This document is a module on ethics in using computers from the Ministry of Education Malaysia. It discusses important concepts around computer ethics including copyright, plagiarism, and unethical computer use. The module aims to teach students the proper ethics around topics such as requesting permission before sharing or using others' work, respecting copyright laws, and avoiding plagiarism. It includes activities for students to learn about these issues through examples and exercises.
This document is a learning module on ethics in using computers for secondary school students in Malaysia. It contains information on computer ethics, copyright, plagiarism, and unethical computer usage. The module defines key terms, provides examples of ethical and unethical behavior, and includes activities for students to practice identifying ethical issues and avoid plagiarism. The goal is for students to understand proper computer usage and respect for intellectual property rights.
The document discusses copyright laws and fair use guidelines for educators. It provides an overview of copyright laws and their intent to protect intellectual property. Fair use allows for limited use of copyrighted works for educational purposes without permission. The document includes a quiz testing knowledge of what is permissible under fair use. It concludes with recommendations for how educators can stay informed of fair use guidelines and properly attribute sources to avoid plagiarism.
This document discusses computer ethics and provides guidelines for ethical computer use. It introduces the topics of ethical principles, doing the right thing, and codes of conduct regarding computer use. It then lists 10 guidelines for being an ethical computer user, such as not using computers to harm people, steal, or bear false witness. It also advises considering the social consequences of programs and systems and using computers with consideration and respect for others. The document concludes by offering to answer any questions about computer ethics.
This document discusses several legal and ethical issues related to using information and communication technologies (ICT). It covers topics like intellectual property rights, copyright, plagiarism, privacy, censorship, cybercrimes, and the digital divide. The document provides guidance on addressing these issues, including developing acceptable use policies, educating users, obtaining consent for personal information, and upgrading infrastructure to improve access. Overall, the document outlines many important legal and social considerations for responsibly using ICT and digital content.
Computer ethics deals with standards of conduct regarding computers and how computing professionals make decisions involving professional and social conduct. There are three major areas of computer ethics: copyright and intellectual property, netiquette, and day-to-day ethics. Copyright protects original creative works from being copied without permission, while intellectual property refers more broadly to creations of the intellect like inventions, works, and designs. Netiquette guidelines help ensure proper and considerate use of networks by emphasizing privacy, avoiding spam, and making constructive contributions. Day-to-day computer ethics addresses issues like software piracy, virus creation, plagiarism, hacking, and respecting file privacy.
This document discusses various topics relating to cyber ethics including privacy, intellectual property, computer crime, and professional responsibilities. It provides definitions for key terms like privacy, intellectual property, piracy, and spyware. It also outlines the ten commandments of computer ethics and guidelines for netiquette when communicating online. Sample emoticons and acronyms are given. The document concludes with presenting three case studies related to ethics in accessing others' files and information without permission.
This document discusses computer ethics and outlines 10 commandments of computer ethics from the Computer Ethics Institute. It addresses the definition of ethics as moral principles and defines computer ethics as the moral principles regarding all aspects of computing. The 10 commandments cover topics like not harming others, respecting privacy, avoiding theft/plagiarism, and considering social impacts. The document also discusses subcategories of computer ethics and how technology has impacted issues like privacy, communication, and employment.
This document discusses several issues relating to computer ethics, including intellectual property rights, privacy concerns, and the impact of computers on society. It provides details on intellectual property, defining it as creations of the intellect like inventions, literary works, symbols and designs used in commerce. The document also discusses categories of intellectual property like industrial property and copyright, as well as topics like software piracy, file privacy, creation of viruses, plagiarism, and ethical hacking. It emphasizes that as technology advances, computer ethics will continue to establish standards for new technologies.
This document is a learning module on ethics in using computers for secondary school students in Malaysia. It contains information on computer ethics, copyright, plagiarism, and unethical computer usage. The module defines key terms, provides examples of ethical and unethical behavior, and includes activities for students to practice identifying ethical issues and avoid plagiarism. The goal is for students to understand proper computer usage and respect for intellectual property rights.
The document discusses copyright laws and fair use guidelines for educators. It provides an overview of copyright laws and their intent to protect intellectual property. Fair use allows for limited use of copyrighted works for educational purposes without permission. The document includes a quiz testing knowledge of what is permissible under fair use. It concludes with recommendations for how educators can stay informed of fair use guidelines and properly attribute sources to avoid plagiarism.
This document discusses computer ethics and provides guidelines for ethical computer use. It introduces the topics of ethical principles, doing the right thing, and codes of conduct regarding computer use. It then lists 10 guidelines for being an ethical computer user, such as not using computers to harm people, steal, or bear false witness. It also advises considering the social consequences of programs and systems and using computers with consideration and respect for others. The document concludes by offering to answer any questions about computer ethics.
This document discusses several legal and ethical issues related to using information and communication technologies (ICT). It covers topics like intellectual property rights, copyright, plagiarism, privacy, censorship, cybercrimes, and the digital divide. The document provides guidance on addressing these issues, including developing acceptable use policies, educating users, obtaining consent for personal information, and upgrading infrastructure to improve access. Overall, the document outlines many important legal and social considerations for responsibly using ICT and digital content.
Computer ethics deals with standards of conduct regarding computers and how computing professionals make decisions involving professional and social conduct. There are three major areas of computer ethics: copyright and intellectual property, netiquette, and day-to-day ethics. Copyright protects original creative works from being copied without permission, while intellectual property refers more broadly to creations of the intellect like inventions, works, and designs. Netiquette guidelines help ensure proper and considerate use of networks by emphasizing privacy, avoiding spam, and making constructive contributions. Day-to-day computer ethics addresses issues like software piracy, virus creation, plagiarism, hacking, and respecting file privacy.
This document discusses various topics relating to cyber ethics including privacy, intellectual property, computer crime, and professional responsibilities. It provides definitions for key terms like privacy, intellectual property, piracy, and spyware. It also outlines the ten commandments of computer ethics and guidelines for netiquette when communicating online. Sample emoticons and acronyms are given. The document concludes with presenting three case studies related to ethics in accessing others' files and information without permission.
