SlideShare a Scribd company logo
Inappropriate use of the network ppt
T heTHREAT
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VInappropriate Use of the Network will always be a
concern as long as the computer is connected to the
internet.
VThreats range from email, websites, social
networking, instant messaging, to certain Web 2.0
tools. Inappropriate use of the network is common
through all technology resources mentioned above.
Common Misconceptions
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VThe biggest misconception of inappropriate use of the
network is that everyone is in fear of misusing computer
resources. That is not a fac. Most students, teachers, and
administrators are not concerned of inappropriate use of the
network due to firewall and blocking software that is being
used in the districts. The software on the district’s resources
do protect the students, teachers, administrators and districts
from harm most of the time.
T he realities Of Inappropriate USE
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VDue to the inappropriate use of the network, students are missing out on
the educational opportunities with the use of the Web 2.0 tools because of
concerns and behaviors such as cyberbullying, chatting, and visiting
websites that are not educational.
VStudents are actually more engaged and motivated with the use of the
Web 2.0 tools, but cannot use them in some districts due to this.
VThere are concerns with school employees using the Internet to view
inappropriate website and using a numerous amount of time exchanging
personal emails throughout the work day.
Common Responses
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VAcceptable Use Policies (AUPs): Contracts between the (Internet and computer user)
students and parents, with the district, the school, and the teachers about appropriate
network usage.
VLimited Web 2.0 Use; Many schools are prohibited to use many Web 2.0 tools such as
blogging, personal email, instant messaging, social networking sites, etc.
VFiltering and Blocking Software: Districts are purchasing this software in attempt to
keep the students safe and from accessing inappropriate use of the network.
VMonitoring and Surveillance Software: Many districts also purchase software that
monitors all information that is transmitted through the district’s network.
VRestricting Access: Many districts do not allow teachers to create or use websites and
Web 2.0 tools to be used with their classrooms and students.
A few Recommendations
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
Vicki Davis (2007) shares her six pillars of the Web 2.0 classroom (Robinson, Brown, & Green,
2010):
VInternet safety and privacy: Teachers make it their responsibility to teach students the skills
to be safe and to protect students from harm through careful supervision.
VInformation literacy: Teach students how to maintain privacy.
VInternet citizenship: Teach students to evaluate and respond to information on the web
critically.
VInternet teamwork: Teach students to engage in a responsible way with others online.
VIntentional Internet activities: Teachers will create intentional planned activities for
students learning while using the Internet and Web 2.0 tools.
VAn engaged teacher: The same teachers will be engaged in the student learning throughout
these activities. The teachers should be trusted as professionals to use the district’s network
appropriately and have the necessary resources and bandwidth available with few filters to
interfere in this learning process.
Sources USED
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
VRobinson, L., Brown, A., and Green, T. (2010). Security vs. access.
International Society for Technology in Education

More Related Content

PDF
Network security ppt
PDF
Internet Publication
PPTX
Legal and ethical issues for using technology in the classroom
PPTX
Cyber Bullying
PPT
Education & Technology
PPTX
Acceptable Use Policy
PPTX
Aup lesson for cbs students
PDF
High school students and cybersecurity
Network security ppt
Internet Publication
Legal and ethical issues for using technology in the classroom
Cyber Bullying
Education & Technology
Acceptable Use Policy
Aup lesson for cbs students
High school students and cybersecurity

What's hot (20)

PPTX
Aup lesson for cbs students
PPT
Teaching Ethical and Legal use of Technology in the Classroom
PPTX
Navigating Social Media
PPTX
Social Media
PPTX
Aup lesson for cbs students
PPT
Parent engagement cvps
DOC
Actions model last
ODP
Digital Natives
PPTX
Etl523 pres jj jarick
PPTX
Presentation1
PPTX
techKNOW leadership for JefCoEd Tech Camp 7.11.13
PPTX
Mobile devices
PPTX
Back to school - CYBER SAFETY
PPTX
Technology in the classroom
DOCX
Week of safe internet
PPT
Twitter Social Networking And Social Media Oct1509
PPTX
Ed. Tech. 2
PPTX
Faculty and staff training
PPTX
Digital citizenship project[1]
PPT
Computer Security and safety
Aup lesson for cbs students
Teaching Ethical and Legal use of Technology in the Classroom
Navigating Social Media
Social Media
Aup lesson for cbs students
Parent engagement cvps
Actions model last
Digital Natives
Etl523 pres jj jarick
Presentation1
techKNOW leadership for JefCoEd Tech Camp 7.11.13
Mobile devices
Back to school - CYBER SAFETY
Technology in the classroom
Week of safe internet
Twitter Social Networking And Social Media Oct1509
Ed. Tech. 2
Faculty and staff training
Digital citizenship project[1]
Computer Security and safety
Ad

