SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Do fear and exaggeration increase risk?




              Larry Magid
            (not pictured above)
        Co-director, ConnectSafely.org
           Founder, SafeKids.com
          larry@ConnectSafely.org
Franklin Delano Roosevelt was right


            “The only thing we have
            to fear is fear itself.”
After 9/11, flying was “dangerous”

So people drove more and deaths per
passenger mile went up
Some parents fear inoculations
Which means fewer kids are protected
against preventable diseases
And sometimes fear can lead to
questionable invasive procedures
Some panicked over:
•   Y2K
•   Killer bees
•   Swine flu
•   Stranger danger
•   Stock market “crash”
•   Al Qaeda and nuclear weapons in Iraq
•   Unemployment
•   Not enough people to fill available jobs
•   Inflation
•   Deflation
•   Obama getting elected
•   McCain getting elected
And, of course
But fear can also be protective
“You should not try to scare people into
             healthy practices”
“In 50 years of research, many different theories have been
developed to explain the inconsistent results with respect to
the effects (or lack of effects) of fear appeals, but in general
health communicators have assumed for a long time that
“you should not try to scare people into healthy practices,
including smoking prevention and cessation.”

(Hill, Chapman, Donovan, 1998).
http://www.thcu.ca/infoandresources/publications/
fear%20appeals%20-%20web%20version.pdf
If it’s not credible & actionable, people
                  don’t respond
“According to EPPM*, how people respond to fear
appeals depends on their assessment of the threat and
their perceived efficacy. When assessing threat, the
audience considers severity, or the seriousness of it, as
well as their susceptibility, or the likelihood that it will
happen to them.”

*Extended Parallel Process Model

Based on research from Kim White @ Michigan State
http://www.thcu.ca/infoandresources/publications/fear%20appeals%2
0-%20web%20version.pdf
Boomerang effect
If the perception of threat exceeds perception of
efficacy…
• They will avoid the message
• Deny they are at risk
• Mock the message or become angry at the source or
    issue (and ignore it).
• They may even increase their unhealthy behaviors
    (boomerang effect).
Danger control
• When perceived threat is low, the audience does not
  worry about efficacy and so they do not respond
• When perceived threat is high and perceived efficacy is
  low(er), the result is avoidance, denial or anger towards
  the source or issue (fear control)
• When perceived threat is high and perceived efficacy is
  higher, the recommended behavior is adopted (danger
  control)

Based on research from Kim White @ Michigan State
http://www.thcu.ca/infoandresources/publications/fear%20appeals%20-
%20web%20version.pdf
The DARE experience
• DARE classes were no less likely to have smoked marijuana or
  cigarettes, drunk alcohol, used "illicit" drugs like cocaine or heroin, or
  caved in to peer pressure than kids who’d never been exposed to DARE.
• Its panic-level assertions that "drug abuse is everywhere." Kids don’t
  respond well to hyperbole, and both the "Just Say No" message and the
  hysteria implied in the anti-drug rhetoric were pushing students away.
• It’s also possible, some researchers speculate, that by making drugs seem
  more prevalent, or "normal" than they actually are, the DARE program
  might actually push kids who are anxious to fit in towards drugs.

Time Magazine:
http://www.time.com/time/nation/article/0,8599,99564,00.html#ixzz1W0XkvmW1DD
DARE to keep kids away from candy
• My 6-year old daughter was afraid of Walgreens because it
  sold “drugs”

• Besides, kids her age weren’t at risk of drugs – the biggest risk
  in their lives was candy and junk food

Source: My wife Patti Regehr
Fear can paralyze
And lead to irrational decisions
Predator Panic of 2004-2006
The rise of the web has not resulted in increased
              victimization of children


                                                                          51% Decline
                                                                          (during the period of the
                                                                          Web’s existence)




           Blue line represents 58% decline in child sex abuse from
           1992 to 2008
Source: Updated Trends in Child Maltreatment, 2008: Finkelhor, Jones and Shattuck: Crimes Against
Children Research Center
Moving right along
The Internet Safety Technical Task Force found that:

“Bullying and harassment, most often by peers, are the
most salient threats that minors face, both online and
offline.”

