h ardware security c omputers should be positioned in a safe place with cords and cables covered. d...

9
SAFE & ETHICAL USE OF TECHNOLOGY “A SIMPLE WAY OF DEFINING AN ‘ETHICAL ACTION’ IS THAT SUCH AN ACTION DOES NOT HAVE A DAMAGING IMPACT ON ONESELF, OTHER INDIVIDUALS, OR SOCIETY.” (JOHNSON, 2012)

Upload: ashlynn-dennis

Post on 25-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

SAFE & ETHICAL USE OF TECHNOLOGY

“A SIMPLE WAY OF DEFINING AN ‘ETHICAL ACTION’ IS THAT SUCH AN ACTION DOES NOT

HAVE A DAMAGING IMPACT ON ONESELF, OTHER INDIVIDUALS, OR SOCIETY.” (JOHNSON,

2012)

COMPUTER SAFETY VIRUSES

• DO NOT OPEN ANY UNEXPECTED EMAIL ATTACHMENTS OR DOWNLOAD ANY PROGRAMS FROM UNKNOWN SOURCES.

• DOWNLOAD A VIRUS PROTECTION PROGRAM AND SET IT TO SCAN YOUR COMPUTER REGULARLY, ESPECIALLY IF YOU HAVE A LAPTOP OR DESKTOP COMPUTER YOU USE BOTH AT HOME AND AT SCHOOL..

HARDWARE SECURITY

• COMPUTERS SHOULD BE POSITIONED IN A SAFE PLACE WITH CORDS AND CABLES COVERED.

• DO NOT OPEN THE PROTECTIVE CASE. LEAVE ANY REPAIRS TO A QUALIFIED TECHNICIAN.

DATA PRIVACY• No posting of photographs or student work on the

school Web site unless a permission slip is signed by the parent. Students’ last names, e-mail addresses, or other identifying information will not appear on the school Web site.

• Students need to recognize that school-provided e-mail accounts, file storage space, and log-ins and usage logs may be viewed by school authorities and law enforcement officers if necessary.

Passwords• Should be unique for each application• Should be changed on a regular, frequent basis• Should be composed of both letters and numbers for

highest security• Should be composed of a string of characters not

found in a dictionary• Should be kept in a secure place if written down• Should never be given to anyone else, especially

other students

Personal Privacy• Nothing online is private.• Never give your social security number over the

Internet. Be very careful to whom you supply your telephone number, e-mail address, mailing address, and other personal information.

• When making a purchase using a credit card on the Internet, make sure the site is reputable and ‘‘secure.’’ A secure site’s address will begin with ‘‘https’’rather than simply ‘‘http.’’

School Internet Acceptable Use Policy• Know it and abide by it.

SOCIAL NETWORKINGDOS

• POST ONLY WHAT YOU WANT THE WORLD TO SEE. IMAGINE YOUR PARENTS, TEACHERS, ADMINISTRATORS AND FUTURE EMPLOYERS VISITING YOUR SITE. ON A SOCIAL NETWORKING SITE, ONCE YOU POST SOMETHING IT MAY BE AVAILABLE EVEN AFTER YOU HAVE REMOVED IT FROM YOUR ACCOUNT—PHOTOS OR COMMENTS MAY BE SHARED WIDELY IN ONLY MINUTES—AND CAN NEVER BE RECOVERED.

• VISIT YOUR PROFILE’S SECURITY AND PRIVACY SETTINGS. AT A MINIMUM, STUDENTS SHOULD HAVE ALL PRIVACY SETTINGS SET TO ‘‘ONLY FRIENDS.’’ MAKING YOUR INFORMATION VISIBLE TO ‘‘FRIENDS OF FRIENDS’’ AND ‘‘NETWORKS AND FRIENDS’’ OPENS YOUR CONTENT TO A LARGE GROUP OF UNKNOWN PEOPLE. YOUR PRIVACY AND THAT OF YOUR FAMILY MAY BE AT RISK.

• DUE TO SECURITY RISKS, BE CAUTIOUS WHEN INSTALLING THE EXTERNAL APPLICATIONS THAT WORK WITH THE SOCIAL NETWORKING SITE. EXAMPLES OF THESE APPLICATIONS ARE CALENDAR PROGRAMS AND GAMES.

• RUN UPDATED MALWARE PROTECTION TO AVOID INFECTIONS OF SPYWARE AND ADWARE THAT SOCIAL NETWORKING SITES MIGHT PLACE ON YOUR COMPUTER.

• BE CAREFUL NOT TO FALL FOR PHISHING SCAMS THAT ARRIVE VIA E-MAIL OR ON YOUR WALL, PROVIDING A LINK FOR YOU TO CLICK THAT LEADS TO A FAKE LOG-IN PAGE.

DON’TS

• DO NOT INITIATE FRIENDSHIPS WITH TEACHERS.

