Top Banner
The Safe and Ethical Use of Technology Development of an instructional presentation to the students
33

The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

Jan 18, 2016

Download

Documents

Malcolm Lane
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

The Safe and Ethical Use of Technology

Development of an instructional presentation to the students

Page 4: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

PROCEDURES FOR SAFETY OFF AND ONLINE OF THE COMPUTER

OFF LINE •Open a notebook or file utilizing a simple outline with information about your computer including:•Technical support telephone number•Serial numbers of the product and manufacturer•User’s ID and password•Keep your computer in a safe area free of dust and dirt•Protect your computer from viruses•Conserve energy•Back-up plan. Back up your lessons files and other important files, or subscribe to a Cloud program.

Page 5: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

ONLINE •You should take steps to protect your computer from harm because there are computer criminals (hackers) who attack other people’s computers. Those people can attack directly by breaking into your computer through the Internet and stealing your personal information.•Virus Awareness •A virus is a small software program designed to spread from one computer to another and to interfere with computer operation.•If your computer starts to behave strangely, you may be experiencing symptoms or have other unwanted software installed in your computer.

Page 6: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

Possible sources of viruses•The possible sources are:•-Downloadable Programs•-Cracked software•-Email attachments•-Internet•-Booting from CD•You must update your computer regularly and use antivirus software• •Resources•http://www.microsoft.com/security/pc-security/virus•Smelly Gary B. Cashman. Thomas J. Vermaat Misty E. Microsoft Office 2003 Course technology introductory concepts and techniques, Boston, Thomson

Page 7: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

TEN COMMANDMENTS OF COMPUTER ETHICS

Page 9: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

The ethical values as defined in 1992 by the Computer Ethics Institute, a non-profit organization whose mission is to advance technology by ethical means, lists these rules as a guide to computer ethics•Thou shall not use a computer to harm other people.•Thou shall not interfere with other people’s computer work.•Thou shall not snoop around in other people’s computer files.•Thou shall not use a computer to steal.•Thou shall not use a computer to bear false witness.

Page 10: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

• Thou shall not copy or use proprietary software to which you have not paid.

• Thou shall not use other people’s computer resources without authorization or proper compensation.

• Thou shall not appropriate other people’s intellectual output.

• Thou shall think about the social consequences of the program you are writing or the system you are designing.

• You shall always use a computer in ways that insure consideration and respect to your fellow humans. (Computer Ethics Institute, 1992).

Page 11: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

• DON’T’S• RFC 1087In January 1989, the Internet Architecture Board (IAB) in

RFC 1087 defines an activity as unethical an unacceptable if it:

• Seeks to gain unauthorized access to the resources of the Internet.

• Disrupts the intended use of the Internet.• Wastes resources (people, capacity, computer)

through such actions.• Destroys the integrity of computer-base information,

or,• Compromises the privacy of users (RFC 1087, 1989).

Page 14: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

1. Don't Be SelfishThis is a common mistake I see far too often.

2. Do Add ValueSocial media is another form of communication, which means you have to be interesting.

3. Don’t Take Short CutsNothing in life comes for free, and this goes for social media as well. There's no magic pill to social media.

4. Do Focus Where It CountsYes, there are tons of social networks out there. But that in no way means you need to be present and active on all of them.

Page 15: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

5. Don’t Steal ImagesStealing is wrong, we all know that.

6. Do Be Authentic7. Do Test, Monitor and Report8. Don't Expect the World If You Don't Give the

World. Social media is a two way stream.9. Do Know Your Audience

Your social media strategy is only good if your audience response and relates to the content you share.

Page 16: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

10. Don't Be Afraid of Haters Haters are going to be out there.

11. Do Build RelationshipsBy knowing your audience and making a step into learning about them they are going to feel wanted, respected and heard.

12. Do Have Something To ShareThis is the most important point. If you don't have something to share you are not going to succeed on social media. In my opinion blogging gives you the best type of content to share.

Authored by:Stephanie Fresco at http://socialmediatoday.com/node?ref=navbar

Page 17: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

Ethical use of internet material • ETHICAL USE OF INTERNET MATERIAL INCLUDING VIDEOS, MUSIC AND

PRINTED MATERIALS.• Cyber-ethics is the philosophic study of ethics pertaining to computers,

encompassing user behavior and what computers are programmed to do, and how this affects individuals and society. Examples of cyber-ethical questions include:

• • Is it ok to display personal information about others on the Internet (such

as their online status or their present location via GPS)?• Should users be protected from false information?• Who owns digital data (such as movies, books, web pages etc.) what

should users be allowed to do with it?• How much access should there be to gambling and pornography online?• Is access to the internet a basic right that everyone should have?• http://en.wikipedia.org/wiki/

Page 19: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

Copyright Rights

• Type of intellectual property protection extended to authors of original creative works automatically upon fixation in any tangible medium of expression. Copyright protection extends only to the expression of an idea not the underlying idea itself. References:

• Fair Use at W http://en.wikipedia.org/wiki/Fair_use

• Protection of Intellectual Property Right. (At the Library of the University: http://sa.hkbu.edu/hk/.../guidelines.../guidelines.

• http://sa.hkbu.edu.hk/home/campus-life-support/gu

Page 20: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

Guidelines for the Protection of Intellectual Property Rights

• The University, being a publicly-funded institution, has the responsibility to respect copyright and be the role model of society. Refusal to follow the Copyright law may tarnish the image of the University and subject ourselves to potential infringement lawsuits initiated by copyright owners.

Page 21: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

• According to the Copyright (Amendment) Ordinance , which came into force in July 2007. It aims to help teachers and students make reasonable and fair use of copyright works for teaching and learning purposes in appropriate circumstances without infringing copyright. But teachers and students should bear in mind that they should use or deal with reasonable portions of copyright works in a

Page 22: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

• fair manner for teaching and learning in a specified course of study. To decide whether an act of dealing with a copyright work is ‘fair’, you need to consider all the circumstances, in particular:

• the purpose and nature of the dealing, including whether such dealing is for non profit-making purpose and whether it is of a commercial nature;

Page 23: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

• the nature of work; • the amount and substantiality of the portion

dealt with in relation to the work as a whole; and

• the effect of the dealing on the potential market for or value of the work. The user liable on an indemnity basis for any claims…the University may suffer as a result of such infringement. For further details please refer to the Library of the University.

Page 24: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

• References:

• Fair Use at W http://en.wikipedia.org/wiki/Fair_use

• Protection of Intellectual Property Right. (At the Library of the University: http://sa.hkbu.edu/hk/.../guidelines.../guidelines

• http://library.hkbu.edu.hk/others/copyright.html.

Page 25: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

METHODS FOR CHECKING FOR PLAGIARISM

•Turnitin (Can be accessed at the University of Phoenix) is an Internet based plagiarism prevention service created by IParadigms, LLLC. Typically universities and high schools buy licenses to submit essays to the Turnitin website, which checks the documents for unoriginal content. The results can be used to identify similarities to existing sources or can be used in formative assessment to help students how to avoid plagiarism and improve their writing.

Page 26: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

Proper citation methods

• A website with an author• In text:• Sample 1:• According to Copeland (2003) the adaptation

required when minorities enter the workplace is a two way street.

Page 27: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

• Reference Page Citation• Copeland, l. (2003) Managing a Multicultural

Workforce, California Job Journal.• Retrieved from:• http://www.jobjournal.com

Page 28: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

• Podcasts:• Podcasts can be formatted in any of the

following ways:• In text citation• Sample 1:• In Fogarty’s (2007) podcast about the

differences between Who versus Whom, she provided tips to determine which one should be used in a question.

Page 29: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

• Reference Page Citation:• Fogarty, M. (Writer/Speaker), (2007, March

9). Who versus whom [Audio podcast]. Retrieved from Grammar Girl’s Quick and dirty Tips for Better Writing Website: http://grammar.quickanddirtytips.com/who=versus-whom.aspx.

• Note: Give the author name or podcaster name first followed by the role in parentheses )eg., Producer, Writer, speaker, etc.).

Page 30: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

• An Online Video• An online video could be formatted in many of

the following ways:• In-Text Citation• Sample 1:• In an Internet video, Gore (2008) stated that

68% of the American population believes that human activity is a contributing factor to global warming.

Page 31: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

• Reference Page citation• Gore A. (Author), (2008,April). Al gore: New

thinking on the climate crisis [Video file]. Available from TED talks.

• Website: http://www.ted.com/talks/view/id/243• [Note: Give the name of the

author/producer/writer/publisher name followed by that person’s or entity’s role in parentheses. If there is no name to give in the author’s position, then the entry should begin with the title of the video instead].

Page 32: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

A website with no identifiable authorIn text citation:Sample 1The website for the National Osteoporosis Foundation (2008) has many interesting facts about this debilitating disease

Page 33: The Safe and Ethical Use of Technology Development of an instructional presentation to the students.

Reference Page citation:National Osteoporosis Foundation (2008) Fast facts. Retrieved from http://www.nof.org