SlideShare a Scribd company logo
1 of 20
Legal, Social and Ethical Issues
This is an interactive Power Point for students to use to
understand Technology Education.
 Pictures of cameras will link you to YouTube videos
that provide more information on topics.
 Circles will bring you back to the main topic page for
that section
 Squares will bring you back to the home page
TOPICS OF IMPORTANCE
Ethical Issues for Safety and
Security
Digital Divide
Legal Use of Digital Media
Ethical Issues for Safety and
Security
 Social Networking
 Acceptable Use Policies
 Netiquette
 Cyber bullying
 Student Data
 Internet Privacy
Social Networking
 A broad class of websites and services that allow you to
connect with others online as well as meet people with
similar interests or hobbies.
 Examples
 Facebook
 Myspace
 Twitter
Acceptable Use Policies
 This is a policy set
up by the network
administrator or
other school
leaders that are set
to agree with their
technology needs
and safety
concerns.
Netiquette
 Refers to the online code of what is appropriate and in
good taste for internet users
 Contraction of the words “net” (from internet) and
“etiquette.
 Poor choices online can lead to bad consequences.
Cyber Bullying
 Bullying which is carried out through a social
networking site, but can also include through other
technologies such as text messaging.
 Different from regular bullying: more invasive, wider
audience, can be done at anytime, anyplace.
 One of the faster growing bullying trends among teens
today.
Student Data
 New computer technologies for gathering, storing,
manipulating, and communicating data are
revolutionizing the use and spread of information
 Student’s have the right to control use of information
that is related to themselves.
Internet Privacy
 Every move made online is being tracked.
 IP addresses can trace location.
 Be aware of what private information you make
available online.
 Protect passwords and do not leave confidential
information up for others to see.
Digital Divide
The digital divide is the lack of access to information
and communications technologies by segments of the
community
 Gender
 Socio Economic
 Race
 Resource Equity
 Teacher Bias
Gender
 Women and men use internet differently
 Men are more driven by IT, where as women are more
passive in their role as technology users.
 Men favor video games
 Women favor chatting, email
Socio Economic
 Many people living in poverty do not get the same
technological resources as others, leaving them farther
behind in the digital divide. A lot of technology is
expensive and people living in poverty cannot afford
them, as they are not a necessity.
Race
 Disadvantaged minority groups fall behind in
informational technology skills because of limited
access due to their socio economic standings.
 This can cause an even larger digital divide because the
minorities will not have practice with informational
technology skills which are one of the top careers of
today.
Resource Equity
 Having equal access to technology
 This is important part of a quality education
 Equal access is important to help bridge the gap in the
digital divide.
Teacher Bias
 The way a teacher teaches with technology and uses it
in the classroom can affect how students use and
understand using technology.
Legal Use Of Digital Media
 Copyright
 Fair Use
 Creative Commons
Copyright
 Gives creator right to reproduce, distribute, perform
and display his/her work.
 Copyright protection protects the creator from others
stealing ideas as their own and taking money and
association of what is rightfully theirs.
 A teacher must make sure the materials they use in the
classroom are not breaking copyright laws, they can do
so by purchasing materials from the creator/publisher or
using materials that are marked as “free” to use in the
classroom under whatever rules the publisher claims.
Fair Use
 Fair use is a doctrine in the United States copyright law
that allows limited use of copyrighted material
without requiring permission from the right holders.
 Four factors to look at: purpose, nature, amount,
effect.
Creative Commons
 Creative Commons' licenses allow others to copy and
distribute the work under specific conditions, and
general descriptions, legal clauses and HTML tags for
search engines are provided for several license options.
 One of the primary uses of a Creative Commons
license is to allow people to copy the material as long
as it is not used for commercial use.

More Related Content

Similar to MIL 7.ppt

Teaching with technology
Teaching with technologyTeaching with technology
Teaching with technologygibbs753
 
Teaching with technology 2
Teaching with technology 2Teaching with technology 2
Teaching with technology 2awood6
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Sherelle stubbs digital elements
Sherelle stubbs digital elementsSherelle stubbs digital elements
Sherelle stubbs digital elementssherelle74
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizensStaci Trekles
 
Second-level Digital Divide and experiences of Schools and Teachers
Second-level Digital Divide and experiences of Schools and TeachersSecond-level Digital Divide and experiences of Schools and Teachers
Second-level Digital Divide and experiences of Schools and TeachersLiwayway Memije-Cruz
 
Jennifer Reader Presentation 504
Jennifer Reader Presentation 504Jennifer Reader Presentation 504
Jennifer Reader Presentation 504jkdwb
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
Murphy Ppt.Digital Citizenship In Our Schools
Murphy Ppt.Digital Citizenship In Our SchoolsMurphy Ppt.Digital Citizenship In Our Schools
Murphy Ppt.Digital Citizenship In Our SchoolsKevin Murphy
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
How to Teach Digital Citizenship to Students A Comprehensive Guide for Teache...
How to Teach Digital Citizenship to Students A Comprehensive Guide for Teache...How to Teach Digital Citizenship to Students A Comprehensive Guide for Teache...
How to Teach Digital Citizenship to Students A Comprehensive Guide for Teache...digitalrajnikant
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 

Similar to MIL 7.ppt (20)

Teaching with technology
Teaching with technologyTeaching with technology
Teaching with technology
 
