Professional Documents
Culture Documents
Lesson 7 Social Ethical and Legal Responsibilities in The Use of Technology Tools and Resources
Lesson 7 Social Ethical and Legal Responsibilities in The Use of Technology Tools and Resources
Lesson 7 Social Ethical and Legal Responsibilities in The Use of Technology Tools and Resources
Internet plays a very vital role in education. It is no doubt that in this modern era
everyone prefers Google for their queries, problems or doubts. Popular search engines like
Google, Yahoo, etc. are the topmost choice of people as they offer an easy and instant reach to
the vast amount of information in just a few seconds. It contains a wealth of knowledge that can
be searched at any time. The internet has introduced improvements in technology,
communication, and online entertainment.
Today, it has become more important as well as a powerful tool in the world which is
preferred by everyone. Everybody needs internet for some or other purposes. Students need
internet to search for information related to exams, curriculum, results, etc. You can also follow
these steps for students to achieve success in student life.
Importance of internet in education to the students’ means that it makes easier for
them to research things, and relearn the content taught in the school. People use it according to
their needs and interests.
There are many benefits of the internet in the field of education. Some of these are:
The Internet is a boon to the people, which is used all over the world. Hence, it should
be used for good purpose. It has had a great impact on imparting education to the children. If
this is used in appropriate ways that meet children’s development level, they can benefit and
learn from the Internet.
www.theasianschool.net
https://www.theclassroom.com/benefits-laptops-students
D. Cyberbullying
Cyberbullying is bullying that takes place over digital devices like cell phones,
computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social
media, forums, or gaming where people can view, participate in, or share content. Cyberbullying
includes sending, posting, or sharing negative, harmful, false, or mean content about someone
else. It can include sharing personal or private information about someone else causing
embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal
behavior.
With the prevalence of social media and digital forums, comments, photos, posts, and
content shared by individuals can often be viewed by strangers as well as acquaintances. The
content an individual share online – both their personal content as well as any negative, mean,
or hurtful content – creates a kind of permanent public record of their views, activities, and
behavior. This public record can be thought of as an online reputation, which may be accessible
to schools, employers, colleges, clubs, and others who may be researching an individual now or
in the future. Cyberbullying can harm the online reputations of everyone involved – not just the
person being bullied, but those doing the bullying or participating in it. Cyberbullying has unique
concerns in that it can be:
Hard to Notice – Because teachers and parents may not overhear or see cyberbullying taking
place, it is harder to recognize.
Schools, however, to mitigate the effects and reduce the incidence of bullying, should
comply with the Implementing Rules and Regulations of the Anti-bullying law of 2013 to address
E. Netizens in Cyberspace
As defined by Merriam Webster dictionary, NETIZEN is an active participant in the
online community of the Internet.
When we plug into the internet or the cellular networks, we instantly become full-
fledged members of a worldwide community. We will have instant access to every other person
who is also wandering around in that world. Immediate access, physical distance and the
perceived anonymity of the cyber world may cause humans no end of trouble.
To be a good cyber citizen, we need to know what that actually means. Citizenship is the
rights, privileges and duties conferred on a member of a society. It most often includes both
protections (e.g., the Bill of Rights) and duties (e.g., obeying the law, contributing to the
community). Cyber citizenship is the rights, privileges and responsibilities required of internet
and cellular network users.
A. Cyber Rights
Cyber citizenship is based on the general concept of citizenship but differs in a couple of
ways. First, there are no real “rights” you have as a cyber citizen other than the legal
protections you already have as an actual citizen. Moreover, some of those are not available
due to the global nature of the cyber world. Nevertheless, every citizen of the cyber world
While the cyber world does not have a bill of constitutionally protected rights, we should
still be required to respect certain unalienable rights:
• Life: Right for fair and reasonable treatment online. In the cyber world, the right to life is
primarily about being treated in a civil and respectful manner. This means interacting with
people in a considerate, tolerant and appropriate way. This right also includes freedom from
threats to life or person-hood.
• Liberty: Right to basic freedoms. Respect for online freedom should be similar to those
enshrined by our constitution, especially the Bill of Rights. We should respect and expect
privacy, safety and equal treatment regardless of sex, religion or sexual orientation. We
should also honor other’s property.
• Pursuit of Happiness: Right to explore personal interests without undue interference.
B. Cyber Privileges
It is a privilege to have access to the internet. It is a privilege to have the technology that
allows us access to the internet and cellular networks.
C. Cyber Responsibilities
It is a privilege to have access to the internet. It is a privilege to have the technology that
allows us access to the internet and cellular networks.
Cyber citizenship is probably more accurately characterized as civil behavior. There are
certain ways civilized human beings should behave toward others.
D. Laws
The most important area of respect we should demonstrate as a cyber citizen is for the law.
There are several legal issues related to online activity. The first is intellectual property
rights. This includes the written word, ideas and products like music. If you download music
without paying for it, you have violated the property rights of the artist.
Pornography also is regulated by law. For the most part that means ensuring that it is not
child pornography. Most other forms of pornography occupy a grey area that is in part
protected as free speech and in part whether it violates community standards of decency.
This pretty much means it is unregulated. A more recent aspect of pornography is what has
been called revenge porn. For people over 18, a slimy former partner or, as likely, someone
who has hacked your kid’s account, may provide nude images to sites that solicit this kind of
material. It can be done without the consent of the person in the images.
Making creating a false web sites under another person’s name and otherwise using their
personally identifying information is both a state crime.
F. Cyber Crimes
So, here is a summary of things that are against the law:
• Copyright infringement
• Plagiarism
• Downloading songs you didn’t purchase
• Profiting from others’ creative efforts or products
• Bullying and harassment
• Child pornography (including sexting)
• Internet stalking
• Identity theft
G. Cyber Identity
There are a range of ways we can be identified and recognized online. It starts with the
online names we use for various accounts as well as our online addresses (e.g., email,
texting number, social media accounts, etc.). Then, there are the more traditional forms of
identity such as name, home town, school they attend, home address, or phone number.
We may also be identified by their date of birth and social security number. Each computer
or device that accesses the internet or cellular network has a unique IP address that can be
used to identify that device (and potentially the user of that device). Finally, we can also
establish a cyber identity through credit and debit card numbers used to make online
purchases.
• Photos
• Videos (e.g., Youtube, Vimeo, Vine, Skype, Facetime)
• Texting
• Social media accounts (e.g., Facebook, Twitter, Snapchat, Chatroulette, blogs like
Tumblr)
• Comments posted on other sites
• Emails
• Tagged photos on other user accounts
• Apps (e.g., Pinterest, Snapchat, Instagram, Zoom, Tiktok)
• Purchases and other transactions
Then, there are unintentional footprints we leave in cyber space. Unintentional footprints
include such things as cookies, search engine metrics and social media tracking.
I. Cyber Property
Anything that is posted online automatically becomes the copyright protected product of
the creator. This includes music, photos, videos and written material.
Example:
The creator of these products doesn’t have to formally register it with the US Office of
Copyrights or with the United States Patent and Trademarks Office. Use of these products,
particularly for monetary gain, requires permission of the copyright owner.
J. Relational Aggression
The internet and cellular networks can be used to express frustration, anger and cruelty to
other people. The most common form of relational aggression is represented by insensitive
comments, crude and awkward remarks or attempts at playful humor. The inability to read
the nonverbal social cues when making or receiving playfully insulting or sarcastic remarks
can result in misunderstandings about the real intent of the remarks or the reactions of the
recipient.
https://ualr.edu/itservices
F. Netiquette
Netiquette is short for "Internet etiquette." Just like etiquette is a code of polite behavior in
society, netiquette is a code of good behavior on the Internet. This includes several aspects of
the Internet, such as email, social media, online chat, web forums, website comments,
multiplayer gaming, and other types of online communication.
While there is no official list of netiquette rules or guidelines, the general idea is to respect
others online. Below are ten examples of rules to follow for good netiquette:
https://techterms.com/definition/netiquette
Educational websites can include websites that have games, videos or topic related
resources that act as tools to enhance learning and supplement classroom teaching. These
websites help make the process of learning entertaining and attractive to the student,
especially in today’s age.
While there are many advantages of such websites, we also need to be aware of the
negatives. Students need to be guided properly. Without proper guidance, students may find
resources and content that are not reliable or do not align with the direction of the teaching
in class. Some websites are huge and offer a massive variety of games and resources.
Students may be easily distracted on such websites and end up spending time on activities
that are either below their level or do not complement or add to the classroom teaching.
Unrestricted access and freedom on the internet can be dangerous, especially for younger
students.