Today's schedule is A-AG-B-C-D
A Block Social Studies 11 - Today we'll begin our look at the steps to world war two and Canada's response.
We'll review your work on the rise of dictators and then we'll examine German
aggression in terms of European politics. Next we'll look at isolation and
appeasement along with Canada's declaration of war. I'll show you some archival
footage from Germany and then you'll need to work on questions 2, 3, and 5 from
page 98 along with questions 1 through 4 on page 105 of the Counterpoints text.
Your 1920's - 1930's quiz will be Thursday (May 14th) and we'll have a quick review for that.
B Block Geography 12 - Today we start looking at storms and "CYCLOGENESIS"...sweet! We will look at
mid-latitude cyclones and the source regions of air masses that cause these
storms to develop. We'll analyze the difference between the three dimensional
structure of a warm front and a cold front and we'll finish watching our BBC
friend Mr. Donal McIntyre and his efforts to combat wet extremes on the planet.
Your work to accomplish for the day is questions 1, 2, and 5 from page 147 and
question 10 from page 248 in your Geosystems textbook. The following sites will
help with cyclogenesis:
Michael Ritter's The Physical Environment: An
Introduction to Physical Geography on line text
National
Weather Service Jet Stream on line weather school
University
of Illinois WW2010 Weather Wold Project
Rapid Cyclogenesis Web lesson
Environment Canada Understanding
Cyclogenesis
C Block Law 9/10 - Since we're looking at profiling...I'll have you try to build a criminal profile
of a computer hacker. I'd like you to read through the section in your class
text (handout) on “geographic profiling” and then using the information about
organized criminals on page 7 of your handout, try to build a profile of a
person who commits criminal mischief (computer hacking) in the class. Complete
this as a “dossier file” and imagine that it will be provided to the computer
forensics department of the local R.C.M.P. detachment. Here is some information
about hackers to add to your profile.
From the article Psychological Profile of Network Intruder by
Dragan Pleskonjic, Veljko Milutinovic, Nemanja Macek, Borislav Djordjevic and
Marko Caric
A hacker is defined as a person who knowledgeably use
computer to avoid rules and restrictions. All kinds of network intruders can
also be called hackers. A simple conclusion can be made - hacking is about
respect, reputation and acknowledgment. Any individual might be tempted to
believe that hackers are very altruistic, do serve the environment and are
socially engaged. Hackers try to solve interesting problems, and they learn to
keep score primarily by what other hackers think of their skill.
Hackers
are more or less anonymous so it is not easy to provide detailed information
about their activity and motivation. Does the very fact that they spend much
time using computer for activities not considered to be scientific but yet
involving curiosity, suggests their personality? Is the choice of their interest
caused by their inner disharmony? Regarding the amount of damage they caused,
rough answer would often be yes! However, we should emphasize once again that it
difficult to properly classify all those invading network systems.
• most
of computer users are white males aging 12-28 years
• most of hackers have a
good repertoire of social skills
• the term middle-class is meaningless, for
most computer users considers themselves members of
middle-class
Intrusion in the network system requires skill, creativity
and very often the ability to deceive other people. It can be classified as a
mixture of computer skills and psychology. In any case, it would be person who
uses the secrets of his trade to make all kinds of manipulations. It does not
necessarily mean that he deceives everybody and everyone, but it definitely
means that in many situations he feels relieved of moral responsibility for his
actions. Moreover, he would often justify them. Hackers are likely to practice
their profession until the age of thirty after which time most of them willingly
leave such way of life. This comes in support of a profile of typical young
burglar who is not critical enough of his actions. The fact that they are young
and reckless, however, cannot fully justify such behavior A hacker is
particularly inspired by the opportunity to commit a crime of theft without
being physically present. Even the reward can come by itself. The ones who steal
are called thieves. The ones who cause damage to the property are called
destructive.
After, we'll finish our look at profiling by examining Geographic profiling.
I'll ask you to brainstorm a list of locations in the Comox Valley that you feel
crime will be more prevalent in and you'll have to justify your reasoning. For
more on Geographic profiling check out:
Mapping Crime by Keith Harris
Center for
Geospatial Intelligence and Investigation
RCMP Geographic Profiling
Los
Angeles Auto Theft hot spots 2003
No comments:
Post a Comment