44
STUDY ON INFORMATION ETHICS STUDY ON INFORMATION ETHICS OF STUDENTS IN THE E-LEARNING OF STUDENTS IN THE E-LEARNING ERA ERA 2006. 1. 5 2006. 1. 5 Hyun-Yong Jung Department of Technology Education, College of Engineering Chungnam National University, Korea

STUDY ON INFORMATION ETHICS OF STUDENTS IN THE E-LEARNING ERA 2006. 1. 5 Hyun-Yong Jung Department of Technology Education, College of Engineering Chungnam

Embed Size (px)

Citation preview

STUDY ON INFORMATION ETHICS STUDY ON INFORMATION ETHICS

OF STUDENTS IN THE E-LEARNING ERAOF STUDENTS IN THE E-LEARNING ERA

2006. 1. 52006. 1. 5

Hyun-Yong Jung

Department of Technology Education, College of Engineering Chungnam National University, Korea

I. INTRODUCTIONI. INTRODUCTION

Since the mid 1990s, the government has Since the mid 1990s, the government has invested a vast amount of finances and invested a vast amount of finances and time on propagating the national infra time on propagating the national infra structure of information. structure of information.

In the beginning, the internet had spread In the beginning, the internet had spread through colleges and research centers. As through colleges and research centers. As time goes by, it came to be provided to time goes by, it came to be provided to elementary and middle schools. elementary and middle schools. Nowadays, every teacher and student can Nowadays, every teacher and student can freely use it.freely use it.

It is positive that e-learning help students' It is positive that e-learning help students' learning. But the internet use also has learning. But the internet use also has negative effects. negative effects.

Hence, reinforcing related laws to forcefully Hence, reinforcing related laws to forcefully prevent the adverse effects in the internet prevent the adverse effects in the internet use is not enough. It is necessary to insulate use is not enough. It is necessary to insulate the willingness of voluntary prevention of the willingness of voluntary prevention of students in an e-learning era. They also need students in an e-learning era. They also need to be educated with information ethics that to be educated with information ethics that enable themselves to make good decisions enable themselves to make good decisions and use information effectively.and use information effectively.

II. THEORETICAL BACKGROUNDII. THEORETICAL BACKGROUND

1. Basic Principles of Information Ethics1. Basic Principles of Information Ethics

The basic principles of information ethics can be The basic principles of information ethics can be defined in a various ways but the followings are defined in a various ways but the followings are common elements in them(Information Communicommon elements in them(Information Communication Ethics Committee, 2003):cation Ethics Committee, 2003):

1) Respect1) RespectRespect yourself as well as others. 'Respect yourRespect yourself as well as others. 'Respect yourself' implies the concern that one might not take self' implies the concern that one might not take care of life and body damaging his/her healthy bcare of life and body damaging his/her healthy because he/she became addicted to cyber space.ecause he/she became addicted to cyber space.

1. Basic Principles of Information Ethics1. Basic Principles of Information Ethics

2) Responsibility2) ResponsibilityResponsibility can be divided in proactive Responsibility can be divided in proactive responsibility and retroactive responsibility. responsibility and retroactive responsibility. Proactive responsibility is related to issues of Proactive responsibility is related to issues of whether one should be cautious or interested whether one should be cautious or interested before the action is taken. Retroactive before the action is taken. Retroactive responsibility means that one should be responsibility means that one should be responsible for the consequences of the action responsible for the consequences of the action taken. In the cyber space, both information users taken. In the cyber space, both information users and providers need to be considerate about what and providers need to be considerate about what consequences will follow their actions.consequences will follow their actions.

1. Basic Principles of Information Ethics1. Basic Principles of Information Ethics

3) Justice3) JusticeEveryone should seek for truth of information, imEveryone should seek for truth of information, impartiality, integrity, justifiable expression for whapartiality, integrity, justifiable expression for what they provide in the cyber space and benefits of t they provide in the cyber space and benefits of information. information.

4) Non-maleficence4) Non-maleficenceCyber sexual harassment, cracking, and virus cirCyber sexual harassment, cracking, and virus circulation are clearly harmful to others. Thus, they culation are clearly harmful to others. Thus, they should be prevented. Due to the characteristics oshould be prevented. Due to the characteristics of information technology, unethical activities in tf information technology, unethical activities in the cyber space cause tremendous damages to mhe cyber space cause tremendous damages to many people.any people.

2. Definition and Scope of Information Ethics2. Definition and Scope of Information Ethics

The motive for academic interest about The motive for academic interest about information ethics is in the computer information ethics is in the computer ethics that deals with ethical issues of ethics that deals with ethical issues of computer technology. computer technology.

Moor(1995) diagnoses that computer Moor(1995) diagnoses that computer technology caused new types of special technology caused new types of special ethical issues. He defined computer ethics ethical issues. He defined computer ethics as the study with the goal to analyze the as the study with the goal to analyze the societal essence and influence of societal essence and influence of computer technology to establish and computer technology to establish and justify the ways for ethical uses of justify the ways for ethical uses of computer technology.computer technology.

2. Definition and Scope of Information Ethics2. Definition and Scope of Information Ethics

Johnson(1994) divided computer ethics into thJohnson(1994) divided computer ethics into the work ethic of professionals, ownership of softwe work ethic of professionals, ownership of software, privacy, crime/abuse/hacking, responsibility are, privacy, crime/abuse/hacking, responsibility and duty in terms of autonomy and approach as and duty in terms of autonomy and approach as computer's societal impact. computer's societal impact.

Byeongwan Chu(2001) points out the loss of tByeongwan Chu(2001) points out the loss of the sense of balance because ethic education emhe sense of balance because ethic education emphases the adverse effects of information. He suphases the adverse effects of information. He suggested four broad areas to be considered imporggested four broad areas to be considered importantly in the education of information ethics: infotantly in the education of information ethics: information community, information ethics, netiquettrmation community, information ethics, netiquette, and coping ability.e, and coping ability.

2. Definition and Scope of Information Ethics2. Definition and Scope of Information Ethics

The Korea Agency for Digital Opportunity and The Korea Agency for Digital Opportunity and Promotion proposed the goals and contents of Promotion proposed the goals and contents of information ethic education in details for the information ethic education in details for the areas of communication etiquettes, unhealthy areas of communication etiquettes, unhealthy information circulation, addiction to information circulation, addiction to communication/games, cyber sexual communication/games, cyber sexual harassment/prostitution, language deformation, harassment/prostitution, language deformation, abuse of personal information, communication abuse of personal information, communication fraud/gambling, hacking, virus circulation, and fraud/gambling, hacking, virus circulation, and copyright infringement. (The Korea Agency for copyright infringement. (The Korea Agency for Digital Opportunity and Promotion, 2004)Digital Opportunity and Promotion, 2004)

2. Definition and Scope of Information Ethics2. Definition and Scope of Information Ethics

The Korea Agency for Digital Opportunity and Promotion(KADO)The Korea Agency for Digital Opportunity and Promotion(KADO)

http://www.kado.or.krhttp://www.kado.or.kr

3. Education for Information Ethics in Korea3. Education for Information Ethics in Korea

There are two types of education for There are two types of education for information ethics in the elementary schools information ethics in the elementary schools and the middle schools in Korea. and the middle schools in Korea.

First, information ethic is taught in regular First, information ethic is taught in regular curriculum such as computer class or ethics. curriculum such as computer class or ethics.

The other case is that each school teaches The other case is that each school teaches information ethics in creative free activity information ethics in creative free activity classes or special activity classes in classes or special activity classes in accordance with the education administration accordance with the education administration manual of information and communication for manual of information and communication for elementary and middle schools.elementary and middle schools.

III. STUDENTS IN THE E-LEARNING ERA WHO III. STUDENTS IN THE E-LEARNING ERA WHO ARE EXPOSED TO THE ADVERSE EFFECTS OF ARE EXPOSED TO THE ADVERSE EFFECTS OF INFORMATIONINFORMATION

According to the statistics of Korean Internet According to the statistics of Korean Internet Information Center(2002), the reasons for the Information Center(2002), the reasons for the youth to use the internet is to play games, youth to use the internet is to play games, emailing, information search, and chatting. emailing, information search, and chatting. 1.5% of people used internet for their 1.5% of people used internet for their academic work. academic work.

The misbehavior of the youth in the internet The misbehavior of the youth in the internet is almost unguarded. According to the report is almost unguarded. According to the report of the Police Agency(2003) on the statistics of of the Police Agency(2003) on the statistics of cyber crime rate in different age groups, the cyber crime rate in different age groups, the youth showed the highest rate as 37.6% of youth showed the highest rate as 37.6% of the total cyber crimes. Accordingly, the fraud the total cyber crimes. Accordingly, the fraud cases of the youth appeared to be increasing. cases of the youth appeared to be increasing.

IV. METHODOLOGY IV. METHODOLOGY

I took a training course of Information Ethics at I took a training course of Information Ethics at Korea Agency Digital Opportunity & Promotion Korea Agency Digital Opportunity & Promotion (KADO). (KADO).

I have visited schools assigned by the agency I have visited schools assigned by the agency and given lectures, since 2004, on information and given lectures, since 2004, on information ethics and the dysfunction of informatization. ethics and the dysfunction of informatization.

KADO offers training courses for instructors of KADO offers training courses for instructors of information ethics twice a year. The courses arinformation ethics twice a year. The courses are intended for people who have master or docte intended for people who have master or doctoral degrees in the fields of ethical education, oral degrees in the fields of ethical education, philosophy, education, and computer science. philosophy, education, and computer science. 40 people can be enrolled each time. 40 people can be enrolled each time.

People who complete the courses are assignePeople who complete the courses are assigned to schools where they can teach information d to schools where they can teach information ethics. ethics.

I teach students and teachers at two I teach students and teachers at two elementary, two middle, and two high elementary, two middle, and two high schools. schools.

I taught parents at an elementary school. I taught parents at an elementary school. I also taught information ethics during I also taught information ethics during

computer-related courses at two computer-related courses at two universities.universities.

The purpose of the class is to shape a healthy iThe purpose of the class is to shape a healthy information society by applying information tecnformation society by applying information technology in an ethically and morally correct wahnology in an ethically and morally correct way. y.

At elementary and middle schools, I used exerAt elementary and middle schools, I used exercises and cases on animation to teach the contcises and cases on animation to teach the content of information dysfunction. ent of information dysfunction.

At high schools and universities, I give lectureAt high schools and universities, I give lectures focusing on the cases and precautions of infs focusing on the cases and precautions of information ethics and informatization dysfunctioormation ethics and informatization dysfunction. n.

The methods of the classes are as follows: The methods of the classes are as follows: I give lectures for students and teachers by usiI give lectures for students and teachers by usi

ng visual aids such as computers and beam prng visual aids such as computers and beam projectors at an auditorium or gym or by using a ojectors at an auditorium or gym or by using a broadcasting system. broadcasting system.

Teachers in charge of informatization at the scTeachers in charge of informatization at the school evaluated the classes according to the cohool evaluated the classes according to the contents of the lectures and student reaction.ntents of the lectures and student reaction.

I reported the results to KADO. Individual studI reported the results to KADO. Individual student evaluations could not be done due to time ent evaluations could not be done due to time and environmental factors. and environmental factors.

When I read the letters from other lecturers of When I read the letters from other lecturers of information ethics in the bulletin board information ethics in the bulletin board operated by KADO, elementary students operated by KADO, elementary students showed the highest interest, and middle showed the highest interest, and middle school students showed higher interest than school students showed higher interest than high school students. high school students.

Many lecturers conclude that most high school Many lecturers conclude that most high school students already have the knowledge of students already have the knowledge of information ethics, and they are not interested information ethics, and they are not interested in the classes, so they act against what they in the classes, so they act against what they know in reality. know in reality.

Through the questionnaires in college-student-Through the questionnaires in college-student-oriented classes, I found out that there is a big oriented classes, I found out that there is a big difference between what college students knodifference between what college students know about copyrights and netizen's ethical knowlw about copyrights and netizen's ethical knowledge, and how they act in reality. edge, and how they act in reality.

V. INFORMATION ETHICS THAT V. INFORMATION ETHICS THAT STUDENTS OF THE E-LEARNING STUDENTS OF THE E-LEARNING

ERA SHOULD KNOWERA SHOULD KNOW

1. Netiquette 1. Netiquette With the advanced internet, now people With the advanced internet, now people

in anywhere in the world can be in anywhere in the world can be connected. connected.

On the internet, unlike communication in On the internet, unlike communication in the real world, people's appearance and the real world, people's appearance and personality are not easily revealed. personality are not easily revealed.

Due to the negative characteristic of the Due to the negative characteristic of the internet, 'netiquette', internet etiquettes internet, 'netiquette', internet etiquettes is needed. is needed.

1. Netiquette 1. Netiquette 1) Chatting1) Chatting

2) Cyber Language Deformation2) Cyber Language Deformation

3) Cyber Verbal Violence/Defamation of 3) Cyber Verbal Violence/Defamation of Character Character

4) Cyber Sexual harassment4) Cyber Sexual harassment

1. Netiquette 1. Netiquette Netiquette is a basic manner that is obeyNetiquette is a basic manner that is obey

ed on the web. Therefore, we should teaced on the web. Therefore, we should teach our students that they have the same sh our students that they have the same standard and do their behavior online as ttandard and do their behavior online as they live in their real lives, in the considerhey live in their real lives, in the consideration of cyber's characteristics, anonymiation of cyber's characteristics, anonymity, autonomy and variety, and that they fty, autonomy and variety, and that they forgive others' mistakes and respect their orgive others' mistakes and respect their time, privacy and character. time, privacy and character.

2. Copyright & Illegal Copy of Software2. Copyright & Illegal Copy of Software

It's common that many students in the prIt's common that many students in the primary and secondary schools download imary and secondary schools download pictures, photos, MP3, software online fopictures, photos, MP3, software online for their leisure time and put them onto ther their leisure time and put them onto their individual website, blog, or cafe withouir individual website, blog, or cafe without their creators' permission. t their creators' permission.

But this can be accused by the copyright But this can be accused by the copyright holder because it is the action that violatholder because it is the action that violates against the copyright.es against the copyright.

2. Copyright & Illegal Copy of Software2. Copyright & Illegal Copy of Software

Therefore, we should make our students Therefore, we should make our students understand about the right copyright and understand about the right copyright and remember that illegal copying without remember that illegal copying without permission is wrong to take out their permission is wrong to take out their rights from the software or contents' rights from the software or contents' holders.holders.

3. Online Game/Internet Addiction3. Online Game/Internet Addiction Game and internet addiction is resulted from Game and internet addiction is resulted from

the desires that they possess and keep much the desires that they possess and keep much more items and higher positions on the web more items and higher positions on the web because it makes them come true their desires because it makes them come true their desires in the cyber space, unlike in their real world.in the cyber space, unlike in their real world.

Therefore the education for the prevention of Therefore the education for the prevention of game and internet addiction, as well as cure of game and internet addiction, as well as cure of them, is needed at schools and homes. It's them, is needed at schools and homes. It's good for them to induce that they decrease the good for them to induce that they decrease the time for playing games and internet and make time for playing games and internet and make them higher positions in the real world through them higher positions in the real world through various activities like sports, culture, hobbies various activities like sports, culture, hobbies and learning, than those in the game world. and learning, than those in the game world.

3. Online Game/Internet Addiction3. Online Game/Internet Addiction And we should raise their psychological And we should raise their psychological

abilities to solve these problems by abilities to solve these problems by themselves.themselves.

4. Smut4. Smut Computer smut is a thing in the form of Computer smut is a thing in the form of

photos, novels and videos that someone photos, novels and videos that someone can see on computer, and be made by can see on computer, and be made by computer and into program files. It can computer and into program files. It can be distributed in a fast speed because it be distributed in a fast speed because it can be easily copied in the basic can be easily copied in the basic characteristics of computer, e-mailing characteristics of computer, e-mailing and internetand internet. .

4. Smut4. Smut Therefore, it is important that we should Therefore, it is important that we should

carry out the prevention education to the carry out the prevention education to the students in the lower classes and students in the lower classes and illegality and danger of illegal illegality and danger of illegal distribution and circulation of smut, its distribution and circulation of smut, its addiction prevention and the education addiction prevention and the education for cure to those in the higher classes. for cure to those in the higher classes.

For operating it, international For operating it, international cooperation through nations is needed, cooperation through nations is needed, especially to prevent and control the especially to prevent and control the websites that provide these kinds of websites that provide these kinds of smut services.smut services.

5. Cyber/Computer Crime5. Cyber/Computer Crime Cyber crime means all kinds of crimes Cyber crime means all kinds of crimes

committing online including computer committing online including computer crime. crime.

The forms of cyber crime can be divided The forms of cyber crime can be divided into cyber terror and general cyber into cyber terror and general cyber crime. crime.

Cyber crime by teens tends to flow into Cyber crime by teens tends to flow into making economic profit through hacking making economic profit through hacking and illegal programs, beyond their and illegal programs, beyond their simple curiosity, and their deeds against simple curiosity, and their deeds against society and to operate illegal website are society and to operate illegal website are done without any consciousness for done without any consciousness for feeling guilty.feeling guilty.

5. Cyber/Computer Crime5. Cyber/Computer Crime Therefore, in the present point that cyber Therefore, in the present point that cyber

crime is increasing with internet user's crime is increasing with internet user's increasing, not only everyone has to try increasing, not only everyone has to try their best at school, home and society, their best at school, home and society, but also the government try to have but also the government try to have prevention policy for it.prevention policy for it.

VI. CONCLUSION & SUGGESTIONVI. CONCLUSION & SUGGESTION

First, the education for information First, the education for information ethics has to begin to the students in the ethics has to begin to the students in the lower classes who begin to learn how to lower classes who begin to learn how to use computer and internet.use computer and internet.

To them, we should teach the prevention To them, we should teach the prevention and managing method of smut, as well and managing method of smut, as well as netiquette and copyright, and then as netiquette and copyright, and then with this prevention education, we with this prevention education, we should enforce the education of cure for should enforce the education of cure for the addiction of smut, internet and game the addiction of smut, internet and game in the higher classes. in the higher classes.

Second, the education for information Second, the education for information ethics is also needed for parents.ethics is also needed for parents.

The first thing that students come back The first thing that students come back home after school is sitting at the home after school is sitting at the computer. Their parents usually think computer. Their parents usually think that their children study through that their children study through computers, but they don't in many cases. computers, but they don't in many cases.

Therefore, it is needed that parents Therefore, it is needed that parents should see what their children are doing should see what their children are doing and what kind of material they are and what kind of material they are searching. If they don't so, their children searching. If they don't so, their children can be game/internet addicts or smut can be game/internet addicts or smut addicts, assaulters or victims of cyber addicts, assaulters or victims of cyber crime. crime.

Third, the education of information Third, the education of information ethics is not only in charge of home and ethics is not only in charge of home and school. Now, nation and society have to school. Now, nation and society have to participate in it.participate in it.

