Intro and Purpose





This blog is being created by me, Samantha Skeen.  I am a special needs teacher at the high school level.  I also have my Technology Integration Specialist endorsement.  I have been teaching at my current school for 7 years and I try to include technology as a daily part of my lessons. 


The purpose of this blog is to inform about the issues associated with cyber safety.  Additionally, tips will be provided to help you guard against various forms of cyber intrusion.

The intended audience is:  high school students, teachers, and parents of high school students.

WV CSO's addressed:
21C.O.9-12.3.TT.1
Student protects software, hardware and network resources from viruses, vandalism, and unauthorized use and employs proper techniques to access, use and shut down technology equipment.
21C.O.9-12.3.TT.3
Student evaluates current trends in information technology, discusses the potential social, ethical, political, and economic impact of these technologies, and analyzes the advantages and disadvantages of widespread use and reliance on technology in the workplace and society
21C.O.9-12.3.TT.4
Student adheres to acceptable use policy and displays ethical behaviors related to acceptable use of information and communication technology (e.g., privacy, security, copyright, file-sharing, plagiarism); student predicts the possible cost and effects of unethical use of technology (e.g., consumer fraud, intrusion, spamming, virus setting, hacking) on culture and society; student identifies the methodologies that individuals and businesses can employ to protect the integrity of technology systems.
21C.O.9-12.3.TT.5
Student models ethical behavior relating to security, privacy, computer etiquette, passwords and personal information and demonstrates an understanding of copyright by citing sources of copyrighted materials in papers, projects and multi-media presentations.  Student advocates for legal and ethical behaviors among peers, family, and community regarding the use of technology and information.
21C.O.9-12.3.TT.7
Student protects his/her identity online and in email and/or websites, limits the distribution of personal information/pictures, and evaluates the authenticity of emails that solicit personal information.  Student identifies the methodologies that individuals and businesses can employ to protect the integrity of technology systems.

suescheffblog.com