Friday, April 22, 2011

Twitter

So I was reflecting a little bit about Twitter this past semester. At the beginning of semester I did not get Twitter at all. I thought it was a way for people to update on their every move. "I'm at lunch!" "I'm at line in Starbucks" "I"m eating a ham sandwich". I just never understood it.

After using it this semester, I must say, I really enjoy it!! I have had the opportunity to meet people I wouldn't have otherwise. Some in other states, and even other countries. It's been super cool meeting new people.

Some times I felt that it was hard to know what to tweet. But I think I learned, over the course of the semester, how to be a good Tweeter. :)

I have enjoyed this and will continue to stay on Twitter. Thank you Dr. V, for making us use it!!!

Article Review #5

For my fifth and final article analysis, I chose, "Safety in Cyberspace: Adolescents' Safety and Exposure Online" by Fleming, Greentree, Cocotti-Muller, Elias and Morrison. It was in the Youth and Society journal, Volume 38, Number 2, pages 135-154, Published December 2006.

ADOLESCENTS' SAFETY IN CYBERSPACE
Researchers are estimating that not only are youth online at a higher rate than ever, but they have a stronger presence than adults. Youth have access to the Internet at home and at school. It has been estimated that 21 million youth in the US, between the age of 12 and 17, use the Internet. That makes up approximately 87% of that age bracket. Estimates are the same for the same age bracket in Australia. Youth use the Internet for email, chatting, homework, games, music, sports, entertainment, hobbies, health information, and shopping. With youth using the Internet so much, comes a lot of concerns about dangers and their safety. Sexual predators often lurk online and groom potential victims by exposing them to pornography and sexual violence. As well, this exposure can greatly affect the child's development. Suggestions on how to protect youth include: discussion by parents, parental participation, increase of filters, and community education.

PARENTAL SAFETY DISCUSSION AND CONTROL OF INTERNET USE
Parents often regard their kids as the household "computer guru" (Kiesler, Zdaniuk, Lundmark and Kraut, 2000). Because youth know so much, parents often allow for their children to spend extended hours online, often spending more time on the computer now-a-days, than in front of the TV (Kiesler, Zdaniuk, Lundmark and Kraut, 2000). This has lead to implications in regards to parental control over the youth's Internet usage and children's attitudes (feeling they need to be online all the time, engaging in more risky behavior, etc).

With the high rates of online crimes, it is surprising that one study conducted by Turow and Nir in 2000, found that 60% of parents felt that people worry too much about the possibility of their child being victimized through online crimes. Some parents have stated that they have had the conversation about safe online practices, children to disagree that the convo ever took place. Some parents reported that they have installed filters and blockers on their home computer, therefore, the youth are safe.

ONLINE EXPOSURE
Sometimes youth visit pornographic or violent websites by choice. However, this may subject them to unpleasant materials that they were not expecting. Research has suggested that bullying, porn, and violence all have negative effects on youth. They may display violence towards women or peers, sexualized aggression, and may even lead to rape or the belief that they need to rape. Bullying can lead to depression, low self esteem, and even suicidal ideation.

ONLINE SAFETY PRACTICES
Sexual predators often know that the Internet is a place with a high volume of youth to which they can victimize. These predators can groom their victims. Grooming is a way that predators blur the line of appropriate and inappropriate behaviors. The process is gradual, and has an ultimate goal of making the child feel comfortable enough to engage in the inappropriate behaviors (whether it may be to have sex talk, send photographs or even meeting with the predator). The predator is attempting to gain affection, interest and trust of the child. They strive to be a "mentor" to the child. Youth often desire relationships, belongingness, attention, validation and acceptance. Predators know this fact and exploit it. In the grooming process, the predators attempt to normalize the behaviors. Normalizing the sexualized and deviant behaviors means that the child is less likely to tell anyone about the interaction. The grooming path typically follows: chatting, sexual comments, presentation of pornography (in order to desensitize the victim), meeting, gift giving.

HYPOTHESES
Boys will be more exposed to sexual and violent online materials, more so than girls.
Parents who have installed blockers and filters will indicate less online exposure.
Boys will have poorer safety practices than girls.
Younger teens will have poorer online safety practices than older teens.
Those teens who have talked with parents about safety online will have better safety practices.

METHOD
PARTICIPANTS
4 high schools in the Australian Capital Territory.
709 students between 8-10th grades.
17 were eliminated due to missing data, leaving 692 participants.
464 were male and 228 were female.

MEASURES
Self report questionnaire, which consisted of demographic questions (age, sex, access to Internet at home and school).
Main reason for using the Internet: IM, email, chatting, homework, music, videos, games, health, dating, relationships, TV, movies, help seeking, other.
Frequency of Internet usage: how often they use the Internet in an average week
Age group: 13-14 were younger teens, 15-16 were older teens
Parental use of blocks or filters: Yes/No if their parents have installed these programs
Internet safety discussions between parents and teens
Exposure to inappropriate material or behaviors online: how frequently they were exposed to porn, violence, bullying, rude comments, sexual comments, other offensive materials.
Online safety practices

RESULTS
99% of both girls and boys reported having school Internet access
95% of boys and 93% of girls reporting having Internet access at home
The main reason for using the Internet was homework, followed by IM, games, email, music/videos, and TV shows.
52% reported high Internet usage.
19% had parents install filters/blockers.
Only 39% of the older youth have had an Internet safety discussion with their parents.
Both girls and boys had exposure to violent and sexual materials.

DISCUSSION
Many young people were found to being exposed to sexual and violent materials. Boys were significantly more exposed to the inappropriate materials than were girls. Boys were found to be online more than girls, therefore, this leads to greater exposure to materials and behaviors. Explanation may be that boys are more curious, therefore, they are more willing to go to violent and pornographic websites. Approximately 1 in 5 parents had installed some form of blocker or filter on their home computer. However, the usage of these programs could be much higher, as parents often don't tell their children if they install the programs.
There was no difference between boys and girls online safety practices. Younger youth had poorer safety practices than older youth.

