{"id":622,"date":"2015-08-07T19:30:20","date_gmt":"2015-08-07T19:30:20","guid":{"rendered":"https:\/\/courses.candelalearning.com\/computerapps\/?post_type=chapter&#038;p=622"},"modified":"2016-04-21T22:51:11","modified_gmt":"2016-04-21T22:51:11","slug":"assignment-computer-ethics","status":"publish","type":"chapter","link":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/chapter\/assignment-computer-ethics\/","title":{"raw":"Assignment: Computer Ethics","rendered":"Assignment: Computer Ethics"},"content":{"raw":"<h2>Assignment Introduction<\/h2>\r\nYou will learn the following:\r\n<ol>\r\n\t<li>What a Code of Ethics is<\/li>\r\n\t<li>Giving Credit where Credit is Due<\/li>\r\n\t<li>Privacy on the Internet<\/li>\r\n\t<li>E-mail Uses and Abuses<\/li>\r\n\t<li>The School Acceptable Use Policy as compared with other AUPs<\/li>\r\n\t<li>What is Copyright and how does it effect the use of<\/li>\r\n<\/ol>\r\n<ul>\r\n\t<li>Written work on the Internet<\/li>\r\n\t<li>Computer Software<\/li>\r\n\t<li>Pictures on the Internet<\/li>\r\n\t<li>Music on the Internet<\/li>\r\n\t<li>Movies on the Internet<\/li>\r\n<\/ul>\r\n<h2>Assignment Directions<\/h2>\r\nAfter going through the information in\u00a0tasks (1-6) each student will:\r\n<ul>\r\n\t<li>Create a page on the Ethics Blog<\/li>\r\n\t<li>They will\u00a0choose a good title for their page<\/li>\r\n\t<li>Summarize what they learned from steps 1-6. The summary should clearly identify each of the six main areas (Ethics, Copyright, Plagerism, Privacy, Email, &amp; Acceptable Use)<\/li>\r\n<\/ul>\r\nAfter completing the blog entry, each student will comment (provide feedback) to at least two (2) other students. All comments are to be at least two complete sentences.\r\n<h3>Task 1: Ethics<\/h3>\r\n<p align=\"left\"><strong>You will need a notebook to take notes in.\u00a0<\/strong>Now you will visit at least three of the following sites about ethics and make notes on what a Code of Ethics is and how it affects your use of computers at school and how it affect your computer use at your place of employment.\u00a0 In your notes, make sure you document which site\u00a0you got the information. Use the grading rubric to guide your note taking.<\/p>\r\n\r\n<div align=\"left\">\r\n<ol>\r\n\t<li><a href=\"http:\/\/www.trhs.weber.k12.ut.us\/Doc\/EthicsReading.pdf\" target=\"_blank\">What are Ethics? by Duke Mosman<\/a>\u2014USOE<\/li>\r\n\t<li><a href=\"http:\/\/www.business-ethics-pledge.org\/\" target=\"_blank\">Business Ethics Pledge<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.crews.org\/curriculum\/ex\/compsci\/articles\/ethics.htm#part1\" target=\"_blank\">Computer Ethics and Coypright Issues? Right vs. Wrong<\/a><\/li>\r\n\t<li><a href=\"http:\/\/journalism.nyu.edu\/ethics\/handbook\/ethics-pledge\/\" target=\"_blank\">NYU Ethics Pledge<\/a><\/li>\r\n\t<li><a href=\"http:\/\/plato.stanford.edu\/entries\/ethics-computer\/\" target=\"_blank\">Computer Ethics: Basic Concepts and Historical Overview<\/a><\/li>\r\n\t<li><a href=\"http:\/\/charactercounts.org\/programs\/reportcard\/2006\/index.html\" target=\"_blank\">Youth Ethics<\/a><\/li>\r\n\t<li><a href=\"http:\/\/ethics.csc.ncsu.edu\/basics\/principles\/\" target=\"_blank\">Ethics in Computing<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.scu.edu\/ethics\/practicing\/decision\/framework.html\" target=\"_blank\">A Framework for Ethical Thinking<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.mekabay.com\/ethics\/napster.htm\" target=\"_blank\">The Napster Cantata<\/a><\/li>\r\n\t<li><a href=\"http:\/\/cil.usu.edu\/files\/uploads\/ethics.pdf\" target=\"_blank\">Computer &amp; Information Literacy<\/a><\/li>\r\n<\/ol>\r\n<h3>Task 2: Copyright<\/h3>\r\n<div class=\"details\">\r\n<div class=\"vtbegenerated\">\r\n<p align=\"left\">Visit at least three of the following sites about copyright and continue to take notes on what Copyright is and how it effects what you can and cannot copy and use from the Internet.