Ekxtbdrxxfphilosopenf

Total Page:16

File Type:pdf, Size:1020Kb

Ekxtbdrxxfphilosopenf Virtually Invisible: At-Risk Boys and their Concepts of Self as Beings-in-the-Online-World by Jordan Tinney B. Ed, University of Victoria, 1994 M. Ed., University of Victoria, 1996 A Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of EKXTBDRXXFPHILOSOPEnf in the Department of Curriculum and Instruction We accept this dissertation as conforming to the required standard Dr. L. K. paxter. Supervisor, /Department of Curriculum and Instruction) Dr. T. Riecken, Department Member, (Department of Curriculum and Instruction) ncis ent Member, (Department of Curriculum and Instruction) ember, (Department of Curriculum and Instruction) Riley, Extdmal Examiner, (Ontario Institute for Studies in Education) © Jordan Tinney, 2002 University of Victoria All rights reserved. This dissertation may not be reproduced, in whole or in part, by photocopying or other means with the permission of the author. Supervisor: Dr. L. R. Baxter ABSTRACT As communications technologies flourish, increasing numbers of students are spending inordinate amounts of time in online communities. Often, students who spend excess time online are boys who are experiencing difficulty in school. For many of these boys, their participation in virtual worlds and their use of computers has shown them to be successful learners. However, for a variety of reasons, these boys continue to be disengaged in school and seriously at-risk for failure. This study explores the lives of at-risk boys who spend several hours a day in online worlds. The researcher is a long time participant in virtual worlds and through interviews examines the notions of self in online communities and how these at-risk boys navigate between their lives on and offline. The students’ participation in online forums may provide helpful insights into who they are and how we can best meet their needs in our schools. In addition to an examination of the social formation of self in online worlds, this study mounts a critique of the promotion of an internet “culture” or “community,” In the text- based world of Internet Relay Chat (IRC), many of the foundations of what, constitutes a culture may be absent and researchers may be too quick in accepting such forums as true communities. Exam in^: , Dr. L.R. Baxter, Supervisor, (Department of Curriculum and Instruction) DrrT. Riecken, Department Member, (Department of Curriculum and Instruction) ncis-Pelt t Member, (Department of Curriculum and Instruction) er, (Department of Curriculum and Instruction) al Examiner, (Ontario Institute for Studies in Education) Ill TABLE OF CONTENTS PREFACE............... V N o t e s t o t h e R e a d e r ...............................................................................................................................................................v P e r s o n a l B a c k g r o u n d .........................................................................................................................................................v i CHAPTER 1: CONTEXT, PROBLEM STATEMENT, JUSTIFICATION AND SIGNIFICANCE... 1 C o n t e x t ............................................................................................................................................................................................1 P r o b l e m St a t e m e n t ..................................................................................................................................................................3 J ustification o f S t u d y ............................................................................................................................................................3 The Impact of Modem Technologies..................................................................................................................3 The Disboys: Disillusioned, Disconnected, and Disengaged........................................................................ 4 Technology and the Disboys............................................................................................................................... 6 Physical Worlds - Virtual Worlds: Multiple Identities...................................................................................8 Observations in School......................................................................................................................................................... 9 S ignificance OF THE S t u d y ..................................................................................................................................................12 CHAPTER 2: LITERATURE REVIEW ............»............................».............................................. 16 T h e N a t u r e o f Se l f : C e n t e r e d , D e c e n t e r e d , a n d D is t r ib u t e d ....................................................................16 T h e o r e t ic a l P erspectives o f Se l f ..................................................................................................................................19 Sociological Perspectives of Self..................................................................................................................... 20 Sociological and Philosophical Perspectives of.............................................................................................. Self 22 Discursive Construction of the .................................................................................................................Self 24 Oneself as Another -from Text to Action....................................................................................................................25 Historical, Temporal, Cultural and Moral Considerations of............................................................ Self 28 Decentered and Distributed Self...................................................................................................................... 30 A P l u r a l it y o f L if e -w o r l d s ; A C o h e r e n t L en s f o r t h e S e l f ....................................................................... 32 CHAPTER 3: METHODOLOGY...................................................................».................................... 40 M ethodological Implications ........................................................................................................................................40 T h e H e r m e n e u t ic C ir c l e a n d V ir t u a l C h a l l e n g e s .............................................................................................41 Interpreting t h e h u m a n E x p e r ie n c e ........................................................................................................................... 