Six Ways to Protect Student Data and Prevent Cyberattacks
School administrators and IT staff can be super-vigilant, but the hackers are getting better and better at sneaking through security.
the most common cybersecurity threats, and how can school staff avoid them?
Eavesdropping / Man-in-the-Middle (MiTM) Attacks
What they are: It’s likely that you sometimes use a school laptop or mobile device to gain internet access via Wi-Fi networks in public places like coffee shops or airports. If so, be aware that there may be hackers eavesdropping to try and gain entry to any two-party exchange you make so they can filter and steal data.
How to avoid them: Always use a school-verified SIM card, dongle or VPN(virtual private network) to access the internet in public places.
Social Engineering Attacks
According to Verizon’s 2018 Breach Investigations report, 92 percent of malware is delivered via email, often referred to as social engineering attacks. The aim is to interact with the user and influence and manipulate their actions to gain access to systems and install harmful software. Malware uses various guises. Here are some of the most common:
1. Phishing emails
2. Baiting attacks
3. Quid pro quo requests
4. Pretexting attacks
5. Contact with a ‘compromised’ website
CALL FOR CHAPTER PROPOSALS
Proposal Submission Deadline: February 12, 2019
Leveraging Technology for the Improvement of School Safety and Student Wellbeing
A book edited by Dr. Stephanie Huffman, Dr. Stacey Loyless, Dr. Shelly Allbritton, and Dr. Charlotte Green (University of Central Arkansas)
Technology permeates all aspects of today’s school systems. An Internet search on technology in schools can generate millions of website results. The vast majority of these websites (well over 8,000,000 results for one simple search) focuses on advice, activities, and uses of technology in the classroom. Clearly teaching and learning with technology dominates the literature and conversations on how technology should or could be used in classroom settings. A search on school safety and technology can produce more than 3,000,000 results with many addressing technological tools such as video cameras, entry control devices, weapon detectors, and other such hardware. However, in recent times, cyberbullying appears to dominate the Internet conversations in references to school safety. With an increase in school violence in the past two decades, school safety is a fundamental concern in our nation’s schools. Policy makers, educators, parents, and students are seeking answers in how best to protect the physical, emotional, and social well-being of all children.
Objective of the Book
The proposed edited book covers the primary topic of P-12 school safety and the use of technology and technology used for fostering an environment in which all students can be academically successful and thrive as global citizens. School safety is defined as the physical, social, and emotional well-being of children. The book will comprise empirical, conceptual and case based (practical application) research that craft an overall understanding of the issues in creating a “safe” learning environment and the role technology can and should play; where a student’s well-being is valued and protected from external and internal entities, equitable access is treasured as a means for facilitating the growth of the whole student, and policy, practices, and procedures are implemented to build a foundation to transform the culture and climate of the school into an inclusive nurturing environment.
The target audience is leadership and education scholars, leadership practitioners, and technology coordinators. This book will be used as a collective body of work for the improvement of K-12 schools and as a tool for improving leadership and teacher preparation programs. School safety is a major concern for educators. Technology has played a role in creating unsafe environments for children; however it also is an avenue for addressing the challenges of school safety
Recommended topics include, but are not limited to, the following:
Section I – Digital Leadership
- Technology as a Climate and Cultural Transformation Tool
- School Leadership in the Digital Age: Building a Shared Vision for all Aspects of Learning and Teaching
- Ensuring Equity within a “One to One” Technology Framework
- Infrastructure within Communities
- Accessible WiFi for Low SES Students
- Developing Culturally Responsive Pedagogy
- Professional Development for School Leaders
Section II – Well Being
- Social Media and School Safety: Inputs and Outputs
- Tip lines: Crime, Bullying, Threats
- Communication and Transparency
- Platform for Social Justice
- Teaching Strategies to Promote Healthy Student Interactions in Cyberspace (Digital Citizenship?)
- Building Capacity and Efficacy, Platform to lower incidence of Cyber-Bullying, Boosting Instructional Engagement
- Literacy and Preparedness for the Influence and Consequence of Digital Media Marketing Campaigns directed toward Children, Adolescents, and Teens.
