1. Trang chủ
  2. » Ngoại Ngữ

Usefulness of teaching security awareness for middle school stude

75 0 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Usefulness of Teaching Security Awareness for Middle School Students
Tác giả Hani Alhejaili
Người hướng dẫn Professor. Sylvia Perez-Hardy (Chair), Professor. Jim Leone, Professor. Lawrence Hill
Trường học Rochester Institute of Technology
Chuyên ngành Master of Science in Computing Security and Information Assurance
Thể loại Thesis
Năm xuất bản 2013
Thành phố Rochester, New York
Định dạng
Số trang 75
Dung lượng 2,31 MB

Cấu trúc

  • 1. INTRODUCTION (11)
  • 2. LITERATURE REVIEW (17)
  • 3. METHODOLOGY (21)
  • 4. RESULTS (24)
    • 4.1 Does the use of technology have an influence on the crimes committed within the community of (24)
    • 4.2 Do parents have a proper security awareness that supports their teens' safety when using the Internet? (28)
    • 4.3 What is the role of school districts in achieving a safe online environment for their students? (48)
  • 5. DISCUSSION (54)
  • 6. RECOMMENDATIONS (65)
  • 7. CONCLUSION AND FUTURE WORK (67)

Nội dung

INTRODUCTION

Technology and the Internet offer significant advantages, especially in healthcare, where doctors can share sensitive patient information securely This accessibility allows patients to switch doctors or travel abroad without the need to repeat medical examinations or restart treatment processes, ensuring continuity of care.

In today's digital age, individuals can manage their finances seamlessly through smartphones and tablets, eliminating the need for bank visits Additionally, the rise of e-commerce allows consumers to shop from the comfort of their homes, benefiting from convenient shipping and hassle-free return processes.

The advent of cloud computing has revolutionized technology by enabling researchers to establish extensive virtual computer labs, which are more cost-effective than traditional physical networking labs Users can access their preferred operating systems from anywhere, freeing them from dependence on specific devices Additionally, cloud storage simplifies data management, allowing users to store information securely online and access it from any device at any time, eliminating the need for physical storage media.

Social networks have revolutionized global communication, allowing users of all ages to easily share their daily activities and connect with others Unlike in the past, when understanding different cultures or languages necessitated travel and extensive reading, today's Internet enables instant access to this information and facilitates communication without the need for physical journeys.

Utilizing technology and the Internet in education significantly enhances students' learning experiences by providing access to diverse resources for academic success Middle school students and teachers are increasingly encouraged to develop computer literacy, with a notable reliance on online academic support services, including e-tutoring Discussions are ongoing about effectively integrating technology from kindergarten through 12th grade, supported by the US government’s commitment to digital resources in schools A report indicates that nearly all public schools have instructional computers with Internet access, highlighting the importance of technology in fostering critical thinking and problem-solving skills, which in turn boosts student grades Online learning platforms empower students to seek information and ask questions without fear of judgment, while tablet devices and smartphones facilitate quick access to knowledge According to the Verizon Foundation, students also benefit from free educational apps that aid in mastering subjects like math and science, promoting collaboration on projects.

Technology offers significant advantages for middle school students, particularly in mathematics education, where its impact varies based on the type of technology and how well it is integrated into the curriculum Technological tools and educational resources enhance students' ability to present and visualize historical facts, improving their understanding Research indicates that students grasp science concepts more effectively through web-based inquiry units that incorporate visualizations compared to traditional teaching methods Additionally, cloud computing provides substantial benefits, allowing schools to create virtual labs accessible from anywhere, reducing costs and eliminating the need for lab technicians, as these labs can be easily restored to their original states.

Companies such as IBM are providing cloud computing services for schools such as Fischer Middle School [11]

The misuse of technology poses significant risks to individuals, particularly middle school students who are vulnerable during a critical developmental stage For instance, storing sensitive information, like online banking credentials, in insecure locations can jeopardize personal privacy and financial security As students transition from elementary to middle school, they may experience negative impacts on their academic performance, motivation, and mental health Despite schools' efforts to protect students physically, online threats persist, especially at home, where 93% of teenagers are active Internet users, with nearly half engaging in online shopping This exposure can lead to the inadvertent sharing of personal information, which, once released, is difficult to control Furthermore, online predators, including those seeking inappropriate interactions with minors, represent a severe risk to middle school students Internet offenders typically fall into categories such as child pornography seekers or those desiring physical contact with children, highlighting the urgent need for awareness and protection against these dangers.

Cyber bullying poses a significant threat to middle school students, negatively impacting their well-being While technology facilitates knowledge sharing among peers, it can also be misused by some students to inflict harm Defined as harassment directed at peers through information and communication technology, cyber bullying allows perpetrators to reach a wide audience rapidly Research indicates that approximately 17.3% of students are involved in cyber bullying incidents A tragic example of its consequences occurred in 2006 when a teenage girl took her own life after being bullied online by a 16-year-old boy.

Chapter 1 INTRODUCTION a social networking site That boy is turned out to be a 49-year-old mother living in the same neighborhood [22]

Middle school students face the risk of becoming script kiddies, individuals who exploit online scripts to hack vulnerable systems without adequate technological expertise These scripts are typically designed to steal sensitive information, including passwords and social security numbers, potentially causing significant harm Engaging in such activities can lead to serious legal consequences, as there have been numerous cases of students facing charges for hacking into school systems to access or modify private data.

Students can face arrest for making online threats, regardless of their intent For instance, a 13-year-old was taken into custody for threatening to bring a knife and gun to school to harm peers Similarly, three middle school students were arrested after threatening to shoot classmates in the cafeteria via MySpace and then commit suicide.

The illegal use of the Internet poses a significant threat to middle school students, encompassing activities such as the distribution of illegal materials and the unauthorized sharing of copyrighted content, which can lead to serious legal consequences A notable example is a middle school student who created a dangerous explosive cocktail using an online recipe and brought it to school, highlighting the potential risks associated with inappropriate Internet use.

Teaching security awareness to middle school students is essential for reducing potential risks they may face An effective method for imparting this knowledge is through an online interactive program Just as businesses develop their own security awareness initiatives for protection, schools should also prioritize similar programs to safeguard students.

To effectively protect middle school students from online threats, it is crucial to educate them about digital safety, ethical technology use, and relevant laws Proper awareness can minimize risks associated with sharing personal information, such as locations and financial data, which can be exploited if mishandled By learning safe online practices, students can also share their knowledge with family and community, reducing the likelihood of human error in organizations Despite the prevalence of cyberbullying discussions, there is a lack of technological initiatives aimed at raising awareness of various online threats Many parents remain unaware of these dangers, and studies indicate that students often feel more secure discussing issues with peers than with adults An engaging, age-appropriate online educational program is essential for teaching security compliance Web browsers and media outlets should collaborate to promote this initiative through creative advertisements The program must remain interactive, solicit public feedback, and recognize outstanding contributions to foster a community-focused approach to online safety.

LITERATURE REVIEW

This chapter explores the initiatives undertaken by researchers to educate students about security While many of these efforts are not exclusively designed for middle school students, analyzing them is crucial for identifying effective teaching methods tailored to this age group.

Teaching children responsible technology use is akin to instructing them on safe driving, as both can yield benefits or risks if mismanaged Stansell-Gamm emphasizes the importance of parental discussions about the ethics of technology usage Additionally, parents must establish clear rules regarding technology use, ensuring that violations result in significant consequences.

Stewart and Shillingford proposed a Cyber Girls summer camp program aimed at middle school female students to enhance their understanding of cybersecurity risks This initiative addresses the challenge many schools face in providing technology-driven cybersecurity education due to budget constraints The program is structured into six informative modules, covering topics such as the history of the Internet and its security, fundamental cryptography concepts, basic security risks associated with networks and databases, identification of phishing sites and security attacks, and the ethical issues related to cybersecurity.

Developing effective social networking skills is essential for female middle school students, and utilizing a summer camp program with instructors can be beneficial The program employs various teaching tools, including computers, printouts, posters, and handouts, to enhance learning However, this approach is limited as it only accommodates female students and requires an annual budget, which restricts its reach to all middle school students across different states.

In regards to providing an online safety program, Shariff and Hoff [31] advocate the invention of “interactive online educational programs” to help the students know about ethics in technology

I-safe and E-safety programs aim to safeguard students from online threats through traditional school curricula However, a study evaluating the effectiveness of I-safe revealed that teachers often struggle with inadequate time to cover the program's materials during regular class hours While there is a noted improvement in students' knowledge about online safety, this does not translate into positive changes in their online behavior and is influenced by factors such as race, gender, and parental involvement.

Katz's "three-tier plan" for the E-safety program focuses on global messaging, support for abused recipients, and educational initiatives The first phase aims to develop essential tools, train "e-safety champions," and effectively communicate safety messages Previous iterations faced challenges, particularly regarding parental capability to educate children on online safety and the lack of application of learned concepts by participants Katz emphasizes the need for age-appropriate content integrated into educational curricula, along with obtaining feedback from participants Furthermore, it is crucial for parents and teachers to be well-versed in technology and safety protocols, while children should be educated on responsible online behavior to foster a safe digital environment.

A study on the E-safety program in Estonia reveals that many students lack a clear understanding of e-safety and often respond inappropriately to incidents Additionally, few schools have established e-safety policies, and police narratives within the program rarely address fraud The current regulations may lead teachers to rely solely on their own computers for presentations Social media continues to pose significant challenges in e-safety education Furthermore, the "Stop-Block-Tell" method for raising awareness is ineffective for children, indicating a need for updated, case-by-case procedural training.

NetSmartZ is an interactive online program designed to educate parents, educators, and students about Internet safety It features engaging videos, games, and tip sheets to guide students in navigating the online world The video section is particularly beneficial, showcasing real-life stories that highlight potential Internet threats However, the tip sheets lack comprehensive technical guidance, and while the games are entertaining, they do not effectively communicate the dangers teens may encounter online or how to avoid them.

OnGuardOnline is a federal government website offering comprehensive resources for parents and students to enhance online safety It provides detailed technical information primarily in text format, ensuring users can access valuable guidance for navigating the digital world securely.

Visualization is a popular method for teaching security awareness to computer science students, utilizing Macromedia's Flash software to illustrate concepts like packet sniffers, authentication architecture, and network attacks Researchers advocate for this approach, believing that visualization enhances learning experiences These tools are accessible online and can be utilized in both classroom settings and for self-directed study However, they are primarily designed for students with a foundational knowledge of computers A survey indicated high satisfaction levels among students who engaged with these visualization tools.

Video games like CyberCIEGE serve as valuable tools for teaching security awareness and training to the public This free, downloadable resource allows students to create virtual networking environments and explore potential threats based on their designs By engaging with various security scenarios, learners gain insights into the consequences of their choices while constructing their networks This interactive approach makes CyberCIEGE an effective supplement for teaching essential information security awareness.

Chapter 2 of the literature review discusses training programs designed for the general public using computers However, a significant limitation of these programs is that they require students to first learn the software before understanding the core objectives Additionally, these programs are not well-suited for middle school students, who would benefit more from simpler programs that incorporate storytelling and animations.

To effectively engage middle school students and address their unique challenges, a web-based interactive virtual program is essential Traditional classroom settings often fail to captivate all learners, with factors like shyness hindering participation The online program should incorporate Flash and video scenarios that highlight online threats and risks, using both fictional and real-world incidents to illustrate potential consequences Instead of merely advising students on avoiding harm, it should share impactful stories of those affected by cyber incidents, proving more effective than traditional guidance The program must also teach fundamental cyber protection strategies for smartphones and tablets, presented as procedural guidelines for popular websites Incorporating video games can enhance student understanding and attract interest in the program Additionally, student feedback should be collected and evaluated by program supervisors To ensure the program remains relevant, collaboration with security experts and families for developmental proposals is crucial, with awards for the best suggestions to encourage participation This comprehensive approach aims to safeguard students and their families from online threats.

METHODOLOGY

The goal of this research is to find answers to the following three questions in order to prove my thesis that students need to be educated about security awareness:

1 Does the use of technology have an influence on the crimes committed within the community of middle school students?

2 Do parents have a proper security awareness that supports their teens' safety when using the Internet?

3 What is the role of school districts in achieving a safe online environment for their students? What do they offer?

Middle school students primarily spend their time at home and school, making it essential to address security awareness in these environments Without adequate measures in place, students become vulnerable to various Internet threats.

To enhance security awareness among middle school students, it is essential to utilize quantitative data collection tools from diverse sources to answer each question effectively.

1 Does the use of technology have an influence on the crimes committed within the community of middle school students?

To address this inquiry, I will gather a random sample of police reports detailing incidents and crimes occurring in middle schools My focus will be on reports published by online newspapers.

In this study, conducted from January 2003 to June 2013, random samples of reports were analyzed, ensuring that they were not limited to technology-related incidents This approach allows for a broader understanding, as middle school students are not always involved in technology-related issues Once data collection is complete, the reports will be examined based on various factors to provide a comprehensive analysis.

Understanding the types of incidents related to technology use is crucial for identifying potential misunderstandings among students regarding regulations and laws This insight allows for an informed assessment of current school efforts in enforcing these regulations Additionally, determining whether students are suspects or victims is vital for tailoring educational approaches to their needs Investigating the relationship between technology use and incidents is important to gauge its negative impact on students Furthermore, assessing the involvement of school staff and parents in these incidents is essential, as many research studies and Internet safety programs engage them in the educational process Consequently, evaluating the qualifications of parents and school staff to effectively teach these subjects is imperative.

2 Do parents have a proper security awareness that supports their teens' safety when using the Internet?

To answer this question, I will conduct an anonymous online survey using SurveyMonkey, targeting Internet users The survey will be divided into three sections: the first will focus on general electronic device usage, the second will assess social media usage, and the third, which is optional, will be exclusively for parents regarding their children's Internet and social media habits Through the responses, I aim to evaluate participants' understanding of security awareness related to these topics.

3 What is the role of school districts in achieving a safe online environment for their students? What do they offer?

To effectively address Internet safety in schools, I will conduct interviews with 10 representatives from various school districts in Monroe County, New York The focus of these interviews will be on current security awareness plans and procedures implemented in schools, specifically examining whether these are presented in clear, step-by-step formats Additionally, it is crucial to assess how these procedures are applied in practice to determine if students have adequate resources or if further improvements are necessary.

The findings will help assess the current level of student awareness regarding existing efforts and tools Based on these results, I can evaluate whether teaching security awareness to middle school students will effectively reduce online threats.

RESULTS

Does the use of technology have an influence on the crimes committed within the community of

An analysis of 375 incident reports from online newspapers over the past decade revealed that 14% of incidents are linked to technology, while 24% do not involve technology Notably, 62% of the incidents remain unclear regarding technology's involvement The data indicates that threatening behavior is the most common, accounting for 29% of technology-related incidents, with assaults and gun possession at 18% and 15%, respectively Geographically, Florida has the highest incident rate at 16.8%, followed by Texas at 8.6% Additionally, incidents resulting in loss of life constitute 4%, whereas 96% are non-life-threatening Furthermore, 9.33% of incidents involve school staff as suspects, while 90.67% do not.

Figure 1: Incidents based on the use of technology

Figure 3: Incidents where technology is involved

Figure 4: Occurrence of the incidents in the States

Figure 6: Involvement of school staff in the incidents

Do parents have a proper security awareness that supports their teens' safety when using the Internet?

A recent survey revealed that Internet users generally possess adequate security awareness to safeguard themselves and their children from online threats Out of 150 participants, an impressive 94.5% reported consistent Internet usage, primarily through smartphones, which are commonly used to access social media platforms.

Figure 7: Analysis of using the Internet

Figure 8: Devices used to surf the Internet

Figure 9: Devices used to surf the social media websites

A significant portion of users, 33.9%, consistently leave their computers running when not in use, while 43% do so occasionally; in contrast, only 23.1% always shut down their devices after use Routers are often left on, with 69.4% of users keeping them active at all times, and 28.9% occasionally disconnecting them Additionally, 38.1% of social media users always sign off, and 32.4% do so sometimes It is crucial to disconnect network devices and power down electronics to mitigate potential cyber threats Signing off from social media accounts is essential to prevent unauthorized postings, particularly when accessing these platforms via smartphones, which may request access to personal data Users who overlook these permissions risk unwanted activity on their accounts.

Figure 10: Leaving the computers running when no longer in-use

Figure 11: Leaving the router running when no longer in-use

Figure 12: Signing-off from social media websites

Recent findings indicate that 53.4% of Internet users frequently engage with social media platforms Additionally, 64.5% of these users occasionally share updates about their daily lives, including photos Most users are aware of how to manage their privacy settings effectively Notably, 56.9% refrain from accessing social media on public computers or networks, while 36.7% do so occasionally Understanding these behaviors is crucial for assessing users' awareness of potential risks, such as inadvertently sharing sensitive information or the dangers posed by account hacking, which can lead to embarrassing situations for the account owner.

Figure 13: Surfing social media websites

Figure 14: Sharing daily life activities in social media websites

Figure 15: Knowledge of using the privacy controls of social media websites

Figure 16: Using social media websites from public computers/networks

A significant portion of Internet users have installed security tools on their computers, including anti-virus, anti-spyware, and firewalls Notably, 53.3% of users are aware of and customize the features of these tools, while 36.7% do not engage with these settings When it comes to email safety, 46.7% of users consistently inspect embedded links, and 40.2% do so occasionally Additionally, only 20.5% frequently check their browser history and cookies, with 57.4% inspecting them sometimes, while 19.7% never do Furthermore, 67.8% of Internet users can recall their personal passwords without needing to write them down, whereas 19.8% choose to record their passwords on paper.

Figure 17: Existence of security tools

Figure 18: Customizing the settings in security tools

Figure 19: Inspecting embedded links in emails

Figure 20: Inspecting the cookies and histories of web browsers

Installing security tools on electronic devices is crucial for protecting against Internet malware; without them, devices are at high risk of infection However, merely installing these tools is not enough; users must understand how to customize their settings to enhance security effectively Some software can alter security features without user awareness, leaving devices vulnerable Regularly inspecting browser history and cookies is recommended to help users monitor their online activities and identify any unusual behavior Additionally, examining embedded links in emails is essential to avoid falling victim to phishing scams, which often seek to steal sensitive information like passwords and credit card details.

Parents who participated in the online survey have their children in middle schools, elementary schools, and high schools with 29.7%, 24.8%, and 15.8% respectively as in Figure 22 The majority of

Chapter 4 RESULTS their children use the Internet with 48% while 43.9% sometimes use the Internet as in Figure 23 Most of the children who use the Internet stay online for no more than two hours at 48.8% 26.9% of children spend less than an hour on the Internet as in Figure 24 Children are likely to use home sharing computers as in Figure 25 Figure 26 shows that 56.4% of children who use the Internet surf social media websites while 40.4% do not Moreover, the majority of the children who use the Internet also use online games and online video games with 74.5% as in Figure 27

Figure 22: Children's level of education

Figure 23: Use of the Internet by children

Figure 24: Time spent by children on the Internet

Figure 25: Electronic devices used by children to surf the Internet

Figure 26: Children's usage of social media websites

Home computers, including desktops and laptops, are widely accessible and often shared among family members Each individual typically owns their own smartphone and tablet, enhancing personal connectivity and productivity Additionally, schools and libraries provide computers for public use, while internet cafés serve as communal spaces for accessing technology.

Which of the following devices do your kids most often use to connect to the Internet?(you may choose more than one answer)

Figure 27: Children's usage of online games

A significant 53.7% of users share their computers with family members, while 48.4% have multiple accounts on their devices Notably, 41.8% utilize administrative user accounts, indicating a trend towards higher access privileges Additionally, a concerning 58.2% of parents do not implement parental controls, highlighting potential risks in shared computer environments.

Figure 28: Sharing computers with family members

Figure 29: Using multiple accounts in computers

Figure 30: Working on administrative users

Figure 31: Using parental controls at homes

Implementing security guidelines at home is essential for the safe use of electronic devices and to reduce online threats A survey revealed that 40.6% of parents sometimes adhere to these security measures, while 39.6% consistently follow them.

32 The majority of them have already established their own security guidelines and rules at their homes with 74.7% as in Figure 33

Figure 33: Establishing security guidelines at homes

A recent survey revealed that 76.8% of parents have discussed Internet threats with their children When faced with technical issues or online threats, 45% of Internet users prefer to resolve the problems independently, while 40% seek assistance from experienced relatives or friends Additionally, 83.7% of parents indicated they would engage in conversations with their children to understand the underlying issues when such challenges arise.

Figure 34: Discussing the Internet threats with children

Figure 35: Internet users' reactions when they face technical issue or Internet threats

Figure 36: Parents' reactions when their children face technical issue or Internet threats

A recent survey on user preferences for presenting technical procedures revealed that 55.8% of respondents prefer formats that include pictures, while 23.3% favor video presentations.

Figure 37: Preferring the formats of technical procedures

What is the role of school districts in achieving a safe online environment for their students?

While I couldn't secure interviews with representatives from various school districts to gather insights on their online safety plans, I opted to explore two key websites commonly utilized as safety resources: Netsmartz.org and OnGuardOnline.com Analyzing these platforms revealed that they are widely adopted across numerous school districts, as indicated in Table 2 This article will delve into the specific focus areas of these websites and identify any gaps in their offerings.

Table 2: Preliminary findings in school districts' websites School district District materials Outside resources Projected to

Kids, blogs and too much information [43]

OnGuardOnline[38] Parents and students Rochester City

Netsmartz411[45] Parents and students Brighton Central

The Parent's Guide To Internet Safety[46]

Kids Safety[47] Students Pittsford Central

What Parents Should Know about BLOGS and Personal Website[49]

School district District materials Outside resources Projected to

Web 2.0 Tools and social Media[51]

NetSmartZ[37] Parents and students Internet Safety Tips for

Steps to Reduce Security Risks to Your Child[53]

NetSmartZ[37] Parents and students cyberAngels[54] Students

Internet Safety: Rules of the Road for Kids[55]

OnGuardOnline[38] Parents and students Preventbullying[56] Parent and students Hilton Central

NetSmartZ[37] Parents and students OnGuardOnline[38] Parents and students

School district District materials Outside resources Projected to

(parents/students) Information for Parents

East Irondequoit central school district

4.3.1 Overview of Netsmartz.org and OnGuardOnline.gov

Netsmartz serves as an excellent online educational resource, providing valuable materials for teachers to enhance classroom learning The website features age-appropriate videos, online games, and tip sheets that effectively raise awareness about safe Internet and social media use By encouraging students to think critically before engaging in online activities, Netsmartz plays a crucial role in promoting responsible digital behavior The video sections and tip sheets are particularly effective in reducing the risk of students becoming victims online However, it is important to note that Netsmartz lacks technical guidance on protecting personal computers and electronic devices Overall, the platform is instrumental in educating students on what to share and what not to post online, given their extensive social media usage.

Chapter 4 RESULTS of social media websites, but there are also other activities students may do online and seem to be not covered in Netsmartz such as online shopping

Nearly half of teenagers using the Internet, specifically 48%, have engaged in online shopping, raising concerns about their ability to identify scam websites Phishing emails often follow these transactions, posing additional risks For instance, students who shop on Amazon.com may receive deceptive emails prompting them to update their information or log in for special offers, leading to potential credential theft on counterfeit sites mimicking Amazon Given that Amazon stores sensitive credit card information, this could enable attackers to make unauthorized purchases Similarly, both parents and students may mistakenly believe that well-known platforms like PayPal provide complete protection against online fraud To effectively combat these threats, students and their parents require enhanced technical knowledge and practical examples.

Incorporating education on governmental policies and laws into online programs for parents, students, and school staff is essential Many students mistakenly believe they can post threats online without consequences, leading to serious repercussions, as evidenced by reports indicating that 13% of arrests stem from such threats Additionally, illegal sharing of copyrighted material poses legal risks for students To address these issues, Netsmartz should provide tip sheets and videos that highlight these dangers While school staff may appear to understand the relevant laws, a dedicated section for ongoing education is crucial, especially considering that 9.33% of incidents involve school staff as suspects and 4.80% relate to technology use These statistics, though seemingly minor, raise significant concerns about trust and the comprehension of regulations among school personnel.

Netsmartz provides valuable tips for parents on monitoring their children's online activities but lacks detailed technical guidance on implementing these suggestions For instance, while they recommend using parental filtering for web surfing, they do not offer practical instructions on how to set it up This can make it challenging for parents to effectively add parental controls to their electronic devices.

OnGuardOnline is a valuable security awareness resource that complements Netsmartz by offering technical tips aimed at avoiding scams and recognizing phishing emails, which are particularly beneficial for online shoppers The website also includes sections on the basic security of smartphones, PCs, and laptops, making it a comprehensive learning tool from a security standpoint However, much of the content is presented in plain text, lacking the detail, examples, and visuals that users desire An online survey revealed that 55.8% of participants prefer technical procedures to be illustrated with pictures, while 23.3% favor video formats Specific sections, such as securing computers and protecting children online, require more practical guidance; for instance, while parental controls are recommended, no specific products or implementation steps are provided Similarly, while OnGuardOnline encourages the installation of security software, it lacks detailed instructions Conversely, the site does offer some useful video content for managing routers from popular brands Overall, computer users would greatly benefit from more detailed and conveniently presented directions.

DISCUSSION

Recent incident reports suggest that technology plays a minimal role in crimes involving middle school students, with many incidents categorized as unclear While it's likely that most incidents are related to technology, the data collected does not encompass all occurrences from the past decade, highlighting the need for collaboration with police departments nationwide Additionally, factors such as the availability of internet access in the United States may contribute to the low incidence of technology-related incidents.

A report by the United States Census Bureau reveals significant disparities in Internet connectivity across different states, with classifications based on the national average of 27% The findings categorize states as above, at, or below this average Additionally, the report highlights smartphone usage in the U.S., with an average of 48.2%, using similar classifications based on access from homes and other locations.

Figure 38: Internet connectivity in the United States 2011 [62]

Despite expectations that states with lower-than-average user connections would experience fewer technology-related incidents, my findings reveal a surprisingly high occurrence of such incidents across these states Table 3 illustrates the distribution of technology-related incidents by state, aligned with US census classifications Furthermore, Figure 40 highlights the number of states experiencing these incidents, while Figure 41 details the total incidents categorized by census classifications Notably, states classified as having “no significant difference” report the highest number of technology-related incidents.

Table 3 : Classifying US States and incidents based on the Internet connectivity

US State Abbreviation Number of incidents

US State classification according to the US census 2011

Rhode Island RI 3 No difference

Figure 40: Occurrence of US States with the classification of US census

Figure 41: Occurrence of incidents based on the classification of the US census

Category of the US States involoved in incidents that related to the use of technology( based on the US Census categories) lower no difference higher

Occurence of incidents that related to technology

-categorized based on US Census) lower no difference higher

The analysis of smartphone-related incidents reveals that the highest occurrences are found in states categorized as lower consumers of smartphones, as illustrated in Table 4 and supported by Figures 39, 42, and 43.

Figure 42: Occurrence of US states based on the smartphone consumption

Figure 43: Incidents occurrence based on the smartphone consumption

Category of the US States involoved in incidents that related to the use of technology( based on the US Census categories for smartphones) lower no differnece higher

Occurence of incidents that related to technology -categorized based on US Census for smartphones lower no difference higher

Table 4: Incidents that related to the technology based on the smartphones classification

US State Abbreviation Number of incidents

US State classification according to the US census 2011

Rhode Island RI 3 No difference

South Carolina SC 2 No difference

The latest US census report suggests a correlation between technology usage incidents and connectivity levels, indicating that states with above-average connectivity experience fewer technology-related incidents Interestingly, despite assuming that most incidents would involve smartphones, states with higher smartphone consumption reported a surprisingly low number of such incidents.

The increasing reliance on technology may lead to a rise in incidents over time, potentially becoming a significant concern for the nation According to US census data, internet usage has steadily increased, highlighting the growing prevalence of technology in daily life.

In 2011, 71.7% of the population connected to the Internet, a significant increase from 54.7% in 2003, according to US census data My analysis of incidents based on their occurrence year aligns with this trend, as evidenced by Figure 45, which indicates that incidents in 2013 are at their highest, despite being only mid-year This suggests that the overall trend of incidents is on the rise, highlighting a growing concern Although my sample reflected a small percentage of incidents linked to technology use, it underscores the need for enhanced security awareness and measures, as current efforts are insufficient to curb this escalating issue.

