Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Communication Technology and New Media

PDF

Series

2009

Security

Articles 1 - 2 of 2

Full-Text Articles in Social and Behavioral Sciences

Review Of Existing Australian And International Cyber-Safety Research, Julian J. Dooley, Donna Cross, Lydia Hearn, Robyn Treyvaud Jan 2009

Review Of Existing Australian And International Cyber-Safety Research, Julian J. Dooley, Donna Cross, Lydia Hearn, Robyn Treyvaud

Research outputs pre 2011

Information and communication technologies have permeated almost all areas of society and become an important component of daily functioning for most Australians. This is particularly true for Internet and mobile phone technology. The majority of Australian households (67% in 2007 – 2008) have access to the Internet and over 11 million Australians use the Internet as an integral part of their personal, social and occupational activities. By mid-2008, there were over 22 million active mobile phones being used in Australia, which equates to more than one phone for every citizen. There are many benefits associated with Internet and mobile phone …


Cookie Monsters: Seeing Young People’S Hacking As Creative Practice, Gregory T. Donovan, Cindi Katz Jan 2009

Cookie Monsters: Seeing Young People’S Hacking As Creative Practice, Gregory T. Donovan, Cindi Katz

Publications and Research

This paper examines the benefits and obstacles to young people’s open-ended and unrestricted access to technological environments. While children and youth are frequently seen as threatened or threatening in this realm, their playful engagements suggest that they are self-possessed social actors, able to negotiate most of its challenges effectively. Whether it is proprietary software, the business practices of some technology providers, or the separation of play, work, and learning in most classrooms, the spatial-temporality of young people’s access to and use of technology is often configured to restrict their freedom of choice and behavior. We focus on these issues through …