- Pioneering Innovative Technology Program in Curriculum: Fostering “Belonging” beyond Athletics & Arts.
Section III- Infrastructure Safety
- Campus/Facility Safety and Security
- Rural Schools vs. Urban Schools
- Digital A/V Systems
- Background Check – Visitor Registration (i.e. Raptor)
- Network Security Systems and Protocols
- User Filtering and Monitoring
- Appropriate use policies
- Digital Citizenship
- Web development policy
- Intellectual Property & Copyright
Section IV – Academic Success
- Professional Development for Classroom Teachers
- Pedagogical Integration of Technology
- Instructional Coaching for Student Engagement
- Increase Rigor with Technology
- Competence in the Blended/Hybrid/Flipped Classroom
- Technology to enhance learning for all
- Assistive Technology
- Accessibility issues
- Internet access for Low SES Students in the Blended/Hybrid/Flipped Classroom
- Personal Learning Design
- Differentiation for Student Efficacy
- Strategies for Increasing Depth of Knowledge
- Design Qualities for Enhanced Engagement
Researchers and practitioners are invited to submit on or before February 12, 2019, a chapter proposal of 1,000 to 2,000 words clearly explaining the purpose, methodology, and a brief summary findings of his or her proposed chapter. Authors will be notified by March 12, 2019 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by June 12, 2019, and all interested authors must consult the guidelines for manuscript submissions at http://www.igi-global.com/publish/contributor-resources/before-you-write/ prior to submission. See Edited Chapter Template. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.
Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Leveraging Technology for the Improvement of School Safety and Student Wellbeing. All manuscripts are accepted based on a double-blind peer review editorial process.
All proposals should be submitted through the eEditorial Discovery®TM online submission manager. USE THE FOLLOWING LINK TO SUBMIT YOUR PROPOSAL. https://www.igi-global.com/publish/call-for-papers/call-details/3709
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), an international academic publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. IGI Global specializes in publishing reference books, scholarly journals, and electronic databases featuring academic research on a variety of innovative topic areas including, but not limited to, education, social science, medicine and healthcare, business and management, information science and technology, engineering, public administration, library and information science, media and communication studies, and environmental science. For additional information regarding the publisher, please visit http://www.igi-global.com. This publication is anticipated to be released in 2020.
February 12, 2019: Proposal Submission Deadline
March 12, 2019: Notification of Acceptance
June 12, 2019: Full Chapter Submission
August 10, 2019: Review Results Returned
August 10, 2019: Final Acceptance Notification
September 7, 2019: Final Chapter Submission
Inquiries can be forwarded to
Dr. Stephanie Huffman
University of Central Arkansas
email@example.com or 501-450-5430
Selecting the Right Tech Solutions for Your Classroom
Integrating technology into your teaching practice can be intimidating. Where do you start? What tools do you choose? What are the questions you need to ask?
In Selecting the Right Tech Solutions for Your Classroom, you’ll get the guidance you need to thrive with edtech, whether you’re just dipping your toe in or rethinking a districtwide approach. Throughout the course, you’ll engage in online content, develop materials specific to your context and receive feedback from experts. The course culminates with a capstone project that can be used to communicate with stakeholders about your selected technology, your rationale for choosing it and how you’ll implement it.
This is a 15-hour, instructor-led course.
Winter session: February 5 – March 29, 2019
Storytelling with Data: An Introduction to Data Visualization
Mar 04 – Mar 31, 2019
Data visualization is about presenting data visually so we can explore and identify patterns in the data, analyze and make sense of those patterns, and communicate our findings. In this course, you will explore those key aspects of data visualization, and then focus on the theories, concepts, and skills related to communicating data in effective, engaging, and accessible ways.
This will be a hands-on, project-based course in which you will apply key data visualization strategies to various data sets to tell specific data stories using Microsoft Excel or Google Sheets. Practice data sets will be provided, or you can utilize your own data sets.
