SlideShare une entreprise Scribd logo
1  sur  13
Cyber Ethics Rating my teachers without permission or notification: Ethical use of the Internet
The need for cyber ethics Teen's Facebook party cancelled as 200k threaten to show up (Grubb, 2011) http://www.ratemyteachers.com/
What is cyber ethics?: A code of behaviour Acceptable, safe and responsible behaviour similar to that of everyday life. No harmful and illegal behaviour online (Norton, (2007; US DOJ Computer Crime and Intellectual Property Section (2011). .
What is cyber ethics?: Guidelines Privacy Property a(P)propriate-use
What is cyber ethics?: A list of dos and don’ts http://us.norton.com/library/familyresource/article.jsp?aid=pr_cyberethics http://www.justice.gov/criminal/cybercrime/rules/rules.htm
Cyber ethics for whom? Web designers and website owners Users of websites and applications
How should cyber ethics be taught in schools?  Case studies (Endicott-Popovski, 2009)  Internet safety sites (Fredrick, 2010) Collaboration between a teacher librarian and teachers to deliver  classroom activities (Bell, 2002)
How should cyber ethics be taught in schools?  Internet Use Policy (Starr (2003) Modelling appropriate Behaviour
Alternatives to cyber ethics Bans? Filtering?
Conclusion Draw parallels between the real world and the electronic world.   Make direct  comparisons between what students do on the Internet and how they behave in their everyday lives.
Discussion questions Should online ethics be a matter of individual choice or should it be the law? (Schwartau, 2011).  What should be the consequences of unethical behaviour online? (Schwartau, 2011).  How can parents and educators know what students are doing on the Internet?
Recommended readings Bell, M. A. (2002). Kids can care about cyberethics! Ed media world conference on educational media, hypermedia and telecommunications, Association for the Advancement of Computing in Education,  Available from: http://www.shsu.edu/~lis_mah/documents/TCEA/brightideasportal.html Endicott-Popovsky, B. (2009) Seeking a balance: Online safety for our children. Teacher Librarian, 37(2), 29-34. Fredrick, K. (2010) Teaching the rules of the road online. School Library Monthly, 26(8), 35-36. Norton. (2007, February 19). Cyberethics. Available from: http://us.norton.com/library/familyresource/article.jsp?aid=pr_cyberethics United States Department of Justice Computer Crime and Intellectual Property Section, Cyberethics. (2011, March 17).  Retrieved from: http://www.justice.gov/criminal/cybercrime/cyberethics.htm
Slide Attribution List Slide 1.  Internet police http://www.flickr.com/photos/adamcrowe/4014323612  Slide 2.Cyber bullyshttp://www.flickr.com/photos/theadamclarke/4866228241 Slide 3. Smiling Pam http://www.flickr.com/photos/theenmoy/5504152401  Jacob Frownshttp://www.flickr.com/photos/athoos/265329441   Slide 6. Desktop computerhttp://www.flickr.com/photos/cabinet/53737447  Slide 8. Creative Commons http://www.flickr.com/photos/double-h90/3014588691

Contenu connexe

Tendances

Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crimeAman Kumar
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrimeOnline
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Advantages and disadvantages of the internet
Advantages and disadvantages of the internetAdvantages and disadvantages of the internet
Advantages and disadvantages of the internetpilarace
 
ICT Presentation
ICT PresentationICT Presentation
ICT PresentationLisa
 

Tendances (20)

Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Ppt
PptPpt
Ppt
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Advantages and disadvantages of the internet
Advantages and disadvantages of the internetAdvantages and disadvantages of the internet
Advantages and disadvantages of the internet
 
ICT Presentation
ICT PresentationICT Presentation
ICT Presentation
 

En vedette

Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldAmae OlFato
 
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015Priyanka Aash
 
Ethics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage ratesEthics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage ratesAysha Rahman
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldRownel Cerezo Gagani
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
Uses & applications of microsoft excel in vph research
Uses & applications of microsoft excel in vph researchUses & applications of microsoft excel in vph research
Uses & applications of microsoft excel in vph researchDr Alok Bharti
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityGareth Davies
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityFizaril Amzari Omar
 
Ethical Issues in Social Media
Ethical Issues in Social MediaEthical Issues in Social Media
Ethical Issues in Social Mediaattractalagan
 

En vedette (20)

Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is Cyberworld
 
Cyber law
Cyber lawCyber law
Cyber law
 
Ethical issues in cyberspace
Ethical issues in cyberspaceEthical issues in cyberspace
Ethical issues in cyberspace
 
Inpage
InpageInpage
Inpage
 
Sharing of Information
Sharing of InformationSharing of Information
Sharing of Information
 
Inpage
InpageInpage
Inpage
 
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
 
Ethics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage ratesEthics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage rates
 
Inpage presentation
Inpage presentationInpage presentation
Inpage presentation
 
Cs106 professional-ethics
Cs106 professional-ethicsCs106 professional-ethics
Cs106 professional-ethics
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Bridging Between Languages
Bridging Between LanguagesBridging Between Languages
Bridging Between Languages
 
In-page Urdu Features
In-page Urdu FeaturesIn-page Urdu Features
In-page Urdu Features
 
Uses & applications of microsoft excel in vph research
Uses & applications of microsoft excel in vph researchUses & applications of microsoft excel in vph research
Uses & applications of microsoft excel in vph research
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 
Ethical Issues in Social Media
Ethical Issues in Social MediaEthical Issues in Social Media
Ethical Issues in Social Media
 

Similaire à Cyber ethics

Cyberethics accompanying text
Cyberethics accompanying text Cyberethics accompanying text
Cyberethics accompanying text Geoffrey Lowe
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizensStaci Trekles
 
Policies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social WebPolicies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social Webteach42
 
Addressing Ethics With Young Students
Addressing Ethics With Young StudentsAddressing Ethics With Young Students
Addressing Ethics With Young Studentsbeccapr69
 
Using ICTs to Promote Cultural Change: A Study from a Higher Education Context
Using ICTs to Promote Cultural Change: A Study from a Higher Education ContextUsing ICTs to Promote Cultural Change: A Study from a Higher Education Context
Using ICTs to Promote Cultural Change: A Study from a Higher Education Contextac2182
 
Internet Safety And The Internet
Internet Safety And The InternetInternet Safety And The Internet
Internet Safety And The InternetStephanie King
 
Digital Literacy PDLM
Digital Literacy PDLMDigital Literacy PDLM
Digital Literacy PDLMlinzer85
 
Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...Alexander Decker
 
Internet_Use_Behavior_and_Attitude_of_College_Stud.pdf
Internet_Use_Behavior_and_Attitude_of_College_Stud.pdfInternet_Use_Behavior_and_Attitude_of_College_Stud.pdf
Internet_Use_Behavior_and_Attitude_of_College_Stud.pdfHải Quân
 
Ed 6620 – Future Trends In Educational Technology
Ed 6620 – Future Trends In Educational TechnologyEd 6620 – Future Trends In Educational Technology
Ed 6620 – Future Trends In Educational TechnologyJames Parsons
 
Information Skills in a Global 2.0 World
Information Skills in a Global 2.0 WorldInformation Skills in a Global 2.0 World
Information Skills in a Global 2.0 WorldKelly Lambert
 
C:\Fakepath\Ed 6620 – Future Trends In Educational Technology
C:\Fakepath\Ed 6620 – Future Trends In Educational TechnologyC:\Fakepath\Ed 6620 – Future Trends In Educational Technology
C:\Fakepath\Ed 6620 – Future Trends In Educational TechnologyJames Parsons
 
Lessons Learned from the Safer Internet Program in Estonia
Lessons Learned from the Safer Internet Program in EstoniaLessons Learned from the Safer Internet Program in Estonia
Lessons Learned from the Safer Internet Program in EstoniaeLearning Papers
 
Cyberbully presentation
Cyberbully presentationCyberbully presentation
Cyberbully presentationYuming Peng
 

Similaire à Cyber ethics (20)

Cyberethics accompanying text
Cyberethics accompanying text Cyberethics accompanying text
Cyberethics accompanying text
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizens
 
Policies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social WebPolicies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social Web
 
Addressing Ethics With Young Students
Addressing Ethics With Young StudentsAddressing Ethics With Young Students
Addressing Ethics With Young Students
 
Using ICTs to Promote Cultural Change: A Study from a Higher Education Context
Using ICTs to Promote Cultural Change: A Study from a Higher Education ContextUsing ICTs to Promote Cultural Change: A Study from a Higher Education Context
Using ICTs to Promote Cultural Change: A Study from a Higher Education Context
 
