starting the discussions with students about safe and ethical use of technology
TRANSCRIPT
TECHNOLOGY IN THE
CLASSROOM
PRESENTER EDNA LAMARCA
DATE NOVEMBER 11, 2013
THE CORE PRINCIPLES
That Students Must Know
Computer Safety
Social Networking
Ethics
Copyright Guidelines
Plagiarism
Citation
TECHNOLOGY HARDWARE:
• Be careful with devices
– Place securely on tables
– Handle carefully
– Watch for cords and cables
– Keep devices clean
• Respect software and programs
– Never open attachments you are not expecting
– Never download programs, apps, etc.
– Keep an updated virus protection plan
– Back up your files regularly
Technology Hardware
Acceptable Use Policy
Passwords
PASSWORDS:
• Your responsibility
• Unique
• Changed on a regular basis
• Composed of both letters and numbers
• Never be given to anyone else
• Not be taped under the computer or in
another easily accessible place
ACCEPTABLE USE POLICY:
• Your responsibility to know the rules
• Parental Permission Form
• Everything may be searched by school
authorities/law enforcement officials
• Never:
– Access pornographic, obscene material
– Vandalize property of another person
– Pirate software
– Violate any local, state, or federal statue
WHEN WE ENTER THE INTERNET WE BECOME CONNECTED
WITH THE WORLD
We must be professional and
responsible with every word
• Never give out personal
information
• Secure sites “https” but not
“http”
• Organizations want to market
to you
A STRANGER IS A STRANGER
Protect yourself from giving out too much information
Protect yourself from predators
Protect yourself fromCyberbullying
Johnson, D. (2012). The classroom teacher’s technology survival guide. San Francisco, CA: John Wiley & Sons.
ETHICS
• Is the branch of philosophy that deals with moral
judgments, issues of right and wrong, and
determining what behaviors are humane or
inhumane.
Johnson, D. (2012). The classroom teacher’s technology survival guide. San Francisco, CA: John Wiley & Sons.
• “Ethical Action” is an action does not have a
damaging impact
on oneself, other individuals, or society.
JOHNSON’S THREE RULES OF TECHNOLOGY ETHICS
1. Privacy – I will protect my privacy and respect the privacy of others.
2. Property – I will protect my property and respect the property of others.
3. Appropriate use – I will use technology in constructive ways and in ways that do not break the rules of my family, faith, school, or government.
Johnson, D. (2012). The classroom teacher’s technology survival guide. San Francisco, CA: John Wiley & Sons
Do Not: Steal or Destroy
Exaggerate or embellish
Look at or create tasteless, offensive or lacking in educational value material
Do: Treat intellectual property the same way you would treat physical property
Question material - Hate groups, Political extremists
DOES MY USE OF THE TECHNOLOGY VIOLATE THE PRIVACY OF
OTHERS, OR AM I GIVING INFORMATION TO OTHERS THAT I SHOULD NOT?
Johnson, D. (2012). The classroom teacher’s technology survival guide. San Francisco, CA: John Wiley & Sons.
PLAGIARISM
mizikar, A. (). Battling Plagiarism in the Internet age. Retrieved from http://www6.wittenberg.edu/lib/help/plagiarism/
Accidental or Intentional Plagiarism:
Copying a quotation without quotation marks
Not writing the citation showing where the information comes from
Writing material very close to the original
Paraphrasing - writing another’s ideas in your own words – rearranging
words
Copying and pasting without using citations or quotation marks
Purchasing work (such as essays) from the Internet and claiming them as
your own
Using another student’s work as your own
Using images, charts, or graphics without a citation
Giving information that is not accurate
METHODS OF CHECKING FOR PLAGIARISM
Changes in Writing Style Unusual Word ChoicesChanges in Font Above/Below Class LevelNot the Right Topic Samples of In-class WritingCheck Citations Students Write SummariesDated References Boolean Searches
Microsoft
• http://content.easybib.com/citation-guides/apa-format
Easy Bib
• http://www.studymode.com/citation-generator/
Study Mode
• http://apareferencing.ukessays.com/
APA Format Citation Generator
THE CORE PRINCIPLES
Follow the Rules
Ask
Report
Learn
Computer Safety
Social Networking
Ethics
Copyright
Plagiarism
CitationMicrosoft
Chaudhary, N. (). Free Images of Technology. Retrieved from http://www.google.com/search?q=free+images+of+technology&nord
=1&rlz=1C2GGGE_enUS510US543&tbm=isch&tbo=u&source=univ&sa=X&ei=wrd2UouDCOSOyAHqhIGQDg&ved=0CFwQsAQ&biw
=1292&bih=683#facrc=_&imgdii=_&imgrc=Y1axob-gHnJyJM%3A%3BmewJg4JEtZemvM%3Bhttp%2
Free Images of Technology. Retrieved from http://www.google.com/search?q=free+images+of+technology&nord=1&rlz=1C2GGGE_en
US510US543&tbm=isch&tbo=u&source=univ&sa=X&ei=wrd2UouDCOSOyAHqhIGQDg&ved=0CFwQsAQ&biw=1292bih=683
Free Images of Technology. Retrieved from http://office.microsoft.com
Johnson, D. (2012). The classroom teacher’s technology survival guide. San Francisco, CA: John Wiley & Sons
https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?assetMetaId=d9ec986b-3a6b-48fd-85ec-
278389888511&assetDataId=22d60f48-4737-40d0-93c6-ba6b18108fdf§ionId=ch07lev1sec1&assetpdfdataid=dd438dd1-2462-4fe0-
9eeb-a422cffd9dff
mizikar, A. (). Battling Plagiarism in the Internet age. Retrieved from http://www6.wittenberg.edu/lib/help/plagiarism/
Bibliography