SlideShare a Scribd company logo
1 of 8
Internet Usage   1


Running Head: INTERNET USAGE AT SCHOOL




            Internet Usage at School – The Challenges of a Web 2.0 World

                          Mary “Nicole” Bennett Wingate

                            Georgia Southern University

                                    FRIT 7132
Internet Usage   2


                                            Abstract

This paper focuses on the obstacles and challenges created by the Web 2.0 World. It addresses

Internet filters and Acceptable Use Policies when determining the best way to educate students in

a technology centered world. The paper suggests teachers embrace the opportunities created

through new technology, rather than banning it for fear of inappropriate use.
Internet Usage     3


       The look and focus of today’s media center is drastically different from the media center

during the Leave it to Beaver era. Years ago, students went to the media center to check out

books, find resource information from encyclopedias, or read in a cozy corner. Today, students

visit the media center to print out their research papers, use Galileo to find information on their

research topic, or use Internet sites to prepare for tests; or at least that’s what we, educators, want

our students to visit the media center for. All too often though we catch students finding a

“backdoor” into MYSPACE, or playing an online hunting game when they still have three pages

of a research paper to complete that, by the way, is due the next day. With all of the

opportunities the Internet has provided for education, it has definitely created some roadblocks as

well. So, how do we overcome these roadblocks to ensure our students are receiving the

technology-focused education they need, without distracting or endangering themselves? And

more importantly, how do we tell the difference between an “opportunity” and a “roadblock”?

       The all too common answer to this Internet usage issue has become the installation and

use of an Internet filter. Internet filters can be used to block inappropriate or unwanted sites off

of school computers and thereby gives educators more control over what students can access

from a federally funded school computer. However, there are issues. First off, there are sites

that help students get around these school filters. As Doug Johnson states in his article “Rules

for the Social Web” (2007), “Do you know about SchoolBoredom.com? Trust me; your kids do

– and they use it and other blocker-busting sites” (p. 11). Websites like SchoolBoredom.com

allow students access to sites that are typically blocked on school computers. Therefore, when a

student uses a “backdoor” site such as this, the effectiveness of the Internet filter is greatly

reduced. And not only are Internet filters easy to “hack,” they also have problems with the

materials they do sensor. Filters come with a setting that allows the user to determine how
Internet Usage    4


restrictive they are in allowing site access. A common misconception is that the more restrictive

the filters are, the safer the Internet experience becomes for the student. However, filters that are

set at levels that are too restrictive not only restrict the inappropriate sites students are allowed to

access, but they often times restrict the educationally sound sites as well. For example, students

at my school are commonly asked to include pictures in their presentations. One particular

example I remember was when the Spanish students were asked to find pictures of common

household furniture and label them in Spanish. However, any image search on Google was

blocked by the Internet filter. The students therefore had a harder time finding images to use on

their poster boards. In this case, the Internet filter actually hinders the educational process rather

than making it safer.

        A second “answer” to the Internet usage issue that often accompanies these Internet

filters is an Acceptable Use Policy (AUP). Students are commonly presented with these on the

first day of school. The policy outlines acceptable use of computers, technology, and the Internet

while on campus. Students are asked to sign the policy, have a parent sign it, and return it to

school administration. However, students often forget to have these policies signed, and as a

result, are not allowed to access the Internet. So how does a teacher conduct Internet research in

the library when half of her class is not allowed to use the computer? This issue is addressed by

Judi Repman when she states (2008), “I noticed that the media specialist was doing searches in

the OPAC and GALILEO for some students and handing them the print outs…When I asked

why I was told that she had to do this for students who didn’t have a signed AUP” (par. 2). Is

this really supplying students with the technology-based education that they deserve? Simply

because a student forgets to have a paper signed, he or she is denied the right to learn and

practice the information literacy skills crucial for success in today’s world. Though this poses a
Internet Usage     5


fundamental problem for educators, Acceptable Use Policies are not only problematic when they

are not signed and returned by students. As Dr. Repman points out, they are often outdated.

And as Doug Johnson points out, their language is often times broad and open to interpretation.

So even when AUPs are appropriately completed and returned to school administrators, they are

problematic. Therefore, Acceptable Use Policies are not the “answer” to the Internet usage

dilemma.

       And one final issue that is affected by both the Internet filters and a school’s Acceptable

Use Policy is email. Often times students are not allowed to check their emails at school, and if

they are, it has to be under direct supervision of a teacher. This “supervision” issue has created

some schools to designate particular computers as “email access” computers, as is the case in

Mrs. Hamilton and Mrs. Fleet’s media center. In their recent blog, they state (2008), “If you

have forgotten your flash drive and have an email emergency, please see Mrs. Hamilton or Mrs.

Fleet – you may use Station 21 to get homework or essays off email…Be aware, though, that

some of the student profile restrictions may disable you from downloading attached files” (par.

1-2). So even when students can access their email, other acceptable use restrictions prohibit

them from downloading attachments. Email access is not the only Internet asset being blocked,

sites likes MySpace and Facebook are also blacklisted, despite the advantages these networking

tools could provide for education. At my former school, though email was not outlawed in the

AUP, all major email providers were blocked. When students were working on their research

papers, I commonly had to open my email on ten to fifteen student computers to email rough

drafts from school computers to students’ emails. Students could then make changes and work

on their papers at home. Then, if they needed to open their papers from email at school, they

would have to email their papers to my school account. This entire process was faulty and time
Internet Usage   6


consuming. Instead of spending time during the class period assisting students with sentence

structure or reliable source questions, I was spending half of the class period emailing papers,

just as Mrs. Hamilton and Mrs. Fleet are forced to spend their time supervising student email in

the media center. There has to be a better answer!

       So what is it? How do we provide students with a safe and productive Internet

environment? By making sensible decisions and creating sensible policies concerning the

Internet and technology in general. Though the Internet filters create some problems, these

problems could be drastically reduced by heightened teacher monitoring while using less

restrictive filtering levels. Doug Johnson also believes this approach is best , which is proven

when he states (2007), “…we would install a filter, but it would be set at its least restrictive

setting…Adults monitor student access to the Internet as if no filter were present” (p. 12). This

change would also create a higher-sense of responsibility for student users, and we all know

when more is expected of students, more is produced by them. These less restrictive Internet

filters could work with updated and precise Acceptable Use Policies that explicitly state what is

expected of students. Also, encouraging students to bring back AUPs by offering incentives to

those who do, like entry into a raffle for a free IPOD, would definitely be more productive than

just threatening students who don’t return signed AUPs. And finally, email could be provided

through the school system. Include in the AUP that email should be appropriate, and place

responsibility on the students to use it appropriately. No, I know everyone won’t follow the

rules, but a certain sense of pride and expectancy comes with being trusted to have your own

school email, and the students will respond to that.

       So ultimately, educators simply need to refine what they are already doing. Though the

original Internet usage policies and strategies were created with good intentions, somewhere
Internet Usage    7


along the way, they lost their effectiveness. Web 2.0 tools are there, and students use them

outside of school. It should ultimately be every educator’s goal to implement these exciting and

innovative new tools into classroom curriculum. Why not let a student create a blog entry

instead of a journal entry if she feels more comfortable doing that? With technology, the

possibilities are endless! If used appropriately, both at school and at home, technology will

expand our students’ knowledge and provide countless opportunities rather than creating a

roadblock to their success.
Internet Usage   8


                                         References

Fleet and Hamilton. (2008). Do You Have the Email Blues? Retrieved November 29, 2008,

       from: http://theunquietlibrary.wordpress.com/2008/03/17/do-you-have-the-email-blues/

Johnson, Doug. (2007). Rules for the Social Web. Threshold, Summer 2007, 9-12.

Repman, Judi. (2008). Acceptable Use Policies in the 21st Century. Retrieved November 29,

       2008, from:

       http://glma.wordpress.com/2008/01/18/acceptable-use-policies-in-the-21st-century/

More Related Content

What's hot

INTERNET AND ITS IMPACT ON STUDENT PERFORMANCE
INTERNET AND ITS IMPACT ON STUDENT PERFORMANCEINTERNET AND ITS IMPACT ON STUDENT PERFORMANCE
INTERNET AND ITS IMPACT ON STUDENT PERFORMANCEArshad Ahmed Saeed
 
Acceptable Internet Use In Schools
Acceptable Internet Use In SchoolsAcceptable Internet Use In Schools
Acceptable Internet Use In Schoolsvlferrari
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computingsappingtonkr
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomGabriella Maree Wheeler
 
Copyright policy critique
Copyright policy critiqueCopyright policy critique
Copyright policy critiqueLaurie Roberts
 
Why cell phones
Why cell phonesWhy cell phones
Why cell phoneselizkeren
 
Cyberethics accompanying text
Cyberethics accompanying text Cyberethics accompanying text
Cyberethics accompanying text Geoffrey Lowe
 
Filtering.pete
Filtering.peteFiltering.pete
Filtering.petekadair26
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriersJohn Oxley
 
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueNL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueMichael Barbour
 
Cybersafety
Cybersafety Cybersafety
Cybersafety Sue Noor
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomMrs.Faust
 
Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingDr. Conrath
 
Macul2011 text
Macul2011 textMacul2011 text
Macul2011 textelizkeren
 
Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technologypeav1n0
 
Internet Filtering and Blocking
Internet Filtering and BlockingInternet Filtering and Blocking
Internet Filtering and BlockingJoshua Sparks
 

What's hot (19)

INTERNET AND ITS IMPACT ON STUDENT PERFORMANCE
INTERNET AND ITS IMPACT ON STUDENT PERFORMANCEINTERNET AND ITS IMPACT ON STUDENT PERFORMANCE
INTERNET AND ITS IMPACT ON STUDENT PERFORMANCE
 
Acceptable Internet Use In Schools
Acceptable Internet Use In SchoolsAcceptable Internet Use In Schools
Acceptable Internet Use In Schools
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroom
 
Copyright policy critique
Copyright policy critiqueCopyright policy critique
Copyright policy critique
 
Why cell phones
Why cell phonesWhy cell phones
Why cell phones
 
WORST ACADEMIC WRITING
WORST ACADEMIC WRITING WORST ACADEMIC WRITING
WORST ACADEMIC WRITING
 
Cyberethics accompanying text
Cyberethics accompanying text Cyberethics accompanying text
Cyberethics accompanying text
 
Filtering.pete
Filtering.peteFiltering.pete
Filtering.pete
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueNL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
 
Cybersafety
Cybersafety Cybersafety
Cybersafety
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the Classroom
 
Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullying
 
Payne aup keynote
Payne   aup keynotePayne   aup keynote
Payne aup keynote
 
Macul2011 text
Macul2011 textMacul2011 text
Macul2011 text
 
Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technology
 
Acceptable use policy__ecomp_6204
Acceptable use policy__ecomp_6204Acceptable use policy__ecomp_6204
Acceptable use policy__ecomp_6204
 
Internet Filtering and Blocking
Internet Filtering and BlockingInternet Filtering and Blocking
Internet Filtering and Blocking
 

Viewers also liked

Wingate instructional partner collaboration lesson plan
Wingate instructional partner collaboration lesson planWingate instructional partner collaboration lesson plan
Wingate instructional partner collaboration lesson planNicole Wingate
 
Etude du ecommerce dans le Rhin
Etude du ecommerce dans le RhinEtude du ecommerce dans le Rhin
Etude du ecommerce dans le RhinBenoit Gaillat
 
Présentation1
Présentation1Présentation1
Présentation1celinnnou
 
Wingate Learner Analysis
Wingate Learner AnalysisWingate Learner Analysis
Wingate Learner AnalysisNicole Wingate
 
Wingate 2010 Materials Order
Wingate 2010 Materials OrderWingate 2010 Materials Order
Wingate 2010 Materials OrderNicole Wingate
 