Internet Safety And The Internet
Internet Safety And The InternetInternet Safety And The Internet
Internet Safety And The Internet
 
Social Network Revised
Social Network RevisedSocial Network Revised
Social Network Revised
 
Digital Literacy PDLM
Digital Literacy PDLMDigital Literacy PDLM
Digital Literacy PDLM
 
Ethics Half Day
Ethics Half DayEthics Half Day
Ethics Half Day
 
Faculty and staff training
Faculty and staff trainingFaculty and staff training
Faculty and staff training
 
4
44
4
 
Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...
 
Internet_Use_Behavior_and_Attitude_of_College_Stud.pdf
Internet_Use_Behavior_and_Attitude_of_College_Stud.pdfInternet_Use_Behavior_and_Attitude_of_College_Stud.pdf
Internet_Use_Behavior_and_Attitude_of_College_Stud.pdf
 
Ed 6620 – Future Trends In Educational Technology
Ed 6620 – Future Trends In Educational TechnologyEd 6620 – Future Trends In Educational Technology
Ed 6620 – Future Trends In Educational Technology
 
Information Skills in a Global 2.0 World
Information Skills in a Global 2.0 WorldInformation Skills in a Global 2.0 World
Information Skills in a Global 2.0 World
 
C:\Fakepath\Ed 6620 – Future Trends In Educational Technology
C:\Fakepath\Ed 6620 – Future Trends In Educational TechnologyC:\Fakepath\Ed 6620 – Future Trends In Educational Technology
C:\Fakepath\Ed 6620 – Future Trends In Educational Technology
 
Digital+issues[1]
Digital+issues[1]Digital+issues[1]
Digital+issues[1]
 
Acceptable use policy__ecomp_6204
Acceptable use policy__ecomp_6204Acceptable use policy__ecomp_6204
Acceptable use policy__ecomp_6204
 
Lessons Learned from the Safer Internet Program in Estonia
Lessons Learned from the Safer Internet Program in EstoniaLessons Learned from the Safer Internet Program in Estonia
Lessons Learned from the Safer Internet Program in Estonia
 
Cyberbully presentation
Cyberbully presentationCyberbully presentation
Cyberbully presentation
 

Dernier

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 

Dernier (20)

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 

Cyber ethics

  • 1. Cyber Ethics Rating my teachers without permission or notification: Ethical use of the Internet
  • 2. The need for cyber ethics Teen's Facebook party cancelled as 200k threaten to show up (Grubb, 2011) http://www.ratemyteachers.com/
  • 3. What is cyber ethics?: A code of behaviour Acceptable, safe and responsible behaviour similar to that of everyday life. No harmful and illegal behaviour online (Norton, (2007; US DOJ Computer Crime and Intellectual Property Section (2011). .
  • 4. What is cyber ethics?: Guidelines Privacy Property a(P)propriate-use
  • 5. What is cyber ethics?: A list of dos and don’ts http://us.norton.com/library/familyresource/article.jsp?aid=pr_cyberethics http://www.justice.gov/criminal/cybercrime/rules/rules.htm
  • 6. Cyber ethics for whom? Web designers and website owners Users of websites and applications
  • 7. How should cyber ethics be taught in schools? Case studies (Endicott-Popovski, 2009) Internet safety sites (Fredrick, 2010) Collaboration between a teacher librarian and teachers to deliver classroom activities (Bell, 2002)
  • 8. How should cyber ethics be taught in schools? Internet Use Policy (Starr (2003) Modelling appropriate Behaviour
  • 9. Alternatives to cyber ethics Bans? Filtering?
  • 10. Conclusion Draw parallels between the real world and the electronic world. Make direct comparisons between what students do on the Internet and how they behave in their everyday lives.
  • 11. Discussion questions Should online ethics be a matter of individual choice or should it be the law? (Schwartau, 2011). What should be the consequences of unethical behaviour online? (Schwartau, 2011). How can parents and educators know what students are doing on the Internet?
  • 12. Recommended readings Bell, M. A. (2002). Kids can care about cyberethics! Ed media world conference on educational media, hypermedia and telecommunications, Association for the Advancement of Computing in Education, Available from: http://www.shsu.edu/~lis_mah/documents/TCEA/brightideasportal.html Endicott-Popovsky, B. (2009) Seeking a balance: Online safety for our children. Teacher Librarian, 37(2), 29-34. Fredrick, K. (2010) Teaching the rules of the road online. School Library Monthly, 26(8), 35-36. Norton. (2007, February 19). Cyberethics. Available from: http://us.norton.com/library/familyresource/article.jsp?aid=pr_cyberethics United States Department of Justice Computer Crime and Intellectual Property Section, Cyberethics. (2011, March 17). Retrieved from: http://www.justice.gov/criminal/cybercrime/cyberethics.htm
  • 13. Slide Attribution List Slide 1. Internet police http://www.flickr.com/photos/adamcrowe/4014323612 Slide 2.Cyber bullyshttp://www.flickr.com/photos/theadamclarke/4866228241 Slide 3. Smiling Pam http://www.flickr.com/photos/theenmoy/5504152401 Jacob Frownshttp://www.flickr.com/photos/athoos/265329441 Slide 6. Desktop computerhttp://www.flickr.com/photos/cabinet/53737447 Slide 8. Creative Commons http://www.flickr.com/photos/double-h90/3014588691

