Safe & ethical USE OF THE INTERNET

advertisement
SAFE & ETHICAL USE OF
TECHNOLOGY
“A SIMPLE WAY OF DEFINING AN ‘ETHICAL ACTION’
IS THAT SUCH AN ACTION DOES NOT HAVE A
DAMAGING IMPACT ON ONESELF, OTHER
INDIVIDUALS, OR SOCIETY.” (JOHNSON, 2012)
COMPUTER SAFETY

VIRUSES
•
DO NOT OPEN ANY
•
DOWNLOAD A VIRUS PROTECTION PROGRAM AND SET IT TO
SCAN YOUR COMPUTER REGULARLY, ESPECIALLY IF YOU HAVE A

HARDWARE
UNEXPECTED EMAIL ATTACHMENTS OR
DOWNLOAD ANY PROGRAMS FROM UNKNOWN SOURCES.
SECURITY
•
COMPUTERS SHOULD BE POSITIONED IN A SAFE PLACE
CORDS AND CABLES COVERED.
•
DO NOT OPEN THE PROTECTIVE CASE. LEAVE ANY
QUALIFIED TECHNICIAN.
WITH
REPAIRS TO A
LAPTOP OR DESKTOP COMPUTER YOU USE BOTH AT HOME AND AT
SCHOOL..


DATA PRIVACY

Personal Privacy
• Nothing online is private.
• Never give your social security number over the Internet.
Be very careful to whom you supply your telephone
number, e-mail address, mailing address, and other
personal information.
• When making a purchase using a credit card on the
Internet, make sure the site is reputable and ‘‘secure.’’ A
secure site’s address will begin with ‘‘https’’rather than
simply ‘‘http.’’
• No posting of photographs or student work on the school
Web site unless a permission slip is signed by the parent.
Students’ last names, e-mail addresses, or other
identifying information will not appear on the school Web
site.
• Students need to recognize that school-provided e-mail
accounts, file storage space, and log-ins and usage logs
may be viewed by school authorities and law
enforcement officers if necessary.
Passwords
• Should be unique for each application
• Should be changed on a regular, frequent basis
• Should be composed of both letters and numbers for
highest security
• Should be composed of a string of characters not
found in a dictionary
• Should be kept in a secure place if written down
• Should never be given to anyone else, especially other
students

