Design, Development and Implementation of an Information Security and Cyberethics Course for Pre-Service Teachers: a Design-Based Research

Total Page:16

File Type:pdf, Size:1020Kb

Design, Development and Implementation of an Information Security and Cyberethics Course for Pre-Service Teachers: a Design-Based Research DESIGN, DEVELOPMENT AND IMPLEMENTATION OF AN INFORMATION SECURITY AND CYBERETHICS COURSE FOR PRE-SERVICE TEACHERS: A DESIGN-BASED RESEARCH A THESIS SUBMITTED TO THE GRADUATE SCHOOL OF NATURAL AND APPLIED SCIENCES OF MIDDLE EAST TECHNICAL UNIVERSITY BY EVRİM AKMAN KADIOĞLU IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY IN COMPUTER EDUCATION AND INSTRUCTIONAL TECHNOLOGY APRIL 2019 Approval of the thesis: DESIGN, DEVELOPMENT AND IMPLEMENTATION OF AN INFORMATION SECURITY AND CYBERETHICS COURSE FOR PRE-SERVICE TEACHERS: A DESIGN-BASED RESEARCH Submitted by EVRİM AKMAN KADIOĞLU in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Education and Instructional Technology Department, Middle East Technical University by, Prof. Dr. Halil Kalıpçılar Dean, Graduate School of Natural and Applied Sciences Assoc. Dr. Ömer Delialioğlu Head of Department, Comp. Edu. and Inst. Tech. Assist. Prof. Dr. Cengiz Savaş Aşkun Supervisor, Comp. Edu. and Inst. Tech., METU Examining Committee Members: Prof. Dr. Hakan Tüzün Comp. Edu. and Inst. Tech., Hacettepe Uni. Assist. Prof. Dr. Cengiz Savaş Aşkun Comp. Edu. and Inst. Tech., METU Assoc. Prof. Dr. Ömer Delialioğlu Comp. Edu. and Inst. Tech., METU Assoc. Prof. Dr. Çiğdem Haser Mathematics and Science Education, METU Assist. Prof. Dr. Halil Ersoy Comp. Edu. and Inst. Tech., Başkent Uni. Date: 05.04.2019 I hereby declare that all information in this document has been obtained and presented in accordance with academic rules and ethical conduct. I also declare that, as required by these rules and conduct, I have fully cited and referenced all material and results that are not original to this work. Name, Surname: Evrim Akman Kadıoğlu Signature: iv ABSTRACT DESIGN, DEVELOPMENT AND IMPLEMENTATION OF AN INFORMATION SECURITY AND CYBERETHICS COURSE FOR PRE-SERVICE TEACHERS: A DESIGN-BASED RESEARCH Akman Kadıoğlu, Evrim Doctor of Philosophy, Computer Education and Instructional Technology Supervisor: Assist. Prof. Dr. Cengiz Savaş Aşkun April 2019, 252 Pages With the introduction of the Information and Communication Technologies (ICT) into our lives, production and distribution of information have increased exponentially. The ICT systems and the data, which these systems use, create, or both is an essential resource of schools. For this reason, the secure and ethical use of information is a primary concern for schools. However, the curriculum in teacher training institutions does not include a course that aims to raise pre-service teachers’ awareness of information security and cyberethics. In other words, there is a need for more instructional content on information security and cyberethics for pre-service teachers. The designed, developed and implemented course for this study significantly improves the amount of content for pre-service teachers’ information security awareness and cyberethics sensitivity. The main purpose of this study is to explore important points of designing process of a course including such an instructional content, to enhance pre-service teachers’ information security awareness and cyberethics sensitivity in the Faculty of Education. The research questions of the study can be summarized as; (i) what are content, learner, and instruction related issues during the design and development of a course v to increase the pre-service teachers’ information security awareness and cyberethics sensitivity? (ii) What are the facilitating and challenging factors faced during the implementation, and how the challenges are handled from the instructor’s experience? (iii) How do pre-service teachers perceive the contribution of the course on their information security awareness and cyberethics sensitivity? Design-Based Research (DBR) approach with qualitative methods is carried out to answer these questions. As a result of this research, a course content aimed at raising pre-service teachers’ information security and cyberethics awareness presented, and critical elements in the design and development process of such a course are identified. In the scope of the study, during the need analysis and the development phases of the study, a content pool including different cybersecurity, cyberethics, and cybersafety issues and a