Next, the researcher will conduct a query of the computer awareness of education administrators, teachers, parents, and students in the New Orleans school district, then evaluation of documented data will provide a research base of the required elements needed to consider while developing a framework that can be used as a guide by educational leaders and parents for the protection of children at school and at home. Research areas will include law enforcement agencies, various information systems security sites that provide security solutions that can be implemented in schools and in the home, other avenues of research will include interviews with a multitude of technical personnel proficient in hardware, software and network technology utilized for computer security.
The purpose of this dissertation is to provide recommendations from experienced practitioners of detailed, hands on instruction or guides that even the computer illiterate parent or senior caregiver can use to set up a home computer in the most secure mode available. Research areas will include various Information Systems Security sites and discussions with a multitude of technical personnel proficient in the security of hardware, software and network technology. These sources will support a Delphic study designed to develop safety recommendations for using computers in home environments where minors are present.
The results of the study will contain a systematic instructional guide, a tool that one can use to establish a computer system in as secure a mode as possible. The dissertation will also include a detailed listing of available security hardware and application software with installation details as to how to better utilize the hardware and software security features. A Delphi study research approach engaging administrators, educators, librarians, and parents in the Louisiana school districts who are expert in computer use and safety measures will provide an enhanced understanding of a growing problem that has developed into potential threats to the safety of our nation's youth. Findings resulting from the Delphi study will provide a framework and heighten awareness, thus equipping responsible adults with the tools required to minimize the potential internet predator risks. Change implementation of computer environments in the Louisiana school districts is dependent upon the outcome of the interviews and observations conducted during this research.
According to Linstone & Turoff (2002) "Delphi may be characterized as a method for structuring a group communication process so that the process is effective in allowing a group of individuals, as a whole, to deal with a complex problem." (p 5) given the explanation provided by Linstone and Turoff in regards to the Delphi research method the goal of the research results is to provide valuable information that educators and parents can utilize while providing internet access for our students, technology is a way of life that students in the classrooms today must continue to understand and utilize as a research tool to learn more about our world.
To grasp a better understanding of the technological understanding of students, educators and parents, it is essential to implement a process in which one can obtain insight into the technological skills of students, according to Lang (n.d.):
The Conventional Delphi has two main functions. That is forecasting and estimating unknown parameters and is typical of Delphi as it was originally conceived. It is used to determine consensus on forecasting dates and developments in many areas - but particularly in the area of long-term change in the fields of science and technology. By estimating unknown parameters, respondents make their own estimates regarding the expected levels of an activity relative to present levels. The Policy Delphi on the other hand, does not aim for consensus but seeks to generate the strongest possible opposing views on the resolution of an issue and to table as many opinions as possible. The objective is for it to act as a forum for ideas and to expose the range of positions advocated and the pros and cons of each position (Bjil 1992). And finally the Decision Delphi is utilized to reach decisions amongst a diverse group of people with different investments in the solution. (p 3)
Significance of the Study
Research will assist administrators, educators, librarian, and parents in gaining a better understanding of the potential risks of children accessing the Internet unprotected and unsupervised. Additionally, heightened...
Currently it is the intent of the researcher to conduct further investigation of this concern by utilizing a modified Delphi study.
Nature of the Study
According to one authority, "The Delphi technique has been described as 'a method for structuring a group communication process so that the process is effective in allowing a group of individuals, as a whole, to deal with a complex problem" (¶ 1) "...features of a Delphi procedure are an expert panel; a series of rounds in which information is collected from panelists, analysed and fed back to them as the basis for subsequent rounds; an opportunity for individuals to revise their judgements on the basis of this feedback; and some degree of anonymity for their individual contributions." (¶ 4). In their book, Task Analysis and Instructional Design, Hannum, Jonassen and Tessmer (1999) report that, the Delphi technique is a structured group interview technique for seeking consensus among a group about ideas, goals, or other issues. The Delphi technique is often used in forecasting needs, predicting outcomes, and predicting the future. This technique is intended to produce convergence of group opinion and reduce error inherent in individual opinions" (p. 267). The Delphi technique requires an iterative approach so that the initial analysis of group responses are provided to all group participants who then examine the results and subsequently respond another time in a subsequent round; based on this iterative approach, a group consensus is typically reached (Hannum et al., 1999).
To what extent are educational leaders, teachers, and parents aware of potential risks to children during unprotected and unsupervised access to the Internet? Heightened awareness of potential predator risks to children while accessing the Internet unsupervised and unprotected is a vulnerability that will become a reality through further investigation of the issue. Through research utilizing a phenomenal approach the potential risks and their consequences of the issues will then exist in the minds of all concerned, providing substantial significance and heightened sensitivity to the issues addressed, this accomplished through emphasizing a focus on the subjective experiences and enlightened understanding of the issues in the minds of administrators, educators, librarians and parents.
