1 / 10

Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher

Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher. Amy Ginther Project NEThics Director; Policy Develoment Coordinator University of Maryland MICCA April 27, 2004. Core Academic Values.

Download Presentation

Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher Amy Ginther Project NEThics Director; Policy Develoment Coordinator University of Maryland MICCA April 27, 2004

  2. Core Academic Values Oblinger, 2003. In Computer and Network Security in Higher Education, Luker & Petersen, editors. • Community: shared decision making; outreach to connected communities (access to affiliates or other patrons) • Autonomy: academic and intellectual freedom; distributed computing • Privacy: “the right to open inquiry without having the subject of one’s interest examined or scrutinized by others” (American Library Association, 2002) • Fairness: due process

  3. Cyberethics Topics within the Cyberethics framework: • Acceptable Use Policy • Netiquette • Freedom of Speech issues • Privacy • Intellectual Property • Software Licensing • Electronic Cheating • Access issues

  4. Netiquette issues Examples of breaches of Netiquette: • Writing in ALL CAPS • Passing around e-mail hoaxes • Excessive signature files • Forwarding messages without permission • Being impatient with “newbies” • Off topic postings • Not checking for FAQ information

  5. Cybersafety Topics within the Cybersafety framework: • Protection of personal information— “Google” yourself to see what is knowable about you • Password protection • Screen names and e-mail identities—what do they communicate? • Harrassment/Predators • Hoax e-mails/$$$ fraud

  6. Cybersecurity Topics within the Cybersecurity framework: (overlap with Cybersafety) • Viruses/Trojans—e-mail, attachments, MP3s • Updating system patches • Keeping anti-virus software updated • Spyware • Eavesdropping

  7. Cybersecurity Awareness Programs • Target Audiences: faculty, staff, students, IT professionals • Delivery Methods: presentations, ads, articles, quizzes, handouts, videos • Message Framework • Knowledge: what to do • Skills: how to do • Attitudes: want to do • National Initiatives: • EDUCAUSE Security Education and Awareness • www.staysafeonline.info

  8. Awareness Programs • Communication tips (Payne, 2003. In Luker/Petersen.) • Take the message to the people • Be consistent in the message • Write to short attention spans • Make the message real to each target audience • Make it fun • Repeat, repeat, repeat • Some examples: http://www.cit.buffalo.edu/security/caught.html http://www.itc.virginia.edu/pubs/ads/fightback/ http://www.udel.edu/codeoftheweb/

  9. Resources • Computer and Network Security in Higher Education, 2003. Mark Luker and Rodney Petersen, editors.http://www.educause.edu/asp/doclib/abstract.asp?ID=PUB7008 • Collection of policies and policy development resources: www.educause.edu/security

  10. Contact Information Office of Information Technology University of Maryland, College Park Amy Ginther, Policy Development Coordinator, aginther@umd.edu; phone: 301.405.2619 Gerry Sneeringer, Security Officer, sneeri@umd.edu; phone: 301.405.2996

More Related