Upgrade to Pro — share decks privately, control downloads, hide ads and more …

An Intensive Analysis on the Usage Situation of the Mobile Services in Japanese High Schools. Why and How Are They Used? (2016/08/23 WSSM)

C2443f72b1e23d2ae5b7086e190e3c56?s=47 okadat
July 12, 2021

An Intensive Analysis on the Usage Situation of the Mobile Services in Japanese High Schools. Why and How Are They Used? (2016/08/23 WSSM)

C2443f72b1e23d2ae5b7086e190e3c56?s=128

okadat

July 12, 2021
Tweet

Transcript

  1. An Intensive Analysis on the Usage Situation of the Mobile

    Services in Japanese High Schools . Why and How Are They Used? Tadashi OkadaɹGraduate School of Science and Engineering, Ibaraki Uni-versity Jun IioɹDept. of Socio-informatics, Faculty of Letters, Chuo Uni-versity Yoshihiko KubotaɹFaculty of Education, Utsunomiya University Tatsuhiro YonekuraɹCollege of Engineering, Ibaraki University 1
  2. "HFOEB 
 • Introduction • Investigation summary • Service and

    the use of the application • Encounter from service to lead to "an encounter", and to feel • Summary 2
  3. Introduction 3

  4. • About the cybercrime arrest situation by the end of

    fi scal year 2013, (source: The National Police Agency cybercrime measure) *OUSPEVDUJPO 5IFOBNFPGUIFP ff FOTFBOPUIFSQFSDFOUBHFPGUIFDZCFSDSJNF 7JPMBUJPOPG 6OBVUIPSJ[FE$PNQVUFS "DDFTT-BX $SJNFGPSUIFSFDPSEPG UIFDPNQVUFS DSJNF BCPVUUIFVOKVTUSFDPSE $IFBU 7JPMBUJPOPGZPVOHQFPQMFQSPUFDUJOH BOEOVSUVSJOHSFHVMBUJPOT $PQZSJHIU"DUWJPMBUJPO $SJNFTTVDIBTUIF PCTDFOJUZEJTUSJCVUJPO $IJMETFYVBMFYQMPJUBUJPO $IJME1SPTUJUVUJPO 7JPMBUJPOPGEBUJOHTJUF SFHVMBUJPONFUIPE 5SBEFNBSLT"DUWJPMBUJPO 0UIFST 4
  5. *OUSPEVDUJPO • About the cybercrime arrest situation by the end

    of fi scal year 2013, (source: The National Police Agency cybercrime measure) $IFBU 7JPMBUJPOPGZPVOHQFPQMFQSPUFDUJOH BOEOVSUVSJOHSFHVMBUJPOT $PQZSJHIU"DUWJPMBUJPO $SJNFTTVDIBTUIF PCTDFOJUZEJTUSJCVUJPO $IJMETFYVBMFYQMPJUBUJPO $IJME1SPTUJUVUJPO 7JPMBUJPOPGEBUJOHTJUF SFHVMBUJPONFUIPE 5SBEFNBSLT"DUWJPMBUJPO 0UIFST 5
  6. The source: About the present conditions and the measures of

    the criminal offense to be caused by dating site in 2013 and the community siteʢThe National Police Agencyʣ *OUSPEVDUJPO Comparison of the number of damaged children to the cause dating and communication site 4/4 DPNNVOJUZ4JUF FUD EBUJOH4JUF 4/4 DPNNVOJUZ4JUF FUD EBUJOH4JUF 5IFMJOFHSBQIJTUIFOVNCFSPGBSSFTUT 5IFCBSHSBQIJTUIFOVNCFSPGUIFNJOPSEBNBHF      6
  7. 
 5IFTPVSDF"CPVUUIFQSFTFOUDPOEJUJPOTBOEUIFNFBTVSFTPGUIFDSJNJOBMP ff FOTFUP CFDBVTFECZEBUJOHTJUFJOBOEUIFDPNNVOJUZTJUFʢ5IF/BUJPOBM1PMJDF"HFODZʣ *OUSPEVDUJPO ίϛϡχςΟαΠτ ग़ձ͍ܥαΠτ ೥ྸผඃ֐ࣇಐ਺ͷׂ߹ dZFBSTPME

