Download presentation
Presentation is loading. Please wait.
1
Possible WebQuest type links http://it.wce.wwu.edu/jongejan/544/EthicsActivity.html http://it.wce.wwu.edu/jongejan/544/EthicsActivity.html http://it.wce.wwu.edu/344/copyright/default.html http://it.wce.wwu.edu/344/copyright/default.html Lessons on copyright - opinion 1 or opinion 2 http://www.cyberbee.com/copyrt.html http://www.cyberbee.com/copyrt.html WEBQUEST http://www.hazelwood.k12.mo.us/~jdarnell/webq/ http://www.hazelwood.k12.mo.us/~jdarnell/webq/ http://webinstituteforteachers.org/~camon/infoliteracy/musiccopywebq.htm http://webinstituteforteachers.org/~camon/infoliteracy/musiccopywebq.htm For teachers http://www.ivyrun.com/education/resources/copyright.htm http://www.ivyrun.com/education/resources/copyright.htm Many presentations http://it.wce.wwu.edu/jongejan/presentations.html http://it.wce.wwu.edu/jongejan/presentations.html
2
Ethics Demonstrate legal and ethical practices when completing projects/schoolwork
3
Ethics - placing a value on acts according to whether they are good or bad. 10 Commandments as defined by the Computer Ethics Institute 1. Thou shalt not harm other people. It’s bad to destroy or steal someone’s books and notebooks. It’s equally bad to access and destroy their files.
4
Ethics 10 Commandments 2. Thou shalt not interfere with other people’s computer work. Generating or consciously spreading computer viruses is unethical.
5
Ethics 10 Commandments 3. Thou shalt not snoop around in other people’s files. Reading other people’s e-mails on their computers is as bad as opening and reading their letters. Obtaining other people’s non-public files is like breaking into their rooms and stealing their documents.
6
Ethics 10 Commandments 4. Thou shalt not use a computer to steal. Using a computer to break into the accounts of a company or a bank and transferring money is the same as robbery.
7
Ethics 10 Commandments 5. Thou shalt not use a computer to bear false witness. Spreading false rumors about a person or false propaganda about historical events is wrong.
8
Ethics 10 Commandments 6. Thou shalt not use or copy software for which you have not paid. Software is an intellectual product. Obtaining illegal copies of copyrighted software is against the law, just like photocopying a copyrighted book is illegal. Obtaining other people’s non-public files is like breaking into their rooms and stealing their documents.
9
Ethics 10 Commandments 7. Thou shalt not use other people’s computer resources without authorization. Multiuser systems use user id’s and passwords to safeguard information. Hacking a system to break and bypass the authorization is unethical.
10
Ethics 10 Commandments 8. Thou shalt not appropriate other people’s intellectual output. Copying somebody else’s program without proper authorization is software piracy and is unethical. Intellectual property is a form of ownership and may be protected by copyright laws.
11
Ethics 10 Commandments 9. Thou shalt think about the social consequences of the program you write. Don’t produce anything that could be harmful to someone.
12
Ethics 10 Commandments 10. Thou shalt use a computer in ways that show consideration and respect. The fact that you cannot see the people you are interacting with on the Internet does mean that you can be rude to them.
13
References One http://www.efuse.com/Plan/copyright2.html#reallife http://www.efuse.com/Plan/copyright2.html#reallife http://www.templetons.com/brad/copymyths.html http://www.templetons.com/brad/copymyths.html http://www.wipo.int/about-ip/en/ http://www.wipo.int/about-ip/en/ http://www.copyright.gov/title17/92chap12.html#1204 http://www.copyright.gov/title17/92chap12.html#1204 http://www.efuse.com/Plan/copyright.html http://www.efuse.com/Plan/copyright.html http://answers.findlaw.com/abaflg/flg-10-4a-1.html http://answers.findlaw.com/abaflg/flg-10-4a-1.html http://www.washingtonpost.com http://www.washingtonpost.com http://otel.uis.edu http://otel.uis.edu
14
References Two http://www.thestar.com/News/Canada/article/442126 http://fairuse.stanford.edu/Copyright_and_Fair_Use_Overvi ew/ http://www.ibls.com/internet_law_news_portal_view http://www.medialawyer.com/lec-copy.htm http://www.dynamicwebs.com.au/tutorials/copying.htm http://www.answers.com/topic/plagiarism http://www.wipo.int
15
Image Citations One http://www.d.umn.edu/~jvileta/images/ http://www.geoffreyleaver.com/articles/ http://www.vavros.wz.cz http://www.mitpress.mit.edu http://usinfo.state.gov/products/pubs/intelprp/ http://www-scf.usc.edu http://www.media-awareness.ca http://www.flickr.com http://www.watta.co.th http://www.technewsworld.com www.centerforsocialmedia.org
16
Image Citations Two http://www.toggle.org Htt://home.hawaii.rr.com http://domain.newmethoddecor.com http://www.flickr.com http://www.storyboardtoys.com http://www.sillyjokes.co.uk http://www.discountgolfshoes.com/ http://www.lugarus.com/music/12 http://www.greencrazy.com http://www.page.auctions.yahoo.com http://www.tax-consultants-international.com
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.