Term: 2nd Term
Week: 9
Class: Senior Secondary School 3
Age: 17 years
Duration: 40 minutes of 2 periods each
Date:
Subject: Computer studies and ICT
Topic:- Computer ethics and legal issues
SPECIFIC OBJECTIVES:
At the end of the lesson, pupils should be able to
INSTRUCTIONAL TECHNIQUES: Identification, explanation, questions and answers, demonstration, videos from source
INSTRUCTIONAL MATERIALS: Videos, loud speaker, pictures, Data Processing for senior Secondary Education by Hiit Plc, WAPB Computer Studies for Senior Secondary III by Adekunle et al, On-line Materials.
INSTRUCTIONAL PROCEDURES
PERIOD 1-2
PRESENTATION |
TEACHER’S ACTIVITY |
STUDENT’S ACTIVITY |
STEP 1 INTRODUCTION |
The teacher reviews the previous lesson on preventive measures against security breaches |
Students pay attention |
STEP 2 EXPLANATION |
He lists and discusses some legal issues that could arise in the cause of using a computer
|
Students pay attention and participates |
STEP 3 DEMONSTRATION |
He explains computer ethics |
Students pay attention and participate |
STEP 4 NOTE TAKING |
The teacher writes a summarized note on the board |
The students copy the note in their books |
NOTE
LEGAL ISSUES THAT COULD ARISE IN THE CAUSE OF USING A COMPUTER
1. Piracy
Piracy is the unauthorized reproduction or use of a copyrighted material, book, recording, television program, patented invention, trademarked product, etc. In Nigeria, much software is pirated.
The use of pirated software is a violation of the manufacturer’s license agreement and it is a criminal offence to use pirated software
Computer crime or cyber crime described as the crime committed by means of computers or the internet. Examples of cyber crime are internet fraud, identity theft, hacking etc.
Identity theft is a cybercrime that involves stealing of someone else’s identity by pretending to be the actual person.
A common form of identity theft is the ATM/credit card theft whereby a person‘s ATM pin is used to withdraw on behalf of the account holder without their authorization.
Hacking is the unauthorized use of computer and network resources. The person who consistently engages in hacking activities as a lifestyle is called a hacker. A common example of a method used by hackers is an email with a program that either automatically runs, or that runs when the attachment is clicked.
COMPUTER ETHICS
Ethics is a set of moral principles that govern the behavior of a group of individual.
Computer ethics is a set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights such as copyrighted electronic content, privacy concerns, and how computers affect society.
For example, while it is easy to duplicate copyrighted electronic or digital content, computer ethics would suggest that it is wrong to do so without the author approval and while it may be possible to access someone’s personal information on the computer system, computer ethics would advise that such action is unethical.
As technology advances, computers continue to have a greater impact on society. Therefore, computer ethics promote the discussion of how much influence computers should have in areas such as artificial intelligence and human communication. As the world of computer evolves, computer ethics continuous to create ethical standards that address new issues raised by new technologies.
EVALUATION: 1. List and explain four legal issues that could arise in the cause of using a computer
CLASSWORK: As in evaluation
CONCLUSION: The teacher commends the students positively