Which naturally leads to ….
Cyberbullying Panic!
It’s a problem, not an epidemic
                  Data is not consistent but the consensus is that
                   about 20% of kids experienced cyberbullying




Chart: Cox Communications Teen Online & Wireless Safety Survey
Be careful about “bullycide”
  •   Suicide experts say there is
      rarely one single reason why a
      person takes his or her life
  •   Dramatizing or glorifying suicide
      can actually lead to copycat
      suicides.
  •   Be aware of suicide media
      guidelines
Most children are neither victims nor
                      monsters
                     • Not every interaction that makes kids
                       uncomfortable is bullying
                     • While some are very vulnerable,
                       most children are reasonably
                       resilient.
                     • Across Europe, 6% of 9 to 16-year-old
                       internet users have been bullied
                       online. 3% confess to having bullied
                       others. *
                     • Far more have been bullied offline,
                       with 19 per cent saying they have
                       been bullied at all – and 12 per cent
                       have bullied someone else*

* EU Kids Online
And bullying is going down, not up

  “The percentage of youth (2-17) reporting physical
  bullying in the past year went down from 22 percent
  to 15 percent between 2003 and 2008.”

  Source: Trends in Childhood Violence and Abuse Exposure ..
  Finkelhor, et al)
Sexting Panic
A 2008 survey found that 20% of teens sent a ‘sext’




 Which led to stories like this:
But a 2011 study found
                   •     1.3% sent an image where they
                         showed breasts, genitals or
                         someone’s bottom

                   •     2.5% sent an image where they
                         were nude or partially nude



Source: Crimes Against Children Research Center, Dec , 2011
Danger of exaggeration

• Can destroy credibility
• Can cause “boomerang effect”
• Can cause people to believe that behaviors are
  “normal”
Social norms approach
            • People emulate how they think their peers
              behave
            • If people think their friends don’t smoke,
              they’re less likely to smoke.
            • Same is true with over-eating, excessive
              alcohol use and other negative behaviors,
              including bullying*




*Assessing Bullying in New Jersey Secondary Schools: Applying the Social
Norms Model to Adolescent Violence: Craig, Perkins 2008
Alternative to fear messaging
“Social-norms marketing campaigns have emerged
as an alternative to more traditional approaches
(e.g., information campaigns, moral exhortation,
fear inducing messages) designed to reduce
undesirable conduct.”

Donaldson, Graham, Piccinin, & Hansen, 1995
http://www.csom.umn.edu/assets/118375.pdf
Emphasize the positive

• People, especially youth, can benefit from
  positive images and role models
• Creating a culture of respect actually can lead
  to respect
• Respectful behavior truly is normal. Most kids
  do not bully
Examples of positive norming




Source: Assessing Bullying in New Jersey Secondary Schools: Applying the Social Norms
Model to Adolescent Violence: Craig, Perkins 2008
Thanks
       Larry Magid
Co-director, ConnectSafely.org
   Founder, SafeKids.com
  larry@ConnectSafely.org

Weitere ähnliche Inhalte

Was ist angesagt?

A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safetyConnectSafely
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for ParentsRodolfo Salazar
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?Sarah Welstead
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big ProblemGail Rebuck
 
Cyberbulling
CyberbullingCyberbulling
Cyberbullingeliasfiad
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingQuirky Kid
 
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakRaising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakBex Lewis
 

Was ist angesagt? (20)

A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
Web safety
Web safetyWeb safety
Web safety
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Olmv cyberbullying
Olmv cyberbullyingOlmv cyberbullying
Olmv cyberbullying
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big Problem
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbulling
CyberbullingCyberbulling
Cyberbulling
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakRaising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Andere mochten auch

10 Steps to Get Beyond Fear
10 Steps to Get Beyond Fear10 Steps to Get Beyond Fear
10 Steps to Get Beyond FearHarish
 
PNAIS 2011 Breakout Session on Bullying and Bias
PNAIS 2011 Breakout Session on Bullying and BiasPNAIS 2011 Breakout Session on Bullying and Bias
PNAIS 2011 Breakout Session on Bullying and BiasRosetta Eun Ryong Lee
 
Parenting in the Digital World 2012-Multicare
Parenting in the Digital World 2012-MulticareParenting in the Digital World 2012-Multicare
Parenting in the Digital World 2012-MulticareHolly Gerla
 
9 questions to stop making you feel like a failure!
9 questions to stop making you feel like a failure!9 questions to stop making you feel like a failure!
9 questions to stop making you feel like a failure!Inspire99
 
How to Overcome Fear to Get What You Want
How to Overcome Fear to Get What You WantHow to Overcome Fear to Get What You Want
How to Overcome Fear to Get What You Wantnoah kagan
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Fear Driven Development
Fear Driven DevelopmentFear Driven Development
Fear Driven DevelopmentRyan Kennedy
 
How to overcome fear
How to overcome fearHow to overcome fear
How to overcome fearInspire99
 
How To Overcome Fear Of Failure – Self Confidence Tips
How To Overcome Fear Of Failure – Self Confidence TipsHow To Overcome Fear Of Failure – Self Confidence Tips
How To Overcome Fear Of Failure – Self Confidence TipsVKool Magazine - VKool.com
 

Andere mochten auch (12)

10 Steps to Get Beyond Fear
10 Steps to Get Beyond Fear10 Steps to Get Beyond Fear
10 Steps to Get Beyond Fear
 
HOW TO OVERCOME FEAR
HOW TO OVERCOME FEARHOW TO OVERCOME FEAR
HOW TO OVERCOME FEAR
 
Fear.Ppt%
Fear.Ppt%Fear.Ppt%
Fear.Ppt%
 
PNAIS 2011 Breakout Session on Bullying and Bias
PNAIS 2011 Breakout Session on Bullying and BiasPNAIS 2011 Breakout Session on Bullying and Bias
PNAIS 2011 Breakout Session on Bullying and Bias
 
Parenting in the Digital World 2012-Multicare
Parenting in the Digital World 2012-MulticareParenting in the Digital World 2012-Multicare
Parenting in the Digital World 2012-Multicare
 
9 questions to stop making you feel like a failure!
9 questions to stop making you feel like a failure!9 questions to stop making you feel like a failure!
9 questions to stop making you feel like a failure!
 
Nlp 113
Nlp 113Nlp 113
Nlp 113
 
How to Overcome Fear to Get What You Want
How to Overcome Fear to Get What You WantHow to Overcome Fear to Get What You Want
How to Overcome Fear to Get What You Want
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Fear Driven Development
Fear Driven DevelopmentFear Driven Development
Fear Driven Development
 
How to overcome fear
How to overcome fearHow to overcome fear
How to overcome fear
 
How To Overcome Fear Of Failure – Self Confidence Tips
How To Overcome Fear Of Failure – Self Confidence TipsHow To Overcome Fear Of Failure – Self Confidence Tips
How To Overcome Fear Of Failure – Self Confidence Tips
 

Ähnlich wie Do fear and exaggeration increase risk?

Safe kids – connected to web 2
Safe kids – connected to web 2Safe kids – connected to web 2
Safe kids – connected to web 2Oliver Mittl
 
The Child’s Psychological Use of the Parent: A Workshop
The Child’s Psychological Use  of the Parent: A Workshop The Child’s Psychological Use  of the Parent: A Workshop
The Child’s Psychological Use of the Parent: A Workshop James Tobin, Ph.D.
 
Running Head JUVENILE PROSTITUTIONJUVENILE PROSTITUTION.docx
Running Head JUVENILE PROSTITUTIONJUVENILE PROSTITUTION.docxRunning Head JUVENILE PROSTITUTIONJUVENILE PROSTITUTION.docx
Running Head JUVENILE PROSTITUTIONJUVENILE PROSTITUTION.docxcowinhelen
 
Inormation Literacy Paper
Inormation Literacy PaperInormation Literacy Paper
Inormation Literacy PaperSeneca Washburn
 
Conceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskConceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskMarcelo Pesallaccia
 
Media use among adolescents, Media influence on adolescents
Media use among adolescents, Media influence on adolescentsMedia use among adolescents, Media influence on adolescents
Media use among adolescents, Media influence on adolescentsLydia Betsy
 
