Other
Business Education Resource Consortium: Computer Science & Information Systems
In this online manual you will find examples of integrated performance activities developed to coordinate with the Computer Science and Information Systems Career Path in the Business Education Career Path and Model Curriculum Standards....
Virginia Tech
Virginia Tech: Computer Citizenship
An in-depth article on Computer/Internet ethics. Includes personal property, copyright, plagiarism, respect, and protecting yourself and others. Also includes examples for class discussion questions.
Other
Association for Computing Machinery: Acm Code of Ethics and Professional Conduct
The "Code of Ethics" from the American Association for Computing Machinery. Includes responsibility to employers, clients, system users, the profession, and society.
NC State University
North Carolina State University: Ethics in Computing: Speech Issues
Curated collection of links to articles, essays, and related topics on responsible use of the Internet and information technologies with respect to speech and online hate compiled and maintained by a university instructor.
Common Sense Media
Common Sense Media: Cyber Smart! Student Curriculum Lesson: Can You Hack It? [Pdf]
Students learn that computers and electronic files are property and explore the reasons for, consequences, and ethics of teen hacking. This ISTE-aligned lesson plan for Grades 6-8 includes student activity and Home Connection sheets....
Other
Tech in Ctrl: Ethics/copyright: What's Mine Isn't (Necessarily) Yours
Sharing, reusing, or copying content is so easy that rarely do we pause to think about its original source. This lesson plan will give learners the tools to navigate this often-complicated world of digital media and mass information by...
University of California
University of California, Berkeley: Computer Hacking and Ethics
This article explores the topic of computer hacking and suggests ways of dealing with it in the educational setting.
NC State University
North Carolina State University: Hacking
This site contains an overview of, stories about and related links to computer hacking.
Other
Albion: The Core Rules of Netiquette
Excerpts from the book "Netiquette" which gives etiquette rules for using the Internet. Ten rules with explanations are presented.
Other
Great Hackers
This article explores the controversies surrounding and the rationale for computer hacking.
Department of Defense
Do Dea: Spreadsheet Software: M1: L2: Ethical and Efficient Use of Computers
In Module 1 Lesson 2 of this course, students are introduced to issues related to copyright, public domain, and licensing agreements. They will also learn about industry certification for this course on spreadsheet applications.
Other
Western Illinois University: Plagiarism and the Web
An essay on the challenge of plagiarism for teachers and the temptation for students, with helpful suggestions.
Other
Bitlaw: Rights Granted Under Copyright Law
An article on the exclusive rights granted under the Copyright Act.
Other
The Fourth Screen
A series of stories woven together to start a conversation with high school students about living our lives on & offline (on The Fourth Screen) more thoughtfully. Clicking on some of the slides directs you to websites and articles...
TED Talks
Ted: Ted Ed: Defining Cyberwarfare in Hopes of Preventing It
Can you imagine a future where wars are fought not with bombs and bullets but computer viruses and pacemaker shutdowns? Cyberware is unique in that it is not covered by existing legal framework and it often inspires more questions than...
Consumer Financial Protection Bureau
Consumer Financial Protection Bureau: Composing Songs and Verse About Fraud
Students write a song, rap, or poem that warns people about identity theft and types of fraud. Includes teaching guide and student worksheet that can be filled in on a computer.
University of Hawai'i
University of Hawaii: Network Etiquette
This site is provided for by the University of Hawaii. Information on network etiquette with information on not sending chain mail, spamming, and other Usenet inappropriate uses.
Other
Brad Templeton: 10 Big Myths About Copyright Explained
This personal site from Brad Templeton provides an article on copyright myths with explanations of the USENET/Internet.
Other
Brad Templeton: A Brief Intro to Copyright
This personal site provides an article on the copyright issues. Includes the basics, creative work, making copies, commerce, fair use/fair dealing, and some legal basics.
Other
How to Become a Hacker
This site contains a description of and the issues surrounding hacking.
Other
Ludwig Von Mises Institute: The Market Function of Piracy
This article describes the market forces that are driving piracy and could be driving product sales.
Federal Trade Commission
Federal Trade Commission: Spam Scam Slam: Don't Be Fooled
Three rounds. Three strikes. Make it through this game, and it's clear you're on to spam scams and not likely to get slammed by the next one.
Other
Cpsr: Netiquette Training Whose Responsibility?
CPSR offers an article on the need to train new Internet users about netiquette. Includes experiences with E-mail, need for netiquette, and additional resources.
The Tech Interactive
The Tech Museum: Robotics: Sensing, Thinking, Acting
Robotics was designed to introduce the science behind the design and operation of robots. Through articles and interactive activities, you will learn what a robot is, and the advantages and disadvantages of their use. Includes a...
Other popular searches
- Teaching Computer Ethics
- Computer Ethics Powerpoint
- Computer Ethics and Laws
- Ethics and Computer Use
- Computer Ethics Lessons
- Computer Ethics Code