Week 1: Introduction and Tool Setup
Week 2: Cognitive Load and Pre-Attentive Attributes
Week 3: Selecting the Appropriate Visualization Type
Week 4: Data Stories and Context
Upon completion of this course, you will be able to create basic data visualizations that are effective, accessible, and engaging. In support of that primary objective, you will:
- Describe the benefits of data visualization for your professional situation
- Identify opportunities for using data visualization
- Apply visual cues (pre-attentive attributes) appropriately
- Select correct charts/graphs for your data story
- Use appropriate accessibility strategies for data tables
Basic knowledge of Microsoft Excel or Google Sheets is required to successfully complete this course. Resources will be included to help you with the basics should you need them, but time spent learning the tools is not included in the estimated time for completing this course.
What are the key takeaways from this course?
- The ability to explain how data visualization is connected to data analytics
- The ability to identify key data visualization theories
- Creating effective and engaging data visualizations
- Applying appropriate accessibility strategies to data visualizations
Who should take this course?
- Instructional designers, faculty, and higher education administrators who need to present data in effective, engaging, and accessible ways will benefit from taking this course
more on digital storytelling in this IMS blog
more on data visualization in this IMS blog
Other sessions for Dr. James Johnson’s classes:
other sessions for EDAD courses:
How do we search?
Academic Social Sites: http://blog.stcloudstate.edu/ims/2018/11/13/scsu-edad-scopus-vs-academia-vs-researchgate/
How do we work/collaborate? (digital literacy)
Zoom, Skype Pro, Google Hangouts, Adobe Connect
Zotero, Mendeley (Scopus), Refworks, Endnote
UDL (Universal Design for Learning): http://blog.stcloudstate.edu/ims?s=universal+design
Five Questions About Data Use for School Leaders
Anna Egalite, assistant professor of leadership and policy at NC State. Previously, Anna taught elementary school and did a postdoc at Harvard. She’ll be writing about education-leadership research—what we know, where we have good intuitions, and where we’re still very much in the dark.
It’s back-to-school time and education reporters are highlighting stories about how school leaders are “leaning on data” to promote student learning, making administrative decisions that are “supported by a data-driven process,” and drawing on their experience in “data-driven instruction.”
more on data use and ed leaders in this IMS blog
Schools are using AI to track what students write on their computers
Under the Children’s Internet Protection Act (CIPA), any US school that receives federal funding is required to have an internet-safety policy. As school-issued tablets and Chromebook laptops
become more commonplace, schools must install technological guardrails to keep their students safe. For some, this simply means blocking inappropriate websites. Others, however, have turned to software companies like Gaggle
, and GoGuardian
to surface potentially worrisome communications to school administrators
Over 50% of teachers say their schools are one-to-one (the industry term for assigning every student a device of their own), according to a 2017 survey
from Freckle Education
But even in an age of student suicides and school shootings, when do security precautions start to infringe on students’ freedoms?
When the Gaggle algorithm surfaces a word or phrase that may be of concern—like a mention of drugs or signs of cyberbullying—the “incident” gets sent to human reviewers before being passed on to the school. Using AI, the software is able to process thousands of student tweets, posts, and status updates to look for signs of harm.
SMPs help normalize surveillance from a young age. In the wake of the Cambridge Analytica scandal
at Facebook and other recent data breaches from companies like Equifax
, we have the opportunity to teach kids the importance of protecting their online data
in an age of increased school violence, bullying, and depression, schools have an obligation to protect their students. But the protection of kids’ personal information is also a matter of their safety
more on cybersecurity in this IMS blog
more on surveillance in this IMS blog
more on privacy in this IMS blog
Data Analytics a Key Skill for Administrators in K–12
A recent report highlights how data can open the door for K-12 school administrators to maximize student outcomes.
Report authors also call on state policymakers to help lead the charge for more literate school administrators. School and district administrators need to model and support effective data use at every level, including as part of classroom instruction
more on data analytics in education in this IMS blog