cyberethics, cybersafety, and cybersecurity (c3): implications for the classroom teacher amy ginther...
TRANSCRIPT
![Page 1: Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher Amy Ginther Project NEThics Director; Policy Develoment Coordinator](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f0c5503460f94c1fa33/html5/thumbnails/1.jpg)
Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the
Classroom Teacher
Amy GintherProject NEThics Director;
Policy Develoment Coordinator
University of Maryland
MICCA
April 27, 2004
![Page 2: Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher Amy Ginther Project NEThics Director; Policy Develoment Coordinator](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f0c5503460f94c1fa33/html5/thumbnails/2.jpg)
Core Academic ValuesOblinger, 2003. In Computer and Network Security in Higher
Education, Luker & Petersen, editors.• Community: shared decision making; outreach to connected communities
(access to affiliates or other patrons)
• Autonomy: academic and intellectual freedom; distributed computing
• Privacy: “the right to open inquiry without having the subject of one’s interest examined or scrutinized by others” (American Library Association, 2002)
• Fairness: due process
![Page 3: Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher Amy Ginther Project NEThics Director; Policy Develoment Coordinator](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f0c5503460f94c1fa33/html5/thumbnails/3.jpg)
Cyberethics
Topics within the Cyberethics framework:• Acceptable Use Policy• Netiquette• Freedom of Speech issues• Privacy• Intellectual Property• Software Licensing• Electronic Cheating• Access issues
![Page 4: Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher Amy Ginther Project NEThics Director; Policy Develoment Coordinator](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f0c5503460f94c1fa33/html5/thumbnails/4.jpg)
Netiquette issues
Examples of breaches of Netiquette:
• Writing in ALL CAPS
• Passing around e-mail hoaxes
• Excessive signature files
• Forwarding messages without permission
• Being impatient with “newbies”
• Off topic postings
• Not checking for FAQ information
![Page 5: Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher Amy Ginther Project NEThics Director; Policy Develoment Coordinator](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f0c5503460f94c1fa33/html5/thumbnails/5.jpg)
Cybersafety
Topics within the Cybersafety framework:• Protection of personal information— “Google”
yourself to see what is knowable about you• Password protection• Screen names and e-mail identities—what do
they communicate?• Harrassment/Predators• Hoax e-mails/$$$ fraud
![Page 6: Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher Amy Ginther Project NEThics Director; Policy Develoment Coordinator](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f0c5503460f94c1fa33/html5/thumbnails/6.jpg)
Cybersecurity
Topics within the Cybersecurity framework:
(overlap with Cybersafety)• Viruses/Trojans—e-mail, attachments, MP3s• Updating system patches• Keeping anti-virus software updated• Spyware• Eavesdropping
![Page 7: Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher Amy Ginther Project NEThics Director; Policy Develoment Coordinator](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f0c5503460f94c1fa33/html5/thumbnails/7.jpg)
Cybersecurity Awareness Programs
• Target Audiences: faculty, staff, students, IT professionals
• Delivery Methods: presentations, ads, articles, quizzes, handouts, videos
• Message Framework– Knowledge: what to do– Skills: how to do– Attitudes: want to do
• National Initiatives:– EDUCAUSE Security Education and Awareness– www.staysafeonline.info
![Page 8: Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher Amy Ginther Project NEThics Director; Policy Develoment Coordinator](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f0c5503460f94c1fa33/html5/thumbnails/8.jpg)
Awareness Programs
• Communication tips (Payne, 2003. In Luker/Petersen.)– Take the message to the people– Be consistent in the message– Write to short attention spans– Make the message real to each target audience– Make it fun– Repeat, repeat, repeat
• Some examples:http://www.cit.buffalo.edu/security/caught.htmlhttp://www.itc.virginia.edu/pubs/ads/fightback/
http://www.udel.edu/codeoftheweb/
![Page 9: Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher Amy Ginther Project NEThics Director; Policy Develoment Coordinator](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f0c5503460f94c1fa33/html5/thumbnails/9.jpg)
Resources
• Computer and Network Security in Higher Education, 2003. Mark Luker and Rodney Petersen, editors. http://www.educause.edu/asp/doclib/abstract.asp?ID=PUB7008
• Collection of policies and policy development resources: www.educause.edu/security
![Page 10: Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher Amy Ginther Project NEThics Director; Policy Develoment Coordinator](https://reader036.vdocuments.net/reader036/viewer/2022082818/56649f0c5503460f94c1fa33/html5/thumbnails/10.jpg)
Contact Information
Office of Information Technology
University of Maryland, College Park
Amy Ginther, Policy Development Coordinator,
[email protected]; phone: 301.405.2619
Gerry Sneeringer, Security Officer,
[email protected]; phone: 301.405.2996