Saturday, January 25, 2020

Wireless Vulnerabilities Threats And Countermeasures Information Technology Essay

Wireless Vulnerabilities Threats And Countermeasures Information Technology Essay Introduction to Network Security maintains its focus on the network and its vulnerabilities, protocols, and security solutions. It includes network architecture, the functions of layers in a typical network, and network based attacks including header, protocol, and authentication attacks. Bottom-up approach, it provides understanding of the vulnerabilities and mechanisms of each layer of network security. In any stadium there is network security plan in order to control all the events occurred in the stadium like ticketing selling, consumable purchases, seating arrangement and others. By using the wireless technology and mobiles we can plan the top level network security in the plan, the steps taken in this are all the members in the wireless channel have one wireless mobile. From the mobiles all the members can give the information to channel that means it is a server. All the decisions taken by the empires are by the wireless only, the video channel also very much useful in controlling the stadium. Consider the cricket stadium Chinnaswamy, Cricket Stadium in Bangalore, INDIA. The boundary line of the stadium is marked by the rope and here the boundary line is called as the perimeter of the stadium having field diameter of 140 to 160 yards. Score board has to display scores and sometimes should work as a third empire for keen observation and all this setup should work with wireless technology because wired transmission cannot be implemented over there. This stadium with a seating capacity of 55,000. Features of the stadium: The entire stadium is equipped with the very sensitive digital cameras, short and long distance explosive detectors. Totally it have 29 closed circuit television cameras, in this 29 cameras five of them are very highly sophisticated which are having the 360 degree of vision and all these will covers all the corners of the stadium. Trained marshals will operate the 29 closed circuit television cameras (CCTV), nearly 20 trained marshals are there in the stadium. These marshals having the helmets which are with sensitive cameras and sensitive detectors which are capable for covering the explosives which are happened around of 300 meter, this is called as OSD(on-screen display) camera which in the helmet and it is directly connected to the CMS(central monitoring system) vehicle. This CMS vehicle is standing outside the stadium, so whatever the marshal see and do, each and every point of the stadium and things happening in the stadium are very clearly seen in the CMS (central monitoring s ystem) vehicle. The entire system works on SNMP(simple network management protocol). Total stadium can be seen in the CMS vehicle, and another important thing is that empires decisions for example take the out and not out decisions it can be displayed on the big digital screen. The runs taken by the both the teams will be displayed on the digital screen in stadium. At the heart of the modern stadium is a communications system capable of supporting the innovative new services and applications customers are looking for. Organizing and hosting events requires a complete communications foundation essential to satisfying the communication needs of fans, guests, corporate employees, service and security staff, event organizers, press and media. It is that to provide all the components needed to build a complete, converged, secure and reliable communications system. Security, communication and services are the main aspects at the stadiums now-a- days. The organizers and event managers should be able to satisfy the complete communications foundation essential to satisfying the communication needs of fans, guests, corporate employees, service and security staff, event organizers, press and media. And also the communication system which provides all the components needed to build a complete, secure and consistent communications system. Converged IP/Ethernet Core: Stadiums support the communications needs of events with much number of users. Moreover, the supporting infrastructure is shared by different groups with different needs including stadium corporate users, media and press and event promoters. It is important to the make the event successful with High-speed, consistent and secure communication which doesnt fails. With reliable, secure, high-performance, intelligent Ethernet connectivity the enterprise LANs can intelligently prioritize real-time business communications like voice, video and multimedia services. Voice communications: Voice communications are important in any environment and mainly in the stadiums. IP networks provide the strength and quality of service that voice service requires. Converging voice and data over IP maximizes network efficiency, streamlines the architecture, reduces capital and operating costs, and opens up new service opportunities. It would be secure for organizations of all sizes to use voice over IP (VoIP), with IP PBXs (Private Branch Exchange). Today the global markets have a complete variety of IP phones, including desktop phones with displays, rugged wireless handsets, and PC-based softphones. All of these access devices operate seamlessly across the range of IP-enabled platforms and applications. Mobility: The nature of the stadium environment is mobile. Staff move constantly on making the event successful and provide the security at the top level. For the users, it is essential to have the access to key information and communication tools and allows them to roam and remain in touch no matter where they are. In WLAN IP Telephony services, we have a large choice of mobile desktops and handsets. Voice calls can be placed from laptops or PDAs(Personal Digital Assistant) using soft phones and employees can be equipped with voice over WLAN handsets that support multiple functions extremely useful for stadium staff, such as text messaging, conferencing and a push-to-talk feature that allows groups of handsets to behave as walkie-talkies. With this, the good coverage can be assured in areas which are difficult to reach with public areas. Wireless Mesh Network extends the reach of Wireless LANs securely and cost-effectively for situations where cabling for the LAN network is not in place or too costly to deploy. Implementing new Technologies With a comprehensive communications infrastructure as the base, stadiums have the foundation on which to build an intelligent environment filled with new, media-rich applications and services capable of creating new revenue opportunities and improving the overall fan experience. Wireless ticketing kiosks: Premium seats for sporting events and concerts can be expensive. Stadiums can leverage wireless technology to implement standalone, mobile kiosks that attract fans to upgrade their existing tickets for an event onsite. Digital signage directs patrons to the kiosk during the event. The fan simply inserts his ticket, checks a map of available seats, uses a touch-screen to select the new seat and inserts his credit card to pay. The machine keeps the old ticket and provides the upgrade. The stadium fills the seats closer to the action and generates revenue that would have been lost. It creates a win-win for the guest, the team and the stadium. Stadium owners can use the same kiosk to encourage customers to buy tickets for future events while guests are onsite and in the mood to buy. The kiosk can advertise upcoming events and attract fans waiting to exit after watching a game or seeing a concert. The terminal shows a list of available events and allows users to follow the same simple steps to purchase a ticket. Additionally, stadium owners can use the kiosk to capture and collect valuable information about its customer base. The kiosk can advertise loyalty programs and contests that offer incentives for fans to provide personal data that helps the stadium better understand and communicate with its audience base. Public safety and security: With thousands of people attending major events at one time, public safety and security is critical. Stadiums can leverage the communications system to offer digital security options including digital video surveillance and RFID (Radio-Frequency Identification) tagging and tracking. For example, stadiums can improve security threat detection with high-resolution IP cameras that provide full surveillance of the crowd using pre-sets by section: operators can select a stadium section and automatically receive all video from that section in multiple views. Operations staff can set rules to govern detection of left bags, perimeter entry, threshold crossing and loitering receiving alarms if any of the rules are breached Stadiums can improve event response through video feeds and text alerts that are transmitted manually or automatically to remote PDAs, laptops or offsite responders. All responders can be linked together automatically via dedicated audio conferencing channel. RFID tags can be used to locate and dispatch the closest security personnel to an emergency situation, ensuring a timely response. ABOUT NETWORK SECURITY AND TO FIND THREATS Vulnerabilities, Threats and Countermeasures Wireless networking has many advantages. Network configuration and reconfiguration is easier, faster, and less expensive. But, wireless technology creates new threats and alters the existing information security risk profile. Wireless networking alters the risks associated with various threats to security, the security objectives remain the same as with wired networks, preserving confidentiality, ensuring integrity, and maintaining availability of the information and information systems. Wireless Networks present a host of issues for network managers. Unauthorized access points, broadcasted SSIDs, unknown stations, and spoofed MAC addresses are just a few of the problems addressed in WLAN troubleshooting. Wireless Vulnerabilities, Threats and Countermeasures The wireless networks consist of four basic components: The transmission of data using radio frequencies; Access points that provide a connection to the organizational network and/or the Client devices (laptops, PDAs) and Users. Each of these components provides an avenue for attack that can result in the compromise of one or more of the three fundamental security objectives of confidentiality, integrity, and availability. Wireless Network Attacks Malicious association Malicious associations are when wireless devices can be actively made by crackers to connect to a network through their cracking laptop instead of a access point (AP). These types of laptops are known as soft APs and are created when a cracker runs some software that makes his/her wireless network card look like a legitimate access point. Once the cracker has gained access, he/she can steal passwords, launch attacks on the wired network, or plant trojans. Since wireless networks operate at the Layer 2 level, Layer 3 protections such as network authentication and virtual private networks (VPNs) offer no barrier. Wireless 802.1x authentications do help with protection but are still vulnerable to cracking. The idea behind this type of attack may not be to break into a VPN or other security measures. Most likely the cracker is just trying to take over the client at the Layer 2 level. Ad-hoc networks Ad-hoc networks can pose a security threat. Ad-hoc networks are defined as peer-topeer networks between wireless computers that do not have an access point in between them. While these types of networks usually have little protection, encryption methods can be used to provide security. Identity theft (MAC spoofing) Identity theft (or MAC spoofing) occurs when a cracker is able to listen in on network traffic and identify the MAC address of a computer with network privileges. Most wireless systems allow some kind of MAC filtering to only allow authorized computers with specific MAC IDs to gain access and utilize the network. However, a number of programs exist that have network sniffing capabilities. Combine these programs with other software that allow a computer to pretend it has any MAC address that the cracker desires, and the cracker can easily get around that hurdle. Man-in-the-middle attacks A man-in-the-middle attacker entices computers to log into a computer which is set up as a soft AP (Access Point). Once this is done, the hacker connects to a real access point through another wireless card offering a steady flow of traffic through the transparent hacking computer to the real network. The hacker can then sniff the traffic. One type of man-in-the-middle attack relies on security faults in challenge and handshake protocols to execute a de-authentication attack. This attack forces AP connected computers to drop their connections and reconnect with the crackers soft AP. Man-in-the-middle attacks are enhanced by software such as LANjack and AirJack, which automate multiple steps of the process. What once required some skill can now be done by script kiddies. Hotspots are particularly vulnerable to any attack since there is little to no security on these networks. Denial of service A Denial-of-Service attack (DoS) occurs when an attacker continually bombards a targeted AP (Access Point) or network with bogus requests, premature successful connection messages, failure messages, and/or other commands. These cause legitimate users to not be able to get on the network and may even cause the network to crash. These attacks rely on the abuse of protocols such as the Extensible Authentication Protocol (EAP). Network injection In a network injection attack, a cracker can make use of access points that are exposed to non-filtered network traffic, specifically broadcasting network traffic such as Spanning Tree (802.1D), OSPF, RIP, and HSRP. The cracker injects bogus networking re-configuration commands that affect routers, switches, and intelligent hubs. A whole network can be brought down in this manner and require rebooting or even reprogramming of all intelligent networking devices. Signal-Hiding Techniques In order to intercept wireless transmissions, attackers first need to identify and locate wireless networks. There are, however, a number of steps that organizations can take to make it more difficult to locate their wireless access points. The easiest and least costly include the following: Turning offthe service set identifier (SSID) broadcasting by wireless access points, Assign cryptic names to SSIDs, Reducing signal strength to the lowest level that still provides requisite coverage or Locating wireless access points in the interior of the building, away from windows and exterior walls. More effective, but also more costly methods for reducing or hiding signals include: Using directional antennas to constrain signal emanations within desired areas of coverage or Using of signal emanation-shielding techniques, sometimes referred to as TEMPEST, 1 to block emanation of wireless signals. Encryption The best method for protecting the confidentiality of information transmitted over wireless networks is to encrypt all wireless traffic. This is especially important for organizations subject to regulations. Securing Wireless Access Points Insecure, poorly configured wireless access points can compromise confidentiality by allowing unauthorized access to the network. Use anti-virus and anti-spyware software, and a firewall Computers on a wireless network need the same protections as any computer connected to the Internet. Install anti-virus and anti-spyware software, and keep them up-to-date. If your firewall was shipped in the off mode, turn it on. Change your routers pre-set password for administration The manufacturer of your wireless router probably assigned it a standard default password that allows you to set up and operate the router. Hackers know these default passwords, so change it to something only you know. The longer the password, the tougher it is to crack. Allow only specific computers to access your wireless network Every computer that is able to communicate with a network is assigned its own unique Media Access Control (MAC) address. Wireless routers usually have a mechanism to allow only devices with particular MAC addresses access to the network. Some hackers have mimicked MAC addresses, so dont rely on this step alone. Training and Educating Users Notice that Figure 1 also includes users as the fourth basic component of wireless networking. As is the case with wired security, users are the key component to wireless networking security. Indeed, the importance of training and educating users about secure wireless behavior cannot be overstated. To be effective, user training and education needs to be repeated periodically. The Security Policy To maintain a secured wireless network security, we need to apply these policies, so that the wireless network can be protected by the major threats and vulnerabilities. Computer Acceptable Use. A general document covering all computer use by eventstaff, including desktop, mobile, home PCs, and servers. Password. A description of the requirements for password protecting computer systems, the rules for choosing passwords, and how the password policy is enforced. Email. This policy covers the use of email sent from any email address and received at any computer system. Web. A specification of what browsers may be used, how they should be configured, and any restrictions on which sites event staff can visit. Mobile Computing and Portable Storage. A description of who owns the mobile computing and portable storage on the network, how they are supported, and what specific devices (if any) are authorized for use on the network. Remote Access. A policy stating who can access what information from which locations under what circumstances. Internet. A description of your Internet-facing gateway configuration, stating what is allowed in and out, and why. Wireless. A specification stating how wireless access will be managed on the network and how access points will be plugged in, secured, and maintained; who is allowed to use them; and under what circumstances. Servers. A statement of the standards for servers, what services are enabled or disabled by default, and important distinctions between production, test, and development environments. Incident Response Plan. No policy is complete until it also specifies what to do when defenses fail: what is considered a security incident; who gets called; who is authorized to shut things down if needed; who is responsible for enforcing applicable local laws; who speaks for the company. Standards: Workstations: Approval for workstation connection must be obtained as part of the standard workstation installation process handled by Information Technology Services, or authorized departmental technical personnel. Other devices (including, but not limited to, network components such as hubs, routers, switches, wireless access points, printers and other communication devices): Approval to connect devices other than workstations must be expressly obtained from Information Technology Services/Network Services. Vendors/visitors can obtain a physical connection access to the University network through Information Technology Services on a per visit basis. This access will be granted for a specific period of time Mail servers may not be run outside of Information Technology Services. Guidelines: Accounts Definition and use of departmental accounts and shared accounts should be restricted as much as possible. Only those functions needed by the user should be made available through such accounts. Servers 1. SSL should be implemented on Web servers if account log-in is required. 2. Run intrusion detection system where appropriate 3. Store backups offsite on a monthly basis. 4. Install firewall system where appropriate 5. Application updates must be performed every 30 days. 6. Run file integrity checker such as Tripwire daily. 7. Periodically test backups for integrity. Passwords 1. should not use any words found in dictionary of any language 2. should not use any combination of letters of a users real name, username, initials or nickname 3. should not use any combination of a famous persons name 4. should not use any combination of a spouses, girlfriends, boyfriends, or childs name 5. should not use any personalized numbers Workstations 1. Turn off workstations overnight. 2. Work-related files should be stored on the Novell cluster in the staff members home directory or the departments work directory 3. Implement periodic backups 4. Logging: a. should be enabled to record: i. successful and unsuccessful login attempts. ii. system and application errors. CONCLUSION: We introduce the top level network security plan in the stadium to control the things happening. So by this we can create the safe atmosphere to the audience in the stadium. We can prevent the things inside the stadium only but out side the stadium we cant, so the government have to come forward and give the external security to the stadium. Because of the terrorism attacks the government has to be very careful in giving the security to the stadium. For this each and every person who entering into the stadium is first checked with bomb squad and also by the wireless detector. By this we can provide the safety to people and the players in the match.

Friday, January 17, 2020

Six Challenges for Educational Technology

Six Challenges for Educational Technology Chris Dede George Mason University Many exciting applications of information technology in schools validate that new technology-based models of teaching and learning have the power to dramatically improve educational outcomes. As a result, many people are asking how to scale-up the scattered, successful â€Å"islands of innovation† instructional technology has empowered into universal improvements in schooling enabled by major shifts in standard educational practices.Undertaking â€Å"systemic reform† (sustained, large-scale, simultaneous innovation in curriculum; pedagogy; assessment; professional development; administration; incentives; and partnerships for learning among schools, businesses, homes, and community settings) requires policies and practices different than fostering pilot projects for small-scale educational improvement. Systemic reform involves moving from utilizing special, external resources to reconfiguring ex isting budgets in order to free up money for innovation.Without undercutting their power, change strategies effective when pioneered by leaders in educational innovation must be modified to be implemented by typical educators. Technology-based innovations offer special challenges and opportunities in this scalingup process. I believe that systemic reform is not possible without utilizing the full power of high performance computing and communications to enhance the reshaping of schools. Yet the cost of technology, its rapid evolution, and the special knowledge and skills required of its users pose substantial barriers to effective utilization.One way to frame these issues is to pose six questions that school boards, taxpayers, educators, business groups, politicians, and parents are asking about implementing large-scale, technology-based educational innovations. After each question, I’ll respond to the issues it raises. Collectively, these answers outline a strategy for scali ng-up, leveraging the power of technology while minimizing its intrinsic challenges. Question One: How can schools afford to purchase enough multimedia-capable, Internetconnected computers so that a classroom machine is always available for every two to three students?Giving all students continuous access to multimedia-capable, Internet-connected computers is currently quite fashionable. For politicians, the Internet in every classroom has become the modern equivalent of the promised â€Å"chicken in every pot. † Communities urge everyone to provide volunteer support for NetDays that wire the schools. Information technology vendors are offering special programs to encourage massive educational purchases. States are setting aside substantial amounts of money for building information infrastructures dedicated to instructional usage.Yet, as an educational technologist, I am more dismayed than delighted. Some of my nervousness about this initiative comes from the â€Å"First Gen eration† thinking about information technology that underlies these visions. Multimedia-capable, Internet-connected computers are seen by many as magical devices, â€Å"silver bullets† to solve the problems of schools. Teachers and 2 administrators who use new media are assumed to be automatically more effective than those who do not.Classroom computers are envisioned as a technology comparable to fire: just by sitting near these devices, students get a benefit from them, as knowledge and skills radiate from the monitors into their minds. Yet decades of experience with technological innovations based on First Generation thinking have demonstrated that this viewpoint is misguided. Classroom computers that are acquired as panaceas end up as doorstops. As discussed later, information technology is a costeffective investment only in the context of systemic reform.Unless other simultaneous innovations in pedagogy, curriculum, assessment, and school organization are coupled t o the usage of instructional technology, the time and effort expended on implementing these devices produces few improvements in educational outcomes—and reinforces many educators’ cynicism about fads based on magical machines. I feel additional concern about attempts to supply every student with continuous access to high performance computing and communications because of the likely cost of this massive investment.Depending on the assumptions made about the technological capabilities involved, estimates of the financial resources needed for such an information infrastructure vary (Coley, Cradler, & Engel, 1997). Extrapolating the most detailed cost model (McKinsey & Company, 1995) to one multimedia-capable, Internet-connected computer for every two to three students yields a price tag of about ninety-four billion dollars of initial investment and twenty-eight billion dollars per year in ongoing costs, a financial commitment that would drain schools of all discretionar y funding for at least a decade.For several reasons, this is an impractical approach for improving education. First, putting this money into computers-and-cables is too large an investment in just one part of the infrastructure improvements that many schools desperately need. Buildings are falling apart, furnishings are dilapidated, playgrounds need repair, asbestos must be removed†¦ otherwise, the machines themselves will cease to function as their context deteriorates.Also, substantial funding is needed for other types of innovations required to make instructional hardware effective, such as standards-based curricular materials for the WorldWide Web and alternative kinds of pedagogy based on partnerships between teachers and tools. (The McKinsey cost estimates do include some funding for content development and staff training, but in my judgment too little to enable effective technology integration and systemic reform. ) If most of the money goes into new media, little fundin g is available for the new messages and meanings that those devices could empower.Second, without substantial and extended professional development in the innovative models of teaching and learning that instructional technology makes affordable and sustainable, many educators will not use these devices to their full potential. â€Å"Second Generation† thinking in educational technology does not see computers as magic, but does make the mistake of focusing on automation as their fundamental purpose. Computers are envisioned as ways to empower â€Å"teaching by telling† and â€Å"learning by listening,† serving as a fire hose to spray information from the Internet into learners’ minds.However, even without educational technology, classrooms are already drowning in data, and an overcrowded curriculum puts students and teachers on the brink of intellectual indigestion. Adding additional information, even when coated with multimedia bells-and-whistles, is like ly to worsen rather than improve educational settings. Professional 3 development needs are more complex than increasing educators’ technical literacy (e. g. , training in how to use web browsers).The issue is building teachers’ knowledge and skills in alternative types of pedagogy and content, and such an increase in human capabilities requires substantial funding that will be unavailable if almost all resources are put into hardware. Third, the continuing costs of maintaining and upgrading a massive infusion of schoolbased technology would be prohibitive. High performance computing and communications requires high tech skills to keep operational and will become obsolete in five to seven years as information technology continues its rapid advance.Yet taxpayers now see computers as similar to blackboards: buy them once, and they are inexpensively in place for the lifetime of the school. School boards rapidly become restive at sizable yearly expenditures for technology maintenance and telecommunications usage—especially if, several months after installation, standardized test scores have not yet dramatically risen—and will become apoplectic if another $50B to replace obsolete equipment is required only a few years after an initial huge expenditure.For all these reasons, investing a huge sum in information infrastructures for schools is impractical and invites a later backlash against educational technology as yet another failed fad. I would go farther, however, and argue that we should not make such an investment even if the â€Å"technology fairy† were to leave $100B under our virtual pillows, no strings attached. Kids continuously working on machines with teachers wandering around coaching the confused is the wrong model for the classroom of the future; I wince when I see those types of vendor commercials.In that situation—just as in classrooms with no technology—too much instructional activity tends to center on presentation and motivation, building a foundation of ideas and skills as well as some context for why students should care. Yet this temporary interest and readiness to master curricular material rapidly fades when no time is left for reflection and application, as teachers and students move on to the next required topic in the overcrowded curriculum, desperately trying to meet all the standards and prepare for the test.Substantial research documents that helping students make sense out of something they have assimilated, but do not yet understand is crucial for inducing learning that is retained and generalized (Schank & Jona, 1991). Reflective discussion of shared experiences from multiple perspectives is essential in learners’ converting information into knowledge, as well as in students mastering the collaborative creation of meaning and purpose (Edelson, Pea, & Gomez, 1996).Some of these interpretative and expressive activities are enhanced by educational devices, bu t many are best conducted via face-to-face interaction, without the intervening filter and mask of computer-mediated communication (Brown & Campione, 1994). What if instead much of the presentation and motivation that is foundational for learning occurred outside of classroom settings, via information technologies part of home and workplace and community contexts? Students would arrive at school already imbued with some background and motivation, ripe for guided inquiry, ready for interpretation and collaborative construction of knowledge.People are spending lots of money on devices purchased for entertainment and information services: televisions, videotape players, computers, Web TV, videogames. Many of these technologies are astonishingly powerful and inexpensive; for example, the Nintendo 64 machine available now for a couple hundred dollars is the equivalent of a several hundred 4 thousand dollar graphics supercomputer a decade ago. What if these devices—many ubiquitous in rich and poor homes, urban and rural areas—were also utilized for educational purposes, even though not acquired for that reason?By off-loading from classroom settings some of the burden of presenting material and inducing motivation, learning activities that use the technology infrastructure outside of schools would reduce the amount of money needed for adequate levels of classroom-based technology. Such a strategy also enables teachers to focus on students’ interpretation and expressive articulation without feeling obligated to use technology in every step of the process. Such a model of â€Å"distributed learning† involves orchestrating educational activities among classrooms, workplaces, homes, and community settings (Dede, 1996).This pedagogical strategy models for students that learning is integral to all aspects of life—not just schooling— and that people adept at learning are fluent in using many types of information tools scattered thro ughout our everyday context. Such an educational approach also can build partnerships for learning between teachers and families; this is important because parental involvement is certainly one of the most powerful levers in increasing any student’s educational performance.In other words, unless â€Å"systemic reform† in education is conducted with one boundary of the system around the school and another boundary around the society, its affordability and sustainability are doubtful. As a bridge across these boundaries, new media can play a vital role in facilitating this bi-level approach to large-scale educational innovation. For example, videogame players are the only interactive devices widely available in poor