draft content sequence have emerged. At the end of the two iterative implementation phases, the course design has reached to the final form which included different instructional methods such as face to face lecture sessions, online discussion forums and in-class discussion sessions, reading materials, and different audiovisual materials. The qualitative data analysis shows that the course influenced the students’ preferences on online activities and password protection strategies. Besides, their information security and cyberethics awareness have raised. Furthermore, daily life correspondence of the course topics facilitates the instruction process and increases the learners’ interest. Keywords: Information Security, Cyberethics, Design-Based Research, Course Design and Development, Pre-service Teachers vi ÖZ ÖĞRETMEN ADAYLARI İÇİN BİLGİ GÜVENLİĞİ VE BİLİŞİM ETİĞİ DERSİNİN TASARIM, GELİŞTİRME VE UYGULAMASI: TASARIM TEMELLİ ARAŞTIRMA Akman Kadıoğlu, Evrim Doktora, Bilgisayar ve Öğretim Teknolojileri Eğitimi Tez Danışmanı: Dr. Ögr. Üyesi Cengiz Savaş Aşkun Nisan 2019, 252 Sayfa Bilgi ve İletişim Teknolojilerinin (BİT) hayatımıza girmesiyle, bilginin üretimi ve iletimi katlanarak artmıştır. BİT teknolojilerinin kullandığı ve/ya oluşturduğu bilgiler, eğitim kurumlarının önemli bir kaynağıdır. Bu nedenle, bilginin güvenli ve etik değerlere uygun olarak kullanılması bu kurumların önemli kaygıları arasındadır. Bununla birlikte, öğretmen yetiştiren kurumların müfredatında, öğretmen adaylarının bilgi güvenliği ve bilişim etiği farkındalığını artırmayı hedefleyen bir ders bulunmamaktadır. Diğer bir deyişle öğretmen adayları için bilgi güvenliği ve bilişim etiği hakkında daha fazla eğitim içeriğine ihtiyaç bulunmaktadır. Öğretmen adaylarının bilgi güvenliği ve bilişim etiği farkındalığını arttırmak için bu araştırma kapsamında tasarlanan, geliştirilen ve uygulanan bu ders bilgi güvenliği ve bilişim etiği hakkındaki eğitsel içerik ihtiyacına anlamlı bir katkı sağlayacaktır. Bu araştırmanın temel kaygısı, bu içeriğe yönelik bir dersin tasarım, geliştirme ve uygulama aşamalarındaki önemli noktaları belirlemek ve öğretmen adaylarının bilgi güvenliği ve bilişim etiği farkındalıklarını arttırmaktır. Bu doğrultuda, araştırma soruları şu şekilde belirlenmiştir: (i) Öğretmen adaylarının bilgi güvenliği bilinci ve bilişim etik duyarlılık düzeylerini yükseltmek için bir ders tasarlarken, geliştirirken ve uygularken göz önüne alınan öğrenci, içerik ve öğretim ile ilgili konular nelerdir? (ii) Öğretmen adaylarının bilgi güvenliği vii farkındalığı ve bilişim etiği duyarlılığını arttırmayı amaçlayan böyle bir dersin tasarım ve uygulama sürecinde karşılaşılan kolaylıklar ve zorluklar nelerdir ve zorluklar nasıl aşılmıştır? (iii) Öğretmen adayları böyle bir dersin bilişim etik duyarlılıklarını ve bilgi güvenliği farkındalıklarına etkilerini nasıl algılamaktadır? Bu sorulara cevap bulmak için nitel yöntemlerle Tasarım Temelli Araştırma (TTA) metodu uygulanmıştır. Bu araştırmanın sonucunda bilgi güvenliği ve bilişim etiği duyarlılığı yüksek öğretmen adayları yetiştirmeyi hedefleyen bir ders içeriği sunulmuştur. Bu çalışma kapsamında, ihtiyaç analizi ve geliştirme aşamalarında bilişim etiği, bilişim emniyeti ve bilişim güvenliği konularına yönelik bir içerik havuzu oluşturulmuş, ardından taslak bir izlencesi hazırlanmıştır. Ardından iki ardışık uygulama döneminin sonucunda dersin yapısı olgunlaşmıştır. Bu ders çeşitli eğitsel bileşenleri içermektedir. Örneğin yüz yüze ders oturumları, sınıf içi tartışma etkinliği, çevrim içi forum sayfaları, genişletilmiş ders notları, değişik kaynaklardan yararlanılan ders içerikleri bu örneklerden bazılarıdır. Ayrıca yapılan nitel veri analizinin sonucunda bu dersin öğrencilerin çevrim içi işlemlerle ilgili davranışlarını, şifre koruma tercihlerini etkilediği, öğrencilerin bilgi güvenliği ve bilişim etiği farkındalıklarını arttırdığı gözlenmiştir. Bunun yanı sıra ders içeriklerinin günlük yaşamla uyumlu olmasının öğretmenin öğretim süreçlerini kolaylaştırdığı ve öğrencilerin derse ilgilerini arttırdığı gözlenmiştir. Anahtar Kelimeler: Bilgi güvenliği, Bilişim etiği, Ders tasarım ve geliştirme, Tasarım temelli araştırma, Öğretmen adayları viii Dedicated to the loving memory of Eyüp Hamdi Akman, my grandfather, one of the first educators of Republic of Turkey ix ACKNOWLEDGEMENTS I am grateful for the support of my advisor Assist. Prof. Dr. Cengiz Savaş Aşkun. I would also like to thank the members of the thesis monitoring committee; Assoc. Prof. Dr. Çiğdem Haser and