SlideShare a Scribd company logo
Lesson 48: Qualifying the Information
    • checking information for accuracy, authenticity, or
      objectivity
    • using computers in work, home, and school environments
    • understanding what copyright is and how it works online
    • recognizing what may be inappropriate behaviors when
      online
    • understanding how computers have changed from
      traditional practices
    • identifying how technologies have helped people with
      disabilities


© CCI Learning Solutions Inc.                                   1
Evaluating the Information
    • Web sites of well-known organizations usually present
      accurate information as their reputation is at stake
    • Do “comparison shopping”
    • Look for obvious errors in facts, statistics, grammar, spelling,
      or language use
    • How current Web site is provides another indication of effort in
      construction, and quality of information
    • If page offers facts and statistics, determine accuracy by
      checking author’s and publisher’s qualifications
    • Check About Us, Mission, Philosophy, Corporate Profile, and
      Background sections of Web site
    • Use URL as guide to whether Web site affiliated with known
      organization
© CCI Learning Solutions Inc.                                            2
Evaluating the Information
    • Presence or absence of source references can help assess
      authenticity of material
    • Authors need no qualifications to contribute to wikis or blogs
    • Look for depth of coverage, supported by other types of information
    • Information may be accurate information but could be biased
    • Check tone of message
    • How much advertising exists and are ads independent of content or
      selling similar or complementary products or services
    • Site with good ranking in many search engines indicates effort
      invested in design of Web site
    • Check if author or publisher can be contacted for verification



© CCI Learning Solutions Inc.                                               3
Identifying Ethical Issues
    • Information on Internet subject to same copyright rules as other
      media
    • Copyright refers to protection of any material, published or
      unpublished, created by individual or organization
    • Can only use material if creator grants right to use it
    • Fair Use
          – Can use portions of copyrighted information for purpose of criticism or
            comment without seeking permission
    • Trademark is like copyright except that it applies to name, symbol,
      design, or image
    • To use information from Web site:
          – Send e-mail asking for permission to use information and describe how
            intend to use
          – Quote information accurately and give owners credit
© CCI Learning Solutions Inc.                                                         4
Identifying Ethical Issues
    • Plagiarism occurs when you use information created by
      another person and present it as your own
          – When using information from Internet, always use in its original
            form and cite source material
    • Libel is when you make untrue statement in writing that
      “defames” another person’s character or reputation
          – Slander occurs when defamatory remark is spoken
          – Do not start, do not listen, and do not respond




© CCI Learning Solutions Inc.                                                  5
Identifying Ethical Issues
    • You are responsible and accountable for your actions
      online:
          – Pranks can be hurtful and should be avoided
          – Bullying is not acceptable in real life or online
          – Do not share personal information about someone else with
            others, even if you know all parties involved well
          – Do not ridicule or dismiss opinions of others
          – Provide facts and sources to support information
    • Do unto others as you would have them do unto you!




