Instant Messaging: Does It Have A Place in Business Networks?

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 15

Instant Messaging: Does it have a Place in Business Networks?

Launched: Nov 02, 2004 Updated: Apr 06, 2005 Section: Articles :: Misc Network Security Author: Deb Shinder Printable Version Adjust font size: Rating: 4.1/5 - 90 Votes

Instant Messaging (IM) is wildly popular with home users, but in a business environment the ability to communicate with colleagues in real time can be either a benefit or a phenomenal time waster. This article looks at the pros and cons of allowing IM protocols on your business network, how to make IM more secure if you do allow it, and how to prevent users from using it altogether.

The Great Debate


Instant Messaging is a little like a controversial political figure: you either love it or you hate it. Teenagers love it; they can spend hours chatting with friends. It allows home users keep in touch with faraway family members and friends without long distance charges and with more immediacy than e-mail. But corporate managers and network administrators are divided over its utility in the business world. IM presents some of the same benefits to business users as to home users: it allows you to communicate with colleagues, customers and partners at a distance in real time, like the telephone, while avoiding the hefty long distance rates that apply during normal business hours. The growing popularity of Voice over IP (VoIP) services is taking some of this

advantage away, as companies can now utilize the Internet to place telephone calls at a substantial savings over the traditional phone system. Nonetheless, IM continues to be the communications method of choice for many because it provides more of a personal link than e-mail, while being a bit less intrusive than the telephone. IM is handy for dual communications. For example, you can get information from a colleague via IM while youre on the phone with a customer, without having to disrupt the telephone conversation. IM can also be useful for quick communications in emergencies, as the Internet may remain functional during an outage of regular telephone services. Corporate employees who are used to using IM on their computers at home want the same convenience at work. Most of them are unaware of the security and productivity implications.

IM Software on Business Computers: To Be or Not to Be?


What are the concerns of businesses about IM communications taking place on their networks, and are they valid, or just a case of employers wanting to exert control over their employees? Lets take a look at some of the disadvantages of IM in the business environment. The first is lost productivity. Popular IM programs were designed for recreational chatting and anyone whos looked up from an online chat session to find that several hours have gone by knows how easy it is to get involved in conversation and spend much longer than you intended. Because people dont type as fast as they talk (normal conversation ranges from 100-250 words per minute), it takes longer to exchange the same information via text chat as compared with over the telephone. Employees may also be more prone to abuse IM for personal use on the job than the telephone, since its easier to look as if youre working while typing IM messages than to disguise the personal nature of a phone call if youre in an open office. In fact, a recent study by research company Radicati Group indicated that most IM users in enterprise environments used the technology more for casual intra-company communication and personal use than for communicating with customers or business partners (http://www.instantmessagingplanet.com/enterprise/article.php/3423321). Busy employees complain that those with less to do distract them from their work with non-urgent or personal messages. Many people seem to abandon the rules of polite communications when they use IM or chat programs. For example, few people would dream of picking up a phone book and randomly dialing people whose names sound interesting, but many think nothing of contacting a stranger online just to strike up a conversation.

Another problem with heavy IM traffic is bandwidth usage. If you have many employees engaging in chat, it can impact your networks bandwidth and performance. IM communications are also subject to unwanted advertising (IM spam is referred to as spim). Spim often consists of pornographic images that pop up during IM use. Like other display of pornography in the workplace, this can lead to sexual harassment charges and lawsuits. But the biggest concern in todays business environment is security. Different IM applications use different, proprietary protocols and standard firewall configurations may not block or detect them. The IM programs also often circumvent authentication systems. Some IM clients can use ports other than those associated with IM (see the table for a list of commonly used IM ports), even commonly open ports such as 80. Instant Messaging Client Software AOL Instant Messenger (AIM) Yahoo Instant Messenger MSN Messenger Commonly Used Port 5190 5050 1863

The free consumer IM client programs in widest use, such as AIM, Yahoo and MSN Messenger, pose many security concerns. Consumer IM programs often support more than just simple text-based chat. They may also include peer to peer file transfer capabilities, which can pose security risks in two ways. Internal users can send documents that may be confidential out of your network, circumventing your networks perimeter defenses against file sharing programs or e-mail attachments. On the other hand, external users can send files that might contain viruses or malicious code to users on the internal network. In addition, a liability risk arises if employees use the file transfer feature to share copyrighted music, movie or software files in violation of the law. If youre in an industry that falls under government regulations (such as HIPAA for health care and the GLB Act for financial institutions), use of public IM systems may violate mandates regarding electronic communications and record keeping.