School Internet Acceptable Use Policy
•
Know it and abide by it.
SOCIAL NETWORKING
DOS
•
POST ONLY WHAT YOU WANT THE WORLD TO SEE. IMAGINE YOUR
PARENTS, TEACHERS, ADMINISTRATORS AND FUTURE EMPLOYERS
VISITING YOUR SITE. ON A SOCIAL NETWORKING SITE, ONCE YOU POST
SOMETHING IT MAY BE AVAILABLE EVEN AFTER YOU HAVE REMOVED IT FROM
YOUR ACCOUNT—PHOTOS OR COMMENTS MAY BE SHARED WIDELY IN
ONLY MINUTES—AND CAN NEVER BE RECOVERED.
•
VISIT YOUR PROFILE’S SECURITY AND PRIVACY SETTINGS. AT A MINIMUM,
STUDENTS SHOULD HAVE ALL PRIVACY SETTINGS SET TO ‘‘ONLY FRIENDS.’’
MAKING YOUR INFORMATION VISIBLE TO ‘‘FRIENDS OF FRIENDS’’ AND
‘‘NETWORKS AND FRIENDS’’ OPENS YOUR CONTENT TO A LARGE GROUP OF
UNKNOWN PEOPLE. YOUR PRIVACY AND THAT OF YOUR FAMILY MAY BE AT
RISK.
•
DUE TO SECURITY RISKS, BE CAUTIOUS WHEN INSTALLING THE EXTERNAL
APPLICATIONS THAT WORK WITH THE SOCIAL NETWORKING SITE. EXAMPLES
OF THESE APPLICATIONS ARE CALENDAR PROGRAMS AND GAMES.
•
RUN UPDATED MALWARE PROTECTION TO AVOID INFECTIONS OF SPYWARE
•
BE CAREFUL NOT TO FALL FOR PHISHING SCAMS THAT ARRIVE VIA E-MAIL OR
ON YOUR WALL, PROVIDING A LINK FOR YOU TO CLICK THAT LEADS TO A
FAKE LOG-IN PAGE.
AND ADWARE THAT SOCIAL NETWORKING SITES MIGHT PLACE ON YOUR
COMPUTER.
DON’TS
•
DO NOT INITIATE FRIENDSHIPS WITH TEACHERS.
•
DO NOT ACCEPT PEOPLE YOU DO NOT KNOW AS
FRIENDS. REMEMBER THAT PEOPLE CLASSIFIED AS FRIENDS
HAVE THE ABILITY TO DOWNLOAD AND SHARE YOUR
INFORMATION WITH OTHERS.
•
DO NOT DISCUSS OTHER STUDENTS OR
SCHOOL POLICIES OR PERSONNEL.
•
DO NOT USE COMMENTARY DEEMED TO BE DEFAMATORY,
OBSCENE, PROPRIETARY, OR LIBELOUS. EXERCISE CAUTION IN
REGARD TO EXAGGERATION, COLORFUL LANGUAGE,
GUESSWORK, OBSCENITY, COPYRIGHTED MATERIALS, LEGAL
CONCLUSIONS, AND DEROGATORY REMARKS OR
CHARACTERIZATIONS.
PUBLICLY CRITICIZE
COPYRIGHT GUIDELINES
PRINTED MATERIAL(SHORT)
•
•
ONE POEM LESS THAN 250 WORDS, OR
A 250-WORD EXCERPT OF A POEM
GREATER THAN 250 WORDS
•
PHOTOGRAPH
•
ILLUSTRATION
UP TO 10 PERCENT OR 1,000 WORDS,
WHICHEVER IS LESS, OF A SINGLE
•
COLLECTIONS OF PHOTOGRAPHS
•
COLLECTIONS OF ILLUSTRATIONS
COPYRIGHTED WORK OF TEXT
•
•
ILLUSTRATIONS AND PHOTOGRAPHS
ONE CHART, PICTURE, DIAGRAM, OR
CARTOON PER BOOK OR PER PERIODICAL
ISSUE
TWO
PAGES (MAXIMUM) FROM AN
ILLUSTRATED WORK LESS THAN 2,500
WORDS (E.G., A CHILDREN’S BOOK)
STUDENTS CAN INCORPORATE TEXT
INTO A MULTIMEDIA PROJECT
*COPIED TEXT MUST BE PROPERLY
CITED
SINGLE WORKS MAY BE USED IN THEIR
ENTIRETY, BUT NO MORE THAN FIVE
IMAGES BY A SINGLE ARTIST OR
PHOTOGRAPHER MAY BE USED
FROM A COLLECTION, NO MORE THAN
15 IMAGES OR 10% (WHICHEVER IS
LESS) MAY BE USED
CHECK TO MAKE SURE OLDER
ILLUSTRATIONS ARE NOT PART OF A
COPYRIGHT COLLECTION.
COPYRIGHT OWNERSHIP INFORMATION
IS AVAILABLE AT WWW.LOC.GOV OR
WWW.MPA.ORG
Video (for integration into
multimedia or video projects)
• Videotapes (purchased)
• DVDs
• Laserdiscs
• Multimedia encyclopedias
• Quick Time Movies
• Video clips from the Internet
Students “may use portions of lawfully
acquired copyrighted
works in their academic multimedia”
10% or three minutes (whichever is less)
of “motion media”
• Material must be a legal copy or a
home recording
• Copyrighted works included in
multimedia projects must be cited
properly.
COPYRIGHT GUIDELINES -CONTINUED
MUSIC (FOR
INTEGRATION INTO
MULTIMEDIA OR VIDEO PROJECTS)
•
RECORDS
•
CASSETTE TAPES
•
CDS
•
AUDIO CLIPS ON THE WEB
UP TO 10% OF A COPYRIGHTED
COMPUTER SOFTWARE
•
SOFTWARE (PURCHASED)
•
SOFTWARE (LICENSED)
COPIES MAY ONLY BE MADE FOR ARCHIVAL
PURPOSES, FOLLOWING THE SOFTWARE
APPLICATION’S END USER LICENSE
AGREEMENT.
MUSICAL COMPOSITION MAY BE
REPRODUCED, PERFORMED, AND
DISPLAYED AS PART OF A
MULTIMEDIA PROGRAM.
ONLY ONE MACHINE AT A TIME MAY USE THE
PROGRAM .
A MAXIMUM OF 30 SECONDS PER
THE NUMBER OF MACHINES BEING USED MUST
NEVER EXCEED THE NUMBER LICENSED.
MUSICAL COMPOSITION MAY BE
USED.
ALTERATIONS TO A MUSICAL WORK
SHOULD NOT CHANGE THE BASIC
MELODY OR THE FUNDAMENTAL
CHARACTER OF THE WORK.
THE NUMBER OF SIMULTANEOUS USERS MUST
NOT EXCEED THE NUMBER OF LICENSES; AND
Internet
•
Internet connections
•
World Wide Web
Images may be downloaded for
projects
Sound files and video files may be
downloaded for use in multimedia
projects (see portion restrictions).
• Resources from the Web may not be
reposted onto the Internet; however,
links may be posted.
• Downloaded resources must have
been legitimately acquired by
the Web site.
METHODS FOR CHECKING FOR PLAGIARISMTHE "WRONGFUL APPROPRIATION" AND "PURLOINING AND PUBLICATION" OF ANOTHER AUTHOR'S "LANGUAGE, THOUGHTS,
IDEAS, OR EXPRESSIONS," AND THE REPRESENTATION OF THEM AS ONE'S OWN ORIGINAL WORK (WIKIPEDIA.COM)
1. The most common method of detecting plagiarism relies on the ability of a
teacher to make deductions about the probability of plagiarism on the basis of internal clues
embedded in the text itself. An assessor can only confirm an initial suspicion of plagiarism by
