Sunday, January 26, 2020
Protecting Children from Harm in the Internet Age
Protecting Children from Harm in the Internet Age Yiliang, Yin Issues regarding childrenââ¬â¢s Internet safety remained an overarching concern for the society. But as a matter of fact, internet is already an irreplaceable part of daily life, especially for children (learning, gaming, and social networking). The Canadian government has introduced agreements to protect children. Nervertheless, some crimes are national basis. In addition, a lot of countries define ââ¬Ëchildrenââ¬â¢ differently, makes protecting children a harder work [Minujin et al. 2006]. Internet filtering technology has been conducted in most western countries as well as some developing countries. It is used to prevent Internet users from accessing materials that considered inappropriate or unsafe [Hamade, 2008]. Although parents and local institution are encouraged to use these software to protect their children and the community, but there is no guarantee that these software are 100% effective at regulating undesirable contents, they always likely to under- or over-block content. Therefore, besides using network level filtering, it is critical for parents, education- and government-related personnel to educate children about self-protection, risks and responsibility they may encounter while using the Internet. 1. INTRODUCTION Internet has become one of the most important media among the others. Common uses of internet among people including children are: Leaning Social-networking Entertaining The development of technology makes Internet usage more convenient. Children are now able to access internet from their cellphone, tablet and laptop instead of desktop computers. But this made supervision much more difficult than before [LoÃÅ'à pez, Arnao and Puente, 2012]. While the internet is overall a great educational place for children, there are also exist areas that are not appropriate for children. Without appropriate supervision, children are likely to get contacted by contents involving: violence, porn, hate speech, etc. Although there exist unsafe contents on the internet, but internet itself is a powerful tool. The internet gives parents and educators better opportunity to teach children according to their age and interest, giving children better way of learning while having fun. Parents, education- and government-related personnel should work together in order to build a safer environment for children. It is everyoneââ¬â¢s responsibility to build and maintain a healthy environment for children wherever they are, giving children a safe and nurturing childhood. 2. Children Internet Use Both the amount of children and their ability to use internet are increasing. Some parents claim they donââ¬â¢t know better than their child about the internet. According to a survey conducted by the pan-European survey published by the European Commission, children start to use the Internet at 7, and the age of internet user is decreasing, internet uses include: social-networking (89%), entertaining (84%) and schoolwork (80%) [Digital Agenda, 2010]. Therefore, building safe guideline and setting rules for childrenââ¬â¢s internet usage should start once they get contact with computer. An important role of enabling childrenââ¬â¢s safety online is to help them understand the concepts of safety and risks, so that they will be able to make better decisions in the future based on what they have known. Internet safety education is critical in protecting children from internet threats. Some people blocked childrenââ¬â¢s internet usage completely, claiming it as an evil thing, which will misguide the children. They should also keep in mind that internet use is one of the basic skills in daily life. In addition, children learn from their mistakes. Therefore, it is the goal to teach children the ââ¬â¢internet mannerââ¬â¢ and ââ¬Ëlook before you leapââ¬â¢. 