Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.

Slides:



Advertisements
Similar presentations
for 6th grade Technology
Advertisements

Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Technology and Ethics Joel Price. Lenses The first lens is as a technology user. The second lens is as an educator. The third lens is as a writer.
Adapted by Melinda Buterbaugh Teacher Librarian.  Be polite when you are sending messages to people.  Treat other people the way you would like to be.
An Introduction of Multimedia Etiquette Nicole Huang.
COMPUTER Protection & PRIVACY ISSUES Selected examples using concepts from Computer Concepts by Pusins & Ambrose, South-Western Education Division, 2001.
1 Presented by Ahmad Bahaitham Mohammad Felemban.
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Objective Day 1 The student will analyze ethics in relations to computer use and occupational use. (plagiarism)
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
JCSD-aw Citizenship in an e-World Johnston Community School District.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Computer Ethics – The Ten Commandments
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Computer ethics.
By Adam, Rachelgail & Kayla. What is internet Ethics? They are principles and guidelines to be applied whilst using the internet. Codes of ethics have.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Digital Citizenship By Bhavna. Plagiarism Plagiarism is illegal and can get you arrested. If a teacher finds out you used plagiarism he/she can fail you.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Computer Ethics.
Computer Ethics for Computer Users
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
COMPUTER ETHICS Do you know the difference between right and wrong?
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Cyber Bullying By Mrs. Giambri. What is Cyber Bullying? What is Cyber Bullying? ( What is Cyber Bullying? Cyber bullying.
Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.
Ethics, Computing, and the Internet
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
Computer Crimes Career & Technology Education Department.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Computer Ethics CSCI 101 Kara kelly. Ethics Ethics can be defined as a discipline in which one attempts to identify, organize, analyze, and justify human.
Ethics. Ethics are the principles and standards we use to decide how to act.
Ethics Business Law Sunny Hills High School Mrs. Larsen.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
Seminar in Interactive Advertising Seminar Notes for Topic: “Examining Socio-Cultural Issues” Department of Advertising College of Communication The University.
Netiquette INFORMATION TECHNOLOGY AND ACQUIRING INFORMATION (JÄRVELÄ, RITVA-LIISA)
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
The History of Computers Hardware, Software, Programs, Computers Safety Tips, and Computer Ethics.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
Digital access is the equal chance for every country to be able access digital technology. Every person in the world should be able to have access to.
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
Keeping it safe on the internet
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Q1 A) What are the skills needed by systems analyst? The skills needed by systems analyst:  Working knowledge of information technology.  Computer programming.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Computer Ethics IT Fundamentals Battlefield High School.
Internet Etiquette or Netiquette
Computers Are Your Future Twelfth Edition
Internet Etiquette or Netiquette
Ethical Uses of Computer
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Internet Etiquette or Netiquette
Ethics & Privacy CSCI 101.
Presentation transcript:

Ten Commandments of Cyber Ethics

I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people the way you would like to be treated. Think before you hit the “send” command. The things you text or could hurt someone.

II. Thou shalt not interfere with other people’s computer work If someone forgets to log out, log out for them. Leave other people’s files alone. Treat other people the way you would like to be treated.

III. Thou shalt not snoop around in other people’s files Be careful to “log out” of sites you have signed into. Be a good Cyber Citizen: If someone forgets to log out, log out for them.

IV. Thou shalt not use a computer to steal Illegal gambling and fraud are examples of using a computer to steal. Using your computer as place to store illegal or stolen information is wrong. Using or texting to plan crimes is wrong.

V. Thou shalt not use a computer to bear false witness “False witness” means telling lies about people. Be considerate of other people’s feelings. Don’t spread rumors.

VI. Thou shalt not use or copy software for which you have not paid “Software” is a term for computer programs. Software allows you to do things on the computer. Examples are video games, media players like iTunes, and word processing programs like MS Word. “Open source” and “shareware” are free and OK to use.

VII. Thou shalt not use other people’s computer resources without authorization “Authorization” means permission. “Computer resources” are people’s hardware (the computer) and software (the programs). If it’s not yours, ASK first.

VIII. Thou shalt not appropriate other people’s intellectual output “Intellectual output” can be books, artwork, music, films, magazine articles, video games. “Appropriate” means copying other people’s work and passing it off as your own. If you do use someone else’s work, cite your source. I will cite my sources for this lesson at the very end.

IX. Thou shalt think about the social consequences of the program you write If you create a computer program that helps others steal or do anything against the law, you have done wrong. Hacking is wrong. Examples of hacking are shutting down or defacing web sites and creating and sending viruses.

X. Thou shalt use a computer in ways that show consideration and respect The computer is a wonderful tool. There are lots of positive ways to use a computer. Can you think of some?

Works Cited “Ten Commandments of Cyber Ethics.” The Cyber Citizen Partnership. 10 Jun ments.html ments.html “What Is Cyber Crime?” The Cyber Citizen Partnership. 10 Jun e.html e.html