University of Central Arkansas Committee for the Dean’s Council
La’Cresha Henderson
Danielle Joanette
Nu’Rodney Prad
Justin Varghese
Spam
Spam costs the correspondent very little to send as most of the expenditures
Knowing the Harmful issues
Discussing the benefits of Preventative Measures
Future Implications
Phishers are people who attempt to steal your personal information and then your money. The person then sells the data to a "Casher" who is setup to use the data for identity theft, printing credit cards or just stealing your money.
Pretending to be from your financial institution, a legitimate retailer or government agency, the emails will contain a link that looks real, saying something like "Click here to Update your account" or to “confirm” your personal information.
Typically, the link will direct you to a fake website that are near-replicas of the real one, making it hard even for experts to distinguish between the real and fake web sites.
You enter your personal information onto the web site – and into the hands of identity thieves.
The emails can look very official, please click to see samples
• Spam also hurts consumers. Many people still pay hourly rates for Internet access, including those who use wireless Internet services and business travelers who download e-mail while on the road.
These consumers have to pay for the time they spend downloading these unsolicited messages to their computer from the Internet.
SPAM CHART
25
20
15
10
5
0
60
Click Link
0
Number of Spam Emails
• It takes 10 seconds to recognize that an email contains spam
• 60 spam emails takes 10 minutes of your time to delete
• When you click “remove from list” it automatically doubles the amount of time it takes to delete spam
• If each student takes 20 minutes a day to delete spam at the University of Central Arkansas that equates to:
20 minutes x 12,000 students = 4,000 hours of wasted learning time each day
• Most Internet Service Providers (ISPs) also limit the space available in account mailboxes for consumers to store e-mail messages. Spam fills mailbox space that consumers could utilize for other purposes. Viruses, Trojans, and other malicious scripts can attach themselves to spam and infect your computer the instant you open the message.
• Spammers also often push their mail throughout other people's systems. This allows spam creators to offload the real costs
(CPU time, e-mail account user time, disk space, etc.) onto other innocent third parties.
• Internet Service Providers (ISPs) and other businesses lose millions of dollars and hundreds of hours of productivity as a result of unsolicited commercial e-mail. Spam clogs the Internet, computer systems, and e-mail accounts slowing down operations and at times causing system shutdowns and failures.
is like the biological counterpart —it attaches itself and depends on a
infiltrate the computer, duplicate and attach itself to as many programs as possible.
been crafted to use up as much server time as possible. A DDOS attack can absorb a server's entire capacity and make it unavailable or “down” to its legitimate users for the duration of the attack.
Important tools include Appliances and Software: designed for the Novell Groupwise
Community with many features
Including:
Email Policy and Surveillance
Anti-Virus Tools
Anti-Spam Tools
Virus Defense
Anti-virus
Anti-phishing
Anti-spyware (Attachments)
Denial of Service
Picture Retrieved from: http://www.ironport.com/products/network_map_esa.html
User Perception
•
Spam may affect internet users by causing them to desert many public discussion forums for fear that their e-mail addresses will be harvested and added to junk mail lists. Many are afraid to give their addresses out in even legitimate commerce for fear of being added to and traded among thousands of mailing lists. Genuine businesses, institutional faculty, staff and even more specifically, admission officers are having second thoughts to use e-mail to communicate with their prospective customers and students for fear of being branded Net abusers. This distrust threatens to undermine the acceptance and growth of electronic commerce among the legions of new Internet users taking their first steps online.
Global Implications
•
Electronic mail is a tool of business and personal communication. It's simple, it's accessible, and it's becoming more and more an essential part of our professional lives. However, there are even more far-reaching potentials of e-mail that have a possibility of being lost if this mode of communication gets destroyed by the increased production of junk e-mail.
Technology
• When responsible computing behavior becomes more popular, tools dealing with
Spam Filtering, implementation of spyware and removal procedures, will continue to be strong factors in decreasing the amount of spam created.
LGBTQ Online is the phenomenon of providing students with departmental resources through the internet.
• This is a hot topic because cyberspace is serving many functions for
LGBTQ students. These include:
Educating- consists of collecting basic information
Networking- allows students to connect with a larger LGBTQ network community
Developmentfacilitates an individual’s ability to obtain knowledge on
LGBTQ issues and explore alternative ways of self-expression .
•Examples of such resources include:
Princeton’s LGBTQ Center website: http://www.princeton.edu/lgbt/
University of Michigan’s LGBTQ Affairs website: http://www.umich.edu/~lgbta/
•
Potential students in areas where physical LGBTQ resources are scarce can locate institutions of higher education that are LGBTQ-friendly through online searches.
Example: “ The Advocate College Guide for LGBT Students” is a book that is easily located on http://www.amazon.com
• Blogs, forums, and websites addressing LGBTQ issues offer 24/7 guidance on developmental issues and support through reaching a larger LGBTQ community.
Example: http://www.gay.com
Example: Pennsylvania State has an online LGBTQ resource center that hosts online discussion groups http://www.sa.psu.edu/lgbt/
Issue 1: Compromising Anonymity
The internet is a public space and personal information can be found —therefore putting aspects of the LGBTQ identity online through blogs, facebook profiles, or dating advertisement can have negative repercussions.
Example: One religious private institution used a gay student’s blog as evidence to expel
Issue 2: Personal Safety
The precautions of online personal safety are very similar to protective measures we use in everyday life. However, it is often difficult to identify users on the opposite side of computer terminals in chat rooms or blogs.
Example: Recently in October of 2006, three males were arrested and charged with a hate crime in New York City. These individuals were prosecuted for falsely luring a male through online resources on the pretences they were gay. They arranged to meet in a location where they intended to take personal belongings. When the victim attempted to flee the situation he was struck by a vehicle on a six lane highway.
Web sources will allow prospective LGBTQ Students to identify which institution of higher education is friendly to students of the LGBTQ community.
Online services allow those who are in the process of coming out, or those who may wish to remain discrete, ways to connect, gain information, and ask
Access to resources may help interpersonal development.
Example: In Chickering’s Seven Vectors model, the vector of
“Establishing Identity” includes becoming comfortable with one’s sexual orientation and the creation of self-concept through roles and lifestyles. Access to online resources and support may help facilitate this process.
Development of the whole LGBTQ student
• Institutions who make it a point to support and provide access to
LGBTQ friendly resources will promote growth and further development of the whole student; especially those identifying as
LGBTQ.
Development of classes on LGBTQ Studies and incorporation of
LGBTQ online issue into diversity training
• Scholars have discussed that online literacy may be different from academic literacy, and since the using the internet depends on writing skills, there may be a better development in these areas for LGBTQ students than what is seen in the classroom. Making these areas of interest a focus in class work has the potential for further educational development.
• Blogs have infiltrated every aspect of our lives including
Higher Education and Student Affairs. Faculty, staff, and students are using blogs as an extension of in-class teaching and communication. Blogs have begun to impact both teaching and learning methods.
• The internet blogosphere is incredibly active. There are over 175,000 new blogs every day. Bloggers update their blogs regularly to the extent of over 1.6 million posts per day, or over 18 updates a second. Blogs have changed the face of communication around the world.
• Blogging continues to experience technological advancements within itself that has changed the perception of institutions. Institutions of higher education have started to sponsor and support blogs.
A frequent, chronological publication of personal thoughts and web links .
Blogs are alternatively called weblogs.
• Political (Includes current political topics, commentary and campaign material)
• Personal (On-line journal and diary)
• Business (Promotion, advertising, information)
• Topical (Focuses on single issue or niche
• Health (Medical news, personal accounts with health issues)
• Literary (Focuses on a literature topic including the publishing industry)
• Travel (Travelers share stories and photos)
• Research (Includes research notes and issue discussions)
• Educational (Course plan, discussion and announcements)
• Legal (Legal commentary and case analysis)
I. Title: Typically reflects the purpose of the site
II. Date and Post Title: Includes the date of publication and overview of the post's subject matter.
III. Commentary: Style and content of words vary.
Types:
Personal
Opinionated
Topic-oriented
Irrelevant
IV. Links: Serve as a kind of works cited page, directing readers to additional sources of relevant material.
V. Blogrolls: Contains links to other blogs and websites, and can typically be found running down the left or right-hand side of the page.
VI. Dialogue: A venue for carrying on simple conversations and disseminating information.
VII. Feed: Every blog is published and broadcasted as a Really Simple
Syndication (RSS) feed.
Feed readers collect and combine feeds to allow readers to browse a central location.
VIII. About: Includes the author, contact information and purpose of the blog
Cyberstalking is a new phenomenon that allows anonymous online stalkers to
their lives. The aggregate information in a personal profile can assist someone
appointments, hiring, and tenure for faculty. Students may be penalized based may experience blog writing “burnout.” This could hinder effective learning and teaching due to lack of participation. Faculty may underestimate the time required for reading postings which may affect research and publication.
