You need money. Your close friend has a lot of it and they also have the same password for everything. You know that they wouldn't mind and may not notice if you took some money. Should you log into their account and take some money?
No because you should not take advantage of people with bad passwords.
Is is ethical to participate on personal accounts when using a work or school device or when present in work of school?
No
True or false: Digital culture is based on participation.
True
Get verification symbols and or be consistent contributors?
No
True or False: There are many ways to be unethical through online participation.
True
How must managers handle terminating employees?
It should be handled ethically and with sensitivity.
How can you protect other's privacy?
Not sharing passwords, locations, or other information wihtout consent
What types of cases are authorization very much important in?
Artwork, music, poetry and photos
True or False: Credit and benefits are main factors in authorship and ownership.
True
How can one establish credibility on social media platforms?
Get verification symbols and or be consistent contributors
How many people does it take to spread something you posted on social media?
One person
What is an example of an offline identify?
Everything except a computer
What is credbility closely tied to?
Trustworthiness
What is the definition of online identity?
A one-to-one relationship between a human and their digital presence
Should you trust anyone who claims a certain level of expertise or position?
No
True or false? Many questions will be asked during an interview, so it is acceptable not to ask permission questions.
False
What is personal privacy?
The protection of personal information such as name, address, email, financial information, and other sensitive data.
What helps to establish credibility?
Using good grammar, being informed about the topic and citing sources.
What can you do to help someone online if you witness cyberbullying?
Report it, stand up for that person.
Why is the work of certain individuals such as doctors and chefs trusted?
Due to the position they hold.
Name one of the characteristics of an ethical evaluation.
- Expectations must be clear.
- Feedback must be frequent and constructive.
- Issues must be addressed right away.
What is something that can protect authors when putting out creative work to the public?
Creative Common Licenses
What are examples of further protection online that can keep information safe?
Firewalls and multiple level authorization.
Liz is a student at GCIT. She received an email from someone from out of the district. Should she click on the link attached to the email?
NO!!
Brianna is a student at GCIT and has to send personal and confidential information before the end of the day. Should she send it while at school why or why not, (you need the correct answer AND correct explanation)?
She should not send it while at school because she would be using GCEC-Public, a public network that is not secure and her information could get leaked.