SlideShare a Scribd company logo
1 of 13
Cyber Ethics Rating my teachers without permission or notification: Ethical use of the Internet
The need for cyber ethics Teen's Facebook party cancelled as 200k threaten to show up (Grubb, 2011) http://www.ratemyteachers.com/
What is cyber ethics?: A code of behaviour Acceptable, safe and responsible behaviour similar to that of everyday life. No harmful and illegal behaviour online (Norton, (2007; US DOJ Computer Crime and Intellectual Property Section (2011). .
What is cyber ethics?: Guidelines Privacy Property a(P)propriate-use
What is cyber ethics?: A list of dos and don’ts http://us.norton.com/library/familyresource/article.jsp?aid=pr_cyberethics http://www.justice.gov/criminal/cybercrime/rules/rules.htm
Cyber ethics for whom? Web designers and website owners Users of websites and applications
How should cyber ethics be taught in schools?  Case studies (Endicott-Popovski, 2009)  Internet safety sites (Fredrick, 2010) Collaboration between a teacher librarian and teachers to deliver  classroom activities (Bell, 2002)
How should cyber ethics be taught in schools?  Internet Use Policy (Starr (2003) Modelling appropriate Behaviour
Alternatives to cyber ethics Bans? Filtering?
Conclusion Draw parallels between the real world and the electronic world.   Make direct  comparisons between what students do on the Internet and how they behave in their everyday lives.
Discussion questions Should online ethics be a matter of individual choice or should it be the law? (Schwartau, 2011).  What should be the consequences of unethical behaviour online? (Schwartau, 2011).  How can parents and educators know what students are doing on the Internet?
Recommended readings Bell, M. A. (2002). Kids can care about cyberethics! Ed media world conference on educational media, hypermedia and telecommunications, Association for the Advancement of Computing in Education,  Available from: http://www.shsu.edu/~lis_mah/documents/TCEA/brightideasportal.html Endicott-Popovsky, B. (2009) Seeking a balance: Online safety for our children. Teacher Librarian, 37(2), 29-34. Fredrick, K. (2010) Teaching the rules of the road online. School Library Monthly, 26(8), 35-36. Norton. (2007, February 19). Cyberethics. Available from: http://us.norton.com/library/familyresource/article.jsp?aid=pr_cyberethics United States Department of Justice Computer Crime and Intellectual Property Section, Cyberethics. (2011, March 17).  Retrieved from: http://www.justice.gov/criminal/cybercrime/cyberethics.htm
Slide Attribution List Slide 1.  Internet police http://www.flickr.com/photos/adamcrowe/4014323612  Slide 2.Cyber bullyshttp://www.flickr.com/photos/theadamclarke/4866228241 Slide 3. Smiling Pam http://www.flickr.com/photos/theenmoy/5504152401  Jacob Frownshttp://www.flickr.com/photos/athoos/265329441   Slide 6. Desktop computerhttp://www.flickr.com/photos/cabinet/53737447  Slide 8. Creative Commons http://www.flickr.com/photos/double-h90/3014588691

More Related Content

What's hot

Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
The effect of technology on today's society ppt
The effect of technology on today's society pptThe effect of technology on today's society ppt
The effect of technology on today's society pptoacore
 
Issues and challenges in ict
Issues and challenges in ictIssues and challenges in ict
Issues and challenges in ictNoor Ibrahim
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital ageSaman Sara
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Digital Etiquette
Digital Etiquette Digital Etiquette
Digital Etiquette EMCox02
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & PrecautionsTalwant Singh
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 

What's hot (20)

Cyber safety
Cyber safetyCyber safety
Cyber safety
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
The effect of technology on today's society ppt
The effect of technology on today's society pptThe effect of technology on today's society ppt
The effect of technology on today's society ppt
 
Issues and challenges in ict
Issues and challenges in ictIssues and challenges in ict
Issues and challenges in ict
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Digital Etiquette
Digital Etiquette Digital Etiquette
Digital Etiquette
 
Internet safety
Internet safety Internet safety
Internet safety
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 

Viewers also liked

Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldAmae OlFato
 
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015Priyanka Aash
 
Ethics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage ratesEthics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage ratesAysha Rahman
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldRownel Cerezo Gagani
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
Uses & applications of microsoft excel in vph research
Uses & applications of microsoft excel in vph researchUses & applications of microsoft excel in vph research
Uses & applications of microsoft excel in vph researchDr Alok Bharti
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityGareth Davies
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityFizaril Amzari Omar
 

