SlideShare a Scribd company logo
ADHERENCE OF TECHNO ETHICS AMONG
COLLEGE GOING STUDENTS
Priya Sehjal
INTRODUCTION
• Information communication technology to expand access to education.
Through ICT learning can occur anytime and anywhere. Varied researchers
have noted that ICT has become an integral and customary part of students’
everyday life.
• Lau and Au (2002) explored that 89% student’s use computer for doing
homework.
• Ogur (2004) surveyed that 91.1% students use internet, 69.5%use computer
for watching different videos, 70.5% for listing different kind of music
and81.6% use email for communication with peers.
• Uribe and Marino (2006) found that students who had access to a
computers 64%, search engines is 88.3%, and email use is 92.2% and
about 21% student use internet for their studies.
• Gay (2006) found that 92% students use computer for writing their work,
72% for doing their studies, and 95% for emailing for communication with
teachers.
• Inoue (2007) explored that college students attitude toward using ICT in
education was very positive.
• Ghabili and Alizadeh (2008) found that approximately 45% students use
computers and internet for connecting with peers.
• The modern scenario is particularly marked by the misuse of
technology in various forms and scales. The misuse of
technology at global level is very alarming. It is a biggest
threat to mankind by mankind themselves. Its implication on
our values, ethics, cultures, civilization, humanity and peace is
destructive and immoral. The misuse of technology has to be
brought to light, its implications have to be made aware in the
society, corrective measures need to be suggested and
practiced for the creation of better tomorrow. Some of the
problems which have emerged due to non-adherence of ethics
and values for the use of ICT are:
Cyber Crime:- Cybercrime is a crime in which a computer is the object of the crime.
Cyber criminals may use computer technology to access personal information, secrets
and use the internet for exploitive of malicious purposes.
• Mahajan (2015) found that (53.5%) rise cases in the cyber crime. 324 peoples have
arrested under the information technology act, 215 from the age 18-30 years. The cause
of increasing cyber crime among youth is earning money in easy ways. Peer pressure
also plays a negative role which leads youths to earn money in easy ways that increase
cyber crime.
• According to PIT (2015) national crime records bureau studied in 2014, 143 people
arrested for cyber crime below age of 18-30. Types of cyber crime included cyber
defamation, email hacking, mobiles crime, cyber stalking and data theft.
• Home Affairs and Enforcement (2015) found that in India 5693 total cases had been
registered under crime in the year 2013. The fifteen Indian states Uttar Pradesh,
Maharashtra, Kerala, Andhra Pradesh, West Bengal, Madhya Pradesh, Punjab, Haryana,
Rajasthan, Bihar, Assam, Orissa, Delhi and Chhattisgarh in terms of the maximum
number of cyber crime cases registered in 2013.
• Barton (2016) Identity theft is one of the fastest growing crimes against consumers, and
it can affect anyone, including college students. College students are especially
vulnerable because many do not understand the importance of keeping their personal
information and documents safe. According to the U.S. Federal Trade Commission
(FTC), 29 percent of identity theft victims are between the ages of 18 and 29. Young
adults are a prime target for identity thieves because they are likely to have a clean credit
report and are less likely to monitor their credit history on a regular basis.
Account and Data Hacking:- Hacking means hack bank accounts,
passwords, emails and personal information of individuals from social sites
by the criminals.
• LinkedIn (2012) is very popular social networking site for used
professionals. Recently came under Russia hackers who publicized the
passwords of more than 6.5 million user’s accounts.
• IBN Live (2013) explored that Delhi Police arrested two people for
allegedly swindling 70lakh from the bank account. The police seized that
three laptops from them containing banking data of around 1.5 crore
people.
• Express New Service (2016) found that cyber crime police bengaluru
arrested seven people including an Axis Bank deputy Manager for
allegedly hacking into peoples bank accounts using mobile banking apps
and stealing people’s money.
Plagiarism: It’s an act of stealing and using others intellectual properties
and academic works as one’s own. It includes illegally copying and using
of academic write-ups, stories, books, songs, poems etc.
• Gilmore (2010), explored that (42.2%) of research proposals by technology,
science, mathematics and engineering graduate students have contained
plagiarism.
• University News (2012) surveyed 60 undergraduate and postgraduate
business students with different scenarios around an impending assignment.
The results showed that whether the last minute rush to compete an essay
was expected or unexpected influenced the students committing plagiarism.
• Vieyra (2013) conducted a study that (47%) of English Additional
Language graduate students had plagiarized in their research proposals.
Identity theft: Several criminals have impersonated themselves as
important officials and used the advantage of the situation to steal money