Figure 44: Household computer and Internet use 1984-2011[62]

Figure 45: Involvement of technology in incidents per year

Survey results indicate that many internet users, particularly parents, may lack adequate technical knowledge despite their self-reported confidence Most parents primarily use smartphones for web browsing and social media, which are inherently vulnerable to various security threats App developers often prioritize user-friendliness over security, increasing the risk for users Given that parents frequently engage in online activities via smartphones, their sensitive information, including personal photos and locations, is at risk of being compromised This vulnerability extends to children as well, with 43% of them accessing the internet on their own smartphones, further heightening concerns about online safety.

Many children access the Internet from shared home computers, yet a significant number of parents neglect to implement parental controls, leaving kids vulnerable to inappropriate content Research indicates that children can easily search for harmful information, especially when experiencing strong emotions While most parents acknowledge the importance of security measures, they often fail to utilize parental controls effectively Alarmingly, 41.8% of Internet users operate their computers with administrative privileges, allowing children to alter security settings This misuse increases the risk of exposure to harmful content, particularly since many parents do not shut down their devices after use, further compromising the system's security.

The involvement of school staff in technology-related incidents raises concerns about their knowledge of technology and security awareness Although staff involvement is relatively low at 9.33%, 4.8% of these incidents specifically relate to technology use Notably, 35% of all technology-related incidents involve school staff as suspects, highlighting the critical need for collaboration between school staff and students in promoting online security awareness.

Figure 46: Incidents where school staff was involved

RECOMMENDATIONS

Middle school students require a comprehensive resource that employs various visualization methods to educate them about safety procedures and the common policies in school districts, along with the consequences of neglecting these protocols Research indicates that many incidents highlight students' misunderstandings of school safety policies To effectively assess their comprehension, video games can play a crucial role Websites focused on Internet safety, like Netsmartz, offer games that promote security awareness, yet these often lack practical examples and detailed procedures It is essential for students to engage in games that not only test their grasp of concepts but also their ability to apply them in real-life scenarios For instance, rather than merely providing tips on password management, games should challenge students to create and evaluate the strength of their passwords to enhance their understanding of security measures.

A multilingual program is essential, as approximately 29.5% of households in New York State speak languages other than English and struggle with English proficiency, according to the United States Census Bureau If parents cannot read and understand English well, they may not fully benefit from safety programs, which hampers their ability to teach their children proper safety procedures The New York State Department of Motor Vehicles addresses this issue by offering information in multiple languages to help reduce accidents Given that online threats are as critical as physical accidents, creating a multilingual environment for students and their families is crucial.

Incorporating school staff and parents into the online educational program is essential, as findings indicate a lack of sufficient knowledge among both groups regarding technical procedures and relevant public laws.

Expert, student, school staff, and parent feedback, combined with regular contests and awards, is essential for continuously improving and updating educational programs By leveraging audience insights, any misunderstandings in lessons can be effectively addressed and enhanced.

CONCLUSION AND FUTURE WORK

The integration of technology in education offers significant benefits, allowing students to learn beyond traditional classroom settings However, it also poses potential risks, particularly when online services are used without adequate security awareness Research highlights the necessity for middle school students to receive education on security awareness through an accessible online interactive program, which can mitigate online threats Findings indicate that students, parents, and school staff require a unified source of information that encompasses essential concepts and technical procedures, ideally presented through text, images, or video formats The increasing incidents involving technology among middle school students raise concerns, as these incidents correlate with the growing accessibility of the Internet and the diverse usage of electronic devices for online activities.

The study faced several limitations, primarily stemming from the assumption of collecting at least 700 incidents, which was not met due to challenges in accessing archived news Additionally, many reports lacked the necessary information to categorize them based on technology involvement For a more comprehensive analysis, collaboration with police departments is essential to obtain accurate and detailed reports.

The inability to secure interview appointments with school district representatives may be attributed to the summer timing of the research, as many employees were likely on vacation Future research should focus on interviewing school district representatives, school staff, and middle school students to identify existing gaps and areas for improvement.

Chapter 7 CONCLUSION AND FUTURE WORK

Further research is essential to explore the necessary efforts in the field of e-commerce, particularly in how online organizations gather and analyze user data during internet browsing and online purchases By leveraging these data collection techniques, online retailers can tailor their merchandise displays to align with user preferences Similarly, applying these methods to monitor students' online activities can enhance their safety by alerting them to potential threats Additionally, this approach can provide insights into their current usage patterns, guiding improvements for future research and support.

[1] R Kellough and N Kellough, Middle school teaching: A guide to methods and resources ERIC,

[2] J A Corrigan, “The implementation of e-tutoring in secondary schools: A diffusion study,”

Computers & Education, vol 59, no 3, pp 925 – 936, 2012 [Online] Available: http://www.sciencedirect.com/science/article/pii/S036013151200070X

The article by D L Lowther et al examines the effectiveness of technology integration in education when significant barriers are eliminated Published in Educational Media International, it analyzes how removing obstacles impacts the successful implementation of technology in learning environments The study highlights the importance of addressing these barriers to enhance educational outcomes and provides insights into best practices for integrating technology in classrooms For further reading, the article can be accessed online through the provided link.

In 2010, the National Center for Education Statistics published a report titled "Educational Technology in US Public Schools: Fall 2008," authored by L Gray, N Thomas, and L Lewis This report provides an insightful overview of the state of educational technology in public schools across the United States as of Fall 2008 For further details, the full report can be accessed online at the ERIC website.

Technology significantly influences student learning by enhancing engagement, facilitating personalized education, and providing access to diverse resources It allows for interactive and collaborative learning experiences, fostering critical thinking and problem-solving skills Furthermore, technology equips educators with tools to track student progress and adapt instruction to meet individual needs, ultimately improving educational outcomes.

