Social, Ethical, Ad Legal Issues
Social, Ethical, Ad Legal Issues
CHAPTER
5
5
Social, Ethical, legal,
and Human Issues
C
C
omputers are now so pervasive in our society that the question of how they can
be used most wisely, efficiently, and ethically is a human issue that demands
the attention of anyone interested in computer use. Although many of the purposes
for which computers are used are extremely beneficial to the individual and
to society, there is a wide range of misuse as well. For the past several decades,
science
fiction writers, philosophers, educators, and many others h,lVe been warning
us about dramatic changes that computers will cause in our lives. What will these
changes be? How will we adapt to such drastic reorganization of our routines?
Implementation
of these changes and adaptations requires that we act responsibly with
our new technologies. How do we, as pioneers and educators, encourage ethical
behavior
on the technological frontier? We must grapple with these issues now if we
are to shape a productive and humane future.
Social, E
CYBl
Cybercr
networ1
Vamosi
than dn
dam of
dealing
U.5.bm
U.S. Sec
year (Ev
issues 01
concem~
I COM
Hundrec
People in
mainfran
figures a
dents of
related c
into the f
TherE
puters Cl
society.
criminal
rate acCi
ilmounts
puter ani
informati
tices. Ma
ment age
their cus
rized per:
tion can
Theft of
school pe
computer
determin.
records, s
grades of
of COlllpul
crime th,
I FIGURE 5.1 I FBI computer security survey.
111
i
I
iI~~.~%more:
L-_. .... ---'
Source: 2005 FBI Computer Crime Survey.
Retrieved January 15,2007, from
www.fbi.gov/publications/ccs2005.pdf
Hundreds of thousands of hlrge mai.nframe computers are used in the United States.
People involved with these systems number in the millions. Many others have access
to
mainframes through personal computers. These
figures add up to an alarming increase in incidents
of computer abuse, especially computerrelated
crime, a trend that will likely continue
into the future.
There are a variety of ways in which computers
can be used to defraud others in our
society. Theft of "/OI/cy can occur through
criminal programming or intentionally inaccurate
accounting transactions and rounded
amounts. Stealing information from a computer
and using a computer to market stolen
information illegally are not uncommon practices.
Many private companies and government
agencies maintain computerized lists of
their customers and clients. Once unauthorized
personnel access these lists, the information
can be sold to others for various uses.
Theft of il/formatiol/ is a serious concern to
school personnel who store student records on
computers. With access to a computer and the
determination to break into confidentiell
records, students have been known to alter the
grades of their friends and enemies The theft
of cOlI/pllter timc is another computer-related
crime that is on the increase. People who
Cybercrime describes criminal activity in which computers, the Internet, or
networks are a tool, computation device, or a place of criminal or illicit
activity.
Vamosi (2005) states that today, criminals are making more money from cybercrime
than drug-related crime. Computer fraud, invasion of individual privacy, and
freedom
of speech are issues affecting our li\'es. The FBI reported (Evers, 2006) that
dealing with viruses, spyware, PC theft and other computer-related crimes costs
U.s. businesses a staggering $67.2 billion a year (see Figure S.1). In addition,
the
U.s. Secret Service reported telecommunication fraud losses are about $1 billion a
year (Evers, 2005). This chapter will examine the contemporary social and human
issues of computer crimes, security, and privacy, and the ethical, legal, and
equity
concerns in education
Social, Ethical, Legal, and Human Issues
I COMPUTER FRAUD AND MISUSE
I CYBERCRIME�
112 CHAPTER FIVE SOCIal.
invade computer systems without authorization are called hackers, and their victirr
of students who want to use the same software at the same time, but there is not
enough software to go around. Given the ease with which software can be pirated,
it is tempting to make unauthorized copies. Although the act of piracy takes only a
few minutes, the ramifications are long term. First, piracy sets a poor example for
students, who are, after all, the computer users of the future. Second, it
ultimately
results in higher software prices because publishers must raise prices to
compensate
for losses through piracy. See www.spa.org for copying guidelines and other
policies
on software use. Piracy results in fewer legitimate cllstomers and, consequently,
higher-priced software packages.
Theft of identity is the fastest-growing white-collar crime. Victims' identities
are
assumed through stolen Social Security numbers, drivers' licenses, ATM cards,
credit card information, and employee data theft. While impersonating their
victims,
criminals quickly spend as much money as possible before moving on to another
stolen identity. Thieves can also use computer databases and the Internet to
access large amounts of personal data. They steal passwords, Social Security
numbers,
and banking information from websites and employer databases. With this
information, identity thieves apply for loans and make purchases over the Internet.
and data. Only through constant upgrades of anti\�irus programs can users be
relatively
safe from infection, In a recent case in California, a 20-year-old hacker seized
control of hundreds of thousands of Internet-connected computers using the zombie
network called a botnet to sen'e pop-up ads and renting it to people who
mounted attacks on websites illld sent out spam (Goodin, 2(06).
Computer viruses might not be immediately noticed. Some are designed to lie
dormant until triggered by a sequence of kevstrokes or a date. On Nov'ember 1,
1988,
a person entered a virus that was intended to live innocently and undetected in
ARPANET, a U.s, Department of Defense computer network, the original "Internet."
