20,433 research outputs found

    Digital Competence and Family Mediation in the Perception of Online Risk to Adolescents. Analysis of the Montenegro Case Study

    Get PDF
    Da diversi anni il dibattito scientifico e politico internazionale ha manifestato un interesse sempre piĂč crescente sulla digital literacy e la digital education, quali strumenti di tutela del minore rispetto ai rischi derivanti dall’utilizzo incontrollato e inconsapevole di diversi mezzi di comunicazione. Contemporaneamente, diversi filoni della letteratura scientifica hanno approfondito i temi dei rischi e delle opportunitĂ  legate all’utilizzo della rete, da cui spesso sono stati promossi interventi territoriali politici, di sensibilizzazione o di formazione per arginare gli effetti potenzialmente nocivi e incrementare quelli positivi, legati soprattutto alle opportunitĂ  di crescita individuale e di inclusione socioculturale che le tecnologie possono contribuire a determinare. Il paper si inserisce all’interno di questo quadro per riflettere sul modo in cui il possesso o meno di alcune competenze digitali possa influenzare o meno il comportamento di fruizione mediale dei giovani, incrementando o meno il rischio di esposizione mediale all’interno di un contesto socioculturale circoscritto. Per intraprendere questo tipo di riflessione, il paper focalizza la propria attenzione sul caso di studio del Montenegro e analizza alcuni risultati della ricerca Eukids on line del 2016, per riflettere sulla relazione fra competenze digitali e livello di rischio espositivo dei bambini compresi fra i 9 e i 17 anni all’interno di aree territoriali socioculturali circoscritte.For several years, international scientific and political debate has shown increasing interest in digital literacy and digital education as tools to protect minors from the risks associated with the unmonitored and unaware use of various media. At the same time, various strains in the scientific literature have more deeply analyzed the themes of the risks and opportunities associated with using the web; this has often resulted in the promotion of political, awareness-raising, or educational interventions on the local level, to contain the potentially harmful effects and augment the positive ones linked especially to the opportunities for individual growth and sociocultural inclusion that these technologies can help bring about. This paper enters into this framework to explore how whether or not digital competence is possessed can influence young people’s media use behaviour, while increasing or not increasing the risk of media exposure within a circumscribed sociocultural context. To undertake this kind of reflection, this paper focuses its attention on the Montenegro case study and analyzes some results of the 2016 Global kids on line research work, to consider the relationship between digital competence and the exposure risk level of children between 12 and 17 years of age within circumscribed sociocultural areas

    Reading and company: embodiment and social space in silent reading practices

    Get PDF
    Reading, even when silent and individual, is a social phenomenon and has often been studied as such. Complementary to this view, research has begun to explore how reading is embodied beyond simply being ‘wired’ in the brain. This article brings the social and embodied perspectives together in a very literal sense. Reporting a qualitative study of reading practices across student focus groups from six European countries, it identifies an underexplored factor in reading behaviour and experience. This factor is the sheer physical presence, and concurrent activity, of other people in the environment where one engages in individual silent reading. The primary goal of the study was to explore the role and possible associations of a number of variables (text type, purpose, device) in selecting generic (e.g. indoors vs outdoors) as well as specific (e.g. home vs library) reading environments. Across all six samples included in the study, participants spontaneously attested to varied, and partly surprising, forms of sensitivity to company and social space in their daily efforts to align body with mind for reading. The article reports these emergent trends and discusses their potential implications for research and practice

    Internet Predictions

    Get PDF
    More than a dozen leading experts give their opinions on where the Internet is headed and where it will be in the next decade in terms of technology, policy, and applications. They cover topics ranging from the Internet of Things to climate change to the digital storage of the future. A summary of the articles is available in the Web extras section

    Adaptive Traffic Fingerprinting for Darknet Threat Intelligence

    Full text link
    Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such, there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes. However, anonymity in cyberspace has always been a domain of conflicting interests. While it gives enough power to nefarious actors to masquerade their illegal activities, it is also the cornerstone to facilitate freedom of speech and privacy. We present a proof of concept for a novel algorithm that could form the fundamental pillar of a darknet-capable Cyber Threat Intelligence platform. The solution can reduce anonymity of users of Tor, and considers the existing visibility of network traffic before optionally initiating targeted or widespread BGP interception. In combination with server HTTP response manipulation, the algorithm attempts to reduce the candidate data set to eliminate client-side traffic that is most unlikely to be responsible for server-side connections of interest. Our test results show that MITM manipulated server responses lead to expected changes received by the Tor client. Using simulation data generated by shadow, we show that the detection scheme is effective with false positive rate of 0.001, while sensitivity detecting non-targets was 0.016+-0.127. Our algorithm could assist collaborating organisations willing to share their threat intelligence or cooperate during investigations.Comment: 26 page

    Emerging technologies for learning (volume 2)

    Get PDF

    M-health review: joining up healthcare in a wireless world

    Get PDF
    In recent years, there has been a huge increase in the use of information and communication technologies (ICT) to deliver health and social care. This trend is bound to continue as providers (whether public or private) strive to deliver better care to more people under conditions of severe budgetary constraint

    Addressing the cyber safety challenge: from risk to resilience

    Get PDF
    Addressing the cyber safety challenge: from risk to resilience describes the cyber safety issues emerging from a range of technology trends, how different populations are using technologies and the risks they face, and how we can effectively respond to each group’s unique cyber safety needs. Written by the University of Western Sydney for Telstra Corporation Ltd, the report advocates for continuing to move cyber safety from a ‘risk and protection’ framework to one that focuses on building digital resilience, as well as fostering trust and confidence in the online environment. To do this we need to: Address the needs of populations often neglected by current policies and programs – including adults, seniors, parents, and small to medium enterprises Continue to build the digital literacy skills of all populations, because digital literacy strongly influences users’ ability to engage safely online – this is best achieved by a hands-on learning approach Keep risk in perspective – the risks and benefits of digital participation go hand in hand Broaden the focus from awareness-raising to long-term behaviour change. As digital technologies become further integrated into the everyday lives of Australians, users are potentially exposed to greater risks. However, the risks and benefits of digital participation go hand in hand. The challenge, therefore, is to support users to minimise the risks without limiting their digital participation and their capacity to derive the full benefits of connectivity. If Australians are to benefit as either consumers or providers of online services and products in the e-commerce environment, consumer safety and trust need to be improved. Cyber safety needs to be considered against a transforming backdrop of technology trends, products and practices. While the rise of social media has tended to dominate recent debate and developments in cyber safety, particularly in relation to young people, a range of other trends is also shaping how users engage online, the risks they potentially face in the new media landscape, and the strategies used to address them. These trends include the rise of user generated content and content sharing platforms; the uptake of mobile technologies and, in particular, the adoption of smartphones; cloud computing; platform integration and single sign-on mechanisms; and the rise of GPS and location based services

    Children's Databases - Safety and Privacy

    Get PDF
    This report describes in detail the policy background, the systems that are being built, the problems with them, and the legal situation in the UK. An appendix looks at Europe, and examines in particular detail how France and Germany have dealt with these issues. Our report concludes with three suggested regulatory action strategies for the Commissioner: one minimal strategy in which he tackles only the clear breaches of the law, one moderate strategy in which he seeks to educate departments and agencies and guide them towards best practice, and finally a vigorous option in which he would seek to bring UK data protection practice in these areas more in line with normal practice in Europe, and indeed with our obligations under European law
    • 

    corecore