Security vs. access : balancing safety and productivity in the digital school / LeAnne K. Robinson, Abbie H. Brown, Tim D. Green.
Material type:
- 9781564842640 (pbk.)
- 1564842649 (pbk.)
- 371.33 22
- LB 1028.5 R658s 2010
Item type | Current library | Home library | Collection | Shelving location | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|---|---|
![]() |
Biblioteca Juan Bosch | Biblioteca Juan Bosch | Humanidades | Automatización y Procesos Técnicos (1er. Piso) | LB 1028.5 R658s 2010 (Browse shelf(Opens below)) | 1 | Available | 00000127291 |
Browsing Biblioteca Juan Bosch shelves, Shelving location: Automatización y Procesos Técnicos (1er. Piso), Collection: Humanidades Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
LB 1028.5 M878m 2016 Meeting common core technology standards : strategies for grades 9-12 / | LB 1028.5 M878m 2016 Meeting Common Core technology standards : strategies for grades K-2 / | LB 1028.5 M878m 2016 Meeting common core technology standards : strategies for grades 3-5 / | LB 1028.5 R658s 2010 Security vs. access : balancing safety and productivity in the digital school / | LB 1044.84 H783m 2017 Mobile learning mindset : the IT specialist's guide to implementation / | LB 1044.87 M234t 2015 Teaching online : a guide to theory, research, and practice / | LB 1050.38 H149p 2018 Personalized reading : digital strategies and tools to support all learners / |
Includes bibliographical references (p. 113-123).
Ch 1. The threat of security and its effect on access --
ch 2. Inappropriate content --
ch 3. Predators, or ensnaring young people --
ch 4. Misuse of mobile communication devices and cyberbullying --
ch 5. Network security vs. access --
ch 6. Inappropriate uses of the network --
ch 7. Copyright infringement --
ch 8. Data and identity theft --
ch 9. Exercising professional responsibility.
Emphasizes the importance of balance in creating school environments that are safe and productive. Provides educators, administrators, and IT staff the information they need to have constructive conversations about security challenges while still making sure students receive an effective, technology-infused education.
There are no comments on this title.