A design error in the virus caused it to replicate out of control, It jammed more
than
6,000 computers nationwide, including computers at the Rand Corporation, SRI
Internationill,
Lawrence Livermore Lilboriltories, the Massachusetts Institute of Technology,
and military bases allover the United States. The \'irus spread by mailing
itself to other computers under the auspices of ,1 legitimate user. Because it
continued
to replicate, all infected computers slowed down and eventually shut down. In
the past few years, we han:-experienced \'irllses bv the names of K!ez, Melissa, \
V32,
Blaster, Sasser, Sober, i1nd Michelangelo. The Sobig-F email worm crei1ted millions
of copies of itself and spread worldwide more rapidly than earlier \'irllses (see
www.pcworld.com/news/article/O,aid,l12411,OO.asp). W32,Mydoom.A@mm (c1lso
known as \N32.NO\arg.A) is a mass-mailing worm that c1frives ilS an att,Khment with
the file extension .bat, .cmd, .exe, .pif, .scr, or .zip. When a computer is
infected, the
worm sets up a backdoor into the system by opening TCP ports and can potentially
allow an attacker to connect to the computer and use it as a proxy to gain access
to
its network resources (see http://securityresponse,symantec.com/avcenterivenc/
data/[email protected]).
Bnckdoor. A secret computer progrilm that gi\'es its (reiltor a method of gaining
access without il password to a computer system or computer network, often
allowing the in fected system to be used in later <1ttacks.
Trojan horse. A program that evades security and masquerades as something
harmless. Unlike \'iruses, Trojan horses do not replicate themselves, but they can
be just as destructive.
Worm. A type of virus that can replicate itself over a computer network and
usui1lly
performs malicious actions, such as using up the computer's resources and
potentii111y
shutting the system down. Hybrid worms mi1Y contain viruses, backdoors,
and Trojan horses (see www.edweek.org/ew/ewstory.cfm?slug=:02virus.h23).
Spam. Spam (unwanted emilil such as unsolicited email illi\'ertisements) has been
increasing i1t i111 alarming rate, forcing Congress to begin pursuing legislation
to
reduce spi1m. Charp (2003) reported that ..J-L) percent of users spend from ..J-O
min
utes a day to almost ..J-hours ,1 week deleting spam. Otlll'r common terms are
other than work and cvberhari1ssment th,lt is emi1il that is obscl'Ill' or hateful
or
that threatens or frightens and usu,11ly h,lS offensi\'e sexist or racist content!
Sec
Figure S.2 for most common email subject lines. Compilre 20GS to 2003 to see the
changes in spam subject line notes. Mi1IlY computer USl'rs arc getting additional
email add resses to shi1re wi th (1chertisl'1"s and thus hi1w' protected their
persona I
Email Scams.IIl.ldditiontospamsilndphishing.there.Hl.manyemililsc.lms.as
listed in Figure 5.3 (p,lge 116).
Spyware. Spymlrc refers to mi1licious softw,He that is designed to intercept or
take
partial control of i1 computer's operiltion without the informed consent of th,lt
mi1chine's
owner or legitimate user. There ilre free spvware detection progrilms ilS well
as antispyware software progri1ms which will remm'e ,11ld then pre\'ent the
malicious
spyware. Be sure to keep your computer upd<lted with i1 spywilre checker.
Also, keep up with the recommended security updates for the computer's operating
system.
Phishing. Phislling is a term used to describe the action of ,1ssuming the identity
of
a legitimate orgi1nization or website, using forged email or web pages and with a
view to com'ince consumers to share their user names, passwordS, and personi1l
Social,
FIGl
200:
200~
1.
2. I
3. I
4. (
5. I
6. I
7. l
8. (
9. l
10. (
2003
1. "
2. (
3. (
4. (
5. C
6. L
7. L
8. I/'
9. H
10. A
Sourc
AOLl
financial
often reI
.html). [
credit ca
respond
spear-ph
Howto J
sent out
very safE
financial
recommE
fiGURE 5.2 I AOL's top ten spam email subject lines in 2005 compared to
spam)
8. [IMPORTANT] Your Mortgage Application Is Ready (mortgage-re:ated scams)
9. Thank you Your $199 Roiex Special Included (high-end "deals")
10. Online Prescriptions Made Easy (pharmaceutical)
financial information for the purpose of using it to commit fraud. Phishing is also
.html). By hijacking the trusted brands of well-known banks, online retailers, and
credit card companies, phishers are able to convince up to 5 percent of recipients
to
respond to them (see www.antiphishing.org). A more recent form of phishin~ is
spear-phishing, which targets corporations (Vamosi, 2005).
How to Avoid Phishing Scams. The number and sophistication of phishing scams
sent out to consumers is continuing to increase dramatically. While ecommerce is
very safe, as a general rule you should be careful about giving out your personal
financial information over the Internet. JPMorgan Chase has compiled a list of
recommendations that you can use to avoid becoming a victim of these scams
FIGURE 5.3 I Top ten internet frauds listed by the National Consumers
League.
1. Bogus online auctions, where the items purchased are never delivered.
2. Deliberate misrepresentation or nondelivery of general merchandise purchased
online.
3. Nigerian money offers.
4. Deliberate misrepresentation or nondelivery of computer equipment or software
purchased online.
5. Internet access scams, where bogus Internet service providers fraudulently
charge
for services that were never ordered or received.
6. Credit card or telephone charges for services that were never ordered or
misrepresented as free. These often include charges for accessing "adult" material.
� Don't use the links in an email to get to any web page if you suspect the message
� Avoid filling out forms in email messages that ask for personal financial
information.
OJ
"
"
"
"A
"
"
Gainir
hijack
numb
(FTC)
fenda
gotter
Onlin
a prot
if they
and fr
body(
on the
colors,
it was
steal c
Socia
Mossb
scams
of tacti
use to:
bywhi
sites fn
to i1 cal
steal y(
but thE
install,
data. r-.,
techno
� Always ensure that you're using a secure website when submitting credit card
or other sensitive information via vour web browser.
