Cyber Ethics nU!. What is Cyber Ethics?  (click me) 

Slides:



Advertisements
Similar presentations
1 drt 6455 eCommerce Law lesson 8 – IT and web 2.0 associate professor faculty of law university of montreal university of montreal chair in e-Security.
Advertisements

How to protect yourself, your computer, and others on the internet
Mayfield Intermediate
Developed by Technology Services 1:1 Laptop Initiative
COPYRIGHT AND COPYWRONG Respect Copyright, Celebrate Creativity.
Copyright: What You Need To Know 1. Basic understanding of copyright, Fair Use, and citing sources you use. 2. Review how to evaluate Free Web information.
The Two Faces of Facebook Marianne Hebert, College Libraries (In collaboration with Jenica Rogers) Alumni Weekend July 11, 2008 SUNY Potsdam Presentation.
1 Lesson 15 Evaluating Electronic Information Computer Concepts BASICS 4 th Edition Wells.
ICT Workshop Departmental-use Dr. Hoda Baytiyeh-Naja The American University of Beirut.
A “bundle of rights” controlled by the owner Distribute the work Reproduce the work Display the work Perform the work Create derivative works.
September 22, 2010 Updates New Hire/Rehire Documents.
Day 3 Curriculum organized by Santa Ana Unified School District Digital Citizenship – Keeping It Ethical and Responsible.
Technology in Education Issues we need to know. Social, Ethical, and Legal. By: Kara Bushey ECED 201.
Personal Integrity and Björn Nilson Personal Integrity  Integrity vs Personal Integrity  Definition(s)  Physical and mental.
Lecture 16 Secure Social Networking. Overview What is Social Networking? The Good, the Bad and the Ugly How to protect yourself How to protect your children.
Facebook me! Online social networking as part of libraries’ web presence? This research is not affiliated with or sponsored by Facebook. Kim Holmberg Information.
Keeping Your Copyrights Deborah R. Gerhardt – Fall 2005.
ISTEP Sping 2009 Brent Howard ESD 101 Technology Integration Specialist
Copyright Myths. "If it doesn't have a copyright notice, it's not copyrighted." This was true in the past, but today almost all major nations follow the.
Harvard University CSCI E-2a Life, Liberty, and Happiness After the Digital Explosion 2: Privacy.
Using The World Wide Web Information Gathering. TCP/IP Communications protocol  how computers communicate or “talk” How does it work?
Student Library Media Center Safety Guidelines Prepared by: Mrs. Fitzpatrick AHS Library Media Center
Have You Read Your Medical Record? Peggy Beck, RHIA, CMT, FAAMT.
Do you know how to keep yourself safe?
Grade 5 Student Assistants
CYBER SAFETY RACHEL FOULGER & JANELL TOMLINSON. Cyber Bullying Violence In Media Pornography Fraud & Copyright Be Kind On Line.
What Every Principal & Staff Should Know About The Ethics of Technology ( Internet ) * Establish Guidelines * Acceptable Use Policy *Internet Safety *Privacy.
Describe ethical considerations resulting from technological advances.
Fundamental of IP network ~ ping, traceroute ~ Practice 1 Information and Communications Technology Internet Engineering.
Cyber Ethics nU!. Words for the Day  Hegemony  Public Domain  Perpetuity.
What if I told you that a random stranger has access to…
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
LINGLESTOWN MIDDLE SCHOOL GUIDELINES AND PRACTICES FOR COPYRIGHT & FAIR USE.
Safe and Responsible Social Networking Stephanie ListerBrent Howard Assistant U.S. Attorney, ED of WANorth East Washington ESD 101 Computer Crime & Intellectual.
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
Intellectual Property, Nondisclosure agreements, Electronically Monitored Workplaces, And high level thinking questions.
Internet Safety. The Now Generation! Cyber-bullying Why? “A day in the life of a student has changed”
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 7 The Internet and the World Wide Web START This multimedia product and its contents are protected.
Intellectual Property Rights and the Web: Common Myths Presentation by Jean Mistele.
(By posting) Member Content to any part of the Web site, you automatically grant, and you represent and warrant that you have the right to grant, to (company.
Community Level 6. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.
Intellectual Property Level 7. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
By: Emma Barnett CELL PHONE GPS: SAFETY OR STALKING DEVICES?
Copyright Multimedia content comes from somewhere Either you make it or you acquire it Who owns the content? Do you or your users have the property rights?
Mr. Fleming.  Law passed by Congress in  Right to Privacy ◦ Medical information of patient can only be shared with doctor and professionals administering.
Mandatory online training. intro why we are doing this why you should care what we hope you get out of this.
Privacy Issues on The Internet. Login if you want everyone to see your private life * * * * *
Police are not prepared for rising incidence of Identity Fraud By Chris DeVito.
LIBRARIES MEET THE GRID: Librarians in Cyberspace Virginia Allen Beth Avery.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Social Networking and College Classrooms Some Thoughts for Instructors Kem Saichaie & Leighton Christiansen Des Moines Area Community College 27 February.
Word 2007® Business and Personal Communication How can Microsoft Word 2007 help you work with others?
4343 X2 – Outline The Domain Name System The Web.
Computer Technology Timpview High School
Information Literacy *Internet searches and Copyright* Created by Madison Library Media Specialists.
Digital Rights and Responsibilities CSI: CyberSpace Investigation Tracee Pearson Lead Investigator.
Digital Citizenship By: Michelle Hamby ED505. Digital citizenship is the norms of appropriate, responsible technology use. Netiquette Copyright Fair Use.
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
Web Design Vocabulary #3. HTML Hypertext Markup Language - The coding scheme used to format text for use on the World Wide Web.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
Ethical Issues. Introduction to Copyright, Plagiarism Get out your note sheet.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
Using the Computer Responsibly
Issues With Internet in College
Internet Basics and Information Literacy
Presentation transcript:

Cyber Ethics nU!

What is Cyber Ethics?  (click me)  nternet.htm (click me) nternet.htm nternet.htm  rime/cyberethics.htm (no click me) rime/cyberethics.htm rime/cyberethics.htm  urces/EthicsCode.pdf My Favorite! urces/EthicsCode.pdf urces/EthicsCode.pdf

What the H is he talking about?  Cyber bullying?  Cyber trespass aka Hacking?  Ripping of MP3s, WMVs, etc?  Cyber safety?  Cyber stalking?

NO! But Hell_UVA NO!!!

Seriously  Lock up your stuff on the next  Use some common sense  Pay attention to the rest of this talk!  Remember the SBTS story Cyber protection is no JOKE!

My Turn: There's One More Talk You Need to Have by Martha Stansell-Gamm Sept. 15, Not long ago my son received his driver's license. In Virginia, this is a big deal-the ceremony takes place at the county court where a black-robed judge, a police officer and a defense attorney all address the drivers about their newly acquired freedom. It is an impressive rite of passage that marks a teenager's assumption of important new powers and responsibilities.  As I watched the ceremony, I was struck by the difference between our approach to teaching kids to drive and teaching them to use computers.

Immigrants and Natives  The world is upside down  Wild Wild West  Drivers License

Words for the Day  Hegemony  Public Domain  Perpetuity

Hegemony Leadership, predominance, preponderance; esp. the leadership or predominant authority of one state of a confederacy or union over the others: originally used in reference to the states of ancient Greece, whence transferred to the German states, and in other modern applications. -OED - the domination of one state over its allies or… Natives Immigrants Natives

“I like words – I lick them.” James Cavanaugh

Cyber Ethics nU!

nU! Information

Wikipedia Information ethics it is the field that investigates the ethical issues arising from the development and application of information technologies.

more Wikipedia Human-computer interaction is a discipline concerned with the design, evaluation and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them.

What does this have to do with ME!

(By posting) Member Content to any part of the Web site, you automatically grant, and you represent and warrant that you have the right to grant, to (company name) an irrevocable, perpetual, non- exclusive, transferable, fully paid, worldwide license (with the right to sublicense) to use, copy, perform, display, reformat, translate, excerpt (in whole or in part) and distribute such information and content and to prepare derivative works of, or incorporate into other works, such information and content, and to grant and authorize sublicenses of the foregoing. (By posting) Member Content to any part of the Web site, you automatically grant, and you represent and warrant that you have the right to grant, to (company name) an irrevocable, perpetual, non- exclusive, transferable, fully paid, worldwide license (with the right to sublicense) to use, copy, perform, display, reformat, translate, excerpt (in whole or in part) and distribute such information and content and to prepare derivative works of, or incorporate into other works, such information and content, and to grant and authorize sublicenses of the foregoing.

