personal Data?– Usernames and Passwords– Malware?
Good practice• Encrypt sensitive information
– When storing– When transmitting
• https
• Most Wi-Fi hotspots don’t encrypt the information you send over the internet and are not secure.
• Do not use the same password on different websites. It could give someone who gains access to one of your accounts access to many of your accounts.
• Many web browsers alert users who try to visit fraudulent websites or download malicious programs. Pay attention to these warnings, and keep your browser and security software up-to-date.
• Assure the firewall is working on your computer
#5
Inappropriate Content
FactFilters fail to filter about 10% of inappropriate content.http://news.bbc.co.uk/2/hi/uk_news/education/8148287.stm
What should you do?
• Be proactive. Inform students that filters are not 100% effective. If accidental access occurs, teach students to turn off the monitor or close the laptop and tell the teacher.
• Encourage self control, but if that fails. Explain that browsing history in schools is tracked.
• If illegal content is found on the school’s computer network, it’s essential that no-one downloads, prints or emails it (as this can be a criminal offence in itself) and that the suspect computer is not touched (not even turned on or off) so as to preserve the evidence.
• Report it
#4
Intellectual Property
Fact94% of teens go online to do research for school assignments. Almost half do so daily.
Plagiarism & The Internet• 15% have submitted a paper obtained in large part from a term paper
mill or website• 52% have copied a few sentences from a website without citing the
source• 90% of the students using the Internet to plagiarize have also
plagiarized from written sources. (The Web has ‘created’ few new cheaters - 6% of all students.)
Source: Center for Academic Integrity study: Student Cheating in American High Schools. Donald L. McCabe May 2004 http://www.academicintegrity.org
30Copyright 2009: Davina Pruitt-Mentle, Ph.D.: Permission to use
for educational purposes with credit given - 2009 NECC Conference
“Some Teachers Ignore Cheating”
• 47% of students think teachers sometimes ignore cheating.
• The major reasons students think teachers ignore cheating are:– Don’t want to deal with hassle (18%)– Don’t care (11%)– Not worth trouble on small assignments (7%)
Source: Center for Academic Integrity study: Student Cheating in American High Schools. Donald L. McCabe May 2004 http://www.academicintegrity.org
31Copyright 2009: Davina Pruitt-Mentle, Ph.D.: Permission to use
for educational purposes with credit given - 2009 NECC Conference
Why Students Cheat• Lazy/don’t study/didn’t prepare (32%)
• To pass/get good grades (29%)
• Pressures to succeed (12%)
• Don’t know answers/understand (9%)
• Time pressure - too much work, etc. (5%)
• Other (13%)
Source: Center for Academic Integrity study: Student Cheating in American High Schools. Donald L. McCabe May 2004 http://www.academicintegrity.org
32Copyright 2009: Davina Pruitt-Mentle, Ph.D.: Permission to use
for educational purposes with credit given - 2009 NECC Conference
Strategies to Help Prevent Plagiarism
• Be clear about cheating and plagiarism policies• Discuss as a legal issue of fair use and intellectual property. • Demonstrate how easy it is to check paper mills and internet sources• Have students do an exercise
– Find if someone has plagiarized by using the web– Download a paper from one of the paper mill sites and have students analyze it to
see that these sites produce poor quality work in many cases• Assign current and local topics • Assign an initial research “short paper” on the topic of ethics, cybercheating, or
cyberethics• Be specific about the paper
– Not just general statement “ a paper on the Civil war”– Include how many pages for each section
• Change topics from semester to semester or from class to class• Make sure students know that you read carefully the papers that are handed in • Set example by using properly citied media with Creative Commons Licensing.
33
Source: Pruitt-Mentle, Cyberethics Seminar for Professional Educators: Ethical and Legal Implications for Classroom Technology Use University of Maryland, College Park: July 16-17, 2002
#3
Hacking
FactIn general there are an average of 156 days between the compromise of a website and detectionhttps://www.trustwave.com/downloads/whitepapers/Trustwave_WP_Global_Security_Report_2010.pdf
Hacking• Miller says he recently heard about a server hijacking case in
Louisiana where a school district's server had been unknowingly usurped to disseminate pornography in China.
• "I remember one incident where students loaded some software onto a computer while the teacher was out of the room," says Charles Garten, director of information support services for the 33,000-student Poway Unified School District, north of San Diego, Calif.
• "Unfortunately for them, they didn't realize they weren't getting into the real grade book program," says Garten. "When the quarter ended and report cards went home, the kids who had purchased better grades got their real grades. There were a lot of unhappy students and a lot of unhappy parents when the students told their parents what had happened."
Students at Potomac school hack into computers; grades feared changed
• “Teachers were told to check grades for anomalies and correct them before first semester report cards are released Feb. 3, according to the sources. But because teachers at the school no longer keep separate log books of their grades, it might be difficult to go back and find a student's original grade, the sources said.
• Some teachers are careful to print out grades immediately after entering them in the system, one source said, but if grades were left on the computer system for any length of time before they were printed out, they could have been modified even on the printed version.”
• http://www.washingtonpost.com/wp-dyn/content/article/2010/01/28/AR2010012803494.html
Prevention Techniques
• Be careful with your password• Log off of a computer when you will not be in
eyesight• Avoid using student thumb drives on teacher
computers• Understand social engineering• If a website seems strange or new, do not log in• If your computer is running slowly or strangely
use care with authentications
#2
Social Engineering
FactEighty-eight percent of e-mail globally is unwantedhttp://www.aasa.org/SchoolAdministratorArticle.aspx?id=8606
Don’t Phall for the Phish• Be skeptical• Look carefully at the sender’s address• Look at the header• Consider all attachments and links dangerous• Phishing can happen by phone or in person• HOAX ENCYCLOPEDIA: The About.com Antivirus site has a comprehensive
database of e-mail and virus hoax messages. Before you forward the next "urgent" alert to your family and friends, check for it on this List, find.pcworld.com/64327
• PHISHTANK: A community project, PhishTank is a database of known phishing sites. You can search the database to identify phishing sites, and you can add to the fist any new sites you've encountered, www.phishtank.com
• Report suspicious emails to your IT department and to www.fraud.org
#1
You!
#1