background preloader

Paul Robeson Library

Paul Robeson Library

A dozen ways to teach ethical and safe technology use From the draft of my Survival Skills book: A dozen ways to teach and promote ethical and safe technology use Responsible teachers recognize that schools must give students the understandings and skills they need to stay safe not just in school, but outside of school where most Internet use by young people occurs. Teachers who address safe and ethical Internet use proactively: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. Will doing those things guarantee that a student will never get in trouble or danger online? Ethical instruction needs to be on going. * Johnson’s 3 P’s of Technology Ethics: Privacy - I will protect my privacy and respect the privacy of others.Property - I will protect my property and respect the property of others.a(P)propriate Use - I will use technology in constructive ways and in ways which do not break the rules of my family, church, school, or government. Image source:

Teaching Guide: Dealing with Plagiarism As access to documents on the World Wide Web has grown, the issue of plagiarism and the enforcement of the consequences for academic dishonesty have become important concerns for writing teachers and teachers who use writing in their courses. This guide can help you deal with the concept of plagiarism before it becomes an issue in your classroom as well as deal with enforcing its consequences if the situation should occur. Teaching Ethical Behavior in the Global World of Information and the New AASL Standards, School Library Media Activities Monthly, 2008-Dec The American Association of School Librarians "Standards for the 21st Century Learner" (2007) expresses nine fundamental common beliefs. One of these beliefs is that "ethical behavior in the use of information must be taught" (AASL 2007, 1). It is important for library media specialists to understand that teaching ethical behavior is much more than teaching students about plagiarism. In this article, the author focuses on the explanation of ethical principles as well as steps, learning activities, and tools to assist upper elementary through high school library media specialists and content teachers in teaching ethical behavior in the global world of information and the new AASL standards. The learning tasks are focused on problem solving in realistic situations rather than just learning bodies of content. This approach is inspired by the writing of Richard J. Libraries Unlimited.

Plagiarism You have something in common with the smartest people in the world. You see, everyone has ideas. We use our minds to create something original, whether it’s a poem, a drawing, a song, or a scientific paper. Some of the most important ideas are published and make it into books, journals, newspapers and trustworthy websites that become the building blocks for things we all learn. But ideas are also very personal, and we need dependable ways to keep track of the people behind the ideas we use because they deserve credit for their contribution, just as you do if someone uses your idea. Passing off another person’s ideas or words as your own, without credit, is called plagiarism. Meet Cassie, a university student. She’s not the kind of person who would plagiarize by turning in someone else’s work, but she is aware that plagiarism can happen accidentally, so she follows some basic rules: Second, she’s careful to use only her own words when she’s not quoting directly.

Proper Internet Use | Tools for Teaching Cyber Ethics Everyone knows someone who has commited a cyber crime. Perhaps you downloaded a song you shouldn't have or maybe somebody else's research was a little more helpful than it should have been. Students are no different and the temptation to commit cyber crimes exists in every school. Are our schools filled with budding cyber criminals unaware of the consequences of their online activities? Should educators scramble to institute a formal cyber ethics curriculum? Or should schools ban the use of the Internet? High School Student Arrested for Online Investment Fraud A 14-year-old recently purchased inexpensive stocks, lied about their potential value in an investment chat room, and reaped hundreds of thousands of dollars when other investors bought his lies -- and the stocks! Poll Reveals Kids Think Hacking Is OK! Cyber Ethics Conference Convened in Maryland! FBI Calls for Cyber Ethics Curriculum! Is cyber crime an epidemic? Crystal should know.

Simple thoughts about fair use Copyright is not an absolute. Potato chips are absolute. If this is my potato chip, then it's not yours. There is a yin to the yang of copyright protection, and it's called Fair Use. Without fair use, it would be impossible to write a negative book review, or compare Shakespeare to the Simpsons. Most web users should know a few simple guidelines, principles so simple that you can generally assume them to be rules. You don't need to ask someone's permission to include a link to their site.You don't need to ask permission to include a screen shot of a website in a directory, comment on that site or parody it.You can quote hundreds of words from a book (for an article or book or on your website) without worrying about it and you certainly don't need a signed release from the original author or publisher. There's a difference between being polite and observing the law. PS as soon as you make something and fix it in a tangible form, you own the copyright in it.

referenceandinformationresources / Plagiarism Resources Tutorials: Two brief videos from ABC News (one focuses on the videos available on YouTube that "teach" cheating): From Connect with Kids: High Tech Cheating A brief video and article (August 18th, 2010) Free Online Plagiarism Detection Tools: Bowman, V. (2004). NY: Neal-Schuman. Callahan, D. (2004). Orlando: Harcourt. Harris, R. (2004). Lathrop, A., & Foss, K. (2000). Englewood, CO: Libraries Unlimited. from cheating and plagiarism to honesty and integrity: Strategies for change. Libraries Unlimited. McKenzie, J. (1998). age. McKenzie, J. (2002). Minkel, W. (2002). Johnson, D. (2004) Plagiarism proofing assignments. Johnson is also the author of Learning Right from Wrong in the Digital Age: An Ethics Guide for Parents, Teachers, Librarians and Others who Care About Computer-Using Young People. Noodle Tools. (2006). template for a plagiarism policy and ways to teach notetaking. Pope, D.C. (2001). miseducated students. Big Nerds

The Plagiarism Resource Site « Welcome About Plagiarism: Plagiarism is the misrepresentation of authorship. Typically, words and ideas conceived by one person are attributed to another person. Plagiarism is a form of intellectual theft or fraud and it undermines the intellectual economy that values ideas, words, and understanding. In the most common form of plagiarism, one author’s words are inserted verbatim in the work of a second author, without quotation, acknowledgement, or attribution. Plagiarism is not a black-and-white issue because many of our ideas and words derive from those of others, and what constitutes true intellectual theft or fraud often involves some degree of subjectivity. What this Site Provides: Software for Detecting Plagiarism WCopyfind is an open source windows-based program that explores a collection of documents, looking for matching language. Thoughts and Ideas about Plagiarism, Education, and Society Links to Other Web Sites Dealing with Plagiarism

Related: