ethics half day

Post on 12-May-2015

611 Views

Category:

Technology

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Ethics for Ethics for Cyberspace:Cyberspace: Teaching Teaching

Students Right from Students Right from

Wrong in the Digital AgeWrong in the Digital Age

Invest in Futures, ISLMA Invest in Futures, ISLMA November 6, 2008November 6, 2008

Doug JohnsonDoug Johnsonwww.doug-johnson.comwww.doug-johnson.com

……a little about the a little about the presenterpresenter

HandoutsHandouts

A modest proposal…A modest proposal…

poke an eye outpoke an eye out

poke another kidpoke another kid

write a dirty wordwrite a dirty wordwrite a threatening notewrite a threatening notewritewrite a note with test a note with test

answersanswers

some students may have some students may have nicer modelsnicer models

get stolenget stolen

break and need repairbreak and need repair

might be used for doodlingmight be used for doodling

Federal legislation neededFederal legislation neededNOW!NOW!

Where are we going????Where are we going????• Two worlds – Two worlds –

physical and virtualphysical and virtual• What’s different aboutWhat’s different about

“computer” ethics?“computer” ethics?• Ethical codesEthical codes• The three P’s: CasesThe three P’s: Cases• What students need to understandWhat students need to understand• What’s new in the Web 2.0 world?What’s new in the Web 2.0 world?• What activities teach ethical What activities teach ethical

behaviors?behaviors?

Two worldsTwo worlds

• The physical worldThe physical world• The virtual worldThe virtual world• ExamplesExamples

• the magazinethe magazine• the keysthe keys• the term paperthe term paper• the stolen bookthe stolen book Not all technology comes Not all technology comes

with rules for safe and with rules for safe and appropriate behavior.appropriate behavior.

What’s different about What’s different about “computer ethics?”“computer ethics?”

• What is ethical What is ethical behavior?behavior?

What is ethical behavior?What is ethical behavior?1.1. Promotes the general health of Promotes the general health of

society.society.

2.2. Promotes or maintains individual Promotes or maintains individual freedoms and rights.freedoms and rights.

3.3. Protects individuals from harm.Protects individuals from harm.

4.4. Treats all human beings as having Treats all human beings as having inherent value and accords those inherent value and accords those beings respect.beings respect.

5.5. Upholds religious, social, cultural, and Upholds religious, social, cultural, and governmental laws and mores.governmental laws and mores.

What’s different about What’s different about “computer ethics?”“computer ethics?”

• What is ethical behavior?What is ethical behavior?• Basis of ethical decisionsBasis of ethical decisions• The role of the school in The role of the school in

values educationvalues education• Special attributes of Special attributes of

technology ethicstechnology ethics• not understoodnot understood• new capabilitiesnew capabilities• intangibleintangible• seemingly low riskseemingly low risk

Ethical codesEthical codes• 10 Commandments 10 Commandments

of Computer Useof Computer Use• Code of Ethics and Code of Ethics and

Professional Professional ConductConduct

• NetiquetteNetiquette• Acceptable Use Acceptable Use

PoliciesPolicies• Hacker “Ethics”Hacker “Ethics”

Major areas: Major areas: PrivacyPrivacy, , Property, aPpropriate useProperty, aPpropriate use• PrivacyPrivacy - I will protect my privacy and - I will protect my privacy and

respect the privacy of others.respect the privacy of others.

For each scenario:For each scenario:

• Whose Whose privacyprivacy is at risk? is at risk?• What danger or discomfort might What danger or discomfort might

the unethical action cause?the unethical action cause?• Is there a parallel in the physical Is there a parallel in the physical

world to this scenario?world to this scenario?• Other comments? Other Other comments? Other

incidents?incidents?

Other questions…Other questions…• When is shared data helpful? When is it When is shared data helpful? When is it

harmful?harmful?• Is the hacker argument that all information Is the hacker argument that all information

should be free defensible?should be free defensible?• How available should these kinds of student How available should these kinds of student

information be?information be?• school recordsschool records• last 3 books borrowed last 3 books borrowed

from the media centerfrom the media center• last 3 sites visited on the last 3 sites visited on the

World Wide WebWorld Wide Web• favorite foods and fashionsfavorite foods and fashions

Major areas: Privacy, Major areas: Privacy, PropertyProperty, aPpropriate use, aPpropriate use• PropertyProperty - I will protect my property - I will protect my property

and respect the property of others.and respect the property of others.

