Sunday, April 7, 2019
The Law and ICT Essay Example for Free
The jurisprudence and ICT EssayIntroductionSince the institution of personal entropy processors in 1980s, the engagement of computer engine room in checks has mirrored that in western partnership as a whole. In m whatsoever western tames, the availability of an earnings-connected is pressed as a right and a prerequisite for learning mevery schools take for considered or argon planning to move to a proportion of one computer for each student.As computer applied science has grown ubiquitous in the spheres of lineage and industry, a cultural expectation has bugger offed that schools should train students for the workplaces of the future. This expectation has led, in turn, to public indemnity initiatives foc utilize on encouraging adoption of motley aspects of technology. Universities began training teachers to use technology in their classrooms, and g everywherenments and businesses give c arwise began pouring money into schools.Though initi entirelyy referred to by the catch-all term preparational technology, reflecting the perspective of mevery in the research community that computers were anformer(a) in the long line of tools utilise in service of process of technology, the rhetoric began to change in the late 1990s. Researchers and policymakers in the United Kingdom, excited astir(predicate) the prospects of computer technology for transforming teaching method and learning, began to use the phrase nurture and Communication Technologies, or ICT, to refer to the broad uses of computing in schools (St regulartideson, n. p., 1997).Today, though there re important pockets where computer technology is less than pervasive in schools, m both consider that schools in developed countries have reached a near-universal direct of introduction to computing technology. Statistics bolster this argument 99% of secondary schools in the US and UK has computers that john portal the net profit. The average student-to-computer ratio in UK seco ndary schools in 2004 was 4.9-to-one, era US schools reported an average ratio of 4.8-to-one in 2002. (NCES 2003, DFES 2004)At the same condemnation the computer technology has become ubiquitous in schools, researchers have begun to examine what role computers should play in the educational endeavor. From early technophiles and champions of classroom-based computing came promises of increased learning efficiency and success for all learners (Papert, n. p., 1980), combined with a peradventure unpleasant notion of teachers macrocosm relegated to mere coaches for students one-on-oneized learning (Callister Dune, p 324-326, 1992). Critics, pointing to the amazing ability of the educational establishment to avoid organizationatic change in the face of even the most impressive of interventions, were speculative of technology for a number of reasonablenesss (Chadwick, p 35-40, 2002).One result of this rivalry (Reynolds, Treharne, Tripp, p 151-167, 2003) was a pro keepration of res earch comparing educational computing to traditional content delivery collectively, the work found basically no difference in the educational outcomes of the different delivery methods (Salomon, p 71-72, 2002). Other research has provided significantly much valu equal info on how computer technology can be employ in educational contexts. Specifically, by combining research in the learning sciences with research in educational computing, researchers have been able to point out clear areas where computers can impact learning in highly positive slipway (Brown, p 399 413, 1997).There remain questions, yet, about computer technology in schools (Cuban, Kirkpatrick, Peck, p 813-834, 2001 Solomon, p 73- 75, 2002). In spite of growing bodies of research pointing to successful ways to integrate computers into learning environments, many problems exist. Teachers are lots ill-prepared and fail to integrate ICT successfully even when they have the call forful hardware and software. ap plied science programs are a lot introduced into schools with little preparation and support, thus ensuring that lone nigh(prenominal) the most highly motivated teachers give take them up.Technology is often used in support of traditional teaching utilizes, even though it shows the promise of victorious teaching and learning to a mod, to a ampleer extent learner-centered and thus more telling level (Reigeluth Joseph, p 9-13, 2002).ICT in Schools at UKAs it is comm only if used in UK schools today, ICT whitethorn consist of many technology-based tools which are used for teaching and learning in the schools personal computers used by the teachers, staff, or students any software that whitethorn run on those computers, whether designed or adopted for educational purposes or not the lucre including various component applications that specifically the Web static display technologies much(prenominal) as monitors and LCD projectors or interactive ones much(prenominal) as ele ctronic whiteboards printers and opposite output devices telecasting cameras, digital still cameras, audio rec come outs, digitized music, and opposite mul mea receiveddia production equipment that connects to the computers and different alternative input devices such as scientific metre equipment.Perhaps because of how broadly sound computer technology has been in the workplace, or because of how it has changed the way many batch communicate with friends and family, there seems to be a tacit assumption that technology should improve the experience of teaching and learning in schools (Tyack Cuban, n. p., 1995).The Function Per create by ICT in the System of EducationICT is capable of and definitely performs a number of functions inwardly a school. The key functions that it can play are academic, ethnic, communal, managerial and professional .If ICT is implement with a vigilant software and is set up logically, it can absolutely influence numerous areas of school life, such as the extent and intensity of the environment of learning, starting as of a strong bewilderment of current practices of teaching to a ongoing development in value, in addition to offering a outstanding opening for the progress and improvement of teachers (Pedro et al. p 2, 2004).Function of Academic ImplementationOne of the outstanding roles of ICT within the circumstances of school is to devote a structure so as to encourage an encourage and revise educational practices of teaching. Although there have been numerous optimistic results postered for on a minor level, on a replicable and large scale no innovative sort of break through is evident on answer for of ICT. However, both students and teachers whitethorn avail the benefit of an increased number of learning sources such as sack up pages and software packages. For strong classroom utilization the teachers would require emergence and force connect to the lively computer programme in addition to comprehensible sho w upes model patterns. If IT is included as a routine classroom practice the teachers leave alone cognise a fall apart learning motivation and even an improved regularity and attendance at school. olibanum, teachers could productively make use of this affirmative manner to open up novel educational approaches to involve students in learning activities more actively, rather than making them mere inactive k at presentledge recipients. (Pedro et al. p 3, 2004)Edifying, Communal, and Specialized FunctionsThe edifying, communal and specialized functions of ICT are implemented principally out of a successful utilisation of the enormous quantity of sources of knowledge and obtainable assistance at present for the whole community of education that are the parents, administrators, teachers and the students. Besides, at present the latest apparatus for instance the PDAs, Tablet PCs and science devices, and economical movable keyboards having ability of text-handling, are definitely assi sting teachers the world over.An meshing connected school can speed up inter pull through and exchange of ideas within the educational community not only on local or national extents but on a global level as well. The academic and learning projects which take away together both teachers and pupils from all over the world could intensify the eminence of the spoken distances, and could enlarge learners perspectives through permitting them to get acquainted with community of different ethos and whitethorn arouse collective work and communal intercourse and interface. Such networks suffice as an intermediary for teachers to set up smooth associations amid worldwide schools peers.The teachers might have great advantages by discussing their knowledge, troubles and uncertainties with teachers of otherwise countries in the same field. E-learning is also assuming significance at present among the teachers for offering numerous training modules via net profit, consequently making new resources available for proficient advancement no matter what and where is the workplace of the participants. (Pedro et al. p 3-4, 2004)Organizational/managerial FunctionThe functions performed by ICT in the school wariness are get byd as not much burden whatever and can be successfully corporate into the administrative flow of information about pupils, teachers, syllabus and prospectus, financial plans and authority actions due to the learning shunning pipelines of information. ICT also proves to be an impelling source of information for the community such as guardians, parents, investigators and politicians, regarding new policies and other educational reports. They also enable teachers to stiffly keep their up-to-date records such as students marks and other academic or personal records with the latest upgrading.With the help of preformatted documents they can also generate the complete necessary particulars and figures for the parents and management. Significantly, in d igital format teachers are able to preserve their topic poppycock like worksheets and exercises, lectures outlines, lesson plans, sound judgment papers and evaluations etc., with easier revision and updating, which could also be shared with other teachers. hazardually, the multipurpose apparatus for instance a CPU, a portable key board or a handheld gadget along with a and a network, may assist teachers in carrying out their organizational responsibilities, is of course a persuasive reason to convince teachers for ICT training (Pedro et al. p 4-5 2004).However, there is also a growing body of research demonstrate that ICT can have a just impact and has significant potential for education. Not surprisingly, many cognitive scientists have rallied around the idea that computers and computer-aided learning environments can definitely have unique benefits for students if they are used in ways that support student learning (Bransford et al., n. p., 1999). Nevertheless, if not appropr iately and vigilantly operated the same beneficial aspects of employing the ICT in schools may turn into extremely adverse situations for the administration as a number of bet ons are involved in its usage. The research now moves on to study such hazards and the measures to overcome them.Synopsis potency destinys A great number of constructive learning and communal advantages are offered by ICT to young groups, provided regrettably it involves approximately hazards also. Young folks and kids are more susceptible to unknown or even known hazards in any walk of life on account of their mental immaturity and may harm themselves. Similarly while entertain ICT as well, specifically the Internet they are more unfastened to the hazards.Moreover a number of immature individuals might involve themselves in some il healthy or inappropriate activities. Several problems and scourges may be abridged chthonianneath (E- golosh exploitation whole-school policies to support effective prac tice, p 4, 2005).Since a number of problems summarized here mainly speak about ICT exercises not inside the school, but predictably numerous activities