Computer Crime and Technology Misuse Resources

The purpose of this site, geared toward K-12 educators, is to provide an annotated list of resources about computer crime and technology misuse and their effects in the realm of elementary and secondary education.

Navigation for this site:

Introductory Sites | General Computer Crime Resources | Acceptable Use Policies (AUPs) | Child Pornography on the Internet | Computer Virus-Related Sites | Copyright | Fraud | General Security | Hacking | Movies and Books of Fiction Dealing With Computer Crimes | Online Harassment | Pedophiles | Sites of Particular Interest to Policy Makers | Software Piracy |

Introductory Sites     
Computer Crime Introduction

Part of a MS Power Point® presentation entitled "Understanding Information Systems."  Slides 16-21 define computer crime, present statistics, categorize types of crimes, and introduce various computer crime terms.  This is an excellent, brief introduction to computer crime.
General Computer Crime Resources  
Computer Crime Books and Periodicals

Regularly updated descriptions, reviews, and information regarding new books, handbooks, and manuals.  Highly recommended!
Computer and Internet Security Resources

A resource made up of links to organizations, legal resources, professional services, classes, publications, books, and mailing lists.  Highly recommended!
ISS Library Mail Lists

Probably the best way to get up to speed regarding selected topics, this is a large list of listservs specializing in areas such as general security, firewalls, viruses, etc.  Highly recommended!
Parker, Donn D.  (1998).   Fighting Computer Crime: A New Framework for Protecting Information.  Wiley. Gives a general definition of "cybercrime" and breaks these crimes into categories.  Computer Crime Dictionary: a set of terms from Parker's work that are a must for educators dabbling in this field.
Journal of Information, Law and Technology

British electronic journal including a number of editorials and refereed articles likely to be of interest to educators.  Highly recommended!
Acceptable Use Policies (AUPs)      
K-12 Internet Acceptable Use Policies by Nancy Willard

This site provides a legal and educational analysis of K12 Acceptable Use Policies. It also includes a number of templates for each aspect in the development and implementation of AUPs, including:
Student Acceptable Use Policy Template
Student Account Agreement Template
Employee Account Agreement Template
Guest Account Agreement Template
Letter to Parents Template
Armadillo's Web Server

Child Pornography on the Internet      
Abuse/Incest Report

This report on child pornography by Nancy Burnett is broken in three parts:  understanding the problem, empowering the parents, and reporting child pornography on the Internet.  Very useful information and multiple links to assist parents in combating the dangers child pornography on the Internet.
Fighting Child Pornography on the Internet

This site solicits opinions on how child pornography can be combated on the Internet.  The stress is avoidance of over-censorship of the Internet while advocating respect for children.
National Coalition for the Protection of Children and Families

This site claims as its mission to protect "children and families from the harms of pornography."  Links include research on the effects of pornography, tips for families trying to combat the pitfalls of the Internet, reference to laws which protect pornographers, news segments on efforts to combat pornography, and ways families can make a difference.
The Police Notebook:  Kid Safety on the Internet

The University of Oklahoma Department of Public Safety maintains this site to educate parents and children of the dangers of the Internet.  This site delves into many different computer abuse/misuse issues, including child pornography.
Sites which encourage reporting of child pornography on the Internet:  
National Center for Missing and Exploited Children Cyber Tipline


The Child Protection Society

Computer Virus-Related Sites    
The Regulation of Virus Research and the Prosecution for Unlawful Research

An outstanding, well-designed page introducing viruses and their impacts.  Includes an excellent, though brief, bibliography.
AntiVirus Research Center

Produced by Symantec, the premiere producer of anti-viral software, this site is clearly one of the most informative and best presented on the WWW. Suitable for novices through expert computer users, individual sections include: 1) General Virus Information, 2) Viruses: The Threat is Real, 3) Types of Viruses, and 4) Macintosh Viruses.
Online Data Recovery, Antivirus Procedures and Methods Manual

An outstanding resource for intermediate/advanced users and network administrators. Includes: 1) A Primer On Computer Viruses, 2) Techniques Used by Computer Viruses, 3) Optimizing Your Anti-Virus Strategy, 4) Hard Disk Recovery, and 5) A Primer to Generic Antiviral Methods.
Computer Viruses

Don't be misled by the generic name, this is an excellent list of links which relate to many different aspect of computer viruses including: software types, bulletins, virus list-servs and hoaxes.
Virus Information

Again, the name of the site doesn't do it justice in terms of the wealth of information available. This site , oriented toward advanced users and network administrators, provides valuable resources in its four sections: 1) Virus Databases, 2) Virus Links and Utilities, 3) Virus Research and 4) Writing on Security Issues.
Anti-Virus Resources on the Web

Fairly generic in terms of its presentation of many websites, the main value of this page is clearly its links to electronic conferences, commonly used anti-viral resources (freeware, shareware and commercial) and anti-viral software comparisons.
The Copyright Website

A copyright web site which provides information regarding copyright issues in a very readable, often entertaining manner; links include: Famous Copyright Infringements, Basic Fundamentals, Internet and Software, Fair Use and Public Domain, What's News and a copyright discussion group.
10 Big Myths About Copyright Explained

A quick read, and very well written.

ILTweb C R E D O Section III. The Educator's Copyright Survival Guide

A good resource for those who have already examined The Copyright Website and 10 Big Myths About Copyright Explained who would like to continue pursuing the topic.
Discussion site addressing copyright concerns

This site allows users to post and reply to messages regarding copyright issues.
Copyright in the Digital Age

Article written by Karen Coyle discussing various issues of copyright and modern technology.
Copyright Implementation Manual (CIM)

Its purpose is to provide teachers, librarians, and students with clear instructions on the permissible uses of copyrighted materials. This is an excellent resource for educators that includes specific information about what is permitted in multimedia productions. This site contains a permission form to facilitate requests to use
copyrighted material.
Copyrights and Responsibilities

This site contains a guide to developing school district copyright and Acceptable Use Policies. It is written by Donna Brown, Betty Goyette, and Al Hopkins. This is a helpful resource to use when constructing AUPs for students. Includes proper citation format for a variety of online material. This site also addresses many policy and ethical considerations such as privacy, intellectual property, access, and filters.
Copyright Myths, from "10 Big Myths About Copyright" by Brad Templeton

Unsure if something violatescopyright on the Internet?  This is an excellent resource that addresses 10 common myths about this issue. This article includes various descriptions of copyright lawsuits and their outcomes. It also describes how copyright differs from plagarism.
The National Fraud Information Center

Introduces a number of different types of fraud including links to telemarketing fraud, internet fraud, and fraud against the elderly.
Internet Fraud: How to Avoid Internet Investment Scams

Produced by the US Securities and Exchange Commission, this site is an excellent introduction to the myriad of ways in which the Internet is being used as a tool for fraudulent purposes.
Internet Fraud Watch

A good site that exists to help consumers distinguish between legitimate and fraudulent promotions in cyberspace and route reports of suspected fraud to the appropriate law enforcement agencies. You will find a link to an online incident report form. It also provies a link that includes some useful basic Internet tips. This site hosts a multitude of articles about known fraudlant sites.
Flim Flam dot Com

This site exposes fraud, confidence games, scams, rip-offs, swindles, rackets, shell games, deceptions and flimflam.
General Security  

The World Wide Web Security FAQ

Probably the best general introduction to security I've encountered on the WWW (D. Stone), it introduces web security concerns from the most basic level to network administration concerns; if you're going to examine only one site regarding WWW security, this is the site to visit.
Comprehensive Technology Security
Safeguarding Your Technology: Practical Guidelines for Electronic Education Information Security

An extensive, detailed guide to education institution security. This downloadable document deals with risks, needs assessment, security policy development, and protection of physical, information software, user access, and network information securities. Highly recommended for teachers, technology coordinators, network administrators, and technology committee members.
Security Level Products
FoolProof Software
PowerOn Software
Alladin Systems
Apple Software
Firewall and Router Security

Review of Firewalls and Internet Security
Active Matrix's Hideaway

Written by a "true hacker", one who seeks knowledge rather than robbery and destruction, this alternative site gives an alternative view of hacking as an art and science.
Concerning Hackers Who Break into Computer Systems

Interesting discussion of hackers, hacker ethics and how hacking relates to issues and practices of an information society.
Technology and Pleasure: Considering Hacking Constructive

Fascinating VERY ALTERNATIVE discussion of history of the hacker community and hacker ideology. If you're going to read a single document which deals with the hacker mindset, this should be it!!!!
The New Hacker's Dictionary

A resource which introduces the reader to everything from hacker slang, jargon, hacker folklore, writing style and speech style to general appearance, dress, education and personality characteristics. If you are going to examine a single resource regarding hacking, this should be it!

Hacking Documents

This is the source many use for initial ventures into hacking. It consists of 1) The Guide to Mostly Harmless Hacking, 2) Beginner's Documents, and 3) Other Various Documents. There is also a link called Hacking Archives. Quite user friendly, it becomes clear how kids could easily be lured into this site and its activities.

Defcon 7

Voted one of the top hackers sites by PC Magazine (is it any wonder our kids have little difficulty finding these sites?), this site consists of hundreds of links which walk individuals step-by-step through the myriad of different hackers activities.

AstaLaVista H/C Search Engine

Here's something new - a search engine designed for hackers. Includes links to all types of software, serial numbers, sniffers, etc.
Movies and Books of Fiction Dealing With Computer Crimes (much summary information gained from  
The Net 1995, Winkler Films, Columbia Pictures Corporation, Rated PG-13.  A woman tries to gain back her identity after it has been criminally deleted over the Internet.
War Games

A 1980's movie about a high school hacker who accidently starts World War III after accidently breaking into a US military computer. The movie presents themes of artificial intelligence and the social implications related to poor technology planning and implementation.
Sneakers 1992, Universal Pictures.  Martin Bishop is the head of a group of experts who specialize in testing security systems. When he is blackmailed by Government agents into stealing a top secret black box, the team find themselves embroiled in a game of danger and intrigue. After they recover the box, they discover that it has the capability to decode all existing encryption systems around the world, and that the agents who hired them didn't work for the Government after all...  Summary written by Graeme Roy {}
Hackers 1995, United Artists, Rated PG-13. A young boy is arrested by the Secret Service for hacking into a government computer, and banned from using a computer until his 18th birthday. Years later, he and his new-found friends discover a plot to unleash a dangerous computer virus, but must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.  Summary written by Alexander Lum {}
Jurassic Park 1993, Universal Studios, Amblin Entertainment.  Probably the ultimate in poor computer information security.  Food and drink on the computer; one programmer who creates the software and operates the computer; no one else has knowledge of the system; no uninterruptable secondary power system.
Independence Day 1996, Centropolis Film Productions, Twentieth Century Fox, Rated PG-13.  The world is saved by Jeff Goldblum as he hacks a virus onto the computer system of hostile alien forces attacking the earth.
Every Mother's Worst Fear 1998, Universal Home Video, Inc., Rated PG-13.  Faced with her parents' recent divorce, her mother working long hours and her high school boyfriend dumping her, 16-year-old Martha looks for solace in the world of Internet chat rooms. Innocent chatting turns deadly as Martha attracts the attention of a pedophile and cyber-kidnapping ring. Martha's mother Connie suspects foul play and begins a frantic search for her daughter, enlisting the help of the police, the FBI and an expert hacker. Summary written by PetrinaC {}
Vonnegut, Kurt.  (1997).   Player Piano.  Laureleaf. "Vonnegut's first novel spins the chilling tale of engineer Paul Proteus, who must find a way to live in a world dominated by a super computer and run completely by machines. His rebellion is a wildly funny, darkly satirical look at modern society." (Synopsis courtesy of
Online Harassment   

An excellent introduction to stalking and its potential ramifications. Sections of this document link to pages dealing with types of stalkers and the way they operate, suggestions on how to remain safe, and how to try to stop the stalking and true accounts of
The Stalking Victim's Sanctuary

This site includes the same categories of information presented at the previous site, as well as links to regaining control of your life and support groups.

Civic watchdog organization that tracks hate groups. It includes links to hate group home pages and provides links written by scholars. Currently the page is being restructured, though it has a WebBoard discussion which is still functional.
Newsgroup and Email Spamming

Concise introduction to spamming and its impact.
Spamming - Policies, Regulation, Scams and Issues

Links to numerous sites pertaining to spamming definition and policy, constructed by one of our classmates.

Outstanding resource for parents wanting to become more aware and prevent their kids from encountering some of the dangers present in cyberspace; highly recommended!

Links include: Kids' Rules for Online Safety, What Are the Risks?, Guidelines for Parents and Privacy Issues; highly recommended!

Developed specifically for teens, links include: Staying Safe Online, Protecting Your Privacy, Computers and the Internet, Links for Teens, Articles About Teen and Child Safety Online and Know The Rules (A public awareness campaign about general safety for teenage girls); highly recommended!
The Parent's Guide to the Information Superhighway: Rules and Tools for Families Online

General information regarding kids and the Internet; includes a link to child safety on the Internet.

Parents will be particularly interested in the Parenting link, which provides "information parents should know when considering how much access to the Internet to allow their children. Includes advice for schools with computers;" recommended.

This site boasts being the "Largest Online Internet Safety Program."  A Parent's Guide to the Internet, Anatomy of a Pedophile, and Sophia's Safe Surfing Club are a few of the link options of this site.   An all-around excellent site for concerned parents and teachers.
GOCIAP:  Guarding Our Children's Innocence Against Pedophiles

This site was created by an individual who was molested when younger.  It gives good descriptions of the traps used by pedophiles to lure children in and keep them quiet about what is happening.  It contains some questionable language, but is very upfront as far as what parents need to know to keep their children safe.
CS Pedophilia

This site is a personal piece of writing about pedophilia.  It goes into the different types of pedophiles that seem to exist.   The author discusses allowing himself to be in a pedophile situation when he was a young boy.
NAMBLA:  North American Man Boy Love Association

This statement, created by Roy Radow, supports the belief that government should not be involved in deciding at what age children should be allowed to explore their sexuality.  Taking up many arguments that teenagers might feel strongly about, the group feels that people should be able to experiment with sex at any age with any gender as long as their is consent between participants.
The Pedophilia Survey

This site offers a survey for pedophiles to take.   It also offers the results of the survey.  They purpose lies in getting to know more about general pedophile characteristics.
Sites of Particular Interest to Policy Makers   
Computer Crime Materials

Particularly interesting for those involved in school policy, whether it be at the school, district, state, or national level.  Consists of links to:  Law Journal Article References, Australian and Overseas Cases, Australian and Overseas Legislation, Australian and Overseas Explanatory Memoranda, and Australian and Overseas Reports.
Computer Crime Directory

Oriented toward professional police officers, the Computer Crime Resource Sites and Computer Laws links may be quite useful for those involved in school policy.
Safeguarding Your Technology:  Practical Guidelines for Electronic Education Information Security

An extensive, detailed guide to education institution security.  This downloadable document deals with risks, needs assessment, security policy development, and protection of physical, information software, user access, and network information securities.  Highly recommended for teachers, technology coordinators, network administrators, and technology committee members.
Software Piracy  
Software Piracy - What It Is & What It Does

Concise introduction of types of piracy and its effects.  Quick, excellent overview.
Software Piracy

Well-written, concise presentation of issues surrounding software piracy.
Lecture 4:  Software Piracy

Good introduction to the history of software piracy; presents a number of landmark software piracy legal issues.
Combating Software Piracy

Probably one of the best software piracy documents on the web; introduces types of intellectual property infringement, cost and scope of piracy; additionally, this document presents and analyzes trends in protection against piracy; highly recommended.
Software Piracy: Is It Happening In Your School? Software Publishers Association document aimed specifically at educators; this document should clear up many of the occasional gray areas we encounter on a regular basis.
Software Piracy Facts

1996-97 statistics from a number of sources.
Overview: Global Software Piracy Report: Facts and Figures, 1994 - 1996

Software Publishers Association discussion of software piracy throughout the world.
1996 BSA/SPA Piracy Study Results

Breakdown by country of changes in software piracy over a three-year period.
Is it OK for Schools to Copy Software?

Software Publishers Association document aimed specifically at educators. This document should clear up many of the occasional gray areas we encounter on a regular basis.
1997 Global Piracy Report

One of the most up to date and detailed accounts of global piracy. Very well written and organized 10 page downloadable pdf document.
Newspaper or magazine articles related to piracy (titles state specific content):        
Korea's Software Piracy Reached 70 Percent in 1996

The Problem of Software Piracy in Hong Kong and China

M.S. thesis written by Kenneth Ho (London School of Economics and Political Science), fascinating reading.
Software Piracy Still Rife in Pakistan

Thailand - Warning On Software Piracy

Forty-three Percent of Canadians Condone Software Piracy Decima Survey Reveals     
The Islamic Ruling on Software Piracy

Software piracy is forbidden regardless of whether it is done with books or software, but if the two conditions are met (need and lack of funds) then, according to these scholars, it becomes permissible.
Software Publishers Association Anti-Piracy Page

An excellent introduction to the software piracy and its societal impact; one section deals specifically with software use and piracy in schools.
Congressional Hearings to Target Software Piracy

Outlines and presents statistics regarding the impact of software piracy on the US economy, as well as congressional responses.


Back to Educator's Guide to Computer Crime and Technology Misuse


Last updated 05/03/99