|
AAAS/GW Fellows
CPS 291
Using Technology in Science Education
Week 2
Session 4: Word Basics (continued), PPT Basics,
Policies & Standards
May 21, 2008 |
Quick Links
- Course Content [PPT]
- DC Technology Counts Report Card 2007 [PDF]
- "Ideas for Teacher Technology Profile" (examples of questions similar to and part of the MD state teacher Profile instrument). [Word ... PDF]
|
In Class:
- Standards and Assessment
- Policies: NCLB
- HW Discussions
- Review of Group Exercise Results (Technology Standards profile)
- Review of HW Results (Teacher Standards)
|
Due Tonight
Be Ready To Discuss in Class
- 4.1 NCLB
- 4.2 Critical Questions
- 4.3 DC Technology Counts Report Card
- Discussions [Word ... PDF]
- From session 3 HW we will reflect on "Ideas for Teacher Technology Profile" (examples of questions similar to and part of the MD state teacher Profile instrument). [Word ... PDF]
- Results from your Teacher Standards Profile (emailed)
|
Follow up Homework/Read
Introduction:
We have spent some time exploring the global status of technology and the impact on the educational setting. Whether or not the educational setting keeps pace is a situation within itself, what we do know is….The digital age has created new concerns regarding the use of non-traditional electronic and Internet resources in the classroom setting. Unfortunately, while the teaching of technology processes and skills has been handed to the classroom teacher, most educators lack the knowledge and up-to date information related to Cyberawareness-Cyberethics, Cybersafety and Cybersecurity (C3) issues. Teacher technology training has been geared towards skills development and integration techniques. Teachers, in many instances, model incorrect protocol and behavior to their students. Cyberawareness has become such a critical component that Educational Technology Policy, Research, and Outreach offersr an annual C3 conference (this week in October each year), a semester long course on the topics, and working with the Federal Trade Commission, Homeland Security and EDUCAUSE have developed both a state Cyberawareness initiative for K12 students that coincides with National Cyberawareness months (April and October-when we move are clocks back and forth) as well as a C3 portal of teacher resources.
Cyberethics includes such things as Copyright, Fair Use, TEACH Act citing sources for pictures pulled from internet plugged into PPT presentations, Plagiarism and other electronic tactics (instant messaging answers during exams, programming in class notes to graphic calculators and/or cell phones), Netiquette and the list goes on. Cybersafety includes such things as filtering, and the plethora of resources for teachers to use with students to enlighten them about online bullying and stalking, predators etc…Cybersecurity awareness helps teachers learn about spam, hoaxes, viruses, backup systems, using anti-virus protection, patches and upgrades, passwords and other valuable information.
Not only does this decrease the risks to the security of the teacher's own home and classroom computer, the local school system's information systems, but it also increases the chances that students will follow their behaviors.
Start by learning more about Netiquette & Acronyms
Sometimes educators skip material (especially if it deals with technology) that might be relevant to today's students simply because the "language" seems foreign. Today students make use of Netiquette acronyms, emoticons, and other jargon that previous generations have not used. This part of the session will try to bring those of us up to speed who haven't been utilizing these coding schemes. For those who have seen or used these before, this will be a review.
And next we will explore the "hot" topic of Plagiarism
"Although plagiarism has been around as long as students have, the Internet has dramatically increased the ease of and opportunities for plagiarism. 'Cyber-plagiarism' is the term used to describe the process by which students either copy ideas found on the Web without giving proper attribution, or the process by which students download research papers from the Web, in whole or in part, and submit the paper as original work" (Bombak, 2005). This session part of the session will look at plagiarism statistics, anti-plagiarism strategies and techniques, as well as detection and process |
Readings
Netiquette & Acronyms
"Netiquette" is network etiquette, the do's and don'ts of online communication. Netiquette covers both common courtesy online and the informal "rules of the road" of cyberspace. Read through the online tutorial links to both summary and detail information about Netiquette. You will be taking the quiz in one of the discussion threads. Netiquette 101 for new netizens also offers good guidelines to follow.
To get us up to speed with the jargon explore the following:
Think you know all the "slang" ? A new information-age slang is commonly referred to as leetspeek, or leet for short. Leet (a vernacular form of "elite") is a specific type of computer slang where a user replaces regular letters with other keyboard characters to form words phonetically-creating the digital equivalent of Pig Latin with a twist of hieroglyphics. Read more about this at: http://buzzfeed.com/buzz/Leetspeak
Plagiarism
Begin by viewing the PowerPoint set of notes
- Promoting Academic Integrity [PPT]
Then skim the following: (there are quite a few since this is a "hot topic" hop through several to get a sense of the different perspectives-in order to answer the discussion threads. Do not think you have to READ EVERY LINK-every page
Articles
- Student Plagiarism in an Online World - concise article, includes useful links
- To Copy or Not to Copy-That is the Question - gives some unique guidelines for unique situations (i.e., class notes and radio broadcasting)
- For another point-of-view on Turnitin. Read Carbone, N. (2001). Thinking and talking about plagiarism. Tech Notes. and Carbone, N. (2001) Turnitin.com: A pedagogic placebo for plagiarism. Tech Notes.
