Transaction Search Form: please type in any of the fields below.
Date: November 22, 2024 Fri
Time: 11:44 am
Time: 11:44 am
Results for internet
38 results foundAuthor: Gallagher, Bernard Title: International and Internet Child Sexual Abuse and Exploitation: Research Report Summary: There has, in recent years, been growing awareness and concern over cases of child sexual abuse (CSA)which have an international dimension or which involve the Internet. However, relatively little is known about these cases, as a result of which the policy and practice response may not be as appropriate or effective as it should be. This research project, directed by Bernard Gallgher, and funded by The Nuffield Foundation, was designed to further knowledge of international and Internet CSA, and in doing so contribute to the development of policy and practice. Details: Hudderfields, UK: Centre for Applied Childhood Studies, University of Huddersfield, 2006 Source: The Nuffield Foundation Year: 2006 Country: United Kingdom URL: Shelf Number: 104160 Keywords: Child Sexual AbuseInternational CrimeInternet |
Author: Canada. Office of the Federal Ombudsman for Victims of Crime Title: Every Image, Every Child: Internet-Facilitated Child Sexual Abuse in Canada Summary: This report gives an overview of the problem of Internet-facilitated child sexual abuse, provides limited historical information about what has been done by the federal government on the issue to date, identifies issues that negatively impact child victims and makes recommendations for positive change. Details: Ottawa: 2009 Source: Year: 2009 Country: Canada URL: Shelf Number: 115363 Keywords: Child Sexual AbuseInternetPornography |
Author: Gallagher, Bernard Title: International and Internet Child Sexual Abuse and Exploitation: Research Report Summary: From the report: "there has, in recent years, been growing awareness and concern over cases of child sexual abuse (CSA) which have an international dimension or which involve the Internet. However, relatively little is known about these cases, as a result of which the policy and practice response may not be as appropriate or effective as it should be. This research project, directed by Bernard Gallagher, and funded by The Nuffield Foundation, was designed to further knowledge of international and Internet CSA, and in doing so contribute to the development of policy and practice. Details: Hudderfields, UK: Centre for Applied Childhood Studies, University of Huddersfield, 2006 Source: Year: 2006 Country: United Kingdom URL: Shelf Number: 104160 Keywords: Child Sexual AbuseInternetPornography |
Author: Canadian Human Rights Commission Title: Freedom of Expression and Freedom from Hate in the Internet Age Summary: This report provides a comprehensive analysis of a current debate: what is the most effective way to prevent the harm caused by hate messages on the Internet, while respecting freedom of expression? Details: Ottawa: Minister of Public Works and Government, 2009. 58p. Source: Special Report to Parliament Year: 2009 Country: Canada URL: Shelf Number: 118364 Keywords: Drug TraffickingFreedom of ExpressionGun-Related ViolenceHate CrimesInternetOrganized CrimeViolence (Latin America)Violent Crime |
Author: Lumby, Catharine Title: Untangling the Net: The Scope of Content Caught By Mandatory Internet Filtering Summary: This report considers a number of key challenges the Australian Federal Government faces in designing the regulatory framework and the reach of its planned mandatory internet filter. Previous reports on the mandatory filtering scheme have concentrated on the filtering technologies, their efficacy, their cost and their likely impact on the broadband environment. This report focuses on the scope and nature of content that is likely to be caught by the proposed filter and on identifying associated public policy implications. Details: Brisbane: ACR Centre of Excellence for Creative Industries and Innovation, 2009. 40p. Source: Internet Resource Year: 2009 Country: Australia URL: Shelf Number: 118582 Keywords: InternetInternet Filtering |
Author: Byron, Tanya Title: Do We Have Safer Children in a Digital World? A Review of Progress Since the 2008 Byron Review Summary: 1. In the last two years there has been significant progress on improving children's digital safety which I am pleased to highlight in this report. As the UK Council for Child Internet Safety (UKCCIS) enters the next phase of its work, I think it is a good time to take stock of progress so far and consider priorities. I hope this report will help UKCCIS to build on its successes, as in the fast-paced digital world the UK and UKCCIS will need to speed up to stay ahead as the world leader in child digital safety. 2. In the first phase of this work I have been impressed by the public awareness campaign which I think gives clear and concise messages to help parents educate their children. 3. I have also been struck by the improvements to educational resources which are enabling our children and young people to develop the resilience and skills they need to negotiate their digital lives. These skills will in turn help them to educate their children, as today's children are tomorrow's parents. 4. The UK is a world leader in improving children's digital safety. The establishment of UKCCIS is a significant achievement, bringing together a range of influential organisations with an interest in, or a responsibility for, keeping children and young people safe on the internet. The council is to be congratulated on publishing the first UK child internet safety strategy in December 2009. 5. In preparing this report, I have gathered evidence through talking to UKCCIS executive board members, children and young people, parents, wider stakeholders and a survey of 148 members of UKCCIS. 6. The recommendations in this report are intended to support the recommendations in my 2008 review and the ongoing work of UKCCIS. I planned for my 2008 recommendations to be delivered over a five-year timescale, so I would not expect them all to have been completed by now. For this reason this report does not deliver a recommendation by recommendation audit of my 2008 review. Details: Annesley, UK: Department for Children, Schools and Families, 2010. 60p. Source: Internet Resource: Accessed April 224, 2018 at: http://dera.ioe.ac.uk/709/7/do%20we%20have%20safer%20children%20in%20a%20digital%20world-WEB_Redacted.pdf Year: 2010 Country: United Kingdom URL: http://dera.ioe.ac.uk/709/7/do%20we%20have%20safer%20children%20in%20a%20digital%20world-WEB_Redacted.pdf Shelf Number: 119455 Keywords: Child WelfareComputer CrimesInternetInternet SafetyVideo Games |
Author: Baker, Wade Title: 2010 Data Breach Investigations Report Summary: "In some ways, data breaches have a lot in common with fingerprints. Each is unique and we learn a great deal by analyzing the various patterns, lines, and contours that comprise each one. The main value of fingerprints, however, lies in their ability to identify a particular individual in particular circumstances. In this sense, studying them in bulk offers little additional benefit. On the other hand, the analysis of breaches in aggregate can be of great benefit; the more we study, the more prepared we are to stop them. Not surprisingly, the United States Secret Service (USSS) is also interested in studying and stopping data breaches. This was a driving force in their decision to join us in this 2010 Data Breach Investigations Report. They’ve increased the scope of what we’re able to study dramatically by including a few hundred of their own cases to the mix. Also included are two appendices from the USSS. One delves into online criminal communities and the other focuses prosecuting cybercrime. We’re grateful for their contributions and believe organizations and individuals around the world will benefit from their efforts. With the addition of Verizon’s 2009 caseload and data contributed from the USSS, the DBIR series now spans six years, 900+ breaches, and over 900 million compromised records." Details: Basking Ridge, NJ: Verizon Business, 2010. 64p. Source: Internet Resource Year: 2010 Country: United States URL: Shelf Number: 119521 Keywords: CybercrimeInternetInternet Safety |
Author: Warren, Ian Title: Crime Risks of Three-Dimensional Virtual Environments Summary: Three-dimensional virtual environments (3dves) are the new generation of digital multi-user social networking platforms. Their immersive character allows users to create a digital humanised representation or avatar, enabling a degree of virtual interaction not possible through conventional text-based internet technologies. As recent international experience demonstrates, in addition to the conventional range of cybercrimes (including economic fraud, the dissemination of child pornography and copyright violations), the 'virtual-reality' promoted by 3dves is the source of great speculation and concern over a range of specific and emerging forms of crime and harm to users. This paper provides some examples of the types of harm currently emerging in 3dves and suggests internal regulation by user groups, terms of service, or end-user licensing agreements, possibly linked to real-world criminological principles. This paper also provides some directions for future research aimed at understanding the role of Australian criminal law and the justice system more broadly in this emerging field. Details: Canberra: Australian Institute of Criminology, 2010. 6p. Source: Internet Resource: Trends and Issues in Crime and Criminal Justice, No. 388: Accessed November 3, 2010 at: http://www.aic.gov.au/documents/D/5/2/%7BD5233F02-F880-4EF1-BDC6-29B436DB1B19%7Dtandi388.pdf Year: 2010 Country: International URL: http://www.aic.gov.au/documents/D/5/2/%7BD5233F02-F880-4EF1-BDC6-29B436DB1B19%7Dtandi388.pdf Shelf Number: 120174 Keywords: Computer CrimesCybercrimesInternet |
Author: Rose, Andree Title: Developing a Cybervetting Strategy for Law Enforcement. Special Report. Summary: Cybervetting is an assessment of a person's suitability to hold a position using information found on the Internet to help make that determination. Cybervetting occurs even though there are no generally accepted guidelines and procedures for fair, complete, and efficient Internet searches for this purpose. Job applicants, employees, and employers are often uncertain whether cybervetting is legal, where privacy rights begin and end, and what cyber behaviors and postings should be subject to cybervetting. The purpose of this document is to present policies and practices to consider when using the Internet to search for information on law enforcement applicants, candidates, and incumbents, and when developing social media policies to limit inappropriate online behaviors. Cybervetting guidelines need to strike the right balance between individuals' constitutional rights and law enforcement agencies' due diligence responsibilities for screening out undesirable job applicants and employees. Details: Alexandria, VA: International Association of Chiefs of Police, 2010. 42p. Source: Internet Resource: Accessed February 7, 2011 at: http://www.iacpsocialmedia.org/Portals/1/documents/CybervettingReport.pdf Year: 2010 Country: United States URL: http://www.iacpsocialmedia.org/Portals/1/documents/CybervettingReport.pdf Shelf Number: 120697 Keywords: Background ChecksInternetPersonnel ManagementPolice Recruitment and Selection |
Author: U.S. Government Accountability Office Title: Combating Child Pornography: Steps Are Needed to Ensure That Tips to Law Enforcement Are Useful and Forensic Examinations Are Cost Effective Summary: The Department of Justice (DOJ) reports that online child pornography crime has increased. DOJ funds the National Center for Missing and Exploited Children (NCMEC), which maintains the CyberTipline to receive child pornography tips. The Providing Resources, Officers, and Technology To Eradicate Cyber Threats to Our Children Act of 2008 (the Act) contains provisions to facilitate these investigations and create a national strategy to prevent, among other things, child pornography. The Act directed GAO to report on actions to minimize duplication and enhance federal expenditures to address this crime. This report examines (1) the extent to which NCMEC determines the usefulness of tips; (2) mechanisms to help law enforcement coordination (i.e., deconfliction); and (3) the extent to which agencies are addressing factors that federal law enforcement reports may inhibit investigations. GAO analyzed the Act and spoke to law enforcement officials who investigate these crimes, selected to reflect geographic range, among other things. Although these interviews cannot be generalized, they provided insight into investigations. NCMEC takes steps to obtain feedback from law enforcement on the usefulness of CyberTipline reports; however, it does not systematically collect information on how useful individual reports are for initiating and advancing investigations or about information gaps that limit reports' usefulness. For instance, NCMEC solicits feedback via e-mail or in person quarterly from federal law enforcement liaisons at NCMEC about the overall usefulness of CyberTipline reports. However, according to many law enforcement officials GAO contacted, information in a CyberTipline report may not contain an image of apparent child pornography or may contain old data. NCMEC officials said that they are interested in obtaining additional feedback to enhance the usefulness of its reports and could explore additional methods to gather such information, such as creating a systematic process for obtaining feedback from federal law enforcement. Enhancing its processes for collecting feedback on the usefulness of CyberTipline reports could help NCMEC ensure that reports are as useful as possible to law enforcement. Existing deconfliction mechanisms generally prevent pursuit of the same suspects but are fragmented; DOJ is in the early stages of developing a system to address this fragmentation. Many law enforcement officials GAO contacted reported using various nonautomated (e.g., task forces) and automated (e.g., investigative systems) mechanisms to avoid duplication of effort in investigations. But these officials reported that there is not a single automated system that provides comprehensive case information and deconfliction, which can contribute to difficulties coordinating investigations. As mandated in the Act, DOJ is developing a national system to, among other things, provide law enforcement with a single deconfliction tool. Specifically, DOJ is conducting a needs assessment--which it plans to complete in 12 to 24 months--to use as a basis for system development. However, because DOJ is waiting on the results of the needs assessment to begin system development, it may be several years before the system is operational. Backlogs in the forensic analysis of digital evidence can delay or hinder online child pornography investigations; assessing the costs and benefits of taking extra steps to ensure the integrity of forensic analysis could help determine if there are efficiencies that could reduce backlogs. Forensic analysis of digital evidence consists of the review of information from digital media, such as hard drives, and can prove online child pornography crime. Several factors may contribute to backlogs in forensic analysis, including the steps federal law enforcement agencies believe enhance the integrity of analysis, such as making exact copies of digital evidence to discourage tampering. The FBI takes additional steps it believes enhance integrity, such as separating the forensic examination from the investigation. However, some federal officials and prosecutors GAO spoke with differed on the need for such steps. According to DOJ, the national strategy's working group is in a good position to address backlog issues and having this group assess the costs and benefits of steps taken to ensure the integrity of forensic analysis could help it determine potential efficiencies that could reduce backlogs. GAO recommends that NCMEC enhance its processes to collect feedback to improve tips and that DOJ assess the costs and benefits of steps agencies take to ensure the integrity of forensic analysis. NCMEC and DOJ generally concurred with our recommendations and discussed actions to address them. Details: Washington, DC: U.S.Government Accountability Office, 2011. 77p. Source: Internet Resource: GAO-11-334: Accessed April 2, 2011 at: http://www.gao.gov/new.items/d11334.pdf Year: 2011 Country: United States URL: http://www.gao.gov/new.items/d11334.pdf Shelf Number: 121221 Keywords: Child AbuseChild PornographyChild ProtectionComputer CrimesCriminal InvestigationsCybercrimesInternetSex Offenses |
Author: Sommer, Peter Title: Reducing Systemic Cybersecurity Risk Summary: This report is part of a broader OECD study into ―Future Global Shocks, examples of which could include a further failure of the global financial system, large-scale pandemics, escape of toxic substances resulting in wide-spread long-term pollution, and long-term weather or volcanic conditions inhibiting transport links across key intercontinental routes. The authors have concluded that very few single cyber-related events have the capacity to cause a global shock. Governments nevertheless need to make detailed preparations to withstand and recover from a wide range of unwanted cyber events, both accidental and deliberate. There are significant and growing risks of localised misery and loss as a result of compromise of computer and telecommunications services. In addition, reliable Internet and other computer facilities are essential in recovering from most other large-scale disasters. Details: Paris: Organisation for Economic Co-operation and Development, 2011. 119p. Source: Internet Resource: Accessed May 11, 2011 at: http://www.oecd.org/dataoecd/57/44/46889922.pdf Year: 2011 Country: International URL: http://www.oecd.org/dataoecd/57/44/46889922.pdf Shelf Number: 121708 Keywords: Computer CrimesCybercrimeCybersecurityInternet |
Author: Erez, Edna Title: Jihad, Crime, and the Internet - Content Analysis of Jihadist Forum Discussions Summary: The study’s findings indicate that most Jihadist on-line forum discussions are brief, involve a small number of participants from among the registered forum members, and include few entries and pages. Forum participants often refer viewers to approved web site and share authentic Jihadist multimedia. References and quotes from religious sources are common. Just over one-third of the discussions include calls for Jihad, and 3 percent of the communications discussed non-terrorist illegal activities, particularly computer-related and software-related offenses. Content analysis of the forum discussions identified four categories of content: information dissemination, religious preaching, instruction or training, and social interactions. These content categories support three core activities of the terrorist organization: ideological foundation, organizational structure, and operational means. Based on these findings the study offers a number of policy recommendations. First, analyze the forum discussions to determine the current status of Jihadist attention and interest. Second, respond to threats by adding interference at any touch point along the communication process. Third, mitigate the harm posed by exposure of Web site viewers to violent imagery. Fourth, the content of forum discussions could increase understanding of the context of the Arab, Muslim, and Jihadist milieu in which the forum social interactions occur. Recommendations for further research are offered. The peer reviews seriously challenge the study’s methodology and conclusions. One of the core criticisms among peer reviewers is that sweeping generalizations are frequently made with little, if any, documented evidence to validate them. Extensive references from a literature review. Details: Washington, DC: National Institute of Justice, 2011. 179p. Source: Internet Resource: Accessed on January 23, 2012 at https://www.ncjrs.gov/pdffiles1/nij/grants/236867.pdf Year: 2011 Country: United States URL: https://www.ncjrs.gov/pdffiles1/nij/grants/236867.pdf Shelf Number: 123756 Keywords: ComputersInformation TechnologyInternetJihadismTerrorism |
Author: Hutchings, Alice Title: Computer Security Threats Faced by Small Businesses in Australia Summary: The internet is an affordable and effective place for small businesses to sell and promote their goods and services. However, the internet also provides opportunities for fraudulent behaviour and unauthorised access to business and client data. Attacks on the computer system of a business can have immediate and ongoing effects, such as targeting customers for identity crimes or infecting website visitors with malicious software. It is contended that small businesses in Australia have been slow to implement security technology and policies that may protect their information systems, making them vulnerable to current and future threats. In this paper, an attempt is made to educate small business owners about the risks that they face and the mitigation strategies they could employ to make their organisation safer. Details: Canberra: Australian Institute of Criminology, 2011. 6p. Source: Internet Resource: Trends & Issues in Crime and Criminal Justice, No. 433: Accessed February 7, 2012 at: http://www.aic.gov.au/documents/F/1/0/%7BF1072721-F83E-4D19-9100-95E539507A70%7Dtandi433_001.pdf Year: 2011 Country: Australia URL: http://www.aic.gov.au/documents/F/1/0/%7BF1072721-F83E-4D19-9100-95E539507A70%7Dtandi433_001.pdf Shelf Number: 124001 Keywords: Computer Crime (Australia)Computer SecurityInternet |
Author: Liang, Christina Schori Title: Shadow Networks: The Growing Nexus of Terrorism and Organised Crime Summary: Key Points: there are growing links between terrorist and organised crime groups who are sharing expertise and are cooperating in kidnapping, arms, drugs and human trafficking, as well as drug production, cigarette smuggling, extortion and fraud; The growing nexus of shared tactics and methods of terror and crime groups is due to four major developments: globalization, the communication revolution through the Internet, the end of the Cold War, and the global "war on terror"; Both terrorist and organised crime groups are leveraging the Internet for recruitment, planning, psychological operations, logistics, and fundraising. The Internet has become the platform for both organised crime and terrorists to conduct cybercrimes ranging from video piracy, credit card fraud, selling drugs, extortion, money laundering and pornography; The growing nexus has facilitated terrorists to access automatic weapons, including stand-off weapons and explosive devices, empowering them to challenge police, land and naval forces with the latest sophisticated weaponry and intelligence; The growing nexus of terrorism and organised crime is exacerbating efforts in war-fighting and peacemaking in Iraq and Afghanistan. Also, West Africa in general and the Sahel in particular have become a dangerous new trafficking hub uniting both terrorists and organised crime cartels across a wide and mostly ungoverned land mass; The growing nexus of terrorism and organised crime groups is challenging international and national security by weakening democratic institutions, compromising government institutions, damaging the credibility of financial institutions and by infiltrating the formal economy, leading to increased crime and human security challenges. Details: Geneva: Geneva Centre for Security Policy, 2011. 6p. Source: GCSP Policy Paper No. 20: Internet Resource: Accessed February 21, 2012 at http://gcsp.ch/content/download/6607/61163/download Year: 2011 Country: International URL: http://gcsp.ch/content/download/6607/61163/download Shelf Number: 124228 Keywords: InternetOrganized CrimeTerrorismTransnational CrimeViolenceWeapons |