� To ensure that you are on a secure web sen'er, check the beginning of the web
address in your browser's address bar; it should be "https://" rather than just
''http://,,.
� Regularly check yuur online accounts as well as bank, credit, and debit card
statements
to ensure that all transactions are legitimate.
� Ensure that your browser is up to date and that all security patches are applied.
Gaining Identity Information through Phishing. An identity thief who allegedly used
hijacked corporate logos and decepti\'e spam to con consumers out of credit card
numbers and other financia I data has ilgreed to settle Federal Trade Commission
(FTC) charges that his scam violated federal laws. If appro\'ed by the court, the
defendant,
a minor, will be barred for life from sending spam and will gi\'e up his illgotten
gains. The FTC alleged that the scam worked like this: Posing as America
Online, the con artist sent wnsumers email messages claiming that there had been
a problem with the billing of their AOL account. The email warned consumers that
if they did not update their billing information, they risked losing their AOL
ilccounb
and Internet access. The message directed consumers to click on a hyperlink in the
body of the email to connect to the"AUL Billing Center." When consumers clicked
on the link they landed on a site that contained AOL's logo, AOL's type style,
AOL's
colors, and links to real AOL web pages. Jt appeared to be AOL's Billing Center.
But
it was not. The defendant had hijacked AOL's identity and W,lS going to use it to
steal consumers' identities, as well, the FTC 'llleged (FTC, 20(3).
Social Engineering
Mossberg (2006) provides an excellent list of tips to help you a\'oid the latest
theft
scams which he calls "sociill engineering." He defines social engineering as
consisting
of tactics that try to fool users into giving up sensiti\e financial dilt,l that
criminals can
use to steal their money and even their identities. He includes '\,hishing," the
pmctice
by which crooks create emails and websites that look just like legitimate messages
and
sites from real banks and other financial companies as social engineering and is
linked
to a category of malicious software called Crimeware-programs that help criminals
steal your private financial information. These terms are confusing ilnd
O\'erlapping,
but the threat is real. Increasingly, common-looking scams are combined with secret
installations of software that help crilllinals spy 011 you and steill your
data. Mossberg provides the following tips (http://online.wsj.com/article/personal_
technoIogy.html?mod=djemptech):
1. Don't trust email from financial institutions. Email is so easily manipulated by
crooks that you simply should neYer, eyer consider any email from a financial
institution
as legitimate. The message may bear a bank's or a broker's logo, but you
should never respond to such an email, and ne\'er click on any link it contains.
There
is a very high chance it's a skillful fraud and that the link will take you to a
cleyer
fake website designed to capture passwords and account numbers. The site may also
silently install on your PC a program called a key logger, which records everything
I MAINTAINING SECURITY
The need for security of computer equipment and computer data is significant for a
computer system of any size, from a large mainframe system with extensiye
peripheral equipment to a single computer on a student's desk. Security measures
prevent the fraudulent usc or destruction of computer equipment. These measures
include something a person has (a key or badge), something a person knows (a
password),
or something about a person (a fingerprint, a voiceprint, a facial feature).
Most large companies have security systems that one must pass through to gain
access to the computer room. These systems may use special cards to insert or but
tons to press on the outer door of the computer room. Other security measures
written and in place, computer progrClmmers should not be allowed to go into the
computer room and should never be allowed to run their programs. Whereas it is
computer room, in most schools such a security meClsure would be unreCllistic. How
Bi
identi
such (
an err
smart
bers.l
to vel'
ternet
as rep
FIG
Sr
I ir~un
L
L
om
be necessarily broader. Another measure requires the investigation of staff and
security clearances for those who work with confidential information. A third
measure
establishes a system for efficiently investigating suspected breaches of security.
No system is ever foolproof, but every effort should be made to ensure the security
Biometric devices are now being used to ensure privacy, protect assets, confirm
identity, and guard against unauthorized access. Biometric devices scan body parts
such as fingerprints or retinas. A "smart card" is a plastic credit card type
device with
an embedded integrated circuit for storing information. Biometric technologies and
smart cards are replacing the antiquated method of using passwords or PIN numbers.
Electronic signatures, or e-signatures, represent a new form of technology used
to verify a party's identity so as to certify contracts that ilre agreed to over
the Internet.
See Figures 5.4 and 5.5 for listings of security technologies and financial losses
as reported by the FBI in a 2005 Crime Sun-ey.
____P7%
Firewalls
Anti-virus software
I I _-_.9~%
._72~ I
.... 70%:
jl
---~_.---------------_.---_._-------'
Source: 2005 FBI Computer Crime and Secunty Survey. Retrieved August 15, 2006,
from www.cpppe.umd.edu/Bookstore/Documents/2005CSISurvey.pdf
�1
�1
FIGURE 5.5 I Dollar amount losses by type.
$42.787.767
Virus
$3l.233.100
Unauthorized access
$30.933.000
$7, 0,725
Denial of service
$6,816450
fi'ilJ_ $4,107300
Laptop theft
~!l $2,565,000 i
Financial fraud
,;' 52,227.500
~ $841,400
System penetration
5544,700
$340,600
Sabotage
$242000
Telecom fraud
$115,000 ,
I i
$0 $10 million $20 million $30 million $40 million $50 million
Web site defacement
Source: 2005 FBI Computer Crime and Security Survey. Retrieved August 15, 2006,
from www.cpppe.umd.edu/Bookstore/Documents/2005CSISurvey.pdf
�T
f(
tl
�T
ir
�C
al
al
L,
credi
pend
on tir
All tI
of ere
Pl
rangE
thilt F
not h
in de
never
witho
inforr
probl(
able t,
growt
�
other
Our digital identities are being stored in databases of companies we've never heard
Ta
of. Private information is not only being captured online via the Internet, it is
being Burca
collected in our offline world as well. Buying piltterns are data mined from
pointrecord
information. merge
Until 1974, there was little concern about privacy with regard to databases. Few
ual's r
databases shared their information because access was slow and inefficient.
Howclient
ever, as technology 'ldv'lnced and databases evolved into data warehouses, concern
Th,
for individual privacy incn."lsed. President Gerald Ford signed the Privacy Act of
tional
1974 into law. Its purpose was to protect confidentiality of files generated by the
to treK
Let's examine the pri\'acy issue with regard to several situations. First, consider
Tax forms are submitted to the Internal Revenue Service each yec1r. The Census
Bureau gathers information and law enforcement databases compile criminal
records. Motor vehicle departments annually update data on registered car owners
and licensed drivers, and \oter registration lists abound. With this wide range of
available information, these databases could be merged into data wilrehouses. These
KenRiit legally, wisely, and ethically. A strong need exists for improved oversight
and
Bloorrstricter enforcement of current laws. To ensure that legal protections are
not ignored,
femalea public research center, the Electronic Privacy Information Center (EPIC),
estabcrime,
lished a website at www.epic.org to disseminate information on emerging civil
libdownlerties
issues, including privacy and First Amendment concerns.
buyin!
Privacy issues are increasingly a concern for educators as well. The handling of
70 per,student information is protected under the Family Educational Rights and
Privacy
long a Act (FERPA) of 1974. This federal law provides parents and students with the
right
film into see their school records and to request corrections to records believed
to be inacpurch,
curate or misleading. Schools must have written consent from parents or an eligible
Kel
exceptions exist for certain entities, for instance, school employees or a contract
of teen
the mi.
So far, our discussion of computer crimes and threats to privacy illustrates some
Copy a
of the drastic changes computers are causing in our society. Another key set of
issues,
ethics and equity, impacts new responsibilities facing educators. The next two
Copyin~
sections explore these concerns in education.
Downlo
Downlo
Educators share with parents and society the task of teaching ethical use of comput
Shoplifti
ers and the Internet. To help teachers develop a set of ethics applicable to
computer
and Internet use, schools create and implement an acceptable use policy (AUP). The
Shopllfti
AUP is a critical part of the school's technology plan and states the rules
governing
computer and Internet use and the consequences for violations. Parents and their
Source: h
children are held responsible to adhere to this policy. There are many commercial
software products that parents can use to screen their children's Internet access
including
messaging and chat rooms. In fact, most products can limit access to certain
times of day and also have the ability to keep logs of the websites their children
have
visited. Do students know what is legal to copy and what is not legal to copy? The
following are the results of a recent poll attempting to ans\ver this question.
KenRadio.com (2006) reports that a poll recently conducted by the LA Tillles and
Bloomberg found that the majority of teenagers and young adults, both male and
female, up to the age of 24, believe that while copying stolen music or movies is a
crime, copying purchased CDs or UVlJs is not. These young consumers know that
downloading free music and movies from unauthorized sites is iJ1egal. They kno\v
buying bootlegged CDs and DVDs is wrong, too. But, according to the survey, 60 to
70 percent of them think it is perfectly all right to burn discs for or from
friends, as
long as the discs were legitimately purchased. As far as lawyers for the music and
film industries are concerned, copying a CD or DVD for even one friend, even if you
purchased it and paid full price, violates the federal copyright code and it is a
crime.
Young users do not agree. See Table 5.1.
KenH.adio.com also explained that the results of the poll implied thilt 69 percent
of teens ages 12 to 17 believe it is legal to copy a CD from a friend who purchased
Source: http://KenRadio.com
27% 35%
.............
39% 44%
, ............
79% 81%
83% 83%
82% 84%
......................
83% 84%
97% 97%
99% 99%
33% 38%
. ...........
40% 41%
70% 79%
.............
74% 79%
................
76% 76%
80% 77%
............
98% 96%
99% 97%
FIGURE 5.6 I Content that U.S. tweens and teens have downloaded without
paying for.
���������������" ����'51"'""
����10%
1
�����14%
Scftl'.l'HC
32%
22%
�������250
�����������132%
Source: http://KenRadio.com
40%.
II 200b
2004
53%
illegal downloading of music, movies, games, and softw<lre by young users was
trending downward. Sec Figure 5.6.
COPYRIGHT
Teachers are role models. Therefore, there is no substitute for ethical teacher
behavior
and proper supervision of students. Teachers must set an example of ethical
behavior
whene"er using or discussing computers. A lecture on the evils of software piracy
becomes
meaningless if the teacher practices piracy. Understanding current copyright
issues and the term cdilm/iollll! fllir IN' are paramount to teachers' ethical
behavior.
The federal agency charged \vith administering the copyright law is the Copyright
Office of the Library of Congress. (Visit its site at
http:Jncweb.loc.gov/copyright/title17
to re"iew the law, or www.loc.gov/copyright/circs/circ1.html to review the basics.)