----

The main reason for analyzing this article is to show the need for education and talk. Studies show that parents think there isn't much of a problem. This shows both parents and youth are naive about online dangers. Youth can be exposed to materials that can be damaging to their development (violent and sexual materials). They can even be exposed to predators who wish to take advantage of them and groom them for their sexualized desires. Predators lurk online and know the things to say to get children's trust. Many theorists, researchers, law enforcement personnel, etc all state that the Internet has become "a predators playground". This reason alone should be enough for parents to want to take action in ensuring their kids never become a victim to these online predators.

Internet Safety

I wrote my paper on the topic of Internet safety for youth. I also wrote on the types of programs that are available. There are a number of programs available, that many people don't know about. Some of them are geared towards kids, while others are geared towards parents. Some offer games, videos, readings, etc., while others offer just readings.

I wanted to ask everyone what your thoughts are? Would you utilize a program, paid or free, to teach your kids about Internet safety? Would you tell other people about the programs? Do you think that safety programs should focus on parents or on kids?

Sunday, April 17, 2011

Article Review #4

Article review #4 is for the article titled "Sexual Harassment on the Internet" by Azy Barak. The article was published in Social Science Computer Review, Volume 23, Number 1, Spring 2005, pages 77-92.

Introduction:
Sexual harassment is something that has always affected people. It h as played a role "at work, school, military installations, and social gatherings". Mostly women suffer from sexual harassment, however, men, children, and homosexuals are also targets of SH as well. The Internet has become a medium where people can be sexually harassed . "SH and offense on the Internet is considered a major obstacle to the free, legitimate, functional, and joyful use of the Net, as these acts drive away Net users as well as cause significant emotional harm and actual damage to those who remain users, whether by choice or by duty." In other words, despite all the positives of the Internet, bad exists, which causes harm and distress among the victim.

Offline Sexual Harassment
SH has largely been performed face to face in social environments. SH happens all over the world and is not limited to one culture or society. However, SH affects people in different ways. The authors state there are three categories of sexual harassment: gender, unwanted sexual attention and sexual coercion. Gender is verbal and visual comments that put down the person because of their gender. These are intended to give the person negative emotions. This could be in the form of sexual jokes, insults, posting pornography, and making gender degrading remarks. Sexual attention refers to behaviors that display sexual desire and are unwanted by the victim. This could be staring at a womans breasts or making statements that insinuate sexual activities or desires. Sexual coercion is putting sexual pressure on another person . This could be touching, bribing, or making threats.

Sexual Harassment in Cyberspace
The three above types of SH are also online, but most of SH tends to be in the form of gender harassment and unwanted sexual attention. Gender harassment is very common online. It may be verbal, which could be offensive sexual messages toward a victim. Messages may be gender humiliating, such as saying a woman shouldn't be in a forum but rather in the kitchen, sexual remarks, or dirty jokes. Based off of a study by Mitchell, Finkelhor and Wolak (2003), 62% of youth received unwanted sexualized email's, 92% from senders they did not know and 73% unintentionally visited the websites which were sex sites (pop up windows, clicking a link they didn't know what it was, etc).

Passive verbal SH online is less intrusive than the pop ups or messages described above. The individual who is performing this type of SH online doesn't necessarily target a specific person, rather potential receivers. Example depicted in the article describes user names in chats, forums, instant messaging, emails, etc, which are offensive and possibly demeaning.

SH online can be both passive and active. Active harassment can be intentionally sending pornographic materials to another individual online. The amount of offense the receiver takes, it upon the sensitivity of that receiver. Therefore, whether the person deems the material as SH, depends on their attitudes, sensitivity and preferences, as well as, the content of the materials.

SH online is different than face to face SH, because communication between the harasser and victim is not necessary. The sender may post a message, however, the victim does not necessarily has to respond. It is important to note, that these activities may also not be considered sexual harassment based on the context of the situation. For instance, if someone enters a chat room in order to meet a partner, and they have a screen name which can be considered lude in other contexts, and make sexual statements, would not necessarily be considered SH, as both individuals entered the room for a sexually driven purpose.

Cases and Prevalence of SH on the Internet
There have been numerous articles depicting the dangerousness of SH on the Internet, however, very little empirical studies have been completed. One British study found that 41% of Internet users were sent pornographic materials online. Another study found that 19% of youth, mostly girls, had some form of SH in the past year.

The Dynamics of SH on the Internet
SH behavior is based on the online interactions and situations to which they are a part of. Online disinhibition tends to lead to a person exposing more of their "true self" than they would, prior to feeling disinhibited. It has always been stated that SH is about power, not about sex. The same is true online. Getting someone to lower their inhibitions, is a powerful factor in leading to SH. Disinhibition, more openness, and an environment which can be more masculine, can lead to higher likelihood of SH behaviors, especially by men towards women. As well, people online tend to follow group standards. This leads to further disinhibition and forms the groundwork of SH behavior. It is almost as if there is a lack of clear boundaries. Online there isn't the set of rules necessarily to state that SH behavior is wrong and will not be tolerated, as there is in the work place. The lack of legal and social sanctions supports SH behavior.

Effects of SH on the Internet
The main effects SH has on the victims is avoidance of certain sites where the SH took place. As well, women tend to change their online presence after SH takes place. Much more empirical research needs to be done to assess the effects SH online has on individuals.

Prevention of SH on the Internet
The main message in preventing SH on the Internet is educating potential victims and harassers, as well, changing culture and norms. It is argued that behaviors and attitudes are based on the media and users perspective. However, targeting specific populations online is virtually impossible, due to the vastness of the Internet. Therefore, the best method would be educating people on SH, especially starting with the youth.

Conclusion
SH exists online as much as it exists online. The Internet provides a unique environment where SH can be easily facilitated. Legally enforcing the prevention of SH is virtually impossible, educating with prevention messages to people, especially youth, can help the reduction of SH.

Sunday Funday!

I haven't done a fun post in a while..so I decided today would be a good day to blog about some of my favorite things!!

I'm going to start off with my favorite song at the moment! It is Tinie Tempah "Written in the stars". It's really good. Enjoy the video here:

My favorite TV show right now is Kenny VS Spenny. It is hilarious. I highly recommend it! It is about two best friends who do various, hilarious competitions, such as "who makes the best woman" or "who can eat the most meat". The loser has a humiliation at the end. It is really really funny. Season 4 is on Netflix. Otherwise, you can watch episodes online. Check it out!! However, it is not for those with weak stomachs. Not all of the episodes are raw, but a lot of them are. The meat one especially...don't watch if you have issue with people vomiting. Enjoy!

I always say to myself "work now, play later". One day when I can afford it...I plan to buy Christian Louboutin shoes! That will be my play later purchase!!
Christian Louboutin shoes Declic Christian Louboutin Shoes, Declic
Aren't they PRETTY?!?

I am moving into a house in the fall, and have been obsessed with finding new items for my house. I found these bath accessories at Bed Bath and Beyond. They are ME!

My favorite recipe at the moment is this chicken roll up! It is SO good. I highly recommend it!!

Tuesday, April 12, 2011

Interesting Observation

Today, as I sat in class, I made an interesting observation, that inspired this post. My PhD program is in the College of Technology. My studies are very interdisciplinary. I take a lot of courses in Psychology and Sociology. I was had been wondering if there are differences between graduate students in Liberal Arts, and graduate students in Technology. So the last two weeks of classes, I took it upon myself to do some observations of the two groups.

MY FINDINGS:
YES! There are major differences!
1. The most major difference that I found....Tech students bring computers. Liberal Arts students have paper and pencil! I noticed that the LA students were furiously taking notes. Tech students type away.
2. Tweeting during class in Tech. Granted, Twitter is part of the course requirements....LA, I would never foresee having Twitter be a part of learning.
3. Areas of research. Sure, this is part of being in Tech vs LA. We had to discuss research projects for my Psychology class. I had more questions on how I would execute a project, instruments, methodology, etc. from the LA classmates. Now, my area of research revolves around crimes against children, and this topic ALWAYS gets numerous questions because it definitely has the shock value aspect, however, the type of questioning from the LA students was significantly different than in any Tech classes I have taken.

Those were major differences that I can think of at the moment. It is interesting how we are all aiming for the same goal, yet we are so different. It really is two different worlds between the two colleges!

Monday, April 11, 2011

Article Review #3

Title: Case Study, Child Seduction and Self Representation on the Internet
Authors: Ethel Quayle and Max Taylor
Journal: Cyber Psychology and Behavior, Volume 4, Number 5, 2001

The paper is a case study of a man, who was charged with downloading child pornography. He traded CP, located children to abuse, and to socialize online with other pedophiles. This is a behavioral look at offenders, and how the Internet plays a role in child victimization.

Intro:
There are four ways which pedophiles use the Internet for their sexual interest: traffic CP, locate kids to molest, engage in inappropriate sexualized communication with kids and to communication with other adults who have sexual interest in kids (pedophiles). This case study devuldged into the mind of a pedophile, and online activity. The individual utilized chat rooms, where he could undertake multiple persona's.

A typical cognition of these individuals, is the justification of their behaviors. They deny any possible injury towards the kid, and wish bad upon anyone who looks down upon their actions. Internet child pornography allows the user to further justify their actions, because they are not actually touching the child. As well, they can find like minded individuals to communicate with, therefore, do not need to worry about condemners. Like minded individuals will support and encourage their actions and behaviors. A lot of these individuals feel that this is the "more responsible way of dealing with their feelings than going out and trying to abuse 'real' children".

Pedophiles engage in this online because of accessibility, affordability, and anonymity of the Internet. The Internet makes available not only CP images and videos, but also communities of like minded individuals, erotica (images, videos or stories, which does not constitute child pornography, but is used by pedophiles to fulfill their sexual gratification; example: a child wearing underwear in provocative poses). Anonymity allows people to also say things they wouldn't normally say, and be various persona's (this is not just unique to CP users, but for all people...people tend to feel more free to say and do things they wouldn't otherwise do or say).

Case of Q.X.
The individual used for this case study was a 33 year old, single man. He is sex offender treatment program..He has struggled with depression. He has never had a successful relationship with an adult. He sought contact with boys ages 9-14.

A number of aspects of the Internet were asked to QX.

ENGAGEMENT WITH THE INTERNET
He bought a computer with the sole goal of accessing CP. He reported that finding CP was very easy and there was a wide variety. His first area of access CP on the Internet was on Newsgroups. He found out where to find the materials online, largely by the press. The first CP images that he saw was arousing and escalated downloading. "...so there was a bit of shock, but that went very quickly..I was very much hooked..."

PROGRESSION FROM NEWSGROUPS TO CHATROOMS
He quickly became bored with Newsgroups and switched to chatrooms. "...I became hooked on chat rooms rather than the initial Newsgroups". Chats were a place where QX could meet those who had similar interests as him, as well as view child pornography movies. Collecting movies became his primary interest. He stated that he became "numb" to images, and that the same images were repeatedly traded.

ASSUMING A CHILD PERSONA
QX quickly began portraying himself as a child. He stated he did this in order to increase the possibility of accessing kids. Children are more likely to talk to another child. Therefore, the pedophile pretending to really be a child increased the chance and amount of children who would talk to him. He tried multiple child persona's, he ultimately ended maintaining Joe, 11 year old boy, who had blue eyes and blonde hair. Interestingly, the author states, that Joe was very similar to how QX would have looked at this age. QX offline life is a teacher, wherefore, it was easy for him to act as the children he saw at school. The online persona enabled him to act out fantasies that he has had. The picture that he used of himself, was that of a young boy who was on the local cricket team. Activities in the chat rooms has many people who are also participating in the same activities, and supporting the behaviors.