are instigated outside of course, but are gradually brought inside the school and are demand to be handled by the school management. For example, bullying via chat or text messages will impact upon consanguinitys within school fanatical internet exploit by a student must affect his performance in the school, and his character variations and common comfort possibly will signify his involvement in inappropriate activities.Though the schools are supposed to have suitable technologies to confine such unacceptable right to use, however one cant deny the fact that students might fleet to use a more complicated miscellany of handheld appliances within school which may provide them discrete right to use inappropriate resources. Therefore the policies of the schools regarding adequate employ, must contemplate about the equipments possess ed by the students.Thus, a great office lies with the school management not only to teach the students, but to educate them with acceptable discretion and essential judgment ability which could guide them to continue legally and safely while working on internet and using various technologies.The adolescents habitual of too much internet practice, or occupied in threatening and illegal online behaviors, at times take professional assistance and therapy restore stability in their life whether online or offline. In this regard a vital role may also be played by the school for facilitating suitable assist (E-safety Developing whole-school policies to support effective practice, p 4, 2005).ICT and overzealous internet apply The young people and children are more inclined to be fanatical while using the internet and its associated expertise. There are certain factors which indicate the level of priority achieved by the Internet in the life of an adolescent, as followsWasting of precio us study time in online activitiesReducing time of sleepDeclining performance in the schoolBad effects on relationships with family members (E-safety Developing whole-school policies to support effective practice, p 5, 2005).Violation of Copyright LawThe law of copy right is applicable on the internet also but is neglected at times by a number of adolescents when they either download music files or exchange them, prepare their academic assignments merely by cutting and pasting other sources works, or sometimes the complete project is purchased online available at some cheat sites detached of considering the inferences and results (E-safety Developing whole-school policies to support effective practice, p 5, 2005).Illegitimate or Unsuitable conduct Teenagers are sometimes caught up in unsuitable, disruptive or illicit activities during employing the latest technologies. They can form online factions or gangs, and accordingly behaviors which they initiate only for fun, for example expressing a disparate view for some other associate of the blog, may sometimes bring very undesirable and serious consequences. Another adverse feature for using the new technologies is online bullying which is supposed to offer an unidentified technique to the bullies who can torture their targeted people any time they want.Pleasure achieved by teasing others is a very dangerous psychological tendency and may lead to other criminal activities. Though such bullying doesnt cause any physical hazard to its victims but definitely causes mental distress and embarrassment or at times fear when they rule any disgusting or threatening e-mail or text message while chat. Thus, their arrogance and psychological bail is injured by this undesirable practice.A number of kids and adolescents get occupied in even more crucial behaviors. nearly potential threats could be participation in stealing the individuation or involvement in websites of detestation or religious groups, or sale or purc hase of illicit or stolen commodities online.There is uncomplicated access available for gambling, sites guiding suicide attempts, buying and merchandising of arms, sites promoting hacking techniques, and offering formulas of preparing explosives or bombs and recipes of making drugs, cannot be ignored. Youths are often caught up in watching, keeping and owning, preparing and sharing offensive or pornographic descriptions or pictures. Such instances of illegal obscene or immoral racism may be informed at Internet Watch Foundation or the legal philosophy force (IWF) (E-safety Developing whole-school policies to support effective practice, p 4-5, 2005)Contact with unacceptable resources The kids and adolescents can be exposed to unsuitable stuff either text or images, while using the internet, chat or e-mail. Such stuff could be of detestable or aggressive type, pornographic, supports illicit and unsafe action, or may be simply disadvantage and unsuitable for their age.This is und oubtedly an advantage of the web that it is accessible to everybody but regrettably it has adverse implications when people with intemperate bowed, bigot or racially prejudiced outlooks get opportunities to extend their imprecise vision worldwide.The internet definitely serves a multitude for presenting huge quantity authorized and illegitimate stuff as far as obscenity is concerned. Inquisitiveness concerning pornography is a usual element of internal maturity however adolescents could perhaps be offended with any of such stuff available online. The lasting effects of such revelation may be unexpected (E-safety Developing whole-school policies to support effective practice, p 5, 2005).Sexual Exploitation and Corporal HazardThe danger of corporal hazard is possibly a seriously upsetting and severe threat meetd to the internet and supplementary expertise. The unlawful groups make utilize the internet and associated assistance for instance the chat opportunities serve as a contac t point for young people. The main objective of these groups is to create and promote such associations with adolescents to drag and involve them in unsuitable sexual cry. Specific persons are usually targeted through pedophiles, exhibit a friendly dude with identical hobbies and leisure pursuit to initiate the online relation of friendship.Beginning with childly chat such relationship gradually develop into more closer one with cleverly gaining the give of innocent youths, conceivably develop some other modes of contact just like the text messages being a preface of personal appointment. There is also a danger that when a child or youth provides personal facts online which may recognize them, and try to meet their online friends thus imposing a threat not only to their own security system to their other relations also (E-safety Developing whole-school policies to support effective practice, p 5-6, 2005).School staffs Illicit or Improper activitiesIt is a regrettable fact that s ome of the schools staffs have also been found in some unsuitable and unlawful activities while using ICT. Such activities could be watching, sharing and circulating child pornographic or other impermissible stuff through e-mail. Therefore, the responsibility lies with the school management for educating and guiding their staffs to adopt decent online conducts, and vigilantly watching the networks system of the school for confirmation of any unsuitable pursuit. In an evident case of unacceptable pursuit by a staff member must get a penalizing rejoinder from school administration, for example police consultation etc (E-safety Developing whole-school policies to support effective practice, p 6, 2005)The Significance of Guaranteeing a Secured ICT Educational AtmosphereThe creation of safe ICT educational atmosphere is the duty of all schools however most of them are not cognisant of about how to start it. The schools are showered from different organizations ads assuring about their novel technical goods as a solution of all internet security issues encountered by the school. There is no doubt that these products are multipurpose to an extent but can not be employed separately. Such technological sorts of instruments are successful when employed as a part of the framework of a wide-ranging program made for internet security, being summarized as underProducing a protected ICT education atmosphere requires to compriseIntroduction of a wide-ranging education program for the entire school community ensuring internet securityThere should be comprehensive infrastructure with selected duties, measures, strategies and guidelines well understood by the whole schoolA useful variety of technological instruments should be made availableThe composition of above mentioned constituents may differ from school to school. Apparently, the requirements for a small school with a few computers must be different than those having multifaceted set of connections, for thousands of stu dents. besides still, the requirement for above mentioned essential constituents will of course be the consistent (E-safety Developing whole-school policies to support effective practice, p 8, 2005)The Implication of Law The Governmental Perspective against ICT ill-treats With the above discussion it is quite clear now that significance of using ICT in the schools can not be denied on account of its various undeniable benefits, however, looking at the darker side of the picture we have also realized that there is an intense need to overcome the misuse of ICT to save our young generation from its potential hazards, either physical or psychological. Thus, like all developed nations of the world the Government of UK has also made numerous efforts to govern such abuses by imposing several criminal or civil laws. A few of such specifications are recapitulated as under bulwark of Children cultivate 1978, amended in 1994 by section 84 of the Criminal rightness and Public Order bringTh e Telecommunications Act 1984Malicious communication Act 1988Copyright, designs and Patents Act 1988 calculator Misuse Act 1990Protection from Harassment Act 1997Crime and Disorder Act 1998Data Protection Act 1998Freedom of affirmation Act 2000Sexual Offences Act 2003Privacy and Electric Communications regulations 2003Byron analyzeComputer Misuse Act 1990This is the only act imposed only to handle computer related crimes and is effective in determining an incident and is value summarizing in some ensuing corporation records. In a school situation when a misuse incident is evident a reaction strategy is formed and permitted by main judgment officials chosen from within the school, contemplation must be paid toIn case of misuse discovery who will be informed first?Who is going to head the resolution plan and inspection panel?If there is need of some extent of police involvement or the services of any exterior professional inspection expertise?The concluding and decisive action in e xecuting a successful event reaction strategy is conveying the pertinent strategy and measures all over the school. Training distinctive faculties and picking in-house advocate who may guarantee the carrying out of the policy, and make sure that each one comprehends their responsibilities and necessities for any contingency. As a minimum requirement it is sensible to inform the main faculties and engage them in the initial phase of a case. In this way the commitment to process is ensured. Because of that assurance, the ensuant inspection may attain a buy-in as of everybody concerned and effect in a nonionised case response (Janes, p 1, 2006).Discovering a Misuse CaseAfter determining the prospective case, the nature of misuse case must be discovered. The police participation is not advisable in any or all cases unless some particular type of crime is involved. The cases of pedophilic nature or which are allege as planned offenses are needed to be reported. Such categorization o f cases may assist in deciding the intensity of reaction and ensuing allotment of suitable means.Isolate the crime settingIn the academic world the prime enticement on the discovery of a misuse case is for a speedy glance and the same is definitely the most terrible fault which