\u00a0 In your notes make sure you document where you got the information.<\/p>\r\n\r\n<div align=\"left\">\r\n<ol>\r\n\t<li><a href=\"http:\/\/www.lib.utsystem.edu\/copyright\/\" target=\"_blank\">Copyright Tutorial<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.cyberbee.com\/cb_copyright.swf\" target=\"_blank\">Cyberbee Copyright<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.htmlgoodies.com\/tutors\/copyright.html\" target=\"_blank\">Copyright Questions and Answers<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.copyright.com\/ccc\/viewPage.do?pageCode=cr10-n\" target=\"_blank\">Copyright Basics<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.pbs.org\/newshour\/extra\/features\/jan-june03\/digital_5-01.html\" target=\"_blank\">Digital Copyright Fight<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.loc.gov\/teachers\/copyrightmystery\/#\" target=\"_blank\">Taking the Mystery out of Copyright<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.templetons.com\/brad\/copymyths.html\" target=\"_blank\">10 Big Myths about copyright explained<\/a><\/li>\r\n\t<li><a href=\"http:\/\/lcweb.loc.gov\/copyright\/\" target=\"_blank\">Copyright<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.msnbc.msn.com\/id\/30386423\/\" target=\"_blank\">DVD Copyright Battle MSNBC<\/a><\/li>\r\n<\/ol>\r\n<h3>Task 3: Plagiarism<\/h3>\r\nContinue taking notes as you visit at least three of the following sites on What is Plagiarism and How to Cite Resources or Give Credit Where Credit is Due.\u00a0 In your notes make sure you document where you got the information.\r\n<div align=\"left\">\r\n<ol>\r\n\t<li><a href=\"http:\/\/en.wikipedia.org\/wiki\/Plagiarism\" target=\"_blank\">Plagiarism Definition<\/a><\/li>\r\n\t<li><a href=\"http:\/\/ec.hku.hk\/plagiarism\/introduction.htm\" target=\"_blank\">What Is Plagiarism<\/a><\/li>\r\n\t<li><a href=\"http:\/\/kidshealth.org\/kid\/feeling\/school\/plagiarism.html\" target=\"_blank\">What Is Plagiarism Kid's Health<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.indiana.edu\/~wts\/pamphlets\/plagiarism.shtml\" target=\"_blank\">How to recognize and avoid plagiarism<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.collegeboard.com\/student\/plan\/college-success\/10314.html\" target=\"_blank\">Summarizing, Paraphrasing, and Quoting<\/a><\/li>\r\n\t<li><a href=\"http:\/\/owl.english.purdue.edu\/handouts\/print\/research\/r_plagiar.html\" target=\"_blank\">Avoiding Plagiarism<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.unc.edu\/depts\/wcweb\/handouts\/plagiarism.html\" target=\"_blank\">Plagiarism:Why it's wrong<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.collier.k12.fl.us\/nhs\/lmc\/citations.htm\" target=\"_blank\">Plagiarism: What It is and How to Recognize and Avoid It<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2008\/08\/09\/AR2008080901453_pf.html\" target=\"_blank\">Plagiarism: expulsion for a guilty verdict<\/a><\/li>\r\n<\/ol>\r\n<h3>Task 4: Privacy<\/h3>\r\n<p align=\"left\"><strong>Fourth<\/strong> visit at least three of the following sites and add to the previous notes information about Privacy (what belongs to me and my rights; cookies) on the Internet.<\/p>\r\n\r\n<div align=\"left\">\r\n<ol>\r\n\t<li><a href=\"http:\/\/www.walthowe.com\/navnet\/privacy.html\" target=\"_blank\">Privacy on the Internet, What can others learn about you?<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2009\/05\/13\/AR2009051303439.html\" target=\"_blank\">Be Careful Online: Not Everyone Is a True 'Friend'<\/a><\/li>\r\n\t<li><a href=\"http:\/\/wps.prenhall.com\/wps\/media\/objects\/619\/633890\/priv\/index.html\" target=\"_blank\">Internet Privacy and Email Security<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.howstuffworks.com\/cookie.htm\" target=\"_blank\">How Internet Cookies Work<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2009\/10\/07\/AR2009100703682.html?wpisrc=newsletter\" target=\"_blank\">Phishing Arrests<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.onguardonline.gov\/#\" target=\"_blank\">On Guard Online<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2008\/05\/02\/AR2008050203831_pf.html\" target=\"_blank\">Virginia tries to Ensure Students\u2019 Safety in Cyberspace<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.privacyrights.org\/fs\/fs18-cyb.htm\" target=\"_blank\">Privacy and the Internet: Traveling in Cyberspace Safely<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2008\/01\/12\/AR2008011200275_pf.html\" target=\"_blank\">Identity theft gets personal<\/a><\/li>\r\n\t<li><a href=\"https:\/\/www.privacyrights.org\/privacy-basics\" target=\"_blank\">Privacy Rights<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.buzzle.com\/articles\/ethical-issues-of-internet-privacy.html\" target=\"_blank\">Ethical Issues of Internet Privacy<\/a><\/li>\r\n<\/ol>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<h3>Task 5: Email and Abuses<\/h3>\r\n<p align=\"left\"><strong>Now<\/strong> visit at least three of the following sites and continue taking notes on E-mail uses and abuses and proper usage, viruses etc.<\/p>\r\n\r\n<div align=\"left\">\r\n<ol>\r\n\t<li><a href=\"http:\/\/www.emailreplies.com\/\" target=\"_blank\">Email etiquette<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.communicaid.com\/communication-skills\/writing\/email-writing\/index.php\" target=\"_blank\">Professional Email Writing<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.homebiznotes.com\/keep-your-e-mails-professional-personal-home-business-ones\/\" target=\"_blank\">Keep Your E-mails Professional\u2014Personal &amp; Home Business Ones<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.emailreplies.com\/\" target=\"_blank\">http:\/\/www.emailreplies.com\/<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.iwillfollow.com\/email.htm\" target=\"_blank\">http:\/\/www.iwillfollow.com\/email.htm<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.smallbizmentor.com\/2007\/10\/sending_responding_to_group_em.html\" target=\"_blank\">Sending &amp; Responding To Group Emails\u2014What Not To Do\u2014Email Etiquette<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.successis.co.nz\/online-newsletters-book.htm\" target=\"_blank\">Professional Online Newsletters and Emails Exactly How To Create Your Own<\/a><\/li>\r\n<\/ol>\r\n<h3>Task 6: Acceptable Use Policies<\/h3>\r\n<p align=\"left\"><strong>V<\/strong>isit at least three of these sites and finish taking notes on Acceptable Use Policies (AUPs) what our school policy is and how it compares to other policies.