SlideShare una empresa de Scribd logo
1 de 14
REFLECTION ON INTEGRATING THE
INTERNET SAFELY AND ETHICALLY
Anna Lovel
IDT 7064
PERSONAL USES OF THE INTERNET
I currently use the internet for the following:
 Online banking
 Online shopping: Amazon
 Getting a Master’s Degree
 Work and personal email accounts
 Finding information and images to use for school
   and work

 I currently do not use the internet for social reasons
  such as chatting, Twitter, or social networking.
 I easily use the internet four hours a day.
PERSONAL SAFETY ON THE INTERNET
   I use the internet for sensitive information, such as
    banking, and it would probably be wise to change
    my password.

   It is rare that I share any information on the internet;
    however, I have been uncomfortable a few times
    when I had to use my social security number online.

   All accounts can be hacked, so I know that it is
    important to minimize the number of accounts that
    are linked to important information.
PERSONAL SAFETY ON THE INTERNET (CONT.)
 In order to maintain the integrity of my computer, I
  installed Avast for free.
 Additionally, I do not click on unreliable links, nor do
  I respond to phishing scams, which are explained
  by Anderson (2008).
 Because I do not engage in any social media, the
  risks of image sharing, being tracked though my
  cell phone, or having my information stolen from a
  website are greatly reduced.
 These risks are especially important for young
  people to be aware of, as netsmartz explains.
PERSONAL ETHICS ON THE INTERNET
 I must admit that my practices concerning images
  are not entirely ethical. I often use them without a
  source, even though it is obvious that the image is
  not my own.
 I do cut and paste off of the internet, despite the
  fact that this is discouraged by Fryer (2003). I
  do, however, provide a source for that work.
 I have never infringed on copyrights by
  downloading music or other files illegally.
ACCEPTABLE USE POLICY
 My school is a charter school, and to my
  knowledge, we have no written acceptable use
  policy.
 Because we have no written policy, I have been
  using the “common sense” policy.
     All students are turned so that I can see their computer
      screens.
     Only mature, hard-working, trustworthy students are
      allowed to use the computers.
     Students do not use the computers without supervision
      and permission.
     All students must be on-task at all times.
THE MCS POLICY
 My school technically falls under the MCS umbrella.
 The MCS policy places a significant burden on the
  students and parents in order to ensure that the
  internet is used ethically:
       “MCS will make reasonable efforts to supervise
        students’ Internet and e-mail use, but will not be
        responsible for claims and liabilities arising out of such
        use.” (Form No. 14197)
   Reasonable efforts are not defined at any point in
    the document, and there do not appear to be
    instructions for the teacher concerning how to
    provide reasonable efforts.
BLOCKING OR FILTERING
 My school has few blocks or filters.
 For example, I cannot engage in a job search at
  work, but last year, a student was caught viewing
  pornography on his personal laptop while at school.
 There are obvious gaps in the filter.

 I know, from my conversations with other teachers
  and my own education in MCS, that MCS has many
  filters and blocks on their network, to the point that
  it compromises the usefulness of the internet.
ACCEPTABLE USE POLICIES
The Soulsville Charter
                           Memphis City Schools
School

 No document.              Eight page
 Teachers are required      document, including a
  to directly supervise      release form for
  students who are using     students, parents, and
  computers.                 employees.
 Requirements for          Requirements for
  students are unclear.      supervision are
                             unclear, although there
 No disclaimers; anyone
                             are requirements for
  could be responsible
                             students.
  for consequences of
  use.                      Numerous disclaimers.
                            Seems to be outdated.
CURRENT IMPLEMENTATION OF ETHICS
 Students are required to cite information that was
  obtained from the internet or other written texts.
 Students must use MLA formatting for listing their
  references and in their citations.
 Frequently, this actually looks like students providing
  references at the end of their project without ever
  having cited these sources in their project.
 Plagiarism is detected using my own personal radar:
  I compare the work to what I know about the
  student’s writing and knowledge.
 I have been less concerned with the source of
  images.
RIGOR OF PRACTICES
 The rigor for textual citations is
  appropriate, according to Fryer (2003), but it should
  be better implemented.
 Fryer strongly discourages cutting and pasting text
  from the internet, but I know that my students do
  this. Even if they do use the citation, they still need
  to list it as a quotation.
 The expectation for images is set too low. All
  images should be cited, especially if they are
  copyrighted (Fryer 2003).
FUTURE SAFETY AND EHTICS PRACTICES
 My instructions to students about how to cite their
  work need to be more specific so that students will
  cite all of the information that they get from a
  source, in order to respect intellectual property
  (Anderson 2008).
 I should require citations for images, especially if
  there are more than 5, or students should explicitly
  state that the image is open source in order to
  avoid confusion and copyright infringement
  (Anderson 2008).
FUTURE SAFETY AND ETHICS PRACTICES
(CONT.)
 I should continue to monitor students directly when
  they are using computers in order to ensure that
  they are being used appropriately and safely.
 I will discuss with my school leaders about creating
  an AUP.
 I would suggest that we base our AUP on the one
  provided by iSafe, rather than the one written by
  MCS.
REFERNCES
   Anderson, R. S. (2008). Excerpt from Chapter 5: Literacy in
    the Information Age. Technology to teach literacy: A resource
    for K-8 teachers. Upper Saddle River, NJ: Merrill Prentice
    Hall.
   Fryer, W. (2003). Copyright 101 for educators. TechEdge.
    Retrieved from
    http://www.wtvi.com/teks/02_03_articles/copyright.html
   ------. Acceptable Use Policies. Carlsbad, CA: i-SAFE
    America, Inc. Retrieved from
    http://www.isafe.org/imgs/pdf/education/AUPs.pdf
   ------. Memphis City Schools E-mail and Internet Acceptable
    Use Agreement. Memphis, TN.
   ------. Netsmartz videos. Retrieved from
    http://www.netsmartz.org/RealLifeStories/JuliesJourney

Más contenido relacionado

La actualidad más candente

Lansing Cc 2010
Lansing Cc 2010Lansing Cc 2010
Lansing Cc 2010
elizkeren
 
Social media policy
Social media policySocial media policy
Social media policy
Har1982
 
Cellphones09 29
Cellphones09 29Cellphones09 29
Cellphones09 29
elizkeren
 
Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technology
peav1n0
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroom
Gabriella Maree Wheeler
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
Matt Forney
 
Online safety web project description
Online safety web project descriptionOnline safety web project description
Online safety web project description
chrisswanson
 

La actualidad más candente (18)

Internet safety for kids
Internet safety for kidsInternet safety for kids
Internet safety for kids
 
Ass1ppt.orgn
Ass1ppt.orgnAss1ppt.orgn
Ass1ppt.orgn
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)
 
Lansing Cc 2010
Lansing Cc 2010Lansing Cc 2010
Lansing Cc 2010
 
E safety training
E safety trainingE safety training
E safety training
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Social media policy
Social media policySocial media policy
Social media policy
 
Faculty and staff training
Faculty and staff trainingFaculty and staff training
Faculty and staff training
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Cellphones09 29
Cellphones09 29Cellphones09 29
Cellphones09 29
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technology
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroom
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Online safety web project description
Online safety web project descriptionOnline safety web project description
Online safety web project description
 

Destacado

Ideal reader biography and mission statement
Ideal reader biography and mission statementIdeal reader biography and mission statement
Ideal reader biography and mission statement
conorchanner
 
icabihal sayi 4
icabihal sayi 4icabihal sayi 4
icabihal sayi 4
kolormatik
 
icabihal sayi 5
icabihal sayi 5icabihal sayi 5
icabihal sayi 5
kolormatik
 
Naroa, maider, maria
Naroa, maider, mariaNaroa, maider, maria
Naroa, maider, maria
gazadi
 
Anew webinar presentation_2.0
Anew webinar presentation_2.0Anew webinar presentation_2.0
Anew webinar presentation_2.0
aneweducation
 
「開放式領導」期末報告 Zappos通體舒暢
「開放式領導」期末報告 Zappos通體舒暢「開放式領導」期末報告 Zappos通體舒暢
「開放式領導」期末報告 Zappos通體舒暢
Douny Yang
 

Destacado (20)

Ideal reader biography and mission statement
Ideal reader biography and mission statementIdeal reader biography and mission statement
Ideal reader biography and mission statement
 
Prezentare sotron grigore_geta_caracal
Prezentare sotron grigore_geta_caracalPrezentare sotron grigore_geta_caracal
Prezentare sotron grigore_geta_caracal
 
Филатова О.Г. PR-агентства на региональном рынке коммуникационных услуг (опыт...
Филатова О.Г. PR-агентства на региональном рынке коммуникационных услуг (опыт...Филатова О.Г. PR-агентства на региональном рынке коммуникационных услуг (опыт...
Филатова О.Г. PR-агентства на региональном рынке коммуникационных услуг (опыт...
 
Precious metals
Precious metalsPrecious metals
Precious metals
 
icabihal sayi 4
icabihal sayi 4icabihal sayi 4
icabihal sayi 4
 
Powerpoint imagenes
Powerpoint imagenesPowerpoint imagenes
Powerpoint imagenes
 
Assessment of IEC-61499 and CDL for Function Block composition in factory-wid...
Assessment of IEC-61499 and CDL for Function Block composition in factory-wid...Assessment of IEC-61499 and CDL for Function Block composition in factory-wid...
Assessment of IEC-61499 and CDL for Function Block composition in factory-wid...
 
icabihal sayi 5
icabihal sayi 5icabihal sayi 5
icabihal sayi 5
 
Creelo 5to
Creelo 5toCreelo 5to
Creelo 5to
 
Reality shock j aracil
Reality shock   j aracilReality shock   j aracil
Reality shock j aracil
 
Onderzoek naar de invloed van webactiviteiten op didactische interactie in de...
Onderzoek naar de invloed van webactiviteiten op didactische interactie in de...Onderzoek naar de invloed van webactiviteiten op didactische interactie in de...
Onderzoek naar de invloed van webactiviteiten op didactische interactie in de...
 
Naroa, maider, maria
Naroa, maider, mariaNaroa, maider, maria
Naroa, maider, maria
 
Anew webinar presentation_2.0
Anew webinar presentation_2.0Anew webinar presentation_2.0
Anew webinar presentation_2.0
 
Todas laminas mineduc
Todas laminas mineducTodas laminas mineduc
Todas laminas mineduc
 
WEBDESIGN TUDÁSTÁR: Színek alkalmazása
WEBDESIGN TUDÁSTÁR: Színek alkalmazásaWEBDESIGN TUDÁSTÁR: Színek alkalmazása
WEBDESIGN TUDÁSTÁR: Színek alkalmazása
 
「開放式領導」期末報告 Zappos通體舒暢
「開放式領導」期末報告 Zappos通體舒暢「開放式領導」期末報告 Zappos通體舒暢
「開放式領導」期末報告 Zappos通體舒暢
 
The faces behind the story
The faces behind the storyThe faces behind the story
The faces behind the story
 
Study material
Study materialStudy material
Study material
 
Turk resimpiyasasi
Turk resimpiyasasiTurk resimpiyasasi
Turk resimpiyasasi
 
Developing Strategic Readers
Developing Strategic ReadersDeveloping Strategic Readers
Developing Strategic Readers
 

Similar a Reflection on integrating the internet safely and ethically

Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
Linda Long
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
juliewltn
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
juliewltn
 
Staff training session
Staff training sessionStaff training session
Staff training session
mander5208
 
Internet Publication
Internet PublicationInternet Publication
Internet Publication
Dré Davis
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ss
Lenva Shearing
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
Aplus Admin
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
juliewltn
 
Computers in the Classroom
Computers in the ClassroomComputers in the Classroom
Computers in the Classroom
guestb1be291
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
Mazni Salleh
 

Similar a Reflection on integrating the internet safely and ethically (20)

Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
 
Lesson 3 ethical issues
Lesson 3   ethical issuesLesson 3   ethical issues
Lesson 3 ethical issues
 
Internet publication
Internet publicationInternet publication
Internet publication
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
 
Staff training session
Staff training sessionStaff training session
Staff training session
 
Internet Publication
Internet PublicationInternet Publication
Internet Publication
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ss
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
 
Wingate Policy Paper
Wingate Policy PaperWingate Policy Paper
Wingate Policy Paper
 
E safety for governors & carers
E safety for governors & carersE safety for governors & carers
E safety for governors & carers
 
Common ethical issues
Common ethical issuesCommon ethical issues
Common ethical issues
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parents
 
Computers in the Classroom
Computers in the ClassroomComputers in the Classroom
Computers in the Classroom
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Reflection on integrating the internet safely and ethically

