SlideShare a Scribd company logo
1 of 33
Social
Networking
Ethics in Information Technology
What is Social Networking Web Site?
Business Applications of Online Social Net
Social Networking Ethical Issues
Online Virtual World
Overview
What is Social Networking Web Site?
Business Applications of Online Social Net
Five new profiles are created every second
There are 83 million fake profiles
Photo uploads total 300 million per day
Average time spent per Facebook visit is 20 minutes
699 million people log onto Facebook daily, which represents a 26% increase from 2012
4.5 billion likes generated daily as of May 2013 which is a 67 percent increase from August
2012
Age 25 to 34, at 29.7% of users, is the most common age demographic
Facebook Facts
Social Network Advertising
Social Shopping Web Sites
Business Applications of Online Social Net
Direct Advertising
Advertising Using an Individual’s Network of Friends
Indirect Advertising Through Groups
Company-Owned Social Networking Web Site
Viral Marketing
Social Network Advertising
Direct Advertising
Advertising Using an
Individual’s Network of
Friends
Indirect Advertising
Through Groups
0
Company-Owned Social
Networking Web Site
Viral Marketing
Social Shopping Web Sites
Utilitarian Perspective
Fairness Perspective
Common Good Perspective
Virtue Perspective
Some Unavoidable Ethical Issues
Social Networking At Work Place
Decrease
Efficiency
Cyberbullying
Cyberbullying is the
use of the Internet
and related
technologies to
harm or harass other
people, in a
deliberate, repeate
d, and hostile
manner.
Cyberbullying is Defined in Legal Glossaries as
Statistics
Cyberbulling
Non Attacked
Attacked
Among 800 students
ages 13-17, about
43% had
experienced
cyberbullying
Result of Cyberbulling
Forms of Cyberbullying
 Threatening Messages
 Thousands Of Text Messages
 Impersonating The Victim And Sending Inappropriate
Messages To Others
 Stealing The Victim’s Password And Manipulating
 Posting Mean, Personal, Or False Information About The
Victim
It is the Adult Version of Cyberbullying
Cyberstalking
What Should We Do?
 Victims Should Send a Written Notice
 Evidence of All Contacts should be Saved.
 Inform Their ISP Provider.
 Speaking to Law Enforcement Officers.
 Never Agree to Meet With the Stalker to “Talk Things Out”
People who commit sex crimes, such as rape or child sexual
abuse, are commonly referred to as sexual
predators
Encounters with Sexual Predators
Parents and their children need to work together to
protect against online predators.
How to Avoid Sexual Predators activity?
Most social networking Web sites have policies against
uploading materials
But Policies do not stop all members from posting
inappropriate material
Uploading of Inappropriate Material
Online Virtual World
Avatars
Communication
Shopping and Office
Relationship
Promote events
Business
Avatar in Virtual World
Use Virtual Currency
Earn Virtual Money
Virtual Items
E-commerce
Avatar in Virtual World (cont.)
Trafficking In Actual Drugs or Stolen Credit Cards
Online Muggings and Sex Crimes
Cyber Harassment
Crime in Virtual Worlds
The New Media Consortium (NMC)
Media Grid’s Immersive Education Initiative
Rivers Run Red
Educational and Business Uses of
Virtual Worlds
Q&A

More Related Content

What's hot

Social media and networking
Social media and networkingSocial media and networking
Social media and networking
gdeboe
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
UMaine
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
nadikari123
 

What's hot (20)

Social media and networking
Social media and networkingSocial media and networking
Social media and networking
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
SOCIAL Networking Sites
SOCIAL Networking SitesSOCIAL Networking Sites
SOCIAL Networking Sites
 
Netiquette and code of conduct in communication
Netiquette and code of conduct in communicationNetiquette and code of conduct in communication
Netiquette and code of conduct in communication
 
What is Digital Media 4
What is Digital Media 4What is Digital Media 4
What is Digital Media 4
 
Social Media Safety
Social Media SafetySocial Media Safety
Social Media Safety
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking Presentation
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
The Current State of ICT Technologies.pptx
The Current State of ICT Technologies.pptxThe Current State of ICT Technologies.pptx
The Current State of ICT Technologies.pptx
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Cyber crime & cyber security 10
Cyber crime & cyber security 10Cyber crime & cyber security 10
Cyber crime & cyber security 10
 
Social Media Monitoring: Presentation on Social Media Monitoring: Why and How
Social Media Monitoring: Presentation on Social Media Monitoring: Why and HowSocial Media Monitoring: Presentation on Social Media Monitoring: Why and How
Social Media Monitoring: Presentation on Social Media Monitoring: Why and How
 
Developing Your Digital Identity
Developing Your Digital IdentityDeveloping Your Digital Identity
Developing Your Digital Identity
 
Personal Branding
Personal BrandingPersonal Branding
Personal Branding
 
Software Development
Software DevelopmentSoftware Development
Software Development
 

Viewers also liked

Impact of Information Technology on Productivity & Quality of Life
Impact of Information Technology on Productivity & Quality of LifeImpact of Information Technology on Productivity & Quality of Life
Impact of Information Technology on Productivity & Quality of Life
Shibbir Shimanto
 
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Nawanan Theera-Ampornpunt
 
Information Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingInformation Ethics and Clinical Decision Making
Information Ethics and Clinical Decision Making
Nawanan Theera-Ampornpunt
 
Segurança, ética e privacidade da informação
Segurança, ética e privacidade da informaçãoSegurança, ética e privacidade da informação
Segurança, ética e privacidade da informação
Daiana de Ávila
 
Health Informatics
Health InformaticsHealth Informatics
Health Informatics
Julesykora
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
amitmitkar
 

Viewers also liked (20)

Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
 
Impact of Information Technology on Productivity & Quality of Life
Impact of Information Technology on Productivity & Quality of LifeImpact of Information Technology on Productivity & Quality of Life
Impact of Information Technology on Productivity & Quality of Life
 
Ethic02
Ethic02Ethic02
Ethic02
 
Overview of ethics and information technology
Overview of ethics and information technologyOverview of ethics and information technology
Overview of ethics and information technology
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
 
Information Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingInformation Ethics and Clinical Decision Making
Information Ethics and Clinical Decision Making
 
Hi271 lacking in ethics pdf v3
Hi271 lacking in ethics pdf v3Hi271 lacking in ethics pdf v3
Hi271 lacking in ethics pdf v3
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Islamic ethics
Islamic ethicsIslamic ethics
Islamic ethics
 
Segurança, ética e privacidade da informação
Segurança, ética e privacidade da informaçãoSegurança, ética e privacidade da informação
Segurança, ética e privacidade da informação
 
Health Informatics
Health InformaticsHealth Informatics
Health Informatics
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
 
law and ethics
law and ethicslaw and ethics
law and ethics
 
Ethics in Islam
Ethics in IslamEthics in Islam
Ethics in Islam
 
Law and ethics
Law and ethicsLaw and ethics
Law and ethics
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Users
 

Similar to Social Networking (Ethics in Information Technology)

Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
victoriahoo
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docx
jaggernaoma
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 
My Online Image
My Online ImageMy Online Image
My Online Image
aluthe
 

Similar to Social Networking (Ethics in Information Technology) (20)

Facebook
FacebookFacebook
Facebook
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
ES_ 6 Author-Shelina Rajawat
ES_ 6 Author-Shelina RajawatES_ 6 Author-Shelina Rajawat
ES_ 6 Author-Shelina Rajawat
 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threats
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Jon Newman PRSARVA 5/19/10
Jon Newman PRSARVA 5/19/10Jon Newman PRSARVA 5/19/10
Jon Newman PRSARVA 5/19/10
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Social Media
Social MediaSocial Media
Social Media
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docx
 
Users and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & SecurityUsers and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & Security
 
