1 Social / Ethics NCDesk Societal and Ethical Issues.

Slides:



Advertisements
Similar presentations
1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Advertisements

Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 3 CPUs.
UNITED NATIONS Shipment Details Report – January 2006.
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
Lost in Translation Measuring and Managing GOOD Web Intentions Marilyn Harmacek. 1.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Computer Literacy BASICS
Northside I.S.D. Acceptable Use Policy
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
The Racing Game of Knowledge Continue Questions – push on trees
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
Cyber Safety Assessment Review
Hart District Acceptable Use Policy Acceptable Use Policy.
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
The Governments of the world decided that certain rules apply to ALL children under the age of 18 to help keep them safe and protect their needs.
Analyzing Genes and Genomes
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Essential Cell Biology
Intracellular Compartments and Transport
1 Lesson 15 Evaluating Electronic Information Computer Concepts BASICS 4 th Edition Wells.
PSSA Preparation.
Essential Cell Biology
Immunobiology: The Immune System in Health & Disease Sixth Edition
Energy Generation in Mitochondria and Chlorplasts
Profile. 1.Open an Internet web browser and type into the web browser address bar. 2.You will see a web page similar to the one on.
User Security for e-Post Applications Dr Chandana Gamage University of Moratuwa.
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.

Woodland Hills School District Computer Network Acceptable Use Policy.
The Internet.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Washburn High School Student “Responsible Use” Guidelines for Electronic Technologies.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Threats to I.T Internet security By Cameron Mundy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Digital Citizenship Created By: Kelli Stinson June 2011.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
Digital Citizenship Project By Allen Naylor Ed 505.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Digital Citizenship. What is a Digital Citizen? Digital Citizens are people who use technology often and appropriately. Digital Citizens are people who.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Things Every Computer User Should Know… Jessica Johnsey ED 505- Technology and Education.
Woodland Hills School District Computer Network Acceptable Use Policy.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
DIGITAL CITIZENSHIP What You Should Know!.
Technology Guidelines for Students
Technology Guidelines for Students
Student User Agreement and Policy 2022
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

1 Social / Ethics NCDesk Societal and Ethical Issues

2 Social / Ethics Computers and the Internet have a tremendous impact on society. It is important to remember some things so that you can make ethical decisions when using a computer and the internet.

3 Social / Ethics At the start of the school year, all students (along with their parents) are given the Acceptable Use Policy or AUP for computer/internet usage at school. This agreement – that you and your parents sign – basically says that you agree to use the computers and internet resources available at school appropriately. This means doing what you are instructed to do and what is ethical. Ethical behavior is considered good or right behavior.

4 Social / Ethics Your school network consists of all of the devices (computers and printers) in the building connected to the server which is a special computer used to store programs and files and send them to other computers. The school network is an example of a LAN or Local Area Network. A computer not connected to a network is called a stand alone computer. When LAN systems are connected, they form a Wide Area Network, or WAN.

5 Social / Ethics ACCEPTABLE USE POLICY (AUP) A set of rules and guidelines that are set up to regulate Internet use and to protect the user. AUP P UP

6 Social / Ethics The AUP attempts to ensure that the LAN/WAN is protected from intentional damage by users. Protect your passwords better than this! Each person has a unique username and password – NEVER let another person use your account – if they do something that is not ethical, you will be held accountable!

7 Social / Ethics Passwords should always be unique and not something that can be easily figured out by a hacker, someone who is unauthorized to access files on a computer. A strong password should contain a combination of upper and lowercase letters, numbers, and symbols. A firewall is computer software designed to protect your computer from hackers and some viruses. o1f5o1MLK

8 Social / Ethics FIREWALL Technology that prevents users from visiting inappropriate web sites, and protects the network from unauthorized users.

9 Social / Ethics PASSWORD A code for the security protection to allow access to a computer or the computer programs. sbrown s1a2n3t4a5ro11nd22a hot919dogs Which password is obviously bad?

10 Social / Ethics SECURITY Protection of computer, computer files or a computer network from use without permission of the owner or owners.

11 Social / Ethics ANTIVIRUS SOFTWARE An application designed to search for viruses and repair files on a computer.

12 Social / Ethics A Virus or Worm can damage computer files and possibly a network. Be careful when opening –If you dont know who sent it or recognize the subject – BE CAREFUL!

13 Social / Ethics TROJAN HORSE Type of computer virus that is disguised as a useful application. VIRUS A computer program designed to damage computer files. WORM A computer file designed to do damage that goes through a computer and possibly a network.

14 Social / Ethics SPAM is unwanted and unrequested . Sometimes SPAM may look like something you want. If an asks you for personal information such as passwords, social security numbers, bank or credit card information, be careful. This is called phishing (someone is fishing for information for unauthorized use)

15 Social / Ethics When you use information found on the internet (or in a book, on television…) you must remember to give credit where credit is due. If you use an image or other information, you must document your source. Abraham Lincoln Birthplace National Historic Site. 11 Feb National Park Service. 13 Feb

16 Social / Ethics COMPUTER VANDALISM The intentional act of destroying computer files or computer networks.

17 Social / Ethics HACKER An unauthorized person who secretly gains access to computer files.

18 Social / Ethics COPYRIGHT Law granting a legal right to a copyright holder or author which requires their permission to make non-archival copies of the work in question.

19 Social / Ethics ONLINE SAFETY Precautions taken to protect personal information and images from being misused by others.

20 Social / Ethics FAIR USE AND MULTIMEDIA GUIDELINES The fair use doctrine provides educators with the right to make reasonable copies of copyrighted materials without specific consent of the author for purposes of criticism, comment, news reporting, teaching, scholarship, or research. The guidelines permit the use of copyrighted works in teaching, if certain factors are considered, including: the purpose and character of the use (commercial vs. educational), the nature of the copyrighted work, the amount of the work copied in relation to the work as a whole, the effect of use on the potential market for or value of the work.

21 Social / Ethics EMERGING TECHNOLOGIES Technologies that are new and in the developmental stages; not in widespread use

22 Social / Ethics SOFTWARE/APPLICATIONS Programs that allow you to accomplish certain tasks such as write letters, analyze numbers, sort files, manage finances, draw pictures, and play games.

23 Social / Ethics PUBLIC DOMAIN Software written and then donated to the public. Anyone can use and copy public domain software free of charge, but it is not always the same quality as commercial software.

24 Social / Ethics SHAREWARE Software that can be tried before you purchase.

25 Social / Ethics FREEWARE Software written and then donated to the public, so anyone is free to copy it and share it with their friends. This is not the same as shareware or commercial software, which is supposed to be paid for.

26 Social / Ethics Commercial Software Copyrighted software that must be purchased before being installed on a machine: examples are Microsoft Windows, Office or Math Blaster

27 Social / Ethics Blog A web log; a web page that serves as an electronic journal

28 Social / Ethics IM / Chat Programs used to communicate with other users over the Internet

29 Social / Ethics Profile A web page containing information about a user of buddy sites and IMs. No personal information should ever be posted

30 Social / Ethics MP3 Type of digital music file mainly used in file sharing over the Internet

31 Social / Ethics

32 Social / Ethics

33 Social / Ethics

34 Social / Ethics

35 Social / Ethics

36 Social / Ethics

37 Social / Ethics

38 Social / Ethics