SlideShare a Scribd company logo
1 of 14
REFLECTION ON INTEGRATING THE
INTERNET SAFELY AND ETHICALLY
Anna Lovel
IDT 7064
PERSONAL USES OF THE INTERNET
I currently use the internet for the following:
 Online banking
 Online shopping: Amazon
 Getting a Master’s Degree
 Work and personal email accounts
 Finding information and images to use for school
   and work

 I currently do not use the internet for social reasons
  such as chatting, Twitter, or social networking.
 I easily use the internet four hours a day.
PERSONAL SAFETY ON THE INTERNET
   I use the internet for sensitive information, such as
    banking, and it would probably be wise to change
    my password.

   It is rare that I share any information on the internet;
    however, I have been uncomfortable a few times
    when I had to use my social security number online.

   All accounts can be hacked, so I know that it is
    important to minimize the number of accounts that
    are linked to important information.
PERSONAL SAFETY ON THE INTERNET (CONT.)
 In order to maintain the integrity of my computer, I
  installed Avast for free.
 Additionally, I do not click on unreliable links, nor do
  I respond to phishing scams, which are explained
  by Anderson (2008).
 Because I do not engage in any social media, the
  risks of image sharing, being tracked though my
  cell phone, or having my information stolen from a
  website are greatly reduced.
 These risks are especially important for young
  people to be aware of, as netsmartz explains.
PERSONAL ETHICS ON THE INTERNET
 I must admit that my practices concerning images
  are not entirely ethical. I often use them without a
  source, even though it is obvious that the image is
  not my own.
 I do cut and paste off of the internet, despite the
  fact that this is discouraged by Fryer (2003). I
  do, however, provide a source for that work.
 I have never infringed on copyrights by
  downloading music or other files illegally.
ACCEPTABLE USE POLICY
 My school is a charter school, and to my
  knowledge, we have no written acceptable use
  policy.
 Because we have no written policy, I have been
  using the “common sense” policy.
     All students are turned so that I can see their computer
      screens.
     Only mature, hard-working, trustworthy students are
      allowed to use the computers.
     Students do not use the computers without supervision
      and permission.
     All students must be on-task at all times.
THE MCS POLICY
 My school technically falls under the MCS umbrella.
 The MCS policy places a significant burden on the
  students and parents in order to ensure that the
  internet is used ethically:
       “MCS will make reasonable efforts to supervise
        students’ Internet and e-mail use, but will not be
        responsible for claims and liabilities arising out of such
        use.” (Form No. 14197)
   Reasonable efforts are not defined at any point in
    the document, and there do not appear to be
    instructions for the teacher concerning how to
    provide reasonable efforts.
BLOCKING OR FILTERING
 My school has few blocks or filters.
 For example, I cannot engage in a job search at
  work, but last year, a student was caught viewing
  pornography on his personal laptop while at school.
 There are obvious gaps in the filter.

 I know, from my conversations with other teachers
  and my own education in MCS, that MCS has many
  filters and blocks on their network, to the point that
  it compromises the usefulness of the internet.
ACCEPTABLE USE POLICIES
The Soulsville Charter
                           Memphis City Schools
School

 No document.              Eight page
 Teachers are required      document, including a
  to directly supervise      release form for
  students who are using     students, parents, and
  computers.                 employees.
 Requirements for          Requirements for
  students are unclear.      supervision are
                             unclear, although there
 No disclaimers; anyone
                             are requirements for
  could be responsible
                             students.
  for consequences of
  use.                      Numerous disclaimers.
                            Seems to be outdated.
CURRENT IMPLEMENTATION OF ETHICS
 Students are required to cite information that was
  obtained from the internet or other written texts.
 Students must use MLA formatting for listing their
  references and in their citations.
 Frequently, this actually looks like students providing
  references at the end of their project without ever
  having cited these sources in their project.
 Plagiarism is detected using my own personal radar:
  I compare the work to what I know about the
  student’s writing and knowledge.
 I have been less concerned with the source of
  images.
RIGOR OF PRACTICES
 The rigor for textual citations is
  appropriate, according to Fryer (2003), but it should
  be better implemented.
 Fryer strongly discourages cutting and pasting text
  from the internet, but I know that my students do
  this. Even if they do use the citation, they still need
  to list it as a quotation.
 The expectation for images is set too low. All
  images should be cited, especially if they are
  copyrighted (Fryer 2003).
FUTURE SAFETY AND EHTICS PRACTICES
 My instructions to students about how to cite their
  work need to be more specific so that students will
  cite all of the information that they get from a
  source, in order to respect intellectual property
  (Anderson 2008).
 I should require citations for images, especially if
  there are more than 5, or students should explicitly
  state that the image is open source in order to
  avoid confusion and copyright infringement
  (Anderson 2008).
FUTURE SAFETY AND ETHICS PRACTICES
(CONT.)
 I should continue to monitor students directly when
  they are using computers in order to ensure that
  they are being used appropriately and safely.
 I will discuss with my school leaders about creating
  an AUP.
 I would suggest that we base our AUP on the one
  provided by iSafe, rather than the one written by
  MCS.
REFERNCES
   Anderson, R. S. (2008). Excerpt from Chapter 5: Literacy in
    the Information Age. Technology to teach literacy: A resource
    for K-8 teachers. Upper Saddle River, NJ: Merrill Prentice
    Hall.
   Fryer, W. (2003). Copyright 101 for educators. TechEdge.
    Retrieved from
    http://www.wtvi.com/teks/02_03_articles/copyright.html
   ------. Acceptable Use Policies. Carlsbad, CA: i-SAFE
    America, Inc. Retrieved from
    http://www.isafe.org/imgs/pdf/education/AUPs.pdf
   ------. Memphis City Schools E-mail and Internet Acceptable
    Use Agreement. Memphis, TN.
   ------. Netsmartz videos. Retrieved from
    http://www.netsmartz.org/RealLifeStories/JuliesJourney

More Related Content

What's hot

E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Maria Eloisa Blanza
 
Lansing Cc 2010
Lansing Cc 2010Lansing Cc 2010
Lansing Cc 2010elizkeren
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Social media policy
Social media policySocial media policy
Social media policyHar1982
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
Cellphones09 29
Cellphones09 29Cellphones09 29
Cellphones09 29elizkeren
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technologypeav1n0
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomGabriella Maree Wheeler
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Online safety web project description
Online safety web project descriptionOnline safety web project description
Online safety web project descriptionchrisswanson
 

What's hot (18)

Internet safety for kids
Internet safety for kidsInternet safety for kids
Internet safety for kids
 
Ass1ppt.orgn
Ass1ppt.orgnAss1ppt.orgn
Ass1ppt.orgn
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)
 
Lansing Cc 2010
Lansing Cc 2010Lansing Cc 2010
Lansing Cc 2010
 
E safety training
E safety trainingE safety training
E safety training
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Social media policy
Social media policySocial media policy
Social media policy
 
Faculty and staff training
Faculty and staff trainingFaculty and staff training
Faculty and staff training
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Cellphones09 29
Cellphones09 29Cellphones09 29
Cellphones09 29
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technology
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroom
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Online safety web project description
Online safety web project descriptionOnline safety web project description
Online safety web project description
 

Viewers also liked

Manual curso taller adobe photoshop básico
Manual curso taller adobe photoshop básicoManual curso taller adobe photoshop básico
Manual curso taller adobe photoshop básicoMarco Antonio Jaén
 
God's generous grace and our vocations
God's generous grace and our vocationsGod's generous grace and our vocations
God's generous grace and our vocationsEdward Bryant
 
Losers, bromance and chicken & beer: a journey into Chinese web culture
Losers, bromance and chicken & beer: a journey into Chinese web cultureLosers, bromance and chicken & beer: a journey into Chinese web culture
Losers, bromance and chicken & beer: a journey into Chinese web cultureLabbrand
 
보관용 이베이
보관용 이베이보관용 이베이
보관용 이베이Kay Ellie
 
Теплица дачная стрелка
Теплица дачная стрелкаТеплица дачная стрелка
Теплица дачная стрелкаAl Maks
 
Biometrics presentation
Biometrics presentationBiometrics presentation
Biometrics presentationSn Moddho
 
Question Focus Recognition in Question Answering Systems
Question Focus Recognition in Question  Answering Systems Question Focus Recognition in Question  Answering Systems
Question Focus Recognition in Question Answering Systems Waheeb Ahmed
 
Proiectele eTwinning cale spre cunoasterea culturii europene
Proiectele eTwinning  cale spre cunoasterea culturii europeneProiectele eTwinning  cale spre cunoasterea culturii europene
Proiectele eTwinning cale spre cunoasterea culturii europeneGrigore Gheorghita
 
González, Roberto. Integración social de jóvenes
González, Roberto. Integración social de jóvenesGonzález, Roberto. Integración social de jóvenes
González, Roberto. Integración social de jóvenesCristian Arce
 
Probak egiten ari naiz
Probak egiten ari naizProbak egiten ari naiz
Probak egiten ari naizhelenaaldaz
 
Ruta de aprendizaje semana 1
Ruta de aprendizaje semana 1Ruta de aprendizaje semana 1
Ruta de aprendizaje semana 1Kattia Rodriguez
 

Viewers also liked (20)

Manual curso taller adobe photoshop básico
Manual curso taller adobe photoshop básicoManual curso taller adobe photoshop básico
Manual curso taller adobe photoshop básico
 
God's generous grace and our vocations
God's generous grace and our vocationsGod's generous grace and our vocations
God's generous grace and our vocations
 
Losers, bromance and chicken & beer: a journey into Chinese web culture
Losers, bromance and chicken & beer: a journey into Chinese web cultureLosers, bromance and chicken & beer: a journey into Chinese web culture
Losers, bromance and chicken & beer: a journey into Chinese web culture
 
Case study task
Case study taskCase study task
Case study task
 
보관용 이베이
보관용 이베이보관용 이베이
보관용 이베이
 
Теплица дачная стрелка
Теплица дачная стрелкаТеплица дачная стрелка
Теплица дачная стрелка
 
Presentation1
Presentation1Presentation1
Presentation1
 
Biometrics presentation
Biometrics presentationBiometrics presentation
Biometrics presentation
 
Joblinge
JoblingeJoblinge
Joblinge
 
Fcp
FcpFcp
Fcp
 
Chronicle Map
Chronicle MapChronicle Map
Chronicle Map
 
Los sustantivos
Los sustantivosLos sustantivos
Los sustantivos
 
Question Focus Recognition in Question Answering Systems
Question Focus Recognition in Question  Answering Systems Question Focus Recognition in Question  Answering Systems
Question Focus Recognition in Question Answering Systems
 
Fdfsdf
FdfsdfFdfsdf
Fdfsdf
 
A solution for processing supply chain events within ontology-­based descrip...
A solution for processing supply chain  events within ontology-­based descrip...A solution for processing supply chain  events within ontology-­based descrip...
A solution for processing supply chain events within ontology-­based descrip...
 
Proiectele eTwinning cale spre cunoasterea culturii europene
Proiectele eTwinning  cale spre cunoasterea culturii europeneProiectele eTwinning  cale spre cunoasterea culturii europene
Proiectele eTwinning cale spre cunoasterea culturii europene
 
González, Roberto. Integración social de jóvenes
González, Roberto. Integración social de jóvenesGonzález, Roberto. Integración social de jóvenes
González, Roberto. Integración social de jóvenes
 
Probak egiten ari naiz
Probak egiten ari naizProbak egiten ari naiz
Probak egiten ari naiz
 
1 uu no 20 tahun 2003 ttg sisdiknas
1 uu no 20 tahun 2003 ttg sisdiknas1 uu no 20 tahun 2003 ttg sisdiknas
1 uu no 20 tahun 2003 ttg sisdiknas
 
Ruta de aprendizaje semana 1
Ruta de aprendizaje semana 1Ruta de aprendizaje semana 1
Ruta de aprendizaje semana 1
 

Similar to Reflection on integrating the internet safely and ethically

Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethicallyLinda Long
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethicallyLinda Long
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectjuliewltn
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectjuliewltn
 
Internet publication
Internet publicationInternet publication
Internet publicationlinamccoach
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectjuliewltn
 
Staff training session
Staff training sessionStaff training session
Staff training sessionmander5208
 
Internet Publication
Internet PublicationInternet Publication
Internet PublicationDré Davis
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ssLenva Shearing
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipAplus Admin
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectjuliewltn
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parentsamelialouise
 
Computers in the Classroom
Computers in the ClassroomComputers in the Classroom
Computers in the Classroomguestb1be291
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rulesMazni Salleh
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
 

Similar to Reflection on integrating the internet safely and ethically (20)

Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
 
Lesson 3 ethical issues
Lesson 3   ethical issuesLesson 3   ethical issues
Lesson 3 ethical issues
 
Internet publication
Internet publicationInternet publication
Internet publication
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
 
Staff training session
Staff training sessionStaff training session
Staff training session
 
Internet Publication
Internet PublicationInternet Publication
Internet Publication
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ss
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
 
Wingate Policy Paper
Wingate Policy PaperWingate Policy Paper
Wingate Policy Paper
 
E safety for governors & carers
E safety for governors & carersE safety for governors & carers
E safety for governors & carers
 
Common ethical issues
Common ethical issuesCommon ethical issues
Common ethical issues
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parents
 
Computers in the Classroom
Computers in the ClassroomComputers in the Classroom
Computers in the Classroom
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 

