Thursday, 18 April 2013


WHAT TECHNOLOGIES DO WATCH HERE J




Here's a rundown of some of the main technologies you should be aware of, as well as some of their benefits and risks.
If you come across other terms you don't recognise on the Teachtoday website, go to our jargon buster.
And if you want to know more about the potential benefits and risks of these technologies, you'll find Childnet's Know It All guide for teachers and page 6 of the DfE's Cyberbullying Guidance useful.
technology
About the technology
Benefits include...
Be aware of the following...
Social
net working
Social networking services enable users to set up a profile and build and manage their own community online. This can be done on the internet or on some mobile devices and is becoming an increasingly popular way of interacting with, often vast, networks of people.
Some of the most common social networking activities are communicating and socialising with existing friends; Meeting new people; Creating and uploading content (such as blogs, photos or music); Sharing third-party content (like photos and videos); And taking part in community and collaborative activities such as music and politics.
Social networking services include Bebo, Facebook, Faceparty, Flickr, Google Buzz, MySpace, and Piczo. Some social networking services have themes - Flickr is for publishing and sharing photos; MySpace is for connecting people, content and culture; YouTube is for posting, sharing and viewing video clips, for example.

You can socialise easily with your friends and family and make new friends; Encourages creativity in areas like music and film; Promotes collaboration between users; Helps develop communication and digital literacy skills.

Anyone can view your profile and personal information unless it is set to private; Could expose you to contact from strangers; Could be misused by bullies; Other people could post harmful/inappropriate information or images of you online; Fake profiles could be created.

Mobile phone
Nowadays, mobiles are not simply for talking and texting (SMS) - they offer a myriad of services, including picture messaging (MMS), built-in cameras, video capabilities, TV, mobile games and music.
Plus, the development of Wireless Application Protocol (WAP) means that you can access the internet from newer mobiles.
Sources: Various websites

Like a portable mini-computer; Good way to stay in touch with people; Offers independence and a feeling of security; Text messaging is a quick and (compared to calls) inexpensive way of keeping in touch; Multimedia messaging lets you send, receive and store photos, videos and music on your mobile; 3G mobiles allow you to check email, browse the internet, watch TV and video clips and play games while you're on the move.

You might receive nasty calls or text messages; You might be the victim of (or be sent) humiliating images; You could run up large bills from Premium Rate Services.

Web cams
Webcams (web cameras) are small cameras (usually, though not always, video cameras), whose images can be accessed using the Web, instant messaging, a PC video conferencing application or, in some cases, a mobile phone.
Most commonly, webcams are used to see a picture or video of someone you're talking to online.

Good for taking pictures or recording messages; Enable you to see and talk to someone live on your computer screen - useful for staying in touch with friends and family who don't live nearby, for example; Let you post messages, photos and videos on the internet.

You might be persuaded to act inappropriately or take and send inappropriate images of yourself to someone you've met online; You might see or be sent inappropriate webcam footage.

Wi-Fi
Wi-Fi is the trademark for the popular wireless technology used in home networks, mobiles, games consoles and other electronic devices, which enables them to connect to the internet without the need for wires.

Enables you to access your devices in a wider range of places, such as the garden or Wi-Fi hotspots in airports or hotels; Facilitates connection between different devices (eg games console and PC).

Wireless networks are particularly vulnerable to other users gaining access so you must ensure that security features are enabled.

Bluetooth
Bluetooth is a wireless protocol that provides a way to connect and exchange data over short distances from fixed and mobile devices, including digital cameras, mobiles and games consoles that are Bluetooth-enabled.

Provides wireless communication between devices, such as a mobile and a hands-free handset and a PC and printer; Enables wireless networking between PCs in a confined space.

Bluejacking - where a stranger or a company sends you a message or picture to your Bluetooth device; Bluesnarfing - where another Bluetooth user accesses data you have stored on your device - such as your address book, text messages and photos - without your authorisation.

Video-sharing
Video-sharing websites, like YouTube, enable users to upload video clips and share them with other internet users.

Makes it easy to view videos; Contain lots of interesting content, such as music videos and funny clips; Encourages creativity by enabling you to upload video clips you make and share them with others.

You might access inappropriate material, such as violent or sexually-explicit clips; Video clips you post might make you vulnerable to contact by strangers; Video clips of you posted by others might embarrass you; Video clips might encourage irresponsible behaviour, such as driving dangerously.

Downloading content legitimately
Many websites and retailers offer download options for music, films, games, ringtones and other content and pass on the royalties to the content producers.
Sources: Various websites

Makes it easy and quick to access music, films and other entertainment content; Lets you store content on your PC.
Unfortunately, some websites allow content to be downloaded without the permission of the producer and without rewarding them in any way - if you download from these sites you could be breaking the law; Downloading from unknown sites could put you at greater risk of viruses and hackers.

No comments:

Post a Comment