Download - Identifying and Ranking Internet Dangers
Elena Aristodemou, Tatjana TaraszowYianis Laouris
A word about us….
The Cyprus Neuroscience & Technology Institute is a small research organization with about 20 associates
Our focus is on socially responsible projects, which capitalize on new technologies
We have world wide projects in computers/learning, safer internet, structured dialogue, Development Education, etc.
We are interested to collaborate with you
74
75
76
70
98
99
97
92
97
96
0 20 40 60 80 100
All children
High SES
Medium SES
Low SES
15-16 yrs
13-14 yrs
11-12 yrs
9-10 yrs
Boys
Girls% Of children who access the internet
Using the following devices...
Shared PC 58
Own PC 36
Television set 31
Mobile phone 29
Games console 25
Own laptop 24
Shared laptop 22
Other handheld portable device 10
Average number of devices used 2,5
At the following locations...
Living room (or other public room) at home 62
At school or college 59
At a friend's home 52
Own bedroom (or other private room) at home 49
At a relative's home 39
In an internet cafe 11
In a public library or other public place 10
When 'out and about' 7
Average number of locations of access 2,9
8,3 8,3 8,2 8,0 7,9 7,7 7,6 7,6 7,6 7,6 7,5 7,4 7,4 7,4 7,2 7,1 7,1 6,8 6,8 6,7 6,7 6,6 6,6 6,3
5,4
0
2
4
6
8
10
12
14
16
EE LT CZ SE CY FR NO NL SI BG BE HU RO UK FI DK DE ES IT PT EL AT PL TR IE
Weighted average = 7,1
% how true is this of you…Not trueA bit trueVery trueI find it easier to be myself on the internet than when I am with people face to face523611I talk about different things on the internet than I do when speaking to people face to face573311On the internet I talk about private things which I do not share with people face to face70237Table 7: Online – offline boundaries
% how true is this of you…Not trueA bit trueVery trueI find it easier to be myself on the internet than when I am with people face to face523611I talk about different things on the internet than I do when speaking to people face to face573311On the internet I talk about private things which I do not share with people face to face70237Table 7: Online – offline boundaries
% how true is this of you…
Not true
A bit true
Very true
I find it easier to be myself on the internet than when I am with people face to face
52 36 11
I talk about different things on the internet than I do when speaking to people face to face
57 33 11
On the internet I talk about private things which I do not share with people face to face
70 23 7
Number of activities
Boundaries
www.CyberEthics.infowww.CyberEthics.info
www.CyberEthics.infwww.CyberEthics.infoo
Most common Internet Risks• Child Pornography: refers to visual material depicting sexually explicit activities that involve a child or children
under the age of 18.
• Cyber-bullying: occurs when one minor harasses torments, threatens or humiliates another minor (child, pre-
teen or teen). In cyber-bullying this kind of abuse is conducted through the internet, digital technologies or
mobile phones. In many cases the bully discloses personal information of the victim on the web humiliates
him/her and threatens them.
• Racism: refers to an ideology or practice or behavior towards a person or people, which classifies the worth of
the person or people according to racial characteristics (such as color, ethnicity and nationality).
• Online grooming: refers to the incidents where pedophiles enter chat rooms that are used by children and
approach them with the purpose of later engaging in sexual contact with them.
• Internet addiction: refers to the excessive use of internet to the extent that it affects the daily life of a person
The SDD process was developed by scientists such as Hasan Özbekhan, Erich Jantsch, John Warfield and Alexander Christakis
In the context of the Club of Rome they opted for developing a democratic methodology for solving contemporary complex problems
The methodology is based on seven laws and four axioms from cybernetics
It has been grounded both scientifically and empirically in hundreds of settings on a global scale for the past 30 years
Why we need an Innovation in Dialogue?Why we need an Innovation in Dialogue?
The Floor Plan of the Athenian Agora The Floor Plan of the Athenian Agora
The Institute for The Institute for 2121stst Century Agoras Century Agoras
The future isn't what it used to be.Yogi Berra
http://www.globalagoras.org/http://www.globalagoras.org/
• Elicits and deals with the different priorities of stakeholder (effective priorities)
• Equalizes power relations
The distinctive characteristics of The distinctive characteristics of Structured Dialogue are that it: Structured Dialogue are that it:
Purposes & Uses of Structured Dialogue (SDD)
Resolve issues among diverse stakeholders
Democratic large-group decision-making
Policy design & decision making Strategic planning Complex Problem definition Root-cause diagnosis
We applied the SDD methodology in order to record democratically the views of every participant in the dialogue. The procedure in any SDD co-laboratory begins with the formulation of a triggering question. Participants are encouraged to produce responses to this question. The triggering question was formulated from a core group team referred to as Knowledge Management Team (KMT), comprised of people who are considered and who feel as owners of the problem. Once set, the triggering question was emailed to the participants who were required to prepare prior the start of the co-laboratory by providing at least three contributions. For the current study the triggering question was:
What dangers do children and youth face with the expansion of Cyberspace in their lives?
Cluster 1: SeductionCluster 2: Personal DataCluster 3: Problematic ContentCluster 4: AddictionCluster 5: Blurred RealityCluster 6: Harassment/IntimidationCluster 7: ExploitationCluster 8: DesensitizationCluster 9: Inappropriate EntertainmentCluster 10: Social PressureCluster 11: Physical ProblemsCluster 12: Educational IssuesCluster 13: Antisocial NetworksCluster 14: Social Consequences
Level III
Level I
Level II
Obstacle 5: Conversing withstrangers
Obstacle 18: Child pornography
Obstacle 54: Confusion between trueand false information
Obstacle 48: Exposure to racist content
Obstacle 4: Addiction
Obstacle 9: Watching ofinappropriate content
Obstacle 1: Grooming
Obstacle 45: Easy access to gamesthat are inappropriate for certain ages
Obstacle 26: Submission ofbehaviors and opinions
Obstacle 27: Publishing of personaldata
Obstacle 3: Access to fictitious or falseinformation that appears to be true
Level IV
Level V
Level VI Obstacle 19: Permanence of theInternet
Obstacle 7: Confusion between realand imaginary world
Obstacle 13: Access to illegal content
Obstacle 17: Anonymity Obstacle 32: Promotion ofwrong idols
Obstacle 16: Intimidation Obstacle 10: Cyberbullying
Idea #19: Permanence of the Internet Idea #45: Easy access to games that are
inappropriate for certain ages
Idea #54: Confusion between true and false information
Idea #48: Exposure to racist content Idea #09: Watching of inappropriate
content