CYBERSECURITY, CYBERSAFETY AND THE K-12 COMPUTER SCIENCE NATIONAL STANDARDS

Size: px
Start display at page:

Download "CYBERSECURITY, CYBERSAFETY AND THE K-12 COMPUTER SCIENCE NATIONAL STANDARDS"

Transcription

1 CYBERSECURITY, CYBERSAFETY AND THE K-12 COMPUTER SCIENCE NATIONAL STANDARDS INTRODUCTION The invention of the computer in the 20 th century was a once in a millennium event, comparable in importance to the development of writing or the printing press. s have enormous impact on the way we live, think, and act. It is hard to overestimate their importance in the future. In fact, many believe that the true computer revolution will not happen until everyone can understand the technology well enough to use it in truly innovative ways. But as is often the case with new technologies, the increasing ubiquity of computers in our lives and in the systems that support and protect those lives comes with its own set of challenges. Our growing dependence on computing engenders a profound need to ensure that we know how to protect ourselves as users and how to ensure the security of the systems that protect our very lives. For these reasons, both cyber safety and cyber security are deeply embedded in the CSTA K 12 Science Standards. The academic discipline of Science spans a wide range of computing endeavors, from theoretical foundations to robotics, computer vision, intelligent systems, and bioinformatics. The work of computer scientists is concentrated in three areas: designing and implementing secure software, developing effective ways to solve computing problems, and devising new ways to use computers. In schools, computer science learning is a deeply scaffolded experience (as it is in all rigorous academic disciplines) and a great deal of work is required to ensure that, at each step, students learn and master the skills and concepts that form the knowledge foundations for their lives. Like a collage, assembled from a multitude of small, layered pieces, a comprehensive set of standards ensures that foundational knowledge leads to deeper knowledge and deeper knowledge leads to mastery, and all of this learning is ageappropriate and engaging. This document teases out the specific learning standards that address cyber safety and cyber security with the goal of making these standards more obvious for teachers and, at the same time, enabling the education community to create engaging opportunities to specifically address these standards as part of every student s school experience. THE ORGANIZATIONS OF THE CSTA STANDARDS The CSTA K 12 Science Standards are organized into three levels each containing discrete learning expectations. These standards are based on a model where each of the three levels represents a specific set of grades and courses. Level 1 provides the learning standards for students in Grades K 6, Level 2 provides the learning standards for students in Grades 6 9, and Level 3 provides the learning standards for 1

2 students in each of three discrete courses in grades The overall structure of this model is shown in Figure 1. Level 1 Grades K 6 Level 2 Grades 6 9 Level 3 Grades 9 12 Science and Me Science and Community Science in the Modern World Applying Concepts and Creating Real- World Solutions Science Concepts and Practices Topics in Science Within these standards, levels One ( Science and Me) and Two ( Science and Community) contain learning standards focusing primarily on cyber safety while level Three ( Science in the Modern World, Science Concepts and Practices, and Topics in Science) contain the learning standards focusing primarily on cyber security At each level, the standards are further organized by strand. The five complementary and essential strands throughout all three levels are: computational thinking; collaboration; computing practice; computers and communication devices; and community, global, and ethical impacts. These strands not only demonstrate the richness of computer science but also help organize the subject matter for students so that they can begin to perceive computer science as engaging and relevant to all academic field (especially STEM), and as more than a solitary pursuit. Cyber safety and cyber security learning objectives are located primarily in the following two strands: and Communications Devices (with its focus on the practice of good internet citizenship), Community, Global, and Ethical Impacts (with its emphasis on the ethical use of computers and networks and the principles of personal privacy, network security, software licenses, and copyright), and Computing Practice & Programming (with its focus on developing secure systems). 2

