Skip to main content

Home/ Horizon Project 2008/ Group items tagged internet

Rss Feed Group items tagged

glen gatin

Online Predators and Their Victims - 0 views

  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • ...23 more annotations...
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
  • The factors that make youths vulnerable to seduction by online molesters are complex and related to immaturity, inexperience, and the impulsiveness with which some youths respond to and explore normal sexual urges.
    • glen gatin
       
      Extended adolescence as much a contributing factor as inherent evil in online community?
    • Vicki Davis
       
      Not sure I understand the term "extended adolescence?"
    • glen gatin
       
      Twenty somethings still living with their parents.
    • glen gatin
       
      The whole concept of adult hood has shifted as a result. Thinking of the woman who was censured for putting her 9 yr old on the subway. Not sure how this applies to online predators.
    • glen gatin
       
      Comment box seems to work fine. It took me a while to find it too. What a neat tool! I can think of a 6 projects where this will come in very handy!! Thanks for the invite, Vicki.
    • Vicki Davis
       
      Interesting theory -- I'm not sure that this study was focusing on that age group -- we need to refer to the original study linked at the top of the page on that one.
  • images of adolescent sexuality abound in the media
    • glen gatin
       
      Much of what is published in the MSM about social networking and the internet in general is designed to emphasize the hazards. predators, identity theft, viruses etc. Usually hot button emotional issues. Same old deal, people love to be horrified. It sells alot of papers. In an attention economy it is getting harder to attract attention. A good "scary internet" story attracts attention and sells papers.
  •  
    Information summarizing an article on online safety -- something important for education subgroups to cover.
Vicki Davis

Today's spies find secrets in plain sight - USATODAY.com - 0 views

  • Now, however, the President's Daily Brief and other crucial intelligence reports often rely less on secrets from risky espionage missions than on material that's available to just about anyone.
    • Vicki Davis
       
      "Open-source" information is becoming part of intelligence gathering as analysts turn to Internet sources of information.
  • Such material is known as "open-source intelligence" or, in the acronym-laden parlance of the 16 federal agencies that make up the U.S. intelligence community, OSINT. The explosion of information available via the Internet and other public sources has pushed the collection and analysis of that material to the top of the official priority list in the spy world, intelligence officials say.
  • Federal commissions repeatedly have criticized the intelligence community for not moving more quickly and aggressively to exploit open-source information.
  • ...5 more annotations...
  • Every potentially useful nugget must be vetted because enemy states and terror groups, such as al-Qaeda, sometimes use the Internet and other open channels to put out misleading information.
  • The CIA has set up an Open Source Center, based in a nondescript office building in suburban Washington, where officers pore over everything from al-Qaeda-backed websites to papers distributed at science and technology symposiums, says Douglas Naquin, the center's director.
  • Other agencies, such as the FBI and the Defense Intelligence Agency, are training scores of analysts to mine open sources and giving many of them desktop Internet access
  • national security officials also are grappling with the flip side of the open-source phenomenon: making sure sensitive information held by the government, businesses and even individuals doesn't slip into the same sort of public outlets that U.S. intelligence agencies are scrutinizing.
  • Open sources can provide up to 90% of the information needed to meet most U.S. intelligence needs
  •  
    Open source now has a new meaning -- the traditional term has meant "open source software" but now, increasingly it is meaning "open source information" -- as US spy agencies are talking about the use of more open source information, or information taken from openly available and free sources on the Internet. As we teach new terminology and how to understand the words that make our world meaningful, it is increasingly important to teach students to watch and understand the evolution of language. This is an excellent case study. This is also an important term and article to be reviewed by students involved in the Horizon project that are analyzing government trends and our changing world.
  •  
    This new term of open source information is a very important emerging trend that should be included in the subgroup of those analyzing government information and trends.
Steve Madsen

Internet Is the Platform, Web 2.0 Founder Says - 0 views

  •  
    The Internet is the platform - a tool for harnessing collective intelligence. Data has become the "Intel Inside" and software is above being written for just a single device, meaning desktops, laptops and mobile devices.
  •  
    Some good trends identified, some sites listed where they are working for 'a higher purpose'; the value grows based on the number of participants. Could have some ideas for a mulit-media artifact.
Vicki Davis

Modern Day Revolution - Horizon Project 2008 - 0 views

  • I agree that in the upcoming generation, my generation, we control our screen instead of watching it as our parents did.
  • Collaboration is not just a word in the dictionary that we have to recite to a chalkboard. Itโ€™s something that we have become accustomed to; it is as natural to us as breathing.
  • In the digital age, we do not have to strike in front of the White House. We effect change by telling the world the truth from the comfort of our own homes using the Internet with facebook, myspace, blogger, and so much more.
  •  
    I'm reading some great posts from students about the keynote. This one in particular was very captivating. In the digital age, we do not have to strike in front of the White House. We effect change by telling the world the truth from the comfort of our own homes using the Internet with facebook, myspace, blogger, and so much more."
Julie Lindsay

Welcome to Webware 100 Awards 2008 - 0 views

  •  
    These are the 100 best Web 2.0 applications, chosen by Webware readers and Internet users across the globe.
glen gatin

The Future of the Internet-And How to Stop It - 0 views

  •  
    recommended on Stephens Web
Steve Madsen

'Do Not Track List' requested of FTC - The INQUIRER - 0 views

  •  
    This article shows privacy concerns about the implicit collection of data by tracking mouse movents / clicks / keyboard.
  •  
    CONSUMER GROUPS asked the US Federal Trade Commission to establish a national "Do Not Track List" that would enable Internet wibblers to prohibit advertisers from building profiles of their online activities.
Vicki Davis

Diigo and Ripples | Black Diamond - 0 views

  •  
    This teacher is contributing and participating in projects and his enthusiasm is spilling over into class discussions (imagine that) -- Steve has helped us proofread our horizon templates and create a page for internet safety for the students that they will be adding to. It is this type of professional educator that makes projects like Horizon so worthwhile and meaningful -- we have a lot of virtual volunteers out there!
glen gatin

idc_texts: Some Exploratory Notes on Produsers and Produsage - 0 views

  • These changes are facilitated (although, importantly, not solely driven) by the emergence of new, participatory technologies of information access, knowledge exchange, and content production, many of whom are associated with Internet and new media technologies.
  • J.C. Herz has described the same process as โ€˜harnessing the hiveโ€™ (2005) โ€“ that is, the harnessing of promising and useful ideas, generated by expert consumers, by commercial producers (and sometimes under ethically dubious models which appear to exploit and thus hijack the hive as a cheap generator of ideas, rather than merely harnessing it in a benign fashion).
  • These produsers engage not in a traditional form of content production, but are instead involved in produsage โ€“ the collaborative and continuous building and extending of existing content in pursuit of further improvement.
  • ...3 more annotations...
  • In such models, the production of ideas takes place in a collaborative, participatory environment which breaks down the boundaries between producers and consumers and instead enables all participants to be users as well as producers of information and knowledge, or what I have come to produsers (also see Bruns 2005a).
  • Sites of produsage flourish if they can attract a large number of engaged and experienced participants who adhere to the ideals of the site. This requires a balance between openness and structure โ€“ if sites are seen as being controlled by a closed in-group of participants, they are unlikely to attract new produsers into the fold, as these are likely to feel alienated; on the other hand, if anyone can participate without any sense of oversight by individuals or the established community as a whole, then cohesion is likely to be lost.
  • At such stages, projects often rely on a small number of highly engaged contributors, and it is crucial for them to both convey a sense of purpose and drive for the project as well as create an environment which invites participation from new contributors.
  •  
    referenced in Scope Conf SAF2008
Vicki Davis

From the Annointed Few to the Collective Many - 0 views

  • What has not changed significantly, however, is the nature of human interactions in business โ€“ email, conference calls, and presentations by experts to non-experts are still the dominant means of interaction
  • the Internet has morphed from a presentation medium to an interactive platform in just a few years
  • a leading web analysis site
  • ...18 more annotations...
  • more than 50 percent of Americans aged 20-30 years old use Facebook
  • among Americans under the age of 35, social networking and user-generated content sites have overtaken TV as a primary media.
  • โ€œVisitors to MySpace.com and Friendster.com generally skew older, with people age 25 and older comprising 68 and 71 percent of their user bases, respectively.โ€
  • Weโ€™re in the midst of a paradigm shift where individuals are indeed connecting โ€œin ways and at levels that [they] havenโ€™t done beforeโ€
  • Workplace communities
  • orkplace communities are designed to solve workplace-related challenges
  • talent management is about finding, developing, and retaining key talent within the organization
  • Ernst & Young, for instance, has a significant presence on Facebook in support of its recruiting efforts
  • Google, Home Depot, Enterprise Rent a Car, and Deloitte also are recruiting using Web 2.0 tools through YouTube videos and even alumni social networks
  • โ€œIf companies keep social networks out, they will be doing a significant disservice to their bottom lines
  • Between 2000 and 2020, 75 million Boomers will reach retirement age.
  • The only content service with mass adoption (greater than 50 percent) was Social Networking, and this was only among respondents under the age of 35.โ€
  • In addition, Millennials are the first generation to spend more hours online per week than watching TV (16.7 vs 13.6).
  • some of the characteristics of Millenials, which included a desire to work in  โ€œ[open] and flat organizationsโ€ as โ€œpart of a tribe.โ€
  • โ€œheavy use of technology (messaging, collaboration, online learning) as a daily part of their work lives.โ€
  • robust and active communities will have an easier time recruiting talented Millennials
  • they have opportunities to meaningfully connect to their peers and supervisors.
  • A retiring Boomer who is an expert in a particular field could be an excellent community manager, blogger, or wiki contributor.
  •  
    Business people and management should read this article about the transformation of business by using workplace communities. "Workplace communities are designed to solve workplace-related challenges" -- they focus on tasks. I would find it interesting to see a business REALLY use technology to change things. Having the business in a business network (OK a NING) and let people tag their posts with the business related PROBLEMS they are having and blog, video, or photograph it-- the tag cloud would tell the business IMMEDIATELY what the problems are in the company. The problem with this model is that there are few corporate executives who REALLY want to know the problems within their organizations. They don't want to be problem solvers, just opportunity creators. However, when managers open their eyes (and I'm a former General Manager myself) and see that two things give business opportunity: problem solving and innovation. And they are directly related. True innovation solves problems. Read this article and think about how you may solve problems using the networks you may now create. If you don't want everyone to know, keep it private and only allow people in your company in.
  •  
    Important article about why businesses need to change.
glen gatin

A Threat So Big, Academics Try Collaboration - New York Times - 0 views

  • aimed at getting students and professors from different disciplines to collaborate in studying the environmental ramifications of production and consumption.
    • Vicki Davis
       
      This is important because we are now seeing collaboration across disciplines -- something that has rarely happened in the history of science, but has been found to spark true creativity.
    • glen gatin
       
      The threat may actually be to the academic industrial complex as much as to evnironment studies.
  •  
    Fascinating article about cross-disciplinary collaboration. This is becoming something that is possible through new means of using the Internet.
Steve Madsen

Six Apart Gives Facebook Users Free Blogging Tool -- Web 2.0 -- InformationWeek - 0 views

  •  
    Blog It lets Facebook users create blog posts and post them through any one of 10 blogging services, including Blogger, Movable Type, TypePad, Twitter, Vox, and WordPress.
Vicki Davis

OpenID Status Check: A Guide to Getting and Using Your OpenID - ReadWriteWeb - 0 views

  •  
    This is the effort to have ubiquitous log in ID's for people across the Internet.
  •  
    Places to get an Open ID -- this important technology allows people to have one user ID to log into many sites -- and because it is a distributed ID -- you can keep using it even if your main site dissappears.
Vicki Davis

MASSP News Center ยป Can You Hear Me Now? - 0 views

  • May school officials lawfully โ€œsearchโ€ the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
  • [A] search of a student by a teacher or other school officials will be โ€˜justified at its inceptionโ€™ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.โ€
  • In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the schoolโ€™s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
  • ...5 more annotations...
  • compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
  • The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
  • here was no basis for them to search the text and voice mail messages stored on the phone.
  • unlawful access to the stored voice mail and text message communications.
  • (2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization. (3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
  •  
    Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
  •  
    A court case about illegal search and siezure of a cell phone in Michigan, USA.
Vicki Davis

diigo is in the top twitter cloud! | Diigo Message System - 0 views

  •  
    Look at how diigo has propagated through the internet through "word of tweet" (from twitter.)
  •  
    I find this fascinating that diigo has made the "top twitter" cloud. There are certainly a lot of people following it. They are very responsive and have done a great job. They deserve it. As Horizon looks at collaboration and mashups, Diigo is something that the students will want to look at, both as a service AND at the way it has spread like wildfire, through basically "word of tweet."
glen gatin

Education Matters: Insights on education, learning and training in Canada - 0 views

  • Manitoba 28 35 37
  •  
    Uniformly the education industrial complex is not keeping up with the adoption of ICT in the gen pop. Still stuck in the bums-in-seats mentality. This is in part because education is a major economic engine in a community. All the people who run the plant are voters and taxpayers. The old structures persist, not because they are the best model of educational excellence but because they are the source of the best jobs in town. Deans wife works in student services, the presidents cousins husband works in maintainence etc.
Vicki Davis

Dimdim: Free Live Meeting, Web Conference, Net Meeting, Online Meetings, Online Trainin... - 0 views

  •  
    Opensource web meeting software. Interesting.
  •  
    This new platform for allowing people to meet using the internet with free open source software is very exciting!
glen gatin

Daily Kos: State of the Nation - 0 views

  • Bloggers are not competition to the traditional media -- though they do, hopefully, act as an occasional check on its excesses.  However, even if the Internet were entirely dedicated to the downfall of existing media, it would be only one popgun in a chorus of cannons.  A large part of the traditional media is dedicated to nothing less than making war on the rest.
  •  
    Article on the Cult of the Professional response to Andrew Keen's Cult of the Amateur. I recently watched a web clip of a panel discussion that Keen did at Berkeley? (find link)
  •  
    Cult of the Semi-pro?
1 - 18 of 18
Showing 20 items per page