Teaching Hacker Ethics with a Common Curriculum for “Information Ethics” H2K2 Presentation July 12, 2002 Greg Newby

Slides:



Advertisements
Similar presentations
Applying a match to the embers Developing design process skills through exploration Anna Hiley July 2006 The way that the exercises were laid out would.
Advertisements

Curriculum Review Steering Group Presentation Engagement with disciplines and promoting a sense of belonging in our students Dr Derek Scott School of Medical.
They’re Computer Savvy, Right? Well, Maybe…
Washington DC Student Project Unit Portfolio Presentation By Terri Lackey.
Understanding By Design: Integration of CTE and Core Content Curriculum Michael S. Gullett.
The ABCs of Assessment Improving Student Learning Through New Approaches to Classroom Assessment.
CS1203 SCCC/ATS COURSE SYLLABUS Introduction to Computer Concepts and Applications Revised 8/16/2014 Online 7/14 revision Ed Hall Instructor.
Instructional Decision Making
Jack Holbrook Inquiry-based Teaching/Learning (IBSE)
1 SESSION 3 FORMAL ASSESSMENT TASKS CAT and IT FORMS OF ASSESSMENT.
EDUC 260: Week 13 Hand-in your Position Paper. Overview Administrivia Ethics of computing in classrooms What did we learn in the course? Course evaluations.
Game Inception and Design Project 1 Due date: –Wednesday, May 24 th (in class)
Phoebe A wiki-based pedagogic planner to promote innovative practice in Design for Learning Liz Masterman Oxford University Computing Services with Marion.
Curriculum description
Experience in Applying Online Learning Techniques in Computer Science & Engineering Dr. Aiman H. El-Maleh Computer Engineering Department King Fahd University.
Unit Assessment Plan Weber State University’s Teacher Preparation Program.
ACE TESOL Diploma Program – London Language Institute OBJECTIVES You will understand: 1. The difference between a course, curriculum, and syllabus. 2.
No Longer the Wave of the Future. No Longer the Wave of the Future How do you know if you’ve caught the wave?
Reflective Pathways from Theory to Practice Brewton-Parker College Education Division.
8/13/2015 Online Internet Training for Classroom Teachers Level One Click Here for More Info.
Barbara Blummer & Jeffrey Kenton Information Fluency Conference, 2013 March 13, 2013.
Education Bachelor’s Degree in Elementary Education Began the Master’s of Special Education program in January of 2011 Professional After graduation Sorensen.
Service Learning K-12 Service-Learning & Effective Instructional Strategies.
Developing a programme of information literacy. Strategy Will you work at an institutional level? Will you work at a course level? Will you work at a.
Intel ® Teach Essentials ICT in the Classroom Conference St John's College, Johannesburg 5-7 July 2011 Workshop by Claire Dean Senior Trainer SchoolNet.
New Advanced Higher Subject Implementation Events
New Advanced Higher Subject Implementation Events Design and Manufacture: Advanced Higher Course Assessment.
The Common Core Curriculum By Dean Berry, Ed. D. Gregg Berry, B.A.
Effective Teaching of Health Reporting: Lectures and More Barbara Gastel, MD, MPH Texas A&M University Train the Trainer Workshop: Health Reporting for.
Symposium 2001June 24, 2001 Curriculum Is Just the Beginning Chris Stephenson University of Waterloo.
Strand A In Depth Context and Introduction. Strand A: Instruction Demonstrates your competency in instruction based on your documentation of NM Teacher.
Project Based Learning (PBL) Two Approaches Teacher Centered – Direct instruction driven Learner Centered - PBL.
Role delineation in an iterative, cognitive skills based model of Information Literacy Judith Keene and John Colvin, University of Worcester, U.K. Justine.
The Art of the Designer: creating an effective learning experience HEA Conference University of Manchester 4 July 2012 Rebecca Galley and Vilinda Ross.
Role delineation in an iterative, cognitive skills based model of Information Literacy Judith Keene and John Colvin, University of Worcester, U.K. Justine.
New Advanced Higher Subject Implementation Events Engineering Science Advanced Higher Course Assessment.
Copyright © 2008, Intel Corporation. All rights reserved. Intel, the Intel logo, Intel Education Initiative, and Intel Teach Program are trademarks of.
Assignment Design I Katy Sullivan, Reference & Instruction Librarian Albin O. Kuhn Library & Gallery Spring 2004.
EDU 385 CLASSROOM ASSESSMENT Week 1 Introduction and Syllabus.
Barbara F. Schloman, Ph.D., TRAILS Project Director Julie A. Gedeon, Ph.D., TRAILS Assessment Coordinator Kent State University Libraries and Media Services.
Watson 2001 Test One Review Technology Integration StandardsLearning Theory Learning Theorists Issues
Teaching Information Ethics with a Common Curriculum Based on a Presentation made at H2K2 July 12, 2002 Updated September 12, 2002 H2K2 Greg Newby
Facilitate Group Learning
Life after HS (for students) Preparing Your Students for Post Secondary Education Dr. Carter Tiernan, University of Texas at Arlington College of Engineering.
Local AIMSweb® Manager: Taking the Role An introduction to: Course Overview Role of a Local AIMSweb Manager (LAM) Skills needed to become a successful.
Engaging Middle Level Candidates with STEM/STEAM-based pedagogies Stacie Nowikowski, D. Ed.
Using WebQuests in the Classroom Developing and locating inquiry-oriented activities that utilize the Internet.
Centra Quick Tips Press button or Ctrl Key to speak Use button to ask questions Use button for Yes, button for No Use buttons for feedback - Step Out Text.
An Evaluation of Professional Development for One-to-One Instruction at Pantego Christian Academy Steven R. Newby Kristi Fairbanks Marilyn Dardenne.
QTC Tel: : Yan Li QTC Tel: : Student-Centred Learning The Challenge of Change.
21 st Century Learning and Instruction Session 2: Balanced Assessment.
Data, Information and Knowledge (and the delayed Introduction!) Session 2 INST 301 Introduction to Information Science.
ECSE Core Curriculum Innovation in Engineering Education.
Level 2 Unit 1 Exploring the Engineering World Engineering Diploma Level 2 Unit 1 Exploring the Engineering World An Approach to Unit Delivery and Assessment.
Introduction and Welcome. Looking to the future... PPLI currently developing a short course in Russian which will be available to schools for delivery.
Kari Zhe-Heimerman NYSCILIB   Introduction to Gaming Research Project  My BIO 380 course as a case study  Examples of student games  What are.
Course Work 2: Critical Reflection GERALDINE DORAN B
Day 1 Session 2/ Programme Objectives
Instructor Training Cambridge
Information Technology (IT)
שילוב קורסים לפיתוח מיומנויות למידה במכללה להנדסה
Taking Note of CCSD Resources
Teaching Accessibility: Three Case Studies
Teaching Accessibility: Three Case Studies
IDEA Student Ratings of Instruction
Competency Reflections
Doc. PaedDr. PhDr. Jiří DOSTÁL, Ph.D.
INTRODUCTION Educational technology as the theory and practice of educational approaches to learning. Educational technology as technological tools and.
Presentation transcript:

