SlideShare uma empresa Scribd logo
1 de 2
Filtering of the Internet<br />-Filtering helps keep kids out of trouble (safety, privacy) and prevents spam<br />-Types of filtering: IP Blocking, DNS Tampering, URL Blocking<br />-IP Blocking is easier to get around<br /> -Can be used at home for parental controls, school restrictions, helps keeps students focused. <br />-Limits educational research- can actually overly block websites<br />-Under-blocking- still get unwanted websites<br />-Examples: facebook, e-mail, chat rooms, social networks<br />-Softwares: net nanny parental control, McAfee family protection, PureSight<br />-Different countries filter <br />-No filter like a teacher standing by<br />Movie and Music sharing and Piracy<br />-Piracy is the unauthorized use of a copyright and it is illegal<br />-Peer-to-peer software is used to access files from other’s hard drives- the software is not illegal<br />-P2P programs: napster, FrostWire, LimeWire, BearShare, Kazaa<br />-If you download illegally there is a fine<br />-Using these can give your computer viruses, breaks down security, they can get into all your files<br />Free Speech on the Internet<br />-human right or privilege? Some countries take that freedom away<br />-freedom of expression<br />-freedom of speech can insult religion <br />-some people want censorship, filtering<br />Copyright and Fair Use for teachers<br />-legal issues, permission, purpose, limitations<br />-songs(10% or 30 seconds, whichever is less), poems (entire poem up to 230 words, or 230 of one, no more than 3 from one author, or 5 from the same anthology), text (10%, 1,000 words, whichever is less), photos (5 by one person, no more than 15 or 10%, whichever is less of a published work)<br />-you can use anything in the public domain- Anything that was copyrighted before 1923, newspapers<br />-spontaneity is allowed <br />Gender issues<br />,[object Object]
gender bias has negative effectsE-cheating<br />-the use of technology in aiding the process of cheating<br />-cell phones, internet, ipods, calculators are all commonly used<br />-signs: looking into their laps, headphones, using websites, talking, unnecessary stuff on their desk<br />-Plagiarism: downloading essays, copy and paste without citing<br />-preventions: restrictions on the internet, monitoring students, teaching how to cite, safe assign, turning off electronic devices <br />Hacking and cracking in classrooms<br />-hacking: re-configuring a program of a system in ways not facilitated by the owner, administrator, or designer.<br />-ethical backing: can help students learn how to protect their identity, their computers, and any other piece of technology<br />-un-ethical hacking: systems such as cable and cell phones are just a few that these instructors are teaching students- could change school grades, hack into other peoples accounts- steal life info<br />-hacking- legal, cracking- illegal<br />Truths and Myths in Technology<br />-more bars, more service- myth<br />-wash keyboard in a dishwasher- only non-wireless<br />-Macs= no viruses- myth, less <br />- powering your computer on and off is bad- myth, it’s a good thing<br />-keep it G-rated will prevent viruses- myth<br />-Don’t believe everything you read- test everything!<br />Software Sharing<br />-can be legal and illegal, P2P sharing<br />-file sharing came from people wanting to access their files on other computers<br />-anything that has a copyright and costs money is illegal to share<br />Privacy on the Internet<br />-nothing is private, easily hacked, everything is viewable and searched<br />-information could be given out social networks, dating sites, surveys, shopping, banking, photo uploading<br />-effects: hacking, suspension, lose of job, no admittance, identity theft, bugs and viruses and spam<br />-prevention: put as little info out as possible, be aware, only use highly trusted sites, be careful of what you post, privacy settings<br />Internet Acceptable Use Policy (AUP, or IAUP)<br />-All schools have an AUP in MI<br />-tells students what they can do and cannot do <br />-explains what happens when violated<br />-includes passwords, user IDs<br />

Mais conteúdo relacionado

Mais procurados

The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rulesritz482
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 
Issues with computers
Issues with computersIssues with computers
Issues with computersayerssaa
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
CST 20363 Session 6 Cyberspace
CST 20363 Session 6 CyberspaceCST 20363 Session 6 Cyberspace
CST 20363 Session 6 Cyberspaceoudesign
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentationISTE
 
Safe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point finalSafe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point finalejl2
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Internet Awareness October 2013
Internet Awareness October 2013Internet Awareness October 2013
Internet Awareness October 2013Julie Esanu
 

Mais procurados (19)

The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
 
CST 20363 Session 6 Cyberspace
CST 20363 Session 6 CyberspaceCST 20363 Session 6 Cyberspace
CST 20363 Session 6 Cyberspace
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Safe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point finalSafe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point final
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Internet Awareness October 2013
Internet Awareness October 2013Internet Awareness October 2013
Internet Awareness October 2013
 

Destaque

Podcast tutorial
Podcast tutorialPodcast tutorial
Podcast tutorialMayci Neal
 
Object Reuse and Exchange と その実装例について
Object Reuse and Exchange と その実装例についてObject Reuse and Exchange と その実装例について
Object Reuse and Exchange と その実装例についてhiraku
 
EvaluacióN De Adhesivos
EvaluacióN De AdhesivosEvaluacióN De Adhesivos
EvaluacióN De Adhesivosgabriela duarte
 
Codigos halloween
Codigos halloweenCodigos halloween
Codigos halloweenamparoj
 
Plan de curso fundamentos matemáticos admon.
Plan de curso fundamentos matemáticos admon.Plan de curso fundamentos matemáticos admon.
Plan de curso fundamentos matemáticos admon.mazariegos
 
C1 mate factorización por monomio - 4º
C1 mate   factorización por monomio - 4ºC1 mate   factorización por monomio - 4º
C1 mate factorización por monomio - 4ºbrisagaela29
 
Obtención del etileno
Obtención del etilenoObtención del etileno
Obtención del etilenoFernyval18
 
Plataformas Virtuales educativas
Plataformas Virtuales educativasPlataformas Virtuales educativas
Plataformas Virtuales educativasDiegoleonsalazar
 
NRMCA Seeks to Standardize Industry Financial Reporting
NRMCA Seeks to Standardize Industry Financial ReportingNRMCA Seeks to Standardize Industry Financial Reporting
NRMCA Seeks to Standardize Industry Financial ReportingJoel Ungar
 
Ingilis dili 4 ismayilli 1 mirzeyeva mehri elsad
Ingilis dili 4 ismayilli 1 mirzeyeva mehri elsadIngilis dili 4 ismayilli 1 mirzeyeva mehri elsad
Ingilis dili 4 ismayilli 1 mirzeyeva mehri elsadmimio_azerbaijan
 

Destaque (20)

Pemplet3
Pemplet3Pemplet3
Pemplet3
 
Formation kanban avancé
Formation kanban avancéFormation kanban avancé
Formation kanban avancé
 
Podcast tutorial
Podcast tutorialPodcast tutorial
Podcast tutorial
 
Object Reuse and Exchange と その実装例について
Object Reuse and Exchange と その実装例についてObject Reuse and Exchange と その実装例について
Object Reuse and Exchange と その実装例について
 
EvaluacióN De Adhesivos
EvaluacióN De AdhesivosEvaluacióN De Adhesivos
EvaluacióN De Adhesivos
 
Trabajo
TrabajoTrabajo
Trabajo
 
Codigos halloween
Codigos halloweenCodigos halloween
Codigos halloween
 
Plan de curso fundamentos matemáticos admon.
Plan de curso fundamentos matemáticos admon.Plan de curso fundamentos matemáticos admon.
Plan de curso fundamentos matemáticos admon.
 
Os ossos
Os ossosOs ossos
Os ossos
 
C1 mate factorización por monomio - 4º
C1 mate   factorización por monomio - 4ºC1 mate   factorización por monomio - 4º
C1 mate factorización por monomio - 4º
 
El medio ambiente
El medio ambienteEl medio ambiente
El medio ambiente
 
Poster 3
Poster 3Poster 3
Poster 3
 
Hoja de cálculo
Hoja de cálculoHoja de cálculo
Hoja de cálculo
 
Gustavo.Jpb
Gustavo.JpbGustavo.Jpb
Gustavo.Jpb
 
Obtención del etileno
Obtención del etilenoObtención del etileno
Obtención del etileno
 
Plataformas Virtuales educativas
Plataformas Virtuales educativasPlataformas Virtuales educativas
Plataformas Virtuales educativas
 
NRMCA Seeks to Standardize Industry Financial Reporting
NRMCA Seeks to Standardize Industry Financial ReportingNRMCA Seeks to Standardize Industry Financial Reporting
NRMCA Seeks to Standardize Industry Financial Reporting
 
1
11
1
 
Australia day
Australia dayAustralia day
Australia day
 
Ingilis dili 4 ismayilli 1 mirzeyeva mehri elsad
Ingilis dili 4 ismayilli 1 mirzeyeva mehri elsadIngilis dili 4 ismayilli 1 mirzeyeva mehri elsad
Ingilis dili 4 ismayilli 1 mirzeyeva mehri elsad
 

Semelhante a Currentissuenotes

Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxJoy Dugayo
 
E behaviour code brochure english
E behaviour code brochure englishE behaviour code brochure english
E behaviour code brochure englishThinkB4UClick
 
IMA Meeting 03222012
IMA Meeting 03222012IMA Meeting 03222012
IMA Meeting 03222012jerryjustice
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Working with ict ethical social and legal issues
Working with ict ethical social and legal issuesWorking with ict ethical social and legal issues
Working with ict ethical social and legal issuesMaher Al Beshlawy
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxhenrysales6
 
Digital law
Digital lawDigital law
Digital lawAlieyn_
 
Digital law
Digital lawDigital law
Digital lawmakylahh
 
Digital law
Digital lawDigital law
Digital lawmakylahh
 
Digital law
Digital lawDigital law
Digital lawCAQUES01
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Is your privacy, private?
Is your privacy, private?Is your privacy, private?
Is your privacy, private?DionShawMSPM
 

Semelhante a Currentissuenotes (20)

Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
 
E behaviour code brochure english
E behaviour code brochure englishE behaviour code brochure english
E behaviour code brochure english
 
Power Point Presentation by Auwalu Adamu
Power Point Presentation by Auwalu Adamu Power Point Presentation by Auwalu Adamu
Power Point Presentation by Auwalu Adamu
 
IMA Meeting 03222012
IMA Meeting 03222012IMA Meeting 03222012
IMA Meeting 03222012
 
IT Security
IT SecurityIT Security
IT Security
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Working with ict ethical social and legal issues
Working with ict ethical social and legal issuesWorking with ict ethical social and legal issues
Working with ict ethical social and legal issues
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Is your privacy, private?
Is your privacy, private?Is your privacy, private?
Is your privacy, private?
 

Currentissuenotes

  • 1.
  • 2. gender bias has negative effectsE-cheating<br />-the use of technology in aiding the process of cheating<br />-cell phones, internet, ipods, calculators are all commonly used<br />-signs: looking into their laps, headphones, using websites, talking, unnecessary stuff on their desk<br />-Plagiarism: downloading essays, copy and paste without citing<br />-preventions: restrictions on the internet, monitoring students, teaching how to cite, safe assign, turning off electronic devices <br />Hacking and cracking in classrooms<br />-hacking: re-configuring a program of a system in ways not facilitated by the owner, administrator, or designer.<br />-ethical backing: can help students learn how to protect their identity, their computers, and any other piece of technology<br />-un-ethical hacking: systems such as cable and cell phones are just a few that these instructors are teaching students- could change school grades, hack into other peoples accounts- steal life info<br />-hacking- legal, cracking- illegal<br />Truths and Myths in Technology<br />-more bars, more service- myth<br />-wash keyboard in a dishwasher- only non-wireless<br />-Macs= no viruses- myth, less <br />- powering your computer on and off is bad- myth, it’s a good thing<br />-keep it G-rated will prevent viruses- myth<br />-Don’t believe everything you read- test everything!<br />Software Sharing<br />-can be legal and illegal, P2P sharing<br />-file sharing came from people wanting to access their files on other computers<br />-anything that has a copyright and costs money is illegal to share<br />Privacy on the Internet<br />-nothing is private, easily hacked, everything is viewable and searched<br />-information could be given out social networks, dating sites, surveys, shopping, banking, photo uploading<br />-effects: hacking, suspension, lose of job, no admittance, identity theft, bugs and viruses and spam<br />-prevention: put as little info out as possible, be aware, only use highly trusted sites, be careful of what you post, privacy settings<br />Internet Acceptable Use Policy (AUP, or IAUP)<br />-All schools have an AUP in MI<br />-tells students what they can do and cannot do <br />-explains what happens when violated<br />-includes passwords, user IDs<br />