1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
|
Network Working Group B. Manning
Request for Comments: 1746 ISI
Category: Informational D. Perkins
Houston ISD
December 1994
Ways to Define User Expectations
Status of this Memo
This memo provides information for the Internet community. This memo
does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.
Abstract
This paper covers basic fundamentals that must be understood when one
defines, interprets, or implements methods to control user
expectations on or over the Internet.
1. Background
User agreements are a form of acceptable use policy (AUP) are an
implicit part of internetworking since they place parameters on user
expectation. They define the desired and expected behaviour of those
who participate. Everyone has one, whether published or not. This
applies to networks that provide transit paths for other networks as
well as end sites and the individual users that use systems. A
better understanding of an AUP, and how to formulate one seems to be
increasingly important as the global net encompases new environments
as varied as K12 schools and real-time systems. AUP's are used to
determine pricing, customer base, type and quality of service
metrics, and a host of other provider services.
2. Components of an Agreement
In defining your particular agreement there are three areas that must
be addressed. They are where you get service from, who your peers
are, and whom you provide service to. A good understanding of these
concepts will make or break the policies you formulate.
2.1 Where you get service from
Each entity gets its service from one or more other providers,
either a level three service, such as IP transit, or a level two
service, such as circuits. The provider of such services usually has
an policy in the form of an agreement or contract specifying terms
Manning & Perkins [Page 1]
^L
RFC 1746 Ways to Define User Expectations December 1994
and conditions of use. This forms the basis for the type of service
offerings that you as an entity can provide. If you get service from
several providers, all of them need to be considered in the
formation of policy.
2.2 Who your peers are
Are your policies consistent with those offered by your peers? In
many cases, the formation of policy will define who your peers are.
It is important to clearly identify which areas you intend to reach
and the community you wish to be a contributing, productive part of.
Once this is clear, formulate polices along those lines.
2.3 Who you provide service to
It is required that you inform those who use your services just what
your policies are. Without this information, it will be almost
impossible for them to distinguish what to expect from your service
offering. Without a clear policy it is possible that litigation may
ensue. It is important to reflect community standards in the creation
of policy.
3. Some Issues to consider
IP provided services can be complex. They comprise both information
and communication. In the formulation of policy it is critical that
the policy provide for security and access to information and
communication while ensuring that the resource use does not
overburden the system's capabilities. These conflicting demands must
be analyzed and a synthesis arrived at. This hints a fourth
component of an AUP, that it has a method to extract compliance.
This is so site specific that further analysis will not be attempted
here.
Some items that should be considered in the formation of policy are:
- privacy - morals & ethics
- freedom of expression - legal constraints
- safety - harassment
- plagiarism - resource utilization
- indemnification - targeted areas of interest
- expected behaviours - remedies and recourse
This should not be considered as an exhaustive list but as pointers
for those types of things to be considered when policy is formed.
Manning & Perkins [Page 2]
^L
RFC 1746 Ways to Define User Expectations December 1994
4. Security Considerations
Security and Liability issues are not discussed in this memo.
5. Summary
User Agreements are here to stay. As the Interconnected mesh of
networks grows, the choices presented to end-users mandate that
provider/user expectations are clearly presented. Use of these
guidelines will help create a clearer, better defined environment for
everyone.
Authors' Addresses
Bill Manning
USC/Information Sciences Institute
4676 Admiralty Way
Marina del Rey, CA 90292
Phone: 822-1511
EMail: bmanning@isi.edu
Don Perkins
Instructional Media Services
Houston Independent School District
3830 Richmond
Houston, TX 77027
EMail: dperkins@tenet.edu
Manning & Perkins [Page 3]
^L
RFC 1746 Ways to Define User Expectations December 1994
Example
For further reference on some acceptable use policies, see the
following materials archived in Armadillo--The Texas Studies Gopher:
Name=Acceptable and Unacceptable Use of Net Resources (K12)
Type=1
Host=chico.rice.edu
Port=1170
Path=1/More/Acceptable
or:
http://chico.rice.edu/armadillo
If these resources are not available to you, you may want to review
the attached policy and justification that is in use by an NSF
sponsored project on K12 networking. It provides a view on the
thinking process and actual Agreement that was worked out for this
project.
