Title: Hot Topics in Technology for Higher Education
1Hot Topics in Technology for Higher Education
- University of Central Arkansas Committee for the
Deans Council - LaCresha Henderson
- Danielle Joanette
- NuRodney Prad
- Justin Varghese
2Whats Bringing the Heat?
Distance Education
LGBTQ Online
Online Safety/Training
Blogs
3Whats Hot about Spam?
- Spam is the the mass-posting of emails sent to
Internet users through many copies or different
messages in an effort to impose the information
onto people who would not otherwise select to
obtain it. - The Importance of addressing spam has to do with
three areas - Knowing the Harmful issues
- Discussing the benefits of Preventative Measures
- Future Implications
4Phishing A way spam ends up in your inbox
Fool me once, shame on you fool me twice, shame
on me.
- Identity Safety is threatened when spammers
partake in Phishing By E-mail - Phishers are people who attempt to steal your
personal information and then your money. The
person then sells the data to a "Casher" who is
setup to use the data for identity theft,
printing credit cards or just stealing your
money. - Pretending to be from your financial institution,
a legitimate retailer or government agency, the
emails will contain a link that looks real,
saying something like "Click here to Update your
account" or to confirm your personal
information. - Typically, the link will direct you to a fake
website that are near-replicas of the real one,
making it hard even for experts to distinguish
between the real and fake web sites. - You enter your personal information onto the web
site and into the hands of identity thieves. - The emails can look very official, please click
to see samples
5Issues with Spam on Our Campus
- Issue 1 Time Constraints
- Spam also hurts consumers. Many people still pay
hourly rates for Internet access, including those
who use wireless Internet services and business
travelers who download e-mail while on the road.
These consumers have to pay for the time they
spend downloading these unsolicited messages to
their computer from the Internet. - It takes 10 seconds to recognize that an email
contains spam - 60 spam emails takes 10 minutes of your time to
delete - When you click remove from list it
automatically doubles the amount of time it takes
to delete spam - If each student takes 20 minutes a day to delete
spam at the University of Central Arkansas that
equates to
6Issues with Spam on Our Campus
- Issue 2 Harm to Computers
- Most Internet Service Providers (ISPs) also limit
the space available in account mailboxes for
consumers to store e-mail messages. Spam fills
mailbox space that consumers could utilize for
other purposes. Viruses, Trojans, and other
malicious scripts can attach themselves to spam
and infect your computer the instant you open the
message. - Spammers also often push their mail throughout
other people's systems. This allows spam
creators to offload the real costs (CPU time,
e-mail account user time, disk space, etc.) onto
other innocent third parties.
7Issues with Spam on Our Campus
- Issue 3 Harm to Servers
- Internet Service Providers (ISPs) and other
businesses lose millions of dollars and hundreds
of hours of productivity as a result of
unsolicited commercial e-mail. Spam clogs the
Internet, computer systems, and e-mail accounts
slowing down operations and at times causing
system shutdowns and failures. - The Three ways spam can harm the server is
- Viruses
- Bot or Botnet
- DDOS Distributed Denial of Service Attack
8Benefits of Embracing Anti-Spam Tools on Our
Campus
- Central Benefit Minimization of time
expenditures, computer and server harm - Important tools include Appliances and Software
Iron-Port An appliance that has many features
to protect against spam and viruses on the
Internet. Such features include Spam
Defense Virus Defense Content Filters
Barracuda Spam Firewall Is an appliance
compatible with all email servers and can fit
into nearly any corporate or small business
environment. It is used by small organizations
with as few as 10 employees and large
organizations with as many as 200,000 employees.
Features of Barracuda include Anti-spam
Anti-virus Anti-phishing Anti-spyware
(Attachments) Denial of Service
GWAVA Is a software specifically designed for
the Novell Groupwise Community with many features
Including Email Policy and Surveillance
Anti-Virus Tools Anti-Spam Tools Spam
Management Tools
Picture Retrieved from http//www.ironport.com/pr
oducts/network_map_esa.html
9Future Implications of Spam
- User Perception
- Spam may affect internet users by causing them to
desert many public discussion forums for fear
that their e-mail addresses will be harvested and
added to junk mail lists. Many are afraid to give
their addresses out in even legitimate commerce
for fear of being added to and traded among
thousands of mailing lists. Genuine businesses,
institutional faculty, staff and even more
specifically, admission officers are having
second thoughts to use e-mail to communicate with
their prospective customers and students for fear
of being branded Net abusers. This distrust
threatens to undermine the acceptance and growth
of electronic commerce among the legions of new
Internet users taking their first steps online. - Global Implications
- Electronic mail is a tool of business and
personal communication. It's simple, it's
accessible, and it's becoming more and more an
essential part of our professional lives.
However, there are even more far-reaching
potentials of e-mail that have a possibility of
being lost if this mode of communication gets
destroyed by the increased production of junk
e-mail. - Technology
- When responsible computing behavior becomes more
popular, tools dealing with Spam Filtering,
implementation of spyware and removal
procedures, will continue to be strong factors in
decreasing the amount of spam created.
10Whats Hot about LGBTQ Online?
- LGBTQ Online is the phenomenon of providing
students with departmental resources through the
internet. - This is a hot topic because cyberspace is
serving many functions for - LGBTQ students. These include
- Educating- consists of collecting basic
information - Networking- allows students to connect with a
larger LGBTQ network community - Development- facilitates an individuals ability
to obtain knowledge on LGBTQ issues and explore
alternative ways of self-expression. - Examples of such resources include
- Princetons LGBTQ Center websitehttp//www.p
rinceton.edu/lgbt/ - University of Michigans LGBTQ Affairs
website http//www.umich.edu/lgbta/
11Methods of Using LGBTQ Online Resources
- Online Searches
- Potential students in areas where physical LGBTQ
resources are scarce can locate institutions of
higher education that are LGBTQ-friendly through
online searches. - Example The Advocate College Guide for LGBT
Students is a book that is easily located on
http//www.amazon.com - Online Discussion Opportunities and Services
- Blogs, forums, and websites addressing LGBTQ
issues offer 24/7 guidance on developmental
issues and support through reaching a larger
LGBTQ community. - Example http//www.gay.com
- Example Pennsylvania State has an online LGBTQ
resource center that hosts online discussion
groups http//www.sa.psu.edu/lgbt/
12Issues with LGBTQ Interactions Online
- Issue 1 Compromising Anonymity
- The internet is a public space and personal
information can be foundtherefore putting
aspects of the LGBTQ identity online through
blogs, facebook profiles, or dating advertisement
can have negative repercussions. - Issue 2 Personal Safety
- The precautions of online personal safety are
very similar to protective measures we use in
everyday life. However, it is often difficult to
identify users on the opposite side of computer
terminals in chat rooms or blogs.
13Benefits of Embracing Online LGBTQ on Our Campus
- Benefit 1 Identifying Allies
- Benefit 2 Protecting Privacy
- Benefit 3 Further Development
14Future Implications of LGBTQ Online
- Development of the whole LGBTQ student
- Institutions who make it a point to support and
provide access to LGBTQ friendly resources will
promote growth and further development of the
whole student especially those identifying as
LGBTQ. - Development of classes on LGBTQ Studies and
incorporation of - LGBTQ online issue into diversity training
- Scholars have discussed that online literacy may
be different from academic literacy, and since
the using the internet depends on writing skills,
there may be a better development in these areas
for LGBTQ students than what is seen in the
classroom. Making these areas of interest a focus
in class work has the potential for further
educational development.
15Whats Hot About Blogs?
- Blogs have infiltrated every aspect of our lives
including Higher Education and Student Affairs.
Faculty, staff, and students are using blogs as
an extension of in-class teaching and
communication. Blogs have begun to impact both
teaching and learning methods. - The internet blogosphere is incredibly active.
There are over 175,000 new blogs every day.
