Hidden Works in a Project of Closing Digital Inequalities: a Qualitative Inquiry in a Remote School

Total Page:16

File Type:pdf, Size:1020Kb

Hidden Works in a Project of Closing Digital Inequalities: a Qualitative Inquiry in a Remote School HIDDEN WORKS IN A PROJECT OF CLOSING DIGITAL INEQUALITIES: A QUALITATIVE INQUIRY IN A REMOTE SCHOOL BY KEN-ZEN CHEN DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Secondary and Continuing Education in the Graduate College of the University of Illinois at Urbana-Champaign, 2012 Urbana, Illinois Doctoral Committee: Professor Margery Osborne, Chair Professor Nicholas C. Burbules Professor Mark Dressman Adjunct Assistant Professor George Reese ABSTRACT This study investigated students’ experiences and teachers' hidden works when initiating an instructional technology project that aimed to reduce digital inequality in a remote aboriginal school in a developed Asian country. The chosen research site was a small school classified as “extremely remote” by the Ministry of Education in Taiwan. I intended to understand teachers’ hidden works through qualitative case study and participant research when attempting to bridge the existing digital divide at the school. The proposed main research questions were: What hidden work did teachers need to accomplish when implementing a technology reform? How did students and teachers experience the changes after learning and living with the XO laptops? How and in what way could a bridging-digital-divide project like OLPC live and survive in remote schools? A qualitative case study design was used in this investigation. Data were collected between June 2011 and Jan. 2012 and included classroom video/audio-taping, photos taken by students and myself, interviews, field notes, artifacts, documents, logs, and journals. ii The findings indicated that remote school children had experienced barriers to access technology not only because of socioeconomic inequalities but also because of the ineffectiveness of policy tools that argued to close the divides. Deploying XO laptops in the school was an intelligent choice to bridge children’s digital inequalities; however, a complete support system was necessary for this to be truly effective. Otherwise, teachers needed to devote extra effort, the “hidden works,” in every dimension to cover the system’s insufficiency to make the project work. Students’ learning experiences were exciting during my fieldwork. Students showed engagement when learning with XOs and technical devices. The XOs became part of children’s lives in the schools and at home. Students also expressed progress in learning. However, due to conflicts in the school, the effectiveness was constrained and only a few teachers showed interest in teaching with the XOs. By reflecting and analyzing my fieldwork within the literature, I connected technology diffusion and social and cultural capital from a theoretical perspective into my discussion. Treating the “closing-divide” endeavor as a kind of technological diffusion, the change agents are the key actors that make the new technology accessible and acceptable. The required actions that the change agents are expected to accomplished are iii similar to the hidden works that I demonstrated during the field study. In terms of social capital, my field study was not only an attempt to teach with the XO laptops, but also revealed a process that connected possible social relationships to transmit social capital to remote school children. My study suggests a collaborative action to close the digital divide in the field is necessary. For further studies, teamed researchers and long-term investigations are encouraged to advocate for the mission of bridging the digital divide. iv To My Beloved v ACKNOWLEDGEMENTS It is a great pleasure to give respect to those kind people around me who made this dissertation possible. I would like to express the deepest appreciation to my dissertation advisor, Dr. Margery Osborne, a sincere mentor, colleague, and friend. Her guidance has made this study a thoughtful and rewarding journey. I would like also to thank my dissertation committee of Drs. Nicholas Burbules, Mark Dressman, and George Reese, for their support over the past years as I moved from an idea to a completed study. My committee members convincingly conveyed a spirit of adventure and reflection in regard to educational research and scholarship. In a similar vein, I’d like to recognize Drs. Sharon Tettegah, Liora Bresler, Ian Westbury, Brendesha Tynes, Bertram (Chip) Bruce, Martin Wolske, William (Bill) Cope, and Richard Herman, for the contributions that each of them made to my intellectual growth step-by-step during my years of study at the University of Illinois. Additionally, one of the most interesting and instructive interactions I enjoyed was with the faculty and vi students in Graduate School of Library and Information Sciences. In GSLIS, I found my calling as an educational researcher and instructional technologist. I share the credit of my work with children, teachers, and parents in my field location. Even though I could not disclose them because of research ethics, I am very grateful to all these individuals for their support of my research. My sincere thanks also go to Hao Chen. My fieldwork would not have been possible without his helps. Financial support was provided by the two-year study abroad scholarship of Ministry of Education (Taiwan), graduate assistantship of College of Education Online for four years, and a predoctoral fellowship by the Graduate College supported my doctoral study in the U.S. I consider it an honor to work with excellent Education Online colleagues: Adam Fein, Scott Wennerdahl, Hui-Lien Hsiao, Laura English, Eun Jee Kim, Sun Joo Yoo, and Seung Won Hong. It has also been a pleasure to study with wonderful group of peers in the College of Education. Yun-Hsuan Chen, Chang-Hua Cheng, Yen-Fang Cheng, Tangwee Teo, Chia-Chun Chang--your suggestions, comments, and criticisms have been so helpful. To Pei-Hsiu Tan, I’ve always appreciated your joyful spirit and this spirit provided the boost that made my long Ph.D. journey enjoyable. No words can express how grateful vii I am for your cheering and support. I am indebted to I-Chen Wang, who encouraged me along the difficult road to the statistics master’s program. Special thanks are due to Yu-Ling Huang, for her sympathetic understanding and listening throughout the process. I would like to thank Chi-Ting Su, for keeping patience on my odd murmuring as a picky Virgo. It would have been a lonely journey without lovely friends like them in the Taiwanese (Women) Studies Group for the six years. I owe my deepest gratitude to Taiwanese friends: Min-Feng Hsieh, Mei-Hui Lin, Wei-Feng Tsai, Chui-Wen Lin, Hui-Wen Liu, Ya-Ting Hsu, and Chinese friends: Ying-Shueh Cheng, Ming Fang, Yun-Yan Zhang, Yang Yu, Yong-Fei Yi, at The Ohio State University. Your kindness and persistent assistance both made up for the times when I was not available and saved me as a disqualified husband. Most importantly, I’d be remiss if I didn’t acknowledge the innumerable sacrifices made by my wife, Hsiao-Feng Tsai, in shouldering far more than her fair share of the parenting to our daughter, Amber, and household burdens in Taiwan while I pursue this final degree. My parents, my father-in-law, and mother-in-law have given me their unequivocal support throughout, as always, for which my mere expression of thanks likewise does not suffice. viii Any attempt to list the people and opportunities with which my life has been richly blessed would be like trying to count the stars in the universe. Without them, this thesis would have remained a dream. ix TABLE OF CONTENTS Chapter 1: Introduction ....................................................................................................... 1 Chapter 2: Literature Review .............................................................................................. 9 Chapter 3: The Context ..................................................................................................... 91 Chapter 4: Methodology and Methods ............................................................................119 Chapter 5: Participating in the School ............................................................................ 137 Chapter 6: Teaching and Learning with and without the XOs ........................................ 214 Chapter 7: Discussion and Conclusions .......................................................................... 289 References ....................................................................................................................... 325 Appendix A: Letter of IRB Approval.............................................................................. 342 Appendix B: Permission to Enter the Research Site ....................................................... 343 Appendix C: Interview Protocol ..................................................................................... 344 Appendix D: Consent Forms .......................................................................................... 346 x Chapter 1: Introduction 1.1 Significance of Research Nowadays computer technologies are embedded into our daily lives and ubiquitous computing can no longer be resisted by schools (Lei, Conway, & Zhao, 2008). This digital age has created a new and younger generation called “digital natives, who are more technologically literate and more comfortable than the “digital immigrants”--the adults who may feel difficulties catching up with technical advancements as if learning a new language after growing up (Prensky, 2001). Such a phenomenon reverses the typical situations of learning
Recommended publications
  • Android Firefox Remove Recommendations by Pocket
    Android Firefox Remove Recommendations By Pocket Ramiform Win usually overate some deoxyribose or hepatising divergently. Biannual Mikel pulp nor'-west or conglobating suppositionally when Percy is unofficial. Is Washington always stenotropic and dimensional when mantle some ventilation very seventhly and reflectively? Google Mail Checker is extension for chrome to know the status of the number of unread messages in Google Mail inbox. If you choose to upgrade, Pocket will create a permanent copy of everything in your library. University of North Carolina shuts down athletic programs through Thursday. This is particularly surprising since it was Firefox that made browser extensions mainstream. Not all VPNs have an extension for Firefox though, and some of them work differently. When I launched App Center, it just brought up a small Live Update screen, then listed a BIOS update, so I clicked that, it installed, and restarted. When you open a new tab, Pocket recommends a list of articles based on the most popular items saved that day. The next command should remove two directories. While the Safari browser does come standard on all Apple devices able to connect to the internet, an update might be needed every once in awhile. Instead, it basically learns as you use it. When it easy and remove firefox recommendations by pocket considers to emulate various changes. Then, click Save to save your changes. And the respect is just as prevalent as the accolades and ability. Change the mode from Novice to Advanced. Vysor puts your Android on your desktop. It can download and organize files, torrents and video in fast mode.
    [Show full text]
  • Administering Hue Date Published: 2019-08-10 Date Modified: 2021-03-19
    Cloudera Runtime 7.1.6 Administering Hue Date published: 2019-08-10 Date modified: 2021-03-19 https://docs.cloudera.com/ Legal Notice © Cloudera Inc. 2021. All rights reserved. The documentation is and contains Cloudera proprietary information protected by copyright and other intellectual property rights. No license under copyright or any other intellectual property right is granted herein. Copyright information for Cloudera software may be found within the documentation accompanying each component in a particular release. Cloudera software includes software from various open source or other third party projects, and may be released under the Apache Software License 2.0 (“ASLv2”), the Affero General Public License version 3 (AGPLv3), or other license terms. Other software included may be released under the terms of alternative open source licenses. Please review the license and notice files accompanying the software for additional licensing information. Please visit the Cloudera software product page for more information on Cloudera software. For more information on Cloudera support services, please visit either the Support or Sales page. Feel free to contact us directly to discuss your specific needs. Cloudera reserves the right to change any products at any time, and without notice. Cloudera assumes no responsibility nor liability arising from the use of products, except as expressly agreed to in writing by Cloudera. Cloudera, Cloudera Altus, HUE, Impala, Cloudera Impala, and other Cloudera marks are registered or unregistered trademarks in the United States and other countries. All other trademarks are the property of their respective owners. Disclaimer: EXCEPT AS EXPRESSLY PROVIDED IN A WRITTEN AGREEMENT WITH CLOUDERA, CLOUDERA DOES NOT MAKE NOR GIVE ANY REPRESENTATION, WARRANTY, NOR COVENANT OF ANY KIND, WHETHER EXPRESS OR IMPLIED, IN CONNECTION WITH CLOUDERA TECHNOLOGY OR RELATED SUPPORT PROVIDED IN CONNECTION THEREWITH.
    [Show full text]
  • Linux Sound Subsystem Documentation Release 4.13.0-Rc4+
    Linux Sound Subsystem Documentation Release 4.13.0-rc4+ The kernel development community Sep 05, 2017 CONTENTS 1 ALSA Kernel API Documentation 1 1.1 The ALSA Driver API ............................................ 1 1.2 Writing an ALSA Driver ........................................... 89 2 Designs and Implementations 145 2.1 Standard ALSA Control Names ...................................... 145 2.2 ALSA PCM channel-mapping API ..................................... 147 2.3 ALSA Compress-Offload API ........................................ 149 2.4 ALSA PCM Timestamping ......................................... 152 2.5 ALSA Jack Controls ............................................. 155 2.6 Tracepoints in ALSA ............................................ 156 2.7 Proc Files of ALSA Drivers ......................................... 158 2.8 Notes on Power-Saving Mode ....................................... 161 2.9 Notes on Kernel OSS-Emulation ..................................... 161 2.10 OSS Sequencer Emulation on ALSA ................................... 165 3 ALSA SoC Layer 171 3.1 ALSA SoC Layer Overview ......................................... 171 3.2 ASoC Codec Class Driver ......................................... 172 3.3 ASoC Digital Audio Interface (DAI) .................................... 174 3.4 Dynamic Audio Power Management for Portable Devices ...................... 175 3.5 ASoC Platform Driver ............................................ 180 3.6 ASoC Machine Driver ............................................ 181 3.7 Audio Pops
    [Show full text]
  • Private Browsing
    Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, and Lorrie Faith Cranor, Carnegie Mellon University https://www.usenix.org/conference/soups2018/presentation/habib-prying This paper is included in the Proceedings of the Fourteenth Symposium on Usable Privacy and Security. August 12–14, 2018 • Baltimore, MD, USA ISBN 978-1-939133-10-6 Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor Carnegie Mellon University {htq, jcolnago, vidyag, spearman, thomasjm, acquisti, nicolasc, lorrie}@andrew.cmu.edu ABSTRACT Prior user studies have examined different aspects of private Previous research has suggested that people use the private browsing, including contexts for using private browsing [4, browsing mode of their web browsers to conduct privacy- 10, 16, 28, 41], general misconceptions of how private brows- sensitive activities online, but have misconceptions about ing technically functions and the protections it offers [10,16], how it works and are likely to overestimate the protections and usability issues with private browsing interfaces [41,44]. it provides. To better understand how private browsing is A major limitation of much prior work is that it is based used and whether users are at risk, we analyzed browsing on self-reported survey data, which may not always be reli- data collected from over 450 participants of the Security able.
