SlideShare a Scribd company logo
1 of 18
ETHICAL ISSUESALAN S.ABERILLA
"Doing the right thing is the right thing to do.”
--Stephen Sandherr, Chief Executive Officer, Associated General Contractors of America
There’s always a purpose for technology use. Think of how, when, why, and for
what purpose you're using it. Think of ways to be creative and innovative. Think
about communicating and collaborating with others globally to learn about another
country. Think about how much students can learn via the Internet. Think of using it
to prepare today’s learners to be successful citizens of the 21st century. Think of all
the possibilities.
Technological advancements are truly impressive. We should accept that this is
the world our students are growing up in and provide opportunities to expose them to
these wonderful developments. However, each new technology should be carefully
evaluated and used as a tool to enhance the personal element in the teaching
process, not to completely replace traditional learning methods.
As we increase the use of technology in the classroom, we must also be
conscious of ethical issues that arise from that technology use. Understanding the
biggest ethical issues affecting our classrooms will help us better understand how to
address them.
When we are young our parents used to teach us the right behavior and
etiquette. Even in schools and classes, there are certain behaviors and ethics we
need to observe to achieve a healthy relationships with teachers and classmates.
Ethics has always been at the core of creating a thriving learning environment.
We are well accustomed to teaching students ethics through principled examples,
such as: these are the rules (don't push); here are reasons for the rules (don't cause
harm to others).
The widespread availability of technology brings new and challenging ethical
issues to the forefront. Doug Johnson, an expert in educational technology,
acknowledges that technology in the classroom can be extremely disruptive. He
argues that our society has imposed guidelines for things children cannot do (for
example: we drive after age 16, vote at 18, and drink at 21) because children are not
emotionally developed for these activities. However, in our attempt to educate
children to become computer literate, we push them into cyberspace without
guidance. How can we expect them to know how to behave ethically on the internet,
with their identity hidden, when we haven't fully taught them to act ethically in real-life
situations?
1. ACADEMIC HONESTY AND RESEARCH ETHICS
In the Connected Age, it's easy to go online and download multimedia
(illegally or legally). There are even subscription sites that allow unlimited
downloading of movies, music, or games, which further blurs the line between
what is free and what is copyrighted. In fact, some students are confused that
copying and pasting is plagiarism because their source material didn't have an
author, and therefore it was ''common knowledge.''
Plagiarism is a big ethical concern, especially with search engines that make
it easy to find any query. The widespread availability of knowledge also makes it
easier for students to fabricate research and fake a source. Reinforcing how to
cite authors, and why it's important to respect the intellectual property of others,
will help to minimize these occurrences. Requiring well-cited sources will also
help prevent any fabricated research.
2. ELECTRONIC COMMUNICATIONS
Electronic communication between teachers and students can be helpful, but
the line can become blurred between business and personal. Keep electronic
communications professional, and warn students of the dangers of thinking that their
emails and text messages are personal. Especially when using school or business
email systems, these types of communications can easily be made public.
3. SOCIAL NETWORKS & CYBERBULLYING
According to their company info page, Facebook has 1.79 billion active users,
and 66% of these users log on every day. That's a staggering number! Some
educators are using Facebook to share multimedia with students, or as a way for
students to connect and collectively brainstorm. My college had a Facebook page
for our cohort, and while the intentions of connecting students through the page
were positive, they provided no guidelines for the page's use and it inevitably led to
ethical issues. One student began snapping pictures of a particular student and
posting them to the page, making fun of him at every turn. This repeated-over-time
pattern of hurtful behavior was cyberbullying.
Prevent cyberbullying by discussing it, addressing it, and reporting it.
Students interact with one another via social networks, chat rooms, blogs, etc.
daily. They can write just about anything on these platforms, which then can be
forwarded to many with just a few clicks, causing more issues if the information
is sensitive or hurtful to another (Levy, 2011).
The consequences of cyberbullying can be damaging, resulting in emotional
stress, withdrawal from school, relocation, and even suicide (Cennamo et al.,
2010).
Students should report inappropriate online interactions to their parents,
teachers, counselors, and administrators immediately, whether they are a victim
or bystander.
Students need to know about the serious repercussions for intentionally
harming someone online. Outlining cyberbullying guidelines can help students
address and prevent threatening and inappropriate online behavior.
4. SOCIAL MEDIA
Social Networks can also bring up ethical issues for teachers who are
''friends'' with their students. Teachers may learn things about their students, like
seeing posts about underage drinking. A young student doesn't understand that
they have waived their right to privacy by posting things on social networks, and
they often feel that Facebook is anonymous because there is no face-to-face
interaction. This feeling also enabled my classmate to cyberbully another
student without feeling the full weight of his actions. This is a teaching moment
to help students understand that Facebook is not a diary and it is not
anonymous. Our actions and posts on public social networks could one day
prevent us from getting a job, or they could cause us to become unemployed.
Students must think before they post something online and make it available
for the world to see. A potential problem of which today’s learners must be aware
is that employers check for information about prospective candidates online
(Oxley, 2010). It’s essential that students understand that once they post an
image, comment, etc. online, it’s there forever.
5. CONFIDENTIALITY
Between utilizing online forums, social media, and other online applications,
schools are collecting a lot of information about students. The U.S. Department of
Education's Privacy Technical Assistance Center (PTAC) offers best practices for
teachers to follow when enrolling in new online services. Their advice includes
reviewing the contract for data use and retention policies, as well as being
