You are here:


, Northern Kentucky University, United States ; , Central Arizona College Signal Peak Campus, United States ; , , University of Phoenix, United States

E-Learn: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, in Vancouver, Canada ISBN 978-1-880094-57-0 Publisher: Association for the Advancement of Computing in Education (AACE), San Diego, CA


Abstract: The rapidly changing world of technology is creating unique challenges for today's educators of higher learning. In particular, e-learning programs throughout the world have created an increasingly complex set of issues related to acceptable student conduct in cyberspace. One of many challenges that educators and administrators must face is how to establish and enforce an effective student code of conduct. This inquiry presents potential dangerous scenarios that exist in educational cyberspace. Increasing abuses of online systems have created a possible need for educators to consider a zero tolerance approach to e-learning programs. Further, a contrasting view of traditional and online codes of conduct is offered. Ultimately, it appears that traditional classroom codes of conduct do not address the range of student behaviors that are possible in cyberspace. Educators in higher learning institutions must ensure that their code of conduct keeps pace with the unique freedoms associated with e-learning programs.


Traina, M., Doctor, D., Bean, E. & Wooldridge, V. (2005). STUDENT CODE of CONDUCT in the ONLINE CLASSROOM: A CONSIDERATION of ZERO TOLERANCE POLICIES. In G. Richards (Ed.), Proceedings of E-Learn 2005--World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education (pp. 1855-1863). Vancouver, Canada: Association for the Advancement of Computing in Education (AACE). Retrieved December 17, 2018 from .

View References & Citations Map


  1. The Brookings Institution (2005). Computer ethics institute. Retrieved April 24, 2005, from
  2. Brown, B.L. (2003). Career education models. ERIC Clearinghouse on Adult, Career, and Vocational Education, Trends and Issues Alert No. 44. Retrieved April 21 2005, from
  3. Burch, E. (2001). Censoring hate speech in cyberspace: A new debate in a new America. North Carolina Journal of Law& Technology. Retrieved April 21, 2005 from,
  4. Essex, N.L. (2005). School law and the public schools: a practical guide for educational leaders (3rd Ed). Boston: Pearson.
  5. Estep, S., McInerney, W., Vockell, E. & Kosmoski, G. (2000). An investigation of the relationship between integrated learning systems and academic achievement. Journal of Educational Technology Systems, 28(1), 5-21.
  6. Grigg, C. (2005). Cyberpatrol: a select few aim to reduce abuse in cyberspace at the University of Virginia. Retrieved April 23, 2005, from
  7. Keegan, D. (2000). Pennsylvania makes spreading computer viruses criminal. Retrieved April 24, 2005, from /
  8. National School Safety and Security Services. (2005). Zero Tolerance. Retrieved April 23, 2004, from
  9. Ogilvie, E. (2000). Cyberstalking. Australian Institute of Criminology. September, 2000.
  10. Rimlinger, C. (2003). Budget Cuts Stall Online Course Growth at UW; Distance Education Grows Across Nation. Madison Capital Times, July 28, 2003, P. 2A.
  11. Rowe, N.C. (2004). Cheating in online student assessment. Beyond Plagiarism. Retrieved on April 24, 2005, from University of Phoenix. (2004-5). 31_Online_Master_Catalog_2004_05. Retrieved on April 21, 2005, from
  12. Waterhouse, S. & Rogers, R.O. (2004). The importance of policies in e-learning instruction: Thoughtful policies on topics such as e-mail, electronic discussions and intellectual property rights can keep an e-learning course running smoothly. Educause quarterly (27), 3. Retrieved April 20. 2005 from
  13. Washburn University. (2005). Cyberspace Citizen Code. Retrieved April 24, 2005 from, Wheeler, T. (2004). Slamming in cyberspace: the boundaries of student First Amendment rights. The Computer& Internet Lawyer. 21(4), 14-21.
  14. Wikipedia. (2005). Zero tolerance. Retrieved April 26, 2005 from,,2005,from /
  15. Yates, J. & Van Maanen, J.(2001). Information technology and organizational transformation: history, rhetoric, and practice. Pp. 93-136. California: Sage Publications.

These references have been extracted automatically and may have some errors. If you see a mistake in the references above, please contact