Notes de l'éditeur

  1. ETL523, Geoffrey Lowe, 11472382, Assignment 1 (Item 2), lecturer: Judy O’Connell Everyday, the Internet offers much freedom, social interaction and many other possibilities. Recent events, reported in the news media, suggest that now more than ever it is important to ensure that Internet sites (such as RateMyTeachers) encourage ethical behaviour, and that users behave ethically. In this presentation there will be a brief overview of some case studies suggesting the need for cyber ethics. This will be followed by definitions of cyber ethics, discussions of who needs to be ethical, how this should be taught to students, and alternatives to cyber ethics. The presentation will conclude with a number of discussion questions for consideration.
  2. There have been a number of recent news stories about unethical uses of the Internet (Kwek, 2011; Wilkinson, 2011; Atkin, 2011). Interestingly, in the case of the Facebook party that made the news recently (Grubb, 2011) it has been argued that the girl was not to blame. She did not realise that something could go wrong and it was someone else that made her invite go viral. Regardless of whether or not this is true this still suggests a need for cyber ethics to educate users as to what is possible online and why they should protect their privacy. The existence of the RateMyTeacherswebsite suggests the need for cyber ethics to stop website developers and owners encouraging and making it possible for users to be unethical. Last year, a colleague informed me that I had been rated on this website. When I checked it out it was true. Like many teachers that I have spoken to since, I was unaware that a website such as this even existed. It allows anyone to anonymously enter a teacher’s name then rate that teacher and make comments without permission, then immediately put that on Facebook. Anyone can do this without the teacher ever knowing that this has happened. Contrary to the views of the designers of RateMyTeacher this website arguably encourages unethical behaviour including a cycle of classroom disruption, bullying and cyber bullying. The Teacher Support Network (2010) argues that teachers should ignore this website and that it should be shut down.
  3. What is cyber ethics? One general definition of cyber ethics is that it is a code of behaviour for using the Internet (Norton, 2007; United States Department of Justice Computer Crime and Intellectual Property Section, 2011). Norton (2007) and the United States Department of Justice Computer Crime and Intellectual Property Section (2011) do not define this code in detail but they do agree that, on one hand, it encourages acceptable, safe and responsible behaviour on the Internet which is similar to that of everyday life, and on the other hand, discourages harmful and illegal behaviour online.
  4. Bell (2002, p. 5) argues that exposing students to clear and understandable guidelines is important and useful in enabling them to comprehend and comply with cyber ethics. The three “P” statements are a good example of such guidelines. The first is Privacy – “I will protect my privacy and respect the privacy of others”. The second is Property – “I will protect my property and respect the property of others”. Thirdly, “I will use my technology in constructive ways and in ways which do not break the rules of my family, church, school or government” (Bell, 2002, pp. 4-5).
  5. Another definition of cyber ethics relies upon sets of rules; dos and don’ts. According to Endicott-Popovsky (2009) “the ability to create a list of ‘DOs’ versus a list of ‘DON’Ts’ for using electronic resources remains the teacher-librarian’s task as we try to facilitate use in safe and sane ways” (p. 29). Norton (2007) provides one example of a list of dos and don’ts. For example: do use the Internet to help you do your schoolwork… Don’t copy information from the Internet and call it your own… Do use the Internet to learn about music, video and games… Don’t use the Internet to download or share copyrighted material. The US Department of Justice (2002) also advocates using rules to define what is ethical and unethical behaviour. For example, DO use the Internet to meet children in other countries or to keep in touch with pen pals who live far away in this country or other countries… DON'T give your password to anyone. Passwords are intended to protect your computer and your files. It's like giving the key to your house away!
