Site icon Cyber Security & Awareness

UNIT 5-QUESTION 1

Ethics directs people’s behavior in every aspect of life. Regardless ages, social status or jobs, everyone is expected to behave ethically. When technology is used more and more often in the classroom, users must be aware of ethical issues. In this essay, I will share my five codes of ethics statements for using technology in my workplace.
Number 1 is avoiding plagiarism. Working as teacher, it is very necessary for me to study and search information on the Internet to illustrate my lessons as well as build up my knowledge. With the support of the Internet, we can easily access to countless sources of information. However, whenever I can find an appropriate website, I try not to copy and paste. In other words, I attempt to rewrite or paraphrase the ideas from the author based on my understanding and follow the reference rules.
Number 2 is no online deception. More specifically, when I use the social media, I will not makw my personal information visible. Also, I will not intend to make friends with strangers to guarantee cyber safety. I will have no intention of deceiving anyone as well. I always believe that if I delude someone, then I will be cheated by someone else.
Number 3 is no sharing personal information, videos, posts or photos on social networks. Obviously, it is not safe to send your personal information online. Online scammers can take advantage of this information to cheat you. As a result, you become a victim of cyber attack.
Another ethics code is password. I have a habit of setting passwords for all digital devices I use to make sure no one can access to them without my permission. This habit prevents you from losing important information. Adopting different ways to protect you and your device from cyber
attack is an essential issue and needs to be paid more attention.
The last ethics code I often bear in mind is being alert. No one can deny the vital role of technology in our daily life from studying, working to entertaining. However, the more technology develops, the more popular and various types of technological crime arises. Therefore, being alert and critically thinking can help us to avoid being a victim. As being mentioned in unit 4, online scams come from many forms such as messages, emails, online shopping and social media. When receiving an email or a message, we should be careful to detect any unreal signals.
In conclusion, when we use technology to facilitate our life, we should use it ethically. As a result, not only you but also other users can exploit the advantages of technology and avoid unexpected risks.

Exit mobile version