Discussion
This case study showed how pedophiles use the Internet to facilitate relationships and find materials to fit their sexual desires. The main focus was on how finding an online persona and forming relationships with children, heightened his arousal. Participating with link minded people allowed for sexual expression and solicitation.

---

The main purpose of blogging about this article is to show how people act online. I think many people trust who they are speaking with online, however, as shown above, people lie about who they are. I think that not trusting strangers that one meets, especially in chat rooms, is a valuable lesson that people need to be informed about.

Saturday, April 9, 2011

Innocent Images National Initiative

As I go through articles, to determine which will be the next article to write on (for class), I came across an article that I have printed and kept in my library a while ago. I feel that this article has potential to educate many of those reading this blog. It is from the FBI and discusses the Innocent Images National Initiative. The IINI is a part of the FBI's Cyber Crimes program. It is intelligence driven, multi-agency operation, which aims at combating child pornography and child exploitation proliferation. They focus on the crimes which are facilitated by the computer and Internet. This initiative analyzes information, and works with state, local, international and federal agencies.

"The mission of the IINI is to reduce the vulnerability of children to acts of sexual exploitation and abuse which are facilitated through the use of computers; to identify and rescue child victims; to investigate and prosecute sexual predators who use the Internet and other online services to sexually exploit children for personal or financial gain; and to strengthen the capabilities of federal, state, local, and international law enforcement through training programs and investigative assistance."

The purpose of posting this information, is to inform people about great law enforcement divisions, which are aiming to cut down on the horrific problem of online crimes. Please explore the IINI website! Every day kids are being victimized. Fight against Crimes Against Children!!! So that no more kids are being victimized!!!

Sunday, April 3, 2011

Archive for Dr. V!

I have been blogging all semester and just keeping a personal archive...I am going to post my blog comments on here and I'll just continue updating from here for now on. I know I sent you a few on Twitter, as I've done them. But I am going to make this the comprehensive list.




    Internet Addictions??

    On Friday I was stuck in traffic for a period of time. During this time, I tweeted, checked my Facebook, and watched a few YouTube videos on my phone. The more I think about this, the more ridiculous I think it is! What did I do a few years ago, when my phone didn't have the Internet on it?? I was on my way to work, stuck in traffic and playing around on Social Networking Sites. Now I'm sure I am not the only one who does this. Not just in that situation....how many people play on their phones while on the bus, or train, or at the airport...in the store, in a waiting room, or in the middle of the night when you just can't sleep. I really feel that this has become the norm. People check their sites whenever they get the chance.

    In my Master's thesis, I wrote on Internet Addiction. Though the main focus was on child pornography users and their level of addiction, I touched on non-CP users' level of addiction. As I reflect on Friday's trip to work, I wonder...am I addicted to the Internet and Social Networking?!?! or has this activity just become the norm? The scale that I used for my thesis, was developed a few years back, I wonder if scales that measure Internet activity, need to constantly be updated. Internet is literally at the palm of everyone's hands. I wonder how youth will be with technology in the future. They are growing up with iPhone's and iPad's, Droids, etc. They will be using the Internet and technology from the time they wake up until the time they go to sleep. It will be very interesting to see how technology will continue to be more and more a part of our daily lives.

    Sunday, March 27, 2011

    Law Enforcement and SNS

    As you may or may not realize, SNS's are becoming a medium for criminals. They may send messages, perform transactions, or just post their criminal behavior on their pages. Some SNS's work very well with Law Enforcement Officers (LEO). They will provide the information on the bad guys site to LEO. Some other SNS's (I will not name any names), do not work well with LEO. They will abide when a subpoena is sent (court order to provide the information), however, some of them will inform the individuals that LE is watching them, or just delete the profile all together. This can severely  hinder an investigation!! 

    What do you think? Do you think SNS's should work with LEO's?? Do you think that SNS's should delete profiles or leave them up?

    Social Networking

    Over the past two weeks, I have been at training for work. It was the Federal Law Enforcement Analyst Training. It was a great two weeks! We learned so much, from Social Networking, to charting, to crime trends, to everything involving drug investigations. We had a two day seminar on Social Networking. It was fabulous. I loved it in part, because my boss was the presenter. But also because I learned SO much from him!! A lot of the lecture revolved around investigations.

    One of the main things that I wanted to blog about, was about Facebook. He presented on how Facebook start, which anyone who loves SNS's and has viewed the movie The Social Network, knows how FB started. However, he talked about how FB really aims to be the "Franklin Planner" of SNS's. I thought that this was a great analogy!! Franklin Planners have calanders, to do lists, phone numbers, etc. It's a handy way to keep everything you need in one location. Well, as the presenter had stated, that is FB's goal. They want to have a central way for people to keep track of friends, phone numbers (if you put it on your page), birthdays, etc. This central "do all" that FB provides really sets it apart from other SNS's. 

    Internet

    For the last two weeks I have been at training for work. I got to stay at my parents house, instead of a hotel. It was awesome being able to visit with my parents, however, they have.....DIAL UP!!!! Therefore, the only Internet access I had was my phone!! I attempted to use their Internet, but it was so slow that I gave up and didn't even attempt to log on. I have been thinking how high speed Internet has really become a part of our daily lives. You don't realize how much you appreciate wireless, and high speed until you don't have it!!

    Where my parents live, I also had fairly bad reception. It would take SO long to send a text or a tweet!! It really is crazy how we depend on the Internet. It feels so nice to sit here right now and type this blog with wireless Internet!!!

