“…spaces that have the curious property of being in relation with all the other sites [of society], but in such a way as to suspect, neutralize, or.

Slides:



Advertisements
Similar presentations
Internet Safety Rockingham County Public Schools
Advertisements

Digital Citizenship Cyber bullying Answers. 1.What is a Cyber bully? a. A bully that intimidates over the internet and is 17 years old or younger b. A.
Predators These people use the Internet to trick children into meeting with them in person File-share Abuse Exchanging music, video, and other files with.
Cyber Time! Third Grade!.
E-Safety Advice to Parents Richard Scott E-Learning Manager DASP.
Let’s Talk About Cyber Security
Internet Safety in Schools
National Board Support Review of Entry 4 and Creating Videos and Writing Tips November 16, 2012.
Let’s create a better internet together Safer Internet Day 2015 Primary Assembly.
Embedding Quotations and P.Q.E.
Mental Health Week Introduction W e are here today to help you understand more about what gets you down and hopefully find a few ways to help. This.
Cyber Bullying Get The Facts! Next.
Answers e c d d b b a a.
When you or someone else uses a computer or cell phone to cause harm or distress to other kids, this is called.
Some Ideas about MAKING DECISIONS. Define It! What are you trying to decide? What’s your GOAL?
Internet Online Safety How to have FUN and Stay in Control.
Digital Citizenship L’école élémentaire Beachy Cove Elementary School January 2013.
What you don’t know CAN hurt you!
Who Wants To Be A Safe Communicator? What does the ‘e’ stand for when it is in front of words? For example: , e-safety etc…
Cyber Safety What Every Parent Needs to Know If your child is surfing the Web, you need to be paddling right alongside him/her.
Important Facts you should know about the Net
CREATE YOUR PERSONALITY Define your identity GET TALKED ABOUT/ STAY RELEVANT Create a buzz CREATE A CONNECTION Hashtags & striking images PERFECT PICTURES.
Cyber Bullying BEAT BULLYING.
Internet addiction in children. CONTENT Introduction What is internet addiction? What is ADHD? What are the problems at school? What are the problems.
Social Media 101 How to use it for the benefit of Rotary! Created by: Marc Durocher
The Intranet A local area network (LAN) that is often A local area network (LAN) that is often used solely within a company or organization. It uses the.
LESSON 3 – ONLINE COMMUNICATION Mr Cole. ONLINE COMMUNITIES  People who are computer literate, and have the equipment, can form groups or ‘societies’
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Copyright, 1998 Duane Ruth-Heffelbower Use of the Internet in Refugee Resettlement.
Let’s Begin What is the Human Response to War? A Separate Peace and WWII Cyberlesson.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
Surfing the Internet Teaching Children about the SMARTS of using the Internet Are you being responsible when you use the Internet??? B E SMART! B E RESPONSIBLE!
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
What is social networking? 1.Social networking is the grouping of individuals into specific groups 2.networking is possible in person, for example in.
CMPT 880/890 Arguments. Outline Arguments What should be an argument and what shouldn’t? Claims Reasons Evidence.
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
Cyber Bullying Cyber bullying can happen in many different ways. The mains ways are either texting on a phone or ing. Cyber bullying is a criminal.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
Internet Safety Plan Sophomore Year. Essential Questions How will I know what risks I am exposing myself to when I make decisions online? How will I be.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Pre-Attentive Processing. Affordances In this screenshot, we see rocks and trees, similar to ones real world. In WoW, there are differences between how.
ASHLEIGH LENTYCH CYBER BULLYING AND INTERNET SAFETY.
Ethics. Ethics are the principles and standards we use to decide how to act.
KCB202, Week 11 Tutorial. Today Housekeeping LEX Hive Mind: The Theory Hive Mind: The Practice Consultations.
Digital citizenship By: Cody Quinn.
Operating Systems Proj.. Background A firewall is an information technology (IT) security device which is configured to permit, deny or proxy data connections.
Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 8 Ethics in IT Societies II.
What is the internet addictions???
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Unit 12 The Internet.
By Jessica Parkinson. Mobile phones have allowed our generation to connect with others all over the world. However, the potential threats are numerous,
E- safety Learn how to be safe on the computer! Reporting ALWAYS TELL A TRUSTED ADULT straight away if you are upset or worried about something that.
Literature Circle Jobs. Your job is to select 3 passages (preferably powerful quotes spoken by someone) from the reading selection that you think are.
Computer Technology Semester 2 Final Exam Review.
Cyberbullying Internet Safety. What is Cyber-bullying? Cyber-bullying is repeatedly hurting someone else through the use of technology. So, instead of.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
Internet Acceptable Use Policy
Who Wants To Be A Safe Communicator?
4 Ways to Set Up Parental Controls On Your Home Network
Is Facebook changing our identity ? By:raven bryant
Hotspot Shield Protect Your Online Identity
Unit 12 The Internet.
COMMUNICATION SOFTWARE
What Is Bullying? Bullying is defined as the repetitive, intentional hurting of one person or group by another person or group where the relationship.
Module 4 Remote Login.
Safety on the Internet By: Rachel Morello, Eddie Miller, Kyle Hayward, Heather Shuboney, and Lisa Ross.
R E A D What is cyber bullying? Hall

3.4 Internet – Use of Internet
Presentation transcript:

“…spaces that have the curious property of being in relation with all the other sites [of society], but in such a way as to suspect, neutralize, or invent the set of relations that they happen to designate, mirror, or reflect…”

 The internet is a heterotopia… let’s figure this out…  Precise Determined Functions that can change over time … beginning: research data, share resources, find information… … now: connect people, create community, provide information… Internet: Heterotopia with many heterotopias within…

 Capable of juxtaposing -- in a single, real place -- several places …virtual communities now lack visible signs that usually indicate how to interact with one another… … instead, textual descriptions are relied upon… … what’s the difference between the textual description, and the image …

 System of opening/closing… restrict entry but allow some… purification/rites or compulsory… …purification: (MHC) download Virus Software… …rites… obtaining an internet connection… “logging on”… “logging off”

 Either create a space of illusion that exposes real space, or else it is a space that is other…as perfect as the ‘real’ is chaotic… …the mere of creating ‘internet’ communities… ‘virtual’ realities… of constructing them… reflects how we construct our own “real” world…

… but remember… heterotopias, while embodying all this… … are “real” places… So the internet is a “real” place… … but “real” things don’t happen there… … right?

… there is the sense of the “virtual” and the “real”… … what is online isn’t “real”… > facts in virtual reality are shadowed by “real life” > in real life… a bunch of people sit in front of their computers > typing… typing … typing…

LambdaMOO, 1992 – a virtual chat space with virtual characters… … a rape in cyber space? But… can you be raped without a body? …wasn’t it all… “virtual”?.. it wasn’t “real”…

… but if it wasn’t real… if it didn’t “really” happen… if no one was harmed… … why did people react to it as a traumatic event? … couldn’t they just stop reading?

… just a bunch of people, typing away at their computers! … they could have just not read it… they could have just logged off… … their virtual community isn’t real! … because it’s all on a network with some text! … all it was was text!