Viewers also liked (7)

Wingate instructional partner collaboration lesson plan
Wingate instructional partner collaboration lesson planWingate instructional partner collaboration lesson plan
Wingate instructional partner collaboration lesson plan
 
Etude du ecommerce dans le Rhin
Etude du ecommerce dans le RhinEtude du ecommerce dans le Rhin
Etude du ecommerce dans le Rhin
 
Open questions to 09
Open questions to 09Open questions to 09
Open questions to 09
 
Présentation1
Présentation1Présentation1
Présentation1
 
Wingate Learner Analysis
Wingate Learner AnalysisWingate Learner Analysis
Wingate Learner Analysis
 
Wingate 2010 Materials Order
Wingate 2010 Materials OrderWingate 2010 Materials Order
Wingate 2010 Materials Order
 
2010 media self eval
2010 media self eval2010 media self eval
2010 media self eval
 

Similar to Wingate Policy Paper

Recommendation Report
Recommendation ReportRecommendation Report
Recommendation ReportARKTURO
 
The revised draft (RD2) is the culminating assignment of our second
The revised draft (RD2) is the culminating assignment of our second The revised draft (RD2) is the culminating assignment of our second
The revised draft (RD2) is the culminating assignment of our second jacvzpline
 
Webliography: J.Cope
Webliography: J.CopeWebliography: J.Cope
Webliography: J.Copeguest035174
 
What are the Pros and Cons on how Technology has changed teaching te.pdf
What are the Pros and Cons on how Technology has changed teaching te.pdfWhat are the Pros and Cons on how Technology has changed teaching te.pdf
What are the Pros and Cons on how Technology has changed teaching te.pdfarihantmobilepoint15
 
Internet In The Classroom
Internet In The ClassroomInternet In The Classroom
Internet In The Classroomguest5afae7
 
Impact of Computers in Education
Impact of Computers in EducationImpact of Computers in Education
Impact of Computers in EducationMohammadSamiUllah15
 
A TOUR OF THE STUDENT’S E-LEARNING PUDDLE
A TOUR OF THE STUDENT’S E-LEARNING PUDDLEA TOUR OF THE STUDENT’S E-LEARNING PUDDLE
A TOUR OF THE STUDENT’S E-LEARNING PUDDLEacijjournal
 
Topic 5 Aup
Topic 5  AupTopic 5  Aup
Topic 5 AupBlair E
 
What is the future of online learning
What is the future of online learningWhat is the future of online learning
What is the future of online learningSakshiJain416116
 
Computers in the Classroom
Computers in the ClassroomComputers in the Classroom
Computers in the Classroomguestb1be291
 
The advantages and disadvantages of online learning
The advantages and disadvantages of online learningThe advantages and disadvantages of online learning
The advantages and disadvantages of online learningJanna8482
 
Computers In The Classroom
Computers In The ClassroomComputers In The Classroom
Computers In The Classroomguestb1be291
 
Computers in the Classroom
Computers in the ClassroomComputers in the Classroom
Computers in the Classroomguestb1be291
 
Running head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS .docx
Running head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS              .docxRunning head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS              .docx
Running head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS .docxcharisellington63520
 
The benefits and detrimental effects of internet on students email
The benefits and detrimental effects of internet on students   emailThe benefits and detrimental effects of internet on students   email
The benefits and detrimental effects of internet on students emailwan zakaria wan rosli
 
Your Last Name 6Your NameYour Teacher’s NameCourse Number.docx
Your Last Name 6Your NameYour Teacher’s NameCourse Number.docxYour Last Name 6Your NameYour Teacher’s NameCourse Number.docx
Your Last Name 6Your NameYour Teacher’s NameCourse Number.docxdanielfoster65629
 
THE WEB-BASED EDUCATION JOURNEY: A CONSTANT LIFELINE
THE WEB-BASED EDUCATION JOURNEY: A CONSTANT LIFELINETHE WEB-BASED EDUCATION JOURNEY: A CONSTANT LIFELINE
THE WEB-BASED EDUCATION JOURNEY: A CONSTANT LIFELINEcscpconf
 

Similar to Wingate Policy Paper (20)

Recommendation Report
Recommendation ReportRecommendation Report
Recommendation Report
 
WebQuest PowerPoint
WebQuest PowerPointWebQuest PowerPoint
WebQuest PowerPoint
 
LifelongLearning_EmergentTech
LifelongLearning_EmergentTechLifelongLearning_EmergentTech
LifelongLearning_EmergentTech
 
The revised draft (RD2) is the culminating assignment of our second
The revised draft (RD2) is the culminating assignment of our second The revised draft (RD2) is the culminating assignment of our second
The revised draft (RD2) is the culminating assignment of our second
 
Webliography: J.Cope
Webliography: J.CopeWebliography: J.Cope
Webliography: J.Cope
 
What are the Pros and Cons on how Technology has changed teaching te.pdf
What are the Pros and Cons on how Technology has changed teaching te.pdfWhat are the Pros and Cons on how Technology has changed teaching te.pdf
What are the Pros and Cons on how Technology has changed teaching te.pdf
 
Internet In The Classroom
Internet In The ClassroomInternet In The Classroom
Internet In The Classroom
 
Impact of Computers in Education
Impact of Computers in EducationImpact of Computers in Education
Impact of Computers in Education
 
A TOUR OF THE STUDENT’S E-LEARNING PUDDLE
A TOUR OF THE STUDENT’S E-LEARNING PUDDLEA TOUR OF THE STUDENT’S E-LEARNING PUDDLE
A TOUR OF THE STUDENT’S E-LEARNING PUDDLE
 
Topic 5 Aup
Topic 5  AupTopic 5  Aup
Topic 5 Aup
 
What is the future of online learning
What is the future of online learningWhat is the future of online learning
What is the future of online learning
 
Computers in the Classroom
Computers in the ClassroomComputers in the Classroom
Computers in the Classroom
 
The advantages and disadvantages of online learning
The advantages and disadvantages of online learningThe advantages and disadvantages of online learning
The advantages and disadvantages of online learning
 
Computers In The Classroom
Computers In The ClassroomComputers In The Classroom
Computers In The Classroom
 
Computers in the Classroom
Computers in the ClassroomComputers in the Classroom
Computers in the Classroom
 
Running head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS .docx
Running head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS              .docxRunning head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS              .docx
Running head HOW TECHNOLOGY AFFECT COLLEGE STUDENTS .docx
 
Lesson 3 ethical issues
Lesson 3   ethical issuesLesson 3   ethical issues
Lesson 3 ethical issues
 
The benefits and detrimental effects of internet on students email
The benefits and detrimental effects of internet on students   emailThe benefits and detrimental effects of internet on students   email
The benefits and detrimental effects of internet on students email
 
Your Last Name 6Your NameYour Teacher’s NameCourse Number.docx
Your Last Name 6Your NameYour Teacher’s NameCourse Number.docxYour Last Name 6Your NameYour Teacher’s NameCourse Number.docx
Your Last Name 6Your NameYour Teacher’s NameCourse Number.docx
 
THE WEB-BASED EDUCATION JOURNEY: A CONSTANT LIFELINE
THE WEB-BASED EDUCATION JOURNEY: A CONSTANT LIFELINETHE WEB-BASED EDUCATION JOURNEY: A CONSTANT LIFELINE
THE WEB-BASED EDUCATION JOURNEY: A CONSTANT LIFELINE
 

More from Nicole Wingate

Wchs march media report
Wchs march media reportWchs march media report
Wchs march media reportNicole Wingate
 
Wingate 2010 materials order
Wingate 2010 materials orderWingate 2010 materials order
Wingate 2010 materials orderNicole Wingate
 
Wingate 2010 collection development plan
Wingate 2010 collection development planWingate 2010 collection development plan
Wingate 2010 collection development planNicole Wingate
 
