SlideShare a Scribd company logo
1 of 19
REFLECTIONS ON 
INTEGRATING THE 
INTERNET SAFELY AND 
ETHICALLY 
Linda Long 
IDT 7064 
Fall 2014
PERSONAL PRACTICES OF 
USING THE INTERNET 
 My Internet experiences have come late in life. I did not grow up 
with the technology that our kids are using today, so in essence the 
learning process has been somewhat difficult. The world has also 
become a much more dangerous place to live in than when I was a 
child. I don’t have any small children whom I have to monitor while 
on the Internet, but after the readings this week, I can see where it 
would be very difficult for a parent trying to raise a child these days.
PERSONAL PRACTICES OF 
USING THE INTERNET 
 When my children were little, the Internet was just beginning and 
schools did not have access to all of the technology that they do today. 
My children did not have cell phones until they were 15 or 16 years old, 
and there certainly were not any smart phones. Children today are getting 
these smart phones as early as 8 & 9 years old. I did not have a cell phone 
until I was about 30 years old, and it was just a year ago that I bought a 
smart phone. I have always had just a regular flip-phone which did not 
allow access to the Internet.
 My experiences with the Internet has been mainly just looking up 
information through Google, viewing my Facebook, Internet banking, and 
email. I have to admit, there are parts of the Internet that has made life a 
little easier. One, I can look at my bank account any time that I want. If I 
need to transfer money or see if a check has cleared, it is readily available. I 
also like to go on my Facebook and look at all of my friend’s pictures. I have 
also found friends which I have not seen or talked to in many years. I use 
Google as my search engine because it offers so many other tools that are 
great for my classes. I have experienced some problems with the Internet. 
Once a girl in my office opened an email which was supposed to be from 
UPS, well of a sudden, everything on my computer started disappearing. I 
found out that it was a Trojan virus and it ate everything on my computer 
before I could get it stopped. Needless to say, that was a hard lesson learned. 
Always be careful what you open on your computer.
PRACTICES FOR SAFETY 
 With the dangers on the Internet today, parents, teachers, and 
administrators must take responsibility for what our kids are able to access 
from the Internet. I believe that we must use the best filtering or blocking 
software that is available. Our children should be taught to never give out 
their personal information over the Internet. We also need to set up rules 
and guidelines for the students and be prepared to punish the ones who 
cannot obey them. I personally believe that limiting our children’s time on 
the Internet is just as important. Kids ,nowadays, walk around with cell 
phones glued to their hands. Most of them can text faster than they can 
talk.
 I also believe that parents need to be educated on what the possible dangers 
are from using the Internet. Some parents just do not have a clue as to what 
dangers are out there just waiting on their children. For instance, three young 
girls were just caught in Germany after they left their homes in Denver to join 
the terrorist group ISIS. The parents did not have any idea that their children 
were gone until the principal called one of the dads and told him that his 
daughter was late to school. The dad called her cell phone only to be told that 
she was on her way to school but was just running late. However, after 
discovering that two of her friends were missing as .well, the father began 
looking for his daughter’s passport and it was gone. When he checked with the 
other two families, he discovered that their passports were missing also along 
with $2,000.00 dollars. The parents notified the FBI and that is how their 
daughters were caught in Germany. Parents should learn from this near tragic 
incident and pay attention to what their kids are doing.
ACCEPTABLE USE POLICY 
 I am not currently in a school system, so I have decided to use the 
Jackson Madison County School system acceptable use policy. The 
website states the following: “(JMCSS) recognizes that access to 
technology in school gives students greater opportunities to learn, 
engage, communicate, and develop skills that will prepare them for 
work, life, and citizenship. We are committed to helping students 
develop 21st-century technology and communication skills.”
The JMCSS has guidelines that teachers and students must adhere to: 
 The JMCSS network is intended for educational purposes. 
 All activity over the network or using district technologies may be monitored and 
retained. 
 Access to online content via the network may be restricted in accordance with our 
policies and federal regulations, such as the Children’s Internet Protection Act (CIPA). 
 Students are expected to follow the same rules for good behavior and respectful 
conduct online as offline. 
 Misuse of school resources can result in disciplinary action. 
 JMCSS makes a reasonable effort to ensure students’ safety and security online, but 
will not be held accountable for any harm or damages that result from use of school 
technologies. 
 Users of the district network or other technologies are expected to alert Technology 