Soci,
1
COP)
teacl
an iI
law,
�1
n
�1
�1
�T
VI
VI
Digi
In 19
DMC
the [
coPYI
playe
accon
other
Teacl
On N(
legist
logica
righte
enroll,
class s
nologi
thorizi
www.,
accura
Copy
David:
their r
Copyr
of the
be sup
Fair use is defined in Section 107 of the 1976 Copyright Act (see www.loc.gov/
copyright/title17/92chapl.html#107). Use for criticism, comment, news reporting,
teaching (including multiple copies for classroom use), scholarship, or research is
not
an infringement of copyright. To determine whether a use is fair under the above
law, the following factors must be considered but are not limited to:
� The purpose and character of the use, including whether such use is of a
commercial
nature or is for nonprofit educational purposes
� The nature of the copyrighted work
� The amount and substantiality of the portion used in relation to the copyrighted
work as a whole
� The effect of the use upon the poten hal market for or value of the copyrighted
work
In 1998 the Digital Millennium Copyright Act (DMCA) was signed into law. The
DMCA's purpose is to update our copyright law for the digital age. An overview of
the DMCA can be found at www.asu.edu/counsel/brief/dig.html. Under federal
copyright law, no copyrighted work may be copied, published, disseminated,
displayed,
performed, or played without permission of the copyright holder except in
accordance with f,lir use or licensed agreement. This includes music, movies, and
other copyrighted m'lterial.
On November 2, 2002, the Teach Act of2002 was signed into law (www.copyright.gov/
legislation/pl107-273.pdf#13210). The Te,1(h Act of 2002 requires the use of
technologicaI
measures that re<lsonably prevent further copying and distribution of copyrighted
works. Aclass is limited to aCcess to copyrighted works only for those officially
enrolled. In addition, the access is only for the time period necessary to complete
the
class session. Finally, the digital transmissions are expected not to interfere
with technological
measures used by the copyright owners to prevent such retention or unauthorized
further dissemination. The Association of Research Libraries website at
www.arl.org/info/frn/copy/copytoc.html is a good source to acquire current <md
accurate information 011 copyright issues.
Davidson (2005) developed the chart in Table 5.2 to inform classroom teachers of
their rights under the copyright law and copyright guidelines of the United States.
Copyright and the notion of intellectual property was written into the Constitution
of the United States to promote learning and the useful arts-and was designed to
be supportive of the work of educators.
The purpose of copyright protection is repeatedly and mistakenly reported to be
for the protection of authors and other intellectual property owners. In fact,
copyright
has been always been for the purpose of benefiting society as a whole and
particularly
the institutions of education. Learning, or science, in the language of the
Enlightenment and the Constitution, was to be promoted by allowing authors and
others rights for a limited time for their work. The first copyright act written
into
federal law was titled "The Education Act."
Teachers in the classroom make the decisions closest to the field of instruction,
and it is teachers who helVe been given the greatest rights-rights that even their
districts
do not have. Hall Davidson, a teacher, designed a Copyright Chart to inform
teachers of what they may do under the law. A PDF form of the chart is availelble
at
www.mediafestival.org/downloads.html. See Table 5.2.
The Child Online Protection Act (COPA), enacted in 1998, replaced the Communication
Decency Act and bans sending harmful materials to minors as well as underage
exposure to sexually explicit materials. The Children's Online Privacy Protection
Act
(COPPA), which went into effect on April 21, 2000 (47 U.s.c. �231), applies to the
online
collection of personal information from children under 13. It explains what a
website
operator must include in a privacy policy, when and how to seek verificlble consent
COPA imposes il $50,000 fine and 6 months in prison for the knowing posting,
for "commerciol purposes," of World Wide Web content that is "harmful to minors,"
but provides on ilffirmiltive defense to commerciill web speakers who restrict
ilccess
to prohibited materiols by "requiring use of a credit card" or "ony other
reilsonable
measures that are feasible under a\'ai lable technology," �231 (c)(I). COPA was
enacted
in response to RCI/o v. American Ciui! Lillerties Union, 521 U.s. 844, in which
this Court
held that the Communications Decency Act of 1996, Congress' first attempt to make
the Internet safe for minors by criminalizing certoin Internet speech, was
unconstitutional
because it was not narrowly tailored to sen'e a compelling governmental interest
and because less restrictive alternatives were available. Respondents, who were
web speakers and others concerned with protecting the freedom of speech, filed suit
On remand, the Third Circuit again affirmed, concluding that COPA was not the
least restrictive means aV'lilable for the government to sen'e the interest of
preventing
minors from using the Internet to gain access to harmful materials (U.s.
Supreme Court decision No, 03-218. Argued March 2, 2004-Decided June 29, 2004).
For more information, see http://supct.law.comell.edu/supct/html/03-218.ZS.html
and www.epic.org/free_speech/copa.
Social, [
In the Ie
agreeml
Organiz.
America
permittE
the Cop
guidelin
For mar,
.html#al
Printed
� Poem
words
� ExcerF
from a
than 2'
� Article:
essays
2,500 \
� Excerp
longer
work
or 1,00
whiche
but an
500 wo
� One ch
graph,
picture
per per
� Two pa
from an
work Ie
words (
books)
TA8LE 5.2 Classroom Copyright Chart
Circular 21
"Consumables" can't
be copied. Don't do it
every term (if time
allows, seek permission).
Can't be
directed by "higher
authority." Copying
can't be substitute for
buying. Copies may
be made only from
legally acquired
originals.
(continued)
TABLE 5.2 Continued
Printed Material
(continued)
� A chapter from a
book
� An article from a
periodical
� Short story, short
essay, or short poem
� Chart, graph, diagram,
drawing, cartoon,
picture from a book,
periodical, or
newspaper
� Portions of a
work
� An entire work
� A work if "the
existing format in
which a work is
stored has become
obsolete"
� Same rights
as "Printed
Material" above
Illustrations and
Photographs
� Photograph
� Illustration
� Collections of
photographs
� Collections of
illustrations
According to
United States
Copyright
Office
Circular 21
Section 108
Copyright Act
(1976)as
amended by
the Digital
Millenium
Copyright Act
According to
Fair Use
Guidelines for
Educational
Multimedia
According to
Fair Use
Guidelines for
Educational
Multimedia
"reasona ble
investigation that copy
... cannot be obtained
at a fair price" or that
the format is obsolete.
be in the public
domain, but the
collection may be
copyrighted.
Video
� Videc
(purd
� Video
(rente
� DVD
� Laser,
Video ("I
Media") I
Multimec
� Videoti
� DVD
� Laser d
� QulCkTi
� Encyclo
(CD RO
Video for
into Videc
� Videota
� DVD
� Laser &
� QUlckTir
movies
� Encyclof
(CD ROr
TABLE 5.2 Continued
� Videotapes Teachers may use these Section 110 of The material must be
(purchased) materials in the classroom the Copyright legitimately acquired (a
without restrict'ons of length, Act legal copy). It must be
� Videotape
use as entertainment
shoUld be instructional.
nonprofit educational
institution.
If replacements are
unavailable at a fair
price or are available
only in obsolete formats
(e.g., betamax videos).
Video ("Motion
� Videotapes Students "may use portions Fair Use "Proper attribution and
of lawfully acquired Guidelines for credit must be noted
� Laser discs
� QuickTime
movies
� Encyclopedias
(CD ROM)
(continued)
Social, E
Internetinto Multimedial
Video Projects What You Can Do According to The Fine Print
� Music
Computer Software
� Purchased
software
� Licensed
software
Up to 10% of a copyrighted
musical composition may be
reproduced, performed, and
displayed as part of a
multimedia program
produced by an educator or
student for educational
purposes.
Sections 107
and 108 of
Copyright Act
and
subsequent
amendments
Some authorities cite
a maximum length
of 30 seconds
(www.indiana.edu),
some do not mention a
maximum (Tina Ivany,
UCSD, 12/08/95)
See below.
If unavailable at fair
price or is an obsolete
format.
The number of
simultaneous users
must not exceed the
number of licenses. A
network license may
be required for
multiple users.
� Internl
� World
Web
Televisiol
� Broadc
ABC, f\
UPN,P
televisi
� Tapes r
broadc
Cable Tell
� CNN
� MTV
� HBO (et
� Tapes m
from cal
Fair Use
Guidelines for
Educational
Multimedia
According to
TABLE 5.2 Continued
� Internet connections
� World Wide
Web
Television
Fair Use
Guidelines for
Educational
Multimedia &
DMCA
According to
� Broadcast (e.g.,
ABC, NBC, CBS,
UPN, PBS, local
television stations)
� Tapes made from
broadcast
Cable Television
Congress
According to
� CNN
� MTV
� HBO (etc.)
� Tapes made
from cable
www.ciconline.org/main
.cfm
Cable systems
(and their
associations)
of IntE
ernon
Copyright Policy
and Guidelines
for California's
School Districts,
California
Department of
Education
corpOi
an on]
freely
site on
Helpfu
Ad
[ntE
WY.
Fau
Plagiarism
tior
Another growing concern among educators is Internet plagiarism. Finding informaww
tion on the Internet makes verbatim text, enhanced photos, and animations very con
EdL
venient for students to cut and paste into their papers and research reports. Even
entire
and
essays can be downloaded and passed off as original works. Entrepreneurs can
acquire ww
a repository of essays and research papers for resale. In less than a second after
enterSafe
ing the search word essays into Coogle or Yahooligans, you can find many websites
listing student essays' Because so many sources of information are available on the
Inww
ternet, plagiarizing the information in papers and reports is a temptation. See
Chapter
15 and www.plagiarism.org/index.html for more information on this topic. Social
Social f\
Information Accuracy
every fE
Another growing concern among educators is the accuracy of Internet-provided social
111
information. There are no standards or clearinghouses to screen the plethora of
sion wo
information available. Careful review of all Internet information is required.
will1ted
with sto
Role-Playing Models for Ethical Behavior work. M
Unp]
These are a few of the technology-related issues. Teachers �111 spend class time
disincludincussing
ethical issues with students. There are many role-plilying models that cast
now h'1\students as software pirates, software publishers, and so on. Giving
students opportustudent,
nities to role play and discuss these issues helps them develop and clarify their
own
parentsethical codes. See www.vuw.ac.nz/stafflalastaicsmith/evaln and
www.library.jhu
their we
.edu/researchhelp/general/evaluating.
list of so
Popular!
Child safety, often referred to as Kid Safety or Cybersafety, is the goal of
parents, 360 Y
teachers, and schools. The Internet Keep Safe Coalition group teaches basic rules
http:/
of Internet safety to children and parents, reaching them online and in school.
