Presentation is loading. Please wait.

Presentation is loading. Please wait.

Unit 11 Computing and Ethics. Skills focus Listening recognizing the speaker’s stance writing up notes in full Speaking building an argument in a seminar.

Similar presentations


Presentation on theme: "Unit 11 Computing and Ethics. Skills focus Listening recognizing the speaker’s stance writing up notes in full Speaking building an argument in a seminar."— Presentation transcript:

1 Unit 11 Computing and Ethics

2 Skills focus Listening recognizing the speaker’s stance writing up notes in full Speaking building an argument in a seminar agreeing/disagreeing Vocabulary focus words/phrases used to link ideas (moreover, as a result, etc.) stress patterns in noun phrases and compounds fixed phrases from academic English words/phrases related to ethical issues in computing

3 11.1 Vocabulary11.2 Listening11.3 Extending Skills11.4 Extending Skills

4 We use linking words and phrases to join ideas together in a sequence, to show how the ideas are related. Some linking words can be used to join independent and dependent clauses in a sentence. Examples: The decisions made by computer professionals have an impact on large numbers of people because computers play an increasingly important role in society. Or Because computers play an increasingly important role in society, the decisions made by computer professionals have an impact on large numbers of people. Linking words Vocabulary bank

5 Other linking words join sentences in a text. Examples: Computers play an increasingly important role in society. As a result, the decisions made by computer professionals have an impact on large numbers of people. When building an argument, it is a good idea to use linking words to add points: Examples: Firstly, …In addition, … For example, …Moreover, … Another point is ……whereas… Secondly, …Finally, … Linking words Vocabulary bank

6 A Look at the pictures on the opposite page. 1 Match each picture A — D to a label. What does each item do? 11.1 Vocabulary Body scanner DNA testing systemSurveillance system Credit card reader A B D C

7 A Look at the pictures on the opposite page. 11.1 Vocabulary Body scanner DNA testing system Surveillance system Credit card reader A B D C 2. What benefits can it deliver? Beneficial if it is used to ensure safety and to prevent crime. Beneficial if it is used to allow individuals to use their own money to make purchases. Beneficial if it is used to identify diseases which can be treated. Beneficial if it is used to identify weapons or explosives.

8 A Look at the pictures on the opposite page. 11.1 Vocabulary Body scanner DNA testing system Surveillance system Credit card reader A B D C Harmful if it is used fraudulently to remove other people’s money from their accounts. Harmful if it is used to identify diseases so that people can be excluded from health insurance policies. Harmful if it is used to look at somebody without their clothes on, without their consent. 3. How might it be harmful? Harmful if it is used to track innocent people’s movements to keep them under control.

9 B Look at the words at the bottom of the spidergram on the opposite page. Put the words in the correct spaces. 11.1 Vocabulary Ethics Rules and regulations Legislation Principles Personal beliefs International treaties National laws Company policy Professional code of conduct Religion

10 C Study the linking words and phrases in box a. 11.1 Vocabulary 1. Put them into two groups for: a. discussing reasons and results b. building an argument 2. Is each linking word used to join ideas: a. within a sentence?within a sentence b. between sentences?between sentences 3. Can you think of similar linking words?

11 C Study the linking words and phrases in box a. 11.1 Vocabulary ‘Within-sentence’ linking words or phrases join clauses in a sentence. e.g. Decisions made by computer professionals affect a growing number of people because computers play an increasingly important role in our society. ‘between-sentence’ linking words or phrases connect two sentences. e.g. Computers play an increasingly important role in our society. As a result, decisions made by computer professionals affect a growing number of people. With between-sentence linking words, there is usually a comma before the rest of the sentence.

12 11.1 Vocabulary C Study the linking words and phrases in box a. Linking words/phrases Use forWithin or between sentence Other similar words/phrases another point is as a result because finally firstly for example building an argument between and another thing reasons and resultsbetween consequently reasons and results within as building an argument between lastly building an argumentbetween to begin with/to start with for one thing building an argument between for instance Possible answers

13 11.1 Vocabulary C Study the linking words and phrases in box a. Linking words/phrases Use forWithin or between sentence Other similar words/phrases in addition moreover one result of this is secondly since so building an argument between also building an argument between furthermore reasons and results between within as reasons and resultsbetween/within therefore, thus, hence Possible answers one consequence of this is because of this building an argument next, then reasons and results

14 C Study the linking words and phrases in box a. 11.1 Vocabulary 4. Put the linking words in a suitable order to list points in support of an argument. firstly for example in addition secondly another point is moreover finally supporting the point with a specific example adding another related point in support making the second major support point adding another related point in support adding more information to the point above making the last point making the first major support point

15 D Study the words in box b. 11.1 Vocabulary 1 Are the words nouns, verbs or adjectives? 2 What is the stress pattern of each word? 3 What other words or phrases have the same meaning? WordPart of speechOther words/phrases bene ficial censorship conflict ethical faulty harmful ' adj. ' ' ' ' good n(U) control n(C or U)dispute adj moral adj flawed adj damaging '

16 D Study the words in box b. 11.1 Vocabulary WordPart of speechOther words/phrases impact impli cation justify negligence obli gation repu tation res ponsible sur veillance ' n(C);also v (T,I) ' ' ' effect; to affect, have an influence on n(C) effect that an action or decision might have on something else v (T) give a good reason (for doing something) n (U) carelessness n(C) duty n(C or U) record ' adj to blame (as adj, not v.) ' n (U)monitoring ' '

17 E Listen to a recording about computer ethics. Check what you have heard against the text. 11.1 Vocabulary 1 Complete each space with a word or phrase from box a or box b. Change the form if necessary. Computer ethics Computers play an increasingly important role in our society. _____________ is that decisions made by computer professionals have an _________ on a growing number of people. _________ IT contractors need to balance their clients’ demands with their obligations to society. _________ to ethical reasons for this, there are also practical reasons why this is necessary. _________, errors in the design or construction of IT systems can have profound economic or human consequences. _________, Bynum, 2004, refers to a chemical company, Chemco, where faulty computer system design was _________ for an explosion which resulted in significant loss of life and widespread environmental contamination. One result of this impact Moreover In addition Firstly For example responsible 请将本单元的音频和此 PPT 放在一个单独的文件夹内,点击小喇叭即可播放音频。(下同)

18 reputation 1 Complete each space with a word or phrase from box a or box b. Change the form if necessary. 11.1 Vocabulary Because the system design was flawed, the designer’s professional ______________ was at risk. ________________, if found responsible for the death and destruction because of negligence, he faced a large fine or imprisonment. This example of a failure in standards illustrates the importance of making decisions based on sound principles which can be justified. ______________, a conflict of opinion can arise between a computer professional and his or her employer. The employee may have a disagreement about whether his or her work is being put to beneficial or ___________ uses. One ___________ of this could be the construction, maintenance or operation of systems for surveillance or censorship. _____ it is important that professionals understand the ethical issues before entering into contracts. Furthermore Secondly harmful example So E Listen to a recording about computer ethics. Check what you have heard against the text.

19 E Listen to a recording about computer ethics. Check what you have heard against the text. 11.1 Vocabulary 2 Can you think of other words or phrases with the same meaning as the underlined words? WordSynonym increasingly balance obligations practical profound consequences resulted in widespread illustrates arise disagreement important progressively reconcile commitments sensible fundamental effects caused extensive shows occur dispute crucial

20 E Listen to a recording about computer ethics. Check what you have heard against the text. 11.1 Vocabulary 3 Match the phrases below from the text on the right with a later phrase that refers back to them. 1 computer professionals 2 loss of life 3 environmental contamination 4 negligence 5 conflict of opinion 6 computer professional a death b employee c failure in standards d destruction e disagreement f IT contractors f a d c e b

21 F Do the general knowledge quiz on the opposite page. 11.1 Vocabulary 1 a Digital Millennium Copyright Act (DMCA) – US law, passed in 1998, which makes it a criminal offence to produce or disseminate technology which is designed to allow users to get around digital rights management protection. b European Union Copyright Directive (EUCD) – EU directive which has to be passed into law in individual countries; imposes considerable restrictions on the rights of individuals to copy digital content. c Computer Misuse Act – passed in 1990, this Act makes it an offence in the UK to access another person’s computer, or alter data on their computer, without the owner’s permission. d Hacker’s Manifesto – written in 1986, it sets out an explanation of why people are attracted to hacking.