Author: Cunningham, Scott Title: Men-in-Transit and Prostitution: Using Political Conventions as a Natural Experiment Summary: Approximately 100,000 visitors came to Denver, Colorado and Minneapolis, Minnesota to attend the 2008 Democratic and Republican National Conventions. Economic theory suggests that men in transit can cause a shift in demand for commercial sex work. We estimate the responsiveness of labor supply to these two conventions, focusing on a previously neglected but increasingly important segment of the prostitution market: indoor sex workers who advertise on the Internet. Using a differences‐in‐differences estimator, we find that the conventions caused a roughly 30% increase in advertisements on the larger of two advertisement sites in the affected markets. Given the key role prostitution plays in the transmission of STIs, these results imply a focus of public health resources on men in transit. Details: Unpublished paper, 2011. 34p. Source: Internet Resource: Accessed May 22, 2012 at: http://www.toddkendall.net/Men_In_Transit_012511.pdf Year: 2011 Country: United States URL: http://www.toddkendall.net/Men_In_Transit_012511.pdf Shelf Number: 125264 Keywords: AdvertismentsInternetProstitutesProstitutionSex Work |
Author: Bipartisan Policy Center Title: Countering Online Radicalization in America Summary: While being a force for good, the Internet has also come to play an important—and, in many ways, unique—role in radicalizing homegrown and domestic terrorists. Supporters of Al Qaeda, Sovereign Citizens, white supremacists and neo-Nazis, environmental and animal liberationists, and other violent extremist groups all have embraced the Internet with great enthusiasm and vigor. They are using it as a platform to spread their ideas, connect with each other, make new recruits, and incite illegal and violent actions. We believe that this trend will continue and that future terrorist attacks against the United States and its interests will involve individuals who have been radicalized—at least in part—on the Internet. As a result, countering online radicalization should continue to be a major priority for the government and its Countering Violent Extremism (CVE) efforts. The purpose of this report is to equip policy makers with a better understanding of how the Internet facilitates radicalization, in particular within the United States; an appreciation of the dilemmas and trade-offs that are involved in countering online radicalization within the United States; and ideas and best practices for making the emerging approach and strategy richer and more effective. Details: Washington, DC: Bipartisan Policy Center, 2012. 56p. Source: Internet Resource: Accessed December 7, 2012 at: http://bipartisanpolicy.org/library/report/countering-online-radicalization-america Year: 2012 Country: United States URL: http://bipartisanpolicy.org/library/report/countering-online-radicalization-america Shelf Number: 127136 Keywords: Domestic TerrorismExtremist GroupsInternetRadical Groups (U.S.)Terrorist Groups |
Author: Albury, Kath Title: Young People and Sexting in Australia: Ethics, Representation and the Law Summary: Young People and Sexting in Australia report presents the #ndings of a qualitative study of young people’s understandings of, and responses to, current Australian laws, media and educational resources that address sexting. While there are many defnitions of sexting, for the purposes of this report we are referring to the production and distribution of naked or semi-naked photographs via mobile phones and social media. The project involved a review of both international local and academic research as well as popular media addressing sexting, and a review of educational resources for young people. Three focus groups were conducted with young people aged 16 and 17 in 2012, and a working paper based on those findings was then distributed to adult stakeholders in the fields of law enforcement, youth and children’s legal support, education, criminology, media and communications, youth work, youth health care, counseling and youth health promotion. This report therefore draws on both the focus group discussions, and a workshop consultation with the adult stakeholder group. Key Findings: While focus group participants were familiar with the practice of sending naked or semi-naked pictures, the term sexting was understood as an adult or media-generated concept that did not adequately reflect young people’s everyday practices and experiences of creating and sharing digital images. Young people observed that gendered double-standards were applied to discussions of sexting, and digital self-representation in general. For example one group of young women were particularly offended that their self-portraits or selves were viewed by both peers and adults as ‘provocative’ while young men’s naked or semi-naked pictures were understood as ‘jokes’. Sample media campaigns and public education materials viewed by focus groups were rejected by some participants for failing to acknowledge young women’s capacity for consensual production and exchange of images. These participants also felt that current sexting education fails to emphasise young people’s responsibility to not share images without consent. Both young people and adult stakeholders agreed that current legal frameworks relating to sexting (particularly those that con$ate sexting with child pornography) are not widely understood by either young people or adults, and that this lack of education and awareness places young people at risk of unreasonable criminal charges. The Young People and Sexting in Australia report recommendations are presented in two major categories, (1) strategies and (2) new approaches to understanding sexting. Details: Sydney: University of New South Wales, 2013. 39p. Source: Internet Resource: Accessed May 8, 2013 at: http://www.cci.edu.au/sites/default/files/Young_People_And_Sexting_Final.pdf Year: 2013 Country: Australia URL: http://www.cci.edu.au/sites/default/files/Young_People_And_Sexting_Final.pdf Shelf Number: 128673 Keywords: Computer CrimesCybercrimesInternetMediaSex LawsSexting (Australia) |
Author: Ringrose, Jessica Title: A Qualitative Study of Children, Young People and 'Sexting' Summary: Sexting has been conventionally defined as ‘exchange of sexual messages or images’ (Livingstone et al., 2011) and ‘the creating, sharing and forwarding of sexually suggestive nude or nearly nude images’ (Lenhart, 2009) through mobile phones and/or the internet. The legal interest has been in under-aged sexually explicit images which are a form of child pornography. Quantitative research on sexting has found rates as wide as 15% to 40% among young people, depending on age and the way what is understood as sexting is measured. However, quantitative research alone cannot offer in-depth understandings about the nature or complexity of technologically mediated sexual expression or activity via mobile or online media. Many teenagers do not even use the term ‘sexting’ indicating a gap between adult discourse and young people’s experiences. The purpose of this small scale qualitative research was to respond to and enhance our understandings of the complex nature of sexting and the role of mobile technologies within peer teen networks. It was designed as a pilot study – to investigate a phenomenon whose nature, scale and dimensions were unknown. Thus the research itself also was small in scale and exploratory in nature and also culturally and geographically specific. We conducted focus group interviews with 35 young people years 8 and 10 in two inner city London schools. At the focus groups we asked participants to friend us on Facebook, with a research Facebook profile. We then mapped some of their activities online and returned for 22 individual interviews with selected case study young people. We also interviewed key teachers and staff at the schools. While we believe that the findings that emerged are far from unique to the two year groups studied in two schools, considerable caution is needed before making any generalisations to other groups. This also underscores the urgent need for expanding the research with a broader scoped study (outlined in policy recommendations). Details: London: National Society for the Prevention of Cruelty to Children, 2012. 76p. Source: Internet Resource: Accessed May 30, 2013 at: http://www.nspcc.org.uk/Inform/resourcesforprofessionals/sexualabuse/sexting-research-report_wdf89269.pdf Year: 2012 Country: United Kingdom URL: http://www.nspcc.org.uk/Inform/resourcesforprofessionals/sexualabuse/sexting-research-report_wdf89269.pdf Shelf Number: 128875 Keywords: Computer CrimesCybercrimesInternetMediaSex LawsSexting (U.K.) |
Author: Van Buskirk, J. Title: Drugs and the Internet Summary: To date the availability of illicit drugs in Australia has largely been examined through interviews with people who use drugs (e.g. the Ecstasy and related Drugs Reporting System, EDRS); indicators such as drug seizures and arrests; and analyses of hospital admissions and drug-related deaths. Over the past decade there has been an increasing awareness and interest in online marketplaces as a source for discussion about and purchase of drugs (Walsh, 2011). There are now many internet sites selling substances such as prescription opioids, substances marketed as legal highs (e.g. herbal smoking blends) and substances that have been listed as controlled drugs (e.g. emerging psychoactive substance EPS such as mephedrone and synthetic cannabinoids). EPS is a general term used to refer to substances that have similar subjective effects to existing illicit psychoactive substances, and many of these are now listed as controlled drugs (i.e. they are now illicit) in Australia. The advent of the Silk Road in 2011, as an online marketplace, has broadened out the availability of EPS and other more conventional illicit substances (such as cannabis and MDMA). This bulletin is the first in a new Drug Trends series that provides analysis of trends over time in the availability and type of substances sold via the internet to Australia. The current bulletin reports for the time period September 2012 to February 2013. Key findings The number of retailers on the Silk Road increased (from 282 at time 1 to 374 at the last time point), while the number of retailers on the surface web remained relatively stable (92 at time 1 and 101 at the last time point). The increase on the Silk Road is largely driven by international rather than domestic retailers. On the Silk Road, cannabis and EPS were sold by the largest number of retailers consistently across all time points, followed by MDMA (3,4-methylenedioxy-Nmethylamphetamine) and pharmaceuticals (primarily benzodiazepines and sildenafil). The type of EPS available from surface web retailers differed substantially from the EPS available from those selling on the Silk Road. EPS sold on the Silk Road more closely mirrored those most commonly used by EDRS participants (i.e. people who regularly use psychostimulants) including drugs from the 2C-x and NBOMe categories, followed by DMT (dimethyltryptamine), Mephedrone and Methylone. Average prices of methamphetamine, cocaine and ecstasy being sold on the Silk Road remained stable across the time period. Average domestic prices for common quantities of these substances were comparable to prices paid for these same quantities by 2012 EDRS participants. Average international prices for these substances were substantially lower. Details: Sydney: National Drug and Alcohol Research Centre, 2013. 11p. Source: Internet Resource: Issue 1: Accessed March 21, 2014 at: http://ndarc.med.unsw.edu.au/sites/default/files/ndarc/resources/DrugsTheInternet_Newsletter%20FINAL%20with%20ISSN.pdf Year: 2013 Country: Australia URL: http://ndarc.med.unsw.edu.au/sites/default/files/ndarc/resources/DrugsTheInternet_Newsletter%20FINAL%20with%20ISSN.pdf Shelf Number: 104854 Keywords: Drug Abuse and AddictionIllicit DrugsInternetOnline CommunicationsOnline Transactions |