Teaching Hacker Ethics with a Common Curriculum for “Information Ethics” H2K2 Presentation July 12, 2002 Greg Newby

Overview of the Session Who is this guy? Why develop some sort of curriculum? Who is the curriculum for? Goals Implementation plan Feedback?

Greg Newby Yes, “Newby.” Has taught about the Internet and predecessor networks since 1988 Writes code, does research on open source search engines Has given talks on hacker ethics and related topics at H2K and HAL 2001.

Curriculum? What’s that? Why? A curriculum (plural: curricula) is a course of study. In practice, it’s a set of courses or other instructional units (like a series of workshops) Curricula exist for nearly all academic and non- academic structured learning. For example, to get a college degree you need to follow the guidelines in the curriculum for that degree. K-12 schools have set curricula to enable standard quality expectations and exit requirements

Why a Curriculum for Information Ethics? Schools at all levels (especially high school and college) are requiring computer competency Very few include components of “appropriate use” – especially ethics – of computer-based tools Let’s fix that, by including training for information ethics in curricula at different levels: early education, high school and college

Where does Hacking Fit? Hackers are the people who push the limits of computer-based tools Hackers need to learn ethics like everyone else. (Unlike many computer users, hackers have good communication networks to help learn and share ethics.) By teaching information ethics, many aspects of hacking will be encouraged, not discouraged

Huh? Encourage hacking? Absolutely, on several levels: –Hackers are curious, motivated and talented. These are desirable traits for computer users –Hackers experiment with systems. Hackers have been behind almost every major technology innovation – this is valuable! –Ethics are shared through communication. Hackers learn and teach, they communicate

What are some suggested values for info ethics curriculum? Theme: value of information Information has value There are value-adding processes, such as organization, summarization, extraction… Theme: Information privacy People should have some expectation of privacy, but also some expectation of non-privacy. When? Others may invade on your privacy. What can you do?

More themes Theme: Information security –You can take steps to determine how information you generate, or about you, is utilized –You can take steps to add value to information by data integrity, safeguarding, verifying, etc. Theme: Secrecy –What is secrecy? When is secrecy effective?

The Suggested Curriculum Add a few hours of instruction with contextual localized examples on information ethics to computer training gbn’s suggestion is to do this in about the 5 th grade, 10 th grade and 1 st year of college gbn is developing curriculum details to try to work with CPSR on making the curriculum happen in NC and elsewhere

What would a teaching unit on information ethics look like? For grade school (during the first structured introduction to computing, especially networked computing): –What is information about me, and who knows it? –Why do we keep secrets sometimes? –What kinds of things can I find out using computers? Is what I find on a computer always right?

Teaching Unit: High School What data about me exist, and what sort of privacy do I have? Why is some information secret and other information public? What “secrets” can a computer tell me? Find and discuss examples of erroneous information on the Internet What are some differences between effective and ineffective use of information tools? How can the value of information be changed?

Teaching Unit: College What is data integrity? How is it related to the value of data? Is information a commodity? Why or why not? How can you evaluate an information source’s credibility? Information timeliness? What other factors impact information value?

Teaching Unit: College What is data integrity? How is it related to the value of data? Is information a commodity? Why or why not? How can you evaluate an information source’s credibility? Information timeliness? What other factors impact information value?

Curriculum Delivery Get people to talk about their experiences Emphasize concepts, not skills The issues of information ethics are not strictly computer-related, but computers are the major method for storing and accessing information so play a strong role Information ethics could be taught in far greater depth and at different times, these ideas are meant to be a minimal coverage suitable for easy implementation by educators.

Hacking Revisited Hackers understand the value of information better than most people Hackers are very interested in data integrity, security and privacy Hackers are able to understand systems and their shortcomings Therefore, teaching information ethics will make computer users more like hackers! We don’t know if this will create more hackers, but it will reinforce core hacker values

Possible Consequences People who are better informed about information ethics and related issues. People who have thought about the concepts behind computer-based tools, not just the applications and processes. People stimulated to express and explore curiosity about computer systems and the people and institutions behind them. People who question the status quo in systems’ approaches to data security and info use

What’s Next? Feedback on these ideas, better structure and planning for curricula Actual creation of course modules or teaching packets, with desired outcomes or measures Making the modules available to interested teachers and assessing impact Creation and passage of curriculum standards