Viewers also liked (20)

Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is Cyberworld
 
Cyber law
Cyber lawCyber law
Cyber law
 
Ethical issues in cyberspace
Ethical issues in cyberspaceEthical issues in cyberspace
Ethical issues in cyberspace
 
Inpage
InpageInpage
Inpage
 
Sharing of Information
Sharing of InformationSharing of Information
Sharing of Information
 
Inpage
InpageInpage
Inpage
 
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
 
Ethics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage ratesEthics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage rates
 
Inpage presentation
Inpage presentationInpage presentation
Inpage presentation
 
Cs106 professional-ethics
Cs106 professional-ethicsCs106 professional-ethics
Cs106 professional-ethics
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Bridging Between Languages
Bridging Between LanguagesBridging Between Languages
Bridging Between Languages
 
In-page Urdu Features
In-page Urdu FeaturesIn-page Urdu Features
In-page Urdu Features
 
Uses & applications of microsoft excel in vph research
Uses & applications of microsoft excel in vph researchUses & applications of microsoft excel in vph research
Uses & applications of microsoft excel in vph research
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 

Similar to Cyber ethics

Cyberethics accompanying text
Cyberethics accompanying text Cyberethics accompanying text
Cyberethics accompanying text Geoffrey Lowe
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizensStaci Trekles
 
Policies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social WebPolicies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social Webteach42
 
Addressing Ethics With Young Students
Addressing Ethics With Young StudentsAddressing Ethics With Young Students
Addressing Ethics With Young Studentsbeccapr69
 
Using ICTs to Promote Cultural Change: A Study from a Higher Education Context
Using ICTs to Promote Cultural Change: A Study from a Higher Education ContextUsing ICTs to Promote Cultural Change: A Study from a Higher Education Context
Using ICTs to Promote Cultural Change: A Study from a Higher Education Contextac2182
 
Internet Safety And The Internet
Internet Safety And The InternetInternet Safety And The Internet
Internet Safety And The InternetStephanie King
 
Digital Literacy PDLM
Digital Literacy PDLMDigital Literacy PDLM
Digital Literacy PDLMlinzer85
 
Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...Alexander Decker
 
Internet_Use_Behavior_and_Attitude_of_College_Stud.pdf
Internet_Use_Behavior_and_Attitude_of_College_Stud.pdfInternet_Use_Behavior_and_Attitude_of_College_Stud.pdf
Internet_Use_Behavior_and_Attitude_of_College_Stud.pdfHải Quân
 
Ed 6620 – Future Trends In Educational Technology
Ed 6620 – Future Trends In Educational TechnologyEd 6620 – Future Trends In Educational Technology
Ed 6620 – Future Trends In Educational TechnologyJames Parsons
 
Information Skills in a Global 2.0 World
Information Skills in a Global 2.0 WorldInformation Skills in a Global 2.0 World
Information Skills in a Global 2.0 WorldKelly Lambert
 
C:\Fakepath\Ed 6620 – Future Trends In Educational Technology
C:\Fakepath\Ed 6620 – Future Trends In Educational TechnologyC:\Fakepath\Ed 6620 – Future Trends In Educational Technology
C:\Fakepath\Ed 6620 – Future Trends In Educational TechnologyJames Parsons
 
Lessons Learned from the Safer Internet Program in Estonia
Lessons Learned from the Safer Internet Program in EstoniaLessons Learned from the Safer Internet Program in Estonia
Lessons Learned from the Safer Internet Program in EstoniaeLearning Papers
 
Cyberbully presentation
Cyberbully presentationCyberbully presentation
Cyberbully presentationYuming Peng
 

Similar to Cyber ethics (20)

Cyberethics accompanying text
Cyberethics accompanying text Cyberethics accompanying text
Cyberethics accompanying text
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizens
 
Policies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social WebPolicies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social Web
 
Addressing Ethics With Young Students
Addressing Ethics With Young StudentsAddressing Ethics With Young Students
Addressing Ethics With Young Students
 
Using ICTs to Promote Cultural Change: A Study from a Higher Education Context
Using ICTs to Promote Cultural Change: A Study from a Higher Education ContextUsing ICTs to Promote Cultural Change: A Study from a Higher Education Context
Using ICTs to Promote Cultural Change: A Study from a Higher Education Context
 
