SlideShare une entreprise Scribd logo
1  sur  21
The Internet
&
Cyber Ethics
Source: Created by Rebecca Thomas 7200 EDMD Auburn University Fall 2005
EC05.01b Analyze legislation concerning Internet security issues 2
The Internet and Cyber Ethics
What is Cyber Ethics?
…...the ways that an individual uses a computer that
follows the rules made by the schools and government
EC05.01b Analyze legislation concerning Internet security issues 3
The Internet and Cyber Ethics
How do I know if the computer in my classroom is being
used legally and ethically?
The Department of Justice classifies computer crime
in three ways………
……….computers as a target
……….computers as a weapon
………computers as an accessory
EC05.01b Analyze legislation concerning Internet security issues 4
The Internet and Cyber Ethics
When should I learn cyber ethics
and Internet safety?
Most students are developmentally ready to learn
and apply the rules of Internet safety and cyber
ethics by third grade.
EC05.01b Analyze legislation concerning Internet security issues 5
The Internet and Cyber Ethics
What can be a crime in the classroom?
Hacking into the school’s main server to change grades?
Using the school website to publish a picture of a
teacher superimposed on a donkey’s body?
Copying pictures and sound clips
from a
copyrighted Internet source
to use in your school’s digital
yearbook ?
EC05.01b Analyze legislation concerning Internet security issues 6
The Internet and Cyber Ethics
What is “hacking”?
A hacker is someone who breaks into files
that belong to someone else to read private
emails or other information.
EC05.01b Analyze legislation concerning Internet security issues 7
The Internet and Cyber Ethics
What could happen to students who “hack”?
• Restitution of any money loss as a result of hacking
• Community service
• Loss of internet privileges
• Probation
• Incarceration if hacking results in serious loss, injury,
or death.
EC05.01b Analyze legislation concerning Internet security issues 8
The Internet and Cyber Ethics
What is the purpose of a password?
Passwords can help keep hackers out of your
computer or server so that it makes it harder for
them to steal information
EC05.01b Analyze legislation concerning Internet security issues 9
The Internet and Cyber Ethics
How can you use passwords to protect YOUR
personal information?
Let’s look at password combinations. Which of these
combinations would be harder for a professional hacker
to decode?
Tom1963
Rthomas
FiReCraCKer05
Iluv3dgs
Big_BabY_61
EC05.01b Analyze legislation concerning Internet security issues 10
The Internet and Cyber Ethics
How can one choose a password that is
harder for a hacker to “crack”?
Don't use passwords that are based on personal
information that can be easily accessed or guessed such as
birthdays, address, abbreviated names, initials, zip code,
etc. Examples: bobjackson, 01091964 (birthday in ANY
forms), becky1963, rlthomas, becky.thomas
EC05.01b Analyze legislation concerning Internet security issues 11
The Internet and Cyber Ethics
• Don't use words that can be found in any dictionary of
any language.
• Develop a mnemonic for remembering complex
passwords (Iluv3dogs=I love 3 dogs)
• Use both lowercase and capital letters
• Use a combination of letters, numbers, and special
characters
• Don’t use the same password for every password
protected account. This can be
easily traced by a professional.
EC05.01b Analyze legislation concerning Internet security issues 12
The Internet and Cyber Ethics
What are some specific rules regarding Internet
safety for students?
Never give out personal information (including your
name, home address, phone number, age, race, family