For each scenario:For each scenario:

• What is the What is the propertyproperty??• Who is its owner?Who is its owner?• What danger or discomfort might What danger or discomfort might

the unethical action cause?the unethical action cause?• Is there a parallel in the physical Is there a parallel in the physical

world to this scenario?world to this scenario?• Other comments? Other Other comments? Other

incidents?incidents?

Is time property?Is time property?Online checking stocks

Online planning a wedding

Online booking a vacation

Online buying a car

Online looking for another job

Online looking for a spouse

Online trading Pokemon cards

Major areas: Privacy, Major areas: Privacy, Property,Property, aPpropriate use aPpropriate use• Plagiarism preventionPlagiarism prevention• How?How?

• Developing understandingDeveloping understanding• Having clear policiesHaving clear policies• Designing better projectsDesigning better projects

• original thinkingoriginal thinking• primary sourcesprimary sources• personal, timely, localpersonal, timely, local• choicechoice

Other questions…Other questions…• How does paying for software How does paying for software

benefit the USER?benefit the USER?• When does someone “own” an When does someone “own” an

idea? Should a cure for a disease idea? Should a cure for a disease be considered property?be considered property?

• What are the ethical What are the ethical issues raised when virus issues raised when virus hoaxes are perpetrated?hoaxes are perpetrated?

Major areas: Privacy, Major areas: Privacy, Property, Property, aPpropriate useaPpropriate use• AppropriatenessAppropriateness - I will use technology - I will use technology

in constructive ways and in ways which in constructive ways and in ways which do not break the rules of my family, do not break the rules of my family, religion, school, or government.religion, school, or government.

For each scenario:For each scenario:

• What is the inappropriate action?What is the inappropriate action?• Who committed it?Who committed it?• What danger or discomfort might What danger or discomfort might

the unethical action cause?the unethical action cause?• Is there a parallel in the physical Is there a parallel in the physical

world to this scenario?world to this scenario?• Other comments? Other Other comments? Other

incidents?incidents?

Major areas: Privacy, Major areas: Privacy, Property, Property, aPpropriate useaPpropriate use

Would I be Would I be proud to have proud to have my actions my actions seen by my seen by my family, my family, my religious leader, religious leader, or my principal?or my principal?

Other questions…Other questions…• Are some things appropriate for Are some things appropriate for

some students that are not for some students that are not for other students?other students?

• Is the personal use of school Is the personal use of school technology ever ethical?technology ever ethical?

• What is the definition of:What is the definition of:• pornographypornography• hate grouphate group• sites harmful to minorssites harmful to minors

• What are the ethical issuesWhat are the ethical issuesinvolved regarding filtering involved regarding filtering software?software?

What students need to What students need to understandunderstand• Rules and laws - Rules and laws -

principles behind themprinciples behind them• Detection is growingDetection is growing• Rights and responsibilitiesRights and responsibilities• Protection from unethical Protection from unethical

behavior of othersbehavior of others• Trust adultsTrust adults

http://www.whitehouse.govhttp://www.whitehouse.gov

http://www.whitehouse.comhttp://www.whitehouse.com

What do teachers need to What do teachers need to understand?understand?

What teachers need to What teachers need to understandunderstand

* * I clearly understand the difference between freeware, I clearly understand the difference between freeware, shareware, and commercial software and the fees involved in the shareware, and commercial software and the fees involved in the use of each. I know the programs for which the district or my use of each. I know the programs for which the district or my building holds a site license. building holds a site license. ** I understand the school board policy on the use of copyrighted I understand the school board policy on the use of copyrighted materials.materials.** I demonstrate ethical usage of all software and let my students I demonstrate ethical usage of all software and let my students know my personal stand on legal and moral issues involving know my personal stand on legal and moral issues involving technology. technology. ** I know and enforce the school’s technology policies and I know and enforce the school’s technology policies and guidelines, including its Internet Acceptable Use Policy. guidelines, including its Internet Acceptable Use Policy. ** I am aware of the controversial aspects of technology use I am aware of the controversial aspects of technology use including data privacy, equitable access, and free speech issues. including data privacy, equitable access, and free speech issues.

Perhaps the classic case of moral confusion Perhaps the classic case of moral confusion happened recently in California: A young teacher was happened recently in California: A young teacher was fired for downloading pornography on a school fired for downloading pornography on a school computer.computer.

