A must-read for educators: privacy, ethics, and educator responsibility in #edtech

There are some exciting tools out there that allow students to do amazing things, but test them out first of all with a dummy account and cast a critical eye over the ethics of the service before you encourage students to start using it.

If you’re an educator, this post by Cameron Hocking is a great place to begin thinking critically about the tools you use and the responsibility you have in protecting your students data: Educational Conferences and the ethics of EdTech.

STOP! Don’t even think about upgrading to iOS 8 today!

 beyonce

If you were on earth today and you use technology, you might be excited about iOS 8 because you read about it on a tech blog or heard something about it on the news. You might even want it now, because there are tons of blog posts telling you how you can get iOS 8 right now. You’re wondering if it’s worth $99 to sign up for that developer account and see if all of those tech bloggers know what they’re talking about, and if the future we’re being promised on our Apple devices is really as great as everyone says it is.

I’m here to tell you one very important thing: DON’T. Don’t do it, gurl, don’t do it! Do not upgrade to the developer version of iOS 8 unless you’re a developer working on an app or something else for the platform.

Developers are a highly-evolved species of skilled digital nitpickers (ed note: I mean this with love) who are well equipped to give feedback, find security vulnerabilities, and report bugs that will affect their own software creations before this release finds its way to the public. I’ve worked for and advised a few iOS developers, and have upgraded twice to beta versions of iOS software in the past.

I am here to tell you that you don’t want iOS 8 because iOS 8 isn’t ready for your jelly you just yet. Here’s why:

1) Beta software is notoriously buggy– because it’s a first draft of a piece of tech that hasn’t yet been put through the ringer, and then shined and polished for its intended audience. There are lots of buttons and interactions that just won’t work, because the lines of code that make them run still need a bit of work to make magic happen.

2) There’s no going back. Once you upgrade to the beta version of iOS 8, you’re stuck there– there’s no way to roll back the install and revert to fully-functional iOS 7 if you decide that you can’t handle it.

3) Your most loved and frequently used apps weren’t built to work with iOS 8.  If you’re the kind of person who wants to watch  your apps CRASH CRASH CRASH until the full release, you’re more than welcome to upgrade– for everyone else, just don’t do it.

4) Your phone could lose major functionalities for the unforseeable future. Last year, I was unable to use my camera for an entire weekend and couldn’t open Mail to save my life for three days. And that doesn’t even touch the intermittent issues that popped up with both Bluetooth and wi-fi in the beta period.

5) Security. New software and programming languages are, by definition, full of security problems. Apple does an audit before they release something into the wild… but do you really want to use something before white hat hackers have had a couple of months to sniff out all of the operating system’s 0day vulnerabilities and other potential weaknesses? (In case you’re wondering, “No” is the correct answer to this question.)

6) iCloud problems, you’re gonna have them. In this particular release, iCloud is changing everything– and that means it will probably be changing server environments, too. It’s very highly likely that your device, if upgraded, will stop synching/communicating with Mavericks and iOS 7 devices. No bueno!

Today’s WWDC keynote was a show-and-tell session of some pretty exciting stuff, a, but it’s important to note that Apple’s iOS 8 was released to a community whose feedback, over the next three months, will help them polish and refine the work they’ve been doing since last Fall’s public release.

Still thinking about downloading that hot new OS? You’re not going to get to the singularity or any other fully digitally connected cyborg future by downloading the latest operating system before anyone else has it, and by putting yourself through unnecessary pain to boot. So cool your heels, put down the credit card, and wait to install iOS 8 with the rest of us when it is in full release this Fall.

We (the regular people) will need all of the help we can get crashing Akamai’s servers (if Apple hasn’t replaced them with their own CDN)  two years in a row ;)

Did I miss any other good reasons to wait before updating? Let me know in the comments!

What To Do When You’re a Teacher Being Cyberbullied #edsec #edtech #edchat

Image

A few days ago, a good friend approached me about a difficult situation taking place in her classroom. After noticing that a student had given her a disparaging nickname in an email, she was devastated when she came across numerous mean-spirited, false comments made about her by that student on a social network.

This wasn’t the first time it had happened in her school– but it was the first time it had happened to her, and she wasn’t sure how to bounce back from something that has marred the last few weeks she had with her students this year. What should she do to protect herself from this in the future? Continue reading

Teachers cyberbullied by students and their parents

Jessy:

This piece is a must-read for educators as it has especially helpful advice for documenting abusive behaviors from students and parents on social media.

Originally posted on Naked Security:

Teacher. Image courtesy of Shutterstock One in five UK teachers have been cyberbullied by students and/or their parents, according to a survey published by the teachers’ union NASUWT.

According to the union’s press release, one in five respondents – 21% – reported being the target of nasty comments posted on social media sites.

Out of those comments, 64% were posted by pupils, 27% were from parents, and 9% came from both pupils and parents.

Trolling of teachers has the same rank odor as that of other groups: “abusive and highly offensive language” is common, the survey found, while the content can focus on teachers’ appearance, competence or sexuality.

Most of the comments were posted by secondary pupils, and most relied on Facebook to deliver their toxins.

The pupils’ posts broke down like so:

  • 47% of respondents received insulting comments.
  • 50% had a comment made about their performance.
  • 26% saw videos/photos posted of them that had…

View original 439 more words

How Educators Can Protect Students’ Data from Security Breaches

This article was written for MindshiftKQED, where it appeared here.

getty

By Jessy Irwin

Every day, teachers are responsible for maintaining numerous logins, passwords, data, and other private information about their students. As chief technology officer in the modern century classroom, an educator’s role becomes more complex (and potentially overwhelming) as more tablets, computers, and web tools are put in the hands of students. With so many tools, security and privacy are often an afterthought despite the increasing number of websites that fall victim to data breaches and security vulnerabilities each day.

Last week, researchers discovered Heartbleed, a massive security flaw in an encryption tool used to protect data across some of the most popular sites on the web. For almost two years, this hole in OpenSSL may have quietly left two-thirds of the web vulnerable to eavesdropping, leaking private data including logins, passwords, and other information stored in Web servers to anyone who might be listening. Given the enormous amounts of information entrusted to teachers about their students, colleagues, and their communities, here are a few important measures teachers can take to protect themselves from Heartbleed.

  • Don’t login to a site or attempt to change your passwords unless you’re certain that a vulnerable site has been fixed. Though most major web companies have fixed the Heartbleed bug, it’s important to note that logging in and changing passwords on a vulnerable site will leave you vulnerable to the likelihood of an attack.

  • There are numerous resources that can help you determine whether a site is vulnerable or if it has been patched. If you use Google Apps for Education, Yahoo! Mail, Pinterest or Minecraft in your classroom and you haven’t changed your passwords in the last week, it’s safe to do so now. For Android users, this tool from mobile security firm Lookout will help identify whether your operating system is susceptible to Heartbleed. Alternately, there are many tools that can check encrypted sites for the bug herehere, and here.

  • Your online accounts are more likely to be compromised by a phishing attack that attempts to steal account credentials than a hacker exploiting Heartbleed to steal data from servers. Because public awareness of Heartbleed is high, malicious hackers will do their best to make the most out of this situation as they can. For maximum security, educators should be manually accessing the sites they use when they want to login and change passwords instead of clicking through links within an email.

  • If you’re using the same password for multiple accounts on the web, it is safest to assume all of the accounts using that password have been compromised. In the wake of major data breaches, criminals can and will employ tools that attempt to break into any online accounts they can. If you are one of many educators exercising this insecure habit, now is an excellent time time to break it. Password managers like LastPass1Password and KeePass are valuable tools that can help educators to generate, store, and audit passwords for all of your web accounts.

  • Heartbleed may be affecting your school or district network, too. Security engineers are beginning to discover that firewalls, switches, virtual private networks, servers and other important network hardware are also susceptible to the hole in OpenSSL. In some cases, the records of your current and former students stored in an SIS are vulnerable, and sensitive information could be leaked without a trace to the rest of the web. District technology leaders, technology coordinators, and anyone maintaining databases full of student information should double check with hardware vendors to confirm whether their systems need patching or not.

Though technologists and engineers have patched many of the sites vulnerable to Heartbleed, it’s impossible to determine if sensitive user data may have leaked onto the web. While there is no such thing as being completely safe from hacking and data breaches on the web, there are many preventative measures that can be taken to protect sensitive data and online accounts. If there’s a lesson that can be taken away from Heartbleed, it’s this– there’s never a bad time to be proactive about online security.

Jessy Irwin is a privacy and security advocate who once integrated technology and social media into a class of 3,000 students.

 

 

“We do not understand this tragedy. We know we did nothing to deserve it… no one deserves a tragedy.”

DCP_5005

Candlelight Vigil on the Drillfield at Virginia Tech, 4/17/2007

“We are strong, and brave, and innocent, and unafraid. We are better than we think and not quite what we want to be. We are alive to the imaginations and the possibilities. We will continue to invent the future through our blood and tears and through all our sadness.

We are the Hokies.

We will prevail.

We will prevail.

We will prevail.

We are Virginia Tech.”

- Nikki Giovanni, 4/17/2007

Does edtech need a cheerleader?

tswizzlecheerleader

Over the past few years, I’ve noticed a worrisome trend in the education community– the rise of the edtech cheerleader. I’m not talking about the teacherbloggers who are the first to integrate the trendiest of tech tools into their lesson plans (that’s another post.) I’m not talking about the teachers who champion technology in ways that extend archaic, ineffective practices in the classroom. I’m not even talking about the teachers pre-writing blog posts about how their tech-infused lessons before the lesson ever takes place (that’s another post). And in case you’re wondering, I’m not even talking about a few recent Techcrunch-y additions to the edtech blogging market. (That one’s a shocker, I know!)

Continue reading