Citation

Online Behavior, Offline Consequences, and Personnel Security

Abstract | Word Stems | Keywords | Association | Citation | Similar Titles



Abstract:

Statistics show that nearly 2 billion people worldwide used the internet in 2010, posting over 40 billion photos to Flickr and Facebook, 152 million blogs, and an average 35 hours of video to YouTube per minute (Royal Pingdom.com, 2011). Online gamers and virtual world participants log millions of hours per year in online social worlds, interacting with other participants from all over the world. Many individuals engage in behavior online that they would not engage in offline (e.g. simulated sexual activities, “flaming,” “trolling”) because of the presumed anonymity of online environments. Of particular government personnel security interest (e.g for a background investigation for access to classified information) is the potential for online behavior to manifest in one of three ways: spillover into real life behavior, engagement in cyber behavior of security concern (e.g. participating in foreign social networks), and participation in illicit activities (e.g. online prostitution). The purpose of this discussion is to better understand the potential security implications of cyber behaviors and the “spillover” effect. Additionally, the legal and security concerns related to participation in risky online behaviors and monitoring online behaviors will be considered.
Convention
All Academic Convention can solve the abstract management needs for any association's annual meeting.
Submission - Custom fields, multiple submission types, tracks, audio visual, multiple upload formats, automatic conversion to pdf.Review - Peer Review, Bulk reviewer assignment, bulk emails, ranking, z-score statistics, and multiple worksheets!
Reports - Many standard and custom reports generated while you wait. Print programs with participant indexes, event grids, and more!Scheduling - Flexible and convenient grid scheduling within rooms and buildings. Conflict checking and advanced filtering.
Communication - Bulk email tools to help your administrators send reminders and responses. Use form letters, a message center, and much more!Management - Search tools, duplicate people management, editing tools, submission transfers, many tools to manage a variety of conference management headaches!
Click here for more information.

Association:
Name: ASC Annual Meeting
URL:
http://www.asc41.com


Citation:
URL: http://citation.allacademic.com/meta/p523823_index.html
Direct Link:
HTML Code:

MLA Citation:

Smith, Samantha. "Online Behavior, Offline Consequences, and Personnel Security" Paper presented at the annual meeting of the ASC Annual Meeting, Washington Hilton, Washington, DC, <Not Available>. 2014-11-25 <http://citation.allacademic.com/meta/p523823_index.html>

APA Citation:

Smith, S. A. "Online Behavior, Offline Consequences, and Personnel Security" Paper presented at the annual meeting of the ASC Annual Meeting, Washington Hilton, Washington, DC <Not Available>. 2014-11-25 from http://citation.allacademic.com/meta/p523823_index.html

Publication Type: Roundtable Paper
Abstract: Statistics show that nearly 2 billion people worldwide used the internet in 2010, posting over 40 billion photos to Flickr and Facebook, 152 million blogs, and an average 35 hours of video to YouTube per minute (Royal Pingdom.com, 2011). Online gamers and virtual world participants log millions of hours per year in online social worlds, interacting with other participants from all over the world. Many individuals engage in behavior online that they would not engage in offline (e.g. simulated sexual activities, “flaming,” “trolling”) because of the presumed anonymity of online environments. Of particular government personnel security interest (e.g for a background investigation for access to classified information) is the potential for online behavior to manifest in one of three ways: spillover into real life behavior, engagement in cyber behavior of security concern (e.g. participating in foreign social networks), and participation in illicit activities (e.g. online prostitution). The purpose of this discussion is to better understand the potential security implications of cyber behaviors and the “spillover” effect. Additionally, the legal and security concerns related to participation in risky online behaviors and monitoring online behaviors will be considered.


Similar Titles:
The Influence of Social Media on Political Behavior: Modeling Political Involvement via Online and Offline Activity

TE16 Teacher self-disclosure in online environments: Behaviors, boundaries, and consequences

Behavioral Consequences of Conflict-Oriented News Coverage: The 2009 Mammography Guideline Controversy and Online Search Trends


 
All Academic, Inc. is your premier source for research and conference management. Visit our website, www.allacademic.com, to see how we can help you today.