 Lesson 06: Ethics. IEEE Code of Ethics Accept Responsibility. Avoid conflicts of interest. Reject bribery. Improve understanding of technology Do.

Slides:



Advertisements
Similar presentations
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Advertisements

Professional Ethics Social Implications of Computers.
Department of Education Policy 311 Acceptable Use of School Computers.
WORD STUDY  SPAM”. Online Ethics, Safety, and Privacy Module 6.
4. Intellectual Property and Ethics on the Web 59.
Vladimir Misic: 10 Professionalism and Ethics Ownership and Protection.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Netiquette Rules.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Hackers Plan Space Satellites to Combat Censorship By: David Cocke ACM TechNews: 01/04/12 Source: BBC News (12/30/11) David Meyer Website:
Colin Stewart.  Darpa announced it’s new project BOLT, Broad Operational Language Translation.  Given that the US fights a lot of wars in places where.
Intellectual Property
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Copyright A Creator’s rights.
VISD Acceptable Use Policy
What Is Computer Ethics?
Intellectual Property
Online Ethics, Safety, and Privacy Module 6.  Go to  Follow these breadcrumbs: Engineering & Technology Digital Citizenship,
BY: CHELSEA KUCERA ELED 318 The Legal, Social and Ethical Issues in Technology for the Classroom.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
7/3/08 Created by Mae Thomas Property Rights There can be consequences if you violate others' intellectual property rights. (That is, if you copy something.
Copyright What is copyright? The creator’s right to freely use his or her work. Defined under the U.S. Constitution What type of work is copyrighted?
Welcome to Technology Class
Cyber Bullying Challenges for Educators, Legal issues, and Advice for Students and Parents.
Computer Ethics.
Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
NETIQUETTE GUIDELINES FOR DISTANCE EDUCATION COURSES.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
By: Brenna Langham. Netiquette: Some Basic Rules Be careful of the words chosen when writing a statement for others to read! The other person might misinterpret.
Digital Citizenship Project Amanda Friscia University of West Alabama ED 505--Fall 2011 Online.
Digital Citizenship Project By Allen Naylor Ed 505.
Digital Citizenship. Topics  Netiquette  Copyright and Fair Use  Plagiarism  Safety on the Internet  Safety on your Computer.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
Intellectual Property Laws and Fair Use Guidelines for Educational Multimedia.
Intellectual Property Basics
General Moral imperatives
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
Boating is fun… Your Lawyer can show you how! HOW TO STAY OUT OF THE INTELLECTUAL PROPERTY MINEFIELD.
Ethics.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Breaking the law. The danger Either knowingly or otherwise, children and young people can fall foul of the law or get into trouble with other Internet.
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Digital Citizenship. What is a Digital Citizen? Digital Citizens are people who use technology often and appropriately. Digital Citizens are people who.
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Things Every Computer User Should Know… Jessica Johnsey ED 505- Technology and Education.
Internet Safety, Netiquette, Copyright Law, and Ethics
Computer Ethics Computer Technology 1 By Jill Einerson.
Copyright Laws How to Get Permission? By: Ruth Garza EDTC
Cybersafe and Secure BYHS ACCEPTABLE USE POLICY.  Access to Internet and computer resources should be for educational purposes.  Transmission of copyrighted.
E-Safety Many people around the world use internet For entertainment, social lives and Work. However, nobody knows what YOU could be getting yourself.
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
Let’s Talk about Intellectual Property Copyright Plagiarism Fair Use.
Lecture. 1.What are ethics? Why needed? 2.Islamic code of ethics 3.Network etiquette (8 broad rules) 4.Brief overview of ACM code of ethics 5.How to acquire.
What is Copyright?
Copyright Quiz How Well Do You Know Copyright?. Copyright Quiz: True or False Only materials with a copyright symbol,©, are protected. If it doesn’t have.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
A GUIDE TO COPYRIGHT & PLAGIARISM Key Terms. ATTRIBUTION Identifying the source of a work. For example, a Creative Commons "BY" or attribution license.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
4. Intellectual Property and Ethics on the Web
A Gift of Fire Third edition Sara Baase
Ethics & Privacy CSCI 101.
ICT Communications Lesson 3: Internet Life and Privacy
Presentation transcript:

 Lesson 06: Ethics

IEEE Code of Ethics Accept Responsibility. Avoid conflicts of interest. Reject bribery. Improve understanding of technology Do not discriminate. Avoid harming others Help others. utus/ethics/code.html

ACM Code of Ethics Contribute to society. Avoid harm to others. Be honest and trustworthy. Do not discriminate. Honor property rights. Give proper credit. Respect privacy

Hacker Ethics Do no harm. Protect Privacy Continual Improvement Share! Improve Security

Veracity

Wasp Orchid Trap Credit: photobitzphotobitz Tricks wasps into thinking it’s another wasp.

MySpace User Trap

Don’t Fall for Spam Bots!

Veracity Fact-Check things you find online and e- mails sent to you. Don’t forward s unless you have verified them. Snopes.com is good for verifying information you receive. Check the references on Wikipedia (wikipedia.org)

Netiquette

Online Forums

Forum Misbehaving Anonymity can bring out the worst in people. Cranks, Flamers, and Trolls Amateurs, Partisans, and Advertisers Cyberbullying Name-calling, Profanity, Goodwin’s Law, Caps Lock

Misunderstandings Text is a “cold” medium, lacking context. It doesn’t convey a tone of voice or facial expressions. Sarcasm doesn’t translate well and things texted in jest may be taken seriously. How do we communicate the intentions behind our words online?

Emoticons : ) ; ) = ) :-( (^_^) (*_*) (o_O) (^o^) (*^^*)

Once You Post Something Online, It Can Stay Online Permanently!!!

Respect Other’s Privacy Don’t post questionable photos of your friends without their permission. Don’t post slanderous statements about other people. If you flame, people will flame you back.

Remember: The Internet is Forever

Intellectual Property

Patent VS Copyright Copyright covers “works of authorship” (art, photos, books, movies, plays, music), lasts 28 years with option to renew 67 more years. The copyright on anything before 1923 has expired. Patent covers inventions, lasts 20 years.

Stuff You Can Use Fair Use Creative Commons GNU License Public Domain

Where To Get Stuff Photos: Wikipedia.org (See License Accompanying Media) Photos: Flickr.com (Search Creative Commons Photos) Music: jamendo.com Books: Project Gutenberg (gutenberg.org) Anything: Internet Archive (archive.org) Government Websites (.GOV)

Ethical Dilemas

The MySpace Suicide Case 49-year-old mother, Lori Drew, pretended to be a 16-year-old boy on MySpace to humiliate a 13-year-old girl, Megan Meier, who hung herself because of the abuse. Should Lori Drew be held accountable? How? Is it possible to prevent this sort of abuse? Are there right to privacy concerns?

Right to Fresh Start? A lawyer googled his name and found a 25- year-old newspaper article from his student newspaper reporting on his being convicted of a burglary at the school; however, the conviction had been removed from his record. He sued to have the article taken down and lost. Now the news of his lawsuit is also online. How do we reconcile the newspaper’s right to publish its articles with the individuals’ right to a clean record?

Should Software Be Patentable? Currently software can be patented or copyrighted. Algorithms can be patented if they are stored on a computer. MP3 and GIF file compression formats are patented. This makes it difficult to write software that uses these file formats. How complex should and algorithm be to make it eligible for patenting?