• Like
Group1 Ppt
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Group1 Ppt

  • 285 views
Published

 

Published in Technology , Education
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
285
On SlideShare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
8
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1.  
  • 2. -William O’Douglas, American Jurist, Supreme Court Justice (1898-1980)
    • “ Security can only be achieved through constant change, through discarding old ideas that have outlived their usefulness and adapting others to current facts.”
  • 3. Let’s Begin with a video clip…click here
  • 4.  
  • 5. In this Age of Information, what kind of society are we creating? Ethical Issues “ Information is the means through which the mind expands and increases its capacity to achieve its goals, often as a result of an input from another mind” ~ Management Information Systems Quarterly, Vol 10, Number 1, March 1986, Richard O Ethical Issue
  • 6. What is Fair Use? Ethical Issue A copy right principle
    • Based on the belief that the public
    • is entitled to freely use portions of
    • copyrighted materials for purposes of
    • commentary and criticism
  • 7. ?QUESTION?
    • Should you have the freedom to criticize an author, and use a quote from their work without asking permission?
    Ethical Issue ??? ??? ???
  • 8. Protection and Risks
    • What’s the problem?
    • Who’s at risk?
    • What can we do?
    • What are the risks?
    Protection and Risks
  • 9. Protection on the Internet AUP
        • キ Less restrictive than filtering software
        • キ Use internet in a safe manner
        • キ Protects from giving out personal information
        • キ Informs parents
    ** AUP acts as a written contract between administrators, teachers, parents and students… Hopewell Valley Regional School District in NJ – AUP Example Protection and Risks
  • 10. Does Your School Have an AUP? Tell us in our poll!
    • Click here to take our poll!
  • 11. ~ Monitor students through each step Plagiarism No Longer Just A Written Problem? ~What’s the difference between quoting, paraphrasing, and summarizing on the net? ~How to document internet sources? Protection and Risks Teach your students to cite – use this website to help you.
  • 12. Detect plagiarism in school. Need to know what’s what? Protection and Risks www.Turnitin.com What to know about copyrights? Copyrights
  • 13. Should Protection Go this Far? Teacher & Student Monitoring Administrators monitoring your internet use and e-mail activity? Why or Why not? Monitoring your students internet use and e-mail activity? Why or Why not? Protections and Risks
  • 14. Internet Safety In the Classroom What can we do to keep our children safe in our classroom and at home? Transforming the Classroom Transforming the Classroom
  • 15. The best way to keep our Children safe is to educate them! Transforming the Classroom
  • 16.
        • Cyberbullying – What is it ?
    Transforming the Classroom Who’s affected? How do we keep it from happening?
  • 17. Transforming the Classroom Teach Children Never to give out personal information Know the rules and laws Identify Cyberbullying
  • 18. Prevention
        • Educate kids about
        • the consequences
        • to respect others
        • take a stand against all bullying
    Transforming the Classroom
  • 19. Show your students what Cyberbullying looks like Click here to see a video Let them know that they are not alone, and they should tell a trusted adult Transforming the Classroom
  • 20. Resources that Teach about Internet Safety Early Childhood
    • www.Kidsdomain.com
    • www.Wiredkids.com
    • Elementary School
    • www.Cybercrime.gov
    • www.4teachers.org
    • Teen Safety
    • www.Safeteens.com
    • www.Cybersmartkids.com
  • 21. Summing It Up
    • Working Together
    • Ethical Issues
    • Protecting Your Computer
  • 22. Show What You Have Learned!
    • Click here to take our online quiz.
    • *** Type your name and click start quiz on the lower right hand side of the box.
  • 23. http://www.siia.net/piracy/whatis.asp#Examples http://doe.state.in.us/olr/aup/welcome.html http://www.education-world.com/a_curr/curr280a.shtml http://www.bizjournals.com/buffalo/stories/2004/05/03/story8.html http://www.youtube.com/watch?v=ABrbRu2OUrc http://www.sevenoaksart.co.uk/images/compscreens.gif Work Cited
  • 24. http://www. youtube .com/watch?v=aa6Vxc4cB2w&NR=1 http://www. youtube .com/watch?v=fNumIY9D7uY Gary B. Shelly, Thomas J. Cashman, Glenda A. Gunter, Randolph E. Gunter (2006) Teachers Discovering Computers ( http:// oc .course.com/sc/tdc5/index. cfm ). www.stopcyberbullying.org Mason, Richard O. (1986). Four Ethical Issues of the Information Age . Management Information Systems Quarterly, 10 Number 1, 5-12. http://Fairuse.stanford.edu/Copyright_and_Fair_Use_ Overview/chapter9/index.html Work Cited http://www.media-awareness.ca/english/resources/special_initiatives/wa_ resources/wa_teachers/backgrounders/acceptable_use.cfm