Shades of Grey Suzy Jagger Challenging students in the area of Cyber-ethics.

Slides:



Advertisements
Similar presentations
1 A Rights-based approach in relief and development (RBA) 1.The international vision 2.Application to Child Rights : the example of Save The Children 3.What.
Advertisements

Developmentally Appropriate Practice
VCE Health and Human Development- Unit 1 Determinants of Health La Toya.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Sauce for the Goose Learning strategies that work for teachers as well as students Many of our guests at CUREE’s 10th Anniversary event responded enthusiastically.
PART 1 MS. RHODALENE AIDOO INTRODUCTION Career is one of the commonest words to students of all levels including primary school children. This is evident.
Introduction to Computer Ethics
DED 101 Educational Psychology, Guidance And Counseling
What have we learned? We are aware of different descriptions of what it means to be moral. All of us have to make choices. Choices that involve right.
Computer Ethics in Information Technology
Social Networking in Education Presented by Justin R. Clark.
. 4.1 Understanding ethical and social issues related to systems. 4.2 Ethics in an information society. 4.3 The moral dimensions of information systems.
Propaganda law(s) in Ukraine Insight public organization Ukraine Olena Shevchenko.
Powerpoint TemplatesPage 1 Curriculum for the Nuns of Bhutan Presented by Bhutan Nuns Foundation.
The Social Effect of Information System
Nine Elements of Digital Citizenship BH. Nine elements is identified to create a digital citizenship. Digital Access: full electronic participation in.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Mr. Sellers Freshmen Studies.  Divide class into 9 groups and have each cover one of the 9 elements of digital citizenship, as defined by the book “Digital.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
LECTURE 2 - DTLLS Assessment. Research into the impact of assessment tells us that students learn best when assessment is:  Evenly timed  Represents.
SCHOOL COUNSELING "Helping children to become all that they are capable of being." Created by Tammy P. Roth, MEd Licensed School Counselor.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
Promoting Social Emotional Competence
UDMIS.info Ethics and IS. UDMIS.info The Ethics of IS Ethics and Privacy Ethical Issues Law & Order.
Digital Citizenship By JASSIM Althani. Definition of Digital Citizenship The appropriate and reasonable behavior in the use of technology. There are 9.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
CHAPTER 10 Technology Issues.
Computer Ethics A Necessity for the new era. Why is Computer Ethics Important? The creation and existence of new questions that older laws cannot answer.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Digital Citizenship: Active Participants in a Digital World.
Information Ethics Prof. Madya Dr. Rozinah Jamaludin 11 March 2010.
AIT, Comp. Sci. & Info. Mgmt AT02.98 Ethical, Legal, and Social Issues in Computing September Term, Objectives of these slides: l What ethics is,
ETHICS and COMPUTERS An Overview 23/04/2017.
Ethics, Computing, and the Internet
Final experiences with the course "Computer Ethics" on under-graduate level Mirjana Ivanović, Zoran Putnik.
Basic Nursing: Foundations of Skills & Concepts Chapter 7 ETHICAL RESPONSIBILITIES.
Incorporation of Technology into the Classroom By: Jenna Snyder.
Essential Standard 2.00 Understand the nature of business. 1.
Christine Yang March 17, As a teacher it is critical for me to demonstrate mastery of technology teacher standards. ISTE-NETS Teacher Standards.
Computer crimes.
Module 3 21st Century Learning Design Peer Coach Training.
Earning the Right To a New Beginning By Tammy Allen.
Nine Themes of Digital Citizenship By: Jinwoo Song.
INFORMATION TECHNOLOGY ETHICS INFORMATION TECHNOLOGY ETHICS.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
 Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes.
Honours Seminar in Psychology Lecture 5: Introduction to Ethics.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Revision Session 6 The Media. So what is the media?
Three Fundamental Concepts in MYP Liberty Middle School IB MYP Program.
Final-placement Meeting 18 October Demonstrate the ability to identify and apply appropriate methods of intervention, describe their theoretical.
Digital Citizenship By: Ali Al-Thani 6B. Digital citizenship Digital citizenship is an idea which enables teachers and parents to understand what students,
DPI 10 Teaching Standards
How we make ethical decisions
TECHNOLOGY STANDARDS FOR EDUCATORS BONNIE SMITH MAY 2, 2011
Crime.
DEBATE Dr. S K Biswas.
ISNE101 Dr. Ken Cosh.
Meaning and Scope Chapter 1.
Learning Area 1 Information And Communication Technology and Society
By Madison Daugherty edu
By Carly Shannon Digital Citizenship By Carly Shannon
Digital citizenship An Overview of the Nine Elements to Becoming a Good Citizen Dr. Clara Bannister, PhD. Franklin Military Academy.
– Communication Technology in a Changing World
Deciding and acting ethically
Communication Technology in a Changing World
Which man might the judge be more likely to convict? Why?
Presentation transcript:

Shades of Grey Suzy Jagger Challenging students in the area of Cyber-ethics

A computer can seriously damage your health…. New & highly sophisticated opportunities for crime New & highly sophisticated opportunities for crime Traditional crime can be committed in non-traditional ways Traditional crime can be committed in non-traditional ways Difficulty of detection Difficulty of detection The Criminal Justice system cannot keep pace with technology and is limited by geographical boundaries The Criminal Justice system cannot keep pace with technology and is limited by geographical boundaries The Data Protection Act, virtually impossible to practically enforce (33 prosecutions in the UK in 2003) The Data Protection Act, virtually impossible to practically enforce (33 prosecutions in the UK in 2003) Threat to national security, child pornography, computer intrusion and fraud, are issues that we all take seriously Threat to national security, child pornography, computer intrusion and fraud, are issues that we all take seriously The theft of intellectual property, increased plagiarism in universities. The theft of intellectual property, increased plagiarism in universities.

