Group1 Ppt

406 views

Published on

Published in: Technology, Education
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
406
On SlideShare
0
From Embeds
0
Number of Embeds
9
Actions
Shares
0
Downloads
10
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Group1 Ppt

    1. 2. -William O’Douglas, American Jurist, Supreme Court Justice (1898-1980) <ul><li>“ Security can only be achieved through constant change, through discarding old ideas that have outlived their usefulness and adapting others to current facts.” </li></ul>
    2. 3. Let’s Begin with a video clip…click here
    3. 5. In this Age of Information, what kind of society are we creating? Ethical Issues “ Information is the means through which the mind expands and increases its capacity to achieve its goals, often as a result of an input from another mind” ~ Management Information Systems Quarterly, Vol 10, Number 1, March 1986, Richard O Ethical Issue
    4. 6. What is Fair Use? Ethical Issue A copy right principle <ul><li>Based on the belief that the public </li></ul><ul><li>is entitled to freely use portions of </li></ul><ul><li>copyrighted materials for purposes of </li></ul><ul><li>commentary and criticism </li></ul>
    5. 7. ?QUESTION? <ul><li>Should you have the freedom to criticize an author, and use a quote from their work without asking permission? </li></ul>Ethical Issue ??? ??? ???
    6. 8. Protection and Risks <ul><li>What’s the problem? </li></ul><ul><li>Who’s at risk? </li></ul><ul><li>What can we do? </li></ul><ul><li>What are the risks? </li></ul>Protection and Risks
    7. 9. Protection on the Internet AUP <ul><ul><ul><li>キ Less restrictive than filtering software </li></ul></ul></ul><ul><ul><ul><li>キ Use internet in a safe manner </li></ul></ul></ul><ul><ul><ul><li>キ Protects from giving out personal information </li></ul></ul></ul><ul><ul><ul><li>キ Informs parents </li></ul></ul></ul>** AUP acts as a written contract between administrators, teachers, parents and students… Hopewell Valley Regional School District in NJ – AUP Example Protection and Risks
    8. 10. Does Your School Have an AUP? Tell us in our poll! <ul><li>Click here to take our poll! </li></ul>
    9. 11. ~ Monitor students through each step Plagiarism No Longer Just A Written Problem? ~What’s the difference between quoting, paraphrasing, and summarizing on the net? ~How to document internet sources? Protection and Risks Teach your students to cite – use this website to help you.
    10. 12. Detect plagiarism in school. Need to know what’s what? Protection and Risks www.Turnitin.com What to know about copyrights? Copyrights
    11. 13. Should Protection Go this Far? Teacher & Student Monitoring Administrators monitoring your internet use and e-mail activity? Why or Why not? Monitoring your students internet use and e-mail activity? Why or Why not? Protections and Risks
    12. 14. Internet Safety In the Classroom What can we do to keep our children safe in our classroom and at home? Transforming the Classroom Transforming the Classroom
    13. 15. The best way to keep our Children safe is to educate them! Transforming the Classroom
    14. 16. <ul><ul><ul><li>Cyberbullying – What is it ? </li></ul></ul></ul>Transforming the Classroom Who’s affected? How do we keep it from happening?
    15. 17. Transforming the Classroom Teach Children Never to give out personal information Know the rules and laws Identify Cyberbullying
    16. 18. Prevention <ul><ul><ul><li>Educate kids about </li></ul></ul></ul><ul><ul><ul><li>the consequences </li></ul></ul></ul><ul><ul><ul><li>to respect others </li></ul></ul></ul><ul><ul><ul><li>take a stand against all bullying </li></ul></ul></ul>Transforming the Classroom
    17. 19. Show your students what Cyberbullying looks like Click here to see a video Let them know that they are not alone, and they should tell a trusted adult Transforming the Classroom
    18. 20. Resources that Teach about Internet Safety Early Childhood <ul><li>www.Kidsdomain.com </li></ul><ul><li>www.Wiredkids.com </li></ul><ul><li>Elementary School </li></ul><ul><li>www.Cybercrime.gov </li></ul><ul><li>www.4teachers.org </li></ul><ul><li>Teen Safety </li></ul><ul><li>www.Safeteens.com </li></ul><ul><li>www.Cybersmartkids.com </li></ul>
    19. 21. Summing It Up <ul><li>Working Together </li></ul><ul><li>Ethical Issues </li></ul><ul><li>Protecting Your Computer </li></ul>
    20. 22. Show What You Have Learned! <ul><li>Click here to take our online quiz. </li></ul><ul><li>*** Type your name and click start quiz on the lower right hand side of the box. </li></ul>
    21. 23. http://www.siia.net/piracy/whatis.asp#Examples http://doe.state.in.us/olr/aup/welcome.html http://www.education-world.com/a_curr/curr280a.shtml http://www.bizjournals.com/buffalo/stories/2004/05/03/story8.html http://www.youtube.com/watch?v=ABrbRu2OUrc http://www.sevenoaksart.co.uk/images/compscreens.gif Work Cited
    22. 24. http://www. youtube .com/watch?v=aa6Vxc4cB2w&NR=1 http://www. youtube .com/watch?v=fNumIY9D7uY Gary B. Shelly, Thomas J. Cashman, Glenda A. Gunter, Randolph E. Gunter (2006) Teachers Discovering Computers ( http:// oc .course.com/sc/tdc5/index. cfm ). www.stopcyberbullying.org Mason, Richard O. (1986). Four Ethical Issues of the Information Age . Management Information Systems Quarterly, 10 Number 1, 5-12. http://Fairuse.stanford.edu/Copyright_and_Fair_Use_ Overview/chapter9/index.html Work Cited http://www.media-awareness.ca/english/resources/special_initiatives/wa_ resources/wa_teachers/backgrounders/acceptable_use.cfm

    ×