22
Legal, Social, and Ethical Technology Issues . EDUC 318 Katie McDermott Click Here

Click Here . A social network is a website created where individuals can connect to one another through the internet. › Often called “nodes” Benefits:

  • View
    213

  • Download
    0

Embed Size (px)

Citation preview

Legal, Social, and Ethical Technology

Issues.EDUC 318

Katie McDermott

Click Here

Ethical Issues for Safety and

Security

Social Networking

A social network is a website created where individuals can connect to one another through the internet.› Often called “nodes”

Benefits:› Good way to keep in touch with

family and friends.› Good networking for businesses.

Dangers› Allows easy contact with

strangers.› Easy to share private

information on the internet. Examples:

› MySpace, Facebook, Twitter

How to stay safe:› Become educated

on the hazards that can be caused by the internet.

› Do not display any personal information on the web. Use a nickname

and do not give our your e-mail address.

Watch this video to learn how to stay safe on the web!

Acceptable Use Policy (AUP) Set of rules that restrict the ways in

which a website may be used.› Outline how the student should act

while using technology, what they can and can not do with it, and the consequences following their actions. Appropriate websites vs.

inappropriate websites. Respecting materials. Only using computers for school-

related learning. How does this work inside of the

classroom?› Create a “contract” that outline

how students should behave on the internet or while using any form of technology. Should be looked at and signed by

parents, teachers, and students.

Netiquette Refers to the etiquette one should abide by

while using the internet.› DO NOT TYPE IN ALL CAPS!

This seems like you are angry or yelling at your reader.

› Caution: posts can easily be made public. Do not share any information (even over E-mail or

Instant Messenger) that you would not want to become public knowledge.

› Do not use internet slang during school. Abbreviations , such as LOL, and other slang words are

commonly used on the internet but keep in mind that when you are communicating with a teacher or using computers for school related material it is important to use proper spelling and grammar in your sentences.

Cyber Bullying

Using technology to emotionally hurt others.› Spreading rumors› Sharing other’s

personal information› Sending hurtful

photos of others› Impersonating others

on the web.

Cyber bullying is one of the most reoccurring type of bullying found in schools today.

Cyber bullying occurs whenever someone maliciously intends harm on someone else by using any form of technology such as the internet or text messaging.

Cyber Bullying Statistics› 22% of students know someone who has been bullied

online. › 19% of students admit to saying something hurtful to

others online. › 12% of students have personally become upset by

strangers online. › 90% of middle school students have had their feelings

hurt online. › 75% have visited a web site bashing another student › 40% have had their password stolen and changed by a

bully .› 81% of cyber bullies do it because they think its

funny ("Cyberbullying").

How To Put An End To Cyber Bullying STOP

› Encourage your peers to stop cyberbullying. BLOCK

› Ignore messages from cyber bullies or block them from your social networking sites.

TELL› Tell an adult about the bullying right away.

Student Data Family Educational

Rights and Privacy Act› “Federal law that protects

the privacy of student education records. The law applies to all schools that receive funds under an applicable program of the U.S. Department of Education” ("Family educational rights" 2009).

› FERPA gives the parents the right to all their child’s educational records until they turn 18 or attend further schooling after high school.

Although it is beneficial for teachers to keep student records digitally, it is of the upmost importance that this information remains private.› In order to keep this

information private, it can be beneficial for the teacher to have their own password which allows until authoritative figures to access the students’ information.

Internet Privacy Children’s Internet

Protection Act› Law concerning the amount of

access people can obtain from school and library computers.

› E-rate program Any school or library that

receives funding from the E-rate program is required to implement the rules of CIPA

Can not receive E-rate discounts unless they verify that they implement the protection measures.

Required to block pictures that are obscene, pornographic, or harmful to minors.

Schools /libraries under the CIPA but address the issues of:› “access by minors to inappropriate

matter on the Internet;› the safety and security of minors

when using electronic mail, chat rooms, and other forms of direct electronic communications;

› unauthorized access, including so-called “hacking,” and other unlawful activities by minors online;

› unauthorized disclosure, use, and dissemination of personal information regarding minors;

› measures restricting minors’ access to materials harmful to them” ("Children's internet protection" 2009).

Digital Divide

Gender

What contributes to this gap?› In general, men are

more interested in technology than women.

› Most technology software is aimed towards the male sex.

› Men are more comfortable on computers. Spend more time

playing computer games.

How can we close this gap?› American Association of

University Women School aimed towards

getting girls interested in exploring learning through technology.

› The AED Center for Gender Equity Focuses on helping girls get

a good education and succeed in society.

“Promotes the rights of girls and women to education, health, a safe environment, economic participation, and leadership ("Center for gender" ).

Socio-Economic Difference in SES highly effect

the availability of technology. Finances play a huge role in this gap.

› Families may not not have enough money to purchase a computer for their home. This is a growing problem due to the fact

that education is becoming more technology based as the time goes on.

