Presentation on theme: "Cyberethics and YOUR Classroom Teaching kids what they THINK they know, but really don’t."— Presentation transcript:
Cyberethics and YOUR Classroom Teaching kids what they THINK they know, but really don’t.
April 29, 2006Linda Newell2 Pre-presentation Q & A ► I► I► I► Isn’t this what we have a computer teacher for? ► H► H► H► How much trouble can we get into with only ONE computer in the classroom? ► A► A► A► Are you giving bathroom breaks? ► W► W► W► We’re not really responsible for this, are we? ► W► W► W► Will you avoid technocratic English please?
April 29, 2006Linda Newell3 Pre-presentation Q & A ► Yes and no ► Quite a bit ► No ► Yep ► I will try
April 29, 2006Linda Newell4 To recap…(knowledge base) ► definition of ethics branch of philosophy ethical action ► how taught home church school that’s us!
April 29, 2006Linda Newell5 ETHICAL ACTION does not have a damaging impact upon: oneself other people society
April 29, 2006Linda Newell6 So how, you ask, how is computer ethics different?
April 29, 2006Linda Newell7 isteNETS IV. SOCIAL, ETHICAL, LEGAL, AND HUMAN ISSUES. Teachers understand the social, ethical, legal, and human issues surrounding the use of technology in PK-12 schools and apply those principles in practice. Teachers: A. model and teach legal and ethical practice related to technology use. B. apply technology resources to enable and empower learners with diverse backgrounds, characteristics, and abilities. C. identify and use technology resources that affirm diversity D. promote safe and healthy use of technology resources. E. facilitate equitable access to technology resources for all students.
April 29, 2006Linda Newell8 Change of viewpoint ► i► i► i► intangible, virtual world ≠ real world aaaactions are viewed as less serious ► l► l► l► low-risk, game-like challenge ““““fingerprints” and “footprints” less detectable ► l► l► l► less physical risk ► i► i► i► improprieties “disappear”
April 29, 2006Linda Newell9 18 % K - 12 53% 8-18 Learned ethics in school Download media files illegally 1/3
April 29, 2006Linda Newell10 beginning at the Beginning…
April 29, 2006Linda Newell12 http://disney.go.com/cybersafety/tips.html
April 29, 2006Linda Newell13 http://disney.go.com/cybersafety/tips.html
April 29, 2006Linda Newell14 10 Commandments of Computer Ethics (Computer Ethics Institute) TSN use a computer to harm other people. TSN interfere with other’s computer work. TSN snoop around in other’s computer files. TSN use a computer to steal. TSN use a computer to bear false witness.
April 29, 2006Linda Newell15 10 Commandments of Computer Ethics (Computer Ethics Institute) TSN copy or use software for which you have not paid. TSN use other’s computer resources without permission. TSN appropriate other’s intellectual output. TSN ignore the social consequences of technology creation. TSN forget to be considerate and respectful when using technology.
April 29, 2006Linda Newell16 Headlines… ► Student charged for death threat against teacher considers teacher a friend – was something to do ► Teens accused of hacking school shrink’s computer learned psychologist’s password installed software transferred files to his home computer – tampering charges: trespass, tampering, unauthorized use up to 4 years if convicted
April 29, 2006Linda Newell17 And then there is Reid… ► 1► 1► 1► 15 years old ► 4► 4► 4► 4.0 GPA ► 2► 2► 2► 200 milliseconds & 3 hacking programs to break into school’s computers ► c► c► c► changed his GPA to a 1.9 ► r► r► r► received an A+ from impressed school administrators ► p► p► p► part of exhibition requirements ► m► m► m► made it easy to undo changes ► s► s► s► school fixing changes ► w► w► w► wants to go to MIT (Legon, 2002)
April 29, 2006Linda Newell18 Can you give me a jumpstart?
April 29, 2006Linda Newell19 Conversation starters ► steal book v. steal program ► copy another’s work v. cut and paste ► steal keys v. steal passwords ► sexually explicit magazine v. sexually explicit web site v. sexually explicit web site ► eavesdropping on conversations v. “overlooking” on someone’s screen v. “overlooking” on someone’s screen ► comments/threats face to face v. comments/threats over the Internet comments/threats over the Internet ► vandalism of physical property v. property that cannot be held (erasure, viruses, alterations, etc.) that cannot be held (erasure, viruses, alterations, etc.)