staff immediately of any concerns for safety or security.
ACCEPTABLE USE POLICY 
 The school system covers most of the areas when it comes to using the 
Internet or technology in the classroom. The parents and students have to 
sign an agreement stating that they will abide by the rules and are aware of 
the consequences if they do not. A list of possible punishments include: 
 Suspension of network, technology, or computer privileges 
 Notification to parents 
 Detention or suspension from school and school-related activities 
 Legal action and/or prosecution
CRITIQUE JMCSS 
 The JMCSS has covered the basics of using the Internet and technology in 
the classroom. The website covers the major components of Web Access, 
Email, Social/Web 2.0, Mobile Devices Policy, Personally-Owned Devices 
Policy, Security, Downloads, Netiquette, Plagiarism, Personal Safety, and 
Cyberbullying. The website list 11 things that the students cannot do when 
using the Internet or any of these technologies. JMCSS makes it very clear 
that they will not be held responsible for any situations which could arise from 
the students using the Internet or technologies from the Internet.
CRITIQUE JMCSS 
 I think JMCSS has done a very good job with their acceptable use 
policy. The students and the parents know exactly what is expected 
of them, and what will happen if the students break any of the rules. 
The only subject that this school system did not cover is that some 
published website may not be true and people online may not be who 
they seem to be. I think the students need to be aware of these two 
subjects as well.
STANDARD OF ETHICS 
 I’m not currently teaching at this time, so I will explain what I did 
when I was teaching Developing Reading at Lambuth University. 
When I asked my student’s to do research, I would have them search 
the databases on the Lambuth Library site. These documents usually 
ended with a .edu which meant that the source was reliable. I also 
encouraged them to use .gov and .org endings because theses were 
government websites and reliable also.
STANDARD OF ETHICS 
 There are a number of websites that a teacher can use to check for 
plagiarism. www.plagiarism.org is a great website to use for checking for 
plagiarism. Plagiarism Checker at www.grammarly.com is another great 
website for students and teachers to ensure that the quality of the 
students work is what is expected. As far as the copyright law, images, 
videos, and such, I usually encourage my students to look for technology 
tools that are free. So many websites charge a fee but many of them will 
give a student the basic service for free.
ANALYZE 
 The main thing that a teacher has to emphasize to her students is 
that academic dishonesty can get a student kicked out of school and 
could keep them our of college permanently. When I was in school, 
we did not have to worry about plagiarism that much. All we had was 
reference books, encyclopedias, and newspapers or journals. Today 
these kids have a wealth of knowledge at their fingertips, and it is very 
important for them to learn what to cite and what is not necessary to 
cite.
ANALYZE 
 According to the Academic Integrity website, the best way to keep 
academic honesty is to check with professors about their expectations 
for citing sources, read the syllabus and assignment instructions 
carefully, ask your professor for permission before you share your 
work, plan ahead, and make smart decisions like doing your own 
work, diligently studying for exams, and writing your own essays.
SYNTHESIZE 
 I think it is important to incorporate lesson on plagiarism. Many 
times the professor or teacher just assumes that the student knows what 
that word means, but doesn’t actually understand the full concept of it. 
When I started to college, I understood what it meant but I did not realize 
that you had to put citations within your papers. I though by doing a 
reference list was all that was required of students. I would start my class 
by having my students write a paper on plagiarism. Then there would be 
a class discussion on the importance of academic honesty.
SYNTHESIZE 
 I also believe that the lesson on plagiarism should not end after the 
first few days of school. That is exactly what happens in college, and 
these kids just don’t understand it. I would continue to incorporate 
lessons on academic dishonesty until I felt like every student had 
grasped the concept. And, I don’t think this should be done strictly in 
a Freshman English class. All the other classes which require students 
to write papers should teach lessons about plagiarism.
REFERENCES 
 Brumfield, B. (2014) Officials: 3 Denver girls played hooky from 
school and tried to join ISIS. CNN News. Web. Retrieved 
from http://www.cnn.com/2014/10/22/us/colorado-teens syria-odyssey/ 
 Jackson Madison County School System. (2011). Acceptable Use 
Policy. Web. Retrieved from 
http://images.pcmac.org/SiSFiles/Schools/TN/JacksonMadisonCounty/No 
rtheastMiddle/Uploads/Forms/JMCSS%20Acceptable%20Use%20Policy.pdf 
 Mills, S.C. (2006). Using the Internet for active teaching and learning. 
Upper Saddle River, NJ: Pearson Merrill Prentice Hall. 
ISBN 10: 0131105469.
REFERENCES 
 University of Illinois Springfield. (2014). Academic Integrity. 
Web. Retrieved from 
http://www.uis.edu/academicintegrity/students/integrity/