transparent with students and parents about district information policies, including
what is being collected and how it will be used.
6. TAKE CARE OF TECHNOLOGY EQUIPMENT
Students must take care of the technology equipment, which can be viewed
as a privilege. It is also important for students to learn to protect the technology
resources (Cennamo, Ross, and Ertmer, 2010). Malware such as viruses, worms,
and Trojan horses are even more prevalent today because of the increased use of
email, fax, blogs, social media, etc. Students should be alert and active at all
times.
Unauthorized Access and Use of Hardware, software, Network, and Computer
Files. There are many cases when we want something's to be kept private and
would not allow others to use it, such as diaries, messages in our phones and e-
mails, and many others.
SOME TIPS IN CAREFULLY CREATING A PASSWORD
 Use at least characters
 Use a combination of upper and lower case letters, words, numbers, and
special characters
 Use join words together
 Use words from other languages
 Add one or more numbers at the beginning, middle, or end of a word
 Use a password that can remembered easily
 Select a password that can be entered easily even without looking at the
keyboard
 Do not leave written copies of your password anywhere
 Do not share your password to anyone.
7. EXPLORE APPROPRIATE AND SAFE SITES FOR LEARNING AND RESEARCH
The Internet is an immense storehouse of knowledge and should be used
appropriately at all times. Students should use known and trusted digital resources
(Cennamo et al., 2010). Teachers can initially provide students with a list of approved
Web sites to use in class. However, students must be empowered to evaluate sites to
make responsible and ethical decisions while surfing the Net. This practice will be
helpful when students have to complete research for school or work. Students must be
able to recognize if information on a site is valid and credible. Teaching students to
critically evaluate Web sites will prepare them for their future education and profession
(Pinkham, Wintle, and Silvernail, 2008).
8. ETHICS FOR COMPUTER USER
 Use the computer to help people and not to do harm
 Use your own assigned computer unit and not to interfere with others work
 Use the computer using your own files and not to use others files
 Use the computer to share information and not to steal others information
 Use the computer to spread truthful information and not to do character
assassination
 Use software that are original an legal not pirated
 Use others computer resources with permission and not to duplicate it without
authorization
 Use your own work and not the work of others
 Use the computer that shows respect and consideration for the other people
and not to do cyber bullying
 Create programs or software having in mind its social impact and not for self
interest.
9. HARDWARE THEFT AND VANDALISM
Hardware Theft and Vandalism are some of the security challenges
encountered by school administrators and teachers.
10. SOFTWARE THEFT
Software piracy is a form of software theft. These happens when a person
copies illegally copyrighted software for personal or business. An end-user
license agreement (EULA) or single-user license agreement is the common
type of license included in software packages purchased by an individual.
Some of the conditions are:
 Users may install the software on only one computer
 Users are prohibited to install the software on a network (school computer
lab network
 Users may make copy for back up purposes
 Users are prohibited to give copies to friends and copies to friends and
colleagues.
12. INFORMATION THEFT
Information theft is a computer crime when one deliberately steals
information for purposes of studying how to compete with other organization or
companies.
Plagiarism is a big ethical concern, especially with search engines that
make it easy to find any query. The widespread availability of knowledge also
makes it easier for students to fabricate research and fake a source.
Reinforcing how to cite authors, and why it's important to respect the intellectual
property of others, will help to minimize these occurrences. Requiring well-cited
sources will also help prevent any fabricated research.
Malicious Acts in Software - the following malicious acts are commonly
experienced in emails, cell phones, or text messaging devices and blogs.
 Spam is an unwanted message being received through emails,
discussions, text messaging devices, and others
 Phishing may also be called as carding or spoofing
 Spam message can be reduce if not prevented by adjusting the settings in
your emails to delete spam automatically
 Malware is a malicious software that causes harm to one or more
computers
 Adware is a software that incorporates the presentation of advertisements
and condition for operating the software.
13. ACCEPTABLE AND UNACCEPTABLE USES OF SCHOOL TECHNOLOGY
Schools may have different rules and regulations or policies in implementing
acceptable and unacceptable used of school technology.
Examples of Acceptable Use of School Technology Examples of Unacceptable
Use of School Technology
 Abiding by the policies and procedures of other networks that are accessed
 Being polite and using appropriate language
 Deleting unwanted messages or old data from computers and servers
 Enforcing appropriate used and reporting misuse or security issues
 Altering software by deleting files, downloading programs, or copying or
installing unauthorized files or programs
 Assuming the identity or using the passwords or materials of another
 Conducting commercial activities, advertising products, or taking part in
political lobbying
 Running antivirus software on downloaded files, attachments, peripherals, or
disks
 Signing correspondence
 Using online time efficiently
 Using the internet ethically and legally
 Downloading text, graphics or software, or engaging in behaviours that may
considered obscene, abusive, libelous, indescent, vulgar, profane, or lewd
 Gaining access to any pay- for -view site
 Giving out your own or others’ private information, such as address, phone
number, or passwords.
 Harassing an individual using the internet
 Plagiarizing
 Transmitting material that violates any local or countries regulation, or obscene
material
 Vandalizing equipment, digital files, or wilfully spreading computer viruses.
ACTIVITY 2 (Truth or Dare)
Make a brochure on the different malicious acts in software
considering the following:
1. Use short bond paper – (Orientation – Landscape)
2. Divide the bond paper into 3 columns
Rubrics
SPECIFICS POINTS
Content 30
Originality 10
Creativity 10
Vallor, Shannon. “An Introduction to Cybersecurity Ethics.” Markkula Center for Applied EthicsWebsite, February 7,
2018, pp. 48-52. Available at: https://www.scu.edu/media/ethics-center/technology-
ethics/IntroToCybersecurityEthics.pdf
Cennamo, K.S., Ertmer, P.A., and Ross, J.D. (2010).Technology Integration for MeaningfulClassroom Use:A
Standards-BasedApproach, 1st ed. Belmont, CA:Wadsworth Cengage Learning.
GOOD LUCK
KEEP SAFE
GOD BLESS
/ Sir A