income, school name or location, or friends' names)
or use a credit card online without your permission.
Never share a password, even
with friends.
EC05.01b Analyze legislation concerning Internet security issues 13
Never arrange a face-to-face meeting with
someone you meet online.
Never respond to messages that make you
feel confused or uncomfortable. You should
ignore the sender, end the communication,
and tell your teacher or another trusted
adult right away.
Never use bad language or send
mean messages online.
The Internet and Cyber Ethics
EC05.01b Analyze legislation concerning Internet security issues 14
The Internet and Cyber Ethics
What kinds of ways can a predator seek out victims?
…… BBS ……….email
…….COS ……….public chat rooms
…….ISP ……….chat rooms
…….instant messaging ……….internet relay chat (IRC)
……….usenet (newsgroups)
EC05.01b Analyze legislation concerning Internet security issues 15
The Internet and Cyber Ethics
How can I, as a student, encourage my peers to use and
search for appropriate content on the World Wide Web?
Make sure we know appropriate areas to search and
what areas are off limits. Set time limits.
Pay attention to games or programs that are downloaded
or copied. Illegally copied programs or CD’s are a no-no.
.
EC05.01b Analyze legislation concerning Internet security issues 16
The Internet and Cyber Ethics
Check into the filtering software that your school
provides and ask the technology coordinator if there are
ways to bypass this filter. Keep a careful eye on myself
and my peers to make sure we are not doing these things
in order to go to inappropriate or questionable sites.
Talk to my parents about the importance of choosing a
highly visible place to locate the family computer. Too
much privacy for
students can lead to unhealthy, harmful
and/or
unsupervised behavior.
EC05.01b Analyze legislation concerning Internet security issues 17
The Internet and Cyber Ethics
What content is unacceptable for a student?
How about….
……gambling?
……pornography?
……chat sessions with a predator?
……activities with someone else’s credit card?
EC05.01b Analyze legislation concerning Internet security issues 18
……downloading files with viruses attached?
……illegal file sharing with friends (music, video, etc.)?
……pranks that lead federal, state, or local law
enforcement officials to you?
The Internet and Cyber Ethics
EC05.01b Analyze legislation concerning Internet security issues 19
The Internet and Cyber Ethics
In what way can schools make rules clear to students
about their responsibility for ethical behavior using any
form of multi-media?
How about a student contract?
EC05.01b Analyze legislation concerning Internet security issues 20
The Internet and Cyber Ethics
WHAT HAVE WE LEARNED?
The Internet is an infinite source of educational
information that can enhance the learning
experience.
Copyright laws apply to teachers as well as
students.
Fair use is the standard to which educators
and students must follow when
deciding if content is
appropriate for reproduction
EC05.01b Analyze legislation concerning Internet security issues 21
The Internet and Cyber Ethics
References
Cyber Citizenship, http://www.cybercitizenship.org/
Cyber Ethics for Teachers, ( January 24, 2005 ) A lesson plan outline for
elementary and middle school children.
http://www.cybercrime.gov/rules/lessonplan1.htm
Department of Education, (1997). Parents guide to the internet.
http://www.ed.gov/pubs/parents/internet/tips.html
U.S. Department of Justice, Federal Bureau of Investigation
http://www.fbi.gov/publications/pguide/pguidee.htm
Warlick, D., (1998-2003) Landmarks for Schools
http://www.computerlearning.org/respcode.htm
http://www.bham.wednet.edu/copyperm.htm

