Abstract
Educational institutions and educators should aim to form netizen students who can effectively deal with and protect themselves from the various scenarios and ways of transgressions, grievances, violence and sexual exploitation that are based on the computer network. This article will discuss some risks and dangers, such as grooming, child pornography, human trafficking and public humiliation. It will identify and discuss the concepts of surface web and deep web as the scenarios in which these risks and hazards occur. This research seeks to motivate educational institutions and educators to empower students in the new environments and dangers of new technologies, encouraging the components of the education system to defect to the possible prerogative of being a digital objector.
How to cite:
Gutarra-Cordero, A. (2017). Algunos impedimentos del educador a ser objetor digital. Cuaderno de Investigación en la Educación, 32, 107-125. Retrieved from https://revistas.upr.edu/index.php/educacion/article/view/13925
References
Castells, M. (2015). Redes de indignación y esperanza. Madrid, España: Alianza Editorial.
Easttom, C. & Taylor, J. (2011). Computer crime, investigation, and the law. Boston, MA: Cengage Learning Publisher.
Elliott, J. (2015). The role of consent in human trafficking. Londres & Nueva York: Routledge.
Gallagher, A. (2010). The International Law of Human Trafficking. New York, NY: Cambridge University Press.
Hepburn, S. & Simon, R. (2013). Human trafficking around the world: Hidden in plain sight. Nueva York: Columbia University Press.
Jenkins, P. (2003). Beyond tolerance: Child pornography on the internet. Nueva York: New York University Press.
Lievens, E. (2010). Protecting children in the Digital Era: The use of alternative regulatory instruments. Leiden, Países Bajos: Martinus Nijhoff Publishers.
Ost, S. (2009). Child pornography and sexual grooming: Legal and societal responses. Nueva York: Cambridge University Press.
Saco, D., Argudin, R., Maguire, J. & Tallon, K. (2010). Sexting: Youth practices and legal implications. Cambridge, M.A: Harvard University Press.
Shelley, L. (2010). Human trafficking: A global perspective. New York, NY: Cambridge University Press.
Sherif, M. H. (2016). Protocols for secure electronic commerce (3ra. ed.). Boca Raton, FL: CRC Press.
Skoudis, E. & Zeltser, L. (2004). Malware: Fighting malicious code. Upper Saddle River, NJ: Prentice Hall PTR.
Stel, E. (2014). Seguridad y defensa del ciberespacio. Buenos Aires, Argentina: Editorial Dunken.
Wall, D. (2007). Cybercrime: The transformation of crime in the information age. Cambridge, Reino Unido: Polity Press.
The contents published in the Puerto Rico Journal of Education is freely distributed under open access practices, in accordance with the Creative Commons license, Attribution-NonCommercial 4.0 International (CC BY-NC 4.0). Through these principles, the journal and its authors allow readers to access, reproduce and share articles in full text. Users should give credit to authors in a reasonable way without suggesting they have their support. Under no circumstances, readers may make use of the contents for commercial purposes. The authors retain copyright on their works.