    EBUJOH4JUF ZFBSTPMEZFBSTPME ZFBSTPME ZFBSTPME ZFBSTPME ZFBSTPME dZFBSTPME ZFBSTPME ZFBSTPME ZFBSTPME ZFBSTPME ZFBSTPME ZFBSTPME 4/4 DPNNVOJUZ4JUF FUD Ratio of number of the age-speci fi c damage minors 7
  8. The source: About the present conditions and the measures of

    the criminal offense to be caused by dating site in 2013 and the community siteʢThe National Police Agencyʣ Age, sex of the victim Access method to the dating site of the victim (minor) ZFBSTPMEPWFS           "NJOPSNFBOTBQFSTPOZPVOHFSUIBOZFBST 5IJTJTBSBUJPGPSUIFUPMMT 5PMM 7JDUJN 8PNFO 8PNFO 8PNFO .JOPS 5IF fi STUIBMG 5IFTFDPOE IBMGPGUIFZFBS 5IFMBTUZFBS SBUJP 5IF fi STUIBMG 5IFTFDPOE IBMGPGUIFZFBS 5IFMBTUZFBS SBUJP ZFBSTPMEPWFS 5PMM 7JDUJN DFMMQIPOF DFMMQIPOF 1FSTPOBM$PNQVUFS 1FSTPOBM$PNQVUFS %FWJDFJHOPSBODF %FWJDFJHOPSBODF 8
  9. d 5IFOVNCFSPGUIF EBNBHFNJOPST In the community site, (54.9%) is less

    than 15 years old more than half of the minority. 5PUBM The source: About the present conditions and the measures of the criminal offense to be caused by dating site in 2013 and the community siteʢThe National Police Agencyʣ ZFSTPME ZFSTPME       d       5PUBM 4/4 DPNNVOJUZ4JUF FUD EBUJOH4JUF OVNCFSPGUIF EBNBHFNJOPST OVNCFSPGUIF EBNBHFNJOPST XPNBO NBO XPNBO NBO 3BUJPPGWJDUJN ZFBSTPSZPVOHFS 3BUJPPGWJDUJN ZFBSTPSZPVOHFS 5IFOVNCFSPGUIF EBNBHFNJOPST Toll 15 years or younger dating sitesɾɾɾɾɾɾɾɾ60ʢ37.7%ʣ SNS,community sitesɾɾɾ710ʢ54.9%ʣ In the community site, damage 11 years or younger of the minority occurs 9
  10. *OUSPEVDUJPO • The majority that is arrested of the cybercrime

    a minor (18 years old or younger) • There are many an arrest and crimes about the sexual crime • The use of the community site (including SNS) leads to a crime as a place of the encounters if meet-a-mate • The use terminal is connection from a cell-phone and a smartphone • A minor occupies most number of people of the crime in women • Among minors, the crime of the high school student greatly 10
  11. *OUSPEVDUJPO The crime of a sexual crime and the murder

    case is really taking place, too 11
  12. *OUSPEVDUJPO • It really becomes the communication means for crimes

    12
  13. *OUSPEVDUJPO A crime that the criminal killed a victim, but

    also a crime to greatly damage by honor is taking place Facebook 
 ɹˣ After a case ɹˣ Revenge porno 13
  14. *OUSPEVDUJPO To prevent a future crime It is necessary to

    check the use actual situation of the cell-phone of the high school student and the smartphone. Therefore I investigated it. 14
  15. Investigation summary 15

  16. *OWFTUJHBUJPOTVNNBSZ5BSHFU w 'PVSIJHITDIPPMTJO*CBSBLJ w ")JHI4DIPPM w #)JHI4DIPPM w $)JHI4DIPPM w

    %)JHI4DIPPM w QFPQMFJOUPUBM w "RVFTUJPOOBJSFJTDBSSJFEPVUCZ UXPDMBTTFTPGFBDITDIPPMZFBS w &OGPSDFNFOUQFSJPEGSPN %FDFNCFS UP+BOVBSZ  w *DBSSJFEPVURVFTUJPOBSZTVSWFZ BNPOHUIFQVCMJDIJHITDIPPM NFOUJPOFEBCPWF 
 BCPWF w 5IFRVFTUJPOOBJSFJTJOWFTUJHBUFE 
 
 JOBOPOZNJUZOPUUPCFBCMFUP 
 
 JEFOUJGZBOJOEJWJEVBM 16
  17. .BOBOEXPNBOBOEUIFHSBEFSBUJP 4FY 4DIPPM 
 ZFBS 8PNBO .BO 5IJSE 
 HSBEFS

    4FDPOE 
 HSBEFS 'JSTU 
 HSBEFS 17
  18. .PCJMFDMBTTJ fi DBUJPOBOEUIFVTFSBUJP *EPOPUIBWF 4NBSUQIPOF $FMMQIPOF 18

  19. Service and the use of ɹɹɹɹɹɹthe application 19

  20. 4FSWJDFBOEUIFVTFPGUIFBQQMJDBUJPO 20

  21. 8IBUBSFDBSSZJOH TFSWJDF UIFBQQMJDBUJPOUIBU *XBOUUPVTFJOGVUVSFPGUIFTNBSUQIPOF "QQMJDBUJPOTVDI BT-*/&BOE4LZQF NVTJDEPXOMPBE $BNFSB 
 BQQMJDBUJPO

    (BNF .PWJFQMBZFS #SPXTFS 4IPQTFBSDI FUD 21
  22. 5IFOVNCFSPGLFZXPSEFYUSBDUJPOPGUIF SFBTPOUIBU*XBOUUPVTF fun and interesting Convenience Need communication friend information

    music 22
  23. You used it, and did you feel that it was

    dangerous? 23
  24. 6TJOHDBSSZJOH BTNBSUQIPOF XFSFUIFSF EBOHFSPVTTFSWJDFBOEUIFUIJOHXIJDI*GFMUUPCF :FT /P /PBOTXFS 24

  25. 5IFBQQMJDBUJPOUIBU*UIPVHIUUPCFEBOHFSPVT  UIFSFBTPOPGUIFTFSWJDF The most of the problem are troubles

    by the communication Bad-mouths almost encountered bullying I almost had money stolen I was almost kidnapped by a person I almost encountered a stoker A message comes persistently A message comes persistently I was threatened by one's contributio ns A reply became slow and became unfriendly with a friend Others 25
  26. The use of SNS 26

  27. 5IFVTFTJUVBUJPOPG4/4 :FT /P /PBOTXFS 27

  28. 6TFSFBTPOPG4/4 &WFSZEBZFWFOU 8IBU*IJUPO *OUFSFTUJOH fi HVSFPGUIFGSJFOE 5IFKPLFUIBUPOMZBGSJFOEVOEFSTUBOET 0OFTVOFBTZGFFMJOHT 5IFFYDIBOHFTXJUIUIFDMPTFQFSTPO 0OFTVOFBTZGFFMJOHT

    5IFFYDIBOHFTJOUIFGSJFOE &WFOUXJUIUIFJOUFSFTU &WFSZEBZFWFOU 0UIFST *EPOPUXBOUUP DPOUSJCVUFJUKVTUUPTFFJU 4UVEFOUMJGF 28
  29. 0OFNPTUCZUIFVTFPGUIFTFSWJDFJT5XJUUFS There are a lot of cases to become the

    problem 29
  30. #BLBUUFSʢόΧολʔʣʢ'PPMʴ5XJUUFSʣ Laying upon word of "fool" and "Twitter " I

    tweet for the illusion that I appeal, and only a friend sees for an aim that wants to be outstanding. As for the tweet contents, a large body is a criminal act . There are many cases that such a tweet becomes the social problem . There were the cases that a company and the owner of the shop who hired a parttimer were driven into the business closing . As a common twee t Drinking of the minorit y Driving without a licens e Pride of the crime 30
  31. #BLBUUFSFYBNQMF To a planned person doin g "I enter the

    track" from now on When "I was going to delete the contribution immediately, I did not disappear and did retweet steadily and was surprised" 31
  32. #BLBUUFSFYBNQMF In addition, Bakatter goes down in a track; and

    a design of the photography 32
  33. #BLBUUFSFYBNQMF 33

  34. Then does the high school student do Bakatter? How long

    does the student seem to do it? 
 
 I heard it 34
  35. %PZPVXBOUUPBUUSBDUBUUFOUJPOJO4/4 *UIJOL WFSZNVDI *UIJOLTP *DBOOPUTBZZFTPSOP *EPOPU UIJOLWFSZ NVDI 35

  36. %PZPVXBOUUPEPBOJOUFSFTUJOHDPOUSJCVUJPO BOEBDPOTQJDVPVTDPOUSJCVUJPOJO4/4 *UIJOL WFSZNVDI *UIJOLTP *DBOOPUTBZZFTPSOP *EPOPUUIJOL *EPOPU UIJOLWFSZ NVDI

    36
  37. Encounter from service to lead to "an encounter", and to

    feel 37
  38. *JOUFSDIBOHFEXJUIBQFSTPOOPUUPLOPX VTJOHTFSWJDFTTVDIBT4/4 :FT /P /P BOTXFSFE 38

  39. 5IFTFSWJDFUIBUJOUFSDIBOHFTXJUIPUIFSQFPQMF SSocial games such as mobage or GREE mix i

    ɹLIN E ɹOthe r 39
  40. *NFUBQFSTPOOPUUPLOPXVTJOHTFSWJDFT TVDIBT4/4 I have interchanged with "a person not to

    know" :FT /P /P BOTXFSFE :FT /P /P BOTXFSFE 40
  41. 5IFTFSWJDFUIBUSFBMMZNFUBQFSTPOOPUUPLOPX SSocial games such as mobage or GREE mix i

    ɹLIN E ɹOthe r 41
  42. 3FBMMZNFFUBQFSTPOOPUUPLOPX :FT /P Did you develop into love? 42

  43. *NQSFTTJPOPGUIFQBSUOFS "DDPSEJOHUPJNBHF "OJNBHFJTTMJHIUMZOFBS *DBOOPUTBZ ZFTPSOP *UJTTMJHIUMZGBSGSPNBOJNBHF *UJTGBSGSPNBOJNBHF I really met

    a partner, and how was the impression? 43
  44. "HFPGUIFQFSTPOXIPNFU I do not understand it generations 10s 20s 30s

    40s 50s 60s 44
  45. Summary 45

  46. 4VNNBSZ5IFQSFTFOUDPOEJUJPOT • The use of the smartphone is communication mainly

    • The main use is narrowed down to Twitter and LINE • With the others who do not know it by sight with planning communication using SNS can interface it 46
  47. 4VNNBSZ5IFQSFTFOUDPOEJUJPOT • The student uses the service that information can

    send to unspecified number of the general public such as Twitter for the sense that only a fellow thinker sees • An encounter comes out of interchange with the unspecified number of the general public in Twitter • It is difficult to ascertain a partner with the malice (because inexperienced as experience) 47
  48. 4VNNBSZ5IFQSFTFOUDPOEJUJPOT • When a partner is false, there is the

    risk that watches Twitter, and approaches, and is rolled up in a crime • There is the risk to be connected by the method called the communication that is a secret room using LINE for an evil deed after having approached • Concealment communication not to understand is completed from a parent and a school 48
  49. 4VNNBSZ.FBTVSFT • I wear a scary sense to protect the

    body because I stayed to meet because a murder case of Mitaka was scary • Because there are not checks such as the age, in SNS such as Twitter, do not give the partner who can hide birth and parentage information • I instruct a challenger that there is not it to get attention easily • Have a fear toward a person to approach • Are structure and an action to prevent you from becoming concealment communication not necessary? 49
  50. Thank you for listening 50