3 CYBER SAFETY AND CYBER SECURITY IN THE CSTA STANDARDS This section points to the specific standards that relate to cyber safety and cyber security at each level and within the relevant strands. The specific standards are listed along with their strand and level codes to make them easier to find within the main standards document and the strand and level charts included at the end of that document. For ease of identification, cyber safety standards appear in purple text and cyber security standards in green text. Level 1: Science and Me s and Communications Devices (CD) Grades 3 6 (L1:6.CD) Understand the pervasiveness of computers and computing in daily life (e.g., voice mail, downloading videos and audio files, microwave ovens, thermostats, wireless Internet, mobile computing devices, GPS systems, etc.). Identify that information is coming to the computer from many sources over a network. Grades K 3 (L1:3.CI) Practice responsible digital citizenship (legal and ethical behaviors) in the use of technology systems and software. Identify positive and negative social and ethical behaviors for using technology. Grades 3 6 (L1:6.CI) Discuss basic issues related to responsible use of technology and information, and the consequences of inappropriate use. Identify the impact of technology (e.g., social networking, cyber-bullying, mobile computing and communication, web technologies, cyber security, and virtualization) on personal life and society. Evaluate the accuracy, relevance, appropriateness, comprehensiveness, and biases that occur in electronic information sources. Understand ethical issues that relate to computers and networks (e.g., equity of access, security, privacy, copyright, and intellectual property). Level Two: Science and Community Computing Practice & Programming (CPP) Demonstrate good practices in personal information security, using passwords, encryption, and secure transactions. 3

4 Exhibit legal and ethical behaviors when using information and technology and discuss the consequences of misuse. Describe ethical issues that relate to computers and networks (e.g., security, privacy, ownership, and information sharing). Level Three: Science in the Modern World Computing Practice and Programming (CPP) Use various debugging and testing methods to ensure program correctness (e.g., test cases, unit testing, white box, black box, integration testing) Explain the principles of security by examining encryption, cryptography, and authentication techniques. Describe strategies for determining the reliability of information found on the Internet. Describe how different kinds of software licenses can be used to share and protect intellectual property. Discuss the social and economic implications associated with hacking and software piracy. Describe security and privacy issues that relate to computer networks. Level Three: Science Concepts and Practices Computing Practice and Programming (CPP) Explore principles of system design in scaling, efficiency, and security. Deploy principles of security by implementing encryption and authentication strategies. Analyze the beneficial and harmful effects of computing innovations. Identify laws and regulations that impact the development and use of software. Analyze the impact of government regulation on privacy and security. Level Three: Topics in Science This section of the CSTA K 12 Science Standards does not provide specific learning standards, but rather, suggests a number of possible topics courses for students who have completed the Level 1 and Level 2 courses and possibly the Level 3A course as well. These are intended to be project-based courses that can be either a half-year or fullyear courses or courses leading to industry certification (such as Quick Security+). Many teachers are now developing their own experimental cyber security courses. This is both a good thing and a cause for concern. To ensure that student learning is conceptually 4

5 appropriate, effectively scafolded, and adequately assessed, it is essential that these new courses be grounded in standards. CONCLUSION This document identifies the specific learning outcomes in the CSTA K 12 Science Standards that include specific cyber safety and cyber security learning content. It is hoped that this information will prove useful for educators developing discrete modules that can be inserted into existing courses, developing special topics courses, or simply ensuring that all students are adequately covering these critical concepts. Beyond the standards, the computer science education community must also begin to grapple with the pressing issue of helping students to understand the rich opportunities that the field of cyber security offers. If we are to begin addressing the critical pipeline shortage in this field, we must have homegrown experts, and to achieve this, we must help students understand that a career in cyber security offers an extraordinary opportunity for them to save the world with their minds. To achieve this goal, we must begin in elementary school where students are first beginning to find their explore the world beyond themselves and continue in middle school and high school as they plan their futures. CSTA is committed to working with a the broad community of educators and stakeholders to achieve these goals. CONTACT For more information on our cyber safety and cyber security projects or on CSTA in general, please contact: Chris Stephenson CSTA Executive Director 5

CS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014)

CS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014) CS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014) CSTA Website Oracle Website Oracle Contact http://csta.acm.org/curriculum/sub/k12standards.html https://academy.oracle.com/oa-web-introcs-curriculum.html

More information

Computer Technology Standards of Learning for Virginia s Public Schools

Computer Technology Standards of Learning for Virginia s Public Schools Computer Technology Standards of Learning for Virginia s Public Schools February 2013 Board of Education Commonwealth of Virginia Introduction As the new century has unfolded, various studies have postulated

More information

Describe the process of parallelization as it relates to problem solving.

