Upload
tj-wolfe
View
547
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Citation preview
1
The Internet &
Cyber Ethics
Source: Created by Rebecca Thomas 7200 EDMD Auburn University Fall 2005
EC05.01b Analyze legislation concerning Internet security issues 2
The Internet and Cyber Ethics
What is Cyber Ethics?
…...the ways that an individual uses a computer that follows the rules made by the schools and government
EC05.01b Analyze legislation concerning Internet security issues 3
The Internet and Cyber Ethics
How do I know if the computer in my classroom is being used legally and ethically?
The Department of Justice classifies computer crime in three ways………
……….computers as a target
……….computers as a weapon
………computers as an accessory
EC05.01b Analyze legislation concerning Internet security issues 4
The Internet and Cyber Ethics
When should I learn cyber ethics and Internet safety?
Most students are developmentally ready to learn and apply the rules of Internet safety and cyber ethics by third grade.
EC05.01b Analyze legislation concerning Internet security issues 5
The Internet and Cyber Ethics
What can be a crime in the classroom?
Hacking into the school’s main server to change grades?
Using the school website to publish a picture of a teacher superimposed on a donkey’s body?
Copying pictures and sound clips from a copyrighted Internet source
to use in your school’s digital yearbook ?
EC05.01b Analyze legislation concerning Internet security issues 6
The Internet and Cyber Ethics
What is “hacking”?
A hacker is someone who breaks into files that belong to someone else to read private emails or other information.
EC05.01b Analyze legislation concerning Internet security issues 7
The Internet and Cyber EthicsWhat could happen to students who “hack”?
• Restitution of any money loss as a result of hacking
• Community service
• Loss of internet privileges
• Probation
• Incarceration if hacking results in serious loss, injury, or death.
EC05.01b Analyze legislation concerning Internet security issues 8
The Internet and Cyber Ethics
What is the purpose of a password?
Passwords can help keep hackers out of your computer or server so that it makes it harder for them to steal information
EC05.01b Analyze legislation concerning Internet security issues 9
The Internet and Cyber Ethics
How can you use passwords to protect YOUR personal information?
Let’s look at password combinations. Which of these combinations would be harder for a professional hacker to decode?
Tom1963 RthomasFiReCraCKer05 Iluv3dgs Big_BabY_61
EC05.01b Analyze legislation concerning Internet security issues 10
The Internet and Cyber Ethics
How can one choose a password that is harder for a hacker to “crack”?
Don't use passwords that are based on personal information that can be easily accessed or guessed such as birthdays, address, abbreviated names, initials, zip code, etc. Examples: bobjackson, 01091964 (birthday in ANY forms), becky1963, rlthomas, becky.thomas
EC05.01b Analyze legislation concerning Internet security issues 11
The Internet and Cyber Ethics
• Don't use words that can be found in any dictionary of any language. • Develop a mnemonic for remembering complex passwords (Iluv3dogs=I love 3 dogs)• Use both lowercase and capital letters • Use a combination of letters, numbers, and special characters • Don’t use the same password for every password
protected account. This can be easily traced by a professional.
EC05.01b Analyze legislation concerning Internet security issues 12
The Internet and Cyber Ethics
What are some specific rules regarding Internet safety for students?
Never give out personal information (including your name, home address, phone number, age, race, family income, school name or location, or friends' names) or use a credit card online without your permission.
Never share a password, even
with friends.
EC05.01b Analyze legislation concerning Internet security issues 13
Never arrange a face-to-face meeting with someone you meet online.
Never respond to messages that make you feel confused or uncomfortable. You should ignore the sender, end the communication, and tell your teacher or another trusted adult right away.
Never use bad language or send mean messages online.
The Internet and Cyber Ethics
EC05.01b Analyze legislation concerning Internet security issues 14
The Internet and Cyber Ethics
What kinds of ways can a predator seek out victims?
…… BBS ……….email
…….COS ……….public chat rooms
…….ISP ……….chat rooms
…….instant messaging ……….internet relay chat (IRC)
……….usenet (newsgroups)
EC05.01b Analyze legislation concerning Internet security issues 15
The Internet and Cyber Ethics
How can I, as a student, encourage my peers to use and search for appropriate content on the World
Wide Web?
Make sure we know appropriate areas to search and what areas are off limits. Set time limits.
Pay attention to games or programs that are downloaded or copied. Illegally copied programs or CD’s are a no-no.
.
EC05.01b Analyze legislation concerning Internet security issues 16
The Internet and Cyber Ethics
Check into the filtering software that your school provides and ask the technology coordinator if there are ways to bypass this filter. Keep a careful eye on myself and my peers to make sure we are not doing these things in order to go to inappropriate or questionable sites.
Talk to my parents about the importance of choosing a highly visible place to locate the family computer. Too much privacy for students can lead to unhealthy, harmful and/or
unsupervised behavior.
EC05.01b Analyze legislation concerning Internet security issues 17
The Internet and Cyber Ethics
What content is unacceptable for a student?
How about….
……gambling?
……pornography?
……chat sessions with a predator?
……activities with someone else’s credit card?
EC05.01b Analyze legislation concerning Internet security issues 18
……downloading files with viruses attached?
……illegal file sharing with friends (music, video, etc.)? ……pranks that lead federal, state, or local law enforcement officials to you?
The Internet and Cyber Ethics
EC05.01b Analyze legislation concerning Internet security issues 19
The Internet and Cyber Ethics
In what way can schools make rules clear to students about their responsibility for ethical behavior using any form of multi-media?
How about a student contract?
EC05.01b Analyze legislation concerning Internet security issues 20
The Internet and Cyber EthicsWHAT HAVE WE LEARNED?
The Internet is an infinite source of educational information that can enhance the learning experience.
Copyright laws apply to teachers as well as students.
Fair use is the standard to which educators
and students must follow when
deciding if content is
appropriate for reproduction
EC05.01b Analyze legislation concerning Internet security issues 21
The Internet and Cyber Ethics
References
Cyber Citizenship, http://www.cybercitizenship.org/
Cyber Ethics for Teachers, ( January 24, 2005 ) A lesson plan outline for elementary and middle school children. http://www.cybercrime.gov/rules/lessonplan1.htm
Department of Education, (1997). Parents guide to the internet.http://www.ed.gov/pubs/parents/internet/tips.html
U.S. Department of Justice, Federal Bureau of Investigation http://www.fbi.gov/publications/pguide/pguidee.htm
Warlick, D., (1998-2003) Landmarks for Schools
http://www.computerlearning.org/respcode.htm
http://www.bham.wednet.edu/copyperm.htm