identifying and ranking internet dangers

Click here to load reader

Post on 19-Jan-2016

43 views

Category:

Documents

1 download

Embed Size (px)

DESCRIPTION

Identifying and Ranking Internet Dangers. Elena Aristodemou, Tatjana Taraszow Yianis Laouris. A word about us…. The Cyprus Neuroscience & Technology Institute is a small research organization with about 20 associates - PowerPoint PPT Presentation

TRANSCRIPT

  • Elena Aristodemou, Tatjana TaraszowYianis Laouris

  • A word about us.The Cyprus Neuroscience & Technology Institute is a small research organization with about 20 associatesOur focus is on socially responsible projects, which capitalize on new technologiesWe have world wide projects in computers/learning, safer internet, structured dialogue, Development Education, etc.We are interested to collaborate with you

  • % Of children who access the internetUsing the following devices...Shared PC58Own PC36Television set31Mobile phone29Games console25Own laptop24Shared laptop22Other handheld portable device10Average number of devices used2,5At the following locations...Living room (or other public room) at home62At school or college59At a friend's home52Own bedroom (or other private room) at home49At a relative's home39In an internet cafe11In a public library or other public place10When 'out and about'7Average number of locations of access2,9

  • % how true is this of youNot trueA bit trueVery trueI find it easier to be myself on the internet than when I am with people face to face523611I talk about different things on the internet than I do when speaking to people face to face573311On the internet I talk about private things which I do not share with people face to face70237Table 7: Online offline boundaries% how true is this of youNot trueA bit trueVery trueI find it easier to be myself on the internet than when I am with people face to face523611I talk about different things on the internet than I do when speaking to people face to face573311On the internet I talk about private things which I do not share with people face to face70237Table 7: Online offline boundariesNumber of activitiesBoundaries

    % how true is this of youNot trueA bit trueVery trueI find it easier to be myself on the internet than when I am with people face to face523611I talk about different things on the internet than I do when speaking to people face to face573311On the internet I talk about private things which I do not share with people face to face70237

  • www.CyberEthics.info

  • www.CyberEthics.info

  • Most common Internet RisksChild Pornography: refers to visual material depicting sexually explicit activities that involve a child or children under the age of 18. Cyber-bullying: occurs when one minor harasses torments, threatens or humiliates another minor (child, pre-teen or teen). In cyber-bullying this kind of abuse is conducted through the internet, digital technologies or mobile phones. In many cases the bully discloses personal information of the victim on the web humiliates him/her and threatens them.Racism: refers to an ideology or practice or behavior towards a person or people, which classifies the worth of the person or people according to racial characteristics (such as color, ethnicity and nationality). Online grooming: refers to the incidents where pedophiles enter chat rooms that are used by children and approach them with the purpose of later engaging in sexual contact with them.Internet addiction: refers to the excessive use of internet to the extent that it affects the daily life of a person

  • The SDD process was developed by scientists such as Hasan zbekhan, Erich Jantsch, John Warfield and Alexander ChristakisIn the context of the Club of Rome they opted for developing a democratic methodology for solving contemporary complex problemsThe methodology is based on seven laws and four axioms from cyberneticsIt has been grounded both scientifically and empirically in hundreds of settings on a global scale for the past 30 years

  • Why we need an Innovation in Dialogue? The Floor Plan of the Athenian Agora

  • The Institute for 21st Century AgorasThe future isn't what it used to be.Yogi Berra http://www.globalagoras.org/

  • Elicits and deals with the different priorities of stakeholder (effective priorities) Equalizes power relations

    The distinctive characteristics of Structured Dialogue are that it:

  • Purposes & Uses of Structured Dialogue (SDD)Resolve issues among diverse stakeholdersDemocratic large-group decision-making Policy design & decision makingStrategic planningComplex Problem definitionRoot-cause diagnosis

  • We applied the SDD methodology in order to record democratically the views of every participant in the dialogue. The procedure in any SDD co-laboratory begins with the formulation of a triggering question. Participants are encouraged to produce responses to this question. The triggering question was formulated from a core group team referred to as Knowledge Management Team (KMT), comprised of people who are considered and who feel as owners of the problem. Once set, the triggering question was emailed to the participants who were required to prepare prior the start of the co-laboratory by providing at least three contributions. For the current study the triggering question was:

  • What dangers do children and youth face with the expansion of Cyberspace in their lives?

  • Cluster 1: SeductionCluster 2: Personal DataCluster 3: Problematic ContentCluster 4: AddictionCluster 5: Blurred RealityCluster 6: Harassment/IntimidationCluster 7: ExploitationCluster 8: DesensitizationCluster 9: Inappropriate EntertainmentCluster 10: Social PressureCluster 11: Physical ProblemsCluster 12: Educational IssuesCluster 13: Antisocial NetworksCluster 14: Social Consequences

  • Idea #19: Permanence of the InternetIdea #45: Easy access to games that are inappropriate for certain agesIdea #54: Confusion between true and false informationIdea #48: Exposure to racist contentIdea #09: Watching of inappropriate content

  • [email protected]