home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 45.1 KB | 1,012 lines |
-
-
-
-
-
-
- Network Working Group B. Manning
- Request for Comments: 1746 ISI
- Category: Informational D. Perkins
- Houston ISD
- December 1994
-
-
- Ways to Define User Expectations
-
- Status of this Memo
-
- This memo provides information for the Internet community. This memo
- does not specify an Internet standard of any kind. Distribution of
- this memo is unlimited.
-
- Abstract
-
- This paper covers basic fundamentals that must be understood when one
- defines, interprets, or implements methods to control user
- expectations on or over the Internet.
-
- 1. Background
-
- User agreements are a form of acceptable use policy (AUP) are an
- implicit part of internetworking since they place parameters on user
- expectation. They define the desired and expected behaviour of those
- who participate. Everyone has one, whether published or not. This
- applies to networks that provide transit paths for other networks as
- well as end sites and the individual users that use systems. A
- better understanding of an AUP, and how to formulate one seems to be
- increasingly important as the global net encompases new environments
- as varied as K12 schools and real-time systems. AUP's are used to
- determine pricing, customer base, type and quality of service
- metrics, and a host of other provider services.
-
- 2. Components of an Agreement
-
- In defining your particular agreement there are three areas that must
- be addressed. They are where you get service from, who your peers
- are, and whom you provide service to. A good understanding of these
- concepts will make or break the policies you formulate.
-
- 2.1 Where you get service from
-
- Each entity gets its service from one or more other providers,
- either a level three service, such as IP transit, or a level two
- service, such as circuits. The provider of such services usually has
- an policy in the form of an agreement or contract specifying terms
-
-
-
- Manning & Perkins [Page 1]
-
- RFC 1746 Ways to Define User Expectations December 1994
-
-
- and conditions of use. This forms the basis for the type of service
- offerings that you as an entity can provide. If you get service from
- several providers, all of them need to be considered in the
- formation of policy.
-
- 2.2 Who your peers are
-
- Are your policies consistent with those offered by your peers? In
- many cases, the formation of policy will define who your peers are.
- It is important to clearly identify which areas you intend to reach
- and the community you wish to be a contributing, productive part of.
- Once this is clear, formulate polices along those lines.
-
- 2.3 Who you provide service to
-
- It is required that you inform those who use your services just what
- your policies are. Without this information, it will be almost
- impossible for them to distinguish what to expect from your service
- offering. Without a clear policy it is possible that litigation may
- ensue. It is important to reflect community standards in the creation
- of policy.
-
- 3. Some Issues to consider
-
- IP provided services can be complex. They comprise both information
- and communication. In the formulation of policy it is critical that
- the policy provide for security and access to information and
- communication while ensuring that the resource use does not
- overburden the system's capabilities. These conflicting demands must
- be analyzed and a synthesis arrived at. This hints a fourth
- component of an AUP, that it has a method to extract compliance.
- This is so site specific that further analysis will not be attempted
- here.
-
- Some items that should be considered in the formation of policy are:
-
- - privacy - morals & ethics
- - freedom of expression - legal constraints
- - safety - harassment
- - plagiarism - resource utilization
- - indemnification - targeted areas of interest
- - expected behaviours - remedies and recourse
-
- This should not be considered as an exhaustive list but as pointers
- for those types of things to be considered when policy is formed.
-
-
-
-
-
-
- Manning & Perkins [Page 2]
-
- RFC 1746 Ways to Define User Expectations December 1994
-
-
- 4. Security Considerations
-
- Security and Liability issues are not discussed in this memo.
-
- 5. Summary
-
- User Agreements are here to stay. As the Interconnected mesh of
- networks grows, the choices presented to end-users mandate that
- provider/user expectations are clearly presented. Use of these
- guidelines will help create a clearer, better defined environment for
- everyone.
-
- Authors' Addresses
-
- Bill Manning
- USC/Information Sciences Institute
- 4676 Admiralty Way
- Marina del Rey, CA 90292
-
- Phone: 822-1511
- EMail: bmanning@isi.edu
-
-
- Don Perkins
- Instructional Media Services
- Houston Independent School District
- 3830 Richmond
- Houston, TX 77027
-
- EMail: dperkins@tenet.edu
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Manning & Perkins [Page 3]
-
- RFC 1746 Ways to Define User Expectations December 1994
-
-
- Example
-
- For further reference on some acceptable use policies, see the
- following materials archived in Armadillo--The Texas Studies Gopher:
-
- Name=Acceptable and Unacceptable Use of Net Resources (K12)
- Type=1
- Host=chico.rice.edu
- Port=1170
- Path=1/More/Acceptable
-
- or:
-
- http://chico.rice.edu/armadillo
-
- If these resources are not available to you, you may want to review
- the attached policy and justification that is in use by an NSF
- sponsored project on K12 networking. It provides a view on the
- thinking process and actual Agreement that was worked out for this
- project.
-
- The Internetworked School: A Policy for the Future*
-
- Barry J. Fishman and Roy D. Pea School of Education and Social Policy
- Northwestern University
-
- Note:
-
- The CoVis Network Use Policy itself appears as an appendix to this
- article.
-
- Introduction
-
- The next five years will radically change the ways that schools
- relate to the world around them as global computer networks--long the
- exclusive domain of higher education and private industry--link up to
- primary and secondary schools. The Internet, a network made up of
- many smaller contributing networks, represents a powerful educational
- resource unlike anything that precedes it. Its potential for
- education grows with the establishment of each new connection.
-
- For the first time, schoolchildren have the means for simple, direct
- contact with millions of adults in a forum that masks their physical
- youth and presents them as virtual equals. However, just as the new
- kid in school has to learn new social codes and rituals to fit in,
- schools must learn some of the practices and etiquette of the
- Internet. Of course, the established denizens of the Internet will
- soon have some adjusting to do as well, with thousands (or millions)
-
-
-
- Manning & Perkins [Page 4]
-
- RFC 1746 Ways to Define User Expectations December 1994
-
-
- of new kids knocking electronically at their doors. Since the
- Internet was not designed with children in mind, many potentially
- difficult issues must be discussed by both the education and the
- Internet communities.
-
- This article presents a framework for thinking about some of the
- issues that are essential to making the initial encounter between
- schools and the Internet successful. It also presents an excerpt of a
- policy that embodies our approach to resolving those issues.
-
- Expanding Access, Expanding Horizons
-
- For roughly the past decade, schools increasingly have participated
- in specialized computer networks such as the NGS/TERC Kidsnetwork,
- the Intercultural Learning Network, and FidoNet, as well as for-
- profit services such as CompuServe, America Online, and Prodigy. The
- majority of these projects were conducted on networks, where
- teachers' or students' messages could not be read by anyone beyond a
- predetermined audience composed of other students and teachers. These
- projects made it possible for students and teachers to communicate
- with their peers in faraway places and pioneered some pedagogical
- uses of networks for computer-mediated communication and
- collaborative project work that will carry over to the Internet.
-
- Internetworking, however, goes beyond proprietary systems by joining
- a vast number of distinct networks into one large network, the
- Internet. As individual schools and bulletin boards are connected to
- the Internet, the number of people and services within easy reach
- increases exponentially. By one estimate, there are currently 19
- million users of the Internet, with an annual growth rate approaching
- 80 percent. Furthermore, some of the Internet's most powerful
- communication tools are specifically designed so that any of these
- millions of people could join any conversation. The network's true
- power comes from the synergy of many dispersed minds working together
- to solve problems and discuss issues, and there is little in the way
- of hierarchy or control of the discourse.
-
- The schools' shift to internetworking systems involves critical
- technological, as well as pedagogical, issues. It requires a change
- in the school computing paradigm from centralized computing to
- distributed client-server systems, thus bringing about an
- administrative change in the nature of school computing. Many schools
- that currently have some kind of network access provide accounts only
- to teachers or administrators. Internetworking is fundamentally
- different--giving accounts, access, and therefore control directly to
- students.
-
-
-
-
-
- Manning & Perkins [Page 5]
-
- RFC 1746 Ways to Define User Expectations December 1994
-
-
- There are numerous arguments for the pedagogical benefits of school
- internetworking. But what of the risks? What safety, liability, and,
- above all, educational concerns must be addressed before schools are
- ready to tap into the Internet? This policy is not intended as a
- document that sets limitations or restrictions. Rather, it is
- designed to facilitate and set guidelines for exploring and using the
- Internet as a tool for learning. The policy was written with the
- purpose and goals of the Internet as a background: support for open
- research and education in and among research and instructional
- institutions. The context for the policy was provided by the specific
- needs of a growing community of learners composed of students,
- teachers, scientists, and researchers. The networked environment must
- support collaboration and cooperation. Proper frameworks to support
- network navigation and information searching must be established. And
- because networks will continue to be a scarce educational resource
- for the foreseeable future, the policy also provides guidelines for
- maximizing the educational cost-benefit ratio for teachers and
- students.
-
- Testbed for Change--The CoVis Project
-
- Our framework for considering internetworking issues is a project
- currently being conducted at the School of Education and Social
- Policy at Northwestern University. The Learning Through Collaborative
- Visualization Project, CoVis, is designed to reconceptualize and
- reconfigure high school science education. CoVis is a networking
- testbed funded by the National Science Foundation (NSF). Its goal is
- to enable project-based approaches to science by using low- and
- medium-bandwidth networks to put students in direct contact with
- practicing scientists and scientific tools. In CoVis, we are working
- with the types of network connections we believe will be common in
- schools in the near future.
-
- In the first phase of our project we are working with two Chicago-
- area schools, Evanston Township High School in Evanston and New Trier
- High School in Winnetka. CoVis is deployed in 12 classes at the two
- high schools, involving three teachers at each school. Approximately
- 300 students are involved in the project: 100 freshmen, 100
- sophomores and juniors, and 100 seniors, all enrolled in either earth
- science or environmental science classes. Each classroom contains six
- Macintosh Quadra computers with audio/video conferencing units linked
- to an internal ethernet, which is linked to Northwestern's ethernet
- by a primary-rate Integrated Services Digital Network bridge for
- telecommunications using the public-switched network. Additional
- computers are available for Internet use in computer labs at each
- school.
-
-
-
-
-
- Manning & Perkins [Page 6]
-
- RFC 1746 Ways to Define User Expectations December 1994
-
-
- The CoVis Network Community consists of students and teachers in
- CoVis classes, scientists who wish to collaborate on CoVis student
- projects, the researchers conducting the CoVis project, and other
- interested parties who are granted special accounts. In the CoVis
- classroom, each student is given an account that makes him or her a
- "full" member of the Internet community. This means two things: Each
- student has access to all Internet services with minimal mediation by
- teachers or other adults, and anybody with an Internet account can
- contact the students directly, again without mediation.
-
- In addition to the standard Internet resources, which include
- electronic mail, listservs, Usenet news discussion groups, Telnet,
- gopher, and file transfer, CoVis makes it possible for students to
- communicate with peers and scientists via video and audio conference
- tools and remote screen-sharing technology for synchronous
- collaborative work. Therefore, the CoVis Network Use Policy goes
- beyond the needs of the typical low-bandwidth internetworked school.
-
- As an NSF testbed, CoVis has the job of developing new frameworks for
- the use of internetworking. In seeking to understand problematic
- issues of networking, we turn both to other projects--Bolt Beranek
- and Newman's work with the Ralph Bunche computer-minischool in New
- York; AT&T's Learning Circles; and TERC's LabNet project--and to
- analogous situations extant in schools. Our attention thus is placed
- on the development of a policy to establish ground rules for the
- students who will be introduced to the Internet.
-
- The Need for a Proactive Policy
-
- Exciting or revolutionary educational programs too often are
- derailed. In the 1970s, Jerome Bruner's curriculum Man: A Course of
- Study (MACOS) was at the center of a political and ideological
- firestorm that prevented its implementation in many schools. The
- experience of the MACOS developers taught us that it makes sense to
- spend time in the initial stages of a project trying to determine
- what challenges might arise to an educational innovation in order to
- avoid, preempt, or co-opt them.
-
- In March 1993, the Communications Policy Forum, a nonpartisan group
- of telecommunications stakeholders convened by the Electronic
- Frontier Foundation, met on the issues of Internet services for the
- K-12 educational community. The forum concluded that services should
- be provided only to schools that would indemnify the service
- providers. It also recommended that a warning statement be developed
- to advise schools of the presence of materials on the Internet that
- may be deemed inappropriate for minors.
-
-
-
-
-
- Manning & Perkins [Page 7]
-
- RFC 1746 Ways to Define User Expectations December 1994
-
-
- We believe that it is not enough to devise a policy designed to
- protect schools and service providers, although our policy also
- speaks to those roles. In this policy designed to guide students
- through some of the social complexity presented by the Internet, we
- created guidelines to alert novice users of established expectations
- and practices. Because the Internet is somewhat anarchic in its daily
- commerce, it is necessary to define a safe local space, or identity,
- for a school network where students can feel like members of a
- supportive community. The goal of establishing the boundaries of our
- own community forms the framework of our policy.
-
- Issues and Analogies
-
- The kinds of issues posed by internetworking are not new. Similar
- issues have been debated by schools many times before, from creation
- science to dress codes. These concerns resurface in the availability
- of networked material that some parents, teachers, or students might
- find objectionable, pornographic, or otherwise inappropriate.
- Although the actual percentage of materials in this category is
- small, their mere presence draws plenty of media attention. Consider
- this lead-in to a story about graphic material that can be retrieved
- through the Internet, published in the Houston Chronicle in 1990:
-
- "Westbury High School student Jeff Noxon's homework was rudely
- interrupted recently when he stumbled across the world's most
- sophisticated pornography ring....It was supported by taxes and
- brought into town by the brightest lights of higher education."
-
- While some are shocked, an alternative interpretation might point out
- that in using a valuable resource provided by the local university, a
- high school student chose to view material that many (including
- regular Internet users) find objectionable. Educators must understand
- that, as a byproduct of introducing internetworking, schools likely
- will have to justify student use of network resources to a public
- that does not understand the medium or its utility to education. By
- seeking out analogous situations and applying them to the development
- of our network use policy, we believe it is possible to establish
- frameworks for responding to these challenges. We found several
- significant analogies.
-
- * American Library Association (ALA). In considering information
- access issues, the most striking and informative analogy is to a
- remarkable set of documents built around the ALA's Library Bill of
- Rights of 1980. It is not farfetched to consider the Internet, at
- least in part, as a vast digital library. After all, the electronic
- database and information search tools it employs are rapidly becoming
- part of new school media centers, and many public and school
- libraries are beginning to offer some type of network access to their
-
-
-
- Manning & Perkins [Page 8]
-
- RFC 1746 Ways to Define User Expectations December 1994
-
-
- patrons.
-
- The ALA documents state, "Attempts to restrict access to library
- materials violate the basic tenets of the Library Bill of Rights."
- However, they add, what goes into the library collection should be
- chosen thoughtfully and with an eye toward instructional goals.
- School librarians are bound to devise collections that "are
- consistent with the philosophy, goals, and objectives of the school
- district," and they must "resist efforts by individuals to define
- what is appropriate for all students or teachers to read, view, or
- hear." Similarly, tools used to access the network must be designed
- to direct access to materials that support curricular concerns. Thus,
- the interface to the network embodies the notion of a library
- collection. In a school network policy, the "intent of the
- collection" should be clearly reflected in a statement of purpose for
- the network.
-
- Directly addressing the information access needs of children, the ALA
- opposes attempts to limit access based on the age of a library user.
- "Librarians and governing bodies should maintain that parents--and
- only parents--have the right and the responsibility to restrict the
- access of their children--and only their children--to library
- resources," it states.
-
- While we in the CoVis Project have some ability technologically to
- restrict what is in our Internet "collection," it is virtually
- impossible to prevent students from accessing materials whose
- presence we never anticipated while preserving the students' status
- as full members of the Internet community. In this way, the Internet
- is fundamentally different from a relatively static library
- collection. Following the lead of the ALA, however, we believe that
- the precise limits placed upon students' access cannot be formalized
- by the school policy. Instead, it is the students' responsibility to
- adhere to the standards set by their parents.
-
- * American Society for Information Science (ASIS). The code of ethics
- of ASIS provides another informative analogy, this one speaking to
- issues of professionals' responsibilities to both individuals and
- society. Where individuals are concerned, information professionals-
- -a designation we believe should be applied to teachers--must strive
- both to "protect each information user's and provider's right to
- privacy and confidentiality" and "respect an information provider's
- proprietary rights." With respect to society, information
- professionals should "serve the legitimate information needs of a
- large and complex society while at the same time being mindful of
- [the] individual's rights." They also should "resist efforts to
- censor publications."
-
-
-
-
- Manning & Perkins [Page 9]
-
- RFC 1746 Ways to Define User Expectations December 1994
-
-
- The ASIS code speaks directly to issues of electronic mail privacy.
- We believe that students and teachers must feel certain that their
- communications are private. In many electronic mail systems currently
- used in schools, the teacher must act as an intermediary between the
- school and the outside world. When students are "full" members of the
- Internet, mail is sent directly to the outside world with no human
- mediation. As a rule, such communications should be private, and the
- network policy must make explicit any reasons for teachers or
- researchers to have access to message content. Users must be made
- aware of times and circumstances under which private mail may be
- monitored.
-
- * Prodigy. Privacy in electronic mail communications seems like a
- straightforward issue--it is analogous to the U.S. mail. But what
- about network bulletin boards or Internet newsgroups? Posting a
- message in one of these public information exchanges may raise
- questions of freedom of expression among students and other network
- users, but no more than in any other public forum.