IM Technology: How Does it Work?


There are two basic types of IM technologies: peer to peer (P2P) and client-server. With a peer to peer system, IM clients communicate with each other directly. With a clientserver system, communications go through a central IM server from which it is passed on to the recipient. P2P systems pose a security problem because there is no centralized control. With clientserver systems, on the other hand, IM communications can be monitored and logged at a central location. However, if the IM server is under external control, then you have to worry about interception by the external administrators.

What Are the Top Security Concerns?


IM software, especially the use of popular consumer level IM programs, raises the following security concerns:

Like other software, IM clients can be vulnerable to buffer overflows and other flaws that can be exploited by hackers to launch DoS attacks. Many IM clients allow users to create anonymous user names that cannot be easily tracked or the true identity of the IM user identified. If the IM name is not associated with a legitimate e-mail address, a user can send communications pretending to be someone hes not (electronic identity theft). IM file transfer features, as discussed earlier, pose a big risk both in terms of outgoing and incoming files.

Establishing Policies for IM Usage


If your company decides to allow IM, the first step in keeping it under control is to establish usage policies. Some best practices that can keep IM from becoming a bane to your business include:

IM should not be used as a substitute for e-mail. IM should be used only for questions or announcements that are short and need to be communicated immediately. Users should take advantage of IM software features that allow you to present yourself as busy or offline so they will not be compelled to respond to numerous queries. Users should never register with public directories that allow any and everyone to IM you; instead, users should maintain contact or buddy lists of people who can see their online status, and the list should be restricted to legitimate business contacts. Users should not be allowed to install their own IM software on company computers. If IM is to be part of your companys communications cadre, the software and its configuration should be standardized and controlled by the IT department as with other business software. IM should never be used for confidential communications of any kind unless the IM client supports message encryption. If your industry is regulated, you may need to implement an enterprise level IM system that allows you to record all IM communications.

Creating a policy is only the first step. The policy must be disseminated to employees and there must be mechanisms in place to enforce them. One enforcement mechanism is stated penalties for violation. Another is to technologically enforce policies.

Controlling IM Communications through Technology

Because IM does have benefits for businesses, you might wish to allow it in your organization but that doesnt mean you have to allow it for everyone, or allow employees to use it with no oversight. There are a number of products that allow administrators to manage IM usage. Some of these products include:

Akonix L7 Enterprise (http://www.akonix.com/) IMlogic IM Manager (http://www.imlogic.com/) FaceTimes IM Auditor (http://www.facetime.com/)

With IM management software, you can restrict IM usage to specific users and groups who have a need to communicate via IM. You can control whether users can transfer files (and with some products, what types of files can be transferred). You can specify whether users are allowed to use audio/video features of the IM client, or play the games that are built into some IM clients. You can even restrict IM usage to specific days of the week or times of day. IM management software can also do content filtering. You can set up lists of words or phrases that will cause a message to be blocked, or that will send an alert to the administrator. Finally, these programs allow administrators to log and review IM conversations. Some of them will create reports summarizing information about IM sessions, and you may be able to search the logs for key words or phrases. The biggest drawback to these programs is cost. They are targeted for the enterprise market, and only large companies are likely to be able to afford them. Costs are generally based on number of users and start at about $2500 per 100 users.

Blocking IM Communications Altogether


You may find that its easier and less expensive to block IM communications altogether. This might be easier said than done. You can configure your firewall to close the ports commonly used for IM communications, but clients may be able to use alternate ports. According to Akheron, the process to fully block IM can be complex and expensive, costing up to $30-50,000 per location (http://www.akheron.com/prodinfo/blocking_costanalysis_01.html). There are a number of products designed to detect and block IM traffic (and many of these also block P2P file sharing programs as a bonus). IM Detector Pro from IMlogic is free (http://www.imlogic.com/resources_downloads.htm?WT.mc_n=IMDetector %20Download&wt.mc_t=Banner%20Ads&WT.cg_n=Side%20Panel).

Summary

Instant Messaging can be a benefit to business when used properly, but IM is often abused by employees and poses significant liability and security risks. There are ways to allow IM and yet control its usage, or you can attempt to block IM altogether, although doing so effectively may prove to be expensive. In this article, weve discussed some of the benefits and the drawbacks of IM in the business environment. Each organization is different, so there is no one size fits all solution but every business should have written policies regarding IM use on their network, whether the policy is to prohibit IM completely or to set controls that make it less likely to lead to problems.

About Deb Shinder

DEBRA LITTLEJOHN SHINDER, MCSE, MVP (Security) is a technology consultant, trainer and writer who has authored a number of books on computer operating systems, networking, and security. She is also a tech editor, developmental editor and contributor to over 20 additional books. Her articles are regularly published on TechRepublics TechProGuild Web site and Windowsecurity.com, and have appeared in print magazines such as Windows IT Pro (formerly Windows & .NET) Magazine. She has authored training material, corporate whitepapers, marketing material, and product documentation for Microsoft Corporation, Hewlett-Packard, DigitalThink, GFI Software, Sunbelt Software, CNET and other technology companies. Deb lives and works in the Dallas-Ft Worth area and can be contacted at deb@shinder.net or via the website at www.shinder.net Click here for Deb Shinder's section. http://www.windowsecurity.com/articles/Instant-Messaging-Business-Networks.html

Advantages and Disadvantages of Internet Implementation


Advantages for Students The possible advantages of implementing the Internet in the classroom are as diverse as the services and tools offered by the network. The Internet offers a vast amount of resources that are otherwise not available in any one geographical location. In addition to increasing resources, the Internet also fosters and enhances various skills of its users. Communication skills and writing skills can be directly affected through its use. Depending on its incorporation in classroom activities, it may also contribute to the improvement of skills related to critical thinking, problem solving, and group work. This

section of the paper will elaborate in some detail how the increase in improved access to resources and the fostering of diverse skills can be beneficial to students. Dede distinguishes between two types of information technologies: smart machines and intelligent tools. The former take over tasks previously performed by people as is the case at the checkout counter in a supermarket where the checker no longer has to punch in the price of the merchandise, rather it suffices to scan the label of the goods. This type of technology lowers the required skills of the user. Intelligent tools, on the other hand, require higher skills of the user. They give more options to the user than were previously available by another machine. But this addition of options requires choices on the part of the user. An example of an intelligent tool is a word processor in contrast to a type writer. The user is now required to do more than just type in the information. The additional options offered by the technological tool can only be taken advantage of if one is familiar with the details of the operation, of the many available options, and s/he is capable of making choices between the options. The Internet is an example of an intelligent tool because it presents the user with a multitude of choices. Dede argues that with the increasing presence of intelligent tools in all spheres of the workplace, "people's creativity and flexibility will be vital as job skills, because the standardized aspects of problem solving will be increasingly absorbed by machines." [emphasis by me] One major advantage of the Internet is the amount of resources it makes available to its users. College level students are used to having significant library resources on location, not to mention the vast amount of library resources available to them through interlibrary loans. Such options are not open to children of primary and secondary level institutions. This means that their resources are quite limited and are restricted to the locally available information. Access to all the tools and services of the Internet removes this hindrance faced by young students. Moreover, not only does the Internet expand the amount of resources available to the user, it also makes the process of acquiring materials much quicker than traditional methods. The many sides that issues may be presented from on the Web offer children a very diverse look at a subject. As opposed to looking at the collection of one author, or one book on a subject, they can browse numerous sources in one sitting. Collecting information from various resources (which is how web research often happens) they learn how to integrate different materials. The fact that they can access information in a timely manner means that they can get to the core of information relatively quickly, a point especially advantageous for children who have little patience and quickly lose interest in topics. The quick change in sites and the difference in their looks, presentation and organization of material - while sometimes confusing - also offers new excitement every time the student accesses a new site. This continuous change can be seen as a challenge and could be compared to certain aspect of video games that are technological tools greatly favored by many children. The change in scenes and movement keeps their attention focused and the option of making decisions adds to their interest in engaging with the medium. Moreover, the sources may represent different

