Technology: Friend or Foe? Thinking about Information Ethics.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Developed by Technology Services 1:1 Laptop Initiative
Forms of Cyberbullying
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
INTERNET SAFETY.
INTERNET SAFETY FOR STUDENTS
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
Boyertown Area School District Acceptable Use Policy.
Jana Dixon Dawson Educational Cooperative
INTERNET SAFETY FOR STUDENTS
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
Standards and Guidelines for Web Page Publishing December 9, 2009.
Lathrop Intermediate School Cyber Savvy Week December 1 – December 5, 2014 Be RespectfulBe ResponsibleBe Safe Science Classrooms – Thursday, December 4,
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Digital Citizenship Project
Technology: Friend or Foe? Thinking about Information Ethics.
Digital Citizenship By: Miranda Scorver.
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
Warrior Wednesday DIGITAL CITIZENSHIP.
Digital Citizenship Texting vs. Sexting Cyberbullying.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Welcome to Week 3 in the Mrs. DeRita’s computer lab!
DIGITAL CITIZENSHIP/CYBER BULLYING.  Privacy - Protect Personal Information  Respect – Avoiding Cyberbullying, Plagiarism, Downloading Music Appropriately.
Digital Citizenship Created By: Kelli Stinson June 2011.
Digital Citizenship Project By Allen Naylor Ed 505.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Cassidy Culligan Digital Citizenship Project ED 505.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
Are you a digital citizen? Zeborah Ware 1. Table of Contents Definition of Digital Citizenship Page 3 Classroom Rules for Cell Phones Page 4 Social Networking.
Digital CitizenshipDigital Citizenship By Pinsinee Mekpanuwat (pin) Smita Jirayingcharoen (mudmee)
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Digital Citizenship. What is a Digital Citizen? Digital Citizens are people who use technology often and appropriately. Digital Citizens are people who.
Digital Citizen Project By: Frances Murphey Technology and Education.
Computer crimes.
DIGITAL CITIZENSHIP. Digital Citizenship covers 9 areas according to Mike Ribble, an expert in the field.  Etiquette  Communication  Literacy  Access.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
+ Digital Citizenship Amanda Smith ED Netiquette on Social Media Netiquette refers to the etiquette that is used on the internet and communicating.
DIGITAL CITIZENSHIP.  Privacy - Protect Personal Information  Respect - Plagiarism, Downloading Music Appropriately.  Self Expression - Create your.
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Lecture 3 1Norazirah Ayob, FEB. Ch  Technology advances allow individuals to self-select  what,  when, and  where messages are sent and received.
WHEN SHARING IS NOT CARING: INTERNET ETHICS By Baikgopodi “Bai” Ditiso Presented at CLTD– 09 May 2016.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Technology: Friend or Foe?
Cyber and Internet Safety (Parents’ Night)
DIGITAL CITIZENSHIP What You Should Know!.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
GOSSIP and CYBERBULLYING
Issues In media studies: Cyberbullying
Appropriate Use of Technology
Warrior Wednesday DIGITAL CITIZENSHIP.
GOSSIP and CYBERBULLYING
Rules To Help You Navigate the Internet Safely
Issues With Internet in College
Presentation transcript:

Technology: Friend or Foe? Thinking about Information Ethics

Cybercrime Virus-spreading – a small program that impairs or destroys the computer’s ability to function properly - often spread via Hacking/Cracking – breaking into/gaining unauthorized access into another computer or computer network – many hackers who break into commercial Web sites are looking for customers’ private financial data (identity theft)

Cybercrime continued… piracy -copying protected software without authorization -software companies claim to lose billions of dollars per year through illegal copying phishing – sending that looks like it comes from a legitimate source, such as a bank or software company, but is actually from a fraudulent source phishing

Cybercrime continued… Cyberstalking -harassing and terrorizing people, causing them to fear injury or harm Cyber pornography - Sexting Cyber pornography -producing and/or distributing pornography using a computer Cyberterrorism -unlawful attacks and threats of attack by terrorists against computers, networks, etc. to intimidate a govt. or its people Ethical question: To what extent should perpetrators of these types of crime be punished?

Plagiarism Intellectual Property - reflects the idea that this subject matter is the product of the mind or the intellect, and that IP rights may be protected by law in the same way as any other form of property.mind property Plagiarism has become a more prevalent issue with easy access to information via the Internet Many educational institutions now rely on plagiarism detection services for prevention plagiarism detection services Ethical question: How can plagiarism best be prevented?