Contenu connexe

Tendances

Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Cyber crime presentation school level
Cyber crime presentation school levelCyber crime presentation school level
Cyber crime presentation school levelAbhinav Saxena
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethicsSKS
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber SafetyHarsh Tekriwal
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slidesthothakhail
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsPrabesh Shrestha
 

Tendances (20)

Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Cyber crime presentation school level
Cyber crime presentation school levelCyber crime presentation school level
Cyber crime presentation school level
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethics
 

En vedette

Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Rakshit Sharma
 
Copy Left, Right, or Wrong
Copy Left, Right, or WrongCopy Left, Right, or Wrong
Copy Left, Right, or WrongCopyLeftBot
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsSubas Paudel
 
Ict lessen plan
Ict lessen planIct lessen plan
Ict lessen planDEEPTHI S
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldRownel Cerezo Gagani
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethicsaleeya91
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 

En vedette (19)

Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)
 
Inpage presentation
Inpage presentationInpage presentation
Inpage presentation
 
In-page Urdu Features
In-page Urdu FeaturesIn-page Urdu Features
In-page Urdu Features
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Ethical issues in cyberspace
Ethical issues in cyberspaceEthical issues in cyberspace
Ethical issues in cyberspace
 
Copy Left, Right, or Wrong
Copy Left, Right, or WrongCopy Left, Right, or Wrong
Copy Left, Right, or Wrong
 
Inpage
InpageInpage
Inpage
 
Inpage
InpageInpage
Inpage
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber Ethics
 
Smart Lesson Plan
Smart Lesson PlanSmart Lesson Plan
Smart Lesson Plan
 
Ict lessen plan
Ict lessen planIct lessen plan
Ict lessen plan
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
MY ICT LESSON PLAN 3
MY ICT LESSON PLAN 3MY ICT LESSON PLAN 3
MY ICT LESSON PLAN 3
 
Blog
BlogBlog
Blog
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 

Similaire à Internet & Cyber Ethics Guide

Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 Bjboulanger
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet useBurkeV
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crimehomeworkping8
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computingMichael Jarata
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Ollie Bray
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeetaAparajeeta Salu
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and CyberbullyingLouise Jones
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525chadolivard
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 

Similaire à Internet & Cyber Ethics Guide (20)

Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 B
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet use
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
trial
trialtrial
trial
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computing
 
Internet Law Primer
Internet Law PrimerInternet Law Primer
Internet Law Primer
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and Cyberbullying
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
cyber crime
cyber crimecyber crime
cyber crime
 

Plus de Dr. TJ Wolfe

Principles design lecture
Principles design lecturePrinciples design lecture
Principles design lectureDr. TJ Wolfe
 
Analyzing internetsecurity
Analyzing internetsecurityAnalyzing internetsecurity
Analyzing internetsecurityDr. TJ Wolfe
 
Analyzing securewebsites
Analyzing securewebsitesAnalyzing securewebsites
Analyzing securewebsitesDr. TJ Wolfe
 
Analyzinglegislation
AnalyzinglegislationAnalyzinglegislation
AnalyzinglegislationDr. TJ Wolfe
 
Impact of the_internet_on_globalization_of_business
Impact of the_internet_on_globalization_of_businessImpact of the_internet_on_globalization_of_business
Impact of the_internet_on_globalization_of_businessDr. TJ Wolfe
 
Effects of the_internet_on_consumers_and_businesses
Effects of the_internet_on_consumers_and_businessesEffects of the_internet_on_consumers_and_businesses
Effects of the_internet_on_consumers_and_businessesDr. TJ Wolfe
 
Effects of the_internet_on_education_and_training
Effects of the_internet_on_education_and_trainingEffects of the_internet_on_education_and_training
Effects of the_internet_on_education_and_trainingDr. TJ Wolfe
 
STEM Resources for K-12 Educators
STEM Resources for K-12 EducatorsSTEM Resources for K-12 Educators
STEM Resources for K-12 EducatorsDr. TJ Wolfe
 
Characteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commerceiCharacteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commerceiDr. TJ Wolfe
 
Storyboarding and planning_your_website
Storyboarding and planning_your_websiteStoryboarding and planning_your_website
Storyboarding and planning_your_websiteDr. TJ Wolfe
 
Tech Integration for Dummies. A Simple 5 Step Plan
Tech Integration for Dummies. A Simple 5 Step PlanTech Integration for Dummies. A Simple 5 Step Plan
Tech Integration for Dummies. A Simple 5 Step PlanDr. TJ Wolfe
 

Plus de Dr. TJ Wolfe (11)

Principles design lecture
Principles design lecturePrinciples design lecture
Principles design lecture
 
Analyzing internetsecurity
Analyzing internetsecurityAnalyzing internetsecurity
Analyzing internetsecurity
 
Analyzing securewebsites
Analyzing securewebsitesAnalyzing securewebsites
Analyzing securewebsites
 
Analyzinglegislation
AnalyzinglegislationAnalyzinglegislation
Analyzinglegislation
 
