Presentation is loading. Please wait.

Presentation is loading. Please wait.

Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing.

Similar presentations


Presentation on theme: "Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing."— Presentation transcript:

1 Ethics, Privacy, & Safety

2 Source: Ethics in ComputingEthics in Computing

3 How do People Learn to Engage in Ethical Behavior? A recognition that an action has caused harm Social disapproval Punishment by authority Source: Computer Ethics, Etiquette & Safety

4 Information and communication technologies affect ethical behavior Technology does not provide tangible feedback Technology allows us to become invisible Source: Computer Ethics, Etiquette & Safety

5 Eight Ethical Decision-Making Strategies Golden Rule Test Trusted Adult Test Is There a Rule? Test Front Page Test If Everybody Did It Test Real World Test Gandhi Test Check Inside Test Source: Computer Ethics, Etiquette & Safety

6 Universal Rationalizations The finger of blame (“She started it…”) Follow the crowd (“Everyone does it…”) If I only had a brain (“He told me to…”) No harm no foul (“Nobody got hurt”) It’s only a little bit wrong… Good intentions (“It’s for a good cause…”) “No one ever gets caught…” “Things have changed…” Source: Computer Ethics, Etiquette & Safety

7 What Can You Do? Play by the Rules Keep It Private Look Your Best Don’t Pollute Remain Cool Under Fire Read with Your Eyes Open Credit the Source Respect the Creator Watch Where You are Looking Don’t Take Candy from Strangers Don’t Go Where You Don’t Belong Source: Computer Ethics, Etiquette & Safety

8 Web Resources CyberEthics –CyberSmart CurriculumCyberSmart Curriculum –CopyrightCopyright –Computer Virus Myths, Hoaxes, Urban Legends, HysteriaComputer Virus Myths, Hoaxes, Urban Legends, Hysteria Cyberethics, Cybersecurity and CybersafetyCyberethics, Cybersecurity and Cybersafety

9 The Ten Commandments of Computer Ethics 1.Thou shalt not use a computer to harm other people. 2.Thou shalt not interfere with other people's computer work. 3.Thou shalt not snoop around in other people's computer files. 4.Thou shalt not use a computer to steal. 5.Thou shalt not use a computer to bear false witness. 6.Thou shalt not copy or use proprietary software for which you have not paid. 7.Thou shalt not use other people's computer resources without authorization or proper compensation. 8.Thou shalt not appropriate other people's intellectual output. 9.Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10.Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans. Computer Ethics Institute A project of the Brookings Institution http://www.brook.edu/its/cei/cei_hp.htm

10 What About Privacy? Computer Safety Secure e-mail Identity Theft Credit Reports Spam Filters Anti-Virus Spyware Removal Privacy Software Ad Blockers Firewalls Encryption Parental Control Key Loggers Privacy Fence

11 Web Resources Protecting your Privacy on the Internet Internet Privacy Resources

12 Let’s Stop and Play… Privacy Playground Cybersense and Nonsense Jo Cool or Jo Fool

13 Cyberbullies March 08, 2005 – USA Today "Cyberbullies, mostly ages 9 to 14, are using the anonymity of the Web to mete out pain without witnessing the consequences," reports USA Today."Cyberbullies Half of 3,000 U.S. children surveyed the past six months said they or someone they know have been victims or guilty of cyberbullying, Wired Safety says.Wired Safety Bullying isn't just for large males. Now anyone, male or female, with minimal technical skills can get into the act. But victims still tend to be kids seen as "different."

14 Let’s explore… Quiz Think about this… Suggestions

15 Safety Playing It Safe Keeping Children Safer Surf Swell Island CyberNetiquette Comix GetNetWise SafeKids and SafeTeensSafeKidsSafeTeens Netsmartzkids.org

16 “Integrity is doing the right thing, even if nobody is watching.” Anonymous


Download ppt "Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing."

Similar presentations


Ads by Google