ABUSE OF HUMAN-COMPUTER INTERACTIONS: A COUNTERPOINT TO TRANSFORMATIVE AND LIBERATORY TECHNOLOGIES

ABUSE OF HUMAN-COMPUTER INTERACTIONS: A COUNTERPOINT TO TRANSFORMATIVE AND LIBERATORY TECHNOLOGIES

Warren J. Blumenfeld
DOI: 10.4018/978-1-60960-046-4.ch015
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In our “information age,” technology has improved the lives of many people in significant ways, while connecting the human family as never before on a global scale. Although the possibilities are only limited by our imagination, so too are the dangers for abuse of these technologies. This chapter investigates these dangers by providing a cautionary counterpoint to the transformative and liberatory possibilities technologies offer. Examples of the forms this abuse takes leads off the chapter, followed by some of the psychological and sociological theories that have been put forward to assist us in understanding and possibly addressing this abuse of human-computer interactions.
Chapter Preview
Top

Introduction

Online Cheating and Plagiarism

She is attempting to complete her undergraduate degree at a large Midwestern university in the United States, and she needs only two additional courses before she will graduate. She accepts a great summer intern position in her chosen field, which will become permanent and full-time contingent upon completion of her degree.

He is a brilliant graduate student completing his Masters degree at her university. They negotiate a deal whereby she will enroll in two online courses to fulfill her remaining degree requirements, and he will do all the work—the assigned readings, written assignments, online discussions, communications with the course instructor—and upon receipt of two passing grades, she will pay him the amount of $2000 for each course, or a total of $4000. As it turned out, not only did he pass both classes for her, but he also scored the grade of “A” in each. She, in turn, received a higher cumulative grade point average and “earned” her undergraduate degree, which allowed her to walk to the stage to pick up her diploma at her graduation festivities to the beaming excitement of family and friends assembled on that momentous day. The following week, her company offered her a full-time position with a superb benefits package.

In addition to this form of cheating, students and others are employing communication and information technologies to lift other people’s ideas and work and pass it off as original to them. An entire industry has emerged catering to their needs in the form of Internet-based companies that provide fully completed works, including term papers, at a relatively low cost to students. And the chances of being caught are generally on the students’ side. According to Dr. Fintan Culwin, of London South Bank University in the United Kingdom:

Many students realise the likelihood of being detected is low. As academic institutions are run more like mass industries, tutors cannot be expected to learn the details of so many students’ writing styles (quoted in Clare, 2000).

Culwin and others warn that computer-facilitated academic plagiarism has possibly already decreased the inherent value of a university or college degree.

In our “information age,” technology has improved the lives of many people in significant ways, while connecting the human family as never before on a global scale. Although the possibilities are only limited by our imagination, so too are the dangers for abuse of these technologies. This chapter investigates these dangers by providing a cautionary counterpoint to the transformative and liberatory possibilities technologies offer.

Examples of the forms this abuse takes leads off the chapter, followed by some of the psychological and sociological theories that have been put forward to assist us in understanding and possibly addressing this abuse of human-computer interactions.

Complete Chapter List

Search this Book:
Reset