More Related Content

What's hot

Social media policy
Social media policySocial media policy
Social media policyHar1982
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parentssirchriss
 
Tok final ppt internet reliabiity
Tok final ppt internet reliabiity Tok final ppt internet reliabiity
Tok final ppt internet reliabiity Ahmed Raza
 
Schools And Libraries Should Be Filtered
Schools And Libraries Should Be FilteredSchools And Libraries Should Be Filtered
Schools And Libraries Should Be Filteredllapointe
 
Argumentative Essay
Argumentative EssayArgumentative Essay
Argumentative Essaykusnul Aeni
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianKate Gukeisen
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of TeensKate Gukeisen
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schoolsPaul Chamberlain
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Laura Dunkley
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ssLenva Shearing
 

What's hot (17)

Legal 08
Legal 08Legal 08
Legal 08
 
Social media policy
Social media policySocial media policy
Social media policy
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
Tok final ppt internet reliabiity
Tok final ppt internet reliabiity Tok final ppt internet reliabiity
Tok final ppt internet reliabiity
 
Schools And Libraries Should Be Filtered
Schools And Libraries Should Be FilteredSchools And Libraries Should Be Filtered
Schools And Libraries Should Be Filtered
 
Argumentative Essay
Argumentative EssayArgumentative Essay
Argumentative Essay
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School Librarian
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schools
 
Texas
TexasTexas
Texas
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ss
 

Viewers also liked (16)

الصلاه
الصلاهالصلاه
الصلاه
 
โรคแผลในกระเพาะอาหาร
โรคแผลในกระเพาะอาหารโรคแผลในกระเพาะอาหาร
โรคแผลในกระเพาะอาหาร
 
البرق
البرقالبرق
البرق
 
Fctcp Chw Trends 2 8 2007 10 2
Fctcp Chw Trends 2 8 2007 10 2Fctcp Chw Trends 2 8 2007 10 2
Fctcp Chw Trends 2 8 2007 10 2
 
Weekly news
Weekly newsWeekly news
Weekly news
 
Weekly news 4
Weekly news 4Weekly news 4
Weekly news 4
 
Brockenhurst college
Brockenhurst collegeBrockenhurst college
Brockenhurst college
 
الأمة والحاكم
الأمة والحاكمالأمة والحاكم
الأمة والحاكم
 
MYCV-02 17.01.2015
MYCV-02 17.01.2015MYCV-02 17.01.2015
MYCV-02 17.01.2015
 
Rod morgan
Rod morganRod morgan
Rod morgan
 
Ibe kitap eri̇şi̇lebi̇li̇ri̇li̇k
Ibe kitap eri̇şi̇lebi̇li̇ri̇li̇kIbe kitap eri̇şi̇lebi̇li̇ri̇li̇k
Ibe kitap eri̇şi̇lebi̇li̇ri̇li̇k
 
Data Science Associate (EMCDSA) certificate
Data Science Associate (EMCDSA) certificateData Science Associate (EMCDSA) certificate
Data Science Associate (EMCDSA) certificate
 
البنيوية وما بعدها
البنيوية وما بعدهاالبنيوية وما بعدها
البنيوية وما بعدها
 
الشباب والانترنت والسياسة
الشباب والانترنت والسياسةالشباب والانترنت والسياسة
الشباب والانترنت والسياسة
 
Firearms
FirearmsFirearms
Firearms
 
Y4W
Y4WY4W
Y4W
 

Similar to Integrating the internet safely and ethically

Internet In Schools
Internet In SchoolsInternet In Schools
Internet In Schoolskw52
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyalovel
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyalovel
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rulesMazni Salleh
 
Webliography: J.Cope
Webliography: J.CopeWebliography: J.Cope
Webliography: J.Copeguest035174
 
Esafety ncn july 2014
Esafety ncn july 2014Esafety ncn july 2014
Esafety ncn july 2014Martin Cooke
 
W200 Powerpoint, Katie Fallis
W200 Powerpoint, Katie FallisW200 Powerpoint, Katie Fallis
W200 Powerpoint, Katie Fallisguest9c7c134
 
Being SMART about Internet Safety
Being SMART about Internet SafetyBeing SMART about Internet Safety
Being SMART about Internet SafetyErica Roberts
 
Filtering in schools
Filtering in schoolsFiltering in schools
Filtering in schoolsmylee720
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversationlippertnicole
 
Schools And Libraries Should Be Filtered
Schools And Libraries Should Be FilteredSchools And Libraries Should Be Filtered
Schools And Libraries Should Be Filteredhputnam
 
Schools And Libraries Should Be Filtered
Schools And Libraries Should Be FilteredSchools And Libraries Should Be Filtered
Schools And Libraries Should Be Filteredkbragdon1
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
 
Cyberbully Module
Cyberbully ModuleCyberbully Module
Cyberbully Modulelpj101
 
Computers In The Classroom
Computers In The ClassroomComputers In The Classroom
Computers In The Classroomguestb1be291
 
Computers in the Classroom
Computers in the ClassroomComputers in the Classroom
Computers in the Classroomguestb1be291
 

Similar to Integrating the internet safely and ethically (20)

Internet In Schools
Internet In SchoolsInternet In Schools
Internet In Schools
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethically
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethically
 
Lesson 3 ethical issues
Lesson 3   ethical issuesLesson 3   ethical issues
Lesson 3 ethical issues
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
Webliography: J.Cope
Webliography: J.CopeWebliography: J.Cope
Webliography: J.Cope
 
Esafety ncn july 2014
Esafety ncn july 2014Esafety ncn july 2014
Esafety ncn july 2014
 
W200 Powerpoint, Katie Fallis
W200 Powerpoint, Katie FallisW200 Powerpoint, Katie Fallis
W200 Powerpoint, Katie Fallis
 
Being SMART about Internet Safety
Being SMART about Internet SafetyBeing SMART about Internet Safety
Being SMART about Internet Safety
 
Filtering in schools
Filtering in schoolsFiltering in schools
Filtering in schools
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Ouch 201705 en
Ouch 201705 enOuch 201705 en
Ouch 201705 en
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversation
 
Schools And Libraries Should Be Filtered
Schools And Libraries Should Be FilteredSchools And Libraries Should Be Filtered
Schools And Libraries Should Be Filtered
 
Schools And Libraries Should Be Filtered
Schools And Libraries Should Be FilteredSchools And Libraries Should Be Filtered
Schools And Libraries Should Be Filtered
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Cyberbully Module
Cyberbully ModuleCyberbully Module
Cyberbully Module
 
Computers In The Classroom
Computers In The ClassroomComputers In The Classroom
Computers In The Classroom
 
Computers in the Classroom
Computers in the ClassroomComputers in the Classroom
Computers in the Classroom
 

Recently uploaded

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Integrating the internet safely and ethically

