ethics, privacy, & safety. source: ethics in computingethics in computing
TRANSCRIPT
![Page 1: Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing](https://reader036.vdocument.in/reader036/viewer/2022082317/56649ebd5503460f94bc71d0/html5/thumbnails/1.jpg)
Ethics, Privacy, & Safety
![Page 3: Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing](https://reader036.vdocument.in/reader036/viewer/2022082317/56649ebd5503460f94bc71d0/html5/thumbnails/3.jpg)
How do People Learn to Engage in Ethical Behavior?
• A recognition that an action has caused harm
• Social disapproval
• Punishment by authority
Source: Computer Ethics, Etiquette & Safety
![Page 4: Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing](https://reader036.vdocument.in/reader036/viewer/2022082317/56649ebd5503460f94bc71d0/html5/thumbnails/4.jpg)
Information and communication technologies affect ethical behavior
• Technology does not provide tangible feedback
• Technology allows us to become invisible
Source: Computer Ethics, Etiquette & Safety
![Page 5: Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing](https://reader036.vdocument.in/reader036/viewer/2022082317/56649ebd5503460f94bc71d0/html5/thumbnails/5.jpg)
Eight Ethical Decision-Making Strategies
• Golden Rule Test• Trusted Adult Test• Is There a Rule?
Test• Front Page Test
• If Everybody Did It Test
• Real World Test• Gandhi Test• Check Inside Test
Source: Computer Ethics, Etiquette & Safety
![Page 6: Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing](https://reader036.vdocument.in/reader036/viewer/2022082317/56649ebd5503460f94bc71d0/html5/thumbnails/6.jpg)
Universal Rationalizations
• The finger of blame (“She started it…”)• Follow the crowd (“Everyone does it…”)• If I only had a brain (“He told me to…”)• No harm no foul (“Nobody got hurt”)• It’s only a little bit wrong…• Good intentions (“It’s for a good cause…”)• “No one ever gets caught…”• “Things have changed…”
Source: Computer Ethics, Etiquette & Safety
![Page 7: Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing](https://reader036.vdocument.in/reader036/viewer/2022082317/56649ebd5503460f94bc71d0/html5/thumbnails/7.jpg)
What Can You Do?
• Play by the Rules• Keep It Private• Look Your Best• Don’t Pollute• Remain Cool Under
Fire• Read with Your Eyes
Open
• Credit the Source• Respect the Creator• Watch Where You are
Looking• Don’t Take Candy
from Strangers• Don’t Go Where You
Don’t Belong
Source: Computer Ethics, Etiquette & Safety
![Page 8: Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing](https://reader036.vdocument.in/reader036/viewer/2022082317/56649ebd5503460f94bc71d0/html5/thumbnails/8.jpg)
Web Resources
• CyberEthics– CyberSmart Curriculum– Copyright– Computer Virus Myths, Hoaxes, Urban Legen
ds, Hysteria
• Cyberethics, Cybersecurity and Cybersafety
![Page 9: Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing](https://reader036.vdocument.in/reader036/viewer/2022082317/56649ebd5503460f94bc71d0/html5/thumbnails/9.jpg)
The Ten Commandments of Computer Ethics
1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer
files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which
you have not paid. 7. Thou shalt not use other people's computer resources
without authorization or proper compensation. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the
program you are writing or the system you are designing. 10.Thou shalt always use a computer in ways that ensure
consideration and respect for your fellow humans.
Computer Ethics InstituteA project of the Brookings Institution
http://www.brook.edu/its/cei/cei_hp.htm
![Page 10: Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing](https://reader036.vdocument.in/reader036/viewer/2022082317/56649ebd5503460f94bc71d0/html5/thumbnails/10.jpg)
What About Privacy?
• Computer Safety• Secure e-mail• Identity Theft• Credit Reports• Spam Filters• Anti-Virus• Spyware Removal
• Privacy Software• Ad Blockers• Firewalls• Encryption• Parental Control• Key Loggers• Privacy Fence
![Page 11: Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing](https://reader036.vdocument.in/reader036/viewer/2022082317/56649ebd5503460f94bc71d0/html5/thumbnails/11.jpg)
Web Resources
• Protecting your Privacy on the Internet
• Internet Privacy Resources
![Page 12: Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing](https://reader036.vdocument.in/reader036/viewer/2022082317/56649ebd5503460f94bc71d0/html5/thumbnails/12.jpg)
Let’s Stop and Play…
• Privacy Playground
• Cybersense and Nonsense
• Jo Cool or Jo Fool
![Page 13: Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing](https://reader036.vdocument.in/reader036/viewer/2022082317/56649ebd5503460f94bc71d0/html5/thumbnails/13.jpg)
Cyberbullies
• March 08, 2005 – USA Today• "Cyberbullies, mostly ages 9 to 14, are using the
anonymity of the Web to mete out pain without witnessing the consequences," reports USA Today.
• Half of 3,000 U.S. children surveyed the past six months said they or someone they know have been victims or guilty of cyberbullying, Wired Safety says.
• Bullying isn't just for large males. Now anyone, male or female, with minimal technical skills can get into the act. But victims still tend to be kids seen as "different."
![Page 14: Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing](https://reader036.vdocument.in/reader036/viewer/2022082317/56649ebd5503460f94bc71d0/html5/thumbnails/14.jpg)
Let’s explore…
• Quiz
• Think about this…
• Suggestions
![Page 15: Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing](https://reader036.vdocument.in/reader036/viewer/2022082317/56649ebd5503460f94bc71d0/html5/thumbnails/15.jpg)
Safety
• Playing It Safe
• Keeping Children Safer
• Surf Swell Island
• CyberNetiquette Comix
• GetNetWise
• SafeKids and SafeTeens
• Netsmartzkids.org
![Page 16: Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing](https://reader036.vdocument.in/reader036/viewer/2022082317/56649ebd5503460f94bc71d0/html5/thumbnails/16.jpg)
“Integrity is doing the right thing, even if nobody is watching.”
Anonymous