Chapter 1. Approaching the Internet

  1. Georges Dussart

Published Online: 29 APR 2002

DOI: 10.1002/0470846607.ch1

Biosciences on the Internet: A Student's Guide

Biosciences on the Internet: A Student's Guide

How to Cite

Dussart, G. (2002) Approaching the Internet, in Biosciences on the Internet: A Student's Guide, John Wiley & Sons, Ltd, Chichester, UK. doi: 10.1002/0470846607.ch1

Author Information

  1. Canterbury Christ Church, University College, UK

Publication History

  1. Published Online: 29 APR 2002
  2. Published Print: 28 FEB 2002

ISBN Information

Print ISBN: 9780471498421

Online ISBN: 9780470846605



  • motivation;
  • learner;
  • cheating;
  • honesty;
  • plagiarism;
  • integration;
  • organise;
  • rationalise;
  • scholarship;
  • integrity;
  • printing;
  • budget;
  • multitasking;
  • cyclical;
  • iterative;
  • storage;
  • overwriting;
  • common sense;
  • protection;
  • vigilant;
  • viruses;
  • hackers;
  • rubbish;
  • attachments;
  • heartstrings;
  • jokes;
  • self-defence


The objectives of a motivated learner are to increase the capacity of their intellect, to improve their understanding and to build on their skills. Not all students are motivated and some will attempt to cheat. Ultimately, whom are they cheating? Intellectual honesty implies that learners will be true to themselves. Unfortunately, the Internet offers tempting opportunities for poorly motivated students to cheat. Ultimately of course, they only cheat themselves. Such students should be aware that their tutors are expert readers who can easily recognise differences in style which point to plagiarism or other forms of dishonesty.

Multitasking allows the reader to use several programs in the same working session. This is particularly helpful when checking references for an assignment or thesis. Devices or programs may not always be compatible or may crash at inconvenient times. This is especially disruptive when moving data from computer to computer. Problems can be avoided by paying careful attention to file storage and manipulation; this chapter gives hints on how to do this and how to survive the problem of accidentally overwriting files.

Common sense and care should be exercised when using the Internet. Students must protect themselves, for example by not revealing their name and address in contexts that could lead to dangerous encounters. It is also important to be vigilant in protecting oneself from problems such as viruses, hackers and unreliable information.