© CCI Learning Solutions Inc.                                           6
Impacting Society
    • Businesses use Internet to enable direct communications with
      vendors, suppliers, and customers
    • Can easily research and collect information online, organize for
      review or evaluation, and communicate using e-mail, post it on
      intranet or extranet, or display on dedicated page of Web site
    • Use e-mail through chat rooms, blogs, and social networking sites to
      make friends and share opinions with one or more people globally
    • Online public services to share resources previously would have
      required expertise from someone to help
    • Web conferencing programs significantly increase possibilities for
      people to collaborate on work projects
    • Many pieces of equipment have computers or sensors built into them
    • Automated production lines using robotic technology, with robots
      controlled by computers
© CCI Learning Solutions Inc.                                                7
Impacting Society
    • Air traffic control is computer-based, as is international booking
      system and Global Positioning System (GPS)
    • Retail transactions handled by point-of-sale systems that enable
      payments or adjustments with credit card, debit card, or cash
    • Do online banking transactions through financial institution’s Web site
          – ATMs connect directly to global network of financial institutions to tap
            into your account from any location globally, and withdraw funds in local
            currency
    • Online courses use Web technology to enrich learning environments
      with multimedia techniques or interactive simulations of real-world
      problems in safety of virtual settings
    • Administrative component tracks students’ progress or performance
    • Interactive games enable people to play against each other globally
    • Fun educational games teach everything from spelling to
      mathematics
© CCI Learning Solutions Inc.                                                           8
Impacting Society
    • Telecommuting or working at home while communicating with office
    • Reporting systems use computerized data to help predict, forecast,
      or capture latest information
    • Home inspectors use specialized software and touch-screen
      technology to enter information about house being inspected
    • Forms and documents converted to electronic formats for
      downloading
    • Online communities involve individuals globally to collaborate on
      common interests
    • Improved quality of life of many people with disabilities
    • Internet or Web cafés offer public Internet access
    • Biometric authentication devices identify you before allowing logon
    • Disaster recovery plans protect data on servers and have networks
      up and running again quickly after disaster
© CCI Learning Solutions Inc.                                               9
Review Questions
  1. Fair use is the doctrine that permits you to use portions of
     copyrighted information for the purpose of criticism or
     comments without seeking permission.
          a. True               b. False
  2. Plagiarism occurs when someone copies text from a Web site
     and then does what?
          a. Pastes the information into a marketing document
          b. Claims they wrote the text
          c. Changes the words a bit and then claims it as original
             works
          d. Any of the above
          e        b or c
© CCI Learning Solutions Inc.                                         10
Review Questions
  3. How can you check the authenticity of information provided on a
     Web site?
          a. Check who the author is.
          b. Check who the publisher is.
          c. Check for links to other sites about the author, publisher,
             or company.
          d. Check for any affiliations associated with this Web site.
          e. Contact the author or publisher directly.
          f.       Any of the above




© CCI Learning Solutions Inc.                                              11
Review Questions
  4.      How have computers made an impact in education?
          a. Courses can be taken online instead of at the school.
          b. Technology allows students to communicate with each other online
             instead of in person.
          c. Critical thinking can be promoted as it gives students a chance to solve
             real world issues.
          d. Any of the above
  5.      How have computers been beneficial to people with disabilities?
          a. A person with disabilities can communicate with anyone in the world
             using a variety of tools.
          b. Devices can be incorporated into equipment which respond to a verbal
             prompt.
          c. Services can be free.
          d. Any of the above
          e. a or b

© CCI Learning Solutions Inc.                                                       12

More Related Content

What's hot

Cyber citizenship imen tekaya
Cyber citizenship imen tekayaCyber citizenship imen tekaya
Cyber citizenship imen tekaya
imen Tekaya Bouaziz
 
IT Security in a Scientific Research Environment
IT Security in a Scientific Research EnvironmentIT Security in a Scientific Research Environment
IT Security in a Scientific Research Environment
Nicholas Davis
 
Digital citizenship lesson 1
Digital citizenship lesson 1Digital citizenship lesson 1
Digital citizenship lesson 1
jpanotes
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
JannahAboulhassan
 
Digital Citizenship & Media Literacy
Digital Citizenship & Media LiteracyDigital Citizenship & Media Literacy
Digital Citizenship & Media Literacy
Alec Couros
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
Anirudhya Reevu
 
MKT231 Week 4
MKT231 Week 4MKT231 Week 4
MKT231 Week 4
Michael McDermott
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
trautweiler
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
egschool
 
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Shauna_Cox
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
Michael Zimmer
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
Johan Koren
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentation
Sarah Sell
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
Priscila Velázquez
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Paul Berryman
 
Social Networking - An Ethical Hacker's View
Social Networking - An Ethical Hacker's ViewSocial Networking - An Ethical Hacker's View
Social Networking - An Ethical Hacker's View
Peter Wood
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
Academic Research Paper Writing Services
 
