Sie sind auf Seite 1von 13

IGI PUBLISHING ITJ4110

22 International Journal of Technology and Human Interaction, 4(2), 22-34, April-June 2008
701 E. Chocolate Avenue, Suite 200, Hershey PA 17033-1240, USA
Tel: 717/533-8845; Fax 717/533-8661; URL-http://www.igi-global.com
This paper appears in the publication, International Journal of Technology and Human Interaction, Volume 4, Issue 2
edited by Bernd Carsten Stahl © 2008, IGI Global

getting Involved:
Perspectives on the use of True Projects
as Tools for developing ethical Thinking in
Computer science students
Per Arne Godejord, Nesna University College, Norway

absTraCT

This article describes a unique, educational project within the field of ethics and computers that
was implemented in the undergraduate study of computer science in 2002. Nesna University
College has been using the example of sexual abuse of children in case study teaching in social
informatics, in order to create an environment for intrinsically-motivated learning within the
field of ethics in computer science. The project also gave the students a unique opportunity to
get involved both emotionally and practically in the field of social informatics. The project is
run in cooperation with Save the Children Norway and the Norwegian National Crime Squad.
The computer science education at Nesna University College is the only computer science
education in the world which has sexual abuse of children as the main topic on the computer
science curriculum. The computer science students provide both the Save the Children Norway
and the National Criminal Investigation Service with reports on various topics such as secure
chat, camera phones and possible abuse, Freenet as a tool for sexual abuse, and so on.

Keywords: didactics; ethical/societal issues; pedagogy; social informatics

TermInology years of age. “Sexual abuse” is used in


The terms “Internet” and “digital media” this article to describe both the activities
as used in this article encompass the by grown-ups to induce children in talk-
terms “World Wide Web” and “cyber- ing about sex with them in chat rooms,
space.” The communication that is of meet them for sex, and the distribution
concern here is what is accessed via chat and use of child pornography. The term
rooms. The term “children” or “young “child pornography” is defined as any
people” is applied to people under 16 visual depiction—including any photo-

Copyright © 2008, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
International Journal of Technology and Human Interaction, 4(2), 22-34, April-June 2008 23

graph, film, video, picture, or computer have readily embraced the new com-
or computer-generated image or picture, munication medium, and they utilize
whether made or produced by elec- it in quite a number of ways. A wide
tronic, mechanical, or other means—of array of digital tools is enabling kids to
sexually explicit conduct where children express themselves, to create their own
are engaged, or made to look like they identities, and to personalize the media
are engaged, in sexual activity. The they use. Their creativity seems limit-
term in Norway is often replaced with less and includes such various forms
the term “abusive material,” so as to as mp3 lists, online game characters,
underline the fact that this material is digital movies, and blogs. Just take a
not pornography as such. “Grooming” look at www.youtube.com and see how
is a term describing the activity by a kids place themselves in full view of
grown-up to gain the trust of a child the whole world, or check Web sites
with the intent of abusing him or her like the Norwegian “www.deiligst.no”
sexually. ICT stands for Information (Delicious.no), where teenage girls and
and Computer Technology. boys ask to be evaluated by their peers
on their looks and bodies. Also, blogging
InTroduCTIon is all the rage, and writing innermost
The last decade has seen a rapid de- thoughts online instead of in the old
velopment and growth in the use of diary book might seem quite fun.
computer-based communication and The problem with blogging is that
information sharing. Internet—or “the children reveal more online than par-
Net” as it is sometimes called—has ents know, and they do it because they
proven to be perhaps the most popu- think that blogs are only read by their
lar mass-communication medium in friends. No one ever told them that
the world. As with the phone and the everything placed on the Net is visible
television, most of the society has read- for everyone. There are also similar
ily adopted the technology. Its spread problems with YouTube and sites like
internationally and its penetration into “Deiligst.no.”
almost every corner of the educational Since the fall of 2002, the depart-
system and family life, as well as work, ment of computer science at Nesna
is often described as a ”revolution.” University College has been working
As one of the first countries outside with a project called “Getting Involved.”
the United States to be connected to The project was a part of the undergradu-
the ARPANET, Norway has quickly ate program in computer science and
developed its use of Internet from a the course in social informatics. The
purely researchers’ tool to being second project focused on child pornography
on the list of European countries where and the Internet. In March 2003, Nesna
Internet is used daily by its population. University College signed an agreement
Children and young people in particular with the Norwegian Save the Children

Copyright © 2008, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
24 International Journal of Technology and Human Interaction, 4(2), 22-34, April-June 2008

to work closely with them on this is- change, the uses of information tech-
sue. Nesna University College is the nologies in social contexts, and the
only college in Scandinavia with this ways that the social organization of
kind of project, and the only computer information technologies is influenced
science program in the world which by social forces and social practices.
has put sexual abuse of children on its (Kling, 2001)
curriculum. In 2005, the agreement was In 2002 and 2003, Nesna Univer-
renewed for another two years. sity College had two courses in social
The main focus of the project was to informatics: SI-1, which was taught
try to fight the constant sexual abuse of during the first year of the undergradu-
children on the Internet with informa- ate program in computer science, and
tion and awareness projects directed SI-2, which was taught during the third,
both towards the computer students of and last, year. Many of the computer
Nesna University College and towards students dreaded the course in social
the local computer industry and local informatics. “This is just about Marx.
primary-, secondary-, and upper-sec- No practical computer stuff,” was one of
ondary-level schools. A secondary focus many negative comments by computer
was to get the students more involved students.
in the various topics within social in- If the students felt the course un-
formatics, especially ethical topics, by important and uninspiring, would they
using case study teaching. Our hope learn anything? In 2003, the Department
was that using this teaching method of Computer Science decided to rebuild
would liberate the students from their the course and make it more practical,
preconceived notion that social infor- with one topic as the main ethical theme.
matics is tedious and not practical, and The theme we chose was child pornog-
that ethical themes are of no importance raphy on the Internet. We believed that
to a computer professional. this would be a much more inspiring
Information and computer technol- and interesting topic for the students,
ogy has traditionally been conceived instead of the normal topics of software
as a course closely connected to the piracy and “What are ethics?”
natural and logical/mathematical sci- SI-2 was then organized into the fol-
ences. Social informatics deviates from lowing main topics:
this point of view, and the late Dr. Rob
Kling of Indiana University gave the a. Computers and law,
following definition: b. Computers and organizations, and
Social Informatics (SI) refers to c. Technological change.
the body of research and study that
examines social aspects of computeriza- The main topics were then developed
tion—including the roles of information into several smaller topics. The example of
technology in social and organizational sexual abuse of children and the Internet

Copyright © 2008, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
International Journal of Technology and Human Interaction, 4(2), 22-34, April-June 2008 25

was the glue that kept all the topics in for grown-ups who want to engage
social informatics together. The studentschildren in sexual activities. We see this
worked with different cases, ranging quite clearly on chat sites for children,
from computer forensics to problems where not every nickname supposedly
concerning the introduction of ICT in belonging to a 12-year-old boy is just
an organization, privacy legislation vs. that (Hansen, 2004).
penal legislation, and the different tasks Most children have been told not to
performed by the administrative com- meet—or to get into cars of—strang-
puting services within an organization. ers. And some have also been told not
While all the different cases were linkedto divulge personal information on the
to the project, the main work consisted Internet, so as not to fall prey to grown-
of writing reports at the request of Saveups with evil intentions. Research done
the Children Norway and the National by Save the Children Norway reveals
Criminal Investigation Service. In 2005, that children claim to be anonymous on
the students completed a report on the the Internet (Save the Children Norway,
possible use of Freenet and anonymous 2003), but despite this, most of them still
proxies as tools for distributing images give their e-mail address and telephone
and films of sexual abuse of children, atnumber to people they are chatting with
the request from the National Criminal on the Internet. Children also believe
Investigation Service. Save the Children that if they can speak to a person from
Norway and INTERPOL also expressed a chat on the phone, it will be safer.
an interest in the report, and copies were
According to some of the children that
distributed to these two organizations aswere interviewed by researchers from
well. The reports gave both Save the Chil-
Save the Children Norway, using the
dren Norway and the National Criminal phone will quickly divulge whether the
Investigation Service new knowledge, person is 14 or 40. Despite this, there
and this fact seemed to be a major factorare a number of children in Norway who
in raising the motivation of the computerhave been sexually abused by grown-
science students in completing the courseups that they first met on the Internet.
in social informatics. The abuser had managed to develop
trust in the child, and then suggested a
sexual abuse of meeting either at the abuser’s own home
CHIldren In dIgITal medIa or some other secluded place.
as an eTICHal THeme Sexual abuse might not only be
The Internet gives everyone the op- the grooming of a child, leading on to
portunity to be anonymous. You may sexual activities, but also the distribut-
be of any race, sex, or conviction and ing of what is normally called “child
create your own “world.” No one can pornography.” The term is somewhat
see you, and this “invisibility” is just inadequate, as this has nothing to do with
what makes the Internet a useful arena pornography, but is pictures, films, or

