Objective Day 1 The student will analyze computer ethics in relations to computer use and occupational use. (plagiarism)

Slides:



Advertisements
Similar presentations
Objective Day 1 The student will recognize computer safety rules and analyze computer ethics in relations to computer use and occupational use. (plagiarism)
Advertisements

Music, like writing, can be plagiarized. G-Dragon was accused of illegally copying from American artist Flo-Rida You Decide.
Documenting Sources Defining & preventing plagiarism Using Direct Quotes Paraphrasing.
Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.
Plagiarism Friday, May 15, 2015 MJISMAIL1. What is plagiarism anyway ? PLEASE WATCH 5eFeJMplA MJISMAIL2.
Is it Plagiarism? You read: “Nineteen percent of full-time freshmen say they spend only 1 to 5 hours per week preparing for classes…” From: Young, Jeffrey.
Objective Day 1 The student will analyze ethics in relations to computer use and occupational use. (plagiarism)
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
A Guide to Digital Citizenship
Computer Ethics.
TUES. DAY 2 OBJECTIVE & PREBELL QUESTION  OBJECTIVE: The student will analyze the appropriate netiquettes.  Pre Bell Question: Choose One: 1)Explain.
Roman Legacy Project. Quick Guidelines Slide 1 Introductory Page Slides 2-5Answer the guiding questions Slide 6Work Cited.
Computer Ethics for Computer Users
Computer Ethics Christina McCorkle.
What is it? How do I avoid it?
COMPUTER ETHICS Do you know the difference between right and wrong?
OBJECTIVE: TSW investigate social and ethical issues related to technology in Law, Public Safety Career Cluster Monday Bell Work Question: Explain how.
Chapter 1 Introduction to Computers. Prebell Day 1 –Week and Objective LABOR DAY –NO SCHOOL TODAY.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
OBJECTIVE-Day 1 THE STUDENT WILL RECOGNIZE Telecommunication Terms.
Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing.
Digital Citizenship By: Amanda Thurber. Netiquette on Social Media Sites According to networketiquette.net, netiquette is the social code of the internet.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Day 1-Monday Week 6 OBJ. & BELLWORK Sept. 16th OBJECTIVE(S)-TSW ICT13.c. Review "appropriate use" policies related to telecommunications ICTI3.1 - Explain.
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
Day 1-Sept. 10 th OBJ. & BELLWORK OBJECTIVE(S)-TSW IDENTIFY DIFFERENT TYPES OF SOFTWARE TSW MAKE COMPLEX CHOICES WITH INFO. TECHNOLOGY AND PEOPLE WITH.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
ED 505: Magen Anthony. Netiquette on Social Media site is the etiquette or guideline for posting on social media or other online sites. This helps individuals.
Ethics Business Law Sunny Hills High School Mrs. Larsen.
No School on Monday Professional Development for Teacher
Cassidy Culligan Digital Citizenship Project ED 505.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
COMPUTER RULES April 26, 2011 Pamela Johnson. Elements of Digital Citizen Copyright Plagiarism Safety on the Web Safety on Computer.
BELL ACTIVITY DAY 1 WEEK 8 OBJECTIVE DAY 1---ICTI--1.4.bDescribe the different services available on the Internet. The students will demonstrate keyboarding.
Nov. 9 Mon-Objective & Bell Work Day 1 Day 1 Ojectives ICT1The student will: ICTI1. - Utilize technology to locate, evaluate, and collect information from.
Nov. 9 Mon-Objective & Bell Work Day 1 Day 1 Ojectives ICT1The student will: ICTI1. - Utilize technology to locate, evaluate, and collect information from.
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
Mon, Nov. 2nd -Objective & Bell Work Day 1 Mon, Nov. 2 nd -Objective & Bell Work Day 1 Day 1- The student will: Recognize that people’s online information.
Objective & Bell Work –Day 1 THE STUDENT WILL: ICTI3. - The student will recognize facts about Web Publishing by using a Web Quest.  ICT14.a. Demonstrate.
Digital Citizenship. What is a Digital Citizen? Digital Citizens are people who use technology often and appropriately. Digital Citizens are people who.
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
DAY 1 MON. OCT. 19 TH OBJECTIVES & PREBELL QUESTIONS Objective(s): The student will identify terminology. The student will perform keyboard application.
The History of Computers Hardware, Software, Programs, Computers Safety Tips, and Computer Ethics.
Week 8 Objective & Bell Work & Exit Question –Day 1 Monday Objectives: The student will: Performing touch typing by keying words, numbers, sentences and.
Things Every Computer User Should Know… Jessica Johnsey ED 505- Technology and Education.
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
1. Is it Plagiarism? You read: “Nineteen percent of full-time freshmen say they spend only 1 to 5 hours per week preparing for classes…” From: Young, Jeffrey.
Daily Agenda- Unit 7 Social Media- Week 5 April 18-22, 2016 ICT 1 Classes J. Leverette, ICT1 Teacher.
Mrs. Leverette, Teacher 4th Nine weeks Skills-- Questions.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Week 5 Mon-Objective & Bell Work Day 1
Week 1 October By Mrs. J. Leverette
Is it Plagiarism? You write: You read:
Objective & Bell Work –Day 1
Is it Plagiarism? You write: You read:
OBJECTIVE: TSW The student will research career  in Law, Public Safety, Corrections & Security by investigate social and ethical issues related to technology.
Mon, Oct. 31st -Objective & Bell Work Day One
Is it Plagiarism? You write: You read:
Week 2 Oct , 2016 By Mrs. J. Leverette--
Presentation transcript:

Objective Day 1 The student will analyze computer ethics in relations to computer use and occupational use. (plagiarism)

Bell Work Day Monday What is Computer Safety and Computer Ethic? (Use the Internet Google search)

Monday Daily Agenda Do Pre-Bell for Monday- get handout from table and discuss orally Do Computer Safety Test & turn in scantrom, if not done Friday. Introduce Computer Ethics-complete Computer Ethic Pre-test—Online-Get link from teacher website Do Ethic in Computer/classroom Handout & discuss answers orally and Computer Ethics PowerPoint. Write 10 COMMANDMENTS OF COMPUTER ETHICS in your notebook and do Copyright activity, if time. Homework for the week-Get Handout –Computer Ethics Closure: Wrap up with a review question learned today

GO TO school/story.php?title=computer- ethics-quiz Pre-test-computer ethics school/story.php?title=computer- ethics-quiz

What is Plagiarism? Plagiarism is using words or ideas of another as one's own words. How to avoid plagiarism? Every direct quotation must be identified by quotation marks and must be properly cited (Give the Source)

Is it Plagiarism? You read: "Students are studying about one-third as much as faculty say they ought to, to do well," said George D. Kuh, director of the survey and a professor of higher education at Indiana University at Bloomington. From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002 You write: Most students spend about one-third as much time studying as faculty say they should. Yes! You must credit your source if you paraphrase text.

Is it Plagiarism? You read: “Nineteen percent of full-time freshmen say they spend only 1 to 5 hours per week preparing for classes…” From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002. You write: Nineteen percent of full-time freshmen say they spend only 1 to 5 hours per week preparing for classes. YES! You need to use quotes and to cite your source

Is it Plagiarism? You read : "Students are studying about one-third as much as faculty say they ought to, to do well," said George D. Kuh, director of the survey and a professor of higher education at Indiana University at Bloomington. From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002 You write : According to George D. Kuh, Indiana University at Bloomington, students study about one-third of the time that is expected by faculty. (Young, 2002) No. As long as you have included the Young article in your reference list, you have properly cited your source.

Is it Plagiarism? You read : “The tip given most consistently by professors and college officials is that students should simply do their homework. The most commonly prescribed amount is at least two hours of class preparation for every hour spent in the classroom…” From: Young, Jeffrey R. Homework? What Homework? Chronicle of Higher Education, 49 (15).12/6/2002 You write : College students should do their homework. No. Commonly known facts or ideas do not have to be cited. (Can you find this information in at least five sources?)

Is it Plagiarism? Yes! You need to credit the source of images and other media as well as text. Gray wolf (Canis lupus). © Jeff Lepore/Photo Researchers Wolf. Encyclopædia Britannica. Retrieved March 31, 2004, from Encyclopædia Britannica Online. Should we or shouldn’t we protect the gray wolf? By Ima Lamb Eng 110 Apr. 1, 2004 You find : Your title page :

Is it Plagiarism? When in doubt, cite it!

10 COMMANDMENTS OF COMPUTER ETHICS THOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLETHOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLE THOU SHALT NOT INTERFERE WITH OTHER PEOPLE COMPUTER WORKTHOU SHALT NOT INTERFERE WITH OTHER PEOPLE COMPUTER WORK THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE’S FILES.THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE’S FILES. THOU SHALT NOT USE A COMPUTER TO STEAL.THOU SHALT NOT USE A COMPUTER TO STEAL. THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS.THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS.

10 COMMANDMENTS OF COMPUTER ETHICS THOU SHALL NOT USE OR COPY SOFTWARE FOR WHICH YOU HAVE NOT PAID. 6.  THOU SHALL NOT USE OR COPY SOFTWARE FOR WHICH YOU HAVE NOT PAID.  7. THOU SHALT NOT USE OTHER PEOPLE ‘S COMPUTER RESOURCES WITHOUT AUTHORIZATION.  8. THOU SHALT NOT APPROPRIATE OTHER PEOPLE’S INTELLECTUAL OUTPUT.  9. THOU SHALT THINK ABOUT THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU WRITE.  10. THOU SHALT USE A COMPUTER IN WAYS THAT SHOW CONSIDERATION AND RESPECT.

OBJECTIVE: The student will identify ways to safeguard against computer viruses, worms, etc.; and safeguards against hardware theft and vandalism by using computer ethics rules and terminology. PREBELL DAY 2 EXPLAIN THIS COMPUTER ETHIC “Thou shall not use a computer to harm other people”

Tues. Daily Agenda COMPLETE PRE BELL ACTIVITY REVIEW PREVIOUS LESSON-DAY 1 COMPLETE NOTES ON 1O COMMANDMENTS OF COMPUTER ETHICS, if not completed on Mon. BEGIN HANDOUT-COMPUTER ETHICS TERMS GO TO TO LOOK UP COMPUTER TERMSwww.techterms.com DISCUSS COMPUTER TERMS AND IF TIME, DO COPYRIGHT ACTIVITY FROM MON AND BEGIN WEB QUEST—PROTECTING YOUR COMPUTER -HANDOUT REVIEW TODAY LESSON—REMIND ABOUT HOMEWORK-DUE THURSDAY CLOSURE: WRAP UP WITH A REVIEW QUESTION.

Day 3-OBJECTIVE: The student will identify how to use the Internet safely, legally, and responsibly. PREBELL-DAY 3 EXPLAIN THE PURPOSE OF USING THE INTERNET

DAILY AGENDA-DAY 3 COMPLETE PRE BELL ACTIVITY REVIEW PREVIOUS LESSON-DAY 2-TECHTERMS COMPLETE NOTES ON PROTECTING YOUR COMPUTER FROM POWERPOINT BEGIN HANDOUT-PROTECTING YOUR COMPUTER AND YOURSELF see link on handout GO TO LOG IN: username: lsd password: grade --search for cyberbullying to look for cyberbullying video CLOSURE: REVIEW TODAY LESSON—REMIND ABOUT HOMEWORK-DUE THURSDAY and POST TEST-FRIDAY

Way to safeguard your computer from viruses, etc. 1. Do not open that you don't know 2. Do not open Advertisements 3. Do Not open Face Book Ads 4. Downloading free games, movies, free music—Internet abuse

DAY 4 OBJECTIVE:-The student will review and analyze social and ethical issues related to technology in the context of the Law, Public Safety, Corrections and Security career cluster PREBELL QUESTION-DAY 4 DESCRIBE TWO PRECAUTIONS WHEN USING THE INTERNET SAFELY. DOK2-PLD-PROF.

DAILY AGENDA –DAY 4 REVIEW & RESEARCH DAY 1. COMPLETE DAY 4 PREBELL ACTIVITY & Collect Homework Today. 2 REVIEW DAY 1, 2, & 3 LESSON –Plagiarism, Computer Ethics, 10 Commandments of Computer Ethics, 10 Computer Ethics Terms, And Protecting Your Computer Handout and Copyright. 3.Research info on Google –about Law & Safety Careers as it relates to Computer Ethics and share report with class 4. Complete Pretest Again for Review on Computer Ethic-See Teacher Website 5. Complete Handouts From Wed. Protecting Your Computer –See Website, if not completed from Wed. Activity. 6. GO TO if not completed from Wed. Activitywww.brainpop.com LOG IN: username: lsd password: grade search for cyberbullying to look for cyberbullying video 7. HOMEWORK-STUDY ALL COMPUTER ETHICS NOTES, HANDOUTS AND 10 Terms – Computer Ethics Test Friday 8. ALSO, COMPUTER SAFETY RULES MASTERY 100% RETEST- DUE FRIDAY—STUDY- WRITE THE RULES DOWN YOU MISSED 9. Closure Activity: Review Question for Today.

REVIEW WORDS FOR TEST CREATE A SENTENCE, More Practice 1.PLAGIARISM 2.COPYRIGHT 3.CYBERCRIME 4.HACKER 5.VIRUS 6. WORM 7. ANTIVIRUS 8.ENCRYPTION 9.PHISHING 10 COMPUTER ETHICS

DAY 5 OBJECTIVE: The student will demonstrate their strengths & weaknesses on Computer Ethics DOK 2-PLD-P Friday Pre Bell Questions—Explain Plagiarism—Give an example of plagiarism. Turn in Pre-Bell Next Friday

FRIDAY DAILY AGENDA 1. COMPLETE DAY 5 PREBELL ACTIVITY –DO NOT TURN IN TODAY – TURN IN NEXT WEEK 2 REVIEW DAY 1, 2, & 3 LESSON –Plagiarism, Computer Ethics, 10 Commandments of Computer Ethics, 10 Computer Ethics Terms, And Protecting Your Computer Handout and Copyright. 3. COMPLETE POST TEST UNIT 1 –COMPUTER ETHICS 4. COMPLETE MASTERY COMPUTER SAFETY TEST 100% - DUE TODAY, ALSO, IF YOU DID NOT MASTER IT WITH 100% 5. COMPLETE ANY ICT1 MAKE UP WORK, AT THIS TIME FOR THIS WEEK 6. STUDENTS CAN PRACTICE ON ACADEMIC GAMES, SUCH AS COOL MATH ONLY. 7. Closure Activity: Review Question for Today.– HOW DID YOU DO ON YOUR POST-TEST –COMPUTER ETHICS AND HOW CAN YOU IMPROVE ON THE NEXT TEST?