Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher Amy Ginther Project NEThics Director; Policy Develoment Coordinator University of Maryland MICCA April 27, 2004
Core Academic Values Oblinger, In Computer and Network Security in Higher Education, Luker & Petersen, editors. Community: shared decision making; outreach to connected communities (access to affiliates or other patrons) Autonomy: academic and intellectual freedom; distributed computing Privacy: “the right to open inquiry without having the subject of one’s interest examined or scrutinized by others” (American Library Association, 2002) Fairness: due process
Cyberethics Topics within the Cyberethics framework: Acceptable Use Policy Netiquette Freedom of Speech issues Privacy Intellectual Property Software Licensing Electronic Cheating Access issues
Netiquette issues Examples of breaches of Netiquette: Writing in ALL CAPS Passing around hoaxes Excessive signature files Forwarding messages without permission Being impatient with “newbies” Off topic postings Not checking for FAQ information
Cybersafety Topics within the Cybersafety framework: Protection of personal information— “Google” yourself to see what is knowable about you Password protection Screen names and identities—what do they communicate? Harrassment/Predators Hoax s/$$$ fraud
Cybersecurity Topics within the Cybersecurity framework: (overlap with Cybersafety) Viruses/Trojans— , attachments, MP3s Updating system patches Keeping anti-virus software updated Spyware Eavesdropping
Cybersecurity Awareness Programs Target Audiences: faculty, staff, students, IT professionals Delivery Methods: presentations, ads, articles, quizzes, handouts, videos Message Framework –Knowledge: what to do –Skills: how to do –Attitudes: want to do National Initiatives: –EDUCAUSE Security Education and Awareness –
Awareness Programs Communication tips (Payne, In Luker/Petersen.) –Take the message to the people –Be consistent in the message –Write to short attention spans –Make the message real to each target audience –Make it fun –Repeat, repeat, repeat Some examples:
Resources Computer and Network Security in Higher Education, Mark Luker and Rodney Petersen, editors. Collection of policies and policy development resources:
Contact Information Office of Information Technology University of Maryland, College Park Amy Ginther, Policy Development Coordinator, phone: Gerry Sneeringer, Security Officer, phone: