Internet Security and Ethical Uses of Technology in The Classroom

954 Words2 Pages

Internet security and ethical use of technology in the classroom is vital to a student’s academic success. Internet security ensures that the technologies used in the classroom stay operationally problem free as well as keeps students safe from internet predators. Ethical guidelines ensure proper appropriate use of technology that does not violate school rules or laws put in place by the federal and state governments.

There are several reasons why internet security is vital to the classroom. The most important reason is to maintain a fully functional operational system free of problems like slow running computer programs and hard drive damage caused by computer program viruses. Students often unknowingly download these viruses since every executable file found on the internet potentially harbors a harmful computer virus that can be downloaded onto the classroom computer system. Some of the viruses come in simple forms that copy themselves to every computer file on your hard drive each time a student uses an infected program, then there are email viruses that are able to download the computers email address books and mass email unwanted (sometimes un-ethical) information to everyone on those lists, the most devastating virus is known as a trojan horse which causes the most damage because they are able to erase files and programs as well as wipe out the hard drive completely, and then there are worms that copy themselves to as many computer networks that they can access slowing down the speed of the computers network operations (Brain, 2000). The only way to combat this problem is by running a trusted antivirus program, like Norton AntiVirus made by the Symantec Corporation, that is reliable and able to protect all ...

... middle of paper ...

...iruses Work. HowStuffWorks, Inc. Retrieved on September 4, 2011 from: http://computer.howstuffworks.com/virus.htm

Starr, L. (2003). Tools for Teaching Cyber Ethics. Education World. Retrieved on September 4, 2011 from: http://www.educationworld.com/a_tech/tech/tech055.shtml

Stop Child Predators. (2010). Press Release: Stop Child Predators Supports Legislation Restricting Access to Child Pornography on Government Computers. Stop Internet Predators. Retrieved on September 4, 2011 from: http://www.stopinternetpredators.org/press-release-stop-child-predators-supports-legislation-restricting-access-to-child-pornography-on-government-computers/

Tonarely, K. (n.d.). Effective Classroom Management Strategies for Technology. eHow. Retrieved on September 4, 2011 from: http://www.ehow.com/list_6618516_effective-classroom-management-strategies-technology.html

Open Document