Developing+a+Policy+and+Resources+Manual


 * ** EL7007-8 ** ||  ||
 * ** Ethical and Legal Issues in an Online Course ** || ** 8 Develop an Acceptable Use Policy and Resources Manual ** ||
 * Hi Steve, **
 * Impressive work! Outstanding Acceptable Use Policy! Extremely well written and presented. Outstanding content and APA formatting. It has been a pleasure to work with you and I wish you good luck in your future studies! **
 * Impressive work! Outstanding Acceptable Use Policy! Extremely well written and presented. Outstanding content and APA formatting. It has been a pleasure to work with you and I wish you good luck in your future studies! **

My Mentor indicated that I could cut and paste from previous assignments to complete the first part of this assignment, so I have done just that. Because of that, I am including only the second part of the assignment below.

=Appendix A: Brief Annotated Bibliography = Crews (n.d.), a professor of law, provides in this article a brief summary of the Technology, Education and Copyright Harmonization Act of 2002; exploring the background, context, benefits, and requirements of the Act. His depiction of instructor’s duties framed the backdrop for the information included in the acceptable use policy discussion on considerations regarding e-learning environments. Crews reported facts and only offered his opinion in the conclusion in which he identified that the law brings benefits and opportunities as well as responsibilities and burdens. Information security is of primary importance to educational institutions with regards to their reputation, donations, and legal requirements to inform students, alumni, faculty, or staff if there is a breach. Culnan and Carlin (2009), identified several significant security and privacy challenges in higher education, including: (a) through selling merchandise or gathering information online, (b) large data stores of sensitive personal information, (c) decentralized computing and networking resources, and (e) faculty and student access to school networks and resources. The authors conducted a study of the security policies of 236 of the best colleges in the U.S. to determine how well they adhered to the five elements of Fair Information Practices. Their results suggested the currently institutions of higher education “would likely receive a failing grade” regarding securing the privacy of their networks or the personal information of their students, faculty and staff. This article was the primary source for much of my information regarding what cyber bullying is, and its pervasiveness among young people. Keith and Martin (2005) defined cyber bullying and reported the findings of an internet safety survey, in which a majority of young people under the age of 18 were either the perpetrators or victims of cyber bullying, and often both. The authors also included a number of tips for children, parents, and schools that were incorporated into the acceptable use policy. The most insightful comments in the article indicated signs for adults to watch for in children that are being cyber bullied. Lyons (2010) noted that the issues of copyright, fair use, and open access, especially in the age of the TEACH Act are confusing and complex. This article gives a solid introduction to the concepts of copyright, public domain, and fair use. My discussion of the five factors of fair use principally came from this article. Lyons further developed the history that led to the passing of the TEACH Act of 2002 and identified the specific criteria for fair use under the Act, as well as the works that are and are not permitted. The remainder of the article dealt with issues of open access and was not of further help in the current assignment. McDermott (2012) found that the current state of copyright law interferes with the ability of libraries to provide digital services to the public. She suggested that librarians become better versed in copyright law and act as advocates to change the laws and correct “ the imbalance between the interests of the public and those of copyright holders ” ( p. 7 ). In the article, the author introduced and discussed the concepts of fair use, the Digital Millennium Copyright Act, the Sonny Bono Copyright Term Extension Act, and how these affect current copyrights. She specifically noted that the law continually changes to extend benefits to copyright holders but to the denigration of the public domain. In a review of the literature on cyber bullying interventions and programs, Pearce, Cross, Monks, Waters and Falconer (2011) determined that “ a systematic whole-school approach [is] effective [in] prevent[ing] and manag[ing] all forms of bullying behaviors in schools (including cyberbullying) <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">” ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">p. 1 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">). The authors were most enamored with the 2011 meta-analysis by Ttofi and Farrington (2011) which identified the components of school programs that were most efficacious. To introduce the review, the authors defined cyber bullying and listed consequences of cyber bullying as reported in the literature. Finally, Pearce et al. reported on six domains for whole-school implementation that provide guidelines for action, as well as evidence for inclusion of each domain in bully prevention programs. <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">Snakenborg, Van Acker, and Gable (2011) approached the subject of cyber bullying from the perspective of how beneficial social networks and the use of technology and digital devices can be in the development of “ <span style="color: #0000ff; font-family: 'Times New Roman',Times,serif; font-size: 120%;">social, problem-solving, and critical thinking skills and [the] obtain[ing of] feedback regarding. . . social functionin <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">g” ( <span style="font-family: 'Times New Roman',Times,serif; font-size: 90%;">p. 88 <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">) for young people. The chance to share feelings, ideas, and thoughts with others can contribute greatly to a youth’s personal identify and self-esteem. Snakenborg et al. discussed the harmful effects of any type of bullying, but especially cyber bullying. The authors determined that cyber bullying can be more damaging than face-to-face bullying because of several factors; (a) takes place with little to no adult supervision, (b) can be done anonymously, (c) allows targeting of a greater number of victims, (d) reaches a larger audience, and (e) carries no significant risk. The remainder of the article discussed a number of preventative or intervention programs for youth, as well as some legal remedies that victims may be able to pursue.
 * <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">Crews, K. D. (n.d.). Distance education and the TEACH Act. Retrieved from American Library Association (ALA) website: http://www.ala.org/Template.cfm?Section=Distance_Education_and_the_TEACH_Act&Template=/ContentManagement/ContentDisplay.cfm&ContentID=25939
 * <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">Culnan, M. J., & Carlin, T. J. (2009). Online privacy practices in higher education: Making the grade? Communications of the ACM, 52(3), 126-130. doi:10.1145/1467247.1467277Guy, R., & Lownes-Jackson, M. (2011). Business continuity strategies: An assessment of planning, preparedness, response and recovery activities for emergency disasters. Review of Management Innovation & Creativity, 4(9), 55-69. Retrieved from http://www.intellectbase.org/articles.php?journal=RMIC&volume=4&issue=9
 * <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">Keith, S., & Martin, M. E. (2005). Cyber-bullying: Creating a culture of respect in a cyber world. Reclaiming Children and Youth, 13(4), 224-228. Retrieved from ERIC database (EJ710387)
 * <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">Lyons, M. G. (2010). Open access is almost here: Navigating through copyright, fair use, and the TEACH Act. Journal of Continuing Education in Nursing, 41(2), 57-64. doi:10.3928/00220124-20100126-03
 * <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">McDermott, A. J. (2012). Copyright: Regulation out of line with our digital reality? Information Technology & Libraries, 31(1), 7-20. doi:10.6017/ital. v31i1.1859
 * <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">Pearce, N., Cross, D., Monks, H., Waters, S. & Falconer, S. (2011). Current evidence of best practice in whole-school bullying intervention and its potential to inform cyberbullying interventions. Australian Journal of Guidance and Counseling, 21(1), 1-21. doi:10.1375/ajgc.21.1.1
 * <span style="font-family: 'Times New Roman',Times,serif; font-size: 120%;">Snakenborg, J., Van Acker, R., & Gable, R. A. (2011). Cyberbullying: Prevention and intervention to protect our children and youth. Preventing School Failure, 55(2), 88-95. doi:10.1080/1045988X.2011.539454


