2. "Doing the right thing is the right thing to do.”
--Stephen Sandherr, Chief Executive Officer, Associated General Contractors of America
There’s always a purpose for technology use. Think of how, when, why, and for
what purpose you're using it. Think of ways to be creative and innovative. Think
about communicating and collaborating with others globally to learn about another
country. Think about how much students can learn via the Internet. Think of using it
to prepare today’s learners to be successful citizens of the 21st century. Think of all
the possibilities.
Technological advancements are truly impressive. We should accept that this is
the world our students are growing up in and provide opportunities to expose them to
these wonderful developments. However, each new technology should be carefully
evaluated and used as a tool to enhance the personal element in the teaching
process, not to completely replace traditional learning methods.
As we increase the use of technology in the classroom, we must also be
conscious of ethical issues that arise from that technology use. Understanding the
biggest ethical issues affecting our classrooms will help us better understand how to
address them.
3. When we are young our parents used to teach us the right behavior and
etiquette. Even in schools and classes, there are certain behaviors and ethics we
need to observe to achieve a healthy relationships with teachers and classmates.
Ethics has always been at the core of creating a thriving learning environment.
We are well accustomed to teaching students ethics through principled examples,
such as: these are the rules (don't push); here are reasons for the rules (don't cause
harm to others).
The widespread availability of technology brings new and challenging ethical
issues to the forefront. Doug Johnson, an expert in educational technology,
acknowledges that technology in the classroom can be extremely disruptive. He
argues that our society has imposed guidelines for things children cannot do (for
example: we drive after age 16, vote at 18, and drink at 21) because children are not
emotionally developed for these activities. However, in our attempt to educate
children to become computer literate, we push them into cyberspace without
guidance. How can we expect them to know how to behave ethically on the internet,
with their identity hidden, when we haven't fully taught them to act ethically in real-life
situations?
4. 1. ACADEMIC HONESTY AND RESEARCH ETHICS
In the Connected Age, it's easy to go online and download multimedia
(illegally or legally). There are even subscription sites that allow unlimited
downloading of movies, music, or games, which further blurs the line between
what is free and what is copyrighted. In fact, some students are confused that
copying and pasting is plagiarism because their source material didn't have an
author, and therefore it was ''common knowledge.''
Plagiarism is a big ethical concern, especially with search engines that make
it easy to find any query. The widespread availability of knowledge also makes it
easier for students to fabricate research and fake a source. Reinforcing how to
cite authors, and why it's important to respect the intellectual property of others,
will help to minimize these occurrences. Requiring well-cited sources will also
help prevent any fabricated research.
5. 2. ELECTRONIC COMMUNICATIONS
Electronic communication between teachers and students can be helpful, but
the line can become blurred between business and personal. Keep electronic
communications professional, and warn students of the dangers of thinking that their
emails and text messages are personal. Especially when using school or business
email systems, these types of communications can easily be made public.
3. SOCIAL NETWORKS & CYBERBULLYING
According to their company info page, Facebook has 1.79 billion active users,
and 66% of these users log on every day. That's a staggering number! Some
educators are using Facebook to share multimedia with students, or as a way for
students to connect and collectively brainstorm. My college had a Facebook page
for our cohort, and while the intentions of connecting students through the page
were positive, they provided no guidelines for the page's use and it inevitably led to
ethical issues. One student began snapping pictures of a particular student and
posting them to the page, making fun of him at every turn. This repeated-over-time
pattern of hurtful behavior was cyberbullying.
6. Prevent cyberbullying by discussing it, addressing it, and reporting it.
Students interact with one another via social networks, chat rooms, blogs, etc.
daily. They can write just about anything on these platforms, which then can be
forwarded to many with just a few clicks, causing more issues if the information
is sensitive or hurtful to another (Levy, 2011).
The consequences of cyberbullying can be damaging, resulting in emotional
stress, withdrawal from school, relocation, and even suicide (Cennamo et al.,
2010).
Students should report inappropriate online interactions to their parents,
teachers, counselors, and administrators immediately, whether they are a victim
or bystander.
Students need to know about the serious repercussions for intentionally
harming someone online. Outlining cyberbullying guidelines can help students
address and prevent threatening and inappropriate online behavior.
7. 4. SOCIAL MEDIA
Social Networks can also bring up ethical issues for teachers who are
''friends'' with their students. Teachers may learn things about their students, like
seeing posts about underage drinking. A young student doesn't understand that
they have waived their right to privacy by posting things on social networks, and
they often feel that Facebook is anonymous because there is no face-to-face
interaction. This feeling also enabled my classmate to cyberbully another
student without feeling the full weight of his actions. This is a teaching moment
to help students understand that Facebook is not a diary and it is not
anonymous. Our actions and posts on public social networks could one day
prevent us from getting a job, or they could cause us to become unemployed.
Students must think before they post something online and make it available
for the world to see. A potential problem of which today’s learners must be aware
is that employers check for information about prospective candidates online
(Oxley, 2010). It’s essential that students understand that once they post an
image, comment, etc. online, it’s there forever.
8. 5. CONFIDENTIALITY
Between utilizing online forums, social media, and other online applications,
schools are collecting a lot of information about students. The U.S. Department of
Education's Privacy Technical Assistance Center (PTAC) offers best practices for
teachers to follow when enrolling in new online services. Their advice includes
reviewing the contract for data use and retention policies, as well as being
transparent with students and parents about district information policies, including
what is being collected and how it will be used.
6. TAKE CARE OF TECHNOLOGY EQUIPMENT
Students must take care of the technology equipment, which can be viewed
as a privilege. It is also important for students to learn to protect the technology
resources (Cennamo, Ross, and Ertmer, 2010). Malware such as viruses, worms,
and Trojan horses are even more prevalent today because of the increased use of
email, fax, blogs, social media, etc. Students should be alert and active at all
times.
9. Unauthorized Access and Use of Hardware, software, Network, and Computer
Files. There are many cases when we want something's to be kept private and
would not allow others to use it, such as diaries, messages in our phones and e-
mails, and many others.
SOME TIPS IN CAREFULLY CREATING A PASSWORD
Use at least characters
Use a combination of upper and lower case letters, words, numbers, and
special characters
Use join words together
Use words from other languages
Add one or more numbers at the beginning, middle, or end of a word
Use a password that can remembered easily
Select a password that can be entered easily even without looking at the
keyboard
Do not leave written copies of your password anywhere
Do not share your password to anyone.
10. 7. EXPLORE APPROPRIATE AND SAFE SITES FOR LEARNING AND RESEARCH
The Internet is an immense storehouse of knowledge and should be used
appropriately at all times. Students should use known and trusted digital resources
(Cennamo et al., 2010). Teachers can initially provide students with a list of approved
Web sites to use in class. However, students must be empowered to evaluate sites to
make responsible and ethical decisions while surfing the Net. This practice will be
helpful when students have to complete research for school or work. Students must be
able to recognize if information on a site is valid and credible. Teaching students to
critically evaluate Web sites will prepare them for their future education and profession
(Pinkham, Wintle, and Silvernail, 2008).
11. 8. ETHICS FOR COMPUTER USER
Use the computer to help people and not to do harm
Use your own assigned computer unit and not to interfere with others work
Use the computer using your own files and not to use others files
Use the computer to share information and not to steal others information
Use the computer to spread truthful information and not to do character
assassination
Use software that are original an legal not pirated
Use others computer resources with permission and not to duplicate it without
authorization
Use your own work and not the work of others
Use the computer that shows respect and consideration for the other people
and not to do cyber bullying
Create programs or software having in mind its social impact and not for self
interest.
12. 9. HARDWARE THEFT AND VANDALISM
Hardware Theft and Vandalism are some of the security challenges
encountered by school administrators and teachers.
10. SOFTWARE THEFT
Software piracy is a form of software theft. These happens when a person
copies illegally copyrighted software for personal or business. An end-user
license agreement (EULA) or single-user license agreement is the common
type of license included in software packages purchased by an individual.
Some of the conditions are:
Users may install the software on only one computer
Users are prohibited to install the software on a network (school computer
lab network
Users may make copy for back up purposes
Users are prohibited to give copies to friends and copies to friends and
colleagues.
13. 12. INFORMATION THEFT
Information theft is a computer crime when one deliberately steals
information for purposes of studying how to compete with other organization or
companies.
Plagiarism is a big ethical concern, especially with search engines that
make it easy to find any query. The widespread availability of knowledge also
makes it easier for students to fabricate research and fake a source.
Reinforcing how to cite authors, and why it's important to respect the intellectual
property of others, will help to minimize these occurrences. Requiring well-cited
sources will also help prevent any fabricated research.
Malicious Acts in Software - the following malicious acts are commonly
experienced in emails, cell phones, or text messaging devices and blogs.
Spam is an unwanted message being received through emails,
discussions, text messaging devices, and others
14. Phishing may also be called as carding or spoofing
Spam message can be reduce if not prevented by adjusting the settings in
your emails to delete spam automatically
Malware is a malicious software that causes harm to one or more
computers
Adware is a software that incorporates the presentation of advertisements
and condition for operating the software.
13. ACCEPTABLE AND UNACCEPTABLE USES OF SCHOOL TECHNOLOGY
Schools may have different rules and regulations or policies in implementing
acceptable and unacceptable used of school technology.
Examples of Acceptable Use of School Technology Examples of Unacceptable
Use of School Technology
Abiding by the policies and procedures of other networks that are accessed
Being polite and using appropriate language
15. Deleting unwanted messages or old data from computers and servers
Enforcing appropriate used and reporting misuse or security issues
Altering software by deleting files, downloading programs, or copying or
installing unauthorized files or programs
Assuming the identity or using the passwords or materials of another
Conducting commercial activities, advertising products, or taking part in
political lobbying
Running antivirus software on downloaded files, attachments, peripherals, or
disks
Signing correspondence
Using online time efficiently
Using the internet ethically and legally
Downloading text, graphics or software, or engaging in behaviours that may
considered obscene, abusive, libelous, indescent, vulgar, profane, or lewd
Gaining access to any pay- for -view site
Giving out your own or others’ private information, such as address, phone
number, or passwords.
16. Harassing an individual using the internet
Plagiarizing
Transmitting material that violates any local or countries regulation, or obscene
material
Vandalizing equipment, digital files, or wilfully spreading computer viruses.
17. ACTIVITY 2 (Truth or Dare)
Make a brochure on the different malicious acts in software
considering the following:
1. Use short bond paper – (Orientation – Landscape)
2. Divide the bond paper into 3 columns
Rubrics
SPECIFICS POINTS
Content 30
Originality 10
Creativity 10
Vallor, Shannon. “An Introduction to Cybersecurity Ethics.” Markkula Center for Applied EthicsWebsite, February 7,
2018, pp. 48-52. Available at: https://www.scu.edu/media/ethics-center/technology-
ethics/IntroToCybersecurityEthics.pdf
Cennamo, K.S., Ertmer, P.A., and Ross, J.D. (2010).Technology Integration for MeaningfulClassroom Use:A
Standards-BasedApproach, 1st ed. Belmont, CA:Wadsworth Cengage Learning.