Impact of the_internet_on_globalization_of_business
Impact of the_internet_on_globalization_of_businessImpact of the_internet_on_globalization_of_business
Impact of the_internet_on_globalization_of_business
 
Effects of the_internet_on_consumers_and_businesses
Effects of the_internet_on_consumers_and_businessesEffects of the_internet_on_consumers_and_businesses
Effects of the_internet_on_consumers_and_businesses
 
Effects of the_internet_on_education_and_training
Effects of the_internet_on_education_and_trainingEffects of the_internet_on_education_and_training
Effects of the_internet_on_education_and_training
 
STEM Resources for K-12 Educators
STEM Resources for K-12 EducatorsSTEM Resources for K-12 Educators
STEM Resources for K-12 Educators
 
Characteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commerceiCharacteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commercei
 
Storyboarding and planning_your_website
Storyboarding and planning_your_websiteStoryboarding and planning_your_website
Storyboarding and planning_your_website
 
Tech Integration for Dummies. A Simple 5 Step Plan
Tech Integration for Dummies. A Simple 5 Step PlanTech Integration for Dummies. A Simple 5 Step Plan
Tech Integration for Dummies. A Simple 5 Step Plan
 

Dernier

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 

Dernier (20)

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

Internet & Cyber Ethics Guide

  • 1. The Internet & Cyber Ethics Source: Created by Rebecca Thomas 7200 EDMD Auburn University Fall 2005
  • 2. EC05.01b Analyze legislation concerning Internet security issues 2 The Internet and Cyber Ethics What is Cyber Ethics? …...the ways that an individual uses a computer that follows the rules made by the schools and government
  • 3. EC05.01b Analyze legislation concerning Internet security issues 3 The Internet and Cyber Ethics How do I know if the computer in my classroom is being used legally and ethically? The Department of Justice classifies computer crime in three ways……… ……….computers as a target ……….computers as a weapon ………computers as an accessory
  • 4. EC05.01b Analyze legislation concerning Internet security issues 4 The Internet and Cyber Ethics When should I learn cyber ethics and Internet safety? Most students are developmentally ready to learn and apply the rules of Internet safety and cyber ethics by third grade.
  • 5. EC05.01b Analyze legislation concerning Internet security issues 5 The Internet and Cyber Ethics What can be a crime in the classroom? Hacking into the school’s main server to change grades? Using the school website to publish a picture of a teacher superimposed on a donkey’s body? Copying pictures and sound clips from a copyrighted Internet source to use in your school’s digital yearbook ?
  • 6. EC05.01b Analyze legislation concerning Internet security issues 6 The Internet and Cyber Ethics What is “hacking”? A hacker is someone who breaks into files that belong to someone else to read private emails or other information.
  • 7. EC05.01b Analyze legislation concerning Internet security issues 7 The Internet and Cyber Ethics What could happen to students who “hack”? • Restitution of any money loss as a result of hacking • Community service • Loss of internet privileges • Probation • Incarceration if hacking results in serious loss, injury, or death.
  • 8. EC05.01b Analyze legislation concerning Internet security issues 8 The Internet and Cyber Ethics What is the purpose of a password? Passwords can help keep hackers out of your computer or server so that it makes it harder for them to steal information
  • 9. EC05.01b Analyze legislation concerning Internet security issues 9 The Internet and Cyber Ethics How can you use passwords to protect YOUR personal information? Let’s look at password combinations. Which of these combinations would be harder for a professional hacker to decode? Tom1963 Rthomas FiReCraCKer05 Iluv3dgs Big_BabY_61
  • 10. EC05.01b Analyze legislation concerning Internet security issues 10 The Internet and Cyber Ethics How can one choose a password that is harder for a hacker to “crack”? Don't use passwords that are based on personal information that can be easily accessed or guessed such as birthdays, address, abbreviated names, initials, zip code, etc. Examples: bobjackson, 01091964 (birthday in ANY forms), becky1963, rlthomas, becky.thomas
