04.11.2014 Views

in this chapter - Southern Nazarene University

in this chapter - Southern Nazarene University

in this chapter - Southern Nazarene University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

46 ACADEMIC POLICIES<br />

Academic Honesty and Intellectual Theft<br />

Orig<strong>in</strong>ality, derivation, and the acknowledgement of sources and collaboration are essential to<br />

scholarship and the progress of knowledge. Respect for the work and personal expression of others is<br />

especially critical <strong>in</strong> computer environments. Plagiarism and copyright violations <strong>in</strong>fr<strong>in</strong>ge on authorial<br />

<strong>in</strong>tegrity and are grounds for sanctions.<br />

Students are expected to avoid all forms of academic dishonesty <strong>in</strong>clud<strong>in</strong>g plagiarism, misrepresentation<br />

of authorship, and <strong>in</strong>appropriate collaboration on assignments. The Office of Academic Affairs will<br />

be notified of occurrences of academic dishonesty. Examples of academic dishonesty <strong>in</strong>clude such cases<br />

as the follow<strong>in</strong>g:<br />

Turn<strong>in</strong>g <strong>in</strong> or submitt<strong>in</strong>g electronically someone else's work as one’s own with or without the other<br />

person’s knowledge or permission.<br />

An <strong>in</strong>dividual allow<strong>in</strong>g another <strong>in</strong>dividual to turn <strong>in</strong> or submit electronically work and represented as<br />

their own.<br />

Complet<strong>in</strong>g an assignment as a group and submitt<strong>in</strong>g multiple copies electronically, represent<strong>in</strong>g the<br />

work either implicitly or explicitly completed <strong>in</strong>dividually.<br />

Us<strong>in</strong>g any part of someone else's work without proper acknowledgement.<br />

Steal<strong>in</strong>g a solution from an <strong>in</strong>structor.<br />

Submitt<strong>in</strong>g work products that are substantially similar on an assignment that calls for <strong>in</strong>dependent<br />

work (e.g. academic dishonesty <strong>in</strong> a computer assignment will be suspected if an assignment that<br />

calls for <strong>in</strong>dependent work results <strong>in</strong> two or more solutions so similar that one can be converted to<br />

another by a mechanical transformation).<br />

Examples of academically honest practices <strong>in</strong>clude cases such as the follow<strong>in</strong>g:<br />

Turn<strong>in</strong>g <strong>in</strong> or submitt<strong>in</strong>g electronically work done alone or with the help of the course's staff.<br />

Receiv<strong>in</strong>g or giv<strong>in</strong>g help to solve m<strong>in</strong>or syntax errors.<br />

Discuss<strong>in</strong>g assignment specifications to clarify understand<strong>in</strong>g of the assignment.<br />

Privacy<br />

Students, faculty, and staff who use the computer have the right to privacy and security of their<br />

computer programs and data. At the same time, SNU ownership of the computer system network<br />

implies a limited expectation of privacy. SNU reserves the right to view and/or retrieve any file or<br />

software stored on the computer or pass<strong>in</strong>g through the network.<br />

Computer users should not tamper with files or <strong>in</strong>formation that belongs to other users or to the<br />

operat<strong>in</strong>g system.<br />

Read<strong>in</strong>g someone else's electronic mail without permission is a federal offense (Title 18 of the United<br />

States Code Section 2701). Computer system adm<strong>in</strong>istrators are excluded for technical reasons. They<br />

are, however, prohibited from disclos<strong>in</strong>g a user’s e-mail traffic to anyone unless the user or the other<br />

party to the traffic gives permission.<br />

Security<br />

Owners and users of computer networks operate <strong>in</strong> an <strong>in</strong>terdependent environment that necessitates<br />

jo<strong>in</strong>t ownership of <strong>in</strong>stitutional <strong>in</strong>formation. Reliability and accessibility of <strong>in</strong>formation is critical to the<br />

successful operations of SNU.<br />

Access<strong>in</strong>g a computer system without authorization is a federal offense (Title 18 of the United States<br />

Code Section 2701).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!