STUDENT RESPONSIBILITIES AND RIGHTS Students may also be disciplined for acts committed away from school property and outside school hours if the conduct is detrimental to the interest of the school or adversely affects school discipline or if the conduct results in a criminal charge or conviction. Regulation P, Page 12

High Tech - Back in the day!

Phrase for the Day Expectation of Privacy…

 Who Owns the Internet  What is the Internet?  DARPA  Ma Bell  Circuit v Packet Technology

Timeline of catch up!  The Electronic Communications Privacy Act of 2000  The Electronic Communications Privacy Act of 1986  Wire Fraud Act 1952  Communications Act of 1934  Mail Fraud Act of 1872

Some not so obscure cases  Smyth v. Pillsbury,  US v. Councilman, 2007 en.wikipedia.org/wiki/United_States_ v._Councilman en.wikipedia.org/wiki/United_States_ v._Councilman en.wikipedia.org/wiki/United_States_ v._Councilman  Katz v. United States, 1967 en.wikipedia.org/wiki/Katz_v._United _States en.wikipedia.org/wiki/Katz_v._United _States en.wikipedia.org/wiki/Katz_v._United _States

Packets in action  What is a packet and why should I care?

Ping  Packet Internet Groper. Send an Internet control message protocol (ICMP) echo request and waiting for a response. (Also called packet internet gopher). [ rwasher]$ ping PING ( ) 56(84) bytes of data. 64 bytes from : icmp_seq=0 ttl=241 time=298 ms 64 bytes from : icmp_seq=1 ttl=241 time=293 ms 64 bytes from : icmp_seq=2 ttl=241 time=285 ms 64 bytes from : icmp_seq=3 ttl=241 time=302 ms ping statistics packets transmitted, 4 received, 0% packet loss, time 4993ms rtt min/avg/max/mdev = / / /6.347 ms, pipe 2

Traceroute [ rwasher]$ traceroute traceroute: Warning: has multiple addresses; using traceroute to ( ), 30 hops max, 38 byte packets ( ) ms ms ms ( ) ms ms ms ( ) ms ms ms 4 sl-gw21-rly-3-0.sprintlink.net ( ) ms ms ms 5 sl-bb21-rly-3-0.sprintlink.net ( ) ms ms ms 6 sl-bb25-rly-11-0.sprintlink.net ( ) ms ms ms 7 sl-bb23-sj-9-0.sprintlink.net ( ) ms ms ms 8 sl-bb24-sj-14-0.sprintlink.net ( ) ms ms ms 9 sl-bb20-ana-1-0.sprintlink.net ( ) ms ms ms ( ) ms ms ms 11 sl-st20-la-13-0.sprintlink.net ( ) ms ms ms 12 sl-internap-95-0.sprintlink.net ( ) ms ms ms 13 border20.po2-bbnet2.lax.pnap.net ( ) ms ms ms 14 myspace-2.border20.lax.pnap.net ( ) ms ms ms

Some times it helps to have ADD  Info Ethics - …the ethical issues arising from the development …  HCI - …the study of major phenomena surrounding them…  Natives and FOBs

Who’s blog is it? irrevocable, perpetual, non- exclusive, transferable, fully paid, worldwide license … Who’s information is it?

Check out:     primer.htm primer.htm primer.htm

In the News The publication noted in a February 3, 2006 editorial that, "reporter Matt Donegan was fired this week for writing off-color and racially insensitive comments on his personal blog. He was off work at the time."

Right or Wrong? Other bloggers and defenders of free speech jumped to defend him. The American Civil Libertiesdeclined to do so because of Delaware's right-to-fire law.  Mr. Donegan worked for Mr. Flood (Editor), and part of his employment agreement is being an acceptable public representative of the Dover Post Co. Mr. Donegan violated that work agreement.

Paul Forbes from All Things Considered January 20, 2006 You know those classic words spoken by countless vice principals, I hope you know that this will go down on your permanent record, well our records, all of them are permanent now. Besides, it's just so easy and efficient to keep track of everyone using big databases. Databases want to be merged. They cry out to be mined and turned into money or knowledge.