Safe, Ethical Internet Integration

Reflections and Planned Actions

Personal Practices

I am a digital immigrant.  I was born two years before ARPANET was developed, and in my mid-twenties when World Wide Web was introduced to the world (Mallia, 2013).
Although, I’ve loved all things technological since I programmed a TRS-80 and was elected president of my high school computer science club. Still, for all that has been developed, I have had to build my understanding and adapt to its use.

Today, my personal Internet practices revolve around my desire to keep up with the news; to stay in contact with distant and local friends; to find a good deal; and to be entertained. I eliminated my land-line phone nearly 7 years ago and more recently cut the cord to cable tv 3 years ago.  Having access to the Internet gives me the freedom to contact distant loved ones using Skype, so the phone is no longer necessary.  The Internet also allows me to disconnect the TV from the expensive cable bill.  Now, Hulu, Netflix and Pandora fill in the entertainment needs at a much-reduced cost.  Gone too, is the newspaper subscription.  News is now an online activity.  Between the regional papers and news sites along with access to the major news outlets, I can feed my need for the news via the Internet.

Reflection on safety and ethical actions


I consider myself to be an educated user.  I take action to keep my finances and myself safe while making use of the Internet.  I only shop online with reputable companies, most still have operate brick and mortar storefronts.  In addition, I monitor my accounts to verify charges and monitor for fraudulent activity. 

I am a social media user who understands and applies privacy settings.  Monitoring for policy changes that requires me to review and reset access privileges to my account.  I don’t wish to talk to strangers; rather, social media provides me a way to maintain contact with my distant friends and relatives.  I do not post many personal images or refer to my child by name.  I began exercising this caution when my child was young and it remains my practice today.  I have not yet allowed my child to have a social media account.  She and I have discussed it, and at 15 you would think she would be eager.  In fact, she is the opposite.  She hears talk about it at school and says it is not worth her time.  I’m relieved.  I share with her my use and posts so she’s not a total novice.  I use news stories as a means of initiating conversations about appropriate and inappropriate uses of social media.

I am aware of the copyright laws and do not download questionable media.  I only stream video from reputable sites such as Hulu, Netflix and Amazon.   In the past, when wireless connections became available, I had a period of time where my wireless connection was unprotected.  Living in the city meant my signal was reaching multiple houses surrounding mine.  I received a menacing letter from my cable provider regarding an attempt to download an illegal copy of a movie.  Experience educated me to maintain a password to protect my service from others’ illegal use.

I am aware of bias in the news and read from multiple sources to get perspective.  I enjoy CNN, FOXNews, BBC and PBS news sites.  

The two unethical behaviors that come to light upon reflection are my habit of bypassing the required subscription to a regional newspaper and copyright infringement by capturing and reposting cartoons and images via social media.  In reference to the newspaper, it offers a free a 30-day trial via IP address; using an incognito web browser allows me to circumvent this limitation.   My practice of copy and pasting funny memes, cartoons and images through my social media account is also infringing upon the copyright law.  I should provide a link rather than the actual image.

Professional Practices:  School District’s Acceptable Use Policy 

My school district’s Acceptable Use Policy was recently updated in 2012.  Upon inquiry, I learned our technology coordinator accomplished this task with input from our school district librarians.  I believed our policy to be sufficient; however when comparing it to the Memphis City Schools some weaknesses are notable.  My school district’s policy does not address email use by students.  Our school district does not provide school accounts to students.  This does not mean they aren’t using their personal email accounts via school infrastructure.  In addition, my school district’ policy appears to be two separate documents and not as cohesive as our example.  I believe this policy should be reviewed for improvement.

My treatment of the Acceptable Use Policy is in need of attention.  Currently, the policy is reviewed with all students at the first of the year.  During which time, the stack of to-be-signed papers go home to parents.  I’m certain they are signed without much review by most parents.  I have personally rushed though the obligatory signed paper ritual for my daughter.  The policy is then only references when a discipline referral has to be written for a student being off task.  The most common infraction is streaming music.

My school district provides a required filter to eliminate access to inappropriate websites.  Knowing that all filters are fallible (Anderson, Grant, & Speck, 2008),  I do take additional steps to protect my students.  I use a classroom monitoring software program that allows me to view the computer screen of all students.  During classwork time, as I am moving around the room assisting individuals, I project the monitoring software on the interactive white board, so the students know they are being monitored.  This helps encourage my students to stay on task.  I work to prevent “down time” in my classroom.  All time is directed and students who finish work early can choose from a list of enrichment options to prevent “free web browsing.”  


I do not publish student work outside of my classroom.  My building principal is apposed to cluttered hallways.  In addition, one employee creates all articles published to the local paper.  I can submit items for consideration; however, in the seven years, I have only had one submission accepted and that was in the initial year of beginning our STEM curriculum.

Analysis

Reflection on my professional practices illuminates ways in which I can improve.  I have only cursorily addressed cyber bulling with my students.  This topic is required for the school district to maintain its e-rate funding.  We have had grade-level assemblies to address the topic, which led to classroom discussions.  Limited by the scope and sequence of curriculum, I have not included a developed lesson on either Internet safety or cyber bullying.   I must address this weakness for the benefit of my students.

Ethical Use of Resources

I make a stronger effort in my classroom to hold my students accountable for citing their sources as they complete projects.  I introduce MLA reference formatting to students, following a discussion with my English-teaching colleagues some years back.  They were expressing their concern that many students were unfamiliar with the process and syntax of citing sources.  From that point, I made an effort to be certain students create a Resource Cited Page and include websites as well as images used.  I have recently increased my emphasis on how fair use affects the images used in presentations.  I am now stressing the knowledge and use of Creative Commons Attributions. In regards to plagiarism, it is a topic primarily addressed within the English curriculum, however, I use an in-class mantra to encourage students to avoid plagiarism.  In my classroom, the chant I-YOW is an acronym for the often-used phrase, in your own words.  I want my students to work on their writing skills at all times.  Many are not receptive to this idea, so I encourage with the silliness of I-YOW and reminding my students that I’m not a Physical Education teacher.  “Copy and Paste are a physical skill of the wrist.  I measure mental skills, so, Please remember to I-YOW!”  By the end of the year many sing-song the chant with me.  I try to provide feedback on students’ writing and encourage paraphrasing.  I would consider my efforts superficial at best.

In the past my efforts to address this topic ended poorly.  I required a written research paper and guided my students through the process.  The results were disappointing.  Plagiarism was the result.  The consequences were complex and resulted in my eliminating the assignment from assessment, due to pressure from parents and administration.  I no longer tackle such concentrated writing assignments.  Writing is limited to presentation style, or paragraphs.  I still address plagiarism, but not through a developed unit.  This superficial treatment equates to me hiding my head in the sand.  Unacceptable.  One way that I can immediately work to correct this is by modeling appropriate citations with materials used in the classroom (Fryer, 2002).

Future Strategies

In light of this reflection, I feel called upon to take three issues.  First, I feel I should share the Memphis City Schools Acceptable Use Policy (AUP) with my school district’s technology coordinator.  I would also like to request his assistance in subscribing to i-SAFE or some other online curriculum to standardize our required student and teacher training in regards to their Internet use while at school.  In addition, I will consult with our public relations department, responsible for our school website, to encourage the posting of our district’s acceptable use policy online for parent and student access.  The use of the school district's AUP to educate parents (i-SAFE, N.D.) can be served by making it available online along with a question and response section   This leads to my second issue, whether or not the district adopts i-SAFE, I will research and develop an instructional unit to address the following key points regarding acceptable use:  guidelines, reasons, and consequences.  One idea is to place the students in groups and have them re-write our schools policy in common sense language enabling them to engage with the contents rather than the historical brief review.

My final goal is to address my lack of formal instruction addressing the Internet hazard of cyber bulling.  I will consult again with my school district’s technology coordinator to identify age appropriate instruction to use district wide.  While this search for a district wide curriculum takes place, I shall follow Mirtschin (2008) advice and include videos addressing cyber safety with my students to spur conversations and have students develop avatar's for use with our online learning management system. Finally, through this reflective exercise I want to increase the rigor of my efforts to prevent plagiarism and cite references appropriately.  To this end, I plan on meeting with my fellow English teaching colleagues to develop cross curriculum connections addressing both topics.  This should involve hands-on practice evaluating web site content (Mills, 2006) and increase awareness of my practices in abiding by the fair use and copyright laws (Fryer, 2003).


It was Hlovate (2010) who wrote, “You'll never reach perfection because there's always room for improvement. Yet get along the way to perfection, you'll learn to get better.”    I encourage all teachers to take on these tough issues; reflect upon your practices; and learn to get better!

References

Anderson, R.A., Grant, M.M., & Speck, B.W. (2008) Technology to teach literacy: A resource for K-8 teachers  (2nd ed). Upper Saddle River, NJ; Pearson Merrill Prentice Hall.

Fryer, W. A. (2002). Copyright 101 for educators: Winter 2003. Retrieved from http://www.wtvi.com/teks/02_03_articles/copyright.html


Hlovate. (2010). Versus. Jemari Seni Publishing.


i-SAFE. (N.D.). Why do schools need AUPs? . Retrieved from http://www.isafe.org/imgs/pdf/education/AUPs.pdf

Mallia, D. (2013). When was the internet invented. Retrieved from http://hnn.us/article/142824


Mills, S. C. (2006). Using the Internet for active teaching and learning. Upper Saddle River, NJ: Pearson Merrill Prentice Hall.


Mirtschin, A. (2008, March 27). Keeping students cybersafe! Retrieved from http://murcha.wordpress.com/2008/03/27/keeping-students-cybersafe/

No comments:

Post a Comment