cyber ethics
DESCRIPTION
In this presentation the concept of cyber-ethics is defined, some case studies are provided, as well as suggestions for how to teach cyber-ethics to students. It concludes with questions for consideration.TRANSCRIPT
Cyber Ethics
Rating my teachers without permission or notification: Ethical use of the Internet
The need for cyber ethics
Teen's Facebook party cancelled as 200k threaten to show up (Grubb, 2011)
http://www.ratemyteachers.com/
What is cyber ethics?: A code of behaviour
Acceptable, safe and responsible behaviour similar to that of everyday life.
No harmful and illegal behaviour online (Norton, (2007; US DOJ Computer Crime and Intellectual Property Section (2011).
.
What is cyber ethics?: GuidelinesPrivacy
Property
a(P)propriate-use
What is cyber ethics?: A list of dos and don’ts
http://us.norton.com/library/familyresource/article.jsp?aid=pr_cyberethics
http://www.justice.gov/criminal/cybercrime/rules/rules.htm
Cyber ethics for whom?Web designers and website owners
Users of websites and applications
How should cyber ethics be taught in schools?
Case studies (Endicott-Popovski, 2009)
Internet safety sites (Fredrick, 2010)
Collaboration between a teacher librarian and teachers to deliver classroom activities (Bell, 2002)
How should cyber ethics be taught in schools?
Internet Use Policy (Starr (2003)
Modelling appropriateBehaviour
Alternatives to cyber ethics
Bans?
Filtering?
Conclusion
Draw parallels between the real world and the electronic world.
Make direct comparisons between what students do on the Internet and how they behave in their everyday lives.
Discussion questionsShould online ethics be a matter of individual choice or should it be the law? (Schwartau, 2011).
What should be the consequences of unethical behaviour online? (Schwartau, 2011).
How can parents and educators know what students are doing on the Internet?
Recommended readingsBell, M. A. (2002). Kids can care about cyberethics! Ed media world conference on educational media, hypermedia and telecommunications, Association for the Advancement of Computing in Education, Available from: http://www.shsu.edu/~lis_mah/documents/TCEA/brightideasportal.html
Endicott-Popovsky, B. (2009) Seeking a balance: Online safety for our children. Teacher Librarian, 37(2), 29-34.
Fredrick, K. (2010) Teaching the rules of the road online. School Library Monthly, 26(8), 35-36.
Norton. (2007, February 19). Cyberethics. Available from: http://us.norton.com/library/familyresource/article.jsp?aid=pr_cyberethics
United States Department of Justice Computer Crime and Intellectual Property Section, Cyberethics. (2011, March 17). Retrieved from: http://www.justice.gov/criminal/cybercrime/cyberethics.htm
Slide Attribution List
Slide 1. Internet police http://www.flickr.com/photos/adamcrowe/4014323612 Slide 2.Cyber bullys http://www.flickr.com/photos/theadamclarke/4866228241Slide 3. Smiling Pam http://www.flickr.com/photos/theenmoy/5504152401 Jacob Frowns http://www.flickr.com/photos/athoos/265329441 Slide 6. Desktop computer http://www.flickr.com/photos/cabinet/53737447 Slide 8. Creative Commons http://www.flickr.com/photos/double-h90/3014588691