Privacy One of the earliest ethical issues of concern due to ease with which computers can store and allow access to information New technologies make it possible for employers to monitor many aspects of their employees' jobs, especially on telephones, computer terminals, through electronic and voice mail, and when employees are using the Internet. Sensitive information, such as medical records, financial records, personal information are kept electronically Social networking sites allow users to exploit the privacy of others Ethical question: To what extent should our right to privacy be protected in a digital age?

Copyright Violation Copyright protection is the idea that the original creator of any work is the only person who has the right to make copies of the work distribute copies of the work perform the work publicly display the work publicly; make “derivative works”derivative works File Sharing – downloading music or video files, then posting them on a publicly accessible website for others to share - Violation! Word, Image, video, sound clip use – incorporating forms of media into presentations without permission or attribution – Violation!

Copyright cont. Copyright is immediately established when the author puts his/her work into a “fixed form” – no need to “apply” for copyright “Copyright Infringement” occurs when a person manipulates the work of another without the copyright owner’s permission Infringement is proven if 1. a work in question is “substantially similar” to the original 2. the accused infringer had access to the original work

Fair Use The idea of "Fair Use" is a defense against copyright infringement It allows limited copying of copyrighted works for educational and research purposes. In order for “fair use” to be valid, the following factors will be considered 1. the purpose of the use 2. the nature of the copyrighted work 3. the amount used in comparison to the whole work 4. the effect of the use on the potential market Ethical question: What responsibility do we bear to protect the copyright of others’ original work?

Social Networking Supporters of social networking Web sites say: Websites such as Facebook allow teenagers to socialize, make friends, share media with people they ordinarily would not approach. Social networking websites become a mode of expression and exploration; they allow teenagers to experiment with different interests, which benefits their social development. Communication reaches large audience quickly and simultaneously

Critics of social networking Web sites say: Sexual predators and pedophiles can access social networking websites too easily; Many pedophiles use such Web sites to entice teenagers to meet them in person; crimes such as rape and murder have been linked to teens using Facebook and similar sites Teens are using it as a venue for cyberbullying and displays of their own illegal acts, such as alcohol and drug use Teenagers spend too much time on social networking websites and can even become addicted

Cyberbullying Cyber bullying, which is sometimes referred to as online social cruelty or electronic bullying, can involve: Sending mean, vulgar, or threatening messages or images; Posting sensitive, private information about another person; Pretending to be someone else in order to make that person look bad; Intentionally excluding someone from an online group (Willard, 2005). Cyberbullying can occur via: s, Instant messaging, Text or digital imaging messages sent on cell phones, Web pages, Blogs Chat rooms or discussion groups and Other information communication technologies.

How does cyber bullying differ from other traditional forms of bullying? --Cyber bullying can occur any time of the day or night; --Cyber bullying messages and images can be distributed quickly to a very wide audience; --Children and youth can be anonymous when cyber bullying, which makes it difficult (and sometimes impossible) to trace them;

Online Safety Tips Just because you can post just about anything out on the web, doesn’t mean you should Remain as anonymous as possible on the web. Here are some examples of private information that you should never give out on the Internet: full name home address phone number Social Security number passwords names of family members credit card numbers Photos

Don’t believe everything you see online If you get suspicious s, files, or pictures from someone you don’t know or trust, trash them Avoid chat rooms or discussion areas that look sketchy or provocative Do not give out your address online, don’t respond to junk mail, and use an filter Don’t let people goad you into online fights If you plan to meet someone you’ve met online, bring a friend or a parent, and encourage your acquaintance to bring theirs, too.

Digital Citizenship Respect, Educate, and Protect Respect yourself, respect others Law - Users need to understand that stealing or causing damage to other people’s work, identity, or property online is a crime. Educate yourself, connect with others Literacy - As new technologies emerge, learners need to learn how to use that technology quickly and appropriately. Digital Citizenship involves educating people in a new way— these individuals need a high degree of information literacy skills Protect yourself, protect others Safety - We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.

Evaluating Reference Sources Deciding which reference source best suits your needs

1. Audience Who is the intended audience for this source? Is the material too complex or too basic? Audience = for whom the information is written

2. Authority Who is the author? Is he/she an expert in the field? What are his/her credentials? Are they listed? Authority = Expertise

3. Accuracy Is the information correct Does the author support what he/she is saying with proof? Are other authors providing similar information? Accuracy = correctness

4. Scope How thoroughly is the topic covered in the source? Does the source fulfill its intended purpose? Scope = extent of coverage

5. Bibliography Does the reference source list its sources of information? Has the author consulted other sources for information? Can the author prove that his/ her information is authentic/accurate? Bibliography = list of valid sources of information consulted

7. Timeliness When was the source published? How current is the information presented? Is the author using current sources of information? Timeliness = Currency