Describe the process of parallelization as it relates to problem solving. Level 2 (recommended for grades 6 9) Computer Science and Community Middle school/junior high school students begin using computational thinking as a problem-solving tool. They begin to appreciate the

More information

Educational Technology Standard Articulated by Grade Level. Pre-K to 6 th Grade

Educational Technology Standard Articulated by Grade Level. Pre-K to 6 th Grade Pre-K to 6 th Grade Arizona Department of Education Educational Technology Division Approved 5.18.2009 Strand 1: Creativity and Innovation 2 Strand 1: Creativity and Innovation Concept 1: Knowledge and

More information

Combined Curriculum Document Technology High School

Combined Curriculum Document Technology High School Big Idea: Information, Communication and Productivity High School Students demonstrate a sound understanding of the nature and operations of technology systems. Students use technology to learn, to communicate,

More information

Competencies for Secondary Teachers: Computer Science, Grades 4-12

Competencies for Secondary Teachers: Computer Science, Grades 4-12 1. Computational Thinking CSTA: Comp. Thinking 1.1 The ability to use the basic steps in algorithmic problemsolving to design solutions (e.g., problem statement and exploration, examination of sample instances,

More information

INNOVATION CONFIGURATION. Computer Science 2014-2016

INNOVATION CONFIGURATION. Computer Science 2014-2016 INNOVATION CONFIGURATION Computer Science 2014-2016 SLT Member: Brian Kingsley, Dr. Elisa Calabrese OWNER OF INITIATIVE: Christine Semisch and Guy Barmoha CONTACT/COORDINATOR OF INITIATIVE: Lisa Milenkovic,

More information

Technology Curriculum Draft Grades 6-8

Technology Curriculum Draft Grades 6-8 Tichenor Middle School Curriculum Technology Curriculum Technology Big Idea: Big Idea: Information, Communication and Productivity Students demonstrate a sound understanding of the nature and operations

More information

Students will know and be able to: 1.1. Basic Operations

Students will know and be able to: 1.1. Basic Operations Information Technology Grades 9-10 Basic Operations, Concepts, and Productivity Tools Basic Operations Word Processing Database Spreadsheet Identify the platform, version, properties, function, and interoperability

More information

2014 New Jersey Core Curriculum Content Standards - Technology

2014 New Jersey Core Curriculum Content Standards - Technology 2014 New Jersey Core Curriculum Content s - Technology Content Area Grade Content Statement Students will: Technology A. Technology Operations and Concepts: Students demonstrate a sound understanding of

More information

Massachusetts Technology Literacy Standards

Massachusetts Technology Literacy Standards Massachusetts Technology Literacy Standards The Massachusetts Technology Literacy Standards incorporate the Information and Communication Technology (ICT) Literacy skills developed by the Partnership for

More information

Information Technology Grades 11-12. Students will know and be able to: Basic Operations 1.1 (I)

Information Technology Grades 11-12. Students will know and be able to: Basic Operations 1.1 (I) Information Technology Grades 11-12 Basic Operations, Concepts, and Productivity Tools Basic Operations Word Processing Database Students will know and be able to: Identify the platform, version, properties,

More information

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE The School Board provides technologies, including the internet, to promote educational excellence by facilitating resource sharing, innovation and communication.

More information

Course Overview and Outline

Course Overview and Outline Course Overview and Outline The My Digital Life curriculum is comprised of seven modules that cover key concepts for building digital literacy. Each module contains between three and nine brief activities

More information

i-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5

i-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5 i-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5 Scope of curriculum i-safe materials are available in topic modules to provide the teacher with flexibility in creating a program of instruction

More information

SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY

SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY Date Approved: 4/16/2015 New technologies are modifying the way in which information may be accessed, communicated and transferred. Those changes

More information

Cyber-safety, Cyber-security, Cyber-ethics, (C3) Digital Literacy Skills

Cyber-safety, Cyber-security, Cyber-ethics, (C3) Digital Literacy Skills A Companion to the Augmented Technology Literacy Standards for Students INTRODUCTION The ikeepsafe Digital Citizenship C3 Matrix is designed to assist educators in integrating the concepts of cyber-safety,

More information

CORE Education s Ten Trends matrix 2013

CORE Education s Ten Trends matrix 2013 CORE Education s Ten Trends matrix 2013 Trend (in correct order) Explanation Drivers Impact (e.g.) Implications 1. Personalisation There is a growing awareness that one- size- fits- all approaches to school

More information

The State of K-12 Cyberethics, Cybersafety and Cybersecurity Curriculum in the United States

The State of K-12 Cyberethics, Cybersafety and Cybersecurity Curriculum in the United States The State of K-12 Cyberethics, Cybersafety and Cybersecurity Curriculum in the United States National Cyber Security Alliance Microsoft Corporation Zogby/463 May 2011 Methodology Zogby/463 surveyed a statistically

