Thursday, December 11, 2008

Final post for Ethics and Technology Course

Taking this course has been an eye opener for me. I’ve become more aware to the dangers and seriousness of of the Internet and the crimes that can occur. I have already made some changes in the way that I use the Internet. As far and my professional life, I will share my newly gained knowledge with my third graders. I will also stop stealing things off the Internet (oops!) and inform my students of the same. I have really enjoyed taking this class. The books that were chosen we enjoyable and easy to read. I especially liked The Blue Nowhere.

Thanks Mr. Sanders!

Saturday, December 6, 2008

Childrens Safety on the Internet

I've been reading a lot about the safety of the Internet and keeping children protected. I think using a filtering system is a great way to avoid some of the inappropriate material that a child has no business look at. On the other hand, many times the filter also blocks sites that shouldn't be blocked. Reading the article Children's Safety on the Internet: A Resource Guide for Parents, they gave an example of looking up the word "breast". A filter will block all porn sights as well as sights that deal with breast cancer awareness or a recipe that calls for chicken breast.
There are pros and con's to using a filtering system. Although it may be a pain, I think the pros outweigh all of the con's when it comes to the safety of children.

http://www.privacyrights.org/fs/fs21a-childrensafety.htm

Employee Monitoring

I understand why a business would want to check on an employee's phone calls or emails if they suspected them of wrong doing. Other than that, why would a company spend money for someone to sift through someone else's business? It's almost if they're looking for something, trying to create problems. As long as their employee is getting their job done, not harassing anyone, who cares if every once in a while they make a personal phone call on company time? I'm sure their not costing the company as much as the people who sit at a computer all day looking and listening to what other people do.

Fact Sheet 7. Workplace Privacy
Employee Monitoring: Is There Privacy in the Workplace?
http://www.privacyrights.org/fs/fs7-work.htm

Tuesday, December 2, 2008

The Last chapters of Internet & Computer Ethics for Kids

Reading the last few chapters really summed up the book-cheating and lying are bad (even when you don't get caught). The police can't possibly monitor everything that happens on the Internet but it's best to use your best judgement and make decisions that you can live with. Educate yourself about the do's and don't of proper Internet usage and teach your children as well.

Sunday, November 16, 2008

Reducing Identity Fraud

I used to laugh when I would watch those silly Capital One commercials where there was an old man speaking in the voice of some young teenage girl who had just stolen his identity and bought numerous things. In reality, it's not funny at all. I've never really thought of what I would do or how I would handle that situation. I read an article called; Coping with Identity Theft: Reducing the Risk of Fraud. One thing I received from this article was the cation of using Debit cards (I use mine at least once a day-oops!) Although there is no defined way to keep thieves from your identity, there are many things to do to help lower the likelihood. I found this article very useful.

http://www.privacyrights.org/fs/fs17-it.htm

CIP

Further reading the article; Customer Identification Programs: Getting to Know You, I learned that banks must check your identification against names on a list of terrorist! Interesting. Due to the PATRIOT act, anytime you open a new financial account, you're background information is ran to insure that you aren't a terrorist or you're not laundering money to someone who is. Just a thought, if I were a terrorist and I was going to open up a new account I probably wouldn't use my real name!

http://www.privacyrights.org/fs/fs31-CIP.htm

Reducing Junk Mail

The first thing I do when I get to work every day is check my email. Just like sorting through my paper mail, my mailbox is full of useless junk that I trash immediately. It's not that big of a deal but it is a nuisance. I read an article titled: Anti-Spam Tips and Resources: Reducing the Flood of Junk E-Mail. This article explained how spammers get your email address, what the government is trying to do about it, and tips on what people can do to stop the junk mail. Although most of the tips I already do, such as not opening Spam mail or responding to it, but one thing I will try after reading the article is to use a secondary email verses my work email when signing up for things on the web.

http://www.privacyrights.org/fs/fs20-spam.htm

Sunday, November 9, 2008

Prevent Hacking

I read the article How to Prevent Hacking of your PC? by Jay HS. Jay says the key to keeping hackers off your computer is to install a anti-virus, firewall and anti-spyware solution. Another way to stay hacker free is to avoid strange emails and attachments from people or companies you don't know and visiting cracks, warez, and keygen websites. If your computer is acting strange, such as pop-up ads appearing, shutting down applications, slow or nonexistent Internet connections, chances are your computer is infected.

