Ethics

15
Ethics and Ethics and Technology in Technology in Education Education Michael Langlois Michael Langlois Director of Technology Director of Technology Brimmer and May School Brimmer and May School

description

 

Transcript of Ethics

Page 1: Ethics

Ethics and Technology Ethics and Technology in Educationin EducationMichael LangloisMichael Langlois

Director of TechnologyDirector of Technology

Brimmer and May SchoolBrimmer and May School

Page 2: Ethics

What are the Ethics of What are the Ethics of Technology?Technology?

“Ethical judgments are no different in the area of computing and technology from those in any other area, as computers raise problems of privacy, ownership, theft and power, to name but a few examples.”

Ethics in Computing, NCSU

Page 3: Ethics

How Does This Apply in How Does This Apply in Education?Education?

Ethical behavior is defined at multiple levels in a societyEthical behavior is defined at multiple levels in a society

The community level is one of the most The community level is one of the most influentialinfluential

A prototypical community is a schoolA prototypical community is a school

A school is both a subset and superset of A school is both a subset and superset of prevailing ethical normsprevailing ethical normsEthical behavior in education is no different Ethical behavior in education is no different than ethical behavior elsewherethan ethical behavior elsewhere

It’s t

he same

It’s t

he same

It’s t

he same

It’s t

he same

Page 4: Ethics

ConcernsConcerns

Conflict of InterestConflict of Interest

ConfidentialityConfidentiality

PrivacyPrivacy

SecuritySecurity

SpeechSpeech

FilteringFiltering

AccessAccess

Intellectual PropertyIntellectual Property

Page 5: Ethics

The Ten Commandments of Computer Ethics

1. Thou shalt not use a computer to harm other people.

2. Thou shalt not interfere with other people's computer work.

3. Thou shalt not snoop around in other people's computer files.

4. Thou shalt not use a computer to steal.

5. Thou shalt not use a computer to bear false witness.

6. Thou shalt not copy or use proprietary software for which you have not paid.

7. Thou shalt not use other people's computer resources without authorization or proper compensation.

8. Thou shalt not appropriate other people's intellectual output.

9. Thou shalt think about the social consequences of the program you are writing or the system you are designing.

10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.

the Computer Ethics Institutethe Computer Ethics Institutehttp://computerethicsinstitute.org

Page 6: Ethics

AASL foundational AASL foundational beliefsbeliefs

Reading is a window to the world.Reading is a window to the world.

Inquiry provides a framework for learning.

Ethical behavior in the use of information must be taught.

Technology skills are crucial for future employment needs.

Equitable access is a key component for education.

The definition of information literacy has become more complex as resources and technologies have changed.

The continuing expansion of information demands that all individuals acquire the thinking skills that will enable them to learn on their own.

Learning has a social context.

School libraries are essential to the development of learning skills.

Page 7: Ethics

MechanismsMechanisms

Communication:Communication:

WebWeb

E-mailE-mail

TextText

ChatChat

NewsgroupsNewsgroups

VOIPVOIP

Publication:Publication:

WebsitesWebsites

WikisWikis

PodcastsPodcasts

BlogsBlogs

NewsgroupsNewsgroups

ListsLists

Page 8: Ethics

MinefieldsMinefields

Citations: making sure what isn’t original is attributedCitations: making sure what isn’t original is attributed

Metadata: check the veracity of data that’s Metadata: check the veracity of data that’s hard to seehard to see

Advertising: beware of biasAdvertising: beware of bias

Disposal (of data, hardware, etc.): security Disposal (of data, hardware, etc.): security issueissue

Archiving: saving what deserved to preservedArchiving: saving what deserved to preserved

Creation: making the content originalCreation: making the content original

Page 9: Ethics

Some ScenariosSome ScenariosJules has walked away from a lab computer without logging off. Trish sits down and, still logged in as Jules, sends inflammatory e-mail messages out to a number of students and posts similar messages on the class newsgroup.

Brad has posted a note on his class newsgroup stating his (highly unflattering) opinion of a new teacher. He wants to know what others think. Some of the responses that follow say nice things. Other comments are quite critical; a few are personal.

Like many of her friends, Minnie has a blog. But unlike her friends, she keeps its location secret. She doesn’t link to anyone else’s blog and she doesn’t comment on other blogs using her blog identity. Somehow, though, Edward finds out the URL for Minnie’s blog and adds it to the “friends” list on his blog. Word spreads, and soon everyone has read Minnie’s blog. Unfortunately, she has used her blog to criticize most everyone she knows, including other students, teachers, and her parents. Everyone is furious with her.

Page 10: Ethics

Scenario linksScenario links

University Laboratory High SchoolUniversity Laboratory High School

Doug JohnsonDoug Johnson

Page 11: Ethics

Educators should...Educators should...Draw parallels between the real world and the electronic world. Make direct comparisons between what students do on the Internet and how they behave in their daily lives.

Post a written acceptable use policy in your classroom, and include the consequences for violating it.

Reinforce proper behavior. Treat offenses as mistakes rather than "crimes," especially in the beginning.

Assign students to work with technology buddies, other students who have already worked with technology and will set a good example. Peers can help sell a point that students might not accept from adults. In addition, kids who are working together are less likely to get off task.

Don't model inappropriate behavior.

Instill a sense of responsibility, point out the real costs of misusing technology, and express a belief in students' ability to handle technology properly. Students will live up to or down to your expectations.

Page 12: Ethics

Good PracticeGood Practice

authentication: login and logoutauthentication: login and logout

passwordspasswords

encryptionencryption

revision trackingrevision tracking

savingsaving

backupbackup

Page 13: Ethics

Practices con’t.Practices con’t.

proper research methodsproper research methods

appropriate/correct citationappropriate/correct citation

CRITICAL THOUGHTCRITICAL THOUGHT

collaborate and sharecollaborate and share

ask questionsask questions

Page 14: Ethics

ResourcesResourcesMarkkula Center for Applied EthicsMarkkula Center for Applied Ethics at Santa Clara University at Santa Clara University

Ethics in ComputingEthics in Computing at NC State at NC State

Computer Professionals for Social ResponsibilityComputer Professionals for Social Responsibility

The Computer Ethics InstituteThe Computer Ethics Institute

The Electronic Frontier FoundationThe Electronic Frontier Foundation

TurnItIn.comTurnItIn.com

AASL Learning StandardsAASL Learning Standards

Computer Ethics for EducatorsComputer Ethics for Educators, U. of Illinois, Urbana/Champaign, U. of Illinois, Urbana/Champaign

Education World, Education World, Tools for Teaching Cyber EthicsTools for Teaching Cyber Ethics

Doug JohnsonDoug Johnson

Page 15: Ethics

More ResourcesMore Resources

DoJ site for kids DoJ site for kids http://www.usdoj.gov/criminal/cybercrime/ruleshttp://www.usdoj.gov/criminal/cybercrime/rules/kidinternet.htm/kidinternet.htm

DoJ for teachers DoJ for teachers http://www.usdoj.gov/criminal/cybercrime/ruleshttp://www.usdoj.gov/criminal/cybercrime/rules/lessonplan1.htm/lessonplan1.htm

Institute for Global EthicsInstitute for Global Ethics