Skip to main content
Workforce LibreTexts

8.3: Ethical Issues Related to Internet Usage and AI in Education

  • Page ID
    32025
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)

    ( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\id}{\mathrm{id}}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\kernel}{\mathrm{null}\,}\)

    \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\)

    \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\)

    \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    \( \newcommand{\vectorA}[1]{\vec{#1}}      % arrow\)

    \( \newcommand{\vectorAt}[1]{\vec{\text{#1}}}      % arrow\)

    \( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vectorC}[1]{\textbf{#1}} \)

    \( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)

    \( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)

    \( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)

    \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)
    Section Learning Objectives
    • Identify ethical issues related to internet and AI usage in educational settings.
    • Identify strategies for creating ethical digital citizens in educational settings.

    Ethical Considerations

    As the world becomes more digital, understanding and following internet ethics is extremely important. Internet ethics is basically the code of responsible behavior for our online interactions and activities. This concept covers a wide range, from how we communicate with others to how we share content and protect personal data. In a time when our online presence matters as much as our physical one, these ethical considerations are key to upholding values like integrity, respect, and security. Grasping the essence of internet ethics is not just about knowing what to do and avoid. It’s about creating a safe and respectful digital environment for everyone.

    As we have discussed in earlier chapters, AI is a topic that is now becoming integrated in educational technology.  As someone who will be or is already working in an educational setting, you will want to be aware of some of the ethical considerations in AI.  Although, the following video is a couple of years old, however the concepts are relevant today. Bias, Privacy, Control, Power Balance, Intellectual Property, and Environmental Impact.

    The biggest ethical challenges for Artificial Intelligence (2021). [Video: 10:41.]

    Privacy and Data Security

    As we discussed before, privacy and data security are very important, especially in education. Today's connected world has risks like identity theft, unauthorized data collection, and hacking. We don't want students exposed to these risks in our teaching. 

    Imagine a student innocently shares personal details online while researching for a class presentation. This could lead to serious privacy breaches. Educators play a key role in addressing these challenges. They can teach students the importance of maintaining digital privacy. For example, they can build lessons on safe online practices into their curriculum.

    Strategies like holding workshops on spotting phishing attempts, advising against using unsecured Wi-Fi for sensitive activities, and promoting awareness of long-term digital footprints can be very effective. By empowering students with knowledge and tools to protect their online privacy and data, educators can create a safer digital environment.

    Cyber Bullying and Harassment

    As educators, one of our goals is to keep students safe online. Students can encounter cyberbullying and harassment. We want to be aware of these issues. Cyberbullying and harassment are a growing problem in the digital world. They involve using electronic communication to intimidate, threaten, or humiliate people. Examples include sending threatening emails, spreading rumors online, or posting harmful content about someone on social media. The effects of cyberbullying can be serious and long-lasting, hurting people's mental health and wellbeing. One common situation is when students are targeted by peers on social media. This could involve posting rude comments, sending abusive messages, or creating fake profiles to damage reputations.

    Addressing cyber bullying and harassment requires a multifaceted approach, especially in educational settings. Instructors can play a pivotal role in combating this issue through several strategies (ASPA, 2021):

    • Education and Awareness: Educators should inform students about what constitutes cyber bullying and the severe impact it can have on individuals. This can be achieved through dedicated sessions, workshops, or integrating the topic into the curriculum.
    • Creating a Supportive Environment: Schools and educational institutions should foster a culture where students feel safe to report instances of cyber bullying. This involves establishing clear reporting mechanisms and ensuring that reports are taken seriously and handled sensitively.
    • Implementing Policies: Developing and enforcing a comprehensive anti-bullying policy can serve as a deterrent and provide clear guidelines on the consequences of engaging in such behavior.
    • Encouraging Positive Online Behavior: Instructors can lead by example and encourage positive interactions online. They can also recognize and highlight instances where students use social media and other digital platforms in a respectful and constructive manner.
    • Empowering Bystanders: Often, bystanders can play a crucial role in stopping cyber bullying. Educators can train students to recognize cyber bullying and empower them to stand up against it, whether by supporting the victim or reporting the behavior.
    • Providing Support to Cyber Bullying Victims: It’s essential to offer support and share counseling resources to victims of cyber bullying, helping them cope with the emotional stress and trauma it can cause.
    References

    American University. (2022, October 26). Promoting digital citizenship for students. School of Education Online.

    Marr, B. (2021, August 16). The biggest ethical challenges for Artificial Intelligence. YouTube.

    Assistant Secretary for Public Affairs (ASPA). (2021, November 10). Prevent cyberbullying. StopBullying.gov. US Department of Health and Human Services.

     


    • Was this article helpful?