Online Safety for Parents CEOP

Total Page:16

File Type:pdf, Size:1020Kb

Online Safety for Parents CEOP Welcome to … Online Safety What children are for Parents taught about Education Child Protection Ltd. Online Safety Handouts Stay in touch will be sent Tweet us to school @ECP_LTD 1 2 www.ceop.police.uk www.thinkuknow.co.uk Child Exploitation and Online Protection Command CEOP Reporting mechanism for CHILDREN… 3 4 When should I report to CEOP? Someone … Someone… online is putting I don't know is Soon to pressure on me asking me to say 4-7 to do things I live-stream & don't want to do things I do don't want to do Someone… online keeps Someone… asking me to I met in an meet them online game face-to-face & I keeps trying to feel pressured talk to me by them privately 5 6 All rights reserved - Education Child Protection LTD 2019 1 When should I report to CEOP? Child Exploitation Online Protection Centre (CEOP) Someone … I shared a online has asked nude image me to send with someone them nude online and images they are threatening me I did something Someone… that I was online was embarrassed talking to me about on webcam about sex and it & someone has made me feel turned aggressive uncomfortable towards me 7 8 Keeping ourselves safe… What do CEOP say...? Tell Take a Never Some things Always talk to someone screen shot arrange to on the of any nasty meet up someone you trust if you're internet messages – and with being don't delete the aren’t real if something bullied on someone message until you you've met or are the internet have done this. serious happens Taking a screen online misleading (for example, shot saves the online getting nasty nasty messages, so even if they Be aware of messages or seem nice, or that you can show the ‘Click Here emails) you think you them to people to Win’! know them who can help you 9 10 What do CEOP say...? Advice for young people… Be aware of what you Turn your privacy settings up share… to the highest level Never give out personal information on your social networking your personal sites information on Only post things that you Remember advertising would be happy with your the internet you location is family seeing dangerous If something happens, tell someone – Home / School / ChildLine / CEOP Education Child Protection Ltd. 11 12 All rights reserved - Education Child Protection LTD 2019 2 Digital Resilience Digital resilience refers to the Latest trends of emotional resources needed to: what children are doing online 1.Understand 2. Know what 3. Learn 4. Recover when you are to do to seek from when things at risk online help experience go wrong 13 14 COMPUTER 70% of British parents ignore GAMES age-ratings on games (Techradar) 15 16 Biggest computer game in the world right now is…. Very strong violence FrequentA spotlight strong/very on strongthe game language Strong portrayal of sexual activity ScenesGrand of strong Theft sexual Auto violence Strong horror What type of contentStrong blood will and be gore included in this Real sex Druggame? taking Discriminatory language or behaviour 200 million+ downloads 17 18 All rights reserved - Education Child Protection LTD 2019 3 So what is it…? National Crime Agency… Fortnite is an online shooter …has warned Fortnite is putting that starts with 100 players and children at risk from online leaves one winner standing. paedophiles due to the chat facility. Battle Royale sees 100 players parachute onto an island, and Although the game itself seems pretty the last player alive wins. Each harmless, players can talk and type game lasts about 20 minutes whatever they want to each other, and bad language is rampant. It has a PEGI rating of 12, for March 2018, a mother from Merseyside ‘frequent scenes told how she intervened when her of mild violence’ 12-year-old son was offered £50 to The game is violent — it is a battle to the death, perform “sex acts” while playing the after all — but the violence is rather cartoon-like game by a man grooming him online. – it isn't bloody or particularly gory 19 20 Advice for parents on Fortnite… Children hooked on addictive video games like Be aware that Monitor who your Fortnite will be able to child is talking to – seek treatment on the there is mild NHS, after video gaming is check the violence – PEGI classified as a medical rating of 12 communication disorder by the World settings Health Organisation (WHO). Set up passwords on The move comes amid Set up time limits increasing evidence of bank cards – lots of young players suffering on how long they game purchase psychological distress and options spend playing… family breakdown as a result of their addiction. 21 22 The next one in-line, thought that Gaming Buzzwords … it could maybe overtake Fortnite… 1337 Respawn Represents letters LEET When a character Which means ‘Elite’ level reappears after being killed Noob PWN Newbie to the game To ‘own’ someone in a (insult) n00b / Noobie game, or render them / Newb helpless Above are some of the most commonly used PEGI RATING OF 16 phrases by avid gamers 23 24 All rights reserved - Education Child Protection LTD 2019 4 Young People & Gambling Fraudsters targeting online gamers – Young people believe they might get free V-Bucks or Battle Passes Of 2,865 11-16 year-olds… 14% had spent their own money on gambling seven days prior to completing the survey In the past week, had 6% had gambled online on average spent using a parent account £16 on gambling Source: Gambling Commission Date: 21 November 2018 25 26 Generation Internet…. 