3. Potential Risks According to research, children between ages of 8-15 are mostly likely to be afflicted by online threats. Some are risky to their safety and privacy; some may also resulted from children intentionally or unintentionally violates the law, such as torts which may lead to dangerous situations. Figure 1 shows the overview of common internet risks from Valcke et al. (2011): Fig. 1. Overview of internet Risks File-sharing is a useful technology that allows teachers to show useful information to the student and peers to share files with each other. But many file-sharing programs, like email, give children a way of accessing harmful contents. Example of such contents including: pornography, violence, hate, racism. According to research from Valkenburg and Soeters (2001), figure 2 shows data from childrenââ¬â¢s positive experience of using internet, and figure 3 shows negative experience. Fig. 2. Positive Impacts about childrenââ¬â¢s Internet Use Fig. 3. Negative Impacts about childrenââ¬â¢s Internet Use While children are searching movie clips, some sexually explicit files or sites advocate usage of alcohol, tobacco or illegal drugs may appear. In this case, some online filter or parent-control software can be used. The most common contact risks to think of is a child turn up missing or being hurt after meeting someone online. This always resulted by young children especially girls allured by criminals online. There are many ways internet users can lose their privacy, and leading themselves to danger. If children carelessly exposed family address, phone number, or name to a stranger, serious danger may occur to family members as well. Besides, nowadays there are a lot of companies collecting potential customersââ¬â¢ information as registering for contests or filling address for prize, children should also be aware of giving out information this way, causing mental and property damage. It is not only our privacy we need to consider. Parents should also be aware their children putting other peopleââ¬â¢s information (e.g. friend, other family members, etc.) online. Making jokes as claiming a missing child by putting a friendââ¬â¢s information online can cause a lot of trouble to the family and police. People get angry sometimes, same for children. A lot of people take internet as a way to vent the anger. Children will have higher chance to be exposed to hate speech and violent sentence when get involved. The best defense for children is to avoid getting into online arguments until they are mature enough to filter out bad information, control the anger and speak out their minds. The lack of uniform definition as what is appropriate for children or what is the definition of children are different in most countries based on their culture. Most developed countries take 18 years old as the boundary to differentiate adults from children. But people get marry early in some country so they arrive their adulthood much earlier. In this case, the lack of uniform online legislation may allow children to access inappropriate material from other countries. 4. Present Concerns and Solutions Along with the growth of childrenââ¬â¢s internet use, a large number of Web 2.0 applications like Facebook came out, which makes it now more critical to protect children from unsafe online environment. There are three aspects need to be worked with: government regulation, technologies, parents supervision. 4.1 Government Policies regarding Childrenââ¬â¢s Online Safety According to Liu (2006), Ontario police established the earliest investigation group about child pornography. The investigators realized shortly, child pornography exists not only in certain places, it became an issue of the world. Online investigation needs a lot of time, money and human resources, especially skilled investigators. So the local police station founded an Internet Safety Committee, formed by police representatives, governors from election, members from the local Education Committee, etc., and their goal is to provide the safest online environment as they can for children. To accomplish the goal, the committee established the following detailed rules: educate students about the importance of internet safety; teach the parents how to protect their children from internet risks. The committee worked with one school and added specific course about Internet Safety for students with different age. An insurance company donated a disk with video about Internet Risks to the committee made the education process ran smoother than before. According to the research before experiment, 62% of elementary students were using internet in the spare time, and 23.7% of the student have visited online chatting rooms. For students in grade 9 and grade 10, 88.6% of them have spent spare time online, 66.19% students have chatted online within the last 6 months. The most disturbing result is that there were 90.5% of students thought it is alright to meet people that they met online, and 22% had already met their net friend. The Federal Trade Commission (FTC) of United States had revised Childrenââ¬â¢s Online Privacy Protection Act (COPPA) on July 1, 2013. COPPA give US-parents greater control over their childrenââ¬â¢s privacy. It detailed what a website operator must follow, when and how to seek permission and verification from a parent to guardian, and what responsibility an operator has to protect childrenââ¬â¢s privacy and safety online, including restrictions on doing business with children under 13. 