The Approaching Post-Typographic Culture - ERIC

35 downloads 19355 Views 30KB Size Report
messaging, chat-rooms and text messaging to antagonize ... Deputies responded to a phone call from a ..... Protection Center Federal Bureau of Investigation.
CIMLE

Current Issues in Middle Level Education (2005) 11(1), 19-24

Adolescent's Perceptions of Deviance When Using Te c h n o l o g y : T h e A p p r o a c h i n g P o s t - Ty p o g r a p h i c C u l t u r e A n n i e J. D a n i e l Dillard University “A n y t e c h n o l o g y t e n d s t o c r e a t e a n e w h u m a n e n v i r o n m e n t . ” -Marshall McLuhan

Deviant

behavior on the computer and the Inter net is rising as technolog y use increases ( H o l l i n g e r, 1 9 9 6 b ; Po w e r , 2 0 0 0 ; Va t i s, 2 0 0 0 ) . Deviant behavior, when using computers and the Internet, includes the same types of deviant activities perfor med before the popularity of computers or the inception of the Internet. These activities include: using the Internet for illegal activities that violate local, state, and/or federal laws, inappropriate use defined as a violation of the intended use of the Internet or computer, and/or purpose and goal, obscene activities defined as entering a pornography website or selling pornography goods on the Internet; using the Internet or computer to violate copyrights laws or other contracts such as institutional or third party copyright, license agreements and other contracts, intentionally disrupting the Internet traffic by spreading a computer virus, spreading rumors about another person on the Internet, intimidating, stalking and frightening another person on the Internet. Deviant behaviors using technolog y is a real concern since our society is rapidly moving from a typographic culture to a post-typographic c u l t u r e ( P r o ve n z o, B r e t t & M c C l o s k e y, 1 9 9 9 ) . With this movement, our society is being t r a n s f o r m e d by t h e u s e o f t e ch n o l o g y b e c a u s e adolescents are communicating more by instant messaging, text messaging, electronic mail and in chat-rooms rather than by paper printed text or letter writing. Culturally, we are becoming more dependent on computers and computerb a s e d t e c h n o l o g i e s ( P r o v e n z o, e t a l . , 1 9 9 9 ) .

R e c e n t l y, t h e r e h a s b e e n a n i n c r e a s e i n t h e nu m b e r o f h i g h t e ch c r i m e s by a d o l e s c e n t s. A c c o r d i n g t o t h e U. S. D e p a r t m e n t o f J u s t i c e (2005), teens have gone high tech with oldfashion bullying, stalking and spreading r umors. W i t h t h e u s e o f t e c h n o l o g y, s t u d e n t s h a v e a d v a n c e d t o c y b e r b u l l y i n g a n d c y b e r s t a l k i n g. S t u d e n t s a r e u s i n g e - m a i l , We b s i t e s, i n s t a n t messaging, chat-rooms and text messaging t o a n t a g o n i z e a n d i n t i m i d a t e o t h e r s. On January 6, 2005, three teenagers in L o u i s i a n a wa s a r r e s t e d f o r c y b e r s t a l k i n g. T h e L o u i s i a n a A t t o r n e y G e n e r a l ’s H i g h Te ch C r i m e Unit investigators and Tangipahoa Parish Sheriff ’s Deputies responded to a phone call from a concerned parent who reported threats and violent poems allegedly being put on-line b y t h e s t u d e n t s. “A c c o r d i n g t o i n v e s t i g a t o r s and deputies, the male teens’ website had links to a “poems” jump and a “preps” jump that included bloodthirsty lyrics and a list of students considered preppies or elitists b y t h e s u s p e c t s. T h e f e m a l e u s e d a m a l e c h a t name to threaten one male and allegedly set up a website that included the teenager’s photograph and claims that the teenager is homosexual.” (High Technolog y Crime Unit, 2005) In Louisiana, cyberstalking carries a maximum penalty of one year in prison. This kind of behavior among teens has increased over years with t h e e a s e o f a c c e s s t o t e c h n o l o g y. This study sought to add to the limited body of knowledg e that investig ates technolog y deviance of adolescents in middle and high schools. Students are vulnerable to victimization