  6. Who should exercise cyber ethics? The answer in the literature is exclusively Internet users (Fredrick, 2010; United States Department of Justice Computer Crime and Intellectual Property Section, 2011). This includes schools and parents on the behalf of children. One problem with this is that it lets web designers and website owners off the hook. Clearly, a reason why users are able to behave unethically on the internet is because web designers and website owners make this possible and seemingly encourage it. In the case of the rate my teacher website a key assumption of the owners is that students should be allowed to do online what they cannot do in public (RateMyTeachers, 2010).
  7. There are a number of ways that cyber ethics can be taught in schools. One ideal way is using case studies (Endicott-Popovsky 2009, p. 30). This encourages students to reflect on and verbalise what is often regarded as anonymous, disembodied activity. Another way to teach cyber ethics in schools is using Internet safety sites such as those mentioned earlier (see also, Fredrick, 2010). A third way is using collaboration between teachers and a teacher Librarian to deliver classroom activities. According to Bell (2002, p. 5), the librarian at York Junior High, in the USA, noticed how often students were copying and using images without citing their sources. The librarian and two art teachers decided to collaborate in order to increase student awareness of the principle of respect for intellectual property and graphics. They created lessons and a project to provide a positive alternative to copying images.
  8. In the teaching of cyber ethics, Starr (2003) advocates the incorporation of cyber ethics into the school and classroom culture. One way to do this is to create a written acceptable use policy to be posted in the classroom. Endicott-Popovsky (2009, p. 31) agrees with Starr and adds that development of an Internet use policy utilising collaboration between students, administrators, teachers, parents and IT staff can ensure that all stakeholders are committed and involved in the successful implementation. “Enforceable school policies can establish acceptable norms for online behaviour and access.” (Endicott-Popovski, 2009, p. 31). Another way to incorporate cyber ethics into the school and classroom culture, according to Starr (2003) is for teachers, administrators and other school staff to ensure that they always model appropriate behaviour. “If we provide positive images and effectively communicate ethical values in all areas of their lives, those values will be reflected in the technological environment as well.” (Starr, 2003).
  9. Two simple alternatives to the teaching of cyber ethics are bans and filtering (Starr, 2003). As stated by Fredrick (2010, p. 35), a lot of time has been spent creating firewalls and filters for use on school networks in order to block inappropriate material on the Internet. A 2009 report, funded by the Commonwealth Department of Education, Employment and Workplace Relations, shows that 86% of Australian schools block Facebook, 57% block YouTube, and 14% block Wikipedia (Sydney Morning Herald, 2011, February 28). While keeping out the predators and blocking the bad stuff is an admirable cause (Fredrick, 2010, p. 35) there have been a number of criticisms of bans and filtering. Frederick (2010, p. 35) and Starr (2003) argue that bans and filtering does not give students an online compass to govern their behaviour in the online world beyond school. Some educators argue that school social-media bans are overkill and block access to a proliferation of quality education tools online (Sydney Morning Herald, 2011, February 28). There is evidence that some teachers and schools are fighting and by-passing bans and filters, and pushing for bans to be lifted (Sydney Morning Herald, 2011, February 28).
  10. As shown in this presentation there is clearly a need for students to be taught cyber ethics. While there are alternatives to teaching cyber ethics to students these are not without their problems. As suggested by a number of sources, a reason why unethical online behaviour occurs is because the Internet tends to be seen as exempt from the norms and expectations of everyday life. It is an unnatural and artificial place where anything can go. To ensure that designers and users behave ethically it is important to draw parallels between the real and the electronic world. It is important to make direct comparisons between what students do on the Internet and how they behave in their everyday lives; “call a spade, a spade”. That is, stealing is stealing, vilification is vilification, bad things happen in the community and bad things can happen on the Internet.
