【正文】
ight and knowledge property right will appear continuously. (Xue Hong, 2000)It is a must for us to consider this high risk of academic misconduct and how to adopt effective measures to prevent it. According to the way of risk management, we should make sure the controlling strategies actively and choose the appropriate valid steps, that is to say, demand clearly before, monitor strictly during the process, and punish seriously after. Demand clearly before——to prevent well. Detailed measures are applied to cancel and decrease the consequences caused by various factors before the risk. Its purpose is to reduce the appearing rate and serious result. They are:● Adjust the state of the mental risk. Mental risk is an invisible factor related to person39。s mental state. The risk probability enhances and the consequence continues because of teachers’ random of professional development, the idea of leaving things to chance for risk, and the dependence on the information technology. Therefore, specific activities including the legal system and teacher virtuous education should be strengthened for this kind of mental state(Guo Yimei, 2000)● Establish related norm and request. According to the related laws, education internal rules, domestic and international information norm, a set of information technology usage system and professional strategies has been built up for elementary and middle school teachers, for example, Article (Thesis) Auditor System for Elementary and Middle School Teachers. (Zhang Pin, 1999)Monitor strictly during the process– repress well. Measures are applied to prevent kinds of bad results when risk takes place. They are valid techniques to handle the risk.● Build up different strategies of risk control and supervision according to the different risk grades. For example, carry on the rejoinder strategy to the teacher39。s academic research.● Control the variety of the amount of risk. Along with teachers’ growing consciousness on risks and consummate ways of risk management, these risks have been controlled, reduced their frequency, and even cancelled in certain space and time. For example, the establishment of team cooperation can reduce the phenomenon of academic misconduct. Punish seriously after——assess well.● Build up strict academic punishment system. Dishonorable behaviors of breaching the academic morals or academic norms should be punished seriously. Teachers who copy or plagiarize will pay a high price for their behavior by law, which makes the cost of academic misconduct much higher than the benefit.Now we can consider in a whole the risk management when using the information technique to carry on teacher education. In order to prevent kinds of risks above mentioned effectively——“three defense lines” must be constructed.——Construct a defense line of morals. Teachers’ morals risk is the biggest risk factor in the information technique usage (Guo Yimei, 2000). Therefore, we should construct two teams. One is a team of internet managers with advanced technique to manage teacher education internet. This is an initial condition to prevent risks. The other is a team of internet users (all teachers) with improving professional and thought.——Construct a defense line of innercontrolled system. Effective innercontrolled system is a base of risk premise. Improve systems including the hardware maintenance, the software usage, the network circulate, the data backup, the safety management etc. Strengthen the establishment of the innercontrolled system and the check of its results. And make sure the innercontrolled system carry on fluently. The cost of our education website resources is expensive. Because of the demand of open training, it is necessary to reinforce the existing equipments and system, install the safe product, develop and imply specific safe system according to the actual need, in case of being attacked.——Construct a defense line of safety operation. Safe and norm operation is a key to guard against the risk. Obey the operation rules strictly, considering such factors as the connection between teachers needs and information process, the relationship among members, the independence of information system. Enhance the management of operators’ legal power and password. It is very important to identify a steady attestation mechanism. (Zhu Baigang amp。 Chen Hongsheng, 2003) The abovementioned discussion expresses that each step of basic strategies of risk management plays an important part in risk management. A cycle process is made up of the insurance of risk surrounding, the risk identify, the risk assessment, the decision of scope to deal with, and the measures to reduce the risk (Tronc, 2004). The risk management can make the process of teacher education much steadier, achieve effective abilities of prevention and control, and improve the successful rate of teacher education。 it let schools grasp the work key point, concentrate main energy and financial resources on high risk, change the work method from the passive prevention to the active prevention, and improve teachers’ professional development。 also it will make elementary and middle school teachers have full estimate, preparation, and full confidence, thus arouse the motive of teacher39。s education, and then convert to promote students learning quantity.Bibliography:1. Quinn, D. (2003). Legal Issues in Educational Technology. Educational Administration Quarterly, 39(2), .2. Tronc, K. (2004). Closing the Rhetoric and Reality Gap. The Practising Administrator, Vol. 26(1), .3. Wheelright, K. (2005). Email and the Internet. in Professional Educator. Vol (2), .4. Xue Hong. (2000). Intellectual Property Rights in International Age. Beijing: Law Publishing House.5. Laws and Regulations Centre. (1999). Laws and Regulations of Computer and Netware. Beijing: Law Publishing House.6. Laws and Regulations Related to Computer and Netware. 7. Zhang Ping. (1999).