Raising School Counselor Awareness Regarding - UW

advertisement
Raising School Counselor Awareness Regarding
Students' Inappropriate Use of Cell Phones
by
Jami McAuley
A Research Paper
Submitted in Partial Fulfillment of the
Requirements for the
Master of Science Degree
in
School Counseling
Approved: 2 Semester Credits
{}
The Graduate School
University of Wisconsin-Stout
May, 2011
2
The Graduate School
University of Wisconsin-Stout
Menomonie, WI
Author:
McAuley, Jami L.
Title:
Raising School Counselor Awareness Regarding Students'
Inappropriate Use of Cell Phones
Graduate Degree/ Major: MS School Counseling
Research Adviser:
Carol Johnson, Ph.D.
MonthlYear:
May, 2011
Number of Pages:
36
Style Manual Used: American Psychological Association, 6 th edition
Abstract
School counselors face the ongoing complexity of trying to inform students and educators
about the appropriate use of cell phones at school. With almost 75 percent of all school age
students having cell phones, the use of them in and outside of school is increasing. Situations
regarding the misuse of cell phones continue to appear in the news, as part of school sexting
scandals, and also harassment to the point of suicides by students are examples of how students
have misused cell phones and the internet to intimidate and bully to the point of death.
This literature review examined the different ways in which students use cell phones and
ultimately the implications this use has for students. Cell phone history and their technological
state of affairs, as well as moral, ethical and legal complications of the inappropriate use of cell
phones, students misuse of cell phones, students misuse of the internet on phones regarding
3
School related tasks, and the implications that inappropriate use of cell phones has on students
are included. The review concludes with suggestions and recommendations for practitioners in
the field of school counseling to help inform, intervene, and prevent the inappropriate use of cell
phones by students.
4
The Graduate School
University of Wisconsin Stout
Menomonie, WI
Acknowledgments
First and foremost, I would like to thank Carol Johnson, my thesis advisor, for her
dedication to students, and to me personally. I could have not gotten through my entire graduate
school experience, not to mention writing this thesis without her help and guidance. Carol's
positive support and attitude helped to make this process as painless as possible.
In addition to Carol, I would like to thank my roommate Julie Bethke for her support,
advice, and friendship for the past two years. My graduate experience was positive and
successful because of the companionship we had.
Furthermore, outside of school, I would like to thank my boyfriend Michael Kapral for
his perpetual suppOli and advice. You are my best friend and always knew when to bring me
back to reality when I was overwhelmed with the stresses of graduate school. Thank you for
sticking by my side when I did not always make it easy to do so.
Finally, I want to thank my parents, Mark and Jeanne McAuley for their endless support
for me and my education for the past twenty-four years. Having gone through this experience I
know what supportive, encouraging, and positive parents I have had throughout my life. Thank
you for always seeing the potential and strength I have in me, even when I do not see it. Most
importantly, thank you for helping me get through the past two years of my educational career
and listening to me when I needed to talk and vent. I could not have been as successful in my life
without you both being strong positive role models.
5
Table of Contents
.................................................................................................................................................... Page
Abstract ............................................................................................................................................ 2
Chapter I: Introduction .................................................................................................................... 6
Statement of the Problem ..................................................................................................... 9
Purpose of the Study ............................................................................................................ 9
Research Questions ............................................................................................................ l 0
Assumptions of the Study .................................................................................................. l 0
Definitions of Terms .......................................................................................................... 11
Limitations of the Study ..................................................................................................... 12
Chapter II: Literature Review ........................................................................................................ 13
Introduction ........................................................................................................................ 13
History of Cell Phones ....................................................................................................... 13
Ways Students Misuse Technology ................................................................................... 15
Misusing the Internet ......................................................................................................... 20
Legal and Ethical Implications .......................................................................................... 25
Chapter III: Summary, Discussion, Recommendations ................................................................. 28
Introduction ........................................................................................................................ 28
Summary ............................................................................................................................ 28
Discussion .......................................................................................................................... 30
Recommendations .............................................................................................................. 32
References ...................................................................................................................................... 34
6
Chapter I: Introduction
Cell phones were first used as a means to communicate and talk with others while on the
go, and in limited circumstances related to transportation and public safety. As technology
evolved, the desire to utilize a phone at any time and in any place has grown in popularity. Cell
phone advances began in the mid 19th century during World War II with the use of transferable
battery operated phones on the battle field. In the late 1970's and 1980's cell phones research
soared as the idea of an affordable, portable, hands- free phone was appealing to many.
First generation cell phones were heavy, cumbersome, and had a short battery life in
addition to limitations regarding where the phone could find service. Second generation cell
phones became smaller, had better quality phone calls and service, faster signals, and had built in
cameras. In addition, they also paved the way for emerging technologies in third generation cell
phones. It was during the second generation that cell phone use went viral, with more people
wanting to own their own cell phone. Third generation cell phones, still in existence in 2011 can
send and receive text messages, have internet and email access, and some of the latest
applications on a device that fits neatly in the palm of the hand.
As of 2011, the fourth generation of cell phones, which include smmi phones, allow for
people to utilize GPS services, movie and radio streaming, access to the internet, and other
applications all in one hand-held device. FOUlih generation cell phones allow for people to do
many tasks, such as unlocking or locking a vehicle without even having to be there. There are
even experimental phones that act as credit cards, air line paperless ticketing and can open the
front door or garage door in a home. As cell phone technology continues to advance, more
people around the world, including children and teenagers, have their own cell phone for daily
use.
7
A recent study indicated that as many as 71 % of American youth, ages 12-17, owned a
cell phone (Lehnart, 2009). This study further identified the number of American school-aged
students with a cell phone went up 8% in a span of two years. As a result, schools continue to see
enrollment climb in the study body, which includes students who have cell phones. With the
ratio of educator to students increasing, educators are concerned about monitoring student use of
cell phones, minimizing disruptions to learning, and enforcing school policies that limit
inappropriate cell phone use at school (Lehnart, 2009).
