Tags & Description
1A1 Goal
Understand computing as a way of expressing creativity, solving problems, enabling communication, and fostering innovation in a variety of fields and careers
1A1 Subgoals: Understand computing as a way of expressing creativity, solving problems, enabling communication, and fostering innovation in a variety of fields and careers
a. recognize that computers can be used to showcase creativity
b. recognize the benefits of using computers to solve problems
c. provide examples of how computers enable communication and collaboration
d. provide examples of how computers foster innovation
1A2 Goal
Know the obstacles to equal access to computing among different groups and the impact of those obstacles
1A2 Subgoals: Know the obstacles to equal access to computing among different groups and the impact of those obstacles
a. identify obstacles to equal access to computing among different groups (e.g., groups defined by gender, socioeconomic status, disability/accessibility needs) and the impact of those obstacles
b. identify factors that contribute to the digital divide
c. match obstacles to equal access with effective solutions
1A3 Goal
Understand beneficial and harmful effects of computing innovations and the trade-offs between them
1A3 Subgoals: Understand beneficial and harmful effects of computing innovations and the trade-offs between them
a. analyze computing innovations in terms of their social, economic, and cultural impacts, both beneficial and harmful
b. identify trade-offs between beneficial and harmful effects of computer innovations
1B1 Goal
Know different methods of protecting intellectual property rights and the trade-offs between them in a variety of contexts (e.g., Creative Commons, open source, copyright)
1B1 Subgoals: Know different methods of protecting intellectual property rights and the trade-offs between them in a variety of contexts (e.g., Creative Commons, open source, copyright)
a. using correct vocabulary, describe how different methods of protecting intellectual property rights work
b. given a context, identify appropriate methods of protecting intellectual property rights
c. identify and compare trade-offs between different methods of protecting intellectual property rights
Public Domain
Copyright ownership waived Permission not needed Credit attribution not needed, though appreciated
Open License : (Creative Commons, GNU, etc.)
Copyright ownership retained Permission granted in advance Credit attribution needed
All rights reserved – Copyright
Copyright ownership retained Permission not given. Need to seek. Attribution depends on the agreement made
Open Source licenses including Creative Commons (most uses)
most commonly used in media assets and educational material. It is also the most common license for scientific publications. It is not used for software.
Open Source software the most popular licenses
MIT Licenses. GNU Licenses Apache License
Creative Commons BY
Attribution - This symbol indicates your expectation to receive credit when your work is used by someone else. It is used in all six license combinations.
Creative Commons SA
Share Alike - This requires any new works based on yours to carry the same license originally designated.
Creative Commons ND
No Derivatives - This symbol requires your original work be passed along unchanged and in whole, no changes to it whatsoever.
Creative Commons NC
Non Commercial - This symbol requires no money be made by any product using your work, only non-commercial use allowed.
Creative Commons Attribution (CC BY)
Show credit, OK to change and/or profit from it
Creative Commons Attribution-Share Alike (CC BY SA)
Show credit, OK to profit from it, use same license as stated with the original work
Creative Commons Attribution-NoDerivs (CC BY-ND)
Show credit, no changes allowed, OK to profit
Creative Commons Atrribution-NonCommercial (CC BY-NC)
Show credit, no profit allowed, OK to change
Creative Commons Atrribution-NonCommercial-ShareAlike (CC BY-NC-SA)
Show credit, no profits allowed, use original license, OK to change
Creative Commons Attribution-NonCommercial-NoDerivs (CC BY-NC-ND)
Show credit, non-commercial, no derivatives, most restrictive of the CC licenses
All Open Source Software funded by Federal Grant must be at least
CC BY - Showing Attribution
1B2 Goal
Understand ethical and unethical computing practices and their social, economic, and cultural implications
1B2 Subgoals: Understand ethical and unethical computing practices and their social, economic, and cultural implications
a. identify ethical and unethical computing practices in context
b. describe the social, economic, and cultural implications of ethical and unethical computing practices
c. identify the conditions under which a given computing practice is ethical or legal
Federal Laws: DMCA
The Digital Millennium Copyright Act is a controversial United States digital rights management (DRM) law enacted October 28, 1998 by then-President Bill Clinton. The intent behind DMCA was to create an updated version of copyright laws to deal with the special challenges of regulating digital material. It is a law protecting artists from having their work illegally copied and reused or modified.