Bloggers update their blogs regularly to the
extent of over 1.6 million posts per day, or over
18 updates a second. Blogs have changed the face
of communication around the world. - Blogging continues to experience technological
advancements within itself that has changed the
perception of institutions. Institutions of
higher education have started to sponsor and
support blogs.
16The Basics of Blogs
What is a Blog? A frequent, chronological
publication of personal thoughts and web links.
Blogs are alternatively called weblogs.
Types of Blogs
- Political (Includes current political topics,
commentary and campaign material) - Personal (On-line journal and diary)
- Business (Promotion, advertising, information)
- Topical (Focuses on single issue or niche
- Health (Medical news, personal accounts with
health issues)
- Literary (Focuses on a literature topic including
the publishing industry) - Travel (Travelers share stories and photos)
- Research (Includes research notes and issue
discussions) - Educational (Course plan, discussion and
announcements) - Legal (Legal commentary and case analysis)
17The Basics of Blogs
Components of a Blog
- V. Blogrolls Contains links to other blogs and
websites, and can typically be found running down
the left or right-hand side of the page. - VI. Dialogue A venue for carrying on simple
conversations and disseminating
information. - VII. Feed Every blog is published and
broadcasted as a Really Simple Syndication
(RSS) feed. Feed readers collect and combine
feeds to allow readers to browse a central
location. - VIII. About Includes the author, contact
information and purpose of the blog
- I. Title Typically reflects the purpose of the
site - II. Date and Post Title Includes the date of
publication and overview of the post's subject
matter. - III. Commentary Style and content of words vary.
- Types
- Personal
- Opinionated
- Topic-oriented
- Irrelevant
- IV. Links Serve as a kind of works cited page,
directing readers to additional sources of
relevant material.
18Issues with Embracing Blogs on Our Campus
- Issue 1 Security and Privacy
- Issue 2 Academic Freedom
- Issue 3 Blog Overload
19Benefits of Embracing Blogs on Our Campus
- Benefit 1 Promotes Student Engagement and
Interaction - Benefit 2 Facilitates Small Group Work and Team
Building - Benefit 3 Encourages Civic Engagement on Campus
and - within our Communities
20Future Implications of Blogs
- Institutionally Sponsored Blogs
- The number of institutions sponsoring blogs may
increase. Blogging may also be embraced by more
disciplines in higher education and academia as a
new form of learning. - Institutional Blog Policy
- Institutional revisions of student conduct codes
and computer policy may occur to address blogs.
The focus could be the content and use of blogs.
Discussion of a blog policy for faculty and staff
may be actively addressed beginning with the
administrations. - Blog Training
- Blog Training may be integrated into
institutional training. Professional conferences
and events may increasingly spotlight blogs as a
part of sessions including information on new
advancements.
21Whats Hot About Distance Education?
Distance Education has highly increased over the
last decade for students to participate in
courses without being present on a physical
campus. The following are reasons as to why this
trend is occurring
- Higher education outsourcing and partnerships are
increasing. - Instruction is becoming more learner centered,
non-linear, and self directed. - Traditional campuses are declining, for-profit
institutions are growing, and public and private
institutions are merging.
- The percentage of non-traditional students have
increased over the past two decades. - Distance Learners are able to select a flexible
schedule to accommodate a fulltime job. - There is a huge interest in internet usage by
younger generations.
Distance Education is defined as all credit and
non-credit courses and training delivered via
electronic means.
22Students Using Technology for College Credit
- Examples of Technology used includes Skype,
Podcasting, and Webinars - Skype is a peer-to-peer internet telephone
directory service which allow individuals the
ability of connecting with one another to conduct
online chats and video conferencing. Students and
professors alike are able to log on into a
designated chat room and hold lectures as if they
were in a physical classroom. Most features of
this technology are free, thus being a benefit
for long-distance students. - Podcastings are media files distributed over the
internet using syndication feeds to play back on
portable electronic devices or personal
computers. Numerous professors are recording
lectures and making digital and/or electronic
notes available for students to download to their
personal computer or MP3 players. -
- Webinars allow individuals to be interactive in a
discussion forum. The term itself translates to
seminars conducted over the world wide web. This
type of technology allows institutions of higher
education to discuss current trends and hot
topics that affect campuses. The main benefit is
not requiring several universities to make travel
arrangements to a central location for - the discussion.
