The Potential Abuse 4

Running head: THE POTENTIAL ABUSE OF TECHNOLOGY IN SCHOOLS

The Potential Abuse of Technology in Schools

Nellie Deutsch

CMP 530

Susan Quinn

September 25, 2004

The Potential Abuse 4

The Potential Abuse 4

The Potential Abuse of Technology in Schools

Information is available at the click of a finger as users access the Internet. However, going online can be both a blessing and a curse. Students encounter unexpected threats and technological abuse. It is no wonder that many educators have expressed reluctance to integrate technology at school. However, problems breed solutions. For every dangerous attack encountered, a counter attack develops to eliminate it. Filtering programs, security measures, virus protection and online safety rules can educate users on how to protect themselves.

Young learners have found online activities such as cyber crimes very "enticing and useful in their preteen and teen years... This is the time when young people are sure they know it all, and teachers and parents know nothing…They believe they could never be the victims" (Marsh, n.d). Youngsters do not consider the consequences of their actions as they take risks as they impersonate and illegally use "others' accounts to send nasty or threatening messages" (Marsh, n.d). In addition, they meet cyber acquaintances against their parents' permission and endanger their lives. Not only are they risking their own lives but they are also "breaking into systems … [for the] challenge … curiosity and … rebellion against [authority]" (Marsh, n.d) and causing harm to others. It seems that committing crimes is just another challenge they wish to experience regardless of the consequences.

According to CyberCitizen and Purdue University, the US Department of Justice categorizes cyber crime in three ways (2004):

  1. The computer as a target (using a computer to attack other computers; spreading viruses is an example)
  2. The computer as a weapon (using a computer to commit real world crimes such as fraud or illegal gambling)
  3. The computer as an accessory (using a computer to store illegal files or stolen information)

Literature reveals that a growing number of youngsters are turning to cyber crime as a way of life. The following are examples of teens caught in the web:

  1. On June 7, 2002, two high school hackers attacked the school computer system to access the school grades (Farrell, 2002). They turned their infiltration into a real world crime when they sold the change in grade to fellow students.
  2. CNN.com reports a story about an investigation at the University of Georgia, where "hackers gained access to Social Security and credit card numbers of 31,000 University students and applicants" (2004). This is clearly an example of "using the computer as a weapon" (CP, 2004).
  3. Chicago Tribune reporter, Chelsea J. Carter, revealed a story about "a typical teenager, Cole Bartiromo [who] like a growing number of his peers-teens [uses] the Internet to pull off everything from securities fraud to identity theft" (2002). For most teens, such crimes are just "a game" (2002).
  4. On June 21, 2002, "U.S. Secret Service notified Arizona State University officials that some of their computers may have been compromised" (Lemos). Apparently, students placed "spyware [on computers] to capture passwords and credit card numbers" (2002).
  5. On July 2003, "Clint W. Triou, a 17-year-old junior at Marion High School…must have gotten bored in his networking class. Authorities say he used a keystroke logger to capture his fellow students' passwords. With unfettered network access, he allegedly deleted scores of student project folders" (Walsh)
  6. CNN reporter, Jeordan Legon claims that "it was a breeze for 15-year-old Reid Ellison to hack into his high school's computer grading system … The teen had "a perfect 4.0 grade point average … so to leave his mark, he decided to lower his grades to 1.9 GPA – a meager D+" (2002).

These cases clearly indicate that cybercrime is a serious problem in educational settings and other areas. The Internet has opened the door to teenage hacking, virus writing, downloading illegal music and videos, and plagiarism. Although such cyber crimes are, "on the rise; personal computers are rarely the target of hackers" (Trigaux, 1998). Schools and other institutions are targets that need protection. The more secure the system is, the more challenging the hacking becomes. It needs to stop. Penalties may not be deterring enough for teens. "Senator Robert Torricelli claims that he wants to put hackers who disrupt school computers in prison" (McCullagh, 2001). These "are harsh words" (McCullagh, 2001) since "some of these kids do not realize that they are committing crimes until it is too late. Even more distressing it the fact that some in the media portray the computer criminal as a modern day Robin Hood" (CP, 2004).

The only solution is education. Teachers should develop curriculum that "goes much deeper, addressing teenagers not only as potential victims but also perpetrators of Internet chaos" (Gutierrez, 2004). The U.S. Justice Department, funded by Congress, took the initiate in implementing a program called I-SAFE America "to teach young people about urgent issues in cyber crime … to help protect the country's computer networks against virus writers, identity thieves and malicious hackers" (Gutierrez, 2004).

It is also important to increase youngsters' awareness of cyber ethics. Teens need to understand that hiding behind a computer online does not give them the right to do as they please. Schools should teach and encourage them to abide by ethical codes of behavior. Fear of getting caught, is not the only issue. Learning to respect others is one important issue that needs addressing (Norheim, 2003). Educators should appeal to youngsters' sense of responsibility to others' feelings. There is an online website "Cybercitizen Awareness Program [that] educates children and young adults on the danger and consequences of cyber crime" (CP, 2004). It aims to "establish a broad sense of responsibility and community in an effort to develop smart, ethical and socially conscious online behavior in young people" (CP, 2004). It is up to the schools to make sure its students become just as "knowledgeable" about using computer technology as a "tool" as they are on how "to make appropriate decisions" Sacha Hope (as cited by Gutierrez, 2004).

School websites provide their users with access to the Internet because educators believe it is a valuable tool for learning. However, students should not only learn how to use technology but they should also learn how not to use it. Every school curriculum should have programs on cyber ethics and Acceptable Use Policies to guide its learners, their parents, teachers and the community on appropriate online behavior.

References

Carter, C. J. (2002, February 18). High-tech teens turn to life of cybercrime. Chicago Tribune. Retrieved September 24, 2004, from http://www.chicagotribune.com/technology/local/profiles/chi-020218crime,0,491289,print.story

CNN.com. (2004, January 30). Hackers breach university server. Retrieved September 24, 2004, from http://www.cnn.com/2004/EDUCATION/01/30/computer.breach.ap

Cybercitizen Partnership. (2004). What is cybercrime? Retrieved September 23, 2004, from http://www.cybercitizenship.org/crime/crime.html

Farrell, N. (2002, June 7). High school hackers make the grade. VNU Business Publications. Retrieved September 24, 2004, from http://www.vnunet.com/print1132421

Legon, J. (2002, December 18). Student gets 'A' for hacking school computer. CNN.com. Retrieved September 24, 2004, from http://cnn.technology.printthis.clickability.com/pt/cpt/action=cpt&title=CNN.c...

Norheim, G. (2003, November 7). Educator pushes cyber-law curriculum for schools. Fairfax Journal. Retrieved September 24, 2004, from http://www.socratesinstitute.org/about/print11_7_03.html

Lemos, R. (2002, June 21). School hackers may face secret service. ZDNet News.

Retrieved September 24, 2004, from http://news.zdnet.com/2100-1009-938235.html

McCullagh, D. (2001, August 1). Senator targets school hackers. Wired News. Retrieved September 24, from http://www.wired.com/new/print/0,1294,45752,00.html

Purdue University. (n.d). Cyber crimes and your children. Retrieved September 23, 2004, from http://www.cerias.purdue.edu/education/k-12/cerias_resources/files/infosec_newsletters/doc/08cybercrime.doc

Trigaux, R. (1998, June 14). St. Petersburg Times, The underbelly of cyberspace. Retrieved September 24, 2004, from http://www.sptimes.com/Hackers/underbelly_of_cyberspace.html

United States Department of Justice. (2002, May 31). You can get into real trouble for hacking. Retrieved September 24, 2004, from http://www.cybercrime.gov/rules/reckless.htm

Walsh, L. M. (2003, July). Cyberspace needs McGruff: Children need lessons on the consequences of hacking. Information Security. Retrieved September 24, from http://infosecuritymag.techtarget.com/2003/jui/otls.shtml