Syllabus e-safety

De Wiki livre Netizenship
Révision datée du 15 juin 2011 à 15:13 par Jcbulliard (discussion | contributions) (CHAPTER 1 SYLLABUS - Basic knowledge on e-safety)

e-GUARDIAN - Syllabus V.2.x

Introduction : aims & resources

Aims

This wiki page aims at facilitating a collaborative synergic process for defining the syllabus on netsafety of the EU LdV e-Guardian project. Participants are delegates of partner's institutions from Lithuania, Latvia, Germany and Switzerland.

The resources are :

A web-based social bookmarking working group

on here on Diigo, we can post all related useful information on netsafety, such as :

- definition of key-words

- examples of quizz, pedagogical scenarios and other pedagogical resources

- related scientific articles

- other relevant initiatives

Guidelines for the syllabus

They wwere provided by the project's team coordinated by the LIA organisation, and specially the syllabus workpackage leader, ecdl.lt, represented by Eugenijus Telesius and his team composed of Renata Danieliene & Tomas Lygutas, which is complemented by partner's delegate Algimantas Merkys (LIA, the coordinator's team), Dennis Krannich (Bremen Univbersity), Théo Bondolfi & Rémi Lévy (APTES Switzerland).


These guidelines are :

1. Focus on e-safety offline as well as online, therefore always taking into account basic needs (such as password storage) as well as complex needs (such as behaviour in web2 environments).

2. Taking into account all key-points in this initial version, and considering these key-point as "objects" whcih can be replaced in other forms but which must stay available.

3. respecting the steps of user point of view (example : 1 start computer, 2 launch application...)

4. restructuring with categories and sets like in the policies of ECDL [1]

5. keeping as much as possible the existing phrases and formulations, only changing (merging, repositioning, pionderating) when it suits the next step of test/scenarios

6. Keeping in mind the final intention of equity between risks & opportunities proposing positive practices (opportunities, in an educative perspective) and preventing bad practices (risks, which creates fear), based on the vision of the slide 10 of this presentation of Anne Collier, which says that netsafety3.0 should be :

- research-based, not fearbased, therefore relevant

- flexible & layered, instead of "one-size-fits-all"

- respectful of learning culture : stakeholders in positive experience, not just potential victims

- positive, empowering : not just safety from, but safety for...

- full, constructive engagement in participatory society (that's the context of the construction of this syllabus)

Mind mapping for the key-notions of the syllabus

E-safety.png

In addition, Rémi Levy from APTES has produced a mind mapping image to represent all the notions for the e-safety syllabus. You can access to the interactive map - You can modify it directly because we keep a copy of the precedent contribution.

CHAPTER 1 SYLLABUS - Basic knowledge on e-safety

New Syllabus version of Lithiania Team - 2011-06-15

===========================

1.1. Understand the differences of information contents (open, private, business, etc.).

1.2. Be aware of privacy protection legal act (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies, etc).

1.3. Understand the notion of identity.

1.4. Be aware of different identity for authorization theft methods (skimming, pretexting, shoulder surfing, information diving).

1.5. Know about social engineering and it’s methods.

1.6. Be aware of cyber crime, online predators, financial scams, harm and who to contact if discovered illegal data.

1.7. Understand computer infection threats (viruses, Trojan horses, spyware, dishonest adware, etc.). Know when and how malicious software can get into computer system.

1.8. Know about organizational security: school security, usage of school web pages, content publishing, access, etc.

1.9. Know about netiquette and other basic codes of conducts in the cyberspace (RFC 1855).

===========================


IT IS BETTER IF COMMENTS AND DISCUSSIONS ARE MADE THE DISCUSSION PAGE

1.1. History : from static web1 to dynamic web2 environments

1.2. Intention : web3 proposing constructive engagement in participatory society (or : security through light instead of old model of security through obscurity.