may endanger some inspection. Fragility of an electronic proof is confirmed, which may easily be amended, smashed or damaged by unsafe treatment or assessment. Hence, particular preventative measures must be adopted in recording, gathering, conserving and canvas such proofs. Unsafe use of such forensically tried methods could result in unfeasible verification or an imprecise inference.Therefore, the precise method must be used to protect the reliability of electronic proof. succession a computer-based offense is consigned, the computer is well thought-out as an offense outlook similar to any obscure proof and is not interfered with. In the initial stage no change should be made in the state of electronic a ppliances and their atmosphere. Any interaction might change the content and the evidence might be corrupted (Janes, p 1, 2006).Beginning interviewsEach and every verisimilar witness present at the localisation must be noted preferably by recording the particulars of site, time of access and link with probable conjectures. Collect all helpful information for the purpose of investigation for instance e-mail, set-up and safety of passwords, identity of drug user and the suppliers of internet service. The notes must be completed with details of all supplementary school belongings which are found with a conjecture, for instance PDAs, cell and mobile phones or laptops.Assembling VerificationsSubsequently a specialized computer forensic inspection panel is called upon, whether internal or exterior experts, in order to recognize and protect the probable verification means. Just about positively, inside the academic surroundings the most reliable verification means is suspects regularly used computer. If the suspects used computer and the victims used computer are accessible must be protected. In case of no such access attention must be paid to the backing tapes and the host computer that is the server by means of which the information might surpassed.The accurate particulars about computers are required to be recorded such as model and type, serial number and make etc. For an on computer, details about prove should be recorded or photographed. For an off computer other facts are to be recorded. In case of the presence of other drives, a note should be made for this along with the particulars of their media. As soon as electricity is detached the computer must be preserved in a carton and be shifted to a safer place for further inspection (Janes, p 1, 2006).Representing a ConclusionBy taking into account each and every proof at hand, the ultimate word form of inquiry reaches that is to extract a wrap up up. The ending have to be impartial, balanced and establish ed on unquestionable truth. On this concluding phase it is advisable to take expert or legitimate advice to move on in right deputation (Janes, p 1, 2006).Data Protection Act 1998Significant Features to be Considered Individual facts have to be acquired impartially and legally. The focus of info ought to be informed the entropy organizer or concerned establishment the person representing the data organizer the objectives data are intended to be processed for plus on whom the facts could be revealed. Educational institutions do this for students at the time of registration. mystical dispensation of data can be completed only if some particular provisions are fulfilled comprising the subject consent or the legal requirements data organizer. Supplementary provisions have to be fulfilled for dispensing the vulnerable individual data, related with customs, political judgment, and belief, relationship with trade union, physical condition, sexuality or illicit history of the subject. T he personal data is covered by this new Act in either of the forms, manual or electronic such as bill of fare indices or paper files, apprehended by a prearranged and pertinent arrangement of filing. The reasons reported by the educational institution to the commissioner of data protection must be considered while individual data processing. The data Protection Representative must be discussed with while any new dispensation of data. Keeping the individual data up to date and precise is very essential and must not be maintained and kept eternal than the required period. Suitable safety procedures are to be followed against illegitimate or unlawful dispensation of individual data and in contradiction of unintentional damage, or loss of individual data. This comprises training of staff for data security as an organizational gauge and recurring endorsement of data files in addition to data encoding as technical methods. The individual data is not allowed to be shifted exterior of th e boundaries of theEuropean Economic knowledge domain except exclusive releases is employed with the consent of data subject. It may comprise printing of individual data through internet (Mukerji, p1, 2001).Privileges of Data SubjectThis Act offers noteworthy privileges to persons regarding individual data apprehended in relation to them by data regulators. Such privileges are as followsA person is allowed to have a copy of his individual data in order to make a subject access demandThe data regulator is required assure that they wont be affected by any specific resolutions as such decisions are established only by an mechanized decision-making course of actionTo make sure that no loss or damage is caused to the data while processingThe data processing must be prevented keeping in view the direct marketing as the capital objectiveNecessary steps to be taken in case of any damage suffered by the data regulator for an infringement of the ActNecessary action to be taken for erasing, blocking, rectifying, or destroying any erroneous dataIf there is a doubt regarding contravention of a provision of the Act, a petition can be made to the Data Protection Commissioner for an inquiry of such matter (Mukerji, p1, 2001).Freedom of Information Act 2000Nature of the ActIn 2000, the government activity of UK approved the Freedom of Information Act. In guess this permits individuals or associations to prayer information from the state which, unless it falls within one of the exemptions officials must hand over inside 20 days or longer if they require some period to choose whether it should be released. Whitehall gave itself four years to arrange for this significant enlightening modification in UK, open government has much been seen as a disagreement in terms, but on January 1, the waiting was over. Consequently, civil servants were active destroying documents and removing emails in an attempt to make sure that they wont be required to discharge them now the Act is a pplicable. A number of Departments have twice the number of documents shattered yearly (Amory, p 1, 2005).The Types Organizations Under the Act approximately 100,000 public organizations are distressed. That means the main government ministries, but also every NHS Trust, the Post Office, the police and, more incomprehensibly, the Sea Fish Authority, the Treasury Valuation Committee, the Wine Standards Board, the Covent Garden Market Authority and the British Potato Council. Some public establishments, though, are exempted counting MI5 and MI6, the courts, the National Criminal Intelligence Service and the SAS. (Amory, p 1, 2005).Provisions of the ActAll evidenced information such as written accounts, tapes, emails, diaries, letters, and contracts. Merely concerning anything, actually, so long as it doesnt fall within one of the 27 exemptions. Though, these are so extensively sketch that a smart civil servant could put just about any document into as a minimum one grouping. Anything that is commercially private associates to national safety, involves worldwide relations, is individual information about a person, might destabilize the requirement for openness in the formulation of government strategy, might bias the economic welfare of the UK, and is connected to an official analysis and so on.Ultimately, they dont have to offer any matter that would, in the case of central government, cost more than 600 pounds to collect, nor in the case of other guanos, more than 450 pounds .There is no time boundary on the material applied for information (Amory, p 1, 2005).Gathering Information Requests can be submitted to the organizations apprehensive in writing, by email or by fax, relating the information required. There is no need to give a reason for the request. It is also useful to mention if want the material photocopied or the replies sent by post or email. There is no charge for such a autonomy-of-information request and the power must respond inside 20 working d ays (Amory, p 1, 2005).Appeal against RefusalAn orison against a refusal can be made to discharge information to a self-reliant arbitrator, the Information Commissioner, who will request for a public interest test. In other words, even if the required material falls within one of the exemptions, he can order it revealed if its publication would be in the public interest. It corpse to be seen whether he has the decision to make such an method work in practice, but even if he does the Prime Minister or any other Cabinet Minister can fend his pronouncement and hold back publication of the information at any time. This catchall clause, which will apparently be used to avoid any politically susceptible information seeing the light of day, was contentious when added to the Act (Amory, p 1, 2005).Potential OutcomesMuch depends on the information commissioner, Richard Thomas. If he applies the public interest test robustly, some interesting information could find its way into the public d omain. For instance, private sector firms involved in Private Finance Initiative contracts are already panicking that there will be requests to see the details of their deals, telltale(a) the enormous and unjustified profits theyve made. The number of ministerial refusals will also be significant, as will the attitude of the courts, which will be able to judicially review such vetoes and could overturn them. The most liable(predicate) outcome is a brief flurry of revelations, followed by a new culture in Whitehall that avoids committing any sensitive information to paper whenever possible. One other issue is the extent to which the Act will apply to EU documents, as it could allow us to penetrate the obsessive secrecy that surrounds decision-making in Brussels.Sexual Offences Act 2003The Sexual Offences Act 2003, which received Royal Assent on 20th November 2003, brings wide-reaching changes to current legislation on sexual crimes. There are a number of specific sexual disrespe cts against children which feature within department I of the Act. These relate to the rape or sexual assault of a child, sexual activity with a child, and the abuse of a position of trust which leads to a sexual offence against a child, meeting a child following sexual grooming and sexual activity with a child family member. Other offences relate to encouraging, arranging or causing the involvement of a child in prostitution or pornography. Some of these offences are new, while others are set to replace existing offences under, for example, the Indecency With Children Act 1960 (See Schedule 7 of the Act).This article focuses upon a specific area of the Act in order to evaluate whether the Act (hereafter the SOA) is likely to achieve one of the Governments main aims, of giving children the greatest possible protection under the law from sexual abuse (Burney, p 28-36, 2003). The focus of analysis is the creation of a new offence relating to sexual grooming under s.15. This is a sig nificant development, given that research has shown that an opportunity to sexually abuse a child is more likely to emerge following an act of sexual grooming during which, the individual may convince the child that what he or she is suggesting the child do is both natural and shopworn (Lanning, p 267, 1984).The introduction of this offence also follows calls for such legal reform by both