safe and ethical use of technology in the classroom power point final
DESCRIPTION
TRANSCRIPT
Safe and Ethical Use of Technology in the Classroom
Edna LaMarcaNovember 11, 2013
“This presentation contains copyrighted material under the educational fair use exemption to the U.S. copyright law."
The Core Principles
Core Principles
Computer Safety
Social Networkin
g
Ethics
Copyright Guideline
s
Plagiarism
Citation
Computer Safety Both On and Offline
Microsoft
Technology HardwareBe Careful with Devices
Place securely on tablesHandle carefullyWatch for cords and cableKeep devices clean
Respect software and programsNever open attachments you are not expectingNever download programs, apps, etc.Keep an updated virus protection planBack up your files regularly
Technology Hardware
Acceptable Use PolicyPasswords
PasswordsYour Responsibility
UniqueChanged on a regular basisComposed of both letters
and numbersNever be given to anyone elseNot to taped under the computer or in another
easily accessible place
Passwords
Technology Hardware
Acceptable Use Policy
Acceptable Use PolicyYour responsibility to know
the rulesParental Permission FormEverything may be searched
Never:Access pornographic, obscene materialVandalize property of another personPirate softwareViolate any local, state, or federal statue
Acceptable Use Policy
PasswordsTechnology Hardware
Social Networking Dos and Don’ts
Fotolia
We must be professional and responsible with every word
Never give out personal information
Secure sites “http” but not secure “http”
Organizations want to market to you
When we enter the Internet we become connected with
the world
Presentation Pro
A Stranger is a DangerProtect yourself from
Predators
Protect yourself from Cyberbullying
Protect yourself by not giving out too much information
Johnson, D. (2012). The classroom teacher’s technology survival guide. San Francisco, CA: John Wiley & Sons.
Images from Microsoft
Ethical Use of Internet Materials
Images from Microsoft
EthicsIs the branch of philosophy that deals with moral judgments, issues of right and wrong, and determining what behaviors are humane or inhumane.
“Ethical Action” is an action that does not have damaging impact on oneself, other individuals, or society.”
Johnson, D. (2012). The classroom teacher’s technology survival guide. San Francisco, CA: John Wiley & Sons.
Johnson's Three Rules of Technology Ethics
1.Privacy – I will protect my privacy and respect the privacy of others.
2. Property – I will protect my property and respect the property of others.
3. Appropriate use – I will use technology in constructive ways and in ways that do not break the rules of my family, faith, school, or government.
Johnson, D. (2012). The classroom teacher’s technology survival guide. San Francisco, CA: John Wiley & Sons
Do Not: Steal of Destroy
Exaggerate or EmbellishLook at or create tasteless, offensive or lacking
in educational value material.Do:
Treat intellectual property the same way you would treat physical property
Question material – Hate groups, Political extremists
* Does my use of the technology violate the
privacy of others, or am I giving information to others that I should not?
Johnson, D. (2012). The classroom teacher’s technology survival guide. San Francisco, CA: John Wiley & Sons.
Copyright Guidelines
Images from Microsoft
PLAGIARISM
Accidental or Intentional Plagiarism:
Copying a quotation without quotation marksNot writing the citation showing where the information comes fromWriting material very close to the originalParaphrasing - writing another’s ideas in your own words –
rearranging wordsCopying and pasting without using citations or quotation marksPurchasing work (such as essays) from the Internet and claiming
them as your ownUsing another student’s work as your ownUsing images, charts, or graphics without a citationGiving information that is not accurate
Mizikar, A. (). Battling Plagiarism in the Internet age. Retrieved from http://www6.wittenberg.edu/lib/help/plagiarism/
Methods of Checking for Plagiarism Changes in Writing Style Unusual Word Choices Changes in Font Above/Below Class Level Not the Right Topic Check Citations Samples of in-class Writing Dated References
Students Write Summaries Boolean Searches
Microsoft
Citations Easy Bib
• http://content.easybib.com/citation-guides/apa-format
Study Mode
• http://www.studymode.com/citation-generator/
APA Format Citation Generator
• http://apareferencing.ukessays.com/
THE CORE PRINCIPLES
Core Principles
Computer Safety
Social Networking
Ethics
Copyright Guidelines
Plagiarism
Citation
Follow the Rules
AskReport Learn
Bibliography
Chaudhary, N. (). Free Images of Technology. Retrieved from
http://www.google.com/search?q=free+images+of+technology&nord
=1&rlz=1C2GGGE_enUS510US543&tbm=isch&tbo=u&source=univ&sa=X&ei=wrd2UouDCOSOyAHqhIGQDg&ved=0CFwQsAQ&biw
=1292&bih=683#facrc=_&imgdii=_&imgrc=Y1axob-gHnJyJM%3A%3BmewJg4JEtZemvM%3Bhttp%2
Free Images of Technology. Retrieved from http://www.google.com/search?q=free+images+of+technology&nord=1&rlz=1C2GGGE_en
US510US543&tbm=isch&tbo=u&source=univ&sa=X&ei=wrd2UouDCOSOyAHqhIGQDg&ved=0CFwQsAQ&biw=1292bih=683
Free Images of Technology. Retrieved from http://office.microsoft.com
Johnson, D. (2012). The classroom teacher’s technology survival guide. San Francisco, CA: John Wiley & Sons
https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?assetMetaId=d9ec986b-3a6b-48fd-85ec-
278389888511&assetDataId=22d60f48-4737-40d0-93c6-ba6b18108fdf§ionId=ch07lev1sec1&assetpdfdataid=dd438dd1-2462-4fe0-
9eeb-a422cffd9dff
Mizikar, A. (). Battling Plagiarism in the Internet age. Retrieved from http://www6.wittenberg.edu/lib/help/plagiarism/