2 What are cyber ethics?Ethics are the rules you use in life to help you decide what is right and wrong.Cyber ethics is how you act when you are on the computer.
3 The Fun Side of the Internet Learning/ResearchPlaying gamesStaying in touch( )ShoppingTravel arrangementsDownloading musicChecking the weatherPay bills
4 Netiquette: using good behavior in cyber space Watch your language(written language)ALL CAPS = ShoutingEmoticons = Show emotionsDo not send angry or insulting s(This is called flaming.)Always think about your audience(all online communicationis public)
5 It’s not unethical to make a mistake. However, if you do, correct it. Did you?Download music illegally?Give out a friend’s web/ address?Offend someone?Give out personal information?Copy software from a friend?Correct it.Buy a legal copyTell them so they can change itApologizeTell an adultBuy your own rights or your own copy
6 The positive side of e-mail Talk to friendsKeep in touch with far away relativesShare information
7 The negative side of e-mail SPAM – Phishing is the term used for s which try to scam you for money, sell you things, or give your computer viruses.Viruses – Information sent to your computer to corrupt your hardware.Identity Theft – People try to persuade you to give out personal information so they can access your life.
8 Protecting your (and your friends’) e-mail account Don’t give out youraddress to anyone you don’t know.Don’t give out friends’ addresses without their permission.Don’t share your password.Don’t read other people’ss without their permission.Don’t forward s just because they say to forward them. You could be sharing viruses.
9 Generation @: INTERNET ETHICS Web PagesBlogsMy SpaceFace BookYou TubePodcastsThese items are all accessible by the general public.Everybody can read what you write.BE CAREFUL WHATYOU WRITE! Anything you post can be held against you in a court of law!
10 How to Protect Yourself DO NOT GIVE OUT THE FOLLOWING INFORMATION:AddressPhone #Social Security #Birthday/AgeOther people’s informationSchool NameYour Interests
12 Teasing or harassing someone online Cyber bullyingWhat is it?Teasing or harassing someone onlineWhat do I do if I am beingharassed?Do not respond. This only perpetuates the situation.Tell an adult. Some people become stalkers through bullying.Seek a monitored chat room designated for you and your friends only.
13 GriefersWhat are they?Bullies who hang out at game sites to harass, cheat, or gang up on other gamers.What do I do?Tell or the site owners about the problem.The owners can set up a private game just between you and your friends.
14 PredatorsPredators use the tactic of grooming: earning your trust by engaging you in simple conversations, asking general questions, and by pretending to care.What do I do?Trust your feelingsTell an adultDo not go into chat rooms when you are angry or emotionalGo to safe, monitored chat rooms
15 HackingWhat is it?Hacking: to break into someone’s computer system.Hacker: someone who breaks into computer systems.Cracker: someone who breaks in to do harm to your computer.How do I stop it?Make sure you have up to date spy-ware, pop-up blockers, and filters on your computer to protect you from harm.
16 Plagiarism How do I not plagiarize? Plagiarism means to use someone else’s work and not give them credit for the work.How do I not plagiarize?Cite anything that is not your original work.Easybib.com
17 What are the consequences? JailFinesLoss of internet privilegesLoss of your integrity
18 BibliographyBailey, Diane. Cyber Ethics. New York: Rosen Group, Incorporated, The, 2008.All pictures and icons were copied from Microsoft Clip Art