Cyber ethics

  • 510 views
Uploaded on

 

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
510
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
39
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. The Internet & Cyber Ethics Source: Created by Rebecca Thomas 7200 EDMD Auburn University Fall 2005
  • 2. EC05.01b Analyze legislation concerning Internet security issues 2 The Internet and Cyber Ethics What is Cyber Ethics? …...the ways that an individual uses a computer that follows the rules made by the schools and government
  • 3. EC05.01b Analyze legislation concerning Internet security issues 3 The Internet and Cyber Ethics How do I know if the computer in my classroom is being used legally and ethically? The Department of Justice classifies computer crime in three ways……… ……….computers as a target ……….computers as a weapon ………computers as an accessory
  • 4. EC05.01b Analyze legislation concerning Internet security issues 4 The Internet and Cyber Ethics When should I learn cyber ethics and Internet safety? Most students are developmentally ready to learn and apply the rules of Internet safety and cyber ethics by third grade.
  • 5. EC05.01b Analyze legislation concerning Internet security issues 5 The Internet and Cyber Ethics What can be a crime in the classroom? Hacking into the school’s main server to change grades? Using the school website to publish a picture of a teacher superimposed on a donkey’s body? Copying pictures and sound clips from a copyrighted Internet source to use in your school’s digital yearbook ?
  • 6. EC05.01b Analyze legislation concerning Internet security issues 6 The Internet and Cyber Ethics What is “hacking”? A hacker is someone who breaks into files that belong to someone else to read private emails or other information.
  • 7. EC05.01b Analyze legislation concerning Internet security issues 7 The Internet and Cyber Ethics What could happen to students who “hack”? • Restitution of any money loss as a result of hacking • Community service • Loss of internet privileges • Probation • Incarceration if hacking results in serious loss, injury, or death.
  • 8. EC05.01b Analyze legislation concerning Internet security issues 8 The Internet and Cyber Ethics What is the purpose of a password? Passwords can help keep hackers out of your computer or server so that it makes it harder for them to steal information
  • 9. EC05.01b Analyze legislation concerning Internet security issues 9 The Internet and Cyber Ethics How can you use passwords to protect YOUR personal information? Let’s look at password combinations. Which of these combinations would be harder for a professional hacker to decode? Tom1963 Rthomas FiReCraCKer05 Iluv3dgs Big_BabY_61
  • 10. EC05.01b Analyze legislation concerning Internet security issues 10 The Internet and Cyber Ethics How can one choose a password that is harder for a hacker to “crack”? Don't use passwords that are based on personal information that can be easily accessed or guessed such as birthdays, address, abbreviated names, initials, zip code, etc. Examples: bobjackson, 01091964 (birthday in ANY forms), becky1963, rlthomas, becky.thomas
  • 11. EC05.01b Analyze legislation concerning Internet security issues 11 The Internet and Cyber Ethics • Don't use words that can be found in any dictionary of any language. • Develop a mnemonic for remembering complex passwords (Iluv3dogs=I love 3 dogs) • Use both lowercase and capital letters • Use a combination of letters, numbers, and special characters • Don’t use the same password for every password protected account. This can be easily traced by a professional.
  • 12. EC05.01b Analyze legislation concerning Internet security issues 12 The Internet and Cyber Ethics What are some specific rules regarding Internet safety for students? Never give out personal information (including your name, home address, phone number, age, race, family income, school name or location, or friends' names) or use a credit card online without your permission. Never share a password, even with friends.
  • 13. EC05.01b Analyze legislation concerning Internet security issues 13 Never arrange a face-to-face meeting with someone you meet online. Never respond to messages that make you feel confused or uncomfortable. You should ignore the sender, end the communication, and tell your teacher or another trusted adult right away. Never use bad language or send mean messages online. The Internet and Cyber Ethics
  • 14. EC05.01b Analyze legislation concerning Internet security issues 14 The Internet and Cyber Ethics What kinds of ways can a predator seek out victims? …… BBS ……….email …….COS ……….public chat rooms …….ISP ……….chat rooms …….instant messaging ……….internet relay chat (IRC) ……….usenet (newsgroups)
  • 15. EC05.01b Analyze legislation concerning Internet security issues 15 The Internet and Cyber Ethics How can I, as a student, encourage my peers to use and search for appropriate content on the World Wide Web? Make sure we know appropriate areas to search and what areas are off limits. Set time limits. Pay attention to games or programs that are downloaded or copied. Illegally copied programs or CD’s are a no-no. .
  • 16. EC05.01b Analyze legislation concerning Internet security issues 16 The Internet and Cyber Ethics Check into the filtering software that your school provides and ask the technology coordinator if there are ways to bypass this filter. Keep a careful eye on myself and my peers to make sure we are not doing these things in order to go to inappropriate or questionable sites. Talk to my parents about the importance of choosing a highly visible place to locate the family computer. Too much privacy for students can lead to unhealthy, harmful and/or unsupervised behavior.
  • 17. EC05.01b Analyze legislation concerning Internet security issues 17 The Internet and Cyber Ethics What content is unacceptable for a student? How about…. ……gambling? ……pornography? ……chat sessions with a predator? ……activities with someone else’s credit card?
  • 18. EC05.01b Analyze legislation concerning Internet security issues 18 ……downloading files with viruses attached? ……illegal file sharing with friends (music, video, etc.)? ……pranks that lead federal, state, or local law enforcement officials to you? The Internet and Cyber Ethics
  • 19. EC05.01b Analyze legislation concerning Internet security issues 19 The Internet and Cyber Ethics In what way can schools make rules clear to students about their responsibility for ethical behavior using any form of multi-media? How about a student contract?
  • 20. EC05.01b Analyze legislation concerning Internet security issues 20 The Internet and Cyber Ethics WHAT HAVE WE LEARNED? The Internet is an infinite source of educational information that can enhance the learning experience. Copyright laws apply to teachers as well as students. Fair use is the standard to which educators and students must follow when deciding if content is appropriate for reproduction
  • 21. EC05.01b Analyze legislation concerning Internet security issues 21 The Internet and Cyber Ethics References Cyber Citizenship, http://www.cybercitizenship.org/ Cyber Ethics for Teachers, ( January 24, 2005 ) A lesson plan outline for elementary and middle school children. http://www.cybercrime.gov/rules/lessonplan1.htm Department of Education, (1997). Parents guide to the internet. http://www.ed.gov/pubs/parents/internet/tips.html U.S. Department of Justice, Federal Bureau of Investigation http://www.fbi.gov/publications/pguide/pguidee.htm Warlick, D., (1998-2003) Landmarks for Schools http://www.computerlearning.org/respcode.htm http://www.bham.wednet.edu/copyperm.htm