Carroll (2004) identified some of the reasons why educators should be concerned about
student cell phone use at school. Cell phones with cameras and internet access pose a threat of
having unwanted videos of students and faculty members posted on the web. Can'oll (2004) also
indicated that students are using their cell phones to take locker room photos that may be
considered pornography. Other camera misuse may be used to blackmail classroom teachers.
Also, students may tape class sessions without teacher permission or awareness and post sections
taken out of context for others to see. Students are getting more creative, and imposing on issues
of legality and privacy where others could be affected. Since students have already utilized cell
phones in non-productive ways, educators worry about how students will further use the internet
capabilities on their phones (Carroll, 2004).
Currently, problems related to cell phone use and internet use at school remains ongoing.
Many school districts, like the Montana High School Association implemented policies to
decrease the misuse of technology by students (Carroll, 2004). The policies are designed to
restrict talking, texting, cheating and internet searches on cell phones while at school. In the
United States, many other school districts have followed suit to implement policies related to cell
phone use at school. However, the problem of cell phone use by students is still a concern to
8
many school districts around the nation, as they have not implemented policies to limit cell
phone use at school.
In addition, cases of cyber bullying have become more prevalent as reports have become
more frequent. For example, the case of student Phoebe Prince whose death was believed to be a
result of bullying occurred on the intemet and through text messages that started at school
(Goldman, 2010). Other educational related materials, such as essay and homework sites where
students are paying for someone else to do their work, known as essay mills, continue to become
popular while making teaching difficult and leaving educators without the information or
curriculum to support its intervention and prevention (Bartlett, 2009).
The addition of the intemet access on cell phones is a major concern to educators, and
may increase the likelihood of cheating and inappropriate use of the device; as is the increased
amount of time that students age 12-17 spend on the internet (Lehnart, 2009). Almost all
American youth spend some amount of time each day on the internet with potential access at
school, home or on a cell phone (Lehnart, 2009). The internet in general has the potential to
provide students with a place for chatting or texting that could lead to harassment and bullying.
In addition, access to websites that promote the creation of bombs or the how-to for
homemade drugs; ways to cheat, and other mediums of communication are not a good use of
technology in the hands of young teens (Hope, 2004). Students who have intemet access on their
phones have the potential for endless exposure to harmless infOlmation at their fingertips making
dangerous information go viral for more students to see. Other professionals believe that
unsupervised time spent on the internet can potentially encourage behavior that poses
psychological and physical harm to students and others involved (Hope, 2004).
Parents, school counselors and teachers have a responsibility to help keep kids safe. The
American School Counseling Association (ASCA, 2004) has ethical guidelines pertaining to the
9
use of technology. School counselors playa critical role in educating students in safe and
appropriate use of technology during classroom guidance lessons. School counselors emphasize
students use technology in appropriate ways and advocate for equal access to technology. School
counselors have an ethical obligation not only to the profession, but also to the students to
protect them from the potential dangers while trying to educate students on the implications that
inappropriate use of technology can have on their lives.
Statement of the Problem
The most cunent fOlms of technology such as the internet and cell phone capabilities
have been quickly evolving in the last decade and have impacted student behavior and influenced
changes in ethical behavior. School counselors may need to alter their guidance cuniculum so
that they can promote student success by increasing academic and social skills that provide the
appropriate information and examples of positive student behavior and use of cell phones. The
topic of students' use of cell phones is just beginning to be researched and minimal data exists
for school counselors to review. Therefore, the problem includes both understanding and
identifying how students are inappropriately using cell phones, and also how school counselors
can develop and implement lessons plans and curriculum that provide opportunities for students
to be safe, while making better and more ethical decisions regarding their use of cell phones.
Purpose of the Study
The purpose of this study is to increase knowledge and raise awareness of school
counselors by exploring literature regarding inappropriate student use of cell phones. The review
may help determine ways school counselors can implement necessary preventative curriculum to
educate students, educators, and parents on the dangers of using technology inappropriately.
10
The information obtained may benefit school counselors in the profession by allowing
them to better identify and handle inappropriate use of technology and adapt to the changes of
technology by introducing the most current trends in to the curriculum that will prevent future
misuse of technology and intervene with the cun'ent misuse. This study will address strategies to
use in the classroom will highlight issues of student integrity with appropriate and ethical
behavior with regard to use of technology.
Research Questions
The following questions will be explored when reviewing the literature that pertains to
the subject matter of this paper.
1. In what ways are school age students misusing cell phones and the internet?
2. What are the legal and ethical implications for students by using technology
inappropriatel y?
3. How can school counselors become more aware of the many misuses of cell phones by
students?
Assumptions of the Study
The following assumptions should be considered regarding the information related to this
topic. The literature that was reviewed during spring 2011 and new data may provide insight into
more detailed aspects of student and technology use since the review of literature was started. It
is assumed that the literature presented for review is reliable and trustworthy as the researchers
have published credible work. While it is assumed that the majority of teens will use cell phone
and internet access responsibly, it is assumed that there are those students who use technology in
inappropriate ways.
11
Definition of Terms
The terms listed here are defined because they are used frequently in the literature and
may help clarify their use in this paper.
Cyberbullying. Cyber bullying is when one or more people repeatedly harm, harass,
intimidate, or exclude another person using technology.
Ethics. A pmi of human philosophy that deals with values related to conduct, respect,
and whether a behavior is right or wrong.
Essay Mills. A website where students can purchase or use previously written papers for
classes.
Internet. Refers to the global computer network that allows people to connect with one
another via the World Wide Web.
Harassment. It is the repetitive sending or receiving of insulting, crude, or mean
messages.
Text messaging/Texting. Refers to the exchange of brief written messages between
fixed-line phone or mobile phone and fixed or pOliable devices over a network.
Sexting. Refers to the act of sending or receiving sexually explicit or suggestive content
between mobile devices. It is a genre oftexting that can contain text, images, or video that is
intended to be sexually arousing.
Viral. Going from one to the next in a chain connection where an online posting goes
from a small population to a larger population.
12
Limitations of the Study
The following information examines the limitations that arise regarding the information
related to this topic. The literature being reviewed presents information that has been published
in the last decade given that the topic and data collection has been limited and access to the lately
research or research has not yet been distributed. The research that has been published on this
topic poses limited information and view points as research on this topic is developing to gain
credibility.
13
Chapter II: Literature Review
Introduction
In this chapter, the research will be divided into four sections. The literature review
begins with the history of cells phone, followed by examples of the different ways that students
are using, and misusing the internet on their cell phones and concludes with information on the
legal and ethical implications for using cell phones and internet access inappropriately.
History of Cell Phones
Cell phones have evolved to be a lightweight mechanism used for communication in
comparison to the original cell phone models that began almost 100 years ago. In the early
1920's a new technology had made its way into the transportation and security industry. Firstclass train passengers were allowed to use a device known as the radio telephony, where train
passengers and conductors could talk to one another from short distances away (TopBits, 2010).
This special type of communication made its way into airplanes, trains and into police
departments, and the military soon thereafter. This technology allowed for individuals to be in
different locations and still talk to each other. The expanding communication of the radio
telephony was popular, yet quite centralized to individuals who were trained to use the
equipment (TopBits, 2010).
In World War II, the technology of the radio telephony evolved into something similar to
the modern day walkie-talkies for urgent communication at camp or in the field (TopBits, 2010).
These phone-like communication tools were carried in a backpack and were for the use of the
highest ranking soldiers. Since the phones were so large, it was even required that someone was
designated to
CatTY
around the large and cumbersome equipment. It was after World War II that
the evolution of cell phones really began to take off. In the late 1940's, scientists had discovered
more complicated ways to send and receive signals (TopBits, 2010).
14
Later, in the late 1960's and early 1970's mobile phone technology had come as far as
cordless phones. This phone set-up required the user to stay near its basing station or else the
signal would be lost and the call would end resulting in the phrase, dropped call. Scientist, Dr.
Martin Cooper, began to wonder what it would take for a phone user to be able to move around
freely without dropping a phone call (TopBits, 2010). Dr. Cooper and other scientists in the
United States worked steadily for 12 years to advance the technologies of cell phones until its
approval in 1982. After 1982, the cell phone market took off introducing the first generation of
many of the modem day cell phone (TopBits, 2010).
First generation cell phones consisted of the Motorola DynaTAC 8000X, known as the
brick for its size and weight comparison to one, and also cell phones that were installed into cars,
ones that came in tote bag that could be plugged in for making calls, and even some that came as
a briefcase for users to carry around extra batteries and make calls (TopBits, 2010). All of these
cell phones were limited in functionality and large in size. Many phones in this era, roughly 1983
to the early 1990' s were heavy, large in size and shape, and were not convenient. Cell phone
users in this generation found that talk time was limited with a ShOli battery life, some needed to
be plugged into DC outlets, and cell phones needed to be carried in their own bag. Although cell
phones were growing in popularity, they were still expensive and not user-friendly (TopBits,
2010).
Second generation cell phones, known as 2G, bridged the gap between size and quality of
cell phones for future generations. The second generation of cell phones only lasted for a short
period of time statiing in the 1990's (TopBits, 2010). Cell phone researchers were hard at work
finding ways to make networking faster for better quality phone calls and from more locations.
Also, advances in the reduction of size and weight in cell phones with the continued accuracy
and quality, with longer battery life made cell phones a growing technology that more users were
15
eager to get their hands on. In addition, second generation cell phones also began to see the
introduction of low resolution cameras, games, and other basic functions that added to cell
phones' overall value. As cell phones were becoming more affordable and the quality increased,
more and more people found the value of owning a cell phone, which made cell phone use go
viral (TopBits, 2010).
Third generation cell phones, known as 3G, continue to be maintained in 2011. Relative
to 2G phones, third generation cell phones are capable of more than sending and receiving phone
calls. Phones that are part of the third generation have the capability of sending and receiving
text messages, have higher resolution cameras, video capabilities, internet access, e-mail
capabilities, games, Wi-fi, movie and radio streaming, GPS abilities, and other appealing and
useful applications. Third generation phones are capable of having excellent quality phone calls
both indoors and outdoors with people of all ages having cell phones all around the world
(TopBits, 2010).
Fourth generation cell phones, known as 4G, have become even more widespread in
2011. Many cell phones users utilize smart phones, cell phones that operate using the internet,
and consist of the highest speeds for data rates that make cell phone applications faster. In the
future, most third generation cell phones will switch over to the fourth generation of cell phones
making the addition of internet in cell phones a standard model. Cell phones are likely to see the
integration of additional applications such as unlocking a vehicle from afar, setting a thermostat
at home, or replacing plastic credit cards by scanning the phone aps from any location in the
world (TopBits, 2010).
Ways Students Misuse Technology
Since their development, personal pagers or beepers in schools have been an issue of
debate for educators and administrators. The first use of communication through technology in
16
the education climate was through beepers, which first became a popular item in schools in the
early 1990's (Danforth, 2003). Beepers were the original means of technological
communication; however cell phones took over, eventually allowing more communicative
possibilities. Educators historically attributed the widespread use of beepers and pagers to drug
trafficking in the late 1990's and put bans on them (DanfOlih, 2003). Now that cell phones are
used by most students, the real purpose for students having a cell phone at school is often
unclear.
In 1999, the Columbine school shooting crisis changed the minds of educators and
parents regarding student use of cell phones, especially while at school (Current Events, 2002).
Many of the Columbine students called parents and law enforcement to notify them of the tragic
events of the day. Since the tragedy, parents have continued to encourage constant
communication and provide cell phones to students because they feel as though it closes the gap
in safety (Danforth, 2003). Cell phones give students easy access to call parents for help or
notify parents of an issue immediately. While at the same time, parents claim they feel safer
knowing their child has a cell phone in order can call the police in an emergency situation
(Current Events, 2002).
Similarly, the events of September 11, 2001 also playa role in how cell phones have been
viewed as a necessity and also created the widespread changes in allowing students to have cell
phones at school. Some of the victims in planes and at the Twin Towers were able to contact
family members, explain the situation and say their final good-byes (Canoll, 2004; St. Gerard,
2006). Having a cell phone at school is not necessarily a recent trend, but how students cUlTently
use cell phones has brought up concerns regarding safety and necessity.
Many schools around the nation continue to implement bans on cell phones as the
applications, uses, and services of cell phones continue to expand and bring up issues of
17
controversy. In the article Camera Phones Raise Whole New Set of Privacy Issues, the author
claimed that one of the biggest issues educators have faced in the classroom was the invention of
tiny cameras in cell phones (CatToll, 2004). For example, a partially dressed student in Ireland
was photographed using text messaging and data messaging capabilities. The cell phone
photographer sent the indecent picture to students and people all over the country (Canoll,
2004). Posting such pictures raised the question of privacy resulting in legal issues peliaining to
the misuse of technology. The initial cameras in cell phones were available in 2003 and 2004 and
produced small, grainy pictures. However, in 2011 cameras in cell phones produce pictures that
are quite clear and capable of better quality pictures (David, 2010).
Not only have cell phone creators enhanced the quality of pictures, but many cell phones
come with video features, which can be also sent through data cell phone messaging (St. Gerard,
2006). In regards to cell phone use in schools, teachers have reported students taking
embanassing pictures or videos and posting them on the internet for others to view (Canoll,
2004; St. Gerard, 2006). This may embarrass students and teachers, but also poses legal issues
that students may need to be aware of and held accountable for. Pictures sent or posted for others
to see without permission imposes on individual's right to privacy. The person being
photographed or taped can take legal action and claim the picture or video taker is harassing
them, or is a theft of proprietary information (Canoll, 2004; St. Gerard, 2006).
Another form of text of picture messaging is sexting. Sexting involves sending written
text in messages that are sexually provocative, nude or provocative photographs, and sexually
explicit videos through cell phones (AP, 2009). This form of sexual messaging has been
perceived as more damaging than texting as legally it is an invasion of privacy and very
damaging to the individual.
18
One survey by the National Campaign to Prevent Teen and Unplanned Pregnancy (2008)
examined text messages that involved sexual content. The results indicated that of the
participants in the study, 20% of teens, ages 13-19, have sent or posted nude or semi-nude
photographs they have taken of themselves. Thirty-nine percent of the teen participants indicated
they had posted on the internet or sent someone sexually provocative messages (National
Campaign to Prevent Teen and Unplanned Pregnancy, 2008). Given the high amount of sharing
sexually charged messages, one may question the confidentiality limitations, and wonder if the
person intended to receive the message was indeed the one to receive it. The survey found "44%
of both teen girls and teen boys say it is common for sexually suggestive text messages to get
shared with people other than the intended recipient" (National Campaign to Prevent Teen and
Unplanned Pregnancy, 2008). With that being said, school-age students do not always
understand the repercussions of their actions when using cell phones or internet access.
Reasons for sending sexually suggestive texts varies from teen to teen: to flirt or to get
someone to like them, to do it as a joke, to present someone with a sexy image, or because
someone pressured them to send the sexually messages, pictures, or videos (National Campaign
to Prevent Teen and Unplanned Pregnancy, 2008). In many cases, sexting has gone unnoticed
and undetected. Unfortunately for some, the sexually suggestive information is often found and
some students face legal implications.
In one case of sexting, three Texas male teenagers were the recipients of sexually
suggestive messages sent by their female classmates. The messages were found and the students
were found guilty of possessing child pornography after the picture messages were found on
their phones (Associated Press, 2009). Globally, growing numbers of school-age students are
participate in sending and receiving sexually suggestive messages, pictures, and videos. As the
19
phenomenon continues, students will face legal repercussions, with the most common charge as
possessing child pornography (Stone, 2009).
Since the development of cell phones, sending and receiving texts, videos, and pictures
have contributed to academic misconduct in schools all over the world (Clark, 2008). The
academic integrity of students is at stake when they decide to cheat on exams, plagiarize, or
cheat on homework assignments (Tippit, Ard, Kline, Tilghman, Chamberlain & Meagher, 2009).
Students have been documented using cell phones or phones with internet access to assist them
with cheating in multiple formats. These include: essay mills, taking pictures of an exam, texting
a friend for assistance during an exam or storing information on the phone and they all constitute
as inappropriate use of a cell phone to enhance academic performance. Carroll (2004) indicated
that educators have feared students would begin to get creative with cell phones as a means to
cheat or assist them academically at school since their creation. Educators thought student might
take pictures of things using their cell phones related to test materials and begin cheating using
those pictures. However, the cheating via cell phones had already made its way into the
academic climate much earlier than many educators had anticipated.
In 2002, twelve students were caught cheating on their finals at a Maryland college
(Manning, 2009). Six students who were taking their finals had been sending text messages to
six other students who were not taking the exam. The six taking the final were texting questions
about answers to the exam and the students not taking the exam were supplying answers via text
message (Manning, 2009). The students not taking the final were aware of how to access the
professors personal grading and test information on the computer system. They were sending the
exam answers through text messages. However, the professor administering the test had set a
trap upon hearing past students had gone into the files and were offering information on how to
20
access files to cheat. The students were caught in the act of cheating when the answers matched
the fake answer key rather than the correct responses to the exam (Manning, 2009).
New cell phones with internet capabilities make cheating even easier for students taking
exams. Students can Google questions while taking exams or find ways to discretely check
answers on the internet via cell phone unknown to educators (Johnson, 2010). With the new 4-G
phones, students are able to multi-task data systems to further find information more quickly and
go undetected in a variety of testing situations. Ways to cheat using cell phones and wireless
internet access have added to the imagination of students, and they can search for answers, or
find ways to cheat that they may not have come up with on their own without the technology
assistance provided by using a cell phone in class (Johnson, 2010).
Misusing the Internet
The internet has made its way into classrooms and as discussed previously, the internet is
now accessible on many phones used for searching the internet. Almost a decade ago congress
passed the Child Internet Protection Act of 2000 (CIP A), which put guidelines and restrictions in
place for internet use in school libraries, classrooms and public libraries to protect students
(Suozzi, 2009). Since the enactment of this law, which was developed as a result of student
inappropriate use of the internet to purchase weapons and make postings before the Columbine
school shooting and other related mass killings across the nation, congress and educators have
struggled to maintain up-to-date fire walls to prevent issues related to students and internet
misuse (Suozzi, 2009). The biggest argument opposing filtering programs was the restrictions
not only filtered out dangerous websites, like pornography, explicit chat rooms, and web sites not
deemed educational, but also blocked many useful websites for some people (Suozzi, 2009).
Similarly, the United States government had created restrictions for internet use in many
institutions but the restriction limitations continue to lag behind current technology. Many
21
schools and public libraries already had installed the required filtering programs or had installed
a program of their own for filtering purposes (Villano, 2008). One survey indicated that 59% of
school technology staff had identified students accessing website on the internet that had
inappropriate content and should have been filtered (Media & Methods, 2004).
Most parents and educators would agree that filtering to some degree should have its
place in schools, but in the article What are We Protecting Them From, the author found that
students found ways to disable filters and or get around them (Villano, 2008). Though filtering
programs seem to be the answer to protect students from dangerous internet material, the
problem lies with students not having filtering program on their personal cell phones as they do
not connect to school regulated internet service.
Therefore, the CIPA and United States government intends to restrict derogatory or
inappropriate information from being viewed on the internet while at school, it does not restrict
or filter internet access or searching on cell phones while on school property. Therefore, all of
the filtering programs do not protect students from the dangers they view on their cell phones
throughout the school day. In truth, students continue to find ways onto the cyber world even
when they are restricted by school policies regarding computers. They access the internet using
their cell phones, iPods, and other electronics that are capable of picking up WiFi (Villano,
2008). In one survey, 48% of students estimate that during the school they spend at least two
looking at internet content. Also, students had a difficult time estimating how much of that time
on the internet was spent on their cell phones (Media & Methods, 2004).
The results from a Pew Research Survey (Lenhart et aI., 2010) identified that 93% of
students spend some time surfing the internet and 36% of them are going on the internet several
times a day. Students report they are surfing the internet at school, at home, and continuously
throughout their day on their cell phones. With that in mind, the internet has gone viral. The
22
internet is at the fingertips of many school age students. Because so many students are on the
internet with increased frequency, educators and parents may need to examine in what ways
students are spending their time on the internet.
One thing that has become popular in the last ten years is social networking sites
(Villano, 2008). These sites vary in name and purpose, yet a growing percentage of people log
on each day to check their accounts and communicate with others. Villano (2008) indicated that
in the 2007 National School Boards Association Study, 96% of the participating students
responded that they identified as being part of a social network.
Educators are not concerned about the fact that so many students are using social
networking sites; however, they are concerned about the information that is being shared. When
private personal information is made public, shared with strangers, or exchanges made from
minors to adults, anything from "harassment, cyberbullying, kidnapping, or molestation" or even
worse can occur (Villano, 2008, p. 50).
According to Willard (2007), cyberbullying is "being cruel to others by sending or
posting harmful material or engaging in other forms of social aggression using the Internet or
other digital technologies" (p. 1). Harassment is the repetitive sending or receiving of insulting,
crude, or mean messages (Willard, 2007). Therefore, it can be difficult to differentiate between
cyberbullying and harassment using the internet.
The concept of bullying and harassment are not new in the education climate. Student's
insulting behavior toward one another has been around for decades and generally aimed at
students who identify as being different (Siegle, 2010). Bullies can now use cell phones and send
messages on the internet that does not require for the sender and receiver to be face-to-face.
Cyberbullying allows for the sender to be anonymous if they choose to be, and for someone to
23
say whatever they want to say, and where others can view the crude and insulting comments
about a person on the internet (Siegle, 2010).
In a survey by Associated Press-MTV (2009), 75% ofpatiicipants between ages 17-24,
believed that digital abuse is a serious concern. But only about 50% of the patiicipants
considered the information they post could have repercussions later on (Associated Press-MTV,
2009). The survey results implied that people want to have freedom of speech, yet believe that
other people may be sharing too much. The participants also indicated to have little concern
regarding the text and picture they post and whether it offends someone.
Students do not seem to fully understand the risks and long term effects that insults and
harassment can have on another person. Harassment and bUllying at school does not always stop
at the school house doors. Oftentimes, cyberbullying is documented as an extension of negative
treatment students receive from bullies at school (Juvonen & Gross, 2008). What many bullies
do not understand about their bullying and cyberbullying behaviors is that victims may
experience anxiety and other mental health problems as a result. Some professionals even
describe the lasting impacts of cyberbullying on their victims as symptoms of post traumatic
stress (Juvonen & Gross, 2008).
Sexting, as discussed earlier, can lead to a harmful or dangerous situation. One student
found herself to be the victim and the target of online harassment and cyberbullying from
classmates after an incident of sexting gone wrong (Zetter, 2009). After the sexing incident with
a boyfriend, classmates at school continued to harass her using the internet from social
networking sites and instant messaging. Due to the unfortunate circumstances, the student was
unable to handle the extreme harassment and bullying, and took her own life (Zetter, 2009).
Suicide is often the extreme in a given situation; however, cyberbullying and harassment often
24
go unreported because it is more difficult for parents and adults to observe (Juvonen & Gross,
2008).
Today's students are using the internet for more than social networking. The average
student is bombarded with advertisements, some that include information about successful paper
writing and prompts to buy papers on any topic. Students utilize essay-creating websites, known
as essay mills, and pay someone to write the paper for them. Essay mills have turned up nearly
everywhere, and are easily accessible fl.-om any search engine (Bartlett, 2009). Students often pay
a hefty price in order to avoid having to do their own work. They simply provide the website
with the topic they need an assignment on and some details about the expectations from the
teacher (Clark, 2008). Essay mills seemed to be popular with college students at first, but now
high school students utilize essay writing websites to complete their papers and homework
assignments for them (Clark, 2008).
The academic integrity of students is in question with the use of essay mills. The
Josephson Institute of Ethics (2004) found that of the students surveyed, 62% admitted to
cheating on exams. The survey did not indicate how the students had gone about cheating.
However, YouTube and other video sites have modules that demonstrate ways for students to'
cheat and go undetected (Clark, 2008). The ACT and SAT tests have adapted and changed some
of their procedures for test security to ensure that students have as few opportunities as possible
to cheat on their college entrance exams (Johnson, 2010).
Students continue to find ways to cheat for other exams by using notes inside of water
bottles, note cards, calculator cheat-notes, answers inside hems of skirts, putting things in
pockets, panty hose, and even cell phones (Clark, 2008; Johnson, 2010). The internet offers
advice for students as to how to cheat in certain kinds of exams, what to say to the teacher, and
how to get out of the situation (Johnson, 2010). The problem with students having internet access
25
on their phones at school is that students can have access to these sites while in class or during a
test.
Given all of the information about the possibilities of how students spend their time on
intemet, it is impOliant to understand that students with intemet access on their phones
acknowledge they use the intemet on their phones throughout the school day, whether they are
allowed to or not. As a result, students are logging in and signing on to potentially access the
dangers of the intemet on an hourly and daily basis.
Legal and Ethical Implications
With the number of public media cases of student's misusing technology climbing, the
behaviors tend to question issues of legality and ethical values. Ethics, depending on who is
involved, may cross into the boundary of what is legal and illegal. Cheating or behaving
unethically is not always punishable by law or capable of staying on a person's legal record.
However, a threshold exists where unethical behavior is capable of being punishable by the law.
As mentioned earlier, the Children's Intemet Protection Act of2000 (CIPA) may try to
protect children while at school from the types of pomography and profanity found on the
intemet, but it does not protect children from what they are capable of doing to each other on the
intemet (Suozzi, 2009).
The first amendment rights are protected in schools, however, putting some restrictions
on types of intemet speech and communication that may threaten or harass others at school is
recommended (Suozzi, 2009). Schools can put restrictions on what is said verbally, but the
difficulty lies in what students post on the intemet that can become accessible from anywhere.
Cyberbullying, harassment, and crude or inappropriate comments can make their way onto the
school grounds wherever the intemet is available (Carroll, 2004). School administrators do have
some rights to protect students if celiain communication disrupts or impacts the educational
26
environment (Suozzi, 2009). It becomes extremely difficult for school administrators to monitor
all of the communication that goes on while students are on school grounds, and therefore some
legal ground rules have been set but are difficult to interpret and enforce (Suozzi, 2009).
Schools have the ability, but not enough time or staff, to restrict the communication that
is being sent over the internet and by cell phones (Suozzi, 2009). An internet message or text
message has to be received or opened at school to be questionable by law or school policy, not
necessarily where the message was sent from (Suozzi, 2009). This legal loophole is enough to
confuse educators and school administrators, which keeps schools from fully understanding all
student and school rights as they seem to be written as new cases are presented. Not only can the
source of the communication or inappropriate speech be sent from school or at home, but the
information that is received is also under legal scrutiny (Suozzi, 2009). If the text is threatening
or able to cause an educational disturbance, regardless of the place it is received, it can be
punishable by school law or by state and federal law. The Supreme COUli is heavily involved in
cases of harassment and bullying when school administrators were aware of the problem and did
little to remedy the situation (Suozzi, 2009). Serious public cases of bullying and harassment
which resulted in violence which were recognized prior to an academic disturbance have
prosecuted students for their illegal or harmful behavior and educators for their inattentive
behavior.
Depending on the type of message that is being sent, the right to privacy may be violated.
When students post videos or pictures that they take without the person in the media knowing,
the person's privacy may be violated. Reported by Carroll (2004), according to lawyers, taking
pictures without the other person's consent and publicly posting the content can result in a legal
battle. A student may be charged with creating a hostile work environment if it potentially
hmms, makes the educational environment uncomfortable, or is dangerous to the teacher or their
27
reputation (CalToll, 2004). Other charges for indecent picture taking can result in an invasion of
privacy. If a picture or video of someone is found, the victim can claim that it is a theft of
proprietary information (CalToll, 2004). A simple prank or joke sent by one student to another
student or faculty member may seem funny at the time; however, after the fact; the actions may
be subject to punishment by law to include jail time, a criminal record or monetary penalties.
In summary, it is an insurmountable job for schools and parents to always know what
students are doing with cell phones and while accessing the internet. There may come a time
when schools just need to turn investigations over to the police as the school personnel are not
trained in internet investigations, nor do they have the resources to pursue the avenues that
technology affords students. It is tough enough to try to keep students safe when using
technology at school while informing them of the legal hazards of misusing technology and the
possible impact it may have on future employment, scholarships and getting into colleges with a
criminal record.
28
Chapter III: Summary, Discussion and Recommendations
Introduction
The infOlmation discussed in this section serves as a summary and analysis of the
literature reviewed regarding students' misuse of cell phones. The information may help school
counselors understand and identify how students are misusing cell phones. Finally, the chapter
concludes with suggestions for future research.
Summary
The literature reviewed identified in detail how cell phones have evolved and made their
way in to the educational environment. Starting with beepers, pagers, and now cell phones,
students possess the most technologically advanced devices to communicate openly with others.
Cell phones have many capabilities, such as taking pictures and videos, sending text messages,
making phone calls, using the internet, and playing games or other distracting applications (St.
Gerard, 2006). Students have negatively used cell phones by taking inappropriate pictures and
videos. The sexting phenomenon has yielded legal implications, yet students struggle to
understand how sending sexually suggestive pictures and text can have a negative impact on the
future of the sender or receiver of the messages. Many students believe that sending
inappropriate messages is wrong or could cause harm to someone, but fail to believe that any
negative repercussions could affect them personally (Associated Press-MTV, 2009).
The internet, including access on cell phones, offers many ways for students to
potentially misuse the information readily available at their fingertips. With many students
having internet access on their phone, infOlmation on the internet can be seen almost anywhere
in the world, including school. The accessibility of the internet on computers at home and
school, and cell phones opens the door for students to make poor decisions when using the
internet. Social networking sites have caused potential danger to adolescents globally because of
29
the amount of bullying and harassment that occurs through online chatting allowing information
to be public for others to see (Juvonen & Gross, 2008).
The internet provides students with the ability to search for information that is educationrelated. When doing homework using the internet, students can find ways to cut comers.
Students have always found ways to cheat, and by using the internet people can share the latest
trends on how to cheat (Clark, 2008). Essay mills provide students with the luxury of not having
to do their own work, but at a price, and in the meantime also question a person's ethical
integrity.
Currently, student's ethical values and academic integrity is greatly debated (Tippit et aI,
2009). Educators are concerned about why more students are cheating and why they cheat so
often (Tippit et aI., 2009). Cheating is not the only source of unethical behavior for students, but
it is what greatly affects a student's grade and educational experience. The purpose of school is
to give students an education and provide skills for problem solving. Students are finding some
morally wrong or unethical quick-fix on the internet and bypassing having to retain information
or learn lifelong skills (Sankran & Bui, 2003).
Some students have infringed upon the privacy of other students and faculty, sent child
pornography, have been in the possession of child pornography, have made inappropriate,
damaging, or violent threats, and used the internet to harass and bully others to the point of
suicide (Suozzi, 2009). Students may not even realize that what they are doing is illegal, and that
they can be prosecuted by law enforcement (Suozzi, 2009). School age students, who typically
range from 12-17 years old, are still considered minors and continue to cross the boundary from
being unethical to being illegal. Students who are caught may face legal consequences but may
not receive as serious sentences as adult counterpmis for the same criminal activity.
30
Discussion
Given all of the information about the number of students with cell phones, cell phones
with internet access, and the number of students who use the internet, it can be inferred that a
majority of American students either have a cell phone or are using the internet regularly and
there is bound to be some misuse of technology (Lenhart, 2009; Lenhart et aI., 2010). Students
may be left unsupervised with cell phones or have the ability to search the internet and come
upon dangerous content or social networking sites that expose them to harassing language. Since
it is impossible for school age students to constantly be monitored regarding their technology
use, other strategies seem necessary.
It appears that the elP A of 2000 was meant to help filter and restrict student internet
usage, but students have found ways to get past the restrictions while on school computers and
view the internet on cell phones anyway (Hope, 2006). Many students are accessing the internet
from their own personal cell phones throughout the entire school day. Regardless of how
students are accessing the internet, once students have made their way into dangerous sites on the
internet, it is still necessary to continue educating students, and not to hope that filtering
programs or bad judgment will make the students invulnerable (Siegle, 2010). It may be
beneficial for educators and parents to work as an alliance to monitor technology use in all
environments to keep students safe.
Parents play an important role in reducing the amount of misuse that occurs when schoolage students use technology. It is likely that parents are the ones who are providing their children
with cell phones and cell phones with internet access at an early age, but some parents lack the
ability to provide any guidance about appropriate use. It is important for parents to do some sort
of educating at home about using cell phones and the internet in a positive, ethical, and legal way
(Siegle, 2010). There is also a need for instructing students on what appropriate use of
31
technology looks like, to illustrate what inappropriate use of technology can look like, and then
to show students what they can and should do by setting good examples, monitoring use and
setting guidelines for children (Siegle, 2010).
Educators also play an important role in the lives of students, as they are responsible for
students well being for about eight hours of the school day. Educators are relying more on the
filters and fire-walls of school computers, and are often leaving out the idea that youth still need
some educational component, especially when it comes to internet on cell phones. With so many
public cases of students behaving unethically or illegally while using technology; one must
wonder if students are aware of what is legal or illegal. Some parents and educators appear to be
leaving out the education aspect as they are not always communicating the dangers and
consequences of looking at or sending inappropriate content (Siegle, 2010).
While establishing consequences and punishing students for misusing technology is
necessary, there appears to be a paradigm between what students think they can and should do,
and what they are actually doing. Some schools have implemented contracts that go over student
appropriate use of cell phones and internet while at school. It may be beneficial for many reasons
that the concept of appropriate cell phone and internet use at school to be implemented and
enforced at home (Siegle, 2010). Any type of reinforcement that is consistent at home and at
school can has the potential to establish more successful results in students appropriately using
technology (Siegle, 2010).
In the state of Virginia, legislators passed a law that required schools to implement
cUlTiculum that educates students about the dangers ofthe internet (Villano, 2008). Students
learn about the dangers of the internet and other technology starting in kindergarten until the
time they graduate (Villano, 2008). This lifelong approach to educating students about
appropriately using technology has not been implemented in all states; however, it makes sense
32
that changing technology and technology use will always be addressed while students are in
school. The research and implementation of an all-school curriculum regarding technology use
like the one in Virginia may fall under the responsibility of school counselors. School counselors
would need to be prepared to handle this assignment while providing a confidential relationship,
and developing an open line of communication (Siegle, 2010).
Students have access to cell phones and the internet at an almming rate that continues to
increase each year. Students are using these means of communication, and at times they are
negatively using technology. Students often know more about how to use technology than adults
as they are tend to arm themselves with the latest technological trends. Parents and educators
have an obligation to keep up with technology and student use of technology in order to educate
about appropriate and inappropriate use (Siegle, 2010). Dangerous or harmful content may result
from technology use; however, parents and educators have the option to continue to let students
be exposed potentially unsafe material, or to educate students about how to benefit positive from
technology.
Recommendations
It is evident from the literature that misuse of technology by students is affecting
American youth. Students using cell phones and the internet have caused parents and educators
to question how safe students are. Yet, much of the literature recommends that intervention and
prevention of misuse begins with parents and continues into the educational environment.
One recommendation comes from Villano (2008) who says there is the need for schools
to stop relying solely on filtering programs because they are not as reliable as they are intended.
Filtering programs are good to an extent for school computers, but schools have to make a place
in the curriculum for technology, safety, and appropriate use of cell phones and internet use.
Filtering programs rarely are used on cell phones. In the state of Virginia, every child will
33
receive information each year about using technology safely (Villano, 2008). Villano (2008)
further suggests that it is possible to increase appropriate internet use by continuously educating
students about the dangers of technology and what appropriate use of technology looks like.
Another recommendation from Siegle (2010), who suggested provided a list of tips for
parents and educators to consider when dealing with the issues of cyberbulling. Siegle (2010)
suggests that there needs to be a great deal of education that goes on at home and in schools.
Educators are responsible for students at school, and parents are responsible for students when
they are at home. Parents and educators may need annual training to stay current with the trends,
prevention, and intervention strategies that relate to technology use (Siegle, 2010). Schools can
continue to survey the student body about the problems that students appear to be having and
adapt the curriculum to fit the current needs of the students (Siegle, 2010). There also appears to
be a need for peer mentoring so that students can help educate one another on appropriate use
and to share experiences about the dangers of cell phone and internet use (Siegle, 2010).
Given the nature of how fast technology evolves, the literature used for this review may
not have covered all aspects of student misuse of technology. There may be more detailed and
specific information related to cell phone use, internet use, legal implications, and intervention
and prevention strategies for technology use. Fmiher research is needed to continue identifying
and understanding how students are using technology to contribute to the current body of
knowledge.
School counselors can implement and adapt curriculum to include the latest information
and strategies to help keep children safe from the misuse technology at school. It is hoped that
with all parties involved including parents, educators and school counselors, children will be safe
and well-informed about the potential misuse and consequences for inappropriate internet access.
34
References
(2002). Calling cell phone bans into question. Current Events, 101(19), 3.
(2004). Survey on inappropriate internet access in schools. Media & Methods, 41(2), 28.
Associated Press (2009). "Sexting" shockingly common among teens. Retrieved from:
www.cbsnews.comlstories/2009/0 1115/nationallmain4723161.shtml
Associated Press-MTV. (2009) A thin line: 2009 AP-MTV digital abuse study. Retrieved from:
www.athinline.orglMTV-AP _Digital_Abuse_Study_Executive_Summary.pdf
American School Counseling Association. (2004). Ethical standards for school counselors.
Alexandria, VA: Author.
Bartlett, T. (2009). Cheating goes global as essay mills multiply. (cover story). Chronicle of
Higher Education, 55(28), AI.
Carroll, C. (2004). Camera phones raise whole new set of privacy issues. Education Week,
23(23),8.
Clark, K. (2008). Taking a bite out of cheating, with the help of technology. Us. News & World
Report, 145(8), 74-78.
Danforth, E. (2003). Mixed signals. American School Board Journal, 190(7), 30.
David, G. (2010). Camera phone images, videos and live streaming: A contemporary visual
trend. Visual Studies, 25(1),89-98. doi:10.1080/14725861003607017
Goldman, R. (2010). Teens indicted after allegedly taunting girl who hanged herself Retrieved
from: http://abcnews.go.comlTechnology/TheLaw/teens-charged-bullying-mass-girlkilllstory?id=10231357
Hope, A. (2006). School internet use, youth and risk: A social-cultural study of the relation
between staff views of online dangers and students' ages in UK schools. British
Educational Research Journal, 32(2), 307-329. doi:10.108010141192060569305
35
Johnson, C. (2010). Assessment lab [PowerPoint Slides]. Retrieved from:
https:lluwstout.courses. wisconsin.edu/d211Ims/content/home.d21 ?ou= 1186896
Josephson Institute of Ethics (2004). 2004 report card on the ethics ofAmerican youth.
Retrieved July 27,2010, from:
www.josephsoninstitute.org/Survey200412004reportcard~ressrelease.htm.
Juvonen, J., & Gross, E. (2008). Extending the school grounds?-Bullying experiences in
cyberspace. Journal ofSchool Health, 78(9),496-505. doi: 10.1111/j.17461561.2008.00335.x
Lehnart, A. (2009). Teens and mobile phones over the past five years: Pew internet looks back.
The Pew Internet & American Life Project. Retrieved from:
http://pewinternet.org/RepOlis/2009/14--Teens-and-Mobile-Phones-Data-Memo .aspx
Lenhart, A., Purcell, K., Smith, A., & Zickuhr, K. (2010). Social media and young adults. The
Pew Internet & American Life Project. Retrieved from:
http://pewinternet.org/RepOlisI2010/Social-Media-and-Young-Adults.aspx
Manning, S. (2009) Maryland students admit to cheating with cell phones. Retrieved from:
www.dailygamecock.coml2.3455/maryland-students-admit-to-cheating-with-cell-phones1.382518
National Campaign to Prevent Teen and Unplanned Pregnancy. (2008). Sex and tech: Results
from a survey of teens and young adults. Retrieved from:
www.thenationalcampaign.org/sextechl
Sankaran, S., & Bui, T. (2003). Relationship between student characteristics and ethics:
Implications for educators. Journal of Instructional Psychology, 30(3), 240.
36
Siegle, D. (2010). Cyberbullying and sexting: Technology abuses of the 21st century. Gifted
Child Today, 33(2), 14.
St. Gerard, V. (2006). Updating policy on latest risks for students with cell phones in the school.
Education Digest, 72(4),43.
Stone, G. (2009). 'Sexting' teens can go too far. Retrieved from:
http://abcnews.go.com/Technology/WorldNews/Story?id=6456834&page= 1
Suozzi, P. (2009). Shock and awe: Schools' internet liability. Insurance Advocate, 120(7), 18.
Tippitt, M., Ard, N., Kline, J., Tilghman, 1., Chamberlain, B., & Meagher, P. (2009). Creating
Environments that FOSTER academic integrity. Nursing Education Perspectives, 30(4),
239-244.
TopBits. (2010). History of cell phones. Retrieved from: http://www.tech-faq.comlhistory-ofcell-phones.html
Villano, M. (2008). What are we protecting them from. T. H E. Journal, 35(5), 48.
Willard, N. (2007). Educator's guide to cyberbullying and cyberthreats. Retrieved from:
www.cyberbully.org/cyberbully/docs/cbcteducator.pdf
Zetter, K. (2009). Parents of dead teen sue school over sexting images. Retrieved from:
www.wired.com/threatleve1l2009/12/sexting-suit
Download