Assoc. Prof. Dr. Ömer Delialioğlu for their support in several phases of the study. I want to thank the final chair of my dissertation committee, Prof. Dr. Hakan Tüzün and Assist. Prof. Dr. Halil Güllü, for their valuable suggestions that helped me to complete this thesis. I want to thank Assoc. Prof. Dr. Hanife Akar, Assoc. Dr. Umut Beşpınar, Assoc. Prof. Dr. Funda Gülay Kadıoğlu, Dr. Selma Aydın Bayram, Dr. Levent Bayram, Dr. İbrahim Çalışır, Dr. Müge Maraşlı, Emre Sezginer, and Suna Yılmaz for their suggestions and opinions during the design and development of the course. I am also grateful to all of the students of CEIT215 for their participation in this research. I should also thank my managers, Ferdi Ayaydın and Feride Erdal for their
Recommended publications
  • Reflections on Cyberethics Education for Millennial Software Engineers
    Reflections on Cyberethics Education for Millennial Software Engineers Claudia de O. Melo Thiago C. de Sousa Faculty of Technology Urbanism and Technology Center University of Bras´ılia State University of Piau´ı Bras´ılia, Brazil Teresina, Brazil Email: [email protected] Email: [email protected] Abstract—Software is a key component of solutions for challenges to educating millennial software engineers, which 21st Century problems. These problems are often “wicked”, requires continuous innovation in educational systems and complex, and unpredictable. To provide the best possible solution, curricula delivery [2], [7]. millennial software engineers must be prepared to make ethical decisions, thinking critically, and acting systematically. This Moreover, the design of software systems comes with reality demands continuous changes in educational systems and a special set of responsibilities to society that are much curricula delivery, as misjudgment might have serious social broader than those described in existing codes of ethics for impact. This study aims to investigate and reflect on Software computing professionals [8]. While the potential return on Engineering (SE) Programs, proposing a conceptual framework investment in technology is usually high, the increasing pace for analyzing cyberethics education and a set of suggestions on how to integrate it into the SE undergraduate curriculum. of technological innovation raises ethical questions about its development and use [9]. Information and Communications Keywords-cyberethics; millennial software
    [Show full text]
  • The Society of Enhanced Legal Scholars, Seven of Nine, and Some Regulatory Challenges for Future Generations by Roger Brownsword
    The Society of Enhanced Legal Scholars, Seven of Nine, and some regulatory challenges for future generations by Roger Brownsword INTRODUCTION REGULATORY LEGITIMACY: THREE evelopments in information and communication SCHOOLS OF THOUGHT technologies have transformed the way that Where human enhancement is simply cheating by Dlawyers work. Nowadays, the electronic resources another name, we should obviously take a negative view. are so swift, comprehensive and convenient that However, if the rules permit enhancement, or if the researching the law only occasionally involves consulting situation is not competitive, is a negative view still the hard copy sources in the library. Imagine, though, that appropriate? If regulators permit (even encourage) further developments of this kind, coupled with physical and intellectual improvement, why prohibit developments in biotechnologies and nanotechnologies, as technologies for human enhancement? Does it make sense, well as in human brain/machine interfacing, reach a stage for example, to argue that regulators should permit the at which all legal source materials are on a tiny chip connected to the human brain. With such enabling application of technologies to correct impairment (such as technology, the lawyers of the future will be more than failing eyesight) but not to enhance human capacities (for advanced, they will be enhanced. Should we welcome example, to equip a person with X-ray or all-round vision)? enhancing developments of this kind? Should we try to How do we sort out the ethical wheat from the chaff? resist them or confine them? How should regulators What is the appropriate standard of regulatory legitimacy? respond? What kind of regulatory environment should be Broadly speaking, ethical argument adopts one of three set for a community of potentially enhanced citizens, basic forms: namely, goal-orientated (consequentialism), lawyers, and law-enforcers? rights-based and duty-based forms.
    [Show full text]
  • An Introduction to Cybersecurity Ethics MODULE AUTHOR: Shannon Vallor, Ph.D
    An Introduction to Cybersecurity Ethics MODULE AUTHOR: Shannon Vallor, Ph.D. William J. Rewak, S.J. Professor of Philosophy, Santa Clara University TABLE OF CONTENTS Introduction 2-6 PART ONE: What are the important ethical issues in cybersecurity? 7-12 Case Study 1 13-15 PART TWO: Common ethical challenges for cybersecurity professionals 15-21 Case Study 2 21-24 Case Study 3 24-28 PART THREE: What are cybersecurity professionals’ obligations to the public? 29-34 Case Study 4 34-38 PART FOUR: What ethical frameworks can guide cybersecurity practice? 38-47 PART FIVE: What are ethical best practices in cybersecurity? 48-56 Case Study 5 57-60 Case Study 6 60-61 APPENDIX A: Relevant Professional Ethics Codes & Guidelines (Links) 62 APPENDIX B: Bibliography/Further Reading 63-65 1 An Introduction to Cybersecurity Ethics MODULE AUTHOR: Shannon Vallor, Ph.D. William J. Rewak, S.J. Professor of Philosophy, Santa Clara University 1. What do we mean when we talk about ‘ethics’? Ethics in the broadest sense refers to the concern that humans have always had for figuring out how best to live. The philosopher Socrates is quoted as saying in 399 B.C. that “the most important thing is not life, but the good life.”1 We would all like to avoid a bad life, one that is shameful and sad, fundamentally lacking in worthy achievements, unredeemed by love, kindness, beauty, friendship, courage, honor, joy, or grace. Yet what is the best way to obtain the opposite of this – a life that is not only acceptable, but even excellent and worthy of admiration? How do we identify a good life, one worth choosing from among all the different ways of living that lay open to us? This is the question that the study of ethics attempts to answer.
    [Show full text]
  • The Case for Cyberethics in the Twenty-First Century, Computing and the Internet Have Become Ubiquitous, at Least in the Developed World
    Whittier • Cyberethics in the Googling Age R 19 ence, and to test what students know of these, typically leaves little time or energy for something like teaching cyberethics. In the amal - gam of connected 21st century “global villages,” regardless of how you answer the question: “what is the aim of education?” we have to ask: is teaching cyberethics not worth it? And, if so, do we have the courage to do so? The Case for Cyberethics In the twenty-first century, computing and the Internet have become ubiquitous, at least in the developed world. The Internet is everywhere, and, as Moor explained, “computing technology is not running away from us as much as moving in with us. Computer sprawl, like urban sprawl, moves inexorably on many fronts unsupervised” (Moor, 2000, p. 35). The problem with “unsupervised” technology is that as com - puting creeps into all aspects of life, the ethical implications are often unexamined. Just acquiring, installing, operating, and dealing with technology consumes so much time and energy that, often, little is left for examining its impact and its relationship to right and wrong. The demands of the marketplace are so great, so competitive, that as Moor says, “When a new computer technology is ready for market, nobody asks about its ethical implications. They may come later if at all.” However, the time to acquire ethical practices and habits in com - puting comes early. Both Berkowitz (2000) and Yamano (2004) put it at ages 9–12, or roughly between grades 4 and 7 in schools. Certainly by age nine, most children in the developed world have had experience with computing both at home and increasingly in school, at the library, and with various games and toys.