This document discusses computer ethics and outlines 10 commandments of computer ethics from the Computer Ethics Institute. It addresses the definition of ethics as moral principles and defines computer ethics as the moral principles regarding all aspects of computing. The 10 commandments cover topics like not harming others, respecting privacy, avoiding theft/plagiarism, and considering social impacts. The document also discusses subcategories of computer ethics and how technology has impacted issues like privacy, communication, and employment.
This document discusses several issues relating to computer ethics, including intellectual property rights, privacy concerns, and the impact of computers on society. It provides details on intellectual property, defining it as creations of the intellect like inventions, literary works, symbols and designs used in commerce. The document also discusses categories of intellectual property like industrial property and copyright, as well as topics like software piracy, file privacy, creation of viruses, plagiarism, and ethical hacking. It emphasizes that as technology advances, computer ethics will continue to establish standards for new technologies.
This document provides an overview of computer ethics by examining three key areas: copyright and licensing issues, censorship on the internet, and information privacy issues. It traces the history of the field back to Norbert Wiener in the 1940s and discusses how computer technology has evolved rapidly, requiring re-examination of ethics. Ensuring privacy and developing policies to guide ethical computer use are important aspects of the emerging field of computer ethics.
The document discusses several topics related to internet ethics including acceptable online behavior, cyberbullying, copyright, social media, online reputation, and secure passwords. It provides guidelines for ethical computer use such as not using computers to harm others, respect copyright laws, respect others' privacy, and use strong passwords without sharing login details. The document also contains information about an EU-funded project and a presentation made by a Polish teacher on internet ethics topics.
This document discusses computer ethics and outlines ethical principles for computer use. It defines computer ethics as a branch of ethics that addresses how users should make decisions regarding their online conduct. It provides 10 commandments of computer ethics, such as not using computers to harm others or steal. It notes that computers are replacing humans in many jobs and discusses issues like privacy, copyright, and the responsibilities of computer users.
1. The lecture discusses ethics and netiquette when using information and communication technologies.
2. It outlines basic principles for social conduct online such as respecting others' privacy, intellectual property, and time.
3. The lecture also discusses avoiding harmful, unethical, or illegal behaviors like spreading misinformation or abusing positions of power or trust.
The document discusses computer ethics and copyright issues for educators. It addresses common misconceptions around sharing and copying digital materials. It also provides guidance on what uses are permissible, such as downloading materials for classroom lessons, as well as what requires permission, like posting student work online. Resources for educators to learn about computer ethics and copyright law are also listed.
Computer ethics deals with establishing standards of conduct regarding how people should interact with computers and information technology. This includes issues like privacy, plagiarism, hacking, and distributing offensive content. Professional codes of ethics have been established by organizations like ACM to provide guidelines on ethical computer use and define engineers' responsibilities to clients, employers, and society. Engineering ethics also considers how technology development impacts human well-being and social issues. The goal of computer ethics is to determine appropriate policies to guide the use of information technology in a way that benefits humanity.
One of the most definitive sets of ethical standards is the Association for Computing Machinery Code of Ethics. The code is a four-point standard governing ethical behavior among computing professionals. It covers the core set of computer ethics from professional responsibility to the consequences of technology in society. Computer ethics promotes discussion around how much influence computers should have in areas like artificial intelligence and human communication as technology advances. Issues in computer ethics include intellectual property rights, privacy concerns, and the effects of computers on society.
This document discusses computer ethics and intellectual property rights. It defines computer ethics as moral standards or values that guide computer users. Computer ethics provides ethical guidelines, while computer law establishes legal standards with punishments. The document also outlines four types of intellectual property protection: patents, trademarks, designs, and copyright. It notes these protect inventions, brand identity, product appearance, and creative works, respectively.
The document discusses computer ethics and outlines three primary influences on ethical decisions related to computer technology and usage: an individual's personal code, any informal workplace code, and exposure to formal codes of ethics. It then lists "The Ten Commandments of Computer Ethics" which provide directives for ethical computer use such as not using computers to harm others, steal, snoop, or bear false witness.
ETHICS01 - Introduction to Computer EthicsMichael Heron
The document discusses the complex environment that software developers work in today compared to the past. It notes that developers must consider legal, ethical, and moral obligations of both themselves and their organizations. The module will examine case studies and how to advise on ethics policies. It will assess students through an individual paper and group project analyzing different perspectives on ethical decisions in computing.
Computer ethics is defined as a set of moral principles regulating computer use. Key issues in computer ethics include intellectual property rights, privacy concerns, and how technology impacts society. Ethical computer use means not duplicating copyrighted content without permission, accessing personal information, using computers to harm others, interfering with others' work, stealing, copying unlicensed software, or using computer resources without authorization. Copyright law protects intellectual property by regulating copying, distribution, alteration and display of creative works.
Computer Lab Management and Ethics in Using ComputerNur Azlina
1. The document outlines rules and regulations for computer lab use, including prohibiting unauthorized access, reporting issues to teachers, and being responsible with equipment.
2. It also discusses computer ethics like not harming others, respecting copyright and intellectual property, and using resources only for educational purposes.
3. The last sections define plagiarism as using others' work without credit, and that it is a serious academic offense that can result in exam failure or removal from degree lists. Students are advised to take good notes and rewrite from memory to avoid plagiarism.
ICT refers to technologies that provide access to information through digital devices and computer systems. It includes communication devices, software, and networks for transmission of information. Computer technology has evolved through five generations from vacuum tubes to integrated circuits and now includes mobile devices. ICT is used widely in education, banking, commerce, and industry for tasks like learning, transactions, sales, and production. Computerized systems are more interactive and efficient than non-computerized ones. ICT impacts society through faster communication, lower costs, effective sharing of information, and a more paperless environment. However, it also enables some social problems if not used ethically. Laws regulate privacy, intellectual property, and cybercrimes to address these issues.
This document defines computer ethics and discusses several ethical issues related to computer use. It classifies computer ethics into areas like intellectual property rights and privacy concerns. It provides 10 commandments for ethical computer use, such as not using computers to harm others, steal, or spread misinformation. The conclusion emphasizes the importance of respecting oneself and others in computer use.
