This page contains a Flash digital edition of a book.
Users must not misuse or abuse any information resources. Information technology and resources must not be used to disrupt or interfere with other users, services or equipment. This includes, but is not limited to: threatening or harassing others, propagation of viruses or worms, posting or mailing obscene materials, distribution of unsolicited advertising, and random mailing of messages.


No equipment, supplies, software or manuals may be removed from computing sites without proper authorization.


Violations of Doane’s acceptable use policy are subject to action by the college and may be referred to the appropriate authorities. Violators may be billed for unethical or illegal use of information technology and may be dismissed, suspended, expelled, and/or legally prosecuted.


Doane’s in-depth policy on technology use is available upon request.


Student Rights and Responsibilities All members of the educational community share the responsibility for securing and respecting an environment that is conducive to the freedom to learn. The following are general statements of policy that have not been covered previously in this text.


Academic Integrity Policy In order for the Doane College community to provide, clarify, and preserve an atmosphere in which individuals can strive for academic excellence, the following policy has been adopted to deter acts of academic dishonesty. Academic dishonesty, the act of knowingly and willingly attempting or assisting


others to gain success by dishonest means, is manifested in various ways.


“Issues and Perspectives on Academic Dishonesty” (Gehring, et al., 1986) suggest four categories of academic dishonesty: cheating, fabrication, facilitating academic dishonesty, and plagiarism. Theses categories have been adopted and appropriately modified for use at Doane. Provided with each category is the respective Gehring definition and a list of isolated, but not inclusive, examples of infractions. It must be noted that the essential, qualifying characteristic that must be implied with each is that instructors must consider the alleged offense to be dishonest.


Cheating is defined as “Intentionally using or attempting to use unauthorized information or study aids in any academic exercise” (Gehring, et al, p. 6) Examples of this include when students:


 Intentionally use unauthorized sources to complete an objective. This may include looking at others’ papers during exams, using unauthorized, prewritten responses and electronically-scored information such as crib notes and computer discs, and/or stolen test materials.


 Submit others’ work as their research or data.


 Allow other students to complete exams in their place.


 Submit projects that have been or are currently being used to satisfy requirements from other courses without the explicit permission of both instructors.


21


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40