SlideShare a Scribd company logo
1 of 14
REFLECTION ON INTEGRATING THE
INTERNET SAFELY AND ETHICALLY
Anna Lovel
IDT 7064
PERSONAL USES OF THE INTERNET
I currently use the internet for the following:
 Online banking
 Online shopping: Amazon
 Getting a Master’s Degree
 Work and personal email accounts
 Finding information and images to use for school
   and work

 I currently do not use the internet for social reasons
  such as chatting, Twitter, or social networking.
 I easily use the internet four hours a day.
PERSONAL SAFETY ON THE INTERNET
   I use the internet for sensitive information, such as
    banking, and it would probably be wise to change
    my password.

   It is rare that I share any information on the internet;
    however, I have been uncomfortable a few times
    when I had to use my social security number online.

   All accounts can be hacked, so I know that it is
    important to minimize the number of accounts that
    are linked to important information.
PERSONAL SAFETY ON THE INTERNET (CONT.)
 In order to maintain the integrity of my computer, I
  installed Avast for free.
 Additionally, I do not click on unreliable links, nor do
  I respond to phishing scams, which are explained
  by Anderson (2008).
 Because I do not engage in any social media, the
  risks of image sharing, being tracked though my
  cell phone, or having my information stolen from a
  website are greatly reduced.
 These risks are especially important for young
  people to be aware of, as netsmartz explains.
PERSONAL ETHICS ON THE INTERNET
 I must admit that my practices concerning images
  are not entirely ethical. I often use them without a
  source, even though it is obvious that the image is
  not my own.
 I do cut and paste off of the internet, despite the
  fact that this is discouraged by Fryer (2003). I
  do, however, provide a source for that work.
 I have never infringed on copyrights by
  downloading music or other files illegally.
ACCEPTABLE USE POLICY
 My school is a charter school, and to my
  knowledge, we have no written acceptable use
  policy.
 Because we have no written policy, I have been
  using the “common sense” policy.
     All students are turned so that I can see their computer
      screens.
     Only mature, hard-working, trustworthy students are
      allowed to use the computers.
     Students do not use the computers without supervision
      and permission.
     All students must be on-task at all times.
THE MCS POLICY
 My school technically falls under the MCS umbrella.
 The MCS policy places a significant burden on the
  students and parents in order to ensure that the
  internet is used ethically:
       “MCS will make reasonable efforts to supervise
        students’ Internet and e-mail use, but will not be
        responsible for claims and liabilities arising out of such
        use.” (Form No. 14197)
   Reasonable efforts are not defined at any point in
    the document, and there do not appear to be
    instructions for the teacher concerning how to
    provide reasonable efforts.
BLOCKING OR FILTERING
 My school has few blocks or filters.
 For example, I cannot engage in a job search at
  work, but last year, a student was caught viewing
  pornography on his personal laptop while at school.
 There are obvious gaps in the filter.

 I know, from my conversations with other teachers
  and my own education in MCS, that MCS has many
  filters and blocks on their network, to the point that
  it compromises the usefulness of the internet.
ACCEPTABLE USE POLICIES
The Soulsville Charter
                           Memphis City Schools
School

 No document.              Eight page
 Teachers are required      document, including a
  to directly supervise      release form for
  students who are using     students, parents, and
  computers.                 employees.
 Requirements for          Requirements for
  students are unclear.      supervision are
                             unclear, although there
 No disclaimers; anyone
                             are requirements for
  could be responsible
                             students.
  for consequences of
  use.                      Numerous disclaimers.
                            Seems to be outdated.
CURRENT IMPLEMENTATION OF ETHICS
 Students are required to cite information that was
  obtained from the internet or other written texts.
 Students must use MLA formatting for listing their
  references and in their citations.
 Frequently, this actually looks like students providing
  references at the end of their project without ever
  having cited these sources in their project.
 Plagiarism is detected using my own personal radar:
  I compare the work to what I know about the
  student’s writing and knowledge.
 I have been less concerned with the source of
  images.
RIGOR OF PRACTICES
 The rigor for textual citations is
  appropriate, according to Fryer (2003), but it should
  be better implemented.
 Fryer strongly discourages cutting and pasting text
  from the internet, but I know that my students do
  this. Even if they do use the citation, they still need
  to list it as a quotation.
 The expectation for images is set too low. All
  images should be cited, especially if they are
  copyrighted (Fryer 2003).
FUTURE SAFETY AND EHTICS PRACTICES
 My instructions to students about how to cite their
  work need to be more specific so that students will
  cite all of the information that they get from a
  source, in order to respect intellectual property
  (Anderson 2008).
 I should require citations for images, especially if
  there are more than 5, or students should explicitly
  state that the image is open source in order to
  avoid confusion and copyright infringement
  (Anderson 2008).
FUTURE SAFETY AND ETHICS PRACTICES
(CONT.)
 I should continue to monitor students directly when
  they are using computers in order to ensure that
  they are being used appropriately and safely.
 I will discuss with my school leaders about creating
  an AUP.
 I would suggest that we base our AUP on the one
  provided by iSafe, rather than the one written by
  MCS.
REFERNCES
   Anderson, R. S. (2008). Excerpt from Chapter 5: Literacy in
    the Information Age. Technology to teach literacy: A resource
    for K-8 teachers. Upper Saddle River, NJ: Merrill Prentice
    Hall.
   Fryer, W. (2003). Copyright 101 for educators. TechEdge.
    Retrieved from
    http://www.wtvi.com/teks/02_03_articles/copyright.html
   ------. Acceptable Use Policies. Carlsbad, CA: i-SAFE
    America, Inc. Retrieved from
    http://www.isafe.org/imgs/pdf/education/AUPs.pdf
   ------. Memphis City Schools E-mail and Internet Acceptable
    Use Agreement. Memphis, TN.
   ------. Netsmartz videos. Retrieved from
    http://www.netsmartz.org/RealLifeStories/JuliesJourney

More Related Content

What's hot

Lansing Cc 2010
Lansing Cc 2010Lansing Cc 2010
Lansing Cc 2010
elizkeren
 
Social media policy
Social media policySocial media policy
Social media policy
Har1982
 
Cellphones09 29
Cellphones09 29Cellphones09 29
Cellphones09 29
elizkeren
 
Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technology
peav1n0
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroom
Gabriella Maree Wheeler
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
Matt Forney
 
Online safety web project description
Online safety web project descriptionOnline safety web project description
Online safety web project description
chrisswanson
 

What's hot (18)

Internet safety for kids
Internet safety for kidsInternet safety for kids
Internet safety for kids
 
Ass1ppt.orgn
Ass1ppt.orgnAss1ppt.orgn
Ass1ppt.orgn
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)
 
Lansing Cc 2010
Lansing Cc 2010Lansing Cc 2010
Lansing Cc 2010
 
E safety training
E safety trainingE safety training
E safety training
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Social media policy
Social media policySocial media policy
Social media policy
 
Faculty and staff training
Faculty and staff trainingFaculty and staff training
Faculty and staff training
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Cellphones09 29
Cellphones09 29Cellphones09 29
Cellphones09 29
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technology
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroom
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Online safety web project description
Online safety web project descriptionOnline safety web project description
Online safety web project description
 

Viewers also liked

보관용 이베이
보관용 이베이보관용 이베이
보관용 이베이
Kay Ellie
 
Biometrics presentation
Biometrics presentationBiometrics presentation
Biometrics presentation
Sn Moddho
 

Viewers also liked (20)

Manual curso taller adobe photoshop básico
Manual curso taller adobe photoshop básicoManual curso taller adobe photoshop básico
Manual curso taller adobe photoshop básico
 
God's generous grace and our vocations
God's generous grace and our vocationsGod's generous grace and our vocations
God's generous grace and our vocations
 
Losers, bromance and chicken & beer: a journey into Chinese web culture
Losers, bromance and chicken & beer: a journey into Chinese web cultureLosers, bromance and chicken & beer: a journey into Chinese web culture
Losers, bromance and chicken & beer: a journey into Chinese web culture
 
Case study task
Case study taskCase study task
Case study task
 
보관용 이베이
보관용 이베이보관용 이베이
보관용 이베이
 
Теплица дачная стрелка
Теплица дачная стрелкаТеплица дачная стрелка
Теплица дачная стрелка
 
Presentation1
Presentation1Presentation1
Presentation1
 
Biometrics presentation
Biometrics presentationBiometrics presentation
Biometrics presentation
 
Joblinge
JoblingeJoblinge
Joblinge
 
Fcp
FcpFcp
Fcp
 
Chronicle Map
Chronicle MapChronicle Map
Chronicle Map
 
Los sustantivos
Los sustantivosLos sustantivos
Los sustantivos
 
Question Focus Recognition in Question Answering Systems
Question Focus Recognition in Question  Answering Systems Question Focus Recognition in Question  Answering Systems
Question Focus Recognition in Question Answering Systems
 
Fdfsdf
FdfsdfFdfsdf
Fdfsdf
 
A solution for processing supply chain events within ontology-­based descrip...
A solution for processing supply chain  events within ontology-­based descrip...A solution for processing supply chain  events within ontology-­based descrip...
A solution for processing supply chain events within ontology-­based descrip...
 
Proiectele eTwinning cale spre cunoasterea culturii europene
Proiectele eTwinning  cale spre cunoasterea culturii europeneProiectele eTwinning  cale spre cunoasterea culturii europene
Proiectele eTwinning cale spre cunoasterea culturii europene
 
González, Roberto. Integración social de jóvenes
González, Roberto. Integración social de jóvenesGonzález, Roberto. Integración social de jóvenes
González, Roberto. Integración social de jóvenes
 
Probak egiten ari naiz
Probak egiten ari naizProbak egiten ari naiz
Probak egiten ari naiz
 
1 uu no 20 tahun 2003 ttg sisdiknas
1 uu no 20 tahun 2003 ttg sisdiknas1 uu no 20 tahun 2003 ttg sisdiknas
1 uu no 20 tahun 2003 ttg sisdiknas
 
Ruta de aprendizaje semana 1
Ruta de aprendizaje semana 1Ruta de aprendizaje semana 1
Ruta de aprendizaje semana 1
 

Similar to Reflection on integrating the internet safely and ethically

Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
Linda Long
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
juliewltn
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
juliewltn
 
Staff training session
Staff training sessionStaff training session
Staff training session
mander5208
 
Internet Publication
Internet PublicationInternet Publication
Internet Publication
Dré Davis
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ss
Lenva Shearing
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
Aplus Admin
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
juliewltn
 
Computers in the Classroom
Computers in the ClassroomComputers in the Classroom
Computers in the Classroom
guestb1be291
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
Mazni Salleh
 

Similar to Reflection on integrating the internet safely and ethically (20)

Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
 
Lesson 3 ethical issues
Lesson 3   ethical issuesLesson 3   ethical issues
Lesson 3 ethical issues
 
Internet publication
Internet publicationInternet publication
Internet publication
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
 
Staff training session
Staff training sessionStaff training session
Staff training session
 
Internet Publication
Internet PublicationInternet Publication
Internet Publication
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ss
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
 
Wingate Policy Paper
Wingate Policy PaperWingate Policy Paper
Wingate Policy Paper
 
E safety for governors & carers
E safety for governors & carersE safety for governors & carers
E safety for governors & carers
 
Common ethical issues
Common ethical issuesCommon ethical issues
Common ethical issues
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parents
 
Computers in the Classroom
Computers in the ClassroomComputers in the Classroom
Computers in the Classroom
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 

Reflection on integrating the internet safely and ethically

  • 1. REFLECTION ON INTEGRATING THE INTERNET SAFELY AND ETHICALLY Anna Lovel IDT 7064
  • 2. PERSONAL USES OF THE INTERNET I currently use the internet for the following:  Online banking  Online shopping: Amazon  Getting a Master’s Degree  Work and personal email accounts  Finding information and images to use for school and work  I currently do not use the internet for social reasons such as chatting, Twitter, or social networking.  I easily use the internet four hours a day.
  • 3. PERSONAL SAFETY ON THE INTERNET  I use the internet for sensitive information, such as banking, and it would probably be wise to change my password.  It is rare that I share any information on the internet; however, I have been uncomfortable a few times when I had to use my social security number online.  All accounts can be hacked, so I know that it is important to minimize the number of accounts that are linked to important information.
  • 4. PERSONAL SAFETY ON THE INTERNET (CONT.)  In order to maintain the integrity of my computer, I installed Avast for free.  Additionally, I do not click on unreliable links, nor do I respond to phishing scams, which are explained by Anderson (2008).  Because I do not engage in any social media, the risks of image sharing, being tracked though my cell phone, or having my information stolen from a website are greatly reduced.  These risks are especially important for young people to be aware of, as netsmartz explains.
  • 5. PERSONAL ETHICS ON THE INTERNET  I must admit that my practices concerning images are not entirely ethical. I often use them without a source, even though it is obvious that the image is not my own.  I do cut and paste off of the internet, despite the fact that this is discouraged by Fryer (2003). I do, however, provide a source for that work.  I have never infringed on copyrights by downloading music or other files illegally.
  • 6. ACCEPTABLE USE POLICY  My school is a charter school, and to my knowledge, we have no written acceptable use policy.  Because we have no written policy, I have been using the “common sense” policy.  All students are turned so that I can see their computer screens.  Only mature, hard-working, trustworthy students are allowed to use the computers.  Students do not use the computers without supervision and permission.  All students must be on-task at all times.
  • 7. THE MCS POLICY  My school technically falls under the MCS umbrella.  The MCS policy places a significant burden on the students and parents in order to ensure that the internet is used ethically:  “MCS will make reasonable efforts to supervise students’ Internet and e-mail use, but will not be responsible for claims and liabilities arising out of such use.” (Form No. 14197)  Reasonable efforts are not defined at any point in the document, and there do not appear to be instructions for the teacher concerning how to provide reasonable efforts.
  • 8. BLOCKING OR FILTERING  My school has few blocks or filters.  For example, I cannot engage in a job search at work, but last year, a student was caught viewing pornography on his personal laptop while at school.  There are obvious gaps in the filter.  I know, from my conversations with other teachers and my own education in MCS, that MCS has many filters and blocks on their network, to the point that it compromises the usefulness of the internet.
  • 9. ACCEPTABLE USE POLICIES The Soulsville Charter Memphis City Schools School  No document.  Eight page  Teachers are required document, including a to directly supervise release form for students who are using students, parents, and computers. employees.  Requirements for  Requirements for students are unclear. supervision are unclear, although there  No disclaimers; anyone are requirements for could be responsible students. for consequences of use.  Numerous disclaimers.  Seems to be outdated.
  • 10. CURRENT IMPLEMENTATION OF ETHICS  Students are required to cite information that was obtained from the internet or other written texts.  Students must use MLA formatting for listing their references and in their citations.  Frequently, this actually looks like students providing references at the end of their project without ever having cited these sources in their project.  Plagiarism is detected using my own personal radar: I compare the work to what I know about the student’s writing and knowledge.  I have been less concerned with the source of images.
  • 11. RIGOR OF PRACTICES  The rigor for textual citations is appropriate, according to Fryer (2003), but it should be better implemented.  Fryer strongly discourages cutting and pasting text from the internet, but I know that my students do this. Even if they do use the citation, they still need to list it as a quotation.  The expectation for images is set too low. All images should be cited, especially if they are copyrighted (Fryer 2003).
  • 12. FUTURE SAFETY AND EHTICS PRACTICES  My instructions to students about how to cite their work need to be more specific so that students will cite all of the information that they get from a source, in order to respect intellectual property (Anderson 2008).  I should require citations for images, especially if there are more than 5, or students should explicitly state that the image is open source in order to avoid confusion and copyright infringement (Anderson 2008).
  • 13. FUTURE SAFETY AND ETHICS PRACTICES (CONT.)  I should continue to monitor students directly when they are using computers in order to ensure that they are being used appropriately and safely.  I will discuss with my school leaders about creating an AUP.  I would suggest that we base our AUP on the one provided by iSafe, rather than the one written by MCS.
  • 14. REFERNCES  Anderson, R. S. (2008). Excerpt from Chapter 5: Literacy in the Information Age. Technology to teach literacy: A resource for K-8 teachers. Upper Saddle River, NJ: Merrill Prentice Hall.  Fryer, W. (2003). Copyright 101 for educators. TechEdge. Retrieved from http://www.wtvi.com/teks/02_03_articles/copyright.html  ------. Acceptable Use Policies. Carlsbad, CA: i-SAFE America, Inc. Retrieved from http://www.isafe.org/imgs/pdf/education/AUPs.pdf  ------. Memphis City Schools E-mail and Internet Acceptable Use Agreement. Memphis, TN.  ------. Netsmartz videos. Retrieved from http://www.netsmartz.org/RealLifeStories/JuliesJourney