SlideShare ist ein Scribd-Unternehmen logo
1 von 21
The Internet
&
Cyber Ethics
Source: Created by Rebecca Thomas 7200 EDMD Auburn University Fall 2005
EC05.01b Analyze legislation concerning Internet security issues 2
The Internet and Cyber Ethics
What is Cyber Ethics?
…...the ways that an individual uses a computer that
follows the rules made by the schools and government
EC05.01b Analyze legislation concerning Internet security issues 3
The Internet and Cyber Ethics
How do I know if the computer in my classroom is being
used legally and ethically?
The Department of Justice classifies computer crime
in three ways………
……….computers as a target
……….computers as a weapon
………computers as an accessory
EC05.01b Analyze legislation concerning Internet security issues 4
The Internet and Cyber Ethics
When should I learn cyber ethics
and Internet safety?
Most students are developmentally ready to learn
and apply the rules of Internet safety and cyber
ethics by third grade.
EC05.01b Analyze legislation concerning Internet security issues 5
The Internet and Cyber Ethics
What can be a crime in the classroom?
Hacking into the school’s main server to change grades?
Using the school website to publish a picture of a
teacher superimposed on a donkey’s body?
Copying pictures and sound clips
from a
copyrighted Internet source
to use in your school’s digital
yearbook ?
EC05.01b Analyze legislation concerning Internet security issues 6
The Internet and Cyber Ethics
What is “hacking”?
A hacker is someone who breaks into files
that belong to someone else to read private
emails or other information.
EC05.01b Analyze legislation concerning Internet security issues 7
The Internet and Cyber Ethics
What could happen to students who “hack”?
• Restitution of any money loss as a result of hacking
• Community service
• Loss of internet privileges
• Probation
• Incarceration if hacking results in serious loss, injury,
or death.
EC05.01b Analyze legislation concerning Internet security issues 8
The Internet and Cyber Ethics
What is the purpose of a password?
Passwords can help keep hackers out of your
computer or server so that it makes it harder for
them to steal information
EC05.01b Analyze legislation concerning Internet security issues 9
The Internet and Cyber Ethics
How can you use passwords to protect YOUR
personal information?
Let’s look at password combinations. Which of these
combinations would be harder for a professional hacker
to decode?
Tom1963
Rthomas
FiReCraCKer05
Iluv3dgs
Big_BabY_61
EC05.01b Analyze legislation concerning Internet security issues 10
The Internet and Cyber Ethics
How can one choose a password that is
harder for a hacker to “crack”?
Don't use passwords that are based on personal
information that can be easily accessed or guessed such as
birthdays, address, abbreviated names, initials, zip code,
etc. Examples: bobjackson, 01091964 (birthday in ANY
forms), becky1963, rlthomas, becky.thomas
EC05.01b Analyze legislation concerning Internet security issues 11
The Internet and Cyber Ethics
• Don't use words that can be found in any dictionary of
any language.
• Develop a mnemonic for remembering complex
passwords (Iluv3dogs=I love 3 dogs)
• Use both lowercase and capital letters
• Use a combination of letters, numbers, and special
characters
• Don’t use the same password for every password
protected account. This can be
easily traced by a professional.
EC05.01b Analyze legislation concerning Internet security issues 12
The Internet and Cyber Ethics
What are some specific rules regarding Internet
safety for students?
Never give out personal information (including your
name, home address, phone number, age, race, family
income, school name or location, or friends' names)
or use a credit card online without your permission.
Never share a password, even
with friends.
EC05.01b Analyze legislation concerning Internet security issues 13
Never arrange a face-to-face meeting with
someone you meet online.
Never respond to messages that make you
feel confused or uncomfortable. You should
ignore the sender, end the communication,
and tell your teacher or another trusted
adult right away.
Never use bad language or send
mean messages online.
The Internet and Cyber Ethics
EC05.01b Analyze legislation concerning Internet security issues 14
The Internet and Cyber Ethics
What kinds of ways can a predator seek out victims?
…… BBS ……….email
…….COS ……….public chat rooms
…….ISP ……….chat rooms
…….instant messaging ……….internet relay chat (IRC)
……….usenet (newsgroups)
EC05.01b Analyze legislation concerning Internet security issues 15
The Internet and Cyber Ethics
How can I, as a student, encourage my peers to use and
search for appropriate content on the World Wide Web?
Make sure we know appropriate areas to search and
what areas are off limits. Set time limits.
Pay attention to games or programs that are downloaded
or copied. Illegally copied programs or CD’s are a no-no.
.
EC05.01b Analyze legislation concerning Internet security issues 16
The Internet and Cyber Ethics
Check into the filtering software that your school
provides and ask the technology coordinator if there are
ways to bypass this filter. Keep a careful eye on myself
and my peers to make sure we are not doing these things
in order to go to inappropriate or questionable sites.
Talk to my parents about the importance of choosing a
highly visible place to locate the family computer. Too
much privacy for
students can lead to unhealthy, harmful
and/or
unsupervised behavior.
EC05.01b Analyze legislation concerning Internet security issues 17
The Internet and Cyber Ethics
What content is unacceptable for a student?
How about….
……gambling?
……pornography?
……chat sessions with a predator?
……activities with someone else’s credit card?
EC05.01b Analyze legislation concerning Internet security issues 18
……downloading files with viruses attached?
……illegal file sharing with friends (music, video, etc.)?
……pranks that lead federal, state, or local law
enforcement officials to you?
The Internet and Cyber Ethics
EC05.01b Analyze legislation concerning Internet security issues 19
The Internet and Cyber Ethics
In what way can schools make rules clear to students
about their responsibility for ethical behavior using any
form of multi-media?
How about a student contract?
EC05.01b Analyze legislation concerning Internet security issues 20
The Internet and Cyber Ethics
WHAT HAVE WE LEARNED?
The Internet is an infinite source of educational
information that can enhance the learning
experience.
Copyright laws apply to teachers as well as
students.
Fair use is the standard to which educators
and students must follow when
deciding if content is
appropriate for reproduction
EC05.01b Analyze legislation concerning Internet security issues 21
The Internet and Cyber Ethics
References
Cyber Citizenship, http://www.cybercitizenship.org/
Cyber Ethics for Teachers, ( January 24, 2005 ) A lesson plan outline for
elementary and middle school children.
http://www.cybercrime.gov/rules/lessonplan1.htm
Department of Education, (1997). Parents guide to the internet.
http://www.ed.gov/pubs/parents/internet/tips.html
U.S. Department of Justice, Federal Bureau of Investigation
http://www.fbi.gov/publications/pguide/pguidee.htm
Warlick, D., (1998-2003) Landmarks for Schools
http://www.computerlearning.org/respcode.htm
http://www.bham.wednet.edu/copyperm.htm

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
 

Was ist angesagt? (20)

Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 

Andere mochten auch

Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethics
aleeya91
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
katespeach
 

Andere mochten auch (20)

Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)
 
Inpage presentation
Inpage presentationInpage presentation
Inpage presentation
 
In-page Urdu Features
In-page Urdu FeaturesIn-page Urdu Features
In-page Urdu Features
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Ethical issues in cyberspace
Ethical issues in cyberspaceEthical issues in cyberspace
Ethical issues in cyberspace
 
Copy Left, Right, or Wrong
Copy Left, Right, or WrongCopy Left, Right, or Wrong
Copy Left, Right, or Wrong
 
Inpage
InpageInpage
Inpage
 
Inpage
InpageInpage
Inpage
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber Ethics
 
Smart Lesson Plan
Smart Lesson PlanSmart Lesson Plan
Smart Lesson Plan
 
Ict lessen plan
Ict lessen planIct lessen plan
Ict lessen plan
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
MY ICT LESSON PLAN 3
MY ICT LESSON PLAN 3MY ICT LESSON PLAN 3
MY ICT LESSON PLAN 3
 
Blog
BlogBlog
Blog
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 

Ähnlich wie Cyber ethics

Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet use
BurkeV
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
Ollie Bray
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
chadolivard
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
cpitchford
 

Ähnlich wie Cyber ethics (20)

Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 B
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet use
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
trial
trialtrial
trial
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computing
 
Internet Law Primer
Internet Law PrimerInternet Law Primer
Internet Law Primer
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and Cyberbullying
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
cyber crime
cyber crimecyber crime
cyber crime
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 

Mehr von Dr. TJ Wolfe

Analyzing internetsecurity
Analyzing internetsecurityAnalyzing internetsecurity
Analyzing internetsecurity
Dr. TJ Wolfe
 
Analyzing securewebsites
Analyzing securewebsitesAnalyzing securewebsites
Analyzing securewebsites
Dr. TJ Wolfe
 
Analyzinglegislation
AnalyzinglegislationAnalyzinglegislation
Analyzinglegislation
Dr. TJ Wolfe
 
Impact of the_internet_on_globalization_of_business
Impact of the_internet_on_globalization_of_businessImpact of the_internet_on_globalization_of_business
Impact of the_internet_on_globalization_of_business
Dr. TJ Wolfe
 
Effects of the_internet_on_consumers_and_businesses
Effects of the_internet_on_consumers_and_businessesEffects of the_internet_on_consumers_and_businesses
Effects of the_internet_on_consumers_and_businesses
Dr. TJ Wolfe
 
Effects of the_internet_on_education_and_training
Effects of the_internet_on_education_and_trainingEffects of the_internet_on_education_and_training
Effects of the_internet_on_education_and_training
Dr. TJ Wolfe
 
STEM Resources for K-12 Educators
STEM Resources for K-12 EducatorsSTEM Resources for K-12 Educators
STEM Resources for K-12 Educators
Dr. TJ Wolfe
 
Characteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commerceiCharacteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commercei
Dr. TJ Wolfe
 
Storyboarding and planning_your_website
Storyboarding and planning_your_websiteStoryboarding and planning_your_website
Storyboarding and planning_your_website
Dr. TJ Wolfe
 
Tech Integration for Dummies. A Simple 5 Step Plan
Tech Integration for Dummies. A Simple 5 Step PlanTech Integration for Dummies. A Simple 5 Step Plan
Tech Integration for Dummies. A Simple 5 Step Plan
Dr. TJ Wolfe
 

Mehr von Dr. TJ Wolfe (11)

Principles design lecture
Principles design lecturePrinciples design lecture
Principles design lecture
 
Analyzing internetsecurity
Analyzing internetsecurityAnalyzing internetsecurity
Analyzing internetsecurity
 
Analyzing securewebsites
Analyzing securewebsitesAnalyzing securewebsites
Analyzing securewebsites
 
Analyzinglegislation
AnalyzinglegislationAnalyzinglegislation
Analyzinglegislation
 
Impact of the_internet_on_globalization_of_business
Impact of the_internet_on_globalization_of_businessImpact of the_internet_on_globalization_of_business
Impact of the_internet_on_globalization_of_business
 
Effects of the_internet_on_consumers_and_businesses
Effects of the_internet_on_consumers_and_businessesEffects of the_internet_on_consumers_and_businesses
Effects of the_internet_on_consumers_and_businesses
 
Effects of the_internet_on_education_and_training
Effects of the_internet_on_education_and_trainingEffects of the_internet_on_education_and_training
Effects of the_internet_on_education_and_training
 
STEM Resources for K-12 Educators
STEM Resources for K-12 EducatorsSTEM Resources for K-12 Educators
STEM Resources for K-12 Educators
 
Characteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commerceiCharacteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commercei
 
Storyboarding and planning_your_website
Storyboarding and planning_your_websiteStoryboarding and planning_your_website
Storyboarding and planning_your_website
 
Tech Integration for Dummies. A Simple 5 Step Plan
Tech Integration for Dummies. A Simple 5 Step PlanTech Integration for Dummies. A Simple 5 Step Plan
Tech Integration for Dummies. A Simple 5 Step Plan
 

Kürzlich hochgeladen

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Kürzlich hochgeladen (20)

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Cyber ethics

  • 1. The Internet & Cyber Ethics Source: Created by Rebecca Thomas 7200 EDMD Auburn University Fall 2005
  • 2. EC05.01b Analyze legislation concerning Internet security issues 2 The Internet and Cyber Ethics What is Cyber Ethics? …...the ways that an individual uses a computer that follows the rules made by the schools and government
  • 3. EC05.01b Analyze legislation concerning Internet security issues 3 The Internet and Cyber Ethics How do I know if the computer in my classroom is being used legally and ethically? The Department of Justice classifies computer crime in three ways……… ……….computers as a target ……….computers as a weapon ………computers as an accessory
  • 4. EC05.01b Analyze legislation concerning Internet security issues 4 The Internet and Cyber Ethics When should I learn cyber ethics and Internet safety? Most students are developmentally ready to learn and apply the rules of Internet safety and cyber ethics by third grade.
  • 5. EC05.01b Analyze legislation concerning Internet security issues 5 The Internet and Cyber Ethics What can be a crime in the classroom? Hacking into the school’s main server to change grades? Using the school website to publish a picture of a teacher superimposed on a donkey’s body? Copying pictures and sound clips from a copyrighted Internet source to use in your school’s digital yearbook ?
  • 6. EC05.01b Analyze legislation concerning Internet security issues 6 The Internet and Cyber Ethics What is “hacking”? A hacker is someone who breaks into files that belong to someone else to read private emails or other information.
  • 7. EC05.01b Analyze legislation concerning Internet security issues 7 The Internet and Cyber Ethics What could happen to students who “hack”? • Restitution of any money loss as a result of hacking • Community service • Loss of internet privileges • Probation • Incarceration if hacking results in serious loss, injury, or death.
  • 8. EC05.01b Analyze legislation concerning Internet security issues 8 The Internet and Cyber Ethics What is the purpose of a password? Passwords can help keep hackers out of your computer or server so that it makes it harder for them to steal information
  • 9. EC05.01b Analyze legislation concerning Internet security issues 9 The Internet and Cyber Ethics How can you use passwords to protect YOUR personal information? Let’s look at password combinations. Which of these combinations would be harder for a professional hacker to decode? Tom1963 Rthomas FiReCraCKer05 Iluv3dgs Big_BabY_61
  • 10. EC05.01b Analyze legislation concerning Internet security issues 10 The Internet and Cyber Ethics How can one choose a password that is harder for a hacker to “crack”? Don't use passwords that are based on personal information that can be easily accessed or guessed such as birthdays, address, abbreviated names, initials, zip code, etc. Examples: bobjackson, 01091964 (birthday in ANY forms), becky1963, rlthomas, becky.thomas
  • 11. EC05.01b Analyze legislation concerning Internet security issues 11 The Internet and Cyber Ethics • Don't use words that can be found in any dictionary of any language. • Develop a mnemonic for remembering complex passwords (Iluv3dogs=I love 3 dogs) • Use both lowercase and capital letters • Use a combination of letters, numbers, and special characters • Don’t use the same password for every password protected account. This can be easily traced by a professional.
  • 12. EC05.01b Analyze legislation concerning Internet security issues 12 The Internet and Cyber Ethics What are some specific rules regarding Internet safety for students? Never give out personal information (including your name, home address, phone number, age, race, family income, school name or location, or friends' names) or use a credit card online without your permission. Never share a password, even with friends.
  • 13. EC05.01b Analyze legislation concerning Internet security issues 13 Never arrange a face-to-face meeting with someone you meet online. Never respond to messages that make you feel confused or uncomfortable. You should ignore the sender, end the communication, and tell your teacher or another trusted adult right away. Never use bad language or send mean messages online. The Internet and Cyber Ethics
  • 14. EC05.01b Analyze legislation concerning Internet security issues 14 The Internet and Cyber Ethics What kinds of ways can a predator seek out victims? …… BBS ……….email …….COS ……….public chat rooms …….ISP ……….chat rooms …….instant messaging ……….internet relay chat (IRC) ……….usenet (newsgroups)
  • 15. EC05.01b Analyze legislation concerning Internet security issues 15 The Internet and Cyber Ethics How can I, as a student, encourage my peers to use and search for appropriate content on the World Wide Web? Make sure we know appropriate areas to search and what areas are off limits. Set time limits. Pay attention to games or programs that are downloaded or copied. Illegally copied programs or CD’s are a no-no. .
  • 16. EC05.01b Analyze legislation concerning Internet security issues 16 The Internet and Cyber Ethics Check into the filtering software that your school provides and ask the technology coordinator if there are ways to bypass this filter. Keep a careful eye on myself and my peers to make sure we are not doing these things in order to go to inappropriate or questionable sites. Talk to my parents about the importance of choosing a highly visible place to locate the family computer. Too much privacy for students can lead to unhealthy, harmful and/or unsupervised behavior.
  • 17. EC05.01b Analyze legislation concerning Internet security issues 17 The Internet and Cyber Ethics What content is unacceptable for a student? How about…. ……gambling? ……pornography? ……chat sessions with a predator? ……activities with someone else’s credit card?
  • 18. EC05.01b Analyze legislation concerning Internet security issues 18 ……downloading files with viruses attached? ……illegal file sharing with friends (music, video, etc.)? ……pranks that lead federal, state, or local law enforcement officials to you? The Internet and Cyber Ethics
  • 19. EC05.01b Analyze legislation concerning Internet security issues 19 The Internet and Cyber Ethics In what way can schools make rules clear to students about their responsibility for ethical behavior using any form of multi-media? How about a student contract?
  • 20. EC05.01b Analyze legislation concerning Internet security issues 20 The Internet and Cyber Ethics WHAT HAVE WE LEARNED? The Internet is an infinite source of educational information that can enhance the learning experience. Copyright laws apply to teachers as well as students. Fair use is the standard to which educators and students must follow when deciding if content is appropriate for reproduction
  • 21. EC05.01b Analyze legislation concerning Internet security issues 21 The Internet and Cyber Ethics References Cyber Citizenship, http://www.cybercitizenship.org/ Cyber Ethics for Teachers, ( January 24, 2005 ) A lesson plan outline for elementary and middle school children. http://www.cybercrime.gov/rules/lessonplan1.htm Department of Education, (1997). Parents guide to the internet. http://www.ed.gov/pubs/parents/internet/tips.html U.S. Department of Justice, Federal Bureau of Investigation http://www.fbi.gov/publications/pguide/pguidee.htm Warlick, D., (1998-2003) Landmarks for Schools http://www.computerlearning.org/respcode.htm http://www.bham.wednet.edu/copyperm.htm