100 likes | 292 Views
Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher. Amy Ginther Project NEThics Director; Policy Develoment Coordinator University of Maryland MICCA April 27, 2004. Core Academic Values.
E N D
Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher Amy Ginther Project NEThics Director; Policy Develoment Coordinator University of Maryland MICCA April 27, 2004
Core Academic Values Oblinger, 2003. In Computer and Network Security in Higher Education, Luker & Petersen, editors. • Community: shared decision making; outreach to connected communities (access to affiliates or other patrons) • Autonomy: academic and intellectual freedom; distributed computing • Privacy: “the right to open inquiry without having the subject of one’s interest examined or scrutinized by others” (American Library Association, 2002) • Fairness: due process
Cyberethics Topics within the Cyberethics framework: • Acceptable Use Policy • Netiquette • Freedom of Speech issues • Privacy • Intellectual Property • Software Licensing • Electronic Cheating • Access issues
Netiquette issues Examples of breaches of Netiquette: • Writing in ALL CAPS • Passing around e-mail hoaxes • Excessive signature files • Forwarding messages without permission • Being impatient with “newbies” • Off topic postings • Not checking for FAQ information
Cybersafety Topics within the Cybersafety framework: • Protection of personal information— “Google” yourself to see what is knowable about you • Password protection • Screen names and e-mail identities—what do they communicate? • Harrassment/Predators • Hoax e-mails/$$$ fraud
Cybersecurity Topics within the Cybersecurity framework: (overlap with Cybersafety) • Viruses/Trojans—e-mail, attachments, MP3s • Updating system patches • Keeping anti-virus software updated • Spyware • Eavesdropping
Cybersecurity Awareness Programs • Target Audiences: faculty, staff, students, IT professionals • Delivery Methods: presentations, ads, articles, quizzes, handouts, videos • Message Framework • Knowledge: what to do • Skills: how to do • Attitudes: want to do • National Initiatives: • EDUCAUSE Security Education and Awareness • www.staysafeonline.info
Awareness Programs • Communication tips (Payne, 2003. In Luker/Petersen.) • Take the message to the people • Be consistent in the message • Write to short attention spans • Make the message real to each target audience • Make it fun • Repeat, repeat, repeat • Some examples: http://www.cit.buffalo.edu/security/caught.html http://www.itc.virginia.edu/pubs/ads/fightback/ http://www.udel.edu/codeoftheweb/
Resources • Computer and Network Security in Higher Education, 2003. Mark Luker and Rodney Petersen, editors.http://www.educause.edu/asp/doclib/abstract.asp?ID=PUB7008 • Collection of policies and policy development resources: www.educause.edu/security
Contact Information Office of Information Technology University of Maryland, College Park Amy Ginther, Policy Development Coordinator, aginther@umd.edu; phone: 301.405.2619 Gerry Sneeringer, Security Officer, sneeri@umd.edu; phone: 301.405.2996