Internet Safety And The Internet
Internet Safety And The InternetInternet Safety And The Internet
Internet Safety And The Internet
 
Social Network Revised
Social Network RevisedSocial Network Revised
Social Network Revised
 
Digital Literacy PDLM
Digital Literacy PDLMDigital Literacy PDLM
Digital Literacy PDLM
 
Ethics Half Day
Ethics Half DayEthics Half Day
Ethics Half Day
 
Faculty and staff training
Faculty and staff trainingFaculty and staff training
Faculty and staff training
 
4
44
4
 
Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...
 
Internet_Use_Behavior_and_Attitude_of_College_Stud.pdf
Internet_Use_Behavior_and_Attitude_of_College_Stud.pdfInternet_Use_Behavior_and_Attitude_of_College_Stud.pdf
Internet_Use_Behavior_and_Attitude_of_College_Stud.pdf
 
Ed 6620 – Future Trends In Educational Technology
Ed 6620 – Future Trends In Educational TechnologyEd 6620 – Future Trends In Educational Technology
Ed 6620 – Future Trends In Educational Technology
 
Information Skills in a Global 2.0 World
Information Skills in a Global 2.0 WorldInformation Skills in a Global 2.0 World
Information Skills in a Global 2.0 World
 
C:\Fakepath\Ed 6620 – Future Trends In Educational Technology
C:\Fakepath\Ed 6620 – Future Trends In Educational TechnologyC:\Fakepath\Ed 6620 – Future Trends In Educational Technology
C:\Fakepath\Ed 6620 – Future Trends In Educational Technology
 
Digital+issues[1]
Digital+issues[1]Digital+issues[1]
Digital+issues[1]
 
Acceptable use policy__ecomp_6204
Acceptable use policy__ecomp_6204Acceptable use policy__ecomp_6204
Acceptable use policy__ecomp_6204
 
Lessons Learned from the Safer Internet Program in Estonia
Lessons Learned from the Safer Internet Program in EstoniaLessons Learned from the Safer Internet Program in Estonia
Lessons Learned from the Safer Internet Program in Estonia
 
Cyberbully presentation
Cyberbully presentationCyberbully presentation
Cyberbully presentation
 

Recently uploaded

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 

Recently uploaded (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 

Cyber ethics

  • 1. Cyber Ethics Rating my teachers without permission or notification: Ethical use of the Internet
  • 2. The need for cyber ethics Teen's Facebook party cancelled as 200k threaten to show up (Grubb, 2011) http://www.ratemyteachers.com/
  • 3. What is cyber ethics?: A code of behaviour Acceptable, safe and responsible behaviour similar to that of everyday life. No harmful and illegal behaviour online (Norton, (2007; US DOJ Computer Crime and Intellectual Property Section (2011). .
  • 4. What is cyber ethics?: Guidelines Privacy Property a(P)propriate-use
  • 5. What is cyber ethics?: A list of dos and don’ts http://us.norton.com/library/familyresource/article.jsp?aid=pr_cyberethics http://www.justice.gov/criminal/cybercrime/rules/rules.htm
  • 6. Cyber ethics for whom? Web designers and website owners Users of websites and applications
  • 7. How should cyber ethics be taught in schools? Case studies (Endicott-Popovski, 2009) Internet safety sites (Fredrick, 2010) Collaboration between a teacher librarian and teachers to deliver classroom activities (Bell, 2002)
  • 8. How should cyber ethics be taught in schools? Internet Use Policy (Starr (2003) Modelling appropriate Behaviour
  • 9. Alternatives to cyber ethics Bans? Filtering?
  • 10. Conclusion Draw parallels between the real world and the electronic world. Make direct comparisons between what students do on the Internet and how they behave in their everyday lives.
  • 11. Discussion questions Should online ethics be a matter of individual choice or should it be the law? (Schwartau, 2011). What should be the consequences of unethical behaviour online? (Schwartau, 2011). How can parents and educators know what students are doing on the Internet?
  • 12. Recommended readings Bell, M. A. (2002). Kids can care about cyberethics! Ed media world conference on educational media, hypermedia and telecommunications, Association for the Advancement of Computing in Education, Available from: http://www.shsu.edu/~lis_mah/documents/TCEA/brightideasportal.html Endicott-Popovsky, B. (2009) Seeking a balance: Online safety for our children. Teacher Librarian, 37(2), 29-34. Fredrick, K. (2010) Teaching the rules of the road online. School Library Monthly, 26(8), 35-36. Norton. (2007, February 19). Cyberethics. Available from: http://us.norton.com/library/familyresource/article.jsp?aid=pr_cyberethics United States Department of Justice Computer Crime and Intellectual Property Section, Cyberethics. (2011, March 17). Retrieved from: http://www.justice.gov/criminal/cybercrime/cyberethics.htm
  • 13. Slide Attribution List Slide 1. Internet police http://www.flickr.com/photos/adamcrowe/4014323612 Slide 2.Cyber bullyshttp://www.flickr.com/photos/theadamclarke/4866228241 Slide 3. Smiling Pam http://www.flickr.com/photos/theenmoy/5504152401 Jacob Frownshttp://www.flickr.com/photos/athoos/265329441 Slide 6. Desktop computerhttp://www.flickr.com/photos/cabinet/53737447 Slide 8. Creative Commons http://www.flickr.com/photos/double-h90/3014588691

Editor's Notes

  1. ETL523, Geoffrey Lowe, 11472382, Assignment 1 (Item 2), lecturer: Judy O’Connell Everyday, the Internet offers much freedom, social interaction and many other possibilities. Recent events, reported in the news media, suggest that now more than ever it is important to ensure that Internet sites (such as RateMyTeachers) encourage ethical behaviour, and that users behave ethically. In this presentation there will be a brief overview of some case studies suggesting the need for cyber ethics. This will be followed by definitions of cyber ethics, discussions of who needs to be ethical, how this should be taught to students, and alternatives to cyber ethics. The presentation will conclude with a number of discussion questions for consideration.
  2. There have been a number of recent news stories about unethical uses of the Internet (Kwek, 2011; Wilkinson, 2011; Atkin, 2011). Interestingly, in the case of the Facebook party that made the news recently (Grubb, 2011) it has been argued that the girl was not to blame. She did not realise that something could go wrong and it was someone else that made her invite go viral. Regardless of whether or not this is true this still suggests a need for cyber ethics to educate users as to what is possible online and why they should protect their privacy. The existence of the RateMyTeacherswebsite suggests the need for cyber ethics to stop website developers and owners encouraging and making it possible for users to be unethical. Last year, a colleague informed me that I had been rated on this website. When I checked it out it was true. Like many teachers that I have spoken to since, I was unaware that a website such as this even existed. It allows anyone to anonymously enter a teacher’s name then rate that teacher and make comments without permission, then immediately put that on Facebook. Anyone can do this without the teacher ever knowing that this has happened. Contrary to the views of the designers of RateMyTeacher this website arguably encourages unethical behaviour including a cycle of classroom disruption, bullying and cyber bullying. The Teacher Support Network (2010) argues that teachers should ignore this website and that it should be shut down.
  3. What is cyber ethics? One general definition of cyber ethics is that it is a code of behaviour for using the Internet (Norton, 2007; United States Department of Justice Computer Crime and Intellectual Property Section, 2011). Norton (2007) and the United States Department of Justice Computer Crime and Intellectual Property Section (2011) do not define this code in detail but they do agree that, on one hand, it encourages acceptable, safe and responsible behaviour on the Internet which is similar to that of everyday life, and on the other hand, discourages harmful and illegal behaviour online.
  4. Bell (2002, p. 5) argues that exposing students to clear and understandable guidelines is important and useful in enabling them to comprehend and comply with cyber ethics. The three “P” statements are a good example of such guidelines. The first is Privacy – “I will protect my privacy and respect the privacy of others”. The second is Property – “I will protect my property and respect the property of others”. Thirdly, “I will use my technology in constructive ways and in ways which do not break the rules of my family, church, school or government” (Bell, 2002, pp. 4-5).
  5. Another definition of cyber ethics relies upon sets of rules; dos and don’ts. According to Endicott-Popovsky (2009) “the ability to create a list of ‘DOs’ versus a list of ‘DON’Ts’ for using electronic resources remains the teacher-librarian’s task as we try to facilitate use in safe and sane ways” (p. 29). Norton (2007) provides one example of a list of dos and don’ts. For example: do use the Internet to help you do your schoolwork… Don’t copy information from the Internet and call it your own… Do use the Internet to learn about music, video and games… Don’t use the Internet to download or share copyrighted material. The US Department of Justice (2002) also advocates using rules to define what is ethical and unethical behaviour. For example, DO use the Internet to meet children in other countries or to keep in touch with pen pals who live far away in this country or other countries… DON'T give your password to anyone. Passwords are intended to protect your computer and your files. It's like giving the key to your house away!