Blogging enhances learning beyond what is typically utilized in course
generated and uploaded solely by the instructor. Blogging places some control and participation in the hands of the students which fosters interaction.
on the group blog. The other members can offer feedback and suggestions for while simultaneously allowing student connection with an online community.
Institutionally supported blogs can help individuals connect locally, internationally and globally on common issues and circumstances. Shared
Team Work: Team blogs can be created for groups working on research what is happening globally and in our communities. note pad for the documentation of ideas, a collection of links to outside
Example: Park University's blog on International
Engagement: http://icce.typepad.com
can be presented online.
Example: Pace University’s 4NonProfit blog: http://4nonprofits.org
Institutionally Sponsored Blogs
• The number of institutions sponsoring blogs may increase. Blogging may also be embraced by more disciplines in higher education and academia as a new form of learning.
Institutional Blog Policy
• Institutional revisions of student conduct codes and computer policy may occur to address blogs. The focus could be the content and use of blogs.
Discussion of a blog policy for faculty and staff may be actively addressed beginning with the administrations.
Blog Training
• Blog Training may be integrated into institutional training. Professional conferences and events may increasingly spotlight blogs as a part of sessions including information on new advancements.
Distance Education has highly increased over the last decade for students to participate in courses without being present on a physical campus. The following are reasons as to why this trend is occurring:
• The percentage of non-traditional students have increased over the past two decades.
• Distance Learners are able to select a flexible schedule to accommodate a fulltime job.
• There is a huge interest in internet usage by younger generations.
• Higher education outsourcing and partnerships are increasing.
• Instruction is becoming more learner centered, non-linear, and self directed.
• Traditional campuses are declining, for-profit institutions are growing, and public and private institutions are merging.
Distance Education is defined as all credit and non-credit courses and training delivered via electronic means.
Examples of Technology used includes: Skype, Podcasting, and Webinars
• Skype is a peer-to-peer internet telephone directory service which allow individuals the ability of connecting with one another to conduct online chats and video conferencing. Students and professors alike are able to log on into a designated chat room and hold lectures as if they were in a physical classroom. Most features of this technology are free, thus being a benefit for long-distance students.
• Podcastings are media files distributed over the internet using syndication feeds to play back on portable electronic devices or personal computers.
Numerous professors are recording lectures and making digital and/or electronic notes available for students to download to their personal computer or MP3 players.
• Webinars allow individuals to be interactive in a discussion forum. The term itself translates to seminars conducted over the world wide web. This type of technology allows institutions of higher education to discuss current trends and hot topics that affect campuses. The main benefit is not requiring several universities to make travel arrangements to a central location for the discussion.
Although distance education is becoming recognized throughout the country,
According to a 2006 survey conducted by Vault Inc., fifty-five percent of managers preferred to hire a candidate that received his or her degree the old fashioned way. other necessary electronic equipment.
Distance education makes it possible for a student to study at an educational
time constraints.
In addition, distance education courses are not restricted by the limited number of desks in a classroom. The potential to enroll more students in a web course is a way of making distance education cost effective.
• In the early 1990s, Congress created legislation such as the 50-Percent
Rule and the12-Hour Rule to regulate federal aid dispersion and diploma mill issues in distance education.
•
In recent years, Congress has expressed a desire to remove controversial regulations that limit funding for students of distance education programs.
• Due to fact that technology has been modified and increased in the household of Americans, we believe lawmakers will want to amend the restrictive laws created a decade ago.
• If these laws are reconfigured, we expect a rapid increase in the amount of students enrolled in distance education courses.
• Online Training is a hot topic because Higher Education administrators, educators, and staff are often called upon to make informed choices about technology.
• Online Safety is a hot topic because current empirical research strongly suggests that young adults are increasingly becoming both victims and perpetrators of internet crime and abuse.
• Offenses Typical of College Campuses Include :
Piracy of music
Academic dishonesty
Cyberstalking
Creation of computer viruses
• Higher Education must prepare graduates who can keep America's computing society safe and secure. We must reach out to our schools and employers to assist them in putting instructional programs in place.
• Many colleges and universities are well positioned to add internet safety, information security, and cyberethics training to continuing-education courses as well as to degree-program requirements.
• Higher Education institutions could also offer leadership training to executives of public, private, and nonprofit organizations who have vested interests in having employees who can secure, maintain responsible use information systems.
• Example: The CyberSmart Professional Development Program includes :
Geared towards educators K-12
Topics covered are customized by what each person specifically desires to learn
Includes both online training and on-site learning
The cost of the Cybersmart Program ranges between 350-500 dollars per
Example: “Most IT departments on campuses see themselves as a service
(
)
Example: “The University of Central Arkansas IT Department holds a rarely attended seminar on spyware, which is the cause of 90% of their problems with WebCT.”
( Personal Opinion of an Information Technology professional on Online Training )
There is vast potential in how new technologies can better serve the learning
It must be considered that this generation of students will soon be employees.
Online training would demonstrate institutions’ concern for community and
serve as another source of revenue for institutions.
— and could
Implementing online training could make higher education proactive versus reactive in developing, learning, and teaching online usage .
• The federal government has stressed technological, legislative, and lawenforcement solutions to problems being faced in today’s technological world.
• This committee anticipates the focus of legislation to shift from online predators and pornography to self-education, awareness, and responsibility.
• The main intent of federal legislation in the future should be on a systematic approach. Legislators should set guidelines on how to implement educational tools to students on internet usage.
-
The University of Central Arkansas Committee for the Dean’s Council
Anderson, Michael, Borrelli, Jaycee, and Patterson, & Joseph P. (2003). Spam, Spam, and Spam: A Battle on Many
Fronts [Electronic version]. Morris Computer Science Seminar conduced at University of Minnesota. Retrieved
February 10, 2007 from http://csci.mrs.umn.edu/UMMCSciWiki/pub/CSci2901f03/SpamSpamAndSpam/spam_final.pdf
Barracuda Networks (n.d.). Spam Firewall Overview Retrieved February 10, 2007 from the Barracuda Networks webpage: http://www.barracudanetworks.com/ns/products/spam_overview.php
Carnevale, Dan. (2006). Rule May Spark Online Boom for Colleges [Electronic version]. The Chronicle of Higher
Education, 52 Issue 6. Retrieved February 10, 2007 from http://chronicle.com/weekly/v52/i22/22a00101.htm
Case J. Carl and King, Darwin L. (2006, November, 2). Is Undergraduate Spam Under Control? [Electronic version].
Issues in Information Systems, 7. Retrieved February 10, 2007 from http://www.iacis.org/iis/2006_iis/PDFs/Case_King.pdf
Chickering, A. & Reisser, L. (1993). Education and Identity. In Komives, S., Woodard, D., & Associates. Student
Services A Handbook for the Profession 4th edition. (pp. 181) San Francisco, CA: Jossey-Bass Print
Crucial Marketing. (2007). Blogs. Retrieved February 10, 2007 from the Marketing Terms website: http://www.marketingterms.com/dictionary/blog/
Dawson, K. (2007). Blog Overload: An associate professor and devoted reader of blogs finds that requiring students to create one produced the wrong kind of buzz [Electronic version]. The Chronicle of Higher Education , 53, Issue 22.
Retrieved February 10, 2007 from http://chronicle.com/weekly/v53/i22/22c00201.htm
Education Technology Collaborative: University of Tennessee. (2005). Academic Blogging: Strategies for Using
Weblogs to Promote Active Learning and Professional Development. Retrieved February 10, 2007 from http://edtech.tennessee.edu/~set31/default.html
Evans, N.J., Forney, D. S. & Guido-DiBrito, F. (1998). Student development in college: Theory, research, and practice.
San Francisco: Jossey-Bass. (pp. 94-99).
Everett-Church, Ray (May/June 1999) Why Spam is a Problem. E-OTI: OnTheInternet An international Electronic
Publication of the Internet Society. Retrieved February 10, 2007 from http://www.isoc.org/oti/printversions/0599preverett.html
Gay.com (2006, October, 26). Three charged with hate crime in N.Y. gay slaying. Advocate News. Retrieved February 17,
2007 from http://www.gay.com/news/article.html?2006/10/26/2
Gordon, D. (2007). About Technorati. Retrieved February 10, 2007 from the Technorati website: http://www.technorati.com/about/
Gwava —Overview (n.d.) Retrieved February 10, 2007 from the Gwava World Headquarters website: http://www.gwava.com/products/gwava_overview.php
Herring, B. Personal Communication February 13, 2007
Hoover, Eric. (2006). Gay and Christian [Electronic version]. The Chronicle of Higher Education , 52, Issue 34. Retrieved
February 10, 2007 from http://chronicle.com/weekly/v52/i34/34a04601.htm
Housley, S. (n.d.). NotePage Incorpaorated: The Dangers in Blogging. Retrieved February 10, 2007 from the Feed For All website: http://www.feedforall.com/dangers-blogging.htm
Ironport Products (n.d.). Retrieved February 10, 2007 from the Ironport Systems website: http://www.ironport.com/products/ironport_c650.html
Krause, S. (2005). Blog as a Tool for Teaching [Electronic version]. The Chronicle of Higher Education, 51, Issue 42.
Retrieved February 10, 2007 from http://chronicle.com/weekly/v51/i42/42b03301.htm
Laws and Regulations that Affect Distance Learners (n.d.). Retrieved February 10, 2007, from http://www.elearners.com/resources/education-laws.asp
Lipka, S. (2006). 'Advocate' Guide Profiles 100 Best Colleges for Gay Students [Electronic version]. The Chronicle of Higher
Education, 53, Issue 6. Retrieved February 10, 2007 from http://chronicle.com/weekly/v53/i06/06a04502.htm
Lutus, P. (2006). An updated article on the topic of spam. Retrieved February 10, 2007 from The Anti-Spam Home
Webpage: http://www.arachnoid.com/lutusp/antispam.html#1
Martin, J. and Samels, J. (2007). 10 Trends to Watch in Campus Technology
— Plus 8 Myths and 7 Key Skills for CIO's
[Electronic version]. The Chronicle of Higher Education , 53, Issue 18. Retrieved February 10, 2007 from http://chronicle.com/weekly/v53/i18/18b00701.htm
McQuade, S. C. (2007). We Must Educate Young People About Cybercrime Before They Start College [Electronic version].
The Chronicle of Higher Education, 53, Issue 14. Retrieved February 10, 2007 from http://chronicle.com/weekly/v53/i18/18b02901.htm
Michigan.Gov the Official Portal for the State of Michigan (n.d.). Defining Spam. Retrieved February 10, 2007 from http://www.michigan.gov/ag/0,1607,7-164-17334_17364_18380-44602--,00.html
Moore, S. (2006). Smart Communities: Most Engaging Blogs-Higher Education and Civic Engagement. Retrieved February
10, 2007 from http://smartcommunities.typepad.com/suzanne/2006/01/most_engaging_b_4.html
Mueller, H. Scott (n.d). What is spam? Retrieved February 10,2007 from the GFi Corporation website: http://spam.abuse.net/overview/whatisspam.shtml
National Center for Education Statistics. (2007). Distance Education in Higher Education Institutions. Retrieved February 10,
2007 from http://nces.ed.gov/surveys/peqis/publications/98062/index.asp
Phishing. (n.d). Retrieved February 10, 2007 from http://www.gov.mu/portal/sites/spamweb/phishing.htm#top
Quarterman, John S. (1997, Aptril). Original Spam Considered Harmful [Electronic version]. Matrix News , 7(4). Retrieved
February 10, 2007 from http://fringe.davesource.com/Fringe/Computers/Netiquette/Spam_Considered_Harmful.html
Read, B. (2007). How to Podcast Campus Lectures [Electronic Version]. The Chronicle of Higher Education, 53, Issue
21. Retrieved February 10, 2007 from http://chronicle.com/weekly/v53/i21/21a03201.htm
Reynolds, G. (2006). Can Blogging Derail Your Career: The Politics of Academic Appointments [Electronic version].
The
Chronicle of Higher Education , 52, Issue 47. Retrieved February 10, 2007 from http://chronicle.com/weekly/v52/i47/47b00702.htm
Schackner, B. (2005, December, 25). Freedom of Speech Redefined by Blogs: Words Travel Faster, Stay Around
Longer in the Blogosphere [Electronic version]. The Post-Gazette. Retrieved February 10, 2007 from http://www.post-gazette.com/pg/05359/627794.stm
The CyberSmart Education Company (2007). Retriteved February 17, 2007 from http://www.cybersmart.org/pd/
The World of Blogs. (n.d.). Retrieved February 10, 2007 from http://www.slais.ubc.ca/courses/libr500/05-06wt1/www/A_Cho/introduction.htm
Web Developer’s Virtual Library (n.d.). Spam, Spam, Spam, Spam, Spam, Spam, Spam. Retrieved February 10, 2007 from http://www.wdvl.com/Internet/Protocols/Email/Spam.html
Woo, Stu. (2006). Professors and Students Ask Colleges Not to Hang up on Skype [Electronic Version]. The Chronicle of Higher Education, 53, Issue 16 .
Retrieved February 10, 2007 from http://chronicle.com/weekly/v53/i16/16a02801.htm
Woodland, R. (1999). “I plan to be a 10: Online Literacy and Lesbian, Gay, Bisexual, and Transgender Students”
Computers and Composition 16, 73-87