households and provide a sophisticated, but inexpensive computational platform for learning—if we develop better content than the mindless follies of SuperMarioâ„ ¢ or the grim dystopias of Doomâ„ ¢.My research in virtual reality illustrates how multisensory, immersive virtual environments could leverage learning complex scientific concepts on computational platforms as commonplace as next decade’s videogames (http://www. virtual. gmu. edu). Districts can leverage their scarce resources for innovation, as well as implement more effective educational models, by utilizing information devices outside of classrooms to create learning environments that complement computers and communications in schools.To instead saturate schools with information technology is both very expensive and less educationally effective. Question Two: How can schools afford enough computers and telecommunications to sustain new models of teaching and learning? Educational improvement based on distributed learning—utilizing information technologies external to school settings to enable increased interpretive and expressive activities in classrooms—does not mean that schools won’t need substantial amounts of computers and commu nications.To empower project-based learning through guided inquiry, students must have access to sophisticated information devices in schools (Linn, 1997). Even if this is accomplished via notebook computers and wireless networks moved from class to class as required, with pupils also spending significant amounts of time learning without the aid of technology, districts must allocate more money to purchasing, maintaining, and upgrading computers and telecommunications than has been true historically. Where will educators find the funds for equipment, software, technical staff, ongoing telecommunications services, professional development—the myriad of costs associated with a sophisticated information infrastructure? In the past, this money has come largely from special external sources: grants, community donations, bond initiatives. To be sustainable over the long run, however, resources for technology must come from reallocating existing budgets by reducing other types of ex penditures.Of course, such shifts in financing are resisted by those groups whose resources are cut, and district administrators and school boards have been reluctant to take on the political challenges of changing how money is spent. An easy way to kill educational innovations is to declare that of course they will be implemented—as long as no existing activities must be curtailed to fund new approaches. Such an approach to institutional evolution is one reason why, if Rip Van Winkle awoke today, he would recognize almost nothing in modern society—except schools.Educational organizations are unique, however, in demanding that technology implementation accomplished via add-on funding. Every other type of societal institution (e. g. , factories, hospitals, retail outlets, banks) recognizes that the power of information devices stems in part from their ability to reconfigure employee roles and organizational functioning. These establishments use the power of technology t o alter their standard practices, so that the cost of computers and communications is funded by improvements in effectiveness within the organization, by doing more with less.If educators were to adopt this model—reallocating existing resources to fund technology implementation—what types of expenditures would drop so that existing funds could cover the costs of computers and communications? First, schools that have adopted the inquiry-based models of pedagogy find that outlays on textbooks and other types of standardized instructional materials decrease. While these materials are a smaller part of districts’ budgets than salaries or physical plants, nonetheless they cost a significant amount of money.When students collect their own data, draw down information across the Internet, and interact with a larger pool of experts than teachers and textbooks, fewer commercial presentational resources are required—especially if learners draw on topical data flowin g through information sources outside of schools. Moreover, covering a few concepts in depth rather than surveying many ideas superficially reduces the amount of prepackaged information educators must purchase.A second way to reconfigure existing financial resources is to reduce the staff involved in data entry operations. Educators are inundated with large amounts of recordkeeping functions, and one of the most debilitating aspects of this work is the continuous reentry of identical information on different forms. Businesses have saved substantial amounts of money by altering routine information processes so that data is only entered once, then automatically flows across the entire organization to each place in which it is needed.Were educators to adopt these already proven models for cost-efficient information management, the amount of time and staff required for data entry functions would decrease markedly, freeing funding for instruction-related uses of technology. Third, and on a more fundamental level, teaching is more efficient and effective with new types of technology-based curriculum and pedagogy. At present, substantial re-teaching of 6 knowledge and skills is required; presentational material flows into students’ minds, is retained just long enough to perform on a test, and then is forgotten.Class sizes are typically between twenty-five and forty—somewhat too large for effective project-based learning, yet small given that lectures work as well for several hundred students as for several dozen. The scheduling of class periods is too short, limiting teachers and students to fragmentary presentational and practice activities. Teachers all have comparable roles with similar pay structures—unlike other societal organizations, which have complementary staff roles with a mix of skill levels and salaries. Visions presented in the forthcoming 1998 ASCD Yearbook Dede & Palumbo, in press) depict how altered configurations of human resour ces, instructional modalities, and organizational structures could result in greater effectiveness for comparable costs—even with the acquisition of substantial school-based technology. This case is also made at greater length in Hunter & Goldberg (1995). In the commercial sector, too often these types of institutional shifts result in layoffs. However, because of the coming wave of retirements among educators, districts have a window of opportunity to accomplish structural changes without major adverse impacts on employees.Over the next decade, large numbers of â€Å"baby-boom† educators will leave the profession, and a staged process of organizational restructuring could occur in parallel with those retirements. Coordinating technology expenditures as an integral part of that larger framework for institutional evolution is vital in districts’ planning to afford computers and communications. Question Three: How can many educators disinterested or phobic about c omputers and communications be induced to adopt new technology-based models of teaching and learning?Thus far, most educators who use technology to implement the alternative types of pedagogy and curriculum are â€Å"pioneers†: people who see continuous change and growth as an integral part of their profession and who are willing to swim against the tide of conventional operating procedures—often at considerable personal cost. However, to achieve large-scale shifts in standard educational practices, many more teachers must alter their pedagogical approaches; and schools’ management, institutional structure, and relationship to the community must change in fundamental ways.This requires that â€Å"settlers† (people who appreciate stability and do not want heroic efforts to become an everyday requirement) must be convinced to make the leap to a different mode of professional activity—with the understanding that, once they have mastered these new appr oaches, their daily work will be sustainable without extraordinary exertion. How can a critical mass of educators in a district be induced simultaneously to make such a shift? Studies of innovation in other types of institutions indicate that successful change is always bottom-up, middle-out, and top-down.The driver for bottom-up innovation in a district is the children. Typically, students are joyful and committed when they are given the opportunity to learn by