Current Issues in Middle Level Education (2005) 11(1), 19-24

19

by Internet predators, who are their peers and adults who prey on naïve children for sexually exploiting them. Although a limited amount of research has been perfor med to deter mine the types of deviant behavior students’ use on the Internet and on computers, the opportunity to perfor m deviant acts increases with the inte g ration of technolog y in educa tion a n d s t u d e n t s ’ p e r s o n a l u s e o f t e c h n o l o g y. Method

Instrumentation The instrument was developed by Professor San-Yi Li in Taiwan and revised by the researcher. The primary variables studied were categorized as: 1) students’ demographic characteristics, 2) computer- related activities, 3) students’ perceptions of deviant behavior when using computers and the Internet, 4) students’ perception of their peers’ deviant behavior when using computers and the Internet, and 5) students’ ability to use computers and the Internet.

Population and Sample Results The accessible population included all students who attended a middle or high school in the East Baton Rouge Parish School System (EBRPSS) with computers that are capable of accessing the Internet. A convenience sample of 1,150 students (575 middle and 575 high school students) was selected. Pur pose and Objectives of the Study The primary purpose of this study was to explore middle and high school students’ perceptions of deviant behavior when using computers and the Internet. In order to answer the research problem, the following six objectives were used to guide the researcher: 1. Describe the middle and high school students on selected demographic characteristics. 2. Describe the middle and high school Students’ Behavior Score. 3. Describe the middle and high school Students’ Peers’ Behavior Score. 4. Compare the Students’ Behavior Score of middle and high school students on selected demographic characteristics and p e r c e p t i o n s o f c o m p u t e r- r e l a t e d a c t iv i t i e s. 5. Compare the Students’ Behavior Score and the Peers’ Behavior Score.

Objective One: Demographics Participants of the study ranged in age from 13 to 17 years old. The majority of the responding students were African American, with the next largest group of respondents being White. The grade level of the students ranged from 7th to 12th grade, with the 11th or 12th graders having the largest number o f r e s p o n d e n t s. S t u d e n t s i n t h e s t u d y w e r e either in middle or high school, and most of them rated their academic achievement as good. Most of the students indicated they had a strong religious affiliation. A large portion of the students interacted with their c l a s s m a t e s a n d t e a c h e r r e g u l a r l y. Objective Two: Describe Middle and High School Students’ Behavior Score According to the Students’ Deviant Behavior Score, the majority, 869 (79.6%), of the responding students indicated that they displayed no deviance or some deviant behavior while using the Internet. Only a small percentage of students indicated deviance. Objective Three: Describe Middle and High School Students’ Peers’ Behavior Score The majority, (1,016, 81.5%), of the students perceived their classmates to be displaying deviant behavior often or very often when

Current Issues in Middle Level Education (2005) 11(1), 19-24

20

using the Inter net and computers. The researcher believes that if the students’ peers are engaging in this type of behavior than a larger number of students is engaging as well, but is not disclosing this infor mation. Apparently, students feel more comfortable disclosing what others a r e d o i n g , r a t h e r t h a n w h a t t h e y a r e d o i n g. O b j e c t i v e Fo u r : C o m p a r e t h e B e h a v i o r S c o r e o f Middle and High School Students When comparing the Students’ Behavior Score, the following findings were discovered about gender: males indicated displaying more deviance than females when using the Internet and c o m p u t e r s. R e s u l t s i n d i c a t e d a s t a t i s t i c a l l y significant relationship between gender and perceived deviance. It appears that males are more likely to display deviance when using the Inter net and computers. T he results showed that 27.9% of the males and 12.6% of the females reported deviance. There were twice as many males as females that reported deviance w h e n u s i n g t h e I n t e r n e t a n d c o m p u t e r s. The variable age revealed that 13 and 17 year olds had the lowest percentage of students that displayed deviance while using computers and the Internet. Students ages 14, 15 and 16 had the largest percentage of deviance reported. Still, all of the age groups indicated that the majority of the students did not display any deviance. The ethnic group indicating the largest percentage of deviance when using the Internet a n d c o m p u t e r s w a s t h e H i s p a n i c s t u d e n t s. The second largest percentage of students indicating some deviance was Asian American s t u d e n t s. T h i s f i n d i n g i s c o m p a r a b l e t o a s t u d y by H o l l i n g e r ( 1 9 9 6 b ) o f c o l l e g e s t u d e n t s. H o l l i n g e r ’s r e s e a r c h r e v e a l e d t h a t c r i m e b y computer correlates with software piracy and unauthorized account access of college students. He reported that Asian and Hispanic students i n d i c a t e d t h e h i g h e s t l e v e l s o f p i r a c y. When reporting academic achievement, the majority of students reported their academic achievement as being good, and most of the students perceived themselves as displaying no deviance or some deviance when online. This test resulted in a significant relationship

between academic achievement and Student Behavior Score. The highest percentage of deviance was reported by students indicating poor or fair academic achievement. Of the students that reported “poor” achievement, 38.1% indicated deviance, and the students that reported “fair” achievement had 25.7% to indicate deviance compared to those students that indicated “good” (17%) or excellent (17.4) achievement. Fo r r e l i g i o u s a f f i l i a t i o n , t h o s e s t u d e n t s that indicated a strong or very strong religious affiliation also had the largest percentage of students that did not display deviance when using computers and the Internet. Religious affiliation did not result in a statistically significant relationship with Student Behavior Score. When comparing the no religious affiliation with strong religious affiliation (the group that is closest in numbers), there is no significant difference. The researcher believes these students are either just honest because of their religious affiliation, or religious affiliation for some is not as effective as for others in developing e t h i c s. A f t e r a l l , t h e s t u d e n t s w i t h n o r e l i g i o u s affiliations were also able to disclose their o n l i n e a c t i v i t i e s. With regard to students’ interaction with their teachers, most of the students indicated that they interacted with their teachers. Interacting with teachers did not have a significant relationship with the Student Behavior Score. Although there was not a significant difference between level of interaction with teachers and Students’ Behavior Score, students that reported no interaction with teachers reported deviance at 26.3%. This is compared to the students who reported they interacted with their teachers “some” (15.9%), “often” (20.1%) and “very often” (22.5). Students who interacted with other students reported the least amount of deviance when using computers and the Internet. The majority of the students indicated that they interacted w i t h t h e i r c l a s s m a t e s. T h e r e w a s a s i g n i f i c a n t relationship between the Student Behavior Score and the level of interaction students have with their classmates. Students that reported no interaction with classmates had the highest

Current Issues in Middle Level Education (2005) 11(1), 19-24

21

overall percentage of deviance (35.2%). This is compared to the other levels of interaction that gets lower as the level of reported interaction increases [“some” (21.8%), “often” (18%) and “very often” (17.4)]. Therefore, students who alienate themselves from others are engaging in more deviant activity when using computers and the Internet. The majority of the students indicated that they spend “much” time online and display very little deviance when using the Internet a n d c o m p u t e r s. T h i s a n a l y s i s w a s i n t e r e s t i n g because some of the students indicated that they do not spend any time online, but they displayed deviant behavior when online (time s p e n t o n l i n e “ n o n e ,” 2 8 . 6 % o f t h e s t u d e n t s indicated deviance online). Students evidently misunderstood the question. Students’ time spent online had a significant relationship with Students’ Behavior Score. Students that reported spending more time online had the highest overall percentage of deviance -“very much” (22.2%) and “much” (21.2%). This is compared to the other students who reported spending less time online, “little” (15.5%). As related to hours per day spent on the Internet, when asked specifically how many hours per day they spent on the Internet, students could relate to this question and r e s p o n d e d m o r e a c c u r a t e l y. H o u r s s p e n t o n l i n e are highly related to Student Behavior Score. Students who reported spending the least amount of time online reported the lowest percentage of deviance (2 hours or less, 15.3%). This is compared to the other amounts of time spent online, in which the percentage of deviance increases as more time is spent online (3-4 hours, 19.1%; 5-6 hours, 37.2; 7-8 hours, 44,7%; 9 or more hours, 46.7%). It is highly recommended that students’ time online be super vised and coupled with a prog ram that will monitor or control their online activity. When asked whether there was a working computer in the home, the majority of the students indicated that they had a working computer in the home. However, a smaller number of students indicated that they did not have a computer in the home. A working computer in the home was shown to be significantly