from innocent people.
• Harrell and Langton (2013) found that approximately 16.6 million person
and 7% of all U.S residents age of 16 or older were victim of one or more
time identity theft in year 2012. They also found that in identity theft victim
existing bank 37% of credit card misuse information.
Copyright Infringement: The boom of electronic devices has led
to illegal and mass production of books, audios and video CDs.
• Konstantakis (2005) surveyed 79 students of a Computer Science
Department and it was found that all students illegitimately use or
copy software that is protected by intellectual property rights.
Pirated Software: There are many system software and application
software in market which are not genuine but pirated by group of
people to make quick bucks.
• Christensen and Eining (1991) investigated unethical copying of
software among accounting students and results was found that
(73%) of students self-reported that they have engaging in software
piracy and students' knowledge of the laws appeared to have little
impact on piracy behavior.
• Wood and Glass (1995) studied that females student were less likely
to allow another students to make an illegal copy of commercial
software than males students were more.
Academic Dishonesty: Academic dishonesty or academic miscount is any
type of cheating that occurs in relation to formal academic exercise. It can
included plagiarism, deception and sabotage.
• McCabe (1997), surveyed that 16 schools with engineering and science
programs and it was found that (84%) of business students have self
reported that they admitted to serious in cheating their past years.
• Morales (2000), found that (68%) of college students have self reported
that they had engaged in academic dishonesty behavior in classroom.
• Brown, Weible and Olmosk (2010) found that (49%) of undergraduate
students had admitted in cheating in their classroom.
Cyber bullying: Cyberbullying means the use of mobiles phones,
messaging, emails, chat rooms and social networking sites as Facebook and
Twitter to harass, threaten and intimidate someone.
• Dilmac (2009) surveyed 666 students and researcher found that (22%)
students self reported that they experiencing in Cyberbullying.
• Walker Sockman and Koeln (2011) explored that (11%) of college students
had experienced Cyberbullying and about (40%) of students knowing
someone who had been Cyber bullied.
Internet addiction:- Internet addiction is described as an impulse control
disorder, which does not involve use of an intoxicating drug and is very
similar to pathological gambling. Some Internet users may develop an
emotional attachment to on-line friends and activities they create on their
computer screens.
• Goel, Subramanyam and Kamath (2013) surveyed that 987 adolescents and
researchers found that use of internet addiction had high scores on
depression, anxiety among adolescents.
• Cardak (2013) surveyed 479 university students among internet addiction
and psychological well-being. Results indicate that students have higher
levels of internet addiction are more likely to be low in psychological well-
being.
• The erosion of ethical values in our society today has become a
phenomenon. There is a maddening pursuit to accumulate wealth, power
and status to the total exclusion of humanness in us. In the society of the
future that is emerging and whose frontiers remain largely unknown, it is
not possible, to provide a package of values to the student for use in his
later life. Unlike in the past, the degree of confrontational and conflictual
situations has largely increased. There is marked erosion of personal
freedom, brought about by mass hysteria induced by the powerful
Information and Communication Technology (ICT). To maintain one's
selfhood and identity; to find the resources to make personal choices and
decisions has become one of the major problems. This is also the
educational problem. Whether we deal with this crisis as a source of peril
or (as the Chinese use the term crisis) as an opportunity depends on us.
This represents the agony and the ecstasy of the problem.
• Education at present, with its emphasis on ‘consumerism’ and competition
for achievement, has sidelined its central concern for the full development
of the social, moral and spiritual side of human personality. Ethical
education which needs to be looked upon as an essential aspect for the
overall qualitative improvement of education is being neglected to a great
extent.
TECHNOETHICS
• The word Technoethics is derived from two words
‘technology’ and ‘ethics’ which means ethics in technology.
Technoethics is concern with the ethical and morals aspect of
technology in society. It draws on methods and theories from
many knowledge domains to provide insight on ethical
dimension of technological system and practice for advancing
a technological society. Technoethics involve the ethical aspect
of technology with in a society that is shaped by technologies.
• The concept of Technoethics is not new, as far as the history
could take us back. The term technoethics was first
introducing by Philosopher Mario Bunge in 1977. It was
argued that current scientific practices and technological
progress are not guided by ethics. It was also suggested that