manually matching the suspected plagiarisms to the original sources. (Kakkonen & Mozgovov,
2010)
2. An assessor manually inserts parenthesized extracts from a suspected text into a search
engine.
3. Automatic plagiarism detection software, such as: Turnitin, Sherlock, SafeAssignment,
WCopyfind, Antiplagiarist –compares text with database of papers.
PROPER CITATION METHODS
Basic guidelines for formatting citations in the text
• Place the complete citation within parentheses.
• Use the words in the first part of the citation exactly as they appear in the References so that the source in the text
can easily be located in the References.
• Use the author’s last name and year for the citation: (Smith, 2008). Use et al. for additional citations of a source
with three to five authors: first citation – (Smith, Levy, & Jones, 2008), additional citations – (Smith et al., 2008). Use
et al. along with the first author in the citation when a source has more than five authors: (Smith et al., 2008).
• Place the year in the citation, but do not include the month and day.
• Use only the last name of the author, and never include the first name or initials except in a personal
communication.
• Place the name of a group author (corporations, organizations, and government agencies) first when no
individual author is listed in the source.
• Use the first two or three words of the title of the work when no author is listed: (Writing Executive Summaries, 2007)
or (“Evaluating a Case Study,” 2008). Capitalize all major words of the title.
• Use italics for titles of books, periodicals, movies, television shows, and reports. Use quotation marks for titles of
articles, chapters, or web pages.
• Include the page or paragraph number for a direct quotation: p. or pp. for page numbers, para. for paragraph
numbers. You can also use the section heading of the document if needed. It is recommended that you include
page or paragraph numbers with your paraphrases.
• Place any necessary punctuation after the final parenthesis of the citation unless it is a block quotation.
• Never use a URL address in the citation.
• Cite your work if you are referencing work from a previous document.
PROPER CITATION METHODS - CONTINUED
Basic guidelines for formatting the References page
• Place the references in alphabetical order in one list. (Do not number references or separate them into
categories.)
• Use periods to separate each major element in the reference: Name, A. (Year). Article title. Journal
Title, 24(4), 13-16.
• Include the author’s last name and first and middle initials: Smith, G. Q. (Always use initials instead of
authors’ first/middle names.)
• Use ellipses between the sixth and final author’s name when the source has more than eight authors:
Smith, G. Q., Levy, J., Jones, B., Arthur, N. S., Banks, E., Adam, C., . . . Arnold, A.
• Place the year in parentheses after the author’s name: Smith, G. Q. (2008). If no year is available, put
(n.d.) in parentheses. Include the month or season with the copyright for magazine articles (2010,
March) or (2011, Summer). Include the month and day for newspaper articles (2009, May 7) .
• Place the title of a book or article first when no author is listed in the source.
• Capitalize the following elements of the first title mentioned in the reference: first word, proper nouns,
and the first word after a colon or a dash.
• Capitalize all major words of the second title mentioned in the reference (e.g., journal titles,
newspaper titles, book titles)
• Use italics for titles of books, journals, newspapers, movies, and long reports or studies.
• Never use quotation marks or italics for article titles.
• Include a retrieval date only for Internet sources that contain content that can change over time,
such as Wikis.
• Use the DOI number for electronic sources rather than the name of a database: doi:xxxxxx. If the
document does not contain a DOI number, use the URL of the publisher’s home page: Retrieved from
http://www.xxxxxx. (Do not use periods at the end of a DOI number or URL address.)
• Include database retrieval information only for sources with limited circulation.
• Never include a source that is not mentioned in the paper.
REFERENCES
Brown, V., Jordan, R., Rubin, N., & Arome, G. (2010). Strengths and Weaknesses of Plagiarism
Software. Journal Of Literacy & Technology, 11(1/2), 110-131.
Center for Writing Excellence. University of Phoenix Online.
Johnson, D. (2012) The Classroom Teacher’s Technology Survival Guide.San Francisco, CA:John
Wiley and Sons.
Kakkonen, T., & Mozgovoy, M. (2010). Hermetic and Web Plagiarism Detection Systems for
Student Essays—an Evaluation of the State-of-the-Art. Journal Of Educational Computing
Research, 42(2), 135-159. doi:10.2190/EC.42.2.a
Virginia International University. Copyright and Fair Use Guidelines for Students. Retrieved from
http://kohlerconics.webs.com/Copyright%20Guidelines%20for%20Students.pdf
Wikipedia.com
Download