SlideShare uma empresa Scribd logo
1 de 98
Ethics for Cyberspace:   Teaching Students Right from Wrong in the Digital Age   Invest in Futures, ISLMA  November 6, 2008 Doug Johnson www.doug-johnson.com
… a little about the presenter
Handouts
A modest proposal…
poke an eye out poke another kid
write a dirty word write a threatening note write   a note with test answers
some students may have  nicer models
get stolen
break and need repair
might be used for doodling
Federal legislation needed NOW!
Where are we going???? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Two worlds ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Not all technology comes with rules for safe and appropriate behavior.
What’s different about “computer ethics?” ,[object Object]
What is ethical behavior? ,[object Object],[object Object],[object Object],[object Object],[object Object]
What’s different about “computer ethics?” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ethical codes ,[object Object],[object Object],[object Object],[object Object],[object Object]
The 3 P's Privacy - Property - aPpropriate use
Major areas:  Privacy , Property, aPpropriate use ,[object Object]
For each scenario: ,[object Object],[object Object],[object Object],[object Object]
Other questions… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Major areas: Privacy,  Property , aPpropriate use ,[object Object]
For each scenario: ,[object Object],[object Object],[object Object],[object Object],[object Object]
Is time property? Online checking stocks Online planning a wedding Online booking a vacation Online buying a car Online looking for another job Online looking for a spouse Online trading Pokemon cards
Major areas: Privacy,  Property,  aPpropriate use ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other questions… ,[object Object],[object Object],[object Object]
Major areas: Privacy, Property,  aPpropriate use ,[object Object]
For each scenario: ,[object Object],[object Object],[object Object],[object Object],[object Object]
Major areas: Privacy, Property,  aPpropriate use ,[object Object]
Other questions… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What students need to understand ,[object Object],[object Object],[object Object],[object Object],[object Object]
http://www.whitehouse.gov http://www.whitehouse.com
What do teachers need to understand?
What teachers need to understand *  I clearly understand the difference between freeware, shareware, and commercial software and the fees involved in the use of each.  I know the programs for which the district or my building holds a site license.  *  I understand the school board policy on the use of copyrighted materials. *  I demonstrate ethical usage of all software and let my students know my personal stand on legal and moral issues involving technology.  *  I know and enforce the school’s technology policies and guidelines, including its Internet Acceptable Use Policy.  *  I am aware of the controversial aspects of technology use including data privacy, equitable access, and free speech issues.
Perhaps the classic case of moral confusion happened recently in California: A young teacher was fired for downloading pornography on a school computer. "When he was confronted, the guy said, 'Well, what's wrong with that? I can download anything I want from my home computer, so why not here?' " explains [Paul] Longo, who has spent most of his career analyzing teacher misbehavior. "All the sorts of things that would ring a hundred bells for most people rang no bells for this guy. It doesn't mean he's an evil person. It means that he doesn't get it. So I guess that's why there's a need for [ethics education] for teachers.“ Christian Science Monitor , November 6, 2001
What parents need to understand Training for parents at  AASL’s FamiliesConnect  URL in bibliography/link from my website
What activities  teach ethical behaviors? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What do adults think of when they think of social networking?
This?
Dateline ,[object Object],[object Object],[object Object],Predators & cyberbullies: Reality check   www.blogsafety.com/  March 16, 2007 McCollam, The Shame Game Columbia Journalism Review , Jan/Feb 2007 www.cjr.org/issues/2007/1/McCollam.asp
On the agenda… ,[object Object],[object Object],[object Object],[object Object],[object Object],X
Where do  you live? ,[object Object]
What is Web 2.0? ,[object Object],[object Object],[object Object]
MySpace
Blogs
RSS Aggregators
Wikis
Content sharing  -  FlickR - YouTube - del.icio.us
3D Virtual Environments
On the agenda… ,[object Object],[object Object],[object Object],[object Object],[object Object],X
Web 1.0 to Web 2.0 safety issues ,[object Object],[object Object],[object Object]
… old fears
… from  predators
If you don’t tell your children you love them… someone online will.
… from each other www.cyberbully.org
Ad campaign material
District Guide
… from    themselves
… from themselves Stacy Snyder aka “Drunken Pirate”
… from themselves
It’s never really gone
That darned free speech thing
Common sense
The danger to kids in Web 2.0 comes not from what they may find online, but from what they themselves put online for others to access.
On the agenda… ,[object Object],[object Object],[object Object],[object Object],[object Object],X
Let’s just block it all! ,[object Object],[object Object],[object Object]
This  unnecessary  and  overly broad  legislation will  hinder students’ ability  to engage in distance learning and block library computer users from accessing a  wide array  of  essential  Internet  applications  including instant messaging, email, wikis and blogs. -  Leslie Burger, ALA President, 2006
Blocking formats not content. For every problem, there is a solution that is simple, neat, and wrong. H.L. Menken
Why filtering  is ineffective ,[object Object],[object Object],[object Object],[object Object],[object Object]
SchoolBoredom.com
Education is imperative ,[object Object],[object Object],[object Object],[object Object],[object Object],Due Diligence
Tracking Teresa
 