The Internetworked School: A Policy for the Future*
Barry J. Fishman and Roy D. Pea School of Education and Social Policy
Northwestern University
Note:
The CoVis Network Use Policy itself appears as an appendix to this
article.
Introduction
The next five years will radically change the ways that schools
relate to the world around them as global computer networks--long the
exclusive domain of higher education and private industry--link up to
primary and secondary schools. The Internet, a network made up of
many smaller contributing networks, represents a powerful educational
resource unlike anything that precedes it. Its potential for
education grows with the establishment of each new connection.
For the first time, schoolchildren have the means for simple, direct
contact with millions of adults in a forum that masks their physical
youth and presents them as virtual equals. However, just as the new
kid in school has to learn new social codes and rituals to fit in,
schools must learn some of the practices and etiquette of the
Internet. Of course, the established denizens of the Internet will
soon have some adjusting to do as well, with thousands (or millions)
Manning & Perkins [Page 4]
^L
RFC 1746 Ways to Define User Expectations December 1994
of new kids knocking electronically at their doors. Since the
Internet was not designed with children in mind, many potentially
difficult issues must be discussed by both the education and the
Internet communities.
This article presents a framework for thinking about some of the
issues that are essential to making the initial encounter between
schools and the Internet successful. It also presents an excerpt of a
policy that embodies our approach to resolving those issues.
Expanding Access, Expanding Horizons
For roughly the past decade, schools increasingly have participated
in specialized computer networks such as the NGS/TERC Kidsnetwork,
the Intercultural Learning Network, and FidoNet, as well as for-
profit services such as CompuServe, America Online, and Prodigy. The
majority of these projects were conducted on networks, where
teachers' or students' messages could not be read by anyone beyond a
predetermined audience composed of other students and teachers. These
projects made it possible for students and teachers to communicate
with their peers in faraway places and pioneered some pedagogical
uses of networks for computer-mediated communication and
collaborative project work that will carry over to the Internet.
Internetworking, however, goes beyond proprietary systems by joining
a vast number of distinct networks into one large network, the
Internet. As individual schools and bulletin boards are connected to
the Internet, the number of people and services within easy reach
increases exponentially. By one estimate, there are currently 19
million users of the Internet, with an annual growth rate approaching
80 percent. Furthermore, some of the Internet's most powerful
communication tools are specifically designed so that any of these
millions of people could join any conversation. The network's true
power comes from the synergy of many dispersed minds working together
to solve problems and discuss issues, and there is little in the way
of hierarchy or control of the discourse.
The schools' shift to internetworking systems involves critical
technological, as well as pedagogical, issues. It requires a change
in the school computing paradigm from centralized computing to
distributed client-server systems, thus bringing about an
administrative change in the nature of school computing. Many schools
that currently have some kind of network access provide accounts only
to teachers or administrators. Internetworking is fundamentally
different--giving accounts, access, and therefore control directly to
students.
Manning & Perkins [Page 5]
^L
RFC 1746 Ways to Define User Expectations December 1994
There are numerous arguments for the pedagogical benefits of school
internetworking. But what of the risks? What safety, liability, and,
above all, educational concerns must be addressed before schools are
ready to tap into the Internet? This policy is not intended as a
document that sets limitations or restrictions. Rather, it is
designed to facilitate and set guidelines for exploring and using the
Internet as a tool for learning. The policy was written with the
purpose and goals of the Internet as a background: support for open
research and education in and among research and instructional
institutions. The context for the policy was provided by the specific
needs of a growing community of learners composed of students,
teachers, scientists, and researchers. The networked environment must
support collaboration and cooperation. Proper frameworks to support
network navigation and information searching must be established. And
because networks will continue to be a scarce educational resource
for the foreseeable future, the policy also provides guidelines for
maximizing the educational cost-benefit ratio for teachers and
students.
Testbed for Change--The CoVis Project
Our framework for considering internetworking issues is a project
currently being conducted at the School of Education and Social
Policy at Northwestern University. The Learning Through Collaborative
Visualization Project, CoVis, is designed to reconceptualize and
reconfigure high school science education. CoVis is a networking
testbed funded by the National Science Foundation (NSF). Its goal is
to enable project-based approaches to science by using low- and
medium-bandwidth networks to put students in direct contact with
practicing scientists and scientific tools. In CoVis, we are working
with the types of network connections we believe will be common in
schools in the near future.
In the first phase of our project we are working with two Chicago-
area schools, Evanston Township High School in Evanston and New Trier
High School in Winnetka. CoVis is deployed in 12 classes at the two
high schools, involving three teachers at each school. Approximately
300 students are involved in the project: 100 freshmen, 100
sophomores and juniors, and 100 seniors, all enrolled in either earth
science or environmental science classes. Each classroom contains six
Macintosh Quadra computers with audio/video conferencing units linked
to an internal ethernet, which is linked to Northwestern's ethernet
by a primary-rate Integrated Services Digital Network bridge for
telecommunications using the public-switched network. Additional
computers are available for Internet use in computer labs at each
school.
Manning & Perkins [Page 6]
^L
RFC 1746 Ways to Define User Expectations December 1994
The CoVis Network Community consists of students and teachers in
CoVis classes, scientists who wish to collaborate on CoVis student
projects, the researchers conducting the CoVis project, and other
interested parties who are granted special accounts. In the CoVis
classroom, each student is given an account that makes him or her a
"full" member of the Internet community. This means two things: Each
student has access to all Internet services with minimal mediation by
teachers or other adults, and anybody with an Internet account can
contact the students directly, again without mediation.
In addition to the standard Internet resources, which include
electronic mail, listservs, Usenet news discussion groups, Telnet,
gopher, and file transfer, CoVis makes it possible for students to
communicate with peers and scientists via video and audio conference
tools and remote screen-sharing technology for synchronous
collaborative work. Therefore, the CoVis Network Use Policy goes
beyond the needs of the typical low-bandwidth internetworked school.
As an NSF testbed, CoVis has the job of developing new frameworks for
the use of internetworking. In seeking to understand problematic
issues of networking, we turn both to other projects--Bolt Beranek
and Newman's work with the Ralph Bunche computer-minischool in New
York; AT&T's Learning Circles; and TERC's LabNet project--and to
analogous situations extant in schools. Our attention thus is placed
on the development of a policy to establish ground rules for the
students who will be introduced to the Internet.
The Need for a Proactive Policy
Exciting or revolutionary educational programs too often are
derailed. In the 1970s, Jerome Bruner's curriculum Man: A Course of
Study (MACOS) was at the center of a political and ideological
firestorm that prevented its implementation in many schools. The
experience of the MACOS developers taught us that it makes sense to
spend time in the initial stages of a project trying to determine
what challenges might arise to an educational innovation in order to
avoid, preempt, or co-opt them.
In March 1993, the Communications Policy Forum, a nonpartisan group
of telecommunications stakeholders convened by the Electronic
Frontier Foundation, met on the issues of Internet services for the
K-12 educational community. The forum concluded that services should
be provided only to schools that would indemnify the service
providers. It also recommended that a warning statement be developed
to advise schools of the presence of materials on the Internet that
may be deemed inappropriate for minors.
Manning & Perkins [Page 7]
^L
RFC 1746 Ways to Define User Expectations December 1994
We believe that it is not enough to devise a policy designed to
protect schools and service providers, although our policy also
speaks to those roles. In this policy designed to guide students
through some of the social complexity presented by the Internet, we
created guidelines to alert novice users of established expectations
and practices. Because the Internet is somewhat anarchic in its daily
commerce, it is necessary to define a safe local space, or identity,
for a school network where students can feel like members of a
supportive community. The goal of establishing the boundaries of our
own community forms the framework of our policy.
Issues and Analogies
The kinds of issues posed by internetworking are not new. Similar
issues have been debated by schools many times before, from creation
science to dress codes. These concerns resurface in the availability
of networked material that some parents, teachers, or students might
find objectionable, pornographic, or otherwise inappropriate.
Although the actual percentage of materials in this category is
small, their mere presence draws plenty of media attention. Consider
this lead-in to a story about graphic material that can be retrieved
through the Internet, published in the Houston Chronicle in 1990:
"Westbury High School student Jeff Noxon's homework was rudely
interrupted recently when he stumbled across the world's most
sophisticated pornography ring....It was supported by taxes and
brought into town by the brightest lights of higher education."
While some are shocked, an alternative interpretation might point out
that in using a valuable resource provided by the local university, a
high school student chose to view material that many (including
regular Internet users) find objectionable. Educators must understand
that, as a byproduct of introducing internetworking, schools likely
will have to justify student use of network resources to a public
that does not understand the medium or its utility to education. By
seeking out analogous situations and applying them to the development
of our network use policy, we believe it is possible to establish
frameworks for responding to these challenges. We found several
significant analogies.
* American Library Association (ALA). In considering information
access issues, the most striking and informative analogy is to a
remarkable set of documents built around the ALA's Library Bill of
Rights of 1980. It is not farfetched to consider the Internet, at
least in part, as a vast digital library. After all, the electronic
database and information search tools it employs are rapidly becoming
part of new school media centers, and many public and school
libraries are beginning to offer some type of network access to their
Manning & Perkins [Page 8]
^L
RFC 1746 Ways to Define User Expectations December 1994
patrons.
The ALA documents state, "Attempts to restrict access to library
materials violate the basic tenets of the Library Bill of Rights."
However, they add, what goes into the library collection should be
chosen thoughtfully and with an eye toward instructional goals.
School librarians are bound to devise collections that "are
consistent with the philosophy, goals, and objectives of the school
district," and they must "resist efforts by individuals to define
what is appropriate for all students or teachers to read, view, or
hear." Similarly, tools used to access the network must be designed
to direct access to materials that support curricular concerns. Thus,
the interface to the network embodies the notion of a library
collection. In a school network policy, the "intent of the
collection" should be clearly reflected in a statement of purpose for
the network.
Directly addressing the information access needs of children, the ALA
opposes attempts to limit access based on the age of a library user.
"Librarians and governing bodies should maintain that parents--and
only parents--have the right and the responsibility to restrict the
access of their children--and only their children--to library
resources," it states.
While we in the CoVis Project have some ability technologically to
restrict what is in our Internet "collection," it is virtually
impossible to prevent students from accessing materials whose
presence we never anticipated while preserving the students' status
as full members of the Internet community. In this way, the Internet
is fundamentally different from a relatively static library
collection. Following the lead of the ALA, however, we believe that
the precise limits placed upon students' access cannot be formalized
by the school policy. Instead, it is the students' responsibility to
adhere to the standards set by their parents.
* American Society for Information Science (ASIS). The code of ethics
of ASIS provides another informative analogy, this one speaking to
issues of professionals' responsibilities to both individuals and
society. Where individuals are concerned, information professionals-
-a designation we believe should be applied to teachers--must strive
both to "protect each information user's and provider's right to
privacy and confidentiality" and "respect an information provider's
proprietary rights." With respect to society, information
professionals should "serve the legitimate information needs of a
large and complex society while at the same time being mindful of
[the] individual's rights." They also should "resist efforts to
censor publications."
Manning & Perkins [Page 9]
^L
RFC 1746 Ways to Define User Expectations December 1994
The ASIS code speaks directly to issues of electronic mail privacy.
We believe that students and teachers must feel certain that their
communications are private. In many electronic mail systems currently
used in schools, the teacher must act as an intermediary between the
school and the outside world. When students are "full" members of the
Internet, mail is sent directly to the outside world with no human
mediation. As a rule, such communications should be private, and the
network policy must make explicit any reasons for teachers or
researchers to have access to message content. Users must be made
aware of times and circumstances under which private mail may be
monitored.
* Prodigy. Privacy in electronic mail communications seems like a
straightforward issue--it is analogous to the U.S. mail. But what
about network bulletin boards or Internet newsgroups? Posting a
message in one of these public information exchanges may raise
questions of freedom of expression among students and other network
users, but no more than in any other public forum.
