SlideShare a Scribd company logo
1 of 10
Julie Walton
jwalton2@memphis.edu
IDT 7064-M51
Integrating the Internet Safely and Ethically Project
November 17, 2013

1.

I guess it is fair to say that I am an Internet-a-holic, if that’s a word! I love to use
the Internet. I love to use Facebook to catch up with old friends and classmates and see
pictures of their families. I like to see what is going on in the lives of others around me.
I use email on a daily basis. I have a personal email account and one at work. I
communicate with others using email daily. I do not use chat rooms or discussion
boards often, although I like the Pinterest website and how it is designed.
This time of year I do a lot of online shopping for Christmas. Technology has
made it so easy to buy online and have it delivered right to your front door. It is very
convenient, and we live in a society that is all about convenience.
Google is probably my favorite website. I use it daily to locate information from
lesson plans, homework help for my children, ideas for crafts, home repair- you name it,
and I can find it on Google!
2.

As I research this information and reflect on my practices of using the Internet, I
have become surprisingly aware that I divulge too much information online. When I am
making an online purchase, I try to online use sites that take Paypal for payment. But
many times, depending on how much I want the item or how inexpensive it is, I will buy
it without the secure lock checkout sign at the bottom.
When I use Facebook, I have set my account so that only my friends can view my
posts and pictures. However, I am aware that there are ways around this. I have
become so paranoid from all the news stories that I have heard recently about stalkers
preying on children, that I have just about banned myself from putting any pictures on
the web. As a teacher, it is my responsibility to make sure that I know what students
are doing on the Internet and making sure that I set guidelines for computer use (Mills,
p. 16). Teaching students about Internet safety has to be one of my first priorities.
I must admit, after reading this week’s information, that I have been guilty of
breaking the copyright rules. Many times, before reading these pages, have I used some
clip art or cute pictures from the web for presentations or newsletters I have written. I,
like many students, have assumed that if it is on the Internet that it there for my free
use. But after reading the Mills text, I am aware that I must model integrity for my
students (Mills, p. 18). This must be consistent in my daily activities such as
photocopying and taking graphics off the Internet. Mills expresses the need for
teachers to use different strategies to help students understand and prevent plagiarism
such as making assignments clear and specific and using rubrics for assignments. (Mills,
p. 18).
3.

I work in the Hardeman County School System. We have a district-wide
acceptable use policy that is sent home at the beginning of the school year for parents
and students to discuss and sign. Any students who do not return it, or whose parents
check no to Internet use, will not be allowed to use the school’s computers. Each
student has a file in which this important document is kept.
Our policy begins with the statement that “computer use is a privilege, not a
right.” Many of us forget that. The policy then goes on to describe in detail what is
“acceptable use” and “prohibited use.” Acceptable use explains that students may surf
the net and play games under the supervision of a teacher. Prohibited use forbids
personal software from being brought to school and copied on school computers.
Students may not cause harm to the computers or use food or drink around them.
Computers are not to be used to harass or bully others. Violation of copyright laws is
prohibited. Students are prohibited to give their personal information online. Accessing
social networking sites blocked by filtering software is prohibited. I am including the link
to our acceptable use policy below from one of our schools’ handbooks. It is on page
11. http://www.hardemancountyschools.org/bchs/files/Student_Handbook
%202013%20rev%208-7-13.pdf
Our county strives to make sure that each student’s personal information is kept
secure. Parents must sign a release at the beginning of the year giving the school
consent to take and publish pictures of their child, use their child in any reading videos,
or to publish their child’s name. We use filtering software that blocks sites that are
deemed inappropriate for children. Our school has adopted the Olweus Bullying
Prevention Program, and we devote much time to talk to our students about different
types of bullying, including cyberbullying. Our students are very aware of bullying and
now know how to identify it and the steps to take to prevent it.
4.

