4,866 research outputs found

    Addressing the cyber safety challenge: from risk to resilience

    Get PDF
    Addressing the cyber safety challenge: from risk to resilience describes the cyber safety issues emerging from a range of technology trends, how different populations are using technologies and the risks they face, and how we can effectively respond to each group’s unique cyber safety needs. Written by the University of Western Sydney for Telstra Corporation Ltd, the report advocates for continuing to move cyber safety from a ‘risk and protection’ framework to one that focuses on building digital resilience, as well as fostering trust and confidence in the online environment. To do this we need to: Address the needs of populations often neglected by current policies and programs – including adults, seniors, parents, and small to medium enterprises Continue to build the digital literacy skills of all populations, because digital literacy strongly influences users’ ability to engage safely online – this is best achieved by a hands-on learning approach Keep risk in perspective – the risks and benefits of digital participation go hand in hand Broaden the focus from awareness-raising to long-term behaviour change. As digital technologies become further integrated into the everyday lives of Australians, users are potentially exposed to greater risks. However, the risks and benefits of digital participation go hand in hand. The challenge, therefore, is to support users to minimise the risks without limiting their digital participation and their capacity to derive the full benefits of connectivity. If Australians are to benefit as either consumers or providers of online services and products in the e-commerce environment, consumer safety and trust need to be improved. Cyber safety needs to be considered against a transforming backdrop of technology trends, products and practices. While the rise of social media has tended to dominate recent debate and developments in cyber safety, particularly in relation to young people, a range of other trends is also shaping how users engage online, the risks they potentially face in the new media landscape, and the strategies used to address them. These trends include the rise of user generated content and content sharing platforms; the uptake of mobile technologies and, in particular, the adoption of smartphones; cloud computing; platform integration and single sign-on mechanisms; and the rise of GPS and location based services

    Middle school children online: Comparing parent awareness and supervision of students\u27 behaviors

    Get PDF

    Control Challenges Parents Experience When Monitoring Adolescents\u27 Internet and Social Media Use

    Get PDF
    Abstract The ubiquitous nature of social media/internet use among adolescents in the United States has become a concern for parents due to risks to safety (e.g., sexual predators), emotional and psychological wellbeing (e.g., cyberbullying), academic achievement (e.g., poor grades), and physical health (e.g., sedentary lifestyle/obesity) faced by unsupervised youth with unlimited access to digital media. Parents readily acknowledge the importance of monitoring their adolescents’ social media/internet use; however, studies have documented their failure to do so. For various reasons, parents encounter challenges in their attempts to keep children safe such as adolescents’ desire for independence, lack of parental digital skills, and the secretive nature of social media and digital world writ large. This qualitative study explored parents’ perceptions of challenges experienced while monitoring their adolescent’s social media/internet use. Guided by the parental mediation theory for the digital age, 10 semi-structured interviews were conducted with parents of adolescents who used social media/internet. Data were analyzed through coding and themes. Participants shared their experiences monitoring their adolescents’ social media/internet use, revealing concerns about lack of parental interest, early monitoring, communicating with adolescents, building trust, and app use and parental controls. These findings have implications for positive social change, as the findings can inform training programs developed by school administrators to assist parents’ efforts to keep children safe while enhancing academic performance

    Group size, Grooming and Social Cohesion in Primates

    Get PDF
    Most primates live in social groups in which affiliative bonds exist between individuals. Because these bonds need to be maintained through social interactions (grooming in most primates), sociality will be limited by time constraints. It has previously been shown that the time primates invest in grooming increases with group size. However, when groups become too large, individuals will not have enough time available to service all possible social relationships and group cohesion is expected to decrease. In this study, we used data from previously published studies to determine how large groups compromise on their grooming time and how ecological, phylogenetic and life history variables affect time invested in grooming (across species as well as within taxa). We used path analysis to analyse direct and indirect (via group size) effects on grooming. We showed that not only is grooming time determined by group size, but it is also affected by dispersal patterns and sex ratio. Furthermore, we found that grooming time is asymptotic when group size exceeds 40 individuals, indicating that time constraints resulting from ecological pressure force individuals to compromise on their grooming time. This was true across species, but a similar effect was also found within taxa. Cognitive constraints and predation pressure strongly affect group sizes and thereby have an indirect effect on primate grooming time. Primates that were found to live in groups larger than predicted by their neocortex size usually suffered from greater predation risk. However, most populations in our analysis were placed well within what we define as their eco-cognitive niche. © 2007 The Association for the Study of Animal Behaviour

    Coral Reef Conservation: A Reef of Your Own

    Get PDF
    This web-based lesson focuses on the physiological, ecological, and behavioral strategies that contribute to the success of reef-building corals. Students will learn to describe and explain the importance of asexual and sexual reproductive strategies to reef-building corals, why it is important that the corals have a nutritional strategy that includes both photosynthesis and carnivory, two behaviors that they use to compete for living space with other species, and how coral reefs can produce high levels of biological material when the waters surround­ing them contain relatively small amounts of the nutri­ents normally needed to support biological production. Links to the required online resources are provided. Educational levels: High school, Middle school, Undergraduate lower division

    A systematic survey of online data mining technology intended for law enforcement

    Get PDF
    As an increasing amount of crime takes on a digital aspect, law enforcement bodies must tackle an online environment generating huge volumes of data. With manual inspections becoming increasingly infeasible, law enforcement bodies are optimising online investigations through data-mining technologies. Such technologies must be well designed and rigorously grounded, yet no survey of the online data-mining literature exists which examines their techniques, applications and rigour. This article remedies this gap through a systematic mapping study describing online data-mining literature which visibly targets law enforcement applications, using evidence-based practices in survey making to produce a replicable analysis which can be methodologically examined for deficiencies

    Dark side of information systems and protection of children online: examining predatory behavior and victimization of children within social media

    Get PDF
    Protecting children online from sexual predators has been a focus of research in psychiatry, sociology, computer science, and information systems (IS) for many years. However, the anonymity afforded by social media has made finding a solution to the problem of child protection difficult. Pedophiles manipulate conversation (discourse) with children in social media in order to exercise power, control and coercion over children leading to their psychological and often physical victimization. Recent IS research points to "individuals, groups, and organizations that have been transformed - in intended and unintended ways - by technology" (Dang and Brown 2010, p. 2). This research examines a darker side of social media that demonstrates unintended consequences that are negatively transforming and affecting lives of children who fall victim to predatory coercion. There is a critical need for information systems research to investigate and understand how sexual predators victimize children online. The knowledge gained could help society as a whole to develop interventions to better protect children online, enabling them to use valuable online resources for education, social development and becoming better citizens in the future. In this context, this dissertation contributes to the larger research narrative of information systems and critical social issues. This dissertation comprises three studies. Study 1 addresses how online sexual predators use social media, as a discursive system, to propagate their ideology of acceptance of sexual acts between adults and children. Study 2 addresses how online sexual predators use and manipulate the text of institutional logics within negotiated cyber-social realities to victimize children. Study 3 examines how online sexual predators use text to construct and control negotiated cyber-social realities during the online victimization of children. Across these three studies we examined how online sexual predators used computer-mediated communications to coerce and victimize children within social media. This research introduces: (1) critical discourse analysis in information systems research to critically examine the role of social media in society, (2) an example of a mixed methods research combining critical discourse analysis, structured content analysis and grounded theory approach for the development of theory in social media and, (3) the use of institutional logics to examine social media phenomena. The central contribution of this dissertation is the development of theoretical models that uncover ways in which power relations and effects of pedophilic ideology are manifested in language and discourse between pedophiles and children in social media. The resulting theoretical models of: (1) pedophilic ideology manifestation, coercion and victimization of children in social media, (2) cyber-victimization logic and, (3) negotiated cyber-social realities provide the foundation for further research, social intervention and policy formulation that lead to better protection of children in social media. Additionally, we present a matrix of predatory coercion and victimization of children within social media that aggregates the results of all three studies. This dissertation aims to contribute beyond the traditional focus of IS research on business and organizations, leveraging the wealth of knowledge from IS research to positively impact societal causes that affect the lives of millions of our fellow citizens - in this particular research - millions of children that are the most vulnerable population in our society. These contributions aim to empower the powerless and expose power abuse as expressed in coercion of children leading to their victimization

    Fear and perceived likelihood of victimization in the traditional and cyber settings

    Get PDF
    This study considers the influence of perceived likelihood, demographics (gender and education) and personality on fear of victimization and cyber-victimization using a survey design (N=159). The results suggest that perceived likelihood of victimization predicts fear of victimization in traditional contexts. Women tend to be more fearful of victimization in traditional and cyber contexts, confirming previous research. No group differences emerged in relation to education. Self-esteem and self-efficacy were not significant predictors of fear or perceived likelihood of victimization. However, perceived likelihood was a significant predictor of fear of victimization in traditional settings. This may suggest that different variables (such as awareness of vulnerability) may play a role in fear of victimization in cyber settings. Further group comparisons revealed that fear of victimization and cybervictimization depended on whether or not participants reported high or low perceived likelihood of victimization and internet use. Higher internet use was associated with greater fear of victimization, especially in combination with greater perceived likelihood of victimization. This may suggest an exposure effect, in that being online more frequently may also increase awareness of cyber incidents
    corecore