Transcript
Page 1: Identifying and Ranking Internet Dangers

Elena Aristodemou, Tatjana TaraszowYianis Laouris

Page 2: Identifying and Ranking Internet Dangers

A word about us….

The Cyprus Neuroscience & Technology Institute is a small research organization with about 20 associates

Our focus is on socially responsible projects, which capitalize on new technologies

We have world wide projects in computers/learning, safer internet, structured dialogue, Development Education, etc.

We are interested to collaborate with you

Page 3: Identifying and Ranking Internet Dangers
Page 4: Identifying and Ranking Internet Dangers

74

75

76

70

98

99

97

92

97

96

0 20 40 60 80 100

All children

High SES

Medium SES

Low SES

15-16 yrs

13-14 yrs

11-12 yrs

9-10 yrs

Boys

Girls% Of children who access the internet

Using the following devices...

Shared PC 58

Own PC 36

Television set 31

Mobile phone 29

Games console 25

Own laptop 24

Shared laptop 22

Other handheld portable device 10

Average number of devices used 2,5

At the following locations...

Living room (or other public room) at home 62

At school or college 59

At a friend's home 52

Own bedroom (or other private room) at home 49

At a relative's home 39

In an internet cafe 11

In a public library or other public place 10

When 'out and about' 7

Average number of locations of access 2,9

Page 5: Identifying and Ranking Internet Dangers

8,3 8,3 8,2 8,0 7,9 7,7 7,6 7,6 7,6 7,6 7,5 7,4 7,4 7,4 7,2 7,1 7,1 6,8 6,8 6,7 6,7 6,6 6,6 6,3

5,4

0

2

4

6

8

10

12

14

16

EE LT CZ SE CY FR NO NL SI BG BE HU RO UK FI DK DE ES IT PT EL AT PL TR IE

Weighted average = 7,1

% how true is this of you…Not trueA bit trueVery trueI find it easier to be myself on the internet than when I am with people face to face523611I talk about different things on the internet than I do when speaking to people face to face573311On the internet I talk about private things which I do not share with people face to face70237Table 7: Online – offline boundaries

% how true is this of you…Not trueA bit trueVery trueI find it easier to be myself on the internet than when I am with people face to face523611I talk about different things on the internet than I do when speaking to people face to face573311On the internet I talk about private things which I do not share with people face to face70237Table 7: Online – offline boundaries

% how true is this of you…

Not true

A bit true

Very true

I find it easier to be myself on the internet than when I am with people face to face

52 36 11

I talk about different things on the internet than I do when speaking to people face to face

57 33 11

On the internet I talk about private things which I do not share with people face to face

70 23 7

Number of activities

Boundaries

Page 6: Identifying and Ranking Internet Dangers
Page 7: Identifying and Ranking Internet Dangers
Page 8: Identifying and Ranking Internet Dangers
Page 9: Identifying and Ranking Internet Dangers

www.CyberEthics.infowww.CyberEthics.info

Page 10: Identifying and Ranking Internet Dangers

www.CyberEthics.infwww.CyberEthics.infoo

Page 11: Identifying and Ranking Internet Dangers
Page 12: Identifying and Ranking Internet Dangers

Most common Internet Risks• Child Pornography: refers to visual material depicting sexually explicit activities that involve a child or children

under the age of 18.

• Cyber-bullying: occurs when one minor harasses torments, threatens or humiliates another minor (child, pre-

teen or teen). In cyber-bullying this kind of abuse is conducted through the internet, digital technologies or

mobile phones. In many cases the bully discloses personal information of the victim on the web humiliates

him/her and threatens them.

• Racism: refers to an ideology or practice or behavior towards a person or people, which classifies the worth of

the person or people according to racial characteristics (such as color, ethnicity and nationality).

• Online grooming: refers to the incidents where pedophiles enter chat rooms that are used by children and

approach them with the purpose of later engaging in sexual contact with them.

• Internet addiction: refers to the excessive use of internet to the extent that it affects the daily life of a person

Page 13: Identifying and Ranking Internet Dangers
Page 14: Identifying and Ranking Internet Dangers
Page 15: Identifying and Ranking Internet Dangers
Page 16: Identifying and Ranking Internet Dangers

The SDD process was developed by scientists such as Hasan Özbekhan, Erich Jantsch, John Warfield and Alexander Christakis

In the context of the Club of Rome they opted for developing a democratic methodology for solving contemporary complex problems

The methodology is based on seven laws and four axioms from cybernetics

It has been grounded both scientifically and empirically in hundreds of settings on a global scale for the past 30 years

Page 17: Identifying and Ranking Internet Dangers

Why we need an Innovation in Dialogue?Why we need an Innovation in Dialogue?

The Floor Plan of the Athenian Agora The Floor Plan of the Athenian Agora

Page 18: Identifying and Ranking Internet Dangers

The Institute for The Institute for 2121stst Century Agoras Century Agoras

The future isn't what it used to be.Yogi Berra

http://www.globalagoras.org/http://www.globalagoras.org/

Page 19: Identifying and Ranking Internet Dangers

• Elicits and deals with the different priorities of stakeholder (effective priorities)

• Equalizes power relations

The distinctive characteristics of The distinctive characteristics of Structured Dialogue are that it: Structured Dialogue are that it:

Page 20: Identifying and Ranking Internet Dangers

Purposes & Uses of Structured Dialogue (SDD)

Resolve issues among diverse stakeholders

Democratic large-group decision-making

Policy design & decision making Strategic planning Complex Problem definition Root-cause diagnosis

Page 21: Identifying and Ranking Internet Dangers
Page 22: Identifying and Ranking Internet Dangers

We applied the SDD methodology in order to record democratically the views of every participant in the dialogue. The procedure in any SDD co-laboratory begins with the formulation of a triggering question. Participants are encouraged to produce responses to this question. The triggering question was formulated from a core group team referred to as Knowledge Management Team (KMT), comprised of people who are considered and who feel as owners of the problem. Once set, the triggering question was emailed to the participants who were required to prepare prior the start of the co-laboratory by providing at least three contributions. For the current study the triggering question was:

Page 23: Identifying and Ranking Internet Dangers

What dangers do children and youth face with the expansion of Cyberspace in their lives?

Page 24: Identifying and Ranking Internet Dangers

Cluster 1: SeductionCluster 2: Personal DataCluster 3: Problematic ContentCluster 4: AddictionCluster 5: Blurred RealityCluster 6: Harassment/IntimidationCluster 7: ExploitationCluster 8: DesensitizationCluster 9: Inappropriate EntertainmentCluster 10: Social PressureCluster 11: Physical ProblemsCluster 12: Educational IssuesCluster 13: Antisocial NetworksCluster 14: Social Consequences

Page 25: Identifying and Ranking Internet Dangers

Level III

Level I

Level II

Obstacle 5: Conversing withstrangers

Obstacle 18: Child pornography

Obstacle 54: Confusion between trueand false information

Obstacle 48: Exposure to racist content

Obstacle 4: Addiction

Obstacle 9: Watching ofinappropriate content

Obstacle 1: Grooming

Obstacle 45: Easy access to gamesthat are inappropriate for certain ages

Obstacle 26: Submission ofbehaviors and opinions

Obstacle 27: Publishing of personaldata

Obstacle 3: Access to fictitious or falseinformation that appears to be true

Level IV

Level V

Level VI Obstacle 19: Permanence of theInternet

Obstacle 7: Confusion between realand imaginary world

Obstacle 13: Access to illegal content

Obstacle 17: Anonymity Obstacle 32: Promotion ofwrong idols

Obstacle 16: Intimidation Obstacle 10: Cyberbullying

Page 26: Identifying and Ranking Internet Dangers
Page 27: Identifying and Ranking Internet Dangers

Idea #19: Permanence of the Internet Idea #45: Easy access to games that are

inappropriate for certain ages

Idea #54: Confusion between true and false information

Idea #48: Exposure to racist content Idea #09: Watching of inappropriate

content


Top Related