STANDARD 2: SOCIAL, ETHICAL AND HUMAN ISSUES |
|
Students understand the social, ethical and human issues
related to using technology in their |
|
|
|
READINESS (Kindergarten) |
|
Students know and are able to do the following: |
|
2T-R1. Work cooperatively and collaboratively when using technology in the classroom |
|
See: Arts {Theatre} (1AT-R5) |
|
PO 1. Demonstrate respect for other students while using technology (e.g., take turns, |
|
share resources) |
|
PO 2. Demonstrate appropriate behavior (e.g., use only your documents and folders) |
|
2T-R2. Practice responsible use of technological devices |
|
See: Arts {Visual} (1AV-R6) and Social Studies (2SS-R1) |
|
food or objects near equipment; care for disks and CD-ROM; use proper shut down |
|
procedures) (See Technology IT-R2, PO1) |
|
PO 2. Recognize that damaging school equipment is destroying public property |
|
PO 3. Recognize that changing someone’s work without permission is unacceptable |
|
FOUNDATIONS (Grades 1-3) |
|
Students know and are able to do all of the above and the following: |
|
2T-F1. Demonstrate respect for other students while using technology |
|
See: Social Studies (2SS-F3, PO1-3) |
|
PO 1. Describe and practice respect for other students while using technology (e.g., do not |
|
duplicate software or documents without authorization; report behaviors that threaten |
|
the ability of others to legitimately use resources; allow peers to work uninterrupted; |
|
do not erase or damage files, documents or projects) |
|
2T-F2. Practice responsible use of software |
|
PO 1. Use equipment appropriately (e.g., use for assignments and school work versus |
|
personal pleasure; do not send threats) |
|
PO 2. Describe and practice legal and ethical behaviors when using technology (e.g., do |
|
not copy, alter, delete or move another person’s work) |
|
PO 3. Demonstrate and practice safe and correct security procedures (e.g., protect |
|
password) |
|
2T-F3. Discuss common uses of technology in daily life and the advantages and |
|
disadvantages those uses provide |
|
See: Comprehensive Health (4CH-F2), Science (3SC-F4), Social Studies (4SS-F2, PO4) |
|
PO 1. Describe three-to-five uses of technology in daily life |
|
PO 2. Discuss the positive and negative impact of technologies such as television and |
|
computers on daily life (e.g., negative health impact; safe Internet use, such as |
|
knowing what information is safe to share when using e-mail, “talking” to |
|
strangers) |
|
|
|
|
|
ESSENTIALS (Grades 4-8) |
|
2T-E1. Discuss basic issues related to responsible use of technology and information |
|
and describe personal consequences of inappropriate use |
|
See: Comprehensive Health (4CH-E3), Science (2SC-E2) and Social Studies (2SS-E2, |
|
PO1, 2SS-E5, PO1, 2SS-E7, PO1) |
|
PO 1. Explain the purpose of an Acceptable Use Agreement/Policy and the consequences of |
|
inappropriate use |
|
PO 2. Describe and practice safe Internet/Intranet usage (e.g., do not post inappropriate or |
|
harmful material; do not reveal personal information; follow district Acceptable Use |
|
Policy) |
|
PO 3. Describe and practice “netiquette” when using the Internet and electronic mail (e.g., |
|
publish photographs of people only with their permission) |
|
2T-E2. Exhibit legal and ethical behaviors when using technology and information and |
|
discuss consequences of misuse |
|
PO 1. Follow the rules for deciding when permission is needed for using the work of others, |
|
(e.g., some sites specify whether permission is required or not, some work is in |
|
public domain) |
|
PO 2. Obtain permission to use the work of others (See Technology 5T-E2, PO3) |
|
PO 3. Provide complete citations from electronic media (e.g., use age-level appropriate, |
|
district developed standardized reference formats for citing source of information) |
|
(See Technology 5T-E2, PO5) |
|
PO 4. Explain copyright laws and “fair use” guidelines (e.g., in relationship to print, video, |
|
computer software, multimedia project, music) |
|
PO 5. Describe copyright guidelines3 for multimedia creation and Internet development |
|
PO 6. State personal consequences (e.g., fines, loss of privileges, grade reduction, academic |