  • 11. EC05.01b Analyze legislation concerning Internet security issues 11 The Internet and Cyber Ethics • Don't use words that can be found in any dictionary of any language. • Develop a mnemonic for remembering complex passwords (Iluv3dogs=I love 3 dogs) • Use both lowercase and capital letters • Use a combination of letters, numbers, and special characters • Don’t use the same password for every password protected account. This can be easily traced by a professional.
  • 12. EC05.01b Analyze legislation concerning Internet security issues 12 The Internet and Cyber Ethics What are some specific rules regarding Internet safety for students? Never give out personal information (including your name, home address, phone number, age, race, family income, school name or location, or friends' names) or use a credit card online without your permission. Never share a password, even with friends.
  • 13. EC05.01b Analyze legislation concerning Internet security issues 13 Never arrange a face-to-face meeting with someone you meet online. Never respond to messages that make you feel confused or uncomfortable. You should ignore the sender, end the communication, and tell your teacher or another trusted adult right away. Never use bad language or send mean messages online. The Internet and Cyber Ethics
  • 14. EC05.01b Analyze legislation concerning Internet security issues 14 The Internet and Cyber Ethics What kinds of ways can a predator seek out victims? …… BBS ……….email …….COS ……….public chat rooms …….ISP ……….chat rooms …….instant messaging ……….internet relay chat (IRC) ……….usenet (newsgroups)
  • 15. EC05.01b Analyze legislation concerning Internet security issues 15 The Internet and Cyber Ethics How can I, as a student, encourage my peers to use and search for appropriate content on the World Wide Web? Make sure we know appropriate areas to search and what areas are off limits. Set time limits. Pay attention to games or programs that are downloaded or copied. Illegally copied programs or CD’s are a no-no. .
  • 16. EC05.01b Analyze legislation concerning Internet security issues 16 The Internet and Cyber Ethics Check into the filtering software that your school provides and ask the technology coordinator if there are ways to bypass this filter. Keep a careful eye on myself and my peers to make sure we are not doing these things in order to go to inappropriate or questionable sites. Talk to my parents about the importance of choosing a highly visible place to locate the family computer. Too much privacy for students can lead to unhealthy, harmful and/or unsupervised behavior.
  • 17. EC05.01b Analyze legislation concerning Internet security issues 17 The Internet and Cyber Ethics What content is unacceptable for a student? How about…. ……gambling? ……pornography? ……chat sessions with a predator? ……activities with someone else’s credit card?
  • 18. EC05.01b Analyze legislation concerning Internet security issues 18 ……downloading files with viruses attached? ……illegal file sharing with friends (music, video, etc.)? ……pranks that lead federal, state, or local law enforcement officials to you? The Internet and Cyber Ethics
  • 19. EC05.01b Analyze legislation concerning Internet security issues 19 The Internet and Cyber Ethics In what way can schools make rules clear to students about their responsibility for ethical behavior using any form of multi-media? How about a student contract?
  • 20. EC05.01b Analyze legislation concerning Internet security issues 20 The Internet and Cyber Ethics WHAT HAVE WE LEARNED? The Internet is an infinite source of educational information that can enhance the learning experience. Copyright laws apply to teachers as well as students. Fair use is the standard to which educators and students must follow when deciding if content is appropriate for reproduction
  • 21. EC05.01b Analyze legislation concerning Internet security issues 21 The Internet and Cyber Ethics References Cyber Citizenship, http://www.cybercitizenship.org/ Cyber Ethics for Teachers, ( January 24, 2005 ) A lesson plan outline for elementary and middle school children. http://www.cybercrime.gov/rules/lessonplan1.htm Department of Education, (1997). Parents guide to the internet. http://www.ed.gov/pubs/parents/internet/tips.html U.S. Department of Justice, Federal Bureau of Investigation http://www.fbi.gov/publications/pguide/pguidee.htm Warlick, D., (1998-2003) Landmarks for Schools http://www.computerlearning.org/respcode.htm http://www.bham.wednet.edu/copyperm.htm