Skip to main content

Home/ EdTechTalk/ Group items tagged prey

Rss Feed Group items tagged

Fred Delventhal

Prey = Software to keep track of your stolen laptop - 0 views

  • Prey helps you find your stolen laptop by sending timed reports to your email with a bunch of information of its whereabouts. This includes the general status of the computer, a list of running programs and active connections, fully-detailed network and wifi information, a screenshot of the running desktop and — in case your laptop has an integrated webcam — a picture of the thief.
  •  
    If this works, can we say awesome?
  •  
    Prey helps you find your stolen laptop by sending timed reports to your email with a bunch of information of its whereabouts. This includes the general status of the computer, a list of running programs and active connections, fully-detailed network and wifi information, a screenshot of the running desktop and - in case your laptop has an integrated webcam - a picture of the thief.
Henry Thiele

Online "Predators" and their Victims: Myths, Realities and Implications for Prevention ... - 0 views

  •  
    Abstract The publicity about online "predators" who prey on naive children using trickery and violence is largely inaccurate. Internet sex crimes involving adults and juveniles more often fit a model of statutory rape - adult offenders who meet, develop relationships with, and openly seduce underage teenagers -- than a model of forcible sexual assault or pedophilic child molesting. This is a serious problem, but one that requires different approaches from current prevention messages emphasizing parental control and the dangers of divulging personal information. Developmentally appropriate prevention strategies that target youth directly and acknowledge normal adolescent interests in romance and sex are needed. These should provide younger adolescents with awareness and avoidance skills, while educating older youth about the pitfalls of sexual relationships with adults and their criminal nature. Particular attention should be paid to higher risk youth, including those with histories of sexual abuse, sexual orientation concerns, and patterns of off- and online risk taking. Mental health practitioners need information about the dynamics of this problem and the characteristics of victims and offenders because they are likely to encounter related issues in a variety of contexts.
Jeremy Price

Social Network Sites: Public, Private, or What? : The Knowledge Tree - 0 views

  • Social network sites are the latest generation of ‘mediated publics’ - environments where people can gather publicly through mediating technology.
  • Persistence. What you say sticks around.
    • Jeremy Price
       
      Interesting.
  • Searchability.
  • ...19 more annotations...
  • Invisible audiences. While it is common to face strangers in public life, our eyes provide a good sense of who can overhear our expressions. In mediated publics, not only are lurkers invisible, but persistence, searchability, and replicability introduce audiences that were never present at the time when the expression was created.
  • Replicability. Digital bits are copyable; this means that you can copy a conversation from one place and paste it into another place.
  • Context is only one complication of this architecture. Another complication has to do with scale. When we speak without amplification, our voice only carries so far. Much to the dismay of fame-seekers, just because the Internet has the potential to reach millions, the reality is that most people are heard by very few.
  • The lack of context is precisely why the imagined audience of Friends is key. It is impossible to speak to all people across all space and all time. It’s much easier to imagine who you are speaking to and direct your energies towards them, even if your actual audience is quite different.
  • two audiences cause participants the greatest headaches: those who hold power over them and those that want to prey on them.
  • Some try to resumé-ify their profiles, putting on a public face intended for those who hold power over them. While this is typically the adult-approved approach, this is unrealistic for most teens who prioritise socialisation over adult acceptance.
  • Recognise that youth want to hang out with their friends in youth space.
  • When asked, all youth know that anyone could access their profiles online. Yet, the most common response I receive is “…but why would they?”
  • The Internet mirrors and magnifies all aspects of social life.
    • Jeremy Price
       
      Consistent with capturing/recording interactions in general.
  • When a teen is engaged in risky behaviour online, that is typically a sign that they’re engaged in risky behaviour offline.
  • technology makes it easier to find those who are seeking attention than those who are not.
  • Questions abound. There are no truths, only conversations.
  • They can posit moral conundrums, show how mediated publics differ from unmediated ones, invite youth to consider the potential consequences of their actions, and otherwise educate through conversation instead of the assertion of power.
  • group settings are ideal for engaging youth to consider their relationship with social technologies and mediated publics
  • Internet safety is on the tip of most educators’ tongues, but much of what needs to be discussed goes beyond safety. It is about setting norms and considering how different actions will be interpreted.
  • Create a profile on whatever sites are popular in your school.
  • Keep your profile public and responsible, but not lame.
  • Do not go surfing for your students, but if they invite you to be Friends, say yes. This is a sign that they respect you.
  • The more present you are, the more opportunity you have to influence the norms.
Ced Paine

Predator-Prey - 0 views

  •  
    A simulation
1 - 4 of 4
Showing 20 items per page