The Road to Copyright Clarity
The Road to Copyright ClarityThe Road to Copyright Clarity
The Road to Copyright Clarity
Renee Hobbs
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 version
Johan Koren
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
Educational Collaborators
 

What's hot (20)

Cyber citizenship imen tekaya
Cyber citizenship imen tekayaCyber citizenship imen tekaya
Cyber citizenship imen tekaya
 
IT Security in a Scientific Research Environment
IT Security in a Scientific Research EnvironmentIT Security in a Scientific Research Environment
IT Security in a Scientific Research Environment
 
Digital citizenship lesson 1
Digital citizenship lesson 1Digital citizenship lesson 1
Digital citizenship lesson 1
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
 
Digital Citizenship & Media Literacy
Digital Citizenship & Media LiteracyDigital Citizenship & Media Literacy
Digital Citizenship & Media Literacy
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
MKT231 Week 4
MKT231 Week 4MKT231 Week 4
MKT231 Week 4
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentation
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Social Networking - An Ethical Hacker's View
Social Networking - An Ethical Hacker's ViewSocial Networking - An Ethical Hacker's View
Social Networking - An Ethical Hacker's View
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
The Road to Copyright Clarity
The Road to Copyright ClarityThe Road to Copyright Clarity
The Road to Copyright Clarity
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 version
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 

Viewers also liked

Ordenagailuak(amets molinero)
Ordenagailuak(amets molinero)Ordenagailuak(amets molinero)
Ordenagailuak(amets molinero)ametsmm
 
L44 slides
L44 slidesL44 slides
L44 slides
sgibson28
 
Рубцов Николай Михайлович
Рубцов  Николай МихайловичРубцов  Николай Михайлович
Рубцов Николай Михайлович
TatynaO
 
School technology school_interview word
School technology school_interview wordSchool technology school_interview word
School technology school_interview word
laurengilbert34
 
L45 slides
L45 slidesL45 slides
L45 slides
sgibson28
 
Preliminary Story board
Preliminary Story boardPreliminary Story board
Preliminary Story board
1davidjordan1
 
Designs by dawn brochure 5 15-2013
Designs by dawn brochure 5 15-2013Designs by dawn brochure 5 15-2013
Designs by dawn brochure 5 15-2013
Dawn Miller
 
L49 slides
L49 slidesL49 slides
L49 slides
sgibson28
 
Цветут сады в Молдове
Цветут сады в МолдовеЦветут сады в Молдове
Цветут сады в Молдове
Lilia Pașa
 
Как просыпается весна в Молдове
Как просыпается весна в МолдовеКак просыпается весна в Молдове
Как просыпается весна в Молдове
Lilia Pașa
 
L46 slides
L46 slidesL46 slides
L46 slides
sgibson28
 
L47 slides
L47 slidesL47 slides
L47 slides
sgibson28
 
Cherepovets
CherepovetsCherepovets
Cherepovets
TatynaO
 
конкурс ереповец
конкурс ереповец конкурс ереповец
конкурс ереповец
TatynaO
 
When and How to Use Animation: From Concept to Execution
When and How to Use Animation: From Concept to Execution When and How to Use Animation: From Concept to Execution
When and How to Use Animation: From Concept to Execution
Margarita Iosif
 
L43 slides
L43 slidesL43 slides
L43 slides
sgibson28
 
L42 slides
L42 slidesL42 slides
L42 slides
sgibson28
 

Viewers also liked (17)

Ordenagailuak(amets molinero)
Ordenagailuak(amets molinero)Ordenagailuak(amets molinero)
Ordenagailuak(amets molinero)
 
L44 slides
L44 slidesL44 slides
L44 slides
 
Рубцов Николай Михайлович
Рубцов  Николай МихайловичРубцов  Николай Михайлович
Рубцов Николай Михайлович
 
