Leslie Kinsey, Reich College of Education, Appalachian State University

Home Page

Cover Page

T.O.C by Artifact

T.O.C. by  Tech Competency

T.O.C. by INTASC Principles
 

 Artifact #1

Artifact # 2

Artifact # 3

Artifact # 4

Artifact # 5

Artifact # 6

Artifact # 7

Artifact # 8

Artifact # 9

Artifact # 10

Artifact # 11

Artifact # 12

Artifact # 13

Artifact # 14

Artifact # 15

NC ETSI Advanced Competencies

INTASC Principles

References

Artifact #8:
Ethics Role Playing Activity

Context

In class, we discussed the Acceptable Use Policy, which defined what Internet sources are appropriate to use and when.  The Acceptable Use Policy is an agreement between the school, students, and parents that says that the student will obey computer lab rules.  The handout that defined Valle Crucis’ Policy on Acceptable Use of Computers was a good example of what is appropriate and legal to use from the Internet.  We also discussed the handout describing “Netiquette” (Internet Etiquette).  This handout clearly defines the correct way to handle your electronic mail.  The guidelines on this handout ensure that your emails will be effective and secure, and also ensure that others will not be disrupted by any emails that we send them.  Another topic that we discussed involves the website that we visited called “HoaxBusters.”  This site explains the messages that we get via email that are bothersome and illegal, including chain letters, viruses, and hoaxes (such as emails that claim you can win prizes, money, or other false promotions).  By viewing this site, we saw examples of phony emails and hoaxes.  Also, we were put into groups to role play an example of bad “Netiquette.”  These examples clearly showed what is right or wrong about the use of the Internet. 

Impact

These handouts are very beneficial to us as future teachers.  We need to know what is legal to use from the Internet.  We also need to monitor what our students use as resources from the Internet.  Students also need to be taught what is appropriate behavior when it comes to email.  We can teach them what is safe to use and when it is appropriate to use it.  We should also explain to our students the rules of the computer labs in our school.  Not all students know what is available on the Internet, and we should teach them what is appropriate to look at, and what is not.  They need to know the rules so that they can avoid breaking them.  Also, students need to know the risks of “hoax” emails and know that chain letters are illegal and should not be passed on.  As teachers, we need to know these rules and teach them to our students as well.

Alignment

This activity met Competency 14.3 by clarifying the social, legal, and ethical issues related to technology use.  We discussed the Acceptable Use Policy and saw an example of it.  We also preformed a role play that involved situations where illegal copying of software.  Also, we talked about the examples of ethical and unethical issues of copying material that is not public domain.  This project also meet INTASC Principle #4 because the teacher uses his/her knowledge of appropriate computer behavior and relays this knowledge to his/her students.  This will enhance their performance skills while using the computer.