Vous êtes sur la page 1sur 5

Internet Etiquette-- online communication

that makes everyone comfortable. The


internet is a group of computers that are
connected, etiquette is a social code. That is
the technical definition of the words.
Combing the words into a term enables it to
become a philosophy or part of one.
Online Etiquette
1.Whenever you work and communicate
online, there are some basic rules you should
follow:
Think before you send.
If you send an email or post a message in
anger, it could come back to haunt you later.
The same goes for pictures and videos you
post online. Even when something is deleted
from a page, it may still be out there waiting
to be found when you least expect it.
2. Respect the time and bandwidth of others.
Don't pass along emails that contain hoaxes,
or send messages to the entire student body.
The same goes for sending large videos or
attachments in an email message. It wastes
everyone's time when they have to wade
through extra information to get to the
important stuff.
3. Don't send messages that could be
misinterpreted as threatening or hurtful.
Be careful about the language you use as
well as the information you pass along about
others. Sending messages that could be seen
as threatening may result in disciplinary
action.
4.Follow the conventions of writing when
sending formal emails or posting comments
online.
Unless the message you're sending is
informal (such as a text message to a friend),
you should use correct spelling, grammar,
and punctuation. You shouldn't WRITE IN ALL
CAPS! (It's considered shouting)

5.Respect others' right to privacy.


Don't use technology to pass along rumors or
share personal information about someone
without their permission. The same goes for
posting names and photos of others.
LEVERON H. LAVIA

Privacy and Security on the Internet: 5 Tips


to Stay Safe
As the Internet becomes an increasingly
integral part of

daily life, questions about privacy and


security on the Internet are on the rise.
Keeping your personal information, private
data and finances safe can be difficult, but
by following a few tips, you can avoid the
vast majority of scams, spyware and privacy
breaches.
Tip 1. Be Aware
The best tool to avoid spyware and stay safe
on the Internet is your own brain. Free
software with no potential upgrades or
strings attached, websites that are covered
in flashy ads, and free Wi-Fi in an unexpected
place are all signs that something may be
wrong, and ignoring that intuition can get
you in trouble. By staying aware of what you
are doing, and thinking about your security
while you live your online life, you stand a
better chance of avoiding potentially
dangerous situations.

Tip 2: Check for


website safety
The Internet can
be dangerous
because so many
websites require
your personal
information to
either log in to
your account or to
EMPOWERMENT TECHNOLOGY

complete a
transaction.
Hackers, thieves
and spyware
programmers
realize this and
often try to
intercept your
information
during these
transactions, so
make sure you
are always
dealing with
secure websites
and companies.
First, only provide
your information
to reputable
businesses, then
ensure that the
company's
website uses a
LEVERON H. LAVIA

Web address that


starts with "https"
and has a padlock
symbol either in
the address bar or
at the bottom of
the browser. This
means that the
site encrypts your
information,
making the data
nearly useless to
any thieves or
hackers who may
intercept the
transmission.
Tip 3: Choose strong and varied passwords
For most people, a password is the strongest
protection to ward off hackers and thieves,
and yet so many choose passwords that are
barely worth the time it takes to enter them.
When creating a password, always use a mix
of letters and numbers, and include a symbol
if the website allows it. While more difficult
to

remember, this will make your password


almost impossible to guess.
More importantly, you have to use different
EMPOWERMENT TECHNOLOGY

passwords for different websites. Think about


how often you use the same username and
password for many online

accounts. Hackers specifically target lowsecurity sites to gain access to large lists of
usernames and corresponding passwords,
knowing that many people use the same
combination of credentials for things like
online banking.
Tip 4: What is spyware? How do I stop it?
Spyware probably poses the biggest threat to
privacy and security on the Internet, yet so
few people really know what it is or how it
works. Put simply, spyware is any piece of
software that records your actions or
information without your knowledge. Some
spyware is fairly benign, tracking browsing
history and keeping the data it receives
anonymous, while other spyware is
specifically designed to get your online
banking credentials so thieves can clean out
your accounts.
Because it's almost impossible to avoid
spyware on your own, having anti-spware
and antivirus programs running on your
computer is a must.
Tip 5: It's not all about spyware and scams
With all this talk about spyware, hackers and
Internet security, it's important to remember
that most people with privacy issues on the
Internet put themselves in that position.
Think about social networking sites and just
how much personal information you have
posted there. If someone were trying to steal
your identity and needed your father's
middle name or where you went to
elementary school two commonly used
security questions you need to think about
how a thief could locate those facts. If you're
concerned about Internet privacy, you have
to consider staying away from social
networking sites, minimizing the information
you put out there, or maximizing privacy
settings on these sites.
Internet security - is a tree branch of
computer security specifically related to the
Internet, often involving browser security but
also network security on a more
LEVERON H. LAVIA