1.3. Know about equity between opportunities & risks since web2

1.4. Know about netiquette and other basic codes of conducts in the cyberspace (RFC 1855)

1.5. Know about social engineering and it’s methods, including participative culture and abuses if you don't understand/respect them, for example having your password stolen (to be reformulated)

1.6. Understand the differences of contents (functional, factual, creative) of information

1.7. Understand the differences of formats (open, privative)

1.8. Understand the notion of identity (maybe to be repositioned in some other chapter)

1.9. eTools : Product versus function

1.10. Be aware of different identity for authorization theft methods (skimming, pretexting, shoulder surfing, information diving…)

1.11. Be aware of privacy protection legal act (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies and so on).

1.12. Organizational security (school security) – or social engineering?, usage of school web pages, content publishing, access

CHAPTER 2 SYLLABUS - Privacy and data management

2.0. Distinguish between data and information (RL)

2.1. Understand the opportunities and risks of digital data management from fully collaborative to full privacy.

2.2. Know about multi-layer password creation, changing and keeping password policies.

2.3. Know about safe computer login methods.

2.4. Understand the meaning and importance of access rights.

2.5. Know multiple user accounts on various digital environments. Understand what a personal user account is and how data of different users is separated.

2.6. Be aware of data encryption, decryption and password protected files, transfer?

2.7. Understand what intellectual property on Internet is and be aware of privacy protection legal act. --(Privacy protection legal act is already mentioned in 1.11. Lets make this one only "Understand what intellectual property on Internet is."--by Mantas (Lithuania team) 8 juin 2011 à 16:11 (UTC) )

2.8. Understand the benefits and purpose of data and backups and be able to restore lost data.

2.9. [2.9 to 2.11 to me merged "Privacy Management"- RL Know how to start and finish safe browsing session (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing.

2.10. Know how to browse the Web securable. Know about advantages, disadvantages and dangers of Internet cookies. Know about tools that ensure safety when browsing the Internet (blocking of cookies, ActiveX control, etc.)
2.11. [#Privacy-RL] Be able to manage, clear temporary Internet files, browser history, passwords, cookies, and autocomplete data.

--(2.9 , 2.10 , 2.11 may be consolidated and must be moved to chapter 5 --by Mantas (Lithuania team) 8 juin 2011 à 16:17 (UTC))

CHAPTER 3 SYLLABUS - Security tools and network security

3.1. Know computer network types , (local area network (LAN), wide area network (WAN), virtual private network (VPN)) and why protection is needed.--Renata (Lithuania Team) 8 juin 2011 à 16:19 (UTC)

3.2. Know different network connection methods (Mobile networks, Wireless, Cable).

3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network.--by Mantas (Lithuania team) 8 juin 2011 à 16:30 (UTC)

3.3. Sharing and accessing resources over network (Files, Printer, Screen).

3.4. Understand safety means of computer networks (Firewall, Antivirus, Password protection, Connection encryption – wireless). --(Firewall, Antivirus, Password protection, Connection encryption are all already mentioned in other items and fit there by content and integrity better. We recommend to cross this 3.4. out at all)--by Mantas (Lithuania team) 8 juin 2011 à 16:36 (UTC)

3.5. Be able to use standard OS integrated protection tools.

3.6. [[#see how integrate 3.5 to 2.11 : "All about malware and intrusion protection tools" - RL]] Know what a quality anti-virus, anti-spyware, spam blocker, and personal firewall is and how to use it. (Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.), know that it is unsafe to turn antivirus software off and know consequences). Distinguish different modes of antivirus protection (active, passive…). --(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --by Mantas (Lithuania team) 8 juin 2011 à 16:25 (UTC))

3.7.[#Updating operating system- RL]. Know how to follow, download and use updates for your operating system, software and importance of antivirus definition files. Understand the benefits of these updates. --(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --by Mantas (Lithuania team) 8 juin 2011 à 16:25 (UTC))
3.8. Distinguish different modes of antivirus protection (active, passive…).[# see also 3.6]--(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --by Mantas (Lithuania team) 8 juin 2011 à 16:25 (UTC))
3.9. Know what has to be done and in what order, if you suspect that computer system is infected.
3.10. Distinguish infected files deletion, quarantining and curing.
3.11. Informal and formal periodic external checkup. --(what do you mean by "checkup")--by Mantas (Lithuania team) 8 juin 2011 à 16:30 (UTC)