This document discusses professional practices and computer ethics. It begins with background on ethics according to Socrates, defining ethics as knowing the difference between right and wrong. It then defines computer ethics and its components: responsibility, ownership, access, and personal privacy. The document then discusses the impact of cybercrime such as fraud, sabotage, and hacking. It provides examples of computer ethics cases and concludes with discussing the 10 commandments of computer ethics.
This document outlines a code of ethics for computer use consisting of 10 commandments:
1) Do not use computers to harm others or invade privacy. 2) Do not interfere with others' computer work. 3) Do not access others' computer files without permission. The 10 commandments provide guidance on ethical issues like privacy, theft, honesty, intellectual property, and social impact of technology.
This document provides an ethics module on cyber ethics for the National Youth Cyber Education Program called CyberPatriot. It begins with objectives around understanding ethics, right and wrong, and applying ethics to real world situations. It then defines ethics, discusses sources of ethics, and examines ethical behavior versus understanding. It poses questions about acting ethically online and provides principles of cyber ethics. The module concludes with scenarios to discuss ethical dilemmas and decisions in cyber contexts.
The document outlines The Ten Commandments of Computer Ethics as compiled by the Brookings Institution and the Computer Ethics Institute. The 10 commandments address ethical issues around using technology to harm others, interfere with others' work, snoop in files, steal, bear false witness, use unlicensed software, use other's resources without permission, take others' intellectual output, consider social impact of programs/systems, and ensure respect for others. Each commandment is then examined in one to two paragraphs.
The document discusses computer ethics and some of the ethical issues that can arise from computer use. It outlines several unethical uses of computers such as embezzlement, privacy violations, hacking, and copyright infringement. It also discusses ethical issues like advocacy of hatred/violence, sharing objectionable content, and introducing biases into software. Potential problems from artificial intelligence like autonomous weapons and lack of empathy are mentioned. Environmental impacts and health issues from improper computer use and disposal are also covered.
The document provides safety tips for email etiquette, computer care, and internet safety. It recommends not typing in all caps, swearing, or forwarding personal emails without permission for email etiquette. For computer care, it advises not downloading unknown files, drinking or eating by the computer, or pounding on the keyboard. Regarding internet safety, it suggests not giving out full name, phone number, home address, or personal details online and not meeting people only met online in person.
The document provides rules and guidelines for appropriate computer use at the Fayetteville High School computer lab. It outlines expectations for student conduct, including following the teacher's instructions, respecting others' work and property, and adhering to copyright laws. Consequences are explained for misuse and disciplinary offenses. Basic internet safety tips are also given, such as not sharing private information online and avoiding in-person meetings with strangers.
This document provides an overview of computer ethics by examining three key areas: copyright and licensing issues, censorship on the internet, and information privacy issues. It traces the history of the field back to Norbert Wiener in the 1940s and discusses how computer technology has evolved rapidly, requiring re-examination of ethics. Ensuring privacy and developing policies to guide ethical computer use are important aspects of the emerging field of computer ethics.
The document discusses several topics related to internet ethics including acceptable online behavior, cyberbullying, copyright, social media, online reputation, and secure passwords. It provides guidelines for ethical computer use such as not using computers to harm others, respect copyright laws, respect others' privacy, and use strong passwords without sharing login details. The document also contains information about an EU-funded project and a presentation made by a Polish teacher on internet ethics topics.
This document discusses computer ethics and outlines ethical principles for computer use. It defines computer ethics as a branch of ethics that addresses how users should make decisions regarding their online conduct. It provides 10 commandments of computer ethics, such as not using computers to harm others or steal. It notes that computers are replacing humans in many jobs and discusses issues like privacy, copyright, and the responsibilities of computer users.
1. The lecture discusses ethics and netiquette when using information and communication technologies.
2. It outlines basic principles for social conduct online such as respecting others' privacy, intellectual property, and time.
3. The lecture also discusses avoiding harmful, unethical, or illegal behaviors like spreading misinformation or abusing positions of power or trust.
The document discusses computer ethics and copyright issues for educators. It addresses common misconceptions around sharing and copying digital materials. It also provides guidance on what uses are permissible, such as downloading materials for classroom lessons, as well as what requires permission, like posting student work online. Resources for educators to learn about computer ethics and copyright law are also listed.
Computer ethics deals with establishing standards of conduct regarding how people should interact with computers and information technology. This includes issues like privacy, plagiarism, hacking, and distributing offensive content. Professional codes of ethics have been established by organizations like ACM to provide guidelines on ethical computer use and define engineers' responsibilities to clients, employers, and society. Engineering ethics also considers how technology development impacts human well-being and social issues. The goal of computer ethics is to determine appropriate policies to guide the use of information technology in a way that benefits humanity.
One of the most definitive sets of ethical standards is the Association for Computing Machinery Code of Ethics. The code is a four-point standard governing ethical behavior among computing professionals. It covers the core set of computer ethics from professional responsibility to the consequences of technology in society. Computer ethics promotes discussion around how much influence computers should have in areas like artificial intelligence and human communication as technology advances. Issues in computer ethics include intellectual property rights, privacy concerns, and the effects of computers on society.
This document discusses computer ethics and intellectual property rights. It defines computer ethics as moral standards or values that guide computer users. Computer ethics provides ethical guidelines, while computer law establishes legal standards with punishments. The document also outlines four types of intellectual property protection: patents, trademarks, designs, and copyright. It notes these protect inventions, brand identity, product appearance, and creative works, respectively.
The document discusses computer ethics and outlines three primary influences on ethical decisions related to computer technology and usage: an individual's personal code, any informal workplace code, and exposure to formal codes of ethics. It then lists "The Ten Commandments of Computer Ethics" which provide directives for ethical computer use such as not using computers to harm others, steal, snoop, or bear false witness.
ETHICS01 - Introduction to Computer EthicsMichael Heron
The document discusses the complex environment that software developers work in today compared to the past. It notes that developers must consider legal, ethical, and moral obligations of both themselves and their organizations. The module will examine case studies and how to advise on ethics policies. It will assess students through an individual paper and group project analyzing different perspectives on ethical decisions in computing.