    [Show full text]
  • Investigating Choices of Appropriate Devices for One-To-One Computing Initiatives in Schools Worldwide
    International Journal of Information and Education Technology, Vol. 6, No. 10, October 2016 Investigating Choices of Appropriate Devices for One-to-One Computing Initiatives in Schools Worldwide M. Sirajul Islam and Annika Andersson schools should be governed by “creating an environment in Abstract—The use of technology in schools is rapidly which the child will become highly involved in experience of increasing – today most notably through the one-to-one (1:1) a kind to provide rich soil for the growth in intuitions and programs that are being implemented all around the world. concepts for dealing with thinking, learning, playing, and so Considering how new technologies are emerging fast and obsoleting others in schools, there is a need to continuously on” [5]. In this direction, one of the first practical initiatives monitor and understand the features of various devices in terms on implementing constructionist learning for children with of embedded technology and interaction with users. This paper computers was the development of programming language therefore presents the nature of computing devices used in 1:1 called „Logo‟ in 1967. Following such initiatives, Alan C. computing programs in schools around the world, including Kay, who was closely associated with Papert for promoting investigating the benefits and drawbacks, by means of a and implementing computer based educational constructivism, systematic literature review and a survey conducted in some schools in Sweden. The paper also presents findings based on developed a laptop computer for children in 1970 based on how the various uses of technology affect cooperation practices the sketches of the KiddiComp called „Daynabook‟ as well as personal exploration.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Vulpes Vulpes) Evolved Throughout History?
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Environmental Studies Undergraduate Student Theses Environmental Studies Program 2020 TO WHAT EXTENT HAS THE RELATIONSHIP BETWEEN HUMANS AND RED FOXES (VULPES VULPES) EVOLVED THROUGHOUT HISTORY? Abigail Misfeldt University of Nebraska-Lincoln Follow this and additional works at: https://digitalcommons.unl.edu/envstudtheses Part of the Environmental Education Commons, Natural Resources and Conservation Commons, and the Sustainability Commons Disclaimer: The following thesis was produced in the Environmental Studies Program as a student senior capstone project. Misfeldt, Abigail, "TO WHAT EXTENT HAS THE RELATIONSHIP BETWEEN HUMANS AND RED FOXES (VULPES VULPES) EVOLVED THROUGHOUT HISTORY?" (2020). Environmental Studies Undergraduate Student Theses. 283. https://digitalcommons.unl.edu/envstudtheses/283 This Article is brought to you for free and open access by the Environmental Studies Program at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in Environmental Studies Undergraduate Student Theses by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. TO WHAT EXTENT HAS THE RELATIONSHIP BETWEEN HUMANS AND RED FOXES (VULPES VULPES) EVOLVED THROUGHOUT HISTORY? By Abigail Misfeldt A THESIS Presented to the Faculty of The University of Nebraska-Lincoln In Partial Fulfillment of Requirements For the Degree of Bachelor of Science Major: Environmental Studies Under the Supervision of Dr. David Gosselin Lincoln, Nebraska November 2020 Abstract Red foxes are one of the few creatures able to adapt to living alongside humans as we have evolved. All humans and wildlife have some id of relationship, be it a friendly one or one of mutual hatred, or simply a neutral one. Through a systematic research review of legends, books, and journal articles, I mapped how humans and foxes have evolved together.
    [Show full text]
  • Download Window Empty Firefox
    Download window empty firefox When ever I do a download, the small window appears with no information. Displaying downloads from tools also gives a blank screen. When i try downloadind somthing with firefox. the download window appears. but stays empty.. like if nothing happens empty window. My Download Window in Firefox 14 is blank. I have tried Try to reset the ion pref on the about:config page. But now when I download I see an empty download window. Any way If Help > About Firefox shows Firefox , you may need to clear the. When I click on a link for a popup window, the windows are always blank! I even turned of blocking (which has never been an issue in all the. Say I downloaded a file via "file save as". I get download window while file is downloading but then it goes blank as soon as download. Firefox may repeatedly open new, empty tabs or windows after you click on a link, types, see Change what Firefox does when you click on or download a file. On laptop, cannot make download window stop saving download history; . if you delete the entries in the classic download manager window. By mistake I recently changed a Firefox download setting that now makes all files I try to download as blank web pages. When the window. The download panel window does not ever display anymore, when Firefox manages downloads in the Downloads folder in the Library (History > . All I now see is "show all downloads", which opens the white/empty box. I'm new to FireFox (version ).
    [Show full text]
  • Non Basta Avere Un Computer Potente, L'ultimo Modello Di Tablet O
    Non basta avere un computer potente, l’ultimo modello di tablet o il sistema operativo più aggiornato; 100 per sfruttarli al massimo servono anche applicazioni, servizi e utility capaci di semplificare e velocizzare le operazioni quotidiane. 78 PC Professionale / Settembre 2017 078-117_Art_Freeware_318.indd 78 30/08/17 12:04 100FREE WARE APP E SERVIZI GRATUITI ● Di Dario Orlandi 078-117_Art_Freeware_318.indd 79 30/08/17 12:04 PROVE / FREEWARE / IL TEMPO IN CUI I SISTEMI OPERATIVI SI DAVANO BATTAGLIA SUL FRONTE DELLE FUNZIONI INTEGRATE È ORMAI PASSATO: PERFINO I DISPOSITIVI MOBILE LASCIANO ORMAI ALL’UTENTE LA FACOLTÀ DI SCEGLIERE GLI STRUMENTI E LE APPLICAZIONI PREFERITE, SCEGLIENDOLE TRA QUELLE DISPONIBILI, ANCHE GRATUITAMENTE, NEI RELATIVI STORE. MA PER TROVARE GLI STRUMENTI MIGLIORI BISOGNA CONOSCER- LI, PROVARLI E CONFRONTARLI. ED È PROPRIO QUELLO CHE ABBIAMO FATTO PER PREPARARE QUESTO ARTICOLO: ABBIAMO INSTALLATO E TESTATO MOLTE DECINE DI APPLICAZIONI, UTILITY E SERVIZI, ALLA RICERCA DELLE SOLUZIONI MIGLIORI PER SODDISFARE LE ESIGENZE DELLA FETTA DI UTENTI PIÙ AMPIA POSSIBILE. ABBIAMO CONCENTRATO L’ATTENZIONE SOLO SUI SOFTWARE GRATUITI, PER PROPORRE UNA COLLEZIONE COMPLETA CHE NON INCIDA SUL PORTAFOGLIO. La diffusione dei sistemi opera- un forte ritardo nei confronti di Lo Store che Microsoft di Windows sono ancora in gran tivi mobile ha reso evidente uno tutti gli altri sistemi operativi: le parte abbandonati a loro stessi: dei difetti storici di Windows: distribuzioni Linux offrono da ha creato per le devono individuare, selezionare l’assenza di un sistema di distri- decenni funzioni dedicate alla ge- applicazioni Windows si e installare i programmi senza buzione e aggiornamento auto- stione dei pacchetti, affiancate in sta lentamente popolando, alcun aiuto da parte del sistema matico per i software di terze seguito da interfacce di gestione operativo.
    [Show full text]
  • Anti-Mapa De Privacidade
    Anti-mapa de privacidade Feito para você não ser rastreado Organização: Bárbara Simão e Rafael Zanatta Pesquisa e produção de textos: Bárbara Simão, Juliana Oms, Livia Torres e Rafael Zanatta Revisão: Rafael Zanatta Revisão de texto: Bárbara Prado Simão Design: Talita Patricio Martins Realização Supervisão: Carla Yue e Teresa Liporace Coordenação executiva: Elici Bueno Idec - Instituto Brasileiro de Defesa do Consumidor Rua Desembargador Guimarães, 21 - Água Branca CEP 05002-050 - São Paulo-SP Telefone: 11 3874-2150 [email protected] www.idec.org.br Por que um anti-mapa? Há quem diga que dados O mercado de dados funciona Esta situação gera sérias pessoais são o “petróleo assim: empresas desenvolvem consequências para o modo da era digital”. Enquanto modelos para prever nossos como vivemos e nossa isolados, não representam comportamentos, identificar democracia. Por isso, a muita coisa nem possuem nossas preferências e nos aprovação da Lei Geral tanto valor, mas quando influenciar com propagandas de Dados Pessoais foi tão integrados e analisados em especialmente direcionadas importante: nossos dados conjunto revelam perfis de para nós, pois sabem deixarão de ser objetos consumo, de crédito, hábitos aquilo que nos sensibiliza a passíveis de extração, pois recorrentes e até padrões de partir de nosso padrão de são parte de nós e de quem personalidade. comportamento - situação somos. Ao prever princípios muitas vezes despercebida. éticos e direitos básicos aos Estes perfis que criam de nós cidadãos, a lei nos devolve podem até gerar discriminação o controle sobre todas as com preços diferenciados, por informações que produzimos exemplo, a partir do local onde - é como o Código de Defesa realizamos a compra ou da do Consumidor para as novas renda obtida.