media. There may be texts, videos, and audio materials available through the help of this one medium, also adding to the excitemtn in the research process. The multiplicity in Internet services offers a chance for children of different talents to all develop a certain niche in the use of the medium. The many differences between services means that one may not become familiar with all kinds of resources right away. However, if there is a class where different students use different resources, eventually each individual may develop an area of expertise which can then be shared with the wider group. This allows students to feel that they have a niche, but perhaps even more importantly, they can share the acquired information. Some may be better at understanding graphical representations of information and so they can be designated as experts in that field, whereas others may be better at reading through information. Moreover, if CMC services are added into this equation, it is possible that some students will be more at ease in establishing communication with others through the exchange of e-mail messages than they would be in face to face encounters and thus their chances of interacting with people is augmented. Social behavior may be influenced in some ways by students spending increasing amounts of time alone in front of a computer. The obvious objection may be that children will spend less time interacting with one and other and therefore will lack the social skills that they are otherwise capable of developing through frequent interactions with peers. However, as with many other aspects of the Internet, the implications of computer usage are not just clearly good or bad. First of all, it is possible that children will use computers together which will enhance their interactions with each other. If teachers assign jointprojects where children work in groups of two or more then the interaction of individuals remains in the framework of doing work. Secondly, even if the child uses the instrument alone, s/he is still not necessarily alone. Given the many CMC services of the Internet, it is possible that children use the device to communicate with other children. This opportunity offered by the network actually aides in developing the communication skills of children who are shy, or are not quite accepted by their peers for various reasons. Work on computers can allow for both independent projects and collaborative undertakings. This means that the same medium allows for deepening individual skills as well as enhancing group dynamics skills. Children can gain status through helping others, through demonstrating their knowledge and their generosity. Knowledge coming from a peer may be more appreciated in situations where that knowledge is shared for the benefit of a whole group. Such appreciation for good performance could replace the currently common hostile and jealous attitudes of students expressed toward others who are above average in a certain domain, but who have no way of turning the additional knowledge to the benefit of the whole. In addition to being congratulated for the understanding of material, students can also gain status and appreciation for their generosity in helping others. A positive attitude toward helping others fosters positive group dynamics, a type of work arrangement increasingly common in many job environments. Early exposure may be quite beneficial to its development in children. Moreover, children from certain cultural communities learn better when working in groups because of distinct cultural

practices. For these children, their cultural heritage that partly consists of effectively using group cooperation would now be incorporrated in the classroom setting. The types of materials the network may be especially useful in delivering include simulations of otherwise expensive or dangerous experiments. Although currently the Internet may not be as effective as other types of multi-media tools in delivering such information to the classroom, rapid changes in its capabilities make it a potential tool in this domain too. One may argue that such services may not make it much different from services offered by television through regular programming or through materials available on videotapes. However, it is important to remember that the information on the Internet is available to all locations at any one time. Similarly to the previously mentioned situation of primary and secondary level educational institutions concerning their limited printed library materials, locally available videotapes will most probably be quite limited. This is not solely because of cost, but also because of storage concerns. Moreover, the interactive nature of the Internet allows for students and teachers to cater the programming' to their specific needs. Children also must assume a different, possibly greater, responsibility as learners. There is more information available on the World Wide Web than they could possibly need, but most of the material is very easily accessible. They have to be responsible (even if they are assisted in this process) in knowing what information to use, and how deep to explore a certain topic (one can always easily find more information on a topic on the Web and this may seem overwhelming). At the same time, there is the risk of being sidetracked. There are so many links to sites that cannot all be relevant to one area of interest or research, that they need to know when to stop browsing for fun and start doing work and only work. (See below for a discussion of the danger in the use of objectionable materials.) However, even if they do browse off once in a while, they are still using a technological tool, they are still using some of the skills that are very useful and are only fostered by such an interactive tool. Unlike television, the Web - even when one is mostly just browsing and is taking little advantage of its interactive features - requires to be guided. The viewer decides what the next step is. As Dr. Dorothy Strong, an educator from the Chicago Public Schools stated commenting on the comic book tabu: "Read, but not comic books. No! Use technology that students play with." Most Internet tools require some amount of reading, and different amounts of writing. Moreover, they require skills of logic and inference for the navigation of sites. So instead of being faced with a linear flow of information which is the only way a book can present information, the Web allows for numerous skills to be fostered and improved at once. The computer-mediated communication tools allow students frequent and timely communication with children from around the world, and also with their teachers for information about class assignments or any school related issues. Electronic mail gives students the convenience of responding at their own convenience thereby giving them the time to contemplate their responses. Children can also communicate to others through web pages. The idea of publishing to the whole world may add to children's motivation concerning work. It may also improve the quality of their projects since knowing that their work is being published may motivate them to produce better works. Such practices

have already been instituted in the Kent School District of Washington. The district has a very sophisticated web presence with individual school homepages. Some schools present information about their activities and their students' achievements. The Springbrook Elementary school exhibits the paintings children had created in tribute to Georgia O'Keeffe. Using the CMC tools children can engage in projects with people from around the world. If language issues become a problem, they will increasingly understand the importance of learning foreign languages. For those who already realize the importance of foreign languages, the network may offer exceptional opportunities for practicing their newly acquired language skills through communication with children from countries where the language they are learning is spoken by students as a native language. Communicating with students from other parts of the country and other nations makes discussions about other cultures a reality, awareness about the world's diversity is raised. Laurent Dubois's elementary school classes in Switzerland communicated with students from around the world to exchange information about school hours. The children collected materials about other regions' and countries' practices and published their results on their webpages. They also collected outside observer's opinions concerning the proposed changes in school schedule in their own school district. This project allowed these children to communicate with people from across the world, they were able to compare data, use their mathematical skills in calculating differences in scheduling practices, and they were able to feel like they were directly involved in the processes affecting their school lives. In addition to the contributions the Internet can make in raising children's cultural awareness, it may also be able to play a significant role in fighting some of the gender biases of today's education. This would require that it be implemented in the curriculum across the board regardless of course content. Currently, girls are less likely to take science courses. Traditionally, science courses are more likely to include the use of technical devices such as computers. Many people still think that just because the Internet has to be used with the help of a computer (and perhaps the creation of the WebTV - a TV device that allows viewing of World Wide Web content - will disperse some of these preconceptions), people assume that they need detailed and in-depth technical knowledge for its use. Moreover, it is more likely to be associated with the hard sciences for this reason. However, the Internet is not field-specific. Information can be found on it about any topic, and therefore it can be used with any course content. Showing students the useful aspects of the Internet in courses across the curriculum, and allowing access to the Internet in all classes gives girls an equal opportunity in taking a class that does include Internet use in learning. The issue of who actually gets to sit in front of a computer still remains, but if group projects and individual projects are intermixed, and the educator is conscious of getting everybody to directly interact with the machine then all students will get a chance to try the technology.

A whole separate research paper could be written on the positive role of technology - and within that the Internet - on people with disabilities. A publication that is not available in Braille version may be available on the network which means that a screen reader may thus make it available to a visually impaired user. People who have trouble getting to library locations because of physical barriers can be greatly aided in that they can access information from their own homes. Many of the Internet's characteristics seem to require specific human functions such as good eyesight. Conscious efforts are being taken to make the network accessible to people with disabilities such as motor problems, deafness, low vision and missing limbs. If funding is continued for the development of such tools than the network may even act as an equalizer in making resources previously not available to people with disabilities increasingly accessible . This continued interest in the field does not only depend on humanitarian efforts since even business purposes warrant an investment in the development of helpful tools given that there are 30 million people in the United States alone who suffer disabilities or functional limitations and are potential users of such services. The desires of colleges in terms of course content has affected the content and level of high school classes. The high schools in return pose requirements to junior high schools. In a similar way, it is possible that increasingly the growing emphasis placed on cooperation, conflict management, and problem solving in colleges will affect the need for such skills to be developed in lower-level educational institutions. Colleges evaluate the breadth and depth of high school extra-curricular activities. These after-school activities tell colleges about possible skills of students that would have had to been acquired outside of the classroom since traditional curricula do not train students for many of the characteristics needed of upper-level school students. Increasing implementation of group projects in college curricula means an increasing need for students who possess the skills for the required group dynamics. In turn, if high schools will be asked to present students strong in these skills, high schools may turn to junior high schools to also start fostering the development and evolvement of such skills. In this way, as colleges influenced the curriculum of lower levels of education, they may also influence what skills emphasis is placed on in primary and secondary level schools. Once these educational institutions are required to pay attention to such angles of educating students, the Internet will prove to be increasingly helpful since its implementation can cater to many of these needs. Moreover, if we consider that complex learning skills begin developing at preschool age, it is even more important to remember and take advantage of the "intuitive capability that young children have to process complex thoughts, even in the absence of basic skills traditionally instilled in the young as building blocks' of learning." Disadvantages of Internet Implementation for Students Several of the points mentioned in the section about the Internet's advantages also raise issues about possible negative effects concurrently. Easy access to resources concerning just about any topic may lead children to materials that would otherwise not be made available to them. Students have to be educated about how much information they can give out about themselves to the unknown public. Another issue concerns the increasing

presence of commercial sites with little content that would be deemed educational. However, we will see that none of these concerns are clear cut and they present schools with both hardships and reasons for teaching children about responsible and cautious behavior, in addition to critical thinking. Given the nature of the web - the fact that anyone with access to it can put information up on it - it is inevitable that there is room for incorrect information to also make its way onto the network. This means that users always have to question the reliability of the available information. If students are not aware and conscious of this problem, they may use and learn wrong facts about anything from historical information to scientific data. If teachers are prepared to teach students to be critical in their perception of material derived from the network than this characteristic of the Web may not be such a problem, and it may even turn into a plus by enhancing their research skills. Teaching children to be critical of information presented to them, to check sources, and to try to derive information from various sources teaches them that a search for information entails more than just finding a source. Rather, it involves comparing, evaluating, and making decisions. One could argue that it is essential to teach children to question the reliability of information in any case so this nature of the Web is just reinforcing an otherwise already important aspect of developing a critical approach to various aspects of life. The Internet also houses controversial materials that many adults prefer not to have available to children for various reasons. Sites depicting pornography cause one problem. Even if the public display of certain materials may be illegal in the United States, the international nature of the network makes it possible for users to access materials stored on machines in other countries. Thus, the overall disappearance of certain content would require international consensus on what is deemed harmful and against the law. Other controversial sites include those that represent and advocate ideas deemed dangerous by the majority of the public. Such sites include pages advocating Neo-Nazism or the activities and beliefs of the Ku Klux Klan. It is not within the scope of this work to analyze the pros and cons of such materials being available on the Web, as it is not within the scope of this paper to debate what the contents of school materials should include. While some would argue that such sites should be outlawed, there is the opposing argument that emphasizes the importance of free speech. The latter viewpoint is not only held by those who want to advocate the contents of these sites. Some say that it is important for children to learn abour what types of ideas and viewpoints people represent. It is the responsibility of education to teach them to view such information critically. So if a student is doing research on the Ku Klux Klan then s/he may want to include information from a website advocating the views of that group. Some Web services may be harmful because of the ways in which they offer students alternatives to doing their work. There are numerous sites on the Web that offer term papers and book reports for sale, or even for free. This raises numerous issues concerning plagiarism and work ethic that have to be addressed by administrators before

implementing the network in the classroom. This point is discussed in more detail later in this paper in the section dealing with the general concerns of Internet implementation. Some arguments may be raised concerning the time Internet activities take away from more traditional means of information retrieval such as reading a book. However, it must be noted that much of the information available on-line is also in forms of the printed word. Use of a computer should not be seen as time wasted staring at a screen, but as time used looking at information that mirrors the many faces of users around the world similarly to a book mirroring the voice of its author. Discussing the content of websites in relation to the ideal reading content for children is not within the scope of this work. Although there are quality educational services available for children on the Web, increasingly these are being overshadowed by innovative commercial sites that greatly appeal to children. Advertising sites offer interactive games to children to lure them to their sites and to familiarize them with their brand and materials. To alarm people about the power of computers in guiding children's attitudes and beliefs, Montgomery cites the results of a survey according to which the majority of children queried in the research put greater trust in their computers than they did in their parents. She suggests that the creation of a non-commercial children's civic sector could serve as an alternative to commercial sites and thus contribute to shaping youth- geared web content in more educational ways than advertising sites do. Advantages and Disadvantages of Internet Implementation for Teachers Many of the advantages cited for children are also advantages for teachers including such aspects as timely communication with colleagues and parents. The same is true for information retrieval services in that teachers can access materials in a timely manner and the resources available to them are more than are present in any one geographical location. The following section will elaborate on points that were not discussed above in relation to students. The Internet grants teachers and administrators numerouspossibilities through its computer-mediated communication tools. Students, teachers, and families can communicate directly with each other. This may happen in real-time (talk function, chat rooms), or with a time difference over e-mail, through listserves, or on newsgroups. Some of these tools allow for group distribution of material which can then be further elaborated on with the ongoing inclusion of all participants in follow-up discussions. For example, in discussing a proposed change in the system, administrators and teachers can query parental attitudes through the use of a mailing list or local newsgroup. Instead of requiring a one-time, one-location parent-teacher meeting, the discussion can spread out over time and does not require everyone to be in one place. This gives greater flexibility to parents in taking part in their children's schooling - an issue often stressed and often considered as an important part of education; and it gives administrators and teachers a better sense of what the community of parents are concerned with. However, such use of the Internet also requires that not only schools be wired, but that parents have access to

the Internet as well. This raises additional questions concerning inequality that will be discussed in the next section of the paper. It was already mentioned in the section on advantages for students that children's attention span may last longer with new technological tools than with older teaching aides. This may also serve as an advantage for teachers in that it leaves more time for productive work and requires less time for disciplining. Moreover, the general affect of the network in teaching students more useful skills than they are learning under current conditions may affect teachers in a positive way in that the goal of schools in educating children may be met more effectively through the use of network tools and services and thus teachers can feel a better sense of accomplishment. Adapting the positive aspects of the Internet requires great effort from teachers. Current teaching practices have to be reevaluated and some changes may need to be made. Teachers have to be trained in the use of the new technological tools and their skills require continuous updating, although this may come easier once the initial investments in training have been made. Steps concerning professional development can be assisted through the use of Internet tools. Discussion groups among teachers and technical professionals can aide in their training. One of the main problems seems to be that despite the fact that governments are allocating great funds to Internet implementation, little of these funds is going toward teacher training. Moreover, there is also the question of adequate resources for teachers in that under optimal circumstances they require machines of their own not only in their classrooms, but also in their homes. When a school decides to introduce the Internet in the curriculum, the funds required for teacher training must also be remembered and adequate resources need to be set aside for this purpose. According to studies conducted by psychologists specializing on people's psychological reactions to technology, several factors influence a person's attitude toward computers. One important factor is how early a person is exposed to technological tools during childhood. However, just as important is the instructing teacher's attitude toward and knowledge of technology. If enough emphasis is put on computer education in primary and secondary schools, and the required tools are available, then children are much more likely to be exposed to technology early on. These individuals will be more comfortable with technology later on in their lives. This is why it is important to keep in mind teacher's attitudes toward the topic and to support them in acquiring the necessary skills they need to feel comfortable about technology in order to be able to introduce its use to students. Beyond having to learn the use of new technological tools, Internet implementation also comes with other types of responsibilities such as possible supervision issues, the creation of new projects that incorporate the network into the curriculum, and the introduction of new evaluative methods. These take energy and time to develop and get used to. However, since affective communication channels and timeliness are one of the great features of the Internet, it can aid these processes considerably through information

retrieval on the Web, and through regular (or one-time) communication with colleagues on e-mail, mailing lists, and newsgroups http://www.eszter.com/edu/sides.html

You might also like