Cyber Ethics for Teacher Candidates

Download Report

Transcript Cyber Ethics for Teacher Candidates

Cyber Ethics
for Teacher Candidates
Teresa Chen
Department of Advanced Studies in Education and Counseling
California State University, Long Beach
Lesson Objectives
Upon completion of the lesson, you will be able to
 identify and describe the ethical issues related
to computer usage and technology integration in
schools
 develop activities and lessons that teach cyber
ethics to K-12 students
Ethical Dilemmas??
Cyber Ethics
Moral guidelines
that govern the use of the Internet
Agenda
Making good moral judgments
 Cyber ethics for K-12 students
 A WebQuest on teaching cyber ethics
 Group presentations of lesson plans

Guidelines for Making Good Moral
judgments





Know thyself
Engage your imagination
Identify the precise issue
Gather relevant facts
Identify relevant ethical standards, draw an
appropriate conclusion, and act
Source: Bassham, G., Irwin, W., Nardone, H., & Wallace, J. M. (2008).
Critical thinking: A student's introduction (3rd ed.). Boston: McGraw Hill.
Computer Ethics for Educators







Do not use a computer to harm other people
Do not interfere with others’ computer work
Do not look at others’ computer files
Do not use a computer to steal
Do not use a computer to lie
Do not use software without paying for it
Do not use others’ computer resources without
permission
Computer Ethics for Educators
(cont.)



Do not use others’ work
Think about the social impact of the programs
he or she creates
Always use a computer in a way that shows
respect and consideration for other people
Source: Shelly, G. B., Cashman, T. J., Gunter, R. E., & Gunter, G. A. (2006).
Teachers discovering computers: Integrating technology in the classroom.
(4th ed.). Boston, MA: Course Technology.
Ten Commandments of Computer
Ethics
1. Thou Shalt Not Use A Computer To Harm Other People.
2. Thou Shalt Not Interfere With Other People’s Computer
Work.
3. Thou Shalt Not Snoop Around In Other People’s
Computer Files.
4. Thou Shalt Not Use A Computer To Steal.
5. Thou Shalt Not Use A Computer To Bear False Witness.
6. Thou Shalt Not Copy Or Use Proprietary Software For
Which You Have Not Paid.
Ten Commandments of Computer
Ethics (cont.)
7. Thou Shalt Not Use Other People’s Computer
Resources Without Authorization Or Proper
Compensation.
8. Thou Shalt Not Appropriate Other People’s Intellectual
Output.
9. Thou Shalt Think About The Social Consequences Of
The Program You Are Writing Or The System You Are
Designing.
10. Thou Shalt Always Use A Computer In Ways That
Insure Consideration And Respect For Your Fellow
Humans.
Source: Computer Ethics Institute http://www.brookings.edu/its/cei/
Guidelines for Creating Web Pages





Always protect the identity of your students.
Never list student last names, telephone
numbers, home addresses, or e-mail addresses.
Use only first names of students on a Web site,
but never in conjunction with other identifying
information, such as a photograph
Use caution when including digital pictures of
classrooms; avoid pictures that show close-ups
of students.
Never provide links to sites that are not
appropriate for K-12 students or educational
settings.
Guidelines for Creating Web pages
(cont.)



List the function of all linked Web pages. Link
only to pages that inform, explain, or teach a
concept r curriculum area to students. Beware
of linking to Web sites that persuade students.
Avoid providing links to sites whose primary
propose is selling non-educational products and
services, unless relevant to the subject under
discussion.
Avoid linking to Web pages that are not updated
on a regular basis.
Guidelines for Creating Web pages
(cont.)



Provide links to sites that help you achieve
instructional and curriculum goals.
Avoid discussing controversial issues on your
Web site or linking to Web sites that discuss
controversial issues, unless these issues are
part of your curriculum.
Carefully read and follow all guidelines and
policies that your school district provides.
Source: Shelly, G. B., Cashman, T. J., Gunter, R. E., & Gunter, G. A. (2006).
Teachers discovering computers: Integrating technology in the classroom.
(4th ed.). Boston, MA: Course Technology.
Legal vs. Ethical


Legal issues are those that pertain to, or are
governed by, formal national or international law.
They have specific formal dimensions that are
governed by law, and are enforceable and
answerable to the law.
Ethical issues pertain to professional standards
or codes of conduct that are not legally binding
but can have serious professional or personal
consequences through non-legal sanctions.
Source: Bassham, G., Irwin, W., Nardone, H., & Wallace, J. M. (2008).
Critical thinking: A student's introduction (3rd ed.). Boston: McGraw Hill.
Ethical Issues





Privacy and Surveillance
Piracy
 Online plagiarism
 Downloading software, music, and movie
 Copyright and fair use
Fraudulent practices
 Hacking
 Virus replication
Fabrication of information
Unauthorized collection of information
Case 1: Employee Monitoring

Please read the Web page titled “Porn, the Harvard
dean and tech support”
http://www.salon.com/tech/feature/1999/05/21/tech_support/

Answer the following questions:
 Is it ethical for an employer to monitor what an
employee views or does on the Internet?
 In the case, do you think that the technical
support staff should serve as arbiters?
 Should a technical support member turns a blind
eye if he/ she happens to encounter something
suspicious on your computer?
Case 2: Fabrication of Information

Please give some thoughts to the following
scenario:
John has been using the digital camera to take
pictures for the family photo album. John has
found that he can use a computer program to
change the photographs. He has used the
program so far to make himself look taller, to
blacken out the front tooth of his sister, and to
give his dad slightly crossed eyes.
Case 2: Fabrication of Information
(cont.)

Please answer the following questions:
 What
 What
is the inappropriate action?
danger or discomfort might the unethical
action cause?
 What new visual literacy skills might critical
information seekers need?
 Can you think of other incidents that would fall
into this category?
WebQuests
http://webquest.org

Building blocks
 Introduction
 Task
 Process
 Evaluation
 Conclusion
 Credits
 Teacher page
A WebQuest on Teaching Cyber Ethics
Go to
http://www.csulb.edu/~tchen5/cyberethics.
htm
 Work in a group of four
 Follow the directions on the page
 Share your product (a lesson plan) and
your reflection on the activity with the class

Review




Main points of the lesson
Ethical issues identified
Lesson plans developed
Using the lesson plans in future classes