22 F Do the general knowledge quiz on the opposite page. 11.1 Vocabulary e UK Data Protection Act (DPA) – first passed in 1984, it places a responsibility on all organizations processing data on identifiable individuals to have a data controller who ensures that the privacy of the individual is not breached. f World Intellectual Property Organization (WIPO) – organization set up by the United Nations in Switzerland to protect copyright and other intellectual property; responsible for various treaties which affect digital copyright. g Digital rights management (DRM) software – software designed to prevent unauthorized copying of digital content.

23 F Do the general knowledge quiz on the opposite page. 11.1 Vocabulary 2 a cybercrime – crime carried out involving the use of a computer b email forgery – to create an e-mail which appears to come from somebody else c keylogger – a software application which logs all the keystrokes made by a user (often used to capture passwords) d malware – collective description of all kinds of harmful software (i.e., viruses, Trojans, worms, etc.) e hacker – somebody who can gain unauthorized access to other people’s computers; can also mean somebody who likes to write amendments (hacks) to existing computer code f Trojan – short for Trojan horse: malicious software, disguised as or embedded in harmless software, which allows a user’s computer to be taken over

24 11.2 Listening A You are going to listen to a lecture by a guest speaker in the ICT Faculty at Hadford University. Look at the poster down the page. 1 What is the lecture going to be about? 2 Decide on how you are going to make notes. Prepare a page in your notebook. 2 The lecture is going to follow the format for theories and opinions, then supporting information. This suggests that the most suitable form of notes might be a two-column table or the Cornell system (which is used here). Answers 1 Accept any reasonable suggestions.

25 11.2 Listening B Listen to Part 1 of the lecture and make notes. 1 What is the focus of the lecturer’s talk? 2 What are the two main aspects that the lecturer will discuss? 3 What examples of these aspects does he give? 4 To which aspect does each example belong? Answers 1 Issues that need to be considered when making decisions in a professional capacity or ways in which professional decisions can be justified. 2 Legal and regulatory aspects. 3 Being accused of negligence when designing operating systems; developing software which is not up to professional standards; developing software which infringes on copyright.. 4 Legal; regulatory; legal. 请将本单元的音频和此 PPT 放在 一个单独的文件夹内,点击小喇 叭即可播放音频。(下同)

26 11.2 Listening C Listen to Part 2 of the lecture and make notes. Notes Legal factors: e.g., international treaties, government legislation, civil & contract law (a) Privacy legislation in US ‘Big Brother’ fears Privacy Act 1974, govt. only – no commercial systems response to increase in power of computers by mid-1960s & US government databases: tax, military, census, etc. legislation copied by UK Data Protection Act, 1984 unauthorized access & crime UK Computer Misuse Act, 1990 (b) Criminal & copyright/IP Council of Europe Convention on Cybercrime harmonize computer laws between countries countries to investigate crime in other countries different categories of computer crime

27 11.2 Listening C Listen to Part 2 of the lecture and make notes. Notes (c) World Intellectual Property Organization treaties implemented in US as Digital Millennium Copyright Act (DMCA) – prevents software avoiding DRM protection – controversial, not everybody agrees implemented in EU as European Copyright Directive (d) Categories of cybercrime, e.g., data crimes theft or modification of data network crimes preventing access or sabotaging access crimes gaining unauthorized access to system, introducing viruses, worms or other malware related crimes fraud, forgery, etc. using computer

28 11.2 Listening C Listen to Part 2 of the lecture and make notes. Notes (e) Civil / commercial law contract law covers employment and ∵ what computer professionals obliged to do also contracts between companies/professionals where disagreement on quality of product or service civil law individuals can sue for breach of rights (e.g., damages suffered from defective product, invasion of privacy) civil law depends on the country

29 11.2 Listening D Using your notes, answer the questions in the handout on the right. 1 Why were many Americans worried about the effects of computers in the 1960s? Because they believed that computers could be used to create a ‘Big Brother’ society in which the state could control all its citizens. 2 What evidence was there to suggest that their fear was justified? By the early 1960s, the government already had a number of databases containing a wide range of information on citizens. 3 What examples of US government sources of data does the lecturer mention? Data from the US census, from tax payments made by citizens, from military service records and a range of other sources.