  • 1. REFLECTION ON INTEGRATING THE INTERNET SAFELY AND ETHICALLY Anna Lovel IDT 7064
  • 2. PERSONAL USES OF THE INTERNET I currently use the internet for the following:  Online banking  Online shopping: Amazon  Getting a Master’s Degree  Work and personal email accounts  Finding information and images to use for school and work  I currently do not use the internet for social reasons such as chatting, Twitter, or social networking.  I easily use the internet four hours a day.
  • 3. PERSONAL SAFETY ON THE INTERNET  I use the internet for sensitive information, such as banking, and it would probably be wise to change my password.  It is rare that I share any information on the internet; however, I have been uncomfortable a few times when I had to use my social security number online.  All accounts can be hacked, so I know that it is important to minimize the number of accounts that are linked to important information.
  • 4. PERSONAL SAFETY ON THE INTERNET (CONT.)  In order to maintain the integrity of my computer, I installed Avast for free.  Additionally, I do not click on unreliable links, nor do I respond to phishing scams, which are explained by Anderson (2008).  Because I do not engage in any social media, the risks of image sharing, being tracked though my cell phone, or having my information stolen from a website are greatly reduced.  These risks are especially important for young people to be aware of, as netsmartz explains.
  • 5. PERSONAL ETHICS ON THE INTERNET  I must admit that my practices concerning images are not entirely ethical. I often use them without a source, even though it is obvious that the image is not my own.  I do cut and paste off of the internet, despite the fact that this is discouraged by Fryer (2003). I do, however, provide a source for that work.  I have never infringed on copyrights by downloading music or other files illegally.
  • 6. ACCEPTABLE USE POLICY  My school is a charter school, and to my knowledge, we have no written acceptable use policy.  Because we have no written policy, I have been using the “common sense” policy.  All students are turned so that I can see their computer screens.  Only mature, hard-working, trustworthy students are allowed to use the computers.  Students do not use the computers without supervision and permission.  All students must be on-task at all times.
  • 7. THE MCS POLICY  My school technically falls under the MCS umbrella.  The MCS policy places a significant burden on the students and parents in order to ensure that the internet is used ethically:  “MCS will make reasonable efforts to supervise students’ Internet and e-mail use, but will not be responsible for claims and liabilities arising out of such use.” (Form No. 14197)  Reasonable efforts are not defined at any point in the document, and there do not appear to be instructions for the teacher concerning how to provide reasonable efforts.
  • 8. BLOCKING OR FILTERING  My school has few blocks or filters.  For example, I cannot engage in a job search at work, but last year, a student was caught viewing pornography on his personal laptop while at school.  There are obvious gaps in the filter.  I know, from my conversations with other teachers and my own education in MCS, that MCS has many filters and blocks on their network, to the point that it compromises the usefulness of the internet.
  • 9. ACCEPTABLE USE POLICIES The Soulsville Charter Memphis City Schools School  No document.  Eight page  Teachers are required document, including a to directly supervise release form for students who are using students, parents, and computers. employees.  Requirements for  Requirements for students are unclear. supervision are unclear, although there  No disclaimers; anyone are requirements for could be responsible students. for consequences of use.  Numerous disclaimers.  Seems to be outdated.
  • 10. CURRENT IMPLEMENTATION OF ETHICS  Students are required to cite information that was obtained from the internet or other written texts.  Students must use MLA formatting for listing their references and in their citations.  Frequently, this actually looks like students providing references at the end of their project without ever having cited these sources in their project.  Plagiarism is detected using my own personal radar: I compare the work to what I know about the student’s writing and knowledge.  I have been less concerned with the source of images.
  • 11. RIGOR OF PRACTICES  The rigor for textual citations is appropriate, according to Fryer (2003), but it should be better implemented.  Fryer strongly discourages cutting and pasting text from the internet, but I know that my students do this. Even if they do use the citation, they still need to list it as a quotation.  The expectation for images is set too low. All images should be cited, especially if they are copyrighted (Fryer 2003).
  • 12. FUTURE SAFETY AND EHTICS PRACTICES  My instructions to students about how to cite their work need to be more specific so that students will cite all of the information that they get from a source, in order to respect intellectual property (Anderson 2008).  I should require citations for images, especially if there are more than 5, or students should explicitly state that the image is open source in order to avoid confusion and copyright infringement (Anderson 2008).
  • 13. FUTURE SAFETY AND ETHICS PRACTICES (CONT.)  I should continue to monitor students directly when they are using computers in order to ensure that they are being used appropriately and safely.  I will discuss with my school leaders about creating an AUP.  I would suggest that we base our AUP on the one provided by iSafe, rather than the one written by MCS.
  • 14. REFERNCES  Anderson, R. S. (2008). Excerpt from Chapter 5: Literacy in the Information Age. Technology to teach literacy: A resource for K-8 teachers. Upper Saddle River, NJ: Merrill Prentice Hall.  Fryer, W. (2003). Copyright 101 for educators. TechEdge. Retrieved from http://www.wtvi.com/teks/02_03_articles/copyright.html  ------. Acceptable Use Policies. Carlsbad, CA: i-SAFE America, Inc. Retrieved from http://www.isafe.org/imgs/pdf/education/AUPs.pdf  ------. Memphis City Schools E-mail and Internet Acceptable Use Agreement. Memphis, TN.  ------. Netsmartz videos. Retrieved from http://www.netsmartz.org/RealLifeStories/JuliesJourney