  11. Schwartau (2011) argues thatthe law has no influence over those little voices in your head. What the voices tell you and how you choose to behave is entirely up to you… Just because something can be done does not mean it should be done”. Nevertheless, the Commonwealth government has enacted laws that make cyber bullying illegal.Schwartau (2011) states that “ethics is about understanding how your actions affect other people, knowing what is right and wrong and taking personal responsibility for your actions - even if they are legal”. For the sense of responsibility to be effective it requires clear consequences for unethical behaviour.The value of bans and filters is that they require that educators and parents know what students and children are doing on the Internet. If one takes away prohibitions and emphasises the importance of choice and consequences it is not guaranteed that some students or all students will behave appropriately. This suggests a need for educators and parents to know what students, their sons and daughters are doing online. Without bans or filters does this mean that parents and educators need to rely on trust and honesty.
  12. References Atkin, M. (2011, April 16). Anti-sexting campaign branded dull, unrealistic. ABC News. Retrieved from http://www.abc.net.au/news/stories/2011/04/16/3193307.htm Bell, M. A. (2002). Kids can care about cyberethics! Ed media world conference on educational media, hypermedia and telecommunications, Association for the Advancement of Computing in Education. Retrieved from http://www.shsu.edu/~lis_mah/documents/TCEA/brightideasportal.html Endicott-Popovsky, B. (2009) Seeking a balance: Online safety for our children. Teacher Librarian, 37(2), 29-34.Fredrick, K. (2010). Teaching the rules of the road online. School Library Monthly, 26(8), 35-36. Grubb, B. (2011, March 15). Teen’s Facebook party cancelled as 200k threaten to show up. Sydney Morning Herald. Retrieved from http://www.smh.com.au/technology/technology-news/teens- facebook-party-cancelled-as-200k-threaten-to-show-up-20110314-1btsl.html Kwek, G. (2011, March 17). From victim to hero: How the net transformed bullied boy. SydneyMorning Herald. Retrieved from http://www.smh.com.au/technology/technology-news/from- victim-to-hero-how-the-net-transformed-bullied-boy-20110317-1byik.html Norton. (2007, February 19). Cyberethics. Symantec. Retrieved from http://us.norton.com/library/familyresource/article.jsp?aid=pr_cyberethics RateMyTeachers. (2010). Frequently asked questions. Retrieved from http://au. ratemyteachers.com/faq.php?type=main#q2Schwartau, W. (2011, March 31). Cyber Ethics 101: What Are (Is) Ethics?. Ed-u.com. Retrieved from http: //www.ed-u.com/cyber-ethics.htmStarr, L. (2003). Tools for teaching cyber ethics. Education World. Retrieved from http://www.educationworld.com/a_tech/tech/tech055.shtml.Sydney Morning Herald. (2011, February 28). Teaching the Facebook generation. Retrieved fromhttp://www.smh.com.au/technology/technology-news/teaching-the-facebook-generation- 20110227-1ba19.html Teacher Support Network. (2010, December 8). Rate my Teacher website - overview and how to deal with any problems. Retrieved from http://tsn.custhelp.com/app/ answers/detail/a_id/2251/~/rate-my-teacher-website---overview-and-how-to-deal-with -any-problemsUnited States Department of Justice. (2002, May 31). Rules in Cyberspace. Retrieved from http://www.justice.gov/criminal/cybercrime/rules/rules.htmUnited States Department of Justice Computer Crime and Intellectual Property Section. (2011, March 17).Cyberethics. Retrieved from http://www.justice.gov/criminal/cybercrime/cyberethics.htm  Wilkinson, G. (2011, April 5). BrodiePanlock’s law: Workplace and cyber bullies face 10 years behind Bars. News.com.au. Retrieved from http://www.news.com.au/business/business-smarts/web- of-threats-ended-in-allem-kalkics-...Image attribution listSlide 1. Internet police http://www.flickr.com/photos/adamcrowe/4014323612 Slide 2. Cyber bullys http://www.flickr.com/photos/theadamclarke/4866228241Slide 3. Smiling Pam http://www.flickr.com/photos/theenmoy/5504152401 Jacob Frowns http://www.flickr.com/photos/athoos/265329441 Slide 6. Desktop computer http://www.flickr.com/photos/cabinet/53737447 Slide 8. Creative Commons http://www.flickr.com/photos/double-h90/3014588691