    Saturday, March 19, 2011

    Videos

    A lot of videos have been made on the Internet and on tv, poking fun of Internet dangers. As funny as they are, they do tap into the reality of what goes on online. Please enjoy these videos. I think you'll enjoy them!

    Mad TV Sesame Street skit 
    I can be your Facebook Stalker
    Mad TV To Catch a Predator


    ...and my favorite of all time: SNL Myspace Class


    ENJOY! :)

    Identity

    I am currently working on my literature review for class. I am going through various readings and just finished a great article titled "Mastering the Dark Arts of Cyberspace: A Quest for Sound Internet Safety Policies" by Harry Valetk, which was published in Standford Technology Law Review. A large portion of the paper talks about online privacy and identity theft. This really got me thinking how easy it is for a criminal to steal your identity. The article talks about how criminals can use sites such as http://www.anybirthday.com/ to find out your name, birthday and even address! How scary is that?! As well, sites like this, is just asking for people to have stalkers!! The Internet can really be a scary and creepy place!! I really wonder what goes through someones mind that makes them think that cyber stalking, identity theft, any crime really, is a good idea?

    How many times do you go to school, dentist, doctor, banks, loan offices, etc and give them your name, date of birth, Social Security Number, etc??? It would be so easy for these people to take this information and go online and begin their fraud against you. Not to mention, those tech savvy people who can find your SSN and other personal information just using open source searches?? Be careful people!

    Sunday, March 6, 2011

    Research Project pt 2

    This weekend I have been doing more reflection on what I should do research on for Tech 621. I have also gathered research that is already out there. I do feel that there is chatter about internet safety and dangers, however, I think that there needs to be much much more.

    Therefore....I propose that I do a needs analysis for the project. Displaying the small amount of data and chatter that is taking place on the topic, alongside with the statistics on Internet crimes, can provide a view of what is needed.

    What are your thoughts?

    Friday, March 4, 2011

    Research Project

    For Tech 621, we have to do a research project. I would really like to stay  in line with the Internet Safety topic. However, I have been looking through Radian6 (our outlet to measuring the topic), and not finding much in regards to Internet Safety. Does anyone have any ideas to narrow the topic??? Thanks!

    Sunday, February 27, 2011

    Things I LOVE!

    So I decided I wanted to do a Rachel's favorite things today! I am in the mood for a little fun!! So here it is!

    Well I would say that I am a girly girl sometimes. If you know me, you know that I LOVE make up! I love Smashbox Photo Finish Primer! It works so well and makes skin looking flawless! I think that more people need to know about this product!!
    JUMBO PHOTO FINISH FOUNDATION PRIMER
    For hair to look so beautiful and smell amazing, I love Kiwi blow serum. It's great!
    Lorac cosmetics makes awesome makeup! I love their blush! I love Nars too! I just bought Nars make up on Friday!! Love love love!
    Other things NOT make up that I love:
    I LOVE Carrie Underwood! She's so pretty and an amazing singer! I saw her in concert and oh my goodness she was AMAZING!!!! The song Undo It is such an amazing song!!

    And finally, the Dell Inspiron Convertible...has anyone seen this?! I want it sooo bad! If anyone wants to purchase this for me, please feel free :)

    Identity Management

    In class, we spoke on identity management on social networking sites. I have been thinking about this topic a lot. Managing your identity online is very important now-a-days. Employers, law enforcement, coaches, etc., can see what people are doing based off of their SNS. Employers are checking these sites prior to hire, law enforcement uses them to find bad guys, athletes are being tracked by their coaches and athletic admin to see what they are doing. Maybe a person tells their boss that they are "sick" but posts an unflattering picture on their SNS and their boss sees it...such as that of the Facebook Fairy! SNS's are very much a part of our every day life. So how do you manage your identity on these sites? I think that often, people don't consider their identity online and how it can have impact on their life. A main thing for me, I like to keep my pictures fairly private. Tagged photographs can't be shown on my profile. I can see them, but others can't. I also like to stay away from those "unflattering pictures"....if you don't take them in the first place, then you have nothing to worry about! Sure everyone has a picture with a drink in from of them, but you don't need to take a picture completely "slizzard"....when you get intoxicated to that point, put the camera, phones, etc away! And the best advice....think about what you post before posting it! If you have to think about longer than 15 seconds....then you probably shouldn't do it! :)

    Sunday, February 20, 2011

    Kim K

    I was driving to work the other morning, and on the Bob and Tom show they were talking about the Kardashians. I must say, I do like the e! reality show. But on Bob and Tom, they said that Kim K got $25,000 for a Tweet that she mentions a link for a product! WTF?! That is insane to me!

    I want to send out this statement:

    To any company...I will GLADLY Tweet about your product if you give me $25,000 :)

    Social Capital

    In class, we discussed social capital, and it really got me thinking. Prior to this class, I thought that SNS's were for entertainment...but now I am really starting to see the benefits of SNS's. People can follow others (Twitter) or friend (Facebook, etc) someone that they don't really know that well. However, these "weak" ties can lead to opportunities that one wouldn't otherwise have.
    From a safety standpoint, it is often advocated to not allow someone access to your profile and information, unless you know them very well. I have strongly believed that statement prior. But, now I am starting to see the advantages of social capital. The Internet provides a unique opportunity to meet others that you wouldn't otherwise have any access to. Somebody can be halfway around the world, and because of SNS's and the Internet, you can communicate with them. This can provided a multitude of opportunities. I use to think...'oh Twitter is creepy, you can follow what someone else is doing at any moment of the day'. I  use to believe that people just posted what they had for lunch, or 'oh the line at Starbucks is SO long today'. Granted, there are many cases of that (just as there are on Facebook too), but there is a lot that one can learn. I have had the opportunity to meet new people, to learn about programs and publications that I wouldn't have otherwise hear about, and broaden my knowledge in the field that I study. It is a powerful tool with a wealth of knowledge, and I must say, I am starting to really enjoy it!

