SlideShare uma empresa Scribd logo
1 de 25
Brandon Simpson
 Tiffany Henfling
       Brad Foltz
   Ruth Pridgeon
They Know More Than We Do?

        Do your students know more
       than you do about technology?


               No Way!



              Of Course!
Think Again…
 According to recent research, when asked how much
 time they spend ‘consuming media’, students between
 the ages of 8 – 18 said:


        “practically every waking minute –
          except for the time in school.”


         Let’s try that question again…
Now What?
 Ok, we’re aware that our students are spending more
 time online, and have more knowledge about
 technology than we do, so what do we do now?
Setting Expectations
 Acceptable Use Policy
    Policies that schools establish to mandate the
     expectations they have for their students and their
     internet use
    Examples from Portland Schools acceptable use policy:
       Be mindful of network security, and immediately report any
        bugs, errors, or security problems to the system administrator.
       Users may not illegally copy, send, or distribute any
        copyrighted software, work, or other material.
       Users may not access, attempt to access, modify, or delete any
        record or file without permission or authorization.
Issues Teaching Digital Natives

      Purchasing
                        Music Sharing
     Papers Online

    Software Pirating   Photo Sharing

    Internet Hacking      Plagiarism
Is that Plagiarism?
 Plagiarism is more than just copying text out of a
 textbook. Plagiarism also includes technological
 resources such as websites, online articles, music,
 photos, and other media sources

 Copyright Resource Link:
  http://its.leesummit.k12.mo.us/digitalethic.htm


              Creative Commons
Creative Commons
                     References
License Comparison
Photo Sharing
 Tom wants to add a photo to his report on Civil War
 heroes. He searches the internet and finds an
 awesome picture of Ulysses S. Grant. He highlights
 the picture, right clicks, copies and pastes the picture
 into his paper. He prints the paper and hands it into
 his teacher.

 What should Tom do?

     Turn the                    Research
     Paper In                    Copyright
Research the Copyright
 Correct! He needs to research his rights to use the
  photo, here’s an example of correct usage protocol:
 Flickr:
  - Search for your topic
  - Scroll to the bottom of the page and click Creative
    Commons
  - Your search will sort based on attribution licenses
  - Check to see for the correct license
  - Include the link on your reference page or below
    the photo
                                              Issues
Turn the Paper In
 NO! Tom did not check the photo for its attribution
 license. He also did not include the website on his
 reference page or below his photo.




                                       Try Again!
Music Sharing
 You are a 24 year old Graduate student and you enjoy
  music as a hobby so you download and share music
  using Kazza. You aren’t selling this music or making
  money from it in any way.
 What should you do?


       Download                    Don’t Use
Music Sharing – Download
 Incorrect – most music is copyrighted and without
 permission from the ‘owner’ you may not use it!




                                         Try Again!
Music Sharing – Don’t Use
 Correct!
 In July of 2009 a Boston area court handed down civil
  penalties to Boston University Grad Student Joel
  Tennenbaum for illegally sharing 30 songs on Kazaa.
 The penalty for these 30 songs was $675K
 In 2008 Minnesota Mother Jammie Thomas was fined
  1.92 Million dollars for sharing 24 songs.



                                           Issues
Face the Facts!
 Like it or not, “because so many of them are
  multitasking — say, surfing the Internet while
  listening to music — they pack on average nearly 11
  hours of media content into that seven and a half
  hours.” (emphasis added)

 A Vision of K-12 Education Today (Video Link to You Tube)




                                             Now What?
Purchasing Papers Online
 William has an essay due on Online Education versus
  Traditional Classroom Teaching. His friend, Bob, calls
  him and wants to go out instead. Bob tells him about a
  cool website where he can purchase the essay. William
  caves to peer pressure, buys his essay, and copies it on
  to his classroom blog.
 What should William do?



      Buy Paper                Write His Own
Buy Paper!
 No! William knows that copying and pasting it
  wrong. However, he thinks that the paper is his
  because he purchased it and it is his property.
 But, his actions still falls under the definition of
  plagiarism
 Plagiarism: The act of appropriating the literary
  composition of another author, or excerpts, ideas, or
  passages therefrom, and passing the material off as
  one's own creation. (italics added for emphasis)

                                           Try Again!
Write His Own
 Correct! William should tell his friend Bob that he
  needs to write a paper.
 He can still use internet sources to gather information
  or quotes to use in his paper. There are many websites
  that he can access to correctly cite his paper.
 Some examples are:
   Son of Citation: http://citationmachine.net/
   Purdue Owl:
    http://owl.english.purdue.edu/owl/resource/560/01/

                                               Issues
Internet Hacking
 Joseph is doing a project on how Sports teaches
  responsibility to students at a early age. He remembers
  seeing a You Tube clip explaining the methods of
  teaching responsibility through punctuality, Time
  management, and teamwork.
 The only way he can show the clip to his peers is
  by changing the security settings and allowing the clip
  to play...
 What should Joseph do?

  Change Settings              Ask for Help
Change Settings
 No! This is considered hacking, because although
 Joseph is using the You Tube clip to show his
 classmates the benefits of how sports teaches
 responsibility. He gained access to show the clip by
 "changing" the settings.




                                        Try Again!
Ask IT Dept. for Help
 Correct! Contact your teacher or IT department to
  have the video ‘unlocked’ in order to share it with your
  classmates
 You may also download the video at home, burn it to a
  CD and bring it into the classroom to share. Be sure to
  check for fair use policy.




                                             Issues
Software Pirating
 Jake wants to do his English work at home on his
  family's computer. The problem Jake has is the word
  processing software isn't compatible with his school's
  Microsoft Word platform. One of Jake's best friends
  says, he has Microsoft Office installed and he can lend
  Jake his install disk to put on his home computer.
 Because Jake is using this for his education Jake thinks
  this is ok.
 What should Jake do?

  Take Software                Find Alternative
Take the Software
 No!
 "The legal implications of unauthorized software use
 should be clear to everyone who owns or uses a
 computer. According to the U.S. Copyright Act, illegal
 reproduction of software is subject to civil damages of
 as much as $100,000 per title infringed plus criminal
 penalties, including fines of as much as $250,000 per
 title infringed and imprisonment of up to five years.
 Given these high stakes, the consequences are
 certainly not worth the risks."
                                           Try Again!
Look for Alternatives
 Correct!
 Free alternatives to MS Office
    Open Office - Cross Platform Open Source
    Abiword - Cross Platform Open Source
    Neo Office - Open Source Mac Program
    Google Docs - Online Office Suite




                                          Issues
References
 Dr. William Merrill
 http://learning.blogs.nytimes.com/2010/01/22/how-much-time-do-
    you-spend-consuming-media-every-day/
   http://dictionary.reference.com/browse/plagiarism
   ucblibraries.colorado.edu/about/glossary.htm
   http://www.scu.edu/ethics/publications/iie/v8n3/faqs.html
   http://www.startribune.com/local/82845122.html?elr=KArksUUUoDEy
    3LGDiO7aiU
   http://www.nydailynews.com/money/2009/07/31/2009-07-
    31_court_orders_boston_university_student_joel_tenenbaum_to_pay_
    675g_for_illegally_.html
   http://its.leesummit.k12.mo.us/digitalethic.htm
   http://www.flickr.com
   http://portlandk12.org

Mais conteúdo relacionado

Mais procurados

Cyberbullying in the Middle Years
Cyberbullying in the Middle YearsCyberbullying in the Middle Years
Cyberbullying in the Middle Yearselketeaches
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the LawSuna Gurol
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullyingseswear9388
 
Young Adults And On Line Privacy
Young Adults And On Line PrivacyYoung Adults And On Line Privacy
Young Adults And On Line PrivacyRecrue
 
Cyberbullying class symposium
Cyberbullying class symposiumCyberbullying class symposium
Cyberbullying class symposiumkschermerhorn
 
Digial Citizenship Intro
Digial Citizenship IntroDigial Citizenship Intro
Digial Citizenship Introtechmunoz
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointtburdzy1
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentationjpl17
 
Copyright Scenario Cases
Copyright Scenario CasesCopyright Scenario Cases
Copyright Scenario CasesDCPS
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersMemorial University
 
The iCatechist: Effectively Using Your iDevices
The iCatechist: Effectively Using Your iDevices The iCatechist: Effectively Using Your iDevices
The iCatechist: Effectively Using Your iDevices Caroline Cerveny
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Podcasting intro for Rhodes
Podcasting intro for RhodesPodcasting intro for Rhodes
Podcasting intro for RhodesBryan Alexander
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
Safe Internet Use
Safe Internet UseSafe Internet Use
Safe Internet Useschalman
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet SafetyJVGAJJAR
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointhmorrell1
 
Macul2011 lesson
Macul2011 lessonMacul2011 lesson
Macul2011 lessonelizkeren
 

Mais procurados (20)

Your Child's Digital Tattoo
Your Child's Digital TattooYour Child's Digital Tattoo
Your Child's Digital Tattoo
 
Cyberbullying in the Middle Years
Cyberbullying in the Middle YearsCyberbullying in the Middle Years
Cyberbullying in the Middle Years
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
Young Adults And On Line Privacy
Young Adults And On Line PrivacyYoung Adults And On Line Privacy
Young Adults And On Line Privacy
 
Cyberbullying class symposium
Cyberbullying class symposiumCyberbullying class symposium
Cyberbullying class symposium
 
Digial Citizenship Intro
Digial Citizenship IntroDigial Citizenship Intro
Digial Citizenship Intro
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentation
 
Copyright Scenario Cases
Copyright Scenario CasesCopyright Scenario Cases
Copyright Scenario Cases
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
The iCatechist: Effectively Using Your iDevices
The iCatechist: Effectively Using Your iDevices The iCatechist: Effectively Using Your iDevices
The iCatechist: Effectively Using Your iDevices
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Podcasting intro for Rhodes
Podcasting intro for RhodesPodcasting intro for Rhodes
Podcasting intro for Rhodes
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Safe Internet Use
Safe Internet UseSafe Internet Use
Safe Internet Use
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet Safety
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Macul2011 lesson
Macul2011 lessonMacul2011 lesson
Macul2011 lesson
 
Lis580 seminargroup3
Lis580 seminargroup3Lis580 seminargroup3
Lis580 seminargroup3
 

Destaque

Beautiful Pictures Music
Beautiful  Pictures    MusicBeautiful  Pictures    Music
Beautiful Pictures Musiccrayna2000
 
LRP - Community Development Plan Template
LRP - Community Development Plan TemplateLRP - Community Development Plan Template
LRP - Community Development Plan TemplateQuintin Pastrana
 
45reasonstoenjoylife
45reasonstoenjoylife45reasonstoenjoylife
45reasonstoenjoylifecrayna2000
 
Automoderno Con Radio
Automoderno Con RadioAutomoderno Con Radio
Automoderno Con Radioguest90cbca3
 
The trainsofwinter
The trainsofwinterThe trainsofwinter
The trainsofwintercrayna2000
 
Lung Cancer
Lung CancerLung Cancer
Lung Cancerhungi
 
Therapythorugh Love
Therapythorugh LoveTherapythorugh Love
Therapythorugh Lovecrayna2000
 

Destaque (9)

Beautiful Pictures Music
Beautiful  Pictures    MusicBeautiful  Pictures    Music
Beautiful Pictures Music
 
LRP - Community Development Plan Template
LRP - Community Development Plan TemplateLRP - Community Development Plan Template
LRP - Community Development Plan Template
 
Teaching Ethics
Teaching EthicsTeaching Ethics
Teaching Ethics
 
45reasonstoenjoylife
45reasonstoenjoylife45reasonstoenjoylife
45reasonstoenjoylife
 
Automoderno Con Radio
Automoderno Con RadioAutomoderno Con Radio
Automoderno Con Radio
 
TB
TBTB
TB
 
The trainsofwinter
The trainsofwinterThe trainsofwinter
The trainsofwinter
 
Lung Cancer
Lung CancerLung Cancer
Lung Cancer
 
Therapythorugh Love
Therapythorugh LoveTherapythorugh Love
Therapythorugh Love
 

Semelhante a Teaching Ethics

Lecture 14 Copyright and Ethical Uses
Lecture 14   Copyright and Ethical UsesLecture 14   Copyright and Ethical Uses
Lecture 14 Copyright and Ethical Usesanneleftwich
 
Professional Development Learning Module Presentation Final
Professional Development Learning Module Presentation FinalProfessional Development Learning Module Presentation Final
Professional Development Learning Module Presentation FinalBlackbart5
 
Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship PresentationErin Wasson
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYINGRene Ge
 
Copyright crashcourse conrado gonzalez_634064_v5
Copyright crashcourse conrado gonzalez_634064_v5Copyright crashcourse conrado gonzalez_634064_v5
Copyright crashcourse conrado gonzalez_634064_v5C Gonzalez
 
Copyright crashcourse conrado gonzalez_634064_v4
Copyright crashcourse conrado gonzalez_634064_v4Copyright crashcourse conrado gonzalez_634064_v4
Copyright crashcourse conrado gonzalez_634064_v4C Gonzalez
 
Copyright crashcourse conrado gonzalez_634064_v3
Copyright crashcourse conrado gonzalez_634064_v3Copyright crashcourse conrado gonzalez_634064_v3
Copyright crashcourse conrado gonzalez_634064_v3C Gonzalez
 
Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship projectabroadhead
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet useBurkeV
 
Netiquette do11 skavinska
Netiquette do11 skavinskaNetiquette do11 skavinska
Netiquette do11 skavinskaSergiy Sydoriv
 
Copyright Presentation
Copyright PresentationCopyright Presentation
Copyright PresentationLeigh Zeitz
 
Cruz s professional ethics student lesson powerpoint
Cruz s professional ethics student lesson powerpointCruz s professional ethics student lesson powerpoint
Cruz s professional ethics student lesson powerpointscc0523
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyDi Doersch
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationjpl17
 
Digital Citizenship: Copyright vs. Plagiarism
Digital Citizenship: Copyright vs. PlagiarismDigital Citizenship: Copyright vs. Plagiarism
Digital Citizenship: Copyright vs. Plagiarismllsinclair
 

Semelhante a Teaching Ethics (20)

CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Lecture 14 Copyright and Ethical Uses
Lecture 14   Copyright and Ethical UsesLecture 14   Copyright and Ethical Uses
Lecture 14 Copyright and Ethical Uses
 
Professional Development Learning Module Presentation Final
Professional Development Learning Module Presentation FinalProfessional Development Learning Module Presentation Final
Professional Development Learning Module Presentation Final
 
School p rpresent
School p rpresentSchool p rpresent
School p rpresent
 
Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentation
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYING
 
Copyright crashcourse conrado gonzalez_634064_v5
Copyright crashcourse conrado gonzalez_634064_v5Copyright crashcourse conrado gonzalez_634064_v5
Copyright crashcourse conrado gonzalez_634064_v5
 
Copyright lesson ppt
Copyright lesson pptCopyright lesson ppt
Copyright lesson ppt
 
Copyright crashcourse conrado gonzalez_634064_v4
Copyright crashcourse conrado gonzalez_634064_v4Copyright crashcourse conrado gonzalez_634064_v4
Copyright crashcourse conrado gonzalez_634064_v4
 