30 11.2 Listening D Using your notes, answer the questions in the handout on the right. 4 Why was the 1974 Privacy Act criticized? Because it was difficult to enforce and it did not cover non-governmental organizations which could gather as much information on citizens as they wished. 5 How did the UK Data Protection Act address these criticisms? It made all organizations which used identifiable data responsible for protecting the privacy of individuals, not just government organizations. 6 Who was the Council of Europe Convention on Cybercrime aimed at? Countries who had not yet updated their legal framework to reflect the complexities of the Internet.

31 11.2 Listening D Using your notes, answer the questions in the handout on the right. 7 Why was it criticized? Because it meant that governments would have to investigate their own citizens if another government accused them of a computer crime which was not a crime in their own country. 8 What example is given of possible problems with legislation arising from the Convention? A US citizen selling Nazi memorabilia to French citizens online could be investigated by their own government at the request of the French government even though their activities are legal in the US. 9 What types of contract does the speaker identify as relevant to computer professionals? An employment contract between a computer professional and the company that employs him or her, and sales and maintenance contracts between two companies for the design, development or maintenance of a computer system.

32 11.2 Listening E Refer to the model Cornell notes on page 104. 1 Check your answers with the model. 2 Complete the Review and Summary sections of the Cornell notes. ReviewNotes Types of legal factors are: …? Example of government legislation …? Legal factors: e.g., international treaties, government legislation, civil & contract law (a) Privacy legislation in US ‘Big Brother’ fears Privacy Act 1974, govt. only – no commercial systems response to increase in power of computers by mid-1960s & US government databases: tax, military, census, etc. legislation copied by UK Data Protection Act, 1984 unauthorized access & crime UK Computer Misuse Act, 1990

33 11.2 Listening E Refer to the model Cornell notes on page 104. 1 Check your answers with the model. 2 Complete the Review and Summary sections of the Cornell notes. ReviewNotes Types of international computing treaties …? (b) Criminal & copyright/IP Council of Europe Convention on Cybercrime harmonize computer laws between countries countries to investigate crime in other countries different categories of computer crime (c) World Intellectual Property Organization treaties implemented in US as Digital Millennium Copyright Act (DMCA) -- prevents software avoiding DRM protection – controversial, not everybody agrees implemented in EU as European Copyright Directive

34 11.2 Listening E Refer to the model Cornell notes on page 104. 1 Check your answers with the model. 2 Complete the Review and Summary sections of the Cornell notes. ReviewNotes Examples of cybercrime...? (d) Categories of cybercrime, e.g., data crimes theft or modification of data network crimes preventing access or sabotaging access crimes gaining unauthorized access to system, introducing viruses, worms or other malware related crimes fraud, forgery, etc. using computer

35 11.2 Listening E Refer to the model Cornell notes on page 104. 1 Check your answers with the model. 2 Complete the Review and Summary sections of the Cornell notes. ReviewNotes Other legal issues …? (e) Civil / commercial law contract law covers employment and ∵ what computer professionals obliged to do also contracts between companies/professionals where disagreement on quality of product or service civil law individuals can sue for breach of rights (e.g., damages suffered from defective product, invasion of privacy) civil law depends on the country

36 11.2 Listening E Refer to the model Cornell notes on page 104. 1 Check your answers with the model. 2 Complete the Review and Summary sections of the Cornell notes. Summary Computer professionals need to be aware of the three main types of law: national criminal law, international law and national civil law, so that they can ensure that their decisions are lawful. Key areas of national criminal law include privacy and unauthorized use of computers. International law is being updated to create new categories of cybercrime, which involve the misuse of computers for criminal purposes. It also covers areas of copyright and the development of software to overcome copyright protection. Civil and contract law is also important. Employment contracts determine what computer professionals are obliged to do by their employers. Civil law allows individuals to sue where their rights have been affected.