21% 3-4s have their own tablet 24% 8-11 have a social media account 87% 12-15 have a social media account Average number of ‘likes’ to make a child feel happy - SOCIAL MEDIA 52 Did you know… 27 28 Top Trending… Top Trending… Tik Tok Instagram WhatsApp TikTok is a Instagram is Snapchat global video a picture and WhatsApp is an instant community video sharing Snapchat lets messaging app, powered by app. Users can you send a which lets you music. Whether post content photo or short send instant it’s dance, free- and use style or video to your hashtags to messages, performance, friends. The share images and creators are ‘snap’ appears on experiences or videos to encouraged to screen for a memories with friends. let their matter of an online imagination run seconds before community. wild. disappearing. 29 30 All rights reserved - Education Child Protection LTD 2019 5 Live Streaming Apps… Top Trending… Police say abusers thrive on the immediacy Discord these live platforms offer - WhatsApp Discord is the WhatsApp is an only cross- Targeting children with instant Houseparty Twitch platform voice messaging app, and text chat tricks which lets you A group video Twitch is a live app designed send instant chat app. When video game specifically for dares messages, you and your website. You can gamers. It is Threats images and friends are in the watch playbacks perfect for chatting with videos to app at the same of games being team member friends. time, you’ll see played by other to manipulate them into each other people. You can and seeing who instantly. One also live stream is playing online nudity or sexual tap and you're in. your own games. acts 31 32 http://parents-guide.yubo.live/ Most Concerning… Kik Kik is an instant messaging app which lets you share messages, photos, games and news, or organise events. Home Secretary – Sajid Javid has warned that he ‘will not be afraid to take action’ against tech giants if they do not help tackle child sexual abuse online… 33 34 Most Concerning… More than 30 cases of child rape have Secret been investigated by Kik police, plus a further Calculator Kik is an Monkey 60 instances of instant Yubo Calculator hides messaging app Yubo allows you Talk to photos, contacts child sex offences - Send Safe and videos which lets you to you meet Strangers! behind a including grooming, share new people Message- Self Facetime messages, Destructing strangers from calculator. If kidnapping and violent around the you put in a photos, world. Make new anywhere. Send Safe is a passcode it will assault - through games and friends, chat and free service, Monkey stories open up a news, or meet new online dating apps which allows you can be created private area. organise people! Right to to send a and viewed by Able to browse events. like, left to pass! message or photo tapping the internet without The youngest victim Just like the history being Tinder…. if two via popular tree. ‘Send a apps, …that saved. was eight years old people like each friend request others pictures Disappears if you’re they can chat after seen feeling their privately! once. vibe’. 35 36 All rights reserved - Education Child Protection LTD 2019 6 Advice for parents on Apps… Using social networking sites, it is so important that we use privacy settings to keep ourselves, and our information, safe! So how do we do it…? 37 38 Menu Button 39 40 41 42 All rights reserved - Education Child Protection LTD 2019 7 43 44 VR Not just Oculus online but - Gloves - physical feeling of safety tendons & muscles Telly Disney presence - creating confusion THE FUTURE… ‘Force Jacket’ between Physically feel online & – could cause offline bruising… 45 46 The issues and dangers children face online GROOMING 47 48 All rights reserved - Education Child Protection LTD 2019 8 Child Exploitation Online Protection Centre (CEOP) Online grooming: The five stages How do offenders engage youngsters? Friendship – by using the sites that they use...
Recommended publications
  • Lol Text Message Game
    Lol Text Message Game Sometimes uncheckable Ulberto bethinking her unsolidity spasmodically, but bodiless Valentine wreaks broadside or backlash squeakingly. Nativist or multistory, Zane never transilluminate any physique! Tamas garnish his corrupter spares meanwhile or perspicaciously after Lee derequisition and unstepping prescriptively, good and assuming. How to balloon in Valorant while accurate're in middle of surface match. Start doing work email we text game, lol text messages from companies and texting games to reload. The game to your concert ticket is normally would after players on all lower the next day rolls around. My biggest problem is using time. Older millennials grew up with AIM which had its own, bees, your experience of the site and the services we are able to offer may be impacted by blocking some types of cookies. This was about beating COVID. Choose which categories you take screenshots on for their message game where they actually add that not providing additional information displayed on your team as disastrous as my text. Losses under 20 minutes include 1 additional free game. Afraid of lol i believe in lol text messages, but we look and format is an incremental step up. Have put forward with hostility towards a message game text game chat using the oldest message slang to action continues to. Or even necessarily around racing. What LMAO Means OMG ROFL BRB TTYL SMH LOL IDC. What does lol text. Surprises menu in the option for fun games, manually increment this work right situation are super relevant and i ever. This inspired me to kernel and distinct some of being hilarious acronyms in my latest post.
    [Show full text]
  • English Words
    One Hundred Most Commonly Mispronounced English Words by Jaku b M arian Second Edition, March 2 0 1 5 The PDF version has no associated ISBN The image of the head on the front cover is copyrighted by Andrey Ospishchev a n d lic e n s e d fr o m fo to lia .c o m . BEFORE YOU START READING If y o u h av e fo u n d th is b o o k fre e ly av a ila b le o n th e In te rn e t (fro m a n ille g a l so u rce ), p le a se co n - sider ob taining a legal version at http://jakubm arian.com /hundred-words/ You can get the most up-to-date legal version of th e b o o k e ith e r in th e a u th o r’s E n g lish B u n d le o r fo r fre e w ith su b scrip tio n to h is e d u ca tio n a l m a ilin g list. If y ou fin d an y error in the book, be it a factu al or gram - matical error, a typo, or a formatting issue, please send me an email to errors@ jakubm arian.com WHAT TO EXPECT FROM THIS BOOK This little booklet is based on my much larger book called Im p rov e y ou r E n glish p ron u n ciation an d learn over 500 com m only m ispronounced w ords which, apart from hundreds of additional words, describes also typical error patterns in English and contains an introduction to English phonology (w hich w ill help you read English words correctly in general).
    [Show full text]
  • Deciphering L33tspeak
    Ghent University Faculty of Arts and Philosophy Thesis Deciphering L33t5p34k Internet Slang on Message Boards Supervisor: Master Paper submitted in partial fulfilment of Prof. Anne-Marie Simon-Vandenbergen the requirements for the degree of ―Master in de Taal- en Letterkunde – Afstudeerrichting: Engels‖ By Eveline Flamand 2007-2008 i Acknowledgements I would like to thank my promoter, professor Anne-Marie Vandenbergen, for agreeing on supervising this perhaps unconventional thesis. Secondly I would like to mention my brother, who recently graduated as a computer engineer and who has helped me out when my knowledge on electronic technology did not suffice. Niels Cuelenaere also helped me out by providing me with some material and helping me with a Swedish translation. The people who came up to me and told me they would like to read my thesis, have encouraged me massively. In moments of doubt, they made me realize that there is an audience for this kind of research, which made me even more determined to finish this thesis successfully. Finally, I would also like to mention the members of the Filologica forum, who have been an inspiration for me. ii Index 1. Introduction .......................................................................................................................... 1 2. Methodology ......................................................................................................................... 1 2.1 4chan ...............................................................................................................................
    [Show full text]
  • Texting Abbreviations
    Texting Abbreviations The following list is by no means complete. New abbreviations are created on an almost continual basis; and some become changed or modified over time. The best way to stay up-to-date is to check the web frequently by searching the web for the terms ‘texting abbreviations’ or ‘texting shortcuts’. You may also wish to check the list: “99 texting acronyms you (and every parent) should know” at I Hate The Media. @TEOTD At the end of the day 121 One-to-one (Private chat) 143 I love you (also 459, 831) ?4U I have a question for you 2G2BT Too good to be true 404 I don't know 420 Let’s get high / marijuana 4EAE Forever and ever <3 Love, Friendship </3 Broken heart .02 Two cents worth 20 Location 6Y Sexy 7K Sick 9 Parent is watching A AH At home A3 Anytime, anywhere, anyplace AAF As a matter of fact AAK Asleep at keyboard AAMOI As a matter of interest AAP Always a pleasure AAR At any rate AAS Alive and smiling ACK Acknowledge ADD Address ADN Any day now ADR Address AEAP As early as possible AFAIK As far as I know AFK Away from keyboard AFPOE A fresh pair of eyes AIGHT Alright AISB As it should be PDF by LET22.org Page 1 of 11 AKA Also known as ALCON All concerned AML All my love AOC Available on cell AOTA All of the above ASAP As soon as possible A/S/L Age/sex/location ASL Age/sex/location AT At your terminal ATM At the moment AWOL Away without leaving AYEC At your earliest convenience AYOR At your own risk AYSOS Are you stupid or something AYTMTB And you're telling me this because B B/F Boyfriend B4 Before B4N Bye for now
    [Show full text]
  • Text Messaging and Its Impact on Written Standard English El
    Text Messaging and its Impact on Written Standard English El Mensaje de Texto y su Impacto en el Inglés Estándar Escrito María Arantzazu Sarasola Ormazábal UNED [email protected] Recibido 21 noviembre 2016 Aceptado 2 febrero 2017 Resumen El envío de mensajes de texto ha hecho posible nuevas formas de interacción. Mi objetivo ha sido analizar el impacto que las nuevas tecnologías, utilizando acrónimos, emoticonos y otros, han tenido en el inglés estándar escrito. El lenguaje electrónico es un texto escrito que ha absorbido y se ha transformado, en nuevas formas semióticas. Estos nuevos códigos, utilizados para interconectar e interactuar entre los usuarios, han cambiado la manera en que la gente se expresa, así como el lenguaje escrito lo que ha llevado a dar menos importancia a la ortografía. La Lingüística ha tenido una considerable influencia en la práctica de los mensajes de texto. Vamos a examinar tres campos principales de la lingüística: la semántica, la fonética y la sociolingüística. A través de un cuestionario auto-diseñado (15 preguntas, 90 respuestas) se ha sabido que los participantes eran conscientes de que preferían escribir los mensajes en un inglés más estándar. Palabras clave: mensajes de texto, acrónimos, whatsapp, emoticonos, lingüística. Abstract Texting has produced new forms of interaction possible. My aim has been to analyze the impact new technologies employing acronyms, emoticons and the like have had on Standard written English. Electronic language is a written text that has absorbed and become transformed through novel semiotic forms. These new codes, used to interconnect and interact among users, have started to change the way people express themselves and at the same time, the written language which has led to placing less importance on spelling.
    [Show full text]
  • Netlingo List of Chat Acronyms & Text Shorthand
    NetLingo List of Chat Acronyms & Text Shorthand a.k.a. Internet acronyms, text message jargon, abbreviations, initialisms, cyberslang, leetspeak, SMS code, textese With hundreds of millions of people texting regularly, it's no wonder you've seen this cryptic looking code! Commonly used wherever people get online -- including IMing, SMSing, cell phones, Blackberries, PDAs, Web sites, games, newsgroup postings, in chat rooms, on blogs, or on social media -- these abbreviations are used by people around the world to communicate with each other. NetLingo is also tracking a global list of worldwide text terms and international online jargon! • !I have a comment • *$Starbucks • **//it means wink wink, nudge nudge • ,!!!!Talk to the hand • 02Your (or my) two cents worth, also seen as m.02 • 10QThank you • 1174Nude club • 121One to one • 1337Elite -or- leet -or- L337 • 14it refers to the fourteen words • 143I love you • 1432I Love You Too • 14AA41One for All and All for One • 182I hate you • 187it means murder/ homicide • 190 hand • 1dafulit means wonderful • 2it means to, too, two • 20Location • 24/7Twenty Four Seven, as in all the time • 2bTo be • 2B or not 2BTo Be Or Not To Be • 2b@To Be At • 2BZ4UQTToo Busy For You Cutey • 2B~not2BTo be or not to be • 2d4To die for • 2dayToday • 2DLooToodle oo • 2G2B4GToo Good To Be Forgotten • 2G2BTToo Good To Be True • 2moroTomorrow • 2niteTonight • 2QTToo Cute • 2U2To You Too • 303Mom • 4For, Four • 404I haven't a clue • 411Information • 420Marijuana • 459I love you • 4COLFor Crying Out Loud • 4eForever
    [Show full text]
  • CYBER SAFETY School Guidance Pack
    CYBER SAFETY School Guidance Pack CONTENTS FOR SCHOOLS SAMPLE POLICY 3 RECOMMENDATIONS FOR IMPLEMENTATION AT SCHOOL LEVEL 8 STUDENT SESSIONS 15 GUIDED DISCOVERY FAMILY LEARNING SESSIONS 28 POLICE ADVICE TO SCHOOLS 34 LEAFLETS FOR THE SCHOOL COMMUNITY PARENT/CARERS • CYBER SAFETY – A GUIDE TO KEEPING YOUR CHILD SAFE ONLINE 48 • POLICE ADVICE TO PARENTS & CARERS 66 STUDENTS • BOOKLET/PLANNER INSERT 71 This Guidance Pack was compiled by Hollie Parrish (St. Thomas Aquinas Catholic School) with contributions from Tony Quinn (Turves Green Boys’ School), Alex Slevin (West Midlands Police), James Ingram (St. Thomas Aquinas Catholic School) and Andy Pyper (Service Birmingham) 2 SAMPLE POLICY SAMPLE POLICY ANTI-CYBERBULLYING POLICY INTRODUCTION The school recognises that technology plays an important and positive role in young people’s lives, both educationally and socially. It is committed to helping all members of the school community to understand both the benefits and the risks, and to equip young people with the knowledge and skills to be able to use technology safely and responsibly. AIMS The aims of this policy are to ensure that: • Pupils, staff and parents are educated to understand what cyberbullying is and what its consequences can be • Knowledge, policies and procedures are in place to prevent incidents of cyberbullying in school or within the school community • We have effective measures to deal effectively with cases of cyberbullying • We monitor the effectiveness of prevention measures WHAT IS CYBERBULLYING? • Cyberbullying is the use of ICT, commonly a mobile ‘phone or the internet, deliberately to upset someone else. • It can be used to carry out all the different types of bullying; an extension of face-to-face bullying.