4.2 Internet Filtering Technology A lot of countries have chosen to establish national internet regulation with varying degrees of success, but sometimes will have unintended consequences. Number of countries who use filtering technologies to block the access of certain content has increased dramatically. Normally, the following threes filtering technologies are used to block the access of websites via network infrastructure: IP blocking, DNS filtering, and URL blocking using a proxy. Filters can also be implemented by using software on local computers, in other words, client-side filters. This type of filter can be managed by anyone with administrator-level privileges on the computer. It can be argued that net-work based filtering causes filtering errors: over-blocking and under-blocking. For example, when searching health-related information, some useful information may be filtered out by having same searching keywords with porn-related material. And most of the filtering software will prefer over-blocking instead of allowing any leaking information that their customers donââ¬â¢t want. As a result, over-blocking encourages users to bypass the filtering technology entirely. When new information is updated online, under-blocking may occur. The filtering software may fail to recognise the new information because it has not yet updated on the client side when blacklisting are used instead of whitelisting. With the rapid development of science and technology, people expect higher efficiency for their software. It has been reported that most inline filters (parent-control software) as well as online content filtering are slow when processing. According to AkbasÃÅ'à § (2008), content filtering can be accelerated by examining only web content. In this case, offline filtering and proxy works synergistic, so filtering process and data transfer works independently to accelerate the filtering process. Therefore, decision can be made by examining only part of the web content. While childrenââ¬â¢s internet use at school or home is usually supervised and filtered, many children are now able to access internet through other devices and in different locations with no supervision and internet filter. This means, children are likely to access inappropriate material on the internet. It is therefore, important to educate children how to behave online, and discuss issues that may encounter when accessing Internet. 4.3 Parents and Educatorsââ¬â¢ Action When the government trying to enact laws to protect children as complete as possible, parents and other community members in the society also have the responsibility to guide children, provide a safe and entertained online environment for them. Except using filtering technologies, parents and educators should teach children how to safeguard themselves, since the most effective way of preventing problems arising from internet use is to empower children. Guardians and educators can teach them about legal boundaries, moral and ethical norms regarding their culture. Empowering children can prevent them from being victims as well. It is undeniable that children adapt new technologies better than adults. This made a good relation with children much important, since young people usually will have a trusted relationship with peers or adults, so the influencers should be aware of the risks themselves and give reliable advices. In addition, parents, guardians, educators and trusted influencers should play an active role in teaching children about the risks they may face from sexually explicit materials online and how to avoid internet predators and scammers. Children should also be educated about being careful of sharing personal information on the internet. As children growing up day by day, parentsââ¬â¢ guardian role becomes challenging. While parents are being responsible for their childrenââ¬â¢s safety, they have to respect childrenââ¬â¢s rights to privacy themselves. Parents might give up at this them, but it is urgent to encourage parents to talk and discuss with