Similar to Inappropriate use of the network ppt (20)

PDF
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
PPT
Breaking down the barriers
PPT
Web Policies Presentation
PPT
Parent training keynote_v3
PPSX
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
PDF
Digital Citizenship
PPT
Digital Literacy PDLM
PPSX
E safety training
PPTX
Staff training session
PPTX
Internet Safety
PDF
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
DOCX
Resources
PPT
A2 s watson etl523
PPTX
SOCIAL-AND-ETHICAL.pptx
PPT
Technology Integration Initiative
PPTX
PCK-6-MODULE-9.pptx Digital/ Cyber Literacy
DOCX
Edu current issues
DOCX
Social media policy
PPTX
Virtual learning, online learning environment and covid 19 slides
PDF
The Benefits of Internet Education
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Breaking down the barriers
Web Policies Presentation
Parent training keynote_v3
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
Digital Citizenship
Digital Literacy PDLM
E safety training
Staff training session
Internet Safety
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Resources
A2 s watson etl523
SOCIAL-AND-ETHICAL.pptx
Technology Integration Initiative
PCK-6-MODULE-9.pptx Digital/ Cyber Literacy
Edu current issues
Social media policy
Virtual learning, online learning environment and covid 19 slides
The Benefits of Internet Education
Ad

Recently uploaded (20)

PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Lesson notes of climatology university.
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Cell Types and Its function , kingdom of life
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Presentation on HIE in infants and its manifestations
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Cell Structure & Organelles in detailed.
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Complications of Minimal Access Surgery at WLH
Lesson notes of climatology university.
102 student loan defaulters named and shamed – Is someone you know on the list?
Cell Types and Its function , kingdom of life
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
Chinmaya Tiranga quiz Grand Finale.pdf
O7-L3 Supply Chain Operations - ICLT Program
Microbial disease of the cardiovascular and lymphatic systems
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Presentation on HIE in infants and its manifestations
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Pharma ospi slides which help in ospi learning
Cell Structure & Organelles in detailed.
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...

Inappropriate use of the network ppt

  • 2. T heTHREAT wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww VInappropriate Use of the Network will always be a concern as long as the computer is connected to the internet. VThreats range from email, websites, social networking, instant messaging, to certain Web 2.0 tools. Inappropriate use of the network is common through all technology resources mentioned above.
  • 3. Common Misconceptions wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww VThe biggest misconception of inappropriate use of the network is that everyone is in fear of misusing computer resources. That is not a fac. Most students, teachers, and administrators are not concerned of inappropriate use of the network due to firewall and blocking software that is being used in the districts. The software on the district’s resources do protect the students, teachers, administrators and districts from harm most of the time.
  • 4. T he realities Of Inappropriate USE wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww VDue to the inappropriate use of the network, students are missing out on the educational opportunities with the use of the Web 2.0 tools because of concerns and behaviors such as cyberbullying, chatting, and visiting websites that are not educational. VStudents are actually more engaged and motivated with the use of the Web 2.0 tools, but cannot use them in some districts due to this. VThere are concerns with school employees using the Internet to view inappropriate website and using a numerous amount of time exchanging personal emails throughout the work day.
  • 5. Common Responses wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww VAcceptable Use Policies (AUPs): Contracts between the (Internet and computer user) students and parents, with the district, the school, and the teachers about appropriate network usage. VLimited Web 2.0 Use; Many schools are prohibited to use many Web 2.0 tools such as blogging, personal email, instant messaging, social networking sites, etc. VFiltering and Blocking Software: Districts are purchasing this software in attempt to keep the students safe and from accessing inappropriate use of the network. VMonitoring and Surveillance Software: Many districts also purchase software that monitors all information that is transmitted through the district’s network. VRestricting Access: Many districts do not allow teachers to create or use websites and Web 2.0 tools to be used with their classrooms and students.
  • 6. A few Recommendations wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww Vicki Davis (2007) shares her six pillars of the Web 2.0 classroom (Robinson, Brown, & Green, 2010): VInternet safety and privacy: Teachers make it their responsibility to teach students the skills to be safe and to protect students from harm through careful supervision. VInformation literacy: Teach students how to maintain privacy. VInternet citizenship: Teach students to evaluate and respond to information on the web critically. VInternet teamwork: Teach students to engage in a responsible way with others online. VIntentional Internet activities: Teachers will create intentional planned activities for students learning while using the Internet and Web 2.0 tools. VAn engaged teacher: The same teachers will be engaged in the student learning throughout these activities. The teachers should be trusted as professionals to use the district’s network appropriately and have the necessary resources and bandwidth available with few filters to interfere in this learning process.
  • 7. Sources USED wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww VRobinson, L., Brown, A., and Green, T. (2010). Security vs. access. International Society for Technology in Education