  6. Who should exercise cyber ethics? The answer in the literature is exclusively Internet users (Fredrick, 2010; United States Department of Justice Computer Crime and Intellectual Property Section, 2011). This includes schools and parents on the behalf of children. One problem with this is that it lets web designers and website owners off the hook. Clearly, a reason why users are able to behave unethically on the internet is because web designers and website owners make this possible and seemingly encourage it. In the case of the rate my teacher website a key assumption of the owners is that students should be allowed to do online what they cannot do in public (RateMyTeachers, 2010).
  7. There are a number of ways that cyber ethics can be taught in schools. One ideal way is using case studies (Endicott-Popovsky 2009, p. 30). This encourages students to reflect on and verbalise what is often regarded as anonymous, disembodied activity. Another way to teach cyber ethics in schools is using Internet safety sites such as those mentioned earlier (see also, Fredrick, 2010). A third way is using collaboration between teachers and a teacher Librarian to deliver classroom activities. According to Bell (2002, p. 5), the librarian at York Junior High, in the USA, noticed how often students were copying and using images without citing their sources. The librarian and two art teachers decided to collaborate in order to increase student awareness of the principle of respect for intellectual property and graphics. They created lessons and a project to provide a positive alternative to copying images.
  8. In the teaching of cyber ethics, Starr (2003) advocates the incorporation of cyber ethics into the school and classroom culture. One way to do this is to create a written acceptable use policy to be posted in the classroom. Endicott-Popovsky (2009, p. 31) agrees with Starr and adds that development of an Internet use policy utilising collaboration between students, administrators, teachers, parents and IT staff can ensure that all stakeholders are committed and involved in the successful implementation. “Enforceable school policies can establish acceptable norms for online behaviour and access.” (Endicott-Popovski, 2009, p. 31). Another way to incorporate cyber ethics into the school and classroom culture, according to Starr (2003) is for teachers, administrators and other school staff to ensure that they always model appropriate behaviour. “If we provide positive images and effectively communicate ethical values in all areas of their lives, those values will be reflected in the technological environment as well.” (Starr, 2003).
  9. Two simple alternatives to the teaching of cyber ethics are bans and filtering (Starr, 2003). As stated by Fredrick (2010, p. 35), a lot of time has been spent creating firewalls and filters for use on school networks in order to block inappropriate material on the Internet. A 2009 report, funded by the Commonwealth Department of Education, Employment and Workplace Relations, shows that 86% of Australian schools block Facebook, 57% block YouTube, and 14% block Wikipedia (Sydney Morning Herald, 2011, February 28). While keeping out the predators and blocking the bad stuff is an admirable cause (Fredrick, 2010, p. 35) there have been a number of criticisms of bans and filtering. Frederick (2010, p. 35) and Starr (2003) argue that bans and filtering does not give students an online compass to govern their behaviour in the online world beyond school. Some educators argue that school social-media bans are overkill and block access to a proliferation of quality education tools online (Sydney Morning Herald, 2011, February 28). There is evidence that some teachers and schools are fighting and by-passing bans and filters, and pushing for bans to be lifted (Sydney Morning Herald, 2011, February 28).
  10. As shown in this presentation there is clearly a need for students to be taught cyber ethics. While there are alternatives to teaching cyber ethics to students these are not without their problems. As suggested by a number of sources, a reason why unethical online behaviour occurs is because the Internet tends to be seen as exempt from the norms and expectations of everyday life. It is an unnatural and artificial place where anything can go. To ensure that designers and users behave ethically it is important to draw parallels between the real and the electronic world. It is important to make direct comparisons between what students do on the Internet and how they behave in their everyday lives; “call a spade, a spade”. That is, stealing is stealing, vilification is vilification, bad things happen in the community and bad things can happen on the Internet.
