The purpose of this site, geared toward K-12 educators, is to provide an annotated list of resources about computer crime and technology misuse and their effects in the realm of elementary and secondary education.
Navigation for this site:
Introductory Sites | General Computer Crime Resources | Acceptable Use Policies (AUPs) | Child Pornography on the Internet | Computer Virus-Related Sites | Copyright | Fraud | General Security | Hacking | Movies and Books of Fiction Dealing With Computer Crimes | Online Harassment | Pedophiles | Sites of Particular Interest to Policy Makers | Software Piracy |
| Introductory Sites | |
| Computer Crime Introduction | Part of a MS Power Point® presentation entitled "Understanding Information Systems." Slides 16-21 define computer crime, present statistics, categorize types of crimes, and introduce various computer crime terms. This is an excellent, brief introduction to computer crime. |
| TOP | |
| General Computer Crime Resources | |
| Computer Crime Books and Periodicals | Regularly updated descriptions, reviews, and information regarding new books, handbooks, and manuals. Highly recommended! |
| Computer and Internet Security Resources | A resource made up of links to organizations, legal resources, professional services, classes, publications, books, and mailing lists. Highly recommended! |
| ISS Library Mail Lists | Probably the best way to get up to speed regarding selected topics, this is a large list of listservs specializing in areas such as general security, firewalls, viruses, etc. Highly recommended! |
| Parker, Donn D. (1998). Fighting Computer Crime: A New Framework for Protecting Information. Wiley. | Gives a general definition of "cybercrime" and breaks these crimes into categories. Computer Crime Dictionary: a set of terms from Parker's work that are a must for educators dabbling in this field. |
| Journal of Information, Law and Technology | British electronic journal including a number of editorials and refereed articles likely to be of interest to educators. Highly recommended! |
| TOP | |
| Acceptable Use Policies (AUPs) | |
| K-12 Internet
Acceptable Use Policies by Nancy Willard http://www.erehwon.com/k12aup/index.html
|
This site provides
a legal and educational analysis of K12 Acceptable Use Policies. It also
includes a number of templates for each aspect in the development and
implementation of AUPs, including: Student Acceptable Use Policy Template Student Account Agreement Template Employee Account Agreement Template Guest Account Agreement Template Letter to Parents Template |
| Armadillo's Web Server | |
| TOP | |
| Child Pornography on the Internet | |
| Abuse/Incest
Report
http://incestabuse.miningco.com/library/weekly/aa102097.htm?pid=2791&cob=home |
This report on child pornography by Nancy Burnett is broken in three parts: understanding the problem, empowering the parents, and reporting child pornography on the Internet. Very useful information and multiple links to assist parents in combating the dangers child pornography on the Internet. |
| Fighting Child
Pornography on the Internet
http://childhouse.uio.no/workshops/Open/Fighting_Child_Porno/index.html |
This site solicits opinions on how child pornography can be combated on the Internet. The stress is avoidance of over-censorship of the Internet while advocating respect for children. |
| National Coalition for the Protection of Children and Families | This site claims as its mission to protect "children and families from the harms of pornography." Links include research on the effects of pornography, tips for families trying to combat the pitfalls of the Internet, reference to laws which protect pornographers, news segments on efforts to combat pornography, and ways families can make a difference. |
| The Police Notebook: Kid Safety on the Internet | The University of Oklahoma Department of Public Safety maintains this site to educate parents and children of the dangers of the Internet. This site delves into many different computer abuse/misuse issues, including child pornography. |
| Sites which encourage reporting of child pornography on the Internet: | |
| National Center for Missing and Exploited Children Cyber Tipline | |
| PedoWatch | |
| The Child Protection Society | |
| TOP | |
| Computer Virus-Related Sites | |
| The Regulation of Virus Research and the Prosecution for Unlawful Research | An outstanding, well-designed page introducing viruses and their impacts. Includes an excellent, though brief, bibliography. |
| AntiVirus Research Center | Produced by Symantec, the premiere producer of anti-viral software, this site is clearly one of the most informative and best presented on the WWW. Suitable for novices through expert computer users, individual sections include: 1) General Virus Information, 2) Viruses: The Threat is Real, 3) Types of Viruses, and 4) Macintosh Viruses. |
| Online Data Recovery, Antivirus Procedures and Methods Manual | An outstanding resource for intermediate/advanced users and network administrators. Includes: 1) A Primer On Computer Viruses, 2) Techniques Used by Computer Viruses, 3) Optimizing Your Anti-Virus Strategy, 4) Hard Disk Recovery, and 5) A Primer to Generic Antiviral Methods. |
| Computer Viruses | Don't be misled by the generic name, this is an excellent list of links which relate to many different aspect of computer viruses including: software types, bulletins, virus list-servs and hoaxes. |
| Virus Information | Again, the name of the site doesn't do it justice in terms of the wealth of information available. This site , oriented toward advanced users and network administrators, provides valuable resources in its four sections: 1) Virus Databases, 2) Virus Links and Utilities, 3) Virus Research and 4) Writing on Security Issues. |
| Anti-Virus Resources on the Web | Fairly generic in terms of its presentation of many websites, the main value of this page is clearly its links to electronic conferences, commonly used anti-viral resources (freeware, shareware and commercial) and anti-viral software comparisons. |
| TOP | |
| Copyright | |
| The Copyright Website | A copyright web site which provides information regarding copyright issues in a very readable, often entertaining manner; links include: Famous Copyright Infringements, Basic Fundamentals, Internet and Software, Fair Use and Public Domain, What's News and a copyright discussion group. |
| 10 Big Myths About Copyright Explained | A quick read, and very well written. |
|
ILTweb C R E D O Section III. The Educator's Copyright Survival Guide |
A good resource for those who have already examined The Copyright Website and 10 Big Myths About Copyright Explained who would like to continue pursuing the topic. |
| Discussion site addressing copyright concerns | This site allows users to post and reply to messages regarding copyright issues. |
| Copyright in the Digital Age | Article written by Karen Coyle discussing various issues of copyright and modern technology. |
| Copyright Implementation Manual (CIM) | Its purpose is to
provide teachers, librarians, and students with clear instructions on the
permissible uses of copyrighted materials. This is an excellent resource
for educators that includes specific information about what is permitted
in multimedia productions. This site contains a permission form to
facilitate requests to use copyrighted material. |
| Copyrights and Responsibilities | This site contains a guide to developing school district copyright and Acceptable Use Policies. It is written by Donna Brown, Betty Goyette, and Al Hopkins. This is a helpful resource to use when constructing AUPs for students. Includes proper citation format for a variety of online material. This site also addresses many policy and ethical considerations such as privacy, intellectual property, access, and filters. |
| Copyright Myths,
from "10 Big Myths About Copyright" by Brad Templeton
|
Unsure if something violatescopyright on the Internet? This is an excellent resource that addresses 10 common myths about this issue. |
| http://www.ilt.columbia.edu/projects/copyright/papers/samuelson.html | This article
includes various descriptions of copyright lawsuits and their outcomes. It
also describes how copyright differs from plagarism. |
| TOP | |
| Fraud | |
| The National Fraud Information Center | Introduces a number of different types of fraud including links to telemarketing fraud, internet fraud, and fraud against the elderly. |
| Internet Fraud: How to Avoid Internet Investment Scams | Produced by the US Securities and Exchange Commission, this site is an excellent introduction to the myriad of ways in which the Internet is being used as a tool for fraudulent purposes. |
| Internet Fraud Watch http://www.fraud.org/internet/intset.htm | A good site that exists to help consumers distinguish between legitimate and fraudulent promotions in cyberspace and route reports of suspected fraud to the appropriate law enforcement agencies. You will find a link to an online incident report form. It also provies a link that includes some useful basic Internet tips. |
| http://moneycentral.msn.com/articles/smartbuy/specials/deceit.asp#TOP | This site hosts a multitude of articles about known fraudlant sites. |
| Flim Flam dot Com | This site exposes fraud, confidence games, scams, rip-offs, swindles, rackets, shell games, deceptions and flimflam. |
| TOP | |
| General Security | |
|
The World Wide Web Security FAQ |
Probably the best general introduction to security I've encountered on the WWW (D. Stone), it introduces web security concerns from the most basic level to network administration concerns; if you're going to examine only one site regarding WWW security, this is the site to visit. |
| Comprehensive
Technology Security Safeguarding Your Technology: Practical Guidelines for Electronic Education Information Security |
An extensive, detailed guide to education institution security. This downloadable document deals with risks, needs assessment, security policy development, and protection of physical, information software, user access, and network information securities. Highly recommended for teachers, technology coordinators, network administrators, and technology committee members. |
| Security Level
Products Symantec http://www.symantec.com/ FoolProof Software http://www.smartstuff.com/ PowerOn Software http://www.poweronsw.com/ ASD http://www.asdsoft.com/asdsoft Alladin Systems http://www.alladinsys.com/ Magna http://www.magna1.com/ Apple Software http://anat.apple.com/ |
|
| Firewall and Router
Security
http://www.anatomy.su.oz.au/danny/book-reviews/h/Firewalls_and_Internet_Security.html |
Review of Firewalls and Internet Security |
| TOP | |
| Hacking | |
| Active Matrix's Hideaway | Written by a "true hacker", one who seeks knowledge rather than robbery and destruction, this alternative site gives an alternative view of hacking as an art and science. |
| Concerning Hackers Who Break into Computer Systems http://www-swiss.ai.mit.edu/6095/articles/denning_defense_hackers.txt | Interesting discussion of hackers, hacker ethics and how hacking relates to issues and practices of an information society. |
| Technology and Pleasure: Considering Hacking Constructive http://firstmonday.org/issues/issue4_2/gisle/ | Fascinating VERY ALTERNATIVE discussion of history of the hacker community and hacker ideology. If you're going to read a single document which deals with the hacker mindset, this should be it!!!! |
| The New Hacker's Dictionary http://www.logophilia.com/jargon/jargon_toc.html | A resource which introduces the reader to everything from hacker slang, jargon, hacker folklore, writing style and speech style to general appearance, dress, education and personality characteristics. If you are going to examine a single resource regarding hacking, this should be it! |
|
Hacking Documents |
This is the source many use for initial ventures into hacking. It consists of 1) The Guide to Mostly Harmless Hacking, 2) Beginner's Documents, and 3) Other Various Documents. There is also a link called Hacking Archives. Quite user friendly, it becomes clear how kids could easily be lured into this site and its activities. |
|
Defcon 7 |
Voted one of the top hackers sites by PC Magazine (is it any wonder our kids have little difficulty finding these sites?), this site consists of hundreds of links which walk individuals step-by-step through the myriad of different hackers activities. |
|
AstaLaVista H/C Search Engine |
Here's something new - a search engine designed for hackers. Includes links to all types of software, serial numbers, sniffers, etc. |
| TOP | |
| Movies and Books of Fiction Dealing With Computer Crimes (much summary information gained from http://us.imdb.com/) | |
| The Net | 1995, Winkler Films, Columbia Pictures Corporation, Rated PG-13. A woman tries to gain back her identity after it has been criminally deleted over the Internet. |
| War
Games
http://www-public.rz.uni-duesseldorf.de/~ritterd/wargames/logon.htm |
A 1980's movie about a high school hacker who accidently starts World War III after accidently breaking into a US military computer. The movie presents themes of artificial intelligence and the social implications related to poor technology planning and implementation. |
| Sneakers | 1992, Universal Pictures. Martin Bishop is the head of a group of experts who specialize in testing security systems. When he is blackmailed by Government agents into stealing a top secret black box, the team find themselves embroiled in a game of danger and intrigue. After they recover the box, they discover that it has the capability to decode all existing encryption systems around the world, and that the agents who hired them didn't work for the Government after all... Summary written by http://us.imdb.com/M/search_plot_writers?Graeme+Roy+%7Bgsr%40cbmamiga.demon.co.uk%7D |
| Hackers | 1995, United Artists, Rated PG-13. A young boy is arrested by the Secret Service for hacking into a government computer, and banned from using a computer until his 18th birthday. Years later, he and his new-found friends discover a plot to unleash a dangerous computer virus, but must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus. Summary written by http://us.imdb.com/M/search_plot_writers?Alexander+Lum+%7Baj_lum%40postoffice.utas.edu.au%7D |
| Jurassic Park | 1993, Universal Studios, Amblin Entertainment. Probably the ultimate in poor computer information security. Food and drink on the computer; one programmer who creates the software and operates the computer; no one else has knowledge of the system; no uninterruptable secondary power system. |
| Independence Day | 1996, Centropolis Film Productions, Twentieth Century Fox, Rated PG-13. The world is saved by Jeff Goldblum as he hacks a virus onto the computer system of hostile alien forces attacking the earth. |
| Every Mother's Worst Fear | 1998, Universal Home Video, Inc., Rated PG-13. Faced with her parents' recent divorce, her mother working long hours and her high school boyfriend dumping her, 16-year-old Martha looks for solace in the world of Internet chat rooms. Innocent chatting turns deadly as Martha attracts the attention of a pedophile and cyber-kidnapping ring. Martha's mother Connie suspects foul play and begins a frantic search for her daughter, enlisting the help of the police, the FBI and an expert hacker. Summary written by http://us.imdb.com/M/search_plot_writers?PetrinaC+%7Bcubit%40aol.com%7D} |
| Vonnegut, Kurt. (1997). Player Piano. Laureleaf. | "Vonnegut's first novel spins the chilling tale of engineer Paul Proteus, who must find a way to live in a world dominated by a super computer and run completely by machines. His rebellion is a wildly funny, darkly satirical look at modern society." (Synopsis courtesy of http://www.amazon.com/) |
| TOP | |
| Online Harassment | |
| Stalked | An excellent
introduction to stalking and its potential ramifications. Sections of this
document link to pages dealing with types of stalkers and the way they
operate, suggestions on how to remain safe, and how to try to stop the
stalking and true accounts of stalking. |
| The Stalking Victim's Sanctuary | This site includes the same categories of information presented at the previous site, as well as links to regaining control of your life and support groups. |
| HateWatch | Civic watchdog organization that tracks hate groups. It includes links to hate group home pages and provides links written by scholars. Currently the page is being restructured, though it has a WebBoard discussion which is still functional. |
| Newsgroup and Email Spamming | Concise introduction to spamming and its impact. |
| Spamming -
Policies, Regulation, Scams and Issues
|
Links to numerous sites pertaining to spamming definition and policy, constructed by one of our classmates. |
| TOP | |
| Pedophiles | |
| SmartParent.Com | Outstanding resource for parents wanting to become more aware and prevent their kids from encountering some of the dangers present in cyberspace; highly recommended! |
| SafeKids.Com | Links include: Kids' Rules for Online Safety, What Are the Risks?, Guidelines for Parents and Privacy Issues; highly recommended! |
| SafeTeens.Com | Developed specifically for teens, links include: Staying Safe Online, Protecting Your Privacy, Computers and the Internet, Links for Teens, Articles About Teen and Child Safety Online and Know The Rules (A public awareness campaign about general safety for teenage girls); highly recommended! |
| The Parent's Guide to the Information Superhighway: Rules and Tools for Families Online | General information regarding kids and the Internet; includes a link to child safety on the Internet. |
| PedoWatch | Parents will be particularly interested in the Parenting link, which provides "information parents should know when considering how much access to the Internet to allow their children. Includes advice for schools with computers;" recommended. |
| Cyberangels.org | This site boasts being the "Largest Online Internet Safety Program." A Parent's Guide to the Internet, Anatomy of a Pedophile, and Sophia's Safe Surfing Club are a few of the link options of this site. An all-around excellent site for concerned parents and teachers. |
| GOCIAP: Guarding Our Children's Innocence Against Pedophiles | This site was created by an individual who was molested when younger. It gives good descriptions of the traps used by pedophiles to lure children in and keep them quiet about what is happening. It contains some questionable language, but is very upfront as far as what parents need to know to keep their children safe. |
| CS Pedophilia | This site is a personal piece of writing about pedophilia. It goes into the different types of pedophiles that seem to exist. The author discusses allowing himself to be in a pedophile situation when he was a young boy. |
