ethics half day
TRANSCRIPT
Ethics for Ethics for Cyberspace:Cyberspace: Teaching Teaching
Students Right from Students Right from
Wrong in the Digital AgeWrong in the Digital Age
Invest in Futures, ISLMA Invest in Futures, ISLMA November 6, 2008November 6, 2008
Doug JohnsonDoug Johnsonwww.doug-johnson.comwww.doug-johnson.com
……a little about the a little about the presenterpresenter
HandoutsHandouts
A modest proposal…A modest proposal…
poke an eye outpoke an eye out
poke another kidpoke another kid
write a dirty wordwrite a dirty wordwrite a threatening notewrite a threatening notewritewrite a note with test a note with test
answersanswers
some students may have some students may have nicer modelsnicer models
get stolenget stolen
break and need repairbreak and need repair
might be used for doodlingmight be used for doodling
Federal legislation neededFederal legislation neededNOW!NOW!
Where are we going????Where are we going????• Two worlds – Two worlds –
physical and virtualphysical and virtual• What’s different aboutWhat’s different about
“computer” ethics?“computer” ethics?• Ethical codesEthical codes• The three P’s: CasesThe three P’s: Cases• What students need to understandWhat students need to understand• What’s new in the Web 2.0 world?What’s new in the Web 2.0 world?• What activities teach ethical What activities teach ethical
behaviors?behaviors?
Two worldsTwo worlds
• The physical worldThe physical world• The virtual worldThe virtual world• ExamplesExamples
• the magazinethe magazine• the keysthe keys• the term paperthe term paper• the stolen bookthe stolen book Not all technology comes Not all technology comes
with rules for safe and with rules for safe and appropriate behavior.appropriate behavior.
What’s different about What’s different about “computer ethics?”“computer ethics?”
• What is ethical What is ethical behavior?behavior?
What is ethical behavior?What is ethical behavior?1.1. Promotes the general health of Promotes the general health of
society.society.
2.2. Promotes or maintains individual Promotes or maintains individual freedoms and rights.freedoms and rights.
3.3. Protects individuals from harm.Protects individuals from harm.
4.4. Treats all human beings as having Treats all human beings as having inherent value and accords those inherent value and accords those beings respect.beings respect.
5.5. Upholds religious, social, cultural, and Upholds religious, social, cultural, and governmental laws and mores.governmental laws and mores.
What’s different about What’s different about “computer ethics?”“computer ethics?”
• What is ethical behavior?What is ethical behavior?• Basis of ethical decisionsBasis of ethical decisions• The role of the school in The role of the school in
values educationvalues education• Special attributes of Special attributes of
technology ethicstechnology ethics• not understoodnot understood• new capabilitiesnew capabilities• intangibleintangible• seemingly low riskseemingly low risk
Ethical codesEthical codes• 10 Commandments 10 Commandments
of Computer Useof Computer Use• Code of Ethics and Code of Ethics and
Professional Professional ConductConduct
• NetiquetteNetiquette• Acceptable Use Acceptable Use
PoliciesPolicies• Hacker “Ethics”Hacker “Ethics”
Major areas: Major areas: PrivacyPrivacy, , Property, aPpropriate useProperty, aPpropriate use• PrivacyPrivacy - I will protect my privacy and - I will protect my privacy and
respect the privacy of others.respect the privacy of others.
For each scenario:For each scenario:
• Whose Whose privacyprivacy is at risk? is at risk?• What danger or discomfort might What danger or discomfort might
the unethical action cause?the unethical action cause?• Is there a parallel in the physical Is there a parallel in the physical
world to this scenario?world to this scenario?• Other comments? Other Other comments? Other
incidents?incidents?
Other questions…Other questions…• When is shared data helpful? When is it When is shared data helpful? When is it
harmful?harmful?• Is the hacker argument that all information Is the hacker argument that all information
should be free defensible?should be free defensible?• How available should these kinds of student How available should these kinds of student
information be?information be?• school recordsschool records• last 3 books borrowed last 3 books borrowed
from the media centerfrom the media center• last 3 sites visited on the last 3 sites visited on the
World Wide WebWorld Wide Web• favorite foods and fashionsfavorite foods and fashions
Major areas: Privacy, Major areas: Privacy, PropertyProperty, aPpropriate use, aPpropriate use• PropertyProperty - I will protect my property - I will protect my property
and respect the property of others.and respect the property of others.
For each scenario:For each scenario:
• What is the What is the propertyproperty??• Who is its owner?Who is its owner?• What danger or discomfort might What danger or discomfort might
the unethical action cause?the unethical action cause?• Is there a parallel in the physical Is there a parallel in the physical
world to this scenario?world to this scenario?• Other comments? Other Other comments? Other
incidents?incidents?
Is time property?Is time property?Online checking stocks
Online planning a wedding
Online booking a vacation
Online buying a car
Online looking for another job
Online looking for a spouse
Online trading Pokemon cards
Major areas: Privacy, Major areas: Privacy, Property,Property, aPpropriate use aPpropriate use• Plagiarism preventionPlagiarism prevention• How?How?
• Developing understandingDeveloping understanding• Having clear policiesHaving clear policies• Designing better projectsDesigning better projects
• original thinkingoriginal thinking• primary sourcesprimary sources• personal, timely, localpersonal, timely, local• choicechoice
Other questions…Other questions…• How does paying for software How does paying for software
benefit the USER?benefit the USER?• When does someone “own” an When does someone “own” an
idea? Should a cure for a disease idea? Should a cure for a disease be considered property?be considered property?
• What are the ethical What are the ethical issues raised when virus issues raised when virus hoaxes are perpetrated?hoaxes are perpetrated?
Major areas: Privacy, Major areas: Privacy, Property, Property, aPpropriate useaPpropriate use• AppropriatenessAppropriateness - I will use technology - I will use technology
in constructive ways and in ways which in constructive ways and in ways which do not break the rules of my family, do not break the rules of my family, religion, school, or government.religion, school, or government.
For each scenario:For each scenario:
• What is the inappropriate action?What is the inappropriate action?• Who committed it?Who committed it?• What danger or discomfort might What danger or discomfort might
the unethical action cause?the unethical action cause?• Is there a parallel in the physical Is there a parallel in the physical
world to this scenario?world to this scenario?• Other comments? Other Other comments? Other
incidents?incidents?
Major areas: Privacy, Major areas: Privacy, Property, Property, aPpropriate useaPpropriate use
Would I be Would I be proud to have proud to have my actions my actions seen by my seen by my family, my family, my religious leader, religious leader, or my principal?or my principal?
Other questions…Other questions…• Are some things appropriate for Are some things appropriate for
some students that are not for some students that are not for other students?other students?
• Is the personal use of school Is the personal use of school technology ever ethical?technology ever ethical?
• What is the definition of:What is the definition of:• pornographypornography• hate grouphate group• sites harmful to minorssites harmful to minors
• What are the ethical issuesWhat are the ethical issuesinvolved regarding filtering involved regarding filtering software?software?
What students need to What students need to understandunderstand• Rules and laws - Rules and laws -
principles behind themprinciples behind them• Detection is growingDetection is growing• Rights and responsibilitiesRights and responsibilities• Protection from unethical Protection from unethical
behavior of othersbehavior of others• Trust adultsTrust adults
http://www.whitehouse.govhttp://www.whitehouse.gov
http://www.whitehouse.comhttp://www.whitehouse.com
What do teachers need to What do teachers need to understand?understand?
What teachers need to What teachers need to understandunderstand
* * I clearly understand the difference between freeware, I clearly understand the difference between freeware, shareware, and commercial software and the fees involved in the shareware, and commercial software and the fees involved in the use of each. I know the programs for which the district or my use of each. I know the programs for which the district or my building holds a site license. building holds a site license. ** I understand the school board policy on the use of copyrighted I understand the school board policy on the use of copyrighted materials.materials.** I demonstrate ethical usage of all software and let my students I demonstrate ethical usage of all software and let my students know my personal stand on legal and moral issues involving know my personal stand on legal and moral issues involving technology. technology. ** I know and enforce the school’s technology policies and I know and enforce the school’s technology policies and guidelines, including its Internet Acceptable Use Policy. guidelines, including its Internet Acceptable Use Policy. ** I am aware of the controversial aspects of technology use I am aware of the controversial aspects of technology use including data privacy, equitable access, and free speech issues. including data privacy, equitable access, and free speech issues.
Perhaps the classic case of moral confusion Perhaps the classic case of moral confusion happened recently in California: A young teacher was happened recently in California: A young teacher was fired for downloading pornography on a school fired for downloading pornography on a school computer.computer.