technologists and scientists would be morally or technically
responsible for the technology they practice or produce.
SCOPE OF THE STUDY
• Nowadays, college students have massive use of Information
Communication Technology (ICT), tools like mobiles, computers,
laptops, internet, Wi-Fi, email, IPods, electronic notebooks, MP3
player, text and instant messages for communication, social
networking sites including (Facebook, twitter, MySpace, viber) and
digital television. As student share spending considerable amount of
time on ICT usage, with many positive impact of ICT in education
there are also negative side of the same.
• Some serious issues regarding more involvement of students and
unethical practices in ICT usage followed by them, which were
earlier considered at embryonic stage has gotten mature stage. Issues
like lack of privacy, security, copyright infringement, cyber crime,
academic dishonesty, hacking and plagiarism are having teething
and sound effects, since all are having potential influence in eating
the ethical values of the students. If not taken earnestly there will be
severe magnitude. It is a high time to inculcate some ethical values
allied to ICT usage in the students.
How to stop misuse of technology
• Protecting the computers and network while using
technology is very important in college settings, for
everybody uses these tools. Everybody should be
responsible for protecting technological instruments.
Teachers should teach students careful use of equipment,
resources and facilities.
• Teachers are important elements in the education system.
Since they are responsible for the development of
students, teachers need to be aware of ethical
responsibilities. Teachers should be good role models for
students because students learn by examples. Being a
good model requires caring, compassion, sensitivity,
commitment, the pursuit of truth and respect of self and
others, honesty, trustworthiness, integrity, equality,
impartiality, fairness, and justice (Bodi, 1998).
• Educational organizations playing very important role to
stop misuse of technology. They should have make rules
and obligations to help students learn how to use the
technology in a responsible and safe manner. For
example, filtering is important for institutions and home
computers.
• As we can see, sometimes the technology is not logical.
Educational institutions should help students learn how to
think critically about technology issues, not what to think
about them. Teachers can help students acquire informed
attitudes about the various technologies and their social,
cultural, economic, and ecological consequences.
CONCLUSION
• Information communication technology is one of the most powerful and formative
forces of students life. There are many concerns and encounters among college
students related to lack of social values and unethical behavior while using internet
and technology. The social values parameters such as honesty, humanity,
cooperation, tolerance and unity are essentials to turn up the college students into
right direction for use of technology.
• The present day educational system has ignored students social values related with
technology. Articulation of personal values when using technology is very much
indispensable and vital. We must stress the deliberation and application of
principles rather than relying on a detailed set of rules, ethical behavior is to be
modeled. Accept the fact that students will make mistakes; allow students to use
Internet and reinforce social behaviors and react to the misuse of technology.
Assessment of student understanding of social values while using technology is
mandatory. Educating the students and parents about social values for the use of
ICT.
• The Children’s Internet Protection Act demands that public schools and libraries to
take steps to prevent students from accessing certain materials on cyberspace.
Create such environments that will help students to avoid temptations. Our prime
responsibility is to inculcate ethical and social values among students, so that they
can use ICT in constructive manner. Parents, teachers and educational institutions
can play very important role for inculcation of social values while using ICT. The
one of most effective method for inculcating social values related to technology is
self education. The best way for inculcating social values in students are to teach
them regarding the various technological issues of present time so that varied
technologies can be used for constructive ways.
• The Children’s Internet Protection Act demands that public schools and
libraries to take steps to prevent students from accessing certain materials
on cyberspace. Create such environments that will help students to avoid
temptations.
• Our prime responsibility is to inculcate ethical and social values among
students, so that they can use ICT in constructive manner. Parents, teachers
and educational institutions can play very important role for inculcation of
social values while using ICT. The one of most effective method for
inculcating social values related to technology is self education.
• The best way for inculcating social values in students are to teach them
regarding the various technological issues of present time so that varied
technologies can be used for constructive ways.
THANK YOU

More Related Content

Similar to Priya sehjal

It ethics undergraduates’ perception based on their awareness
It ethics undergraduates’ perception based on their awarenessIt ethics undergraduates’ perception based on their awareness
It ethics undergraduates’ perception based on their awareness
Alexander Decker
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
ITIIIndustries
 
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
Lisa Muthukumar
 
International Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docxInternational Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docx
LaticiaGrissomzz
 
A Comparative Study Of Cyber Bullying Among Undergraduate Students
A Comparative Study Of Cyber Bullying Among Undergraduate StudentsA Comparative Study Of Cyber Bullying Among Undergraduate Students
A Comparative Study Of Cyber Bullying Among Undergraduate Students
Lori Mitchell
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber path
Profsdetchana Murthy
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in Education
Monica Martinez
 
A Semantic Web-Based Approach For Enhancing Oral History Management Systems
A Semantic Web-Based Approach For Enhancing Oral History Management SystemsA Semantic Web-Based Approach For Enhancing Oral History Management Systems
A Semantic Web-Based Approach For Enhancing Oral History Management Systems
Scott Donald
 
APA IPS 2011 - Workshop 07
APA IPS 2011 - Workshop 07APA IPS 2011 - Workshop 07
APA IPS 2011 - Workshop 07
TristanLG
 
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
IRJET Journal
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
Johan Koren
 
4
44
Running head FINAL PAPER .docx
 Running head FINAL PAPER                                      .docx Running head FINAL PAPER                                      .docx
Running head FINAL PAPER .docx
MARRY7
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 version
Johan Koren
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 version
Johan Koren
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATIONA REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
Claire Webber
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
Claire Webber
 
A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2
IAEME Publication
 
Wcci 2014 digital citizenship presentation
Wcci 2014 digital citizenship presentationWcci 2014 digital citizenship presentation
Wcci 2014 digital citizenship presentation
edtechprof
 
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
MohinderSingh78
 

Similar to Priya sehjal (20)

It ethics undergraduates’ perception based on their awareness
It ethics undergraduates’ perception based on their awarenessIt ethics undergraduates’ perception based on their awareness
It ethics undergraduates’ perception based on their awareness
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
 
International Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docxInternational Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docx
 
A Comparative Study Of Cyber Bullying Among Undergraduate Students
A Comparative Study Of Cyber Bullying Among Undergraduate StudentsA Comparative Study Of Cyber Bullying Among Undergraduate Students
A Comparative Study Of Cyber Bullying Among Undergraduate Students
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber path
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in Education
 
A Semantic Web-Based Approach For Enhancing Oral History Management Systems
A Semantic Web-Based Approach For Enhancing Oral History Management SystemsA Semantic Web-Based Approach For Enhancing Oral History Management Systems
A Semantic Web-Based Approach For Enhancing Oral History Management Systems
 
APA IPS 2011 - Workshop 07
APA IPS 2011 - Workshop 07APA IPS 2011 - Workshop 07
APA IPS 2011 - Workshop 07
 
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
4
44
4
 
Running head FINAL PAPER .docx
 Running head FINAL PAPER                                      .docx Running head FINAL PAPER                                      .docx
Running head FINAL PAPER .docx
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 version
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 version
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATIONA REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
 
A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2
 
Wcci 2014 digital citizenship presentation
Wcci 2014 digital citizenship presentationWcci 2014 digital citizenship presentation
Wcci 2014 digital citizenship presentation
 