More Related Content

What's hot

Technology Literacy
Technology LiteracyTechnology Literacy
Technology Literacy
ahlesl3638
 
Importance of Technology in Education
Importance of Technology in EducationImportance of Technology in Education
Importance of Technology in Education
LorvelynMorales
 
King-Mobile Technology in Education.ppt
King-Mobile Technology in Education.pptKing-Mobile Technology in Education.ppt
King-Mobile Technology in Education.ppt
charlotteking11
 
Mobile Devices and Apps in Education
Mobile Devices and Apps in EducationMobile Devices and Apps in Education
Mobile Devices and Apps in Education
Rebecca Kate Miller
 
Nathans Presentation Final
Nathans Presentation FinalNathans Presentation Final
Nathans Presentation Final
sharkitch
 

What's hot (20)

Impact of technology in education
Impact of technology in educationImpact of technology in education
Impact of technology in education
 
Impact of Digital Technology on Education
Impact of Digital Technology on EducationImpact of Digital Technology on Education
Impact of Digital Technology on Education
 
Why is mobile learning important  in education?
Why is mobile learning important  in education?Why is mobile learning important  in education?
Why is mobile learning important  in education?
 
Beekman5 std ppt_16
Beekman5 std ppt_16Beekman5 std ppt_16
Beekman5 std ppt_16
 
Technology Literacy
Technology LiteracyTechnology Literacy
Technology Literacy
 
Impact of technology on learning
Impact of technology on learningImpact of technology on learning
Impact of technology on learning
 
Importance of Technology in Education
Importance of Technology in EducationImportance of Technology in Education
Importance of Technology in Education
 
King-Mobile Technology in Education.ppt
King-Mobile Technology in Education.pptKing-Mobile Technology in Education.ppt
King-Mobile Technology in Education.ppt
 
Peter lance-d.a.-visita-ed tech-2
Peter lance-d.a.-visita-ed tech-2Peter lance-d.a.-visita-ed tech-2
Peter lance-d.a.-visita-ed tech-2
 
Technology and Education
Technology and EducationTechnology and Education
Technology and Education
 
Use of Computers in Education
Use of Computers in EducationUse of Computers in Education
Use of Computers in Education
 
My portfolio in edtc2
My portfolio in edtc2My portfolio in edtc2
My portfolio in edtc2
 
Technology in education
Technology in educationTechnology in education
Technology in education
 
Mobile Learning & New Trends
Mobile Learning & New TrendsMobile Learning & New Trends
Mobile Learning & New Trends
 
Mobile Devices and Apps in Education
Mobile Devices and Apps in EducationMobile Devices and Apps in Education
Mobile Devices and Apps in Education
 
22.Real Teachers Essay On Ict
22.Real Teachers Essay On Ict22.Real Teachers Essay On Ict
22.Real Teachers Essay On Ict
 
Nathans Presentation Final
Nathans Presentation FinalNathans Presentation Final
Nathans Presentation Final
 
The advantages of mobile learning
The advantages of mobile learningThe advantages of mobile learning
The advantages of mobile learning
 
Mobile Learning Definitions
Mobile Learning DefinitionsMobile Learning Definitions
Mobile Learning Definitions
 
Characteristics of mobile learning
Characteristics of  mobile  learningCharacteristics of  mobile  learning
Characteristics of mobile learning
 

Similar to Lesson 3 ethical issues

Does the Usage of Internet harm Child DevelopmentIs the interne.docx
Does the Usage of Internet harm Child DevelopmentIs the interne.docxDoes the Usage of Internet harm Child DevelopmentIs the interne.docx
Does the Usage of Internet harm Child DevelopmentIs the interne.docx
jacksnathalie
 
Unit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docxUnit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docx
marilucorr
 
Navigating Social Media
Navigating Social MediaNavigating Social Media
Navigating Social Media
Mark Ness
 
4The Internet and Social Safety among Elementary KidsInte.docx
 4The Internet and Social Safety among Elementary KidsInte.docx 4The Internet and Social Safety among Elementary KidsInte.docx
4The Internet and Social Safety among Elementary KidsInte.docx
joyjonna282
 
Cyberbully presentation
Cyberbully presentationCyberbully presentation
Cyberbully presentation
Yuming Peng
 
Cyberbully presentation
Cyberbully presentationCyberbully presentation
Cyberbully presentation
Yuming Peng
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
Mazni Salleh
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversation
lippertnicole
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
Linda Long
 
A2 s watson etl523
A2 s watson etl523A2 s watson etl523
A2 s watson etl523
cinkay
 
Final module 6 almost done1
Final module 6 almost done1Final module 6 almost done1
Final module 6 almost done1
clfowler123
 

Similar to Lesson 3 ethical issues (20)

Does the Usage of Internet harm Child DevelopmentIs the interne.docx
Does the Usage of Internet harm Child DevelopmentIs the interne.docxDoes the Usage of Internet harm Child DevelopmentIs the interne.docx
Does the Usage of Internet harm Child DevelopmentIs the interne.docx
 
Unit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docxUnit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docx
 
Ethics
EthicsEthics
Ethics
 
Ruth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldRuth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital World
 
Navigating Social Media
Navigating Social MediaNavigating Social Media
Navigating Social Media
 
Social Media
Social MediaSocial Media
Social Media
 
Social Media Policy for our School District
Social Media Policy for our School DistrictSocial Media Policy for our School District
Social Media Policy for our School District
 
4The Internet and Social Safety among Elementary KidsInte.docx
 4The Internet and Social Safety among Elementary KidsInte.docx 4The Internet and Social Safety among Elementary KidsInte.docx
4The Internet and Social Safety among Elementary KidsInte.docx
 
Cyberbully presentation
Cyberbully presentationCyberbully presentation
Cyberbully presentation
 
Cyberbully presentation
Cyberbully presentationCyberbully presentation
Cyberbully presentation
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversation
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
 
SEG AT2.pptx
SEG AT2.pptxSEG AT2.pptx
SEG AT2.pptx
 
SEG AT2 final update
SEG AT2 final updateSEG AT2 final update
SEG AT2 final update
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber path
 
ETEC635 Paper
ETEC635 PaperETEC635 Paper
ETEC635 Paper
 
A2 s watson etl523
A2 s watson etl523A2 s watson etl523
A2 s watson etl523
 
Final module 6 almost done1
Final module 6 almost done1Final module 6 almost done1
Final module 6 almost done1
 

More from MLG College of Learning, Inc (20)

PC111.Lesson2
PC111.Lesson2PC111.Lesson2
PC111.Lesson2
 
PC111.Lesson1
PC111.Lesson1PC111.Lesson1
PC111.Lesson1
 
PC111-lesson1.pptx
PC111-lesson1.pptxPC111-lesson1.pptx
PC111-lesson1.pptx
 
PC LEESOON 6.pptx
PC LEESOON 6.pptxPC LEESOON 6.pptx
PC LEESOON 6.pptx
 
PC 106 PPT-09.pptx
PC 106 PPT-09.pptxPC 106 PPT-09.pptx
PC 106 PPT-09.pptx
 
PC 106 PPT-07
PC 106 PPT-07PC 106 PPT-07
PC 106 PPT-07
 
PC 106 PPT-01
PC 106 PPT-01PC 106 PPT-01
PC 106 PPT-01
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
PC 106 PPT-05
PC 106 PPT-05PC 106 PPT-05
PC 106 PPT-05
 
