Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Ethics and Research

Similar presentations


Presentation on theme: "Computer Ethics and Research"— Presentation transcript:

1 Computer Ethics and Research

2 Lesson objectives Evaluate scenarios to determine whether or not responsible/ethical practices ensued Identify Internet practices for which an individual is punishable by law Apply APA style of references to cite information sources from online resources. Create a poster outlining 10 ethical practices called ‘Ten Commandments of Computer Ethics; after brainstorming. Create a glossary using the following terms: Cyber Security; Cyber bullying, Plagiarism, Netiquette, Cyberstalking, Cyberbullying, Software Piracy, Sexting Comply with cyber security rules

3 ETHICS Ethics: the rules of personal behaviour accepted by society. Computer Ethics: a set of moral principles that regulate the use of computers

4 Netiquette This is a combination of ‘net’ and ‘etiquette’). Netiquette is etiquette on the Internet, do’s and don'ts of communicating on the Internet.

5

6 Group Activity: In groups of threes, read the following situations. Are they ethical? Give reasons for you answer. A Grade 8 girl types in her age as 18 years old so as to gain access to certain websites. An employee is given a PC at work but not all of the software needed to do his/her job. The employee copies the license from a friend outside the company to use at work. The body of a boy who drowned was in full view of the residents of a certain community. Many persons took out their phones to take pictures of the body. One person who has the picture on his phone started circulating it on social media websites. A grade 9 girl copied an entire paragraph from on online source and placed in her project without stating any source of her information. A boy continuously sends threatening messages to his friend’s friend address.

7 Cyber-bullying The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.

8 Cyber-STALKING The repeated use of electronic communications to harass or frighten someone, for example by sending threatening s.

9 sexting Sexting is sending, receiving, or forwarding sexually explicit messages, photographs or images, primarily between mobile phones.

10 The illegal copying, distribution, or use of software.
Software piracy The illegal copying, distribution, or use of software.

11 Plagiarism The practice of taking someone else's work or ideas and passing them off as one's own.

12

13 HOW TO AVOID Plagiarism

14 CITING SOURCES Whenever you research information and place it into your project, you must refer to the source of your information. One way to do so is record these sources in bibliography in the acceptable format. One acceptable format is called APA format. APA stands for American Psychological Association

15 CITING IMAGES

16 CITING IMAGE with ARTIST and year
Whenever you download an image with AN ARTIST AND THE YEAR THE IMAGE WAS PUBLISHED, this is how you have to record it in your bibliography. Artist Surname, First Initial. (Year). Title of the artwork [Format].Retrieved (date retrieved) from URL (address of web site) EXAMPLE Baumel, A. (2010). Cholera treatment centre in Haiti [Online image]. Retrieved October 2, 2010 from

17 CITING IMAGE with no arTIST and year
Whenever you download an image with NO ARTIST AND YEAR, this is how you have to record it in your bibliography. Title of the artwork [Format].Retrieved (date retrieved) from URL (address of web site) EXAMPLE Cholera treatment centre in Haiti [Online image]. Retrieved October 2, 2010 from

18 CITING IMAGE with no aRTIST, YEAR and title
Whenever you download an image with NO ARTIST, YEAR AND TITLE, this is how you have to record it in your bibliography. [Subject and type of work]. Retrieved from URL (address of web site) EXAMPLE [Untitled illustration of a sleeping dog].Retrieved October 2, 2010 from

19 ACTIVITY Yesterday, Alex copied the image below, entitled, Cyber Crime from and placed it in her project. Show how Alex should cite the reference in APA style? 2. On Wednesday, May 3, 2017, Debbie-ann downloaded the following image and used it on her cover page for a project. How should Debbie-ann cite the image in the bibliography? Artwork: Maja Petric Artist: Maju Lee Year published: 2017 URL:

20 Citing information

21 CITING online information with author and year
Whenever you use information from an online source with AN AUTHOR AND THE YEAR THE ARTICLE WAS PUBLISHED, this is how you have to record it in your bibliography. Author’s Surname, First Initial. (Year). Title of the article. Retrieved (date retrieved) from URL (address of web site) EXAMPLE Baumel, A. (2010). Computer Ethics. Retrieved October 2, 2010 from

22 CITING ONLINE INFORMATION with no author and year
Whenever you use information from an online source with NO AUTHOR AND YEAR, this is how you have to record it in your bibliography. Title of the article. Retrieved (date retrieved) from URL (address of web site) EXAMPLE Computer Ethics. Retrieved October 2, 2010 from

23 activity On January 5, 2017, June collected information from the website shown in the mage below to put in her project. Show how she should cite the information

24 Culminating Activity:
What is hacking? What is piracy? What is plagiarism? State THREE ways in which you can avoid plagiarism. State any THREE netiquettes

25 Follow-up activity: Individual Homework
Create a hand-made or computer-made poster outlining 10 ethical practices called ‘Ten Commandments of Computer Ethics’ Cite all images and information you have used in APA format. Present information on a separate sheet of paper. Prepare for test on URL, Purpose of setting up a network, Meaning of various security threats and security, recommend appropriate security measures for various threats and provide justification, netiquettes, ethical practices, citing references in APA format.


Download ppt "Computer Ethics and Research"

Similar presentations


Ads by Google