If these children are not exposed to technology while their classmates are, they are sure to fall behind in school and if they are continuously deprived from technology knowledge they will ultimately be behind when they reach the workforce.

Although students can get access to the internet through public libraries, some students may not live close enough to utilize this.

How to stop this gap from growing:› Provide the

students with extra time in the classroom to work on the computer.

› Organize a “Computer Club” where the students can get together once a week after school and play educational games on the computer with their partner.

Race SES plays a huge role in

whether an individual has access to a computer.

Technology Literacy and race› Most literate

White

› Least literate African American Hispanics

There are nearly 41.3 Hispanic people in the united states and 14 million don’t speak English.

If they do not speak English, they will not be able to efficiently use a computer.

Race(Carvin, 2006)

Resource Equity

The amount of resources provided differs in each individual school.› For example, one

school may have a variety of technology to provide for the students while another has none.

› Special needs – many children need assistive technology to learn.

Assistive technology› Many students with

special needs have to use assistive technology inside of the classroom to be able to learn.

› If a school does not have the resources to provide this form of technology, the student’s cognitive abilities will suffer.

Teacher Bias

Older teachers› Teachers who have been

working in the educational field for a long time may not be comfortable using technology in the classroom. Therefore, they may choose to steer clear of using technology as an educational tool in the classroom.

Using technology too much.› Some teachers are very

comfortable with using technology inside of the classroom and therefore implement it in every lesson.

› Although using technology to teach in the classroom is proven to be beneficial for the students, teachers need to recognize that students learn in a variety of ways and it is important to teach multiple ways instead of choosing to teach solely through technology.

Legal Use of Digital Media

Copyright

Copyright is an author’s exclusive right to their creation.› As of April 1, 1989 work is copyrighted and protected

whether it has a notice or not.› Even if there is not a copyright on the document, it is

still copyrighted by the author. © It is illegal to use someone’s work without their

permission. Copyrights last for the life of the author, plus 70 years. When an item is copyrighted, you can not can make a

copy of the work, distribute the work to the public, prepare a work that is derivative from the original work, and you can not perform the work publically ("How to Understand" 2006).

Fair Use This is an exception to the copyright law.

› Under some circumstances, copying or distributing someone’s work without their permission.

When copywriting is “fair”:› “The purpose and character of the use, including whether

such use is of a commercial nature or is for nonprofit educational purposes;

› The nature of the copyrighted work; › The amount and substantiality of the portion used in

relation to the copyrighted work as a whole (is it long or short in length, that is, are you copying the entire work, as you might with an image, or just part as you might with a long novel);

› The effect of the use upon the potential market for or value of the copyrighted work” ("How to Understand" 2006).

Creative Commons

Non-profit organization founded in 2001. Creative commons is “devoted to

expanding the range of creative works available for others to build upon legally and to share” (“Creative commons" )› Organization provides copyright-licenses to

the public that allows authors to communicate which rights they want to reserve and which rights they choose to waive in order to let the public freely benefit from their work.

Bibliography•Acceptable use policies: a handbook . (n.d.). Retrieved from http://www.doe.virginia.gov/go/VDOE/Technology/AUP/home.shtml•Bitter, G, & Legacy, J. (2006). Using Technology in the classroom. New York, NY: Pearson Education, Inc.•Carvin, A. (2006, March 31). Race and the digital divide: a current snapshot. Retrieved from http://www.andycarvin.com/archives/2006/03/race_and_the_digital.html•Center for gender equality. Retrieved from http://cge.aed.org/•Children's internet protection act . (2009, September 21). Retrieved from http://www.fcc.gov/cgb/consumerfacts/cipa.html• Creative commons. Retrieved from http://creativecommons.org/ • Cyberbullying. Retrieved from http://www.makeadifferenceforkids.org/cyberbullying.html•Family educational rights and privacy act. (2009, June 16). Retrieved from http://www.ed.gov/policy/gen/guid/fpco/ferpa/index.html •How to Understand copyright restrictions. (2006, August 8). Retrieved from http://lcweb2.loc.gov/ammem/ndlpedu/start/cpyrt/index.html•Internet safety & civility. Retrieved from http://www.safekids.com/•Internet safety with detective kellogg. (2007). [Web]. Retrieved from http://teachertube.com/viewVideo.php?video_id=425&title=Internet_Safety_with_Detective_Kellogg•McGrath, D. (2004). Closing the gender gap. Girls, Technological Fluency, and PBL, 31(6), Retrieved from http://faculty.salisbury.edu/~ddsessoms/Educ318/GenderGap.pdf•Network, networking technology, data communication terms, glossary and dictionary - n. (2004 - 2010). Retrieved from http://www.networkdictionary.com/networking/n.php•Technology glossary. (2009). Retrieved from http://www.4teachers.org/techalong/glossary/•Templeton, B. (1994). 10 big myths about copyright explained. Retrieved from http://www.templetons.com/brad/copymyths.html