Wingate jep reference order
Wingate jep reference orderWingate jep reference order
Wingate jep reference orderNicole Wingate
 
Wingate jep reference order
Wingate jep reference orderWingate jep reference order
Wingate jep reference orderNicole Wingate
 
Evaluation of the reference collection at jesup elementary school
Evaluation of the reference collection at jesup elementary schoolEvaluation of the reference collection at jesup elementary school
Evaluation of the reference collection at jesup elementary schoolNicole Wingate
 
Wingate grant proposal
Wingate grant proposalWingate grant proposal
Wingate grant proposalNicole Wingate
 
Titles from free response questions 09
Titles from free response questions 09Titles from free response questions 09
Titles from free response questions 09Nicole Wingate
 
Sample mla 7 paper w annotations from owl at purdue university
Sample mla 7 paper w annotations from owl at purdue universitySample mla 7 paper w annotations from owl at purdue university
Sample mla 7 paper w annotations from owl at purdue universityNicole Wingate
 
2010 summer reading form
2010 summer reading form2010 summer reading form
2010 summer reading formNicole Wingate
 
Wingate professional development lesson
Wingate professional development lessonWingate professional development lesson
Wingate professional development lessonNicole Wingate
 
Wingate reading enjoyment lesson
Wingate reading enjoyment lessonWingate reading enjoyment lesson
Wingate reading enjoyment lessonNicole Wingate
 
Wingate annotated bibliography
Wingate annotated bibliographyWingate annotated bibliography
Wingate annotated bibliographyNicole Wingate
 
Wingate aup critique portfolio
Wingate aup critique portfolioWingate aup critique portfolio
Wingate aup critique portfolioNicole Wingate
 
Wingate article critiques
Wingate article critiquesWingate article critiques
Wingate article critiquesNicole Wingate
 

More from Nicole Wingate (20)

Mc rubric
Mc rubricMc rubric
Mc rubric
 
Wchs march media report
Wchs march media reportWchs march media report
Wchs march media report
 
Wingate 2010 materials order
Wingate 2010 materials orderWingate 2010 materials order
Wingate 2010 materials order
 
Wingate 2010 collection development plan
Wingate 2010 collection development planWingate 2010 collection development plan
Wingate 2010 collection development plan
 
Wingate jep reference order
Wingate jep reference orderWingate jep reference order
Wingate jep reference order
 
Wingate jep reference order
Wingate jep reference orderWingate jep reference order
Wingate jep reference order
 
Evaluation of the reference collection at jesup elementary school
Evaluation of the reference collection at jesup elementary schoolEvaluation of the reference collection at jesup elementary school
Evaluation of the reference collection at jesup elementary school
 
Wingate grant proposal
Wingate grant proposalWingate grant proposal
Wingate grant proposal
 
Titles from free response questions 09
Titles from free response questions 09Titles from free response questions 09
Titles from free response questions 09
 
Sample mla 7 paper w annotations from owl at purdue university
Sample mla 7 paper w annotations from owl at purdue universitySample mla 7 paper w annotations from owl at purdue university
Sample mla 7 paper w annotations from owl at purdue university
 
Review sheet
Review sheetReview sheet
Review sheet
 
Fall 09 titles
Fall 09 titlesFall 09 titles
Fall 09 titles
 
Dept. guide 2009 10
Dept. guide 2009 10Dept. guide 2009 10
Dept. guide 2009 10
 
2010 summer reading form
2010 summer reading form2010 summer reading form
2010 summer reading form
 
Wingate professional development lesson
Wingate professional development lessonWingate professional development lesson
Wingate professional development lesson
 
Wingate reading enjoyment lesson
Wingate reading enjoyment lessonWingate reading enjoyment lesson
Wingate reading enjoyment lesson
 
Budget simulation
Budget simulationBudget simulation
Budget simulation
 
Wingate annotated bibliography
Wingate annotated bibliographyWingate annotated bibliography
Wingate annotated bibliography
 