44 T r u t h a n d E n g a g e m e n t w it h o u r L if e -W o r l d s .................................................................................................... 47 G u id in g P r in c ip l e s f o r V a l id it y ....................................................................................................................................49 M e t h o d o l o g y a s P r o c e s s - O v e r c o m in g C h a l l e n g e s in V ir t u a l W o r l d s ..........................................51 Anonymity and Consent.....................................................................................................................................51 Developing Themes for Living Online.............................................................................................................53 T h e C u l t u r e o f V ir t u a l W o r l d s ...................................................................................................................................55 In t e r v ie w T e c h n iq u e s ...........................................................................................................................................................57 E x t r a c t in g N a r r a t iv e s f r o m In t e r n e t R e l a y C h a t .........................................................................................58 E x t r a c t in g I d e n t it ie s T h r o u g h Interactions ....................................................................................................... 59 B e in g -In -T h e -V ir t u a l -W o r l d : A H e r m e n e u t ic A p p r o a c h ..............................................................................60 CHAPTER 4: FINDINGS ............................................................... 61 V ir t u a l C o m m u n it ie s a n d IR C a s a C ity o n l in e ................................................................................................... 61 Definition of Terms............................................................................................................................................. 62 Internet Relay Chat (IRC): Introduction to a City of............................................................................ Bits 64 Explorations of a Virtual Environment............................................................................................................66 Participant Viewpoints on Virtual Culture..................................................................................................................77 D a r r e n - In t e r v ie w w it h o n e o f t h e D is b o y s .........................................................................................................82 O bservations in S c h o o l s ..................................................................................................................................................
Recommended publications
  • Users As Co-Designers of Software-Based Media: the Co-Construction of Internet Relay Chat
    Users as Co-Designers of Software-Based Media: The Co-Construction of Internet Relay Chat Guillaume Latzko-Toth Université Laval AbsTrAcT While it has become commonplace to present users as co-creators or “produsers” of digital media, their participation is generally considered in terms of content production. The case of Internet Relay Chat (IRC) shows that users can be fully involved in the design process, a co-construction in the sense of Science and Technology Studies (STS): a collective, simultaneous, and mutual construction of actors and artifacts. A case study of the early de - velopment of two IRC networks sheds light on that process and shows that “ordinary users” managed to invite themselves as co-designers of the socio-technical device. The article con - cludes by suggesting that IRC openness to user agency is not an intrinsic property of software- based media and has more to do with its architecture and governance structure. Keywords Digital media; Communication technology; Co-construction; Design process; Ordinary user résumé Il est devenu banal de présenter l’usager comme cocréateur ou « produtilisateur » des médias numériques, mais sa participation est généralement envisagée comme une production de contenus. Le cas d’IRC (Internet Relay Chat) montre que les usagers des médias à support logiciel peuvent s’engager pleinement dans le processus de conception, une co-construction au sens des Science and Technology Studies : une construction collective, simultanée et mutuelle des acteurs et des artefacts. Une étude de cas portant sur le développement de deux réseaux IRC éclaire ce processus et montre que les « usagers ordinaires » sont parvenus à s’inviter comme co-concepteurs du dispositif.
    [Show full text]
  • Internet Evidence Finder Report
    Patrick Leahy Center for Digital Investigation (LCDI) Internet Evidence Finder Report Written and Researched by Nick Murray 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu July 2013 IEF Report 6/28/2013 Page 1 of 33 Patrick Leahy Center for Digital Investigation (LCDI) Disclaimer: This document contains information based on research that has been gathered by employee(s) of The Senator Patrick Leahy Center for Digital Investigation (LCDI). The data contained in this project is submitted voluntarily and is unaudited. Every effort has been made by LCDI to assure the accuracy and reliability of the data contained in this report. However, LCDI nor any of our employees make no representation, warranty or guarantee in connection with this report and hereby expressly disclaims any liability or responsibility for loss or damage resulting from use of this data. Information in this report can be downloaded and redistributed by any person or persons. Any redistribution must maintain the LCDI logo and any references from this report must be properly annotated. Contents Introduction ............................................................................................................................................................. 5 Prior Work: .......................................................................................................................................................... 7 Purpose and Scope: ............................................................................................................................................
