Ciber Crimen

Páginas: 14 (3421 palabras) Publicado: 28 de agosto de 2011
Model Lesson Plan
Topic: Created by: Date: Sources: Cyber-crime Caitlin Wilson U.S. Dept. of Justice, Cyber-ethics for Kids, available at http://www.usdoj.gov/criminal/cybercrime/rules/lessonplan1.htm; Gregg R. Zegarelli. Computer Fraud and Abuse Act of 1986, Computer Science Study Guide available athttp://www.bookrags.com/sciences/computerscience/computer-fraud-and-abuseact-of-198-csci-01.html. Hackers (1995) 50 minutes

Time:

I. GOALS a. This lesson will introduce students to the criminal implications and consequences of computer crime, specifically hacking. II. OBJECTIVES a. Knowledge Objectives i. As a result of this class, students will be better able to: 1. know what types of Internet activity are or should be considered criminal; 2. understand how criminal prohibitionsagainst certain types of Internet activity are best implemented in law. b. Skills Objectives i. As a result of this class, students will be better able to: 1. determine whether computer crimes are unique and require their own legislation or whether they are just “updated” versions of traditional crimes; 2. determine whether their own computer activity or that of their peers could be consideredcriminal. c. Attitude Objectives i. As a result of this class, students will be better able to feel: 1. their actions and the actions of their peers, especially regarding Internet activity, can and will have real consequences. III. CLASSROOM METHODS a. Opening discussion (5+ minutes) b. Start discussion by asking: i. What comes to mind when you hear the term computer crime? 1. Pirating music, software;child pornography; identity theft

1

ii. Do you think these types of actions constitute completely new crimes or do you think they are just “updated” versions of other crimes? Why? iii. How would you feel if someone hacked into your email and read your personal messages? How would you feel if someone hacked into the school computers and had access to personal information about you, like yourgrades? c. Film Clip (10 minutes) i. How relevant is computer crime to people your age? 1. Show opening sequence from the film Hackers, which features the U.S. Secret Service using excessive force to raid the home of an eleven year old, who has written a virus that was unleashed and crashed 1507 computer systems. d. Discussion (2 minutes) i. This movie is dated, however, teens have historicallybeen linked to computer crimes, causing problems both then and now: 1. A teenager can (and did) cut off the phone service to an entire town for hours by hacking the local phone company. Adolescents can (and have) seriously hurt the music, gaming and software industries, shut down Internet news and commerce sites, brought businesses and government agencies to a halt, and attacked military networks inways that have initiated high-level concern for the economy and for public health and safety. e. Case Study (20 minutes) i. Modified fact pattern attached. 1. Press Release regarding Massachusetts Teen Convicted for Hacking into Internet and Telephone Service Providers and Making Bomb Threats to High Schools in Massachusetts and Florida (September 8, 2005) is available by the following link:www.cybercrime.gov/juvenileSentboston.htm. ii. Have students count off in groups of four. iii. Distribute fact pattern to groups. iv. Read the fact pattern aloud. v. Let students work in groups to determine what “crimes” Henry has committed (traditional crimes or computer crimes?) and what they feel the consequences for those crimes should be. vi. Have groups report back to entire class. vii. Recordideas on board, both ideas for what crimes Henry has committed and what his punishment should be. 1. For example, Henry could be guilty of trespass and theft as well as hacking. viii. Inform class what “really” happened in the case of “Henry” (see press release) ix. Ask class whether the law should treat traditional crimes committed via computer differently.

2

f. Explanation of Law with...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • Ciber
  • ciber
  • ciber
  • Ciber
  • Ciber
  • ciber
  • ciber
  • ciber

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS