Presentation is loading. Please wait.

Presentation is loading. Please wait.

Plagiarism, Netiquette, and Internet Safety Amy Benko Gail Evanchan Leah Oser.

Similar presentations


Presentation on theme: "Plagiarism, Netiquette, and Internet Safety Amy Benko Gail Evanchan Leah Oser."— Presentation transcript:

1 Plagiarism, Netiquette, and Internet Safety Amy Benko Gail Evanchan Leah Oser

2 Objectives: Provide a definition for Plagiarism, Netiquette, and Internet Safety Offer tips for how to prevent plagiarism in your classroom and home Supply the rules of netiquette Demonstrate ways to be safe on the Internet at home and school

3 A story about Plagiarism

4 PLAGIARISM!!!!!!! The action of presenting another person’s work as one’s own.

5 3 Ways Students Plagiarize Copy and paste entire pieces Copy and paraphrase parts of an article without quoting or referencing Cut and paste to combine different sources while writing

6 Types of Plagiarism using technology Copy and pasting from the Internet Taking digital photography with digital cameras and cell phones Instant messaging and text messaging Video recordings Playing information off of iPods and PDAs

7 When are Students Most Likely to Plagiarize Don’t know how to synthesize information Don’t know how to cite or reference information Use only one internet source Feel they don’t have enough time for the assignment Everyone else is cheating, why not?

8 Solutions for teachers!!! Teach students to respect material created by others Teach proper citing of sources TEACH HOW TO PUT INFORMATION IN YOUR OWN WORDS! Arrange classroom so computers face the middle of room Have parents and students Acceptable use Documents (make sure plagiarism is addressed)

9 Software Available www.turnitin.com TOAST http://www.cshe.unimelb.edu.au/assessinglea rning/03/plagsoftsumm1.html http://www.cshe.unimelb.edu.au/assessinglea rning/03/plagsoftsumm1.html

10 Solutions for Parents USE COMMON SENSE! Proof-read your child’s work Ask the following questions: – Does my child talk like this? – Do they know the meaning of these words? Have the students to show you the sites they used to obtain the information Be proactive and stay involved in your child’s school work!

11 NETIQUETTE The manners we use on the Internet based on common sense and respect. REMEMBER WE ARE STILL USING A FORM OF WRITTEN COMMUNICATION!!

12 Netiquette Rules Never send anything that reflects poorly on you or anyone else Company sent e-mails are company property and can be monitored Avoid offensive comments (even as a joke) Stay away from emotional language as it can be easily misinterpreted Forward messages with care

13 Don’t sacrifice accuracy for efficiency Don’t type in all caps (emphasizes yelling) Don’t type in all small letters (looks lazy) Make sure messages are clear and organized Make sure subject line contains enough information to be filed and saved easily

14 INTERNET SAFETY Making sure students of any age are safe while using the Internet

15 Ways to Keep Students Safe Sites intended for adults, biased towards certain groups, or encourage or promote violence stay out of the classroom

16 Ways to Address Internet Safety Make sure to read, discuss, and sign an Acceptable use document Make sure the arrangement of the monitors face toward the center of the classroom Teachers need to circulate when computers are in use Use filtering software to block access to sites that are inappropriate

17 Use browsers and search engines that are grade level appropriate level Allow children to search and access pre- screened sites Be accessible to the students

18 Cyber-bullying When a minor is teased, tormented, embarrassed or harassed by another minor through the use of the Internet or other multimedia source. Action Plan: Keep information private that’s personal Stop, block, and tell! Google yourself Take 5 Practice the golden rule and don’t be an accomplice Reputation Defender

19 Ohio Standards ELA and Tech Grade level focus: Grades 6-8 ELA: – Research – Locate and summarize important information from multiple sources – Organize information in a systematic way – Acknowledge quoted and paraphrased information and document sources used – Communication: Oral and Visual – Select an organizational structure appropriate to the topic, audience, setting and purpose Tech: – Technology and Communication Application – Communicate information technologically and incorporate principles of design into the creation of messages and communication products. – Select appropriate technology communication tools and design collaborative interactive projects and activities to communicate with others – Technology and Information Literacy – Evaluate the accuracy, authority, objectivity, currency, coverage and relevance of information and data sources – Select, access and use appropriate electronic resources for a defined information need.

20 Safety Pledges and Other Sources Safety Pledge Grades K-2 Internet Safety Pledge Grades K-2 Safety Pledge Grades 3-6 Internet Safety Pledge Grades 3-6 Internet Safety Pledge Grades 7-12 www.coppa.org

21 REFERENCES Berg, B. (2006). When Marion copied. Fort Atkinson, WI: UpstartBoooks. Bertram, B. (2000). Access points on a digital river. [Electronic version]. Journal of Adolescent & Adult Literacy, 44 (3). 1-8. Dillner, M. (2000). Internet safety and ethics for the classroom. Reading Online. Retrieved March 1, 2009, from http://www.readingonline.org/editorial/ethics.htmlhttp://www.readingonline.org/editorial/ethics.html Gallant, T. B. (2008). Twenty-first century forces shaping academic integrity. ASHE Higher Education Report, 33 (5), 65-78. Goldman, L. (2007, October 16). Netiquette rules – 10 best rules for email etiquette. Home:Busimess/Workplace –Communication. Retrieved March 8, 2009, from http://ezinearticles.com/?Netiquette-Rules---10-Best-Rules-for-Email- Etiquette&id=7851777 WHEN http://ezinearticles.com/?Netiquette-Rules---10-Best-Rules-for-Email- Etiquette&id

22 Kinzer,C. (2000/2991, December/January). Addressing issues of Internet safety [an Electronic Classroom Web watch]. Reading Online, 4(6). Retrieved March 8, 2009, from http://www.readingonline.org/electronic/webwatch/safety/index.html http://www.readingonline.org/electronic/webwatch/safety/index.html Kinzer, C. (2000). Web watch: Addressing issues of internet safety. Reading Online. Retrieved Pascarella, J. (2008). Confronting the challenges of critical digital literacy: An essay review critical constructivism: A primer. Educational Studies, 43 (3), 246-255. Storm, P. (2007, Winter). Cheating in middle school and high school. Educational Forum, 71(2). 104-116. Retrieved March 7, 2009, from http://web.ebscohost.com/ehost/detail?vid=44&hid=109&sid=c3426538-a1b1-4c34-b7fd- 2b… Warn, J. (2006, May). Plagiarism software: No magic bullet!. Higher Education Research &Development, 25(2), 195-208. Retrieved March 7, 2009, from http://web.ebscohost.com/ehost/detail?vid=49&hid=,109&sid=c3426538-albl-4c34-b7fd-2b http://web.ebscohost.com/ http://www.reputationdefender.com/mychild http://www.coppa.org/comply http://www.stopcyberbullying.org http://www.netsmartz.org


Download ppt "Plagiarism, Netiquette, and Internet Safety Amy Benko Gail Evanchan Leah Oser."

Similar presentations


Ads by Google