    [Show full text]
  • Curriculum Development for Cyber Ethics with a Focus on Law Enforcement
    Paper ID #29175 Curriculum Development for Cyber Ethics with a Focus on Law Enforcement Dr. Joseph Benin, U.S. Coast Guard Academy CDR Benin is a graduate of the Coast Guard Academy (BSEE), having served as the Regimental Honor Officer and Chairman of the Cadet Standards of Conduct Board. He then served as the Electrical and Elec- tronics Officer aboard the USCGC Healy (WAGB-20) while completing his Engineer-Officer-In-Training (EOIT) qualifications. He began graduate studies at the Georgia Institute of Technology, was selected as an adjunct MacArthur Fellow, and ultimately earned a Master of Science degree in Electrical and Com- puter Engineering and a Master of Science degree in Information Security. In 2005, he was selected as a member of the Permanent Commissioned Teaching Staff (PCTS). He successfully defended his disserta- tion and graduated with a Ph.D. in Electrical and Computer Engineering from Georgia Tech and presently focuses on the areas of computer networks, programming, and security. He is the Program Coordinator for the Coast Guard Academy’s Cyber Systems major and chair of the USCGA Cyber Council. Mr. William Randall, US Coast Guard Academy William Randall spent over 30 years in Coast Guard C4IT/C5I including serving as the senior civilian for the engineering, development, and protection of the Coast Guard’s IT infrastructure at the Coast Guard’s Telecommunication and Information Systems Command. William is currently the director of rowing at the Coast Guard Academy and has been lucky enough to be allowed to help in the development of the Cyber Systems Major at the Academy and to teach the first offering of the Cyber Ethics course.
    [Show full text]
  • |||GET||| Introduction to Nanoscale Science and Technology 1St Edition
    INTRODUCTION TO NANOSCALE SCIENCE AND TECHNOLOGY 1ST EDITION DOWNLOAD FREE Massimiliano Di Ventra | 9781402077203 | | | | | Nanotechnology Fullerenes and quantum dots each have their own chapter that focuses Introduction to Nanoscale Science and Technology 1st edition the properties and applications of these nanostructures. Danish company InnovationsFonden invested DKK 15 million in a search for new catalyst substitutes using nanotechnology. Bibcode : NatSR Such bottom-up approaches should be capable of producing devices in parallel and be much cheaper than top-down methods, but could potentially be overwhelmed as the size and complexity of the desired assembly increases. Environ Sci Technol. Nanotechnology may have the ability to make existing medical applications cheaper and easier to use in places like the general practitioner 's office and at home. Thus, creating these nanoparticles will increase the effectiveness of the resulting diesel engine catalyst—in turn leading to cleaner exhaust fumes—and will decrease cost. Much of the fascination with nanotechnology stems from these quantum and surface Introduction to Nanoscale Science and Technology 1st edition that matter exhibits at the nanoscale. Archived from the original on January 19, The challenge for nanotechnology is whether these principles can be used to engineer new constructs in addition to natural ones. Anthony Seaton of the Institute of Occupational Medicine in Edinburgh, Scotland, who contributed to the article on carbon nanotubes said "We know that some of them probably have the potential to cause mesothelioma. Nanomedicine Nanotoxicology Green nanotechnology Regulation. The giant magnetoresistive effect, operation of Introduction to Nanoscale Science and Technology 1st edition valves, and issues in magnetic scaling are easier to understand when placed in the context of the modern magnetic hard disk drive.
    [Show full text]
  • Cyberspace: Ethical Issues and Catholic Perspectives
    Cyberspace: Ethical Issues and Catholic Perspectives Author: Wojciech Moranski Persistent link: http://hdl.handle.net/2345/bc-ir:107473 This work is posted on eScholarship@BC, Boston College University Libraries. Boston College Electronic Thesis or Dissertation, 2017 Copyright is held by the author, with all rights reserved, unless otherwise noted. Boston College School of Theology and Ministry Academic Year 2016-2017 Cyberspace: Ethical Issues and Catholic Perspectives A Thesis Submitted in Partial Fulfillment of the Requirements for the S.T.L. Degree from the Boston College School of Theology and Ministry By: Wojciech Moranski, S.J. Director: Andrea Vicini, S.J., PhD Second Reader: Prof. Richard Spinello, PhD April 2017 Morański 1 Table of Contents Introduction ................................................................................................................................... 2 Chapter 1: The new dimensions of liberty in cyberspace ......................................................... 5 1.1. Freedom as a central value on the internet ........................................................................... 5 1.1.1. What is freedom? .......................................................................................................... 5 1.1.2. Freedom in the technology of the internet .................................................................... 9 1.1.3. Hackers ....................................................................................................................... 13 1.1.4. Richard Stallman
    [Show full text]
  • Download Bioethics Free Ebook
    BIOETHICS DOWNLOAD FREE BOOK Gilbert Meilaender | 144 pages | 25 Feb 2013 | William B Eerdmans Publishing Co | 9780802867704 | English | Grand Rapids, United States Principles of Bioethics We're gonna stop you right there Literally How to use a word that literally drives some pe One of the first areas addressed by modern bioethicists Bioethics that of Bioethics experimentation. Osmosis Mitosis Vs. Bioethics Article Media Additional Info. Archived from the Bioethics on In the United States, federal funding cannot be used to research germline gene therapy. When the brain stem has ceased to function? He stated that he thought of the word Bioethics returning from a discussion earlier that evening at Georgetown University, where he Bioethics with others a possible Kennedy family sponsorship of an institute Bioethics around the "application of moral philosophy to concrete medical dilemmas. Bioethics is the study of the ethical issues emerging from advances in biology and Bioethics. Some bioethicists, such as Bernard Gert and colleaguesargue that with the exception of nonmaleficence, the principles are flawed as moral action guides as they are so nonspecific, appearing to simply remind the decision maker of considerations that should be taken into account. Archived from the original on 23 October Michel Weber and Will Desmond eds. Jewish affirmations about God Bioethics humans intersect in the concept of Torah as the ordering of human existence in the direction of the divine. Developing a connection and understanding of a patient's moral agent helps enhance the care Bioethics to the patient. While immortality is believed by Bioethics to be beneficial, supporters of bioethics believe that this idea should not Bioethics given that the planet is already under the crisis of unsustainable Bioethics and limited resources.
    [Show full text]
  • Cyberethics in Action: Copyright, Privacy, and Media
    CYBERETHICS IN ACTION: COPYRIGHT, PRIVACY, AND MEDIA AWARENESS TEACHERS’ GUIDES by ARTHUR PUI-KIN LEE A project submitted to the Faculty of Education in conformity with the requirements for the degree of Master of Education Queen’s University Kingston, Ontario, Canada September, 2010 Copyright © Arthur Lee, 2010 ii Abstract New advancements in Information Communication Technology (ICT) have greatly impacted the way people interact with one another and the world. While ICT has led to many improvements, a number of problems involving ICT have also emerged, such as copyright infringement. These issues do not always experience the same level of moral adherence as their real world counterparts. For example copyright violations are not always associated with theft. The area of cyberethics examines these updated attitudes towards morally and ethically dubious acts and recommends cyberethics education for teachers to teach students ethical behaviour and values. Drawing from available literature, documents published by federal and private organizations, and credible online resources, this project develops three guides for instructors regarding the issues of: copyright, privacy, and media literacy. Each guide provides instructors with background information, lesson plan ideas, and additional resources for research and instruction. In this way, this project develops a useful tool to help instructors improve cyberethics education and address issues in ICT. iii Acknowledgments The creation and completion of this project would not have been possible without the help, time, support, and dedication of several incredible individuals. I would first like to acknowledge my supervisor Dr. John Freeman for his tireless support, guidance, and assistance. His feedback and understanding have allowed this project to succeed and his guidance throughout my academic career at Queen’s has helped immeasurably.