More information

North Carolina Professional Technology Facilitator Standards

North Carolina Professional Technology Facilitator Standards North Carolina Professional Technology Facilitator Standards Every public school student will graduate from high school, globally competitive for work and postsecondary education and prepared for life

More information

Q. Will the school district provide minimum or strongly recommended minimum software requirements for the devices? A.

Q. Will the school district provide minimum or strongly recommended minimum software requirements for the devices? A. Questions (Q) & Answers (A) from AVIATOR Launch Presentations We have categorized the questions we received and combined those that were duplicates. Please see Parent Guidebook for answers to most Frequently

More information

Wethersfield Public Schools Course Outline

Wethersfield Public Schools Course Outline Wethersfield Public Schools Course Outline Course Name: Technology and Engineering Education, Grade 8 Department: Technology and Engineering Education Grade(s): 8 Level(s): Unleveled Course Number(s):

More information

i-safe K 12 CURRICULUM SCOPE 06-07

i-safe K 12 CURRICULUM SCOPE 06-07 i-safe K 12 CURRICULUM SCOPE 06-07 GRADES K 4 Scope and sequence i-safe materials are available in topic modules to provide the teacher with flexibility in creating a program of instruction that best suits

More information

Maryland Technology Literacy Standards for Students

Maryland Technology Literacy Standards for Students Standard 1.0 Technology Systems: Develop foundations in the understanding and uses of technology systems Pre-kindergarten Kindergarten Grade 1 Grade 2 Grade 3 A. Systems A. Systems A. Systems A. Systems

More information

EMS BYOD Pilot--Frequently Asked Questions

EMS BYOD Pilot--Frequently Asked Questions EMS BYOD Pilot--Frequently Asked Questions How will EMS handle inappropriate use of, damaged, or lost devices by students? Device security is a common concern of parents nation-wide as schools embark on

More information

Teaching Digital Citizenship

Teaching Digital Citizenship 32 Government of Newfoundland and Labrador - Education I A School-Wide Approach - Positive Behaviour Supports 2013 Education Teaching Digital Citizenship Digital citizenship can be defined as the norms

More information

COLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) USE OF COMPUTERS, COMPUTER NETWORKS, AND INTERNET SERVICES POLICY

COLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) USE OF COMPUTERS, COMPUTER NETWORKS, AND INTERNET SERVICES POLICY 1 The COLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) a consortium of the Colusa County Office of Education (CCOE) with Colusa Unified School District, Maxwell Unified School District, Williams Unified School

More information

North Carolina School Library Media Coordinators Standards

North Carolina School Library Media Coordinators Standards North Carolina School Library Media Coordinators Standards Every public school student will graduate from high school, globally competitive for work and postsecondary education and prepared for life in

More information

POLICIES AND REGULATIONS Policy #78

POLICIES AND REGULATIONS Policy #78 Peel District School Board POLICIES AND REGULATIONS Policy #78 DIGITAL CITIZENSHIP Digital Citizenship Digital citizenship is defined as the norms of responsible behaviour related to the appropriate use

More information

Elementary and Middle School Technology Curriculum Guidelines

Elementary and Middle School Technology Curriculum Guidelines Elementary and Middle School Technology Curriculum Guidelines Catholic Schools Office Diocese of Erie March, 2007 PHILOSOPHY STATEMENT... 1 TECHNOLOGY CURRICULUM FOUNDATION... 1 TECHNOLOGY FOUNDATION STANDARDS

More information

INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures

INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures Purpose The purpose of the ACH Network Acceptable Use Procedures is to provide the procedures, rules, guidelines,

More information

Chariho Regional School District. Technology Education Curriculum. Grades K-8

Chariho Regional School District. Technology Education Curriculum. Grades K-8 Chariho Regional School District Technology Education Curriculum Grades K-8 March 13, 2012 Chariho Regional School District Technology Education Curriculum Grades K - 8 Table of Contents Page Section One

More information

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating

More information

Cyber Strong Schools Project. Summary Report

Cyber Strong Schools Project. Summary Report Cyber Strong Schools Project Summary Report October 25, 2013 Cyber Strong Schools Project Summary This project summary describes a three phase study inclusive of students, staff, and stakeholders from

More information

National Standards for Quality Online Teaching

National Standards for Quality Online Teaching National Standards for Quality Online Teaching National Standards for Quality Online Teaching Introduction The mission of the North American Council for Online Learning (NACOL) is to increase educational

More information

There is much confusion today when attempting to understand the differences

There is much confusion today when attempting to understand the differences Clarifying Misconceptions between Technology Education and Educational Technology Only you will assume the responsibility to educate others about the importance of technology education in schools today.

More information

GREENWICH PUBLIC SCHOOLS Greenwich, Connecticut

GREENWICH PUBLIC SCHOOLS Greenwich, Connecticut Policy E-040 Effective Learning Environment GREENWICH PUBLIC SCHOOLS Greenwich, Connecticut Procedure E-040.4 - Acceptable Use and Internet Safety Agreement Acceptable Technology Use Regulations/Internet

More information

Standards for Quality Online Teaching

Standards for Quality Online Teaching Standard 1 Standards for Quality Online Teaching The teacher plans, designs and incorporates strategies to encourage active learning, interaction, participation and collaboration in the online environment.

More information

NJ Department of Education Office of Educational Technology Digital Learning NJ (DLNJ)

NJ Department of Education Office of Educational Technology Digital Learning NJ (DLNJ) 8.1 Educational Technology: All students will use digital tools to access, manage, evaluate, and synthesize information in order to solve problems individually and collaborate to create and communicate

More information

Computer Network System Acceptable Use Policy

Computer Network System Acceptable Use Policy 366 Computer Network System Acceptable Use Policy The Waupun Area School District is committed to increasing access to learning opportunities through technology tools and resources. The District s goal

More information

A partner school of K 12, the leader in K 12 online education

A partner school of K 12, the leader in K 12 online education A partner school of K 12, the leader in K 12 online education Welcome Dear Tri Cities Area families, Three Rivers Homelink is a public school using an innovative model to provide your child with the best

More information

COMPUTER NETWORK AND INTERNET ACCEPTABLE USE FOR STUDENTS AND STAFF

COMPUTER NETWORK AND INTERNET ACCEPTABLE USE FOR STUDENTS AND STAFF 4526 COMPUTER NETWORK AND INTERNET ACCEPTABLE USE FOR STUDENTS AND STAFF Philosophy: It is the philosophy of the Great Neck Public Schools that the integration of technology with the curriculum is an essential

More information

ELE 400 Chapter 1: Introduction to Professional Practice

ELE 400 Chapter 1: Introduction to Professional Practice ELE 400 Chapter 1: Introduction to Professional Practice It is useful to begin a discussion on the subject of professional practice with a definition of the word profession. When meeting someone for the

More information

Office of the Superintendent of Schools MONTGOMERY COUNTY PUBLIC SCHOOLS Rockville, Maryland. May 30, 2013

Office of the Superintendent of Schools MONTGOMERY COUNTY PUBLIC SCHOOLS Rockville, Maryland. May 30, 2013 DISCUSSION 5.0 Office of the Superintendent of Schools MONTGOMERY COUNTY PUBLIC SCHOOLS Rockville, Maryland May 30, 2013 MEMORANDUM To: From: Subject: Members of the Board of Education Joshua P. Starr,

More information

6-8 Technology Education Program Evaluation. Board of Education Program Report December 10, 2013

6-8 Technology Education Program Evaluation. Board of Education Program Report December 10, 2013 6-8 Technology Education Program Evaluation Board of Education Program Report December 10, 2013 2 Grades 5-8 Part 100 Requirements Technology education means a program of instruction designed to assist

More information

Pride Academy Charter School

Pride Academy Charter School 2010-2011 Computer and Internet Use Policy For Staff and Students General Computer and Network Use Pride Academy believes that the use of technology and computer-assisted communications is vital to our

More information

Years 3-7 Acceptable Use Policy & Agreement

Years 3-7 Acceptable Use Policy & Agreement Years 3-7 Acceptable Use Policy & Agreement Reidy Park Primary School is committed to enhancing teaching and learning through the safe use of information and communication technologies (ICTs). We require

More information

The Climate of College: Planning for Your Future

The Climate of College: Planning for Your Future TCCRI College Readiness Assignments The Climate of College: Planning for Your Future Overview Description This activity challenges students to think about life after high school: Where do they hope to

More information

K-12 Information and Digital Literacy

K-12 Information and Digital Literacy K-12 Information Digital Literacy K-12 Information Digital Literacy It is the goal of the educators of the Burlington Public Schools to foster a dynamic learning environment that promotes engagement, relevant

More information

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important

More information

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers.