    Sunday, February 13, 2011

    SNS experience

    So I had a Social Networking Site experience that I would like to share. On Wednesday, 2/9/2011, at about 6:40 pm, I had gone out to my car. I was at home and had to leave to go to campus for a meeting. Well, when I got outside, I noticed somebody had HIT my car! The bumper (driver's side), was hanging about 1.5" off, with a huge dent and a huge crack! I stood there and was in shock that someone hit my PARKED car!!! I immediately looked to see if someone left a note with their insurance details, as that is the RIGHT thing to do when you hit someones car. Well of course, there wasn't a note. I noticed a man in another car, who had parked and was just sitting in his car. I will leave his name and details about him out of this, but let's just say, I knew who he was. He was sitting in his car watching me. My analytical mind started racing...he never parks in that spot, in fact he ALWAYS parks in the spot next to mine. I immediately call the police and file a report. I went inside to get the number for the agency, and in that time (probably 1.5 min), the man was out of his car and somewhere else. He must have run! I told the officer (who was extremely nice, by the way) who I believed hit my car and left the scene. I told him why and that there was paint from his car on mine (paint color, obviously a paint analysis wasn't done). The officer asked me what time I had gotten home on Wednesday and what time I realized the car was hit. At first I wasn't exactly sure the time...but after thinking for a moment, I realized...hey, I wrote on someone's wall as I was walking down the stairs to my car!! So I got on Facebook and looked at the time stamp to see what time exactly I was walking down the stairs. I was able to give the officer the exact time.

    For those of you who are curious, the officer was able to get the guy to admit that he did it. He tried denying it at first, but after some convincing, he admitted to it. Thankfully...and yes he had insurance. I just thought it was cool that I used SNS's to check my time, to give a more accurate time!

    Sunday, February 6, 2011

    Article Review #2

    My second article review for Tech 621 is titled Internet Prevention Messages: Targeting the Right Online Behaviors. The purpose of the article is to examine if sharing personal information online leads to victimization. The article further provides tips for pediatricians to assess children's online behaviors and how to talk to children about their online activities.

    BACKGROUND: There were a few interesting statistics which started this article. The authors stated that 9% of youth are estimated to be targets of harassment, and 13% are targets of unwanted sexual solicitation. Being a victim can lead to psychological problems, such as depression, distress, and victimization offline. Pediatricians are usually asked to consult on children's online safety. 

    The article focuses on 5 online behavior for this survey. Disclosure of personal information, aggressive behavior, talking with unknown people, sexual behavior, and downloading images using file-sharing programs. The research questions were: what are the prevalence rates of risky behaviors, Are behaviors which are targeted in safety prevention messages associated with online victimization, do psychology and behavioral problems account for these associations, and does the total number of online behaviors engaged in affect the association between specific behaviors and victimization.

    METHODS: The sample was taken from the Second Youth Internet Safety Survey (YISS-2). The survey was conducted on the phone, over a 3 month period. 1500 youth were interviewed for this sample. They had to be English speaking and used the Internet for the past 6 months, at least once a month. The ages ranged between 10-17, with the mean being 14.2. 

    MEASURES:
    Online behaviors- this section of the questions asked if the children posted personal information, such as name, phone number, school name, age or year born, and/or pictures. Aggressive online behaviors were asked if the children ever made rude or nasty comments to someone online, or harassed or embarrassed someone that they were mad at. They were also asked if they met people online that they did not know in person. 
    Online interpersonal victimization- this section included unwanted sexual solicitation or harassment online. 
    Psychological and behavioral problems- this section asked if they had been sexually or physically abused on and offline. The abused could include being attached, hit, jumped, hit by peers, picked on by peers. They were also asked how frequently a caregiver nagged, yelled, or took away their privileges. 
    Internet use and demographics- this section asked how often the child was online (days/week and hours/day). They were also asked how often they blogged, used instant messaging and chat rooms.

    Questions were asked in either a yes/no format or on a 4-point likert scale.

    RESULTS: one in five (20%) of the children had unwanted interpersonal victimization in the past year. 75% of the respondents had engaged in at least one of the behaviors being assessed. Nearly 30% engaged in 4 or more types of online behaviors in the past year. The most common online behavior was disclosure of personal information: posting personal information, which was done by 55% of the sample. The next common behavior was meeting someone online, which was done by 43% of the sample. The least common behavior was talking about sex with someone known only online. In regards to sending personal information, the most common posting was disclosure of age/year born. 

    The article concludes by providing advice. The best statement, in my opinion, of the article, was: "many types of online behaviors considered risky are becoming normative." Over half of the sample has given some sort of personal information, which validates the prior statement. The authors also provide, what they believe, to be an effect approach to discussing online dangers with youth..."I know many young people your age are meeting people online. You probably know how easy it is to hide your identity. be careful and know that you can discontinue a relationship any time by changing your login name or blocking someone...Acknowledge too, that some online relationship can be positive and a source of social support; nevertheless, wariness is warranted. We need to acknowledge the online world youth are living in and arm them with the tools to reduce the risk that some of their behaviors may entail."

    ----
    My thoughts on this article: I really enjoyed this article. I think it provided good tips and insights into how children are behaving online. As the article states, risky behaviors are now becoming normal to youth. It is not a good message to say...don't talk to strangers online, because that is unrealistic, but it is best to tell children facts about online crimes and how to be safe and avoid becoming a victim. The only thing I didn't like about the article, was the talk about pediatricians talking to children about online crimes. I think if that is the only one available, then that is fine, however, I believe that law enforcement officers or other advocates should be delivering the message. A lot more research needs to be done in this area. There is very limited research available currently. More needs to be done to understand online crimes, psychological aspects, and victimization. It would be interesting to see this article replicated and see how the statistics ended. I personally feel that the results may not be 100% accurate, for a few reasons. If someone is asking you a question that you are embarrassed about or didn't want to own up to, chances are you won't be truthful. There wasn't a way to measure lying in this study. For instance, if a child had been a bully, but their parent was standing near the phone and could hear the responses, the child may not say that they have bullied someone before, in fear that they would be in trouble. Perhaps, if the study was done again, using the Internet to assess children, the results may be different. It would be VERY interesting to see the results. All in all, I really enjoyed this article. 

    Sunday, January 30, 2011

    Article Review

    I was recently given an article, which was very interesting. It is titled Use of Social Networking Sites in Online Sex Crimes Against Minors: An Examination of National Incidence and Means of Utilization by Kimberly Mitchell, David Kindlehor, Lisa Jones, and Janis Wolak, Journal of Adolescent Health 47 (2010), pages 183-190.

    This article studied law enforcements incidents with crimes against children, regarding social networking sites. The purpose of this study, the authors felt, was to display the truth of crimes against children statistics, because the media has led people to have misconceptions about these crimes. The authors state that sex crimes against children have actually decreased, since the mid-1990s. However, in my  opinion, I believe that any "decline" is due to the fact that this crime is typically unreported...leading the true statistics incredibly under-representative of the true nature. I believe the under-reporting rate is due to a number of reasons:
    1. There is stigma attached to being a victim of this type of crime
    2. Predators have gotten smarter and are great manipulators. Once they have gotten what they want, whether it be a photograph or a sexual encounter with a child, they are very skilled at manipulating the child into thinking that this action is normal, and should happen again. As well, the predators are great at blackmailing, and scaring the kids into continually doing the act. They may say...I will tell people what you did, if you don't do it again. The kid, being afraid of their friends and family finding out, will continue to do the act in silence.
    3. Some kids like the attention they receive from these older men. They may think that this guy giving them all this attention online, isn't a "bad guy", rather a good guy that makes them feel good about themselves. They may not see a problem with the act, therefore, will never report it or tell their parents.
    4. The kid believes the guy is a good guy, and doesn't want them to get into trouble. The pedophiles are skilled at manipulating children into believing that they have good intentions and that people just "don't understand them".

    This article provided some good statistical findings. They interviewed law enforcement agencies. The first round was via questionnaire and the second via phone. The statistics which stuck out to me are:
    1. The predator used SNSs to initiate a relationship with the child. They may not utilize the SNS to disseminate pornography, or to set up a meeting instantly, but they used these sites to start a TRUSTING relationship. These guys often use the sites to seem "cool" to the kid. Hey we have this in common or that in common. It is a way to show who "they are" and seem normal to the kids. It is also a way to get to know who the kids are. Kids often share their entire life on these sites, sometimes even their phone number or address. This is a starting point for these predators. They may move to chatrooms, texting, or phone calls. This was done in 50% of victim involved cases.
    2. 72% of the cases, the predator used SNSs to send messages to the victim. I believe this is part of the grooming process, same as number 1. However, messages, and SNS "chats" helps to further build a relationship with the child. Builds "trust".
    3. In 69% of the cases, predators utilized the sites to get information on the victim. I believe the true statistic to be much higher. However, I believe a lot of predators wouldn't be honest about it. When anyone looks at someones SNS profile, they look at the likes, interests, school, whereabouts, relationship status, photographs, etc. A predator would use this to gain trust in the victim. They (predators) are good at using this for their advantage. They may talk to the kid and say "Oh I love Plain White T's, what about you". They may only be saying that because the kid is a fan of the band, or has them listed in their interests. The kid, not realizing that this is posted on their site, may think, oh wow, we have a lot in common. They don't realize that the predator is doing this to manipulate, gain trust, and groom the child.

    Children need to learn the behaviors of these individuals. They need to know what these guys are REALLY doing and motivations they have. If a 30 year old man is "facebooking" a 14/15 year old, they need to not be flattered, and realize that this is NOT normal and NOT ok. They need to not trust these guys and learn to keep their guard up. I truly believe that any decline in statistics is due to a decline in reporting as well. These predators are getting smarter and smarter. They are learning how to manipulate better and hide their actions, so that they go unnoticed by law enforcement.

    Sites

    There are a few sites that I want my readers to be aware of. First is the sex offender registry. Please view this link. You can search for a specific person by looking up their first and last name. OR you can search by state, county, city, or zip code. There is also a site where you can search by state. This will give you the option to search your address, and see who is located in your area. The sex offender registry will give you the sex offenders address, in some cases their place of employment, a photograph, and offense details. This is a good site to check on occasion for your own safety. Whether you are viewing because you have a child, or for your own safety, this site is worth checking out. Sexually violent predators are among us, and it is good to be familiar of who is living around you.

    Another site that I love is called MyCrimeSpace. The author of this site posts about those who utilize SNS's to commit crimes. It is a good way to read some cases that have happened on SNS's. I utilize this site when I present on the dangers of SNS's, to give some real life examples. Enjoy!

    The Social Network

    I saw the movie, "The Social Network" for the first time this weekend!! I must say, I really liked it. It got me thinking a lot about SNS's--the developments, the impact on our culture, and problems associated. It's really incredible to me that Mark Zuckerberg was able to develop the site in such a short amount of time. I know the movie isn't completely accurate (in fact, I read online that it was about 40% accurate), but the fact that someone can just sit down and develop a site that ends up having a great impact on the world, is mind blowing. Why couldn't I think of Facebook!? :)

    I would love to hear from the "big wigs" of SNS's, and their thoughts on crime trends on these sites. Facebook, MySpace, MyYearbook, among others, are notorious for crimes against children on these sites. People on these sites exploit, bully, harass, entice, among others crimes towards children. I believe that this is an unexpected and unintended trend of SNS's. However, I would love to hear their thoughts on the issue. There is no way to end the problem of crimes against children...however, SNS's can work with law enforcement to cut down the problem. They can report abuse on these sites to NCMEC. SNS's typically have a security team, which monitors activity on their site. Granted, with a large number of members, it is hard to keep up with activity that all members are doing. There are some sites which work very well with NCMEC and support the mission of cutting down crimes against children, such as MyYearbook. Their security team is very good. And then there are some, which do not work well with NCMEC. I won't name names. I don't understand why these sites wouldn't want to work with law enforcement to cut down crimes against children. I would love to pick the minds of the "big wigs" to see what their thoughts are on crimes against children and reasoning for not working with law enforcement. And for those who do work with LE and NCMEC, learning about their viewpoint on the issues.