37 11.2 Listening F The lecturer talks about the Digital Millennium Copyright Act. Listen again to part of the lecture. Which words tell us whether the information is fact or opinion? However, some people say that (these laws have ended up protecting only the rights of the copyright holders and ignoring the rights of...) This phrase can be used to give a speaker’s own opinion and as well as an opposing view. The evidence shows that this is especially true (with respect to the US). Sometimes, to put their case strongly, people will present opinions as facts, very strongly stated, with no tentativeness. In my view, (the DMCA... is a case in point).This is clearly the lecturer’s opinion. Whether something is ‘good’ or ‘interesting’ is always a matter of opinion. A very interesting article... gives an extremely good insight (into what...) … actually (motivates these individuals). The lecturer means ‘contrary to what most people think’. Again, the lecturer is stating the case very strongly to persuade the listener.

38 11.2 Listening G Study the phrases in the blue box. Which type of information below follows each phrase in the blue box? Listen to some sentences from the lecture. restatement definite point example summary of a source statement of a topic another point tentative point clarification purpose for speaking 1 Don’t misunderstand me … 2 To some degree … 4 in an attempt to … 3 It is fair to say that … 5 That is to say … 6 To the extent that … 7 Not only that, but …

39 11.2 Listening G Study the phrases in the blue box. Which type of information below follows each phrase in the blue box? Listen to some sentences from the lecture. restatement definite point example summary of a source statement of a topic another point tentative point clarification purpose for speaking 8 … gives a good description of … in … 9 Briefly, (he) explains how … 11 With respect to … 10 (He) has no doubt that … 12 … is a case in point …

40 11.2 Listening H Write out one section of your notes in complete sentences. See Skills bank.

41 A Study the phrases in box a. 11.3 Extending skills 1 Mark the stressed syllables in each phrase. 2 Listen and check your answers. disciplinary action black hat i dentity theft de nial of ser vice software ex ploit social engi neering i llegal ac tivities bulletin board a ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' '

42 A Study the phrases in box a. 11.3 Extending skills 3Which phrases have adjective + noun? Which word has the stronger stress in these phrases? disciplinary action black hat i dentity theft de nial of ser vice software ex ploit social engi neering i llegal ac tivities bulletin board a ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' 3 Adjective + noun (second word has stronger stress): disciplinary action, social engineering, illegal activities (in the context of the lecture, ‘black hat’ has the stress on the adjective, not the noun, as it is being contrasted with the adjective in ‘white hat’ ). ' '

43 11.3 Extending skills B Look at the topics below. companies and the law justifying illegal activities ethical hacking 1 What would you like to know about these topics? 2 Prepare a page in your notebook to make some notes. 3 Listen to the final part of the lecture (Part 3) and make notes. If there is information which you miss, leave a space. 4 Compare your notes with someone else. Fill in any blank spaces.

44 11.3 Extending skills C Answer the questions on the Hadford University handout, using your notes. 1 They are designed to provide guidance in decision-making in areas where there may be differences of opinion. Answers: 2 Show that their decisions were reasonable and within the law as they understood it.

45 11.3 Extending skills C Answer the questions on the Hadford University handout, using your notes. 3 The BBC purchased a botnet for a programme on computer security to show how it could be used for spamming and denial of services. However, accessing or altering data on another person’s computer without their permission is an offence under the 1990 Computer Misuse Act. Answers: 4 Because it was felt that the use of real botnets in the programme had helped more home computer users take their security more seriously.

46 11.3 Extending skills C Answer the questions on the Hadford University handout, using your notes. 5 Where security company employees with high-level computer skills are given the job of trying to break into their clients’ systems in order to test its security. 6 To examine the issues related to ethical hacking: firstly, by looking at legislation and hacking; secondly, by looking at rules and regulations for companies engaging in ethical hacking; and thirdly, by looking at justifications for illegal activities when hacking. Answers:

47 11.3 Extending skills D Study the stages of building an argument (a — f) in box b. 1 Put the stages in an appropriate order. 2 Match each stage with a phrase from box c.

48 11.3 Extending skills D Study the stages of building an argument (a — f) in box b. 1 Put the stages in an appropriate order. 2 Match each stage with a phrase from box c. It’s quite clear that … a giving a counter-argument b giving your opinion d supporting the reason with evidence c stating the issue e rejecting a counter- argument e giving a reason for you opinion But the questions is… Research… has shown that … I’m afraid that just isn’t true … Some computer professionals claim… Evidence to support this…

49 11.3 Extending skills E Look at box b again. 1 Listen to a section from the lecture. Make notes on what the lecturer says for each stage of the argument (a — f). 2 Check your answers to Exercises D and E1. Type of statementPhraseLecturer’s words c stating the issueBut the question is … But the question is, is it enough to follow company rules in order to ensure that decisions are ethical? a giving a counter- argument Some computer professionals claim … Some computer professionals claim that they don’t have to worry about breaking national and international laws … e rejecting a counter-argument I’m afraid that just isn’t true. But I’m afraid that just isn’t true.

