Syllabus e-safety : Différence entre versions

De Wiki livre Netizenship
(Another Mind mapping)
(CHAPTER 2 SYLLABUS - Privacy and data management)
 
(89 révisions intermédiaires par 4 utilisateurs non affichées)
Ligne 3 : Ligne 3 :
  
 
== Introduction : aims & resources ==
 
== Introduction : aims & resources ==
 +
 +
=== Criteria, which are important by developing e-GUARDIAN questions ===
 +
 +
•There should be two types of questions:
 +
 +
• question with four answers, of which one is correct,
 +
• question with image (hotspot questions), where answer could be marked in the picture.
 +
 +
•It is important to create four questions for each syllabus item
 +
 +
•It is advisable to create equal length answers (for example, if there would be three long answers and one short, which is correct, test taker could have a clue about correct answer)
 +
 +
•It is advisable not to use specific software in the questions (exceptions may be possible, the information about this software must be in the educational material).
 +
 +
--[[Utilisateur:Donarena|Renata (Lithuania Team)]] 20 juin 2011 à 07:47 (UTC)
  
 
=== Aims ===
 
=== Aims ===
 +
 
This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project.
 
This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project.
Participants are delagtes of partner's institutions from Lithuania, Latvia, Germany and Switzerland.
+
Participants are delegates of partner's institutions from Lithuania, Latvia, Germany and Switzerland.
  
 
The resources are :  
 
The resources are :  
Ligne 22 : Ligne 38 :
  
 
=== Guidelines for the syllabus ===  
 
=== Guidelines for the syllabus ===  
They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Engenijus Telesius and his team composed of Renata Danieliene & Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi & Rémi Lévy (APTES Switzerland).  
+
They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Eugenijus Telesius and his team composed of Renata Danieliene & Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi & Rémi Lévy (APTES Switzerland).  
  
  
Ligne 51 : Ligne 67 :
 
=== Mind mapping for the key-notions of the syllabus ===
 
=== Mind mapping for the key-notions of the syllabus ===
  
[[Fichier:e-safety.png|1050px|]]
+
In addition, Rémi Levy from APTES has produced a [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea mind mapping image] to represent all the notions for the e-safety syllabus. You can access to [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea the interactive map] - You can modify it directly because we keep a copy of the precedent contribution.
 +
 
 +
== Other possible structure of the syllabus - A.P.T.E.S proposition ==
  
In addition, Rémi Levy from APTES has produced a [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea mind mapping image] to represent all the notions for the e-safety syllabus. You can access to [http://www.mindomo.com/view.htm?m=0a1258e0720347bab585be7ac0e7baea the interactive map] - You can modify it directly because we keep a copy of the precedent contribution.
+
[http://netizen3.org/index.php/Proposition access to the page]
 +
 
 +
== CHAPTER 1 SYLLABUS - Basic knowledge on e-safety ==
 +
 
 +
<span style="color:#FF0000">NOTICE IT IS BETTER IF COMMENTS AND DISCUSSIONS ARE MADE ON THE DISCUSSION PAGE </span>
 +
 
 +
<span style="color:#FF0000">New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:28 (UTC)
 +
 
 +
1.1. Understand the differences of information [[contents]] (open, private, business, etc.).
 +
 
 +
1.2. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: when publishing, writing comments, downloading,etc)
 +
 
 +
1.3. Know about '''[[equity between opportunities & risks]]''' of [[web2]]
  
== Basic knowledge on e-safety ==
+
1.4. Understand the notion of '''[[identity]]'''.
  
1.1. History : from static '''web1 to''' dynamic '''web2''' environments
+
1.5. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving).
  
1.2. Intention : '''[[web3]]''' proposing constructive engagement in participatory society (or : [[security]] through light instead of old model of [[security]] through obscurity),
+
1.6. Know about '''[[social engineering]]''' and its methods.
  
1.3. Know about '''equity between opportunities & risks''' since [[web2]]  
+
1.7. Be aware of cyber crime, online predators, financial scams, harms and who to contact when discovering illegal data.
  