Author: Odinot, G. Title: The Dutch Implementation of the Data Retention Directive. On the Storage and Use of Telephone and Internet Traffic Data for Crime Investigation Purposes Summary: This report shows how the Dutch Data Retention Act works in practice. It provides an overview of the way in which the Retention Act is structured, and of the use of the retained telephone and internet traffic data in the investigative practice. The report also provides insight into the use and value of these data in court rulings. The main assumption behind the Data Retention Act is that certain telephone and internet traffic data can play an important role in the investigation and prosecution of serious crimes. However, the fact that these privacy sensitive data have to be stored for a certain period of time, is a continual source of discussion. This report provides insight into the use of the data that are stored according to Dutch law, in order to assess the value and the necessity of the retention directive. Hereby this report fills a need that is felt both in The Netherlands, as well as at the European level. Due to the rise of mobile phone and smartphone use, and due to the many communication possibilities provided by the Internet, distance communication has changed drastically in recent years. The current legislation does not reflect these developments, and it is unlikely that 'local' Dutch legislation can overcome this and can be meaningful in the borderless and location free space of the Internet. Given the international nature of many forms of crime, European harmonization on retention periods and the retrieval of data is desirable. European harmonization does not, however, resolve all the possible challenges presented by the virtual world. Security minded thinking stimulates an expansion of retention directives to involve more possibilities for the use of internet data in the investigation of crime. However, from the perspective of the privacy of citizens, this is an undesirable development. The search for an alternative to the current data retention is a hefty challenge. Insights offered in this report will be useful in discussions concerning these developments. Details: The Hague: WODC and Eleven International Publishing, 2014. 150p. Source: Internet Resource: Accessed September 11, 2014 at: http://www.wodc.nl/onderzoeksdatabase/ov-201402-the-dutch-implementation-of-the-data-retention-directive.aspx?cp=44&cs=6796 Year: 2014 Country: Netherlands URL: http://www.wodc.nl/onderzoeksdatabase/ov-201402-the-dutch-implementation-of-the-data-retention-directive.aspx?cp=44&cs=6796 Shelf Number: 133278 Keywords: Criminal Investigation (Netherlands)Criminal RecordsInternet |
Author: Sherbert Research Title: Children's Online Behaviour: Issues of risk and trust - qualitative research findings Summary: Sherbert Research was commissioned by Ofcom to conduct qualitative research on how children think about and manage online risks, and if and how they decide what sources to trust online. Ofcom has a statutory duty to further the interests of citizens in relation to communications matters, and is guided by a regulatory duty to promote media literacy, including among children. Ofcom conducts regular research on how children use telecommunications services. To date, there has been little in-depth research on children's critical thinking skills online, and this research furthers understanding in this important area. The research was designed to address the following core questions relating to children's critical thinking: - Do children understand the issues and risks around their personal data and their wider online activity and what, if any, strategies do they employ to manage these issues and risks? - How do they decide which external information sources to trust online, and what authentication approaches do they use? The study focused on a cross-section of children and young people aged 8 to 17 across the UK. A triangulation-based research approach was used, consisting of groups of three friends (termed 'friendship triads' in this research), one-to-one 'accompanied surfs' and filmed, unmoderated sessions. In total, 54 individual respondents took part in 36 research sessions. Fieldwork was conducted in February and March 2014. Details: London: Ofcom, 2014. 97p. Source: Internet Resource: Accessed September 29, 2014 at: http://stakeholders.ofcom.org.uk/binaries/research/research-publications/childrens/report.pdf Year: 2014 Country: United Kingdom URL: http://stakeholders.ofcom.org.uk/binaries/research/research-publications/childrens/report.pdf Shelf Number: 133465 Keywords: Internet Online CommunicationsOnline SecurityOnline Victimization (U.K.) |
Author: Saifudeen, Omer Ali Title: The Cyber Extremism Orbital Pathways Model Summary: The starting premise of this study is that internet-based communications possess unique characteristics that warrant the need to have a discrete pathway model to explain online radicalisation. This online radicalisation pathway model would especially apply to the growing communities of young netizens whose socio-psychological makeup is shaping a "new normal" in the way we exchange information and interact. The proposed Cyber Extremism Orbital Pathways Model (CEOP) describes how online cognitive radicalisation can move towards real-world violent extremism. The model also elucidates the multitude of competing forces in cyberspace that promote or impede such radicalization and what this means for online counter-radicalisation strategies. The CEOP model is based on inferences made from content and discourse analysis of extremist narratives on the internet and current studies about internet-based communications. The research took into account distinctive factors that made internet-based messaging more persuasive and this includes the effects of crowdsourcing. Finally, the CEOP model suggests how the same persuasive communication strategies used on the internet by extremists can be conversely used to counter online radicalisation. Details: Singapore: S. Rajaratnam School of International Studies, 2014. 32p. Source: Internet Resource: RSIS Working Paper No. 283: Accessed November 20, 2014 at: http://www.rsis.edu.sg/wp-content/uploads/2014/11/WP283.pdf Year: 2014 Country: International URL: http://www.rsis.edu.sg/wp-content/uploads/2014/11/WP283.pdf Shelf Number: 134170 Keywords: CybercrimeExtremismExtremist GroupsInternetRadical GroupsRadicalization |
Author: Gill, Paul Title: What are the roles of the internet in terrorism? Measuring Online Behaviours of Convicted UK Terrorists Summary: Using a unique dataset of 227 convicted UK-based terrorists, this report fills a large gap in the existing literature. Using descriptive statistics, we first outline the degree to which various online activities related to radicalisation were present within the sample. The results illustrate the variance in behaviours often attributed to 'online radicalisation'. Second, we conduct a smallest-space analysis to illustrate two clusters of commonly co-occurring behaviours that delineate behaviours from those directly associated with attack planning. Third, we conduct a series of bivariate and multivariate analyses to question whether those who interact virtually with like-minded individuals or learn online, exhibit markedly different experiences (e.g. radicalisation, event preparation, attack outcomes) than those who do not. Details: VOX-Pol Network of Excellence, 2015. 64p. Source: Internet Resource: Accessed November 28, 2015 at: http://voxpol.eu/wp-content/uploads/2015/11/DCUJ3518_VOX_Lone_Actors_report_02.11.15_WEB.pdf Year: 2015 Country: United Kingdom URL: http://voxpol.eu/wp-content/uploads/2015/11/DCUJ3518_VOX_Lone_Actors_report_02.11.15_WEB.pdf Shelf Number: 137352 Keywords: Extremist GroupsInternet Online CommunicationsRadical GroupsRadicalizationTerrorismTerroristsViolent Extremism |
Author: Hussain, Ghaffar Title: Jihad Trending: A Comprehensive Analysis of Online Extremism and How to Counter it Summary: Online extremism and the role the Internet plays in the radicalisation process is currently being debated and discussed by journalists, academics, technologists and government officials alike. This report demystifies the topic of extremist content online and exposes the manner in which online tools are being used by Islamist extremist organisations and individuals to recruit and propagandise. Current measures to tackle online extremism are also assessed and critiqued, after which the report details a practical strategy for countering extremism online and making the Internet a less hospitable domain for extremists. The research conducted for this report focuses on 30 Islamist extremist groups operating in the UK and France, mapping their use of the Internet and what they hope to achieve through their online activities. Popular online platforms such as YouTube, Facebook, Twitter as well as chat rooms, discussion forums and static websites are analysed with a view to assessing the role online extremist messaging plays in the radicalisation process. The report also addresses the issue of censorship, assessing the effectiveness of current filtering methods available and their overall efficacy. Research for this report was based on original data collection and analyses as well as interviews with a range of experts, mentors and target audiences. Key findings in this report: - With the Internet often being accused of producing radicalisation in isolation of other factors, this report found that the vast majority of radicalised individuals come into contact with extremist ideology through offline socialisation prior to being indoctrinated online. In other words, the Internet does not radicalise in isolation of other factors and should not be targeted as the 'cause' of radicalisation. As such, the Internet's role is less about initiating the radicalisation process; rather it acts as a facilitator and catalyst for the radicalisation process by 1) indoctrinating, 2) educating and 3) socialising individuals. - Although governments are increasingly relying on censorship and filtering methods to counter online extremism, this report found that negative measures, or censorship in general, was not only ineffective and costly but also potentially counter-productive. - Positive measures, such as developing counter-extremist efforts through online counter-speech content and popularising online initiatives that fight against extremism are much more effective in challenging extremist ideologies. However, there are currently not enough materials that counter extremist content online, allowing extremists to monopolise certain issues. - We found that results from search engines rarely, if ever, provide links to content that supported Islamist extremism. It was equally rare to find content countering extremist narratives. - Research also found that available Islamist extremist content websites were most successful if they provided more subtle, non-illegal information platforms with links to active social media platforms for users. Available static websites served primarily to 1) propagate the Islamist narrative through specific interpretations of scriptures, 2) promote martyrdom and 3) solidify a 'self versus other' allegiance to Muslims, rejecting non-Muslims. This report seeks to differentiate itself from previous reports on online extremism in two ways; firstly the research itself is much more in-depth and diverse, combining qualitative and quantitative data to reach conclusions. Secondly, this report offers a comprehensive and practical list of recommendations which, if implemented fully, could unleash a new wave of online activism that will take the fight to extremists online, breaking the current monopoly they hold over certain socio-political issues. Recommendations to public, private and third party sectors based on our findings: - Establishing a forum that deals with online extremism and brings stakeholders from key sectors together in order to do so. - Improving digital literacy and critical consumption skills in schools and communities. - Encouraging the establishment of a social media outlet that clarifies government policies and debunks propaganda. - A mapping exercise that explores current efforts to tackle extremism online and identifies partners that could be given support to develop an effective online presence. - Establishing a central body that offers seed funding and training for grassroots online counter-extremism initiatives. - More research into how the far right is using the Internet to propagandise giving a broader view of 'extremism online'. The findings and recommendations of this report suggest a clearer understanding of the role the Internet plays in radicalisation process and an appreciation of the dangers of relying on illiberal censorship can contribute towards the development of a more holistic approach to tackling extremism online. Relying on the cultivation of grassroots initiatives to develop and promote counter-speech online, as opposed to censorship, could help turn the tide against current extremist efforts. However, co-operation and regular communication between stakeholders from key sectors is vital in order for the above vision to be realised and, thus, the establishment of a forum that allows this to take place is also important. Details: London: Quilliam Foundation, 2014. 132p. Source: Internet Resource: Accessed February 12, 2016 at: http://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/jihad-trending-quilliam-report.pdf Year: 2014 Country: United Kingdom URL: http://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/jihad-trending-quilliam-report.pdf Shelf Number: 137854 Keywords: Counter-ExtremismCounter-TerrorismExtremismExtremist GroupsInternetIslamistsOnline CommunicationsRadical GroupsRadicalizationTerrorism |
Author: Vidino, Lorenzo Title: Terrorist Chatter: Understanding what terrorists talk about Summary: Since the early 2000s the Internet has become particularly crucial for the global jihadist movement. Nowhere has the Internet been more important in the movement's development than in the West. While dynamics differ from case to case, it is fair to state that almost all recent cases of radicalization in the West involve at least some digital footprint. Jihadists, whether structured groups or unaffiliated sympathizers, have long understood the importance of the Internet in general and social media, in particular. Zachary Chesser, one of the individuals studied in this report, fittingly describes social media as "simply the most dynamic and convenient form of media there is." As the trend is likely to increase, understanding how individuals make the leap to actual militancy is critically important. This study is based on the analysis of the online activities of seven individuals. They share several key traits. All seven were born or raised in the United States. All seven were active in online and offline jihadist scene around the same time (mid- to late 2000s and early 2010s). All seven were either convicted for terrorism- related offenses (or, in the case of two of the seven, were killed in terrorism- related incidents.) The intended usefulness of this study is not in making the case for monitoring online social media for intelligence purpose - an effort for which authorities throughout the West need little encouragement. Rather, the report is meant to provide potentially useful pointers in the field of counter- radicalization. Over the past ten years many Western countries have devised more or less extensive strategies aimed at preventing individuals from embracing radical ideas or de- radicalizing (or favoring the disengagement) of committed militants. (Canada is also in the process of establishing its own counter- radicalization strategy.) Radicalization is a highly complex and individualized process, often shaped by a poorly understood interaction of structural and personal factors. It is no surprise then that counter-radicalization initiatives are equally complex. Even among the seven subjects in this project there are only limited commonalities in terms of interests and views. While all seven subjects share a common background, based on the evidence of their online activities, their interests, views and approaches remain highly diverse. Some are focused mostly on religion; others are more interested in political issues. Some immediately adopt a jihadist mindset; others seem to undergo a long radicalizing trajectory. Given this diversity, it becomes obvious that any counter- radicalization needs to be tailored to the specifics of the case. Flexibility is the name of the game. Another key finding is that, at least in the beginning of their trajectories, the individuals studied here are all avid seekers of knowledge and information on religion. All refer to religious concepts and frames throughout their posts. Jihadism is a complex ideology that mixes religion and politics. But this study confirms the importance of its religious aspect for many of those who embrace violence - a fact some studies have dismissed. Any counter-radicalization effort, while not ignoring other aspects, should take into consideration the centrality of religious issues for those embracing jihadism. While for legal, political and cultural reasons it might be difficult to replicate in the West some of the religion-based counter- radicalization efforts adopted in countries such as Saudi Arabia or Singapore, the religious aspect should take a central role. The study also shows that those interested in religion are extremely inquisitive during the first stages of their radicalization trajectories. In the first months or even years of their posting life, in fact, these individuals constantly engage with fellow posters for sources and opinions on religious matters. They seem to be constantly searching for validation of their opinions. Over time, this openness seemed to slowly decrease, and by the end of the posting trajectory, there are only limited traces of questions. In the late stages, instead of questions, statements appear, often filled with confident pronouncements of their own knowledge. This attitude provides an enormous opportunity for counter- radicalization. It is arguable that it is in this phase that any kind of intervention might be more likely to succeed. Details: Ottawa: The Norman Paterson School of International Affairs, Carleton University, 2015. 75p. Source: Internet Resource: NPSIA Working Paper Series: Working Paper No. 03, 2015: Accessed February 26, 2016 at: http://carleton.ca/npsia/wp-content/uploads/No.-03-Terrorist-Chatter.pdf Year: 2015 Country: International URL: http://carleton.ca/npsia/wp-content/uploads/No.-03-Terrorist-Chatter.pdf Shelf Number: 137979 Keywords: InternetJihadismOnline CommunicationsRadicalizationSocial MediaTerrorismTerrorists |
Author: Balkovich, Edward Title: Helping Law Enforcement Use Data from Mobile Applications A Guide to the Prototype Mobile Information and Knowledge Ecosystem (MIKE) Tool Summary: Consumer devices that automatically and unobtrusively collect data about their users, including cell phones and other mobile devices, are spreading. While these devices gather much data that is potentially helpful to law enforcement, they also complicate the interpretation of surveillance law and raise questions about privacy. Moreover, facilitating law enforcement understanding of and access to metadata may help law enforcement adjust practices as increased use of encryption decreases the availability of content information, even with appropriate legal permission. This report documents a prototype tool called MIKE (the Mobile Information and Knowledge Ecosystem) created to help interested stakeholders - law enforcement, commercial enterprises, regulators, legislators, and the public (including advocacy groups) - better understand the mobile app ecosystem and the relationships among the data, its sources, and applicable legal constraints. This volume describes the prototype, explains how it was developed, provides a manual for those who are interested in using it, and discusses how the prototype might be updated and extended. Details: Santa Monica, CA: RAND, 2017. 124p. Source: Internet Resource: Accessed May 6, 2017 at: https://www.rand.org/pubs/research_reports/RR1482.html Year: 2017 Country: United States URL: https://www.rand.org/pubs/research_reports/RR1482.html Shelf Number: 135335 Keywords: Information PrivacyInternetLaw EnforcementMobile DevicesMobile PhonesPolice TechnologyPrivacy |
Author: Conway, Maura Title: Disrupting Daesh: Measuring Takedown of Online Terrorist Material and Its Impacts Summary: This report seeks to contribute to public and policy debates on the value of social media disruption activity with respect to terrorist material. We look in particular at aggressive account and content takedown, with the aim of accurately measuring this activity and its impacts. Our findings challenge the notion that Twitter remains a conducive space for Islamic State (IS) accounts and communities to flourish, although IS continues to distribute propaganda through this channel. However, not all jihadists on Twitter are subject to the same high levels of disruption as IS, and we show that there is differential disruption taking place. IS's and other jihadists' online activity was never solely restricted to Twitter. Twitter is just one node in a wider jihadist social media ecology. We describe and discuss this, and supply some preliminary analysis of disruption trends in this area. Details: Dublin, Ireland: VOX-Pol Network of Excellence, 2017. 47p. Source: Internet Resource: Accessed November 10, 2017 at: http://www.voxpol.eu/download/vox-pol_publication/DCUJ5528-Disrupting-DAESH-1706-WEB-v2.pdf Year: 2017 Country: Europe URL: http://www.voxpol.eu/download/vox-pol_publication/DCUJ5528-Disrupting-DAESH-1706-WEB-v2.pdf Shelf Number: 148131 Keywords: DaeshInternetIslamic StateJihadistsSocial MediaTerrorism |
