Objective Day 1 The student will analyze ethics in relations to computer use and occupational use. (plagiarism)

Slides:



Advertisements
Similar presentations
Objective Day 1 The student will recognize computer safety rules and analyze computer ethics in relations to computer use and occupational use. (plagiarism)
Advertisements

Music, like writing, can be plagiarized. G-Dragon was accused of illegally copying from American artist Flo-Rida You Decide.
Documenting Sources Defining & preventing plagiarism Using Direct Quotes Paraphrasing.
An Introduction of Multimedia Etiquette Nicole Huang.
Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Plagiarism Friday, May 15, 2015 MJISMAIL1. What is plagiarism anyway ? PLEASE WATCH 5eFeJMplA MJISMAIL2.
Is it Plagiarism? You read: “Nineteen percent of full-time freshmen say they spend only 1 to 5 hours per week preparing for classes…” From: Young, Jeffrey.
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
For Students. What is Copyright? “The exclusive right to produce or reproduce (copy), to perform in public, or to publish an original literary or artistic.
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
Computer Ethics – The Ten Commandments
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Plagiarism. Plagiarizing, according to the Merriam-Webster Dictionary, is “to steal and pass off (the ideas or words of another) as one's own : use (another's.
Computer ethics.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Computer Ethics.
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Roman Legacy Project. Quick Guidelines Slide 1 Introductory Page Slides 2-5Answer the guiding questions Slide 6Work Cited.
Plagiarism and Academic Integrity 'Always Do the RIGHT Thing'
Computer Ethics for Computer Users
Objective Day 1 The student will analyze computer ethics in relations to computer use and occupational use. (plagiarism)
Computer Ethics Christina McCorkle.
What is it? How do I avoid it?
COMPUTER ETHICS Do you know the difference between right and wrong?
Beth Sanderson University of Washington Libraries, Bothell © Lawrence Snyder 2004 Computer / Information / Internet Ethics.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing.

Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Day 1-Monday Week 6 OBJ. & BELLWORK Sept. 16th OBJECTIVE(S)-TSW ICT13.c. Review "appropriate use" policies related to telecommunications ICTI3.1 - Explain.
Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.
Ethics, Computing, and the Internet
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
Computer Crimes Career & Technology Education Department.
Day 1-Sept. 10 th OBJ. & BELLWORK OBJECTIVE(S)-TSW IDENTIFY DIFFERENT TYPES OF SOFTWARE TSW MAKE COMPLEX CHOICES WITH INFO. TECHNOLOGY AND PEOPLE WITH.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Computer Ethics CSCI 101 Kara kelly. Ethics Ethics can be defined as a discipline in which one attempts to identify, organize, analyze, and justify human.
Ethics Business Law Sunny Hills High School Mrs. Larsen.
ICS131 – Ethics 11/17/03. IEEE-CS and ACM 1.PUBLIC - Software engineers shall act consistently with the public.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
Plagiarism English 9 September 3, 2015 Mr. Pettine.
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
The History of Computers Hardware, Software, Programs, Computers Safety Tips, and Computer Ethics.
Plagiarism, Copyright, Fair Use and Intellectual Property.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
1. Is it Plagiarism? You read: “Nineteen percent of full-time freshmen say they spend only 1 to 5 hours per week preparing for classes…” From: Young, Jeffrey.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Q1 A) What are the skills needed by systems analyst? The skills needed by systems analyst:  Working knowledge of information technology.  Computer programming.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
What is Plagiarism and How Can You Avoid It?.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Internet Etiquette or Netiquette
Is it Plagiarism? You write: You read:
Internet Etiquette or Netiquette
Is it Plagiarism? You write: You read:
Plagiarism It’s a crime!.
PLAGIARISM AND COPYRIGHT
Is it Plagiarism? You write: You read:
Presentation transcript:

Objective Day 1 The student will analyze ethics in relations to computer use and occupational use. (plagiarism)

GO TO school/story.php?title=computer- ethics-quiz

Bell Work Day Monday What is Computer Ethic? (Use the Internet Google search)

Monday Vocabulary CREATE SENTENCE epigram—A witty saying MCT2 Word Evaluate—to judge

Is it Plagiarism? You read: "Students are studying about one-third as much as faculty say they ought to, to do well," said George D. Kuh, director of the survey and a professor of higher education at Indiana University at Bloomington. From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002 You write: Most students spend about one-third as much time studying as faculty say they should. Yes! You must credit your source if you paraphrase text.

What is Plagiarism? Plagiarism is using words or ideas of another as one's own words. How to avoid plagiarism? Every direct quotation must be identified by quotation marks and must be properly cited (Give the Source)

Is it Plagiarism? You read: “Nineteen percent of full-time freshmen say they spend only 1 to 5 hours per week preparing for classes…” From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002. You write: Nineteen percent of full- time freshmen say they spend only 1 to 5 hours per week preparing for classes. YES! You need to use quotes and to cite your source

Is it Plagiarism? You read : "Students are studying about one- third as much as faculty say they ought to, to do well," said George D. Kuh, director of the survey and a professor of higher education at Indiana University at Bloomington. From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002 You write : According to George D. Kuh, Indiana University at Bloomington, students study about one-third of the time that is expected by faculty. (Young, 2002) No. As long as you have included the Young article in your reference list, you have properly cited your source.

Is it Plagiarism? You read : “The tip given most consistently by professors and college officials is that students should simply do their homework. The most commonly prescribed amount is at least two hours of class preparation for every hour spent in the classroom…” From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002 You write : College students should do their homework. No. Commonly known facts or ideas do not have to be cited. (Can you find this information in at least five sources?)

Is it Plagiarism? Yes! You need to credit the source of images and other media as well as text. Gray wolf (Canis lupus). © Jeff Lepore/Photo Researchers Wolf. Encyclopædia Britannica. Retrieved March 31, 2004, from Encyclopædia Britannica Online. Should we or shouldn’t we protect the gray wolf? By Ima Lamb Eng 110 Apr. 1, 2004 You find : Your title page :

Is it Plagiarism? When in doubt, cite it!

10 COMMANDMENTS OF COMPUTER ETHICS THOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLETHOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLE THOU SHALT NOT INTERFERE WITH OTHER PEOPLE COMPUTER WORKTHOU SHALT NOT INTERFERE WITH OTHER PEOPLE COMPUTER WORK THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE’S FILES.THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE’S FILES. THOU SHALT NOT USE A COMPUTER TO STEAL.THOU SHALT NOT USE A COMPUTER TO STEAL. THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS.THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS.

10 COMMANDMENTS OF COMPUTER ETHICS THOU SHALL NOT USE OR COPY SOFTWARE FOR WHICH YOU HAVE NOT PAID. 6.  THOU SHALL NOT USE OR COPY SOFTWARE FOR WHICH YOU HAVE NOT PAID.  7. THOU SHALT NOT USE OTHER PEOPLE ‘S COMPUTER RESOURCES WITHOUT AUTHORIZATION.  8. THOU SHALT NOT APPROPRIATE OTHER PEOPLE’S INTELLECTUAL OUTPUT.  9. THOU SHALT THINK ABOUT THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU WRITE.  10. THOU SHALT USE A COMPUTER IN WAYS THAT SHOW CONSIDERATION AND RESPECT.

OBJECTIVE: The student will identify ways to safeguard against viruses. PREBELL DAY 2 EXPLAIN THIS COMPUTER ETHIC “Thou shall not use a computer to harm other people”

Vocabulary Words Create a Sentence with each word Homage- respectful deference MCT2 Word— formulate- Create

Day 3-OBJECTIVE: The student will identify ways to safeguard against viruses PREBELL-DAY 3 EXPLAIN THE PURPOSE OF USING THE INTERNET

Vocabulary Words Day 3 Create sentence with each word nimble —moving quickly and lightly “as nimble as a deer” or “nimble fingers” MCT2 Word Describe —tell all about it

Way to safeguard your computer from viruses, etc. 1. Do not open that you don't know 2. Do not open Advertisements 3. Do Not open Face Book Ads 4. Downloading free games, movies, free music—Internet abuse

DAY 4 OBJECTIVE: THE STUDENT WILL IDENTIFY HOW TO USE THE INTERNET SAFELY PREBELL QUESTION-DAY 4 DESCRIBE TWO PRECAUTIONS WHEN USING THE INTERNET SAFELY. DOK2-PLD-PROF. CREATE SENTENCES: VOC. WORDS-SUSIDE: TO WEAR OFF OR DIE DOWN. MCT2 WORD-INFER READ BETWEEN THE LINES

DAY 5 OBJECTIVE: The student will demonstrate their strengths & weaknesses on Computer Ethics DOK 2-PLD-P Friday Pre Bell Questions—What is the difference between uploading information and downloading information to your computer