children about their online activity. (what the parents can do are: communicate with children as much as they can; make sure the children understand the importance of not exposing private information to strangers; make sure they donââ¬â¢t meet net friend; if found anything that children did were not appropriate online, stop them, and educate them; put the computer at where you can see easily; use parents control software;) 5. Conclusions Internet control is not impossible. Along working with children in their families and schools, there are a lot of actions that government can do to build public awareness to help children be benefit from the internet in a safe environment. For example, involve all members in the society to build public awareness about internet safety; encourage law enforcement and the educational department to develop best practices in proving safe online environment and dealing with crimes. The internet renovates so rapidly that the government regulation and technologies might not keep up. More effective and durable measures are those close to children: family, school, and community, guiding children to make good decisions, so that they will grow to become the next generation of responsible and trusted influencers. REFERENCES http://refworks.scholarsportal.info.proxy.bib.uottawa.ca/refworks2/default.aspx?r=file::get_filefile_name=yyin051-RefList.htmlcontent_type=text/htmlfile_token=WWFvJ8ccM8n3WWpZKOfcZRsWMbn0Mo5vMb5yMoefNE90J8e0GApnVtW[ZhkcUCd[GtA1T8c4E. AkbasÃÅ'à §. 2008. Next Generation Filtering: Offline Filtering Enhanced Proxy Architecture for Web Content Filtering. In Computer and Information Sciences, 2008. ISCIS 08. 23rd International Symposium on. 1-4. DOI:http://dx.doi.org.proxy.bib.uottawa.ca/10.1109/ISCIS.2008.4717892 S. N. Hamade. 2008. Internet filtering and censorship. Information Technology: New Generations, 2008. ITNG 2008. Fifth International Conference on ( 2008) , 1081-1086. DOI:http://dx/doi.org/10.1109/ITNG.2008.50 Zhongwen Liu. 2006. On internet safety for canadian children. Journal of Liaoning Police Academy 39, 5 (September. 2006)DOI:http://dx/doi.org/1008-5378(2006)05-0049-02 E. M. LoÃÅ'à pez, R. N. M. Arnao, and S. M. Puente. 2012. Children and adolescent risk environment characterization to use information technologies and communications (ICT): Case merida, venezuela. Latin America Transactions, IEEE (Revista IEEE America Latina) 10, 3 ( 2012), 1791-1797. DOI:http://dx/doi.org/10.1109/TLA.2012.6222586 Alberto Minujin, Enrique Delamonica, Alejandra Davidziuk, and D. E. Gonzalez. 2006. The definition of child poverty: A discussion of concepts and measurements. Environment and Urbanization 18, 481 ( 2006)DOI:http://dx/doi.org/10.1177/0956247806069627 M. Valcke, B. De Wever, H. Van Keer, and T. Schellens. 2011. Long-term study of safe internet use of young children. Computers Education 57, 1 (August. 2011), 1292-1305. DOI:http://dx/doi.org/10.1016/j.compedu.2011.01.010. P. Valkenburg and K. Soeters. 2001. Childrens positive and negative experiences with the internet an exploratory survey. Communication Research 28, 5 (October. 2001), 652-675. DOI:http://dx/doi.org/10.1177/009365001028005004 Page 1 of 7
Friday, January 17, 2020
Cph Herbal Medicines
10 Herbal Medicine RA NO. 8423- Phil Institute of Traditional and Alternative Health Care (PITAHC) Mnemonic is BUBLY/SANTA B-AWANG (Hypertesion,Lowers Cholesterol, Toothache) U-LISIMANG BATO (PANCIT-PANCITAN) (Lowers uric acid, Rheumatism) B-AYABAS (Diarrhea, Wounds, Toothache) L-AGUNDI (Cough, Asthma, Fever) Y-ERBA BUENA (Muscle Pain, Athritis, Rheumatism, Cough, Headache) S- AMBONG (anti-Edema, Diuretic, Anti-Urolithiasis) A-MPLAYA (Diabetes, Mellitus) N-NIOG-NIOGAN (Paratism, Arcariasis, Anti-Helmintic) T-SANG GUBAT (Stomachache, Diarrhea) A-KAPULKO (Scabies, Anti-Fungal & Athletes Foot) Aromatic Medicinal PlantsContains volatile oil for treatment of fever, cough, colds, itchiness and gaspain. 1. Petals- (sampaguita, Rosal, jasmine) * Sore eyes, conjunctivitis, eye wash. 2. Leaves- (ex. Suha, Calamansi, Mangga) * Fever 3. Plant: a. Tanglad/Sale- Fever (whole plants) b. Damong Maria- Cough/Colds/Dysminorrhea (whole plant) c. Leaves of Mansanilya- Gaspain d. Camias- Fever e. Sibuyas - Ferver Astringent and bitter tasting Medicinal Plants * Tannin and pectin (decrease peristalsis) A-VOCADO LEAVES B-AYABAS LEAVES K-AIMITO LEAVES D-UHAT LEAVES S-AGING LEAVES S-ANTOL LEAVES M- ANGOSTEEN FRUIT K- ASUY (NUTS/LEAVES) T-SAANG GUBAT (MOUTH WASH)EFFECT: ANESTHETIC AND DEPRESSANT EFFECT TREATMENT/DS: SKIN Problems 1. Akapulko Leaves 2. Kalachuchi 3. Malungay 4. Kakawati 5. Makabuhay DEPRESANTS 1. Dapdap Leaves 2. Dita 3. Makahiya ACHES/PAINS 1. Damong Marya 2. Sambong ASCABIES/ANTI-CANCER DRUG/ DEPRESSANTS 1. Chichirica 2. Mabuhay IMPOTENCE/ERECTILE DISFUNCTION/DEPRESSANT/SLEEPING 1. MAKAHIYA BRONCHODILATOR 1. TALAMTUNAY PIGSA 1. MAYANA PLANT SEEDS- most of the time, anti-helmentic 1. Patola Seeds- ABORTION/ANTI HELMENTIC 2. IPIL-IPIL 3. BETEL NUT 4. SQUASH SEED 5. LANSONES- insect-repelant GRASS FAMILY- diuretic (edema,urinary problem,ihi-ihi) . Tubo 2. Tanglad 3. Pandan Lalaki FOR ASTHMAS 1. KAGON 2. PUGO-PUGO 3. BUTO-BUTONES 4. GATAS-GATAS RENAL STONE- bato sa bato 1. CORN HAIR (BUHOK NG MAIS) Natural Family Planning (kulang yung family planning ko, please hanap nalang po kayo sa iba ng additional. Thanks) Girls 1. Spacing # of Prenancy & Ideal Timing a. Barriers b. Hormones- IUD, Condoms (male/female) cervical cup, vanginal sponge, spermicites 2. Scientific Family Planning a. Natural Method A. 1 Cervical Mucus Method A. 2 Basal Body Temperature A. 3 Lactating Amenorrhea b. Standard Days Method 3. Tubal Ligation
Thursday, January 9, 2020
Why Churchill Lost the 1945 Election
In 1945 Britain, an event occurred which still causes shocked questions from around the world: how did Winston Churchill, the man who had led Britain to victory in the Second World War, get voted out of office at the moment of his greatest success, and by such an apparently large margin. To many it looks like Britain was supremely ungrateful, but push deeper and you find that Churchillââ¬â¢s total focus on the war allowed he, and his political party, to take their eyes off the mood of the British People, allowing their pre-war reputations to weigh them down. Churchill and the Wartime Consensus In 1940 Winston Churchill was appointed Prime Minister of a Britain who appeared to be losing the Second World War against Germany. Having been in and out of favor over a long career, having been ousted from one government in World War One only to return later to great effect, and as a long-standing critic of Hitler, he was an interesting choice. He created a coalition drawing on the three main parties of Britain ââ¬â Labour, Liberal, and Conservative ââ¬â and turned all his attention to fighting the war. As he masterfully kept the coalition together, kept the military together, kept international alliances between capitalist and communist together, so he rejected pursuing party politics, refusing to aggrandize his Conservative party with the successes he and Britain began to experience. For many modern viewers, it might seem that handling the war would merit re-election, but when the war was coming to a conclusion, and when Britain divided back into party politics for the el ection of 1945, Churchill found himself at a disadvantage as his grasp of what people wanted, or at least what to offer them, had not developed. Churchill had passed through several political parties in his career and had led the Conservatives in the early war in order to press his ideas for the war. Some fellow conservatives, this time of a far longer tenure, began to worry during the war that while Labour and other parties were still campaigning ââ¬â attacking the Tories for appeasement, unemployment, economic disarray ââ¬â Churchill was not doing the same for them, focusing instead on unity and victory. Churchill Misses Reform One area where the Labour party were having success campaigning during the war was reform. Welfare reforms and other social measures had been developing before World War 2, but in the early years of his government, Churchill had been induced into commissioning a report on how Britain could rebuild after it. The report had been chaired by William Beveridge and would take his name. Churchillà and others were surprised that the findings went beyond the rebuilding theyââ¬â¢d envisioned, and presented nothing less than a social and welfare revolution. But the hopes of Britain were growing as the war seemed to be turning, and there was vast support for Beveridgeââ¬â¢s report to be turned into a reality, a great new dawn. Social issues now dominated the part of British political life that was not taken up with the war, and Churchill and the Tories slipped back in the publicââ¬â¢s mind. Churchill, a one-time reformer, wished to avoid anything which might fracture the coalition and didnââ¬â¢t back the report as much as he might; he