<\/p>\r\n\r\n<div align=\"left\">\r\n<ol>\r\n\t<li><a title=\"LFCC Computer Use Policy\" href=\"http:\/\/www.lfcc.edu\/about-the-college\/office-of-financial-and-administrative-services\/technology-services-475\/ethics-agreement\/index.html\" target=\"_blank\">LFCC Computer Use Policy<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.esc2.net\/links\/aup.htm\" target=\"_blank\">Acceptable Use Policy<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.enterasys.com\/solutions\/secure-networks\/acceptable_use\/\" target=\"_blank\">http:\/\/www.enterasys.com\/solutions\/secure-networks\/acceptable_use\/<\/a><\/li>\r\n\t<li><a href=\"http:\/\/bizsecurity.about.com\/od\/creatingpolicies\/a\/6_policies.htm\" target=\"_blank\">http:\/\/bizsecurity.about.com\/od\/acceptableusagepolicies\/a\/creatingaup.htm<\/a><\/li>\r\n\t<li><a href=\"http:\/\/wildblue.com\/legal\/acceptable_use_policy.jsp\" target=\"_blank\">Business AUPs<\/a><\/li>\r\n\t<li><a href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2008\/01\/23\/AR2008012302511_pf.html\" target=\"_blank\">Nine Employees Fired for Internet Porn<\/a><\/li>\r\n<\/ol>\r\n<\/div>\r\n<\/div>","rendered":"<h2>Assignment Introduction<\/h2>\n<p>You will learn the following:<\/p>\n<ol>\n<li>What a Code of Ethics is<\/li>\n<li>Giving Credit where Credit is Due<\/li>\n<li>Privacy on the Internet<\/li>\n<li>E-mail Uses and Abuses<\/li>\n<li>The School Acceptable Use Policy as compared with other AUPs<\/li>\n<li>What is Copyright and how does it effect the use of<\/li>\n<\/ol>\n<ul>\n<li>Written work on the Internet<\/li>\n<li>Computer Software<\/li>\n<li>Pictures on the Internet<\/li>\n<li>Music on the Internet<\/li>\n<li>Movies on the Internet<\/li>\n<\/ul>\n<h2>Assignment Directions<\/h2>\n<p>After going through the information in\u00a0tasks (1-6) each student will:<\/p>\n<ul>\n<li>Create a page on the Ethics Blog<\/li>\n<li>They will\u00a0choose a good title for their page<\/li>\n<li>Summarize what they learned from steps 1-6. The summary should clearly identify each of the six main areas (Ethics, Copyright, Plagerism, Privacy, Email, &amp; Acceptable Use)<\/li>\n<\/ul>\n<p>After completing the blog entry, each student will comment (provide feedback) to at least two (2) other students. All comments are to be at least two complete sentences.<\/p>\n<h3>Task 1: Ethics<\/h3>\n<p style=\"text-align: left;\"><strong>You will need a notebook to take notes in.\u00a0<\/strong>Now you will visit at least three of the following sites about ethics and make notes on what a Code of Ethics is and how it affects your use of computers at school and how it affect your computer use at your place of employment.\u00a0 In your notes, make sure you document which site\u00a0you got the information. Use the grading rubric to guide your note taking.<\/p>\n<div style=\"text-align: left;\">\n<ol>\n<li><a href=\"http:\/\/www.trhs.weber.k12.ut.us\/Doc\/EthicsReading.pdf\" target=\"_blank\">What are Ethics? by Duke Mosman<\/a>\u2014USOE<\/li>\n<li><a href=\"http:\/\/www.business-ethics-pledge.org\/\" target=\"_blank\">Business Ethics Pledge<\/a><\/li>\n<li><a href=\"http:\/\/www.crews.org\/curriculum\/ex\/compsci\/articles\/ethics.htm#part1\" target=\"_blank\">Computer Ethics and Coypright Issues? Right vs. Wrong<\/a><\/li>\n<li><a href=\"http:\/\/journalism.nyu.edu\/ethics\/handbook\/ethics-pledge\/\" target=\"_blank\">NYU Ethics Pledge<\/a><\/li>\n<li><a href=\"http:\/\/plato.stanford.edu\/entries\/ethics-computer\/\" target=\"_blank\">Computer Ethics: Basic Concepts and Historical Overview<\/a><\/li>\n<li><a href=\"http:\/\/charactercounts.org\/programs\/reportcard\/2006\/index.html\" target=\"_blank\">Youth Ethics<\/a><\/li>\n<li><a href=\"http:\/\/ethics.csc.ncsu.edu\/basics\/principles\/\" target=\"_blank\">Ethics in Computing<\/a><\/li>\n<li><a href=\"http:\/\/www.scu.edu\/ethics\/practicing\/decision\/framework.html\" target=\"_blank\">A Framework for Ethical Thinking<\/a><\/li>\n<li><a href=\"http:\/\/www.mekabay.com\/ethics\/napster.htm\" target=\"_blank\">The Napster Cantata<\/a><\/li>\n<li><a href=\"http:\/\/cil.usu.edu\/files\/uploads\/ethics.pdf\" target=\"_blank\">Computer &amp; Information Literacy<\/a><\/li>\n<\/ol>\n<h3>Task 2: Copyright<\/h3>\n<div class=\"details\">\n<div class=\"vtbegenerated\">\n<p style=\"text-align: left;\">Visit at least three of the following sites about copyright and continue to take notes on what Copyright is and how it effects what you can and cannot copy and use from the Internet.\u00a0 In your notes make sure you document where you got the information.<\/p>\n<div style=\"text-align: left;\">\n<ol>\n<li><a href=\"http:\/\/www.lib.utsystem.edu\/copyright\/\" target=\"_blank\">Copyright Tutorial<\/a><\/li>\n<li><a href=\"http:\/\/www.cyberbee.com\/cb_copyright.swf\" target=\"_blank\">Cyberbee Copyright<\/a><\/li>\n<li><a href=\"http:\/\/www.htmlgoodies.com\/tutors\/copyright.html\" target=\"_blank\">Copyright Questions and Answers<\/a><\/li>\n<li><a href=\"http:\/\/www.copyright.com\/ccc\/viewPage.do?pageCode=cr10-n\" target=\"_blank\">Copyright Basics<\/a><\/li>\n<li><a href=\"http:\/\/www.pbs.org\/newshour\/extra\/features\/jan-june03\/digital_5-01.html\" target=\"_blank\">Digital Copyright Fight<\/a><\/li>\n<li><a href=\"http:\/\/www.loc.gov\/teachers\/copyrightmystery\/#\" target=\"_blank\">Taking the Mystery out of Copyright<\/a><\/li>\n<li><a href=\"http:\/\/www.templetons.com\/brad\/copymyths.html\" target=\"_blank\">10 Big Myths about copyright explained<\/a><\/li>\n<li><a href=\"http:\/\/lcweb.loc.gov\/copyright\/\" target=\"_blank\">Copyright<\/a><\/li>\n<li><a href=\"http:\/\/www.msnbc.msn.com\/id\/30386423\/\" target=\"_blank\">DVD Copyright Battle MSNBC<\/a><\/li>\n<\/ol>\n<h3>Task 3: Plagiarism<\/h3>\n<p>Continue taking notes as you visit at least three of the following sites on What is Plagiarism and How to Cite Resources or Give Credit Where Credit is Due.\u00a0 In your notes make sure you document where you got the information.<\/p>\n<div style=\"text-align: left;\">\n<ol>\n<li><a href=\"http:\/\/en.wikipedia.org\/wiki\/Plagiarism\" target=\"_blank\">Plagiarism Definition<\/a><\/li>\n<li><a href=\"http:\/\/ec.hku.hk\/plagiarism\/introduction.htm\" target=\"_blank\">What Is Plagiarism<\/a><\/li>\n<li><a href=\"http:\/\/kidshealth.org\/kid\/feeling\/school\/plagiarism.html\" target=\"_blank\">What Is Plagiarism Kid&#8217;s Health<\/a><\/li>\n<li><a href=\"http:\/\/www.indiana.edu\/~wts\/pamphlets\/plagiarism.shtml\" target=\"_blank\">How to recognize and avoid plagiarism<\/a><\/li>\n<li><a href=\"http:\/\/www.collegeboard.com\/student\/plan\/college-success\/10314.html\" target=\"_blank\">Summarizing, Paraphrasing, and Quoting<\/a><\/li>\n<li><a href=\"http:\/\/owl.english.purdue.edu\/handouts\/print\/research\/r_plagiar.html\" target=\"_blank\">Avoiding Plagiarism<\/a><\/li>\n<li><a href=\"http:\/\/www.unc.edu\/depts\/wcweb\/handouts\/plagiarism.html\" target=\"_blank\">Plagiarism:Why it&#8217;s wrong<\/a><\/li>\n<li><a href=\"http:\/\/www.collier.k12.fl.us\/nhs\/lmc\/citations.htm\" target=\"_blank\">Plagiarism: What It is and How to Recognize and Avoid It<\/a><\/li>\n<li><a href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2008\/08\/09\/AR2008080901453_pf.html\" target=\"_blank\">Plagiarism: expulsion for a guilty verdict<\/a><\/li>\n<\/ol>\n<h3>Task 4: Privacy<\/h3>\n<p style=\"text-align: left;\"><strong>Fourth<\/strong> visit at least three of the following sites and add to the previous notes information about Privacy (what belongs to me and my rights; cookies) on the Internet.<\/p>\n<div style=\"text-align: left;\">\n<ol>\n<li><a href=\"http:\/\/www.walthowe.com\/navnet\/privacy.html\" target=\"_blank\">Privacy on the Internet, What can others learn about you?<\/a><\/li>\n<li><a href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2009\/05\/13\/AR2009051303439.html\" target=\"_blank\">Be Careful Online: Not Everyone Is a True &#8216;Friend&#8217;<\/a><\/li>\n<li><a href=\"http:\/\/wps.prenhall.com\/wps\/media\/objects\/619\/633890\/priv\/index.html\" target=\"_blank\">Internet Privacy and Email Security<\/a><\/li>\n<li><a href=\"http:\/\/www.howstuffworks.com\/cookie.htm\" target=\"_blank\">How Internet Cookies Work<\/a><\/li>\n<li><a href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2009\/10\/07\/AR2009100703682.html?wpisrc=newsletter\" target=\"_blank\">Phishing Arrests<\/a><\/li>\n<li><a href=\"http:\/\/www.onguardonline.gov\/#\" target=\"_blank\">On Guard Online<\/a><\/li>\n<li><a href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2008\/05\/02\/AR2008050203831_pf.html\" target=\"_blank\">Virginia tries to Ensure Students\u2019 Safety in Cyberspace<\/a><\/li>\n<li><a href=\"http:\/\/www.privacyrights.org\/fs\/fs18-cyb.htm\" target=\"_blank\">Privacy and the Internet: Traveling in Cyberspace Safely<\/a><\/li>\n<li><a href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2008\/01\/12\/AR2008011200275_pf.html\" target=\"_blank\">Identity theft gets personal<\/a><\/li>\n<li><a href=\"https:\/\/www.privacyrights.org\/privacy-basics\" target=\"_blank\">Privacy Rights<\/a><\/li>\n<li><a href=\"http:\/\/www.buzzle.com\/articles\/ethical-issues-of-internet-privacy.html\" target=\"_blank\">Ethical Issues of Internet Privacy<\/a><\/li>\n<\/ol>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<h3>Task 5: Email and Abuses<\/h3>\n<p style=\"text-align: left;\"><strong>Now<\/strong> visit at least three of the following sites and continue taking notes on E-mail uses and abuses and proper usage, viruses etc.<\/p>\n<div style=\"text-align: left;\">\n<ol>\n<li><a href=\"http:\/\/www.emailreplies.com\/\" target=\"_blank\">Email etiquette<\/a><\/li>\n<li><a href=\"http:\/\/www.communicaid.com\/communication-skills\/writing\/email-writing\/index.php\" target=\"_blank\">Professional Email Writing<\/a><\/li>\n<li><a href=\"http:\/\/www.homebiznotes.com\/keep-your-e-mails-professional-personal-home-business-ones\/\" target=\"_blank\">Keep Your E-mails Professional\u2014Personal &amp; Home Business Ones<\/a><\/li>\n<li><a href=\"http:\/\/www.emailreplies.com\/\" target=\"_blank\">http:\/\/www.emailreplies.com\/<\/a><\/li>\n<li><a href=\"http:\/\/www.iwillfollow.com\/email.htm\" target=\"_blank\">http:\/\/www.iwillfollow.com\/email.htm<\/a><\/li>\n<li><a href=\"http:\/\/www.smallbizmentor.com\/2007\/10\/sending_responding_to_group_em.html\" target=\"_blank\">Sending &amp; Responding To Group Emails\u2014What Not To Do\u2014Email Etiquette<\/a><\/li>\n<li><a href=\"http:\/\/www.successis.co.nz\/online-newsletters-book.htm\" target=\"_blank\">Professional Online Newsletters and Emails Exactly How To Create Your Own<\/a><\/li>\n<\/ol>\n<h3>Task 6: Acceptable Use Policies<\/h3>\n<p style=\"text-align: left;\"><strong>V<\/strong>isit at least three of these sites and finish taking notes on Acceptable Use Policies (AUPs) what our school policy is and how it compares to other policies.