doing, to engage in collaborative construction of knowledge, and to experience mentoring relationships. That these types of instruction are accomplished via educational technology will excite some kids, while others will be indifferent—but all will appreciate the opportunity to move beyond learning by listening.Educators can draw enormous strength and purpose from watching the eager response of their students to classroom situations that use alternative forms of pedagogy. Often, teachers have shifted from pioneers to settlers 7 because they were worn down by the unceasing grind of motivating students to master uninteresting, fragmented topics; and administrators have undergone a similar loss of enthusiasm by being inundated with paperwork rather than serving as instructional coordinators. The professional commitment that kids’ enthusiasm can re-inspire is a powerful driver of bottom-up change.The source of middle-out change is a district’s pioneers. Many teachers entered the profession because they love students of a certain age and want to help them grow—or love their subject matter and want to share its beauty and richness. Often, these teachers feel alienated because the straightjacket of traditional instruction and school organization walls them away from meaningful relationships with their students and their subject. Similarly, many administrators want to serve as leaders and facilitators, but are forced by conventional managerial practices into being bureaucrats and bo sses.Middle-out change is empowered when educators who have given up hope of achieving their professional dreams see pioneer colleagues using technology to succeed in those goals—and realize that, if everyone made a similar commitment, no one would have to make continuous personal sacrifices to achieve this vision. The lever for top-down innovation is the community served by the district. Educators want respect—yet teaching has fallen from a revered professions to a much lower status.The relationship between educators and their community is seldom seen as a partnership; instead, teachers and administrators often feel isolated, forced to perform a difficult task with inadequate resources. Parents, the business sector, and taxpayers bitterly debate the purpose of schools and sometimes attempt to micro-manage their operation. In contrast, when homes, classrooms, workplaces and community settings are linked via new media to achieve distributed learning, much more positive interactions emerge between schools and society.Educators can move from isolation to collaboration with the community, from a position of low esteem to an respected role in orchestrating children’s learning across a spectrum of settings. This shift in status is a powerful driver for innovation. To activate these bottom-up, middle-out, and top-down forces for improvement, educators must take the lead in developing a shared vision for systemic reform, distributed learning, and sophisticated utilization of technology. Making such a commitment to large-scale educational innovation is not only the right thing to do, but is increasingly essential to educators’ professional integrity.In many ways, physicians working in health maintenance organizations (HMOs) face challenges similar to teachers and administrators working in today’s schools. These doctors are responsible for the well-being of their patients, but work within administrative structures that restrict their d ecision making capabilities, that are focused on saving money at least as much as on combating illness, and that do not provide the latest technology or much time and resources for professional development.Yet we expect those physicians to do whatever it takes—fight the system for what the patient needs, spend personal time mastering the latest medical advances and technologies—to help those whom they serve. To do otherwise would be malpractice, a betrayal of trust, a breach of ethics as a professional. Given advances in information technology that are reshaping the knowledge students need and the ways educators can help them learn, we need to accept a professional obligation—despite current institutional constraints—to do whatever it takes in changing traditional instructional practices so that a generation of children is truly prepared for the 21st century. Question Four: How do we prove to communities that new, technology-based models of teaching and l earning are better than current instructional approaches? Few communities are willing to take educational innovations â€Å"on faith. † Many people are uneasy about whether conventional instruction and traditional testing are developing and assessing the types of knowledge and skills children need for their future.However, most parents and taxpayers feel that the current system worked for them and do not want to substitute something radically different unless new methods are proven to be superior. What types of evidence can educators offer communities that innovative, technology-based models of teaching and learning are so much better—given what our society needs in the 21st century—that the substantial cost and effort of systemic reform is more than worth the trouble?Research documents that new, technology-based pedagogical strategies result in at least four kinds of improvements in educational outcomes. Some of these gains are easy to communicate to the commun ity; others are difficult—but together they constitute a body of evidence that can convince most people. These four types of improvements are listed below, in sequence from the most readily documented to the hardest to demonstrate. Increased learner motivation.Students are very excited when exposed to learning experiences that go beyond information assimilation and teaching-by-telling. Guided inquiry, project-based collaboration, and mentoring relationships all evoke increased learner motivation, manifested via readily observable indicators such as better attendance, higher concentration, and greater time on task. All of these not only correlate with increased educational performance, but also are in stark contrast to the attitudes parents and taxpayers formed about most of their schooling.Documenting to communities that students care about what they are learning and are working hard to achieve complex goals is not difficult, given the ubiquity of videotape players and camcor ders. Student-produced videos that show learners engaged and excited are intriguing to parents and taxpayers, who may not fully understand what is happening in the classroom, but are impressed by student behavior divergent from their own memories and likely to result in better learning outcomes.Too often, educators take little advantage of this easy way to open a dialogue about instructional improvement with the community. Advanced topics mastered. Whatever else they believe about the purposes of schooling, parents want their children to have a prosperous lifestyle and know that this necessitates mastering advanced concepts. In the 21st century, being a successful worker and an informed citizen will require the sophisticated knowledge delineated in the national curriculum standards, especially in the sciences and mathematics.Information technology can help students not only to learn these difficult concepts, but also to master the learning-how-to-learn skills needed to keep their ca pabilities current in a rapidly evolving economy. When shown that technologybased instructional strategies enable teaching sophisticated ideas not now part of the conventional curriculum, more complex than the items on current standardized tests, and harder than what they learned in school, taxpayers are impressed. 