• DO NOT ACCEPT PEOPLE YOU DO NOT KNOW AS FRIENDS. REMEMBER THAT PEOPLE CLASSIFIED AS FRIENDS HAVE THE ABILITY TO DOWNLOAD AND SHARE YOUR INFORMATION WITH OTHERS.

• DO NOT DISCUSS OTHER STUDENTS OR PUBLICLY CRITICIZE SCHOOL POLICIES OR PERSONNEL.

• DO NOT USE COMMENTARY DEEMED TO BE DEFAMATORY, OBSCENE, PROPRIETARY, OR LIBELOUS. EXERCISE CAUTION IN REGARD TO EXAGGERATION, COLORFUL LANGUAGE, GUESSWORK, OBSCENITY, COPYRIGHTED MATERIALS, LEGAL CONCLUSIONS, AND DEROGATORY REMARKS OR CHARACTERIZATIONS.

COPYRIGHT GUIDELINESPRINTED MATERIAL(SHORT)• ONE POEM LESS THAN 250 WORDS,

OR A 250-WORD EXCERPT OF A POEM GREATER THAN 250 WORDS

• UP TO 10 PERCENT OR 1,000 WORDS, WHICHEVER IS LESS, OF A SINGLE COPYRIGHTED WORK OF TEXT

• ONE CHART, PICTURE, DIAGRAM, OR CARTOON PER BOOK OR PER PERIODICAL ISSUE

• TWO PAGES (MAXIMUM) FROM AN ILLUSTRATED WORK LESS THAN 2,500 WORDS (E.G., A CHILDREN’S BOOK)

STUDENTS CAN INCORPORATE TEXT INTO A MULTIMEDIA PROJECT

*COPIED TEXT MUST BE PROPERLY CITED

ILLUSTRATIONS AND PHOTOGRAPHS• PHOTOGRAPH

• ILLUSTRATION

• COLLECTIONS OF PHOTOGRAPHS

• COLLECTIONS OF ILLUSTRATIONS

SINGLE WORKS MAY BE USED IN THEIR ENTIRETY, BUT NO MORE THAN FIVE IMAGES BY A SINGLE ARTIST OR PHOTOGRAPHER MAY BE USED

FROM A COLLECTION, NO MORE THAN 15 IMAGES OR 10% (WHICHEVER IS LESS) MAY BE USED

CHECK TO MAKE SURE OLDER ILLUSTRATIONS ARE NOT PART OF A COPYRIGHT COLLECTION.

COPYRIGHT OWNERSHIP INFORMATION IS AVAILABLE AT WWW.LOC.GOV OR WWW.MPA.ORG

Video (for integration intomultimedia or video projects)• Videotapes (purchased)• DVDs• Laserdiscs• Multimedia encyclopedias• Quick Time Movies• Video clips from the InternetStudents “may use portions of lawfully acquired copyrightedworks in their academic multimedia”10% or three minutes (whichever is less) of “motion media”• Material must be a legal copy or a home recording• Copyrighted works included in multimedia projects must be cited properly.

COPYRIGHT GUIDELINES -CONTINUEDMUSIC (FOR INTEGRATION INTO MULTIMEDIA OR VIDEO PROJECTS)

• RECORDS

• CASSETTE TAPES

• CDS

• AUDIO CLIPS ON THE WEB

UP TO 10% OF A COPYRIGHTED MUSICAL COMPOSITION MAY BE REPRODUCED, PERFORMED, AND DISPLAYED AS PART OF A MULTIMEDIA PROGRAM.

A MAXIMUM OF 30 SECONDS PER MUSICAL COMPOSITION MAY BE USED.

ALTERATIONS TO A MUSICAL WORK SHOULD NOT CHANGE THE BASIC MELODY OR THE FUNDAMENTAL CHARACTER OF THE WORK.

COMPUTER SOFTWARE• SOFTWARE (PURCHASED)

• SOFTWARE (LICENSED)

COPIES MAY ONLY BE MADE FOR ARCHIVAL PURPOSES, FOLLOWING THE SOFTWARE APPLICATION’S END USER LICENSE AGREEMENT.

ONLY ONE MACHINE AT A TIME MAY USE THE PROGRAM .

THE NUMBER OF SIMULTANEOUS USERS MUST NOT EXCEED THE NUMBER OF LICENSES; AND THE NUMBER OF MACHINES BEING USED MUST NEVER EXCEED THE NUMBER LICENSED.

Internet • Internet connections

• World Wide Web

Images may be downloaded for projects

Sound files and video files may be downloaded for use in multimedia projects (see portion restrictions).

• Resources from the Web may not be reposted onto the Internet; however,links may be posted.• Downloaded resources must have been legitimately acquired bythe Web site.

METHODS FOR CHECKING FOR PLAGIARISM-THE "WRONGFUL APPROPRIATION" AND "PURLOINING AND PUBLICATION" OF ANOTHER AUTHOR'S "LANGUAGE, THOUGHTS, IDEAS, OR EXPRESSIONS," AND THE REPRESENTATION OF THEM AS ONE'S OWN ORIGINAL WORK

(WIKIPEDIA.COM)

1. The most common method of detecting plagiarism relies on the ability of ateacher to make deductions about the probability of plagiarism on the basis of internal clues embedded in the text itself. An assessor can only confirm an initial suspicion of plagiarism by manually matching the suspected plagiarisms to the original sources. (Kakkonen & Mozgovov, 2010) 2. An assessor manually inserts parenthesized extracts from a suspected text into a searchengine.

3. Automatic plagiarism detection software, such as: Turnitin, Sherlock, SafeAssignment, WCopyfind, Antiplagiarist –compares text with database of papers.

PROPER CITATION METHODS

Basic guidelines for formatting citations in the text• Place the complete citation within parentheses. • Use the words in the first part of the citation exactly as they appear in the References so that the source in

the text can easily be located in the References. • Use the author’s last name and year for the citation: (Smith, 2008). Use et al. for additional citations of a

source with three to five authors: first citation – (Smith, Levy, & Jones, 2008), additional citations – (Smith et al., 2008). Use et al. along with the first author in the citation when a source has more than five authors: (Smith et al., 2008).

• Place the year in the citation, but do not include the month and day. • Use only the last name of the author, and never include the first name or initials except in a personal

communication. • Place the name of a group author (corporations, organizations, and government agencies) first when no

individual author is listed in the source. • Use the first two or three words of the title of the work when no author is listed: (Writing Executive

Summaries, 2007) or (“Evaluating a Case Study,” 2008). Capitalize all major words of the title. • Use italics for titles of books, periodicals, movies, television shows, and reports. Use quotation marks for

titles of articles, chapters, or web pages. • Include the page or paragraph number for a direct quotation: p. or pp. for page numbers, para. for paragraph

numbers. You can also use the section heading of the document if needed. It is recommended that you include page or paragraph numbers with your paraphrases.

• Place any necessary punctuation after the final parenthesis of the citation unless it is a block quotation. • Never use a URL address in the citation. • Cite your work if you are referencing work from a previous document.

PROPER CITATION METHODS - CONTINUEDBasic guidelines for formatting the References page• Place the references in alphabetical order in one list. (Do not number references or separate them

into categories.) • Use periods to separate each major element in the reference: Name, A. (Year). Article title. Journal

Title, 24(4), 13-16. • Include the author’s last name and first and middle initials: Smith, G. Q. (Always use initials instead

of authors’ first/middle names.) • Use ellipses between the sixth and final author’s name when the source has more than eight

authors: Smith, G. Q., Levy, J., Jones, B., Arthur, N. S., Banks, E., Adam, C., . . . Arnold, A. • Place the year in parentheses after the author’s name: Smith, G. Q. (2008). If no year is available,

put (n.d.) in parentheses. Include the month or season with the copyright for magazine articles (2010, March) or (2011, Summer). Include the month and day for newspaper articles (2009, May 7) .

• Place the title of a book or article first when no author is listed in the source. • Capitalize the following elements of the first title mentioned in the reference: first word, proper

nouns, and the first word after a colon or a dash. • Capitalize all major words of the second title mentioned in the reference (e.g., journal titles,

newspaper titles, book titles) • Use italics for titles of books, journals, newspapers, movies, and long reports or studies. • Never use quotation marks or italics for article titles. • Include a retrieval date only for Internet sources that contain content that can change over time,

such as Wikis. • Use the DOI number for electronic sources rather than the name of a database: doi:xxxxxx. If the

document does not contain a DOI number, use the URL of the publisher’s home page: Retrieved from http://www.xxxxxx. (Do not use periods at the end of a DOI number or URL address.)

• Include database retrieval information only for sources with limited circulation. • Never include a source that is not mentioned in the paper. • Lead your reader as closely as possible to your source. Not every source will fit the examples in

this guide, so you may need to combine elements from more than one option to create your entry.

REFERENCESBrown, V., Jordan, R., Rubin, N., & Arome, G. (2010). Strengths and Weaknesses of Plagiarism Software. Journal Of Literacy & Technology, 11(1/2), 110-131.

Center for Writing Excellence. University of Phoenix Online.

Johnson, D. (2012) The Classroom Teacher’s Technology Survival Guide.San Francisco, CA:John Wiley and Sons. Kakkonen, T., & Mozgovoy, M. (2010). Hermetic and Web Plagiarism Detection Systems for

Student Essays—an Evaluation of the State-of-the-Art. Journal Of Educational Computing Research, 42(2), 135-159. doi:10.2190/EC.42.2.a

Virginia International University. Copyright and Fair Use Guidelines for Students. Retrieved from http://kohlerconics.webs.com/Copyright%20Guidelines%20for%20Students.pdf

Wikipedia.com