Citation

Online Behavior, Offline Consequences, and Personnel Security

Abstract | Word Stems | Keywords | Association | Citation | Get this Document | Similar Titles



Abstract:

Statistics show that nearly 2 billion people worldwide used the internet in 2010, posting over 40 billion photos to Flickr and Facebook, 152 million blogs, and an average 35 hours of video to YouTube per minute (Royal Pingdom.com, 2011). Online gamers and virtual world participants log millions of hours per year in online social worlds, interacting with other participants from all over the world. Many individuals engage in behavior online that they would not engage in offline (e.g. simulated sexual activities, “flaming,” “trolling”) because of the presumed anonymity of online environments. Of particular government personnel security interest (e.g for a background investigation for access to classified information) is the potential for online behavior to manifest in one of three ways: spillover into real life behavior, engagement in cyber behavior of security concern (e.g. participating in foreign social networks), and participation in illicit activities (e.g. online prostitution). The purpose of this discussion is to better understand the potential security implications of cyber behaviors and the “spillover” effect. Additionally, the legal and security concerns related to participation in risky online behaviors and monitoring online behaviors will be considered.
Convention
Convention is an application service for managing large or small academic conferences, annual meetings, and other types of events!
Submission - Custom fields, multiple submission types, tracks, audio visual, multiple upload formats, automatic conversion to pdf.Review - Peer Review, Bulk reviewer assignment, bulk emails, ranking, z-score statistics, and multiple worksheets!
Reports - Many standard and custom reports generated while you wait. Print programs with participant indexes, event grids, and more!Scheduling - Flexible and convenient grid scheduling within rooms and buildings. Conflict checking and advanced filtering.
Communication - Bulk email tools to help your administrators send reminders and responses. Use form letters, a message center, and much more!Management - Search tools, duplicate people management, editing tools, submission transfers, many tools to manage a variety of conference management headaches!
Click here for more information.

Association:
Name: ASC Annual Meeting
URL:
http://www.asc41.com


Citation:
URL: http://citation.allacademic.com/meta/p523823_index.html
Direct Link:
HTML Code:

MLA Citation:

Smith, Samantha. "Online Behavior, Offline Consequences, and Personnel Security" Paper presented at the annual meeting of the ASC Annual Meeting, Washington Hilton, Washington, DC, <Not Available>. 2014-09-13 <http://citation.allacademic.com/meta/p523823_index.html>

APA Citation:

Smith, S. A. "Online Behavior, Offline Consequences, and Personnel Security" Paper presented at the annual meeting of the ASC Annual Meeting, Washington Hilton, Washington, DC <Not Available>. 2014-09-13 from http://citation.allacademic.com/meta/p523823_index.html

Publication Type: Roundtable Paper
Abstract: Statistics show that nearly 2 billion people worldwide used the internet in 2010, posting over 40 billion photos to Flickr and Facebook, 152 million blogs, and an average 35 hours of video to YouTube per minute (Royal Pingdom.com, 2011). Online gamers and virtual world participants log millions of hours per year in online social worlds, interacting with other participants from all over the world. Many individuals engage in behavior online that they would not engage in offline (e.g. simulated sexual activities, “flaming,” “trolling”) because of the presumed anonymity of online environments. Of particular government personnel security interest (e.g for a background investigation for access to classified information) is the potential for online behavior to manifest in one of three ways: spillover into real life behavior, engagement in cyber behavior of security concern (e.g. participating in foreign social networks), and participation in illicit activities (e.g. online prostitution). The purpose of this discussion is to better understand the potential security implications of cyber behaviors and the “spillover” effect. Additionally, the legal and security concerns related to participation in risky online behaviors and monitoring online behaviors will be considered.

Get this Document:

Find this citation or document at one or all of these locations below. The links below may have the citation or the entire document for free or you may purchase access to the document. Clicking on these links will change the site you're on and empty your shopping cart.

Associated Document Available Access Fee ASC Annual Meeting
Associated Document Available Access Fee All Academic Inc.


Similar Titles:
TE16 Teacher self-disclosure in online environments: Behaviors, boundaries, and consequences

Building Bridges Between Worlds: Understanding the Offline Consequences of Online Decisions

Developmental Pathways of Online and Offline Sexual Risk Behavior During Adolescence: A Dual Trajectory Approach


 
All Academic, Inc. is your premier source for research and conference management. Visit our website, www.allacademic.com, to see how we can help you today.