    [Show full text]
  • Os^Ar M Iadison Fans Ha^ Ive Their * Chance Woma Long W Saves Fr An's
    _ .-G o o d mmorning.. l b s t fft s t r ft l ) k e T oday’s forecast1s t : • ccum Mostly cloudy withith a cliancc of show- 1TBe Associated Press ers and thundcrshdwciw ers. W e st w iiid s 10 A ssessm enisnt of 37th to 15 mpli. Highs ne;irear 65 degrees. Lows NEW YORK— Richardd NixonN died I'ri- p r e s i d ea n n l t - A S -^0 -to 45-dcgrceK.-^— _ day,-fouT-days-atlw-i;ufrcrin{ring-a-Ktroko-that- ----------------- “ ^ ~ N i x o t r b i b gjraphy f c - AS P a g o A 2 hhad left him m 11 deep comu,lu, IH e w a s 8 1 , ------------------------ Thc former president dieilied al 7:08 p.m. MDT nt New York HeHospital, said at the Richard M. Nixolixon I’residcntial Li- snokeswomiin Mvma Manncimcrs. "His family ___________ ' brary and Birthplace in \Yorba Linda, Calif. was wilh' him," she said. --------A-privMly intcrin.,-nt ;vilwill follow .at .tlifc- li._______ Reporters gathered outsidiside the Mnnhat- bniry near thc grave ofhisof I wife. Tat. who Young E arth DaO a y w o r k e r s titan hospital learned thc nenews about IK- f c - . died last year. A ninchcr includedi;d ichildren in his rc- hhours after his death in a'a two-sentence m NixDn was broughtI to thc hospiial after habilitiition work crc':rew on over-grazed nnew.'i release. Soon aflpr llie news .was an- s u ffe r in g th e s tr o k e NltiNlonday nighl at his liind bordering n sj^ring■ing.
    [Show full text]
  • Introduction to Online Sexual Exploitation Curriculum 1 Safe Online Outreach Project Learning Objectives
    Introduction To Online Sexual Exploitation: Curriculum February 2003 Safe OnLine Outreach Project © M. Horton 2003 Safe OnLine Outreach Project Acknowledgements This document is the result of many hours of hard work and dedication. I'd like to thank Renata Karrys, Jaynne Aster, Nikki O'Halloran, Charlaine Avery, Lisa Ingvallsen and Elizabeth Nethery for their support and assistance in producing this document. Additionally the SOLO Advisory Committee, the Canadian National Crime Prevention - Community Mobilization Program, the Vancouver Foundation, Athabasca University/MediaCan and Parents Against Sexual Abuse have all been instrumental in turning this idea into a Project. Lastly, David and Conor have been silent contributors to this project since it began. Their support is woven into each page. Merlyn Horton SOLO Project Coordinator February 2003 Safe OnLine Outreach Project February 3, 2003 Introduction to the Curriculum Dear Reader, The curriculum you hold in your hands was produced in a former pottery studio in the middle of a coastal rain forest in British Columbia, Canada; the physical launch pad for this examination of a virtual issue. It is the result of three years of research. This introduction is intended to outline a context for the curriculum and to give you an overview of how to use this curriculum, who should present this curriculum and how appropriate audiences might be chosen. Context The philosophical foundation for this curriculum, and indeed for the Safe OnLine Outreach Project, is the United Nations Convention on the Rights of the Child (CRC)1. The CRC is one of four Conventions created by the United Nations to further the goal of recognizing the inherent dignity and rights of all members of the human family2.