What concerns do computer aware parents and teachers have about child safety on the internet
Do computer aware parents and teachers currently apply strategies and make adaptations to improve safety for children online?
What suggestions can computer aware teachers and parents make about improving child safety online?
Do computer aware parents and teachers recommend any changes in the way the children use the internet in schools and in the home?
How do computer aware parents and teachers envision the future use of the internet by children in the home and at school?
The conceptual framework used for this study was an exploratory approach. According to Atkinson (1995), an "exploratory methodology is designed to uncover aspects of data that should generate questions" (p. 77). Furthermore, Thomas (1998) emphasizes that an exploratory research methodology may provide the researcher with some serendipitous findings: "Some studies qualify as exploratory investigations because the researchers are guided only by very general questions rather than by specific hypotheses to test or precise questions to answer. As a consequence, interpretations of exploratory studies often include unanticipated conclusions" (p. 268).
Definition of Terms
Computer Crimes. The U.S. Department of Justice broadly defines computer crime as "any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution"; because of the diversity of computer-related offenses, a narrower definition would not be adequate (Kim, Lusthaus & Wallace, 2005).
CME. Center for Media Education.
CEOS. Child Exploitation and Obscenity Section.
DOJ. Department of Justice.
FTC. Federal Trade Commission.
For the purposes of this study, it will be assumed that all children of eligible age will be enrolled in a school appropriate for their age and learning levels; it will also be assumed that these students have some level of access to the Internet, and that some of this access will not be entirely supervised by adults.
Although the general scope of this study will extend to predation of children online in the United States and other countries, the primary focus will remain on the U.S.
This chapter introduced the topic under consideration, the importance of its investigation and what problems would be addressed, including the significance, nature and scope of the proposed study. The study's guiding research questions and rationale were followed by a description of the study's assumptions and scope. Chapter two below provides a critical review of the peer-reviewed and scholarly literature concerning current trends in…
Atkinson, E.N. (1995). Interactive dynamic graphics for exploratory survival analysis. The American Statistician, 49(1), 77.
Barker, C., & Groenne, P. (1996). Advertising on the World Wide Web. [online]. Available: http://www.samkurser.dk/advertising/research.htm[1998, April 6].
Bever, T.G., Smith, M.L., Bengen, B., & Johnson, T.G. (1975). Young viewers' troubling response to TV ads. Harvard Business Review, 54, 109-120.
Cai, X., & Gantz, W. (2000). Online privacy issues associated with Web sites for children. Journal of Broadcasting & Electronic Media, 44(2), 197.
Center for Media Education. (1996a). "And now a Web from our sponsor": How online advertisers are cashing in on children. [online]. Available: http://tap.epn.org/cme/infoactive/22/22nweb.html#advertising [1998, March 5].
Center for Media Education. (1996b). Children's advocacy group asks federal trade commission to act against deceptive Internet site targeting children. [online]. Available: http://tap.epn.org/cme/cme_pubs.html [1998, September 12].
Center for Media Education. (1996c). Guidelines for the collection and tracking of information from children on the global information infrastructure and in interactive media. [online]. Available: http://tap.epn.org/cme/cmgltx.html#statement[1998, March 5].
Children's Advertising Review Unit. (1997). CARU's self-regulatory guidelines for children's advertising. [online]. Available: http://www.bbb.org/advertising/caruguid.html[1998, March 2].
Clinton, B., & Gore, a. (1997, July). A framework for global electronic commerce. [online]. Available: http://www.iitf.nist.gov/eleccomm/ecomm.htm[1998, June 30].
Coyne, C. (1998, May 7). DMA net.marketing conference showcases Internet marketing. [online]. Available: http://www.the-dma.org.[1998, June 26].
Direct Marketing Association. (1997). Responsibly conquer a new frontier with the DMA's marketing online privacy principles and guidance. [online]. Available: http://www.thedma.org/busasst6/busasst-onmarkprivpr6a7.shtml[1998, April 3].
Information Center. (1998, June 23). Reports find little privacy among marketing members: Self- regulation in doubt. [online]. Available: http://www.epic.org/Reports/pr_surfer_beware2.html [1998, June 26].
Federal Trade Commission. (1997, December 13). FTC surfs children's Web sites to review privacy practices: Most are collecting data on kids; few see parental approval. [online]. Available: http://www.ftc.gov/opa/1997/9712/kids.htm[1999, March 9].
Federal Trade Commission. (1998, June 4). Privacy online: A report to Congress. [online]. Available: http://www.ftc.gov/reports/privacy3[1998, June 4].
Festinger, L. (1997). Cognitive Dissonance Theory. Third Edition of a First Look at Communication [Online Version]. Retrieved, at http://www.afirstlook.com/archive/cogdiss.cfm.
Graphic, Visualization, & Usability Center (GVU). (1999). GVU's 10th WWW.usersurvey. [online]. Available: http://www.cc.gatech.edu/gvu/user_surveys/survey-1998-101[1999, March 8].
Green, J. (1997). Predators hide behind the computer screen. Retrieved April 24, 2004, at http://www.infinex.com/~buddha/northstar/articles/997/november/features/predators.html
Information Infrastructure Task Force. (1995, June 6). Privacy and the national information infrastructure: Principles for providing and using personal information. [online]. Available: http://www.iitf.nist.gov/ipc/ipc/ipc-pubs/niiprivprin_final.html [1998, June 29].
Lang, T. (n.d.) an overview of four futures methodologies: Delphi, environmental scanning, issues management and emerging issue analysis. Retrieved February 3, 2007 at http://www.soc.hawaii.edu/future/j7/LANG.html.
Les, B. (2005) Guidelines on internet access for children and parents. Retrieved February 6, 2007 at http://www.lesbell.com.au/Home.nsf/web/Guidelines+on+Internet+Access+for+Children+and+Parents/.
Linstone, H.A. & Turoff, M. (2002) the delphi method. Retrieved January 5, 2007 at http://www.is.njit.edu/pubs/delphibook/index.html.
NetLingo (n.d.). Online Lingo. Retrieved June 17, 2006, at http://www.netlingo.com/emailsh.cfm.
Online Privacy Alliance. (1998, June 22). Online Privacy Alliance will serve as vanguard of industry efforts to protect privacy in cyberspace. [online]. Available: http://www.privacyalliance.org/news/06221998.shtml[1998, June 23].
Online Privacy Alliance. (1998, June 22). Principles for children's online activities. [online]. Available: http://www.privacyalliance.org/kidsprivacy[1998, June 23].
Pew Research Center (1999). Technology 1998. [online] Available: http://www.people-press.org/tech98mor.html. [1999, January 26].
Pieper, K. (1998, June 11). Special ClikZ report: Online privacy. [online]. Available: http://www.searchz.com/clickz/061198.html[1998, June 15].
Pitofsky, R. (1998, September 23). Protection of children's privacy on the World Wide Web. [online]. Available: http://www.ftc.gov/os/1998/9809/priva998. html. [1999, March 10].
The Guardian Angel (n.d.). The resource for internet safety and privacy protection for kids and adults. Retrieved April 24, 2004, at http://www.theguardianangel.com/computersecurity.html.
Underhill, N. (March 2004). The Delphi method. Retrieved May 29, 2006, from http: / / 184.108.40.206/search?q=cache:JJnTikZS8_UJ: www.britishcouncil.org/learning-innovation-awards-delphi+Method%22+and+%22Underhill%22&h1=en.
Wire Safety (n.d.). predators online [website item]. Retrieved March 4, 2005, at http://www.wiredsafety.org/media/pr/predatorsonline.html
Adult Day Care Industry ABC Adult Day Care will be a mid-sized company, which will provide adult day care services to the residents of Boston. This mid-sized adult care facility will serve adults aged fifty years and above. It will provide community-based day health services for the elderly and disabled. Services offered include living assistance, nursing, therapy, meals, and social activities. Their services will be secure and safe, presenting the elderly
Marketing Strategies: Adult Pleasure Toys and Lingerie This report discusses the presence of a company that produces adult toys and lingerie. There are several parts to this analysis. First, the report examines the market segment and defines the target customer according to several types of segmentation. For a complete understanding of the targeted market, the report chose psychographic segmentation, demographic segmentation, behavioral segmentation and benefits sought segmentation. The choice for these methods
(Colorado Department of Human Services (CDHS), 2011) Recommendations Even though, the services provided by the Colorado division of child welfare are of satisfactory quality but there are certain areas on which the Colorado division of child welfare has to work in order to enhance the quality of its programs and services. The Colorado division of child welfare shall opt for a more facilitated and properly administered organizational structure as this would
The case study chosen includes a service user who has experienced cut-off and negligence from his relatives, friends and family especially during his childhood period. He has ever since longed to have contact or an attachment with a family securely. His condition has brought about anxiety which has made him unsettled. If the student is placed in an adult learning disability team whose role is to support adults with learning
Distance learning is a new scheme or mode of transferring and acquiring learning or education through the use of modern technology between instructor and student who are separated by time and space. It can be between schools, between schools and colleges and universities, within school buildings and districts or between individuals (Burke, 2002). Is earliest prototype was the international correspondence in the 19th century. In the 1970s, it reshaped into open
Adult Education and the Internet Higher Education, the Internet, and the Adult Learner The concept of using the Internet in the pursuit of higher education is not exactly new. Indeed, the institution of "distance learning," has been in full swing since the heyday of late night Sally Struthers correspondence-school commercials. What has changed, however, is the increasing legitimacy and widespread use of the Internet in the pursuit of higher education -- from