- An innocent student was accused of plagiarizing a paper via a detection service. Beware that no system is perfect. Dehnart, A. (1999). The Web's plagiarism police. Salon.
- Davis, B. G. (1993). Preventing academic dishonesty. In Tools for teaching. San Francisco: Jossey-Bass.
- Evans, J. (2000). The new plagiarism in higher education: From selection to reflection. Interactions, 4 (2).
- Alford, J. (2005). R U Cheating? http://www.bestofneworleans.com/dispatch/2005-03-22/cover_story.html
- Harris, R. (2002, March 8). Anti-plagiarism strategies for research papers. - Harris focuses on faculty strategies.
- McCabe, D. L. (2001a). New research on academic integrity: The success of "modified" honor codes. Synfax Weekly Reports.
- McCabe, D. L. (2001b). Plagiarism and plagiarism detection go high tech [Colloquy live transcript]. Chronicle of Higher Education.
- McCabe, D. L., & Pavela, G. (n.d.) Ten principles of academic integrity. Ashville, NC: College Administration Publications.
- The Cheating Game 'Everyone's Doing it,' from grade school to graduate school - from U.S. New & World Report-11/22/99
- McKenzie, J. (1998). The new plagiarism: Seven antidotes to prevent highway robbery in an electronic age. From Now On, 7 (8).
- Murray, B. (2002). Keeping plagiarism at bay in the Internet age. APA Monitor, 33 (2).
- Murray, B. (2002). Technological tools to detect dishonesty. APA Monitor, 33 (2).
- Schneider, A. (1999, January 22). Why professors don't do more to stop students who cheat. Chronicle of Higher Education, pp. A8-10.
- Standler, R. B. (2000). Plagiarism in colleges in USA. - Presents the legal point-of-view.
Basics
- McCarthy, J., Lerch, D., Gilmore, L., Brunsman, S., (1999). Educator's Guide to Intellectual Property, Copyright, and Plagiarism. [Online]. Available: http://lrs.ed.uiuc.edu/wp/copyright/index.html
- Avoiding Plagiarism - Mastering the Art of Scholarship (UC Davis) - comprehensive explanation of plagiarism
- Plagiarism: What It is and How to Recognize and Avoid It - paraphrasing including acceptable / unacceptable examples
- Sources from Dartmouth College - comprehensive list of terms relating to plagiarism /copyright issues with explanations & examples.
Citation Formats
You may have found that the information from this session has captured your attention and would like to read further. Here are additional resources.
- ETPRO's portal resources on Cyberethics
- Jeffreys, J., & Romano, V. (2002). Plagiarism and papermills: FAQ's. Urbana: University of Illinois, College of Education.
- Nixon, S. (2002). Keeping a lid on plagiarism: Resources. Towson, MD: Towson University.
- Stoerger, S. (2003). Plagiarism. Urbana: University of Illinois.
- University of Maryland. Center for Intellectual Property. (2003). Current issues & resources: Plagiarism. Adelphi, MD: Author.
- PLAGIARISM IN CYBERSPACE: Sources, Prevention, Detection, and Other Information
- Crowe, Elane and Roche, Philip. Online Paper Mills and Plagiarism: Has the Web Changed Cheating? http://library.shastacollege.edu/papermills.html Shasta College Library
- Ehrlich, Heyward. Plagiarism and Anti-Plagiarism. http://newark.rutgers.edu/~ehrlich/plagiarism598.html Rutgers University.
- Hinchliffe, Lisa. "Cut-and-Paste Plagiarism: Preventing, Detecting, and Tracking Online Plagiarism.". 25 Feb. 1999.
- Valle Verde Library - Combating Cybercheating: Resources for Teachers http://www.epcc.edu/vvlib/cheat.htm
|
Be Ready to Discuss in Class
Asynchronous Discussion: [Word]
Until Blackboard is open to all please prepare in Word and email
Please NOTE:
Discussion questions will be submitted by or on May 28th. I would prefer to receive electronically (email)
Paper 1 is also due on this date and should be submitted via email.
- 5.1 Netiquette Quiz
- 5.2 Jargon and Emoticons
- 5.3 Google
- 5.4 Slang Translator
- 5.5 Paper Mill Sites
- 5.6 Red Flags
- 5.7 Today's Settings
Also note Paper /Project 1 is due on or before May 28th. Send via email |
Skim Resources on Learning Theories that we will refer to throughout the course |
|
|