An Exploration of Middle and High School Students' Perceptions of Deviant Behavior When Using Computers and the Internet

By Daniel, Annie J. | Journal of Technology Studies, Winter 2005 | Go to article overview

An Exploration of Middle and High School Students' Perceptions of Deviant Behavior When Using Computers and the Internet


Daniel, Annie J., Journal of Technology Studies


Abstract

If the current trend continues, the use of computer technologies and the Internet will increase for teaching and education. It is urgent that researchers study computer and Internet deviance. The purpose of this study was to explore middle and high school students' perceptions of deviant behavior when using computers and the Internet.

The target population for this study was middle and high school students. The accessible population included all students who attended a middle or high school in the East Baton Rouge Parish School, which has computers that are capable of accessing the Internet ( 1,150 students - 575 middle school students and 575 high school students).

Professor San-Yi Li of Taiwan designed the instrument used in this study. This instrument contained 66 questions and a scantron was used to record participants' responses. From the instrument, variables were selected from five sections - 1 ) students demographic characteristics 2) computer-related activities 3) students perceptions of deviant behavior when using computers and the Internet 4) students perception of their peers deviant behavior when using computers and the Internet 5) students ability to use computers and the Internet.

Results showed that the majority of students indicated they perceive their behavior as being not deviant when using computers and the Internet. Contrarily, the students indicated they perceive the behavior of their peers to be more deviant when using computers and the Internet. When the means of the Students Behavior Score and the Peers Behavior Score were compared, there was a significant different between the two scores. The Peers Behavior Score for deviance was much higher than the Students Behavior Score.

Introduction

"Any technology tends to create a new human environment."

-Marshall McLuhan

Marshall McLuhan declared this quote over forty years ago. Indeed, today's technology has created many new human environments and behaviors. Deviant behaviors on the computer and the Internet are rising as technology use increases (Hollinger, 1996b; Power, 2000; Vatis, 2000). This is evident in the enormous number of computer viruses that have been released recently causing businesses, educational institutions and personal computer users to become skeptical about performing familiar daily tasks (e.g., opening email messages).

For the purpose of this paper, deviant behavior for technology will include these activities: using computers and the Internet for illegal activities that violate local, state, and/or federal laws, inappropriate use; such as, a violation of the intended use of the Internet or computer, and/or its intended purpose and goal, obscene activities; defined as entering a pornography website or selling pornography goods on the Internet; using the Internet or computer to violate copyrights laws or other contracts such as institutional or third party copyright, license agreements and other contracts, intentionally disrupting the Internet traffic by spreading a computer virus, spreading rumors about another person on the Internet, intimidating and frightening another person on the Internet.

Deviant behaviors are a genuine concern since our society is rapidly moving from a typographic culture to a post-typographic culture (Provenzo, Brett & McCloskey, 1999). According to Provenzo, et al., "typographic culture is defined as a culture or society based around the technology of printing and post-typographic culture is defined as an electronic nontext-oriented culture." (p. i) With this movement, our culture and society is being transformed. People are communicating more by electronic mail and computers than by text or letter writing. Culturally, we are becoming more dependent on computers and computer-based technologies (Provenzo, et al.).

For example, students are no longer learning to type with typewriters, but with word processor software. …

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

An Exploration of Middle and High School Students' Perceptions of Deviant Behavior When Using Computers and the Internet
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Full screen

matching results for page

Cited passage

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited passage

Welcome to the new Questia Reader

The Questia Reader has been updated to provide you with an even better online reading experience.  It is now 100% Responsive, which means you can read our books and articles on any sized device you wish.  All of your favorite tools like notes, highlights, and citations are still here, but the way you select text has been updated to be easier to use, especially on touchscreen devices.  Here's how:

1. Click or tap the first word you want to select.
2. Click or tap the last word you want to select.

OK, got it!

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.