Title: Hot Topics in Technology for Higher Education
 1Hot Topics in Technology for Higher Education
- University of Central Arkansas Committee for the 
 Deans Council
- LaCresha Henderson 
- Danielle Joanette 
- NuRodney Prad 
- Justin Varghese
2Whats Bringing the Heat?
Distance Education
LGBTQ Online
Online Safety/Training
Blogs 
 3Whats Hot about Spam?
- Spam is the the mass-posting of emails sent to 
 Internet users through many copies or different
 messages in an effort to impose the information
 onto people who would not otherwise select to
 obtain it.
- The Importance of addressing spam has to do with 
 three areas
- Knowing the Harmful issues 
- Discussing the benefits of Preventative Measures 
- Future Implications
4Phishing A way spam ends up in your inbox
Fool me once, shame on you fool me twice, shame 
on me.
- Identity Safety is threatened when spammers 
 partake in Phishing By E-mail
- Phishers are people who attempt to steal your 
 personal information and then your money.  The
 person then sells the data to a "Casher" who is
 setup to use the data for identity theft,
 printing credit cards or just stealing your
 money.
- Pretending to be from your financial institution, 
 a legitimate retailer or government agency, the
 emails will contain a link that looks real,
 saying something like "Click here to Update your
 account" or to confirm your personal
 information.
- Typically, the link will direct you to a fake 
 website that are near-replicas of the real one,
 making it hard even for experts to distinguish
 between the real and fake web sites.
- You enter your personal information onto the web 
 site  and into the hands of identity thieves.
- The emails can look very official, please click 
 to see samples
5Issues with Spam on Our Campus
- Issue 1 Time Constraints 
- Spam also hurts consumers. Many people still pay 
 hourly rates for Internet access, including those
 who use wireless Internet services and business
 travelers who download e-mail while on the road.
 These consumers have to pay for the time they
 spend downloading these unsolicited messages to
 their computer from the Internet.
- It takes 10 seconds to recognize that an email 
 contains spam
- 60 spam emails takes 10 minutes of your time to 
 delete
- When you click remove from list it 
 automatically doubles the amount of time it takes
 to delete spam
- If each student takes 20 minutes a day to delete 
 spam at the University of Central Arkansas that
 equates to
6Issues with Spam on Our Campus
-  Issue 2 Harm to Computers 
- Most Internet Service Providers (ISPs) also limit 
 the space available in account mailboxes for
 consumers to store e-mail messages. Spam fills
 mailbox space that consumers could utilize for
 other purposes. Viruses, Trojans, and other
 malicious scripts can attach themselves to spam
 and infect your computer the instant you open the
 message.
- Spammers also often push their mail throughout 
 other people's systems. This allows spam
 creators to offload the real costs (CPU time,
 e-mail account user time, disk space, etc.) onto
 other innocent third parties.
7Issues with Spam on Our Campus
- Issue 3 Harm to Servers 
- Internet Service Providers (ISPs) and other 
 businesses lose millions of dollars and hundreds
 of hours of productivity as a result of
 unsolicited commercial e-mail. Spam clogs the
 Internet, computer systems, and e-mail accounts
 slowing down operations and at times causing
 system shutdowns and failures.
- The Three ways spam can harm the server is 
- Viruses 
- Bot or Botnet 
- DDOS  Distributed Denial of Service Attack 
8Benefits of Embracing Anti-Spam Tools on Our 
Campus
- Central Benefit Minimization of time 
 expenditures, computer and server harm
- Important tools include Appliances and Software 
Iron-Port An appliance that has many features 
to protect against spam and viruses on the 
Internet. Such features include Spam 
Defense Virus Defense Content Filters 
Barracuda Spam Firewall Is an appliance 
compatible with all email servers and can fit 
into nearly any corporate or small business 
environment. It is used by small organizations 
with as few as 10 employees and large 
organizations with as many as 200,000 employees. 
Features of Barracuda include Anti-spam 
 Anti-virus Anti-phishing Anti-spyware 
(Attachments) Denial of Service 
GWAVA Is a software specifically designed for 
the Novell Groupwise Community with many features 
Including Email Policy and Surveillance 
 Anti-Virus Tools Anti-Spam Tools Spam 
Management Tools 
Picture Retrieved from http//www.ironport.com/pr
oducts/network_map_esa.html 
 9Future Implications of Spam
- User Perception 
- Spam may affect internet users by causing them to 
 desert many public discussion forums for fear
 that their e-mail addresses will be harvested and
 added to junk mail lists. Many are afraid to give
 their addresses out in even legitimate commerce
 for fear of being added to and traded among
 thousands of mailing lists. Genuine businesses,
 institutional faculty, staff and even more
 specifically, admission officers are having
 second thoughts to use e-mail to communicate with
 their prospective customers and students for fear
 of being branded Net abusers. This distrust
 threatens to undermine the acceptance and growth
 of electronic commerce among the legions of new
 Internet users taking their first steps online.
- Global Implications 
- Electronic mail is a tool of business and 
 personal communication. It's simple, it's
 accessible, and it's becoming more and more an
 essential part of our professional lives.
 However, there are even more far-reaching
 potentials of e-mail that have a possibility of
 being lost if this mode of communication gets
 destroyed by the increased production of junk
 e-mail.
- Technology 
- When responsible computing behavior becomes more 
 popular,  tools dealing with Spam Filtering,
 implementation of spyware and  removal
 procedures, will continue to be strong factors in
 decreasing the amount of spam created.
10Whats Hot about LGBTQ Online?
- LGBTQ Online is the phenomenon of providing 
 students with departmental resources through the
 internet.
-  This is a hot topic because cyberspace is 
 serving many functions for
-  LGBTQ students. These include 
- Educating- consists of collecting basic 
 information
- Networking- allows students to connect with a 
 larger LGBTQ network community
- Development- facilitates an individuals ability 
 to obtain knowledge on LGBTQ issues and explore
 alternative ways of self-expression.
- Examples of such resources include 
-  Princetons LGBTQ Center websitehttp//www.p
 rinceton.edu/lgbt/
-  University of Michigans LGBTQ Affairs 
 website http//www.umich.edu/lgbta/
11Methods of Using LGBTQ Online Resources
- Online Searches 
- Potential students in areas where physical LGBTQ 
 resources are scarce can locate institutions of
 higher education that are LGBTQ-friendly through
 online searches.
- Example The Advocate College Guide for LGBT 
 Students is a book that is easily located on
 http//www.amazon.com
- Online Discussion Opportunities and Services 
- Blogs, forums, and websites addressing LGBTQ 
 issues offer 24/7 guidance on developmental
 issues and support through reaching a larger
 LGBTQ community.
- Example http//www.gay.com 
- Example Pennsylvania State has an online LGBTQ 
 resource center that hosts online discussion
 groups http//www.sa.psu.edu/lgbt/
12Issues with LGBTQ Interactions Online
- Issue 1 Compromising Anonymity 
- The internet is a public space and personal 
 information can be foundtherefore putting
 aspects of the LGBTQ identity online through
 blogs, facebook profiles, or dating advertisement
 can have negative repercussions.
- Issue 2 Personal Safety 
- The precautions of online personal safety are 
 very similar to protective measures we use in
 everyday life. However, it is often difficult to
 identify users on the opposite side of computer
 terminals in chat rooms or blogs.
13Benefits of Embracing Online LGBTQ on Our Campus
- Benefit 1 Identifying Allies 
- Benefit 2 Protecting Privacy 
- Benefit 3 Further Development
14Future Implications of LGBTQ Online
- Development of the whole LGBTQ student 
- Institutions who make it a point to support and 
 provide access to LGBTQ friendly resources will
 promote growth and further development of the
 whole student especially those identifying as
 LGBTQ.
- Development of classes on LGBTQ Studies and 
 incorporation of
- LGBTQ online issue into diversity training 
- Scholars have discussed that online literacy may 
 be different from academic literacy, and since
 the using the internet depends on writing skills,
 there may be a better development in these areas
 for LGBTQ students than what is seen in the
 classroom. Making these areas of interest a focus
 in class work has the potential for further
 educational development.
15Whats Hot About Blogs?
- Blogs have infiltrated every aspect of our lives 
 including Higher Education and Student Affairs.
 Faculty, staff, and students are using blogs as
 an extension of in-class teaching and
 communication. Blogs have begun to impact both
 teaching and learning methods.
- The internet blogosphere is incredibly active. 
 There are over 175,000 new blogs every day.
 Bloggers update their blogs regularly to the
 extent of over 1.6 million posts per day, or over
 18 updates a second. Blogs have changed the face
 of communication around the world.
- Blogging continues to experience technological 
 advancements within itself that has changed the
 perception of institutions. Institutions of
 higher education have started to sponsor and
 support blogs.
16The Basics of Blogs
What is a Blog? A frequent, chronological 
publication of personal thoughts and web links. 
Blogs are alternatively called weblogs. 
Types of Blogs 
- Political (Includes current political topics, 
 commentary and campaign material)
- Personal (On-line journal and diary) 
- Business (Promotion, advertising, information) 
- Topical (Focuses on single issue or niche 
- Health (Medical news, personal accounts with 
 health issues)
- Literary (Focuses on a literature topic including 
 the publishing industry)
- Travel (Travelers share stories and photos) 
- Research (Includes research notes and issue 
 discussions)
- Educational (Course plan, discussion and 
 announcements)
- Legal (Legal commentary and case analysis) 
17The Basics of Blogs
Components of a Blog
- V. Blogrolls Contains links to other blogs and 
 websites, and can typically be found running down
 the left or right-hand side of the page.
- VI. Dialogue A venue for carrying on simple 
 conversations and disseminating
 information.
- VII. Feed Every blog is published and 
 broadcasted as a Really Simple Syndication
 (RSS) feed. Feed readers collect and combine
 feeds to allow readers to browse a central
 location.
- VIII. About Includes the author, contact 
 information and purpose of the blog
- I. Title Typically reflects the purpose of the 
 site
- II. Date and Post Title Includes the date of 
 publication and overview of the post's subject
 matter.
- III. Commentary Style and content of words vary. 
 
- Types 
- Personal 
- Opinionated 
- Topic-oriented 
- Irrelevant 
- IV. Links Serve as a kind of works cited page, 
 directing readers to additional sources of
 relevant material.
18Issues with Embracing Blogs on Our Campus
- Issue 1 Security and Privacy 
- Issue 2 Academic Freedom 
- Issue 3 Blog Overload 
19Benefits of Embracing Blogs on Our Campus
- Benefit 1 Promotes Student Engagement and 
 Interaction
- Benefit 2 Facilitates Small Group Work and Team 
 Building
- Benefit 3 Encourages Civic Engagement on Campus 
 and
-  within our Communities 
20Future Implications of Blogs
- Institutionally Sponsored Blogs 
- The number of institutions sponsoring blogs may 
 increase. Blogging may also be embraced by more
 disciplines in higher education and academia as a
 new form of learning.
- Institutional Blog Policy 
- Institutional revisions of student conduct codes 
 and computer policy may occur to address blogs.
 The focus could be the content and use of blogs.
 Discussion of a blog policy for faculty and staff
 may be actively addressed beginning with the
 administrations.
- Blog Training 
- Blog Training may be integrated into 
 institutional training. Professional conferences
 and events may increasingly spotlight blogs as a
 part of sessions including information on new
 advancements.
21Whats Hot About Distance Education?
Distance Education has highly increased over the 
last decade for students to participate in 
courses without being present on a physical 
campus. The following are reasons as to why this 
trend is occurring
- Higher education outsourcing and partnerships are 
 increasing.
- Instruction is becoming more learner centered, 
 non-linear, and self directed.
- Traditional campuses are declining, for-profit 
 institutions are growing, and public and private
 institutions are merging.
- The percentage of non-traditional students have 
 increased over the past two decades.
- Distance Learners are able to select a flexible 
 schedule to accommodate a fulltime job.
- There is a huge interest in internet usage by 
 younger generations.
Distance Education is defined as all credit and 
non-credit courses and training delivered via 
electronic means.  
 22Students Using Technology for College Credit
- Examples of Technology used includes Skype, 
 Podcasting, and Webinars
- Skype is a peer-to-peer internet telephone 
 directory service which allow individuals the
 ability of connecting with one another to conduct
 online chats and video conferencing. Students and
 professors alike are able to log on into a
 designated chat room and hold lectures as if they
 were in a physical classroom. Most features of
 this technology are free, thus being a benefit
 for long-distance students.
- Podcastings are media files distributed over the 
 internet using syndication feeds to play back on
 portable electronic devices or personal
 computers. Numerous professors are recording
 lectures and making digital and/or electronic
 notes available for students to download to their
 personal computer or MP3 players.
-  
- Webinars allow individuals to be interactive in a 
 discussion forum. The term itself translates to
 seminars conducted over the world wide web. This
 type of technology allows institutions of higher
 education to discuss current trends and hot
 topics that affect campuses. The main benefit is
 not requiring several universities to make travel
 arrangements to a central location for
-  the discussion. 
23Issues with Embracing Distance Education on Our 
Campus
- Issue 1 Distrust of Online Degrees by Potential 
 Employers
- Issue 2 Technological and Computer Literacy 
24Benefits of Embracing Distance Education on Our 
Campus 
- Benefit 1 Accessibility and Location 
- Benefit 2 Diverse student population 
- Benefit 3 Cost Effective 
-  
25Future Implications of Distance Education
- In the early 1990s, Congress created legislation 
 such as the 50-Percent Rule and the12-Hour Rule
 to regulate federal aid dispersion and diploma
 mill issues in distance education.
- In recent years, Congress has expressed a desire 
 to remove controversial regulations that limit
 funding for students of distance education
 programs.
-  
- Due to fact that technology has been modified and 
 increased in the household of Americans, we
 believe lawmakers will want to amend the
 restrictive laws created a decade ago.
- If these laws are reconfigured, we expect a rapid 
 increase in the amount of students enrolled in
 distance education courses.
26Whats Hot About Online Safety/Training?
- Online Training is a hot topic because Higher 
 Education administrators, educators, and staff
 are often called upon to make informed choices
 about technology.
- Online Safety is a hot topic because current 
 empirical research strongly suggests that young
 adults are increasingly becoming both victims and
 perpetrators of internet crime and abuse.
- Offenses Typical of College Campuses Include 
- Piracy of music 
- Academic dishonesty 
- Cyberstalking 
- Creation of computer viruses 
- Higher Education must prepare graduates who can 
 keep America's computing society safe and secure.
 We must reach out to our schools and employers to
 assist them in putting instructional programs in
 place.
27Online Training How do we do it?
- Many colleges and universities are well 
 positioned to add internet safety, information
 security, and cyberethics training to
 continuing-education courses as well as to
 degree-program requirements.
- Higher Education institutions could also offer 
 leadership training to executives of public,
 private, and nonprofit organizations who have
 vested interests in having employees who can
 secure, maintain responsible use information
 systems.
- Example The CyberSmart Professional Development 
 Program includes
- Geared towards educators K-12 
- Topics covered are customized by what each person 
 specifically desires to learn
- Includes both online training and on-site 
 learning
28Issues with Embracing Online Training on Our 
Campus
- Issue 1 Cost of implementing programs 
- Issue 2 Placement of the responsibility of 
 technology
-  education 
- Issue 3 Effective Programming requires 
 participation and full support
29Benefits of Online Training on Our Campus
- Benefit 1 Serving Student Populations 
- Benefit 2 Career Preparedness 
- Benefit 3 Concern For Community 
- Benefit 4 Developing a Proactive Stance
30Future Implications of Online Training
- The federal government has stressed 
 technological, legislative, and law-enforcement
 solutions to problems being faced in todays
 technological world.
- This committee anticipates the focus of 
 legislation to shift from online predators and
 pornography to self-education, awareness, and
 responsibility.
- The main intent of federal legislation in the 
 future should be on a systematic approach.
 Legislators should set guidelines on how to
 implement educational tools to students on
 internet usage.
31Final Thoughts on Hot Topics
-  Whether students or faculty are encountering 
 spam, utilizing LGBTQ online resources, blogging,
 taking courses online, or using the internet for
 entertainment the millennial generation is
 plugged in. It is important to address
 technological hot topics as they arise in order
 to still be in touch with our student population.
 We must use technology rather than fear its
 potential in Higher Education.
-  - The University of Central Arkansas 
 Committee for the Deans Council
32References
- Anderson, Michael, Borrelli, Jaycee, and 
 Patterson,  Joseph P. (2003). Spam, Spam, and
 Spam A Battle on Many Fronts Electronic
 version. Morris Computer Science Seminar
 conduced at University of Minnesota. Retrieved
 February 10, 2007 from http//csci.mrs.umn.edu/UMM
 CSciWiki/pub/CSci2901f03/SpamSpamAndSpam/spam_fina
 l.pdf
- Barracuda Networks (n.d.). Spam Firewall Overview 
 Retrieved February 10, 2007 from the Barracuda
 Networks webpage http//www.barracudanetworks.com
 /ns/products/spam_overview.php
- Carnevale, Dan. (2006). Rule May Spark Online 
 Boom for Colleges Electronic version. The
 Chronicle of Higher Education, 52 Issue 6.
 Retrieved February 10, 2007 from
 http//chronicle.com/weekly/v52/i22/22a00101.htm
- Case J. Carl and King, Darwin L. (2006, November, 
 2). Is Undergraduate Spam Under Control?
 Electronic version. Issues in Information
 Systems, 7. Retrieved February 10, 2007 from
 http//www.iacis.org/iis/2006_iis/PDFs/Case_King.p
 df
- Chickering, A.  Reisser, L. (1993). Education 
 and Identity. In Komives, S., Woodard, D.,
 Associates. Student Services A Handbook for the
 Profession 4th edition. (pp. 181) San Francisco,
 CA Jossey-Bass Print
- Crucial Marketing. (2007). Blogs. Retrieved 
 February 10, 2007 from the Marketing Terms
 website http//www.marketingterms.com/dictionary/
 blog/
- Dawson, K. (2007). Blog Overload An associate 
 professor and devoted reader of blogs finds that
 requiring students to create one produced the
 wrong kind of buzz Electronic version. The
 Chronicle of Higher Education, 53, Issue 22.
 Retrieved February 10, 2007 from
 http//chronicle.com/weekly/v53/i22/22c00201.htm
- Education Technology Collaborative University of 
 Tennessee. (2005). Academic Blogging Strategies
 for Using Weblogs to Promote Active Learning and
 Professional Development. Retrieved February 10,
 2007 from http//edtech.tennessee.edu/set31/defau
 lt.html
- Evans, N.J., Forney, D. S.  Guido-DiBrito, F. 
 (1998). Student development in college Theory,
 research, and practice. San Francisco
 Jossey-Bass. (pp. 94-99).
33References
- Everett-Church, Ray (May/June 1999) Why Spam is a 
 Problem. E-OTI OnTheInternet An international
 Electronic Publication of the Internet Society.
 Retrieved February 10, 2007 from
 http//www.isoc.org/oti/printversions/0599preveret
 t.html
- Gay.com (2006, October, 26). Three charged with 
 hate crime in N.Y. gay slaying. Advocate News.
 Retrieved February 17, 2007 from
 http//www.gay.com/news/article.html?2006/10/26/2
 
- Gordon, D. (2007). About Technorati. Retrieved 
 February 10, 2007 from the Technorati website
 http//www.technorati.com/about/
- GwavaOverview (n.d.) Retrieved February 10, 2007 
 from the Gwava World Headquarters website
 http//www.gwava.com/products/gwava_overview.php
- Herring, B. Personal Communication February 13, 
 2007
- Hoover, Eric. (2006). Gay and Christian 
 Electronic version. The Chronicle of Higher
 Education, 52, Issue 34. Retrieved February 10,
 2007 from http//chronicle.com/weekly/v52/i34/34a0
 4601.htm
- Housley, S. (n.d.). NotePage Incorpaorated The 
 Dangers in Blogging. Retrieved February 10, 2007
 from the Feed For All website http//www.feedfora
 ll.com/dangers-blogging.htm
- Ironport Products (n.d.). Retrieved February 10, 
 2007 from the Ironport Systems website
 http//www.ironport.com/products/ironport_c650.htm
 l
- Krause, S. (2005). Blog as a Tool for Teaching 
 Electronic version. The Chronicle of Higher
 Education, 51, Issue 42. Retrieved February 10,
 2007 from http//chronicle.com/weekly/v51/i42/42b0
 3301.htm
- Laws and Regulations that Affect Distance 
 Learners (n.d.). Retrieved February 10, 2007,
 from http//www.elearners.com/resources/education-
 laws.asp
34References
- Lipka, S. (2006). 'Advocate' Guide Profiles 100 
 Best Colleges for Gay Students Electronic
 version. The Chronicle of Higher Education, 53,
 Issue 6. Retrieved February 10, 2007 from
 http//chronicle.com/weekly/v53/i06/06a04502.htm
- Lutus, P. (2006). An updated article on the 
 topic of spam. Retrieved February 10, 2007 from
 The Anti-Spam Home Webpage http//www.arachnoid.
 com/lutusp/antispam.html1
- Martin, J. and Samels, J. (2007). 10 Trends to 
 Watch in Campus Technology  Plus 8 Myths and 7
 Key Skills for CIO's Electronic version. The
 Chronicle of Higher Education, 53, Issue 18.
 Retrieved February 10, 2007 from
 http//chronicle.com/weekly/v53/i18/18b00701.htm
- McQuade, S. C. (2007). We Must Educate Young 
 People About Cybercrime Before They Start College
 Electronic version. The Chronicle of Higher
 Education, 53, Issue 14. Retrieved February 10,
 2007 from http//chronicle.com/weekly/v53/i18/18b0
 2901.htm
- Michigan.Gov the Official Portal for the State of 
 Michigan (n.d.). Defining Spam. Retrieved
 February 10, 2007 from http//www.michigan.gov/ag/
 0,1607,7-164-17334_17364_18380-44602--,00.html
- Moore, S. (2006). Smart Communities Most 
 Engaging Blogs-Higher Education and Civic
 Engagement. Retrieved February 10, 2007 from
 http//smartcommunities.typepad.com/suzanne/2006/0
 1/most_engaging_b_4.html
- Mueller, H. Scott (n.d). What is spam? Retrieved 
 February 10,2007 from the GFi Corporation
 website http//spam.abuse.net/overview/whatisspam
 .shtml
- National Center for Education Statistics. (2007). 
 Distance Education in Higher Education
 Institutions. Retrieved February 10, 2007 from
 http//nces.ed.gov/surveys/peqis/publications/9806
 2/index.asp
- Phishing. (n.d). Retrieved February 10, 2007 from 
 http//www.gov.mu/portal/sites/spamweb/phishing.ht
 mtop
- Quarterman, John S. (1997, Aptril). Original Spam 
 Considered Harmful Electronic version. Matrix
 News, 7(4). Retrieved February 10, 2007 from
 http//fringe.davesource.com/Fringe/Computers/Neti
 quette/Spam_Considered_Harmful.html
35References
- Read, B. (2007). How to Podcast Campus Lectures 
 Electronic Version. The Chronicle of Higher
 Education, 53, Issue 21. Retrieved February 10,
 2007 from http//chronicle.com/weekly/v53/i21/21a0
 3201.htm
- Reynolds, G. (2006). Can Blogging Derail Your 
 Career The Politics of Academic Appointments
 Electronic version. The Chronicle of Higher
 Education, 52, Issue 47. Retrieved February 10,
 2007 from http//chronicle.com/weekly/v52/i47/47b0
 0702.htm
- Schackner, B. (2005, December, 25). Freedom of 
 Speech Redefined by Blogs Words Travel Faster,
 Stay Around Longer in the Blogosphere Electronic
 version. The Post-Gazette. Retrieved February
 10, 2007 from http//www.post-gazette.com/pg/05359
 /627794.stm
- The CyberSmart Education Company (2007). 
 Retriteved February 17, 2007 from
 http//www.cybersmart.org/pd/
- The World of Blogs. (n.d.). Retrieved February 
 10, 2007 from http//www.slais.ubc.ca/courses/libr
 500/05-06-wt1/www/A_Cho/introduction.htm
- Web Developers Virtual Library (n.d.). Spam, 
 Spam, Spam, Spam, Spam, Spam, Spam. Retrieved
 February 10, 2007 from http//www.wdvl.com/Interne
 t/Protocols/Email/Spam.html
- Woo, Stu. (2006). Professors and Students Ask 
 Colleges Not to Hang up on Skype Electronic
 Version. The Chronicle of Higher Education, 53,
 Issue 16. Retrieved February 10, 2007 from
 http//chronicle.com/weekly/v53/i16/16a02801.htm
- Woodland, R. (1999). I plan to be a 10 Online 
 Literacy and Lesbian, Gay, Bisexual, and
 Transgender Students Computers and Composition
 16, 73-87