Teaching with technology 2
Teaching with technology 2Teaching with technology 2
Teaching with technology 2
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Sherelle stubbs digital elements
Sherelle stubbs digital elementsSherelle stubbs digital elements
Sherelle stubbs digital elements
 
Acceptable use policy__ecomp_6204
Acceptable use policy__ecomp_6204Acceptable use policy__ecomp_6204
Acceptable use policy__ecomp_6204
 
Social media
Social mediaSocial media
Social media
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizens
 
Second-level Digital Divide and experiences of Schools and Teachers
Second-level Digital Divide and experiences of Schools and TeachersSecond-level Digital Divide and experiences of Schools and Teachers
Second-level Digital Divide and experiences of Schools and Teachers
 
Grad presentation
Grad presentationGrad presentation
Grad presentation
 
Jennifer Reader Presentation 504
Jennifer Reader Presentation 504Jennifer Reader Presentation 504
Jennifer Reader Presentation 504
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Murphy Ppt.Digital Citizenship In Our Schools
Murphy Ppt.Digital Citizenship In Our SchoolsMurphy Ppt.Digital Citizenship In Our Schools
Murphy Ppt.Digital Citizenship In Our Schools
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
How to Teach Digital Citizenship to Students A Comprehensive Guide for Teache...
How to Teach Digital Citizenship to Students A Comprehensive Guide for Teache...How to Teach Digital Citizenship to Students A Comprehensive Guide for Teache...
How to Teach Digital Citizenship to Students A Comprehensive Guide for Teache...
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
MIL_WEEK-3.pptx
MIL_WEEK-3.pptxMIL_WEEK-3.pptx
MIL_WEEK-3.pptx
 
Hamad Rabban.It
Hamad Rabban.ItHamad Rabban.It
Hamad Rabban.It
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

MIL 7.ppt

  • 1.
  • 2. Legal, Social and Ethical Issues This is an interactive Power Point for students to use to understand Technology Education.  Pictures of cameras will link you to YouTube videos that provide more information on topics.  Circles will bring you back to the main topic page for that section  Squares will bring you back to the home page
  • 3. TOPICS OF IMPORTANCE Ethical Issues for Safety and Security Digital Divide Legal Use of Digital Media
  • 4. Ethical Issues for Safety and Security  Social Networking  Acceptable Use Policies  Netiquette  Cyber bullying  Student Data  Internet Privacy
  • 5. Social Networking  A broad class of websites and services that allow you to connect with others online as well as meet people with similar interests or hobbies.  Examples  Facebook  Myspace  Twitter
  • 6. Acceptable Use Policies  This is a policy set up by the network administrator or other school leaders that are set to agree with their technology needs and safety concerns.
  • 7. Netiquette  Refers to the online code of what is appropriate and in good taste for internet users  Contraction of the words “net” (from internet) and “etiquette.  Poor choices online can lead to bad consequences.
  • 8. Cyber Bullying  Bullying which is carried out through a social networking site, but can also include through other technologies such as text messaging.  Different from regular bullying: more invasive, wider audience, can be done at anytime, anyplace.  One of the faster growing bullying trends among teens today.
  • 9. Student Data  New computer technologies for gathering, storing, manipulating, and communicating data are revolutionizing the use and spread of information  Student’s have the right to control use of information that is related to themselves.
  • 10. Internet Privacy  Every move made online is being tracked.  IP addresses can trace location.  Be aware of what private information you make available online.  Protect passwords and do not leave confidential information up for others to see.
  • 11. Digital Divide The digital divide is the lack of access to information and communications technologies by segments of the community  Gender  Socio Economic  Race  Resource Equity  Teacher Bias
  • 12. Gender  Women and men use internet differently  Men are more driven by IT, where as women are more passive in their role as technology users.  Men favor video games  Women favor chatting, email
  • 13. Socio Economic  Many people living in poverty do not get the same technological resources as others, leaving them farther behind in the digital divide. A lot of technology is expensive and people living in poverty cannot afford them, as they are not a necessity.
  • 14. Race  Disadvantaged minority groups fall behind in informational technology skills because of limited access due to their socio economic standings.  This can cause an even larger digital divide because the minorities will not have practice with informational technology skills which are one of the top careers of today.
  • 15. Resource Equity  Having equal access to technology  This is important part of a quality education  Equal access is important to help bridge the gap in the digital divide.
  • 16. Teacher Bias  The way a teacher teaches with technology and uses it in the classroom can affect how students use and understand using technology.
  • 17. Legal Use Of Digital Media  Copyright  Fair Use  Creative Commons
  • 18. Copyright  Gives creator right to reproduce, distribute, perform and display his/her work.  Copyright protection protects the creator from others stealing ideas as their own and taking money and association of what is rightfully theirs.  A teacher must make sure the materials they use in the classroom are not breaking copyright laws, they can do so by purchasing materials from the creator/publisher or using materials that are marked as “free” to use in the classroom under whatever rules the publisher claims.
  • 19. Fair Use  Fair use is a doctrine in the United States copyright law that allows limited use of copyrighted material without requiring permission from the right holders.  Four factors to look at: purpose, nature, amount, effect.
  • 20. Creative Commons  Creative Commons' licenses allow others to copy and distribute the work under specific conditions, and general descriptions, legal clauses and HTML tags for search engines are provided for several license options.  One of the primary uses of a Creative Commons license is to allow people to copy the material as long as it is not used for commercial use.