Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber Ethics for Teacher Candidates Teresa Chen Department of Advanced Studies in Education and Counseling California State University, Long Beach.

Similar presentations


Presentation on theme: "Cyber Ethics for Teacher Candidates Teresa Chen Department of Advanced Studies in Education and Counseling California State University, Long Beach."— Presentation transcript:

1 Cyber Ethics for Teacher Candidates Teresa Chen Department of Advanced Studies in Education and Counseling California State University, Long Beach

2 Lesson Objectives Upon completion of the lesson, you will be able to identify and describe the ethical issues related to computer usage and technology integration in schools develop activities and lessons that teach cyber ethics to K-12 students

3 Ethical Dilemmas??

4 Cyber Ethics Moral guidelines that govern the use of the Internet

5 Agenda Making good moral judgments Cyber ethics for K-12 students A WebQuest on teaching cyber ethics Group presentations of lesson plans

6 Guidelines for Making Good Moral judgments Know thyself Engage your imagination Identify the precise issue Gather relevant facts Identify relevant ethical standards, draw an appropriate conclusion, and act Source: Bassham, G., Irwin, W., Nardone, H., & Wallace, J. M. (2008). Critical thinking: A student's introduction (3rd ed.). Boston: McGraw Hill.

7 Computer Ethics for Educators Do not use a computer to harm other people Do not interfere with others’ computer work Do not look at others’ computer files Do not use a computer to steal Do not use a computer to lie Do not use software without paying for it Do not use others’ computer resources without permission

8 Computer Ethics for Educators (cont.) Do not use others’ work Think about the social impact of the programs he or she creates Always use a computer in a way that shows respect and consideration for other people Source: Shelly, G. B., Cashman, T. J., Gunter, R. E., & Gunter, G. A. (2006). Teachers discovering computers: Integrating technology in the classroom. (4th ed.). Boston, MA: Course Technology.

9 Ten Commandments of Computer Ethics 1. Thou Shalt Not Use A Computer To Harm Other People. 2. Thou Shalt Not Interfere With Other People’s Computer Work. 3. Thou Shalt Not Snoop Around In Other People’s Computer Files. 4. Thou Shalt Not Use A Computer To Steal. 5. Thou Shalt Not Use A Computer To Bear False Witness. 6. Thou Shalt Not Copy Or Use Proprietary Software For Which You Have Not Paid.

10 Ten Commandments of Computer Ethics (cont.) 7. Thou Shalt Not Use Other People’s Computer Resources Without Authorization Or Proper Compensation. 8. Thou Shalt Not Appropriate Other People’s Intellectual Output. 9. Thou Shalt Think About The Social Consequences Of The Program You Are Writing Or The System You Are Designing. 10. Thou Shalt Always Use A Computer In Ways That Insure Consideration And Respect For Your Fellow Humans. Source: Computer Ethics Institute http://www.brookings.edu/its/cei/http://www.brookings.edu/its/cei/

11 Guidelines for Creating Web Pages Always protect the identity of your students. Never list student last names, telephone numbers, home addresses, or e-mail addresses. Use only first names of students on a Web site, but never in conjunction with other identifying information, such as a photograph Use caution when including digital pictures of classrooms; avoid pictures that show close-ups of students. Never provide links to sites that are not appropriate for K-12 students or educational settings.

12 Guidelines for Creating Web pages (cont.) List the function of all linked Web pages. Link only to pages that inform, explain, or teach a concept r curriculum area to students. Beware of linking to Web sites that persuade students. Avoid providing links to sites whose primary propose is selling non-educational products and services, unless relevant to the subject under discussion. Avoid linking to Web pages that are not updated on a regular basis.

13 Guidelines for Creating Web pages (cont.) Provide links to sites that help you achieve instructional and curriculum goals. Avoid discussing controversial issues on your Web site or linking to Web sites that discuss controversial issues, unless these issues are part of your curriculum. Carefully read and follow all guidelines and policies that your school district provides. Source: Shelly, G. B., Cashman, T. J., Gunter, R. E., & Gunter, G. A. (2006). Teachers discovering computers: Integrating technology in the classroom. (4th ed.). Boston, MA: Course Technology.

14 Legal vs. Ethical Legal issues are those that pertain to, or are governed by, formal national or international law. They have specific formal dimensions that are governed by law, and are enforceable and answerable to the law. Ethical issues pertain to professional standards or codes of conduct that are not legally binding but can have serious professional or personal consequences through non-legal sanctions. Source: Bassham, G., Irwin, W., Nardone, H., & Wallace, J. M. (2008). Critical thinking: A student's introduction (3rd ed.). Boston: McGraw Hill.

15 Ethical Issues Privacy and Surveillance Piracy  Online plagiarism  Downloading software, music, and movie  Copyright and fair use Fraudulent practices  Hacking  Virus replication Fabrication of information Unauthorized collection of information

16 Case 1: Employee Monitoring Please read the Web page titled “Porn, the Harvard dean and tech support” http://www.salon.com/tech/feature/1999/05/21/tech_support/ http://www.salon.com/tech/feature/1999/05/21/tech_support/ Answer the following questions:  Is it ethical for an employer to monitor what an employee views or does on the Internet?  In the case, do you think that the technical support staff should serve as arbiters?  Should a technical support member turns a blind eye if he/ she happens to encounter something suspicious on your computer?

17 Case 2: Fabrication of Information Please give some thoughts to the following scenario: John has been using the digital camera to take pictures for the family photo album. John has found that he can use a computer program to change the photographs. He has used the program so far to make himself look taller, to blacken out the front tooth of his sister, and to give his dad slightly crossed eyes.

18 Case 2: Fabrication of Information (cont.) Please answer the following questions:  What is the inappropriate action?  What danger or discomfort might the unethical action cause?  What new visual literacy skills might critical information seekers need?  Can you think of other incidents that would fall into this category?

19 WebQuests http://webquest.org http://webquest.org Building blocks  Introduction  Task  Process  Evaluation  Conclusion  Credits  Teacher page

20 A WebQuest on Teaching Cyber Ethics Go to http://www.csulb.edu/~tchen5/cyberethics. htm http://www.csulb.edu/~tchen5/cyberethics. htm Work in a group of four Follow the directions on the page Share your product (a lesson plan) and your reflection on the activity with the class

21 Review Main points of the lesson Ethical issues identified Lesson plans developed Using the lesson plans in future classes


Download ppt "Cyber Ethics for Teacher Candidates Teresa Chen Department of Advanced Studies in Education and Counseling California State University, Long Beach."

Similar presentations


Ads by Google