    [Show full text]
  • General Characteristics of Android Browsers with Focus on Security and Privacy Features
    BÁNKI KÖZLEMÉNYEK 3. ÉVFOLYAM 1. SZÁM General characteristics of Android browsers with focus on security and privacy features Petar Čisar*, Sanja Maravic Cisar**, Igor Fürstner*** Academy of Criminalistic and Police Studies, Belgrade, Serbia, **Subotica Tech, Subotica, Serbia, ***Óbuda University, Bánki Donát Faculty of Mechanical and Safety Engineering, Budapest, Hungary, [email protected], [email protected], [email protected] • Incognito browsing mode - offers real private Abstract —Satisfactory level of security in the use of the browsing experience without leaving any historical Internet in mobile devices depends on several factors. One of data. them is safe browsing. A key factor in providing secure • Using of HTTPS protocol - enforces SSL (Secure browsing is the application of a browser with the appropriate Socket Layer) security protocol (using of certificates) methods applied: clearing cookies, cache and history, ability wherever that’s possible. of incognito browsing, using of whitelists and encryptions and others. This paper presents an overview of the various • Disabling features like JavaScript, DOM (Document security and privacy features used in the most frequently Object Model) storage used Android browsers. Also, in the case of several browsers • Using fingerprinting techniques and types of mobile devices, the use of benchmark tests is Further sections of this paper provide an overview of the shown. Bearing in mind the differences, when choosing a applied security and privacy methods for more popular browser, special attention should be paid to the applied Android browsers. Also, in order to compare the adequate security and privacy features. features of browsers, the use of benchmark tests on different mobile devices will be shown.
    [Show full text]
  • Discontinued Browsers List
    Discontinued Browsers List Look back into history at the fallen windows of yesteryear. Welcome to the dead pool. We include both officially discontinued, as well as those that have not updated. If you are interested in browsers that still work, try our big browser list. All links open in new windows. 1. Abaco (discontinued) http://lab-fgb.com/abaco 2. Acoo (last updated 2009) http://www.acoobrowser.com 3. Amaya (discontinued 2013) https://www.w3.org/Amaya 4. AOL Explorer (discontinued 2006) https://www.aol.com 5. AMosaic (discontinued in 2006) No website 6. Arachne (last updated 2013) http://www.glennmcc.org 7. Arena (discontinued in 1998) https://www.w3.org/Arena 8. Ariadna (discontinued in 1998) http://www.ariadna.ru 9. Arora (discontinued in 2011) https://github.com/Arora/arora 10. AWeb (last updated 2001) http://www.amitrix.com/aweb.html 11. Baidu (discontinued 2019) https://liulanqi.baidu.com 12. Beamrise (last updated 2014) http://www.sien.com 13. Beonex Communicator (discontinued in 2004) https://www.beonex.com 14. BlackHawk (last updated 2015) http://www.netgate.sk/blackhawk 15. Bolt (discontinued 2011) No website 16. Browse3d (last updated 2005) http://www.browse3d.com 17. Browzar (last updated 2013) http://www.browzar.com 18. Camino (discontinued in 2013) http://caminobrowser.org 19. Classilla (last updated 2014) https://www.floodgap.com/software/classilla 20. CometBird (discontinued 2015) http://www.cometbird.com 21. Conkeror (last updated 2016) http://conkeror.org 22. Crazy Browser (last updated 2013) No website 23. Deepnet Explorer (discontinued in 2006) http://www.deepnetexplorer.com 24. Enigma (last updated 2012) No website 25.
    [Show full text]