    [Show full text]
  • Sample Chapter
    5674ch01.qxd_jt 9/24/03 8:44 AM Page 1 11 TheThe OnlineOnline WorldWorld 5674ch01.qxd_jt 9/24/03 8:44 AM Page 2 Today’s online world has changed dramatically in the last decade. Back then, online to the average user meant a telephone connection directly to either another computer or to an online service, such as CompuServe or AOL. The Internet now dominates all online activity. In popular parlance, the Internet is synonymous with the World Wide Web, although it is much more, as we’ll explain in this book. The Internet can be described generally as a “network” of networks. It is a transportation vehicle for applications. In fact, the visual representations of the Net look like a road map. If lines are drawn between each connection, between larger and larger connections, and between smaller and smaller ones, the end result is a web of connections—a virtual road map. This book is divided into four rough sections. The first is for beginners. It is to get anyone up to speed quickly with the information needed about the Web. Each chapter has recommended Web sites (to type the address, or Uniform Resource Locator [URL] into your Web browser) to help direct you. The second section has more detailed information about downloads, email, secu- rity, and information on virus protection. The third part is about how to create a Web site, Web tools, blogging, and what you can add to your Web site (such as streaming media, RSS feeds, and XML, among other things). The fourth part is by far the densest.
    [Show full text]
  • Exinda Applications List
    Application List Exinda ExOS Version 6.4 © 2014 Exinda Networks, Inc. 2 Copyright © 2014 Exinda Networks, Inc. All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. Document Built on Tuesday, October 14, 2014 at 5:10 PM Documentation conventions n bold - Interface element such as buttons or menus. For example: Select the Enable checkbox. n italics - Reference to other documents. For example: Refer to the Exinda Application List. n > - Separates navigation elements. For example: Select File > Save. n monospace text - Command line text. n <variable> - Command line arguments. n [x] - An optional CLI keyword or argument. n {x} - A required CLI element. n | - Separates choices within an optional or required element. © 2014 Exinda Networks, Inc.
    [Show full text]
  • DMK BO2K8.Pdf
    Black Ops 2008: It’s The End Of The Cache As We Know It Or: “64K Should Be Good Enough For Anyone” Dan Kaminsky Director of Penetration Testing IOActive, Inc. copyright IOActive, Inc. 2006, all rights reserved. Introduction • Hi! I’m Dan Kaminsky – This is my 9th talk here at Black Hat – I look for interesting design elements – new ways to manipulate old systems, old ways to manipulate new systems – Career thus far spent in Fortune 500 • Consulting now – I found a really bad bug a while ago. • You might have heard about it. • There was a rather coordinated patching effort. • I went out on a very shaky limb, to try to keep the details quiet – Asked people not to publicly speculate » Totally unreasonable request » Had to try. – Said they’d be congratulated here Thanks to the community • First finder: Pieter de Boer – Michael Gersten – 51 hours later – Mike Christian • Best Paper • Left the lists – Bernard Mueller, sec- – Paul Schmehl consult.com – Troy XYZ – Five days later, but had full – Others info/repro • Thanks • Interesting thinking (got close, – Jen Grannick (she contacted kept off lists) me) – Andre Ludwig – DNSStuff (they taught me – Nicholas Weaver LDNS, and reimplemented – “Max”/@skst (got really really my code better) close) – Everyone else (people know – Zeev Rabinovich who they are, and know I owe them a beer). Obviously thanks to the Summit Members • Paul Vixie • People have really been • David Dagon incredible with this. – Georgia Tech – thanks for • What did we accomplish? the net/compute nodes • Florian Weimer • Wouter Wijngaards • Andreas Gustaffon • Microsoft • Nominum • OpenDNS • ISC • Neustar • CERT There are numbers and are there are numbers • 120,000,000 – The number of users protected by Nominum’s carrier patching operation – They’re not the Internet’s most popular server! • That’s BIND, and we saw LOTS of BIND patching – They’re not the only server that got lots of updates • Microsoft’s Automatic Updates swept through lots and lots of users • Do not underestimate MSDNS behind the firewall.
    [Show full text]
  • Covert Channels Within IRC Wayne C
    Air Force Institute of Technology AFIT Scholar Theses and Dissertations Student Graduate Works 3-11-2011 Covert Channels Within IRC Wayne C. Henry Follow this and additional works at: https://scholar.afit.edu/etd Part of the Computer and Systems Architecture Commons, and the Digital Communications and Networking Commons Recommended Citation Henry, Wayne C., "Covert Channels Within IRC" (2011). Theses and Dissertations. 1394. https://scholar.afit.edu/etd/1394 This Thesis is brought to you for free and open access by the Student Graduate Works at AFIT Scholar. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of AFIT Scholar. For more information, please contact [email protected]. 88th ABW PUBLIC AFFAIRS SECURITY AND POLICY REVIEW WORKSHEET NOTE: Public release clearance is NOT required for material presented in a closed meeting and which will not be made available to the general public, on the Internet, in print or electronic media. I~;; ;~e;;~~~J JI. 1. SUBMITTER NAME OFFICE SYMBOL IPHONE 2. DATE SUBMITIED [email protected] AFITIENG 53636 3. AUTHOR(S) NAME ORGANIZATION PHONE Wayne C. Henry 53636 4. DOCUMENT TITLE 6. CONFERENCE/EVENT/PUBLICATION NAME 7. DATE NEEDED Covert Channels Within IRC N/A 5. DOCUMENT TYPE N/A D ABSTRACT D TECH REPORT D JOURNAL ARTICLE D VIDEO 8. EVENT lOCATION 9. EVENT DATE D SPEECH D TECH PAPER D BRIEFING CHARTS D PHOTO N/A ~ THESISIDISSERTATION D OTHER N/A 10. RELATED CASES PREVIOUSLY APPROVED 11. OTHER AGENCY COORDINATION REQUIRED 12. OTHER INFORMATION (List contact information) 13. NATIONAL SECURITY STATUTESITECHNOLOGY ISSUES 14.
    [Show full text]
  • IRC Internet Relay Chat
    IRC Internet Relay Chat Finlandia, 1988,l'idea di IRC prende ispirazione dai primi software quali “MUT” e “Talk”. Da un idea di uno studente finlandese, questa innovazione pian piano si sviluppò in una rete IRC universitaria che permetteva agli studenti di tutte le università del paese di comunicare tramite i loro terminali Unix. Quando divenne disponibile la connessione Internet tra più stati la rete IRC Finlandese si espanse fino a raggiungere alcuni server Statunitensi dando vita poco tempo dopo alla prima rete IRC Internazionale tutt'oggi esistente: Eris Free Net (EfNet). Ben presto, nel giro di poco tempo si ebbe un boom delle reti IRC Nazionali ed Internazionali, con una conseguente crescita esponenziale del numero di utenti nel mondo, tanto da far diventare IRC il sistema di Chat più diffuso. In italia fece la prima comparsa intorno al 1995. L'idea di IRC fu progettato come un sistema di chat "grezzo", dove non ci fosse alcun controllo sulle attività degli utenti. La mancanza di moderazione fu la causa principale della nascita e il conseguente sviluppo del fenomeno dell'IRCWar, che consiste nell'utilizzare tecniche più o meno lecite che vanno dall'attacco della macchina dell'utente fino al disturbo/attacco della stessa chatrom con lo scopo dell'impossersarsene. L'indirizzo principale per collegarsi alla rete di solito è irc.xxx.xxx, quest'ultimo punta a rotazione su tutti i server principali per bilanciarne il carico a favore della stabilità e affidabilità della connessione. DISCLAIMER: Questa guida è stata scritta senza nessun fine di lucro. Questo documento è stato scritto prendendo spunto e informazioni da vari siti internet.
    [Show full text]
  • Irc Protocol Used in Any Connection
    Irc Protocol Used In Any Connection Unstoppable Gilbert kedges excessively. Salaried Myke elevates tactually and protectively, she distributed her wite crumpled unhappily. Sometimes peptic Warde ochred her deflagration confidingly, but instinctual Cass suburbanise swith or reinforce delusively. However irc protocol in connection that place, groups or fatal error for a given server After connecting to an IRC network you can bend a channel you reside to join marked. Irc protocol mediation robots, useful in close conjunction with a fairly harmless hacking techniques for connecting to connected to be known as a server on either. Once you testify to the channel, it describes some not the basic commands that IRC users need or know is join channels, use this command. How do faculty connect to IRC? This is called a channel takeover. Which is arbitrary but interesting. IRC clients by subclassing the ephemeral protocol class, an odd delimiter, I have a lot of good people watching it for me. These differences in exactly, be blocking my client connection in the united states network led to connect to aid in processing. Most IRC clients also triple the ability to share files. APIs to connect directly to IRC servers without needing a proxy. The irc in any useful, used in the same as well as message that connects you want also report. To switch the display to a different server or channel, channel mode settings and the topic. Infact, typically a nick. Other channel modes may light the delivery of the message or time the message to be modified before delivery, delimited by spaces.
    [Show full text]
  • Mediawiki Presentation
    An Introduction to MediaWiki Niharika Kohli Disambiguation! Table of contents • MediaWiki Architecture Overview • Getting started with MediaWiki Development • Phabricator • Git & Gerrit • Mediawiki - Vagrant • Good to know stuff • IRC • API • Extensions • GSoC and Outreachy MediaWiki Architecture Overview Gadgets Database Core MediaWiki User Scripts MySQL software Skins PostgreSQL PHP SQLite Extensions Database for Wikipedia CC BY SA. Credits to Krinkle (Timo Tijhof) Table of contents • MediaWiki Architecture Overview • Getting started with MediaWiki Development • Phabricator • Git & Gerrit • Mediawiki - Vagrant • Good to know stuff • IRC • API • Extensions • GSoC and Outreachy Where is the code? • All code is hosted on Gerrit (which we will become friends with in a bit) • The code is mirrored over to GitHub: wikimedia/mediawiki Table of contents • MediaWiki Architecture Overview • Getting started with MediaWiki Development • Phabricator • Git & Gerrit • Mediawiki - Vagrant • Good to know stuff • IRC • API • Extensions • GSoC and Outreachy Phabricator • MediaWiki’s bug reporting & tracking system • Replaced Bugzilla last year • Possibly a future Code-review system Table of contents • MediaWiki Architecture Overview • Getting started with MediaWiki Development • Phabricator • Git & Gerrit • Mediawiki - Vagrant • Good to know stuff • IRC • API • Extensions • GSoC and Outreachy What is Git? • Git is, in a nutshell, a Versioning Control System (VCS). • You have probably seen Git at work before - in Google Docs. • Git stores comprehensive revision history. • Git stores who made which changes and when. • Online code repository hosting services like GitHub and BitBucket use Git. What is Gerrit? • Gerrit • Software developers in a team can review each other's modifications on their source code using a Web browser and approve or reject those changes.
    [Show full text]
  • Talk, Type, and Text: Conversation on the Internet
    Talk, Type, and Text: Conversation on the Internet Jon Camfield TC660H Plan II Honors Program The University of Texas at Austin April 26, 1999 Joel F. Sherzer Anthropology Supervising Professor Heidi Johnson Linguistics Second Reader i Abstract Author: Jon Camfield Title: Talk, Type, and Text: Conversation on the Internet Supervising Professor: Dr. Joel Sherzer Second Reader: Heidi Johnson On the eve of Y2K, the extent that computers are interwoven with our lives is painfully obvious, yet only relatively recently has the academic eye taken interest in the events going on on-line. Despite this attention, there still remain new frontiers that have not been explored on the Internet. The phenomenon of real-time interaction is the best example of these. Some commentaries have treated the social aspects of MUDs, a special subspecies of real-time interaction, but more pure textual conversations have not been examined closely. This paper seeks to remedy this. I will, by necesity, place my investigations into the frame of the Internet at large, and discuss websites, e-mail and newsgroups. I will focus, however, on data from real-time interactions which use text as their only channel of communication. i Table of Contents ABSTRACT.................................................................................................................................................................. i TABLE OF CONTENTS...........................................................................................................................................
    [Show full text]