  • 1. REFLECTIONS ON INTEGRATING THE INTERNET SAFELY AND ETHICALLY Linda Long IDT 7064 Fall 2014
  • 2. PERSONAL PRACTICES OF USING THE INTERNET  My Internet experiences have come late in life. I did not grow up with the technology that our kids are using today, so in essence the learning process has been somewhat difficult. The world has also become a much more dangerous place to live in than when I was a child. I don’t have any small children whom I have to monitor while on the Internet, but after the readings this week, I can see where it would be very difficult for a parent trying to raise a child these days.
  • 3. PERSONAL PRACTICES OF USING THE INTERNET  When my children were little, the Internet was just beginning and schools did not have access to all of the technology that they do today. My children did not have cell phones until they were 15 or 16 years old, and there certainly were not any smart phones. Children today are getting these smart phones as early as 8 & 9 years old. I did not have a cell phone until I was about 30 years old, and it was just a year ago that I bought a smart phone. I have always had just a regular flip-phone which did not allow access to the Internet.
  • 4.  My experiences with the Internet has been mainly just looking up information through Google, viewing my Facebook, Internet banking, and email. I have to admit, there are parts of the Internet that has made life a little easier. One, I can look at my bank account any time that I want. If I need to transfer money or see if a check has cleared, it is readily available. I also like to go on my Facebook and look at all of my friend’s pictures. I have also found friends which I have not seen or talked to in many years. I use Google as my search engine because it offers so many other tools that are great for my classes. I have experienced some problems with the Internet. Once a girl in my office opened an email which was supposed to be from UPS, well of a sudden, everything on my computer started disappearing. I found out that it was a Trojan virus and it ate everything on my computer before I could get it stopped. Needless to say, that was a hard lesson learned. Always be careful what you open on your computer.
  • 5. PRACTICES FOR SAFETY  With the dangers on the Internet today, parents, teachers, and administrators must take responsibility for what our kids are able to access from the Internet. I believe that we must use the best filtering or blocking software that is available. Our children should be taught to never give out their personal information over the Internet. We also need to set up rules and guidelines for the students and be prepared to punish the ones who cannot obey them. I personally believe that limiting our children’s time on the Internet is just as important. Kids ,nowadays, walk around with cell phones glued to their hands. Most of them can text faster than they can talk.
  • 6.  I also believe that parents need to be educated on what the possible dangers are from using the Internet. Some parents just do not have a clue as to what dangers are out there just waiting on their children. For instance, three young girls were just caught in Germany after they left their homes in Denver to join the terrorist group ISIS. The parents did not have any idea that their children were gone until the principal called one of the dads and told him that his daughter was late to school. The dad called her cell phone only to be told that she was on her way to school but was just running late. However, after discovering that two of her friends were missing as .well, the father began looking for his daughter’s passport and it was gone. When he checked with the other two families, he discovered that their passports were missing also along with $2,000.00 dollars. The parents notified the FBI and that is how their daughters were caught in Germany. Parents should learn from this near tragic incident and pay attention to what their kids are doing.
  • 7. ACCEPTABLE USE POLICY  I am not currently in a school system, so I have decided to use the Jackson Madison County School system acceptable use policy. The website states the following: “(JMCSS) recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop skills that will prepare them for work, life, and citizenship. We are committed to helping students develop 21st-century technology and communication skills.”
  • 8. The JMCSS has guidelines that teachers and students must adhere to:  The JMCSS network is intended for educational purposes.  All activity over the network or using district technologies may be monitored and retained.  Access to online content via the network may be restricted in accordance with our policies and federal regulations, such as the Children’s Internet Protection Act (CIPA).  Students are expected to follow the same rules for good behavior and respectful conduct online as offline.  Misuse of school resources can result in disciplinary action.  JMCSS makes a reasonable effort to ensure students’ safety and security online, but will not be held accountable for any harm or damages that result from use of school technologies.  Users of the district network or other technologies are expected to alert Technology staff immediately of any concerns for safety or security.
  • 9. ACCEPTABLE USE POLICY  The school system covers most of the areas when it comes to using the Internet or technology in the classroom. The parents and students have to sign an agreement stating that they will abide by the rules and are aware of the consequences if they do not. A list of possible punishments include:  Suspension of network, technology, or computer privileges  Notification to parents  Detention or suspension from school and school-related activities  Legal action and/or prosecution
  • 10. CRITIQUE JMCSS  The JMCSS has covered the basics of using the Internet and technology in the classroom. The website covers the major components of Web Access, Email, Social/Web 2.0, Mobile Devices Policy, Personally-Owned Devices Policy, Security, Downloads, Netiquette, Plagiarism, Personal Safety, and Cyberbullying. The website list 11 things that the students cannot do when using the Internet or any of these technologies. JMCSS makes it very clear that they will not be held responsible for any situations which could arise from the students using the Internet or technologies from the Internet.
  • 11. CRITIQUE JMCSS  I think JMCSS has done a very good job with their acceptable use policy. The students and the parents know exactly what is expected of them, and what will happen if the students break any of the rules. The only subject that this school system did not cover is that some published website may not be true and people online may not be who they seem to be. I think the students need to be aware of these two subjects as well.
  • 12. STANDARD OF ETHICS  I’m not currently teaching at this time, so I will explain what I did when I was teaching Developing Reading at Lambuth University. When I asked my student’s to do research, I would have them search the databases on the Lambuth Library site. These documents usually ended with a .edu which meant that the source was reliable. I also encouraged them to use .gov and .org endings because theses were government websites and reliable also.
  • 13. STANDARD OF ETHICS  There are a number of websites that a teacher can use to check for plagiarism. www.plagiarism.org is a great website to use for checking for plagiarism. Plagiarism Checker at www.grammarly.com is another great website for students and teachers to ensure that the quality of the students work is what is expected. As far as the copyright law, images, videos, and such, I usually encourage my students to look for technology tools that are free. So many websites charge a fee but many of them will give a student the basic service for free.
  • 14. ANALYZE  The main thing that a teacher has to emphasize to her students is that academic dishonesty can get a student kicked out of school and could keep them our of college permanently. When I was in school, we did not have to worry about plagiarism that much. All we had was reference books, encyclopedias, and newspapers or journals. Today these kids have a wealth of knowledge at their fingertips, and it is very important for them to learn what to cite and what is not necessary to cite.
  • 15. ANALYZE  According to the Academic Integrity website, the best way to keep academic honesty is to check with professors about their expectations for citing sources, read the syllabus and assignment instructions carefully, ask your professor for permission before you share your work, plan ahead, and make smart decisions like doing your own work, diligently studying for exams, and writing your own essays.
  • 16. SYNTHESIZE  I think it is important to incorporate lesson on plagiarism. Many times the professor or teacher just assumes that the student knows what that word means, but doesn’t actually understand the full concept of it. When I started to college, I understood what it meant but I did not realize that you had to put citations within your papers. I though by doing a reference list was all that was required of students. I would start my class by having my students write a paper on plagiarism. Then there would be a class discussion on the importance of academic honesty.
  • 17. SYNTHESIZE  I also believe that the lesson on plagiarism should not end after the first few days of school. That is exactly what happens in college, and these kids just don’t understand it. I would continue to incorporate lessons on academic dishonesty until I felt like every student had grasped the concept. And, I don’t think this should be done strictly in a Freshman English class. All the other classes which require students to write papers should teach lessons about plagiarism.
  • 18. REFERENCES  Brumfield, B. (2014) Officials: 3 Denver girls played hooky from school and tried to join ISIS. CNN News. Web. Retrieved from http://www.cnn.com/2014/10/22/us/colorado-teens syria-odyssey/  Jackson Madison County School System. (2011). Acceptable Use Policy. Web. Retrieved from http://images.pcmac.org/SiSFiles/Schools/TN/JacksonMadisonCounty/No rtheastMiddle/Uploads/Forms/JMCSS%20Acceptable%20Use%20Policy.pdf  Mills, S.C. (2006). Using the Internet for active teaching and learning. Upper Saddle River, NJ: Pearson Merrill Prentice Hall. ISBN 10: 0131105469.
  • 19. REFERENCES  University of Illinois Springfield. (2014). Academic Integrity. Web. Retrieved from http://www.uis.edu/academicintegrity/students/integrity/