Reflection on integrating the internet safely and ethically

  • 1. REFLECTION ON INTEGRATING THE INTERNET SAFELY AND ETHICALLY Anna Lovel IDT 7064
  • 2. PERSONAL USES OF THE INTERNET I currently use the internet for the following:  Online banking  Online shopping: Amazon  Getting a Master’s Degree  Work and personal email accounts  Finding information and images to use for school and work  I currently do not use the internet for social reasons such as chatting, Twitter, or social networking.  I easily use the internet four hours a day.
  • 3. PERSONAL SAFETY ON THE INTERNET  I use the internet for sensitive information, such as banking, and it would probably be wise to change my password.  It is rare that I share any information on the internet; however, I have been uncomfortable a few times when I had to use my social security number online.  All accounts can be hacked, so I know that it is important to minimize the number of accounts that are linked to important information.
  • 4. PERSONAL SAFETY ON THE INTERNET (CONT.)  In order to maintain the integrity of my computer, I installed Avast for free.  Additionally, I do not click on unreliable links, nor do I respond to phishing scams, which are explained by Anderson (2008).  Because I do not engage in any social media, the risks of image sharing, being tracked though my cell phone, or having my information stolen from a website are greatly reduced.  These risks are especially important for young people to be aware of, as netsmartz explains.
  • 5. PERSONAL ETHICS ON THE INTERNET  I must admit that my practices concerning images are not entirely ethical. I often use them without a source, even though it is obvious that the image is not my own.  I do cut and paste off of the internet, despite the fact that this is discouraged by Fryer (2003). I do, however, provide a source for that work.  I have never infringed on copyrights by downloading music or other files illegally.
  • 6. ACCEPTABLE USE POLICY  My school is a charter school, and to my knowledge, we have no written acceptable use policy.  Because we have no written policy, I have been using the “common sense” policy.  All students are turned so that I can see their computer screens.  Only mature, hard-working, trustworthy students are allowed to use the computers.  Students do not use the computers without supervision and permission.  All students must be on-task at all times.
  • 7. THE MCS POLICY  My school technically falls under the MCS umbrella.  The MCS policy places a significant burden on the students and parents in order to ensure that the internet is used ethically:  “MCS will make reasonable efforts to supervise students’ Internet and e-mail use, but will not be responsible for claims and liabilities arising out of such use.” (Form No. 14197)  Reasonable efforts are not defined at any point in the document, and there do not appear to be instructions for the teacher concerning how to provide reasonable efforts.
  • 8. BLOCKING OR FILTERING  My school has few blocks or filters.  For example, I cannot engage in a job search at work, but last year, a student was caught viewing pornography on his personal laptop while at school.  There are obvious gaps in the filter.  I know, from my conversations with other teachers and my own education in MCS, that MCS has many filters and blocks on their network, to the point that it compromises the usefulness of the internet.
  • 9. ACCEPTABLE USE POLICIES The Soulsville Charter Memphis City Schools School  No document.  Eight page  Teachers are required document, including a to directly supervise release form for students who are using students, parents, and computers. employees.  Requirements for  Requirements for students are unclear. supervision are unclear, although there  No disclaimers; anyone are requirements for could be responsible students. for consequences of use.  Numerous disclaimers.  Seems to be outdated.
  • 10. CURRENT IMPLEMENTATION OF ETHICS  Students are required to cite information that was obtained from the internet or other written texts.  Students must use MLA formatting for listing their references and in their citations.  Frequently, this actually looks like students providing references at the end of their project without ever having cited these sources in their project.  Plagiarism is detected using my own personal radar: I compare the work to what I know about the student’s writing and knowledge.  I have been less concerned with the source of images.
  • 11. RIGOR OF PRACTICES  The rigor for textual citations is appropriate, according to Fryer (2003), but it should be better implemented.  Fryer strongly discourages cutting and pasting text from the internet, but I know that my students do this. Even if they do use the citation, they still need to list it as a quotation.  The expectation for images is set too low. All images should be cited, especially if they are copyrighted (Fryer 2003).
  • 12. FUTURE SAFETY AND EHTICS PRACTICES  My instructions to students about how to cite their work need to be more specific so that students will cite all of the information that they get from a source, in order to respect intellectual property (Anderson 2008).  I should require citations for images, especially if there are more than 5, or students should explicitly state that the image is open source in order to avoid confusion and copyright infringement (Anderson 2008).
  • 13. FUTURE SAFETY AND ETHICS PRACTICES (CONT.)  I should continue to monitor students directly when they are using computers in order to ensure that they are being used appropriately and safely.  I will discuss with my school leaders about creating an AUP.  I would suggest that we base our AUP on the one provided by iSafe, rather than the one written by MCS.
  • 14. REFERNCES  Anderson, R. S. (2008). Excerpt from Chapter 5: Literacy in the Information Age. Technology to teach literacy: A resource for K-8 teachers. Upper Saddle River, NJ: Merrill Prentice Hall.  Fryer, W. (2003). Copyright 101 for educators. TechEdge. Retrieved from http://www.wtvi.com/teks/02_03_articles/copyright.html  ------. Acceptable Use Policies. Carlsbad, CA: i-SAFE America, Inc. Retrieved from http://www.isafe.org/imgs/pdf/education/AUPs.pdf  ------. Memphis City Schools E-mail and Internet Acceptable Use Agreement. Memphis, TN.  ------. Netsmartz videos. Retrieved from http://www.netsmartz.org/RealLifeStories/JuliesJourney