Introduction


 

I.         Administrative Details

            A.        Class Roll

            B.        Rules and Procedures

            C.        Distribute Textbooks

            D.        Distribute Syllabus

            E.        Assign First Project

II.        Internet Use and Issues

            A.        Safety

            B.        Worth of Information

            C.        Giving Credit

III.       Safety

            A.        Identity Theft

                        1.         Protect personal information

                        2.         Full name vs Nickname

                        3.         Address

                        4.         SSN

                        5.         Credit Card numbers

                        6.         Bank Account numbers

                        7.         Unknown E-mail

                        8.         Spyware and Malware

                        9.         Electronic footprint, cybertrail

            B.        Predators

                        1.         Target: 13 to 17 years

                                    a.         Background of abuse

                                    b.         Depression

                                    c.         Delinquency

                                    d.         Family problems

                                    e.         Risky online behaviors

                                    f.         75% girls

                        2.         Seduction vs forcible assault

                                    a.         Lure with promises

                                    b.         Alienate from families

                                    c.         Teach how to recognize in appropriate communication

                                    d.         Teach how seduction can happen

                        3.         Pretend to be students

                        4.         Limited contact via social networking sites

                        5.         Greatest contact via IM, email, and chatrooms

            C.        Scams

                        1.         Nigerian Gold

                        2.         Request for financial information

                        3.         IRS requests

            D.        Inappropriate Activity

                        1.         Bullying

                        2.         False rumors

                        3.         Negative attitudes and activities

                        4.         Pornography

                        5.         Threats

                        6.         File Sharing

                                    a.         $9,250 per file

                                    b.         Must follow copyright guidelines

                                    c.         Just because you can does not make it right.

            E.        What can you do

                        1.         Internet Security Software

                                    a.         Norton

                                    b.         Spybot

                                    c.         AVG

                                    d.         Adaware

                        2.         Don’t open email/IM from strangers

                        3.         Use of wireless

                                    a.         Unsecured

                                    b.         Secured

                        4.         Passwords

                                    a.         Birthdates

                                    b.         Phonenumbers

                                    c.         Names

                                    d.         7 to 10 characters

                                    e.         Mix of uppercase, lowercase, numbers, characters

                        5.         Backup

IV.      Worth of the Information

            A.        Assumptions

                        1.         The internet is the easiest way to get information

                        2.         The web page has its own content, not just links

                        3.         You know what you want to find

            B.        The Uniform Resource Locator (URL)

                        1.         Protocol

                        2.         Server

                        3.         Domain

                        4.         Directories

                        5.         File

            C.        Evaluation Criteria

                        1.         Coverage

                        2.         Accuracy

                        3.         Authority

                        4.         Objectivity

                        5.         Currency

                        6.         Ease of Use

V.        Giving Credit

            A.        What is a Copyright

                        1.         Legal protection given to creators of intellectual material

                        2.         Effective when material is created

            B.        Rights of Holder

                        1.         Distribution of material

                        2.         Use of material

                        3.         Copying material

            C.        Fair Use

                        1.         Right to use material without permission of copyright holder

                        2.         May not have negative impact on market

                        3.         Must acknowledge copyrights

            D.        Fair Use Rights

                        1.         Archival copying

                        2.         Criticism or reviews

            E.        In educational environment

                        1.         Teaching

                        2.         Research papers Evaluation and Use of Web Resources

VI.      Basic APA Format

            A.        Title Page

            B.        Abstract Page

            C.        Body of Paper

            D.        Reference Page

                        1.         Only lists references cited in text

VII.     APA References                     

            A.        Basic Format

                        1.         Author

                        2.         Year of Copyright

                        3.         Title

                        4.         Source: this varies with type of source. See links on project page on website

                        5.         Periods used as separators

VIII.    APA In-Text Citation

            A.        When you use facts, ideas, and information of others in a report you must give credit to those people (Glencoe Keyboarding, 2000, 258)

            B.        You use old paper of yours

IX.      APA in Text Reference

            A.        Basic format:

                        1.         (author last name, copyright year)

                        2.         (Smith, 2004)

            B.        Exact Quote:

                        1.         (author last name, copyright year, page nr.)

                        2.         (Jones, 2004, 5)

1