Wingate aup critique portfolio
Wingate aup critique portfolioWingate aup critique portfolio
Wingate aup critique portfolio
 
Wingate article critiques
Wingate article critiquesWingate article critiques
Wingate article critiques
 

Recently uploaded

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 

Recently uploaded (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 

Wingate Policy Paper

  • 1. Internet Usage 1 Running Head: INTERNET USAGE AT SCHOOL Internet Usage at School – The Challenges of a Web 2.0 World Mary “Nicole” Bennett Wingate Georgia Southern University FRIT 7132
  • 2. Internet Usage 2 Abstract This paper focuses on the obstacles and challenges created by the Web 2.0 World. It addresses Internet filters and Acceptable Use Policies when determining the best way to educate students in a technology centered world. The paper suggests teachers embrace the opportunities created through new technology, rather than banning it for fear of inappropriate use.
  • 3. Internet Usage 3 The look and focus of today’s media center is drastically different from the media center during the Leave it to Beaver era. Years ago, students went to the media center to check out books, find resource information from encyclopedias, or read in a cozy corner. Today, students visit the media center to print out their research papers, use Galileo to find information on their research topic, or use Internet sites to prepare for tests; or at least that’s what we, educators, want our students to visit the media center for. All too often though we catch students finding a “backdoor” into MYSPACE, or playing an online hunting game when they still have three pages of a research paper to complete that, by the way, is due the next day. With all of the opportunities the Internet has provided for education, it has definitely created some roadblocks as well. So, how do we overcome these roadblocks to ensure our students are receiving the technology-focused education they need, without distracting or endangering themselves? And more importantly, how do we tell the difference between an “opportunity” and a “roadblock”? The all too common answer to this Internet usage issue has become the installation and use of an Internet filter. Internet filters can be used to block inappropriate or unwanted sites off of school computers and thereby gives educators more control over what students can access from a federally funded school computer. However, there are issues. First off, there are sites that help students get around these school filters. As Doug Johnson states in his article “Rules for the Social Web” (2007), “Do you know about SchoolBoredom.com? Trust me; your kids do – and they use it and other blocker-busting sites” (p. 11). Websites like SchoolBoredom.com allow students access to sites that are typically blocked on school computers. Therefore, when a student uses a “backdoor” site such as this, the effectiveness of the Internet filter is greatly reduced. And not only are Internet filters easy to “hack,” they also have problems with the materials they do sensor. Filters come with a setting that allows the user to determine how
  • 4. Internet Usage 4 restrictive they are in allowing site access. A common misconception is that the more restrictive the filters are, the safer the Internet experience becomes for the student. However, filters that are set at levels that are too restrictive not only restrict the inappropriate sites students are allowed to access, but they often times restrict the educationally sound sites as well. For example, students at my school are commonly asked to include pictures in their presentations. One particular example I remember was when the Spanish students were asked to find pictures of common household furniture and label them in Spanish. However, any image search on Google was blocked by the Internet filter. The students therefore had a harder time finding images to use on their poster boards. In this case, the Internet filter actually hinders the educational process rather than making it safer. A second “answer” to the Internet usage issue that often accompanies these Internet filters is an Acceptable Use Policy (AUP). Students are commonly presented with these on the first day of school. The policy outlines acceptable use of computers, technology, and the Internet while on campus. Students are asked to sign the policy, have a parent sign it, and return it to school administration. However, students often forget to have these policies signed, and as a result, are not allowed to access the Internet. So how does a teacher conduct Internet research in the library when half of her class is not allowed to use the computer? This issue is addressed by Judi Repman when she states (2008), “I noticed that the media specialist was doing searches in the OPAC and GALILEO for some students and handing them the print outs…When I asked why I was told that she had to do this for students who didn’t have a signed AUP” (par. 2). Is this really supplying students with the technology-based education that they deserve? Simply because a student forgets to have a paper signed, he or she is denied the right to learn and practice the information literacy skills crucial for success in today’s world. Though this poses a
  • 5. Internet Usage 5 fundamental problem for educators, Acceptable Use Policies are not only problematic when they are not signed and returned by students. As Dr. Repman points out, they are often outdated. And as Doug Johnson points out, their language is often times broad and open to interpretation. So even when AUPs are appropriately completed and returned to school administrators, they are problematic. Therefore, Acceptable Use Policies are not the “answer” to the Internet usage dilemma. And one final issue that is affected by both the Internet filters and a school’s Acceptable Use Policy is email. Often times students are not allowed to check their emails at school, and if they are, it has to be under direct supervision of a teacher. This “supervision” issue has created some schools to designate particular computers as “email access” computers, as is the case in Mrs. Hamilton and Mrs. Fleet’s media center. In their recent blog, they state (2008), “If you have forgotten your flash drive and have an email emergency, please see Mrs. Hamilton or Mrs. Fleet – you may use Station 21 to get homework or essays off email…Be aware, though, that some of the student profile restrictions may disable you from downloading attached files” (par. 1-2). So even when students can access their email, other acceptable use restrictions prohibit them from downloading attachments. Email access is not the only Internet asset being blocked, sites likes MySpace and Facebook are also blacklisted, despite the advantages these networking tools could provide for education. At my former school, though email was not outlawed in the AUP, all major email providers were blocked. When students were working on their research papers, I commonly had to open my email on ten to fifteen student computers to email rough drafts from school computers to students’ emails. Students could then make changes and work on their papers at home. Then, if they needed to open their papers from email at school, they would have to email their papers to my school account. This entire process was faulty and time
  • 6. Internet Usage 6 consuming. Instead of spending time during the class period assisting students with sentence structure or reliable source questions, I was spending half of the class period emailing papers, just as Mrs. Hamilton and Mrs. Fleet are forced to spend their time supervising student email in the media center. There has to be a better answer! So what is it? How do we provide students with a safe and productive Internet environment? By making sensible decisions and creating sensible policies concerning the Internet and technology in general. Though the Internet filters create some problems, these problems could be drastically reduced by heightened teacher monitoring while using less restrictive filtering levels. Doug Johnson also believes this approach is best , which is proven when he states (2007), “…we would install a filter, but it would be set at its least restrictive setting…Adults monitor student access to the Internet as if no filter were present” (p. 12). This change would also create a higher-sense of responsibility for student users, and we all know when more is expected of students, more is produced by them. These less restrictive Internet filters could work with updated and precise Acceptable Use Policies that explicitly state what is expected of students. Also, encouraging students to bring back AUPs by offering incentives to those who do, like entry into a raffle for a free IPOD, would definitely be more productive than just threatening students who don’t return signed AUPs. And finally, email could be provided through the school system. Include in the AUP that email should be appropriate, and place responsibility on the students to use it appropriately. No, I know everyone won’t follow the rules, but a certain sense of pride and expectancy comes with being trusted to have your own school email, and the students will respond to that. So ultimately, educators simply need to refine what they are already doing. Though the original Internet usage policies and strategies were created with good intentions, somewhere
  • 7. Internet Usage 7 along the way, they lost their effectiveness. Web 2.0 tools are there, and students use them outside of school. It should ultimately be every educator’s goal to implement these exciting and innovative new tools into classroom curriculum. Why not let a student create a blog entry instead of a journal entry if she feels more comfortable doing that? With technology, the possibilities are endless! If used appropriately, both at school and at home, technology will expand our students’ knowledge and provide countless opportunities rather than creating a roadblock to their success.
  • 8. Internet Usage 8 References Fleet and Hamilton. (2008). Do You Have the Email Blues? Retrieved November 29, 2008, from: http://theunquietlibrary.wordpress.com/2008/03/17/do-you-have-the-email-blues/ Johnson, Doug. (2007). Rules for the Social Web. Threshold, Summer 2007, 9-12. Repman, Judi. (2008). Acceptable Use Policies in the 21st Century. Retrieved November 29, 2008, from: http://glma.wordpress.com/2008/01/18/acceptable-use-policies-in-the-21st-century/