|
probation) related to violations of: |
|
a) Copyright (e.g., sheet music, prerecorded music, print, video, images) |
|
b) Password security |
|
c) Privacy (e.g., student files on a network, floppy disk and hard drive) |
|
d) Internet usage (e.g., inappropriate postings, accessing inappropriate material) |
|
PO 7. Discuss the negative impact of unauthorized intrusions into networked data and |
|
describe actions to prevent these intrusions |
|
|
|
|
|
|
|
|
|
|
|
|
|
2T-E3. Demonstrate knowledge of current changes in technologies and the effect those |
|
changes have on the workplace and society |
|
See: Comprehensive Health (4CH-E2) and Social Studies (3SS-E6, PO8, 3SS-E7, PO5) |
|
PO 1. Compare information technologies from past to present and describe the implications |
|
of computer power doubling every 18 months (Moore’s Law) (e.g., size, speed, cost) |
|
PO 2. Describe the impact of technology use on individuals at home and in the workplace |
|
(e.g., computer has replaced the TV for some individuals; free time is spent using |
|
technology versus outdoor activities; jobs have been created and/or eliminated due to |
|
technological advances; possible infringement of privacy) |
|
PO 3. Discuss the social implications of the “digital divide” (e.g., homes and schools with |
|
much technology and connectivity versus those with less or none) |
|
3 http://literacy.kent.edu/Oasis/Workshops/copytoc.html; and |
|
http://lcweb.loc.gov/copyright/circs/circ1.html |
|
PROFICIENCY (Grades 9 – 12) |
|
Students know and are able to do all of the above and the following: |
|
2T-P1. Identify capabilities and limitations of contemporary and emerging technology |
|
resources and assess the potential of these systems and services |
|
See: Arts {Music} (2AM-P3) and Social Studies (1SS-P1, PO2) |
|
PO 1. Make informed choices among technology systems, resources and services in a variety |
|
of contexts |
|
PO 2. Explain the impact computer networking has on an organization (e.g., cost, allocation |
|
of resources, security, productivity, communications, and organizational or societal |
|
change) |
|
PO 3. Predict future technological advances and the impact of them for individuals and the |
|
workplace (e.g., given the current “instant access,” what’s next?) |
|
2T-P2. Analyze advantages and disadvantages of widespread use and reliance on |
|
technology in the workplace and in society as a whole |
|
See: Comprehensive Health (4CH-P2), Science (3SC-P3), Social Studies (1SS-P1, |
|
PO1-2) and Workplace Skills (7WP-P2) |
|
PO 1. Explain the cost of maintaining technology in terms of money and manpower |
|
PO 2. Describe the effect on an organization when technology fails (e.g., power outage) |
|
PO 3. Analyze the long-term impact of technologies and their obsolescence (e.g., on the |
|
preservation of, and access to, older technologies; responsible disposal of old |
|
technologies; retraining of workforce) |
|
|
|
|
|
|
|
|
|
|
|
|
|
2T-P3. Demonstrate legal and ethical behaviors among peers, family, and community |
|
regarding the use of technology and information |
|
See: Social Studies (2SS-P8, PO2 and PO4-6) |
|
PO 1. State personal liability issues related to security systems to protect technologies |
|
(e.g., use of passwords and the importance of protecting them; use of encryption |
|
software) |
|
PO 2. Discuss individual privacy issues versus First Amendment protection (e.g., federal and |
|
state filtering and access legislation) |
|
PO 3. Explain the impact of unauthorized intrusions (i.e., hacking, spamming, manipulating |
|
or deleting data) on society |
|
PO 4. Describe computer viruses and ways to protect computers from them |
|
DISTINCTION (Honors) |
|
Students know and are able to do all of the above and the following: |
|
2T-D1. Analyze current changes in technologies and predict the effect those changes |
|
have on the workplace and society |
|
See: Comprehensive Health (4CH-D1) and Science (3SC-D1) |
|
2T-D2. Advocate for legal and ethical behaviors among peers, family, and community |
|
regarding the use of technology and information |
|
See: Comprehensive Health (4CH-D1, 5CH-D1) and Science (4SC-D1 and D2) |
|
|