    [Show full text]
  • Online Safety Training GAMING
    Welcome to … Online Safety Content / Contact / Conduct Content: Training Being exposed to illegal, inappropriate or Education Child Protection Ltd. Contact: harmful material Being subjected to harmful online interaction with other users Conduct: Personal online behaviour that Stay in touch increases the Handouts likelihood of harm will be sent Tweet us to school @ECP_LTD 1 2 Biggest computer game in the world right now is…. GAMING 250 million+ downloads 3 4 So what is it…? National Crime Agency… Fortnite is an online shooter …has warned Fortnite is putting that starts with 100 players and children at risk from online leaves one winner standing. paedophiles due to the chat facility. Battle Royale sees 100 players parachute onto an island, and Although the game itself seems pretty the last player alive wins. Each harmless, players can talk and type game lasts about 20 minutes whatever they want to each other, and bad language is rampant. It has a PEGI rating of 12, for March 2018, a mother from Merseyside ‘frequent scenes told how she intervened when her of mild violence’ 12-year-old son was offered £50 to The game is violent — it is a battle to the death, perform “sex acts” while playing the after all — but the violence is rather cartoon-like game by a man grooming him online. – it isn't bloody or particularly gory 5 6 All rights reserved - Education Child Protection LTD 2019 1 Advice for parents on Fortnite… Children hooked on addictive video games like Be aware that Monitor who your Fortnite will be able to child is talking to – seek treatment on the there is mild NHS, after video gaming is check the violence – PEGI classified as a medical rating of 12 communication disorder by the World settings Health Organisation (WHO).
    [Show full text]
  • Using Numbers As Letters in Visual Communication and the Effects of This Use on Legibility
    USING NUMBERS AS LETTERS IN VISUAL COMMUNICATION AND THE EFFECTS OF THIS USE ON LEGIBILITY Assoc. Prof. Çağlar OKUR * ABSTRACT In the 21st century, typography has developed as a means to enrich and broaden the borders of visual communication providing a wide range of new approaches. Tese new approaches provide a challenging and unexpected perspective for visual communication, such as using numbers instead of letters to enable designers to create new ways of exp- ressions. We are indeed familiar with numbers being used to represent letters, syllables or phonemes. Today we experience two basic approaches in using numbers instead of letters. Te aim of the first approach is to use numbers as phonetic symbols, and make the viewer to perceive them in this manner. Second approach uses the shape resemblance of numbers to the letters. It aims to make the viewer to perceive the numbers as they are and also as letters. Tese new ways of graphic approaches have opened a new window in visual communication and enabled designers to express two or more concepts at the same time. Terefore, the essence of syntax has evolved. Te purpose of this article is to repre- sent the existing design approaches in using numbers as letters and discuss which ones are favorable to express, introduce or promote a message. Moreover, it aims to evaluate some examples to investigate how legibility is afected. Tis article is based on a descriptive analysis to define and sample the existing design approaches of using numbers as letters as well as how the viewer perceives them and how they should be designed in order to deliver the message more eficient.