Computer ethics is defined as a set of moral principles regulating computer use. Key issues in computer ethics include intellectual property rights, privacy concerns, and how technology impacts society. Ethical computer use means not duplicating copyrighted content without permission, accessing personal information, using computers to harm others, interfering with others' work, stealing, copying unlicensed software, or using computer resources without authorization. Copyright law protects intellectual property by regulating copying, distribution, alteration and display of creative works.
Computer Lab Management and Ethics in Using ComputerNur Azlina
1. The document outlines rules and regulations for computer lab use, including prohibiting unauthorized access, reporting issues to teachers, and being responsible with equipment.
2. It also discusses computer ethics like not harming others, respecting copyright and intellectual property, and using resources only for educational purposes.
3. The last sections define plagiarism as using others' work without credit, and that it is a serious academic offense that can result in exam failure or removal from degree lists. Students are advised to take good notes and rewrite from memory to avoid plagiarism.
ICT refers to technologies that provide access to information through digital devices and computer systems. It includes communication devices, software, and networks for transmission of information. Computer technology has evolved through five generations from vacuum tubes to integrated circuits and now includes mobile devices. ICT is used widely in education, banking, commerce, and industry for tasks like learning, transactions, sales, and production. Computerized systems are more interactive and efficient than non-computerized ones. ICT impacts society through faster communication, lower costs, effective sharing of information, and a more paperless environment. However, it also enables some social problems if not used ethically. Laws regulate privacy, intellectual property, and cybercrimes to address these issues.
This document defines computer ethics and discusses several ethical issues related to computer use. It classifies computer ethics into areas like intellectual property rights and privacy concerns. It provides 10 commandments for ethical computer use, such as not using computers to harm others, steal, or spread misinformation. The conclusion emphasizes the importance of respecting oneself and others in computer use.
This document discusses professional practices and computer ethics. It begins with background on ethics according to Socrates, defining ethics as knowing the difference between right and wrong. It then defines computer ethics and its components: responsibility, ownership, access, and personal privacy. The document then discusses the impact of cybercrime such as fraud, sabotage, and hacking. It provides examples of computer ethics cases and concludes with discussing the 10 commandments of computer ethics.
This document outlines a code of ethics for computer use consisting of 10 commandments:
1) Do not use computers to harm others or invade privacy. 2) Do not interfere with others' computer work. 3) Do not access others' computer files without permission. The 10 commandments provide guidance on ethical issues like privacy, theft, honesty, intellectual property, and social impact of technology.
This document provides an ethics module on cyber ethics for the National Youth Cyber Education Program called CyberPatriot. It begins with objectives around understanding ethics, right and wrong, and applying ethics to real world situations. It then defines ethics, discusses sources of ethics, and examines ethical behavior versus understanding. It poses questions about acting ethically online and provides principles of cyber ethics. The module concludes with scenarios to discuss ethical dilemmas and decisions in cyber contexts.
The document outlines The Ten Commandments of Computer Ethics as compiled by the Brookings Institution and the Computer Ethics Institute. The 10 commandments address ethical issues around using technology to harm others, interfere with others' work, snoop in files, steal, bear false witness, use unlicensed software, use other's resources without permission, take others' intellectual output, consider social impact of programs/systems, and ensure respect for others. Each commandment is then examined in one to two paragraphs.
The document discusses computer ethics and some of the ethical issues that can arise from computer use. It outlines several unethical uses of computers such as embezzlement, privacy violations, hacking, and copyright infringement. It also discusses ethical issues like advocacy of hatred/violence, sharing objectionable content, and introducing biases into software. Potential problems from artificial intelligence like autonomous weapons and lack of empathy are mentioned. Environmental impacts and health issues from improper computer use and disposal are also covered.
The document provides safety tips for email etiquette, computer care, and internet safety. It recommends not typing in all caps, swearing, or forwarding personal emails without permission for email etiquette. For computer care, it advises not downloading unknown files, drinking or eating by the computer, or pounding on the keyboard. Regarding internet safety, it suggests not giving out full name, phone number, home address, or personal details online and not meeting people only met online in person.
The document provides rules and guidelines for appropriate computer use at the Fayetteville High School computer lab. It outlines expectations for student conduct, including following the teacher's instructions, respecting others' work and property, and adhering to copyright laws. Consequences are explained for misuse and disciplinary offenses. Basic internet safety tips are also given, such as not sharing private information online and avoiding in-person meetings with strangers.
The document provides guidelines for computer lab etiquette. Students should sit in their assigned seats with feet on the floor and back against the chair. Students should keep their fingers on the home row of the keyboard and avoid touching the computer screen. Students are responsible for the computer assigned to them and should report any issues to the teacher in the first 3 minutes of class.
Ms. Gardner's Technology Lab has rules for students to follow to ensure computers are treated properly, others are respected, and the Internet is used appropriately. The rules cover arrival and dismissal procedures, how to print documents, keeping work areas clean, asking the teacher for help, and lining up to leave the lab in an orderly fashion. Students are expected to keep their hands on their own computers, help others with kind words instead of actions, and only visit approved websites while keeping personal information private.
Computer lab rules and procedures illustrated 2010Alice Mercer
The document outlines the rules and procedures for students using the computer lab at Oak Ridge Elementary School. It includes instructions such as being careful with equipment, keeping personal information private, helping other students, only visiting approved websites, doing one's best work, and participating appropriately in classroom activities like Think-Pair-Share and Whip Around. Calls like "Oak Ridge Call" are used to get students' attention and give directions.
The document outlines rules and consequences for computer lab behavior, including being respectful, using equipment properly, only printing with permission, keeping food and drink out of the lab, and following acceptable use policies. Infractions will result in warnings, timeouts, being sent to a buddy room, contacting parents, and potential office referrals or loss of computer privileges depending on the frequency and severity of violations.
Students are to line up quietly and wait to be assigned a computer. Food, drinks, touching screens or equipment is prohibited. Students should follow directions, work quietly and leave areas neat. Approved websites only, no email, chatting or sharing personal information. Raise your hand if you need help or to use the restroom. Enjoy learning and having fun in the computer lab.