the Internet Taskforce on Child Protection and child protection groups and demonstrates the increased societal awareness of the way in which such grooming can occur via internet chartrooms. Moreover, the dangers of sexual grooming have been recently recognize by the judiciary. In the case of Re Attorney Generals Reference (No.41 of 2000) 2001 1 Cr App R (S) 372, one of the reasons why the Court of Appeal increased the defendants original denounce for inauspicious assault and making indecent photographs of a child was because he had sexually groomed a vulnerable child with special needs. Increas ing the higher sentence, Rose LJ stated that The gravity of the offence lay . . . in the grooming of this vulnerable and handicapped boy, over a period of time and the giving of money and other gifts (at 375).The first section of this article outlines the new offence of meeting a child following sexual grooming. Section two then provides an analysis of the offence and identifies the reasons why it is a necessary addition to the existing law. A critical analysis of the requirement of proving a harmful ulterior intent in order for the new offence to be made out follows in section three. Finally, section four examines the other new offences under the Sexual Offences Act that could relate to acts of sexual grooming, in order to place the s.15 offence in the context of the wider protection from sexual abuse that the Act seeks to offer children.The issues that this article examines should also be of wider intrinsic academic interest. For example, the analysis of the offence relating to se xual grooming raises the broader issue of the legal identification and induction of a harmful intent in a so-called thought crime. Moreover, the overriding aim of the article is to address the increasingly pertinent question of how the existing law could be effectively developed in order to offer greater protection to children prior to the actual occurrence of sexual abuseByron ReviewA good deal expected Byron Review was made available on 27th meet 2008. This review is actually a wide-ranging account that glances at the threats to kids from being bare to possibly unwholesome or unsuitable matter available to them in video games and on internet. This report signifies the requirements of kids and adolescents and guides about protect them from adversities while using video games and internet and provides them a protected environment where they are able to hump their favorite games and net- surf (Leading Article, p 1, 2008).The author of this review is Dr. Tanya Byron who is a famou s psychologist for children. She has planned a nationwide approach regarding internet security. Dr Byrons main concern is impractical relations threats deforming her insight regarding the issue she is dealing with. The kids and even adolescents are groomed by the pedophiles by means of the chat-rooms, but it doesnt seem possible. A number of video games involve excessive viciousness and bloodshed which definitely seem to have negative effects upon a childs psychology.Dr, Byron has been renowned for her constructive strategies presented in a TV serial Toddler-taming, is not in favor of presenting a persuasive argument complete panoply of controls. She suggests that parental groups, nationwide plan, and governmental authorities as a balanced reaction to an issue which is definitely concerns the entire family and not merely the internet. She tries to explain that access to all available information is not the real concern but it is the mental maturity level of the individual accessing and perceiving it.There is a constant shower of suggestions and threats over parents and the title performance of this exceptional misadventure in case of any offense. The implicit but recurring inference that parents are required to walk out their responsibility to save the life of their children by securing them from any abuse. She believes that now we are on a stage where some rebalancing is required that is to recognize effective parenting doesnt only mean to provide protection but is also meant to offer some extent of freedom also. (Leading Article, p 1, 2008).The freedom of using internet and surfing online is available to almost all children. Numerous of them utilize it for completing their challenging assignments and there are some others who find it an essential means of knowledge on specific topics and issues. Thus, for a great majority it serves a significant learning aid and a source for exploring the world around. Its equal availability to everyone is also a plus poi nt.It is an unrestricted un arbitrated liberty, saturated with unpredicted knowledge, smuggled information, tiresome chat, crazy plotting speculations and the uncultivated envisages of minute groups of people for their underground concerns. There is fewer indications, effortless reach plus perhaps hazardously unidentified. Sporadically indecent and unappreciated facts and descriptions are conveyed to individuals. Thus like all scientific discoveries the internet also has both pros and cons (Leading Article, p 1, 2008).This also a segment of life which is handled by the parents very cautiously. The kids have embedded it in life and parents appreciate them to use it for exchange of ideas, searching and investigation. The problem actually lies with the parents who seem to be perplexed with parental controls sort of proposals and are doubtful regarding computer games and their respective ratings. The parents are usually scared for their children using the chat-rooms and give birth it a s place of trouble, while a majority of children is quite aware about the safety rules.Thus Dr. Byron suggests for training parents in dealing with such problems as she believes that parenting means guiding kids to handle challenging situations and plausibly risky matters in a secured way. If parents positively understand the situation they can convince the kids in a friendly manner to limit the surfing time and to adopt an inflexible system for video games ratings (Leading Article, p 1, 2008).ConclusionAfter a thorough research we have realized the negative aspects and all potential adversities while using ICT at schools. We have also studied the measures adopted by the government and the legal support provided to cyber victims in the form of various Acts being imposed from time to time. However, under these Acts an uncountable number of such online culprits are being caught and executed everyday, but with the passage of time and with the development ever increasing technology new devices and techniques are coming in every other day which are being used by evil-minded people for fulfilling their negative desires. Besides all the legitimate support provided by the government it is essential to develop awareness about self security, specifically the children and youths who are generally victimized in such offenses.RecommendationsA great responsibility lies on the shoulders of schools as they have the targeted age group. Schools need to grow comprehensive and secured ICT policies for safer employment. ICT facility offered to the teachers, students, staff and other community members must be completely owned and monitored by the administration. Appropriate guidelines must be provided to all users clearly notifying the extents and limits. It should be generally restricted to activities in relevancy with school. There should be vivid information about Freedoms Privacy Suitable use of resources Authorization of access Unauthorized usesMoreover, an appropriate organ izational structure is required to be created in the school management as follows1. The Governing Body assumes the constitutional duties regarding children safety and decent internet usage. Some of such duties could be To develop a consciousness among student about both threats and benefits of ICT usage To crate a clear arrangement of current school policy regarding ICT usage To support the head of the school in handling the media for in case of any offense To arrange enough resources for implementing internet security solutions To promote internet safety awareness among parents also.2. The Head of the School definitely needs to take keen interest towards the creation of a protected ICT associated learning atmosphere. He/ she may Keep the final authority and responsibility of overall ICT security while assigning routine works to the ICT coordinator Assure that ICT coordinator is provided with essential resources, time, control and cooperation in performing his duties taper the ICT coordinator to create a culture in the school regarding the internet security in the school Inform the governing body about all concerned strategies and issues.3. The ICT Coordinator Any senior teacher with prompt ICT skills may be promoted to this post or a new member be hired to fulfill the responsibility of ICT security supervision. He may Plan ICT security guidance programs for students keeping in view the school activities and available resources and support Maintain an incident-log regarding ICT security Prepare a workshop for parents in conference with other teachers Propose for the appraisal of current policy in the light of rising tendencies after examining the log.These are only a few general suggestion, however, every school has its own culture and its management can better decide the measures to adopted in the direction of crating a safe ICT learning environment, the primary concern is to realize its importance in the sequence of priorities.ReferencesAmory, Heathcoat. E dward. (2005). How the Information Act Works Q A. Available athttp//www.questia.com/read/5008215484Bransford, J., Brown, A. L. Cocking, R. R. (Eds.) (1999). How wad Learn Brain, Mind, Experience, and School. Washington, D. C. National Academy Press.Brown. A. L. (1997). Transforming Schools into Communities of Thinking and Learningabout Serious Matters. American Psychologist, 52(4).Burney, E. (2003) Using the Law on Racially Aggravated Offences, Criminal Law Review, January.Callister, T. A. J., Dune, F. (1992). The Computer as Doorstop Technology asDisempowerment. Phi Delta Kappan.Chadwick, C. (2002). Why Computers are Failing in the Education of our Children.Educational Technology, 42(5).Cuban, L., Kirkpatrick, H., Peck, C. (2001). High Access and Low Use of TechnologiesIn High School Classrooms Explaining an Apparent Paradox. American Educational Research Journal, 38(4).E-safety Developing whole-school policies to support effective practice. (2005) Availableat publications.bec ta.org.uk/download.cfm?resID=25934Janes, Simon. The effective response to computer crime. Computer Weekly. Available ateLibrary. Proquest CSA. ROBINSON petty(a) SCH. 09 Jun 2008. http//elibrary.bigchalk.comLanning, K. (1984) Collectors, in A. Burgess (ed), Child Pornography and Sex Rings.Lexington, Mass Lexington Books.Leading article The Byron review Internet angst. Guardian, The. 28 Mar 2008. 36.eLibrary. Proquest CSA. ROBINSON SECONDARY SCH. 10 Jun 2008. http//elibrary.bigchalk.comMukerji, M. (2001). The Data Protection Act 1998 A Summary. Available athttp//www.dpa.lancs.ac.uk/summary.htmPapert, S. (1980). Mindstorms Children, Computers, and Powerful Ideas. New York BasicBooks.Pedro Hepp K. Enrique Hinostroza S. Ernesto Laval M. Lucio Rehbein F. (2004).Technology in Schools Education, ICT and the Knowledge Society. Available atwww1.worldbank.org/education/pdf/ICT_report_oct04a.pdfReigeluth, C. M., Joseph R. (2002). beyond Technology Integration The Case forTechnology Transform ation. Educational Technology, 42(4).Reynolds, D., Treharne, D., Tripp, H. (2003). ICT- The Hopes and the Reality. BritishJournal of Educational Technology, 34(2).Salomon, G. (2002). Technology and teaching method Why Dont We See the PromisedRevolution? Educational Technology, 42(2).Stevenson, D. (1997). Information and Communications Technology in UK Schools An Independent Inquiry. London, UK Independent ICT in Schools Commission
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment