cyber ethics

21
1 The Internet & Cyber Ethics Source: Created by Rebecca Thomas 7200 EDMD Auburn University Fall 2005

Upload: tj-wolfe

Post on 22-Jan-2015

547 views

Category:

Education


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Cyber ethics

1

The Internet &

Cyber Ethics

Source: Created by Rebecca Thomas 7200 EDMD Auburn University Fall 2005

Page 2: Cyber ethics

EC05.01b Analyze legislation concerning Internet security issues 2

The Internet and Cyber Ethics

What is Cyber Ethics?

…...the ways that an individual uses a computer that follows the rules made by the schools and government

Page 3: Cyber ethics

EC05.01b Analyze legislation concerning Internet security issues 3

The Internet and Cyber Ethics

How do I know if the computer in my classroom is being used legally and ethically?

The Department of Justice classifies computer crime in three ways………

……….computers as a target

……….computers as a weapon

………computers as an accessory

Page 4: Cyber ethics

EC05.01b Analyze legislation concerning Internet security issues 4

The Internet and Cyber Ethics

When should I learn cyber ethics and Internet safety?

Most students are developmentally ready to learn and apply the rules of Internet safety and cyber ethics by third grade.

Page 5: Cyber ethics

EC05.01b Analyze legislation concerning Internet security issues 5

The Internet and Cyber Ethics

What can be a crime in the classroom?

Hacking into the school’s main server to change grades?

Using the school website to publish a picture of a teacher superimposed on a donkey’s body?

Copying pictures and sound clips from a copyrighted Internet source

to use in your school’s digital yearbook ?

Page 6: Cyber ethics

EC05.01b Analyze legislation concerning Internet security issues 6

The Internet and Cyber Ethics

What is “hacking”?

A hacker is someone who breaks into files that belong to someone else to read private emails or other information.

Page 7: Cyber ethics

EC05.01b Analyze legislation concerning Internet security issues 7

The Internet and Cyber EthicsWhat could happen to students who “hack”?

• Restitution of any money loss as a result of hacking

• Community service

• Loss of internet privileges

• Probation

• Incarceration if hacking results in serious loss, injury, or death.

Page 8: Cyber ethics

EC05.01b Analyze legislation concerning Internet security issues 8

The Internet and Cyber Ethics

What is the purpose of a password?

Passwords can help keep hackers out of your computer or server so that it makes it harder for them to steal information

Page 9: Cyber ethics

EC05.01b Analyze legislation concerning Internet security issues 9

The Internet and Cyber Ethics

How can you use passwords to protect YOUR personal information?

Let’s look at password combinations. Which of these combinations would be harder for a professional hacker to decode?

Tom1963 RthomasFiReCraCKer05 Iluv3dgs Big_BabY_61

Page 10: Cyber ethics

EC05.01b Analyze legislation concerning Internet security issues 10

The Internet and Cyber Ethics

How can one choose a password that is harder for a hacker to “crack”?

Don't use passwords that are based on personal information that can be easily accessed or guessed such as birthdays, address, abbreviated names, initials, zip code, etc. Examples: bobjackson, 01091964 (birthday in ANY forms), becky1963, rlthomas, becky.thomas

Page 11: Cyber ethics

EC05.01b Analyze legislation concerning Internet security issues 11

The Internet and Cyber Ethics

• Don't use words that can be found in any dictionary of any language. • Develop a mnemonic for remembering complex passwords (Iluv3dogs=I love 3 dogs)• Use both lowercase and capital letters • Use a combination of letters, numbers, and special characters • Don’t use the same password for every password

protected account. This can be easily traced by a professional.

Page 12: Cyber ethics

EC05.01b Analyze legislation concerning Internet security issues 12

The Internet and Cyber Ethics

What are some specific rules regarding Internet safety for students?

Never give out personal information (including your name, home address, phone number, age, race, family income, school name or location, or friends' names) or use a credit card online without your permission.

Never share a password, even

with friends.

Page 13: Cyber ethics

EC05.01b Analyze legislation concerning Internet security issues 13

Never arrange a face-to-face meeting with someone you meet online.

Never respond to messages that make you feel confused or uncomfortable. You should ignore the sender, end the communication, and tell your teacher or another trusted adult right away.

Never use bad language or send mean messages online.

The Internet and Cyber Ethics

Page 14: Cyber ethics

EC05.01b Analyze legislation concerning Internet security issues 14

The Internet and Cyber Ethics

What kinds of ways can a predator seek out victims?

…… BBS ……….email

…….COS ……….public chat rooms

…….ISP ……….chat rooms

…….instant messaging ……….internet relay chat (IRC)

……….usenet (newsgroups)

Page 15: Cyber ethics

EC05.01b Analyze legislation concerning Internet security issues 15

The Internet and Cyber Ethics

How can I, as a student, encourage my peers to use and search for appropriate content on the World

Wide Web?

Make sure we know appropriate areas to search and what areas are off limits. Set time limits.

Pay attention to games or programs that are downloaded or copied. Illegally copied programs or CD’s are a no-no.

.

Page 16: Cyber ethics

EC05.01b Analyze legislation concerning Internet security issues 16

The Internet and Cyber Ethics

Check into the filtering software that your school provides and ask the technology coordinator if there are ways to bypass this filter. Keep a careful eye on myself and my peers to make sure we are not doing these things in order to go to inappropriate or questionable sites.

Talk to my parents about the importance of choosing a highly visible place to locate the family computer. Too much privacy for students can lead to unhealthy, harmful and/or

unsupervised behavior.

Page 17: Cyber ethics

EC05.01b Analyze legislation concerning Internet security issues 17

The Internet and Cyber Ethics

What content is unacceptable for a student?

How about….

……gambling?

……pornography?

……chat sessions with a predator?

……activities with someone else’s credit card?

Page 18: Cyber ethics

EC05.01b Analyze legislation concerning Internet security issues 18

……downloading files with viruses attached?

……illegal file sharing with friends (music, video, etc.)? ……pranks that lead federal, state, or local law enforcement officials to you?

The Internet and Cyber Ethics

Page 19: Cyber ethics

EC05.01b Analyze legislation concerning Internet security issues 19

The Internet and Cyber Ethics

In what way can schools make rules clear to students about their responsibility for ethical behavior using any form of multi-media?

How about a student contract?

Page 20: Cyber ethics

EC05.01b Analyze legislation concerning Internet security issues 20

The Internet and Cyber EthicsWHAT HAVE WE LEARNED?

The Internet is an infinite source of educational information that can enhance the learning experience.

Copyright laws apply to teachers as well as students.

Fair use is the standard to which educators

and students must follow when

deciding if content is

appropriate for reproduction

Page 21: Cyber ethics

EC05.01b Analyze legislation concerning Internet security issues 21

The Internet and Cyber Ethics

References

Cyber Citizenship, http://www.cybercitizenship.org/

Cyber Ethics for Teachers, ( January 24, 2005 ) A lesson plan outline for elementary and middle school children. http://www.cybercrime.gov/rules/lessonplan1.htm

Department of Education, (1997). Parents guide to the internet.http://www.ed.gov/pubs/parents/internet/tips.html

U.S. Department of Justice, Federal Bureau of Investigation http://www.fbi.gov/publications/pguide/pguidee.htm

Warlick, D., (1998-2003) Landmarks for Schools

http://www.computerlearning.org/respcode.htm

http://www.bham.wednet.edu/copyperm.htm