general level as it applies to other


applications or operating systems on a
whole. Its objective is to establish rules and
measures to use against attacks over the
Internet.The Internet represents an insecure
channel for exchanging information leading
to a high risk of intrusion or fraud, such as
phishing. Different methods have been used
to protect the transfer of data, including
encryption.

Online Etiquette
PLATFORMS
Social
SOCIAL
SEO
CMS
Online Safety Security Ethics Etiquette
Current State
Generally speaking, before planning can
begin, it is critical that an assessment take
place of the current state of the surrounding
environment. This is especially true when
planning for the implementation of
technology for an educational environment.
In this section we will review what
information a planner must collect and
understand with regards to the current state
of their institution's environment.
Elements to be considered when
documenting the current state of
technology:
1. History of technology planning or
initiative that led to current state:
when was the last plan developed,
what were the recent purchases,
recent initiative, former committee
members, technology leadership, or
any other related information relevant
to the history of technology planning
at the school or district.
2. Mission of educational technology
(implied or stated) at the school or
district level.
EMPOWERMENT TECHNOLOGY

3. Infrastructure elements - for each


section list the number deployed,
version, age, and primary use of each
element:
1. Internet
access
bandwidth, provider.

type,

2. Servers & services - include email, web, data, streaming,


faculty/student storage, and
any other servers or services in
place.
3. Network
equipment.

infrastructure

4. Other infrastructure elements


(power, phones, entry control,
surveillance cameras, etc.).
4. Hardware- for each section list the
number deployed, version, age, and
primary use of each

element:
1. Types of hardware currently
deployed:
computers,
projectors, cameras, iPods, etc.
2. Location of currently deployed
hardware: labs, in classrooms,
mobile
carts,
one-to-one
laptops, etc.

version, age, and primary use of each


element:
1. Administrative systems such as
grading systems, attendance,
records, class plans and other
related technology systems.
List current systems in place,
the related hardware base and
software versions and quantity
deployed.
7. Professional Development: Perhaps
the best way to describe the current
PD program is to answer a series of
questions. What is the intended
purpose of the school's PD? How is
the training conducted? How often is
it being done? Has it been evaluated?
If so, has it been tweaked over

time and proven effective? If it has


not been evaluated, why not? Does it
foster teacher collaboration and
reward experimentation? Has there
been
a
tangible
increase
in
technology use
within classroom instruction? Do the
teachers know where they can go to
get help? What do the teachers not
know yet that they should? All of
these questions should paint an
accurate picture of the program's
effectiveness as well as reveal some
areas that can be improved upon in
the future.

5. Software- for each section list the


number deployed, version, age, and
primary use of each element:
1. Number
and
versions
of
software currently deployed:
OS, Basic, productivity
2. Uses
of
current
software:
Educational, special software
6. Administrative Technology- for each
section list the number deployed,
LEVERON H. LAVIA

8. Nature of Classroom / Teacher /


Student use: this section is an
overview
of
how
the
current
technology is being used, how often it
is used, and how it's use is aligned
with
educational
strategies
and
teaching pedagogies.
EMPOWERMENT TECHNOLOGY

9. Technology Staffing / Support: It is


critically important to assess exactly
where your institution is in terms of
technology staff. If you find your
staff/support staff to be less than
what you need, it should be a top
priority when moving forward. Many
experts believe that the very first step
in developing a technology plan for a
school district is assembling a
technology planning committee that
should review the schools big-picture
learning goals already in place and
identify the districts needs.

LEVERON H. LAVIA

10.Relevant Policies: This section details


the relevant technology policies such
as replacement policy, usage policies,
security policies.
11.Technology Funding: Budget, grants,
e-rate, etc. - there is a separate
section in this book on budgeting this section is an overview of the
current funding amounts and process.
12.Summary of the current environment.

EMPOWERMENT TECHNOLOGY

Vous aimerez peut-être aussi