The document provides rules for students to follow when using the Collier Computer Lab, including arriving quietly and sitting on the carpet in order, only moving to assigned computers when instructed. Students should have clean hands and not bring food or drinks into the lab. When using computers, students should be gentle with mice, headphones, and touch screens, and only print with permission. Students must also keep their work areas neat and clean, and not touch or obstruct the SMARTboard without permission.
Techniques, Tips & Tools for Managing a Computer LabChristopher Casal
A computer lab is the classroom that isn't. While many traditional classroom management techniques wil lwork in a compute rlab, many wont. In addition, the lab itself poses both physicla limitations as additional possibilities not possible in a traditional classroom.
This slide deck is from the SimpleK12.com webinar on 8/8/13 outlining classroom management techniques for a computer lab as well as technical tools for assisting in management.
Computer ethics deals with how computing professionals should make ethical decisions regarding online conduct. There are three main influences on ethical decisions related to computer technology: personal code, workplace code, and exposure to formal ethics codes. The foundations of computer ethics examine relativism, Kantianism, utilitarianism, and social contract theory. In 1950, Norbert Wiener published a foundational book on computer ethics and is considered the father of the field. The increase of computers and internet in the 1990s raised many new ethical issues, leading to a new ACM code of ethics in 1992. Privacy is a major ongoing issue in computer ethics as social networks and internet use have increased.
The document outlines the rules and procedures for Ms. Mercer's computer lab class at Oak Ridge Elementary School. It includes 7 rules for appropriate computer use, such as treating equipment with care, not sharing personal information online, and using respectful language. It also details procedures for arriving in class, working at computers, what to do if help is needed, and leaving at the end of class.
Here is a 3 sentence summary:
The document provides tips for effectively managing a classroom in a computer lab setting such as having backup plans, engaging students with interesting assignments, clearly explaining expectations for behavior and equipment use, monitoring students closely, and addressing any issues immediately. Teachers are advised to be prepared with alternate activities, enforce rules to prevent damage to equipment, and not allow students to distract or bully the teacher.
The document outlines 15 rules and regulations for using the computer lab, including that students must be authorized by a teacher to enter, should report any system problems to the teacher, are responsible for equipment and software, and should not attempt repairs, change computer settings, save work on computers, or bring food or drink into the lab. All users should record computer use and keep the lab clean and tidy.
This document summarizes a student project on a computer lab management system. The system was created to address issues with the existing manual lab management system. It allows both students and administrators to manage lab activities online. The system has modules for student and administrator functions. It uses Java and MySQL for the backend and HTML, CSS, and JavaScript for the frontend. Key features include secure login, viewing computer information, submitting assignments, and generating reports. The system aims to reduce paperwork and facilitate effective monitoring of student and staff activities in the computer lab.
This document provides guidelines for students using the computer lab, including arriving quietly, waiting at the workstations until instructed to start, keeping food and drinks out of the lab, being gentle with equipment, printing only with permission, leaving areas neat and clean, helping others verbally not by using their mouse, restricting computer use to just their own work, and following rules for approved websites and no emailing or chatting.
Legal, Ethical and Social Issues in TechnologyRachel Farnese
This document provides an overview of an interactive PowerPoint about legal, social, and ethical issues related to technology education. It discusses topics like social networking, acceptable use policies, cyberbullying, student data privacy, the digital divide, copyright, fair use, and Creative Commons licenses. The PowerPoint contains pictures and buttons that link to additional explanatory videos and navigate between topics.
Super billing computers are your future
Here at Super Billing we provide you the service and personalization of custom designed and per-designed computers to suit all budget ranges and accessibility and with the help of our knowledgeable staff giving you the opportunity to pick out and know exactly what you are buying.
Computer Ethics and Emerging Technologies:
Computer Ethics: Ethical considerations in computer usage, intellectual property rights, and plagiarism.
Emerging Technologies: Artificial Intelligence (AI), Internet of Things (IoT), Blockchain Technology.
This document discusses the topic of computer ethics. It begins with a brief history of computers and the internet. It then defines ethics and distinguishes between law and ethics. Computer ethics is presented as a unique branch of ethics that is constantly evolving as technology advances. Ten commandments of computer ethics are listed that prohibit using computers to harm others or steal. Reasons for needing computer ethics include addressing new legal issues from emerging technologies. Common computer ethics issues involve violating copyright and accessing personal information without permission.
This document discusses computer ethics and provides guidelines for ethical computer use. It defines computer ethics as applying classical ethical principles to computer technology use. Some key topics covered include privacy, intellectual property, accuracy of information, and the "10 Commandments of Computer Ethics." The 10 commandments establish rules against using computers to harm others, interfere, snoop, steal, lie, use unlicensed software, appropriate others' work without permission, and generally lack consideration and respect.
This document discusses computer ethics and security. It covers netiquette rules for email, chat rooms and online communications. Areas of computer ethics discussed include information accuracy, green computing, codes of conduct, information privacy, and intellectual property. Computer security risks are also examined, such as malicious code, unauthorized access, hardware/software theft, information theft, and system failure. Ways to mitigate these risks through measures like encryption, firewalls, access controls, and uninterruptible power supplies are described.
This document discusses computer ethics and security. It covers netiquette rules for email, chat rooms and online communications. Areas of computer ethics discussed include information accuracy, green computing, codes of conduct, information privacy, and intellectual property. Computer security risks are also examined, such as malicious code, unauthorized access, hardware/software theft, information theft, and system failure. Ways to mitigate these risks include encryption, access controls, firewalls, anti-virus software, and uninterruptible power supplies.
The document outlines guidelines and rules for using the school district's telecommunications network and internet access, which is meant to expand learning opportunities but also may contain unsuitable material. Students are given privileges to use the internet for educational purposes only, and inappropriate use could result in losing privileges or disciplinary action due to issues like privacy violations, viruses, or vandalism. Proper conduct and adherence to the user guidelines are important to maintain a safe and effective network environment.
This document contains information about a course on technology for teaching and learning. It includes:
- A course description that explores basic knowledge, skills and values in using technology for education, including ICT policies, media/tech in different subjects, learning theories, and designing lessons that use traditional and innovative technologies.
- Online classroom rules about self-directed learning, using social media appropriately, communicating with teachers, and meeting deadlines.
- Sections on technology ethics, ethical rules for tech use, and "10 Commandments of Technology Users" regarding harming others, stealing, respecting privacy and intellectual property.
- Guidelines for netiquette and appropriate online communication.
- ICT competency standards
This document discusses four main ethical issues related to cyberethics: privacy, property, accuracy, and access. It provides examples of how each can present challenges on the internet. Privacy is threatened as technology increases our data collection. Accuracy is difficult to determine online as information quality varies. Property issues arise around intellectual property rights for online content. Widespread access enables controversial issues to become more prominent online. The document also outlines elements of Malaysian cyber law and provides guidance on computer ethics for professionals and users.
This document discusses ethics and ethical issues in information systems. It covers emerging technologies, professional ethics, professional ethical standards, computer ethics, and the 10 commandments of computer ethics. Professional ethics codes govern how computing professionals deal with each other and third parties. Various organizations have produced ethics codes to provide behavioral guidelines. The seven areas of computer ethics discussed are unauthorized computer use, software theft, information accuracy, intellectual property rights, codes of conduct, information privacy, and green computing. The 10 commandments address topics like not using computers to harm people or steal, respecting others' work and files, not bearing false witness, and considering social consequences of one's work.
Computer ethics is a new branch of ethics that addresses how users should make decisions regarding their conduct on computers and the internet. It outlines 10 commandments for ethical computer use, such as not using computers to harm others or steal. Issues in computer ethics include privacy violations, plagiarism, hacking, and illegal downloading of copyrighted software and content. Ethics for computer users center around respecting others' privacy and property, not using computers for illegal activities, and being responsible with personal information and passwords.
Codes of ethics establish standards of conduct for professionals. They aim to balance responsibilities to individuals, society, and the profession. Several codes were presented, outlining ethical principles like serving public interests, maintaining integrity and competence, respecting privacy and intellectual property, and avoiding conflicts of interest or unlawful activities. Upholding codes helps enhance professions and build public trust.
The document provides guidelines for appropriate use of the school's telecommunications network and Internet access. It states that:
1. Internet access is being provided to support education and research.
2. Some materials online may not be suitable for students, so teacher monitoring will be used to prevent access to inappropriate content.
3. Unauthorized or illegal uses of the network will result in lost privileges or disciplinary action, including distributing private information, viruses, copyrighted content, and commercial activities.
4. Students are responsible for using the network properly and reporting any security issues.
The document provides guidelines and rules for using the school district's telecommunications network and internet access. It outlines acceptable and unacceptable uses of the network, security measures, and consequences for violating policies. The main goals of the school internet are to expand learning opportunities through resource sharing, accessing outside information and research, encouraging technological innovation, and worldwide communication. Strict rules are in place to protect students and the network, and inappropriate use may result in lost privileges or disciplinary action.
Computer ethics cyber security and technology of itsr24production
This document discusses several moral and legal issues related to computer ethics. It begins by noting that computers are involved in many aspects of modern life and often perform critical tasks, but the computer industry is not as highly regulated as other industries like medicine or transportation. It then outlines 10 principles or "commandments" of computer ethics related to issues like privacy, accuracy of information, intellectual property, and social impact of technology. The document also discusses concepts like ethics, ethical principles to consider when making decisions, and four primary issues in computer ethics around privacy, accuracy, property and access. It provides examples of problems that can arise with large databases and private networks, as well as laws related to privacy and intellectual property.
The document provides guidelines and rules for student use of the school district's telecommunications network and internet access. It outlines acceptable and unacceptable uses, security measures, and consequences for violating policies. The main goals of the network are to expand learning through resource sharing, accessing information, research, encouraging innovation, and worldwide communication. However, some internet content is unsuitable and use is a privilege contingent on following rules of conduct.
This document discusses computer ethics and provides 10 commandments for ethical computer use. It defines ethics as moral principles that govern behavior and computer ethics as moral principles regulating computer use. Some issues in computer ethics are intellectual property, privacy, and societal impacts of computers. The 10 commandments instruct users to not use computers to harm others, interfere with others' work, snoop in files, steal, bear false witness, use unpurchased software, use others' resources without authorization, take others' intellectual output, disregard social impacts of programs, and disrespect others in computer use.
This document discusses several key issues related to media, information, and intellectual property:
- It defines intellectual property and the main types: copyright, patents, trademarks, industrial design, and geographical indications.
- It outlines relevant Philippine laws around intellectual property protection.
- It discusses concepts like fair use, Creative Commons licensing, and public domain in relation to copyrighted works.
- It identifies several digital issues in the Philippines like cyberbullying, computer addiction, digital divide, and data privacy concerns.
- It provides guidance on how to promote positive digital behavior and combat issues through practices like following netiquette rules and preventing excessive computer use.
Digital citizenship refers to the norms of appropriate technology use. It encompasses areas like etiquette, communication, education, access, commerce, responsibility, rights, safety, and security. Developing digital citizenship involves auditing current technology use, understanding issues, identifying needs, creating a curriculum or program, and revisiting efforts on an ongoing basis. Effective implementation also requires educating staff through professional development before teaching students.
Chapter 4_Information, Control, and Privacy.pptxnorwinadriatico
This document discusses computer ethics and cybercrime laws. It defines computer/technology ethics as addressing ethical issues in information technology use, design, and management. It provides examples of ethical dilemmas related to technology use in work and educational settings. It also summarizes key provisions of the Philippines' Cybercrime Prevention Act of 2012, including offenses against computer data/systems, computer-related offenses like forgery and fraud, and content-related offenses like cybersex and child pornography.
Rangkaian pelajaran tahunan pendidikan jasmani tingkatan 2 tahun 2017 memberikan ringkasan mengenai kemahiran dan komponen kecergasan yang akan dipelajari selama setahun. Terdiri daripada 17 minggu pembelajaran yang meliputi aktiviti kecergasan, permainan, dan kemahiran olahraga seperti bola baling, badminton, dan merejam lembing.
Dokumen tersebut berisi soalan-soalan untuk ujian yang mencakupi berbagai topik seperti gizi, olahraga, dan hak serta tanggung jawab konsumen. Soalan-soalannya meminta peserta untuk mengisi kolom kosong, menandai pernyataan yang benar dan salah, menyusun huruf-huruf menjadi kata, serta menghubungkan aktivitas olahraga dengan otot-otot tertentu.
This document is a module on introducing the internet for secondary school students. It defines the internet as the world's largest computer network connecting millions of computers globally. It then lists some common uses of the internet like communication, accessing information, shopping, banking, entertainment and more. The module also outlines the advantages of the internet such as access to vast information and ease of use, as well as disadvantages like information overload and need for quality control. Finally, it describes the basic hardware requirements to access the internet including a network interface card, internet access account, modem, router, switch and wireless access point.
This document provides instructions for students on using email. It includes 10 activities that teach students how to:
1. Register for a Yahoo email account
2. Send and receive emails, including attaching files
3. Reply to emails and download attachments
4. Delete emails and save draft emails
5. Sign out of their email account
The overall aim is for students to be able to create an email account and communicate using emails at the end of completing this module.
This document discusses cyber law and its importance. It provides an overview of some key cyber laws passed in Malaysia, including the Digital Signature Act of 1997, Computer Crimes Act of 1997, Telemedicine Act of 1997, and Communications and Multimedia Act of 1998. These laws aim to regulate digital signatures, computer crimes, telemedicine practices, and communications/telecommunications. The document also lists some common forms of cyber abuse and explains that cyber laws are needed to protect privacy, security, and intellectual property online as well as the legal status of e-transactions. At the end, students are instructed to write a short essay on the need for cyber law.
This document is from the Ministry of Education Malaysia and contains an ICT literacy module on computer hardware and the evolution and types of computers. The module contains 5 activities: 1) explaining the evolution of computer generations from vacuum tubes to integrated circuits, 2) matching processor types to generations, 3) introducing types of computers like supercomputers, mainframes, and microcomputers, 4) labeling a diagram of computer types, and 5) researching computer types. The module aims to teach students about the progression of computer technology over generations and the different categories of computers.
This document contains 20 math and geometry problems for students to solve. It includes questions about geometric solids, time conversions, calculating areas and volumes, fractions, symmetry, and more. Students are asked to show their work and provide numerical answers for multi-step calculations and geometry diagrams. The document is written in both English and Malay and aims to test a variety of math and problem solving skills.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
Ethics in using computer
1. KEMENTERIAN PELAJARAN MALAYSIA
Self Access Learning Module
IICCT LLiitteerraccyy fforr
SSeeccondarryy SScchooll
Prrogrrammee
Ethics In Using
Computer
CURRICULUM DEVELOPMENT DIVISION
MINISTRY OF EDUCATION MALAYSIA
2. ICTL For Secondary School – Computer Lab Manegement
MODULE 1
Ethics In Using
Computer
Curriculum Development Division
Ministry of Education Malaysia
1
3. ICTL For Secondary School – Computer Lab Manegement
1. Name of Module : Ethics in using computer
2. Learning Outcomes: The students should be able to:
a. state the ethics of computer usage
b. define the meaning of copyright.
c. state the effects of copyright violation.
d. list at least 3 unethical use of computers
e. state the effects of unethical use of computers
f. define the meaning of plagiarism
g. state the effects of plagiarism
2
3. Knowledge and Skills
1. Explaining the ethics of computer usage
4. Module Summary: At the end of the module, students should be able to explain
the ethics of computer usage, and give their opinions on copyright and plagiarism.
Activity 1 : Notes on Ethics in using computers
Activity 2 : Exercises on Ethics and Copyright
Activity 3 : Notes on Plagiarism
Activity 4 : Exercises on Plagiarism
.
4. ICTL For Secondary School – Computer Lab Manegement
3
Activity 1
3. Ethics in using computer
Have you ever asked for permission to download materials from the internet such as
music, articles, graphic and other material. If you have, you are following the computer
code of conducts. There are many web sites with restriction where the public is allowed
to use their material. Users may have to pay royalty (fee) to the owner or quote the
website in their assignment or project, in order to be able to use this material.
Examples of ethical computer code of conducts include:
• sending warning about viruses to other computer users
• asking permission before sending any business advertisements to others
• using information with authorization
Ethics in general
1. We often see pirated CDs, software and VCD being sold at the night market. Buying
pirated software is an example of unethical activity in computer ethic.
2. A guideline is needed to stop the current technology products from being exploited
for example copying originals CDs and selling them as pirated software, this
unethical behavior can be controlled by the code of conducts.
3. Under the Malaysia Copyright act 1987, any individual charge with piracy will be fine
up to 10,000 for each copy or up to 5 years imprisonment or both.
4. Computer ethics is a system of moral standards or values used as a guideline for
computer users.
5. ICTL For Secondary School – Computer Lab Manegement
Ten important instructions of computer ethics
The United States Institute of Computer Ethics has come out with 10 instructions of
Computer Ethics as follows:
a. You shall not use a computer to harm other people.
b. You shall not interfere with other people’s computer work.
c. You shall not use a computer to steal
d. You shall not copy or use software for which you have not paid illegally.
e. You shall not use other people’s computer resources without
permission or proper compensation.
f. You shall not look around in other people’s computer files.
g. You shall not use a computer to give false identity.
h. You shall not correct other people’s ideas or works.
i. You shall think about the social effects of the program you
are writing or the system you are designing.
j. You shall always use a computer in ways that ensure consideration
and respect for your fellow friends.
4
7. ICTL For Secondary School – Computer Lab Manegement
Copyright violation (Breaking of copyright law)
A person who does not own the copyright, and without license from the owner or
does not have permission in any of the following acts has broken the copyright law.
• Use resources only for academic assignments and official education and research
and not reproduced in any material form to the public.
• Resources are not to be used for business purposes or private gain.
• Changing of system settings is not allowed.
• Respect and abide by all copyright laws.
• Downloading, installation, or removal of software or hardware is not allowed.
• E-mail messages should be brief, occasional and should indicate the sender’s true
6
identity.
• Send no obscene or harassing messages in any format in violation of any
applicable law.
• Respect the rights and property of others by not accessing other members’ data.
• No one should purposely attempt to weaken the system security or disturb the
system performance through “hacking” .
8. ICTL For Secondary School – Computer Lab Manegement
7
3.2 Unethical use of computers
1. Have you copied materials from the internet and claims that it is your own and submit
them as an assignment? If you have, you are reaching the computer code of
conducts (manners). In other word, you are breaking the law of intellectual property
by stealing someone else’s idea. Intellectual property refers to any products of
human intellect that is unique and has a value in the market place. This covers ideas,
inventions, unique names, computer program codes and many more.
2. Examples of unethical computer code of conducts include:
a) modifying certain information on the internet, affecting the accuracy of the
information
b) selling information to other parties without the owner’s permission
c) using information without permission.
d) involvement in stealing software
e) invasion of privacy
3. With the advancement of ICT, it is easy for anyone to get back your information from
the Internet. You may not realize that when you fill a form on the Internet, your
information may be exposed and stolen.
4. Hacking is unethical. For example, Kevin David Mitnick was a famous hacker. He
accessed computers without authorization. He deprived the privacy of many
individuals by hacking into network of a few companies. He also managed to get
important data unethically for his own usage.
9. ICTL For Secondary School – Computer Lab Manegement
8
Activity 2
Exercise 1
Instruction : Answer the questions below.
Questions:
1. What is the meaning of computer ethics ?
2. State the 10 instructions in computer ethics ?
Exercise 2
Instructions: Read the statements below then put a tick (√) in the relevant boxes. Number 1
has been done for you.
Number Statement
Ethical Unethical
1
Use a computer to steal information √
2
Use other people’s computer resources
with authorization
3
Use software for which you have not paid.
4
Interfere with other people’s computer work.
5
Do not use a computer to bear false
witness.
10. ICTL For Secondary School – Computer Lab Manegement
Exercise 3
Instructions : 1. Work in pair or in a group of four.
2. Read the scenario carefully.
3. Answer the question given.
4. Discuss your answer with your partner or in your group.
9
Scenario A
SCENARIO A: A student prepares and gives a presentation that displays photographs.
Permission was not obtained to use the photographs.
QUESTION : Can the photographs be included in the initial presentation, if it is in a
traditional classroom?
Scenario B
SCENARIO B: A student creates a presentation and include copyrighted music into the
background. Assume that permission was not obtained to use the music
for the presentation
QUESTION: Can the music be included in the teacher's or student's initial presentation?
Scenario C
SCENARIO C : Your friend just bought a copy of Microsoft Office 2007 CD and says it's
the best graphic editor he has ever used. You find out it costs about RM930
and decide it's too expensive for you to buy. Your friend lends you his
Microsoft Office 2007 CD and tells you to go ahead and install it on your
computer.
QUESTION : Is this against copyright rules?
Further Reading
If you have internet access, you may login to the URL given below to test how much you
know about ethics in using computer.
http://www.cyberbee.com/cb_copyright.swf
http://www.thecopyrightsite.org/scenarios/
(This website is available at the time of doing this module)
Activity 3
Answer
Answer
Answer
11. ICTL For Secondary School – Computer Lab Manegement
10
Plagiarism
Plagiarism is copying or paraphrasing information from a source without giving credit to the
owner. Using images, audio, or video without permission or without giving credit is also
plagiarism. Plagiarism is easier today because of the presence of the Internet and the easy
availability of information.
Written permission must be obtained from the owner if you plan to use these files on a web
page. It is permissible to produce a publication or multimedia presentation for classroom,
educational or non-profit purposes as long as credit is given in a bibliography.
Effects of plagiarism
Plagiarism is a serious academic offence for students. Any use of another person’s work or
ideas must be acknowledged. If you fail to do this, you may fail in the examination or your
name maybe removed from the pass list.
How to avoid Plagiarism
1. Take good notes. Write down the title, the name of the source, the author, the
page number(s), and the date for any language you copy or adapt and for each
piece of information you record.
2. Put quotation marks around any language you reproduce directly from the
source.
3. Put away your source before you begin to write. Read your source, and then write
from your memory. After you write, you can recheck your paraphrase or summary
against the original for accuracy.
12. ICTL For Secondary School – Computer Lab Manegement
11
Activity 4
Exercise 3
1. What is Plagiarism?
________________________________________________________________
______________________________________________________
2. List out two points to avoid Plagiarism.
________________________________________________________________
______________________________________________________
Exercise 4
Instruction : Read the situation given and answer the question that follows.
Situation
Three students from University Malaya referred to McShane and Travaglione’s book for their
work. Which student ( A, B or C ) would you count as plagiarism?
Original Text
McShane, S. L. and Travaglione, T. 2003. Organizational behaviour in the Pacific Rim.
Sydney: McGraw Hill.
Work motivation and performance increase when employees feel personally accountable for
the outcomes of their efforts (McShane and Travaglione, 2003, p.199).
Student A wrote:
“Work motivation and performance increase when employees feel personally accountable for
the outcomes of their efforts”. (2003,p.199)
Verdict : ______________________________________________
Reason (s) : ______________________________________________
Answer
Student B wrote:
When employees feel responsible for their work, they tend to be more motivated which
results in higher performances
Verdict : ______________________________________________
Reason (s) : ______________________________________________
Answer
Student C wrote:
McShane and Travaglione (2001, p.199) state that ‘when employees feel responsible for
their work, they tend to be more motivated which results in higher performances’.
Verdict : ______________________________________________
Reason (s) : ______________________________________________
Answer
13. ICTL For Secondary School – Computer Lab Manegement
12
Further Reading
If you have internet access, login to the URL given below to test how much you know
about plagiarism.
http://amow.boardofstudies.nsw.edu.au/downloads/mods_quiz.pdf.html
(This website is available at the time of doing this module)