PC 106 Slide 04
PC 106 Slide 04PC 106 Slide 04
PC 106 Slide 04
 
PC 106 Slide no.02
PC 106 Slide no.02PC 106 Slide no.02
PC 106 Slide no.02
 
pc-106-slide-3
pc-106-slide-3pc-106-slide-3
pc-106-slide-3
 
PC 106 Slide 2
PC 106 Slide 2PC 106 Slide 2
PC 106 Slide 2
 
PC 106 Slide 1.pptx
PC 106 Slide 1.pptxPC 106 Slide 1.pptx
PC 106 Slide 1.pptx
 
Db2 characteristics of db ms
Db2 characteristics of db msDb2 characteristics of db ms
Db2 characteristics of db ms
 
Db1 introduction
Db1 introductionDb1 introduction
Db1 introduction
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 
Lesson 3.1
Lesson 3.1Lesson 3.1
Lesson 3.1
 
Lesson 1.6
Lesson 1.6Lesson 1.6
Lesson 1.6
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 

Recently uploaded

CHEAP Call Girls in Malviya Nagar, (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in  Malviya Nagar, (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in  Malviya Nagar, (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Malviya Nagar, (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Navsari Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...
Navsari Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...Navsari Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...
Navsari Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...
mriyagarg453
 
Call Girls Agency In Goa 💚 9316020077 💚 Call Girl Goa By Russian Call Girl ...
Call Girls  Agency In Goa  💚 9316020077 💚 Call Girl Goa By Russian Call Girl ...Call Girls  Agency In Goa  💚 9316020077 💚 Call Girl Goa By Russian Call Girl ...
Call Girls Agency In Goa 💚 9316020077 💚 Call Girl Goa By Russian Call Girl ...
russian goa call girl and escorts service
 
Zirakpur Call Girls👧 Book Now📱8146719683 📞👉Mohali Call Girl Service No Advanc...
Zirakpur Call Girls👧 Book Now📱8146719683 📞👉Mohali Call Girl Service No Advanc...Zirakpur Call Girls👧 Book Now📱8146719683 📞👉Mohali Call Girl Service No Advanc...
Zirakpur Call Girls👧 Book Now📱8146719683 📞👉Mohali Call Girl Service No Advanc...
rajveermohali2022
 
Desi Bhabhi Call Girls In Goa 💃 730 02 72 001💃desi Bhabhi Escort Goa
Desi Bhabhi Call Girls  In Goa  💃 730 02 72 001💃desi Bhabhi Escort GoaDesi Bhabhi Call Girls  In Goa  💃 730 02 72 001💃desi Bhabhi Escort Goa
Desi Bhabhi Call Girls In Goa 💃 730 02 72 001💃desi Bhabhi Escort Goa
russian goa call girl and escorts service
 
Goa Call Girls 9316020077 Call Girls In Goa By Russian Call Girl in goa
Goa Call Girls 9316020077 Call Girls  In Goa By Russian Call Girl in goaGoa Call Girls 9316020077 Call Girls  In Goa By Russian Call Girl in goa
Goa Call Girls 9316020077 Call Girls In Goa By Russian Call Girl in goa
russian goa call girl and escorts service
 
Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448
ont65320
 

Recently uploaded (20)

Hotel And Home Service Available Kolkata Call Girls Diamond Harbour ✔ 6297143...
Hotel And Home Service Available Kolkata Call Girls Diamond Harbour ✔ 6297143...Hotel And Home Service Available Kolkata Call Girls Diamond Harbour ✔ 6297143...
Hotel And Home Service Available Kolkata Call Girls Diamond Harbour ✔ 6297143...
 
Borum Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Borum Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceBorum Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Borum Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
CHEAP Call Girls in Malviya Nagar, (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in  Malviya Nagar, (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in  Malviya Nagar, (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Malviya Nagar, (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
 
Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata ✔ 62971...
Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata ✔ 62971...Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata ✔ 62971...
Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata ✔ 62971...
 
Navsari Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...
Navsari Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...Navsari Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...
Navsari Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girl...
 
Hotel And Home Service Available Kolkata Call Girls South End Park ✔ 62971435...
Hotel And Home Service Available Kolkata Call Girls South End Park ✔ 62971435...Hotel And Home Service Available Kolkata Call Girls South End Park ✔ 62971435...
Hotel And Home Service Available Kolkata Call Girls South End Park ✔ 62971435...
 
Call Girls Agency In Goa 💚 9316020077 💚 Call Girl Goa By Russian Call Girl ...
Call Girls  Agency In Goa  💚 9316020077 💚 Call Girl Goa By Russian Call Girl ...Call Girls  Agency In Goa  💚 9316020077 💚 Call Girl Goa By Russian Call Girl ...
Call Girls Agency In Goa 💚 9316020077 💚 Call Girl Goa By Russian Call Girl ...
 
Tikiapara Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex A...
Tikiapara Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex A...Tikiapara Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex A...
Tikiapara Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex A...
 
