You are on page 1of 14

ICTL For Secondary School NERWORK

AND THE INTERNET MODULE

KEMENTERIAN PELAJARAN MALAYSIA

Self Access Learning Module

ICT Literacy for Secondary School
Programm e
Ethics In Using Computer

PUSAT PERKEMBANGAN KURIKULUM KEMENTERIAN PELAJARAN MALAYSIA

1

ICTL For Secondary School NERWORK AND THE INTERNET MODULE MODULE 3 Ethics In Using Computer Curriculum Development Centre Ministry of Education Malaysia 2 .

Activity 1 : Activity 2 : Activity 3 : Activity 4 : . c. define the meaning of copyright. Explaining the ethics of computer usage 4. : Ethics in using computer Learning Outcomes: The students should be able to: a. Module Summary: At the end of the module. d.ICTL For Secondary School NERWORK AND THE INTERNET MODULE 1. state the effects of unethical use of computers f. Name of Module 2. Knowledge and Skills 1. state the effects of copyright violation. students should be able to explain the ethics of computer usage. define the meaning of plagiarism g. state the ethics of computer usage b. and give their opinions on copyright and plagiarism. list at least 3 unethical use of computers e. state the effects of plagiarism 3. Notes on Ethics in using computers Exercises on Ethics and Copyright Notes on Plagiarism Exercises on Plagiarism 3 .

in order to be able to use this material. software and VCD being sold at the night market. this unethical behavior can be controlled by the code of conducts.000 for each copy or up to 5 years imprisonment or both. you are following the computer code of conducts. Under the Malaysia Copyright act 1987. graphic and other material.ICTL For Secondary School NERWORK AND THE INTERNET MODULE Activity 1 3. articles. 2. Examples of ethical computer code of conducts include: • • • sending warning about viruses to other computer users asking permission before sending any business advertisements to others using information with authorization Ethics in general 1. If you have. 4 . Users may have to pay royalty (fee) to the owner or quote the website in their assignment or project. We often see pirated CDs. There are many web sites with restriction where the public is allowed to use their material. 4. Computer ethics is a system of moral standards or values used as a guideline for computer users. Ethics in using computer Have you ever asked for permission to download materials from the internet such as music. Buying pirated software is an example of unethical activity in computer ethic. any individual charge with piracy will be fine up to 10. A guideline is needed to stop the current technology products from being exploited for example copying originals CDs and selling them as pirated software. 3.

You shall not look around in other people’s computer files. You shall not use a computer to give false identity. h. You shall not use a computer to harm other people. b. e. d. You shall always use a computer in ways that ensure consideration and respect for your fellow friends. f.ICTL For Secondary School NERWORK AND THE INTERNET MODULE Ten important instructions of computer ethics The United States Institute of Computer Ethics has come out with 10 instructions of Computer Ethics as follows: a. i. You shall not interfere with other people’s computer work. You shall not correct other people’s ideas or works. You shall not use other people’s computer resources without permission or proper compensation. c. j. g. You shall think about the social effects of the program you are writing or the system you are designing. You shall not use a computer to steal You shall not copy or use software for which you have not paid illegally. 5 .

1 Copyright What Is Copyright? Copyright is the legal right given to the owner of a copyright to prevent others from copying an artistic works. the work has been written down. lease. Only the copyright owner has the legal right to reproduce the work in any form and has the right to sue others who copy or distribute unauthorized work without the copyright owner’s permission. or by rental. 6 . or lending. There is no system of registration for copyright in Malaysia. To disallow other persons from using the work without permission. A work that is eligible is protected automatically upon fulfillment of the following conditions:• • sufficient effort has been expected to make the work original in character. Copyright protection in Malaysia is governed by the Copyright Act 1987. recorded or reduced to a material form. The owner of copyright has the special right to do and authorize the following: • • • • • To reproduce the work. To distribute copies of the work to the public by sale or transfer of ownership. literary. To prepare copied works based upon the work.ICTL For Secondary School NERWORK AND THE INTERNET MODULE 3. dramatic or music work. • the author is qualified person or the work is made in Malaysia or the work is first published in Malaysia Copyright symbol Abbreviated as (c) or ©. To carry out the work publicly.

• Downloading. • • • • Use resources only for academic assignments and official education and research and not reproduced in any material form to the public. Resources are not to be used for business purposes or private gain. Changing of system settings is not allowed. or removal of software or hardware is not allowed. and without license from the owner or does not have permission in any of the following acts has broken the copyright law. • Send no obscene or harassing messages in any format in violation of any applicable law. Respect and abide by all copyright laws. occasional and should indicate the sender’s true identity. 7 . installation. • Respect the rights and property of others by not accessing other members’ data. • E-mail messages should be brief. • No one should purposely attempt to weaken the system security or disturb the system performance through “hacking” .ICTL For Secondary School NERWORK AND THE INTERNET MODULE Copyright violation (Breaking of copyright law) A person who does not own the copyright.

you are breaking the law of intellectual property by stealing someone else’s idea. 4. Intellectual property refers to any products of human intellect that is unique and has a value in the market place. With the advancement of ICT. Hacking is unethical. For example. inventions. d) involvement in stealing software e) invasion of privacy 3. This covers ideas. He also managed to get important data unethically for his own usage. 8 . it is easy for anyone to get back your information from the Internet.2 Unethical use of computers 1. You may not realize that when you fill a form on the Internet. affecting the accuracy of the information b) selling information to other parties without the owner’s permission c) using information without permission. In other word. you are reaching the computer code of conducts (manners).ICTL For Secondary School NERWORK AND THE INTERNET MODULE 3. computer program codes and many more. He accessed computers without authorization. your information may be exposed and stolen. unique names. Kevin David Mitnick was a famous hacker. Examples of unethical computer code of conducts include: a) modifying certain information on the internet. He deprived the privacy of many individuals by hacking into network of a few companies. 2. Have you copied materials from the internet and claims that it is your own and submit them as an assignment? If you have.

5 Do not use a computer to bear false witness. 9 . Questions: 1. 4 Interfere with other people’s computer work.ICTL For Secondary School NERWORK AND THE INTERNET MODULE Activity 2 Exercise 1 Instruction : Answer the questions below. What is the meaning of computer ethics ? 2. Number Statement Ethical Unethical 1 Use a computer to steal information √ 2 Use other people’s computer resources with authorization 3 Use software for which you have not paid. Number 1 has been done for you. State the 10 instructions in computer ethics ? Exercise 2 Instructions: Read the statements below then put a tick (√) in the relevant boxes.

Read the scenario carefully. QUESTION : Is this against copyright rules? Answer Further Reading If you have internet access. 3. Scenario A SCENARIO A: A student prepares and gives a presentation that displays photographs. 4. you may login to the URL given below to test how much you know about ethics in using computer. You find out it costs about RM930 and decide it's too expensive for you to buy. Permission was not obtained to use the photographs. 2.ICTL For Secondary School NERWORK AND THE INTERNET MODULE Exercise 3 Instructions : 1. Work in pair or in a group of four.com/cb_copyright. Your friend lends you his Microsoft Office 2007 CD and tells you to go ahead and install it on your computer.thecopyrightsite. Answer the question given. http://www. QUESTION Scenario B SCENARIO B: A student creates a presentation and include copyrighted music into the background. Assume that permission was not obtained to use the music for the presentation QUESTION: Can the music be included in the teacher's or student's initial presentation? Answer : Can the photographs be included in the initial presentation.cyberbee. if it is in a traditional classroom? Answer Scenario C SCENARIO C : Your friend just bought a copy of Microsoft Office 2007 CD and says it's the best graphic editor he has ever used.org/scenarios/ 10 .swf http://www. Discuss your answer with your partner or in your group.

ICTL For Secondary School NERWORK AND THE INTERNET MODULE (This website is available at the time of doing this module) Activity 3 Plagiarism Plagiarism is copying or paraphrasing information from a source without giving credit to the owner. After you write. Put quotation marks around any language you reproduce directly from the source. Write down the title. Put away your source before you begin to write. the page number(s). Plagiarism is easier today because of the presence of the Internet and the easy availability of information. Any use of another person’s work or ideas must be acknowledged. the name of the source. and the date for any language you copy or adapt and for each piece of information you record. It is permissible to produce a publication or multimedia presentation for classroom. and then write from your memory. you can recheck your paraphrase or summary against the original for accuracy. or video without permission or without giving credit is also plagiarism. 11 . Using images. If you fail to do this. audio. the author. How to avoid Plagiarism 1. educational or non-profit purposes as long as credit is given in a bibliography. Written permission must be obtained from the owner if you plan to use these files on a web page. 2. Read your source. Take good notes. you may fail in the examination or your name maybe removed from the pass list. 3. Effects of plagiarism Plagiarism is a serious academic offence for students.

Work motivation and performance increase when employees feel personally accountable for the outcomes of their efforts (McShane and Travaglione.p. ___________________________________________________________ ___________________________________________________________ 2. S. T.199) state that ‘when employees feel responsible for their work. B or C ) would you count as plagiarism? Original Text McShane. Exercise 4 Instruction : Read the situation given and answer the question that follows. Which student ( A. (2003. Student A wrote: “Work motivation and performance increase when employees feel personally accountable for the outcomes of their efforts”. and Travaglione. Sydney: McGraw Hill. Verdict : ______________________________________________ Answer Answer 12 . 2003. Situation Three students from University Malaya referred to McShane and Travaglione’s book for their work. 2003. they tend to be more motivated which results in higher performances Verdict : ______________________________________________ Reason (s) : ______________________________________________ Student C wrote: McShane and Travaglione (2001.199). they tend to be more motivated which results in higher performances’.ICTL For Secondary School NERWORK AND THE INTERNET MODULE Activity 4 Exercise 3 1. p. p. What is Plagiarism? ___________________________________________________________ ___________________________________________________________ List out two points to avoid Plagiarism.199) Verdict : ______________________________________________ Reason (s) : ______________________________________________ Student B wrote: When employees feel responsible for their work. L. Organizational behaviour in the Pacific Rim.

http://amow.au/downloads/mods_quiz. login to the URL given below to test how much you know about plagiarism.boardofstudies.pdf.html (This website is available at the time of doing this module) 13 .nsw.ICTL For Secondary School NERWORK AND THE INTERNET MODULE Reason (s) : ______________________________________________ Answer Further Reading If you have internet access.edu.

edu/legal/copyright/ http://copyright.html http:// webopedia.com/wiki/Netiquette http://plato.ICTL For Secondary School NERWORK AND THE INTERNET MODULE References : Computer Whizzkid (2003) Sri Lanka: NCC education http://cpsr.edu/AUP/ethics_in_labs.ctc.html http://www.copyrightkids.stanford.gov/cires/circ1.usg.edu/entries/ethics-computer/ http://www.tr/~say/c150/intro/lit10.org/wiki/Computer_ethics http://etiquette.boiseschools.wikia.boun.edu/library/reference/copyright.html http://www.org/cybersafe/ethics.org http://www.org/issues/ethics/cei/ http://en.spscc.com/TERM/c/copyright.html 14 .wikipedia.edu.html http://www.unmc.cmpe.html http://www.