


下載本文檔
版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)
文檔簡介
1、Talking about the Risk Management by Usingthe Information Technology in Teacher EducationSino-Australia Class 10037326Wenling Teachers Further Education School, where I work, is the training center for all the elementary and middle school teachers and educators of Wenling City. It is responsible for
2、 about 9205 elementary and middle schools teachers training. In 1993, it is authorized into one of the basic constructions of German Hans-Seidal Foundation (Dilingen Education Institute) and Zhejiang Elementary and Middle Schools Teacher Training Center by Zhejiang Province Education Department. It
3、is also evaluated the State-level Teacher Education Demonstration Organization in 2005.Modern ideas such as opening education,lifelong education and subject education have been set up in my city. Also new teacher education methods of concentrated education experts guid ance, companions mutual aid in
4、 “school-centered ”studying and self-reflection by ones own have been constructed. These modern ideas and new methods are unimaginable for 30 teachers in my school, who are especially in charge of elementary and middle school teacher education, to complete the task of training more than 9000 teacher
5、s. At present, as a kind of modern education medium, the information techniques are developing fast, which are applied widely in our education, particularly teacher education. With the establishment of “Wenling Teacher Education Website”by my school in the early time, great changes havetaken place i
6、n the learning, working, and living styles of all the elementary andmiddle school teachers, including studying contents, education ideas, exchanged thought, learning ways, studying means, studying time and space etc. It not only enhances the realization of teacher education goals, but also makes 100
7、% elementary and middle school teachers learn to use modern information techniques. But the usage of information techniques also brings us the new challenge It represents a new realm of the risk of the school, because the new technique has the latent power to change the current education system. (Qu
8、inn,2003)As we know, the application of new techniques is earlier than the risk management and the policy guarantee (Quinn, 2003). The risk management and thepolicy guarantee are mostly developing and improving in the applied process of the information technique. The analysis of the investigation in
9、 my city education system shows: the time for such development and improvement needs about three to five years generally, and some individuals demand more time. A series of approximate perfect operation requests and rules, e.g., Rules for the School Education and the Research Computer Network Usersa
10、nd Rules and Regulationsof the usage of Information Techniques by Elementary and Middle Schools Teachers, have been displayed by our Education Department and related schools. These rules play an important part in supporting teachers to have the legal right to acquire personal information and data.Th
11、e debut of these rules and demandscome from the following important related laws, regulations, and codes systems.Chart One:Laws and Regulations layerThe name oflawsregulationsandRelease organization and timeMain provisionrelated to the law, laws andregulationsAssemblyNationalPeople s lheninthOne who
12、 has one of the followingbehaviorsCongressdecisionNationalconstitute crime of, relevant rule to pursue theconcerningthePeoplespertaining to crime responsibilitymaintenanceCongress Make use of the Internet indignity others orInternet safepassesonfabricate evidence to calumniate the othersDecember Ill
13、egal intercept and seize, distort, delete the28, 2000others E-mails or other data, infringe upon the citizen correspondence freedom and correspond by letter the secret; Make use of the Internet steal, swindle and extortion Make use of the Internetinvasion othersintelligent property right; Establish
14、the obscenity website, web page on theInternet, provide theobscenity station to order thechain to connect the service, or the obscenity books, periodicals, films , videos or pictures.Administra-ThePeople sState According to a certainapplied target and rulestionRepublic of ChinaDepartmentto collect,
15、process, save, deliver, inspecting etc. theorganizationcalculatorreleases onhandler machine system to the rmationsystemFebruary 8 ,safety regulations1994TheinternationalState The related units should be responsible for theirnet of thePeoplesDepartmentown unit and their customers on t
16、he techniqueRepublic of Chinareleases ontraining and management education of the InternetcalculatorFebruary 8 , The correspondence freedom of the customer andinformation network1994the correspondence secret is protectedby the law.managestheAny unit or individual person can not break the lawtemporary
17、 provisionprovision, They are not allowed to use the Internetto make use of the correspondence freedom and the correspondence secret upon the customerTheinternationalState The customers should obey the management ofnet of thePeoplesDepartmentthe unit, obey the customer rules;Republic of Chinagrantso
18、n The customers should not enter the computercalculatorFebruary 8 ,system without permission. They are not allowed toinformation network1994distort the others information.managesthe The customers shouldnot send the malicetemporary provisioninformation on the network, emit to send out theimplement wa
19、yinformation using the others names, infringe uponthe othersprivacy. Theycan notmake thedissemination calculator virus and be engaged in the activity of the other invasion networkand otherslegal rights.ChineseInternetThe Constructa healthy and civilizedInternetprofessioninformationenvironment,guide
20、the InternetpersonnelSelf-disciplineindustryespecially the teenagers to get to the Internetconventionreleases onhealthilyApril24, The Internetinformationnetworkproduct2002fabricator wants to respect the intelligent property right of the others, the objection manufacture implies the product of harmfu
21、l informationandinfringe upon the others intelligent property right. The whole professionguards against thecalculatormalice code or the destructivenessprocedures in the disseminationon the Internettogetherfrom the operator,the objectionmanufacture and disseminations have the calculator procedureof t
22、he malice attack ability to thecalculatornetworkand the others calculatorinformation system, oppose illegal irruptive or break the others calculator information system.TheInternetTheAnyone can not release the information about one ofelectronicsinformationthe followingcontents in electronicsannouncea
23、nnouncestheindustryservice system:service managementreleaseson Spread the rumor, disturb the social order, breakprovisionOctober8,the society stable;2000 Spread the obscenity, sexy, wager , violence, murder, terror or to incite the crime . Humiliate or calumny others, violate the legal rights of oth
24、ers Do the other contents that are not permitted by the law and the administration laws.Educationn ChinaThe Educate the teaching website, register the areaand researchMinistryand hold the net school and the network universitycalculatornetEducationwith the school or the organization name withoutcusto
25、mer rulesonauthorizationwill ,according to the nationNovember relevantlaws and provisionsthat school22, 1996constitutions pursue the parties concerned and the responsibility concerning personnel.JudicialSupremePeoplesSupreme Appropriate the public information network oforganizationCourtconcerningPeo
26、plesothers to get to the Internet the numbered account,take up todisturbCourtpassword get to the Internet, making the others loseconcreteappliedpassesona great deal of telecommunicationfee. Accordingsome problems ofApril28to the provision of the penal code Article 264,law of the telecom-2000sentence
27、 the punishment with the thieves andmunicationmarketburglars offense.managementordercase hermeneuticSupremePeoplesSupreme The work of the dissemination which have alreadyCourtconcerningPeoplespublished on the newspapers and magazines ortake up toinvolveCourtnetwork in addition to the work power pers
28、onthe calculator net-passes ondeclare or ascend carrying the network servicework works powerNovemberpromoter of that work to be subjected to the workdisputecaseto22, 2000power person entrusting declare and canning notapplysometurn to carry, take off plait of, the website turns toproblemsof lawcarry,
29、 take off the plait and press relevant thehermeneuticprovision pays the guerdon and notes the source, dont constitute the infringement.But the websiteturn to carry, take off to weave the work to exceed the relevantnewspapers and magazines to turn tocarry the work scope of, should affirm for the infr
30、ingement.(Bibliography 5 & 6 )With the fast developmentof teacher profession, the means of informationtech niquein teacher education have already completelygot to promote andachieved great social and econo mic performa nee, the rate of which con tributes70% above (Zhu Baigang & Chen Hongsheng, 2003)
31、. But according to the internal data in the recent five years, the risk can not be neglected in the process of teacher using information technique in our education system. Then what is a risk?Risk implies the possibility of an event that may bringloss of something that isimportant ( Tronc , 2004). T
32、hat is to say, an affair produces the possibility of the results that we don t expect. For example, bad information in teachers forum, plagiarism in teacher education homework and articles, visiting bad website, piracy of learning resource and research results, addiction in the network games, chat a
33、nd songs; virus attack in teacher education internet etc.Howto control therisk above in the process of information technology usage? I think it is necessary to describe and analyze these risks. The risk description and analysis is a foundation work for the information technique usage and the procedu
34、re to carry out the risk management. Comprehending from the meaning of the risk, the risk analysis includes two aspects: the possibility of the occurrence and the degree of the serious result that it result produces. It can be displayed as the rate of affairs and the function of its results: R= p, c
35、. Among them, R stands for risk, p stands for the rate of affairs, and c stands for the ace all for the affairs rate, c for serious that affairs take place. The school leadership must understand this problem well, reducing the interference and negative influences that problem bring as far as possibl
36、e, the full exertive information technique promotes thelearning potential(Quinn, 2003). According to this comprehension, I investigated 217 elementary and middle school teachers who were trained in my school. The investigation involves two problems: Concerning what risk possibilities exist during th
37、e trainingthe usage ofin formatio n tech niq ue? Let the teachers make choices. Among them, the top tenterms with higher statistics rate were assured and divided in to five levels accordi ng to the rate. Based on the above, I inv estigated the comme nts by teachers for the serious ness degree, and d
38、ivided them in to five levels accordi ng to the in vestigati on rate. The n Table 2 of the risk evaluati on was formed based on the an alysis data (refere nee toEPA learning materials, 2006).TheriskPossibility(p)Con seque nc(c)Risk grade (R)Riskdescripti onoccurre neeratelevelsserious nesslevelsleve
39、lsGradesIn itiativeSequenceAcademic misc on duct91 %593 %525High risk1Illegal in formatio n dissem in ati on56 %369 %39Mediumrisk4Addictio ningames or chat82 %491 %520High risk2Virus attack34 %195 %55Low risk6Visit ingthebad website66 %335 %13Low risk7Los ing research result45 %238 %12Low risk8Distu
40、rba nee67 %347 %26Low risk5Los ing in formatio n78 %362 %39Mediumrisk4Downl oad piratical software84 %487 %416High risk3Offen sive mail63 %364 %39Medium risk4Note: 【 1 】Level 1 for 40% below; 2 for 40-60%; 3 for 61-80%;4 for 81-90%; 5 for 91% above;【 2 】Risk grades: Lowrisk for 1-7; Medium risk for
41、8-11;High risk for 12-15The table above shows: teachers think the risk types with higher rate in order are academic misconduct, download piratical software, addiction in games and chat, losing information, disturbance, and visiting the bad website. The risk types with serious result are virus attack
42、, academic misconduct, addiction in games and chat, download piratical software, illegal information dissemination, and offensive mail. The risk types of academic misconduct, download piratical software, addiction in games and chat belong to the types of high risk. How to prevent these risks effecti
43、vely? Take the “academic misconduct ”of the highest risk as an example to have a thorough research.In my opinion, a man has two big basic needs. One is to exist, the other to develop. Food and drinks, safety etc. are an essential for a person to live. Chinese teachers treatment , particularly teache
44、rs in the eastern developed regions, is basically in accordance with other medium developed countries. Existence is for the sake of development. When the development gets the obstacle, teachers will take risk to make potential get full exertive for surmount, breaking through, rounding the obstacles.
