Applying these kinds of practices could be displayed when creating an private online webpage. For example, later in the year we will be looking at creating personal blogs that the children can upload their work to. These will be private and therefore students will have to configure the settings for this to happen. this could involve a friend trying to access it to ensure it can't be found. Another example of keeping safe would be using non-predictable usernames and passwords.
Welcome to The Parent Hub, The blog for your child's year 6 Classroom! This blog will be updated regularly to keep you in touch with what's happening within the classroom, new and exciting topics, as well as some general information that may be useful! feel free to comment on any of the posts or email me directly at thom1004@flinders.edu.au
Tuesday, 16 September 2014
Components 2 & 3: Applying Digital Information Security Practices and Applying personal Security Protocols
Applying Digital Information Security Practices is referred to in the curriculum as an independent process where students should begin to apply strategies for determining and protecting the the security of digital information and develop an understanding of some of the risks that can be present when working with different types of online environments, such as social media (ACARA, 2014). Applying Personal Security Protocols relates closely to this, but has a heavier emphasis on the personal aspect. This component also deals with the recognition and reporting of cyber bullying and displaying mindfulness and tactfulness when online.
Applying these kinds of practices could be displayed when creating an private online webpage. For example, later in the year we will be looking at creating personal blogs that the children can upload their work to. These will be private and therefore students will have to configure the settings for this to happen. this could involve a friend trying to access it to ensure it can't be found. Another example of keeping safe would be using non-predictable usernames and passwords.
Facebook
Twitter
Applying these kinds of practices could be displayed when creating an private online webpage. For example, later in the year we will be looking at creating personal blogs that the children can upload their work to. These will be private and therefore students will have to configure the settings for this to happen. this could involve a friend trying to access it to ensure it can't be found. Another example of keeping safe would be using non-predictable usernames and passwords.
Subscribe to:
Post Comments (Atom)
CC License

Social and Ethical use of ICT by Andy Thomas is licensed under a Creative Commons Attribution 4.0 International License.
No comments:
Post a Comment