here is a vocabulary list for ya…

hate crime

a crime motivated by prejudice, typically one involving violence.(physical, mental, emotional or social/finacial…reputation, and spiritual violence)

bais

cause to feel or show inclination or prejudice for or against someone or something.

opinion

a view or judgment formed about something, not necessarily based on fact or knowledge.

attitude

a settled way of thinking or feeling about someone or something, typically one that is reflected in a person’s behavior.

Implicit Bias

Also known as implicit social cognition, implicit bias refers to the attitudes or stereotypes that affect our understanding, actions, and decisions in an unconscious manner.

disability bias

Ableism /ˈeɪblɪzəm/ (also known as ablism, disablism, disability discrimination, and handicapism) is discrimination and social prejudice against people with disabilities. Ableism characterizes persons as defined by their disabilities, and as inferior to the non-disabled.

racial bias

Racial biases are a form of implicit bias, which refers to the attitudes or stereotypes that affect an individual’s understanding, actions, and decisions in an unconscious manner.

reverse racial bias

Reverse discrimination is discrimination against members of a dominant or majority group in favor of members of a minority or historically disadvantaged group. Groups may be defined in terms of race, gender, ethnicity, or other factors.

ethnic bias

pertaining to or characteristic of a people, especially a group (ethnic group) sharing a common and distinctive culture, religion, language, or the like. 2. referring to the origin, classification, characteristics, etc., of such groups.

religious bias

Religious discrimination is valuing or treating a person or group differently because of what they do or do not believe. [citation needed] Specifically, it is when adherents of different religions (or denominations) are treated unequally, either before the law or in institutional settings such as employment or housing.

sexual orientation bias

Sexual bias. Sexualism is discrimination against a person or group on the basis of their sexual orientation or sexual behavior. It usually refers to a predisposition towards heterosexual people, which is biased against lesbian, gay, bisexual, and asexual people, among others.

cognitive bias

A cognitive bias refers to a systematic pattern of deviation from norm or rationality in judgment, whereby inferences about other people and situations may be drawn in an illogical fashion. Individuals create their own “subjective social reality” from their perception of the input.

physical bias

The physical attractiveness stereotype is a tendency, described by psychologists, to assume that people who are physically attractive also possess other socially desirable personality traits. Stereotyping is the process by which we draw inferences about others based on knowledge of the categories to which they belong.

event

a thing that happens, especially one of importance.

location

a particular place or position.

suspects

: to think that (someone) is possibly guilty of a crime or of doing something wrong. … : to think that (a crime) has possibly been committed. Full Definition of suspect. transitive verb. 1 : to imagine (one) to be guilty or culpable on slight evidence or without proof <suspect him of giving false information>

offences

annoyance or resentment brought about by a perceived insult to or disregard for oneself or one’s standards or principles.

victim

a person harmed, injured, or killed as a result of a crime, accident, or other event or action.

a person who is tricked or duped

a living creature killed as a religious sacrifice

 

 

 

public policy

Other scholars define public policy as a system of “courses of action, regulatory measures, laws, and funding priorities concerning a given topic promulgated by a governmental entity or its representatives.” Public policy is commonly embodied in “constitutions, legislative acts, and judicial decisions.”

the principles, often unwritten, on which social laws are based.
choice theory
The term choice theory is the work of William Glasser, MD, author of the book so named, and is the culmination of some 50 years of theory and practice in psychology and counseling. Choice theory posits behaviors we choose are central to our existence.
trait theory
In psychology, trait theory (also called dispositional theory) is an approach to the study of human personality. Trait theorists are primarily interested in the measurement of traits, which can be defined as habitual patterns of behavior, thought, and emotion.
social process theory
Social process theory views criminality as a function of people’s interactions with various organizations, institutions, and processes in society; people in all walks of life have the potential to become criminals if they maintain destructive social relationships.
price fixing
(1920) by George Howard Earle, Jr. Price fixing is an agreement between participants on the same side in a market to buy or sell a product, service, or commodity only at a fixed price, or maintain the market conditions such that the price is maintained at a given level by controlling supply and demand.
FTC
The Federal Trade Commission (FTC) is an independent federal agency whose main goals are to protect consumers and to ensure a strong competitive market by enforcing a variety of consumer protection and antitrust laws. To guard against price fixing by corporate cartels.
INTERPOL
INTERPOL is a network of police forces from 190 countries all over the world. INTERPOL’s job is to help police in different countries work together to solve crimes that cross borders.
SEC
The Securities and Exchange Commission (SEC) is a U.S. government agency that oversees securities transactions, activities of financial professionals and mutual fund trading to prevent fraud and intentional deception.
FDIC
The Federal Deposit Insurance Corporation (FDIC) is an independent agency of the United States (U.S.) federal government that preserves public confidence in the banking system by insuring deposits.
FCC
The Federal Communications Commission (FCC) is an independent agency of the United States government, created by Congressional statute (see 47 U.S.C. § 151 and 47 U.S.C. § 154) to regulate interstate communications by radio, television, wire, satellite, and cable in all 50 states, the District of Columbia and U.S.
PLATO system
The PLATO system was designed for Computer-Based Education. But for many people, PLATO’s most enduring legacy is the online community spawned by its communication features.PLATO originated in the early 1960’s at the Urbana campus of the University of Illinois. Professor Don Bitzer became interested in using computers for teaching, and with some colleagues founded the Computer-based Education Research Laboratory (CERL). Bitzer, an electrical engineer, collaborated with a few other engineers to design the PLATO hardware. To write the software, he collected a staff of creative eccentrics ranging from university professors to high school students, few of whom had any computer background. Together they built a system that was at least a decade ahead of its time in many ways.

