Discussion:Syllabus e-safety
Discussions
Here is the place to make comments on the Syllabus.
Todo list
- Focus map
- Define number of chapters
- Organise Items and Notions
- Find Quiz
- Discuss about chapter 4 --Rémi LEVY 7 juin 2011 à 09:04 (UTC)
- Give the rights on Mindomo --Rémi LEVY 7 juin 2011 à 09:18 (UTC)
General considerations
- One should avoid the term virtual since it deludes into thinking that things are not real. Electronic or online should be preferred
Discussed on Thursday 16th skype meeting
[16/06/2011 11:04:49] Antje Moebus : Internet use of minors - Risks and opportunities - Recommendations for peadagogues, educators and parents
4.1 Understand the impact of communication with minors about safety in IT world 4.2 Be able to develop policies and applicate methods for minor´s use of the computer and the internet ( depending on age and on the responsibility for the minor ( school, public institution, family) 4.3 Understand the purpose of monitoring, filtering and controlling tools for safer internet use of minors 4.4 Understanding advantages and limitations with protection software
[16/06/2011 10:53:12] Algis M.: how computer user could switch on/off integrated protection? it is administrator's job
teachers are not pc administrators, teacher must know the fact but not technics
[16/06/2011 11:17:59] Algis M.: 4.3. Be aware of different ways to control usage of social networking and other web sites. "block" -> "control"
[16/06/2011 11:28:52] Algis M.: In my oppinion, it is not necessary to make Chapter 5 such particular. Every knowledge in details could be put in Syllabus Guide that have to be prepared later. It is no need to include everything in the Syllabus, - it’s enough topics be more common or connected together.
About Items
Other contributions
- Understand what are the good conditions for using online medias at home: computer in a common area (not in the child's room), clear time and circumstances for using it, having a parental filter installed and properly configured, a grown-up person at hand...
- Understand that it is best to have a person of contact (can be a relative, an educator or a teacher) for online medias concerns (offending contents, technical issues...)
- Be able to evaluate resources on Internet (source, references, date, obious and hidden motivations, style, orthographic correctness, reputation...)
- Knowing how to behave and use the implicit and explicit code of conducts of each media (1- search explicit ones, 2- observe if they are respected and how 3- participate appropriately when appropriate)
- Be aware of private e-mail address publication and alternatives (contact forms, social network or forums "direct messages")
Chapter 1 - Basic knowledge on e-safety
1.1. History : from static web1 to dynamic web2 environments
--(What are those web1, web2 and web3 environments? Is it necessary? by Mantas (Lithuania team) 8 juin 2011 à 14:58 (UTC))
1.2. Intention : web3 proposing constructive engagement in participatory society (or : security through light instead of old model of security through obscurity),
--(same here - we actually do not understand what is it aboutby Mantas (Lithuania team) 8 juin 2011 à 15:11 (UTC))</span>
here is a reference about obscurity: http://en.wikipedia.org/wiki/Security_through_obscurity
1.3. Know about equity between opportunities & risks since web2
--(if speaking about opportunities & risks it should be clarified - do we mean Internet? if so - it should be mentioned.by Mantas (Lithuania team) 8 juin 2011 à 15:11 (UTC))
1.4. Know about netiquette and other basic codes of conducts in the cyberspace (RFC 1855)
--(what do you mean by "basic codes"?by Mantas (Lithuania team) 8 juin 2011 à 15:11 (UTC))
1.5. Know about social engineering and it’s methods, including participative culture and abuses if you don't understand/respect them, for example having your password stolen (to be reformulated)
--)what is "participative culture and abuses"? We think that it is already included in the definition of social engineerging. We recommend to stick to version "Know about social engineering and it’s methods".by Mantas (Lithuania team) 8 juin 2011 à 15:23 (UTC))
1.6. Understand the differences of contents (functional, factual, creative) of information (I don't understand this item --Rémi LEVY 7 juin 2011 à 07:51 (UTC)
--(needs to be clarified with Theo. This item could be moved to syllabus chapter 2 - after 2.0. by Mantas (Lithuania team) 8 juin 2011 à 15:31 (UTC))
1.7. Understand the differences of formats (open, privative)
--(there is no such word "privative". We recommend "Understand the differences of data formats (open, private, business, etc.)" This item could be moved to syllabus chapter 2 - after 2.0. by Mantas (Lithuania team) 8 juin 2011 à 15:36 (UTC))
1.8. Understand the notion of identity
maybe to be repositioned in some other chapter --Rémi LEVY 9 juin 2011 à 19:49 (UTC)
1.9. eTools : Product versus function
--(Should be clarified--by Mantas (Lithuania team) 8 juin 2011 à 15:48 (UTC) )
1.10. Be aware of different identity for authorization theft methods (skimming, pretexting, shoulder surfing, information diving…)
- must be repositioned into the scam/hoax (chapter 5 or 6) ?
--( We recommend to leave in this chapter--by Mantas (Lithuania team) 8 juin 2011 à 16:00 (UTC) )
1.11. Be aware of privacy protection legal act (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies and so on).
1.12. Organizational security (school security) – or social engineering?, usage of school web pages, content publishing, access
--( social engineering is already mentioned in 1.5. We recommend "Know about Organizational security: school security, usage of school web pages, content publishing, access, etc."--by Mantas (Lithuania team) 8 juin 2011 à 15:56 (UTC))
Privacy and data management
I suggest : to begin with "Distinguish between data and information" --Rémi LEVY 7 juin 2011 à 07:49 (UTC)
(...)
2.7. Understand what intellectual property on Internet is and be aware of privacy protection legal act.
--(Privacy protection legal act is already mentioned in 1.11. Lets make this one only "Understand what intellectual property on Internet is."--by Mantas (Lithuania team) 8 juin 2011 à 16:11 (UTC) )
(...)
2.9. Privacy Management : Know how to start and finish safe browsing session (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing.
- 2.9 to 2.11 to me merged ? --Rémi LEVY 10 juin 2011 à 07:49 (UTC)
- 2.10. Know how to browse the Web securable. Know about advantages, disadvantages and dangers of Internet cookies. Know about tools that ensure safety when browsing the Internet (blocking of cookies, ActiveX control, etc.)
- 2.11. [#Privacy-RL] Be able to manage, clear temporary Internet files, browser history, passwords, cookies, and autocomplete data.
--(2.9 , 2.10 , 2.11 may be consolidated and must be moved to chapter 5 --by Mantas (Lithuania team) 8 juin 2011 à 16:17 (UTC))
- As it is technical, I don't see why to put this on chapter 5 which is more about behaviour in social network--Rémi LEVY 10 juin 2011 à 07:53 (UTC)
Security tools and network security
see how integrate from 3.5 to 2.11 --Rémi LEVY 7 juin 2011 à 07:52 (UTC)
3.1. Know computer network types ,
(local area network (LAN), wide area network (WAN), virtual private network (VPN)) and why protection is needed.--Renata (Lithuania Team) 8 juin 2011 à 16:19 (UTC)
3.2. Know different network connection methods (Mobile networks, Wireless, Cable).
3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network.--by Mantas (Lithuania team) 8 juin 2011 à 16:30 (UTC)
3.3. Sharing and accessing resources over network (Files, Printer, Screen).
3.4. Understand safety means of computer networks (Firewall, Antivirus, Password protection, Connection encryption – wireless).
--(Firewall, Antivirus, Password protection, Connection encryption are all already mentioned in other items and fit there by content and integrity better. We recommend to cross this 3.4. out at all)--by Mantas (Lithuania team) 8 juin 2011 à 16:36 (UTC)
3.5. Be able to use standard OS integrated protection tools.
3.6. [[#see how integrate 3.5 to 2.11 : "All about malware and intrusion protection tools" - RL]] Know what a quality anti-virus, anti-spyware, spam blocker, and personal firewall is and how to use it. (Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.), know that it is unsafe to turn antivirus software off and know consequences). Distinguish different modes of antivirus protection (active, passive…).
--(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --by Mantas (Lithuania team) 8 juin 2011 à 16:25 (UTC))
- 3.7.[#Updating operating system- RL]. Know how to follow, download and use updates for your operating system, software and importance of antivirus definition files. Understand the benefits of these updates.