CHAPTER 4 SYLLABUS - Children, newcomers in schools and workplaces : means of safe use for socio-digital inclusion

--(what is a socio-digital inclusion? Maybe we can shorten this chapter name to "Children, newcomers in schools and workplaces"?--by Mantas (Lithuania team) 8 juin 2011 à 16:49 (UTC) )

4.1. Understand the impact of communication with new users about safety in IT World,

4.2. Policy : Be able to develop policies and applicate methods for children’s use of the computer and the Internet (depending on age and socio-cultural situation)

4.3. Understand the purpose of monitoring, filtering and controlling tools against children computer usage and web browsing.

4.4. Understanding advantages and limitations with protection software.


--(Need more items in this chapter. After consolidation in Latvia this chapter has become even shorter than it was. And it was already short :). Maybe we can try to expand again to look more like the previous version, but less stick to children, as you mentioned in Latvia)--by Mantas (Lithuania team) 8 juin 2011 à 16:49 (UTC)

CHAPTER 5 SYLLABUS - Social networks and safe usage of the Internet

5.1. Know when and in which cases personal information can be published on the Internet, i.e. status publishing about leaving home,.

5.2. Understand what a social network is, what are opportunities and risks of social network. Age groups of using social networks. Options and parameters for information disclosure. Understand that it is not safe to disclose information about user accounts, passwords and so on.

5.3. Know different social network types and be able to use them harmless and safe (appropriate account privacy settings).

5.4. (Publishing content)Know what type of information recommended to be published on social network, be responsible for published content, know impacts

5.5. Be able to safely connect to e-Services and secure environments– connecting and using, recover lost passwords.

5.6. (Emails)Be able to send/receive e-mail securely. Know how to reject email from specific email addresses. Know how to treat email messages from unknown senders

5.7. (Spam and malware) Be able (understand) to use network resource controlling software and hardware. Know about email that is classified as spam, and email messages infected with malware.

5.8. Be aware of network resource controlling software and hardware. Know how to reject email from specific email addresses.Know about scam, hoax, chain letters...[5.7 & 5.8 to be merged - RL]

5.9. Understand threats of virtual communication: virtual dating, bullying, commenting,

5.10. Dependency and addiction to the Internet. [# to be develop - TL]

5.11. Understand 'threats of inappropriate content for different groups of people (duality of personality, psychological harm, racism, religious sect, alluring to buy something or disclose your information, information about drugs, violence and so on)

5.12. Reliability of information (Understand that it is not safe to disclose information about user accounts, passwords and so on. can not fully trust content and identities on the internet. (i.e. blogs, Wikipedia, etc).

5.13. Reputation management. Know who you should contact if you discovered inappropriate information about you or your related digital identities. .

5.14. Abuse management, cyber bullying, cyber-mobbing, when is it possible to remove, when to put additional correct information.

5.15. Understand that online socializing reflects "real life"

5.16. Know about the 2 types of social networking : Friendship-driven and Interest-driven --(Social networks types are already mentioned in 5.3. Maybe it can be consolidated or is it different at all?)--by Mantas (Lithuania team) 8 juin 2011 à 17:03 (UTC)

5.17. Understand what is Online Safety 3.0 : research-based, Flexible, layered, Respectful, Positive, empowering, contextual....

5.18. Know reputation and legal safety

5.19. Know about identity, property and community safety

5.20. Understand why digital citizenship is protective and is the best filter ever : pre-installed, free of charge, improve with use...

--(In previous version before Latvia meeting there were items:
Be aware of safe instant messaging. Understand confidentiality while using IM like: file sharing, non-disclosure of important information and etc.
Know about social viruses, chain letters.
Know threats of virtual communication (social networks, IM, e-mail and ect.): virtual dating, bullying, commenting, and dependence on the Internet.
We could consolidate those, but we think that safe IM and social threats are important too and should be included)--by Mantas (Lithuania team) 8 juin 2011 à 16:56 (UTC)

Another Mind mapping

Notions-and-concepts.png

You can access to the dynamic mapp here notions and concepts

Proposition