related to the Student Behavior Score. The percentages for deviance were higher for those students not having a computer in the home. This relationship could mean that students do not need a computer in the home to engage in deviant acts on computers and the Internet. After all, Kevin Mitnick (one of the most famous computer hackers) did not own a computer, but he had been engaging in deviant acts with computers since he was a juvenile. Students with a working computer in the home may be more familiar with computers and may not realize or not have been taught that certain behaviors are deviant, therefore they may not be reporting their behaviors accurately. The significance may be how students with computers view what is actually deviant verses those without a computer in the home. Coldwell (1996) concluded that students from machine-based disciplines (computer environments) are less able to predict the social consequences of computer crime than those from peoplebased disciplines (no computers). Fo r t h e r e a s o n t h a t s t u d e n t s a r e b e i n g introduced to computers and the Internet at an earlier age, it is necessary to introduce technolog y ethics to all levels of education. Ethics should be taught starting when computers are first introduced to the student. Having a computer in the home allows for more chances of deviance to occur, despite the fact that student may not realize what is happening. Therefore, super vision and ethics teaching becomes a necessity at home and away from home. Objective Five - Comparison of Student Behavior and Peers’ Behavior Scores When comparing the means of the Peers’ Behavior Score and the Students’ Behavior Score, students’ perceptions of themselves and their classmates are very different. Students perceive that their peers are displaying deviant behavior “often” and “very often” on computers and the Internet. However, students perceive that they are not engaging in “deviance” or “ s o m e d e v i a n t ” b e h a v i o r.

Current Issues in Middle Level Education (2005) 11(1), 19-24

22

The researcher believes those if the students’ peers are engaging in this type of behavior then a larger number of students are engaging a s we l l , b u t a r e n o t d i s c l o s i n g t h i s i n f o r m a t i o n (Daniel, 2003). Students may feel more comfortable d i s c l o s i n g w h a t o t h e r s a r e d o i n g. S t u d e n t s may not want to admit displaying deviance, but it is easier to be more open when discussing s o m e o n e e l s e ’s b e h a v i o r. T h e r e f o r e , t h e t w o scores might be used to gauge the amount of actual deviance being displayed. Conclusion The primary purpose of this study was to explore what middle and high school students perceive as deviant behavior when using the computer and the Internet. Based on the findings, it can be concluded that students do not perceive most of their behaviors on the Internet and c o m p u t e r s a s d e v i a n t . M o r e s p e c i f i c a l l y, t h e Peers’ Behavior Score mean is higher than the Students’ Behavior Score. Therefore, students do not perceive their own behaviors as being a s d e v i a n t a s t h e i r p e e r s ’ d o. T h i s a t t i t u d e can be correlated to a theory known as the third person effect (Perloff, 1989). Cohen, J. , M u t z , D. , P r i c e , V. a n d G u n t h e r , A . ( 1 9 8 8 ) defined the third person effect as how people r e p r e s e n t t h e m s e l v e s i n r e l a t i o n t o o t h e r s. The students’ image of themselves is more ethical than the students’ imag e of their friends. C o n s e q u e n t l y, t h e i r c l a s s m a t e s a r e t h e o n e s that visit the pornography websites, access o t h e r p e o p l e ’s w e b s i t e s w i t h o u t p e r m i s s i o n and perfor m other deviant acts when using the Internet and computers (Daniel, 2003). A d d i t i o n a l l y, t h i s s t u d y w i l l a d d t o t h e small, but growing body of knowledge concerning students’ perceptions of deviance when using t h e I n t e r n e t a n d c o m p u t e r s. We h a v e g a i n e d an image of how students use the Internet and computers; how students spend some of their time online and how much time; they spend using computers and the Internet. With the integration of computers and the Internet into the curriculum, there must a l s o b e r e s p o n s i b i l i t y. I f d e v i a n c e i s t o b e

avoided or decreased, all participants must t a k e r e s p o n s i b i l i t y, w h i c h i n c l u d e s u s e r s a n d s u p p l i e r s. E d u c a t o r s a n d p a r e n t s m u s t b e vigilant in their effort to discourage computer and Internet deviance. References C o h e n , J. , M u t z , D. , P r i c e , V. , & G u n t h e r , A. (1988). Perceived impact of defamation:An experiment on third-person effects. Public O p i n i o n Q u a r t e r l y, 5 2 ( 2 ) , 1 6 1 - 1 7 3 . Coldwell, R. (1996). University students’ attitudes towards computer crime: A Research note. In R. C. Hollinger (Ed.), Crime, Deviance a n d t h e C o m p u t e r ( p p. 4 1 3 - 4 1 6 ) . A l d e r s h o t , England: Dartmouth. Daniel, A. (2003). Relation of Self-Centeredness to Middle and High School Students’ Perceptions of Deviant Behavior When Using Computers a n d t h e I n t e r n e t . F i r s t Wo r l d C u r r i c u l u m S t u d i e s C o n f e r e n c e ( p p. 2 4 - 5 3 ) . S h a n g h a i P. R . , C h i n a : I n s t i t u t e o f C u r r i c u l u m a n d I n s t r u c t i o n , E a s t C h i n a N o r m a l U n ive r s i t y. G l e n n a n , T. , & M e l m e d , A . ( 1 9 9 6 ) . Fo s t e r i n g the use of educational technolog y. Santa Monica, CA: Rand. H i g h Te c h C r i m e U n i t . ( 2 0 0 5 ) . T h r e e t e e n a g e r s ar rested for cyber stalking. Louisiana A t t o r n e y G e n e r a l ’s O f f i c e : B a t o n R o u g e , LA [On-line]. Available: http://www.ag.state.la.us/ ViewPressRel.aspx?RelID=347 Hollinger, R. (1996). Hackers: Computer heroes or electronic highwaymen? In R. C. Hollinger ( E d . ) , C r i m e , D e v i a n c e a n d t h e C o m p u t e r ( p p. 45-56). Aldershot, England: Dartmouth. H u n t e r , B. ( 1 9 8 4 ) . M y s t u d e n t s u s e c o m p u t e r s . R e s t o n , VA : R e s t o n P u b l i s h i n g C o m p a n y. K e a r s l e y, G. ( 2 0 0 0 ) . O n l i n e e d u c a t i o n : L e a r n i n g and teaching in cyberspace. Belmont, CA: Wa d s w o r t h . Kent, T. & McNergney, R. (1999). W ill technolog y really change education? Thousand Oaks, CA: Corwin Press, Inc. McLuhan, M. (1962). The gutenber g galaxy: T h e m a k i n g o f t y p o g r a p h i c m a n . To r o n t o : U n i v e r s i t y o f To r o n t o P r e s s.

Current Issues in Middle Level Education (2005) 11(1), 19-24

23

McLuhan, M. (1964). Understanding media: The e x t e n s i o n s o f m a n . N e w Yor k : N e w A m e r i c a n L i b r a r y. M i l k e n F a m i l y Fo u n d a t i o n . ( 1 9 9 7 ) . P r e p a r i n g our young people for a changing world: A Milken exchange on education technolog y. Santa Monica, C A : A u t h o r. Papert, S. (1993). The childr en’s machine: Rethinking s c h o o l i n t h e a g e o f t h e c o m p u t e r . N e w Yo r k : T h e F r e e P r e s s. Perloff, R. (1989). Ego-involvement and the third person effect of televised news coverage. Communication Research, 16 (4), 236-262. Power, R. (2000, Spring). 2000 CSI/FBI computer c r i m e a n d s e c u r i t y s u r v e y. C o m p u t e r S e c u r i t y I s s u e s a n d Tr e n d s, 6 ( 1 ) , 1 - 1 5 . Provenz o, E, Brett, A., & McCloskey, G. (1999). Computers, cur riculum, and cultural change. Mahwah, New Jersey: Lawrence Erlbaum A s s o c i a t e s. U. S. D e p a r t m e n t o f Ju s t i c e . ( 2 0 0 5 ) . C o m p u t e r intrusion cases. Computer Crime and Intellectual Property Section of the Criminal Division of the U.S. Department of Justice. Washington, D.C. [On-line]. Available: http://www.usdoj.gov/ c r i m i n a l / c y b e r c r i m e / c c c a s e s. h t m l Va tis, M. (2000) Dir ector, National Infrastr uctur e Pr otection Center Federal Bur eau of Investigation o n C y b e r c r i m e , B e f o r e t h e S e n a t e Ju d i c i a r y Committee, Criminal Justice Oversight Subcommittee and House Judiciar y Committee, Crime Subcommittee Wa s h i n g t o n , D. C . [ O n - l i n e ] . Av a i l a b l e : h t t p : / / w w w. f b i . g o v / p r e s s r m / c o n g r e s s / congress00/vatis022900.htm

Current Issues in Middle Level Education (2005) 11(1), 19-24

24