50 11.3 Extending skills E Look at box b again. 1 Listen to a section from the lecture. Make notes on what the lecturer says for each stage of the argument (a — f). 2 Check your answers to Exercises D and E1. Type of statementPhraseLecturer’s words b giving your opinion It’s quite clear that … It’s quite clear that companies can and do things which are illegal. f giving a reason for your opinion Research … has shown that... Research into IT companies and the law has shown that there are instances where companies’ actions can be seen as breaking the law. d supporting the reason with evidence Evidence to support this... Evidence to support this comes from actual legal cases.

51 11.3 Extending skills F Use your notes to write 75 — 100 words about the main points in the final part of the lecture.

52 11.3 Extending skills G In groups, discuss the research task set by the lecturer. Talk about these questions: 1 What are the three points in relation to hacking that you will need to consider? 2 Which one will you choose? 3 What ideas do you already have? 4 What kind of information will you need to find? 5 Where can you go to find more information? Report back to the class on your discussion. In Lesson 11.4 you will take part in a seminar on this topic.

53 11.4 Extending skills A Study the terms in box a. 1 Explain the meaning of the terms. 2 Mark the main stress in each term.

54 11.4 Extending skills A Study the terms in box a. 1 Explain the meaning of the terms. 2 Mark the main stress in each term. known software exploit technical legal breach black hat hacker a hacker who gains access to systems for personal gain or in order to damage them a known flaw in a piece of software which allows hackers to take control of it where the law is broken, but the breach is very minor and the case is extremely unlikely to be taken to court ' ' '

55 11.4 Extending skills A Study the terms in box a. 1 Explain the meaning of the terms. 2 Mark the main stress in each term. Internet safety guidance secure equipment disposal password protection policy a policy which sets out how strong passwords can be generated and when they should be changed guidance for avoiding malicious websites, phishing and other types of Internet dangers how to get rid of old equipment in a way which does not compromise security; particularly important for old data disks and other forms of storage ' ' '

56 11.4 Extending skills B Study the words in box b. Match the words in columns 1 and 2 to make phrases.

57 11.4 Extending skills reverseengineering rootaccess successfuloutcome targetsystem unpatchedexploit Where a piece of software is essentially taken to pieces in order to view the original code used to write it, and in this way to reveal any potential flaws. A type of login which gives a user control over the whole machine. A satisfactory end result. B Study the words in box b. Match the words in columns 1 and 2 to make phrases. The system which is the target of the penetration testing. A flaw in the software which allows hackers to take over the machine, which has not had the software company’s patch (or solution to the flaw) applied.

58 11.4 Extending skills clientconsent dataprotection legalsituation penetrationtesting privacylegislation Consent given by client (in this case, to access a system). Laws protecting individual privacy when data is processed. The legal position in a given set of circumstances. B Study the words in box b. Match the words in columns 1 and 2 to make phrases. Carried out by ethical hackers who are paid to test a system’s security.. Laws protecting individual privacy.

59 11.4 Extending skills C Study the InnerWeb Security Consultants intranet web page on the opposite page. 1 What is the purpose of the page? 2 Which guidelines or policies are shown in the pictures 1 — 3? Choose from the services listed.

60 11.4 Extending skills C Study the InnerWeb Security Consultants intranet web page on the opposite page.

61 11.4 Extending skills C Study the InnerWeb Security Consultants intranet web page on the opposite page. 1 What is the purpose of the page? 2 Which guidelines or policies are shown in the pictures 1 — 3? Choose from the services listed. 1 To provide a range of guidance and procedures for security staff working for InnerWeb Security Consultants. 2 1 secure equipment disposal 2 guidelines for memory stick use 3 building entry security Answers:

62 11.4 Extending skills D Study the phrases in box c. 1 When would you use these phrases in a seminar and for what purpose? 2 Which phrases can you use for linking your new point to a contribution by another speaker?