Does the Internet harm children's health? A critical review of the evidence
Does the Internet harm children's health? A critical review of the evidenceDoes the Internet harm children's health? A critical review of the evidence
Does the Internet harm children's health? A critical review of the evidenceMonica Bulger
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...Stevecd
 
Module 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperModule 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperMeghan.V
 

Ähnlich wie Do fear and exaggeration increase risk? (20)

Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Kiane Mari Romero
Kiane Mari RomeroKiane Mari Romero
Kiane Mari Romero
 
Safe kids – connected to web 2
Safe kids – connected to web 2Safe kids – connected to web 2
Safe kids – connected to web 2
 
The Child’s Psychological Use of the Parent: A Workshop
The Child’s Psychological Use  of the Parent: A Workshop The Child’s Psychological Use  of the Parent: A Workshop
The Child’s Psychological Use of the Parent: A Workshop
 
Comparisons of Internet usage characteristics by youth self-reported depressi...
Comparisons of Internet usage characteristics by youth self-reported depressi...Comparisons of Internet usage characteristics by youth self-reported depressi...
Comparisons of Internet usage characteristics by youth self-reported depressi...
 
Running Head JUVENILE PROSTITUTIONJUVENILE PROSTITUTION.docx
Running Head JUVENILE PROSTITUTIONJUVENILE PROSTITUTION.docxRunning Head JUVENILE PROSTITUTIONJUVENILE PROSTITUTION.docx
Running Head JUVENILE PROSTITUTIONJUVENILE PROSTITUTION.docx
 
A comparison of bullying online and offline: Findings from a national survey
A comparison of bullying online and offline: Findings from a national surveyA comparison of bullying online and offline: Findings from a national survey
A comparison of bullying online and offline: Findings from a national survey
 
Inormation Literacy Paper
Inormation Literacy PaperInormation Literacy Paper
Inormation Literacy Paper
 
Conceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskConceptual approaches to adolescent online risk
Conceptual approaches to adolescent online risk
 
Teens and social media
Teens and social mediaTeens and social media
Teens and social media
 
Media use among adolescents, Media influence on adolescents
Media use among adolescents, Media influence on adolescentsMedia use among adolescents, Media influence on adolescents
Media use among adolescents, Media influence on adolescents
 
Intentional exposure to pornography online: Is everybody doing it?
Intentional exposure to pornography online: Is everybody doing it?Intentional exposure to pornography online: Is everybody doing it?
Intentional exposure to pornography online: Is everybody doing it?
 
Cpw webinar 2011-mz
Cpw webinar 2011-mzCpw webinar 2011-mz
Cpw webinar 2011-mz
 
Bullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologiesBullying and harassment in the context of emerging technologies
Bullying and harassment in the context of emerging technologies
 
Cyrenne Madlangsakay
Cyrenne MadlangsakayCyrenne Madlangsakay
Cyrenne Madlangsakay
 
Does the Internet harm children's health? A critical review of the evidence
Does the Internet harm children's health? A critical review of the evidenceDoes the Internet harm children's health? A critical review of the evidence
Does the Internet harm children's health? A critical review of the evidence
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
 
MeCCSA Presentation 2013
MeCCSA Presentation 2013MeCCSA Presentation 2013
MeCCSA Presentation 2013
 
Module 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperModule 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review Paper
 

Kürzlich hochgeladen

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Kürzlich hochgeladen (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Do fear and exaggeration increase risk?

  • 1. Do fear and exaggeration increase risk? Larry Magid (not pictured above) Co-director, ConnectSafely.org Founder, SafeKids.com larry@ConnectSafely.org
  • 2. Franklin Delano Roosevelt was right “The only thing we have to fear is fear itself.”
  • 3. After 9/11, flying was “dangerous” So people drove more and deaths per passenger mile went up
  • 4. Some parents fear inoculations Which means fewer kids are protected against preventable diseases
  • 5. And sometimes fear can lead to questionable invasive procedures
  • 6. Some panicked over: • Y2K • Killer bees • Swine flu • Stranger danger • Stock market “crash” • Al Qaeda and nuclear weapons in Iraq • Unemployment • Not enough people to fill available jobs • Inflation • Deflation • Obama getting elected • McCain getting elected
  • 8. But fear can also be protective
  • 9. “You should not try to scare people into healthy practices” “In 50 years of research, many different theories have been developed to explain the inconsistent results with respect to the effects (or lack of effects) of fear appeals, but in general health communicators have assumed for a long time that “you should not try to scare people into healthy practices, including smoking prevention and cessation.” (Hill, Chapman, Donovan, 1998). http://www.thcu.ca/infoandresources/publications/ fear%20appeals%20-%20web%20version.pdf
  • 10. If it’s not credible & actionable, people don’t respond “According to EPPM*, how people respond to fear appeals depends on their assessment of the threat and their perceived efficacy. When assessing threat, the audience considers severity, or the seriousness of it, as well as their susceptibility, or the likelihood that it will happen to them.” *Extended Parallel Process Model Based on research from Kim White @ Michigan State http://www.thcu.ca/infoandresources/publications/fear%20appeals%2 0-%20web%20version.pdf
  • 11. Boomerang effect If the perception of threat exceeds perception of efficacy… • They will avoid the message • Deny they are at risk • Mock the message or become angry at the source or issue (and ignore it). • They may even increase their unhealthy behaviors (boomerang effect).
  • 12. Danger control • When perceived threat is low, the audience does not worry about efficacy and so they do not respond • When perceived threat is high and perceived efficacy is low(er), the result is avoidance, denial or anger towards the source or issue (fear control) • When perceived threat is high and perceived efficacy is higher, the recommended behavior is adopted (danger control) Based on research from Kim White @ Michigan State http://www.thcu.ca/infoandresources/publications/fear%20appeals%20- %20web%20version.pdf
  • 13. The DARE experience • DARE classes were no less likely to have smoked marijuana or cigarettes, drunk alcohol, used "illicit" drugs like cocaine or heroin, or caved in to peer pressure than kids who’d never been exposed to DARE. • Its panic-level assertions that "drug abuse is everywhere." Kids don’t respond well to hyperbole, and both the "Just Say No" message and the hysteria implied in the anti-drug rhetoric were pushing students away. • It’s also possible, some researchers speculate, that by making drugs seem more prevalent, or "normal" than they actually are, the DARE program might actually push kids who are anxious to fit in towards drugs. Time Magazine: http://www.time.com/time/nation/article/0,8599,99564,00.html#ixzz1W0XkvmW1DD
  • 14. DARE to keep kids away from candy • My 6-year old daughter was afraid of Walgreens because it sold “drugs” • Besides, kids her age weren’t at risk of drugs – the biggest risk in their lives was candy and junk food Source: My wife Patti Regehr
  • 16. And lead to irrational decisions
  • 17. Predator Panic of 2004-2006
  • 18. The rise of the web has not resulted in increased victimization of children 51% Decline (during the period of the Web’s existence) Blue line represents 58% decline in child sex abuse from 1992 to 2008 Source: Updated Trends in Child Maltreatment, 2008: Finkelhor, Jones and Shattuck: Crimes Against Children Research Center
  • 19. Moving right along The Internet Safety Technical Task Force found that: “Bullying and harassment, most often by peers, are the most salient threats that minors face, both online and offline.” Which naturally leads to ….
  • 21. It’s a problem, not an epidemic Data is not consistent but the consensus is that about 20% of kids experienced cyberbullying Chart: Cox Communications Teen Online & Wireless Safety Survey
  • 22. Be careful about “bullycide” • Suicide experts say there is rarely one single reason why a person takes his or her life • Dramatizing or glorifying suicide can actually lead to copycat suicides. • Be aware of suicide media guidelines
  • 23. Most children are neither victims nor monsters • Not every interaction that makes kids uncomfortable is bullying • While some are very vulnerable, most children are reasonably resilient. • Across Europe, 6% of 9 to 16-year-old internet users have been bullied online. 3% confess to having bullied others. * • Far more have been bullied offline, with 19 per cent saying they have been bullied at all – and 12 per cent have bullied someone else* * EU Kids Online
  • 24. And bullying is going down, not up “The percentage of youth (2-17) reporting physical bullying in the past year went down from 22 percent to 15 percent between 2003 and 2008.” Source: Trends in Childhood Violence and Abuse Exposure .. Finkelhor, et al)
  • 25. Sexting Panic A 2008 survey found that 20% of teens sent a ‘sext’ Which led to stories like this:
  • 26. But a 2011 study found • 1.3% sent an image where they showed breasts, genitals or someone’s bottom • 2.5% sent an image where they were nude or partially nude Source: Crimes Against Children Research Center, Dec , 2011
  • 27. Danger of exaggeration • Can destroy credibility • Can cause “boomerang effect” • Can cause people to believe that behaviors are “normal”
  • 28. Social norms approach • People emulate how they think their peers behave • If people think their friends don’t smoke, they’re less likely to smoke. • Same is true with over-eating, excessive alcohol use and other negative behaviors, including bullying* *Assessing Bullying in New Jersey Secondary Schools: Applying the Social Norms Model to Adolescent Violence: Craig, Perkins 2008
  • 29. Alternative to fear messaging “Social-norms marketing campaigns have emerged as an alternative to more traditional approaches (e.g., information campaigns, moral exhortation, fear inducing messages) designed to reduce undesirable conduct.” Donaldson, Graham, Piccinin, & Hansen, 1995 http://www.csom.umn.edu/assets/118375.pdf
  • 30. Emphasize the positive • People, especially youth, can benefit from positive images and role models • Creating a culture of respect actually can lead to respect • Respectful behavior truly is normal. Most kids do not bully
  • 31. Examples of positive norming Source: Assessing Bullying in New Jersey Secondary Schools: Applying the Social Norms Model to Adolescent Violence: Craig, Perkins 2008
  • 32. Thanks Larry Magid Co-director, ConnectSafely.org Founder, SafeKids.com larry@ConnectSafely.org

Hinweis der Redaktion

  1. THERE NEVER HAS BEEN A STUDY ON HOW MUCH CHILDREN ARE SOLICITED BY “PREDATORS.” NOTE THE HEADLINE: “All Children Vulnerable to Online Predators”. IT’S A TRICK QUESTION BECAUSE THE SURVEY WASN’T ABOUT PREDATORS. It was about unwanted sexual solicitations from anybody – flirting is often an unwanted sexual solicitation, as the researchers defined the term. Here’s what the 2000 study this refers to – updated in 2006 with the figure 1 in 7, so the no. of solicitations had gone down – actually said....READ THIS:“Youth identify most sexual solicitors as being other adolescents (48% in 2000; 43% in 2006) or young adults 18-24 (20%; 30%), with few (4%; 9%) coming from older adults, and the remaining being of unknown age.” THE TOTALS: 68% teens & 18-24-year-olds in 2000; 73% in 2006.
  2. From 1990 to 2005 – the period of time that the Web was born and grew most rapidly – there was a 51% decline in overall child sexual – the chart’s showing that: out of every 10,000 US minors, 23 were abused, with that no. going down to 11 in 2005.UPDATE: 58% decline thru 2008, latest figure available (reported by CCRC here “Updated Trends in Child Maltreatment, 2008” <http://www.unh.edu/ccrc/pdf/CV203_Updated%20Trends%20in%20Child%20Maltreatment%202008_8-6-10.pdf>)NCANDS = National Data Archives on Child Abuse & Neglect
  3. THESE ARE ALL IMPORTANT BUT VERY GENERAL – CERTAINLY EACH INCIDENT IS UNIQUE AND NEEDS CARING INDIVIDUAL TREATMENT - a full, nonconfrontational, child-caregiver discussion that looks at the situation’s circumstances. The psychological damage can be considerable – some kids have suicidal thoughts.School counselor I spoke with several years ago would find out all the parties involved, get them in a room, and do bully-victim reverse role-playing (empathy training). In families and schools, some of these incidents can be turned into TEACHABLE MOMENTS (maybe anonymized?) for all parties’ benefit.