Download presentation
Presentation is loading. Please wait.
Published byLester Blake Modified over 9 years ago
1
Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher Amy Ginther Project NEThics Director; Policy Develoment Coordinator University of Maryland MICCA April 27, 2004
2
Core Academic Values Oblinger, 2003. In Computer and Network Security in Higher Education, Luker & Petersen, editors. Community: shared decision making; outreach to connected communities (access to affiliates or other patrons) Autonomy: academic and intellectual freedom; distributed computing Privacy: “the right to open inquiry without having the subject of one’s interest examined or scrutinized by others” (American Library Association, 2002) Fairness: due process
3
Cyberethics Topics within the Cyberethics framework: Acceptable Use Policy Netiquette Freedom of Speech issues Privacy Intellectual Property Software Licensing Electronic Cheating Access issues
4
Netiquette issues Examples of breaches of Netiquette: Writing in ALL CAPS Passing around e-mail hoaxes Excessive signature files Forwarding messages without permission Being impatient with “newbies” Off topic postings Not checking for FAQ information
5
Cybersafety Topics within the Cybersafety framework: Protection of personal information— “Google” yourself to see what is knowable about you Password protection Screen names and e-mail identities—what do they communicate? Harrassment/Predators Hoax e-mails/$$$ fraud
6
Cybersecurity Topics within the Cybersecurity framework: (overlap with Cybersafety) Viruses/Trojans—e-mail, attachments, MP3s Updating system patches Keeping anti-virus software updated Spyware Eavesdropping
7
Cybersecurity Awareness Programs Target Audiences: faculty, staff, students, IT professionals Delivery Methods: presentations, ads, articles, quizzes, handouts, videos Message Framework –Knowledge: what to do –Skills: how to do –Attitudes: want to do National Initiatives: –EDUCAUSE Security Education and Awareness –www.staysafeonline.info
8
Awareness Programs Communication tips (Payne, 2003. In Luker/Petersen.) –Take the message to the people –Be consistent in the message –Write to short attention spans –Make the message real to each target audience –Make it fun –Repeat, repeat, repeat Some examples: http://www.cit.buffalo.edu/security/caught.html http://www.itc.virginia.edu/pubs/ads/fightback/ http://www.udel.edu/codeoftheweb/
9
Resources Computer and Network Security in Higher Education, 2003. Mark Luker and Rodney Petersen, editors. http://www.educause.edu/asp/doclib/abstract.asp?ID=PUB7008 http://www.educause.edu/asp/doclib/abstract.asp?ID=PUB7008 Collection of policies and policy development resources: www.educause.edu/security www.educause.edu/security
10
Contact Information Office of Information Technology University of Maryland, College Park Amy Ginther, Policy Development Coordinator, aginther@umd.eduaginther@umd.edu; phone: 301.405.2619 Gerry Sneeringer, Security Officer, sneeri@umd.edusneeri@umd.edu; phone: 301.405.2996
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.