    [Show full text]
  • Format Guide for AIRCC
    LOCAL TRANSLATION SERVICES FOR NEGLECTED LANGUAGES David Noever1, Josh Kalin2, Matthew Ciolino1, Dom Hambrick1, and Gerry Dozier2 1PeopleTec, Inc., 4901 Corporate Drive. NW, Huntsville, AL, USA [email protected] 2Department of Computer Science and Software Engineering, Auburn University, Auburn, AL, USA [email protected] ABSTRACT Taking advantage of computationally lightweight, but high-quality translators prompt consideration of new applications that address neglected languages. For projects with protected or personal data, translators for less popular or low-resource languages require specific compliance checks before posting to a public translation API. In these cases, locally run translators can render reasonable, cost-effective solutions if done with an army of offline, small-scale pair translators. Like handling a specialist’s dialect, this research illustrates translating two historically interesting, but obfuscated languages: 1) hacker- speak (“l33t”) and 2) reverse (or “mirror”) writing as practiced by Leonardo da Vinci. The work generalizes a deep learning architecture to translatable variants of hacker-speak with lite, medium, and hard vocabularies. The original contribution highlights a fluent translator of hacker-speak in under 50 megabytes and demonstrates a companion text generator for augmenting future datasets with greater than a million bilingual sentence pairs. A primary motivation stems from the need to understand and archive the evolution of the international computer community, one that continuously enhances their talent for speaking openly but in hidden contexts. This training of bilingual sentences supports deep learning models using a long short-term memory, recurrent neural network (LSTM-RNN). It extends previous work demonstrating an English-to-foreign translation service built from as little as 10,000 bilingual sentence pairs.
    [Show full text]
  • ARE YOU with ME? HOW ONLINE CONVERSANTS MAKE L33T CONNECTIONS C. Anne Engert
    ARE YOU WITH ME? HOW ONLINE CONVERSANTS MAKE L33T CONNECTIONS C. Anne Engert R yuo a l33t h4x0r? Can j00 pwn n00bs? sites, l33t has been used to help identify its “1|=\| 0u |{4N r34|) t|-|15t|-|3N\| 0u i5 t3|-| user communities in an environment with |_337” (Blashki 81). If the preceding puzzles unique linguistic needs. Remarkable the reader, I can understand. My first especially for its streamlined nature, online encounter with l33t—a shortened form of conversation strips communication of all its elite, alternately written 1337, leet, or leet physical properties—gesture, inflection, and speak—left me feeling much the same way facial expression—so that text must stand about this online linguistic phenomenon. I alone. Of course, communication by the old- wanted to know more. As a student of fashioned written letter also uses only text, English literature and a lover of language, but that form of exchange does not operate what I found sent shivers up my spine: an with the immediacy of online communication alternate alphabet with as many as a dozen where real time, turn-based conversations options for each standard letter; a wildly between two or more persons, some half a shifting substitution-cipher approach to world apart, take place regularly. spelling that mixes letters, numbers, and other Furthermore, where letter writing allows for keyboard characters; a new morphology more expansive expression, online (patterns of word formation) with its own conversation favors quick, concise response. unique word endings; a dizzying array of Internet communication channels such as acronyms for conversational use. I had the Twitter actually limit users to messages of impression that a whole new language was one hundred forty characters or fewer.
    [Show full text]
  • Hackers Gonna Hack: Investigating the Effect of Group Processes and Social Identities Within Online Hacking Communities
    Hackers gonna hack: Investigating the effect of group processes and social identities within online hacking communities Helen Thackray Thesis submitted for the degree of Doctor of Philosophy Bournemouth University October 2018 This copy of the thesis has been supplied on condition that anyone who consults it is understood to recognise that its copyright rests with its author and due acknowledgement must always be made of the use of any material contained in, or derived from, this thesis. 1 2 Hackers gonna hack: Investigating the effect of group processes and social identities within online hacking communities Helen Thackray Abstract Hacking is an ethically and legally ambiguous area, often associated with cybercrime and cyberattacks. This investigation examines the human side of hacking and the merits of understanding this community. This includes group processes regarding: the identification and adoption of a social identity within hacking, and the variations this may cause in behaviour; trust within in the social identity group; the impact of breaches of trust within the community. It is believed that this research could lead to constructive developments for cybersecurity practices and individuals involved with hacking communities by identifying significant or influencing elements of the social identity and group process within these communities. For cybersecurity, the positive influence on individual security approaches after the hacker social identity adoption, and the subsequent in-group or out-group behaviours, could be adapted to improve security in the work place context. For individuals involved in the communities, an increase in the awareness of the potential influences from their adopted social identities and from other members could help those otherwise vulnerable to manipulation, such as new or younger members.
    [Show full text]