9 Students acting as experts do.Developing in learners the ability to use problem solving processes similar to those of experts is challenging, but provides powerful evidence that students are gaining the skills they will need to succeed in the 21st century. One of the most striking features of a classroom based on new instructional models is that learners are behaving as do teams of scientists, mathematicians, designers, or other kinds of expert problem solvers. Pupils’ activities in these learning environments mirror the analytic, interpretive, creative, and expressive uses of information tools increasingly characteristic of sophisticated workplace settings.When parents and taxpayers see students perform complex tasks and create intricate products, they are impressed by the similarity between the recent evolution of their own workplaces and the skills children are developing. Better outcomes on standardized tests. The most difficult type of evidence to provide for the superiority of new, technology-based instructional models is what communities first demand: higher scores on conventional measures of achievement.Standardized tests are designed to assess only a narrow range of knowledge, and the other three types of improvements just discussed fall largely outside the scope of what they measure. A major challenge for educational assessment is to develop methods that measure a wider range of skills than paper-and-pencil, multiple choice tests, without bogging educators down in complex, time-consuming, and potentially unreliable performance evaluations.Research shows that students’ outcomes on conventional achievement tests rise when tec hnology-based educational innovations are implemented, but this does not occur immediately, as teachers and learners must first master these new models of pedagogy. To succeed in systemic reform, educators must prepare communities for the fact that test scores will not instantly rise and that other, complementary types of improvements less easy to report quantitatively are better short-range measures of improvement.Overall, the single most effective means of convincing parents, the business community, and taxpayers that technology-based models of teaching are superior to conventional instructional approaches is to involve them in students’ education. Through distributed learning approaches that build partnerships between schools and society, communities have ample opportunities to observe the types of evidence discussed above, as well as to further enhance students’ educational outcomes. Question Five: How can educational technology increase equity rather than widen cu rrent gaps between â€Å"haves† and â€Å"have-nots? Implemented within a larger context of systemic reform, emerging information technologies can produce dramatic improvements in learning outcomes. But won’t such educational usage of computers and communications widen inequities in our society? However ample the access to technology students have in schools, learners differ greatly in the amount and sophistication of information devices in their homes and communities. Isn’t all this effort simply making education better for the â€Å"haves,† potentially worsening our society’s pathological gaps in income and power?Certainly, new media such as Web TV are dropping in price, and almost all homes have videogames, television, and videotape players—but won’t the rich always have more information devices of greater power than the poor, skewing the advantages of distributed learning and increasing inequality? 10 From an historical perspecti ve, innovative information technologies at first widen inequities within civilization, because initial access to the differential advantage they bring is restricted to the few who can afford the substantial expense of this increased power.As emerging media mature, drop in price, and are widely adopted, however, the ultimate impact of information technology is to make society more egalitarian. For example, the world of universal telephone service is a more equitable environment than was the world of messenger boys and telegraph offices. The challenge for current educational policy is to minimize the period during which the gap between haves and have-nots widens, rapidly moving to a maturity of usage and an universality of access that promotes increased equity.At present, most of society’s attempts to decrease the widened inequalities that new educational technologies could create are centered on access and literacy. In schools that serve disadvantaged and at-risk populations, extra efforts are made to increase the amount of computers and communications available. Similarly, educators and learners in have-not situations are given special training to ensure that they are literate in information tools, such as web browsers.To compensate for more home-based technology in affluent areas, many feel that our best strategy is providing teachers and students in low socioeconomic status areas with additional technology to â€Å"level the playing field† (Coley, Cradler, & Engel, 1997). While a good place to begin, this approach to educational equity is inadequate unless taken beyond access and literacy to also address issues of content and services. The on-line materials and types of assistance that learners and teachers can access must reflect the needs and interests of diverse and at-risk students.For example, I can take homeless people to the public library and show them how to use a web browser to download images of impressionist paintings at the Louvre, but this is not likely to motivate or impress them, since such a learning experience does not speak to their primary needs. Similarly, emerging graphical interfaces such as Microsoft Windowsâ„ ¢ enhance many users’ capabilities, but adversely affect learners with reduced eyesight who cannot effectively manipulate the visual features of these interfaces.The real issue in equity is empowerment—tailoring information technology to give dispossessed groups what they want. For example, I worked with a local team of politicians to explore the implications of information technology for improving public services. They were excited about using community-based information terminals to offer improved access to health care, welfare, education, and other social services for the immigrant and minority populations they served. However, when I began to describe how on-line communication tools could help these groups to increase their participation n voting and to form coalitions fo r political action, the elected representatives immediately lost interest. To truly achieve educational equity, working collaboratively with have-not populations is vital in developing content and services tailored to their needs and designed to build on their strengths and agendas. Otherwise, improving access and literacy will fall short of the success for all students essential to America’s prosperity in the 21st century. Question Six: If we use technology well, what should we expect as â€Å"typical† student performance? 1 If we were to implement systemic reform based on new strategies for learning through sophisticated technology, research suggests that â€Å"typical† students might do as well as â€Å"exemplary† learners do now. Our expectations for what pupils can accomplish are far too low, largely because standard educational processes are obsolete given the progression of information technology, insights into the nature of learning, and shifts in the educational outcomes society needs.In many ways, we live in the â€Å"Dark Ages† of schooling—restrained from making rapid advances toward increased instructional effectiveness by outmoded ideas, ritual, and tradition. Setting our sights higher and using better metrics to measure progress are vital to successful innovation. For example, many people are intrigued by results from the Third International Mathematics and Science Study (TIMSS), which show the United States well behind nations such as Singapore and Japan on math and science outcomes from a globally developed achievement test. Crusaders are implementing reforms to ensure that our students do much better on this test.However, our goal should not be to exceed the level of Singapore on an assessment instrument that, as described earlier, measures only a fraction of what students need to know for their future prosperity—and moreover incorporates a diluted definition of educational quality negotiated a cross many countries with very different populations and national goals. Others advocate using a standards-based curriculum as the touchstone for educational effectiveness, and reformers are centering state and national judgments of educational worth on this measure.Certainly, the National Council of Teachers of Mathematics (NCTM) standards are a major improvement over the hodgepodge math curriculum before their inception, as are the American Association for the Advancement of Science (AAAS) standards and similar efforts in other fields. But our metric for whether students succeed should not simply be whether they learn the math mathematicians think is important, the science scientists feel is vital, and so on. Being a productive worker and citizen involves much more than having an adequate background in each field of knowledge.Integrating these concepts