April 29, 2006Linda Newell20 HELP?!?!? (strategy slide) ;) ► Elementary Older students (4-6 th ) can create a puppet show ► will have to research in order to present ► include raps/songs ► possible claymation and/or movie using stills taken from digital camera Younger students (K-3) can write stories ► to be shared the next day ► name is scratched through and a fictitious one substituted ► discussion on taking false credit and stealing another’s ideas ► discuss consequences and parallels
April 29, 2006Linda Newell21 HELP?!?!? (yes, there is more!) ► Middle school Movie – War Games ► pre-movie activities ► rank actions on continuum of most to least harmful ► consequences of computer crimes Webquest: http://www.wmms.net/walters/webquests/ computer_crime1.htm http://www.wmms.net/walters/webquests/ computer_crime1.htmhttp://www.wmms.net/walters/webquests/ computer_crime1.htm set up database (spreadsheet) ► each student enters personal info (name, address, age, etc.) ► to be printed out and “shared” the next day ► teacher makes changes to each student’s information ► discussion of information tampering and feelings
April 29, 2006Linda Newell22 HELP?!?!? (there is still more…) ► High School (I didn’t forget you!) Code of Responsible Computing ► introduce concepts and define ► tie to relevant legal and historical information Bill of Rights Supreme Court decisions Mock trial ► discuss legal concepts (beliefs and procedures) ► students assume roles (attorneys, judge, plaintiff, witnesses, defendant, jury foreman, jury, etc.) witnesses, defendant, jury foreman, jury, etc.) ► research positions ► after verdict, debate case and issues Conduct school-wide awareness campaign ► develop posters ► conduct video survey ► speaker or panel to address issues
April 29, 2006Linda Newell24 HELP?!?!? (okay, but this is IT! p. 2 ) ► Define the Line www.defineline.com www.defineline.com ► Allies and Aliens http://www.mediaawareness.ca/ english/games/allies_aliens/index.cfm http://www.mediaawareness.ca/ english/games/allies_aliens/index.cfm http://www.mediaawareness.ca/ english/games/allies_aliens/index.cfm ► Are you a good CyberCitizen? http://www.newseum.org/ http://www.newseum.org/ ► Internet Safety Game (ethics too) http://www.kidscomjr.com/games/safety/ safety.html ► Core Rules of Netiquette (interactive quiz) http://www.albion.com/netiquette/corerules.html
Linda Newell 25 April 29, 2015April 29, 2015April 29, 2015 Making an impression… http://www.itc.virginia.edu/pubs/docs/RespComp/videoshttp://www.itc.virginia.edu/pubs/docs/RespComp/videos /
April 29, 2006Linda Newell26 Counter-ethic (hacker/cracker) ► all information especially digital free and available ► breaking and entering helpful their own fault ► knowledge acquisition form of learning is harmless ► watch-dog government business
April 29, 2006Linda Newell27 copyRIGHT or copyWRONG
April 29, 2006Linda Newell28 Copyright ≠ the right to copy most youth (8-18) are: ► aware that digital media is copyrighted 91% - books 88% - movies 88% - music 83% - games 64% - web sites ► aware of illegal downloads 53% - music 32% - games 22% - commercial software 17% - movies
April 29, 2006Linda Newell29 Copyright ≠ the right to copy ► upload software to the Internet 3 out of 10 – unsure it is okay without paying 1/3 – sure it is okay teens feel the strongest ► acceptable 3 out of 10 – music, movies, and games 42% - unsure about law teens – more likely aware of law ► concerns 60% - virus 50% - law 43% - spyware 29% - wrong
April 29, 2006Linda Newell30 Target understandings… ► d► d► d► designed to protect financial interests of originator(s) rrrrewards = incentive eeeensures supply of creative works ► m► m► m► most materials are protected ccccreator owns it ppppermission to use ► f► f► f► find and ask
April 29, 2006Linda Newell31 Responsibilities… ► Briana LaHara 12 years old 1,000 songs via Kaaza in first group to settle with RIAA $2 per song "It's not like we were doing anything illegal," said Torres [her mother]. "This is a 12-year-old girl, for crying out loud." (Johnston/NY Daily News, 2003)
April 29, 2006Linda Newell32 Responsibilities… ► Chi Hi prom Chippewa Falls High School 500 burned CDs (3 songs) used home equipment did not seek permission school officials were proactive junior class advisors were “mislead” by ad Columbia Records declined to sue (Chippewa Falls Area United School District, 2006)
April 29, 2006Linda Newell33 Liabilities – Student as actor ► contributory infringement student parent (legally responsible) teacher (aware) ► vicarious infringement teacher (not aware) librarian (if applicable) administrator(s) school district school board
April 29, 2006Linda Newell36 Tips for Success! ► d► d► d► draw parallels ► i► i► i► involvement in setting rules ► i► i► i► involvement in setting consequences ► m► m► m► mistakes rather than “crimes” ► w► w► w► work in pairs ► t► t► t► teachable moments ► t► t► t► teacher as model ► e► e► e► expectations
April 29, 2006Linda Newell37 Sources CBSNewyork.com. (2004, June 30). Teens accused of hacking shrink’s computer. Retrieved April 29, 2006, from: http://tinyurl.com/qjbm4http://tinyurl.com/qjbm4 Chippewa Falls Area United School District. (2006). Photograph of Chippewa Falls Senior High School. Retrieved April 29, 2006, from: http://cfsd.chipfalls.k12.wi.us/ http://cfsd.chipfalls.k12.wi.us/ CNN.com. (2004, February 18). 12-year old settles music swap lawsuit. Retrieved April 26, 2006, from: http://www.cnn.com/2003/TECH/internet/09/09/music.swap.settlement/ http://www.cnn.com/2003/TECH/internet/09/09/music.swap.settlement/ Disneyonline.com. (n.d.). Cyber Netiquette. Retrieved April 28, 2006, from: http://disney.go.com/cybersafety/tips.html http://disney.go.com/cybersafety/tips.html Hage, J. (2004). School settles CD flap. Retrieved April 29, 2006, from the www.chippewa.com Web site: http://www.chippewa.com/articles/2004/05/15/news/news2.txt http://www.chippewa.com/articles/2004/05/15/news/news2.txt
April 29, 2006Linda Newell38 Sources Information Technology and Communication. (2005, September 28). When I go to U.Va…. Retrieved April 26, 2006, from the University of Virginia Web site: http://www.itc.virginia.edu/pubs/docs/RespComp/videos/ http://www.itc.virginia.edu/pubs/docs/RespComp/videos/ Jackson, S. and Mayster, D. (n.d.). Fact sheet: The cyber frontier and children. Retrieved from the Business Software Alliance Web site: http://www.playitcybersafe.com/pdfs/cyberfrontier-children.pdf http://www.playitcybersafe.com/pdfs/cyberfrontier-children.pdf Johnson, D. (2004). Teaching students right from wrong in the digital age. Retrieved April 26, 2006, from: http://www.doug-johnson.com/handouts/ethics.pdf http://www.doug-johnson.com/handouts/ethics.pdf Johnston/New York Daily News. (2003, September 9). Photograph of Briana LaHara. Retrieved April 29, 2006, from: http://www.nydailynews.com/front/story/116117p-104761c.html
April 29, 2006Linda Newell39 Sources Lystra, T. (2006, April 13). Student charged for death threat. Corvallis Gazette Times. Retrieved April 29, 2006, from: http://www.gazettetimes.com/articles/2006/04/14/news/community/ fri02.txt http://www.gazettetimes.com/articles/2006/04/14/news/community/ fri02.txt http://www.gazettetimes.com/articles/2006/04/14/news/community/ fri02.txt Snyder, M. (2005, March). Pirates of the classroom. Scholastic Instructor. Retrieved April 26, 2006, from the Scholastic Librarians Web site: http://www.scholastic.com/librarians/tech/pirates.htm http://www.scholastic.com/librarians/tech/pirates.htm Starr, L. (2005). Tools for teaching cyber ethics. Retrieved April 28, 2006, from the Education World Web site: http://www.educationworld.com/a_tech/tech/tech055.shtml http://www.educationworld.com/a_tech/tech/tech055.shtml Starr, L. (2004, December 17). District liability and teaching responsibility: Part 5 of an Education World series on copyright and fair use. Retrieved April 28, 2006, from the Education World Web site: http://www.educationworld.com/a_curr/curr280e.shtml http://www.educationworld.com/a_curr/curr280e.shtml
April 29, 2006Linda Newell40 Sources Legon, J. (2002, December 18). Student gets ‘A’ for hacking school computer. Retrieved from the CNN.com/Technology Web site: http://archives.cnn.com/2002/TECH/internet/12/17/student.hack/ http://archives.cnn.com/2002/TECH/internet/12/17/student.hack/ Teaching and Learning with Technology. (2003). TEACH Act frequently asked questions. Retrieved April 29, 2006, from the Pennsylvania State University Web site: http://tlt.its.psu.edu/dmd/teachact/teachactFAQ.html http://tlt.its.psu.edu/dmd/teachact/teachactFAQ.html