Examples of security breaches, stories in the news and direct applications in schools of security and internet use are discussed.
1. Discuss Internet security and how you would use it in your classroom to protect the students from Internet predators and inappropriate material. 2. Explain proper copyright and student use agreements that could be used in any K-12 classroom. 3. Discuss three ethical practices of technology uses and explain their impo