Lesson Four: Key Issues on K-12
Copyrights, Educational Fairuse Guidelines
Privacy and Child safety
Strategies for dealing with inappropriate Internet resources
Authorized Usage Policies
Offline readers and cache monitoring
Citing Internet Resources in ALA and MLA formats
Internet Spam, Scams, Hoaxes, and Viruses
Lesson Four Required Assignments:
1. Send an email to your instructor with your decisions on what you feel are the essential issues related to each of the following topics and how youd prefer to deal with each of these issues. (30 points)
2. Use search engines to find one new resource URL on each topic below, that is not already listed in the handbook, and email them to your instructor. (30 points)
3. Post a message to the class listserv regarding your feelings or suggestions regarding at least one of the following topics. Feel free to raise an issue or make points not already discussed. (30 points)
1. Copyrights and educational
3. Privacy and Child Safety
4. Inappropriate Internet
5. Authorized Usage Policies
6. Citing Internet Resources.
4. For the remaining 10 points for this lesson engage in resource sharing with the other participants via the class listserv as described in the class welcome bulletin at http://lone-eagles.com/spu1wel.htm .
To identify the most important legal and moral issues associated with K-12 Internet use and the most common solutions.
To identify when your students' privacy and safety might be at risk through improper posting of personal information, or other misuse of the Internet.
To practice your searching skills by finding additional resources on these key topics.
To decide how you'll deal with these key issues in your classroom!
A. Your Very Serious Homework!
Your handbook has a section on K12 Essential Resources, see page 119 or http://lone-eagles.com/k12.htm and a Parenting Webtour, http://lone-eagles.com/webtours.htm and activity handouts which all have related resources! You have five hours to invest in careful review of these sites to determine YOUR answers to the many issues raised below. Your knowledge of these issues is vitally important to the welfare of your students, and to legally protect yourself.
Study how others have resolved these dilemmas, knowing there are grey areas between right and wrong on many issues. It is recommended you document your sources in case you have to defend your decisions in the future. You're asked to find additional sites on these six key topics to practice your searching skills and to make sure you're able to find all the information on these issues you'll need to deal adequately with them. If you've not used multiple keywords in searches before, you'll find this presents the perfect opportunity. A popular search engine allowing natural language phrases is http://askjeeves.com . You can simply type in questions, and/or specific keyword phrases!
Have you seen the sign in the library that says its illegal to xerox copyrighted print materials? It is behind the line of students and teachers xeroxing copyrighted materials as part of their daily routine. Did you know its illegal to use your VCR to copy TV programs if you keep them beyond 45 days? There are grey areas between what the law says, and what common practice is, even for responsible citizens.
Where you draw the line between right and wrong for yourself and your students can help be defined by reading the suggestions of others at Stanford Universitys Educational Fairuse site. http://fairuse.stanford.edu
Here's a handy chart summarizing copyright issues for educators:
(You'll need Adobe Acrobat reader to view .pdf files. Available free at http://adobe.com )
When students create a web page with their own pictures, words and ideas, they need to understand what intellectual property rights they hold and how to similarly respect the intellectual property rights of others.
When your students save images off the web for use in their own web pages, are they stealing? Many copyright-free image, and animation archives exist on the web, as listed at http://lone-eagles.com/webdev.htm , which you visited in Lesson 3.
At http://plagiarism.org is a service where for .50 cents per paper a supercomputer will colorcode a student's paper with all the plagiarized material and document the sources. It will get your student's attention that you know this is possible! See also http://plagiarism.com.
Ann Lathrop and Kathleen Foss's Book:
"Student Cheating and Plagiarism in the Internet Era: a Wake-up
Call" Search for it at http://amazon.com or by the full title in quotes.
Students today tend to accept information from the Internet as valid, but need to become much more skeptical information consumers. Students need to learn to cite resources in ALA and MLA formats and to understand how to authenticate information by noting the sponsor of the web site from which they obtained information, validating the information by finding references to the same facts in three different places, and so on. Lesson one includes a form for authenticating Internet information in section F. of that lesson: "Critical Evaluation of Internet Information Handout."
D. Privacy and Child Safety
"Predators" seek to befriend minors via email and entice them to private meetings without their parents knowledge. Since free email accounts are available to anyone, easily, on the web, what can you do to protect your students?
Posting pictures of students with contact information such as home addresses, names, and phone numbers is considered an unwise practice.
You will find many concerned parents and teachers have posted extensive resources related to your options dealing with these issues. Explore the handbook resources in the Parenting webtour, http://lone-eagles.com/webtours.htm , K12 Essential Resources, http://lone-eagles.com/k12.htm and http://childrenspartnership.org
E. Inappropriate Internet Resources (pornography)
Our students represent the first generation to grow up with the Internet and digital technology. They are growing up in a world with unlimited information access. There is no way you can protect students from the information that's out there, particularly when their hormones are driving their curiosity. Ultimately, this will be a moral 'values' and 'character education' issue. You might review the character education curriculum links at http://lone-eagles.com/chared.htm Have your students decide what they believe and what's right and what's wrong.
As if incorrect information isnt bad enough, hate literature and resources on how to make drugs and bombs are readily available on the Internet. Because the first amendment to the constitution guarantees free speech, pornography also exists on the Internet. Pornography of every description and rating is readily available on the Internet.
F. AUPS (authorized usage policies)are legal waivers students and parents must sign to protect your school from law suits should the student intentionally or unintentionally view pornography via a school-owned computer. See the K12 Essential resources http://lone-eagles.com/k12.htm for AUP resources.
G. Blocking programsexist which can inhibit unintentional access to inappropriate web sites, but most people find them more trouble than they are worth because they also block access to information that is desirable and can be circumvented by determined students. Sites for blocking programs are listed in the K12 Essential resources section. http://lone-eagles.com/k12.htm
With students you can't trust, supervision is the only solution, or restricting them to captured, appropriate sections of the Internet using an offline browser.
H. Offline browserslike WebWhacker http://bluesquirrel.com (a free course on use of offline browsers is listed among other online courses in the "Self-Directed Professional Development" section of your handbook") http://lone-eagles.com/self.htm can allow a teacher or parent to easily capture dozens, even hundreds of web pages on a daily basis for captive viewing by students who cant be trusted with unsupervised Internet access. Review what an offline browser is and the options it brings to your classroom. Easy to learn and costing under $50, an offline browser transforms an educator's ability to use any web pages from the Internet for presentations and use in the classroom WITHOUT the "World Wide Wait!"
I. Browser Caching of Web Pages
Did you know browsers can keep a record (called caching) of all web pages visited by a given computer for weeks on end. To view the cache listing in Netscape type about:global where you would normally enter a URL. This listing gives time and date and is searchable. Control-F will give you a search window, enter "edu" and see what happens. Use the help button of your browser to learn more about use of your cache.
Many quality sites exist which detail the risks, issues, and potential strategies for dealing with child safety. See the Parenting Webtour http://lone-eagles.com/webtours.htm and the K12 Essential Resources http://lone-eagles.com/k12.htm
J. Citing Internet Resources in ALA (American Library Association) and MLA style
Review the two great resources on citing resources in the Student Homework Hotlinks webtour. http://lone-eagles.com/webtours.htm More are available on your Thinkquest CD-ROM and at the Thinkquest site. This information is available at a great many educational sites.
K. Help on Internet Spam, Scams, Hoaxes, and Viruses
Scams are email messages and web sites with insincere intents. Learn more at
Hoaxes are often emailed warnings based on rumors that are untrue. Learn more at
Current Health-Related Hoaxes and Rumors
Anti-Virus, Hoax, Myth, Fraud, Chain Letter and Anti-Spam Sites
http://www.internet-101.com/hoax/ See what else you can find at internet-101.com.
A Listing of Common Hoaxes http://www.symantec.com/avcenter/hoax.html
See what else you can find at symantec.com.
Spam is unwanted email, often associated with Scams. Learn more at
Viruses are often sent hidden in unwanted email and can wipe out your hard drive, or worse!
Find out how computer viruses and worms work by logging
You should have a virus protection program running on your computer. You should know to never open an attachment from someone you don't know. Some viruses will automatically send messages to every email address on a persons computer without their knowledge, so even opening an attachment from someone you DO know might contain a virus. Learn more at
Free Virus Software and Related Information
Don't you just HATE hate!
Hate sites on the Internet
More offensive than any of the above topics!
NOTE: If you can think of an important topic
that should be raised in this lesson,
please post it to the class listserv!
Lesson Feedback: Optional, but much appreciated.
You're invited to privately email your instructor:
1. What areas, if any, did you have trouble with during this lesson?
2. What questions remain now that you've finished this lesson?
3. Approximately how much time did you devote to this lesson?
4. What improvements would you like to suggest?