Hackers in the World
Participate and share : Poster
Sunday, June 23, 7:00–8:30 pm
Location: Posters: Level 4, Terrace Ballroom Lobby, Table 18
Mehek Ahuja Vij Rebeca Blanco Villamil Laura Carazo Ureña Ana Sofia Mena Álvarez Alejandra Sancho Martín Ivonne Velasco
Learn about a lesson where we research which countries are most and least vulnerable to hacking and examine how they can avoid attacks. Then we explain how to prevent hacker attacks on our computers.
|Audience:||Teachers, Teacher education/higher ed faculty, Technology coordinators/facilitators|
|Attendee devices:||Devices not needed|
|Participant accounts, software and other materials:||none|
|Focus:||Digital age teaching & learning|
|Subject area:||Social studies, Computer science|
|ISTE Standards:||For Students:
|Additional detail:||Student presentation|
The word hacker in recent years has been constantly pronounced and the consequences that the activity of these people has left in the world is shocking. The objective of this project is to investigate which are the countries in the world which is more attacked by hackers, to whom these attacks are directed, because they attack those countries and because they do not attack other countries in the world. What to do to prevent being hacked and what are the countries in the world that have more protection against these types of activities.
The students investigated in digital and non-digital media, interviewed specialists in the field and people who know how to perform this type of activity, conclude the research presenting statistics of the attacks of hackers in the world using Google Drive, Word and Excel, propose alternatives of prevention of attacks using the social networks in diverse languages for knowledge of the whole world, use Google Chrome to translate the investigation.
-Lakhani, K. R., & Wolf, R. G. (2003). Why hackers do what they do: Understanding motivation and effort in free/open source software projects.
-McClure, S., Scambray, J., Kurtz, G., & Kurtz. (2009). Hacking exposed: network security secrets and solutions.
-Himanen, P. (2002). La ética del hacker y el espíritu de la era de la información.
-Jurgenson, J. L. A. G., & Luis, J. (2003). Cómo hacer investigación cualitativa: fundamentos y metodología. México: Paidós.
She graduated with honors from the National Autonomous University of Mexico in the degree of Pedagogy and holds a master´s degree in education from the Inter-American University for Development with the specialty of technology applied to education. She has taught technology classes from preschool to high school, robotics in lower, middle and high school, courses and workshops to adults in schools, companies and at the Tecnológico de Monterrey campus in Mexico City.