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers. National Unit specification General information Unit code: H9HY 45 Superclass: CC Publication date: September 2015 Source: Scottish Qualifications Authority Version: 02 Unit purpose The purpose of this

More information

BC s Digital Literacy Framework (DRAFT)

BC s Digital Literacy Framework (DRAFT) BC s Digital Literacy Framework (DRAFT) Using standards-based techniques, a collaborative teaching environment enriched through creative integration of technology tools takes learning beyond standardized

More information

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law. OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance

More information

The National Educational Technology Standards. (Upon which our local standards are based)

The National Educational Technology Standards. (Upon which our local standards are based) The National Educational Standards (Upon which our local standards are based) Students demonstrate a sound understanding of the nature and operation of technology systems. Students are proficient in the

More information

Information Literacy and Information Technology Literacy: New Components in the Curriculum for a Digital Culture

Information Literacy and Information Technology Literacy: New Components in the Curriculum for a Digital Culture Information Literacy and Information Technology Literacy: New Components in the Curriculum for a Digital Culture Clifford Lynch Coalition for Networked Information clifford@cni.org February 21, 1998 Introduction

More information

Student & Staff Access and Use of Networked Information Resources and Communications

Student & Staff Access and Use of Networked Information Resources and Communications Page 1 of 6 These procedures are written to support the Electronic Resources Policy of the board of directors and to promote positive and effective digital citizenship among students and staff. Digital

More information

Clarifying Misconceptions. between technology education. and Educational Technology

Clarifying Misconceptions. between technology education. and Educational Technology Clarifying Misconceptions between Technology Education and Educational Technology Only you will assume the responsibility to educate others about the importance of technology education in schools today.

More information

NIST Cybersecurity Framework Manufacturing Implementation

NIST Cybersecurity Framework Manufacturing Implementation NIST Cybersecurity Framework Manufacturing Implementation Keith Stouffer Project Leader, Cybersecurity for Smart Manufacturing Systems Engineering Lab, NIST Manufacturing Cybersecurity Research at NIST

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the

More information

COMPUTER SCIENCE (5651) Test at a Glance

COMPUTER SCIENCE (5651) Test at a Glance COMPUTER SCIENCE (5651) Test at a Glance Test Name Computer Science Test Code 5651 Time Number of Questions Test Delivery 3 hours 100 selected-response questions Computer delivered Content Categories Approximate

More information

SCHOOL E-SAFETY SELF REVIEW TOOL

SCHOOL E-SAFETY SELF REVIEW TOOL SCHOOL E-SAFETY SELF REVIEW TOOL The South West Grid for Learning, Belvedere House, Woodwater Park, Pynes Hill, Exeter, Devon, UK, EX2 5WS. Tel: 0845 601 3203 Fax: 01392 366 494 Email: esafety@swgfl.org.uk

More information

Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016

Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016 Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016 1.0 Introduction St. Thomas Aquinas Catholic School recognizes that access to technology in school gives

More information

Information Technology Career Cluster Digital Design Course Number: 11.45100. Course Standard 1

Information Technology Career Cluster Digital Design Course Number: 11.45100. Course Standard 1 Information Technology Career Cluster Digital Design Course Number: 11.45100 Course Description: Using web design as the platform for product design and presentation, students will create and learn digital

More information

What is Educational Technology?

What is Educational Technology? What is Educational Technology? Dr. Marshall G. Jones What is Ed Tech? 1 What this class is about Technology and Active Participatory Learning What is Ed Tech? 2 New Attitudes; New Realities What is Ed

More information

360 Degree Safe Cymru SELF REVIEW TOOL

360 Degree Safe Cymru SELF REVIEW TOOL 360 Degree Safe Cymru SELF REVIEW TOOL UPDATED OCTOBER 2014 The South West Grid for Learning Trust, Belvedere House, Woodwater Park, Pynes Hill, Exeter, EX2 5WS. Tel: 0845 601 3203 Email: enquiries@swgfl.org.uk

More information

Parent / Guardian Consent for Technology Use in Schools

Parent / Guardian Consent for Technology Use in Schools Parent / Guardian Consent for Technology Use in Schools Our school uses computers and other mobile devices in the classroom to help increase student motivation and achievement. We will use laptop sets,