They have to enforce the laws and They have to enforce the laws and systems to punish against the deed that systems to punish against the deed that infringe copyright, privacy and the infringe copyright, privacy and the defamation of character. defamation of character.

Social organizations also have to Social organizations also have to participate in inspecting websites that participate in inspecting websites that keep and distribute the unhealthy keep and distribute the unhealthy information. information.

Textbooks are being made, for the public Textbooks are being made, for the public educational system, to teach young peopeducational system, to teach young people about the dysfunction of informatizatiole about the dysfunction of informatization and how to use information in the corrn and how to use information in the correct way. ect way.

In the spring semester of 2006, "Internet In the spring semester of 2006, "Internet Ethics" will be taught at middle and high Ethics" will be taught at middle and high schools. schools. 

Fourth, we need the trained professional Fourth, we need the trained professional teachers who can be exclusively teachers who can be exclusively responsibility of teaching and consulting responsibility of teaching and consulting about internet/game addition, cyber about internet/game addition, cyber crime or violence online, and its victims.crime or violence online, and its victims.

Also we need special institutions for the Also we need special institutions for the cyber addicts on internet/game and the cyber addicts on internet/game and the victims who are hurt by cyber violence, victims who are hurt by cyber violence, because they can't do normal school life because they can't do normal school life and have treatment for it properly.and have treatment for it properly.

ReferenceReference Ahn, Seonghun.(2004). Analysis on the Actual Condition of InformAhn, Seonghun.(2004). Analysis on the Actual Condition of Inform

ation ation Communication Ethics of Students, Communication Ethics of Students, Journal of Computer EducatiJournal of Computer Educati

onon, 7(1), 1-13., 7(1), 1-13. Chu, Beong Wan (2001). Chu, Beong Wan (2001). Information Ethics EducationInformation Ethics Education. Seoul:Ulyu. Seoul:Ulyu

ck Press.ck Press. Information Communication Ethics Committee(2003). Information Communication Ethics Committee(2003). Information Information

Communication Ethics White Paper. Communication Ethics White Paper. Seoul: Information CommuniSeoul: Information Communication Ethics Committee.cation Ethics Committee.

Johnson, D. G..(1994). Johnson, D. G..(1994). Computer EthicComputer Ethic. 2nd ed. NJ:Prentics Hall.. 2nd ed. NJ:Prentics Hall. Korea Customer Support Center (2002). Korea Customer Support Center (2002). A Survey on the Internet A Survey on the Internet

and E-commerce Use by Minorsand E-commerce Use by Minors. [On-Line].http://www.cpb.or.kr. [On-Line].http://www.cpb.or.kr Korean Internet Information Center (2002). Korean Internet Information Center (2002). Korean Internet StatistiKorean Internet Statisti

cscs. . [On-Line].http://isis.nic.or.kr[On-Line].http://isis.nic.or.kr Korean National Police Agency(2003). Korean National Police Agency(2003). Cyber Crime StatisticsCyber Crime Statistics. . [On-Line].http://www.police.go.kr[On-Line].http://www.police.go.kr Moor, J. H,(1995). Moor, J. H,(1995). What is Computer Ethics? Computer, Ethics anWhat is Computer Ethics? Computer, Ethics an

d Social Valuesd Social Values. Englewood Cliffs, NJ:Prentics Hall.. Englewood Cliffs, NJ:Prentics Hall.

ReferenceReference Song, Taeok.(2001). Development of a Network-Based Collaborative LearSong, Taeok.(2001). Development of a Network-Based Collaborative Lear

ning System for Education of Information Ethics, ning System for Education of Information Ethics, Journal of Computer EdJournal of Computer Educationucation, 4(2), 43-52. , 4(2), 43-52.

The Korea Agency for Digital Opportunity and Promotion(2004). The Korea Agency for Digital Opportunity and Promotion(2004). [On-Line].http://www.kado.or.kr[On-Line].http://www.kado.or.kr

Thank YouThank You