Impacts of Social Media
Impacts of Social MediaImpacts of Social Media
Impacts of Social Media
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
What is cyber fraud?
What is cyber fraud?What is cyber fraud?
What is cyber fraud?
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
 
My Online Image
My Online ImageMy Online Image
My Online Image
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

Social Networking (Ethics in Information Technology)

Editor's Notes

  1. 1.A social networking Web site is a site whose purpose is to create an online communityof Internet users that enables members to break down barriers created by time, distance,and cultural differences.2. Facebook 1.5 Billion users, twitter 200 Million, myspace 50 million, linkedin 238 million; from wiki
  2. technisia
  3. technisia
  4. sources:facebook, emarketer, infodocket, cnn, allfacebook 2012, gizmodo
  5. Social network advertising involves the use of social networks to inform, promote, and communicate the benefits of products and services.Social network advertising has become big business in the United States, with 2009 ad spending on Facebook estimated to be $230 million, and ad spending on MySpace estimated to be $495 million.12
  6. 1.Direct advertising involves placing banner ads on a social networking Web site.2. An ad can either be displayed to each visitor to the Web site or, by using the information in user profiles
  7. 1.Companies can use social networking Web sites to advertise to an individual’s network of contacts2. This might be a spontaneous message sent by Jared, or Jared might be getting paid by an online promotion firm to send messages about certain products.3.unethicial
  8. Innovative companies are also making use of a new marketing technique by creating a group on a social networking Web site that interested users can join by becoming “fans.” These groups can quickly grow in terms of numbers of fans to become a very effective marketing tool for a company looking to market contests, promote new products, or simply increase brand awareness. In its ongoing fight for market share in the beverage industry, Coca-Cola has implemented a number of social networking initiatives to promote its brands.
  9. 1.Since its launch in February 20072. the Dell community has suggested 11,996 ideas and posted 84,851 comments; 3.Dell has implemented 350 customer-submitted ideas.18
  10. V1.iral marketing encourages individuals to pass along a marketing message to others2. as one person tells two people, each of those two people tell two or three more people, and
  11. Buzzillions Product review Web site that collects thousands of product reviews from the Web sites of various retailersCrowdstormShopping resource that aggregates product information from various online buyers guides, reviews, and blog postingsKaboodle Site where members can discover and recommend new products; get discounts; and locate bargainsOSOYOU UK-based social shopping site for women with an interest in fashion and beauty productsZEBO Site that allows members to create a personal profile about what they own, want, and love to shop for; members can check out one another’s profiles, provide
  12. MySpace, FaceBook, and other sites have been the scene of cyberbullying and online predation. But the same technology allows people to connect with others they might never have met and form meaningful relationships.Some people believe social networking sites offer the ultimate in egalitarianism. When we interact with others online, we have no real way of knowing whether they are white or black, male or female, fat or thin, young or old.Certainly, many people turn to social networking sites to connect with social groups that share their interests and values.What impact will digital media have on these virtues? What, for example, would honesty mean in the context of a world where people are represented by avatars?Utilitarian PerspectiveFairness PerspectiveCommon Good PerspectiveVirtue Perspective
  13. Cyberbullying is the use of the Internet and related technologies to harm or harass other people, in a deliberate, repeated, and hostile manner.
  14. According to recent survey among 800 students ages 13-17 , about 43% had experienced cyberbulling in the past year. Cyberbulling is more common among females and among 15-16 years old .
  15. Ryan Halligan, a 13-year-old boy in Vermont, committed suicide after bullying from his schoolmates and cyberbullying online. Megan Meier, a 13-year-old girl from Missouri, also committed suicide when she was harassed by a fictitious boy created by neighbors with whom she had had a falling out.
  16. Sending mean-spirited or threatening messages to the victimSending thousands of text messages to the victim’s cell phone Impersonating the victim and sending inappropriate messages to othersStealing the victim’s password and modifying his or her profile to include racist,homophobic, sexual, or other inappropriate data that offends others or attractsthe attention of undesirable peoplePosting mean, personal, or false information about the victim in the cyber-bully’s blog