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
 

More from International Center for Research & Development

GWS2022 Keynote Speech - Dr. Michelle Philip.pptx
GWS2022 Keynote Speech  - Dr. Michelle Philip.pptxGWS2022 Keynote Speech  - Dr. Michelle Philip.pptx
GWS2022 Keynote Speech - Dr. Michelle Philip.pptx
International Center for Research & Development
 
GWS2022 Keynote Speech- Dr Madhu Sharan.ppt
GWS2022 Keynote Speech- Dr Madhu Sharan.pptGWS2022 Keynote Speech- Dr Madhu Sharan.ppt
GWS2022 Keynote Speech- Dr Madhu Sharan.ppt
International Center for Research & Development
 
Alaa k
Alaa kAlaa k
Dr.okoro
Dr.okoro Dr.okoro
Shirin abbas
Shirin abbasShirin abbas
Zeynep muftuoglu
Zeynep muftuogluZeynep muftuoglu
Sanduni gunawardena
Sanduni gunawardenaSanduni gunawardena
Lawan cheri
Lawan cheriLawan cheri
Clive hickson 2019
Clive hickson 2019Clive hickson 2019
Elim shanko
Elim shankoElim shanko
Prof. Maria Silva
Prof. Maria SilvaProf. Maria Silva
Priyadharsan
PriyadharsanPriyadharsan
Silva gvntm
Silva gvntmSilva gvntm
Malkanthi p
Malkanthi pMalkanthi p
Bandara r m_u_s
Bandara r m_u_sBandara r m_u_s
Gayathri sl
Gayathri slGayathri sl
Mignodel
MignodelMignodel
Suha
SuhaSuha
Gouri
GouriGouri
Roseline
RoselineRoseline

More from International Center for Research & Development (20)

GWS2022 Keynote Speech - Dr. Michelle Philip.pptx
GWS2022 Keynote Speech  - Dr. Michelle Philip.pptxGWS2022 Keynote Speech  - Dr. Michelle Philip.pptx
GWS2022 Keynote Speech - Dr. Michelle Philip.pptx
 
GWS2022 Keynote Speech- Dr Madhu Sharan.ppt
GWS2022 Keynote Speech- Dr Madhu Sharan.pptGWS2022 Keynote Speech- Dr Madhu Sharan.ppt
GWS2022 Keynote Speech- Dr Madhu Sharan.ppt
 