-
- One approach to dealing with this issue was described in the Wall
- Street Journal's technology supplement of November 15, 1993. Prodigy,
- a dial-up bulletin-board service jointly owned by IBM and Sears, has
- a strict editorial policy for both its public forums and its members'
- private email exchanges. Prodigy employs editors who screen every
- message before it is posted, sometimes delaying posting by up to 40
- hours. It also uses special software to screen messages for what it
- deems objectionable language. The result is a lowest-common-
- denominator approach to what is acceptable or unacceptable material.
-
- This approach undervalues the maturity of Prodigy's users. In the
- CoVis classroom, we want to strive to develop students' maturity, and
- in order to learn these lessons, they must feel that their message
- content is under their own control. To let students know what level
- of behavior is expected of them, we are very clear about the use of
- offensive, obscene, or inflammatory language on the network. These
- guidelines are not unfamiliar to the students in CoVis, as their
- local school codes of conduct include the same admonitions. Offensive
- messages posted by students are not ejected from the network.
- However, students can lose their privileges on the network if they
- post such messages (a significant disincentive for CoVis students),
- and they are encouraged to post a retraction or apology once they
- understand why their message was problematic. These interventions are
- only initiated upon the complaint of another user, not as part of an
- explicit editorial policy.
-
- * School Conduct Codes. Every school has a code of conduct for its
- students that details appropriate school behavior, outlines rights,
- and sets expectations for students. Because the CoVis Network is used
-
-
-
- Manning & Perkins [Page 10]
-
- RFC 1746 Ways to Define User Expectations December 1994
-
-
- as part of a school activity, the school's code of conduct applies to
- network activities. Thus, we believe the network use policy should be
- an extension of the school's policies. An important part of the
- development of the CoVis Network use policy was a close reading of
- the participating high schools' codes of conduct. For example, at one
- of our high schools, special rules against vandalism of computer
- equipment and unauthorized access to information exist. These rules
- cover such important concepts as computer piracy, hacking, and other
- tampering with hardware or software. Both CoVis schools have codes
- warning students that use of harassing or abusive language is
- unacceptable, as is obscenity. At the same time, both high schools
- place a high value on students' right to freedom of expression and
- outline the dimensions of that right in some detail.
-
- * Field Trips. All of the rules that apply to student conduct in
- school also apply when the students are off campus on field trips.
- The Internet offers many opportunities for virtual field trips to
- distant locations, and CoVis adds a new twist to this genre with the
- addition of full audio and video connections to remote locations.
- Students in the CoVis community will be able to "visit" the
- Exploratorium in San Francisco, directing a remote camera around the
- exhibit floor and engaging in conversations with guides and other
- museum visitors. It is important that students realize they act as
- ambassadors for their school in such encounters, and our policy
- states this explicitly. Currently, parental permission slips are
- required before students may take field trips. At one of our
- participating high schools, such slips are required even for "trips"
- within the school building. Is there a precedent for extending the
- concept of permission slips to the virtual field trip? We do not
- believe so, but we do recognize the importance of written information
- alerting parents to interesting or innovative school activities.
-
- Beyond the Barriers
-
- Barriers to internetworking in schools are being lowered every day,
- and soon electronic bulletin boards may be as familiar to the
- American classroom as blackboards. Educators are encouraged by
- continuing developments that make the Internet accessible to schools.
- This is accomplished in part through commercial networks such as
- America Online and Delphi and by the decreasing costs of modems and
- communications software. With the cooperation of nearby universities,
- dial-up Internet connections can now be obtained for an investment of
- under $100 per existing computer.
-
- Schools will find tremendous new opportunities for enhancing,
- extending, and rethinking the learning process with the advent of
- internetworking. But will they be ready to face the challenges? To
- date, schools have had little experience with advanced
-
-
-
- Manning & Perkins [Page 11]
-
- RFC 1746 Ways to Define User Expectations December 1994
-
-
- telecommunications technologies. Many classrooms still lack even such
- basic tools as telephones. Given the general lack of communication
- even between classrooms in the same school, it will not be easy for
- schools to join in the fast-paced discourse of the Internet. The
- CoVis Project has taken a proactive stance toward the issues that
- internetworking raises for schools with the development of a
- network-use policy based upon the best lessons available. We invite
- feedback on our policy and offer it as a contribution to this
- exciting and rapidly developing area of educational technology.
-
- Barry J. Fishman is a Ph.D. student in the Learning Sciences program
- of the Northwestern University School of Education and Social Policy.