Copyright crashcourse conrado gonzalez_634064_v3
Copyright crashcourse conrado gonzalez_634064_v3Copyright crashcourse conrado gonzalez_634064_v3
Copyright crashcourse conrado gonzalez_634064_v3
 
Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship project
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet use
 
Netiquette do11 skavinska
Netiquette do11 skavinskaNetiquette do11 skavinska
Netiquette do11 skavinska
 
Copyright Presentation
Copyright PresentationCopyright Presentation
Copyright Presentation
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Cruz s professional ethics student lesson powerpoint
Cruz s professional ethics student lesson powerpointCruz s professional ethics student lesson powerpoint
Cruz s professional ethics student lesson powerpoint
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and Technology
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Digital Citizenship: Copyright vs. Plagiarism
Digital Citizenship: Copyright vs. PlagiarismDigital Citizenship: Copyright vs. Plagiarism
Digital Citizenship: Copyright vs. Plagiarism
 

Teaching Ethics

  • 1. Brandon Simpson Tiffany Henfling Brad Foltz Ruth Pridgeon
  • 2. They Know More Than We Do? Do your students know more than you do about technology? No Way! Of Course!
  • 3. Think Again…  According to recent research, when asked how much time they spend ‘consuming media’, students between the ages of 8 – 18 said: “practically every waking minute – except for the time in school.” Let’s try that question again…
  • 4. Now What?  Ok, we’re aware that our students are spending more time online, and have more knowledge about technology than we do, so what do we do now?
  • 5. Setting Expectations  Acceptable Use Policy  Policies that schools establish to mandate the expectations they have for their students and their internet use  Examples from Portland Schools acceptable use policy:  Be mindful of network security, and immediately report any bugs, errors, or security problems to the system administrator.  Users may not illegally copy, send, or distribute any copyrighted software, work, or other material.  Users may not access, attempt to access, modify, or delete any record or file without permission or authorization.
  • 6. Issues Teaching Digital Natives Purchasing Music Sharing Papers Online Software Pirating Photo Sharing Internet Hacking Plagiarism
  • 7. Is that Plagiarism?  Plagiarism is more than just copying text out of a textbook. Plagiarism also includes technological resources such as websites, online articles, music, photos, and other media sources  Copyright Resource Link: http://its.leesummit.k12.mo.us/digitalethic.htm Creative Commons
  • 8. Creative Commons References License Comparison
  • 9. Photo Sharing  Tom wants to add a photo to his report on Civil War heroes. He searches the internet and finds an awesome picture of Ulysses S. Grant. He highlights the picture, right clicks, copies and pastes the picture into his paper. He prints the paper and hands it into his teacher.  What should Tom do? Turn the Research Paper In Copyright
  • 10. Research the Copyright  Correct! He needs to research his rights to use the photo, here’s an example of correct usage protocol:  Flickr: - Search for your topic - Scroll to the bottom of the page and click Creative Commons - Your search will sort based on attribution licenses - Check to see for the correct license - Include the link on your reference page or below the photo Issues
  • 11. Turn the Paper In  NO! Tom did not check the photo for its attribution license. He also did not include the website on his reference page or below his photo. Try Again!
  • 12. Music Sharing  You are a 24 year old Graduate student and you enjoy music as a hobby so you download and share music using Kazza. You aren’t selling this music or making money from it in any way.  What should you do? Download Don’t Use
  • 13. Music Sharing – Download  Incorrect – most music is copyrighted and without permission from the ‘owner’ you may not use it! Try Again!
  • 14. Music Sharing – Don’t Use  Correct!  In July of 2009 a Boston area court handed down civil penalties to Boston University Grad Student Joel Tennenbaum for illegally sharing 30 songs on Kazaa.  The penalty for these 30 songs was $675K  In 2008 Minnesota Mother Jammie Thomas was fined 1.92 Million dollars for sharing 24 songs. Issues