<\/p>\n<div style=\"text-align: left;\">\n<ol>\n<li><a title=\"LFCC Computer Use Policy\" href=\"http:\/\/www.lfcc.edu\/about-the-college\/office-of-financial-and-administrative-services\/technology-services-475\/ethics-agreement\/index.html\" target=\"_blank\">LFCC Computer Use Policy<\/a><\/li>\n<li><a href=\"http:\/\/www.esc2.net\/links\/aup.htm\" target=\"_blank\">Acceptable Use Policy<\/a><\/li>\n<li><a href=\"http:\/\/www.enterasys.com\/solutions\/secure-networks\/acceptable_use\/\" target=\"_blank\">http:\/\/www.enterasys.com\/solutions\/secure-networks\/acceptable_use\/<\/a><\/li>\n<li><a href=\"http:\/\/bizsecurity.about.com\/od\/creatingpolicies\/a\/6_policies.htm\" target=\"_blank\">http:\/\/bizsecurity.about.com\/od\/acceptableusagepolicies\/a\/creatingaup.htm<\/a><\/li>\n<li><a href=\"http:\/\/wildblue.com\/legal\/acceptable_use_policy.jsp\" target=\"_blank\">Business AUPs<\/a><\/li>\n<li><a href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2008\/01\/23\/AR2008012302511_pf.html\" target=\"_blank\">Nine Employees Fired for Internet Porn<\/a><\/li>\n<\/ol>\n<\/div>\n<\/div>\n\n\t\t\t <section class=\"citations-section\" role=\"contentinfo\">\n\t\t\t <h3>Candela Citations<\/h3>\n\t\t\t\t\t <div>\n\t\t\t\t\t\t <div id=\"citation-list-622\">\n\t\t\t\t\t\t\t <div class=\"licensing\"><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Original<\/div><ul class=\"citation-list\"><li>Introduction to Computer Applications and Concepts Ethics and Security Assignment. <strong>Authored by<\/strong>: Melissa Stange. <strong>Provided by<\/strong>: Lord Fairfax Community College. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"http:\/\/www.lfcc.edu\/\">http:\/\/www.lfcc.edu\/<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by\/4.0\/\">CC BY: Attribution<\/a><\/em><\/li><\/ul><\/div>\n\t\t\t\t\t\t <\/div>\n\t\t\t\t\t <\/div>\n\t\t\t <\/section>","protected":false},"author":74,"menu_order":7,"template":"","meta":{"_candela_citation":"[{\"type\":\"original\",\"description\":\"Introduction to Computer Applications and Concepts Ethics and Security Assignment\",\"author\":\"Melissa Stange\",\"organization\":\"Lord Fairfax Community College\",\"url\":\"http:\/\/www.lfcc.edu\/\",\"project\":\"\",\"license\":\"cc-by\",\"license_terms\":\"\"}]","CANDELA_OUTCOMES_GUID":"","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-622","chapter","type-chapter","status-publish","hentry"],"part":567,"_links":{"self":[{"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/pressbooks\/v2\/chapters\/622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/wp\/v2\/users\/74"}],"version-history":[{"count":3,"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/pressbooks\/v2\/chapters\/622\/revisions"}],"predecessor-version":[{"id":1258,"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/pressbooks\/v2\/chapters\/622\/revisions\/1258"}],"part":[{"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/pressbooks\/v2\/parts\/567"}],"metadata":[{"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/pressbooks\/v2\/chapters\/622\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/wp\/v2\/media?parent=622"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/pressbooks\/v2\/chapter-type?post=622"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/wp\/v2\/contributor?post=622"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/sanjacinto-computerapps\/wp-json\/wp\/v2\/license?post=622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}