What activities  teach  ethical behaviors? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object]
On the agenda… ,[object Object],[object Object],[object Object],[object Object],[object Object],X
Education  can  be enhanced with the social web resources
Classroom blogs <areallydifferentplace.org>
School library blog
 
Wiki textbooks
Teen Second Life
Full participation? ,[object Object]
On the agenda… ,[object Object],[object Object],[object Object],[object Object],[object Object],X
Making good decisions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Love and balance are the  two most important words in the English language. - John Wooden
Our policy – a group decision… District Technology Advisory Committee Small Important meetings Good agendas and minutes Wide representation Defined responsibilities
Due process for blocking ,[object Object],[object Object],[object Object],[object Object],[object Object]
On the agenda… ,[object Object],[object Object],[object Object],[object Object],[object Object]
Educate adults Continuous effort Study needed
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The fleeber filter
1994 ,[object Object],[object Object],[object Object]
2008 ,[object Object],[object Object],[object Object]
2015, 2020, 2050… ,[object Object],[object Object],[object Object]
What can we as educators do to promote ethical behaviors? ,[object Object],Your ideas
Questions?
The bear
Ethics for Cyberspace:   Teaching Students Right from Wrong in the Digital Age   Doug Johnson www.doug-johnson.com

Mais conteúdo relacionado

Mais procurados

Cyberbullying in the Middle Years
Cyberbullying in the Middle YearsCyberbullying in the Middle Years
Cyberbullying in the Middle Years
elketeaches
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activity
guest09fcd1
 

Mais procurados (20)

3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High School
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber path
 
[R]evolution - Parenting Workshop Slides
[R]evolution - Parenting Workshop Slides[R]evolution - Parenting Workshop Slides
[R]evolution - Parenting Workshop Slides
 
E safety training for staff who work with children and young people - Stephe...
E  safety training for staff who work with children and young people - Stephe...E  safety training for staff who work with children and young people - Stephe...
E safety training for staff who work with children and young people - Stephe...
 
Cyberbullying in the Middle Years
Cyberbullying in the Middle YearsCyberbullying in the Middle Years
Cyberbullying in the Middle Years
 
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop PresentationLydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activity
 
Digital Cheating
Digital CheatingDigital Cheating
Digital Cheating
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 
Can social media save kids' lives?
Can social media save kids' lives?Can social media save kids' lives?
Can social media save kids' lives?
 
International comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youthInternational comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youth
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
 
Parent presentation 2010-11
Parent presentation 2010-11Parent presentation 2010-11
Parent presentation 2010-11
 

Semelhante a Ethics Half Day

Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
Donna Murray
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 version
Johan Koren
 
Project DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxProject DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docx
briancrawford30935
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
Johan Koren
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 version
Johan Koren
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
ConnectSafely
 
Pike Ky Digital Citizenship
Pike Ky Digital CitizenshipPike Ky Digital Citizenship
Pike Ky Digital Citizenship
cynthia.warner
 
Addressing Ethics With Young Students
Addressing Ethics With Young StudentsAddressing Ethics With Young Students
Addressing Ethics With Young Students
beccapr69
 

Semelhante a Ethics Half Day (20)

Policies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social WebPolicies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social Web
 
Lesson 3 ethical issues
Lesson 3   ethical issuesLesson 3   ethical issues
Lesson 3 ethical issues
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 version
 
Project DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxProject DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docx
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 version
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Teaching Ethical Behavior, Kansas Conference Oct 2009
Teaching Ethical Behavior, Kansas Conference Oct 2009Teaching Ethical Behavior, Kansas Conference Oct 2009
Teaching Ethical Behavior, Kansas Conference Oct 2009
 
Teaching Ethical Behavior, Kasl Conference Oct 2009
Teaching Ethical Behavior, Kasl Conference Oct 2009Teaching Ethical Behavior, Kasl Conference Oct 2009
Teaching Ethical Behavior, Kasl Conference Oct 2009
 
Ethics Copyright and Fair Use Guidelines
Ethics Copyright and Fair Use Guidelines Ethics Copyright and Fair Use Guidelines
Ethics Copyright and Fair Use Guidelines
 
ACRL
ACRLACRL
ACRL
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Pike Ky Digital Citizenship
Pike Ky Digital CitizenshipPike Ky Digital Citizenship
Pike Ky Digital Citizenship
 
Addressing Ethics With Young Students
Addressing Ethics With Young StudentsAddressing Ethics With Young Students
Addressing Ethics With Young Students
 
Lis580 seminargroup3
Lis580 seminargroup3Lis580 seminargroup3
Lis580 seminargroup3
 
Ethical
EthicalEthical
Ethical
 

Último

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Último (20)

Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 

Ethics Half Day