23Issues with Embracing Distance Education on Our
Campus
- Issue 1 Distrust of Online Degrees by Potential
Employers - Issue 2 Technological and Computer Literacy
24Benefits of Embracing Distance Education on Our
Campus
- Benefit 1 Accessibility and Location
- Benefit 2 Diverse student population
- Benefit 3 Cost Effective
-
25Future Implications of Distance Education
- In the early 1990s, Congress created legislation
such as the 50-Percent Rule and the12-Hour Rule
to regulate federal aid dispersion and diploma
mill issues in distance education. - In recent years, Congress has expressed a desire
to remove controversial regulations that limit
funding for students of distance education
programs. -
- Due to fact that technology has been modified and
increased in the household of Americans, we
believe lawmakers will want to amend the
restrictive laws created a decade ago. - If these laws are reconfigured, we expect a rapid
increase in the amount of students enrolled in
distance education courses.
26Whats Hot About Online Safety/Training?
- Online Training is a hot topic because Higher
Education administrators, educators, and staff
are often called upon to make informed choices
about technology. - Online Safety is a hot topic because current
empirical research strongly suggests that young
adults are increasingly becoming both victims and
perpetrators of internet crime and abuse. - Offenses Typical of College Campuses Include
- Piracy of music
- Academic dishonesty
- Cyberstalking
- Creation of computer viruses
- Higher Education must prepare graduates who can
keep America's computing society safe and secure.
We must reach out to our schools and employers to
assist them in putting instructional programs in
place.
27Online Training How do we do it?
- Many colleges and universities are well
positioned to add internet safety, information
security, and cyberethics training to
continuing-education courses as well as to
degree-program requirements. - Higher Education institutions could also offer
leadership training to executives of public,
private, and nonprofit organizations who have
vested interests in having employees who can
secure, maintain responsible use information
systems. - Example The CyberSmart Professional Development
Program includes - Geared towards educators K-12
- Topics covered are customized by what each person
specifically desires to learn - Includes both online training and on-site
learning
28Issues with Embracing Online Training on Our
Campus
- Issue 1 Cost of implementing programs
- Issue 2 Placement of the responsibility of
technology - education
- Issue 3 Effective Programming requires
participation and full support
29Benefits of Online Training on Our Campus
- Benefit 1 Serving Student Populations
- Benefit 2 Career Preparedness
- Benefit 3 Concern For Community
- Benefit 4 Developing a Proactive Stance
30Future Implications of Online Training
- The federal government has stressed
technological, legislative, and law-enforcement
solutions to problems being faced in todays
technological world. - This committee anticipates the focus of
legislation to shift from online predators and
pornography to self-education, awareness, and
responsibility. - The main intent of federal legislation in the
future should be on a systematic approach.
Legislators should set guidelines on how to
implement educational tools to students on
internet usage.
31Final Thoughts on Hot Topics
- Whether students or faculty are encountering
spam, utilizing LGBTQ online resources, blogging,
taking courses online, or using the internet for
entertainment the millennial generation is
plugged in. It is important to address
technological hot topics as they arise in order
to still be in touch with our student population.
We must use technology rather than fear its
potential in Higher Education. - - The University of Central Arkansas
Committee for the Deans Council
32References
- Anderson, Michael, Borrelli, Jaycee, and
Patterson, Joseph P. (2003). Spam, Spam, and
Spam A Battle on Many Fronts Electronic
version. Morris Computer Science Seminar
conduced at University of Minnesota. Retrieved
February 10, 2007 from http//csci.mrs.umn.edu/UMM
CSciWiki/pub/CSci2901f03/SpamSpamAndSpam/spam_fina
l.pdf - Barracuda Networks (n.d.). Spam Firewall Overview
Retrieved February 10, 2007 from the Barracuda
Networks webpage http//www.barracudanetworks.com
/ns/products/spam_overview.php - Carnevale, Dan. (2006). Rule May Spark Online
Boom for Colleges Electronic version. The
Chronicle of Higher Education, 52 Issue 6.