63 11.4 Extending skills D Study the phrases in box c. I’d like to start by explaining … = beginning To carry on from this first point, I want secondly to look at … = maintaining/continuing a point I don’t think that is the main reason. = disagreeing That seems like a very good point X is making. = confirming I’m going to expand the topic by mentioning … = adding a new point to someone else’s previous contribution On the other hand, you might want to say that … = disagreeing

64 11.4 Extending skills D Study the phrases in box c. As well as this issue, we can also look at a very different issue. = adding a new point to someone else’s previous contribution So to sum up, we can say that … = summarizing/concluding Does anybody have any opinions or anything they would like to add? = concluding I think we need a different viewpoint. = disagreeing OK, to continue then … = maintaining/continuing a point Following on from what X has said … = adding a new point to someone else’s previous contribution

65 11.4 Extending skills E Listen to some students taking part in a seminar. They have been asked to discuss ethical hacking and some of the new techniques. While you listen, make a note of: 1 the main topic of each extract 2 further details of each topic Main topicFurther details Extract 1 Extract 2 legal issues company regulation client permission, Computer Misuse Act, keylogging issue, data protection and privacy legislation white hat hackers, crossing line to grey hat, professional code of conduct, legal guidance from company Extract 1 Extract 2

66 11.4 Extending skills E Listen to some students taking part in a seminar. They have been asked to discuss ethical hacking and some of the new techniques. While you listen, make a note of: 1 the main topic of each extract 2 further details of each topic Main topicFurther details Extract 3 Extract 4 hackers not employed reverse engineering come across security breaches, example of Apache, seen as useful contribution to security reverse engineering to find exploits, can be illegal, by making exploit public, have to provide manufacturers’ patch, black hats will use to hack into systems Extract 3 Extract 4

67 11.4 Extending skills F Study the control panel for InnerWeb Security Consultants on the opposite page and discuss these questions. 1 What is the purpose of this panel? 2 What beneficial and harmful purposes could it be used for? 3 What is the purpose of the screenshot control? 4 Which controls have the least ethical implications?

68 11.4 Extending skills F Study the control panel for InnerWeb Security Consultants on the opposite page and discuss these questions. 1 What is the purpose of this panel? 2 What beneficial and harmful purposes could it be used for? 3 What is the purpose of the screenshot control? 4 Which controls have the least ethical implications? 1 To monitor what employees are doing with their computers. Answers: 2 Accept any reasonable answers. Examples of benefits are protecting the company from harm, and preventing employees from wasting company time. Examples of harmful purposes would include invasion of employees’ privacy, and blocking them from useful and harmless sites. 3 To provide evidence of what a user was looking at, at a specific time. 4 Accept any reasonable answers. All relate to ethical issues to some degree.

69 11.4 Extending skills G Discuss your research findings on ethical hacking with your group. One person from the group should report the conclusions of the discussion to the class.

70 Tips for Reference 11.1 Vocabulary 部分,学生课前完成练习 A 、 C 、 D 、 E ,教师课堂结合 Vocabulary bank 中 “Linking words” 的技能,完成练习 B 。课堂检查练习 D 的完成情况,并结合 Vocabulary bank 中的 “Using words with similar meanings to refer back in a text” 技能 ,讲解练习 D 中的第 4 小题。 11.2 Listening 部分,顺次完成练习 A 、 B 、 C 、 D 、 E, 复习 “Making the most of lectures” 和 “Using the Cornell note-taking system” 技能。教师课堂讲解 Skills bank 中的 “Writing out notes in full” 技能。练习 F 、 G 、 H 留作课后练习。 11.3 Extending skills 部分,顺次完成练习 A 、 B 、 C 。教师课堂结合 Skills bank 中 “Building an argument” 的技能,完成练习 D 、 E 。课堂讨论完成练习 G 。 练习 F 留作课后练习。 11.4 Extending skills 部分,学生课前完成练习 A 、 B 、 C 。课堂讨论完成练习 D 、 E 、 F 、 G 。

71 谢谢欣赏!


Download ppt "Unit 11 Computing and Ethics. Skills focus Listening recognizing the speaker’s stance writing up notes in full Speaking building an argument in a seminar."

Similar presentations


Ads by Google