« Raising Good Citizens for a Virtual World - Lesson Five | Main | Raising Good Citizens for a Virtual World - Lesson Three »

Raising Good Citizens for a Virtual World - Lesson Four

Raising Good Citizens for a Virtual World: How Do We Help Our Children be Safe and Ethical When Using the Internet? A Families Connect Course for AASL, 2000

Introduction
Lesson One
Lesson Two 
Lesson Three
Lesson Four 
Lesson Five

Appropriate use
This lesson presents scenarios in which young people must ask: “Does this use of the technology have an educational or personal value and is it in keeping with the rules of my family, my church, my school and my government?” Discuss each of the following scenarios with your child:

Scenario 1
Jack has been using the digital camera to take pictures for the family photo album. Jack has found that he can use a computer program to change the photographs. He has used the program so far to make himself look taller, to blacken out the front tooth of his sister, and to give his dad slightly crossed eyes.

    What is the inappropriate action?
    Who committed it?
    What danger or discomfort might the unethical action cause?
    Is there a parallel in the physical world to this scenario?
    Can you think of other incidents that would fall into this category?

While this example may seem frivolous or even like “good fun,” integrity is a serious issue which even young writers and photographers need to be aware of. Deliberate distortion of events whether through words or pictures may harm both those involved in the event as well as the reputation of the reporter. The purpose of a family photo album is to make a record of the activities and appearance of individuals.

An interesting discussion of this topic can be found in Bonnie Meltzerâs article. “Digital Photography — a Question of Ethics.” Learning and Leading with Technology. December-January, 1995-96 (online at http://www.fno.org/may97/digital.html)

Scenario 2
Just for fun, thirteen-year-old Alice tells the other people on her electronic mailing list that she is twenty years old and a nursing student. Others on the list have begun emailing her health-related questions.

    What is the inappropriate action?
    Who committed it?
    What danger or discomfort might the unethical action cause?
    Is there a parallel in the physical world to this scenario?
    Can you think of other incidents that would fall into this category?

Disguise, impersonation, and other forms of “trying on” new personalities are common childhood and adolescent behaviors. The anonymity of the Internet limits such impersonation only to the degree that a lack of a young personâs writing skills or sophistication of thought allows discovery. Role-playing in a physical context is often seen as both healthy and educational. We need to help our children ask when such activities are productive and when they might be harmful.

Scenario 3
Penelope has found a Web site that has “gross jokes” on it. She prints the pages out and shares them with her friends.

    What is the inappropriate action?
    Who committed it?
    What danger or discomfort might the unethical action cause?
    Is there a parallel in the physical world to this scenario?
    Can you think of other incidents that would fall into this category?

A good deal of Internet content, if not obscene, is certainly tasteless, offensive, and lacking in educational value. Parents should define and help their children understand the qualities and conditions under which an item becomes inappropriate for use. Children need to understand the concepts of pornography, racism, and sexism.

Children may access information produced by hate groups and political extremists. Such experiences may be springboards to meaningful discussions about propaganda and free speech issues. Read about how one teacher helps students compare Nazi propaganda to current day hate groups in Jeff Carter’s June 1998 Cable in the Classroom article “High Speed High School.”

Should parents install a filter on their home computer?

Scenario 4
The computers in the library always seem to be busy. Otis tells the librarian he is working on a research project, but actually uses the computer to access the latest soccer scores posted on the Internet.

    What is the inappropriate action?
    Who committed it?
    What danger or discomfort might the unethical action cause?
    Is there a parallel in the physical world to this scenario?
    Can you think of other incidents that would fall into this category?

Most school and public libraries allow their users for personal or recreational activities -to read a book or magazine for enjoyment, to write a letter to a friend, or to draw for pleasure. Technology, too, should be available for student to use to pursue individual interests - to play a game, to send personal email, or to search for Internet information of personal value. The ethical issue here becomes that of an allocation of resources. For most libraries, the demand for technology has outpaced its acquisition. Computers and Internet access are usually in short supply, and priority needs to be given to students who have an academic task to complete.

Scenario 5
Just for fun, Nellie sets the print command on her computer to print 50 copies of an electronic encyclopedia article she’s been reading, and then walks away.

    What is the inappropriate action?
    Who committed it?
    What danger or discomfort might the unethical action cause?
    Is there a parallel in the physical world to this scenario?
    Can you think of other incidents that would fall into this category?

Deliberate waste of school materials is not uncommon, and students again need to understand that it is wrong to waste finite resources. As with the vandalism questions, students need to understand that everyone is affected by such activities.


Discussion Questions

  • Can some actions be considered inappropriate for some young people and not others depending on their family beliefs? Can some actions be considered inappropriate based on the age of the individual?
  • Can the personal use of a technology resource owned by a school or business ever be appropriate? Under what circumstances?
  • Should a student be allowed to use the school networks and email to run for a school office?
  • What is the definition of ãpornographic?ä How would you define ãhate group?ä Are there ever times when a pornographic or hate group site could be viewed as appropriate?
  • How does electronic vandalism or waste of public property harm the individual citizen?
  • Should schools install Internet filters?
Posted on Friday, July 20, 2007 at 07:32AM by Registered CommenterDoug Johnson in | CommentsPost a Comment

PrintView Printer Friendly Version

EmailEmail Article to Friend

Reader Comments

There are no comments for this journal entry. To create a new comment, use the form below.

PostPost a New Comment

Enter your information below to add a new comment.

My response is on my own website »
Author Email (optional):
Author URL (optional):
Post:
 
Some HTML allowed: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <code> <em> <i> <strike> <strong>