Ethics, Computing, and the Internet

Slides:



Advertisements
Similar presentations
for 6th grade Technology
Advertisements

Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Technology and Ethics Joel Price. Lenses The first lens is as a technology user. The second lens is as an educator. The third lens is as a writer.
Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Cyber Ethics for Teacher Candidates Teresa Chen Department of Advanced Studies in Education and Counseling California State University, Long Beach.
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
Understanding Business Ethics
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
For Students. What is Copyright? “The exclusive right to produce or reproduce (copy), to perform in public, or to publish an original literary or artistic.
Spring 2010 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering Privacy Concerns (Chapters [B]) Spring.
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Ethics and Security ISSA International Ethics Committee V2.1 4/27/07.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
Issues in Implementing Technology in Schools
Computer ethics.
By Adam, Rachelgail & Kayla. What is internet Ethics? They are principles and guidelines to be applied whilst using the internet. Codes of ethics have.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Computer Ethics.
Introduction Computers and English Matt Barton. What is this course all about? This course is designed to introduce you to the field of Computers and.
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Computer Ethics for Computer Users
Ethics Presented by: Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas.
COMPUTER ETHICS Do you know the difference between right and wrong?
Beth Sanderson University of Washington Libraries, Bothell © Lawrence Snyder 2004 Computer / Information / Internet Ethics.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing.
Unit 3- Introduction to Computer Ethics
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
Computer Crimes Career & Technology Education Department.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
CSC Intro. to Computing Lecture 19: Ethics & Computers.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Computer Ethics CSCI 101 Kara kelly. Ethics Ethics can be defined as a discipline in which one attempts to identify, organize, analyze, and justify human.
Ethics Business Law Sunny Hills High School Mrs. Larsen.
ICS131 – Ethics 11/17/03. IEEE-CS and ACM 1.PUBLIC - Software engineers shall act consistently with the public.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
ALABAMA TECHNOLGY STANDARDS FOR TEACHERS Ethical Issues of Technology Presented by: Shirley Johnson & Keisha D. Smith.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
 byte  short  int  long  float  double  boolean  char.
ETHICS IN USING COMPUTER
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Q1 A) What are the skills needed by systems analyst? The skills needed by systems analyst:  Working knowledge of information technology.  Computer programming.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
What your students and Parents need to know  The ethical rules we live by also apply to technology.  Make students aware that how technology is.
Computer Ethics IT Fundamentals Battlefield High School.
Computers Are Your Future Twelfth Edition
Chapter 16 – Careers in Information Technology
The Legal System and Ethics in Information Security
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
Unit 3- Introduction to Computer Ethics
Computer Ethics.
Presentation transcript:

Ethics, Computing, and the Internet Censorship or Empowerment?

The Hacker Ethic 1. Access to computers—and anything that might teach you something about how the world works—should be unlimited and total. Always yield to the Hands-on imperative! 2. All information should be free . 3. Mistrust authority—promote the decentralization. 4. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position. 5. You can create art and beauty on a computer.

Computer Ethics (Computer Ethics Institute) 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people’s computer work. 3. Thou shalt not snoop around in other people’s computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness.

Continued 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people’s computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people’s intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that insure consideration and respect for your fellow humans.

Framing questions: How much responsibility should faculty assume for students’ behavior? How much trust are we willing to place in students? What are the legal ramifications if students come across content that is deemed inappropriate? What is and is not appropriate and for whom?: Whose definition of appropriate are we embracing?

How do kids learn ethical behavior? (Willard, 2000) Recognition that an action has caused harm. Social disapproval. Punishment by authority.

More likely to waiver from personal moral code if: Limited chance of detection/punishment. Will not cause perceptible harm or is small in comparison with personal benefit. Harm is to a large entity (corporation) and no specific person will suffer. Many others engage in behavior. Entity/person harmed has engaged in unfair actions.

How do technologies affect ethical behavior? Technology does not provide tangible feedback. Technology allows us to become invisible. Others?

But yet.. How do we impress upon young people the importance of respecting Microsoft's copyrights in their software when Microsoft has used its monopoly position to suppress the creation of competitive products and overcharge for its own products?

How do we encourage young people to avoid sites that promote pornography, hatred, and violence on the Internet when our message that such material is unacceptable is so totally undermined by the messages they are receiving from the entertainment media?

How do we impress upon young people that it is unethical for them to hack into a computer system to leave their mark, when dot.com companies are hacking into their computers, leaving marks, and using those marks to track and record personal and private activities, all without their permission? Why is it when an individual hacks into company's computer to leave a mark it is considered a crime, but what a company hacks into an individual's computer it is considered good business?

How do we let our youth know that they are valued and important, when in the eyes of the dot.com world they are merely private lives to be profiled, eyeballs to be captured, and pocketbooks to be lightened?

Fear and emotional triggers Decentralized architecture of Internet empowers individuals Schools are accustomed to controlling information and resources Students have the technology skills Who has the power….?

Accessing inappropriate content Acceptable Use Policies * Filtering or blocking software * Children’s Internet Protection Act (CIPA)

Accessing inappropriate content District Liability*

Protecting Student Privacy Recognition and credit vs. issues of safety*

Student e-mail What are we really concerned about?

Plagiarism Easier now, but a new concern? New boundaries

Democracy and Reformation Creating content What happened to monarchies and the Catholic Church in the century after the invention of the printing press? Democracy and Reformation Who decides who is allowed to create content? Muncie Community Schools’ policy on teacher web page creation.