  17. When the offender is known, victims should send the stalker a written notice that their contact is unwanted.Evidence of all contacts should be saved.Victims of cyber stalking should inform their ISP provider.Victims should consider speaking to law enforcement officers.Above all else, victims of cyberstalking should never agree to meet with the stalker to“talk things out.”
  18. Talk to your kidsUse parental control software Monitor your children's use of social networking sitesNever download images from an unknown source Never reveal personal information Never agree to meet someone
  19. Most websites do not have sufficient resources to review all material submitted for posting.In April 2008, six teenagers recorded their beating of 16-year old Victoria Lindsay and planned to post it on Myspace and Youtube.On May 20,2009, an organization group of users uploaded video clips of explicit adult content to Youtube. The clips were uploaded with no warning at all. Even worse, they were tagged with child friendly identities.
  20. An online virtual world is a computer-simulated world in which a visitor can move in three-dimensional space, communicate and interact with other visitors, and manipulate elements of the simulated world.
  21. A visitor to a virtual world represents him- or herself through an avatar. a character usually in the form of a human but sometimes in some other form.
  22. Communication: Avatars can typically communicate with each other via text chat or via voice using Voice over IPShopping and Office: shop, hold jobs, run for political office, develop relationships with other avatarsPromote events: promote events and hold them in the virtual worldBusiness: start up new businesses and create or purchase new entities
  23. Use virtual currency: use the virtual world’s currency to purchase goods and servicesEarn Virtual money: earn virtual world money by performing tasks in the virtual world. avatars can convert their virtual world money back into real dollars at whatever the going exchange rateVirtual items: Virtual world items may also be sold to other virtual world players for real world moneye-commerce: also support e-commerce and allow users to sell their own real productsMost virtual worlds have rules against offensive behavior in public, such as using racial slurs or performing overtly sexual actions. However, consenting adults can travel to private areas and engage in all sorts of socially unacceptable behavior
  24. Virtual worlds raise many interesting questions regarding what is a criminal act and whether law enforcement.Example:trafficking in actual drugs or stolen credit cardsonline muggings and sexual crimesCyberharrasmentIn The Sims Online, a number of players formed a “Sim Mafia” and attacked the avatars of unpopular players. The group would send a flood of insulting messages to the targeted character, then trash the target’s virtual property, and finally demand that the target delete his or her avatar from the game.A man playing the Lineage II online game was arrested by Japanese officials for using software to mug avatars and then sell the stolen virtual items for real money.A player of the online game MapleStory became so upset about her sudden divorce from her online husband that she logged onto the game with her virtual world husband’s ID and password and killed his avatar. The woman was arrested by Japanese police and jailed on suspicion of illegally accessing a computer and manipulating electronic data. Under Japanese law, she could be imprisoned up to five years or fined up to $5,000
  25. The New Media Consortium (NMC) is an international consortium of almost 300 organizations focused on exploring the use of new media and technologies to improve teaching, learning, and creative expression. The NMC attracts nearly 1,500 unique visitors to its Second Life campus each week. Princeton, Yale, the University of Southern California, Ball State, and New York University are just a few of the schools with a campus in Second LifeMedia Grid’s Immersive Education Initiative is an international collaboration of universities, research institutes, and companies to define and develop open standards, best practices, platforms, and game-based learning and training systems. Amherst College, Boston College, the City of Boston, Loyola Marymount University, Massachusetts Institute of Technology, and Seton Hall University are some of the members of the Media Grid.Members of the New Media Consortium and the Media Grid can conduct classes and meetings from within a growing number of virtual learning worlds.Second Life is used by the marketing firm Rivers Run Red as a virtual meeting place to display ads, posters, and other designs in three-dimensional settings for clients and partners around the world. Using virtual meeting space can cut weeks off the time that would be required to transport the actual materials back and forth for a real world meeting