1 / 22

Plagiarism, Netiquette, and Internet Safety

Plagiarism, Netiquette, and Internet Safety. Amy Benko Gail Evanchan Leah Oser. Objectives:. Provide a definition for Plagiarism, Netiquette, and Internet Safety Offer tips for how to prevent plagiarism in your classroom and home Supply the rules of netiquette

schampine
Download Presentation

Plagiarism, Netiquette, and Internet Safety

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Plagiarism, Netiquette, and Internet Safety Amy Benko Gail Evanchan Leah Oser

  2. Objectives: • Provide a definition for Plagiarism, Netiquette, and Internet Safety • Offer tips for how to prevent plagiarism in your classroom and home • Supply the rules of netiquette • Demonstrate ways to be safe on the Internet at home and school

  3. A story about Plagiarism

  4. PLAGIARISM!!!!!!! • The action of presenting another person’s work as one’s own.

  5. 3 Ways Students Plagiarize • Copy and paste entire pieces • Copy and paraphrase parts of an article without quoting or referencing • Cut and paste to combine different sources while writing

  6. Types of Plagiarism using technology • Copy and pasting from the Internet • Taking digital photography with digital cameras and cell phones • Instant messaging and text messaging • Video recordings • Playing information off of iPods and PDAs

  7. When are Students Most Likely to Plagiarize • Don’t know how to synthesize information • Don’t know how to cite or reference information • Use only one internet source • Feel they don’t have enough time for the assignment • Everyone else is cheating, why not?

  8. Solutions for teachers!!! • Teach students to respect material created by others • Teach proper citing of sources • TEACH HOW TO PUT INFORMATION IN YOUR OWN WORDS! • Arrange classroom so computers face the middle of room • Have parents and students Acceptable use Documents (make sure plagiarism is addressed)

  9. Software Available • www.turnitin.com • TOAST • http://www.cshe.unimelb.edu.au/assessinglearning/03/plagsoftsumm1.html

  10. Solutions for Parents • USE COMMON SENSE! • Proof-read your child’s work • Ask the following questions: • Does my child talk like this? • Do they know the meaning of these words? Have the students to show you the sites they used to obtain the information Be proactive and stay involved in your child’s school work!

  11. NETIQUETTE • The manners we use on the Internet based on common sense and respect. • REMEMBER WE ARE STILL USING A FORM OF WRITTEN COMMUNICATION!!

  12. Netiquette Rules • Never send anything that reflects poorly on you or anyone else • Company sent e-mails are company property and can be monitored • Avoid offensive comments (even as a joke) • Stay away from emotional language as it can be easily misinterpreted • Forward messages with care

  13. Don’t sacrifice accuracy for efficiency • Don’t type in all caps (emphasizes yelling) • Don’t type in all small letters (looks lazy) • Make sure messages are clear and organized • Make sure subject line contains enough information to be filed and saved easily

  14. INTERNET SAFETY • Making sure students of any age are safe while using the Internet

  15. Ways to Keep Students Safe • Sites intended for adults, biased towards certain groups, or encourage or promote violence stay out of the classroom

  16. Ways to Address Internet Safety • Make sure to read, discuss, and sign an Acceptable use document • Make sure the arrangement of the monitors face toward the center of the classroom • Teachers need to circulate when computers are in use • Use filtering software to block access to sites that are inappropriate

  17. Use browsers and search engines that are grade level appropriate level • Allow children to search and access pre-screened sites • Be accessible to the students

  18. Cyber-bullying When a minor is teased, tormented, embarrassed or harassed by another minor through the use of the Internet or other multimedia source. Action Plan: • Keep information private that’s personal • Stop, block, and tell! • Google yourself • Take 5 • Practice the golden rule and don’t be an accomplice Reputation Defender

  19. Ohio Standards ELA and Tech • Grade level focus: Grades 6-8 • ELA: • Research • Locate and summarize important information from multiple sources • Organize information in a systematic way • Acknowledge quoted and paraphrased information and document sources used • Communication: Oral and Visual • Select an organizational structure appropriate to the topic, audience, setting and purpose • Tech: • Technology and Communication Application • Communicate information technologically and incorporate principles of design into the creation of messages and communication products. • Select appropriate technology communication tools and design collaborative interactive projects and activities to communicate with others • Technology and Information Literacy • Evaluate the accuracy, authority, objectivity, currency, coverage and relevance of information and data sources • Select, access and use appropriate electronic resources for a defined information need.

  20. Safety Pledges and Other Sources • Safety Pledge Grades K-2 • Internet Safety Pledge Grades K-2 • Safety Pledge Grades 3-6 • Internet Safety Pledge Grades 3-6 • Internet Safety Pledge Grades 7-12 • www.coppa.org

  21. REFERENCES Berg, B. (2006). When Marion copied. Fort Atkinson, WI: UpstartBoooks. Bertram, B. (2000). Access points on a digital river. [Electronic version]. Journal of Adolescent & Adult Literacy, 44 (3). 1-8. Dillner, M. (2000). Internet safety and ethics for the classroom. Reading Online. Retrieved March 1, 2009, from http://www.readingonline.org/editorial/ethics.html Gallant, T. B. (2008). Twenty-first century forces shaping academic integrity. ASHE Higher Education Report, 33 (5), 65-78. Goldman, L. (2007, October 16). Netiquette rules – 10 best rules for email etiquette. Home:Busimess/Workplace –Communication. Retrieved March 8, 2009, from http://ezinearticles.com/?Netiquette-Rules---10-Best-Rules-for-Email-Etiquette&id=7851777 WHEN

  22. Kinzer,C. (2000/2991, December/January). Addressing issues of Internet safety [an Electronic Classroom Web watch]. Reading Online, 4(6). Retrieved March 8, 2009, from http://www.readingonline.org/electronic/webwatch/safety/index.html Kinzer, C. (2000). Web watch: Addressing issues of internet safety. Reading Online. Retrieved Pascarella, J. (2008). Confronting the challenges of critical digital literacy: An essay review critical constructivism: A primer. Educational Studies, 43 (3), 246-255. Storm, P. (2007, Winter). Cheating in middle school and high school. Educational Forum, 71(2). 104-116. Retrieved March 7, 2009, from http://web.ebscohost.com/ehost/detail?vid=44&hid=109&sid=c3426538-a1b1-4c34-b7fd-2b… Warn, J. (2006, May). Plagiarism software: No magic bullet!. Higher Education Research &Development, 25(2), 195-208. Retrieved March 7, 2009, from http://web.ebscohost.com/ehost/detail?vid=49&hid=,109&sid=c3426538-albl-4c34-b7fd-2b http://www.reputationdefender.com/mychild http://www.coppa.org/comply http://www.stopcyberbullying.org http://www.netsmartz.org

More Related