One approach to dealing with this issue was described in the Wall
Street Journal's technology supplement of November 15, 1993. Prodigy,
a dial-up bulletin-board service jointly owned by IBM and Sears, has
a strict editorial policy for both its public forums and its members'
private email exchanges. Prodigy employs editors who screen every
message before it is posted, sometimes delaying posting by up to 40
hours. It also uses special software to screen messages for what it
deems objectionable language. The result is a lowest-common-
denominator approach to what is acceptable or unacceptable material.
This approach undervalues the maturity of Prodigy's users. In the
CoVis classroom, we want to strive to develop students' maturity, and
in order to learn these lessons, they must feel that their message
content is under their own control. To let students know what level
of behavior is expected of them, we are very clear about the use of
offensive, obscene, or inflammatory language on the network. These
guidelines are not unfamiliar to the students in CoVis, as their
local school codes of conduct include the same admonitions. Offensive
messages posted by students are not ejected from the network.
However, students can lose their privileges on the network if they
post such messages (a significant disincentive for CoVis students),
and they are encouraged to post a retraction or apology once they
understand why their message was problematic. These interventions are
only initiated upon the complaint of another user, not as part of an
explicit editorial policy.
* School Conduct Codes. Every school has a code of conduct for its
students that details appropriate school behavior, outlines rights,
and sets expectations for students. Because the CoVis Network is used
Manning & Perkins [Page 10]
^L
RFC 1746 Ways to Define User Expectations December 1994
as part of a school activity, the school's code of conduct applies to
network activities. Thus, we believe the network use policy should be
an extension of the school's policies. An important part of the
development of the CoVis Network use policy was a close reading of
the participating high schools' codes of conduct. For example, at one
of our high schools, special rules against vandalism of computer
equipment and unauthorized access to information exist. These rules
cover such important concepts as computer piracy, hacking, and other
tampering with hardware or software. Both CoVis schools have codes
warning students that use of harassing or abusive language is
unacceptable, as is obscenity. At the same time, both high schools
place a high value on students' right to freedom of expression and
outline the dimensions of that right in some detail.
* Field Trips. All of the rules that apply to student conduct in
school also apply when the students are off campus on field trips.
The Internet offers many opportunities for virtual field trips to
distant locations, and CoVis adds a new twist to this genre with the
addition of full audio and video connections to remote locations.
Students in the CoVis community will be able to "visit" the
Exploratorium in San Francisco, directing a remote camera around the
exhibit floor and engaging in conversations with guides and other
museum visitors. It is important that students realize they act as
ambassadors for their school in such encounters, and our policy
states this explicitly. Currently, parental permission slips are
required before students may take field trips. At one of our
participating high schools, such slips are required even for "trips"
within the school building. Is there a precedent for extending the
concept of permission slips to the virtual field trip? We do not
believe so, but we do recognize the importance of written information
alerting parents to interesting or innovative school activities.
Beyond the Barriers
Barriers to internetworking in schools are being lowered every day,
and soon electronic bulletin boards may be as familiar to the
American classroom as blackboards. Educators are encouraged by
continuing developments that make the Internet accessible to schools.
This is accomplished in part through commercial networks such as
America Online and Delphi and by the decreasing costs of modems and
communications software. With the cooperation of nearby universities,
dial-up Internet connections can now be obtained for an investment of
under $100 per existing computer.
Schools will find tremendous new opportunities for enhancing,
extending, and rethinking the learning process with the advent of
internetworking. But will they be ready to face the challenges? To
date, schools have had little experience with advanced
Manning & Perkins [Page 11]
^L
RFC 1746 Ways to Define User Expectations December 1994
telecommunications technologies. Many classrooms still lack even such
basic tools as telephones. Given the general lack of communication
even between classrooms in the same school, it will not be easy for
schools to join in the fast-paced discourse of the Internet. The
CoVis Project has taken a proactive stance toward the issues that
internetworking raises for schools with the development of a
network-use policy based upon the best lessons available. We invite
feedback on our policy and offer it as a contribution to this
exciting and rapidly developing area of educational technology.
Barry J. Fishman is a Ph.D. student in the Learning Sciences program
of the Northwestern University School of Education and Social Policy.