Copyright © 2008, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
2 International Journal of Technology and Human Interaction, 4(2), 22-34, April-June 2008

sound depicting criminal offense. The Dr. Tom Jewett (Jewett & Kling, 1996),
term “abusive material” has therefore which used Bloom’s taxonomy as a
replaced the old term in reports and guide. Their views are that teachers in
lectures done by the police, Save the social informatics should try to anchor
Children Norway, and other institutions the professional and ethical focus of
working within the field of sexual abuse their courses to the immediate future
of children in digital media in Norway. of the students. The most important
Once a photo of a child being sexu- focus should be to help the students
ally abused is placed on the Internet, develop an analytical understanding and
it will exist in “cyberspace” forever. It lifelong curiosity about social aspects
is therefore also important to educate of computing.
both grown-ups and young people that In Kling and Jewett’s view, it is
for every curious click on such material, not possible to teach social informatics
the abuse continues. step-by-step from a traditional textbook.
The choice of this theme as a tool They stated that students needed to get
for evolving ethical thinking in our past the concept that there is a strictly-
students was made based on a notion technical solution for all problems,
that it would be a theme that touched and “the tacit assumption that they,
our students’ hearts and minds, and a as technologists, represent all users of
theme that would seem more important technology. They need to deal carefully
than the ethics concerning downloading with ethical conflicts, not just assume
illegal music, films, and software from that they know right from wrong by
Internet. intuition alone” (Jewett & Kling, 1996).
According to the ideas of Jewett and
usIng a True ProJeCT as Kling (Jewett, 1996; Kling, 2001), one
a Tool for TeaCHIng has to develop a set of objectives for
eTHICal Issues the course, phrased in terms of student
In the beginning, the project was first performance outcomes. These objec-
and foremost connected to the course in tives are also a help in devising ways
social informatics, and it was primarily to assess performance (both teachers
the ideas from Dr. Rob Kling, Professor and students). Kling and Jewett focus
Chuck Huff (St. Olaf College), and Dr. on three ways of organizing these ob-
Tom Jewett (California State University, jectives:
Long Beach) that provided the frame-
work for the project. There are different • Describing outcomes
ideas about what kind of knowledge the • Principles and skills
students in social informatics should • Bloom’s taxonomy
acquire from completing this course,
but I decided to formulate a set of goals Our objectives were that the students
based on the ideas of Dr. Rob Kling and should attain a greater awareness of the

Copyright © 2008, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
International Journal of Technology and Human Interaction, 4(2), 22-34, April-June 2008 27