  11. Schwartau (2011) argues thatthe law has no influence over those little voices in your head. What the voices tell you and how you choose to behave is entirely up to you… Just because something can be done does not mean it should be done”. Nevertheless, the Commonwealth government has enacted laws that make cyber bullying illegal.Schwartau (2011) states that “ethics is about understanding how your actions affect other people, knowing what is right and wrong and taking personal responsibility for your actions - even if they are legal”. For the sense of responsibility to be effective it requires clear consequences for unethical behaviour.The value of bans and filters is that they require that educators and parents know what students and children are doing on the Internet. If one takes away prohibitions and emphasises the importance of choice and consequences it is not guaranteed that some students or all students will behave appropriately. This suggests a need for educators and parents to know what students, their sons and daughters are doing online. Without bans or filters does this mean that parents and educators need to rely on trust and honesty.
  12. References Atkin, M. (2011, April 16). Anti-sexting campaign branded dull, unrealistic. ABC News. Retrieved from http://www.abc.net.au/news/stories/2011/04/16/3193307.htm Bell, M. A. (2002). Kids can care about cyberethics! Ed media world conference on educational media, hypermedia and telecommunications, Association for the Advancement of Computing in Education. Retrieved from http://www.shsu.edu/~lis_mah/documents/TCEA/brightideasportal.html Endicott-Popovsky, B. (2009) Seeking a balance: Online safety for our children. Teacher Librarian, 37(2), 29-34.Fredrick, K. (2010). Teaching the rules of the road online. School Library Monthly, 26(8), 35-36. Grubb, B. (2011, March 15). Teen’s Facebook party cancelled as 200k threaten to show up. Sydney Morning Herald. Retrieved from http://www.smh.com.au/technology/technology-news/teens- facebook-party-cancelled-as-200k-threaten-to-show-up-20110314-1btsl.html Kwek, G. (2011, March 17). From victim to hero: How the net transformed bullied boy. SydneyMorning Herald. Retrieved from http://www.smh.com.au/technology/technology-news/from- victim-to-hero-how-the-net-transformed-bullied-boy-20110317-1byik.html Norton. (2007, February 19). Cyberethics. Symantec. Retrieved from http://us.norton.com/library/familyresource/article.jsp?aid=pr_cyberethics RateMyTeachers. (2010). Frequently asked questions. Retrieved from http://au. ratemyteachers.com/faq.php?type=main#q2Schwartau, W. (2011, March 31). Cyber Ethics 101: What Are (Is) Ethics?. Ed-u.com. Retrieved from http: //www.ed-u.com/cyber-ethics.htmStarr, L. (2003). Tools for teaching cyber ethics. Education World. Retrieved from http://www.educationworld.com/a_tech/tech/tech055.shtml.Sydney Morning Herald. (2011, February 28). Teaching the Facebook generation. Retrieved fromhttp://www.smh.com.au/technology/technology-news/teaching-the-facebook-generation- 20110227-1ba19.html Teacher Support Network. (2010, December 8). Rate my Teacher website - overview and how to deal with any problems. Retrieved from http://tsn.custhelp.com/app/ answers/detail/a_id/2251/~/rate-my-teacher-website---overview-and-how-to-deal-with -any-problemsUnited States Department of Justice. (2002, May 31). Rules in Cyberspace. Retrieved from http://www.justice.gov/criminal/cybercrime/rules/rules.htmUnited States Department of Justice Computer Crime and Intellectual Property Section. (2011, March 17).Cyberethics. Retrieved from http://www.justice.gov/criminal/cybercrime/cyberethics.htm  Wilkinson, G. (2011, April 5). BrodiePanlock’s law: Workplace and cyber bullies face 10 years behind Bars. News.com.au. Retrieved from http://www.news.com.au/business/business-smarts/web- of-threats-ended-in-allem-kalkics-...Image attribution listSlide 1. Internet police http://www.flickr.com/photos/adamcrowe/4014323612 Slide 2. Cyber bullys http://www.flickr.com/photos/theadamclarke/4866228241Slide 3. Smiling Pam http://www.flickr.com/photos/theenmoy/5504152401 Jacob Frowns http://www.flickr.com/photos/athoos/265329441 Slide 6. Desktop computer http://www.flickr.com/photos/cabinet/53737447 Slide 8. Creative Commons http://www.flickr.com/photos/double-h90/3014588691