School technology school_interview word
School technology school_interview wordSchool technology school_interview word
School technology school_interview word
 
L45 slides
L45 slidesL45 slides
L45 slides
 
Preliminary Story board
Preliminary Story boardPreliminary Story board
Preliminary Story board
 
Designs by dawn brochure 5 15-2013
Designs by dawn brochure 5 15-2013Designs by dawn brochure 5 15-2013
Designs by dawn brochure 5 15-2013
 
L49 slides
L49 slidesL49 slides
L49 slides
 
Цветут сады в Молдове
Цветут сады в МолдовеЦветут сады в Молдове
Цветут сады в Молдове
 
Как просыпается весна в Молдове
Как просыпается весна в МолдовеКак просыпается весна в Молдове
Как просыпается весна в Молдове
 
L46 slides
L46 slidesL46 slides
L46 slides
 
L47 slides
L47 slidesL47 slides
L47 slides
 
Cherepovets
CherepovetsCherepovets
Cherepovets
 
конкурс ереповец
конкурс ереповец конкурс ереповец
конкурс ереповец
 
When and How to Use Animation: From Concept to Execution
When and How to Use Animation: From Concept to Execution When and How to Use Animation: From Concept to Execution
When and How to Use Animation: From Concept to Execution
 
L43 slides
L43 slidesL43 slides
L43 slides
 
L42 slides
L42 slidesL42 slides
L42 slides
 

Similar to L48 slides

Law 483 cyberethics
Law 483 cyberethicsLaw 483 cyberethics
Law 483 cyberethics
Ammar Iyyad B. Amran
 
Chesapeake Bay Forum - Using Social Media
Chesapeake Bay Forum - Using Social MediaChesapeake Bay Forum - Using Social Media
Chesapeake Bay Forum - Using Social Media
skippermj
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
Katie Ward
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activity
guest09fcd1
 
Social Networking Methods And Strategies For Sharing
Social Networking Methods And Strategies For SharingSocial Networking Methods And Strategies For Sharing
Social Networking Methods And Strategies For Sharing
guest25967d
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012
curlistl
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell You
Denim Group
 
Social media in organizations
Social media in organizationsSocial media in organizations
Social media in organizations
HtetThuzar
 
Web 2.0 and Social Network for Enterprise
Web 2.0 and Social Network for EnterpriseWeb 2.0 and Social Network for Enterprise
Web 2.0 and Social Network for Enterprise
Goutama Bachtiar
 
Stankiewicz Bill Social Media Mktg09 6 2 09
Stankiewicz Bill Social Media Mktg09 6 2 09Stankiewicz Bill Social Media Mktg09 6 2 09
Stankiewicz Bill Social Media Mktg09 6 2 09
BillStankiewicz
 
2013: The Connected Workplace
2013: The Connected Workplace2013: The Connected Workplace
2013: The Connected Workplace
mkeane
 
Data Driven Marketing Strategy Webinar by Beacon Technologies with Hannon Hill
Data Driven Marketing Strategy Webinar by Beacon Technologies with Hannon HillData Driven Marketing Strategy Webinar by Beacon Technologies with Hannon Hill
Data Driven Marketing Strategy Webinar by Beacon Technologies with Hannon Hill
hannonhill
 
Making social and digital media work for you
Making social and digital media work for youMaking social and digital media work for you
Making social and digital media work for you
Lawrie Phipps
 
Online Reputation Management: - Techniques and Tactics
Online Reputation Management: - Techniques and TacticsOnline Reputation Management: - Techniques and Tactics
Online Reputation Management: - Techniques and Tactics
Omar Ha-Redeye
 
Online Communities: How to encourage involvement
Online Communities: How to encourage involvementOnline Communities: How to encourage involvement
Online Communities: How to encourage involvement
Tiffany St James
 
