in this chapter - Southern Nazarene University
in this chapter - Southern Nazarene University
in this chapter - Southern Nazarene University
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
46 ACADEMIC POLICIES<br />
Academic Honesty and Intellectual Theft<br />
Orig<strong>in</strong>ality, derivation, and the acknowledgement of sources and collaboration are essential to<br />
scholarship and the progress of knowledge. Respect for the work and personal expression of others is<br />
especially critical <strong>in</strong> computer environments. Plagiarism and copyright violations <strong>in</strong>fr<strong>in</strong>ge on authorial<br />
<strong>in</strong>tegrity and are grounds for sanctions.<br />
Students are expected to avoid all forms of academic dishonesty <strong>in</strong>clud<strong>in</strong>g plagiarism, misrepresentation<br />
of authorship, and <strong>in</strong>appropriate collaboration on assignments. The Office of Academic Affairs will<br />
be notified of occurrences of academic dishonesty. Examples of academic dishonesty <strong>in</strong>clude such cases<br />
as the follow<strong>in</strong>g:<br />
Turn<strong>in</strong>g <strong>in</strong> or submitt<strong>in</strong>g electronically someone else's work as one’s own with or without the other<br />
person’s knowledge or permission.<br />
An <strong>in</strong>dividual allow<strong>in</strong>g another <strong>in</strong>dividual to turn <strong>in</strong> or submit electronically work and represented as<br />
their own.<br />
Complet<strong>in</strong>g an assignment as a group and submitt<strong>in</strong>g multiple copies electronically, represent<strong>in</strong>g the<br />
work either implicitly or explicitly completed <strong>in</strong>dividually.<br />
Us<strong>in</strong>g any part of someone else's work without proper acknowledgement.<br />
Steal<strong>in</strong>g a solution from an <strong>in</strong>structor.<br />
Submitt<strong>in</strong>g work products that are substantially similar on an assignment that calls for <strong>in</strong>dependent<br />
work (e.g. academic dishonesty <strong>in</strong> a computer assignment will be suspected if an assignment that<br />
calls for <strong>in</strong>dependent work results <strong>in</strong> two or more solutions so similar that one can be converted to<br />
another by a mechanical transformation).<br />
Examples of academically honest practices <strong>in</strong>clude cases such as the follow<strong>in</strong>g:<br />
Turn<strong>in</strong>g <strong>in</strong> or submitt<strong>in</strong>g electronically work done alone or with the help of the course's staff.<br />
Receiv<strong>in</strong>g or giv<strong>in</strong>g help to solve m<strong>in</strong>or syntax errors.<br />
Discuss<strong>in</strong>g assignment specifications to clarify understand<strong>in</strong>g of the assignment.<br />
Privacy<br />
Students, faculty, and staff who use the computer have the right to privacy and security of their<br />
computer programs and data. At the same time, SNU ownership of the computer system network<br />
implies a limited expectation of privacy. SNU reserves the right to view and/or retrieve any file or<br />
software stored on the computer or pass<strong>in</strong>g through the network.<br />
Computer users should not tamper with files or <strong>in</strong>formation that belongs to other users or to the<br />
operat<strong>in</strong>g system.<br />
Read<strong>in</strong>g someone else's electronic mail without permission is a federal offense (Title 18 of the United<br />
States Code Section 2701). Computer system adm<strong>in</strong>istrators are excluded for technical reasons. They<br />
are, however, prohibited from disclos<strong>in</strong>g a user’s e-mail traffic to anyone unless the user or the other<br />
party to the traffic gives permission.<br />
Security<br />
Owners and users of computer networks operate <strong>in</strong> an <strong>in</strong>terdependent environment that necessitates<br />
jo<strong>in</strong>t ownership of <strong>in</strong>stitutional <strong>in</strong>formation. Reliability and accessibility of <strong>in</strong>formation is critical to the<br />
successful operations of SNU.<br />
Access<strong>in</strong>g a computer system without authorization is a federal offense (Title 18 of the United States<br />
Code Section 2701).