Today's schedule is A-AG-B-C-D
A Block Law 9/10 - Today we'll re-examine the "Unholy Trinity" of serial killer characteristics and then watch a video on how profiling was developed in the F.B.I. Behavioural
Science Unit (through the efforts of many highlighted by the work of John Douglas) today.
The first part of the video focuses on Wayne Williams and then
looks at Robert
Hansen. Don't forget that in Canada the R.C.M.P. call the technique criminal
investigative analysis. For more info look at the work of John Douglas (former FBI
profiler) on mindhunter.com (look in the article section and there is a
great read entitled "So, you want to become a profiler...").
Since we're looking at profiling...I'll have you try to build a criminal profile
of a computer hacker. I'd like you to read through the section in your class
text (handout) on “geographic profiling” and then using the information about
organized criminals on page 7 of your handout, try to build a profile of a
person who commits criminal mischief (computer hacking) in the class. Complete
this as a “dossier file” and imagine that it will be provided to the computer
forensics department of the local R.C.M.P. detachment. Here is some information
about hackers to add to your profile.
From the article Psychological Profile of Network Intruder by
Dragan Pleskonjic, Veljko Milutinovic, Nemanja Macek, Borislav Djordjevic and
Marko Caric
A hacker is defined as a person who knowledgeably use
computer to avoid rules and restrictions. All kinds of network intruders can
also be called hackers. A simple conclusion can be made - hacking is about
respect, reputation and acknowledgment. Any individual might be tempted to
believe that hackers are very altruistic, do serve the environment and are
socially engaged. Hackers try to solve interesting problems, and they learn to
keep score primarily by what other hackers think of their skill.
Hackers
are more or less anonymous so it is not easy to provide detailed information
about their activity and motivation. Does the very fact that they spend much
time using computer for activities not considered to be scientific but yet
involving curiosity, suggests their personality? Is the choice of their interest
caused by their inner disharmony? Regarding the amount of damage they caused,
rough answer would often be yes! However, we should emphasize once again that it
difficult to properly classify all those invading network systems.
• most
of computer users are white males aging 12-28 years
• most of hackers have a
good repertoire of social skills
• the term middle-class is meaningless, for
most computer users considers themselves members of
middle-class
Intrusion in the network system requires skill, creativity
and very often the ability to deceive other people. It can be classified as a
mixture of computer skills and psychology. In any case, it would be person who
uses the secrets of his trade to make all kinds of manipulations. It does not
necessarily mean that he deceives everybody and everyone, but it definitely
means that in many situations he feels relieved of moral responsibility for his
actions. Moreover, he would often justify them. Hackers are likely to practice
their profession until the age of thirty after which time most of them willingly
leave such way of life. This comes in support of a profile of typical young
burglar who is not critical enough of his actions. The fact that they are young
and reckless, however, cannot fully justify such behavior A hacker is
particularly inspired by the opportunity to commit a crime of theft without
being physically present. Even the reward can come by itself. The ones who steal
are called thieves. The ones who cause damage to the property are called
destructive.
B Block Social Studies 11 - Today we'll talk about the ways you can influence government, focusing on
elections and voting. We'll look at representation by population, the first past
the post system, and the concept of proportional representation. You'll need to
work on 1, 2, 3, and 4 on page 253 along with 1 and 2 on page 258 of your Counterpoints textbook today. For help on why
you should vote see:
Elections Canada Young Voters Site
Elections Canada Electoral System
explanation
Compulsory voting in Australia explanation
Electoral Reform in BC First Past the Post or
STV
About.com First Past the Post vs Proportional
Representation
Historical record of Canadian Voter
turnout
2011 Election Results CBC
There will be two members of parliament representing the Comox Valley after the next federal election, now the Electoral Boundaries Commission has decided to draw a line through our Regional District.
Comox and Electoral Areas B and C will remain with the North Island, while Courtenay, Cumberland and Area A will join a new 'Courtenay-Alberni' riding.
C Block Social Studies 10 - Today we're going to work together in the class on explaining and identifying
the six physiographic regions of Canada. You've been working on this as a
project and today you'll get some notes to help you with your test on Friday.
We'll use the Atlas along with the Canadian Atlas on line to go through each one
of the regions - identifying the geologic structures, natural resources, climate
types, ecosystems, population patterns and other cool stuff. This is, of course,
in preparation for your unit test on Friday (March 1st). This unit test will
cover map conventions (skills and comprehension), geographic basics (latitude,
longitude, direction, and time zones), topographic map interpretation, and the
physiographic regions of Canada. Today I'll have you work on questions 1-5 on page 28 of the Horizons text. (Tuesday we'll look at natural regions, Wednesday we'll look at cultural landscape and the First Nations peoples of the land and Thursday we'll see the big picture "How has Geography shaped the culture and history of Canada?")
No comments:
Post a Comment