"When he was confronted, the guy said, 'Well, what's "When he was confronted, the guy said, 'Well, what's wrong with that? I can download anything I want from wrong with that? I can download anything I want from my home computer, so why not here?' " explains my home computer, so why not here?' " explains [Paul] Longo, who has spent most of his career [Paul] Longo, who has spent most of his career analyzing teacher misbehavior. "All the sorts of analyzing teacher misbehavior. "All the sorts of things that would ring a hundred bells for most things that would ring a hundred bells for most people rang no bells for this guy. It doesn't mean he's people rang no bells for this guy. It doesn't mean he's an evil person. It means that he doesn't get it. So I an evil person. It means that he doesn't get it. So I guess that's why there's a need for [ethics education] guess that's why there's a need for [ethics education] for teachers.“for teachers.“
Christian Science MonitorChristian Science Monitor, November 6, 2001, November 6, 2001
What parents need to What parents need to understandunderstand
Training for parents at AASL’s Training for parents at AASL’s FamiliesConnect FamiliesConnect URL in bibliography/link from URL in bibliography/link from
my websitemy website
What activities What activities teach ethical behaviors?teach ethical behaviors?• Articulation and Articulation and
demonstration of valuesdemonstration of values• Reinforcement of behaviorsReinforcement of behaviors• Discussion of issuesDiscussion of issues• Stress on principles rather Stress on principles rather
than rulesthan rules• AssessmentAssessment• Creation of low temptation Creation of low temptation
environments – how?environments – how?
What do adults think of What do adults think of when they think of social when they think of social networking?networking?
This?This?
DatelineDateline
• Spring 2006Spring 2006• Parents wake upParents wake up• DOPADOPA
Predators & cyberbullies: Reality check www.blogsafety.com/ March 16, 2007
McCollam, The Shame GameColumbia Journalism Review, Jan/Feb 2007www.cjr.org/issues/2007/1/McCollam.asp
On the agenda…On the agenda…
• What is “the social web?”What is “the social web?”• How do Web 2.0 safe and ethical use How do Web 2.0 safe and ethical use
issues differ from those of Web 1.0?issues differ from those of Web 1.0?• How can we make kids safe?How can we make kids safe?• Is there a place for the social web in Is there a place for the social web in
schools?schools?• How are good decisions made about How are good decisions made about
filtering and policy - and by whom?filtering and policy - and by whom?
X
Where do Where do you live?you live?
Randall Munroe Randall Munroe http://xkcd.com/c256.htmlhttp://xkcd.com/c256.html
What is Web What is Web 2.0?2.0?• Read only -> Read and Read only -> Read and
writewrite• Horizon Report, 2007Horizon Report, 2007• Manifestations include:Manifestations include:
MySpaceMySpace
BlogsBlogs
RSS RSS AggregatorAggregatorss
WikisWikis
Content Content sharing sharing - - FlickRFlickR- YouTube- YouTube- del.icio.us- del.icio.us
3D Virtual3D VirtualEnvironmentsEnvironments
On the agenda…On the agenda…
• What is “the social web?”What is “the social web?”• How do Web 2.0 safe and ethical use How do Web 2.0 safe and ethical use
issues differ from those of Web 1.0?issues differ from those of Web 1.0?• How can we make kids safe?How can we make kids safe?• Is there a place for the social web in Is there a place for the social web in
schools?schools?• How are good decisions made about How are good decisions made about
filtering and policy - and by whom?filtering and policy - and by whom?
X
Web 1.0 to Web 2.0Web 1.0 to Web 2.0safety issuessafety issues• Protecting children from predatorsProtecting children from predators• Protecting children from each other Protecting children from each other
(cyberbullying) (cyberbullying) Protecting teachers from Protecting teachers from students???students???
• Protecting children from themselves Protecting children from themselves (making inappropriate and personal (making inappropriate and personal information public)information public)
……old fearsold fears
……from from predatopredatorsrs
If you don’t tell your If you don’t tell your children you love them…children you love them…
someone online will.
……from each otherfrom each otherwww.cyberbully.org
Ad campaign materialAd campaign material
DistrictDistrictGuideGuide
…from themselves
……from themselvesfrom themselves
Stacy Snyder aka“Drunken Pirate”
……from themselvesfrom themselves
It’s never really goneIt’s never really gone
That darned free speech That darned free speech thingthing
Common senseCommon sense
The danger to kids in Web The danger to kids in Web 2.0 comes not from what 2.0 comes not from what they may find online, but they may find online, but from what they from what they themselves put online for themselves put online for others to access.others to access.
On the agenda…On the agenda…
• What is “the social web?”What is “the social web?”• How do Web 2.0 safe and ethical use How do Web 2.0 safe and ethical use
issues differ from those of Web 1.0?issues differ from those of Web 1.0?• How can we make kids safe?How can we make kids safe?• Is there a place for the social web in Is there a place for the social web in
schools?schools?• How are good decisions made about How are good decisions made about
filtering and policy - and by whom?filtering and policy - and by whom?
X
Let’s just block it all!Let’s just block it all!
• DOPA, 2006 - DOPA, 2006 - passed the passed the House with House with 96% in favor96% in favor
• DOPA Jr.DOPA Jr.• Tomorrow?Tomorrow?
This This unnecessary unnecessary and and overly overly broad broad legislation will legislation will hinder hinder students’ ability students’ ability to engage in to engage in distance learning and block distance learning and block library computer users from library computer users from accessing a accessing a wide array wide array of of essential essential Internet Internet applications applications including instant messaging, including instant messaging, email, wikis and blogs. - email, wikis and blogs. - Leslie Leslie Burger, ALA President, 2006Burger, ALA President, 2006
Blocking formats Blocking formats not content.not content.
For every problem, For every problem, there is a solution there is a solution that is simple, neat, that is simple, neat, and wrong. H.L. and wrong. H.L. MenkenMenken
Why filtering Why filtering is ineffectiveis ineffective
• Best filters not 100%Best filters not 100%• Can’t filter what goes outCan’t filter what goes out• Access from outside schoolAccess from outside school• ProxiesProxies• Mobile devices/EVDO accessMobile devices/EVDO access
SchoolBoredom.comSchoolBoredom.com
Education is imperativeEducation is imperative
• Dangers are realDangers are real• Schools must be Schools must be
proactiveproactive• Schools must reach outSchools must reach out• Good resources on Good resources on
the webthe web• ““Safe mistakes”Safe mistakes”
Tracking TeresaTracking Teresa
What activities What activities teachteach ethical ethical behaviors?behaviors?• Articulate and demonstrate valuesArticulate and demonstrate values• Reinforce behaviorsReinforce behaviors• Discuss issuesDiscuss issues• Principles rather Principles rather
than rulesthan rules• AssessmentAssessment• Low temptation Low temptation
environmentsenvironments• Chance to practiceChance to practice
ScenariosScenariosLisa posts photographs from recent party Lisa posts photographs from recent party that involved drinking on the FlickR website that involved drinking on the FlickR website along with a really funny video of kids along with a really funny video of kids making out on YouTube.making out on YouTube.
1.1. What is the unsafe or unethical action?What is the unsafe or unethical action?
2.2. What harm might it cause?What harm might it cause?
3.3. How would you counsel/guide Lisa?How would you counsel/guide Lisa?
4.4. Similar incidents?Similar incidents?
On the agenda…On the agenda…
• What is “the social web?”What is “the social web?”• How do Web 2.0 safe and ethical use How do Web 2.0 safe and ethical use
issues differ from those of Web 1.0?issues differ from those of Web 1.0?• How can we make kids safe?How can we make kids safe?• Is there a place for the social web in Is there a place for the social web in
schools?schools?• How are good decisions made about How are good decisions made about
filtering and policy - and by whom?filtering and policy - and by whom?
X
Education Education cancan be be enhanced with the social enhanced with the social web resourcesweb resources
Classroom blogsClassroom blogs
<areallydifferentplace.o<areallydifferentplace.org>rg>
School library blogSchool library blog
Wiki Wiki textbookstextbooks
Teen Second LifeTeen Second Life
Full participation?Full participation?
The school system’s inability to close this The school system’s inability to close this participation gap has negative participation gap has negative consequences for everyone involved. - consequences for everyone involved. - Henry Jenkins, Henry Jenkins, Confronting the Confronting the Challenges of Participatory CultureChallenges of Participatory Culture
On the agenda…On the agenda…
• What is “the social web?”What is “the social web?”• How do Web 2.0 safe and ethical use How do Web 2.0 safe and ethical use
issues differ from those of Web 1.0?issues differ from those of Web 1.0?• How can we make kids safe?How can we make kids safe?• Is there a place for the social web in Is there a place for the social web in
schools?schools?• How are good decisions made about How are good decisions made about
filtering and policy - and by whom?filtering and policy - and by whom?
X
Making good decisionsMaking good decisions
• BalanceBalance• Current AUPsCurrent AUPs
• ““high-quality,” high-quality,” • ““inapropriate,” inapropriate,” • ““reasonable”reasonable”
• Open to Open to interpretation?interpretation?
Love and balance are the two most important wordsin the English language.- John Wooden
Our policy – a group Our policy – a group decision…decision…
District Technology Advisory Committee
Small
Important meetings
Goodagendasand minutes
Wide representation
Defined responsibilities
Due process for blockingDue process for blocking• Block the minimum required by CIPABlock the minimum required by CIPA• Require that any request for blocking as Require that any request for blocking as
site goes through reconsideration processsite goes through reconsideration process• Unblock any site at professional requestUnblock any site at professional request• Keep one unblocked computer in each Keep one unblocked computer in each
librarylibrary• Make educators, not techs, responsible Make educators, not techs, responsible
for safe and appropriate usefor safe and appropriate use
On the agenda…On the agenda…
• What is “the social web?”What is “the social web?”• How do Web 2.0 safe and ethical use How do Web 2.0 safe and ethical use
issues differ from those of Web 1.0?issues differ from those of Web 1.0?• How can we make kids safe?How can we make kids safe?• Is there a place for the social web in Is there a place for the social web in
schools?schools?• How are good decisions made about How are good decisions made about
filtering and policy - and by whom?filtering and policy - and by whom?
……it is not the tools that are inherently good or evil but it is not the tools that are inherently good or evil but rather the use of the tools.rather the use of the tools.
• A hammer can kill someone but it can also build a house.A hammer can kill someone but it can also build a house.• A nail can be driven through a hand but it can also hold A nail can be driven through a hand but it can also hold
the roof over your head.the roof over your head.• A fist can hit but a fist can also be clasped in your hand in A fist can hit but a fist can also be clasped in your hand in
love.love.
We do not outlaw hammers, nails, or fists -- we teach We do not outlaw hammers, nails, or fists -- we teach people to use them properly. people to use them properly.
So should we do with blogs, wikis, podcasts, Skype, So should we do with blogs, wikis, podcasts, Skype, and any other tool that becomes available for use in and any other tool that becomes available for use in the human experience! the human experience!
-Vicki Davis, Cool Cat Blog-Vicki Davis, Cool Cat Blog
The fleeber filterThe fleeber filter
19941994
• Our children will need to be able use Our children will need to be able use the Internet the Internet to compete in business to compete in business and college.and college.
• The Internet The Internet is an important resource is an important resource that can improve current teaching that can improve current teaching practices.practices.
• Our children will need to be able to use Our children will need to be able to use the Internet the Internet as informed, responsible as informed, responsible citizens. citizens.
20082008
• Our children will need to be able use Our children will need to be able use Web 2.0 Web 2.0 to compete in business and to compete in business and college.college.
• Web 2.0 Web 2.0 is an important resource is an important resource that can improve current teaching that can improve current teaching practices.practices.
• Our children will need to be able to use Our children will need to be able to use Web 2.0 Web 2.0 as informed, responsible as informed, responsible citizens. citizens.
2015, 2020, 2050…2015, 2020, 2050…
• Our children will need to be able Our children will need to be able use use ??????? ??????? to compete in business to compete in business and college.and college.
• ??????? ??????? is an important resource is an important resource that can improve current teaching that can improve current teaching practices.practices.
• Our children will need to be able to use Our children will need to be able to use ??????? ??????? as informed, responsible as informed, responsible citizens. citizens.
What can we as educators What can we as educators do to promote ethical do to promote ethical behaviors?behaviors?Your ideasYour ideas Your ideasYour ideas
Questions?Questions?
The bearThe bear
Ethics for Ethics for Cyberspace:Cyberspace: Teaching Teaching
Students Right from Students Right from
Wrong in the Digital AgeWrong in the Digital Age
Doug JohnsonDoug Johnsonwww.doug-johnson.comwww.doug-johnson.com