Moral and Ethical Issues
… "The deliberate act of copying writing, and claiming as one’s own the information, ideas or phrasing of another person without proper acknowledgment of their true source." (Source: JMU graduate student handbook). We will thoroughly discuss this policy when we embark on the projects. Documentation applies in both direct quotations and paraphrases. In certain cases, ideas should also be documented. Care should be exercised to insure that proper credit is given to the author. Infractions will be considered a serious offense when evaluating all projects. Dr. Forcht will provide documentation guidelines for references/citations.
Each student should refer to the Honor Code as outlined in the JMU General Catalog and JMU Graduate Student Handbook. The Honor Code applies to any examinations and ALL projects/presentation submitted for credit. It is not only the instructor’s obligation to report all infractions to the Honor Council, but yours as well. If other students are allowed to violate the Honor Code, it cheapens your education/degree. In certain cases, you will be completing projects that may involve working with others. It is quite acceptable to work with others, and I strongly encourage you to do so, but please bear in mind that the work you submit must be your own if the project is an individual one and not a designated group project.
The practice of "hacking" (breaking into someone’s computer system) is well documented. You will see many cases in your readings/discussions during this course. Please bear in mind, however, that "hacking" is a serious offense and is treated as such by organizations whose systems are violated. Under no circumstances is it warranted for a student, out of curiosity or malicious intent, to break into anyone’s computer system (including JMU’s). Please do not attempt to do so without prior consent/knowledge of the authorizing parties. As legal adults, your violations will be dealt with as in any other theft—to the fullest extent of the law. It is no longer considered "cute" and "creative" to break into someone’s computer system—it is considered a serious crime. Please cooperate on this!
Please refer to the University's Ethics Statement regarding ethical use of computers. These policies have been adopted by JMU and govern all students using computers in any course. It is your obligation to orient yourself with these rules.
The above is a minor modification of an original text written by Karen Forcht.