"When he was confronted, the guy said, 'Well, what's "When he was confronted, the guy said, 'Well, what's wrong with that? I can download anything I want from wrong with that? I can download anything I want from my home computer, so why not here?' " explains my home computer, so why not here?' " explains [Paul] Longo, who has spent most of his career [Paul] Longo, who has spent most of his career analyzing teacher misbehavior. "All the sorts of analyzing teacher misbehavior. "All the sorts of things that would ring a hundred bells for most things that would ring a hundred bells for most people rang no bells for this guy. It doesn't mean he's people rang no bells for this guy. It doesn't mean he's an evil person. It means that he doesn't get it. So I an evil person. It means that he doesn't get it. So I guess that's why there's a need for [ethics education] guess that's why there's a need for [ethics education] for teachers.“for teachers.“

Christian Science MonitorChristian Science Monitor, November 6, 2001, November 6, 2001

What parents need to What parents need to understandunderstand

Training for parents at AASL’s Training for parents at AASL’s FamiliesConnect FamiliesConnect URL in bibliography/link from URL in bibliography/link from

my websitemy website

What activities What activities teach ethical behaviors?teach ethical behaviors?• Articulation and Articulation and

demonstration of valuesdemonstration of values• Reinforcement of behaviorsReinforcement of behaviors• Discussion of issuesDiscussion of issues• Stress on principles rather Stress on principles rather

than rulesthan rules• AssessmentAssessment• Creation of low temptation Creation of low temptation

environments – how?environments – how?

What do adults think of What do adults think of when they think of social when they think of social networking?networking?

This?This?

DatelineDateline

• Spring 2006Spring 2006• Parents wake upParents wake up• DOPADOPA

Predators & cyberbullies: Reality check www.blogsafety.com/ March 16, 2007

McCollam, The Shame GameColumbia Journalism Review, Jan/Feb 2007www.cjr.org/issues/2007/1/McCollam.asp

On the agenda…On the agenda…

• What is “the social web?”What is “the social web?”• How do Web 2.0 safe and ethical use How do Web 2.0 safe and ethical use

issues differ from those of Web 1.0?issues differ from those of Web 1.0?• How can we make kids safe?How can we make kids safe?• Is there a place for the social web in Is there a place for the social web in

schools?schools?• How are good decisions made about How are good decisions made about

filtering and policy - and by whom?filtering and policy - and by whom?

X

Where do Where do you live?you live?

Randall Munroe Randall Munroe http://xkcd.com/c256.htmlhttp://xkcd.com/c256.html

What is Web What is Web 2.0?2.0?• Read only -> Read and Read only -> Read and

writewrite• Horizon Report, 2007Horizon Report, 2007• Manifestations include:Manifestations include:

MySpaceMySpace

BlogsBlogs

RSS RSS AggregatorAggregatorss

WikisWikis

Content Content sharing sharing - - FlickRFlickR- YouTube- YouTube- del.icio.us- del.icio.us

3D Virtual3D VirtualEnvironmentsEnvironments

On the agenda…On the agenda…

• What is “the social web?”What is “the social web?”• How do Web 2.0 safe and ethical use How do Web 2.0 safe and ethical use

issues differ from those of Web 1.0?issues differ from those of Web 1.0?• How can we make kids safe?How can we make kids safe?• Is there a place for the social web in Is there a place for the social web in

schools?schools?• How are good decisions made about How are good decisions made about

filtering and policy - and by whom?filtering and policy - and by whom?

X

Web 1.0 to Web 2.0Web 1.0 to Web 2.0safety issuessafety issues• Protecting children from predatorsProtecting children from predators• Protecting children from each other Protecting children from each other

(cyberbullying) (cyberbullying) Protecting teachers from Protecting teachers from students???students???

• Protecting children from themselves Protecting children from themselves (making inappropriate and personal (making inappropriate and personal information public)information public)

……old fearsold fears

……from from predatopredatorsrs

If you don’t tell your If you don’t tell your children you love them…children you love them…

someone online will.

