ICT CAPABILITY APPLYING SOCIAL AND ETHICAL PROTOCOLS AND PRACTICES WHEN USING ICT Typically by the end of Prep, students Typically by the end of Year 2,

Slides:



Advertisements
Similar presentations
Integrating the NASP Practice Model Into Presentations: Resource Slides Referencing the NASP Practice Model in professional development presentations helps.
Advertisements

Chapter 6 Negotiating access and research ethics
Hart District Acceptable Use Policy Acceptable Use Policy.
They’re Computer Savvy, Right? Well, Maybe…
Level 2 Cambridge Nationals in ICT. ICT Pathway 3hrs a week Two routes you can take one being Cambridge Nationals and the other being GCSE Computing You.
BUSINESS B2 Ethics.
Chapter 2. Understanding Ethical and Legal Considerations © 2004 by Bedford/St. Martin's1 Four Bodies of Law Relevant to Technical Communication Copyright.
Computer Literacy and ICT Engineers 橋本 義平 Hashimoto Yoshihei (情報工学)
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
COMP427 Business Ethics. Objectives 1.To understand ethics and why its important in ways that are consistent with a code of principles. 2.Understand why.
Chapter 1 An Overview of Ethics
ICT Ethics 2 ICT 139.
JCSD-aw Citizenship in an e-World Johnston Community School District.
Chapter 29 Ethics in Accounting
ICAICT202A - Work and communicate effectively in an IT environment
Information and communication technology (ICT) capability Australian Curriculum, F10.
PROTECTION OF CONSUMER & PROPERTY RIGHTS CE.13E. Question What is the role of the United States government in protecting consumer rights and property.
Outcomes Understand the way in which the Australian Curriculum has been structured in these learning areas Spend time familiarising themselves with the.
UNIT 2: CONTEXT. Chapter 3: Ethics & Social Responsibility.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
Graduate Attributes Jackie Campbell, Laura Dean, Mark de Groot, David Killick, Jill Taylor.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
21st Century Skills Initiatives
5.02 PowerPoint Objective 5.02 Understand ethics and ethical decision-making.
What makes Clinical Research Ethical? Dr Enoka Corea Co-secretary, ERC Faculty of Medicine, Colombo.
What is participation? How would you describe what it is to participate? How does it make you feel when you get to participate?
The Legal, Safe and Ethical Use of Technology in the Classroom Gabriella Wheeler s
Por Guan Xiong PROJECT OBJECTIVES To develop a sense of ‘keNegaraan’, collaboration, responsibility and ownership to the communities during.
Rights, Safety, & Security.  What rights do you have in a “digital” society?  Digital rights are freedoms extended to every student, administrator,
Digital Media Literacy Short Course Consultation.
CiTiZEN Group Member: Chew Swee Guan Goh Si Hui
Social and Professional Issues in IT Roshan Chitrakar.
ETHICS and COMPUTERS An Overview 23/04/2017.
A Framework for Developing and Understanding Digital Competence in Europe Barbara Brecko Yves Punie EC JRC IPTS.
The World Around Us and the Media Integrating ICT.
Ethics.
Chapter 2. Understanding Ethical and Legal Considerations © 2012 by Bedford/St. Martin's1 What is ethics? Ethics is the study of the principles of conduct.
Internet & for Learning The ICT in Schools Initiative of the Department of Education and Science 1 Internet & For Learning Objectives - Modules.
1 Ethical Issues in the Care of PLHIV HAIVN Harvard Medical School AIDS Initiatives in Vietnam.
Chapter 3: Ethical Behaviour and Social Responsibility  Ethics  Code of moral principles that sets standards of good or bad, or right or wrong, in one’s.
2 Digital Citizenship
International Business, 8th Edition
General Capabilities. Personal and Social Capability.
Describe the potential of IT to improve internal and external communications By Jim Green.
TRAINING COURSE. Course Objectives 1.Know how to handle a suspected case 2.Know how to care for a recognized trafficked person referred to you Session.
? Moral principles of right and wrong Used by individuals/organisations To guide behaviour.
Computer Ethics 4 4 Chapter.  Ethics Pertaining to right or wrong in conduct  Ethical In accordance with the rules or standards for right conduct or.
Understanding the Potential of IT
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
First week. Catalog Description This course explores basic cultural, social, legal, and ethical issues inherent in the discipline of computing. Students.
 Manners with electronics  Safety online  “Netiquette”
Able to transfer and adapt their skills Able to understand the consequences of their actions Able to use software and devices efficiently Responsible.
International Business Strategy LON301BUS Stakeholder Power and Ethics Unit: 6 Knowledgecast:2.
PDA IN APPLICATIONS OF ICT IN LIBRARIES Levels 7 & 8.
Exploring the Personal and Social Capability for Secondary schools.
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
Information Security Program
Chapter 6 Negotiating access and research ethics
Overview: Exam board is Edexcel
Chapter 6 Negotiating access and research ethics
Parenting Unit 3 Parenting Skills.
Edexcel GCSE ICT ASSESSMENT INFORMATION
Research Ethics Matthew Billington
Learning Area 1 Information And Communication Technology and Society
Chapter 6 Negotiating access and research ethics
Understand ethics and ethical decision-making.
Chapter 6 Negotiating access and research ethics
Understand ethics and ethical decision-making.
Social Responsibility and Business Ethics
CEng progression through the IOM3
Presentation transcript:

ICT CAPABILITY APPLYING SOCIAL AND ETHICAL PROTOCOLS AND PRACTICES WHEN USING ICT Typically by the end of Prep, students Typically by the end of Year 2, students Typically by the end of Year 4, students Typically by the end of Year 6, students Typically by the end of Year 8, students Typically by the end of Year 10, students Recognise intellectual property recognise ownership over their own digital work recognise ownership of digital products that others produce and that what they create or provide can be used or misused by others acknowledge when they use digital products created by someone else, and start to indicate the source identify the legal obligations regarding the ownership and use of digital products and apply some referencing conventions apply practices that comply with legal obligations regarding the ownership and use of digital products resources identify and describe ethical dilemmas and consciously apply practices that protect intellectual property Apply digital information security practices follow class rules about using digital information follow class rules about applying selected standard guidelines and techniques to secure digital information independently apply standard guidelines and techniques for particular digital systems to secure digital information independently apply strategies for determining and protecting the security of digital information and assess the risks associated with online environments independently apply strategies for determining the appropriate type of digital information suited to the location of storage and adequate security for online environments use a range of strategies for securing and protecting information, assess the risks associated with online environments and establish appropriate security strategies and codes of conduct Apply personal security protocols follow class rules when sharing personal information with known audiences and demonstrate an awareness of applying social protocols when using ICT to communicate follow class guidelines when sharing personal information and apply basic social protocols when using ICT to communicate with known audiences apply standard guidelines and take action to avoid the common dangers to personal security when using ICT and apply appropriate basic social protocols when using ICT to communicate with unknown audiences identify the risks to identity, privacy and emotional safety for themselves when using ICT and apply generally accepted social protocols when sharing information in online environments, taking into account different social and cultural contexts identify and value the rights to identity, privacy and emotional safety for themselves and others when using ICT and apply generally accepted social protocols when using ICT to collaborate with local and global communities independently apply appropriate strategies to protect rights, identity, privacy and emotional safety of others when using ICT, and discriminate between protocols suitable for different communication tools when collaborating with local and global communities Identify the Impacts of ICT in society identify how they use ICT in multiple ways on multiple devices identify how ICT is used at home and at school identify the value and role of ICT use at home and school explain the main uses of ICT at school, home and in the local community, and recognise its potential positive and negative impacts on their lives explain the benefits and risks of the use of ICT for particular people in work and home environments assess the impact of ICT in the workplace and in society, and speculate on its role in the future and how they can influence its use

acknowledge when they use digital products created by someone else, and start to indicate the source recognise ownership over their own digital work apply practices that comply with legal obligations regarding the ownership and use of digital products resources follow class rules about applying selected standard guidelines and techniques to secure digital information independently apply strategies for determining and protecting the security of digital information and assess the risks associated with online environments use a range of strategies for securing and protecting information, assess the risks associated with online environments and establish appropriate security strategies and codes of conduct follow class rules when sharing personal information with known audiences and demonstrate an awareness of applying social protocols when using ICT to communicate apply standard guidelines and take action to avoid the common dangers to personal security when using ICT and apply appropriate basic social protocols when using ICT to communicate with unknown audiences identify and value the rights to identity, privacy and emotional safety for themselves and others when using ICT and apply generally accepted social protocols when using ICT to collaborate with local and global communities identify how ICT is used at home and at school explain the main uses of ICT at school, home and in the local community, and recognise its potential positive and negative impacts on their lives assess the impact of ICT in the workplace and in society, and speculate on its role in the future and how they can influence its use