| NAMBLA: North American Man Boy Love Association | This statement, created by Roy Radow, supports the belief that government should not be involved in deciding at what age children should be allowed to explore their sexuality. Taking up many arguments that teenagers might feel strongly about, the group feels that people should be able to experiment with sex at any age with any gender as long as their is consent between participants. |
| The Pedophilia
Survey
http://www.lrz-muenchen.de/~gravilabs/pedophilia/survey.html |
This site offers a survey for pedophiles to take. It also offers the results of the survey. They purpose lies in getting to know more about general pedophile characteristics. |
| TOP | |
| Sites of Particular Interest to Policy Makers | |
| Computer Crime Materials | Particularly interesting for those involved in school policy, whether it be at the school, district, state, or national level. Consists of links to: Law Journal Article References, Australian and Overseas Cases, Australian and Overseas Legislation, Australian and Overseas Explanatory Memoranda, and Australian and Overseas Reports. |
| Computer Crime Directory | Oriented toward professional police officers, the Computer Crime Resource Sites and Computer Laws links may be quite useful for those involved in school policy. |
| Safeguarding Your Technology: Practical Guidelines for Electronic Education Information Security | An extensive, detailed guide to education institution security. This downloadable document deals with risks, needs assessment, security policy development, and protection of physical, information software, user access, and network information securities. Highly recommended for teachers, technology coordinators, network administrators, and technology committee members. |
| TOP | |
| Software Piracy | |
| Software Piracy - What It Is & What It Does | Concise introduction of types of piracy and its effects. Quick, excellent overview. |
| Software Piracy | Well-written, concise presentation of issues surrounding software piracy. |
| Lecture 4: Software Piracy | Good introduction to the history of software piracy; presents a number of landmark software piracy legal issues. |
| Combating Software Piracy | Probably one of the best software piracy documents on the web; introduces types of intellectual property infringement, cost and scope of piracy; additionally, this document presents and analyzes trends in protection against piracy; highly recommended. |
| Software Piracy: Is It Happening In Your School? | Software Publishers Association document aimed specifically at educators; this document should clear up many of the occasional gray areas we encounter on a regular basis. |
| Software Piracy
Facts
http://europe.rainbow.com/sentinel/sentinelKeys/piracy_facts.html |
1996-97 statistics from a number of sources. |
| Overview: Global Software Piracy Report: Facts and Figures, 1994 - 1996 | Software Publishers Association discussion of software piracy throughout the world. |
| 1996 BSA/SPA Piracy Study Results | Breakdown by country of changes in software piracy over a three-year period. |
| Is it OK for Schools to Copy Software? | Software Publishers Association document aimed specifically at educators. This document should clear up many of the occasional gray areas we encounter on a regular basis. |
| 1997 Global Piracy Report | One of the most up to date and detailed accounts of global piracy. Very well written and organized 10 page downloadable pdf document. |
| Newspaper or magazine articles related to piracy (titles state specific content): | |
| Korea's Software Piracy Reached 70 Percent in 1996 | |
| The Problem of Software Piracy in Hong Kong and China | M.S. thesis written by Kenneth Ho (London School of Economics and Political Science), fascinating reading. |
| Software Piracy Still Rife in Pakistan | |
| Thailand - Warning On Software Piracy | |
| Forty-three Percent of Canadians Condone Software Piracy Decima Survey Reveals http://www.newswire.ca/releases/March1998/12/c2701.html | |
| The Islamic Ruling on Software Piracy | Software piracy is forbidden regardless of whether it is done with books or software, but if the two conditions are met (need and lack of funds) then, according to these scholars, it becomes permissible. |
| Software Publishers Association Anti-Piracy Page | An excellent introduction to the software piracy and its societal impact; one section deals specifically with software use and piracy in schools. |
| Congressional Hearings to Target Software Piracy | Outlines and presents statistics regarding the impact of software piracy on the US economy, as well as congressional responses. |
| TOP |
____________________________________________________________________________________________
Back to Educator's Guide to Computer Crime and Technology Misuse
____________________________________________________________________________________________
Last updated 05/03/99