was also dismissive of Beveridge, the man, and his ideas. Churchill thus made it clear he was putting off the issue of social reform until after the elections, while Labour did as much as they could to demand it being put into practice sooner, and then promised it after the election. Labour became associated with the reforms, and the Tories were accused of being against them. In addition, Labourââ¬â¢s contribution to the coalition government had earned them respect: people who had doubted them before began to believe Labour could run a reforming administration. The Date Is Set, the Campaign Fought World War 2 in Europe was declared over on May 8th, 1945, the coalition ended on May 23rd, and the elections were set for July 5th, although there would have to be extra time to gather the votes of the troops. Labour began a powerful campaign aimed at reform and made sure to take their message to both those in Britain and those who had been forced abroad. Years later, soldiers reported being made aware of Labourââ¬â¢s goals, but not hearing anything from the Tories. In contrast, Churchillââ¬â¢s campaign seemed to be more about re-electing him, built around his personality and what heââ¬â¢d achieved in the war. For once, he got the thoughts of the British public every wrong: there was still the war in the East to finish, so Churchill seemed distracted by that. The electorate was more open to the promises of Labour and the changes of the future, not the paranoia about socialism that the Tories tried to spread; they werenââ¬â¢t open to the actions of a man who had won the war, but whose party had not been forgiven for the years before it, and a man who had never seemed ââ¬â up to now ââ¬â entirely comfortable with peace. When he compared a Labour-run Britain to the Nazis and claimed Labour would need a Gestapo, people were not impressed, and memories of the Conservative inter-war failures, and even of Lloyd Georgeââ¬â¢s failure to deliver post World War 1, were strong. Labour Win The results began coming in on July 25th and soon revealed Labour winning 393 seats, which gave them a dominant majority. Attlee was Prime Minister, they could carry out the reforms they wished, and Churchill seemed to have been defeated in a landslide, although the overall voting percentages were much closer. Labour won nearly twelve million votes, to nearly ten million Tory, and so the nation wasnââ¬â¢t quite as united in its mindset as it might appear. A war-weary Britain with one eye on the future had rejected a party which had been complacent and a man who had focused entirely on the nationââ¬â¢s good, to his own detriment.ââ¬â¹ However, Churchill had been rejected before, and he had one last comeback to make. He spent the next few years reinventing himself once more and was able to resume power as a peacetime Prime Minister in 1951.
Wednesday, January 1, 2020
What Is the Difference Between Molarity and Molality
Molarity and molality are both measures of the concentration of a chemical solution. Molarity is the ratio of moles to volume of the solution (mol/L) while molality is the ratio of moles to the mass of the solvent (mol/kg). Most of the time, it doesnt matter which unit of concentration you use. However, molality is preferred when a solution will undergo temperature changes because altering temperature affects volume (thus changing the concentration if molarity is used).ââ¬â¹ Molarity, also known as molar concentration, is the number of moles of a substance per liter of solution. Solutions labeled with the molar concentration are denoted with a capital M. A 1.0 M solution contains 1 mole of solute per liter of solution.ââ¬â¹ Molality is the number of moles of solute per kilogram of solvent. It is important the mass of solvent is used and not the mass of the solution. Solutions labeled with molal concentration are denoted with a lower case m. A 1.0 m solution contains 1 mole of solute per kilogram of solvent.ââ¬â¹ For aqueous solutions (solutions where water is the solvent) near room temperature, the difference between molar and molal solutions is negligible. This is because around room temperature, water has a density of 1 kg/L. This means the per L of molarity is equal to the per kg of molality. For a solvent like ethanol where the density is 0.789 kg/L, a 1 M solution would be 0.789 m. The important part of remembering the difference is: molarity - M ââ â moles per liter solutionmolality - m ââ â moles per kilogram solvent
Subscribe to:
Posts (Atom)