Skillteam workshop social media final v1.0 05.10.2011
Skillteam workshop social media final v1.0 05.10.2011Skillteam workshop social media final v1.0 05.10.2011
Skillteam workshop social media final v1.0 05.10.2011
Fishtank
 
Cutting through the Noise- Simplifying & Socializing
Cutting through the Noise- Simplifying & Socializing Cutting through the Noise- Simplifying & Socializing
Cutting through the Noise- Simplifying & Socializing
Alison Engelsman
 
Global KM - Pitfalls.pptx
Global KM - Pitfalls.pptxGlobal KM - Pitfalls.pptx
Global KM - Pitfalls.pptx
Yogesh Daudkhane
 
Internet Session 1.pptx
Internet Session 1.pptxInternet Session 1.pptx
Internet Session 1.pptx
aytenewbelay1
 
Five Things to Know in 2009
Five Things to Know in 2009Five Things to Know in 2009
Five Things to Know in 2009
Dennis O'Neil
 

Similar to L48 slides (20)

Law 483 cyberethics
Law 483 cyberethicsLaw 483 cyberethics
Law 483 cyberethics
 
Chesapeake Bay Forum - Using Social Media
Chesapeake Bay Forum - Using Social MediaChesapeake Bay Forum - Using Social Media
Chesapeake Bay Forum - Using Social Media
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activity
 
Social Networking Methods And Strategies For Sharing
Social Networking Methods And Strategies For SharingSocial Networking Methods And Strategies For Sharing
Social Networking Methods And Strategies For Sharing
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell You
 
Social media in organizations
Social media in organizationsSocial media in organizations
Social media in organizations
 
Web 2.0 and Social Network for Enterprise
Web 2.0 and Social Network for EnterpriseWeb 2.0 and Social Network for Enterprise
Web 2.0 and Social Network for Enterprise
 
Stankiewicz Bill Social Media Mktg09 6 2 09
Stankiewicz Bill Social Media Mktg09 6 2 09Stankiewicz Bill Social Media Mktg09 6 2 09
Stankiewicz Bill Social Media Mktg09 6 2 09
 
2013: The Connected Workplace
2013: The Connected Workplace2013: The Connected Workplace
2013: The Connected Workplace
 
Data Driven Marketing Strategy Webinar by Beacon Technologies with Hannon Hill
Data Driven Marketing Strategy Webinar by Beacon Technologies with Hannon HillData Driven Marketing Strategy Webinar by Beacon Technologies with Hannon Hill
Data Driven Marketing Strategy Webinar by Beacon Technologies with Hannon Hill
 
Making social and digital media work for you
Making social and digital media work for youMaking social and digital media work for you
Making social and digital media work for you
 
Online Reputation Management: - Techniques and Tactics
Online Reputation Management: - Techniques and TacticsOnline Reputation Management: - Techniques and Tactics
Online Reputation Management: - Techniques and Tactics
 
Online Communities: How to encourage involvement
Online Communities: How to encourage involvementOnline Communities: How to encourage involvement
Online Communities: How to encourage involvement
 
Skillteam workshop social media final v1.0 05.10.2011
Skillteam workshop social media final v1.0 05.10.2011Skillteam workshop social media final v1.0 05.10.2011
Skillteam workshop social media final v1.0 05.10.2011
 
Cutting through the Noise- Simplifying & Socializing
Cutting through the Noise- Simplifying & Socializing Cutting through the Noise- Simplifying & Socializing
Cutting through the Noise- Simplifying & Socializing
 
Global KM - Pitfalls.pptx
Global KM - Pitfalls.pptxGlobal KM - Pitfalls.pptx
Global KM - Pitfalls.pptx
 
Internet Session 1.pptx
Internet Session 1.pptxInternet Session 1.pptx
Internet Session 1.pptx
 
Five Things to Know in 2009
Five Things to Know in 2009Five Things to Know in 2009
Five Things to Know in 2009
 

