Sie sind auf Seite 1von 8

Holly Massard EDMT 602 Winter 2014 Problem-Based Learning Activity Assignment 4 Identify the Problem What are

the ethical issues involved with using technology in learning environments? What belongs in a privacy use handbook? Known: Learning environments: students Forms of Technology Parent signature and Handbook required for access Technology available to all students Firewalls, certain sites blocked at school (You Tube, Pandora) Unknown: All Guidelines for Students and Staff Ethical issues that arise 2. Analyze the Problem (What I need to know to solve the problem) What should be included in handbook? Section 1: Application of Technology Section 2: Access Section 3: Guidelines for students Section 4: Intellectual property Section 5: Privacy and Confidentiality 3. Possible Solutions This Code will serve to guide educators in achieving ethical conduct while using computers in education. This document will provide standards of conduct that govern the relationship with technology. Section 1: Application of Technology

Standard 1. Educators shall use district technologies to improve the overall quality of the education they provide. Educators strive to help students acquire, practice, and use new information in the best possible learning environments and with the best possible set of tools. Technology should be carefully infused to enhance and improve upon the current educational process. Technology should be woven into the curriculum to accomplish both new and existing goals or when the technology itself helps motivate to the students. Standard 2. Educators shall follow the national, state, and district guidelines for infusing technology into their respective curriculum. Barcalow, T. (2001). Code of technology ethics for educators. Curriculum, Technology and Education Reform. Retrieved February 28, 2014 http://lrs.ed.uiuc.edu/students/bweinert/304code.htm Section 2: Access Standard 1: Educators shall provide equal access to technology for all students. Equal access to all of our students and the types and quantity of computers should be considered. Opportunity for all students to engage in interactive uses of the available technologies. Educators of all students, including those with special needs should be supported and encouraged to use technology in their teaching. Standard 2: Educators shall work to provide equitable technology resources to all students. All students should have access to technology whether

it is before, after or during school. All students have access to different types of media that are available at the school: o Laptops/Desktops o iPads/iPods Standard 3: Educators shall use Internet filters and blocking software in the least restrictive manner possible where the students rights to access information without censorship are balanced with their safety and compliance with the federal Child Internet Protection Act (CIPA). Use updated anti-virus software and spam filters on computers. This is especially true for Windows-based operating systems, the primary targets of cyber-attacks and online vandalism. Educator available for guiding students through the Internet, answering their questions and addressing safety concerns is more meaningful than relying on a static software program. Technology and Internet users are responsible for their actions in accessing available resources. Educators should be aware that the government has mandated filter use for schools According to the CIPA, educators may disarm filters when they are using a computer for educational use. Educators should also be aware of procedures for disarming filters so that their own rights to access are not diminished. Barcalow, T. (2001). Code of technology ethics for educators. Curriculum, Technology and Education Reform. Retrieved February 28,2014 http://lrs.ed.uiuc.edu/students/bweinert/304code.htm

Section 3: Guidelines for Students Standard 1: Educators shall provide an Acceptable Use Policy (AUP) to inform students of the appropriate use of district technologies. AUP belongs in writing and print it out in the form of a contract. Have students, parents, and your principal commit to these rules by signing the contract. Be sure to post a copy of your AUP near each computer and remember that part of successful implementation of an AUP is making sure that someone in your school is appointed to enforce the AUP rules. Users who violate any provisions as outlined in the District Acceptable Use Policy will be disciplined according to the AUP. Scholastic (2014). Librarians. Using Technology. Retrieved February 28, 2014 https://www.scholastic.com/librarians/tech/techpolicy.htm Section 4: Intellectual Property Standard 1 Educators shall respect the intellectual property of their peers. Follow fair use guidelines for copyrighted material. Other peoples material should always be correctly cited when used within ones own work. Standard 2: Educators have a responsibility to teach their students about intellectual property. Teach students how to use appropriate citations for documentation in the text, notes and bibliographies by adhering to those in requisite style manuals. The ease in which present technology allows copying and pasting requires that plagiarism be specifically addressed. Barcalow, T. (2001). Code of technology ethics for

educators. Curriculum, Technology and Education Reform. Retrieved February 28, 2014 http://lrs.ed.uiuc.edu/students/bweinert/304code.htm Section 5: Privacy and Confidentiality Standard 1: Educators shall monitor student computer use in the least restrictive manner possible where the learners safety and privacy rights are balanced. Using the computer to violate the law, the AUP, or network etiquette hampers the integrity and/or security of the network. The deliberate creation and/or propagation of computer viruses, sending unsolicited junk mail or chain letters, and any interference with the work of others, with or without malicious intent, is viewed as mischief and harms the integrity of the system. Consequently, the integrity of the system must be maintained through the monitoring of student use. Standard 2: Educators shall provide general notice of various monitoring activities for all users. A general notice of remote monitoring or observing screens respects user privacy rights since the notice alerts users to the fact that files they create or receive are being monitored. The monitoring may include personal e-mail accounts that are accessed at school. Monitoring is done to address users' safety and the integrity of the network. Educators shall provide general notice of accessing and/or deleting of any users files. Standard 4: Educators shall protect personal student information and maintain confidentiality of student records.

Educators and individuals responsible for administering and operating the system must maintain the confidentiality of data prescribing individuals. This would include the use of ID numbers, the monitoring of information included in works published, ensuring accuracy of information presented, and protection from accidental access by unauthorized individuals Information Sources: Online Privacy: Using the Internet Safely | Privacy Rights Clearinghouse. (2014, January). Retrieved February 28, 2014, from https://www.privacyrights.org/online-privacy-using-internetsafely Barcalow, T. (2001). Code of technology ethics for educators. Curriculum, Technology and Education Reform. Retrieved February 28, 2014 http://lrs.ed.uiuc.edu/students/bweinert/304code.htm

Section 6: Online Safety Standard 1: Educators must teach online safety to students. Identity Safety Emphasize the requirement to never provide personal information in online forums to strangers or online friends. Personal information is often leaked by friends and friends-of-friends in wall postings. Illegal downloads (music, video, etc.) Anytime music or a video is acquired without payment, unless the music or video was explicitly given for free by the creator, copyright laws were probably broken. CD reproduction and use of Limewire and similar download

sites should be considered carefully before use. Purchasing and distributing an original gift (not a copy) as well as backing up ones own purchases are entirely permissible. Supervised web activity Pop-ups, mouse-trapping and other lures of advertisement are confusing and distracting. Working together can help students learn to remain focused. Research and Academic Honesty Digital research has drastically changed the process of writing and submitting researched reports. Online research can too easily become copying and pasting data that has not been read closely, digested and integrated into a greater understanding. Have students explain their themes and conclusion as a way of confirming their engagement and grasp of the material. All upper school papers must be submitted to Turnitin.com, to minimizing plagiarism. Standard 2: Educators shall respect the confidentiality of files and resources on district networks. Educators working on LANs and WANs are assigned certain rights to various resources on their respective networks. Some of these resources include network printers, private directories, common or shared directories and often times access to student directories. The electronic files that are meant to be shared and distributed among colleagues are those files stored in the common or shared directories. Attempts to access others private directories, tamper with files in common or shared areas that are not directly related to the user, or print to non-assigned printers is acting against the users designated rights. Standard 3: Educators shall have the responsibility of

providing secure controls for all technology resources. all of these technologies should be appropriately secured to reduce the potential for errors and malfunctions of commonly used tools. Examples of this include using logins and passwords for individual accounts, locating servers in little to no traffic areas, and keeping administrative, teacher, and student files separated. Barcalow, T. (2001). Code of technology ethics for educators. Curriculum, Technology and Education Reform. Retrieved February 28, 2014 http://lrs.ed.uiuc.edu/students/bweinert/304code.htm Evaluate the Solutions 1. Shorten each section/ summarize 2. Change line spacing and margins 3. Delete 7th Section- not needed 4. Bullet points- delete fluff 5. Explain each section briefly Select the Best Solution 1. Label each section in bold and underline 2. Change to student-friendly language

Das könnte Ihnen auch gefallen