Zirakpur Call Girls👧 Book Now📱8146719683 📞👉Mohali Call Girl Service No Advanc...
Zirakpur Call Girls👧 Book Now📱8146719683 📞👉Mohali Call Girl Service No Advanc...Zirakpur Call Girls👧 Book Now📱8146719683 📞👉Mohali Call Girl Service No Advanc...
Zirakpur Call Girls👧 Book Now📱8146719683 📞👉Mohali Call Girl Service No Advanc...
 
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...
 
Desi Bhabhi Call Girls In Goa 💃 730 02 72 001💃desi Bhabhi Escort Goa
Desi Bhabhi Call Girls  In Goa  💃 730 02 72 001💃desi Bhabhi Escort GoaDesi Bhabhi Call Girls  In Goa  💃 730 02 72 001💃desi Bhabhi Escort Goa
Desi Bhabhi Call Girls In Goa 💃 730 02 72 001💃desi Bhabhi Escort Goa
 
𓀤Call On 6297143586 𓀤 Ultadanga Call Girls In All Kolkata 24/7 Provide Call W...
𓀤Call On 6297143586 𓀤 Ultadanga Call Girls In All Kolkata 24/7 Provide Call W...𓀤Call On 6297143586 𓀤 Ultadanga Call Girls In All Kolkata 24/7 Provide Call W...
𓀤Call On 6297143586 𓀤 Ultadanga Call Girls In All Kolkata 24/7 Provide Call W...
 
Kanpur call girls 📞 8617697112 At Low Cost Cash Payment Booking
Kanpur call girls 📞 8617697112 At Low Cost Cash Payment BookingKanpur call girls 📞 8617697112 At Low Cost Cash Payment Booking
Kanpur call girls 📞 8617697112 At Low Cost Cash Payment Booking
 
Call Girls Manjri Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Manjri Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Manjri Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Manjri Call Me 7737669865 Budget Friendly No Advance Booking
 
Hotel And Home Service Available Kolkata Call Girls Lake Town ✔ 6297143586 ✔C...
Hotel And Home Service Available Kolkata Call Girls Lake Town ✔ 6297143586 ✔C...Hotel And Home Service Available Kolkata Call Girls Lake Town ✔ 6297143586 ✔C...
Hotel And Home Service Available Kolkata Call Girls Lake Town ✔ 6297143586 ✔C...
 
Verified Trusted Call Girls Tambaram Chennai ✔✔7427069034 Independent Chenna...
Verified Trusted Call Girls Tambaram Chennai ✔✔7427069034  Independent Chenna...Verified Trusted Call Girls Tambaram Chennai ✔✔7427069034  Independent Chenna...
Verified Trusted Call Girls Tambaram Chennai ✔✔7427069034 Independent Chenna...
 
Goa Call Girls 9316020077 Call Girls In Goa By Russian Call Girl in goa
Goa Call Girls 9316020077 Call Girls  In Goa By Russian Call Girl in goaGoa Call Girls 9316020077 Call Girls  In Goa By Russian Call Girl in goa
Goa Call Girls 9316020077 Call Girls In Goa By Russian Call Girl in goa
 
Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448
 
2k Shot Call girls Laxmi Nagar Delhi 9205541914
2k Shot Call girls Laxmi Nagar Delhi 92055419142k Shot Call girls Laxmi Nagar Delhi 9205541914
2k Shot Call girls Laxmi Nagar Delhi 9205541914
 

Lesson 3 ethical issues

  • 2. "Doing the right thing is the right thing to do.” --Stephen Sandherr, Chief Executive Officer, Associated General Contractors of America There’s always a purpose for technology use. Think of how, when, why, and for what purpose you're using it. Think of ways to be creative and innovative. Think about communicating and collaborating with others globally to learn about another country. Think about how much students can learn via the Internet. Think of using it to prepare today’s learners to be successful citizens of the 21st century. Think of all the possibilities. Technological advancements are truly impressive. We should accept that this is the world our students are growing up in and provide opportunities to expose them to these wonderful developments. However, each new technology should be carefully evaluated and used as a tool to enhance the personal element in the teaching process, not to completely replace traditional learning methods. As we increase the use of technology in the classroom, we must also be conscious of ethical issues that arise from that technology use. Understanding the biggest ethical issues affecting our classrooms will help us better understand how to address them.
  • 3. When we are young our parents used to teach us the right behavior and etiquette. Even in schools and classes, there are certain behaviors and ethics we need to observe to achieve a healthy relationships with teachers and classmates. Ethics has always been at the core of creating a thriving learning environment. We are well accustomed to teaching students ethics through principled examples, such as: these are the rules (don't push); here are reasons for the rules (don't cause harm to others). The widespread availability of technology brings new and challenging ethical issues to the forefront. Doug Johnson, an expert in educational technology, acknowledges that technology in the classroom can be extremely disruptive. He argues that our society has imposed guidelines for things children cannot do (for example: we drive after age 16, vote at 18, and drink at 21) because children are not emotionally developed for these activities. However, in our attempt to educate children to become computer literate, we push them into cyberspace without guidance. How can we expect them to know how to behave ethically on the internet, with their identity hidden, when we haven't fully taught them to act ethically in real-life situations?
  • 4. 1. ACADEMIC HONESTY AND RESEARCH ETHICS In the Connected Age, it's easy to go online and download multimedia (illegally or legally). There are even subscription sites that allow unlimited downloading of movies, music, or games, which further blurs the line between what is free and what is copyrighted. In fact, some students are confused that copying and pasting is plagiarism because their source material didn't have an author, and therefore it was ''common knowledge.'' Plagiarism is a big ethical concern, especially with search engines that make it easy to find any query. The widespread availability of knowledge also makes it easier for students to fabricate research and fake a source. Reinforcing how to cite authors, and why it's important to respect the intellectual property of others, will help to minimize these occurrences. Requiring well-cited sources will also help prevent any fabricated research.
  • 5. 2. ELECTRONIC COMMUNICATIONS Electronic communication between teachers and students can be helpful, but the line can become blurred between business and personal. Keep electronic communications professional, and warn students of the dangers of thinking that their emails and text messages are personal. Especially when using school or business email systems, these types of communications can easily be made public. 3. SOCIAL NETWORKS & CYBERBULLYING According to their company info page, Facebook has 1.79 billion active users, and 66% of these users log on every day. That's a staggering number! Some educators are using Facebook to share multimedia with students, or as a way for students to connect and collectively brainstorm. My college had a Facebook page for our cohort, and while the intentions of connecting students through the page were positive, they provided no guidelines for the page's use and it inevitably led to ethical issues. One student began snapping pictures of a particular student and posting them to the page, making fun of him at every turn. This repeated-over-time pattern of hurtful behavior was cyberbullying.
  • 6. Prevent cyberbullying by discussing it, addressing it, and reporting it. Students interact with one another via social networks, chat rooms, blogs, etc. daily. They can write just about anything on these platforms, which then can be forwarded to many with just a few clicks, causing more issues if the information is sensitive or hurtful to another (Levy, 2011). The consequences of cyberbullying can be damaging, resulting in emotional stress, withdrawal from school, relocation, and even suicide (Cennamo et al., 2010). Students should report inappropriate online interactions to their parents, teachers, counselors, and administrators immediately, whether they are a victim or bystander. Students need to know about the serious repercussions for intentionally harming someone online. Outlining cyberbullying guidelines can help students address and prevent threatening and inappropriate online behavior.
  • 7. 4. SOCIAL MEDIA Social Networks can also bring up ethical issues for teachers who are ''friends'' with their students. Teachers may learn things about their students, like seeing posts about underage drinking. A young student doesn't understand that they have waived their right to privacy by posting things on social networks, and they often feel that Facebook is anonymous because there is no face-to-face interaction. This feeling also enabled my classmate to cyberbully another student without feeling the full weight of his actions. This is a teaching moment to help students understand that Facebook is not a diary and it is not anonymous. Our actions and posts on public social networks could one day prevent us from getting a job, or they could cause us to become unemployed. Students must think before they post something online and make it available for the world to see. A potential problem of which today’s learners must be aware is that employers check for information about prospective candidates online (Oxley, 2010). It’s essential that students understand that once they post an image, comment, etc. online, it’s there forever.
  • 8. 5. CONFIDENTIALITY Between utilizing online forums, social media, and other online applications, schools are collecting a lot of information about students. The U.S. Department of Education's Privacy Technical Assistance Center (PTAC) offers best practices for teachers to follow when enrolling in new online services. Their advice includes reviewing the contract for data use and retention policies, as well as being transparent with students and parents about district information policies, including what is being collected and how it will be used. 6. TAKE CARE OF TECHNOLOGY EQUIPMENT Students must take care of the technology equipment, which can be viewed as a privilege. It is also important for students to learn to protect the technology resources (Cennamo, Ross, and Ertmer, 2010). Malware such as viruses, worms, and Trojan horses are even more prevalent today because of the increased use of email, fax, blogs, social media, etc. Students should be alert and active at all times.
  • 9. Unauthorized Access and Use of Hardware, software, Network, and Computer Files. There are many cases when we want something's to be kept private and would not allow others to use it, such as diaries, messages in our phones and e- mails, and many others. SOME TIPS IN CAREFULLY CREATING A PASSWORD  Use at least characters  Use a combination of upper and lower case letters, words, numbers, and special characters  Use join words together  Use words from other languages  Add one or more numbers at the beginning, middle, or end of a word  Use a password that can remembered easily  Select a password that can be entered easily even without looking at the keyboard  Do not leave written copies of your password anywhere  Do not share your password to anyone.
  • 10. 7. EXPLORE APPROPRIATE AND SAFE SITES FOR LEARNING AND RESEARCH The Internet is an immense storehouse of knowledge and should be used appropriately at all times. Students should use known and trusted digital resources (Cennamo et al., 2010). Teachers can initially provide students with a list of approved Web sites to use in class. However, students must be empowered to evaluate sites to make responsible and ethical decisions while surfing the Net. This practice will be helpful when students have to complete research for school or work. Students must be able to recognize if information on a site is valid and credible. Teaching students to critically evaluate Web sites will prepare them for their future education and profession (Pinkham, Wintle, and Silvernail, 2008).
  • 11. 8. ETHICS FOR COMPUTER USER  Use the computer to help people and not to do harm  Use your own assigned computer unit and not to interfere with others work  Use the computer using your own files and not to use others files  Use the computer to share information and not to steal others information  Use the computer to spread truthful information and not to do character assassination  Use software that are original an legal not pirated  Use others computer resources with permission and not to duplicate it without authorization  Use your own work and not the work of others  Use the computer that shows respect and consideration for the other people and not to do cyber bullying  Create programs or software having in mind its social impact and not for self interest.
  • 12. 9. HARDWARE THEFT AND VANDALISM Hardware Theft and Vandalism are some of the security challenges encountered by school administrators and teachers. 10. SOFTWARE THEFT Software piracy is a form of software theft. These happens when a person copies illegally copyrighted software for personal or business. An end-user license agreement (EULA) or single-user license agreement is the common type of license included in software packages purchased by an individual. Some of the conditions are:  Users may install the software on only one computer  Users are prohibited to install the software on a network (school computer lab network  Users may make copy for back up purposes  Users are prohibited to give copies to friends and copies to friends and colleagues.
  • 13. 12. INFORMATION THEFT Information theft is a computer crime when one deliberately steals information for purposes of studying how to compete with other organization or companies. Plagiarism is a big ethical concern, especially with search engines that make it easy to find any query. The widespread availability of knowledge also makes it easier for students to fabricate research and fake a source. Reinforcing how to cite authors, and why it's important to respect the intellectual property of others, will help to minimize these occurrences. Requiring well-cited sources will also help prevent any fabricated research. Malicious Acts in Software - the following malicious acts are commonly experienced in emails, cell phones, or text messaging devices and blogs.  Spam is an unwanted message being received through emails, discussions, text messaging devices, and others
  • 14.  Phishing may also be called as carding or spoofing  Spam message can be reduce if not prevented by adjusting the settings in your emails to delete spam automatically  Malware is a malicious software that causes harm to one or more computers  Adware is a software that incorporates the presentation of advertisements and condition for operating the software. 13. ACCEPTABLE AND UNACCEPTABLE USES OF SCHOOL TECHNOLOGY Schools may have different rules and regulations or policies in implementing acceptable and unacceptable used of school technology. Examples of Acceptable Use of School Technology Examples of Unacceptable Use of School Technology  Abiding by the policies and procedures of other networks that are accessed  Being polite and using appropriate language
  • 15.  Deleting unwanted messages or old data from computers and servers  Enforcing appropriate used and reporting misuse or security issues  Altering software by deleting files, downloading programs, or copying or installing unauthorized files or programs  Assuming the identity or using the passwords or materials of another  Conducting commercial activities, advertising products, or taking part in political lobbying  Running antivirus software on downloaded files, attachments, peripherals, or disks  Signing correspondence  Using online time efficiently  Using the internet ethically and legally  Downloading text, graphics or software, or engaging in behaviours that may considered obscene, abusive, libelous, indescent, vulgar, profane, or lewd  Gaining access to any pay- for -view site  Giving out your own or others’ private information, such as address, phone number, or passwords.
  • 16.  Harassing an individual using the internet  Plagiarizing  Transmitting material that violates any local or countries regulation, or obscene material  Vandalizing equipment, digital files, or wilfully spreading computer viruses.
  • 17. ACTIVITY 2 (Truth or Dare) Make a brochure on the different malicious acts in software considering the following: 1. Use short bond paper – (Orientation – Landscape) 2. Divide the bond paper into 3 columns Rubrics SPECIFICS POINTS Content 30 Originality 10 Creativity 10 Vallor, Shannon. “An Introduction to Cybersecurity Ethics.” Markkula Center for Applied EthicsWebsite, February 7, 2018, pp. 48-52. Available at: https://www.scu.edu/media/ethics-center/technology- ethics/IntroToCybersecurityEthics.pdf Cennamo, K.S., Ertmer, P.A., and Ross, J.D. (2010).Technology Integration for MeaningfulClassroom Use:A Standards-BasedApproach, 1st ed. Belmont, CA:Wadsworth Cengage Learning.
  • 18. GOOD LUCK KEEP SAFE GOD BLESS / Sir A