
Best Practices for Balancing Technology Use and Safety In A Modern School
PROCEEDING
Dowayne Davis, New Jersey City University, United States
Society for Information Technology & Teacher Education International Conference, in Washington, D.C., United States ISBN 978-1-939797-32-2 Publisher: Association for the Advancement of Computing in Education (AACE), Waynesville, NC USA
Abstract
With bring your own device, one-to-one, and online assessments initiatives in K-12 schools, a classroom’s dependency on a reliable technology infrastructure continues to be an important topic for educators and technology leaders. Innovative initiatives have increased the importance of high technology performance and security within a modern school. With increased access to network resources from remote locations with technologies such as Google Applications, Microsoft 365, and virtual private networks, schools’ technology systems, teachers, and students are increasingly susceptible to technology vulnerabilities. While educators and technology leaders continuously work to strike the right balance between technology use and safety, maintaining security has become an important activity to keeping essential aspects of a school's technology network safe and operable. This paper explores the balance of effective technology use and security from the perspective of the teacher and network administrator to provide best practices that promote effective technology use in a modern school.
Citation
Davis, D. (2018). Best Practices for Balancing Technology Use and Safety In A Modern School. In E. Langran & J. Borup (Eds.), Proceedings of Society for Information Technology & Teacher Education International Conference (pp. 1026-1030). Washington, D.C., United States: Association for the Advancement of Computing in Education (AACE). Retrieved June 2, 2023 from https://www.learntechlib.org/primary/p/182649/.
© 2018 Association for the Advancement of Computing in Education (AACE)
References
View References & Citations Map- Akins. (2017). 3 advantages of a network firewall for your schoo. Retrieved from http://www.akinsit.com/advantages-networkfirewall-school/
- Anderson, M. (2016). How internet filtering hurts kids. Retrieved from https://www.theatlantic.com/education/archive/2016/04/internet-filtering-hurts-kids/479907/
- Baker, M. (2016). Seven tips to protect faculty and student data from hackers. Retrieved from https://www.edsurge.com/news/2016-05-08-seven-tips-to-protect-faculty-and-student-data-from-hackers Basani, V. (2015). The 5 biggest misconceptions about network security. Retrieved from https://blog.cygilant.com/blog/the-5biggest-misconceptions-about-network-security
- Basani, V. (2015). Internal vs. External security threats: Why internal is worse than you expected (and what you can do about it). Retrieved from https://blog.cygilant.com/blog/internal-vs.-external-security-threats-why-internal-is-worse-than-youexpected-and-what-you-can-do-about-it
- Brynjolfsson, E., & McAfee, A. (2011). Race against the machine: How the digital revolution is accelerating innovation, driving productivity, and irreversibly transforming employment and the economy Brynjolfsson
- Dweck, C. (2015). Carol dweck revisits the'growth mindset'. Education Week, Retrieved from http://www.islandtrees.org/main/curriculum/rgm.pdf FCC. (2017). Children's internet protection act (CIPA). Retrieved from https://www.fcc.gov/consumers/guides/childrens-internetprotection-act
- Freeman, A. (2012). 10 easy steps to stop hackers from attacking. Retrieved from https://null-byte.wonderhowto.com/news/lockdown-your-web-server-10-easy-steps-stop-hackers-from-attacking-0133721/
- Gazette, R. (2018). Spectre, meltdown show there's no foolproof solution for network security: Shanley. Retrieved from http://www.rgj.com/story/money/business/2018/01/16/spectre-meltdown-show-theres-no-foolproof-solution-networksecurity-shanley/1037361001/
- Gupta, P. (2016). Some technology policies that schools should refer before adopting. Retrieved from http://edtechreview.in/trends-insights/insights/2407-school-technology-policy Karl, L.C. (2011). Elementary teachers' perceptions of technology proficiencies and motivation to integrate technology in school curriculi (Ed.D.). Available from ProQuest Central, ProQuest Dissertations& Theses Full Text, ProQuest Dissertations& Theses Global. (915789260).
- Lanier, J. (1997). Redefining the role of the teacher: It's a multifaceted profession. Retrieved from https://www.edutopia.org/redefining-role-teacherLarson,S.(2017).Thehacksthatleftusexposedin2017.Retrievedfromhttp://money.cnn.com/2017/12/18/technology/biggestcyberattacks-of-the-year/index.html
- Plotnick, E. (2004). Changing teachers' perceptions and use of technology in the classroom. Educational Technology, Research and Development, 52(1), 116.
- Rice, J.F. (2014). Are breaches inevitable?. Retrieved from https://www.computerworld.com/article/2601901/are-breachesinevitable.html
- Robinson, L., Brown, A., & Green, T.D. (2010). Security vs. Access: Balancing safety and productivity in the digital school International Society for Technology in Education.
- Rubenking, N.J. (2018). The best antivirus protection of 2018. Retrieved from https://www.pcmag.com/article2/0,2817,2372364,00.asp Smith. (2017). Cyber attacks cost U.S. Enterprises $1.3 million on average in 2017. Retrieved
- Vinton, K. (2014). How companies can rebuild trust after A security breach. Retrieved from https://www.forbes.com/sites/katevinton/2014/07/01/how-companies-can-rebuild-trust-after-a-securitybreach/#16a25e855e6c
These references have been extracted automatically and may have some errors. Signed in users can suggest corrections to these mistakes.
Suggest Corrections to ReferencesSlides
- Presentation_Format_52665.pdf (Access with Subscription)