Alaa k
Alaa kAlaa k
Alaa k
 
Dr.okoro
Dr.okoro Dr.okoro
Dr.okoro
 
Shirin abbas
Shirin abbasShirin abbas
Shirin abbas
 
Zeynep muftuoglu
Zeynep muftuogluZeynep muftuoglu
Zeynep muftuoglu
 
Sanduni gunawardena
Sanduni gunawardenaSanduni gunawardena
Sanduni gunawardena
 
Lawan cheri
Lawan cheriLawan cheri
Lawan cheri
 
Clive hickson 2019
Clive hickson 2019Clive hickson 2019
Clive hickson 2019
 
Elim shanko
Elim shankoElim shanko
Elim shanko
 
Prof. Maria Silva
Prof. Maria SilvaProf. Maria Silva
Prof. Maria Silva
 
Priyadharsan
PriyadharsanPriyadharsan
Priyadharsan
 
Silva gvntm
Silva gvntmSilva gvntm
Silva gvntm
 
Malkanthi p
Malkanthi pMalkanthi p
Malkanthi p
 
Bandara r m_u_s
Bandara r m_u_sBandara r m_u_s
Bandara r m_u_s
 
Gayathri sl
Gayathri slGayathri sl
Gayathri sl
 
Mignodel
MignodelMignodel
Mignodel
 
Suha
SuhaSuha
Suha
 
Gouri
GouriGouri
Gouri
 
Roseline
RoselineRoseline
Roseline
 

Recently uploaded

BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 

Priya sehjal

  • 1. ADHERENCE OF TECHNO ETHICS AMONG COLLEGE GOING STUDENTS Priya Sehjal
  • 2. INTRODUCTION • Information communication technology to expand access to education. Through ICT learning can occur anytime and anywhere. Varied researchers have noted that ICT has become an integral and customary part of students’ everyday life. • Lau and Au (2002) explored that 89% student’s use computer for doing homework. • Ogur (2004) surveyed that 91.1% students use internet, 69.5%use computer for watching different videos, 70.5% for listing different kind of music and81.6% use email for communication with peers. • Uribe and Marino (2006) found that students who had access to a computers 64%, search engines is 88.3%, and email use is 92.2% and about 21% student use internet for their studies. • Gay (2006) found that 92% students use computer for writing their work, 72% for doing their studies, and 95% for emailing for communication with teachers. • Inoue (2007) explored that college students attitude toward using ICT in education was very positive. • Ghabili and Alizadeh (2008) found that approximately 45% students use computers and internet for connecting with peers.
  • 3. • The modern scenario is particularly marked by the misuse of technology in various forms and scales. The misuse of technology at global level is very alarming. It is a biggest threat to mankind by mankind themselves. Its implication on our values, ethics, cultures, civilization, humanity and peace is destructive and immoral. The misuse of technology has to be brought to light, its implications have to be made aware in the society, corrective measures need to be suggested and practiced for the creation of better tomorrow. Some of the problems which have emerged due to non-adherence of ethics and values for the use of ICT are:
  • 4. Cyber Crime:- Cybercrime is a crime in which a computer is the object of the crime. Cyber criminals may use computer technology to access personal information, secrets and use the internet for exploitive of malicious purposes. • Mahajan (2015) found that (53.5%) rise cases in the cyber crime. 324 peoples have arrested under the information technology act, 215 from the age 18-30 years. The cause of increasing cyber crime among youth is earning money in easy ways. Peer pressure also plays a negative role which leads youths to earn money in easy ways that increase cyber crime. • According to PIT (2015) national crime records bureau studied in 2014, 143 people arrested for cyber crime below age of 18-30. Types of cyber crime included cyber defamation, email hacking, mobiles crime, cyber stalking and data theft. • Home Affairs and Enforcement (2015) found that in India 5693 total cases had been registered under crime in the year 2013. The fifteen Indian states Uttar Pradesh, Maharashtra, Kerala, Andhra Pradesh, West Bengal, Madhya Pradesh, Punjab, Haryana, Rajasthan, Bihar, Assam, Orissa, Delhi and Chhattisgarh in terms of the maximum number of cyber crime cases registered in 2013. • Barton (2016) Identity theft is one of the fastest growing crimes against consumers, and it can affect anyone, including college students. College students are especially vulnerable because many do not understand the importance of keeping their personal information and documents safe. According to the U.S. Federal Trade Commission (FTC), 29 percent of identity theft victims are between the ages of 18 and 29. Young adults are a prime target for identity thieves because they are likely to have a clean credit report and are less likely to monitor their credit history on a regular basis.
  • 5. Account and Data Hacking:- Hacking means hack bank accounts, passwords, emails and personal information of individuals from social sites by the criminals. • LinkedIn (2012) is very popular social networking site for used professionals. Recently came under Russia hackers who publicized the passwords of more than 6.5 million user’s accounts. • IBN Live (2013) explored that Delhi Police arrested two people for allegedly swindling 70lakh from the bank account. The police seized that three laptops from them containing banking data of around 1.5 crore people. • Express New Service (2016) found that cyber crime police bengaluru arrested seven people including an Axis Bank deputy Manager for allegedly hacking into peoples bank accounts using mobile banking apps and stealing people’s money.