    [Show full text]
  • A Self-Assessment Approach to Adolescents' Cyberethics Education
    Volume 19, 2020 A SELF-ASSESSMENT APPROACH TO ADOLESCENTS’ CYBERETHICS EDUCATION Wing Shui Ng* The Open University of Hong Kong, [email protected] Hong Kong * Corresponding author ABSTRACT Aim/Purpose Teachers usually educate students’ cyberethics using debate, case-based discus- sion, and role-playing instructional methods in a face-to-face setting. With the presence of teacher and peers, students may not be willing to share their true at- titudes, and it may affect the effectiveness of the teaching methods. To tackle the challenge, the author applied a teaching method with a core component of a pressure-free self-assessment approach to improving adolescents’ cyberethics education. This study aimed to explore the impact of the self-assessment method on students’ self-knowledge and self-awareness of cyberethics. Background Since people usually use their own devices in an individual environment to par- ticipate in online activities, going online can be regarded as a private act. The behaviours of youngsters in the online environment may be different from that in the classroom when they are engaged in a face-to-face discussion, especially as they are not required to use their real names to go online. Research has sug- gested that youngsters have a higher inclination to misbehave online. Together with the fact that they are regular Internet users, and they are overrepresented online, there is an urgent need to foster ethical online behaviour in adolescents. Methodology A group of 28 students of age about 14 participated in this study. They were studying in secondary level 3 of a government-subsidised secondary school.
    [Show full text]
  • GLEN MILLER Department of Philosophy 418 YMCA Building
    GLEN MILLER Department of Philosophy 418 YMCA Building, 4237 TAMU Texas A&M University College Station, TX 77843 Email: [email protected] EDUCATION • Ph.D. in Philosophy, Department of Philosophy and Religion, University of North Texas, 2009–2015. • Master of Arts in Philosophy, Department of Philosophy and Religion Studies, University of North Texas, 2012. Language Competence: Latin. • Bachelor of Science in Chemical Engineering, Missouri University of Science and Technology (summa cum laude, with a minor in Communication), 1993–1998. FIELDS OF STUDY Areas of Specialization: Philosophy and Technology; Philosophy and Engineering; Environmental Philosophy; Professional Ethics; and Social and Political Philosophy. Areas of Competence: Ethics; Environmental Ethics; Cyberethics; Bioethics; and Science, Technology, and Society Studies. ACADEMIC POSITIONS • Instructional Assistant Professor, Texas A&M University (August 2016–present). • Lecturer, Texas A&M University (August 2013–July 2016). • Teaching Fellow, University of North Texas (August 2010–May 2013). • Teaching Assistant, University of North Texas (August 2009–May 2010). • Guest Lecturer and Teaching Assistant, Colorado School of Mines (January 2009–May 2010). PUBLICATIONS Books Reimagining Philosophy and Technology, Reinventing Don Ihde, co-edited with Ashley Shew. 11 original articles from scholars from a range of specializations centered on the work of Don Ihde. Part of the Springer Philosophy of Engineering and Technology series, series editor Pieter Vermaas. In press. Articles Editors’ Introduction, first author with Ashley Shew. Reimagining Philosophy and Technology, Reinventing Ihde. Springer. In press. Preface, second author With Ashley Shew. Reimagining Philosophy and Technology, Reinventing Ihde. Springer. In press. “Western Philosophical Approaches and Engineering.” In Handbook of Philosophy of Engineering, edited by Diane Michelfelder and Neelke Doorn.
    [Show full text]
  • The Crisis of Patient-Physician Trust and Bioethics: Lessons and Inspirations from China
    The crisis of patient-physician trust and bioethics: lessons and inspirations from China The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Nie, Jing-Bao, Lun Li, Grant Gillett, Joseph D. Tucker, and Arthur Kleinman. 2017. “The Crisis of Patient-Physician Trust and Bioethics: Lessons and Inspirations from China.” Developing World Bioethics (September 18). Portico. doi:10.1111/dewb.12169. Published Version doi:10.1111/dewb.12169 Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:34334600 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#OAP TOWARD A TRUST-ORIENTED BIOETHICS: LESSONS AND INSPIRATIONS FROM CHINA Jing-Bao Nie, Lun Li, Grant Gillett, Joseph T. Tucker, and Arthur Kleinman Correspondence: Jing-Bao Nie, Bioethics Centre, University of Otago, 71 Frederick St., Dunedin, New Zealand; email: [email protected]. ABSTRACT Trust is indispensable not only for interpersonal relationships and social life, but for good quality healthcare. As manifested in the increasing violence and tension in patient-physician relationships, China has been experiencing a widespread and profound crisis of patient–physician trust. And globally, the crisis of trust is an issue that every society, either developing or developed, has to face in one way or another. Yet, in spite of some pioneering works, the subject of patient-physician trust and mistrust -- a crucial matter in healthcare especially because there are numerous ethical implications -- has largely been marginalized in bioethics as a global discourse.
    [Show full text]