[6] J Lehmarai, “The impact of online learning on the middle school student,” Thesis, 2009 [Online] Available: http://www2.uwstout.edu/content/lib/thesis/2009/2009nehrj.pdf

[7] K Stacy Teicher, “Not just 4 texting: 1 in 3 middle-schoolers uses smart phones for homework,” p 10, 2012 [Online] Available: http://search.proquest.com.ezproxy.rit.edu/docview/1220717477?accountid8

[8] J Roschelle, N Shechtman, D Tatar, S Hegedus, B Hopkins, S Empson, J Knudsen, and L P Gallagher, “Integration of technology, curriculum, and professional development for advancing middle

BIBLIOGRAPHY school mathematics: Three large-scale studies,” American Educational Research Journal, vol 47, no 4, pp 833–878, 2010 [Online] Available: http://aer.sagepub.com/content/47/4/833.abstract

In their 2009 study published in the Journal of Research on Technology in Education, Hernández-Ramo and De La Paz explore the effectiveness of project-based learning in middle school history education through multimedia design The research highlights how engaging students in creating multimedia projects enhances their learning experience and understanding of historical concepts The full article can be accessed online for further insights into this innovative educational approach.

A study by Lee et al (2010) published in the Journal of Research in Science Teaching explores the effects of technology-enhanced inquiry science units on classroom learning The research, found in volume 47, issue 1, pages 71-90, investigates how these innovative educational tools influence student engagement and understanding in science For further details, the article is accessible online through the provided link.

[11] Anonymous, “Fischer middle school, IBM and Wyse technology enhance student performance through desktop cloud technology,” 2010 [Online] Available: http://search.proquest.com.ezproxy.rit.edu/docview/744652318?accountid8

[12] K A Rappa, “A case study exploring the transition to middle school from the perspective of students,” Ph.D dissertation, 2012 [Online] Available: http://search.proquest.com.ezproxy.rit.edu/docview/1015171181?accountid8

A study by Lenhart et al (2010) from the Pew Internet & American Life Project highlights the significant use of social media and mobile internet among teens and young adults The report provides insights into how these platforms shape communication and social interactions in this demographic For more detailed findings, the full report is available online.

[14] K.-L Hui, H H Teo, and S.-Y T Lee, “The value of privacy assurance: an exploratory field experiment,” MIS Q., vol 31, no 1, pp 19–33, Mar 2007 [Online] Available: http://dl.acm.org/citation.cfm?id 17327.2017330

[15] K F Durkin, “Misuse of the internet by pedophiles: Implications for law enforcement and probation practice,” Federal Probation, vol 61, no 3, p 14, 1997 [Online] Available:

BIBLIOGRAPHY http://ezproxy.rit.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&dbh&AN965 2&site=ehost-live

[16] E M Alexy, A W Burgess, and T Baker, “Internet offenders: Traders, travelers, and combination trader-travelers,” Journal of Interpersonal Violence, vol 20, no 7, pp 804–812, 2005 [Online]

Available: http://jiv.sagepub.com/content/20/7/804.abstract

[17] C Atkinson and D Newton, “Online behaviours of adolescents: Victims, perpetrators and web 2.0,” Journal of Sexual Aggression, vol 16, no 1, pp 107–120, 2010 [Online] Available: http://www.tandfonline.com/doi/abs/10.1080/13552600903337683

[18] A V Beale and K R Hall, “Cyberbullying: What school administrators (and parents) can do,” The Clearing House, vol 81, no 1, pp 8–12, Sep 2007 [Online] Available: http://search.proquest.com.ezproxy.rit.edu/docview/196893089?accountid8

[19] T L Beran, “Cyber-harassment: A study of a new method for an old behavior.” Journal of

Educational Computing Research, vol 32, no 3, pp 265 – 277, 2005 [Online] Available: http://ezproxy.rit.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=tfh&AN3031 16&site=ehost-live

[20] B Belsey, “Cyberbullying: An emerging threat to the “always on” generation,” Retrieved January, vol 16, p 2007, 2005 [Online] Available: http://www.cyberbullying.ca/pdf/Cyberbullying_Article_by_Bill_Belsey.pdf

School bullying among adolescents in the United States encompasses various forms, including physical, verbal, relational, and cyberbullying This multifaceted issue is explored in depth in the study by Wang, Iannotti, and Nansel, published in the Journal of Adolescent Health The research highlights the prevalence and impact of these bullying behaviors on youth, emphasizing the need for comprehensive strategies to address and mitigate the effects of bullying in schools Understanding these dynamics is crucial for fostering a safer and more supportive educational environment for all students.

[22] “Parents: Cyber bullying led to teen’s suicide - ABC news,” 2009 [Online] Available: http://abcnews.go.com/GMA/story?id882520&page=1

In the digital landscape, distinguishing between hackers, crackers, and script kiddies is crucial for understanding cybersecurity dynamics M Fitzgerald's article on ExtremeTech.com delves into this distinction, shedding light on the roles and motivations of these individuals in the ongoing battle of good versus evil online By exploring their behaviors, the article aims to equip readers with the knowledge needed to navigate the complexities of internet security For more insights, visit the full article [here](http://search.proquest.com.ezproxy.rit.edu/docview/213775813?accountid8).

[24] B O’Brien, “Catching the ’script kiddies’: Focus: Student hackers,” Apr 21 2008 [Online]

Available: http://search.proquest.com.ezproxy.rit.edu/docview/465429639?accountid8

[25] J Washington, “Brief: Virginia Beach teen charged with making internet school threat,” May

16 2008 [Online] Available: http://search.proquest.com.ezproxy.rit.edu/docview/465165405?accountid8

[26] The, “Middle-school student arrested in school shooting plot,” p D.5, 2008

[27] Y Beau, “Fontana middle student arrested after locker room explosion,” 2013 [Online] Available: http://www.highbeam.com/doc/1P2-34105648.html

[28] M Lynch and D Cicchetti, “Children’s relationships with adults and peers: An examination of elementary and junior high school students,” Journal of School Psychology, vol 35, no 1, pp 81 – 99,

1997 [Online] Available: http://www.sciencedirect.com/science/article/pii/S0022440596000313

[29] M Stansell-Gamm, “There’s one more talk you need to have,” pp 14–15, Sep 15 2003 [Online] Available: http://search.proquest.com.ezproxy.rit.edu/docview/214285900?accountid8