More information

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using

More information

Bring Your Own Device (BYOD) Acceptable Use Agreement 2015

Bring Your Own Device (BYOD) Acceptable Use Agreement 2015 Monivae College Bring Your Own Device (BYOD) Acceptable Use Agreement 2015 This agreement is applicable to all: 1. students in Years 7, 8, 9, 10 and 11 using their own device to access the College network

More information

Educators' Guide Intel Security Digital Safety Program: Think Before You Link Module 1: Cybersafety

Educators' Guide Intel Security Digital Safety Program: Think Before You Link Module 1: Cybersafety Educators' Guide Intel Security Digital Safety Program: Think Before You Link Module 1: Cybersafety The Intel Security Digital Safety Program: Think Before You Link is an interactive digital-safety program

More information

Responsible Use of Technology

Responsible Use of Technology Responsible Use of Technology Table of Contents Responsible Use of Technology... 1 Responsible Use of Technology (RUT)... 3 Device Security... 4 Computer Security:... 4 Filtering Software:... 4 Privacy...

More information

Idaho K 12 Content Standards for Computer Science

Idaho K 12 Content Standards for Computer Science The Computer Science standards build upon frameworks developed by professional organizations, educators, and industry. In particular, they build upon the 2016 draft standards put out by CSTA (Computer

More information

HS Web Design Business and Technology

HS Web Design Business and Technology Scope And Sequence Timeframe Unit Instructional Topics Course Description Web Design students will learn how to create and maintain web pages using the prevailing techniques and software. Students will

More information

Acceptable Use of Electronic Networked Resources & Internet Safety

Acceptable Use of Electronic Networked Resources & Internet Safety PROCEDURES AND GUIDELINES Acceptable Use of Electronic Networked Resources & Internet Safety Arlington Public Schools (APS) expects all users to access the Internet and other electronic networked resources

More information

Adopted on May 14, 2010

Adopted on May 14, 2010 Nevada Computer and Technology Standards Classroom Technology Integration for the 21 st Century 2010 Adopted on May 14, 2010 Nevada Department of Education 700 East Fifth Street Carson City, NV 89701 www.doe.nv.gov

More information

School Policy Regarding Computer Use, Technology and Internet Access

School Policy Regarding Computer Use, Technology and Internet Access School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school

More information

Programme Specification. 1. Advanced Computer Science (ACS)

Programme Specification. 1. Advanced Computer Science (ACS) Programme Specification Advanced Computer Science Internet Computing and Network Security Visual Systems and Technology Information Technology International Computing for the Internet Academic Year: 2013/14

More information

BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary

BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME Executive Summary In support of National Cyber Security Awareness Month (October), ESET and the National Cyber Security Alliance (NCSA) commissioned

More information

ISTE Technology Student Teaching Assessment

ISTE Technology Student Teaching Assessment ISTE Technology Student Teaching Assessment Levels/Criteria Teachers use their knowledge of subject matter, teaching and, and technology to facilitate experiences that advance, creativity, and innovation

More information

Please review these materials carefully with your child before signing the required application form.

Please review these materials carefully with your child before signing the required application form. LOVELAND CITY SCHOOL DISTRICT Technology and Computer Use Dear Parents/Guardians: Each year, the Loveland City School District requires parents and their students to re-apply for authorization to utilize

More information

Howard County Public School System Educational Technology. Essential Curriculum Grades 9-12

Howard County Public School System Educational Technology. Essential Curriculum Grades 9-12 Howard County Public School System Educational Technology DRAFT Essential Curriculum Grades 9-12 Goal 1: The students at all grade levels 9-12 will demonstrate the ability to explain basic technology operations

More information

Course: Digital Graphics (Grades 10 12 )

Course: Digital Graphics (Grades 10 12 ) Course: Digital Graphics (Grades 10 12 ) Strand Theories and Principles proficiency in the use an the concepts underlying hardware, ethics and safety home, in school, and in Pathway standards: Media and

More information

K-20 Network Acceptable Use Guidelines/Internet Safety Requirements

K-20 Network Acceptable Use Guidelines/Internet Safety Requirements Page 1 of 5 K-20 Network Acceptable Use Guidelines/Internet Safety Requirements These procedures are written to support the Electronic Resources Policy of the board of directors and to promote positive

More information

YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org

YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org CYBER SAFETY, CYBER ETHICS, CYBER SECURITY How to teach the kids about these concepts (a primer from staysafeonline.org program that is available free from the website) YOUR PRESENTERS Maryly Skallos Technology

More information

NETS for Students: Achievement Rubric

NETS for Students: Achievement Rubric NETS for Students: Achievement Rubric DRAFT (March 22, 2005) Purpose: This draft version of the NETS for Students: Achievement Rubric is available online for educational technology professionals to review

More information

Revisioning Graduate Teacher Education in North Carolina Master of Arts in Elementary Education Appalachian State University

Revisioning Graduate Teacher Education in North Carolina Master of Arts in Elementary Education Appalachian State University Revisioning Graduate Teacher Education in North Carolina Master of Arts in Elementary Education Appalachian State University A. A description of how the proposed program has been revisioned to reflect

More information

District Technology Guidelines. for Students and Parents/Guardians, updated for 2015-16

District Technology Guidelines. for Students and Parents/Guardians, updated for 2015-16 District Technology Guidelines for Students and Parents/Guardians, updated for 2015-16 Table of Contents Topic Page Forward... 1 Technology Guidelines... 1 Overview... 1 Acceptable Use... 1 Prohibited

More information

ACCEPTABLE USE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY

ACCEPTABLE USE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY Please Note: This is the Eastern School District policy in its entirety. Not all regulations are relevant to a K-6 school. Policy Statement ACCEPTABLE USE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY All

More information

BOARD OF EDUCATION POLICY

BOARD OF EDUCATION POLICY BOARD OF EDUCATION POLICY IFBGE Internet Safety 7/1/13 It is the policy of the Cobb County School District (District) to: (a) prevent user access over its computer network to, or transmission of inappropriate

More information

Testimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the

Testimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the Testimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the U. S. Senate Committee on Commerce, Science, and Transportation Subcommittee

More information

Technology Curriculum Kindergarten Gwinn Area Community Schools

Technology Curriculum Kindergarten Gwinn Area Community Schools Technology Curriculum Kindergarten Gwinn Area Community Schools * Standards are to be introduced. All other standards are to be reinforced or applied. 1. Basic Operations and Concepts a. Students demonstrate

More information

Industrial Control Systems Security Guide

Industrial Control Systems Security Guide Industrial Control Systems Security Guide Keith Stouffer, Engineering Lab National Institute of Standards and Technology NIST SP 800-82, Rev 2 and ICS Cybersecurity Testbed Keith Stouffer Project Leader,

More information

POLICY TITLE: Computer and Network Service: POLICY NO: 698 POLICY TITLE: Acceptable Internet Use Policy PAGE 1 of 5

POLICY TITLE: Computer and Network Service: POLICY NO: 698 POLICY TITLE: Acceptable Internet Use Policy PAGE 1 of 5 POLICY TITLE: Acceptable Internet Use Policy PAGE 1 of 5 An account on the Emmett School District computer network and subsequently, access to the Internet, is provided for all students, unless otherwise

More information

21st Century Learning and Technology

21st Century Learning and Technology Policy No. 7.3 21st Century Learning and Technology Date Approved: Oct. 2013 Projected Review Date: Oct. 2017 PURPOSE: Hamilton-Wentworth District School Board (HWDSB) is committed to promoting 21st century

More information

Haddon Township School District Acceptable Use of Information and Communication Technology for Students

Haddon Township School District Acceptable Use of Information and Communication Technology for Students Haddon Township School District Acceptable Use of Information and Communication Technology for Students Please read the following carefully before signing the Acceptable Use Policy for Students Agreement.

More information

GENERATION SAFE 360 SELF ASSESSMENT: PRINTABLE VERSION. Page 1

GENERATION SAFE 360 SELF ASSESSMENT: PRINTABLE VERSION. Page 1 Page 1 Contents 1. Introduction 2. How to use the 360 Self Assessment 3. Links to documents and resources 4. Acknowledgements 5. 360 Self Assessment 6. Report Sheet Introduction The development and expansion

More information

Policies Concerning the use of Computers

Policies Concerning the use of Computers Policies Concerning the use of Computers Shrewsbury School s Policies Concerning the use of Computers The Director of IT is responsible for the formulation and review of policies affecting the use of computers

More information

Maumee City School District Bylaws & Policies

Maumee City School District Bylaws & Policies Maumee City School District Bylaws & Policies 5136 - RESPONSIBLE USE POLICY FOR TECHNOLOGY AND NETWORK USE Technology tools and resources profoundly influence education, the work place, and everyday life.

More information

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document

More information