Wall Street Journal 11 th Jan 2005 “Spirituality Matters on the Job” More Business Schools in the US are looking at the concept of spirituality: More Business Schools in the US are looking at the concept of spirituality: It was taboo for so many years to talk about worker’s “spirituality”. But people are suffering by not being able to address that part of themselves and lead a more integrated life.” Dr. Thierry Pauchant, HEC Montreal Business School.

Wall Street Journal 11 th Jan 2005 “Spirituality Matters on the Job” “Work hours are so gruelling these days that if you don’t love what you do, you are in hell. You need the work you do to express your values and be of benefit to the larger society”. Srikumar Rao, Columbia University Business School “Work hours are so gruelling these days that if you don’t love what you do, you are in hell. You need the work you do to express your values and be of benefit to the larger society”. Srikumar Rao, Columbia University Business School

How can we educate students to look at these issues? Codes of Conduct Codes of Conduct What can we do as educators? What can we do as educators?

Enter the Undergraduate Worn out from A Levels and learning by rote Worn out from A Levels and learning by rote On the cusp of their career On the cusp of their career Ready to…..??!! Ready to…..??!! The Challenge The Challenge The Solution The Solution How can this be done effectively? How can this be done effectively?

3D Method to Learning “It matters not what we have learned. What we can do with what we have learned; this is the issue… let us not judge our students on what they know… Rather let them be judged on what they can generate from what they know – how well they can leap the barrier from learning to thinking” Bruner (1961) “It matters not what we have learned. What we can do with what we have learned; this is the issue… let us not judge our students on what they know… Rather let them be judged on what they can generate from what they know – how well they can leap the barrier from learning to thinking” Bruner (1961) … and from thinking to behaviour where attitudes are the filter to ensure correct decisions and choices are made. … and from thinking to behaviour where attitudes are the filter to ensure correct decisions and choices are made.

Debate Essentials in Practice Linked to assessment Linked to assessment Supported by strong knowledge base Supported by strong knowledge base Strong structural approach Strong structural approach Individually marked but working in groups Individually marked but working in groups Topics chosen/supported by students but students to do not choose their “side”. Topics chosen/supported by students but students to do not choose their “side”. Incentive to win the debate Incentive to win the debate

Some Topics Chosen “This house believes that the simulation of violent acts in computer games is psychologically harmful to children, promoting anti-social behavior.” “This house believes that the simulation of violent acts in computer games is psychologically harmful to children, promoting anti-social behavior.” “This house believes Napster was a great Internet innovation, not a cyberspace pirate” “This house believes Napster was a great Internet innovation, not a cyberspace pirate” “This house believes hacking should be considered a crime only if it causes harm” “This house believes hacking should be considered a crime only if it causes harm” “This house believes that the creation of robots capable of human emotions, sensations and feelings is morally unethical.” “This house believes that the creation of robots capable of human emotions, sensations and feelings is morally unethical.” “This house believes that the introduction of identity cards, as planned by the UK government, violates the rights of an individual to personal freedom and privacy” “This house believes that the introduction of identity cards, as planned by the UK government, violates the rights of an individual to personal freedom and privacy”

Questionnaires and Discussions Anonymous questionnaires before and after Anonymous questionnaires before and after Further discussions with students Further discussions with students Discussions with students over the years following the course Discussions with students over the years following the course

Comments from Students “ Before the debate I was completely indifferent to the issue. Now I am definitely opposed to Internet censorship. I think that we often take our freedom of speech in this country for granted, and it is only when you stop to think about it that you realise how valuable it is.” “ Before the debate I was completely indifferent to the issue. Now I am definitely opposed to Internet censorship. I think that we often take our freedom of speech in this country for granted, and it is only when you stop to think about it that you realise how valuable it is.”

Comments from Students “Before starting my studies in PI, I had not looked at this issue with any concern. I would have preferred to be on the other side debating. Having a look at this particular issue in this way has totally opened my eyes to a new way of unblinkered thinking.” “Before starting my studies in PI, I had not looked at this issue with any concern. I would have preferred to be on the other side debating. Having a look at this particular issue in this way has totally opened my eyes to a new way of unblinkered thinking.”

Comments from Students “Before I started the work on this debate I was definitely for the motion that it was a great innovation but as I delved deeper into the inner workings of Napster and the peer to peer technology used in its worldwide usage, I found out how illegal it was. My view of Napster has changed in the few weeks of working on this project” “Before I started the work on this debate I was definitely for the motion that it was a great innovation but as I delved deeper into the inner workings of Napster and the peer to peer technology used in its worldwide usage, I found out how illegal it was. My view of Napster has changed in the few weeks of working on this project”

A Path to Discovery The application of appropriate collaborative teaching techniques appears to be useful in helping students develop their own critical thinking skills The application of appropriate collaborative teaching techniques appears to be useful in helping students develop their own critical thinking skills The application of these methods in the area of Computer Ethics, will hopefully lead to stronger ethical frameworks being established. The application of these methods in the area of Computer Ethics, will hopefully lead to stronger ethical frameworks being established.