[30] K Stewart and N Shilingford, “Cybergirls Sumer camp: Exposing middle school females to

Internet security,” University of Minnesota-2011 Colloquium Abstracts & Papers, 2011 [Online]

Available: http://www.cehd.umn.edu/STEM/colloquium2011/docs/Shillingford,%20Stewart.pdf

[31] S Shariff and D Hoff, “Cyber bullying: Clarifying legal boundaries for school supervision in cyberspace,” International Journal of Cyber Criminology, vol 1, no 1, pp 76–118, 2007 [Online] Available: http://www.cybercrimejournal.com/shaheenhoff.pdf

[32] “i-SAFE - the leader in e-safety education solutions.” [Online] Available: http://isafe.org/wp/

[33] “Schools e-safety policy.” [Online] Available: https://www.policy.esafety.org.uk/default.cfm?pid&pcid=2

[34] S Chibnall, M Wallace, C Leicht, and L Lunghofer, “I-safe evaluation,” Final report, 2006

[Online] Available: https://www.ncjrs.gov/pdffiles1/nij/grants/213715.pdf?q=evaluation

[35] A Katz, “Cyberbullying and E-safety: What Educators and Other Professionals Need to Know.” London, GBR: Jessica Kingsley Publishers, 2012 [Online] Available: http://site.ebrary.com/lib/rit/docDetail.action?docID572463

[36] B Lorenz, K Kikkas, and M Laanpere, “Comparing children’s e-safety strategies with guidelines offered by adults,” Electronic Journal of e-Learning, vol 10, no 3, pp 326–338, 2012 [Online]

Available: http://www.ejel.org/issue/download.html?idArticle!1

[37] “Netsmartz workshop,” 2013 [Online] Available: http://www.netsmartz.org/Parents

[38] “OnGuardOnline,” 2013 [Online] Available: http://www.onguardonline.gov/

[39] X Yuan, P Vega, Y Qadah, R Archer, H Yu, and J Xu, “Visualization tools for teaching computer security,” Trans Comput Educ., vol 9, no 4, pp 20:1–20:28, Jan 2010 [Online] Available: http://doi.acm.org/10.1145.1656255.1656258

[40] B D Cone, C E Irvine, M F Thompson, and T D Nguyen, “A video game for cyber security training and awareness,” Computers & Security, vol 26, no 1, pp 63 – 72, 2007 [Online] Available: http://www.sciencedirect.com/science/article/pii/S0167404806001556

[41] “Cyberciege educational video game.” [Online] Available: http://cisr.nps.edu/cyberciege/

[42] “Parent guide to internet safety,” 2013 [Online] Available: http://www.fbi.gov/stats- services/publications/parent-guide/parent-guide

[43] B Sullivan, “Kids, blogs and too much information,” NBCNEWS.com, 2005 [Online]

Available: http://www.nbcnews.com/id/7668788/ns/technology_and_science-security/t/kids-blogs-too- much-information/

[44] “Safekids.com | online safety & civility,” 2013 [Online] Available: http://www.safekids.com/

[45] “Netsmartz411 -internet safety helpdesk.” [Online] Available: http://www.netsmartz411.org/

[46] “The parent’s guide to internet safety,” 2013 [Online] Available: http://familyinternet.about.com/

[47] “Kids safety,” 2013 [Online] Available: http://www.fbi.gov/fun-games/kids/kids-safety

[48] “Nsteens - making safer online choices,” 2013 [Online] Available: http://www.nsteens.org/

[49] J Cimmerer, “What parents should know about blogs and personal websites,” 2013 [Online] Available: http://www.pittsfordschools.org/files/16297/BLOGS%20Article%20Cimmerer.pdf

[50] J Cimmerer, “Youth behavior online,” 2013 [Online] Available: http://www.pittsfordschools.org/files/16297/Cyberbullying%20jeff%20cimmerer.pdf

[51] J Cimmerer, “Web 2 tools and social media,” 2013 [Online] Available: http://www.pittsfordschools.org/files/16297/Web%202%20tools.pdf

[52] “Parents-internet safety tips for teens,” 2013 [Online] Available: http://www.fairport.org/parents.cfm?subpage=4

[53] “Safety & security,” 2013 [Online] Available: http://www.fairport.org/parents.cfm?subpage85

[54] “Cyberangels internet safety program,” 2013 [Online] Available: http://www.cyberangels.org/

[55] L Perle, “Internet safety: Rules of the road for kids | common sense media,” 10/3/2010 [Online] Available: http://www.commonsensemedia.org/advice-for-parents/rules-road-kids

[56] “Preventbullying,” 2013 [Online] Available: http://www.preventbullying.net/

[57] H C S District, “Cyber safety video,” 2013 [Online] Available: http://www.hilton.k12.ny.us/info/cybersafetyvideo.htm

[58] “Hcsd cyber safety,” 2013 [Online] Available: http://www.hilton.k12.ny.us/info/cyber-safety.htm

[59] “Cosgrove parents,” 2013 [Online] Available: http://www.spencerportschools.org/cosgrove_middle.cfm?subpageT76

[60] “Cosgrove students,” 2013 [Online] Available: http://www.spencerportschools.org/cosgrove_middle.cfm?subpageT45

[61] “Video on demand,” 2013 [Online] Available: http://www.hflcsd.org/parents.cfm?subpageG6977

[62] T File, “Computer and internet use in the united states,” Report, May 2013 2011 [Online]

Available: http://www.census.gov/prod/2013pubs/p20-569.pdf

[63] M Wọhlisch, S Trapp, J Schiller, B Jochheim, T Nolte, T C Schmidt, O Ugus,D.Westhoff, M Kutscher, M Kỹster, C Keil, and J Schửnfelder, “Vitamin c for your smartphone: the skims approach for

Ngày đăng: 22/10/2022, 20:45

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w