To Be or Not to Be. . . ETHICAL!

An Internet WebQuest on Ethics

Source: Cameron McKinley (Wired at PacBell)|

| Introduction | The Quest(ion) | The Process & Resources | Conclusion |


Introduction

What do you think about this saying?
"Character is what you do when no one is watching."

Well all of us use technology for some reason or another and it's easy to do things 'without being watched'! You can go into chat rooms, surf the net, play great software games and listen to music all using technology. However, with all of the powerful uses of technology, comes a lot of responsibility. Using e-mail, using the Internet, and using software programs and computers both at home and at school is a privilege. We need to make sure that we all honor that privilege and use technology in a way which is right and fair to everyone.

However, there is some disturbing news that shows that everyone does not seem to think doing the right thing counts when using technology.

Juveniles appear to have an ethical 'deficit' when it comes to computer crimes. In one study, 34 percent of university undergraduates admitted to illegally pirating copyrighted software, and 16 percent admitted to gaining illegal access to a computer system to browse or exchange information. [Arthur L. Bowker, Juveniles and Computers: Should We Be Concerned, Federal Probation, December 1999, at 40]

This ethical deficit increases the likelihood that even 'good kids' who are ordinarily unlikely to commit crimes such as robbery, burglary, or assault, may not be as disinclined to commit online crimes.

"Most kids would not walk into somebody's house and rummage around and then turn around and walk out, and say, I didn't do anything wrong because I didn't steal anything. But they're more than willing to go into somebody's computer and do that, and think because they didn't intentionally do anything wrong, they haven't done anything hurtful."--
Pete Smith, Director
Cybercitizen Partnership

Software theft results in 130,000 lost U.S. jobs, $5.3 billion in lost wages, and nearly $1 billion in lost tax revenues. Corporate America and home users are a major part of the problem; 1 in 4 programs are pirated.

The FBI's Michael Vatis, director of the FBI's National Infrastructure Protection Center, tells students, "Do you think it would be OK to go spray-paint your neighbor's house or the grocery store down the street? On a web site, it's the same sort of thing. It's somebody's storefront or an extension of themselves."

"They do sometimes realize that when they're copying someone's product, it's not just that 5 cent disk, but someone's work that they're copying," she said. "I think they do come to appreciate the fact that it's somebody's salary they're stealing."

He tries to drive home the consequences of hacking--including the resources it drains from his center, as law enforcement scrambles to find who is responsible at the outset of an attack.

Authorities "don't know if it's a terrorist or a foreign military," Vatis said. "It diverts very scarce resources of people who are trying to focus on crime, warfare and terrorism."

Consider these examples:

  1. Software and Music Piracy
  2. Plagiarism
  3. Hacking--and other privacy violations including reading private e-mail and files.
  4. Computer Damage--viruses, denial of service attacks, misuse of computers, wasting resources, and impersonating others.

    In the following WebQuest, you will use the power of teamwork and the abundant resources on the Internet to learn all about the ethical use of technology. Each group will learn one piece of the puzzle and then we will all come together to view the ad campaigns you created. Now we'll all know how to behave responsibly when using technology AND how to persuade others to do the same!


The Quest

How can we persuade others to behave responsibly when using technology. . . even when no one is watching?


The Process and Resources

In this WebQuest you will be working together with a group of students in class. Each group will answer the task or quest(ion). as a member of the group you will explore Webpages from people all over the world who care about ethics.

Everyone in your group has a role to play in making sure your group develops an effective ad campaign for your assigned topic. The effective ad campaign will include a 2 minute commercial and a poster created to promote your cause.

Phase I--Background: Something for Everyone

Use the Internet information linked below to answer the basic questions of who? what? where? when? why? and how? Be creative in exploring the information so that you answer these questions as fully and insightfully as you can.

  1. Individuals or pairs from your larger WebQuest team will explore one of the roles below.
  2. Read through the files linked to your group. If you print out the files, underline the passages that you fell are the most important. If you look at the files on the computer, copy sections you fell are important by dragging the mouse across the passage and copying/pasting it into a word processor.
  3. Note: Remember to write down or copy/paste the URL of the file you take the passage from so you can quickly go back to it if you need to prove your point.
  4. Be prepared to focus what you've learned into one main opinion that answers the Big Quest(ion) based on what you have learned from the links for your role.

    Hacking

Computer Abuse--viruses, Web Site Attacks, Inappropriate E-mail & Chat

Use the Internet information linked below to answer these questions specifically related to COMPUTER ABUSE:

  1. Begin your letter with a statement of who you are and why you are writing your message to this particular person or organization.
  2. Give background information that shows you understand the topic.

    STATE THE QUEST(ION) AND YOUR GROUP'S ANSWER.

  3. Each person in your group should write a paragraph that gives two good reasons supporting the group's opinion. Make sure to be specific in both the information (like where you got it from on the Web) and the reasoning (why the information proves your group's point).
  4. Have each person on the team proofread the message. Use correct letter format and make sure you have correctly addressed the E-mail message. Use the link below to make contact. Send your message and make sure your teacher gets a copy.

    Your contact is: Mrs. Nelson


Conclusion

So, should you Be or NOT BE ETHICAL when using technology? It's hard to know when you don't really know the laws or possible consequences involved. It's hard still to convince others when they don't understand a topic as broad or complex as ethics! Now you all know a lot more and you've provided a great product that will influence the way others behave! Nice work. You should be proud of yourselves!


A big thank you to the lesson plan author, Cameron McKinley, http://www.kn.pacbell.com/wired/fil/pages/webethicsca.html.

Back to Projects!