1. Description of Our Team
The four students on this team are part of the Networking Academy and Computer Club in our school, Western High School, in Davie, FL. Our group is an ethnically diverse group of students. Elliott, a junior, is a Cuban American and 16 years old. Katherine, also a junior, is from Peru and 16 years old. Sonia is a sophomore whose mother is Cambodian and father is American, and she is 15 years of age. Lastly David, our only senior, is Asian and 17 years of age. All of our team members have interest in pursuing computer-oriented careers after high school. Our instructor, who is from El Salvador, is Cisco Networking Certified, and has been teaching computers for ten years and networking for three years.
Our team decided to do this web page because through their studies into the world of information technology, they noticed that cyber crime is an area in the technology world that has a great deal of controversy. They realized that this was the area of the law that many students in their age group violated because they did not have a clear understanding of what the laws were. Therefore, the team joined together in hopes that through their research and development of the page, many of the controversial issues surrounding cyber crime will be clarified for students and people of all age groups.
2. Summary of Our Project
The web project takes the user on an in-depth journey into the morals, thoughts, and laws behind cyber crime. These topics are copyright infringement, software piracy, fraud, plagiarism, hacking, and identity theft. The team surveyed around 210 students at Western High School and in our community, Davie, Florida, with questions involving the moral implications of these topics. The home user takes this survey online at the team website, www.truthaboutcybercrime.com, and is informed with the facts and laws behind the questions as they take part in the survey.
3. Our Computer and Internet Access
A. Percentage of students using the Internet at home:more than 50%
B. Number of workstations with Internet access in the classroom:4-6
C. Connection speed used in the classroom:dedicated connection
D. Number of years our classroom has been connected to the Internet:more than 6
E. Additional comments concerning your computer and/or Internet access (Optional):
We are fortunate because all of our team members have access to updated computers, software and fast access internet equipment at home and school.
4. Problems We Had To Overcome
Our team had a few obstacles that we overcame to finish our project. Our first obstacle was the factor of time. Our team found out about the project in late February and had to rapidly work on it mostly outside of school. Our next major challenge was commitment of team members. Many of our previous members had commitment issues and could not put forth the time and the effort involved with the project. Our last obstacle was the learning of various software programs such as Macromedia Flash, Microsoft FrontPage, IMOVIE and Swish.
5. Our Project Sound Bite
Doors to Diplomacy has helped our students come to a better understanding of how cyber crime impacts our society. It has educated them on what is right and what is wrong when using private property on the internet.
6. How did your activities and research for this CyberFair Project support standards, required coursework and curriculum standards?
The web page helped our students get a better understanding of the laws that protect artists, musicians, computer users and software manufactures. Our team had many discussions and controversy among themselves and the students they surveyed regarding the topics the web page covered. The team feels that they can now make better choices regarding cyber crime. Before the page, their knowledge and laws regarding these issues were not completely clear.
The students on this team have also taken courses in our schools Networking Academy program. The curriculum from this course work covered hacking and networking security protection. For instance, the student's curriculum taught them how to create access lists on routers and virtual local area networks to protect network users from cyber crime. The research and information the team gathered for this project was reinforced during the teaching of these topics.
|