1.4. Know about '''[[netiquette]] and other basic codes''' of conducts in the cyberspace (RFC 1855)
+
1.8. Understand computer infection threats (viruses, Trojan horses, spyware, dishonest adware, etc.). Know when and how malicious software can get into computer system.
  
1.5. Know about '''[[social engineering]]''' and it’s methods, including participative culture and abuses if you don't understand/respect them, for example having your password stolen (to be reformulated)
+
1.9. Know about organizational [[security]]: school security, usage of school web pages, content publishing, access, etc.
  
1.6. Understand the differences of '''[[contents]]''' (functional, factual, creative) of information (I don't understand this item --[[Utilisateur:Remilevy|Rémi LEVY]] 7 juin 2011 à 07:51 (UTC)
+
1.10. Know about '''[[netiquette]] and other basic codes''' of conduct in the cyberspace (RFC 1855)
  
1.7. Understand the differences of '''[[formats]]''' (open, privative)
+
1.11. Understand what is [[Online Safety 3.0]] and why [[digital citizenship]] is protective.
  
1.8. Understand the notion of '''[[identity]]''' (maybe to be repositioned in some other chapter)
+
== CHAPTER 2 SYLLABUS - Privacy and data management ==
  
1.9.  '''[[eTools]]''' : Product versus function
+
<span style="color:#FF0000">New Syllabus version discussed on Thursday 16th June </span> --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:35 (UTC)
  
1.10. Be aware of '''different identity for authorization theft methods''' (skimming, pretexting, shoulder surfing, information diving…) [#must be repositioned into the scam/hoax (chapter 5 or 6)]
 
  
1.11. Be aware of '''[[privacy protection]] legal act''' (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies and so on).
+
2.1. [[Distinguish between data and information]].
  
1.12. '''Organizational [[security]]''' (school security) – or [[social engineering]]?, usage of school web pages, content publishing, access
+
2.2. Understand the opportunities and risks of digital '''[[data management]]''' from fully collaborative to full privacy.
  
== Privacy and data management ==
+
2.3. Know about multi-layer '''[[password]]''', changing and keeping password policies.
  
2.0. [[Distinguish between data and information (RL)]]
+
2.4. Know about '''safe computer [[login]] methods'''
  
2.1. Understand the opportunities and risks of (digital) '''[[data management]]''' from fully collaborative to full privacy.
+
2.5. Know why to use multiple user accounts (#or password ? --[[Utilisateur:Remilevy|Rémi LEVY]] 24 juin 2011 à 13:46 (UTC)) on various digital environments. Understand the meaning and importance of access rights (what a personal user account is and how data of different users is separated).  
  
2.2. Know about  multi-layer '''[[password]]''' creations and changing and keeping password policies.
+
2.6. Be aware of '''data encryption''', decryption and password protected files.  
  
2.3. Know about '''safe computer [[login]] methods'''.
+
2.7. Understand what [[intellectual property]] on Internet is.  
  
2.4. Understand the meaning and importance of '''access rights'''.
+
2.8. Understand the benefits and purpose of data '''backups''' and be able to restore lost data.
  
2.5. Know multiple user accounts on various digital environments. Understand what a '''[[personal user account]]''' is and how [[data]] of different users is separated.
+
== CHAPTER 3 SYLLABUS - Security tools and network security ==
  
2.6. Be aware of '''data encryption''', decryption and password protected files, transfer ?.
 
  
2.7. Understand what '''[[intellectual property]]''' on Internet is and be aware of [[privacy protection]] legal act.
+
<span style="color:#FF0000">New Syllabus version discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:24 (UTC)
  
2.8. Understand the benefits and purpose of data and '''backups''' and be able to restore lost data.
+
3.1. Know computer '''network types''' : local area network (LAN), wide area network (WAN), virtual private network (VPN) and why protection is needed.  
  
2.9. [2.9 to 2.11 to me merged "'''Privacy Management'''"- [[RL]] Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of not safe browsing.
+
3.2. Know different network '''connection methods''' (Cable, Wireless, Mobile networks).  
  
: 2.10. Know how to browse the Web securable. Know about advantages, disadvantages and dangers of Internet '''cookies'''. Know about tools that ensure safety when browsing the Internet (blocking of cookies, ActiveX control, etc.)
+
3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network.  
  