- Roy D. Pea is Dean of the School and John Evans Professor of the
- Learning Sciences at Northwestern. They acknowledge the assistance of
- Laura D'Amico, Larry Friedman, Paul Reese, and Dick Ruopp in the
- preparation of this article. Their research is supported in part by
- National Science Foundation Grant MDR-9253462.
-
- Margin Notes: Electronic versions of the original texts of American
- Library Association, American Society for Information Science, and
- Houston Chronicle documents can be found at FTP (file transfer
- protocol) address ftp.eff.org, in the pub/academic/library/directory.
-
- The Communications Policy Forum meeting is reported on by Andrew Blau
- in the EFFector 5(4), also available from ftp.eff.org in the
- /pub/EFF/newsletters directory. Statistics about the Internet are
- available from ftp.nisc.sri.com, in the /pub/zone directory. Both of
- these FTP sites can also be reached via gopher.
-
- For further reading:
-
- Roy Pea, "Distributed Multimedia Learning Environments: The
- Collaborative Visualization Project," Communications of the ACM (May
- 1993).
-
- Denis Newman, Susan Bernstein, and Paul A. Reese, "Local
- Infrastructures for School Networking: Current Models and Prospects,"
- Bolt Beranek and Newman Tech Report No. 7726 (1992).
-
- Richard Ruopp, Shahaf Gal, Brian Drayton, and Meghan Pfister, LabNet:
- Toward a Community of Practice (Hillsdale, NJ: Erlbaum, 1993).
-
-
-
-
-
-
-
-
-
-
- Manning & Perkins [Page 12]
-
- RFC 1746 Ways to Define User Expectations December 1994
-
-
- APPENDIX: THE COVIS NETWORK USE POLICY
-
- A. Mission Statement
-
- The Learning Through Collaborative Visualization Project (CoVis) was
- established to explore project-enhanced science learning supported by
- advanced computing applications in a secondary school environment.
- As such, the computer network environment supported by the project
- (the CoVis Network) is designed to enhance the learning and teaching
- activities of the participating science classrooms at New Trier and
- Evanston Township High Schools. The term "network" in this document
- refers to a number of computers and other electronic tools that are
- connected to each other for the purpose of communication and data
- sharing. CoVis is a National Science Foundation (NSF) funded
- research project, and use of the network is therefore provided to
- allow the study of its impact on learning and teaching.
-
- 1. Purpose of the Internet
-
- The Internet (a global network made up of many smaller
- contributing networks) and its services are intended to support
- open research and education in and among US research and
- instructional institutions, plus research arms of for-profit firms
- when engaged in open scholarly communication and research. Use
- for other purposes, e.g., for-profit activity or extensive
- personal business, is not acceptable.
-
- 2. Purpose of the CoVis Network
-
- The purpose of the CoVis Network is to facilitate communications
- and collaboration between members of the CoVis community. Network
- use is primarily intended for the support of project work
- conducted for participating CoVis classes, and far less
- significantly for other purposes that students and teachers
- determine to be of educational value. The CoVis Network has
- limited resources, and CoVis classrooms have limited time
- available for network- supported teaching and learning activities.
- Any use of the network which adversely affects its operation in
- pursuit of teaching and learning or jeopardizes its use or
- performance for other community members is prohibited, and may
- result in the loss of network privileges.
-
- B. Services Available on the CoVis Network
-
- The CoVis Network consists of a variety of computing equipment,
- software, and network connections. This section describes the
- primary tools and services approved for use in the CoVis Network.
- Other tools may be used, but may not be supported by the system
-
-
-
- Manning & Perkins [Page 13]
-
- RFC 1746 Ways to Define User Expectations December 1994
-
-
- administrators:
-
- 1. Cruiser Videoconferencing. Cruiser is a tool designed to
- allow video and audio connections between two people, each of whom
- must have a Cruiser station and access to the CoVis network.
- Cruiser conversations are private;
-
- 2. Timbuktu Screen-Sharing. Timbuktu is a commercial software
- product that allows a Macintosh user to view or control another
- Macintosh computer remotely (with the remote user's permission).
- This is designed to allow two or more people to work together over
- the CoVis Network. Timbuktu sessions are private;
-
- 3. Collaborative Notebook. The Notebook is a personal or group
- workspace designed to support project work in CoVis classrooms.
- Work done using the notebook may be either private or public, as
- designated by the user. Users should be careful to note whether
- they are working in a private or a public portion of the notebook.