  • 6. Plagiarism: It’s an act of stealing and using others intellectual properties and academic works as one’s own. It includes illegally copying and using of academic write-ups, stories, books, songs, poems etc. • Gilmore (2010), explored that (42.2%) of research proposals by technology, science, mathematics and engineering graduate students have contained plagiarism. • University News (2012) surveyed 60 undergraduate and postgraduate business students with different scenarios around an impending assignment. The results showed that whether the last minute rush to compete an essay was expected or unexpected influenced the students committing plagiarism. • Vieyra (2013) conducted a study that (47%) of English Additional Language graduate students had plagiarized in their research proposals. Identity theft: Several criminals have impersonated themselves as important officials and used the advantage of the situation to steal money from innocent people. • Harrell and Langton (2013) found that approximately 16.6 million person and 7% of all U.S residents age of 16 or older were victim of one or more time identity theft in year 2012. They also found that in identity theft victim existing bank 37% of credit card misuse information.
  • 7. Copyright Infringement: The boom of electronic devices has led to illegal and mass production of books, audios and video CDs. • Konstantakis (2005) surveyed 79 students of a Computer Science Department and it was found that all students illegitimately use or copy software that is protected by intellectual property rights. Pirated Software: There are many system software and application software in market which are not genuine but pirated by group of people to make quick bucks. • Christensen and Eining (1991) investigated unethical copying of software among accounting students and results was found that (73%) of students self-reported that they have engaging in software piracy and students' knowledge of the laws appeared to have little impact on piracy behavior. • Wood and Glass (1995) studied that females student were less likely to allow another students to make an illegal copy of commercial software than males students were more.
  • 8. Academic Dishonesty: Academic dishonesty or academic miscount is any type of cheating that occurs in relation to formal academic exercise. It can included plagiarism, deception and sabotage. • McCabe (1997), surveyed that 16 schools with engineering and science programs and it was found that (84%) of business students have self reported that they admitted to serious in cheating their past years. • Morales (2000), found that (68%) of college students have self reported that they had engaged in academic dishonesty behavior in classroom. • Brown, Weible and Olmosk (2010) found that (49%) of undergraduate students had admitted in cheating in their classroom. Cyber bullying: Cyberbullying means the use of mobiles phones, messaging, emails, chat rooms and social networking sites as Facebook and Twitter to harass, threaten and intimidate someone. • Dilmac (2009) surveyed 666 students and researcher found that (22%) students self reported that they experiencing in Cyberbullying. • Walker Sockman and Koeln (2011) explored that (11%) of college students had experienced Cyberbullying and about (40%) of students knowing someone who had been Cyber bullied.
  • 9. Internet addiction:- Internet addiction is described as an impulse control disorder, which does not involve use of an intoxicating drug and is very similar to pathological gambling. Some Internet users may develop an emotional attachment to on-line friends and activities they create on their computer screens. • Goel, Subramanyam and Kamath (2013) surveyed that 987 adolescents and researchers found that use of internet addiction had high scores on depression, anxiety among adolescents. • Cardak (2013) surveyed 479 university students among internet addiction and psychological well-being. Results indicate that students have higher levels of internet addiction are more likely to be low in psychological well- being.
  • 10. • The erosion of ethical values in our society today has become a phenomenon. There is a maddening pursuit to accumulate wealth, power and status to the total exclusion of humanness in us. In the society of the future that is emerging and whose frontiers remain largely unknown, it is not possible, to provide a package of values to the student for use in his later life. Unlike in the past, the degree of confrontational and conflictual situations has largely increased. There is marked erosion of personal freedom, brought about by mass hysteria induced by the powerful Information and Communication Technology (ICT). To maintain one's selfhood and identity; to find the resources to make personal choices and decisions has become one of the major problems. This is also the educational problem. Whether we deal with this crisis as a source of peril or (as the Chinese use the term crisis) as an opportunity depends on us. This represents the agony and the ecstasy of the problem. • Education at present, with its emphasis on ‘consumerism’ and competition for achievement, has sidelined its central concern for the full development of the social, moral and spiritual side of human personality. Ethical education which needs to be looked upon as an essential aspect for the overall qualitative improvement of education is being neglected to a great extent.
  • 11. TECHNOETHICS • The word Technoethics is derived from two words ‘technology’ and ‘ethics’ which means ethics in technology. Technoethics is concern with the ethical and morals aspect of technology in society. It draws on methods and theories from many knowledge domains to provide insight on ethical dimension of technological system and practice for advancing a technological society. Technoethics involve the ethical aspect of technology with in a society that is shaped by technologies. • The concept of Technoethics is not new, as far as the history could take us back. The term technoethics was first introducing by Philosopher Mario Bunge in 1977. It was argued that current scientific practices and technological progress are not guided by ethics. It was also suggested that technologists and scientists would be morally or technically responsible for the technology they practice or produce.
  • 12. SCOPE OF THE STUDY • Nowadays, college students have massive use of Information Communication Technology (ICT), tools like mobiles, computers, laptops, internet, Wi-Fi, email, IPods, electronic notebooks, MP3 player, text and instant messages for communication, social networking sites including (Facebook, twitter, MySpace, viber) and digital television. As student share spending considerable amount of time on ICT usage, with many positive impact of ICT in education there are also negative side of the same. • Some serious issues regarding more involvement of students and unethical practices in ICT usage followed by them, which were earlier considered at embryonic stage has gotten mature stage. Issues like lack of privacy, security, copyright infringement, cyber crime, academic dishonesty, hacking and plagiarism are having teething and sound effects, since all are having potential influence in eating the ethical values of the students. If not taken earnestly there will be severe magnitude. It is a high time to inculcate some ethical values allied to ICT usage in the students.
  • 13. How to stop misuse of technology • Protecting the computers and network while using technology is very important in college settings, for everybody uses these tools. Everybody should be responsible for protecting technological instruments. Teachers should teach students careful use of equipment, resources and facilities. • Teachers are important elements in the education system. Since they are responsible for the development of students, teachers need to be aware of ethical responsibilities. Teachers should be good role models for students because students learn by examples. Being a good model requires caring, compassion, sensitivity, commitment, the pursuit of truth and respect of self and others, honesty, trustworthiness, integrity, equality, impartiality, fairness, and justice (Bodi, 1998).
  • 14. • Educational organizations playing very important role to stop misuse of technology. They should have make rules and obligations to help students learn how to use the technology in a responsible and safe manner. For example, filtering is important for institutions and home computers. • As we can see, sometimes the technology is not logical. Educational institutions should help students learn how to think critically about technology issues, not what to think about them. Teachers can help students acquire informed attitudes about the various technologies and their social, cultural, economic, and ecological consequences.
  • 15. CONCLUSION • Information communication technology is one of the most powerful and formative forces of students life. There are many concerns and encounters among college students related to lack of social values and unethical behavior while using internet and technology. The social values parameters such as honesty, humanity, cooperation, tolerance and unity are essentials to turn up the college students into right direction for use of technology. • The present day educational system has ignored students social values related with technology. Articulation of personal values when using technology is very much indispensable and vital. We must stress the deliberation and application of principles rather than relying on a detailed set of rules, ethical behavior is to be modeled. Accept the fact that students will make mistakes; allow students to use Internet and reinforce social behaviors and react to the misuse of technology. Assessment of student understanding of social values while using technology is mandatory. Educating the students and parents about social values for the use of ICT. • The Children’s Internet Protection Act demands that public schools and libraries to take steps to prevent students from accessing certain materials on cyberspace. Create such environments that will help students to avoid temptations. Our prime responsibility is to inculcate ethical and social values among students, so that they can use ICT in constructive manner. Parents, teachers and educational institutions can play very important role for inculcation of social values while using ICT. The one of most effective method for inculcating social values related to technology is self education. The best way for inculcating social values in students are to teach them regarding the various technological issues of present time so that varied technologies can be used for constructive ways.
  • 16. • The Children’s Internet Protection Act demands that public schools and libraries to take steps to prevent students from accessing certain materials on cyberspace. Create such environments that will help students to avoid temptations. • Our prime responsibility is to inculcate ethical and social values among students, so that they can use ICT in constructive manner. Parents, teachers and educational institutions can play very important role for inculcation of social values while using ICT. The one of most effective method for inculcating social values related to technology is self education. • The best way for inculcating social values in students are to teach them regarding the various technological issues of present time so that varied technologies can be used for constructive ways.