 * = References ||
 * * Burgunder, L. B. (2011). //Legal aspects of managing technology// (5th ed.). Mason, OH: South-Western Cengage Learning.
 * Crews, K. D. (n.d.). //Distance education and the TEACH Act//. Retrieved from American Library Association (ALA) website: http://www.ala.org/Template.cfm?Section=Distance_Education_and_the_TEACH_Act&Template=/ContentManagement/ContentDisplay.cfm&ContentID=25939
 * Culnan, M. J., & Carlin, T. J. (2009). Online privacy practices in higher education: Making the grade? //Communications of the ACM, 52//(3), 126-130. doi:10.1145/1467247.1467277
 * Definitions of copyright, 17 U.S.C. § 101 (2008).
 * Internet Crime Complaint Center. (2011). //Internet Crime Report//. Washington, DC: National White Collar Crime Center and the Federal Bureau of Investigation. Retrieved from http://www.ic3.gov/media/annualreport/2011_ic3report.pdf
 * Keith, S., & Martin, M. E. (2005). Cyber-bullying: Creating a culture of respect in a cyber world. //Reclaiming Children and Youth, 13//(4), 224-228. Retrieved from ERIC database (EJ710387)
 * Lyons, M. G. (2010). Open access is almost here: Navigating through copyright, fair use, and the TEACH Act. //Journal of Continuing Education in Nursing//, //41//(2), 57-64. doi:10.3928/00220124-20100126-03
 * McDermott, A. J. (2012). Copyright: Regulation out of line with our digital reality? //Information Technology & Libraries//, //31//(1), 7-20. doi:10.6017/ital. v31i1.1859
 * Pearce, N., Cross, D., Monks, H., Waters, S. & Falconer, S. (2011). Current evidence of best practice in whole-school bullying intervention and its potential to inform cyberbullying interventions. //Australian Journal of Guidance and Counseling, 21//(1), 1-21. doi:10.1375/ajgc.21.1.1
 * Snakenborg, J., Van Acker, R., & Gable, R. A. (2011). Cyberbullying: Prevention and intervention to protect our children and youth. //Preventing School Failure, 55//(2), 88-95. doi:10.1080/1045988X.2011.539454
 * Sun, J. C., & Baez, B. (2009). //Intellectual property in the information age: Knowledge as commodity and its legal implications for higher education//. San Francisco, CA: Wiley/Jossey-Bass.
 * U.S. Department of Health and Human Services. (n.d.) //What is cyberbullying?// Retrieved from http://www.stopbullying.gov/cyberbullying/what-is-it/index.html
 * Waxer, B. M., & Baum, M. L. (2006). //Internet surf and turf revealed: The essential guide to copyright, fair use, and finding media//. Boston, MA: Thomson Course Technology.
 * Wilson, L. (2005). //Fair use, free use and use by permission: How to handle copyrights in all media//. New York, NY: Allworth Press. ||