: 2.11. [#Privacy-RL] Be able to manage, clear temporary Internet files, browser history, passwords, cookies, and autocomplete data.
+
3.4. '''Sharing and accessing resources''' over a network (files, printer, desktop).  
  
== Security tools and network security ==
+
3.5. Understand safety means of computer networks (airewall, antivirus, anti-spyware, spam blocker, password protection, connection encryption – wireless).
  
3.1. Know computer '''network types''' and why protection is needed. local area network (LAN), wide area network (WAN), virtual private network (VPN)
+
3.6. Be able to use standard OS integrated protection tools.  
  
3.2. Know different network '''connection methods''' (Mobile networks, Wireless, Cable).
+
3.7. Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.). Distinguish different modes of antivirus protection (active, passive).
  
3.3. '''Sharing and accessing resources''' over network (files, printer, screen),
+
3.8. Know what has to be done and in what order, if you suspect that your computer system is infected. Distinguish between infected files deletion, quarantining and curing.
  
3.4. Understand '''safety means of computer networks''' (Firewall, Antivirus, Password protection, Connection encryption – wireless)
+
3.9. Know how to '''follow, download and use updates for your operating system''', software and importance of antivirus definition files. Understand the benefits of these updates.
  
3.5. Be able to use standard '''OS integrated protection tools'''.  
+
3.10. Be able to run informal and formal periodic [[external checkup]].
  
3.6. [[#see how integrate 3.5 to 2.11 : "'''All about  [[malware]] and intrusion protection tools'''" - RL]] Know what a quality anti-virus, anti-spyware, spam blocker, and personal [[firewall]] is and how to use it. (Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.), know that it is unsafe to turn [[antivirus]] software off and know consequences). Distinguish different modes of antivirus protection (active, passive…).
 
  
: 3.7.[#Updating operating system- RL]. Know how to follow, download and use updates for your operating system, software and importance of antivirus definition files. Understand the benefits of these updates.
+
</span>
  
: 3.8. Distinguish different modes of antivirus protection (active, passive…).[# see also 3.6]
+
== CHAPTER 4 SYLLABUS - Minors and newcomers on the net ==
  
: 3.9. Know what has to be done and in what order, if you suspect that computer system is infected.
+
New Syllabus version discussed on Thursday 16th June - --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 08:53 (UTC)
  
: 3.10. Distinguish infected files deletion, quarantining and curing.  
+
4.1. Understand the impact of communication with minors and new users about safety in IT World.
  
: 3.11. Informal and formal periodic external checkup.
+
4.2 Understand the purpose of monitoring, filtering and controlling tools for safer internet use of minors
  
== Children, newcomers in schools and workplaces : means of safe use for socio-digital inclusion ==
+
4.3. Be aware of different ways to educate, monitor and control usage of social networking and other web sites.
  
4.1. Understand '''the impact of communication''' with new users '''about safety''' in IT World,
+
4.4. Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation).
  
4.2. Policy : Be able to '''develop policies and applicate methods''' for children’s use of the computer and the Internet (depending on age and socio-cultural situation)
+
4.5. Understanding advantages and limitations with protection software
  
4.3. Understand the purpose of '''monitoring, filtering and controlling tools''' against children computer usage and web browsing.
+
</span>
  
4.4. Understanding '''advantages and limitations with protection software'''.
+
== CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet ==
  
== Social networks and safe usage of the Internet ==
+
New Syllabus version as discussed on Thursday 16th June --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:05 (UTC) -
  
5.1. Know when and in which cases '''personal information''' can be published on the Internet, i.e. status publishing about leaving home,.
 
  
5.2. Understand what a social network is, what are '''opportunities and risks of social network'''. Age groups of using social networks. Options and parameters for information disclosure. Understand that it is not safe to disclose information about user accounts, passwords and so on.
+
5.1. Know how to '''start and finish safe browsing session''' (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing.  
  
5.3. Know different '''social network types''' and be able to use them harmless and safe (appropriate '''account privacy settings''').
+
5.2. Know about'''advantages, disadvantages and dangers of Internet cookies''' and ActiveX control. Know about tools that ensure safety when browsing the Internet.
  
5.4. ('''Publishing content''')Know what type of information recommended to be published on social network, be responsible for published content, know impacts
+
5.3. Be able to manage: temporary Internet files, browser history, passwords, cookies and autocomplete data.
  
5.5. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords.  
+
5.4. Be able to safely '''connect to e-Services and secure environments'''– connecting and using, recover lost passwords.
  
5.6. (Emails)Be able to '''send/receive e-mail securely'''. Know how to reject email from specific email addresses. Know how to treat email messages from unknown senders
+
5.5. Know when and in which cases personal '''information can be published on the Internet''' (i.e. status publishing about leaving home).
  
5.7. (Spam and malware) Be able (understand) to use '''network resource controlling software and hardware'''. Know about email that is classified as spam, and email messages infected with malware.  
+
5.6. Know who you should contact if you discovered inappropriate information about you or your related digital identities.
  
5.8. Be aware of network resource controlling software and hardware. Know how to reject email from specific email addresses.Know about scam, hoax, chain letters...[5.7 & 5.8 to be merged - RL]
+
5.7. Understand that it is necessary to exercise critical thinking about content and identities on the internet. (i.e. blogs, Wikipedia, social networks, forums, etc). #reformulated by --[[Utilisateur:Remilevy|Rémi LEVY]] 17 juin 2011 à 09:22 (UTC)
  
5.9. Understand threats of '''virtual communication''': virtual dating, bullying, commenting,  
+
5.8. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on)
  
5.10. '''Dependency and addiction to the Internet'''. [# to be develop - TL]
+
5.9. Understand what an online social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand what is the fascination to disclose private information on the internet
  
5.11. Understand ''''threats of inappropriate content''' for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on)
+
5.10. Know different '''social network types''' (Friendship-driven and Interest-driven) and be able to use them harmless and safe (appropriate account privacy settings).
  
5.12. '''Reliability of information''' (Understand that it is not safe to disclose information about user accounts, passwords and so on. can not fully trust content and identities on the internet. (i.e. blogs, Wikipedia, etc).
+
5.11. Know what type of information recommended to be published on social network, be responsible for published content, and know impacts
  
5.13. '''Reputation management'''. Know who you should contact if you discovered inappropriate information about you or your related digital identities. .
+
5.12. Understand that online socializing reflects "real life".  
  
5.14. '''Abuse management''', cyber bullying, cyber-mobbing, when is it possible to remove, when to put additional correct information.
+
5.13. Be able to send/receive e-mail securely: know how to reject email from specific email addresses. Know how to treat email messages from unknown senders, classified as spam and email messages infected with malware. Know about scam, hoax, chain letters.
  
5.15. Understand that online socializing reflects "real life"
+
5.14. Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information, etc.
  
5.16. Know about the 2 types of [[social networking]] : [[Friendship-driven]] and [[Interest-driven]]
+
5.15. Understand threats of online communication: virtual dating, bullying, commenting.
  
5.17. Understand what is [[Online Safety 3.0]] : research-based, Flexible, layered, Respectful, Positive, empowering, contextual....
+
5.16. Understand dependency and addiction to the Internet.
  
5.18. Know reputation and legal safety
 
  
5.19. Know about identity, property and community safety
 
  
5.20. Understand why [[digital citizenship]] is protective and is the best filter ever : pre-installed, free of charge, improve with use...
+
</span>
  
 
=Another Mind mapping=
 
=Another Mind mapping=
Ligne 187 : Ligne 211 :
 
[[Fichier:notions-and-concepts.png|1100px|]]
 
[[Fichier:notions-and-concepts.png|1100px|]]
  
You can access to the dynamic mapp here [[http://www.mindomo.com/edit.htm?m=64bf626021b940d99dd9576283c833bf notions and concepts]]
+
You can access to the dynamic mapp here [http://www.mindomo.com/edit.htm?m=64bf626021b940d99dd9576283c833bf notions and concepts]
 +
 
 +
[[Proposition]]

Version actuelle datée du 24 juin 2011 à 13:46

e-GUARDIAN - Syllabus V.2.x

Introduction : aims & resources[modifier]

Criteria, which are important by developing e-GUARDIAN questions[modifier]

•There should be two types of questions:

• question with four answers, of which one is correct,
• question with image (hotspot questions), where answer could be marked in the picture.

