You are here:

STUDENT CODE of CONDUCT in the ONLINE CLASSROOM: A CONSIDERATION of ZERO TOLERANCE POLICIES
PROCEEDINGS

, Northern Kentucky University, United States ; , Central Arizona College Signal Peak Campus, United States ; , , University of Phoenix, United States

E-Learn: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, in Vancouver, Canada ISBN 978-1-880094-57-0 Publisher: Association for the Advancement of Computing in Education (AACE), San Diego, CA

Abstract

Abstract: The rapidly changing world of technology is creating unique challenges for today's educators of higher learning. In particular, e-learning programs throughout the world have created an increasingly complex set of issues related to acceptable student conduct in cyberspace. One of many challenges that educators and administrators must face is how to establish and enforce an effective student code of conduct. This inquiry presents potential dangerous scenarios that exist in educational cyberspace. Increasing abuses of online systems have created a possible need for educators to consider a zero tolerance approach to e-learning programs. Further, a contrasting view of traditional and online codes of conduct is offered. Ultimately, it appears that traditional classroom codes of conduct do not address the range of student behaviors that are possible in cyberspace. Educators in higher learning institutions must ensure that their code of conduct keeps pace with the unique freedoms associated with e-learning programs.

Citation

Traina, M., Doctor, D., Bean, E. & Wooldridge, V. (2005). STUDENT CODE of CONDUCT in the ONLINE CLASSROOM: A CONSIDERATION of ZERO TOLERANCE POLICIES. In G. Richards (Ed.), Proceedings of E-Learn 2005--World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education (pp. 1855-1863). Vancouver, Canada: Association for the Advancement of Computing in Education (AACE). Retrieved December 17, 2018 from .

View References & Citations Map

References

  1. The Brookings Institution (2005). Computer ethics institute. Retrieved April 24, 2005, from http://www.brook.edu/its/cei/cei_hp.htm
  2. Brown, B.L. (2003). Career education models. ERIC Clearinghouse on Adult, Career, and Vocational Education, Trends and Issues Alert No. 44. Retrieved April 21 2005, from http://www.cete.org/acve/docs/tia00112.pdf
  3. Burch, E. (2001). Censoring hate speech in cyberspace: A new debate in a new America. North Carolina Journal of Law& Technology. Retrieved April 21, 2005 from, http://www.jolt.unc.edu/vol3/Burch.htm
  4. Essex, N.L. (2005). School law and the public schools: a practical guide for educational leaders (3rd Ed). Boston: Pearson.
  5. Estep, S., McInerney, W., Vockell, E. & Kosmoski, G. (2000). An investigation of the relationship between integrated learning systems and academic achievement. Journal of Educational Technology Systems, 28(1), 5-21.
  6. Grigg, C. (2005). Cyberpatrol: a select few aim to reduce abuse in cyberspace at the University of Virginia. Retrieved April 23, 2005, from http://www.people.virginia.edu/~lae9e/journal/stories/carrie2.htm
  7. Keegan, D. (2000). Pennsylvania makes spreading computer viruses criminal. Retrieved April 24, 2005, from http://lists.virus.org/isn-0005/msg00204.html /
  8. National School Safety and Security Services. (2005). Zero Tolerance. Retrieved April 23, 2004, from http://www.schoolsecurity.org/trends/zero_tolerance.html
  9. Ogilvie, E. (2000). Cyberstalking. Australian Institute of Criminology. September, 2000.
  10. Rimlinger, C. (2003). Budget Cuts Stall Online Course Growth at UW; Distance Education Grows Across Nation. Madison Capital Times, July 28, 2003, P. 2A.
  11. Rowe, N.C. (2004). Cheating in online student assessment. Beyond Plagiarism. Retrieved on April 24, 2005, from http://www.westga.edu/%7Edistance/ojdla/summer72/rowe72 University of Phoenix. (2004-5). 31_Online_Master_Catalog_2004_05. Retrieved on April 21, 2005, from https://mycampus.phoenix.edu/secure/courseList.asp
  12. Waterhouse, S. & Rogers, R.O. (2004). The importance of policies in e-learning instruction: Thoughtful policies on topics such as e-mail, electronic discussions and intellectual property rights can keep an e-learning course running smoothly. Educause quarterly (27), 3. Retrieved April 20. 2005 from http://www.educatuse.edu
  13. Washburn University. (2005). Cyberspace Citizen Code. Retrieved April 24, 2005 from, http://www.washburn.edu/ccc/ Wheeler, T. (2004). Slamming in cyberspace: the boundaries of student First Amendment rights. The Computer& Internet Lawyer. 21(4), 14-21.
  14. Wikipedia. (2005). Zero tolerance. Retrieved April 26, 2005 from, http://en.wikipedia.org/wiki/Zero_toleranceWiredKids.(2004).Victoryforchildrenincyberspace.RetrievedApril23,2005,fromhttp://www.wiredsafety.org/law/kids/hr3494.html /
  15. Yates, J. & Van Maanen, J.(2001). Information technology and organizational transformation: history, rhetoric, and practice. Pp. 93-136. California: Sage Publications.

These references have been extracted automatically and may have some errors. If you see a mistake in the references above, please contact info@learntechlib.org.