Monday, December 22, 2014

5 Research Topics Essential Questions (1): Technology

I. Technology

Pro/Con and Essential Questions


1. Children’s Online Protection Laws

Should the government enact and enforce laws to protect children from explicit Internet content?


Children should be protected from exposure to inappropriate content and experiences.The Children's Internet Protection Act (CIPA), signed into law in 2000, mandates that schools and libraries that receive federal funding for Internet access certify that they have protective measures that block or filter access to pictures that are obscene or child pornography. 

2. Cyberbullying

Should schools and lawmakers do more to protect kids from cyberbullies?

An increase in rules and laws would do little to lessen cyberbullies. Teenagers are particularly susceptible to cyberbullying because of their increasing reliance on cell phones and computers for social networking. The psychological damage inflicted by cyberbullying can be just as severe, and have more long-lasting consequences than physical aggression. Some people think that bullying is part of childhood and that not much can be done to deter it, especially if it is done online. Others say that educators have overreacted to cases of cyberbullying and instituted rules that limit the free speech rights of students. However, in light of some recent cases where students have committed suicide after being cyberbullied, lawmakers in many states have initiated legislation that would require school districts to establish policies to protect against cyberbullying and to punish the bullies.

3. Cybercrime
Should companies that store personal digital data be subject to federal regulation?


Companies that store personal digital data should be responsible for protecting it. Identity theft  is one of the fastest growing computer crimes in the U.S. Identity theft is the criminal act of acquiring or exploiting personal information that is legally assigned to another individual. This can include, but is not limited to, a person's name, address, Social Security number, driver's license number, bank account numbers, credit or work history. The prevalence of this crime is a result of many factors, including the abundance of personal information available to sophisticated criminals via the Internet. Fraudulent use of stolen personal information allows criminals to assume the identity of the victim for their own financial gain. It can take years to repair the damage done to one's credit and return to good financial standing. The U.S. government has recognized a responsibility to protect citizens from identity theft and has recruited the postal service, FBI, Secret Service, and Federal Trade Commission to join in the effort to detect and prevent the crime. In addition, many companies are taking it upon themselves to implement improved security measures that will protect against unlawful access to their databases. Companies would be more effective than one big branch protecting data.

4. Cybersocializing/Online Social Networks

Do the positive aspects of social networking sites outweigh the negatives?

Regardless due to negative criticism, online social networks provide new opportunities for developing and maintaining social and work relationships. Revealing private information on social networking sites is foolish and can be dangerous, especially for young people. However, kids are not addicted to the Internet, as their parents fear, they're addicted to each other, as they always have been getting together with their peers is an absolute necessity for young people learning how to live in the wider world. However, young people are often naïve to the fact that information and photos they post on these sites can come back to haunt them when they apply for college or jobs.



5. Cyberwarfare
Do we need an international cyberwar treaty?










.
An international cyberwar treaty would be impossible to enforce and would not stop terrorist groups from launching cyberattacks. But to make that process productive, the US itself-while resisting the temptation to do to others what America condemns others for doing-must make certain that its vulnerabilities are not easily exploited by adversaries that are difficult to identify.

6. Distracted Driving
Are tougher laws needed to combat distracted driving?

All states need to enact laws prohibiting activities such as texting and cell phone use while driving. However, the emphasis should be on educating people about the dangers of distracted driving. Distracting activities include using a cell phone (talking or texting), eating, drinking, talking to passengers, applying makeup and other grooming activities, reading, using a navigation system, watching a video, and changing music selections on the radio, CD, or MP3 player. The most dangerous of these activities is texting, which involves all three types of distraction. According to the National Highway Traffic Safety Administration (NHTSA), the age group with the greatest proportion of distracted drivers is the under-20 age group. Many states have enacted laws banning certain types of driving distractions and there are many restrictions on cell phone use while driving

7. Filtering Software
Should filtering software be used?

Filtering software prevents access to sites that may be inappropriate. The Federal Government will introduce compulsory internet filtering to block overseas sites which contain criminal content, including child sex abuse and sexual violence. It saves children's innocence with explicit and risque content. However, over-filtering in schools can harm education because schools and libraries nationwide are routinely filtering internet content far more than what the Children's Internet Protection Act (CIPA) requires. Blocking all froms of sexual content can prevent children from searching sexual health advice.

8. Popular Culture
Does the spread of pop culture harm society?




      


Pop Culture has the ability to broaden learning methods. I think it's based on the type of popular culture Video games are fascinating because the player is forced to respond as quickly as possible to be effective, and that obliterates the kind of critical thinking that makes you consider the consequences of your actions. So it's different from film, which is a more removed experience where you aren't forced to react. Film is more complex, and there are lots of theories and studies about the effects of violence in movies on society. Whether the effects are equal for everyone who watches a film is unknown, for one thing. But also in film, there are uses of violence that force us to question violence in society, and some filmmakers use violence to make us think about violence and its effects so not all violence in film has a negative effect. However, it can be unoriginal, vulgar and even threatening to society if it promotes a negative message. However, films can be entertaining, and fun for many different groups of people.

9. Virtual Currencies
Will virtual currencies become as common as conventional currencies?


Virtual currencies can be used to make global online transactions quickly, anonymously and cheaply. Some digital currencies, such as Bitcoin, are cryptocurrencies, as they use cryptography for security and anti-counterfeiting measures over an open networked environment, such as the Internet. As with traditional money, virtual currencies may be used to buy goods and services in the real world, but can also be used in certain virtual communities and online games or social networks to purchase virtual goods and services. Advocates of virtual currencies cherish their anonymity, low transfer fees and quick transaction speed. Opponents of such currencies contend that they are unstable, lack government backing and lend themselves to illegal purposes.

10. Web 2.0
Has Web 2.0 technology made this generation of students smarter than past generations?

The new technology is changing the way students learn. Blogs, wikis, podcasts, and social networking technologies have changed the way we learn, communicate, and exchange ideas. These changing technologies have also presented challenges to our schools, many of which have not kept pace with the new practices. Some educators complain that this generation of students, which has been exposed to technology since elementary school, is less intelligent than previous generations. They claim that because students are communicating by text messages and on social networking sites they don't develop the writing and language skills they need for higher education and the workplace. Other educators are more eager to incorporate Web 2.0 technologies in the classroom and help students develop the skills they will need in the 21st century. While society evolves, so does technology which improves the learning curriculum.


No comments:

Post a Comment