IT Infrastructure & Management

Media

October 03, 2001 1 min read
  • Save to favorites
  • Print

Irresponsible Computing

A middle school boy in overalls tells viewers: “When I go to [the University of Virginia], I want to open e-mail attachments from strangers and get a virus.”

In the video, available on the Web as part of the university’s campaign for responsible computer use, another boy says, “I want to post obscene messages on the Internet.”

Other children, their faces framed by the classical architecture on the university’s Charlottesville, Va., campus, make similarly disturbing pronouncements. "[I want to] commit fraud using someone else’s online identity,” says a girl.

Thousands of new University of Virginia students saw the black-and-white video—a parody of a nationally televised commercial for the job-search company Monster.com—during orientation week this past summer.

University officials said the tongue-in-cheek format effectively conveys the campus policy on responsible computing—and they have made the 60-second video available on the Web for K-12 schools and other colleges and universities to use.

“It’s cute, satirical, it appeals to students, it gets the message across in a short period of time,” said C. Roxanne Chandler, a computer programmer at the university who produced the film last spring for less than $4,000.

Students who enter the University of Virginia from high schools across the country tend to take computer-use issues lightly, said Sandra G. German, a manager in the university’s information technology and communications department, which was responsible for the production. “Students are our hardest audience—they have so much going on,” she said. “It was so important to do something that will catch their attention.”

The actors in the video—middle school students from the Charlottesville area— talk about their plans for other ill-advised activities with computers. Says one boy: “I want to hack into government computers and go to federal prison.”

The text at the end of the video poses the question: “How much trouble can you buy with your computer?”

The video is available on the Web at www.itc.v irginia.edu/pubs/docs/RespComp/videos/home.html.

—Andrew Trotter atrotter@epe.org

Related Tags:

Events

School Climate & Safety K-12 Essentials Forum Strengthen Students’ Connections to School
Join this free event to learn how schools are creating the space for students to form strong bonds with each other and trusted adults.
This content is provided by our sponsor. It is not written by and does not necessarily reflect the views of Education Week's editorial staff.
Sponsor
Reading & Literacy Webinar
Creating Confident Readers: Why Differentiated Instruction is Equitable Instruction
Join us as we break down how differentiated instruction can advance your school’s literacy and equity goals.
Content provided by Lexia Learning
This content is provided by our sponsor. It is not written by and does not necessarily reflect the views of Education Week's editorial staff.
Sponsor
IT Infrastructure & Management Webinar
Future-Proofing Your School's Tech Ecosystem: Strategies for Asset Tracking, Sustainability, and Budget Optimization
Gain actionable insights into effective asset management, budget optimization, and sustainable IT practices.
Content provided by Follett Learning

EdWeek Top School Jobs

Teacher Jobs
Search over ten thousand teaching jobs nationwide — elementary, middle, high school and more.
View Jobs
Principal Jobs
Find hundreds of jobs for principals, assistant principals, and other school leadership roles.
View Jobs
Administrator Jobs
Over a thousand district-level jobs: superintendents, directors, more.
View Jobs
Support Staff Jobs
Search thousands of jobs, from paraprofessionals to counselors and more.
View Jobs

Read Next

IT Infrastructure & Management Ed-Tech Companies Are Vulnerable to Cyberattacks. A New Federal Effort Wants to Help
The Education Department is teaming up with a top research university to stem a wave of cyberattacks on schools.
4 min read
Image of lock on binary code background.
DigitalVision Vectors/Getty
IT Infrastructure & Management Leader To Learn From Through Wars, Tornadoes, and Cyberattacks, He's a Guardian of Student Privacy
Jun Kim, the technology director in Moore, Okla., works to make the most of innovations—without endangering student data.
11 min read
Jun Kim, Director of Technology for Moore Public Schools, center, leads a data privacy review meeting on Dec. 13, 2023 in Moore, Okla.
Jun Kim, director of technology for the Moore public schools in Moore, Okla., leads a data privacy review for staff.
Brett Deering for Education Week
IT Infrastructure & Management One Solution to Maintaining 1-to-1 Devices? Pay Students to Repair Them
Hiring students to help with the repair process is one way school districts are ensuring the sustainability of their 1-to-1 programs.
4 min read
Sawyer Wendt, a student intern for the Altoona school district’s IT department, repairs a Chromebook.
Sawyer Wendt, who's been a student intern for the Altoona district's tech department since junior year, is now studying IT software development in college.
Courtesy of Jevin Stangel, IT technician for the Altoona school district
IT Infrastructure & Management Schools Get Relief on Chromebook Replacements. Google Extends Device Support to 10 Years
Schools have typically had to replace Chromebooks every three to five years.
4 min read
Photo of teacher working with student on laptop computer.
iStock / Getty Images Plus