Governors
and/or their spouses formed this coalition in partnership with a growing
list of crime prevention organizations, law enforcement agencies, foundations, and
corporate sponsors. Studies show that one in five youth using the Internet receive
an online sexual solicita tion in a I-year period, and 29 percent of children will
freely give out their home address if asked (retrieved from the www.ikeepsafe.org
site on August 10,2006).
www.siteadvisor.com
www.scandoo.com
www.surfcontrol.com
Educational materials, including worksheets and tests, are available for parents
and educators
www.ikeepsafe.org/iksc_educators/educational-materials.php
www.gaggle.net
Social Networking
Social Networking is growing very rapidly in popularity. There seem to be new sites
e\'ery few weeks. Angwin (200h) relates senior ymr notes in the school yearbook to
social networking on the computer. Studcnts wrote about what their future
profession
would be in as well as references to favorite music, sports, and anything they
wanted to be remembered bv. Members of the networks USU,11lV share information
..
with stories, photos, addresses and whate\'l'r else is the focus of the particular
network.
Most of the sites are free.
Unpleasant pwblems h,w(' occurred due to the information provided to the sites
including sexual assaults and invasions of privacy. Teachers, parents, and schools
now have become aware of some of these unsafe erwironments and Me providing
student awareness discussions. Basically, information needs to be pro\�ided to help
parents and teachers teach their children not to put identifying personal details
on
their web pages (Barrett, 200h). Some sites now pro\'ide safety lips. Following is
a
list of some of the more popular sites:
360 Yahoo
http://360.yahoo.com
43 Things: What do you want to do with your life?
http://www.43things.com
Blogger
http://blogger.com/start
Bolt
www.Bolt.com
Classmates
www.classmates.com
www.myspace.com
Flickr
www.flickr.com
Livejournal
www.livejournal.com
MSN Photo Album
http://communities.msn.com/content/features/photoalbum.asp
MSNSpaces
www.msnspaces.com
Myspace
www.myspace.com
Myyearbook
www.myyearbook.com
Picasa
http://picasa.google.com/index.html
Tribenetwork
www.tribenetwork.com
Wikipedi,1
http://en.wikipedia.org/wiki/Main~Page
Xanga
www.xanga.com
YouTube
www.youtube.com
I EQUITY IN EDUCATION
Equity issues are a major concern of educators who use technology in the classroom.
Gender and equal availability of technology for e\'eryone are the main issues (Siek
et.
aI., 2006). Research has documented th<1t boys are more interested and involved
with
technology than are girls. Software generally tends to emphasize male-dominated
activities, Games often include violence and competition as motivation. These
software
Socia
chara
essen
St
orScf
low s
Web,
Libra]
the Cll
and Ii
the In
access
signifi
g,1p 01
Ed
)ogicill
experi,
ence VI
the di~
studen
ethnici
Alt
in rnin(
on the
withou
ul<1tion
who ,)f
h,1rdw,
tlw hM'
ties. Te(
Access
Visi
inform,
a text-o
softwM
elemenl
text is L
imp,1ire
disorien
dis,lbilit
Cl'nter f
ca ted to
through
www.ca:
website'
characteristics tend to attract males. Therefore, careful student software
selection is
essential for addressing gender in the classroom.
and Jibrories. The E-Rate progr'lm has connectl'd more than a million classrooms to
the Internet. Although Congress ond state g()\"ernments h,l\'e ta ken steps to
increase
access through the E-Ibte as well as other technologv gr,lnt programs, the gap is
still
significilnt. A new type of pO\'erty-informc1tion pO\'erty-has emerged from this
gap or digit,ll di\'ide.
who Me blind or YisiOIl imp,lired h,we Internet ,Kcess. \Nhen selecting computer
h'lrdware and softwMe ,l~lplications for cl,lSSroOlll use, educators need to
e\',lluate
the hMdw,lrl' 'llld softwarc to determine its 'lCcessibility by students with
dis,lbilities.
lechniques for ensuring ,Kcessibilitv to ,1 vvebsite arc doculllcnted by the Web
Access lniti'lti\'e of the World Wide Web Consortium (www.w3.org/wai).
K'ldel (2()06) indicates that the canyon between technology haves and have-nots
haunts
us, constantly reminding us that access to technology has been, and continues to
be,
unfair. Hm,\' can we ensure adequate 'lnd equal access to technology? Two
strategies
are critical: funding ,md teacher professional de,'e!opment (Kuperstein & Gentile,
1998).
Parent groups, fund-raising, industry parhlerships, and careful budgeting in
schools
can help improve aCCl'SS to technology. Interest groups such as the National
Coalition
for Equity in Education (www.math.ucsb.edu/NCEE) dissemillClte information.
Similarly,
tilt' Digital Divide Network (www.digitaldividenetwork.org) is an online resource
connecting communities with resources needed to address the current inequalities.
In
,lddition, tilt' Digital Equitv Network (http://digitalequity.edreform.net) is an
online
service providing high-qlhllity resources that help address the digital divide in
the classroom
and communi ty. Ongoing profession'll development and technical assistance support
teachers' efforts to tr,msform their practice. Teachers must strive to arrange
l'quitabk access 'llld facilitate students' use of technology that addresses their
individual
needs, including their cultural identity, and promotes interaction with the global
community. S'llpeter (2()06) reported progress is being made in several digital
divide
issues, but the problem has not been soh'ed.
TIll' MIT Medicl Llb (Negropontc, 200S) has de\'eloped a $100 laptop-a technology
that could re\olutionizL' how we educcltt' the world's children. The initiative is
called
One Laptop per Child, OLl'C, and you can learn more about it at http://
Iaptop.media.mit.edu). Nichol,ls Negroponte, co-founder of the MIT Media Llb, first
announced the project in J,llluary 200S at the World Economic Forum in Switzerland
and debuted ,1 prototype of the S100 bptop ilt the UN conference in Tunis,
Negroponte
believes th'lt laptops me both a window into the world and a tool with which to
think.
Laptops promote independent interaction 'lnd exploration, and with them, children
"learn leelrning." The focus is to close the g,lp on the digihll divide by
providing millions
of children around the world with ,1 computer. A crank on the laptop will provide
the two Weltts of power to run the computer and a Wi-Fi mesh network will
pro\'ide the connecti\ity. The first public display of the laptop was July. 2006.
Visit the
Llptop initi'lti\'l' site at www.laptop.com for the latest progress reports. Also
the laptop
wiki h,lS related information at: http://wiki.laptop.org/go/Home.
Social,
rig
an
thE
thE
of
pa
liCE
pal
wa
agr
the
the
use
on
ees
Off
I
war
shir
the
witf
tion
revi
COL
soft'
and
peni
LJ
inaI
in t~
edu(
A University-Copyrighted Computer Software Policy
Have you ever "borrowed" a computer program from a friend or coworker? Are
copyrighted
computer programs currently installed on your home or office computer? If so,
do you know whether those programs were borrowed or installed with the permission
of the copyright owner? Federal copyright law gives the copyright owner the
exclusive
right to determine who can install or borrow copyrighted computer software. If you
or
an authorized university representative purchased software from a reputable vendor,
then that purchase probably included the purchase of a license for the purchaser of
the software.
Before you use, share, or distribute the software, you should understand the terms
of the license. If the software was purchased off the shelf or prepackaged, then
the
packaging will include the license terms.
This method of disclosing the license terms is sometimes referred to as shrink wrap
licensing, because the language often provides that by opening the (shrink wrap)
packaging, the purchaser agrees to be bound by the terms of the license. If the
software
was developed or customized for a particular purpose, an underlying written
agreement may contain the terms of the license. If university employees developed
the software in the course of or as part of their employment, then the copyright in
This means that no one can distribute the software or license or allow others to
use it without the express, written authorization of someone authorized to contract
License terms may restrict the individuals or sites that are authorized to use the
software. The term of the use, the purpose of the use, and the ability to
distribute
and copy the software may also be limited by license terms. The license may
describe
penalties for violation of its terms.
Unauthorized copying or distribution of software may also result in civil and
criminal
liability under federal and state laws. The university and the individuals involved
in the unauthorized copying may be liable even if the software was copied for an
educational or a nonprofit use.
(continued)
Software publishers have taken aggressive steps to protect against infringement of
their copyrighted software. These steps may include an audit of university
computers
to search for software being used without authorization. The presence of unlicensed
software may result in considerable liability for the university and for
individuals involved
in unauthorized copying. In other words, unless you are an authorized user, that
"free"
copy of a copyrighted software program may not be free at all.
Source: Adapted from a document prepared by the Arizona State University Office of
General
Counsel, 2001.
I SUMMARY
We have only begun to experience the radical changes that computers will make on
society as we know it. Computer scientists and sociologists differ in their
estimates
of our technological future: Some foresee a stark 1984-type world; others, Toffler
(1981) among them, predict a bright future in which humans, aided by advanced
technology, functinn with greater freedom than ever before. Who is right remains to
be seen, but this much is certain: Computers are bound to change our lives and our
society in dramatic and irrenlCable ways.
Cnmputer fraud and abuse take many forms: theft of money, goods, and identity;
unlawful use of information stored in computers' memories; and unauthorized
use of cnmputer time. Hackl'rs enter computer systems without authorization.
Softw'lrc piracy, which is the theft of computer programs, can cause software
prices
to increase. The cnmputer virus is another major concern of computer security. The
entry of ,1 virus can destroy or damage records and shut down computers. Generally,
viruses 'lnd spywMe are difficult tn detect, but vaccines and antispyware are
available to overcome them. Spam, email scams and phishing are part of our daily
emails. Education must provide ,1wareness education for students. Social networking
has bt'come n?ry popular. Parents, teachers, and schools must work to maintain
safe use bv students.
Computer crimes ,lre nn the increase pMtly because of the increasing number of
computers in society. There are VMious methods of maintaining security in the
computer
room, primarily by limiting access to the room to authorized personnel. The
password is the tr,lditional method of controlling entry into a computer system and
In addition to concerns for the security of organizations, there is concern for the
rights of individuals. The Federal Privacy Act of 1974 was enacted to protect the
confidentiality of files generated by federal government computers. Several state
Socia
gove
of co
force
Tt
striVE
ethni,
puter
comp
ethic<
acces~
menb
vides
work
1. Ui,
tuc
2. WI
elit
3. De:
con
4. De:
CO
5. Re,
pri\
6. Wh
IiI'l
to p
lin
7. Re"
,KC(
8. Rev
age
,ott,
9. Rev]
wl'b
scho
10. Writ
pro/!
initi,
11. Wha
your
governments have passed laws to further protect the ,nerage citizen from illegal
use
of computer information. Besides computer crime, the issue of change in the labor
force is another m,ljor concern.
'.
I ��������������
-----�-----------l
'
Crnylab~~hoo~-!
I
This video clip provides additional information on the social, ethical, legal, and
human issues
teachers face when they incorporate technology into education.
� Log into www.mylabschool.com. select Educational Technology under the Course tab,
�1
��\
e
[Assignment Finder.
You may also navigate directly to the videos by entering Assignment ID ETVI into
the
� II
�V
� II
� II
COMPANION WEBSITE
� Ie
To access chapter objectives, practice tests, weblinks, glossary, and flash cards,
as well as the com
� i<
Sl
� i<
la
I TEC
The ed
motes
gone a
installc
and sal
ers. Wi
compal
or the h
in whic
double
retraini
share tI
people