-
- 4. General-Use Internet Tools. These include, but are not
- limited to, the following:
-
- a) Electronic Mail, or email. Email is just like regular mail,
- except instead of paper, you use the computer. Email
- correspondence is considered private. The CoVis Project uses a
- program called "Eudora" for sending and receiving mail.
-
- b) Listservs. A listserv is a means to broadcast an email
- message to many users for the purpose of maintaining a
- discussion list. Although listserv messages are transmitted
- via email, correspondence is public, so extra care should be
- used when participating. The program called "Eudora" would be
- used for participating in a listserv.
-
- c) Network News. Netnews is a communications tool for large
- group discussion. Netnews is essentially similar to a
- listserv, except that it does not use email as the means of
- communication. Instead, you use software called a "news
- reader" to read and post messages to the appropriate groups.
- Newsgroups are very public, and should be used thoughtfully.
- The CoVis project employs a program called "NewsWatcher" for
- reading and posting news.
-
- d) File Transfer Protocol, or FTP. File Transfer Protocol is a
- means of moving files between computers on the Internet. The
- CoVis project employs a program called "Fetch" for doing this.
-
-
-
-
-
- Manning & Perkins [Page 14]
-
- RFC 1746 Ways to Define User Expectations December 1994
-
-
- e) Telnet. Telnet allows you to connect to other computers on
- the Internet, provided you know the machine's Internet address
- and appropriate password. All provisions of this document
- apply to members of the CoVis community while using remote
- computers via Telnet. The CoVis Project uses a program called
- "NCSA Telnet" for telnetting operations.
-
- f) Gopher. Gopher is a means of navigating the Internet via a
- menu-driven or point-and-click interface to the computer.
- Gopher is a very convenient way to retrieve files and
- information from sources all around the globe. For most
- purposes, it may be considered an easier form of FTP and can be
- used to initiate Telnet sessions. The CoVis Project uses a
- program called "TurboGopher" for gopher searching.
-
- C. Who is a member of the CoVis community?
-
- All account holders on the CoVis Network will be granted access to
- all services the network offers. The following people may hold
- accounts on the CoVis Network:
-
- 1. Students. Students who are currently enrolled in a CoVis
- class will automatically be granted a network account upon
- agreement to the terms stated in this policy;
-
- 2. Teachers. Teachers of CoVis classes may hold accounts on the
- CoVis Network. Other teachers may apply for accounts;
-
- 3. Scientists. Scientists who wish to collaborate on student
- projects will be granted CoVis Network accounts. The exact nature
- of the account (i.e., which services are available) will depend on
- individual circumstances;
-
- 4. Researchers. The researchers conducting the CoVis project
- will hold accounts on the CoVis network;
-
- 5. Others. Anyone may request a special account on the CoVis
- network. These requests will be granted on a case-by-case basis,
- depending on need and resource availability.
-
- Note: Except in special cases listed above, people from the larger
- Internet community are not part of the local CoVis community, and
- will probably be unaware of the existence of this policy.
- However, you should always treat people you "meet" on the network
- with respect, as if they were a part of your community.
-
-
-
-
-
-
- Manning & Perkins [Page 15]
-
- RFC 1746 Ways to Define User Expectations December 1994
-
-
- D. Privileges and Rights of CoVis Network Community Members
-
- Members of the CoVis community have certain network privileges and
- rights. These include:
-
- 1. Privacy. All members of the CoVis community have the right to
- privacy in their email, Cruiser, Timbuktu, and notebook
- communications when so designated by the user. However, if a user
- is believed to be in violation of the guidelines stated in this
- policy, a system administrator or teacher may need to gain access
- to private correspondence or files. An attempt will be made to
- notify the user of such inspections whenever possible. As CoVis
- is primarily a research project, researchers may periodically make
- requests to study or view correspondence and files, but
- confidentiality is ensured in such circumstances. Also, it is
- important that users recognize the fundamental differences between
- public (e.g., news) and private (e.g., email) forms of
- communication, and shape their content accordingly;
-
- 2. Equal Access. All members of the CoVis community will be
- granted free and equal access to as many network services as their
- technology allows. Exploration of the Internet is encouraged
- relative to the purposes of the CoVis Network;
-
- 3. Safety. To the greatest extent possible, members of the CoVis
- community will be protected from harassment or unwanted or
- unsolicited contact. Any community member who receives
- threatening or unwelcome communications should bring them to the
- attention of a system administrator or teacher. Users must,
- however, be aware that there are many services available on the
- Internet that could potentially be offensive to certain groups of
- users. The designers of the CoVis Network cannot eliminate access
- to all such services, nor could they even begin to identify them.
