SlideShare a Scribd company logo
1 of 10
The ultimate loop
The anonymity paradox
 It‘s good to be anonymous when you
want to…
protect your privacy
 It‘s bad to be anonymous when you
want to…
commit a crime
locate a criminal
The risks
 What gets misused
Trust
Stupidity
Unawareness
Not enough education / experience
 For what purpose
Information thefts
Real-world crimes
The privacy
 Countermeasure: privacy control
 Aware / unaware giveaway
 One-way rule
 Grandmother rule
 Street concept
Our defense
 Double consideration
 Education
 Experience build-up
 Common sense
My opinion
 Nothing is black
 Nothing is white either
One important thing
„Don‘t let internet harm you“
How to distribute the idea
 Through media
 Through teachers
 Through parents
 Through youngsters
Thank you for your attention.
Thank you for your attention.

More Related Content

What's hot

Online safety 2011
Online safety 2011Online safety 2011
Online safety 2011Tea Teić
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationjpl17
 
Cyberbullying - March 2, 2010
Cyberbullying - March 2, 2010Cyberbullying - March 2, 2010
Cyberbullying - March 2, 2010Samantha Morra
 
6 mm cyberbullying
6 mm cyberbullying6 mm cyberbullying
6 mm cyberbullyinglisamholden
 
6 mm cyberbullying
6 mm cyberbullying6 mm cyberbullying
6 mm cyberbullyinglisamholden
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetinganniebee3509
 
Social justice
Social justiceSocial justice
Social justicekm03john
 
Final cyberbullying
Final cyberbullyingFinal cyberbullying
Final cyberbullyingTexasQT
 
Final cyberbullying1
Final cyberbullying1Final cyberbullying1
Final cyberbullying1TexasQT
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2bigmike18
 
Internet security for parents
Internet security for parentsInternet security for parents
Internet security for parentsShannon Blackerby
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingcidelgad
 
Lesson 1 maintaining internet safety(unit 1)
Lesson 1    maintaining internet safety(unit 1)Lesson 1    maintaining internet safety(unit 1)
Lesson 1 maintaining internet safety(unit 1)FRANCISANGELOBANTAT
 
Netiquette & internet safety
Netiquette & internet safetyNetiquette & internet safety
Netiquette & internet safetyjorditrg
 

What's hot (20)

Online safety 2011
Online safety 2011Online safety 2011
Online safety 2011
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Cyberbullying - March 2, 2010
Cyberbullying - March 2, 2010Cyberbullying - March 2, 2010
Cyberbullying - March 2, 2010
 
6 mm cyberbullying
6 mm cyberbullying6 mm cyberbullying
6 mm cyberbullying
 
6 mm cyberbullying
6 mm cyberbullying6 mm cyberbullying
6 mm cyberbullying
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meeting
 
Internet safety for kids
Internet safety for kidsInternet safety for kids
Internet safety for kids
 
Social justice
Social justiceSocial justice
Social justice
 
Final cyberbullying
Final cyberbullyingFinal cyberbullying
Final cyberbullying
 
Final cyberbullying1
Final cyberbullying1Final cyberbullying1
Final cyberbullying1
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
 
Quiz4
Quiz4Quiz4
Quiz4
 
Internet security for parents
Internet security for parentsInternet security for parents
Internet security for parents
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Lesson 1 maintaining internet safety(unit 1)
Lesson 1    maintaining internet safety(unit 1)Lesson 1    maintaining internet safety(unit 1)
Lesson 1 maintaining internet safety(unit 1)
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Netiquette & internet safety
Netiquette & internet safetyNetiquette & internet safety
Netiquette & internet safety
 
Social Media and The Law
Social Media and The LawSocial Media and The Law
Social Media and The Law
 

Similar to Parents and Online technologies - what the youth panel think about internet

Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 ParentsIwith.org
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online SafetyDonna Murray
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
JSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship DiscussionJSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship DiscussionOCHS Librarian
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentationrenumann
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Larry Magid
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipnhokanson
 
Your Privacy & Security on the Web
Your Privacy & Security on the WebYour Privacy & Security on the Web
Your Privacy & Security on the Webankitgadgil
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010paul
 
Nicki Karet & Alison Preston
Nicki Karet & Alison PrestonNicki Karet & Alison Preston
Nicki Karet & Alison PrestonMRS
 
Confronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and ExploitationConfronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and Exploitationmckenln
 
Changing World, Changing Demands
Changing World, Changing DemandsChanging World, Changing Demands
Changing World, Changing Demandskjellwr4
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 

Similar to Parents and Online technologies - what the youth panel think about internet (20)

Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 Parents
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
Solid foundation Media workshop Social Media and You (june 2012)
Solid foundation Media workshop   Social Media and You (june 2012)Solid foundation Media workshop   Social Media and You (june 2012)
Solid foundation Media workshop Social Media and You (june 2012)
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
JSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship DiscussionJSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship Discussion
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentation
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Your Privacy & Security on the Web
Your Privacy & Security on the WebYour Privacy & Security on the Web
Your Privacy & Security on the Web
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010
 
Nicki Karet & Alison Preston
Nicki Karet & Alison PrestonNicki Karet & Alison Preston
Nicki Karet & Alison Preston
 
Confronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and ExploitationConfronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and Exploitation
 
Changing World, Changing Demands
Changing World, Changing DemandsChanging World, Changing Demands
Changing World, Changing Demands
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 

More from Safer Internet Forum 2010 (European Commission)

More from Safer Internet Forum 2010 (European Commission) (18)

Privacy pictograms (Gabriela Bodea)
Privacy pictograms   (Gabriela Bodea)Privacy pictograms   (Gabriela Bodea)
Privacy pictograms (Gabriela Bodea)
 
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
 
The European Online Grooming Project - Preliminary Findings (Julia Davidson)
The European Online Grooming Project - Preliminary Findings (Julia Davidson)The European Online Grooming Project - Preliminary Findings (Julia Davidson)
The European Online Grooming Project - Preliminary Findings (Julia Davidson)
 
Parents and online technologies: Communicating to youth (Francisco J. Pérez L...
Parents and online technologies: Communicating to youth (Francisco J. Pérez L...Parents and online technologies: Communicating to youth (Francisco J. Pérez L...
Parents and online technologies: Communicating to youth (Francisco J. Pérez L...
 
Parents and online technologies - Raising awareness of Parents - Illiterate P...
Parents and online technologies - Raising awareness of Parents - Illiterate P...Parents and online technologies - Raising awareness of Parents - Illiterate P...
Parents and online technologies - Raising awareness of Parents - Illiterate P...
 
Skyrock (Jérôme JA. Aguesse)
Skyrock (Jérôme JA. Aguesse)Skyrock (Jérôme JA. Aguesse)
Skyrock (Jérôme JA. Aguesse)
 
Parents and online technologies: Empowering Parents in the Digital Age (Anne ...
Parents and online technologies: Empowering Parents in the Digital Age (Anne ...Parents and online technologies: Empowering Parents in the Digital Age (Anne ...
Parents and online technologies: Empowering Parents in the Digital Age (Anne ...
 
Online games: Computer Games and Learning (Daniel Schwarz)
Online games: Computer Games and Learning (Daniel Schwarz)Online games: Computer Games and Learning (Daniel Schwarz)
Online games: Computer Games and Learning (Daniel Schwarz)
 
Gouden @penstaart (Marjolijn Bonthuis)
Gouden @penstaart (Marjolijn Bonthuis)Gouden @penstaart (Marjolijn Bonthuis)
Gouden @penstaart (Marjolijn Bonthuis)
 
How do youngsters choose to sign up to a social networking site? What is behi...
How do youngsters choose to sign up to a social networking site? What is behi...How do youngsters choose to sign up to a social networking site? What is behi...
How do youngsters choose to sign up to a social networking site? What is behi...
 
Access to social networks (Bernhard Jungwirth)
Access to social networks (Bernhard Jungwirth)Access to social networks (Bernhard Jungwirth)
Access to social networks (Bernhard Jungwirth)
 
Habbo Hotel
Habbo HotelHabbo Hotel
Habbo Hotel
 
Going Viral (Pedro de Bruyckere)
Going Viral (Pedro de Bruyckere)Going Viral (Pedro de Bruyckere)
Going Viral (Pedro de Bruyckere)
 
Parents and online technologies: Parental Awareness of Youth Online Behaviors...
Parents and online technologies: Parental Awareness of Youth Online Behaviors...Parents and online technologies: Parental Awareness of Youth Online Behaviors...
Parents and online technologies: Parental Awareness of Youth Online Behaviors...
 
Social networks online – toward a digital “Contrat social”? (Georgi Apostolov)
Social networks online – toward a digital “Contrat social”? (Georgi Apostolov)Social networks online – toward a digital “Contrat social”? (Georgi Apostolov)
Social networks online – toward a digital “Contrat social”? (Georgi Apostolov)
 
Results from the 1st assessment of the Social Networking Principles for the E...
Results from the 1st assessment of the Social Networking Principles for the E...Results from the 1st assessment of the Social Networking Principles for the E...
Results from the 1st assessment of the Social Networking Principles for the E...
 
EU Kids Online results on SNS (Elisabeth Staksrud)
EU Kids Online results on SNS (Elisabeth Staksrud)EU Kids Online results on SNS (Elisabeth Staksrud)
EU Kids Online results on SNS (Elisabeth Staksrud)
 
Online games: Awareness activities on Virtual Worlds (Protegeles)
Online games: Awareness activities on Virtual Worlds (Protegeles)Online games: Awareness activities on Virtual Worlds (Protegeles)
Online games: Awareness activities on Virtual Worlds (Protegeles)
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Parents and Online technologies - what the youth panel think about internet

Editor's Notes

  1. Internet is a very big place for information and the great thing is that it‘s made from its content so everyone can contribute. But anyone can also destroy it too. The main idea is that the internet is evolving all the time like for example stock exchange market and like stock exchange market it can get into better or worse situation.
  2. If we want to describe and predict the evolution of the internet, we should focus on its users. The majority of the internet users comes through these stages. At first the user learns how to use the internet and discovers all its features. Then the user realizes that it‘s a handy thing and tries to incorporate it somehow into his everyday life. After getting some experience with the internet the user tries to create some content for others mostly about his interests and favorite stuff. And only some of the users realize all the risks, threats and dangers and try to somehow control or restrict them. Maybe you‘re wondering, how can this be a loop. As I‘ve said, the internet is always evolving – even now, so there‘s always something new to discover and use.
  3. Internet has a cool feature – anonymity. Everyone is able to identify himself with a name of his choice. That brings some good things and bad things. No one can be sure of your identity unless he knows you already. And if your identity is concealed, your privacy gets protected. The bad thing about this is that if someone tries to misuse this and impersonate someone else or commits a crime online, no one except the internet service provider can track him down.
  4. When we are online, we can experience some risks somehow related to the things I‘ve already mentioned. Criminals seek most often people, who are new to the cyberspace environment and haven‘t built up any experience yet. The stolen information is mostly used to commit real-world crimes like for example robberies. Such people are more vulnerable to the risks and behave more predictably.
  5. To counter fight these risks, more and more online services are introducing privacy control features. These features should limit the automatic information giveaway only to the level, which is set by the user. But here is the problem: Some users do not know of such feature or do not know, how to properly use it. If the privacy control features worked on 100%, the information giveaway would be reduced only to the aware giveaway. It‘s still true, that we should double consider posting anything online – once we‘ve done it, there‘s no way to stop its spreading among people. And many people found handy the grandmother rule: „Post online anything, you‘d say to your grandmother“ And the last thing is to adjust our privacy to match the street concept. When you are walking along the street, other people can see your face, maybe guess your gender or age, but that‘s about it. You wouldn‘t tell them your address or what you are doing or feeling at the moment.
  6. So these are the basics of internet security. Education, building up some experience and considering everything twice before actually doing it. Maybe I‘ve convinced you that internet is only full of the risks. Let me say the truth: It‘s not – you just have to be cautious and use the common sense to prevent the bad guys in cheating you.
  7. I think that we shouldn‘t get paranoid about our security but we shouldn‘t be ignorant too. We should balance somewhere between. I‘ve spoken here about people harming other people using the internet. What I haven‘t mentioned is that the internet can harm you by itself – for example in form of addiction.
  8. Now I think the point has been made. The only question is: how to get the information to the people, who need it? I think that the most perspective way of delivery is through the youngsters. Make them aware and let them make their friends aware and friends of those friends and so on.
  9. OK, thank you for your attention… Are there any questions?