Federal Laws: COPPA
Children’s Online Protection Privacy Act, and imposes certain requirements on operators of websites or online services directed to children under 13 years of age, and on operators of other websites or online services that have actual knowledge that they are collecting personal information online from a child under 13 years of age.
Federal Laws: FERPA
Family Education Rights and Privacy Act of 1974, a federal law that protects the privacy of student education records. The law applies to all schools that receive funds under an applicable program of the U.S. Department of Education.
Internet Data Mining Technology: NORA
Non-Obvious Relationship Awareness, a technology that mines data resources to determine the relationships between people. Non-Obvious Relationship Awareness was created by Systems Research and Development (SRD). SRD developed this technology for the Las Vegas gaming industry to help the casinos detect relationships between customers and parties named by the Nevada Gaming Control Board as excluded persons. SRD was acquired by IBM on January 7, 2005.
ACM: Preamble
To act responsibly, they should reflect upon the wider impacts of their work, consistently supporting the public good.[…]The Code includes principles formulated as statements of responsibility, based on the understanding that the public good is always the primary consideration
ACM Section 1 outlines…
fundamental ethical principles that form the basis for the remainder of the Code.
ACM Section 2 addresses…
more specific considerations of professional responsibility.
ACM Section 3…
guides individuals who have a leadership role, whether in the workplace or in a volunteer professional capacity.
ACM Section 4…
the Code
ACM Commitment to ethical conduct is required of…
every ACM member, and principles involving compliance with the Code are given in Section 4.
Plagiarism as defined by writing commons
using the ideas of someone else without referencing that source; failing to capture a source's point in your own words when paraphrasing; mimicking an author's style; and neglecting to include an in-text citation for a quote, paraphrase, or summary.
1B3 Goal
Know privacy and security issues regarding the acquisition, use, and disclosure of information in a digital world
1B3 subgoals: Know privacy and security issues regarding the acquisition, use, and disclosure of information in a digital world
a. using correct vocabulary, describe privacy and security issues
b. in context, identify appropriate strategies to safeguard privacy and ensure security
c. describe trade-offs between local and cloud-based data storage
d. identify methods that digital services use to collect information about users
Privacy Terms: Privacy
Individual privacy is the ability of an individual to conduct activities without the concern of being observed either directly or indirectly (like examination of data collected through online activities). Information privacy is the appropriate protection of individual data.
Privacy Terms: Security
Online security is the protection of an individual’s data either by the individual themselves, the government or a corporation.
Privacy Terms: Digital Footprint
This is the data that is available online about a person. The data typically contains information about the person’s online activity such as social media accounts, their contacts and other online transactions that they conduct on the Internet. Anything you do online leaves a digital trail. This trail is also called digital footprint.
Privacy Terms: Metadata
This is data which supports the actual data that is manipulated. For example if a digital camera stores an image the size of the image or the format of the image is the metadata.
Privacy Terms: Encryption
Encryption prevents others from reading data. Over the Internet, before being transmitted data is transformed by an algorithm in such a way that it is impossible to unscramble the data without knowing a secret piece of data such as a number.
Privacy Terms: Cryptography
The art of sending secret messages so that they can be read only by the intended recipients. Cryptography is based strongly on algorithms.
Privacy Terms: Cybersecurity
Cybersecurity is also known as the information technology security. It refers to technologies, processes and practices designed to protect networks, devices, software and data that are online from attacks, damage and other unauthorized access.
Privacy Terms: Bitcoin
This is digital currency. It is run by a computer software which keeps the currency working. Bitcoin just like any other currency will be accepted by merchants who accept it. Everything needed by a bitcoin is stored in a distributed ledger called blockchain.
Privacy Terms: Privacy / Security issues in Cloud-based storage
The data stored on the Internet by a computer that can be easily shared is called cloud based storage/computing. The privacy/security concerns include who owns the data, who can access it, and in the case of a data leak who is liable.
Privacy Terms: Malware
This stands for malicious software. Any kind of software that is designed to do some sort of damage to the user running it or gain access to private information is called a malware. Often a malware runs without the knowledge of the user.
Privacy Terms: Internet Of Things
All things connected to the internet which collect data (software updates, etc.) through the Internet and supply data back to remote devices through the Internet. Examples include cellphones, cars, security cameras, refrigerators