As I reflect on our district acceptable use policy, I feel that it is very
comprehensive and comparable to others in the state. However, after reading the Mills
text, I realized that there are ways that we could make the policy better. We do have
filtering software on our computers, but we need programs that prevent students from
giving out personal information online. (Mills, 2006). I also like the idea from Mills
about creating a classroom email address so that teachers and parents can monitor
student discussions in online chats. Although I teach lessons on plagiarism and
copyright, I realize that students need a constant reminder throughout the year of the
AUP rules. Mills suggested making a classroom poster reminding students of the AUP
rules. I think this is a great idea, and one I am planning on using.

5.

I currently teach 1st grade, and my first graders are not as Internet savvy as most
of the older students in our school. My students are very innocent and naive, so I try to
express to them that they cannot believe everything they read online. Although they
are young, I understand the importance of teaching them early on about copyright
infringement and using the Internet safely and wisely. At the beginning of the year I go
over the AUP with my students and make sure they know what is expected of them. I
have the students take the AUP home and go over it with their parents and have them
and their parents sign it. We have a short lesson in class on what is “acceptable use”
and “unacceptable use.” The computer teacher also goes over this with students. Most
of the lessons I find on copyright are over my kids’ heads, so I have to water it down
some and adapt it for my 1st graders. The following websites are great resources for
teaching students about copyright:
www.copyrightkids.org
http://www.cyberbee.com/cb_copyright.swf
http://www.teachingcopyright.org/
Even though my students are young, they are not too immature to be taught
how to distinguish between Internet sites that are reliable and those who are not. I like
to approach this topic early on in the year. I found a great website, and worked
together with our librarian to teach my students four lessons over the course of three
weeks. I needed a lot of help from my librarian to adapt the information for my
students. I feel that this is a process that is a school-wide effort, and begins with the
early grade teachers. The following website even lists some kid friendly sites that are
deemed reliable.
http://www.scholastic.com/teachers/top-teaching/2010/11/reliable-sources-andcitations
6.

As I said earlier, my students are very young and naïve when it comes to the

Internet. They take what they see at face value. I have not had any problems with my
students violating the copyright laws or with plagiarism, mostly because the work they
do is supervised. They have not completed major research projects yet in which they
have to cite information. However, I am now more aware, after reading this week’s
texts, of the importance of teaching students early on about academic honesty. The
reality is that many parents are not aware of copyright infringement and plagiarism. I
think the best way to get this message across to our students is to educate the parents
as well. I loved the idea from the post about having a parent night to inform parents
about cyber safety issues (Mirtschin, 2008). I think the earlier in the year, the better for
this.
7.

After reading all the texts this week, I am painfully aware that I need to do more

to protect myself personally online. I also need to take more time to evaluate
information for its credibility. As a teacher, I am responsible for teaching my students
about Internet safety. Several ideas from our texts this week stuck out in my mind. I
would like to create an AUP poster stating all the rules and leave it up in my classroom
all year (Mills, 2006). This would serve as a constant reminder for my students of what
is expected of them. I also like the idea of purchasing some type of filtering software
that limits personal information students are allowed to put on the web (Mills, 2006).
Although most of my students do not participate in online chats, I think it would be a
great idea to have a classroom email so that parents and I could monitor any students
discussions online. I would like to coordinate, along with our librarian, a Parent
Technology Night in which we educate parents about the importance of Internet safety
and copyright laws (Mirtschin, 2008). I think this would benefit our students as well.

References
Bunyi, A. (2010, November 5). Identifying Reliable Sources and Citing Them. Retrieved
November 14, 2013, from http://www.scholastic.com/teachers/topteaching/2010/11/reliable-sources-and-citations
Cyber Bee. (2013). Retrieved November 13, 2013, from
http://www.cyberbee.com/cb_copyright.swf
Electric Frontier Foundation. (2013). Retrieved November 13, 2013, from
http://www.teachingcopyright.org/
Hardeman County Schools. Retrieved November 14, 2013, from
http://www.hardemancountyschools.org/bchs/files/Student_Handbook%2020
3%20rev%208-7-13.PDF
Mills, S. (2006). Using the Internet for Active Teaching and Learning. Upper Saddle
River, NJ: Pearson.
Mirtschin, A. (2008, March 27). Keeping Students Cybersafe. Retrieved November 14,
2013, from http://murcha.wordpress.com/2008/03/27/keeping-studentscybersafe/
The Copyright Society of the USA. (2007). Retrieved from November 13, 2013 from
www.copyrightkids.org
Mirtschin, A. (2008, March 27). Keeping Students Cybersafe. Retrieved November 14,
2013, from http://murcha.wordpress.com/2008/03/27/keeping-studentscybersafe/
The Copyright Society of the USA. (2007). Retrieved from November 13, 2013 from
www.copyrightkids.org

More Related Content

What's hot

Jordan Papps powerpoint
Jordan Papps powerpointJordan Papps powerpoint
Jordan Papps powerpointguesta18090
 
Inquiry Project PP
Inquiry Project PPInquiry Project PP
Inquiry Project PPdolanand
 
When Mom Or Dad Ask To Be Your Facebook Friend 0609 Rev
When Mom Or Dad Ask To Be Your Facebook Friend 0609 RevWhen Mom Or Dad Ask To Be Your Facebook Friend 0609 Rev
When Mom Or Dad Ask To Be Your Facebook Friend 0609 RevSusan Anderson
 
Twitter assignment
Twitter assignmentTwitter assignment
Twitter assignmentwatts135
 
21st Cent_Digitalfootprints 07 07
21st Cent_Digitalfootprints 07 0721st Cent_Digitalfootprints 07 07
21st Cent_Digitalfootprints 07 07elizkeren
 
Computers in the Classroom
Computers in the ClassroomComputers in the Classroom
Computers in the Classroomguestb1be291
 
Giving Students the Freedom to Find Their Sentence
Giving Students the Freedom to Find Their SentenceGiving Students the Freedom to Find Their Sentence
Giving Students the Freedom to Find Their SentenceLisa Nielsen
 
Cellphones09 29
Cellphones09 29Cellphones09 29
Cellphones09 29elizkeren
 
Using Your Cybersmarts Online - Rachel Boyd
Using Your Cybersmarts Online - Rachel BoydUsing Your Cybersmarts Online - Rachel Boyd
Using Your Cybersmarts Online - Rachel BoydRachel Evans Boyd
 
Fort Recovery
Fort RecoveryFort Recovery
Fort Recoveryelizkeren
 

What's hot (19)

Jordan Papps powerpoint
Jordan Papps powerpointJordan Papps powerpoint
Jordan Papps powerpoint
 
Argumentative essay
Argumentative essayArgumentative essay
Argumentative essay
 
Inquiry Project PP
Inquiry Project PPInquiry Project PP
Inquiry Project PP
 
When Mom Or Dad Ask To Be Your Facebook Friend 0609 Rev
When Mom Or Dad Ask To Be Your Facebook Friend 0609 RevWhen Mom Or Dad Ask To Be Your Facebook Friend 0609 Rev
When Mom Or Dad Ask To Be Your Facebook Friend 0609 Rev
 
Twitter assignment
Twitter assignmentTwitter assignment
Twitter assignment
 
Start Pages
Start PagesStart Pages
Start Pages
 
Texas
TexasTexas
Texas
 
21st Cent_Digitalfootprints 07 07
21st Cent_Digitalfootprints 07 0721st Cent_Digitalfootprints 07 07
21st Cent_Digitalfootprints 07 07
 
Computers in the Classroom
Computers in the ClassroomComputers in the Classroom
Computers in the Classroom
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Giving Students the Freedom to Find Their Sentence
Giving Students the Freedom to Find Their SentenceGiving Students the Freedom to Find Their Sentence
Giving Students the Freedom to Find Their Sentence
 
Iasb top ten
Iasb top tenIasb top ten
Iasb top ten
 
Cellphones09 29
Cellphones09 29Cellphones09 29
Cellphones09 29
 
Y2 l10 esafety
Y2 l10 esafetyY2 l10 esafety
Y2 l10 esafety
 
Legal 08
Legal 08Legal 08
Legal 08
 
Digital Cheating
Digital CheatingDigital Cheating
Digital Cheating
 
Using Your Cybersmarts Online - Rachel Boyd
Using Your Cybersmarts Online - Rachel BoydUsing Your Cybersmarts Online - Rachel Boyd
Using Your Cybersmarts Online - Rachel Boyd
 
Digital life ppt 2
Digital life ppt 2Digital life ppt 2
Digital life ppt 2
 
Fort Recovery
Fort RecoveryFort Recovery
Fort Recovery
 

Viewers also liked

Viewers also liked (6)

IVT varmepumper
IVT varmepumperIVT varmepumper
IVT varmepumper
 
Martin Plumley Portfolio
Martin Plumley PortfolioMartin Plumley Portfolio
Martin Plumley Portfolio
 
TFS
TFSTFS
TFS
 
NPN
NPNNPN
NPN
 
Solarux CSP System Concentraded Solar Power
Solarux CSP System Concentraded Solar PowerSolarux CSP System Concentraded Solar Power
Solarux CSP System Concentraded Solar Power
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similar to Julie walton integrating the internet safely and ethically project

Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethicallyLinda Long
 
Internet publication
Internet publicationInternet publication
Internet publicationlinamccoach
 
Internet In Schools
Internet In SchoolsInternet In Schools
Internet In Schoolskw52
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyalovel
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyalovel
 
Computers in the Classroom
Computers in the ClassroomComputers in the Classroom
Computers in the Classroomguestb1be291
 
Webliography: J.Cope
Webliography: J.CopeWebliography: J.Cope
Webliography: J.Copeguest035174
 
Topic 5 Aup
Topic 5  AupTopic 5  Aup
Topic 5 AupBlair E
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying ResourcesAndy Jeter
 
W200 Powerpoint, Katie Fallis
W200 Powerpoint, Katie FallisW200 Powerpoint, Katie Fallis
W200 Powerpoint, Katie Fallisguest9c7c134
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipAplus Admin
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rulesMazni Salleh
 
W200 Presentation Copy
W200 Presentation CopyW200 Presentation Copy
W200 Presentation Copyguest0e74c5
 
Portfolio Concepts for Technology
Portfolio Concepts for TechnologyPortfolio Concepts for Technology
Portfolio Concepts for Technologyrjohn62495
 
Technology Integration Initiative
Technology Integration InitiativeTechnology Integration Initiative
Technology Integration Initiativehpetrich
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
W200 Power Point Presentation
W200   Power Point PresentationW200   Power Point Presentation
W200 Power Point Presentationguest0e74c5
 

Similar to Julie walton integrating the internet safely and ethically project (20)

Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
 
Internet publication
Internet publicationInternet publication
Internet publication
 
Internet In Schools
Internet In SchoolsInternet In Schools
Internet In Schools
 
Lesson 3 ethical issues
Lesson 3   ethical issuesLesson 3   ethical issues
Lesson 3 ethical issues
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethically
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethically
 
Computers in the Classroom
Computers in the ClassroomComputers in the Classroom
Computers in the Classroom
 
Webliography: J.Cope
Webliography: J.CopeWebliography: J.Cope
Webliography: J.Cope
 
Topic 5 Aup
Topic 5  AupTopic 5  Aup
Topic 5 Aup
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying Resources
 
W200 Powerpoint, Katie Fallis
W200 Powerpoint, Katie FallisW200 Powerpoint, Katie Fallis
W200 Powerpoint, Katie Fallis
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
W200 Presentation Copy
W200 Presentation CopyW200 Presentation Copy
W200 Presentation Copy
 
Portfolio Concepts for Technology
Portfolio Concepts for TechnologyPortfolio Concepts for Technology
Portfolio Concepts for Technology
 
Technology Integration Initiative
Technology Integration InitiativeTechnology Integration Initiative
Technology Integration Initiative
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
W200 Power Point Presentation
W200   Power Point PresentationW200   Power Point Presentation
W200 Power Point Presentation
 