Author: Betesh, Hannah Title: Internet Access for Pre-Release Job Search Training: Issue Brief - Early Lessons from LEAP Summary: Nov 02, 2016 Authors Hannah Betesh Key Findings: Given heightened Internet security restrictions in jails, jail-based American Job Centers (AJCs) had to be flexible to adapt their pre-release curricula for this environment. Planning for Internet installation soon after grant award was critical, given the inherent delays and complexity of establishing Internet access in previously unwired jail settings. Adequate budgeting for both equipment purchases and space upgrades was essential to support Internet installation and access in jails. Securing Internet access is a critical planning issue for the creation of a jail-based American Job Center (AJC). Community-based AJCs increasingly offer resources via the Internet, as the majority of job search activities and applications now occur online; however, correctional facilities often do not offer any Internet access for inmates due to security concerns. In jails where Internet access is available, it is generally for purposes unrelated to job search, such as legal research and distance learning, and in designated areas such as a law library or classroom. Arranging Internet access for the purpose of job search inside a jail-based AJC therefore represents a new and complex endeavor in the jail environment. This brief uses data from site visits to 8 of the 20 Linking to Employment Activities Pre-release (LEAP) sites to explore the role of Internet access in pre-release employment services as well as the resources, staffing, and infrastructure needed to establish Internet access for a jail-based AJC. Details: Princeton, NJ: Oakland, CA: Mathematica Policy Research and Social Policy Research Associates, 2016. 3p. Source: Internet Resource: Accessed March 13, 2018 at: https://www.mathematica-mpr.com/our-publications-and-findings/publications/internet-access-for-pre-release-job-search-training Year: 2016 Country: United States URL: https://www.mathematica-mpr.com/our-publications-and-findings/publications/internet-access-for-pre-release-job-search-training Shelf Number: 149461 Keywords: Employment ServicesEx-Offender EmploymentInternetJail InmatesJob Search |
Author: Dawson, Justin C. Title: Strategies to Mitigate the Impact of Electronic Communication and Electronic Devices on the Right to a Fair Trial Summary: he proliferation of electronic communication and electronic devices throughout modern society presents new challenges to the judicial system in protecting the right to a fair trial. Electronic communication, including texts, emails, blogs, social network posts, and other information accessed through the Internet, provides opportunities to expose confidential witnesses or informants, intimidate witnesses and victims from testifying, and bias jurors. Electronic devices can be used to record an image of a witness, identify that witness and expose him or her on the Internet, or communicate with a juror in an attempt to influence the outcome of a case. Jurors may also compromise their own independence by using electronic devices to access or share information about trial proceedings before the case is resolved. Court practices to protect the right to a fair trial have not kept pace with rapidly evolving electronic communication and devices, and traditional approaches to identify and protect against witness intimidation and to preserve juror impartiality are likely insufficient in the face of their near universal use, which facilitates access to information about nearly anything and anyone. On behalf of the National Institute of Justice, the Priority Criminal Justice Needs Initiative convened a panel, including judges, lawyers, educators, and other experts, to identify ways that electronic communication can impact the right to a fair trial and to recommend strategies to protect witnesses from intimidation and jurors from compromising their independence. The panel proceedings and recommendations are presented in this report. Key Findings Judges Should Have Authority to Use Their Own Discretion to Find Solutions for Their Courtrooms Legislation may help mitigate some of the problems introduced by electronic communication, but judges need discretion in their own courtrooms. Judges and attorneys need flexibility in engaging with jurors, who are used to communicating electronically throughout the day but must be limited during trial proceedings. Electronic Device Bans in the Courtroom Are Viewed as Effective in Mitigating Witness Intimidation However, jury sequestration to minimize or eliminate misconduct with electronic communication is considered to be generally impractical and counterproductive. More Public Education Would Clarify the Importance of Due Process and How Electronic and Social Media Communication May Violate the Constitutional Rights of Defendants and Other Parties to a Case Continuing education is also needed for the judiciary and court practitioners on evolving modes of electronic communication. Recommendations Undertake fundamental research on how the exploding volume of electronic data could affect the protection of rights. Develop methods to better assess the effect on the judicial process of jurors' "outside research" during trials. Identify approaches both to limit juror use of mobile devices to do "outside research" during trials and to educate jurors on this issue. Develop methods to monitor juror and defendant social media activity, given concerns about the use of social media to influence judicial processes. Details: Santa Monica, CA: RAND, 2018. 19p. Source: Internet Resource: Accessed May 25, 2018 at: https://www.rand.org/pubs/research_reports/RR2155.html Year: 2018 Country: United States URL: https://www.rand.org/pubs/research_reports/RR2155.html Shelf Number: 150365 Keywords: InternetJuriesOnline CommunicationsSocial MediaTrials |
Author: Phillips, Whitney Title: The Oxygen of Amplification: Better Practices for Reporting on Extremists, Antagonists, and Manipulators Online Summary: We live in a time where new forms of power are emerging, where social and digital media are being leveraged to reconfigure the information landscape. This new domain requires journalists to take what they know about abuses of power and media manipulation in traditional information ecosystems and apply that knowledge to networked actors, such as white nationalist networks online. These actors create new journalistic stumbling blocks that transcend attempts to manipulate reporters solely to spin a beneficial narrative - which reporters are trained to decode - and instead represent a larger effort focused on spreading hateful ideology and other false and misleading narratives, with news coverage itself harnessed to fuel hate, confusion, and discord. The choices reporters and editors make about what to cover and how to cover it play a key part in regulating the amount of oxygen supplied to the falsehoods, antagonisms, and manipulations that threaten to overrun the contemporary media ecosystemand, simultaneously, threaten to undermine democratic discourse more broadly. This context demands that journalists and the newsrooms that support them examine with greater scrutiny how these actors and movements endeavor to subvert journalism norms, practices, and objectives. More importantly, journalists, editors, and publishers must determine how the journalistic rule set must be strengthened and fortified against this newest form of journalistic manipulation - in some cases through the rigorous upholding of long-standing journalistic principles, and in others, by recognizing which practices and structural limitations make reporters particularly vulnerable to manipulation. With a particular focus on coverage of internet trolls, conspiracy theories, and networks of white nationalists during and after the 2016 US presidential election, this report explores these issues through the perspectives of those who must navigate this territory every day: the journalists themselves. The report's three parts incorporate interviews with 50 individuals with intimate knowledge of the contemporary news media. Fifty-six percent of these respondents are women, 30% are people of color, and 26% are natural-born citizens of countries outside the United States, with additional insights gleaned from the scores of the more informal discussions the author - a frequent expert commentator on stories about internet trolling - has had with reporters since 2010. While each part may be read on its own, each informs and is informed by the others. Details: New York: Data & Society, 2018. 128p. Source: Internet Resource: Accessed May 31, 2018 at: https://datasociety.net/wp-content/uploads/2018/05/FULLREPORT_Oxygen_of_Amplification_DS.pdf Year: 2018 Country: United States URL: https://datasociety.net/wp-content/uploads/2018/05/FULLREPORT_Oxygen_of_Amplification_DS.pdf Shelf Number: 150414 Keywords: ExtremistsInternetJournalistsMass MediaMediaSocial MediaTerrorists |
Author: Pacheco, Edgar Title: New Zealand Teens and Digital Harm: Statistical insights into experiences, impact and response Summary: This report presents the findings of a nationally representative study whose purpose was to explore the experiences, attitudes, and behaviours of New Zealand teens about digital communications including harm and/or distress. It was conducted by Netsafe in partnership with the Ministry for Women (the Ministry). While there is growing interest in examining young people's experiences and use of digital technologies, including the challenges and risks teens face, evidence based on representative data in the New Zealand context has been unavailable. The study focuses on the prevalence of New Zealand teens' experiences with a range of unwanted digital communications1 in the previous year and the impact these experiences had on them, both emotionally and in carrying out everyday life activities. It also describes teens' responses, the effectiveness of their coping actions, and to whom they would turn for help in the future. The study reveals distinctive differences regarding experiences of harm and/or distress through unwanted digital communications among different sub-groups of the population surveyed. More noticeable are the varying experiences in the context of gender, with girls being more likely to experience disruptions in their everyday life activities and an emotional toll because of unwanted digital communications. These insights are consistent with key findings from Insights into Digital Harm: The Online Lives of New Zealand Girls and Boys, a qualitative study released last year by the Ministry in collaboration with Netsafe. Similar patterns have been identified in the context of participants' ethnicity, disability and age. The research technique for data collection was an online survey conducted with a sample of 1,001 New Zealand teens aged 14-17 years old and distributed on key demographic variables such as age, gender, disability, ethnicity and location. Fieldwork was conducted in the third term of the 2017 school year. Data collection and initial analysis was carried out by Colmar Brunton. Strict procedures were followed to ensure the protection of participants' privacy and confidentiality. The margin of error of this study is +/- 3.1% on total results. As digital technologies continue to evolve, so too will the ways young people engage with them. Further research will be required to fully explain new dimensions of the complex nature of teens' and children's interaction with their online environment. We believe government agencies, online content and service providers, law enforcement, the research community, and the general public will find this report useful. The findings can contribute to the development of policies and practices that are intended to support New Zealand teens to safely take advantage of the benefits of digital technologies and online environments. Details: Wellington, NZ: Netsafe, 2018. 50p. Source: Internet Resource: accessed June 19, 2018 at: https://www.netsafe.org.nz/wp-content/uploads/2018/05/NZ-teens-and-digital-harm_statistical-insights_2018.pdf Year: 2018 Country: New Zealand URL: https://www.netsafe.org.nz/wp-content/uploads/2018/05/NZ-teens-and-digital-harm_statistical-insights_2018.pdf Shelf Number: 150578 Keywords: Digital HarmInternetOnline CommunicationsOnline VictimizationSocial Media |
Author: Hollywood, John Title: Using Social Media and Social Network Analysis in Law Enforcement. Creating a Research Agenda, Including Business Cases, Protections, and Technology Needs Summary: In April 2017, the National Institute of Justice convened an expert panel to identify high-priority needs for law enforcement's use of social media and social network analysis. The panel characterized business cases for employing social media and social network analysis in law enforcement, including monitoring for short-term safety threats in postings; identifying those at high risk of involvement in violence, either acutely or chronically; and investigating specific crimes and organized crime networks. The panel also specified a core case not to do: monitoring of First Amendment-protected activity for vague purposes. The panel next specified a framework for providing computer security, privacy, and civil rights protections when employing these types of analysis. The framework includes data protections for ensuring legal backings and information security; analytic protections for ensuring protection of findings, legal backing, and equitable justice outcomes; and protections on enforcement actions to ensure consistent and equitable actions and outcomes. Finally, the panel identified and prioritized needs for innovation related to social media and social network analysis. The first part of the resulting innovation agenda concerns developing policies and strategies, including best practices for transparency and collaborative decisionmaking with communities, as well as model policies. The second part is technical development, starting with assessing current tools and how they might be better tailored to law enforcement. The third part concerns law enforcement-specific training, starting with assessing gaps in current training. Training on legal issues is a short-term priority. The final part is creation of a help desk to help law enforcement agencies navigate requests to social media companies and interpret the resulting data. Key Findings - Business cases for social media and social network analysis The panel discussed five core business cases for employing social media and social network analysis in law enforcement: monitoring for activity indicating short-term safety threats in postings, and communicating responses as needed; identifying those at high risk for involvement in violence; actively monitoring the high-risk to see whether violence may be imminent; investigating organized crime networks; and investigating specific crimes. The panel also discussed one core case not to do: monitoring First Amendment-protected activity for vague or unspecified purposes. Core security, privacy, and civil rights protections Data protections relate primarily to documenting procedures and policies, and having protections for, data searches and collections. Analysis protections provide a common set of policies and procedures needed for the deployment and use of analytic tools drawing on social media and other personal communications data. Action protections ensure both that policing practices are not distorted and that both enforcement and social service actions are employed consistently and equitably. An innovation agenda for social media analysis and social network analysis in law enforcement The first part of the expert panel's innovation agenda is to support working with communities to develop policies and strategies for using social media and social network analysis. The second part is technical research on law enforcement-specific social media and social network analysis. The third part is supporting law enforcement-specific training on social media and social network analysis. The final part is creation of a help desk to help law enforcement agencies navigate requests to social media companies. Details: Santa Monica, CA: RAND, 2018. 28p. Source: Internet Resource: Accessed July 27, 2018 at: https://www.rand.org/pubs/research_reports/RR2301.html Year: 2018 Country: United States URL: https://www.rand.org/pubs/research_reports/RR2301.html Shelf Number: 150934 Keywords: InternetLaw Enforcement TechnologyPolice TechnologySocial MediaSocial Network Analysis |
Author: Counter Extremism Project Title: Extremists and Online Propaganda Summary: Official propaganda materials produced by the media arms of groups like ISIS, al-Qaeda, the Taliban, and al-Shabab are intentionally crafted to radicalize, inspire, and incite individuals to violence. These groups have produced propaganda in a myriad of textual, audio, and video forms - from music videos to glossy magazines - that have helped to convince individuals around the world to travel abroad to join extremist groups and to conduct deadly attacks in their home countries. At times, they have even offered specific guidance on how to do so. Abdirizak Warsame, who was arrested at the age of 19 for attempting to join ISIS abroad, stated that while watching violent ISIS execution videos on YouTube, he started to believe that he was "doing something for a greater cause --- for good" by supporting the group. Warsame was one of 57 individuals documented by the Counter Extremism Project (CEP) who attempted to join an extremist group abroad, and one of 72 individuals who accessed explicitly violent propaganda materials. Dzhokhar Tsarnaev - who detonated two homemade bombs along with his brother, Tamerlan, at the April 2013 Boston Marathon - told investigators that he and his brother built the bombs using instructions from al-Qaeda in the Arabian Peninsula"s Inspire propaganda magazine. The Tsarnaev brothers were two of 26 individuals documented who successfully enacted an act of terror, and two of 25 individuals who accessed propaganda materials that provided instructions on how to prepare or execute violent terrorist acts. (Sources: U.S. Department of Justice 2013, Slate, Foreign Policy, CBS News) Official extremist group propaganda materials are easily disseminated and accessed on the Internet. The individuals documented in this report accessed extremist group propaganda on a variety of social media platforms, including Facebook, Twitter, YouTube, Tumblr, Google Plus, Skype, Paltalk, and WhatsApp. Several individuals also played a part in further propagating extremist propaganda materials. Of the 168 individuals documented by CEP, at least 51 disseminated propaganda materials either online, in person, or via mail, and 59 viewed or discussed propaganda materials with another individual. Even if extremist groups lose control over territory in their respective regions of operation, their ability to reach out and spread propaganda online will allow them to continue to attract support from across the globe. For example, even as ISIS steadily lost ground in Iraq and Syria throughout 2017, U.S. permanent resident Sayfullo Habibullaevic Saipov was still inspired by the group's propaganda videos to carry out a vehicular attack in New York City on October 31, 2017, that killed eight people. As long as extremist groups continue to produce compelling propaganda that plays a part in inspiring and inciting individuals to violence - and remains easily accessible online - terrorism in the name of these extremist groups will remain a threat worldwide. (Source: U.S. Department of Justice 2017) Details: New York, NY: Counter Extremism Project, 2018. 68p. Source: Internet Resource: Accessed January 9, 2019 at: https://www.counterextremism.com/extremists-online-propaganda Year: 2018 Country: International URL: https://www.counterextremism.com/sites/default/files/Extremists%20and%20Online%20Propaganda_040918.pdf Shelf Number: 154062 Keywords: al-Qaedaal-ShababCounter Extremism ProjectExtremismInternet ISISRadicalizationSocial MediaTalibanTerrorismViolent Extremism |
Author: Pacheco, Edgar Title: Children's exposure to sexually explicit content: Parents' awareness, attitudes and actions Summary: This report presents findings from a larger quantitative study about parenting, digital technologies and online risks. It focuses on parents and caregivers' awareness and attitudes regarding their child's exposure to sexually explicit content online. The study was conducted in New Zealand based on a nationally representative sample. Summary of findings - Parents' main online concerns are their children sharing nudes of themselves, being treated in a hurtful way, and seeing sexually explicit content. - 1 in 5 parents said their children were exposed to sexually explicit content online in the prior year. - Parents reported children's exposure to sexually explicit content increased with age; and exposure to sexually explicit content was more common among boys. - The main reasons parents gave for their child's exposure to this content were: it popped up on the screen/device, curiosity, and accidental access. - 39% of parents said they stayed calm after finding their children were exposed to sexually explicit content while 22% were angry, and 10% ignored the situation. - Most parents believe they know what to do and say if their children access or are exposed to sexually explicit content. - After a situation occurred, most parents (72%) talked with their children about sexually explicit content on the internet. - Most parents are confident talking with their children about pornography, while 2 in 10 feel embarrassed. Over half said they discuss sex education and sexuality with their children, while 3 in 10 do not. - Half of parents know where to access information and resources about children and pornography, while 4 in 10 do not. Details: Wellington, New Zealand : Netsafe, 2018. 12p. Source: Internet Resource: Accessed February 5, 2019 at: https://www.netsafe.org.nz/wp-content/uploads/2018/12/Parents-and-Pornography-2018_10Dec2018.pdf Year: 2018 Country: New Zealand URL: https://www.netsafe.org.nz/wp-content/uploads/2018/12/Parents-and-Pornography-2018_10Dec2018.pdf Shelf Number: 154491 Keywords: Digital CommunicationsInternetOnline PornographyParentingPornographySexually Explicit MaterialSocial Media |
Author: New Zealand. Ministry for Women Title: Insights into Digital Harm: The Online Lives of New Zealand Girls and Boys Summary: This research is the first of its kind in New Zealand to investigate gendered differences in online harm from the point of view of girls and boys. It establishes a gendered evidence base about digital harm experienced by young people in New Zealand. This research identifies promising directions and potential solutions to prevent and reduce digital harm. It does so by investigating young people's views about their use of digital technologies (such as online platforms); their experiences of harm online; what they currently do to prevent and reduce digital harm; and what they think will help in the future. Digital harm is a complex issue, and can take a variety of forms. The internet provide a space for a unique form of harassment that is easy to create and distribute and difficult to remove. Digital harm can have a very damaging impact on young people. For example, a 2013 research paper found that a third of participants reported electronic harassment in the prior year, with over 50 percent rating the harassment as distressing. Young people are still maturing and learning about the world, yet their technical expertise often outstrips that of the adults who seek to support them. We all need better answers as parents, caregivers, family whanau, teachers, friends, service providers and policy makers. This research helps us build the evidence base about what will help to prevent and reduce digital harm. Details: Wellington: The Authors, 2017. 48p. Source: Internet Resource: Accessed February 5, 2019 at: https://women.govt.nz/sites/public_files/Insights%20Into%20Digital%20Harm%20-%20Ministry%20for%20Women%20%20Netsafe_R3_v6b-Web.pdf Year: 2017 Country: New Zealand URL: https://women.govt.nz/sites/public_files/Insights%20Into%20Digital%20Harm%20-%20Ministry%20for%20Women%20%20Netsafe_R3_v6b-Web.pdf Shelf Number: 154492 Keywords: Digital Communications Digital Harm InternetOnline Victimization Social Media |
Author: Pacheco, Craig Title: Online Hate Speech: A survey on personal experiences and exposure among adult New Zealanders Summary: Online hate speech has been a topic of public concern and research interest for some time. Initially the focus of this centred on the proliferation of online groups and websites promoting and distributing discriminatory content. Since the introduction of more interactive tools and platforms in the mid-2000s that enabled new and faster ways of disseminating content in a relatively anonymous fashion, concerns about online hate speech becoming a pervasive behavior have increased. Current research and analysis acknowledge the complex nature of online hate, the mediating role of technology and the influence of other contextual factors (e.g. social or political events). However, despite the growing attention on the topic, New Zealand-based research looking at personal experiences and/or exposure to online hate is surprisingly absent. This study seeks to address this gap. It builds on existing international research on young peoples experiences to explore those of the adult New Zealand population based on a nationally representative sample. The research instrument used for this study was an online survey. The survey was administered by Colmar Brunton in June 2018. The maximum margin of error for the whole population is 3.1% at the 95% confidence level. The sample is representative of the wider population on key demographics: age, gender, ethnicity, and location. Details: Auckland, NZ: Newsafe, 2018. 42p. Source: Internet Resource: Accessed February 15, 2019 at: https://www.netsafe.org.nz/wp-content/uploads/2019/11/onlinehatespeech-survey-2018.pdf Year: 2018 Country: New Zealand URL: https://www.netsafe.org.nz/wp-content/uploads/2019/11/onlinehatespeech-survey-2018.pdf Shelf Number: 154633 Keywords: Cybercrime Hate Speech InternetOnline Communications Online Extremism Online Victimization Social Media |
Author: Katz, Adrienne Title: Vulnerable Children in a Digital World Summary: There can be no doubt of the significant change connected technology has had on the day to day lives of children and young people, and the pace at which the technology they are using develops is relentless. What is clear from our research is that the support networks around vulnerable children have not yet caught up with the reliance many of them have on their devices and the connectivity it brings them. Although it is readily accepted that some children and young people are more vulnerable than others we must now systematically and thoroughly consider the digital dimension in their lives to ensure we can better protect them from online risk. The Good Childhood Report shows that 18% of children live with seven or more serious problems, such as fear of crime, domestic violence and emotional neglect. One in five children do not have stability because of residential transience. More than a quarter live with a parent who has a mental health difficulty while almost 10% act as young carers for someone in their family. Children and young people may have physical, emotional or mental health problems of their own, including disabilities and special needs or speech and language difficulties. Increasing numbers of our young people have mental health difficulties, while others exhibit emotional distress. When adverse childhood experiences are acknowledged, it is evident that certain children require additional support. Despite these documented adversities, some vulnerable children remain hidden and neglected. The Children's Commissioner for England has raised awareness of many hidden groups and described the risks faced by vulnerable young people as 'the biggest social justice challenge of our time'. It is not surprising therefore that vulnerability should extend to digital life. Online, despite the advantages of technology, some children's vulnerabilities are exacerbated, and others are ill prepared for safe internet use. This briefing paper will highlight how some young people are vulnerable online in specific ways and suggest some solutions. Details: London: Internet Matters, 2019. 44p. Source: Internet Resource: Accessed May 2, 2019 at: https://pwxp5srs168nsac2n3fnjyaa-wpengine.netdna-ssl.com/wp-content/uploads/2019/02/Vulnerable-Children-in-a-Digital-World-FINAL.pdf Year: 2019 Country: United Kingdom URL: https://pwxp5srs168nsac2n3fnjyaa-wpengine.netdna-ssl.com/wp-content/uploads/2019/02/Vulnerable-Children-in-a-Digital-World-FINAL.pdf Shelf Number: 155604 Keywords: Child ProtectionCyberbullyingInternetInternet SafetyOnline VictimizationSocial MediaVulnerable Children |
Author: Klingova, Katarina Title: From Online Battlefield to Loss of Trust? Perceptions and habits of youth in eight European countries Summary: This publication was compiled as a part of the project "Countering disinformation in the V4 and the Balkan region: Mapping needs, building capacity, and generating civic activism" that aims to: 1. increase communication and outreach capacities of civil society organisations that focus on countering disinformation, supporting media literacy or increasing public awareness on crucial topics leading to a more active civil society; 2. increase media literacy and/or awareness of disinformation among the youth in the region through empowerment of civil society organisations and active involvement of young people by entertaining and engaging online communication activities. Therefore, it provides a unique combination of data and insights from the region that enables the reader to understand more deeply the dynamics of disinformation and civil society organisations scene in the region, as well as the behaviour of young people on the internet, and social media specifically. Such a combination of data will facilitate both any future communication activities towards youth in the region, as well as more precise and targeted support of civil society organisations. Moreover, the publication emphasises the need for a diversified country-specific approach from the perspective of potential donors who should take into consideration different dynamics and complexities of the region. The boundaries between the "online" and "offline" world have blurred for great numbers of people who actively use the internet on a daily basis. This is especially the case for young people being raised with cell-phones in their hands, social media platforms and technology have become an integral part of their daily lives. When hunting virtual Pokemons in parks and streets, having online Avatars or attempting to take selfies with sharks or at the top of skyscrapers, young people have been pushing the limits of possibilities and blurring the lines between reality and the online environment. Having one account on social media is not enough, since each platform has its specific purpose. YouTube for music, entertainment or learning; Facebook for being in the loop on what events are happening around; Instagram for checking what a friend was doing during the day. We live in the information world. Internet access equals the access to information - access to a multitude of sources and opinions, and to communities and people living all around the world. How does the constant flow of an unprecedented amount of information influence the young? Do younger generations have enough knowledge and the will to consume information? Do young people consume information, or are they being consumed by the data? Who is the master and who is the pawn? Our research shows that young people realise that they are targets, and they are often tired of being constantly under information-attack. Thanks to many awareness-raising campaigns on disinformation and hoaxes, they also realise that all the information they see and consume must not necessarily be either true or accurate. And that contributes to their annoyance and disgust towards information sources in general. As a result, the distrust and scepticism of the young towards everything and everyone increases considerably. This distrust is not only reflected in their online behaviour but also in key decisions that shape political and social development of countries. As in every era, great challenges lie ahead of us in terms of information consumption and intergenerational communication. This research seeks to shed some more light onto both. Having collected unique qualitative data from focus groups discussions in eight European countries, we try to contribute another piece of the puzzle to understand complexities in the lives and thinking of today's youth and its impact upon the political and social realities of our societies. The boundaries between the "online" and "offline" world have blurred. This is especially the case for todays youth, for whom cell-phones, social media and digital technology have become an integral part of their daily lives. From Online Battlefield to Loss of Trust? sheds further light on young people's consumption of information and disinformation. The report is based on research conducted among 18-24 year olds residing in Central and Southeastern Europe for the purposes of Countering Disinformation in the V4 Region: Mapping Needs, Building Capacity and Generating Civic Activism, a project that's financially supported by the US Department of State. Having collected unique qualitative data from focus groups in eight European countries, the report also seeks to understand the complexities of the lives and thinking of today's youth and its impact upon the political and social realities of our societies. Details: Bratislava, Slovak Republic: GLOBSEC, 2018. 47p. Source: Internet Resource: accessed May 15, 2019 at: https://disinfoportal.org/wp-content/uploads/ReportPDF/From-Online-Battlefield-to-Loss-of-Trust-min.pdf Year: 2018 Country: Europe URL: https://disinfoportal.org/wp-content/uploads/ReportPDF/From-Online-Battlefield-to-Loss-of-Trust-min.pdf Shelf Number: 155852 Keywords: Disinformation internetOnline Communications Social Media |