Roy D. Pea is Dean of the School and John Evans Professor of the
Learning Sciences at Northwestern. They acknowledge the assistance of
Laura D'Amico, Larry Friedman, Paul Reese, and Dick Ruopp in the
preparation of this article. Their research is supported in part by
National Science Foundation Grant MDR-9253462.
Margin Notes: Electronic versions of the original texts of American
Library Association, American Society for Information Science, and
Houston Chronicle documents can be found at FTP (file transfer
protocol) address ftp.eff.org, in the pub/academic/library/directory.
The Communications Policy Forum meeting is reported on by Andrew Blau
in the EFFector 5(4), also available from ftp.eff.org in the
/pub/EFF/newsletters directory. Statistics about the Internet are
available from ftp.nisc.sri.com, in the /pub/zone directory. Both of
these FTP sites can also be reached via gopher.
For further reading:
Roy Pea, "Distributed Multimedia Learning Environments: The
Collaborative Visualization Project," Communications of the ACM (May
1993).
Denis Newman, Susan Bernstein, and Paul A. Reese, "Local
Infrastructures for School Networking: Current Models and Prospects,"
Bolt Beranek and Newman Tech Report No. 7726 (1992).
Richard Ruopp, Shahaf Gal, Brian Drayton, and Meghan Pfister, LabNet:
Toward a Community of Practice (Hillsdale, NJ: Erlbaum, 1993).
Manning & Perkins [Page 12]
^L
RFC 1746 Ways to Define User Expectations December 1994
APPENDIX: THE COVIS NETWORK USE POLICY
A. Mission Statement
The Learning Through Collaborative Visualization Project (CoVis) was
established to explore project-enhanced science learning supported by
advanced computing applications in a secondary school environment.
As such, the computer network environment supported by the project
(the CoVis Network) is designed to enhance the learning and teaching
activities of the participating science classrooms at New Trier and
Evanston Township High Schools. The term "network" in this document
refers to a number of computers and other electronic tools that are
connected to each other for the purpose of communication and data
sharing. CoVis is a National Science Foundation (NSF) funded
research project, and use of the network is therefore provided to
allow the study of its impact on learning and teaching.
1. Purpose of the Internet
The Internet (a global network made up of many smaller
contributing networks) and its services are intended to support
open research and education in and among US research and
instructional institutions, plus research arms of for-profit firms
when engaged in open scholarly communication and research. Use
for other purposes, e.g., for-profit activity or extensive
personal business, is not acceptable.
2. Purpose of the CoVis Network
The purpose of the CoVis Network is to facilitate communications
and collaboration between members of the CoVis community. Network
use is primarily intended for the support of project work
conducted for participating CoVis classes, and far less
significantly for other purposes that students and teachers
determine to be of educational value. The CoVis Network has
limited resources, and CoVis classrooms have limited time
available for network- supported teaching and learning activities.
Any use of the network which adversely affects its operation in
pursuit of teaching and learning or jeopardizes its use or
performance for other community members is prohibited, and may
result in the loss of network privileges.
B. Services Available on the CoVis Network
The CoVis Network consists of a variety of computing equipment,
software, and network connections. This section describes the
primary tools and services approved for use in the CoVis Network.
Other tools may be used, but may not be supported by the system
Manning & Perkins [Page 13]
^L
RFC 1746 Ways to Define User Expectations December 1994
administrators:
1. Cruiser Videoconferencing. Cruiser is a tool designed to
allow video and audio connections between two people, each of whom
must have a Cruiser station and access to the CoVis network.
Cruiser conversations are private;
2. Timbuktu Screen-Sharing. Timbuktu is a commercial software
product that allows a Macintosh user to view or control another
Macintosh computer remotely (with the remote user's permission).
This is designed to allow two or more people to work together over
the CoVis Network. Timbuktu sessions are private;
3. Collaborative Notebook. The Notebook is a personal or group
workspace designed to support project work in CoVis classrooms.
Work done using the notebook may be either private or public, as
designated by the user. Users should be careful to note whether
they are working in a private or a public portion of the notebook.
4. General-Use Internet Tools. These include, but are not
limited to, the following:
a) Electronic Mail, or email. Email is just like regular mail,
except instead of paper, you use the computer. Email
correspondence is considered private. The CoVis Project uses a
program called "Eudora" for sending and receiving mail.
b) Listservs. A listserv is a means to broadcast an email
message to many users for the purpose of maintaining a
discussion list. Although listserv messages are transmitted
via email, correspondence is public, so extra care should be
used when participating. The program called "Eudora" would be
used for participating in a listserv.
c) Network News. Netnews is a communications tool for large
group discussion. Netnews is essentially similar to a
listserv, except that it does not use email as the means of
communication. Instead, you use software called a "news
reader" to read and post messages to the appropriate groups.
Newsgroups are very public, and should be used thoughtfully.
The CoVis project employs a program called "NewsWatcher" for
reading and posting news.
d) File Transfer Protocol, or FTP. File Transfer Protocol is a
means of moving files between computers on the Internet. The
CoVis project employs a program called "Fetch" for doing this.
Manning & Perkins [Page 14]
^L
RFC 1746 Ways to Define User Expectations December 1994
e) Telnet. Telnet allows you to connect to other computers on
the Internet, provided you know the machine's Internet address
and appropriate password. All provisions of this document
apply to members of the CoVis community while using remote
computers via Telnet. The CoVis Project uses a program called
"NCSA Telnet" for telnetting operations.
f) Gopher. Gopher is a means of navigating the Internet via a
menu-driven or point-and-click interface to the computer.
Gopher is a very convenient way to retrieve files and
information from sources all around the globe. For most
purposes, it may be considered an easier form of FTP and can be
used to initiate Telnet sessions. The CoVis Project uses a
program called "TurboGopher" for gopher searching.
C. Who is a member of the CoVis community?
All account holders on the CoVis Network will be granted access to
all services the network offers. The following people may hold
accounts on the CoVis Network:
1. Students. Students who are currently enrolled in a CoVis
class will automatically be granted a network account upon
agreement to the terms stated in this policy;
2. Teachers. Teachers of CoVis classes may hold accounts on the
CoVis Network. Other teachers may apply for accounts;
3. Scientists. Scientists who wish to collaborate on student
projects will be granted CoVis Network accounts. The exact nature
of the account (i.e., which services are available) will depend on
individual circumstances;
4. Researchers. The researchers conducting the CoVis project
will hold accounts on the CoVis network;
5. Others. Anyone may request a special account on the CoVis
network. These requests will be granted on a case-by-case basis,
depending on need and resource availability.
Note: Except in special cases listed above, people from the larger
Internet community are not part of the local CoVis community, and
will probably be unaware of the existence of this policy.
However, you should always treat people you "meet" on the network
with respect, as if they were a part of your community.
Manning & Perkins [Page 15]
^L
RFC 1746 Ways to Define User Expectations December 1994
D. Privileges and Rights of CoVis Network Community Members
Members of the CoVis community have certain network privileges and
rights. These include:
1. Privacy. All members of the CoVis community have the right to
privacy in their email, Cruiser, Timbuktu, and notebook
communications when so designated by the user. However, if a user
is believed to be in violation of the guidelines stated in this
policy, a system administrator or teacher may need to gain access
to private correspondence or files. An attempt will be made to
notify the user of such inspections whenever possible. As CoVis
is primarily a research project, researchers may periodically make
requests to study or view correspondence and files, but
confidentiality is ensured in such circumstances. Also, it is
important that users recognize the fundamental differences between
public (e.g., news) and private (e.g., email) forms of
communication, and shape their content accordingly;
2. Equal Access. All members of the CoVis community will be
granted free and equal access to as many network services as their
technology allows. Exploration of the Internet is encouraged
relative to the purposes of the CoVis Network;
3. Safety. To the greatest extent possible, members of the CoVis
community will be protected from harassment or unwanted or
unsolicited contact. Any community member who receives
threatening or unwelcome communications should bring them to the
attention of a system administrator or teacher. Users must,
however, be aware that there are many services available on the
Internet that could potentially be offensive to certain groups of
users. The designers of the CoVis Network cannot eliminate access
to all such services, nor could they even begin to identify them.
