|
|
Home Page
Artifact # 13 |
Rationale
for Artifact: Ethics Role Playing Activity
Competency 14.3: Social, legal, and ethical issues related to technology use. Context This artifact was produced from an actual role-played activity in which we were given scenarios of different ethical issues dealing with computers. We, as individual groups, acted out each scenario for the rest of the class. They had to tell us what was illegal about it and so on. There were many different scenarios. The one we had was about chain letters and the rudeness and illegalities of them. Another group role-played copying software, which we all know is the most unethical computer crime out there. I have four handouts that all go into great detail about etiquette on the computer. The first handout is the "Policy on acceptable use of computers." This is a list that represents the code of conduct with regard to computers for all users of the Valle Crucis Elementary School. The next one is "Acceptable use policy" produced from the website http://www.connectedteacher.com/tips/aup. asp. The next two are lists of proper etiquette techniques to follow when using email, Internet, or instant message. Such things as being polite, clear and concise, spell check, save a copy, do not send chain mail, avoid spamming or flaming, and do not say anything over the internet you would not want someone else to know, etc... are just some of the rules to abide by. Impact As a classroom teacher, I want to make sure my students, along with others do not do anything unethical and illegal. It is my job to notify my students about what is out there and the harm that certain technological features can cause. These days students have to sign an Internet Access Policy form that gets their attention about what they are allowed to do and not to do. Alignment The Ethics Role Playing Activity aligns with Technology Competency 14.3. I can discuss network security and the Acceptable Use Policy. I can use the NC Computer Skills Curriculum, Ethical Issues Lesson Plans. Role play situations that involve illegal copying of software with a discussion to follow on personal property and personal responsibility.
|