Options for Controlling Internet Access - Tech Learning

Options for Controlling Internet Access

Question: What options are available for controlling student access of the Internet? The IT Guy says: One of the goals of every school’s computer literacy curriculum and campus policies should be helping students learn to be responsible and ethical users of technology tools. To this end, schools need to
Author:
Publish date:

Question: What options are available for controlling student access of the Internet?

The IT Guy says:

One of the goals of every school’s computer literacy curriculum and campus policies should be helping students learn to be responsible and ethical users of technology tools. To this end, schools need to foster perceptions of individual accountability for online behavior just as they do for face to face behavior.

As human beings, we tend to act differently in a situation where we believe we are truly anonymous and not accountable. Rather than creating a stifling, locked down computing environment where no student can make a mistake because the software and system configurations will not permit it, school computing environments must strike a balance between meeting federal regulations for protecting minors from inappropriate online content and creating a completely open and anonymous virtual environment where accountability is non-existant.

Several different commercial products are now available which monitor and record every keystroke, website URL, and instant message or chat phrase typed by a student or staff member onto a school computer. Investing in “big brother†software like this may sound Orwellian, but it does not have to be. Using a mixture of sound instructional practice and student discipline management strategies, as well as available technological solutions, educators must find ways to create academic computing environments which have both a substantial level of freedom for students and staff, and clear lines of accountability for computer users that are clearly understood.

Many school and library computers are so “locked down†that they leave no room for student decision making, when it comes to the ethical choices which are present online and elsewhere in computing environments. This alternative is a poor choice because it leaves students ill-equipped to deal with the realities of non-filtered, completely open home computing environments which are available to growing numbers of children each day. Education about appropriate computer and network resource usage must extend beyond the walls of the classroom into the community, as adults as well as young people strive to stay abreast of ever-changing waves of technology.

Next Tip: TBA

Featured

Related

Monitoring and controlling lab printing

Question: The quantity of paper printed in our library and computer labs by students is out of control. A large number of these pages are wasted and not even used. What can be done? The IT Guy says: The best option is to train network computer users to adhere to acceptable use policies, which should include

Six Steps to Managing Internet Access

Jim Culbert, information security analyst for the Duval County Public Schools in Jacksonville, Fla., talks about developing district policies that ensure kids remain safe online.

BYOD made secure with Network Access Control

The Hamilton Southeastern School District, located in Fishers, Indiana, has always striven to prepare its students for a successful post-secondary education and to excel within a quickly evolving modern workforce.

Kidspiration 2.1 Teacher Options

Tip: Kidspiration is a great tool for primary students. Because students are young and not as experienced on the computer, the teacher may need to take control of some of the features. Go to the Teacher Menu and then to Application Options. Then select the options to which you want students to have access. You

Six Steps to Managing Internet Access

School districts face a moving target when it comes to keeping students from inappropriate Internet sites. Duval County Public Schools in Jacksonville, Fla., with 140,000 students, has in place a three-part system of filtering, monitoring, and reporting. Information security analyst Jim Culbert explains how it

Image placeholder title

Control Room

“When I came here last August, I wanted to use LANDesk, because I’d used it before and loved it,” says Rick DeLaunay, director of technology and media.

Remote Control

It's no secret that the combination of young people and computers can equal aimless Web surfing. In the classroom, teachers incorporating computers into their lessons need to make sure students are using technology in productive ways. To do this, many schools have turned to classroom management systems. Does your