Educator's
Guide to Computer Crime and Technology Misuse
This white paper is designed to assist educators dealing with tough issues that accompany the infusion of technology in K-12 education. As educators who have a strong interest in incorporating computer and WWW technologies into our teaching, our goal is to provide a resource which deals specifically with key areas teachers should understand when using computer technology for recordkeeping and student instruction.
Our resource 1) introduces key areas of potential educator concern, 2) presents major positions/issues in each area of concern, 3) presents ways to deal with or minimize the potential impact of that particular key issue, and 4) culminates in a list of annotated web sites we believe to be excellent sources of further information.
Defining Computer Crime and Technology Misuse
Why Should Administrators be Concerned About Computer Crime and Technology Misuse?
Why Should Educators be Concerned About Computer Crime and Technology Misuse?
| Acceptable Use Policies (AUPs) | Computer Viruses, Trojan Horses, and Logic Bombs | Child Pornography on the Internet | Copyright | Fraud | General Security | Hacking | Online Harassment | Pedophilia on the Internet | Software Piracy | Annotated Web Site Directory |
This white paper was created by four graduate students in the Curriculum, Technology, and Education Reform (CTER) Masters of Education program at the University of Illinois at Urbana-Champaign. Please contact any of the students below with comments or questions about this site.
Megan Forness mforness@springfield.k12.il.usq
Jim Peterson Jim@Petersons.net
JoLynn Plato plato1@fgi.net
David Stone dstone@uni.uiuc.edu
Other papers in this series include:
Educator's Guide to Access | Educator's Guide to Credibility and Web Evaluation | Educator's Guide to Free Speech | Educator's Guide to Intellectual Property, Copyright and Plagiarism | An Educator's Guide to Privacy | Educator's Guide to Commercialism |
Last updated 5/5/99.