    Crimes against children needs to be combated. These are crimes that have been around since the beginning of time, however, with the development of the Internet and SNS's, these crimes have become more prevalent and easily accessible for people. Pre-Internet, people had to go to a store, or order the materials through the mail. Now-a-days, people can access from their computer, phones, even gaming devices. SNS's  are a place where pedophiles know that they can go to meet children. Or they can meet others who share their desires, on these sites. SNS's need to realize this problem and work with LE and NCMEC at cutting down this problem!!

    Sunday, January 23, 2011

    BEAR DOWN!

    Today is going to be a fun day! Da Bears are taking on Green Bay in the playoffs!!! I have been so excited for today. I have my bears gear ready to go, and have been working on hw all week so that I wouldn't have anything to do today! With that...

    Bear down, Chicago Bears, make every play clear the way to victory;
    Bear down, Chicago Bears, put up a fight with a might so fearlessly.
    We'll never forget the way you thrilled the nation with your T-formation.
    Bear down, Chicago Bears, and let them know why you're wearing the crown.
    You're the pride and joy of Illinois, Chicago Bears, bear down.



    Enjoy the day!!!!




    Saturday, January 22, 2011

    Social Networking Sites

    For class, Tech 621, we were required to do some readings defining social networking sites (SNSs) and find 20 new SNSs that we didn't know existed. Completing this assignment I realized there are hundreds of thousands of SNSs out there! I knew that there were a lot, however, I never realized the vast quantity out there! I urge readers to simply Google "social networking sites", and you too will see the wide array of SNSs. Anything you can imagine (ex: sports, photographs, countries, music, games, etc, etc...) has a SNS. There are even sites to help you build your own SNS!! As I look through the list of SNSs that my classmates had found, along with what I had found, I started to think, what are the three broad umbrellas that these sites can fall under? I came up with:
    Professional
    Friendship
    Common Interest

    By professional, I mean that these are sites which the goal is to help people to find jobs, network with professional people in their field, and to explore careers. However, I think a lot of times people find their "friends' and network with them on these sites.
    Friendship, is just that. I mean that these sites are revolved around maintaining friendship. Also, I believe dating would fall into these sites. You are meeting people for a variety of reasons, and using the sites to learn more about others, to talk about who you are, and explore what you enjoy.
    Common Interest, I believe that this would be sites such as photograph sites, or music, or games, sports, etc. The list can go on. These are sites where you don't necessarily know the other people, or may never know these people, but that is OK. You are free to talk about your passions. However, sometimes these sites can form legitimate friendships, lead to dating, etc.

    I strongly believe that defining these sites, and placing them under umbrellas is not black and white. SNSs can fall under multiple categories. During the readings, they attempted to define these sites. I personally think the best definition is that SNSs are a platform for people to accomplish their goal, whether their goal is to meet professionals, make friends, maintain friendships, or to explore their passions and interests. The great thing about the Internet, is that you can define YOURSELF however you desire (though this can also be a scary thing, when it comes to criminals looking to exploit others). In the real world, people can see who someone is as they walk by. For instance, if someone saw me, they would know that I am tall, have long blonde hair, enjoy the color pink, and other information about me based on what setting they see me in. Online, you don't have that opportunity, since "you" are a profile page. These sites allow you to depict yourself virtually. You can say "I am tall, I like the color pink, I like this band, I like that band" etc.

    I think that SNSs are a great thing!...as long as people are safe on them, of course! :)

    Sunday, January 16, 2011

    Safe Internet

    Researching online criminals and their habits has led me to realize that the Internet can be an extremely scary place, especially for children (children being an individual under the age of 18). Often times, people let their guard down and don't realize how easy it can be for a predator to take advantage of them. Social networking sites, chat rooms, instant messenger, email, among others, are avenues that predators can use to potentially exploit, manipulate, or simply make other feel uncomfortable. Don't get me wrong, not every person on social networking sites, chats, or whatever, is a predator. Nor will every person who frequents these sites even come into contact with a predator. However, online crimes are growing rapidly. I have seen first-hand, with my work and studies, the significant volume of "bad guys" lurking on the Internet. These guys are skilled at manipulating, acting like they are "normal" and know exactly what they are doing. Sometimes they just want to "talk dirty" with a child (or other adults), sometimes they want photographs, and sometimes they want to arrange a meeting. My advice, keep your GUARD UP when you meet a stranger online. This goes to children AND adults. You never know who is really on the other end of the computer. When online, you can be whoever you want to be, and say whatever you feel. Be careful. I am not in any way knocking social networking sites. I love the Internet. I am on it day in and day out. And yes, I am one who looks at Facebook on my phone. I just want to spread the message to adults and children alike, to be SAFE on the Internet. People need to realize there are dangers, however, with the proper knowledge, you can be safe and avoid those online bad guys! And if you feel you, or someone you know, is being harassed, victimized, or if an adult is talking to a child inappropriately, please contact your local law enforcement, or report on the National Center for Missing & Exploited Children Cyber TipLine http://www.missingkids.com/missingkids/servlet/PageServlet?LanguageCountry=en_US&PageId=2936

    Da Bears

    Before I kick off my blog posts, I wanted to say LETS GO BEARS! I am a huge Chicago sports fan......and always will be! So don't try to argue with me that your team is better, because you won't change my mind! :)