Plagiarism, Netiquette, and Internet Safety

Download Report

Transcript Plagiarism, Netiquette, and Internet Safety

Plagiarism, Netiquette, and
Internet Safety
Amy Benko
Gail Evanchan
Leah Oser
Objectives:
• Provide a definition for Plagiarism, Netiquette,
and Internet Safety
• Offer tips for how to prevent plagiarism in
your classroom and home
• Supply the rules of netiquette
• Demonstrate ways to be safe on the Internet
at home and school
A story about Plagiarism
PLAGIARISM!!!!!!!
• The action of presenting another person’s
work as one’s own.
3 Ways Students Plagiarize
• Copy and paste entire pieces
• Copy and paraphrase parts of an article
without quoting or referencing
• Cut and paste to combine different sources
while writing
Types of Plagiarism using technology
• Copy and pasting from the Internet
• Taking digital photography with digital
cameras and cell phones
• Instant messaging and text messaging
• Video recordings
• Playing information off of iPods and PDAs
When are Students Most Likely to
Plagiarize
• Don’t know how to synthesize information
• Don’t know how to cite or reference
information
• Use only one internet source
• Feel they don’t have enough time for the
assignment
• Everyone else is cheating, why not?
Solutions for teachers!!!
• Teach students to respect material created by
others
• Teach proper citing of sources
• TEACH HOW TO PUT INFORMATION IN YOUR
OWN WORDS!
• Arrange classroom so computers face the middle
of room
• Have parents and students Acceptable use
Documents (make sure plagiarism is addressed)
Software Available
• www.turnitin.com
• TOAST
• http://www.cshe.unimelb.edu.au/assessinglea
rning/03/plagsoftsumm1.html
Solutions for Parents
• USE COMMON SENSE!
• Proof-read your child’s work
• Ask the following questions:
– Does my child talk like this?
– Do they know the meaning of these words?
Have the students to show you the sites they used to
obtain the information
Be proactive and stay involved in your child’s school
work!
NETIQUETTE
• The manners we use on the Internet based on
common sense and respect.
• REMEMBER WE ARE STILL USING A FORM OF
WRITTEN COMMUNICATION!!
Netiquette Rules
• Never send anything that reflects poorly on
you or anyone else
• Company sent e-mails are company property
and can be monitored
• Avoid offensive comments (even as a joke)
• Stay away from emotional language as it can
be easily misinterpreted
• Forward messages with care
•
•
•
•
•
Don’t sacrifice accuracy for efficiency
Don’t type in all caps (emphasizes yelling)
Don’t type in all small letters (looks lazy)
Make sure messages are clear and organized
Make sure subject line contains enough
information to be filed and saved easily
INTERNET SAFETY
• Making sure students of any age are safe
while using the Internet
Ways to Keep Students Safe
• Sites intended for adults, biased towards
certain groups, or encourage or promote
violence stay out of the classroom
Ways to Address Internet Safety
• Make sure to read, discuss, and sign an
Acceptable use document
• Make sure the arrangement of the monitors
face toward the center of the classroom
• Teachers need to circulate when computers
are in use
• Use filtering software to block access to sites
that are inappropriate
• Use browsers and search engines that are
grade level appropriate level
• Allow children to search and access prescreened sites
• Be accessible to the students
Cyber-bullying
When a minor is teased, tormented, embarrassed or
harassed by another minor through the use of the
Internet or other multimedia source.
Action Plan:
•
•
•
•
•
Keep information private that’s personal
Stop, block, and tell!
Google yourself
Take 5
Practice the golden rule and don’t be an accomplice
Reputation Defender
Ohio Standards ELA and Tech
•
•
Grade level focus: Grades 6-8
ELA:
– Research
– Locate and summarize important information from multiple sources
– Organize information in a systematic way
– Acknowledge quoted and paraphrased information and document sources used
– Communication: Oral and Visual
– Select an organizational structure appropriate to the topic, audience, setting and
purpose
•
Tech:
– Technology and Communication Application
– Communicate information technologically and incorporate principles of design into
the creation of messages and communication products.
– Select appropriate technology communication tools and design collaborative
interactive projects and activities to communicate with others
– Technology and Information Literacy
– Evaluate the accuracy, authority, objectivity, currency, coverage and relevance of
information and data sources
– Select, access and use appropriate electronic resources for a defined information
need.
Safety Pledges and Other Sources
•
•
•
•
•
Safety Pledge Grades K-2
Internet Safety Pledge Grades K-2
Safety Pledge Grades 3-6
Internet Safety Pledge Grades 3-6
Internet Safety Pledge Grades 7-12
• www.coppa.org
REFERENCES
Berg, B. (2006). When Marion copied. Fort Atkinson, WI: UpstartBoooks.
Bertram, B. (2000). Access points on a digital river. [Electronic version]. Journal of
Adolescent & Adult Literacy, 44 (3). 1-8.
Dillner, M. (2000). Internet safety and ethics for the classroom. Reading Online.
Retrieved March 1, 2009, from http://www.readingonline.org/editorial/ethics.html
Gallant, T. B. (2008). Twenty-first century forces shaping academic integrity. ASHE
Higher Education Report, 33 (5), 65-78.
Goldman, L. (2007, October 16). Netiquette rules – 10 best rules for email etiquette.
Home:Busimess/Workplace –Communication. Retrieved March 8, 2009, from
http://ezinearticles.com/?Netiquette-Rules---10-Best-Rules-for-EmailEtiquette&id=7851777 WHEN
Kinzer,C. (2000/2991, December/January). Addressing issues of Internet safety [an Electronic
Classroom Web watch]. Reading Online, 4(6). Retrieved March 8, 2009, from
http://www.readingonline.org/electronic/webwatch/safety/index.html
Kinzer, C. (2000). Web watch: Addressing issues of internet safety. Reading Online. Retrieved
Pascarella, J. (2008). Confronting the challenges of critical digital literacy: An essay review critical
constructivism: A primer. Educational Studies, 43 (3), 246-255.
Storm, P. (2007, Winter). Cheating in middle school and high school. Educational Forum, 71(2).
104-116. Retrieved March 7, 2009, from
http://web.ebscohost.com/ehost/detail?vid=44&hid=109&sid=c3426538-a1b1-4c34-b7fd2b…
Warn, J. (2006, May). Plagiarism software: No magic bullet!. Higher Education Research
&Development, 25(2), 195-208. Retrieved March 7, 2009, from
http://web.ebscohost.com/ehost/detail?vid=49&hid=,109&sid=c3426538-albl-4c34-b7fd-2b
http://www.reputationdefender.com/mychild
http://www.coppa.org/comply
http://www.stopcyberbullying.org
http://www.netsmartz.org