PLATO is a timesharing system. (It was, in fact, one of the first timesharing systems to be operated in public.) Both courseware authors and their students use the same high-resolution graphics display terminals, which are connected to a central mainframe. A special-purpose programming language called TUTOR is used to write educational software.

cyber culture
the social conditions brought about by the widespread use of computer networks for communication, entertainment, and business.
FAA
The Federal Aviation Administration (FAA) of the United States is a national authority with powers to regulate all aspects of civil aviation
arpanet
ARPANET was the network that became the basis for the Internet. Based on a concept first published in 1967, ARPANET was developed under the direction of the U.S. Advanced Research Projects Agency (ARPA). In 1969, the idea became a modest reality with the interconnection of four university computers.
CFTC
The U.S. Commodity Futures Trading Commission (CFTC) is an independent agency of the US government created in 1974, that regulates futures and option markets. The Commodities Exchange Act (“CEA”), 7 U.S.C. § 1 et seq., prohibits fraudulent conduct in the trading of futures contracts.
NRC
The Nuclear Regulatory Commission (NRC) is an independent agency of the United States government tasked with protecting public health and safety related to nuclear energy.
DnD
Dungeons & Dragons (abbreviated as D&D or DnD) is a fantasy tabletop role-playing game (RPG) originally designed by Gary Gygax and Dave Arneson, and first published in 1974 by Tactical Studies Rules, Inc. (TSR).
Copyright Act of 1976
The Copyright Act of 1976 is a United States copyright law and remains the primary basis of copyright law in the United States, as amended by several later enacted copyright provisions.
FECA
The Federal Election Campaign Act of 1971 (FECA, Pub.L. 92–225, 86 Stat. 3, enacted February 7, 1972, 52 U.S.C. § 30101 et seq.) is the primary United States federal law regulating political campaign spending and fundraising. … The 1974 amendments also created the Federal Election Commission (FEC).
FISA
The Foreign Intelligence Surveillance Act of 1978 (“FISA” Pub.L. 95–511, 92 Stat. 1783, 50 U.S.C. ch. 36) is a United States federal law which prescribes procedures for the physical and electronic surveillance and collection of “foreign intelligence information” between “foreign powers” and “agents of foreign powers”
Church Committee
The Church Committee was the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, a U.S. Senate committee chaired by Senator Frank Church (D-ID) in 1975.
Public-key cryptography 1980s
Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys that may be disseminated widely paired with private keys which are known only to the owner. There are two functions that can be achieved: using a public key to authenticate that a message originated with a holder of the paired private key; or encrypting a message with a public key to ensure that only the holder of the paired private key can decrypt it.

 

leet speak

Originating in the early 1980’s, leet speak was first used by hackers as a way to prevent their websites/newsgroups from being found by simple keyword searches.
Leet speak grew and became popular in online games such as Doom in the early 1990’s as a way of suggesting that you were a hacker (h4x0r), and therefore to be feared.
Leet, or 1337, is a short form of “elite,” commonly used by video gamers to suggest that they are skilled.
cyberspace
the notional environment in which communication over computer networks occurs.

eunuch

Lacking forcefulness or effectiveness; inadequate or incompetent:

Botnets, Zombies and Remote Control Attacks

“Bot networks,” or botnets, are collections of computers under the control of a single entity, usually without the knowledge or consent of the owners of those computers. The individual infected computers are running software known as a “bot” (from “robot”), and the computers themselves are often referred to as “bots” or “zombies.”

Botnets are used by the controlling entity, sometimes known as a “botherd” or “botherder,” to perform some function, which may involve distributing tasks across the individual bots (such as cracking passwords) or having them work in concert (e.g., engaging in a denial of service attack).

Botnets have become one of the primary tools of criminal activity used on the Internet today, and botnet activity is driven by economic considerations–to make money for those using them. Botnets provide a technology infrastructure which, in conjunction with a creative division of labor, disperses the risks faced by online criminals, allowing them to grow their operations to a larger scale without fear of being captured and prosecuted (Abad, 2005; Berinato, 2007).

Hackers: Heroes of the Computer Revolution

Hackers: Heroes of the Computer Revolution QURAIS (ISBN 0-385-19195-2) is a book by Steven Levy about hacker culture. … Levy describes the people, the machines, and the events that defined the Hacker Culture and the Hacker Ethic, from the early mainframe hackers at MIT, to the self-made hardware hackers and game hackers.

NCMEC

The National Center for Missing & Exploited Children (NCMEC) is a private, non-profit organization established in 1984 by the United States Congress.

warez group

A warez group is a tightly organised group of people involved in creating and/or distributing warez such as movies, music or software (“warez”) in The Scene. There are different types of these groups: release groups and courier groups.

i am a eunuch… for you all

 

For there are eunuchs who were born that way, and there are eunuchs who have been made eunuchs by others–and there are those who choose to live like eunuchs for the sake of the kingdom of heaven. The one who can accept this should accept it.”

Matthew 19:12

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s