•It is important to create four questions for each syllabus item

•It is advisable to create equal length answers (for example, if there would be three long answers and one short, which is correct, test taker could have a clue about correct answer)

•It is advisable not to use specific software in the questions (exceptions may be possible, the information about this software must be in the educational material).

--Renata (Lithuania Team) 20 juin 2011 à 07:47 (UTC)

Aims[modifier]

This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project. Participants are delegates of partner's institutions from Lithuania, Latvia, Germany and Switzerland.

The resources are :

A web-based social bookmarking working group[modifier]

on here on Diigo, we can post all related useful information on netsafety, such as :

- definition of key-words

- examples of quizz, pedagogical scenarios and other pedagogical resources

- related scientific articles

- other relevant initiatives

Guidelines for the syllabus[modifier]

They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Eugenijus Telesius and his team composed of Renata Danieliene & Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi & Rémi Lévy (APTES Switzerland).


These guidelines are :

1. Focus on e-safety offline as well as online, therefore always taking into account basic needs (such as password storage) as well as complex needs (such as behaviour in web2 environments).

2. Taking into account all key-points in this initial version, and considering these key-point as "objects" whcih can be replaced in other forms but which must stay available.

3. respecting the steps of user point of view (example : 1 start computer, 2 launch application...)

4. restructuring with categories and sets like in the policies of ECDL [1]

5. keeping as much as possible the existing phrases and formulations, only changing (merging, repositioning, pionderating) when it suits the next step of test/scenarios

6. Keeping in mind the final intention of equity between risks & opportunities proposing positive practices (opportunities, in an educative perspective) and preventing bad practices (risks, which creates fear), based on the vision of the slide 10 of this presentation of Anne Collier, which says that netsafety3.0 should be :

- research-based, not fearbased, therefore relevant

- flexible & layered, instead of "one-size-fits-all"

- respectful of learning culture : stakeholders in positive experience, not just potential victims

- positive, empowering : not just safety from, but safety for...

- full, constructive engagement in participatory society (that's the context of the construction of this syllabus)

Mind mapping for the key-notions of the syllabus[modifier]

In addition, Rémi Levy from APTES has produced a mind mapping image to represent all the notions for the e-safety syllabus. You can access to the interactive map - You can modify it directly because we keep a copy of the precedent contribution.

Other possible structure of the syllabus - A.P.T.E.S proposition[modifier]

access to the page

CHAPTER 1 SYLLABUS - Basic knowledge on e-safety[modifier]

NOTICE IT IS BETTER IF COMMENTS AND DISCUSSIONS ARE MADE ON THE DISCUSSION PAGE

New Syllabus version discussed on Thursday 16th June --Rémi LEVY 17 juin 2011 à 08:28 (UTC)

1.1. Understand the differences of information contents (open, private, business, etc.).

1.2. Be aware of privacy protection legal act (be aware of the responsibility for own actions on the Internet: when publishing, writing comments, downloading,etc)

1.3. Know about equity between opportunities & risks of web2

1.4. Understand the notion of identity.

1.5. Be aware of different identity for authorization theft methods (skimming, pretexting, shoulder surfing, information diving).

1.6. Know about social engineering and its methods.

1.7. Be aware of cyber crime, online predators, financial scams, harms and who to contact when discovering illegal data.

1.8. Understand computer infection threats (viruses, Trojan horses, spyware, dishonest adware, etc.). Know when and how malicious software can get into computer system.

