Reflection on integrating the internet safely and ethically

255 views

Published on

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
255
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Reflection on integrating the internet safely and ethically

  1. 1. REFLECTION ON INTEGRATING THEINTERNET SAFELY AND ETHICALLYAnna LovelIDT 7064
  2. 2. PERSONAL USES OF THE INTERNETI currently use the internet for the following: Online banking Online shopping: Amazon Getting a Master’s Degree Work and personal email accounts Finding information and images to use for school and work I currently do not use the internet for social reasons such as chatting, Twitter, or social networking. I easily use the internet four hours a day.
  3. 3. PERSONAL SAFETY ON THE INTERNET I use the internet for sensitive information, such as banking, and it would probably be wise to change my password. It is rare that I share any information on the internet; however, I have been uncomfortable a few times when I had to use my social security number online. All accounts can be hacked, so I know that it is important to minimize the number of accounts that are linked to important information.
  4. 4. PERSONAL SAFETY ON THE INTERNET (CONT.) In order to maintain the integrity of my computer, I installed Avast for free. Additionally, I do not click on unreliable links, nor do I respond to phishing scams, which are explained by Anderson (2008). Because I do not engage in any social media, the risks of image sharing, being tracked though my cell phone, or having my information stolen from a website are greatly reduced. These risks are especially important for young people to be aware of, as netsmartz explains.
  5. 5. PERSONAL ETHICS ON THE INTERNET I must admit that my practices concerning images are not entirely ethical. I often use them without a source, even though it is obvious that the image is not my own. I do cut and paste off of the internet, despite the fact that this is discouraged by Fryer (2003). I do, however, provide a source for that work. I have never infringed on copyrights by downloading music or other files illegally.
  6. 6. ACCEPTABLE USE POLICY My school is a charter school, and to my knowledge, we have no written acceptable use policy. Because we have no written policy, I have been using the “common sense” policy.  All students are turned so that I can see their computer screens.  Only mature, hard-working, trustworthy students are allowed to use the computers.  Students do not use the computers without supervision and permission.  All students must be on-task at all times.
  7. 7. THE MCS POLICY My school technically falls under the MCS umbrella. The MCS policy places a significant burden on the students and parents in order to ensure that the internet is used ethically:  “MCS will make reasonable efforts to supervise students’ Internet and e-mail use, but will not be responsible for claims and liabilities arising out of such use.” (Form No. 14197) Reasonable efforts are not defined at any point in the document, and there do not appear to be instructions for the teacher concerning how to provide reasonable efforts.
  8. 8. BLOCKING OR FILTERING My school has few blocks or filters. For example, I cannot engage in a job search at work, but last year, a student was caught viewing pornography on his personal laptop while at school. There are obvious gaps in the filter. I know, from my conversations with other teachers and my own education in MCS, that MCS has many filters and blocks on their network, to the point that it compromises the usefulness of the internet.
  9. 9. ACCEPTABLE USE POLICIESThe Soulsville Charter Memphis City SchoolsSchool No document.  Eight page Teachers are required document, including a to directly supervise release form for students who are using students, parents, and computers. employees. Requirements for  Requirements for students are unclear. supervision are unclear, although there No disclaimers; anyone are requirements for could be responsible students. for consequences of use.  Numerous disclaimers.  Seems to be outdated.
  10. 10. CURRENT IMPLEMENTATION OF ETHICS Students are required to cite information that was obtained from the internet or other written texts. Students must use MLA formatting for listing their references and in their citations. Frequently, this actually looks like students providing references at the end of their project without ever having cited these sources in their project. Plagiarism is detected using my own personal radar: I compare the work to what I know about the student’s writing and knowledge. I have been less concerned with the source of images.
  11. 11. RIGOR OF PRACTICES The rigor for textual citations is appropriate, according to Fryer (2003), but it should be better implemented. Fryer strongly discourages cutting and pasting text from the internet, but I know that my students do this. Even if they do use the citation, they still need to list it as a quotation. The expectation for images is set too low. All images should be cited, especially if they are copyrighted (Fryer 2003).
  12. 12. FUTURE SAFETY AND EHTICS PRACTICES My instructions to students about how to cite their work need to be more specific so that students will cite all of the information that they get from a source, in order to respect intellectual property (Anderson 2008). I should require citations for images, especially if there are more than 5, or students should explicitly state that the image is open source in order to avoid confusion and copyright infringement (Anderson 2008).
  13. 13. FUTURE SAFETY AND ETHICS PRACTICES(CONT.) I should continue to monitor students directly when they are using computers in order to ensure that they are being used appropriately and safely. I will discuss with my school leaders about creating an AUP. I would suggest that we base our AUP on the one provided by iSafe, rather than the one written by MCS.
  14. 14. REFERNCES Anderson, R. S. (2008). Excerpt from Chapter 5: Literacy in the Information Age. Technology to teach literacy: A resource for K-8 teachers. Upper Saddle River, NJ: Merrill Prentice Hall. Fryer, W. (2003). Copyright 101 for educators. TechEdge. Retrieved from http://www.wtvi.com/teks/02_03_articles/copyright.html ------. Acceptable Use Policies. Carlsbad, CA: i-SAFE America, Inc. Retrieved from http://www.isafe.org/imgs/pdf/education/AUPs.pdf ------. Memphis City Schools E-mail and Internet Acceptable Use Agreement. Memphis, TN. ------. Netsmartz videos. Retrieved from http://www.netsmartz.org/RealLifeStories/JuliesJourney

×