WebQuest PowerPoint
WebQuest PowerPointWebQuest PowerPoint
WebQuest PowerPoint
 

Recently uploaded

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

Julie walton integrating the internet safely and ethically project

  • 1. Julie Walton jwalton2@memphis.edu IDT 7064-M51 Integrating the Internet Safely and Ethically Project November 17, 2013 1. I guess it is fair to say that I am an Internet-a-holic, if that’s a word! I love to use
  • 2. the Internet. I love to use Facebook to catch up with old friends and classmates and see pictures of their families. I like to see what is going on in the lives of others around me. I use email on a daily basis. I have a personal email account and one at work. I communicate with others using email daily. I do not use chat rooms or discussion boards often, although I like the Pinterest website and how it is designed. This time of year I do a lot of online shopping for Christmas. Technology has made it so easy to buy online and have it delivered right to your front door. It is very convenient, and we live in a society that is all about convenience. Google is probably my favorite website. I use it daily to locate information from lesson plans, homework help for my children, ideas for crafts, home repair- you name it, and I can find it on Google! 2. As I research this information and reflect on my practices of using the Internet, I have become surprisingly aware that I divulge too much information online. When I am making an online purchase, I try to online use sites that take Paypal for payment. But many times, depending on how much I want the item or how inexpensive it is, I will buy it without the secure lock checkout sign at the bottom. When I use Facebook, I have set my account so that only my friends can view my posts and pictures. However, I am aware that there are ways around this. I have
  • 3. become so paranoid from all the news stories that I have heard recently about stalkers preying on children, that I have just about banned myself from putting any pictures on the web. As a teacher, it is my responsibility to make sure that I know what students are doing on the Internet and making sure that I set guidelines for computer use (Mills, p. 16). Teaching students about Internet safety has to be one of my first priorities. I must admit, after reading this week’s information, that I have been guilty of breaking the copyright rules. Many times, before reading these pages, have I used some clip art or cute pictures from the web for presentations or newsletters I have written. I, like many students, have assumed that if it is on the Internet that it there for my free use. But after reading the Mills text, I am aware that I must model integrity for my students (Mills, p. 18). This must be consistent in my daily activities such as photocopying and taking graphics off the Internet. Mills expresses the need for teachers to use different strategies to help students understand and prevent plagiarism such as making assignments clear and specific and using rubrics for assignments. (Mills, p. 18). 3. I work in the Hardeman County School System. We have a district-wide acceptable use policy that is sent home at the beginning of the school year for parents and students to discuss and sign. Any students who do not return it, or whose parents check no to Internet use, will not be allowed to use the school’s computers. Each
  • 4. student has a file in which this important document is kept. Our policy begins with the statement that “computer use is a privilege, not a right.” Many of us forget that. The policy then goes on to describe in detail what is “acceptable use” and “prohibited use.” Acceptable use explains that students may surf the net and play games under the supervision of a teacher. Prohibited use forbids personal software from being brought to school and copied on school computers. Students may not cause harm to the computers or use food or drink around them. Computers are not to be used to harass or bully others. Violation of copyright laws is prohibited. Students are prohibited to give their personal information online. Accessing social networking sites blocked by filtering software is prohibited. I am including the link to our acceptable use policy below from one of our schools’ handbooks. It is on page 11. http://www.hardemancountyschools.org/bchs/files/Student_Handbook %202013%20rev%208-7-13.pdf Our county strives to make sure that each student’s personal information is kept secure. Parents must sign a release at the beginning of the year giving the school consent to take and publish pictures of their child, use their child in any reading videos, or to publish their child’s name. We use filtering software that blocks sites that are deemed inappropriate for children. Our school has adopted the Olweus Bullying Prevention Program, and we devote much time to talk to our students about different