and skills and being a lifelong learner with the self-worth, discipline, and motivation to apply this knowledge is of paramount im portance—yet not captured by discipline-based standards alone. New forms of pedagogy are also no â€Å"philosopher’s stone† that can make golden each educational experience for every learner. Some argue that, if only all classrooms were based on constructivist learning or situated cognition or individualized tutoring or multimedia presentations or integrated learning systems or whatever pedagogical panacea, every student would succeed.However, learning is a very complex and idiosyncratic process that requires, for each pupil, a repertoire of many different types of instruction orchestrated together. In other words, no test, no curriculum, and no instructional strategy in itself can guarantee educational quality—even though our current approach to determining schools’ worth is based on these inadequate measures. Instead, we need new standards for a knowledge-based society that combine all these metrics for success and that are based on much higher l evels of â€Å"typical† student outcomes.Successful technology-based innovations have the common characteristic that learners exceed everyone’s expectations for what is possible. Second graders do fifth grade work; nine graders outscore twelfth grade students. What would those ninth graders be accomplishing if, 12 from kindergarten on, they had continuous access to our best tools, curriculum, and pedagogy? Would they be the equivalent of college sophomores? We are selling short a generation by expecting less and by orienting our curriculum, instruction, and tests accordingly.Conclusion My responses to the six questions above sketch a conceptual framework for thinking about the process of scaling-up from islands of innovation to widespread shifts in standard educational practices. These answers illustrate that technology-based systemic reform is hard in part because our ways of thinking about implementation are often flawed. Large-scale educational innovation will never be easy, but can be less difficult if we go beyond our implicit assumptions about learning, technology, equity, schooling, and society.Understanding the scaling-up process is vital for making strategies for change affordable, generalizable, and sustainable. References Brown, A. L. , & Campione, J. C. (1994). Guided discovery in a community of learners. In K. McGilly (Ed. ), Classroom lessons: Integrating cognitive theory and classroom practice (pp. 229-270). Cambridge, MA: MIT Press. Coley, R. J. , Cradler, J. , & Engel, P. K. (1997). Computers and classrooms: The status of technology in U. S. schools. Princeton, NJ: Educational Testing Service. Dede, C. , & Palumbo, D. (Eds). (in press). Learning with technology (the 1998 ASCD Yearbook).Alexandria, VA: ASCD. Dede, C. (1996). Emerging technologies and distributed learning. American Journal of Distance Education 10, 2, 4-36. Edelson, D. C. , Pea, R. D. , & Gomez, L. M. (1996). Constructivism in the collaboratory. In B. Wilson (Ed. ) , Constructivist learning environments: Case studies in instructional design. Englewood Cliffs, NJ: Educational Technology Publications. Hunter, B. , & Goldberg, B. (1995) Learning and teaching in 2004: The BIG DIG. In U. S. Congress, Office of Technology Assessment, Education and technology: Future visions (OTABP-EHR-169).Washington, DC: U. S. Government Printing Office. Linn, M. C. (1997). Learning and instruction in science education: Taking advantage of technology. In D. Tobin & B. J. Fraser (Eds. ), International handbook of science education. The Netherlands: Kluwer. McKinsey & Company. (1995). Connecting K-12 schools to the information superhighway. Palo Alto, CA: McKinsey & Company. Schank, R. C. , & Jona, M. Y. (1991). Empowering the student: New perspectives on the design of teaching systems. The Journal of Learning Sciences, 1, 7-35.

Thursday, January 9, 2020

Social, Economic And Environmental Characteristics For...

This paper will explore the social, economic and environmental characteristics for entrepreneurship in the Olusosun rubbish dump as depicted in the movie welcome to Lagos. (LINES OF EXPLORATION) Nigeria faces vast inequality with a gini coefficient standing at 48. 8 (United Nations Development Programme, 2013). Lagos is home to the largest slum in the country, which is Ajungle. Nearly thirty kilometers away from the cities largest slum is a landfill where nearly 1000 people live and work. Despite being characterized as scavengers of garbage, they are actually entrepreneurs. These people have created a business from what they find in the dump and how they are able to make a profit from what others didn’t find value in. This essay†¦show more content†¦A beneficial inequality represented in the documentary as well as in the papers is that there is no child labor within the dump. All workers are of sixteen years of age or older (Adepegba and Ogunrinola, 2012). This documentary also takes a look on how the poor peoples actions are all represented as one, and how for the most part they are socially unaccepted by others who live in Lagos. The people in the dump ar e ones to be blamed for social inequality. The majority of the people in the dump are there to make a business. In order to stay in business they have to stay out of the public’s eye. When one of the main characters in the documentary got arrested, the situation threatened the whole dump. The reckless behavior of one man was portrayed throughout the thousands of other people working in the dump as being incompetent and troublemakers of society (Nwoye, n.d). Environmentally, the Olusosun rubbish dump is a place for its inhabitants to thrive. It is where they live and it is also where they get all of their resources to sustain their businesses. By the end of the documentary you get the sense that it is a good place for these people to live. The film does show how they face many challenges in the dump such as fires, which can suspend their sales between days and weeks. This film fails to recognize how these challenges and some of the practices these people use to get their prod uct prepared for sale actually cause harm to their lives and others who

Wednesday, January 1, 2020

Nur Misuari †Founding Leader and Chairman of the Central...

Nur Misuari Introduction Nurallaji (Nur) Misuari was born on March 3, 1942 in Jolo, the fourth son in a family of 10 children. His parents were simple Tau Sug and Sama fisherfolks from Kabinga-an, Tapul Island. According to friends, Nur was so poor that he could never have gone to college were it not for a kindly teacher in Jolo who recognized his potentials and pulled off a scholarship for him as a Commission on National Integration (CNI) scholar at the University of the Philippines (UP) in Manila. Nur recalls being an ordinary child without ambition. All I wanted was to go to school and serve my family. In 1958, Nur left Jolo to attend the university, where friends say he was soft spoken, reserved, and a disciplined student.†¦show more content†¦Training as a Revolutionary The Malaysian government of Tunku Abdul Rahman, on the other hand, responded to the incident by promising Muslim leaders, especially Sultan Haroun Al-Raschid Lucman, the Congressman from Lanao, that it would help train and provide arms to dedicated young Muslims. Nur Misuari, together with Abul Khayr Alonto, were part of the first batch of 90 young Muslims, composed of 67 Maranaos, 8 Maguindanaos, and 15 Tausug-Samal, recruited by MIM leaders and Lucman, who began military training in Pulao Pangkor, Malaysia, by Malaysian officers, in 1969. In the midst of their military training, this group of 90 conducted political discussions and analysis of Moro history and aspirations of an independent state, among themselves. Thus was the conception of the Moro National Liberation Front (MNLF). This group of 90 later became the hardcore of the Bangsa Moro Army (BMA), the military arm of the MNLF. Within this period of training, without the knowledge of Rashid Lucman and the MIM leaders who had recruited them, the group organized a seven-man Provisional Central Committee, electing Nur Misuari as Chairman and Abul Khayr Alonto as Vice Chairman. The other major portfolios were given to Otto Salahuddin of Basilan, Ali Wali of Zamboanga. Hashim Salamat was tasked to head the undivided Empire Province of Cotabato where a provincial committee was set up immediately. Upon the arrival of the first batch