45、 At present our teachers met various new challenge in intelligence support, profession development, the course reform ; On the other hand, in order to pursue the personal benefits only forprofessional title evaluation,job promotion, appraisal of excellence and prize, an irreconcilable conflict happe
46、nbetween long-term development and short-term utilitarian concerns. The investigation shows: the real reason for academic misconduct comes from teachers themselves giving up the profession in 80%, rather than the reaction on outer mechanism. Recently, because China is during the social transformatio
47、n period, the phenomenon of the morals lossand many cultured persons becomevery uneasy. They take benefits as true, take honor and dignities as false, and adopt the attitude of no matter others smile or scold, I just hold good things . So we used to think the evaluation or comment from other teacher
48、s is enough to make a teacher stop before the ungrateful action, but actually this kind of virtuous defense line is usually nominal. Those persons with academic misconduct think: carrying on academic misconduct through the information technique is easy to get and difficult to be found out. Also no c
49、lear and practicable laws or regulations have been set up to punish those behaviors of academic misconduct. So high risk rate exists naturally. Teachers in my city are asked to hand in an article after a subject training about teacher virtuous and can obtain related 12 credits. But a selective inves
50、tigation shows: the total amount of elementary and middle school teachers involving copying and plagiarizing whole article on the internet to complete the homework occupies more than 70%. Even 20% teachers copy the same topic and headline.The consequence of teachers ill-got academic is terrible, as
51、it has very strong and continuous effect. It mainly has the following three aspects:One is to induct the occupation moral imperfection.Obeying the academic normis one kind of teachers occupation morals, but this kind of occupation moralswould accompany teacher s whole life. Although Some Rules on St
52、rengthening the Academic Morals Construction has been delivered by Education Department in 2002, in fact the effect is still misty through teachersconclusion nowadays. Howprofound and deep it is the influence of imperfection of teacher virtuous on our students. The second is to foster the laziness o
53、neself.Someone says, A modernteacher writes an article with download, copy and stick by computer and mouse.This is a realistic description about modern teachersarticles. As the academicnorm is not strict enough, our teachers profession development level cant participate in the academic competition o
54、r exchanging innovation activities, which is disadvantageous for the implement of the education reform. A teacher who has no learning motivation and power is a bad teacher who delays the whole citizen education. The third is to cause breaking the law easily.With the development, thepossibility of al
55、ways exists. it is true because the circumstances of academic misconduct are growing in recent years. Although no teacher have been punished by law so far. Circumstance of academic misconduct still exist s. With the development of teacher academic communication, the law problems of copyright and kno
56、wledge property right will appear continuously. (Xue Hong, 2000)It is a must for us to consider this high risk of academic misconduct and how to adopt effective measures to prevent it. According to the way of risk management, we should make sure the controlling strategies actively and choose the appropriate valid steps, that is to say, demand clearly before, monitor strictly dur
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年數(shù)字藝術(shù)與設(shè)計課程考試卷及答案
- 2025年護(hù)理學(xué)專業(yè)畢業(yè)生實習(xí)考試試題及答案
- 2025年大數(shù)據(jù)分析師職業(yè)資格考試試題及答案
- 2025年房地產(chǎn)業(yè)務(wù)管理綜合考核試卷及答案
- 屋頂裝修協(xié)議書范本
- 早教工作總結(jié)匯報
- 秦俑創(chuàng)新美術(shù)課件
- 蠶桑養(yǎng)殖培訓(xùn)講座
- 腫瘤病例診療經(jīng)過圖
- 胃癌患者的防治與護(hù)理
- 丹尼森組織文化模型
- 中藥煎藥室應(yīng)急預(yù)案
- 華東師大版七年級數(shù)學(xué)上冊教學(xué)課件
- 中國航天(航天科普知識)PPT
- GB/T 27806-2011環(huán)氧瀝青防腐涂料
- GB/T 17949.1-2000接地系統(tǒng)的土壤電阻率、接地阻抗和地面電位測量導(dǎo)則第1部分:常規(guī)測量
- 夢幻西游古龍服務(wù)端安裝教程
- 《出生醫(yī)學(xué)證明》單親母親情況聲明
- 4配電柜安全風(fēng)險點告知牌
- 旋挖機操作手知識試卷含參考答案
- Q∕GDW 11445-2015 國家電網(wǎng)公司管理信息系統(tǒng)安全基線要求
評論
0/150
提交評論