Retrieved February 10, 2007 from
http//chronicle.com/weekly/v52/i22/22a00101.htm - Case J. Carl and King, Darwin L. (2006, November,
2). Is Undergraduate Spam Under Control?
Electronic version. Issues in Information
Systems, 7. Retrieved February 10, 2007 from
http//www.iacis.org/iis/2006_iis/PDFs/Case_King.p
df - Chickering, A. Reisser, L. (1993). Education
and Identity. In Komives, S., Woodard, D.,
Associates. Student Services A Handbook for the
Profession 4th edition. (pp. 181) San Francisco,
CA Jossey-Bass Print - Crucial Marketing. (2007). Blogs. Retrieved
February 10, 2007 from the Marketing Terms
website http//www.marketingterms.com/dictionary/
blog/ - Dawson, K. (2007). Blog Overload An associate
professor and devoted reader of blogs finds that
requiring students to create one produced the
wrong kind of buzz Electronic version. The
Chronicle of Higher Education, 53, Issue 22.
Retrieved February 10, 2007 from
http//chronicle.com/weekly/v53/i22/22c00201.htm - Education Technology Collaborative University of
Tennessee. (2005). Academic Blogging Strategies
for Using Weblogs to Promote Active Learning and
Professional Development. Retrieved February 10,
2007 from http//edtech.tennessee.edu/set31/defau
lt.html - Evans, N.J., Forney, D. S. Guido-DiBrito, F.
(1998). Student development in college Theory,
research, and practice. San Francisco
Jossey-Bass. (pp. 94-99).
33References
- Everett-Church, Ray (May/June 1999) Why Spam is a
Problem. E-OTI OnTheInternet An international
Electronic Publication of the Internet Society.
Retrieved February 10, 2007 from
http//www.isoc.org/oti/printversions/0599preveret
t.html - Gay.com (2006, October, 26). Three charged with
hate crime in N.Y. gay slaying. Advocate News.
Retrieved February 17, 2007 from
http//www.gay.com/news/article.html?2006/10/26/2
- Gordon, D. (2007). About Technorati. Retrieved
February 10, 2007 from the Technorati website
http//www.technorati.com/about/ - GwavaOverview (n.d.) Retrieved February 10, 2007
from the Gwava World Headquarters website
http//www.gwava.com/products/gwava_overview.php - Herring, B. Personal Communication February 13,
2007 - Hoover, Eric. (2006). Gay and Christian
Electronic version. The Chronicle of Higher
Education, 52, Issue 34. Retrieved February 10,
2007 from http//chronicle.com/weekly/v52/i34/34a0
4601.htm - Housley, S. (n.d.). NotePage Incorpaorated The
Dangers in Blogging. Retrieved February 10, 2007
from the Feed For All website http//www.feedfora
ll.com/dangers-blogging.htm - Ironport Products (n.d.). Retrieved February 10,
2007 from the Ironport Systems website
http//www.ironport.com/products/ironport_c650.htm
l - Krause, S. (2005). Blog as a Tool for Teaching
Electronic version. The Chronicle of Higher
Education, 51, Issue 42. Retrieved February 10,
2007 from http//chronicle.com/weekly/v51/i42/42b0
3301.htm - Laws and Regulations that Affect Distance
Learners (n.d.). Retrieved February 10, 2007,
from http//www.elearners.com/resources/education-
laws.asp
34References
- Lipka, S. (2006). 'Advocate' Guide Profiles 100
Best Colleges for Gay Students Electronic
version. The Chronicle of Higher Education, 53,
Issue 6. Retrieved February 10, 2007 from
http//chronicle.com/weekly/v53/i06/06a04502.htm - Lutus, P. (2006). An updated article on the
topic of spam. Retrieved February 10, 2007 from
The Anti-Spam Home Webpage http//www.arachnoid.
com/lutusp/antispam.html1 - Martin, J. and Samels, J. (2007). 10 Trends to
Watch in Campus Technology Plus 8 Myths and 7
Key Skills for CIO's Electronic version. The
Chronicle of Higher Education, 53, Issue 18.
