2. EC05.01b Analyze legislation concerning Internet security issues 2
The Internet and Cyber Ethics
What is Cyber Ethics?
…...the ways that an individual uses a computer that
follows the rules made by the schools and government
3. EC05.01b Analyze legislation concerning Internet security issues 3
The Internet and Cyber Ethics
How do I know if the computer in my classroom is being
used legally and ethically?
The Department of Justice classifies computer crime
in three ways………
……….computers as a target
……….computers as a weapon
………computers as an accessory
4. EC05.01b Analyze legislation concerning Internet security issues 4
The Internet and Cyber Ethics
When should I learn cyber ethics
and Internet safety?
Most students are developmentally ready to learn
and apply the rules of Internet safety and cyber
ethics by third grade.
5. EC05.01b Analyze legislation concerning Internet security issues 5
The Internet and Cyber Ethics
What can be a crime in the classroom?
Hacking into the school’s main server to change grades?
Using the school website to publish a picture of a
teacher superimposed on a donkey’s body?
Copying pictures and sound clips
from a
copyrighted Internet source
to use in your school’s digital
yearbook ?
6. EC05.01b Analyze legislation concerning Internet security issues 6
The Internet and Cyber Ethics
What is “hacking”?
A hacker is someone who breaks into files
that belong to someone else to read private
emails or other information.
7. EC05.01b Analyze legislation concerning Internet security issues 7
The Internet and Cyber Ethics
What could happen to students who “hack”?
• Restitution of any money loss as a result of hacking
• Community service
• Loss of internet privileges
• Probation
• Incarceration if hacking results in serious loss, injury,
or death.
8. EC05.01b Analyze legislation concerning Internet security issues 8
The Internet and Cyber Ethics
What is the purpose of a password?
Passwords can help keep hackers out of your
computer or server so that it makes it harder for
them to steal information
9. EC05.01b Analyze legislation concerning Internet security issues 9
The Internet and Cyber Ethics
How can you use passwords to protect YOUR
personal information?
Let’s look at password combinations. Which of these
combinations would be harder for a professional hacker
to decode?
Tom1963
Rthomas
FiReCraCKer05
Iluv3dgs
Big_BabY_61
10. EC05.01b Analyze legislation concerning Internet security issues 10
The Internet and Cyber Ethics
How can one choose a password that is
harder for a hacker to “crack”?
Don't use passwords that are based on personal
information that can be easily accessed or guessed such as
birthdays, address, abbreviated names, initials, zip code,
etc. Examples: bobjackson, 01091964 (birthday in ANY
forms), becky1963, rlthomas, becky.thomas
11. EC05.01b Analyze legislation concerning Internet security issues 11
The Internet and Cyber Ethics
• Don't use words that can be found in any dictionary of
any language.
• Develop a mnemonic for remembering complex
passwords (Iluv3dogs=I love 3 dogs)
• Use both lowercase and capital letters
• Use a combination of letters, numbers, and special
characters
• Don’t use the same password for every password
protected account. This can be
easily traced by a professional.
12. EC05.01b Analyze legislation concerning Internet security issues 12
The Internet and Cyber Ethics
What are some specific rules regarding Internet
safety for students?
Never give out personal information (including your
name, home address, phone number, age, race, family
income, school name or location, or friends' names)
or use a credit card online without your permission.
Never share a password, even
with friends.
13. EC05.01b Analyze legislation concerning Internet security issues 13
Never arrange a face-to-face meeting with
someone you meet online.
Never respond to messages that make you
feel confused or uncomfortable. You should
ignore the sender, end the communication,
and tell your teacher or another trusted
adult right away.
Never use bad language or send
mean messages online.
The Internet and Cyber Ethics
14. EC05.01b Analyze legislation concerning Internet security issues 14
The Internet and Cyber Ethics
What kinds of ways can a predator seek out victims?
…… BBS ……….email
…….COS ……….public chat rooms
…….ISP ……….chat rooms
…….instant messaging ……….internet relay chat (IRC)
……….usenet (newsgroups)
15. EC05.01b Analyze legislation concerning Internet security issues 15
The Internet and Cyber Ethics
How can I, as a student, encourage my peers to use and
search for appropriate content on the World Wide Web?
Make sure we know appropriate areas to search and
what areas are off limits. Set time limits.
Pay attention to games or programs that are downloaded
or copied. Illegally copied programs or CD’s are a no-no.
.
16. EC05.01b Analyze legislation concerning Internet security issues 16
The Internet and Cyber Ethics
Check into the filtering software that your school
provides and ask the technology coordinator if there are
ways to bypass this filter. Keep a careful eye on myself
and my peers to make sure we are not doing these things
in order to go to inappropriate or questionable sites.
Talk to my parents about the importance of choosing a
highly visible place to locate the family computer. Too
much privacy for
students can lead to unhealthy, harmful
and/or
unsupervised behavior.
17. EC05.01b Analyze legislation concerning Internet security issues 17
The Internet and Cyber Ethics
What content is unacceptable for a student?
How about….
……gambling?
……pornography?
……chat sessions with a predator?
……activities with someone else’s credit card?
18. EC05.01b Analyze legislation concerning Internet security issues 18
……downloading files with viruses attached?
……illegal file sharing with friends (music, video, etc.)?
……pranks that lead federal, state, or local law
enforcement officials to you?
The Internet and Cyber Ethics
19. EC05.01b Analyze legislation concerning Internet security issues 19
The Internet and Cyber Ethics
In what way can schools make rules clear to students
about their responsibility for ethical behavior using any
form of multi-media?
How about a student contract?
20. EC05.01b Analyze legislation concerning Internet security issues 20
The Internet and Cyber Ethics
WHAT HAVE WE LEARNED?
The Internet is an infinite source of educational
information that can enhance the learning
experience.
Copyright laws apply to teachers as well as
students.
Fair use is the standard to which educators
and students must follow when
deciding if content is
appropriate for reproduction
21. EC05.01b Analyze legislation concerning Internet security issues 21
The Internet and Cyber Ethics
References
Cyber Citizenship, http://www.cybercitizenship.org/
Cyber Ethics for Teachers, ( January 24, 2005 ) A lesson plan outline for
elementary and middle school children.
http://www.cybercrime.gov/rules/lessonplan1.htm
Department of Education, (1997). Parents guide to the internet.
http://www.ed.gov/pubs/parents/internet/tips.html
U.S. Department of Justice, Federal Bureau of Investigation
http://www.fbi.gov/publications/pguide/pguidee.htm
Warlick, D., (1998-2003) Landmarks for Schools
http://www.computerlearning.org/respcode.htm
http://www.bham.wednet.edu/copyperm.htm