- Thus individual users must take responsibility for their own
- actions in navigating the network;
-
- 4. Intellectual Freedom. The CoVis Network must be a free and
- open forum for expression, including viewpoints that are strange,
- unorthodox, or unpopular. The network administrators will place
- no official sanctions upon the expression of personal opinion on
- the network. However, the poster of an opinion should be aware
- that other community members may be openly critical of such
- opinions. Occasionally, a message that you post may be met from
- outside the CoVis community with especially harsh criticism (a
- practice known as "flaming"). It is best not to respond to such
- attacks, unless you believe you are capable of a measured,
- rational reply. Personal attacks are not an acceptable use of the
- CoVis Network at any time. The CoVis Project does not officially
-
-
-
- Manning & Perkins [Page 16]
-
- RFC 1746 Ways to Define User Expectations December 1994
-
-
- endorse any opinions stated on the network. Any statement of
- personal belief is implicitly understood to be representative of
- the author's individual point of view, and not that of the CoVis
- Network, its administrators, or the participating high schools.
-
- E. Responsibilities of CoVis Network Community Members
-
- With the rights and privileges of membership in the CoVis Network
- community come certain responsibilities. Users need to familiarize
- themselves with these responsibilities. Failure to follow them may
- result in the loss of network privileges. These responsibilities
- include:
-
- 1. Using appropriate language. Profanity or obscenity will not
- be tolerated on the CoVis Network. All community members should
- use language appropriate for school situations as indicated by
- school codes of conduct;
-
- 2. Avoiding offensive or inflammatory speech. Community members
- must respect the rights of others both in the local community and
- in the Internet at large. Personal attacks are an unacceptable
- use of the network. If you are the victim of a "flame," take time
- to respond rationally, and bring the incident to the attention of
- a teacher or system administrator;
-
- 3. Adhering to the rules of copyright. CoVis community members
- must respect all copyright issues regarding software, information,
- and attributions of authorship. The unauthorized copying or
- transfer of copyrighted materials may result in the loss of
- network privileges;
-
- 4. Re-posting personal communications without the original
- author's prior consent is prohibited. To do this is a violation
- of the author's privacy. However, all messages posted in a public
- forum such as newsgroups or listservs may be copied in subsequent
- communications, so long as proper attribution is given;
-
- 5. Use of the network for any illegal activities is prohibited.
- Illegal activities include tampering with computer hardware or
- software, unauthorized entry into computers, or knowledgeable
- vandalism or destruction of computer files. Such activity is
- considered a crime under state and federal law;
-
- 6. Avoid the knowing or inadvertent spread of computer viruses.
- "Computer viruses" are programs that have been developed as
- pranks, and can destroy valuable programs and data. To reduce the
- risk of spreading a computer virus, do not import files from
- unknown or disreputable sources. If you do obtain software or
-
-
-
- Manning & Perkins [Page 17]
-
- RFC 1746 Ways to Define User Expectations December 1994
-
-
- files from remote sources, follow proper procedures to check for
- viruses before use. Deliberate attempts to degrade or disrupt
- system performance of the CoVis Network or any other computer
- system or network on the Internet by spreading computer viruses is
- considered criminal activity under state and federal law;
-
- 7. You have full responsibility for the use of your account. All
- violations of this policy that can be traced to an individual
- account name will be treated as the sole responsibility of the
- owner of that account. Under no conditions should you give your
- password to another user;
-
- 8. Impersonation is not permitted. Real names must be used,
- pseudonyms are not allowed;
-
- 9. Anonymity is not allowed on the CoVis Network. As an
- educational network, we believe that individuals must take
- responsibility for their actions and words;
-
- 10. Exemplary behavior is expected on 'virtual' field trips. When
- 'visiting' locations on the Internet or using the Cruiser or
- Timbuktu communication tools, CoVis community members must conduct
- themselves as representatives of both their respective schools and
- the CoVis community as a whole. Conduct that is in conflict with
- the responsibilities outlined in this document will be subject to
- loss of network privileges.
-
- Note:
-
- This article is reprinted with the express permission of TECHNOS:
- Quarterly for Education and Technology.
-
- It originally appeared as: Fishman, B., and Pea, R.D. (1994). The
- internetworked school: A policy for the future. Technos: Quarterly of
- Education and Technology 3 (1), 22-26.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Manning & Perkins [Page 18]
-
-