……from each otherfrom each otherwww.cyberbully.org

Ad campaign materialAd campaign material

DistrictDistrictGuideGuide

…from themselves

……from themselvesfrom themselves

Stacy Snyder aka“Drunken Pirate”

……from themselvesfrom themselves

It’s never really goneIt’s never really gone

That darned free speech That darned free speech thingthing

Common senseCommon sense

The danger to kids in Web The danger to kids in Web 2.0 comes not from what 2.0 comes not from what they may find online, but they may find online, but from what they from what they themselves put online for themselves put online for others to access.others to access.

On the agenda…On the agenda…

• What is “the social web?”What is “the social web?”• How do Web 2.0 safe and ethical use How do Web 2.0 safe and ethical use

issues differ from those of Web 1.0?issues differ from those of Web 1.0?• How can we make kids safe?How can we make kids safe?• Is there a place for the social web in Is there a place for the social web in

schools?schools?• How are good decisions made about How are good decisions made about

filtering and policy - and by whom?filtering and policy - and by whom?

X

Let’s just block it all!Let’s just block it all!

• DOPA, 2006 - DOPA, 2006 - passed the passed the House with House with 96% in favor96% in favor

• DOPA Jr.DOPA Jr.• Tomorrow?Tomorrow?

This This unnecessary unnecessary and and overly overly broad broad legislation will legislation will hinder hinder students’ ability students’ ability to engage in to engage in distance learning and block distance learning and block library computer users from library computer users from accessing a accessing a wide array wide array of of essential essential Internet Internet applications applications including instant messaging, including instant messaging, email, wikis and blogs. - email, wikis and blogs. - Leslie Leslie Burger, ALA President, 2006Burger, ALA President, 2006

Blocking formats Blocking formats not content.not content.

For every problem, For every problem, there is a solution there is a solution that is simple, neat, that is simple, neat, and wrong. H.L. and wrong. H.L. MenkenMenken

Why filtering Why filtering is ineffectiveis ineffective

• Best filters not 100%Best filters not 100%• Can’t filter what goes outCan’t filter what goes out• Access from outside schoolAccess from outside school• ProxiesProxies• Mobile devices/EVDO accessMobile devices/EVDO access

SchoolBoredom.comSchoolBoredom.com

Education is imperativeEducation is imperative

• Dangers are realDangers are real• Schools must be Schools must be

proactiveproactive• Schools must reach outSchools must reach out• Good resources on Good resources on

the webthe web• ““Safe mistakes”Safe mistakes”

Tracking TeresaTracking Teresa

What activities What activities teachteach ethical ethical behaviors?behaviors?• Articulate and demonstrate valuesArticulate and demonstrate values• Reinforce behaviorsReinforce behaviors• Discuss issuesDiscuss issues• Principles rather Principles rather

than rulesthan rules• AssessmentAssessment• Low temptation Low temptation

environmentsenvironments• Chance to practiceChance to practice

ScenariosScenariosLisa posts photographs from recent party Lisa posts photographs from recent party that involved drinking on the FlickR website that involved drinking on the FlickR website along with a really funny video of kids along with a really funny video of kids making out on YouTube.making out on YouTube.

1.1. What is the unsafe or unethical action?What is the unsafe or unethical action?

2.2. What harm might it cause?What harm might it cause?

3.3. How would you counsel/guide Lisa?How would you counsel/guide Lisa?

4.4. Similar incidents?Similar incidents?

On the agenda…On the agenda…

• What is “the social web?”What is “the social web?”• How do Web 2.0 safe and ethical use How do Web 2.0 safe and ethical use

issues differ from those of Web 1.0?issues differ from those of Web 1.0?• How can we make kids safe?How can we make kids safe?• Is there a place for the social web in Is there a place for the social web in

schools?schools?• How are good decisions made about How are good decisions made about

filtering and policy - and by whom?filtering and policy - and by whom?

X

Education Education cancan be be enhanced with the social enhanced with the social web resourcesweb resources

Classroom blogsClassroom blogs

<areallydifferentplace.o<areallydifferentplace.org>rg>

School library blogSchool library blog

Wiki Wiki textbookstextbooks

Teen Second LifeTeen Second Life

Full participation?Full participation?

The school system’s inability to close this The school system’s inability to close this participation gap has negative participation gap has negative consequences for everyone involved. - consequences for everyone involved. - Henry Jenkins, Henry Jenkins, Confronting the Confronting the Challenges of Participatory CultureChallenges of Participatory Culture

On the agenda…On the agenda…

• What is “the social web?”What is “the social web?”• How do Web 2.0 safe and ethical use How do Web 2.0 safe and ethical use

issues differ from those of Web 1.0?issues differ from those of Web 1.0?• How can we make kids safe?How can we make kids safe?• Is there a place for the social web in Is there a place for the social web in

schools?schools?• How are good decisions made about How are good decisions made about

filtering and policy - and by whom?filtering and policy - and by whom?

X

Making good decisionsMaking good decisions

• BalanceBalance• Current AUPsCurrent AUPs

• ““high-quality,” high-quality,” • ““inapropriate,” inapropriate,” • ““reasonable”reasonable”

• Open to Open to interpretation?interpretation?

Love and balance are the two most important wordsin the English language.- John Wooden

Our policy – a group Our policy – a group decision…decision…

District Technology Advisory Committee

Small

Important meetings

Goodagendasand minutes

Wide representation

Defined responsibilities

Due process for blockingDue process for blocking• Block the minimum required by CIPABlock the minimum required by CIPA• Require that any request for blocking as Require that any request for blocking as

site goes through reconsideration processsite goes through reconsideration process• Unblock any site at professional requestUnblock any site at professional request• Keep one unblocked computer in each Keep one unblocked computer in each

librarylibrary• Make educators, not techs, responsible Make educators, not techs, responsible

for safe and appropriate usefor safe and appropriate use

On the agenda…On the agenda…

• What is “the social web?”What is “the social web?”• How do Web 2.0 safe and ethical use How do Web 2.0 safe and ethical use

issues differ from those of Web 1.0?issues differ from those of Web 1.0?• How can we make kids safe?How can we make kids safe?• Is there a place for the social web in Is there a place for the social web in

schools?schools?• How are good decisions made about How are good decisions made about

filtering and policy - and by whom?filtering and policy - and by whom?

……it is not the tools that are inherently good or evil but it is not the tools that are inherently good or evil but rather the use of the tools.rather the use of the tools.

• A hammer can kill someone but it can also build a house.A hammer can kill someone but it can also build a house.• A nail can be driven through a hand but it can also hold A nail can be driven through a hand but it can also hold

the roof over your head.the roof over your head.• A fist can hit but a fist can also be clasped in your hand in A fist can hit but a fist can also be clasped in your hand in

love.love.

We do not outlaw hammers, nails, or fists -- we teach We do not outlaw hammers, nails, or fists -- we teach people to use them properly. people to use them properly.

So should we do with blogs, wikis, podcasts, Skype, So should we do with blogs, wikis, podcasts, Skype, and any other tool that becomes available for use in and any other tool that becomes available for use in the human experience! the human experience!

-Vicki Davis, Cool Cat Blog-Vicki Davis, Cool Cat Blog

The fleeber filterThe fleeber filter

19941994

• Our children will need to be able use Our children will need to be able use the Internet the Internet to compete in business to compete in business and college.and college.

• The Internet The Internet is an important resource is an important resource that can improve current teaching that can improve current teaching practices.practices.

• Our children will need to be able to use Our children will need to be able to use the Internet the Internet as informed, responsible as informed, responsible citizens. citizens.

20082008

• Our children will need to be able use Our children will need to be able use Web 2.0 Web 2.0 to compete in business and to compete in business and college.college.

• Web 2.0 Web 2.0 is an important resource is an important resource that can improve current teaching that can improve current teaching practices.practices.

• Our children will need to be able to use Our children will need to be able to use Web 2.0 Web 2.0 as informed, responsible as informed, responsible citizens. citizens.

2015, 2020, 2050…2015, 2020, 2050…

• Our children will need to be able Our children will need to be able use use ??????? ??????? to compete in business to compete in business and college.and college.

• ??????? ??????? is an important resource is an important resource that can improve current teaching that can improve current teaching practices.practices.

• Our children will need to be able to use Our children will need to be able to use ??????? ??????? as informed, responsible as informed, responsible citizens. citizens.

What can we as educators What can we as educators do to promote ethical do to promote ethical behaviors?behaviors?Your ideasYour ideas Your ideasYour ideas

Questions?Questions?

The bearThe bear

Ethics for Ethics for Cyberspace:Cyberspace: Teaching Teaching

Students Right from Students Right from

Wrong in the Digital AgeWrong in the Digital Age

Doug JohnsonDoug Johnsonwww.doug-johnson.comwww.doug-johnson.com

top related