  • 5. types of bullying, including cyberbullying. Our students are very aware of bullying and now know how to identify it and the steps to take to prevent it. 4. As I reflect on our district acceptable use policy, I feel that it is very comprehensive and comparable to others in the state. However, after reading the Mills text, I realized that there are ways that we could make the policy better. We do have filtering software on our computers, but we need programs that prevent students from giving out personal information online. (Mills, 2006). I also like the idea from Mills about creating a classroom email address so that teachers and parents can monitor student discussions in online chats. Although I teach lessons on plagiarism and copyright, I realize that students need a constant reminder throughout the year of the AUP rules. Mills suggested making a classroom poster reminding students of the AUP rules. I think this is a great idea, and one I am planning on using. 5. I currently teach 1st grade, and my first graders are not as Internet savvy as most of the older students in our school. My students are very innocent and naive, so I try to express to them that they cannot believe everything they read online. Although they are young, I understand the importance of teaching them early on about copyright infringement and using the Internet safely and wisely. At the beginning of the year I go over the AUP with my students and make sure they know what is expected of them. I have the students take the AUP home and go over it with their parents and have them
  • 6. and their parents sign it. We have a short lesson in class on what is “acceptable use” and “unacceptable use.” The computer teacher also goes over this with students. Most of the lessons I find on copyright are over my kids’ heads, so I have to water it down some and adapt it for my 1st graders. The following websites are great resources for teaching students about copyright: www.copyrightkids.org http://www.cyberbee.com/cb_copyright.swf http://www.teachingcopyright.org/ Even though my students are young, they are not too immature to be taught how to distinguish between Internet sites that are reliable and those who are not. I like to approach this topic early on in the year. I found a great website, and worked together with our librarian to teach my students four lessons over the course of three weeks. I needed a lot of help from my librarian to adapt the information for my students. I feel that this is a process that is a school-wide effort, and begins with the early grade teachers. The following website even lists some kid friendly sites that are deemed reliable. http://www.scholastic.com/teachers/top-teaching/2010/11/reliable-sources-andcitations
  • 7. 6. As I said earlier, my students are very young and naïve when it comes to the Internet. They take what they see at face value. I have not had any problems with my students violating the copyright laws or with plagiarism, mostly because the work they do is supervised. They have not completed major research projects yet in which they have to cite information. However, I am now more aware, after reading this week’s texts, of the importance of teaching students early on about academic honesty. The reality is that many parents are not aware of copyright infringement and plagiarism. I think the best way to get this message across to our students is to educate the parents as well. I loved the idea from the post about having a parent night to inform parents about cyber safety issues (Mirtschin, 2008). I think the earlier in the year, the better for this. 7. After reading all the texts this week, I am painfully aware that I need to do more to protect myself personally online. I also need to take more time to evaluate information for its credibility. As a teacher, I am responsible for teaching my students about Internet safety. Several ideas from our texts this week stuck out in my mind. I would like to create an AUP poster stating all the rules and leave it up in my classroom all year (Mills, 2006). This would serve as a constant reminder for my students of what is expected of them. I also like the idea of purchasing some type of filtering software that limits personal information students are allowed to put on the web (Mills, 2006). Although most of my students do not participate in online chats, I think it would be a
  • 8. great idea to have a classroom email so that parents and I could monitor any students discussions online. I would like to coordinate, along with our librarian, a Parent Technology Night in which we educate parents about the importance of Internet safety and copyright laws (Mirtschin, 2008). I think this would benefit our students as well. References Bunyi, A. (2010, November 5). Identifying Reliable Sources and Citing Them. Retrieved November 14, 2013, from http://www.scholastic.com/teachers/topteaching/2010/11/reliable-sources-and-citations Cyber Bee. (2013). Retrieved November 13, 2013, from http://www.cyberbee.com/cb_copyright.swf Electric Frontier Foundation. (2013). Retrieved November 13, 2013, from http://www.teachingcopyright.org/ Hardeman County Schools. Retrieved November 14, 2013, from http://www.hardemancountyschools.org/bchs/files/Student_Handbook%2020 3%20rev%208-7-13.PDF Mills, S. (2006). Using the Internet for Active Teaching and Learning. Upper Saddle River, NJ: Pearson.
  • 9. Mirtschin, A. (2008, March 27). Keeping Students Cybersafe. Retrieved November 14, 2013, from http://murcha.wordpress.com/2008/03/27/keeping-studentscybersafe/ The Copyright Society of the USA. (2007). Retrieved from November 13, 2013 from www.copyrightkids.org
  • 10. Mirtschin, A. (2008, March 27). Keeping Students Cybersafe. Retrieved November 14, 2013, from http://murcha.wordpress.com/2008/03/27/keeping-studentscybersafe/ The Copyright Society of the USA. (2007). Retrieved from November 13, 2013 from www.copyrightkids.org