Retrieved February 10, 2007 from
http//chronicle.com/weekly/v53/i18/18b00701.htm - McQuade, S. C. (2007). We Must Educate Young
People About Cybercrime Before They Start College
Electronic version. The Chronicle of Higher
Education, 53, Issue 14. Retrieved February 10,
2007 from http//chronicle.com/weekly/v53/i18/18b0
2901.htm - Michigan.Gov the Official Portal for the State of
Michigan (n.d.). Defining Spam. Retrieved
February 10, 2007 from http//www.michigan.gov/ag/
0,1607,7-164-17334_17364_18380-44602--,00.html - Moore, S. (2006). Smart Communities Most
Engaging Blogs-Higher Education and Civic
Engagement. Retrieved February 10, 2007 from
http//smartcommunities.typepad.com/suzanne/2006/0
1/most_engaging_b_4.html - Mueller, H. Scott (n.d). What is spam? Retrieved
February 10,2007 from the GFi Corporation
website http//spam.abuse.net/overview/whatisspam
.shtml - National Center for Education Statistics. (2007).
Distance Education in Higher Education
Institutions. Retrieved February 10, 2007 from
http//nces.ed.gov/surveys/peqis/publications/9806
2/index.asp - Phishing. (n.d). Retrieved February 10, 2007 from
http//www.gov.mu/portal/sites/spamweb/phishing.ht
mtop - Quarterman, John S. (1997, Aptril). Original Spam
Considered Harmful Electronic version. Matrix
News, 7(4). Retrieved February 10, 2007 from
http//fringe.davesource.com/Fringe/Computers/Neti
quette/Spam_Considered_Harmful.html
35References
- Read, B. (2007). How to Podcast Campus Lectures
Electronic Version. The Chronicle of Higher
Education, 53, Issue 21. Retrieved February 10,
2007 from http//chronicle.com/weekly/v53/i21/21a0
3201.htm - Reynolds, G. (2006). Can Blogging Derail Your
Career The Politics of Academic Appointments
Electronic version. The Chronicle of Higher
Education, 52, Issue 47. Retrieved February 10,
2007 from http//chronicle.com/weekly/v52/i47/47b0
0702.htm - Schackner, B. (2005, December, 25). Freedom of
Speech Redefined by Blogs Words Travel Faster,
Stay Around Longer in the Blogosphere Electronic
version. The Post-Gazette. Retrieved February
10, 2007 from http//www.post-gazette.com/pg/05359
/627794.stm - The CyberSmart Education Company (2007).
Retriteved February 17, 2007 from
http//www.cybersmart.org/pd/ - The World of Blogs. (n.d.). Retrieved February
10, 2007 from http//www.slais.ubc.ca/courses/libr
500/05-06-wt1/www/A_Cho/introduction.htm - Web Developers Virtual Library (n.d.). Spam,
Spam, Spam, Spam, Spam, Spam, Spam. Retrieved
February 10, 2007 from http//www.wdvl.com/Interne
t/Protocols/Email/Spam.html - Woo, Stu. (2006). Professors and Students Ask
Colleges Not to Hang up on Skype Electronic
Version. The Chronicle of Higher Education, 53,
Issue 16. Retrieved February 10, 2007 from
http//chronicle.com/weekly/v53/i16/16a02801.htm - Woodland, R. (1999). I plan to be a 10 Online
Literacy and Lesbian, Gay, Bisexual, and
Transgender Students Computers and Composition
16, 73-87