2

Created by

Kari Miller

TOPIC: Ethical Behavior on computers

GRADES: 11th-12th Grade

LESSON DURATION: 4 Weeks (1 hour each day in class + homework)

SOFT SKILLS: Communication, Collaboration, Critical Thinking

Learning Outcome:

  • Given the terms, pledge/oath/vow students will 1) research information 2) create a commitment statement to 3) recite, incorporating elements that align with computer ethical behavior.
  • Having researched pledge/oath/vow students will discuss the of value of  incorporating learned terms prior to completing the final commitment statement.
  • Students will explain the importance of ethical behavior in the field of Cybersecurity after completing collaborated commitment for the class by writing a one page paper to include a graphical representation with their signature as a binding promise including references for their work (minimum 3 references).
  • Students will plan an event to profess their commitment to the ethical behavior using the vow they have created.
  • Students will document the steps taken in class, on the Internet, for any research to include the commitment ceremony using pictures, video’s, written work, in a Powerpoint Presentation to share with AM and PM classes.

CTE Cybersecurity Systems Technology Competencies:

8628.34-39 Demonstrating Ethical Behavior with Computer Systems Technology

Materials:

  • Internet Access
  • Microsoft Office

Activities:

  1. Students are divided into groups to prepare a group statement/plan event to share.
  2. Students document everything to prepare a PowerPoint Presentation assignment. PowerPoint Presentation documents steps taken to complete assignments to all groups in effort to create a Class Commitment Statement/event planning.
  3. The teacher can begin with a discussion with the definition of ethics, giving students IT Ethics worksheet giving examples of ethics statements and Cybersecurity ethics student information worksheet with character traits and links to Carnegie Mellon University information as examples.
  4. How do we ensure absolute willingness to abide by these necessary attributes needed in the security field? Students will work to understand commitment/promise and moral principles/values as many never experienced its importance as it applies to security.
  5. Students identify security issues related to computer hardware, software, and data. Finding Cyber Ethics videos, referencing all information found to use of fabricate their own presentation on Cybersecurity Ethics. Find information on Acceptable Use Policy (AUP), honesty, courtesy, confidentiality, copyright/trademark, intellectual property, privacy issues, identity theft – may be divided between five groups.
  6. Create Team statement of ethical behavior – create Team graphical representation.
  7. Class collaboration to finalize Class Commitment Statement/event plan.

Enrichment/Follow-up:

  1. Students can use this experience to present information to other classes teaching ethical computer behavior to others.
  2. Use Quiziz to enhance Cyber Ethic behavior – https://quizizz.com/admin/quiz/58d29aee8d2374d7033bb738/it-cyber-ethics
  3. Create and have students create quizzes on Kahoot. https://kahoot.com/
  4. Reach out to Security personnel in local businesses to speak to students.
  5. Watch Law Enforcement Pledge video on YouTube https://www.youtube.com/watch?v=2T-kzUkO8JU

Assignment Rubric:

Click <here> for PowerPoint Presentation Rubric.

Sample Completed Assignment: (indicating mastery)

  1. Shorter but all encompassing –

(Student’s name would be specifically included in our commitment statement.)

The Oath of Office, which is taken by the President of the United States and which reads:

“I do solemnly swear (or affirm) that I will faithfully execute the Office of President of the United States, and will to the best of my ability, preserve, protect and defend the Constitution of the United States.”

Tradition dictates that presidents add “So Help Me God,” after saying the Oath, but this is not in the official text.

2.)  Pledge with additional explanation –

https://blog.github.com/2018-04-17-cybertechaccord/  The GitHub Blog

Our Cybersecurity Tech Accord pledge

Today we’re joining a collective of companies across the technology supply chain in committing to a common set of cybersecurity principles. We are pledging to:

  1. Protect our users and customers everywhere;
  2. Oppose efforts to attack innocent citizens and enterprises;
  3. Empower users, customers, and developers to strengthen cybersecurity protection; and
  4. Partner with each other and with other like-minded groups to enhance cybersecurity.

We’re committed to working collaboratively with engineers, researchers, policy makers, and others who play a role in cybersecurity to make the internet a more secure and resilient global resource. Protecting the internet is becoming more urgent every day as more fundamental vulnerabilities in infrastructure are discovered—and in some cases used by government organizations for cyberattacks that threaten to make the internet a theater of war. Reaching industry-wide agreement on security principles and collaborating with global technology companies is a crucial step toward securing our future.

We believe security needs to be embedded into software development, and we’re building features to make that a reality. For years, we’ve participated in bug bounties to find and fix problems with existing infrastructure. And this is just the beginning. We’ll continue advocating against policies that will make software more fragile and for policies that promote stronger internet security.

We’re all in this together. We welcome other companies who share our commitment to the Cybersecurity Tech Accord principles to join this effort, and we encourage governments to protect civilians from the harm of cyber attacks.

Learn more about the Cybersecurity Tech Accord

© 2018 Teach Cyber

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

License

Icon for the Creative Commons Attribution 4.0 International License

GenCyber Lesson Plans Copyright © 2018 by Kari Miller is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Share This Book