1.9. Know about organizational security: school security, usage of school web pages, content publishing, access, etc.

1.10. Know about netiquette and other basic codes of conduct in the cyberspace (RFC 1855)

1.11. Understand what is Online Safety 3.0 and why digital citizenship is protective.

CHAPTER 2 SYLLABUS - Privacy and data management[modifier]

New Syllabus version discussed on Thursday 16th June --Rémi LEVY 17 juin 2011 à 08:35 (UTC)


2.1. Distinguish between data and information.

2.2. Understand the opportunities and risks of digital data management from fully collaborative to full privacy.

2.3. Know about multi-layer password, changing and keeping password policies.

2.4. Know about safe computer login methods

2.5. Know why to use multiple user accounts (#or password ? --Rémi LEVY 24 juin 2011 à 13:46 (UTC)) on various digital environments. Understand the meaning and importance of access rights (what a personal user account is and how data of different users is separated).

2.6. Be aware of data encryption, decryption and password protected files.

2.7. Understand what intellectual property on Internet is.

2.8. Understand the benefits and purpose of data backups and be able to restore lost data.

CHAPTER 3 SYLLABUS - Security tools and network security[modifier]

New Syllabus version discussed on Thursday 16th June --Rémi LEVY 17 juin 2011 à 09:24 (UTC)

3.1. Know computer network types : local area network (LAN), wide area network (WAN), virtual private network (VPN) and why protection is needed.

3.2. Know different network connection methods (Cable, Wireless, Mobile networks).

3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network.

3.4. Sharing and accessing resources over a network (files, printer, desktop).

3.5. Understand safety means of computer networks (airewall, antivirus, anti-spyware, spam blocker, password protection, connection encryption – wireless).

3.6. Be able to use standard OS integrated protection tools.

3.7. Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.). Distinguish different modes of antivirus protection (active, passive).

3.8. Know what has to be done and in what order, if you suspect that your computer system is infected. Distinguish between infected files deletion, quarantining and curing.

3.9. Know how to follow, download and use updates for your operating system, software and importance of antivirus definition files. Understand the benefits of these updates.

3.10. Be able to run informal and formal periodic external checkup.


CHAPTER 4 SYLLABUS - Minors and newcomers on the net[modifier]

New Syllabus version discussed on Thursday 16th June - --Rémi LEVY 17 juin 2011 à 08:53 (UTC)

4.1. Understand the impact of communication with minors and new users about safety in IT World.

4.2 Understand the purpose of monitoring, filtering and controlling tools for safer internet use of minors

4.3. Be aware of different ways to educate, monitor and control usage of social networking and other web sites.

4.4. Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation).

4.5. Understanding advantages and limitations with protection software

CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet[modifier]

New Syllabus version as discussed on Thursday 16th June --Rémi LEVY 17 juin 2011 à 09:05 (UTC) -


5.1. Know how to start and finish safe browsing session (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing.

5.2. Know aboutadvantages, disadvantages and dangers of Internet cookies and ActiveX control. Know about tools that ensure safety when browsing the Internet.

5.3. Be able to manage: temporary Internet files, browser history, passwords, cookies and autocomplete data.

5.4. Be able to safely connect to e-Services and secure environments– connecting and using, recover lost passwords.

5.5. Know when and in which cases personal information can be published on the Internet (i.e. status publishing about leaving home).

5.6. Know who you should contact if you discovered inappropriate information about you or your related digital identities.

5.7. Understand that it is necessary to exercise critical thinking about content and identities on the internet. (i.e. blogs, Wikipedia, social networks, forums, etc). #reformulated by --Rémi LEVY 17 juin 2011 à 09:22 (UTC)

5.8. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on)

5.9. Understand what an online social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand what is the fascination to disclose private information on the internet

5.10. Know different social network types (Friendship-driven and Interest-driven) and be able to use them harmless and safe (appropriate account privacy settings).

5.11. Know what type of information recommended to be published on social network, be responsible for published content, and know impacts

5.12. Understand that online socializing reflects "real life".

5.13. Be able to send/receive e-mail securely: know how to reject email from specific email addresses. Know how to treat email messages from unknown senders, classified as spam and email messages infected with malware. Know about scam, hoax, chain letters.

5.14. Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information, etc.

5.15. Understand threats of online communication: virtual dating, bullying, commenting.

5.16. Understand dependency and addiction to the Internet.


</span>

Another Mind mapping[modifier]

Notions-and-concepts.png

You can access to the dynamic mapp here notions and concepts

Proposition