2. What is Digital Crime/Security?
Here are some Examples:
Internet safety procedures for
the classroom and home
AUP (Acceptable Use Policy) in
the classroom
Computer Hacking
Use of Security Software for
protection
3. While at school or home a child may wonder on to sites that are
not appropriate for their age which ultimately can lead to their
safety being put in jeopardy. Without being aware a child can
enter a site that contains inappropriate material or sexual
predators.
In one survey research claims that
“58% of students admit to using the
Internet unsafely, inappropriately, or
illegally.” (Feldman, 2007)
4. Fortunately there are several tools available for schools and
parents that can prevent a child from wondering to such sites.
Educate- No matter how much protection is provided on a
computer there is no way to block all unsuitable information.
Apply the “Don’t talk to strangers” motto while the online.
Time limits on the computer
Enforce punishments for when computer rules are broken
All information provided by Feldman, 2007.
• Monitoring Software- At any time a
report can be printed out to show
exactly what sites have been visited and
when.
•Personalize programs to require
each student to enter their own
password to ensure individual
responsibility.
•Filters- Stops students from entering
sites that may contain inappropriate
material.
•Keep the computer in an area that
can easily be monitored.
5. Computers are in use in classrooms across the country
and it has become imperative that schools protect
themselves from user liability.
6. Enforcing Acceptable User Policies
How schools can enforce the AUP
If an AUP states that all users’ activities will be monitored,
then the school IT staff needs to be sure that it is doing just
that. Maintain an Internet log. Update regularly and
employ the use of filters to block unacceptable content.
Use clear and precise language: be sure to carefully list all
circumstances in which a violation may occur and avoid
generalities.
Explain the AUP to students in an open discussion forum,
how to use the Internet effectively, and involve parents in
their child’s computer usage.
All information is provided by Fitzer, 2002
7. Computer Hacking
Definition Prevention
Intentionally accessing a
computer without
authorization or exceeding
authorization in order to
access restricted
information
The unauthorized use of
computer and network
resources
Privacy infringement
Varies from being an
annoyance to being illegal
*All information provided by Coakley, 2010.
The best way to prevent
hacking is the use of security
software
Use secure passwords and
keep them private
Be aware of your digital
environment
Explain to students and
others the repercussions and
illegal nature of hacking
8. Resources
Coakley, M. 2010. Hacking.
http://www.mass.gov/?pageID=cagoterminal&L=4&L0=Home&L1=Community+Safety&L2=Cyber+Cr
ime+%26+Internet+Safety&L3=Computer+%26+Online+Privacy&sid=Cago&b=terminalcontent&f=co
mmunity_hacking&csid=Cago
Feldman, B. 2007. Surfing the Net with Kids.
http://www.surfnetkids.com/safety/need_to_know_internet_safety_in_the_classroom-16975.htm
Feldman, B. 2007. Surfing the Net with Kids.
http://www.surfnetkids.com/safety/safeguard_your_students_internet_usage-16974.htm
Fitzer, K. 2002. Enforcing Acceptable Use Policies. http://www/ed/uiuc.edu/wp/crime-2002/aup.htm
Writing an Effective Acceptable Use Policy. 2009. http://www.stbernard.com/forms/switch/internet-
policy.asp?oc=19.htm
Acceptable Use Policy: Ligon Middle School. http://www.ncsu.edu/ligon/au.policy.html
9. Three Questions about Digital
Crime/Security
1. Because there is no way to monitor and filter everything on the Internet,
_________ your students and children on Internet safety is the best prevention.
2. Give one example of how a school can enforce an AUP (Accepted User Policy).
3. What is the unauthorized use of a computer called?
10. Answers
Educating
Monitor all users’ activities, keep an Internet log, and
explain the AUP to all users.
Computer Hacking