--(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --by Mantas (Lithuania team) 8 juin 2011 à 16:25 (UTC))
- 3.8. Distinguish different modes of antivirus protection (active, passive…).[# see also 3.6]
--(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --by Mantas (Lithuania team) 8 juin 2011 à 16:25 (UTC))
- 3.9. Know what has to be done and in what order, if you suspect that computer system is infected.
- 3.10. Distinguish infected files deletion, quarantining and curing.
- 3.11. Informal and formal periodic external checkup.
--(what do you mean by "checkup")--by Mantas (Lithuania team) 8 juin 2011 à 16:30 (UTC)
Children, newcomers in schools and workplaces : means of safe use for socio-digital inclusion
Have discussion.....--Rémi LEVY 7 juin 2011 à 09:05 (UTC)
to discuss new topic :
</span>
--(what is a socio-digital inclusion? Maybe we can shorten this chapter name to "Children, newcomers in schools and workplaces"?--by Mantas (Lithuania team) 8 juin 2011 à 16:49 (UTC) )
4.1. Understand the impact of communication with new users about safety in IT World,
4.2. Policy : Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation)
4.3. Understand the purpose of monitoring, filtering and controlling tools against children computer usage and web browsing.
4.4. Understanding advantages and limitations with protection software.
--(Need more items in this chapter. After consolidation in Latvia this chapter has become even shorter than it was. And it was already short :). Maybe we can try to expand again to look more like the previous version, but less stick to children, as you mentioned in Latvia)--by Mantas (Lithuania team) 8 juin 2011 à 16:49 (UTC)
Chapter 5
</span>
5.1. Know when and in which cases personal information can be published on the Internet, i.e. status publishing about leaving home,.
5.2. Understand what a social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand that it is not safe to disclose information about user accounts, passwords and so on.
5.3. Know different social network types and be able to use them harmless and safe (appropriate account privacy settings).
5.4. (Publishing content)Know what type of information recommended to be published on social network, be responsible for published content, know impacts
5.5. Be able to safely connect to e-Services and secure environments– connecting and using, recover lost passwords.
5.6. (Emails)Be able to send/receive e-mail securely. Know how to reject email from specific email addresses. Know how to treat email messages from unknown senders
5.7. (Spam and malware) Be able (understand) to use network resource controlling software and hardware. Know about email that is classified as spam, and email messages infected with malware.
5.8. Be aware of network resource controlling software and hardware. Know how to reject email from specific email addresses.Know about scam, hoax, chain letters...[5.7 & 5.8 to be merged - RL]
5.9. Understand threats of virtual communication: virtual dating, bullying, commenting,
5.10. Dependency and addiction to the Internet. [# to be develop - TL]
5.11. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on)
5.12. Reliability of information (Understand that it is not safe to disclose information about user accounts, passwords and so on. can not fully trust content and identities on the internet. (i.e. blogs, Wikipedia, etc).
5.13. Reputation management. Know who you should contact if you discovered inappropriate information about you or your related digital identities. .
5.14. Abuse management, cyber bullying, cyber-mobbing, when is it possible to remove, when to put additional correct information.
5.15. Understand that online socializing reflects "real life"
5.16. Know about the 2 types of social networking : Friendship-driven and Interest-driven
--(Social networks types are already mentioned in 5.3.
Maybe it can be consolidated or is it different at all?)--by Mantas (Lithuania team) 8 juin 2011 à 17:03 (UTC)
5.17. Understand what is Online Safety 3.0 : research-based, Flexible, layered, Respectful, Positive, empowering, contextual....
5.18. Know reputation and legal safety
5.19. Know about identity, property and community safety
5.20. Understand why digital citizenship is protective and is the best filter ever : pre-installed, free of charge, improve with use...
--(In previous version before Latvia meeting there were items:
Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information and etc.
Know about social viruses, chain letters.
Know threats of virtual communication (social networks, IM, e-mail and ect.): virtual dating, bullying, commenting, and dependence on the Internet.
We could consolidate those, but we think that safe IM and social threats are important too and should be included)--by Mantas (Lithuania team) 8 juin 2011 à 16:56 (UTC)