  • 15. Face the Facts!  Like it or not, “because so many of them are multitasking — say, surfing the Internet while listening to music — they pack on average nearly 11 hours of media content into that seven and a half hours.” (emphasis added)  A Vision of K-12 Education Today (Video Link to You Tube) Now What?
  • 16. Purchasing Papers Online  William has an essay due on Online Education versus Traditional Classroom Teaching. His friend, Bob, calls him and wants to go out instead. Bob tells him about a cool website where he can purchase the essay. William caves to peer pressure, buys his essay, and copies it on to his classroom blog.  What should William do? Buy Paper Write His Own
  • 17. Buy Paper!  No! William knows that copying and pasting it wrong. However, he thinks that the paper is his because he purchased it and it is his property.  But, his actions still falls under the definition of plagiarism  Plagiarism: The act of appropriating the literary composition of another author, or excerpts, ideas, or passages therefrom, and passing the material off as one's own creation. (italics added for emphasis) Try Again!
  • 18. Write His Own  Correct! William should tell his friend Bob that he needs to write a paper.  He can still use internet sources to gather information or quotes to use in his paper. There are many websites that he can access to correctly cite his paper.  Some examples are:  Son of Citation: http://citationmachine.net/  Purdue Owl: http://owl.english.purdue.edu/owl/resource/560/01/ Issues
  • 19. Internet Hacking  Joseph is doing a project on how Sports teaches responsibility to students at a early age. He remembers seeing a You Tube clip explaining the methods of teaching responsibility through punctuality, Time management, and teamwork.  The only way he can show the clip to his peers is by changing the security settings and allowing the clip to play...  What should Joseph do? Change Settings Ask for Help
  • 20. Change Settings  No! This is considered hacking, because although Joseph is using the You Tube clip to show his classmates the benefits of how sports teaches responsibility. He gained access to show the clip by "changing" the settings. Try Again!
  • 21. Ask IT Dept. for Help  Correct! Contact your teacher or IT department to have the video ‘unlocked’ in order to share it with your classmates  You may also download the video at home, burn it to a CD and bring it into the classroom to share. Be sure to check for fair use policy. Issues
  • 22. Software Pirating  Jake wants to do his English work at home on his family's computer. The problem Jake has is the word processing software isn't compatible with his school's Microsoft Word platform. One of Jake's best friends says, he has Microsoft Office installed and he can lend Jake his install disk to put on his home computer.  Because Jake is using this for his education Jake thinks this is ok.  What should Jake do? Take Software Find Alternative
  • 23. Take the Software  No!  "The legal implications of unauthorized software use should be clear to everyone who owns or uses a computer. According to the U.S. Copyright Act, illegal reproduction of software is subject to civil damages of as much as $100,000 per title infringed plus criminal penalties, including fines of as much as $250,000 per title infringed and imprisonment of up to five years. Given these high stakes, the consequences are certainly not worth the risks." Try Again!
  • 24. Look for Alternatives  Correct!  Free alternatives to MS Office  Open Office - Cross Platform Open Source  Abiword - Cross Platform Open Source  Neo Office - Open Source Mac Program  Google Docs - Online Office Suite Issues
  • 25. References  Dr. William Merrill  http://learning.blogs.nytimes.com/2010/01/22/how-much-time-do- you-spend-consuming-media-every-day/  http://dictionary.reference.com/browse/plagiarism  ucblibraries.colorado.edu/about/glossary.htm  http://www.scu.edu/ethics/publications/iie/v8n3/faqs.html  http://www.startribune.com/local/82845122.html?elr=KArksUUUoDEy 3LGDiO7aiU  http://www.nydailynews.com/money/2009/07/31/2009-07- 31_court_orders_boston_university_student_joel_tenenbaum_to_pay_ 675g_for_illegally_.html  http://its.leesummit.k12.mo.us/digitalethic.htm  http://www.flickr.com  http://portlandk12.org