Thus individual users must take responsibility for their own
actions in navigating the network;
4. Intellectual Freedom. The CoVis Network must be a free and
open forum for expression, including viewpoints that are strange,
unorthodox, or unpopular. The network administrators will place
no official sanctions upon the expression of personal opinion on
the network. However, the poster of an opinion should be aware
that other community members may be openly critical of such
opinions. Occasionally, a message that you post may be met from
outside the CoVis community with especially harsh criticism (a
practice known as "flaming"). It is best not to respond to such
attacks, unless you believe you are capable of a measured,
rational reply. Personal attacks are not an acceptable use of the
CoVis Network at any time. The CoVis Project does not officially
Manning & Perkins [Page 16]
^L
RFC 1746 Ways to Define User Expectations December 1994
endorse any opinions stated on the network. Any statement of
personal belief is implicitly understood to be representative of
the author's individual point of view, and not that of the CoVis
Network, its administrators, or the participating high schools.
E. Responsibilities of CoVis Network Community Members
With the rights and privileges of membership in the CoVis Network
community come certain responsibilities. Users need to familiarize
themselves with these responsibilities. Failure to follow them may
result in the loss of network privileges. These responsibilities
include:
1. Using appropriate language. Profanity or obscenity will not
be tolerated on the CoVis Network. All community members should
use language appropriate for school situations as indicated by
school codes of conduct;
2. Avoiding offensive or inflammatory speech. Community members
must respect the rights of others both in the local community and
in the Internet at large. Personal attacks are an unacceptable
use of the network. If you are the victim of a "flame," take time
to respond rationally, and bring the incident to the attention of
a teacher or system administrator;
3. Adhering to the rules of copyright. CoVis community members
must respect all copyright issues regarding software, information,
and attributions of authorship. The unauthorized copying or
transfer of copyrighted materials may result in the loss of
network privileges;
4. Re-posting personal communications without the original
author's prior consent is prohibited. To do this is a violation
of the author's privacy. However, all messages posted in a public
forum such as newsgroups or listservs may be copied in subsequent
communications, so long as proper attribution is given;
5. Use of the network for any illegal activities is prohibited.
Illegal activities include tampering with computer hardware or
software, unauthorized entry into computers, or knowledgeable
vandalism or destruction of computer files. Such activity is
considered a crime under state and federal law;
6. Avoid the knowing or inadvertent spread of computer viruses.
"Computer viruses" are programs that have been developed as
pranks, and can destroy valuable programs and data. To reduce the
risk of spreading a computer virus, do not import files from
unknown or disreputable sources. If you do obtain software or
Manning & Perkins [Page 17]
^L
RFC 1746 Ways to Define User Expectations December 1994
files from remote sources, follow proper procedures to check for
viruses before use. Deliberate attempts to degrade or disrupt
system performance of the CoVis Network or any other computer
system or network on the Internet by spreading computer viruses is
considered criminal activity under state and federal law;
7. You have full responsibility for the use of your account. All
violations of this policy that can be traced to an individual
account name will be treated as the sole responsibility of the
owner of that account. Under no conditions should you give your
password to another user;
8. Impersonation is not permitted. Real names must be used,
pseudonyms are not allowed;
9. Anonymity is not allowed on the CoVis Network. As an
educational network, we believe that individuals must take
responsibility for their actions and words;
10. Exemplary behavior is expected on 'virtual' field trips. When
'visiting' locations on the Internet or using the Cruiser or
Timbuktu communication tools, CoVis community members must conduct
themselves as representatives of both their respective schools and
the CoVis community as a whole. Conduct that is in conflict with
the responsibilities outlined in this document will be subject to
loss of network privileges.
Note:
This article is reprinted with the express permission of TECHNOS:
Quarterly for Education and Technology.
It originally appeared as: Fishman, B., and Pea, R.D. (1994). The
internetworked school: A policy for the future. Technos: Quarterly of
Education and Technology 3 (1), 22-26.
Manning & Perkins [Page 18]
^L
|