http://www.hotscams.com/articles/69/1/How-to-Prevent-Hacking-of-your-PC/Page1.html

Work at Home Scams

The article, Work at Home Scams-3 Ways to Avoid Being Their Next Victim by Alan Lim explains to readers how not to get taken. The first sign that company is a scam, there are spelling or grammatical errors on their website or emails. If the company request that you must pay ANY type of money-it is a scam! Also, if the company is not listed on the Better Business Bureau, it is a scam. Lastly, read the fine print. Look over every single detail that this business is offering. If there are any holes or things that look suspicious-don't do it.

http://www.hotscams.com/articles/2006/1/Work-at-Home-Scams--3-Ways-to-Avoid-Being-Their-Next-Victim/Page1.html

The Blue Nowhere part 2

This book is driving me crazy! I can't ever be sure of Gillette, can you trust him or not? Just when I think he's truly trying to help, something is uncovered to make me think is in with Shawn!

Thursday, November 6, 2008

Technology Brings False Promises to Schools

Author, Todd Oppenheimer says technology brings false promises to schools. I see where Oppenheimer is coming from but I have to disagree with many of the things he brings up in the article written at http://www.educationworld.com/a_issues/chat/chat097.shtml. Oppenheimer says that schools need to be careful when purchasing technology to ensure that it accomplishes the desired task. He also believes that using technology takes away from critical thinkers, reasoning and listening skills. Personally, I incorporate technology in my classroom as much as possible when it goes along with the skill I am trying to master. It is never my focus or my main sense of teaching. It is up to the professional to make the decision on how and when to use technology in the classroom and I think most would agree that learning must come from multiple modes.

Friday, October 31, 2008

The Blue Nowhere

I've been reading the novel The Blue Nowhere by Jeffrey Deaver and it's REALLY good. This suspense story about a murdering computer hacker is a page turner. I've had trouble putting it down at night! I'm no expert on computers but I wonder if the events in the book could really happen. We were to only have read half of the book but I cheated a little and am ready to read chapter 30. I don't want to give away too many details in case someone from class is reading this and is not as far along in the book as me but just as soon as I think I know what to expect or "who's" in on it-I turn out to be wrong! So many twist and turns-I'm ready to get to the end already.

Thursday, October 23, 2008

Green Team Discussion

I reviewed chapter 4 and this is what I came up with to start our conversations:

Who ever knew there were so many types of hackers and there are "good" hackers? When I hear the word hacker I think of some computer geek trying to steal things off computers. What type of hacker are you most likely to encounter in the school setting? Outside of school? Which area of hacking do you think we should target to raise awareness to our children/students?

Wednesday, October 22, 2008

Cyber Parent!

This evening I took an online quiz to find out what type of cyber parent I am. I received an A; and I'm considered a conversation starter! YEAH ME:) I have a eight year old step son who is very computer savvy. Right now he is into using the Internet to play games and look up music videos and cartoon characters. We've had many conversations about what happens if something inappropriate were to "pop" up and discussed what IS inappropriate! Our computer is located in the family room and he is only allowed on it when an adult is in the room with him. We're a pretty open family and often discuss the dangers on Internet usage. Working at a elementary school and seeing the capabilities of these young students; I feel that it is never too early to begin to train and warn kids of appropriate behaviors on the computer.

Tuesday, October 21, 2008

Who are you on the internet?

As a class assignment, I "googled" my name and phone number. My home phone number came up right away with a name and address, just like you might find in a phone book. When I tried my cell phone, I got a ton of websites that try to get you to spend money to look up information for you. What crazy person would really waist their money to get someones number? I don't see the point, unless your a stalker! As far as my name, Kelly Pearce, nothing to fancy. Apparently I share my name with a successful videographer, a boxer and a bunch of "interesting" people on facebook. The only thing I could find about myself was my name on the list of students who graduated at my college. Big WHOP!

Monday, October 20, 2008

Testing blog!

Just checking to make sure its working!