L48 slides

  • 1. Lesson 48: Qualifying the Information • checking information for accuracy, authenticity, or objectivity • using computers in work, home, and school environments • understanding what copyright is and how it works online • recognizing what may be inappropriate behaviors when online • understanding how computers have changed from traditional practices • identifying how technologies have helped people with disabilities © CCI Learning Solutions Inc. 1
  • 2. Evaluating the Information • Web sites of well-known organizations usually present accurate information as their reputation is at stake • Do “comparison shopping” • Look for obvious errors in facts, statistics, grammar, spelling, or language use • How current Web site is provides another indication of effort in construction, and quality of information • If page offers facts and statistics, determine accuracy by checking author’s and publisher’s qualifications • Check About Us, Mission, Philosophy, Corporate Profile, and Background sections of Web site • Use URL as guide to whether Web site affiliated with known organization © CCI Learning Solutions Inc. 2
  • 3. Evaluating the Information • Presence or absence of source references can help assess authenticity of material • Authors need no qualifications to contribute to wikis or blogs • Look for depth of coverage, supported by other types of information • Information may be accurate information but could be biased • Check tone of message • How much advertising exists and are ads independent of content or selling similar or complementary products or services • Site with good ranking in many search engines indicates effort invested in design of Web site • Check if author or publisher can be contacted for verification © CCI Learning Solutions Inc. 3
  • 4. Identifying Ethical Issues • Information on Internet subject to same copyright rules as other media • Copyright refers to protection of any material, published or unpublished, created by individual or organization • Can only use material if creator grants right to use it • Fair Use – Can use portions of copyrighted information for purpose of criticism or comment without seeking permission • Trademark is like copyright except that it applies to name, symbol, design, or image • To use information from Web site: – Send e-mail asking for permission to use information and describe how intend to use – Quote information accurately and give owners credit © CCI Learning Solutions Inc. 4
  • 5. Identifying Ethical Issues • Plagiarism occurs when you use information created by another person and present it as your own – When using information from Internet, always use in its original form and cite source material • Libel is when you make untrue statement in writing that “defames” another person’s character or reputation – Slander occurs when defamatory remark is spoken – Do not start, do not listen, and do not respond © CCI Learning Solutions Inc. 5
  • 6. Identifying Ethical Issues • You are responsible and accountable for your actions online: – Pranks can be hurtful and should be avoided – Bullying is not acceptable in real life or online – Do not share personal information about someone else with others, even if you know all parties involved well – Do not ridicule or dismiss opinions of others – Provide facts and sources to support information • Do unto others as you would have them do unto you! © CCI Learning Solutions Inc. 6
  • 7. Impacting Society • Businesses use Internet to enable direct communications with vendors, suppliers, and customers • Can easily research and collect information online, organize for review or evaluation, and communicate using e-mail, post it on intranet or extranet, or display on dedicated page of Web site • Use e-mail through chat rooms, blogs, and social networking sites to make friends and share opinions with one or more people globally • Online public services to share resources previously would have required expertise from someone to help • Web conferencing programs significantly increase possibilities for people to collaborate on work projects • Many pieces of equipment have computers or sensors built into them • Automated production lines using robotic technology, with robots controlled by computers © CCI Learning Solutions Inc. 7
  • 8. Impacting Society • Air traffic control is computer-based, as is international booking system and Global Positioning System (GPS) • Retail transactions handled by point-of-sale systems that enable payments or adjustments with credit card, debit card, or cash • Do online banking transactions through financial institution’s Web site – ATMs connect directly to global network of financial institutions to tap into your account from any location globally, and withdraw funds in local currency • Online courses use Web technology to enrich learning environments with multimedia techniques or interactive simulations of real-world problems in safety of virtual settings • Administrative component tracks students’ progress or performance • Interactive games enable people to play against each other globally • Fun educational games teach everything from spelling to mathematics © CCI Learning Solutions Inc. 8
  • 9. Impacting Society • Telecommuting or working at home while communicating with office • Reporting systems use computerized data to help predict, forecast, or capture latest information • Home inspectors use specialized software and touch-screen technology to enter information about house being inspected • Forms and documents converted to electronic formats for downloading • Online communities involve individuals globally to collaborate on common interests • Improved quality of life of many people with disabilities • Internet or Web cafés offer public Internet access • Biometric authentication devices identify you before allowing logon • Disaster recovery plans protect data on servers and have networks up and running again quickly after disaster © CCI Learning Solutions Inc. 9
  • 10. Review Questions 1. Fair use is the doctrine that permits you to use portions of copyrighted information for the purpose of criticism or comments without seeking permission. a. True b. False 2. Plagiarism occurs when someone copies text from a Web site and then does what? a. Pastes the information into a marketing document b. Claims they wrote the text c. Changes the words a bit and then claims it as original works d. Any of the above e b or c © CCI Learning Solutions Inc. 10
  • 11. Review Questions 3. How can you check the authenticity of information provided on a Web site? a. Check who the author is. b. Check who the publisher is. c. Check for links to other sites about the author, publisher, or company. d. Check for any affiliations associated with this Web site. e. Contact the author or publisher directly. f. Any of the above © CCI Learning Solutions Inc. 11
  • 12. Review Questions 4. How have computers made an impact in education? a. Courses can be taken online instead of at the school. b. Technology allows students to communicate with each other online instead of in person. c. Critical thinking can be promoted as it gives students a chance to solve real world issues. d. Any of the above 5. How have computers been beneficial to people with disabilities? a. A person with disabilities can communicate with anyone in the world using a variety of tools. b. Devices can be incorporated into equipment which respond to a verbal prompt. c. Services can be free. d. Any of the above e. a or b © CCI Learning Solutions Inc. 12

Editor's Notes

  1. Pg458Objective 3-3.2.6Discuss how the internet lends itself to anonymity and as such, often things are being or have been done that are in violation of basic copyright laws, such as downloading songs, movies, copying pictures, etc.It is important that students understand what copyright is and how it works, and just because there is no © symbol does not mean the information can be used in any way they want.Ensure they understand what fair use is and how that works.You may want to remind students to refer to the list on page 459 of the book for sources on what copyright truly means.
  2. Pg459Objective 3-3.2.6With plagiarism, make sure students understand how easy it is to verify on the Internet where the information was retrieved from; if they can find it, so can the instructor and determine how much is your work versus what may have been “rewritten”.
  3. Pg455-456Objective 3-3.2.6Building on the last point for the previous slide, everyone is accountable for their actions while online. Even if you think no one is going to be able to trace it back to you, do not discount the fact that there are experts out there who can eventually.It is the golden rule that we need all adhere to, no matter the age or how often you go online.
  4. Pg463As time permits, go over these questions with the class to ensure they have a good grasp of the concepts learned in this lesson.Answers are found on the CCI microsite (ic3.ccilearning.com); you must be logged in as an instructor. Alternatively, if you received the instructor resources in electronic form, they will be located in the root folder.On completion of the Review Questions, have students navigate to the CCI microsite to begin the additional review there.
  5. Pg463As time permits, go over these questions with the class to ensure they have a good grasp of the concepts learned in this lesson.Answers are found on the CCI microsite (ic3.ccilearning.com); you must be logged in as an instructor. Alternatively, if you received the instructor resources in electronic form, they will be located in the root folder.On completion of the Review Questions, have students navigate to the CCI microsite to begin the additional review there.
  6. Pg463As time permits, go over these questions with the class to ensure they have a good grasp of the concepts learned in this lesson.Answers are found on the CCI microsite (ic3.ccilearning.com); you must be logged in as an instructor. Alternatively, if you received the instructor resources in electronic form, they will be located in the root folder.On completion of the Review Questions, have students navigate to the CCI microsite to begin the additional review there.