problem of sexual abuse of children and • Adaptation


the use of ICT as a tool for both the • Origination
abuser and victim, and learn about the
different problems and challenges con- In the Norwegian Upper Secondary
cerning social aspects of computing. Schools, it is the six levels within the
More specifically, we wanted our cognitive domain that are in use, and
students to be able to debate the issues
we therefore chose to concentrate on
in an organized and coherent way, to these six specific levels in our organiz-
develop their own views, and to be ing of the objectives. What we found
sensitized to the world around them. particularly interesting in using Bloom’s
At the same time, there are of coursetaxonomy as a method for organizing
certain facts that they should learn, just
our course in social informatics was
like in any other course. In the issue of
that once you get past the three first
privacy, for example, we expect them to
categories and move to the last three
know what the Privacy Information Actcategories, the students stop being neu-
and the Data Inspectorate are. Bloom’s
tral to the topic. Most students love to
taxonomy is a hierarchical framework of
analyze and discuss, but some hate it.
learning based on three domains: cogni-
This reaction from the students might be
tive, affective, and psychomotor. because the learning now causes them
In the cognitive domain, there are
to change their actions, behaviors, or
six levels of knowledge: knowledge, beliefs. According to Bloom, it is at this
comprehension, application, analysis,point that real learning begins.
synthesis, and evaluation. In the affec- Our use of Bloom’s taxonomy
tive domain, there are five levels: in organizing the course in social
informatics closely follows Dr. Tom
• Receiving phenomena Jewett’s course at CSULB, as described
• Responding to phenomena by Dr. Jewett and Dr. Kling (1996) in
• Valuing “Teaching Social Issues of Computing:
• Organizing values Challenges, Ideas and Resources.” The
• Internalizing values following few examples will illustrate
the organization. The relevant Bloom
In the psychomotor domain, there levels are in parentheses:
are seven levels:
• Helping the students to understand
• Perception how controversies are represented:
• Readiness to act identify major concepts that authors
• Guided response use to frame their arguments (pri-
• Mechanism vacy vs. prevention of sexual abuse
• Complex overt action of children) and identify specific
arguments which are based on these

Copyright © 2008, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
28 International Journal of Technology and Human Interaction, 4(2), 22-34, April-June 2008

concepts (Bloom: Comprehen- as a tool for abusers to get in contact with


sion). children and distributing pictures and
• Get the students to determine the films of sexual abuse, were implemented
impacts of specific personal and as the main theme. Through seminars,
professional work activities (includ- online discussions, and ordinary lectures,
ing systems design) on coworkers, and using representatives from Save
employers, clients, system users, the Children Norway, the Norwegian
and society in general (Bloom: National Crime Squad and the author
Evaluation). For example: The and lawyer Andrew Vachss as lecturers
impact of instituting surveillance and debaters, the students explored such
of e-mail and other ICT use of topics as personal privacy, ICT and law,
employees in order to prevent vio- ICT and ethics, seizing and securing elec-
lations of computer security rules tronic evidence, ICT and organizational
and illegal activities, which was theory, and ICT and politics. To ensure
unforeseen by the implementers. Or that theory was integrated with practical
design computer-based systems for work, the students had to do a project
application procedure that demands based on tasks given them by Save the
privacy information in every case, Children Norway and the Norwegian
regardless of the principles of the National Crime Squad. It is not unprob-
Privacy Information Act. lematic to introduce materials that might
• Use electronic media such as e-mail provoke strong feelings and make it an
and bulletin boards, observing ap- integrated part of a course. First, we had
propriate “netiquette,” and similar to be absolutely sure that all materials
conventions (Bloom: Application). used in the course were not against the
In our course, the students and the law. All the work of our students was
lecturers used Moodle to participate closely monitored and the work itself was
in online discussions about sexual conducted within predefined rules. No
abuse of children and the use of ICT students were allowed to actively search
with the author and lawyer Andrew for illegal materials, nor enter Web sites
Vachss in New York. that might contain such materials. This
of course made some of the assignments
As can be seen in these examples of harder to do, but so far the students have
how we used Bloom’s taxonomy as a solved that problem by collecting and
guide for teaching social informatics, the analyzing general information gathered
project was meant to provide a unifying from the Internet.
thread through the whole course. After Let us take a closer look at one
deciding the objectives of the course as example of a typical assignment in
described above, the example of sexual social informatics at Nesna University
abuse of children and the use of Internet College.

Copyright © 2008, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
International Journal of Technology and Human Interaction, 4(2), 22-34, April-June 2008 2

freenet: a Tool for Privacy or countries such as China and the Middle
abuse? East (Freenet Project, 2006). If this is
In 2005, our students were given an true, we might readily agree that such
assignment from the Norwegian rep- use of Freenet is laudable. One might
resentative at INTERPOL concerning of course discuss how effective the
Freenet. Three student groups chose to system is as a tool for promoting de-
work on this assignment. Freenet is free mocracy through spreading uncensored
software, developed for the Windows information, for instance, in China, or
and Unix/Linux platforms, which makes whether this is just another good idea,
it possible to publish and obtain infor- but without any significant impact. But
mation on the Internet anonymously. that would be outside the scope of this
Freenet is a decentralized peer-to-peer article. Freenet’s founders argue that
distributed data store aiming to provide only with true anonymity comes true
electronic freedom of speech through freedom of speech, and that what they
strong anonymity. Users contribute view as the beneficial uses of Freenet
to Freenet by giving bandwidth and outweighs its negative uses.
a portion of their hard drive (called In this assignment, we discussed
the data store) for storing files. Unlike with the students the various problems
other peer-to-peer file sharing networks, concerning society’s rights to protect
Freenet does not let the user control what itself and its citizens, and the right to
is stored in the data store. Instead, files individual privacy. We also discussed
are kept or deleted depending on how the possibilities of misuse, and the
popular they are, with the least popular students discovered several instances
being discarded to make way for newer of Freenet links pointing to what was
or more popular content. “advertised” as child pornography. Due
Files in the data store are encrypted to Norwegian penal code and the rules
to enable Freenet users to deny any for doing student assignments in this
knowledge of the content stored on project, the students were prohibited
their computers. The same technology from checking if the material really
that allows the anonymous to com- contained child pornography, and the
municate with a large group without possible misuse of Freenet had to be
the publisher’s identity being revealed based on assumptions and analysis
can also allow illegal material such as of available information. Despite the
child pornography to be shared with drawback of not being able to verify
anyone. This makes Freenet ideal as all the information that was collected,
an example of the problems of social the computer science classes of 2003
control vs. individual privacy. Accord- and 2005 provided both the Save the
ing to the Freenet developers, the system Children Norway and the National
is used for the distribution of censored Criminal Investigation Service (includ-
information all over the world including ing INTERPOL) with reports on vari-

Copyright © 2008, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
30 International Journal of Technology and Human Interaction, 4(2), 22-34, April-June 2008

ous topics such as secure chat, camera also an important factor for Jewett and
phones and possible abuse, Freenet and Kling (1996):
proxies as tools for sexual abuse, and so
on. The responses from both the Save Our objective, then, is to design a
the Children Norway and the National course—select topics, materials, and
Criminal Investigation Service have activities—which will develop the stu-
been enormously positive, and both dents’ internal motivation toward the
organizations have declared that the course. At the minimum, we want to
reports contributed new knowledge on reach them in a way that will resonate
how information technology could be with their own interests. At best, we want
used by abusers and victims in cases of each student to have a sense of discov-
sexual abuse. ery—to find a new and exciting way of
understanding computerization in their
THe ProJeCT as a Tool personal and professional lives.
for moTIVaTIon
Students, like all human beings, are in- Jewett and Kling’s focus on internal
herently active and curious. The desire and external motivation corresponds
to learn something new, to explore and with Deci and Ryan’s work on intrinsic
discover, is intrinsic to the nature of us motivation and self-determination (Deci
all. Still, those of us who have been & Ryan, 1985; Ryan & Deci, 2000).
working in the field of teaching for a Many students are naturally en-
longer period of time have more than thusiastic about learning, but there are
once witnessed students who seem to also some that need their instructors to
be completely disinterested from day inspire, challenge, and stimulate them.
one, or who lose interest during the They want to learn, but they also want
course. And this is especially true for to feel that learning is meaningful for
informatics students who suddenly have them and their situation:
to divert their attention from fascinating Do you, as a teacher, know what
technical issues to ethical themes. meaningful knowledge is? Do you, as a
There are many theories of what teacher, know what kind of knowledge
motivates people, but in this particular is important to me as a student? The
project, the work on intrinsic motiva- question is difficult, but if you have no
tion and self-determination by Deci answers, why should I be your student?
and Ryan (1985) was central. Self- (Dale, 1989)
determination theory is an approach to Unfortunately, there is no single
human motivation and personality that magical answer to these questions, but
investigates the basis for people’s self- in my view, we are a long way towards
motivation and personality integration an answer if we are able to involve both
(Ryan & Deci, 2000). Motivation was the hearts and minds of our students.

Copyright © 2008, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
International Journal of Technology and Human Interaction, 4(2), 22-34, April-June 2008 31

There are many factors that affect is useful in connections with informa-
the student’s motivation to work and tion technology. It was our hope that
to learn: interest in the subject matter, introducing the case of sexual abuse of
perception of its usefulness, general children would create an environment
desire to achieve, self-confidence and for intrinsically-motivated learning,
self-esteem, and patience and persis- where the students would develop a
tence. But not all students are motivated true curiosity about the various topics
by the same values, needs, or desires. in social informatics. One quote from
Some of the students will be motivated a student gives an indication that we
by extrinsic incentives: the approval of might have been successful in creating
others, overcoming challenges, and so the desired motivational orientations, at
on. The challenge for me as a teacher least as far as this student goes: “The
in social informatics was to address the assignments motivated me greatly be-
students in such a way as to enhance cause it is more fun to work for others
their intrinsic motivation for learning. than just learning various stuff.”
This was important because research has
shown us that intrinsically-motivated lessons learned
learning is superior to extrinsically-mo- The subject of sexual abuse of children is
tivated learning (Deci & Ryan, 1985). extremely sensitive and still considered
The use of Project Getting Involved taboo by some. With Project Getting
as a motivational tool was based on a Involved, we want to make our computer
study by Benware and Deci in 1984, students aware of two things:
where the results indicated that the
subjects who learned a subject with • You should refrain from viewing
expectation of putting their learning materials on the Internet that de-
to active use were more intrinsically pict sexual activities with children,
motivated than those who learned as every click on such material
without that expectation. One of the continues the abuse of the child
main focus points of Project Getting involved.
Involved was to make the students active • Children may be targeted by abusers
participants in learning social informat- online, and creating awareness of
ics. As already described, the students that fact might be a tool in the fight
used their learning to develop reports against sexual abuse of children in
for the Save the Children Norway and digital media.
the National Criminal Investigation
Service. In other words, they used their In doing so, we have had to be care-
acquired knowledge in a practical way, ful not to overdramatize the dangers, nor
thereby providing new knowledge to the raise an accusing finger at people who
participating organizations and experi- do not want to know too much about
encing that working with ethical themes this difficult topic, or parents who for

Copyright © 2008, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
32 International Journal of Technology and Human Interaction, 4(2), 22-34, April-June 2008

some reason do not take an interest in ferent lines of work, prior to applying for
the Internet and computers. higher education. Most of the students
It is not unproblematic to introduce are therefore mature grown-ups, and
materials that might provoke strong some are already parents themselves.
feelings and make it an integrated part These factors make it easier to introduce
of a course. We have to be absolutely offensive materials as a part of social
sure that all materials used in a course informatics, and the reactions from the
are not against the law. In Project Get- ordinary student has so far been that of
ting Involved, all students’ work was anger, and a strong dedication to help
closely watched, and the work itself fight child pornography.
was within predefined rules. No students This, however, is no guarantee
were allowed to actively search for il- that students who themselves have
legal materials, nor enter Web sites that been victims of sexual abuse will cope
might contain such materials. This of with having to work with this theme,
course made some of the assignments and thereby reliving the horror of the
harder to do, but so far, the students have abuse. Since the project started in 2002,
solved that problem by collecting and we have had two instances of students
analyzing general information gathered whose reactions to the project were
from the Net. based on this kind of experience. Both
We were also concerned with the were taken care of and given special fol-
possibilities of students that were them- low-ups, and both were able to continue
selves former victims of sexual abuse, working within the project.
and students who where abusers, either Despite real and imagined chal-
directly or as users of child pornogra- lenges concerning the use of sexual
phy. Nesna University College has both abuse of children in digital media, we
a social worker and a psychologist at still think it is of great importance to
the student’s disposal, and we therefore continue this project within our under-
felt that we had the expertise at hand if graduate studies in computer science.
needed. We were also prepared to spend In an increasingly globalized world, we
an extra amount of time with the students should also strive to make computer
talking to them about sexual abuse, and education more global, with global-
the importance of having knowledge in ethical themes (Kirkwood, 2001) that
order to fight this problem. are recognizable and relevant both na-
The ordinary student of Norwegian tionally and internationally. The ethical
higher education has spent 12 years in implications of the widespread use of the
school (primary, secondary, and up- Internet might be both enormous and,
per-secondary level), the typical male to some extent, still unknown (Bynum,
student has served for 6 to 12 months 1998). To fight sexual abuse of children
in the National Service, and some of the in digital media using project-based
students also have experience from dif- teaching in relevant fields of education

Copyright © 2008, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
International Journal of Technology and Human Interaction, 4(2), 22-34, April-June 2008 33

is just such an example of a global- getting our computer students involved


ethical theme. And it is a theme that with most of the aspects of this course,
exemplifies one of the challenges as for especially the ethical ones. We have also
ethical issues in the information age. In succeeded in providing our computer
some cultures, erotic pictures of preteen students with knowledge about sexual
kids are allowed (Web sites containing abuse of children and the use of ICT by
teen models—USA), while in others, it both victim and abuser. Lastly, we gave
is considered to fall within the law of the students a unique opportunity to get
child pornography (any picture placing involved both emotionally and practi-
a minor in a situation that could be in- cally in the field of social informatics,
terpreted as sexual—Norway). In such and to make an impact, however small,
instances, whose laws and values should in the continuing fight against sexual
apply? The theme of sexual abuse of abuse of children in digital media.
children on the Internet is a theme that
contains many of the important ques- aCknowledgmenT
tions we as users of Information Tech- I would like to give my most sincere
nology are faced with. Is any picture of a thanks to Dr. Beata Godejord, Depart-
naked, or half-naked, kid on the Internet ment of Media and Information Tech-
an abusive picture? Are all contacts nology, University of Zielona Gora,
between grown-ups and kids on chat Poland, for her untiring support and
a potential abusive situation, and if so, valuable comments during my work
should it lead to immediate surveillance on this article.
of the grown-up? Are individual rights
to privacy an obstacle to the protection referenCes
of kids online?
Bynum, T.W. (1998). Ethics and social
Project Getting Involved is now policy in the information age. Retrieved
an integrated part of computer science from http://www.southernct.edu/organiza-
education at Nesna University College, tions/rccs/resources/research/global_info/
and the fight against sexual abuse of bynum_info_age.html
children and the use of ICT to distribute
Dale, E.L. (1989). Pedagogical profession-
this kind of criminal content has been
alism, on the identity and use of pedagogic.
elected as the main ethical profile of the Oslo, Norway: Gyldendal.
college. We hope that this project will
be a tool in our teaching of computer Deci, E.L., & Ryan, R.M. (1985). Intrinsic
ethics that, to some extent, will help our motivation and self determination in human
behavior. New York: Plenum Press.
students to identify and analyze some
policy vacuums, and perhaps even find Freenet Project. (2006). What is Freenet?
solutions that might resolve them. Retrieved October 8, 2007, from http://
I think we have succeeded in making freenetproject.org/whatis.html
social informatics interesting, and in

Copyright © 2008, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
34 International Journal of Technology and Human Interaction, 4(2), 22-34, April-June 2008

Hansen, A.-A. (2004). Children who meet from Indiana University Web site: http://
abuser online. Author. rkcsi.indiana.edu/
Jewett, T., & Kling, R. (1996). Teaching Ryan, R.M., & Deci, E.L. (2000). Self-de-
social issues of computing: Challenges, termination theory and the facilitation of
ideas and resources. Retrieved October intrinsic motivation, social development,
8, 2007, from http://www.cecs.csulb. and well-being. American Psychologist,
edu/~jewett/teach/teach.html 55(1), 68-78.
Kirkwood, T.F. (2001). Our global age Save the Children Norway. (2003). Every-
requires global education: Clarifying one is lying on the Internet–and everyone
definitional ambiguities. SocialStudies, knows it. Young persons and the Internet.
92(1), 10. Author.
Kling, R. (2001). Conceptions of social
informatics. Retrieved October 8, 2007,

Per Arne Godejord is a senior lecturer in computer science,and head of the Department of Com-
puter Science,Nesna University College. Research topics include: exploring teacher methodology
in social Informatics, both in face to face and in distance education teaching, and the use of
project-based teaching as a tool for creating awareness of ethical issues. He also works closely
with Dr. Beata Godejord, the Department of Media and Information Technologies, University
of Zielona Gora, Poland.

Copyright © 2008, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.

Das könnte Ihnen auch gefallen