scholarly journals Young children's everyday concepts of the internet: A platform for cyber-safety education in the early years

2016 ◽  
Vol 49 (1) ◽  
pp. 45-55 ◽  
Author(s):  
Susan Edwards ◽  
Andrea Nolan ◽  
Michael Henderson ◽  
Ana Mantilla ◽  
Lydia Plowman ◽  
...  
2021 ◽  
pp. 1476718X2110149
Author(s):  
Susan Edwards

Young children aged birth to 5 years are known users of the internet, both unsupervised and in collaboration with adults. Adults also use the internet to share details of children’s lives with others, via sharenting and educational apps. During COVID-19 internet use by children and families rose significantly during periods of enforced stay-home. Internet use by children, and by adults on behalf exposes children to conduct, contact and content risks online. These risks mean that cyber-safety in the early years is increasingly necessary, especially concerning increased internet usage during COVID-19. While cyber-safety is well developed for primary and secondary-school aged children this is not the case for young children, their families and educators. This paper proposes a research agenda for cyber-safety in the early years, using critical constructivism and internet studies to define the internet as a non-unitary technology. Three main objects of study concerning cyber-safety in the early years, including the reference to COVID-19 are identified for targeted research, including: technologies, context and policy.


First Monday ◽  
2016 ◽  
Author(s):  
Randall M. Livingstone

Software robots (“bots”) play a major role across the Internet today, including on Wikipedia, the world’s largest online encyclopedia. Bots complete over 20 percent of all edits to the project, yet often their work goes unnoticed by other users. Their initial integration onto Wikipedia was not uncontested and highlighted the opposing philosophies of “inclusionists” and “deletionists” who influenced the early years of the project. This paper presents an in-depth interview with Wikipedia user Ram-Man, an early bot operator on the site and creator or the rambot, the first mass-editing bot. Topics discussed include the social and technical climate of early Wikipedia, the creation of bot policies and bureaucracy, and the legacy of rambot and Ram-Man’s work.


2016 ◽  
Vol 28 (1) ◽  
Author(s):  
Elmarie Kritzinger

The rate of technological development across the globe is dramatic. The decreasing cost and increasing availability of ICT devices means that its users are no longer exclusively industry or government employees – they are now also home users. Home users integrate ICT in their daily lives for education, socialising and information gathering. However, using ICT is associated with risks and threats, such as identity theft and phishing scams. Most home users of ICT do not have the necessary information technology and Internet skills to protect themselves and their information. School learners, in particular, are not sufficiently educated on how to use technological devices safely, especially in developing countries such as South Africa. The national school curriculum in South Africa currently does not make provision for cyber-safety education, and the availability of supporting material and training for ICT teachers in South Africa is limited, resulting in a lack of knowledge and skills regarding cyber-safety. The research in hand focuses on the situation concerning cyber-safety awareness in schools and has adopted a short-term approach towards cyber-safety among teachers and school learners in South Africa until a formal long-term national approach has been implemented. This study takes a quantitative approach to investigating the current options of teachers to enhance cyber-safety among learners in their schools. The research proposes that short-term initiatives (i.e. posters) can increase learners’ awareness of cyber-safety until formal cyber-safety awareness methods have been introduced.


Author(s):  
Cristian Stefan

Abstract Cryptocurrencies have experienced an exponential growth trend in the past 24 months, followed by a big crash. In the early years of the Internet, inspired entrepreneurs such as Jeffrey Bezos realized that, when something grows exponentially, it becomes ubiquitous within a short time span. Similarly to the Internet in 1994, cryptocurrencies have recently been growing at a dazzling rate, thus one can expect them to be used on a global scale very soon, in spite of the last bubble which has already burst. Alternative currencies are greeted with great enthusiasm, due to their potential to return financial power back to the people, especially in the context of general dissatisfaction and disappointment with the banking sector. They bring about several advantages, such as financial innovations, lower fees as well as increased availability to developing populations. At the same time, their high volatility and lack of supervision might imply that they only serve as complementary financing and not as a substitute of traditional banking. This article discusses the development of cryptocurrencies, including aspects related to Bitcoin, financial technology and the blockchain. Using historical data from Coinmarketcap.com between April 2013 and February 2018, I run a quantitative analysis of the distributions and evolution over time for all listed cryptocurrencies with known market capitalization. I look at the interplay between number of cryptocurrencies and market value, at growth rates, cumulative shares and volatility. I find a phenomenon of exponential growth and violent volatility, which I explain in light of cryptocurrencies’ strengths and weaknesses, as identified in the literature. I emphasize the importance of cryptocurrencies in the context of the global digital economy and I discuss future implications.


2005 ◽  
Vol 39 (2) ◽  
pp. 169-174
Author(s):  
Michael A. Toler

As a scholar of North Africa and the Middle East, I get very excited about the possibilities internet technologies open up for me and other scholars who are concerned with regions of the globe outside our national borders. The internet brings a wealth of information to my computer on a daily basis. It is true that in the early years of its development the overwhelming majority of content on the internet was American and in English, but as the rest of the world has come online in greater numbers, the internet has increasingly allowed us to transcend international borders. To cite just one example, for decades English was overwhelmingly the language of the internet. While English remains the most common language on the web, it is no longer the majority language. For several years now, there has been more non-English content on the internet than content in English. I can now read newspapers and listen to news broadcasts from North Africa at the click of a mouse button. I can even communicate easily with colleagues overseas via email, chat or, increasingly, voice over IP at very little cost.


2020 ◽  
Author(s):  
Siti Zobidah Omar ◽  
Krishnapriyaa Kovalan ◽  
Jusang Bolong ◽  
Rusli Abdullah ◽  
Akmar Hayati Ahmad Ghazali ◽  
...  

BACKGROUND Focus group discussion is a qualitative approach done to obtain an insight into social issues. This approach aims to gain data from a selected group of individuals rather than a random selection of participants. Youth were chosen as informants in this study because most youths engage with new media, the Internet, and social media compared to other age groups. OBJECTIVE The purpose of this paper is to examine the knowledge of cybercrime and to obtain an understanding of cyber safety practices among youth using a qualitative approach. METHODS A focus group discussion with a total of 20 informants was conducted among youth. These informants were divided into three groups. Discussions were audio-recorded, transcribed, and analyzed using thematic analysis. RESULTS These discussions shows there were few themes of knowledge of cybercrime emerged, such as phishing, cyberbullying, hacking, scam, and forgery; and themes of cyber safety practices, such as software downloading, password usage, privacy setting information sharing, safe online shopping website, safe online banking website, preventing cyberbullying, and cybercrime report agencies have emerged. CONCLUSIONS Most of the youth have a knowledge and understanding on cybercrime and cyber safety. This create awareness among youth and educated them to become a safe Internet user. Further study emphasizing on awareness of youth on the Internet usage will be recommended. CLINICALTRIAL Not applicable


INFERENSI ◽  
2019 ◽  
Vol 12 (2) ◽  
pp. 331-348
Author(s):  
Ismail Suardi Wekke ◽  
Ngesti Wihayuningtyas ◽  
Payiz Zawahir Muntaha ◽  
Mukhlis Mukhlis

This article aims to analyses the leadership style of Muslim priest (kyai) in traditional Islamic boarding school (pesantren) seeing from Weber’s leadership theory in managing human resources, infrastructure, finance, and social capital in the pesantren for development. This research also intends to review the existence of selected traditional Islamic boarding school with the types of what Weber’s explain in his article. Using library study in a qualitative approach in nature on several sources, i.e., library books, documents and information on the internet. DDI Mangkoso in South Sulawesi province was selected due to its long history as Islamic institution and their renowned and charismatic and transformative kyai since their early years of establishment. The analysis in this research somehow managed to reveal that the three Weber’s patterns type is found in the leadership of kyai in several pesantrens around Indonesia including in DDI Mangkoso. Traditional leadership of DDI Mangkoso’s kyai is strongly influenced by the tradition of education in pesantren which respects kyai’s position as the leader and the founder of the pesantren. However, charismatic and transformative leadership through Anregurutta K.H. Abdul Rahman Ambo Dalle and KH Farid Wajedi were the two most influence styles among Kyai in DDI Mangkoso until now


2019 ◽  
Author(s):  
Pekka Mertala

Ubiquitous computing (ubicomp) and the Internet of things (IoT) are turning into everyday household technology at an ever‐increasing pace, for example, in the form of connected toys. However, while ubicomp and IoT are changing and shaping children’s digital and technological landscape, not much is known about how children perceive these omnipresent and concealed forms of digital technology. This qualitatively oriented paper explores 3‐ to 6‐year‐old Finnish children’s perceptions of ubicomp and IoT via interviews and a design task. Initially, the children were skeptical toward the idea that tangible objects, such as toys, could be computer and/or Internet enabled. However, these perceptions were subject to change when children were introduced to a scientific conception of what computers and the Internet are and asked to apply their knowledge to a technological design task. Implications for early years digital literacy education are discussed in the paper.


This chapter focuses on the utilization of the internet and digital technologies in terror organizations in the early years of the digital age to the present use of these tools by the Islamic State. The chapter explains the progression of using available technologies and mediums in order to recruit and spread jihadist ideologies around the world.


Sign in / Sign up

Export Citation Format

Share Document