SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Everything I know about protecting children I learned from a visit to Nairobi National Park Larry Magid Co-director ConnectSafely.org larry@connectsafely.org Photos taken by Larry Magid in Nairobi Nat’l Park on Sept 24, 2011
Some children need to be rescued or protected
But all children …
Need to be nurtured
Encouraged to nurture themselves
To present themselves properly
Pay attention to what’s around them
Get support from peers
To stand tall
And allowed to be free
We are in the midst of a global information & social revolution, led by youth
Of course there are risks in life, so…
Who can best protect youth? Government? Law enforcement? Parents?
Or young people themselves?
4 Types of Online Safety Physical safety – freedom from physical harm Psychological safety – freedom from cruelty, harassment, and exposure to potentially disturbing material  Reputational and legal safety – freedom from unwanted social, academic, professional, and legal consequences that could affect you for a lifetime  Identity, property, and community safety – freedom 		from theft of identity & property Items 1 through 3 are from Anne Collier’s NetFamilyNews
The ‘Net effect’ For the most part,the online world is pretty much like the “real world,” but there are a few special things to think about It can be permanent Material can be copied and pasted Lots of people can see it You don’t know for sure who’s seeing it AND Disinhibition: Lack of visual cues reducesempathy Source: adapted from danahboyd: Taken out of Context, 2008
Elements of Online Safety 3.0 Make Net safety relevant to youth in the context of how they use social media, learn, and live their lives.  View youth as participants and stakeholders in positive Internet use rather than potential victims, and empower them to protect themselves. Promote good citizenship Teach new media literacy Understand the value of informal learning Be accurate and honest about risks Encourage industry to engage in best practices, including promoting good citizenship in the communities they run os3.ConnectSafely.org
Fences have their place but … To keep kids safe around all water, we teach kids to swim
Ultimately, the best filter runs between the child’s ears, not on a device Protection that lasts a lifetime Training wheels for young kids
Putting risks into perspective ,[object Object]
Fear messaging & exaggerating risk can backfire
Fear paralyzes & can lead to irrational decisionsIllustration: CustumeHum.com (Creative Commons License)
Building resilience through digital skills Encouraging children to do more online will improve their digital skill set.  Teaching safety skills is likely to improve other skills, while teaching instrumental and informational skills will also improve safety skills.  Inequalities in digital skills persist – in terms of SES, age and, to a lesser degree, gender. So efforts to overcome these are needed.  Low skills among younger children are a priority for teachers and parents, as ever younger children go online
Predator panic ,[object Object]
But the risk was highly exaggerated
Media and politicians confused “unwanted sexual solicitation” with predationIllustration: CustumeHum.com (Creative Commons License)
The rise of the web in the U.S. has not resulted in increased victimization of children 51% Decline (during the period of the Web’s existence) Blue line represents 58% decline in child sex abuse from 1992 to 2008 Source: Updated Trends in Child Maltreatment, 2008: Finkelhor, Jones and Shattuck: Crimes Against Children Research Center
Moving right along The Internet Safety Technical Task Force found that: “Bullying and harassment, most often by peers, are the most salient threats that minors face, both online and offline.”  Which naturally leads to ….
Cyberbullying Panic! “85% of  12 and 13 year-olds have had experience with cyberbullying,” according to one claim
Most children are neither victims nor monsters ,[object Object]
While some are very vulnerable, most children are reasonably resilient.

Weitere ähnliche Inhalte

Was ist angesagt?

How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safetyConnectSafely
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)amalgarn
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010paul
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymegbg
 
Online safety Ofsted 2015
Online safety Ofsted 2015Online safety Ofsted 2015
Online safety Ofsted 2015bellla33
 
Iowa Bullying Prevention
Iowa Bullying Prevention Iowa Bullying Prevention
Iowa Bullying Prevention emilyensign
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
A (very) brief history of US Internet safety
A (very) brief history of US Internet safetyA (very) brief history of US Internet safety
A (very) brief history of US Internet safetyAnne Collier
 
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop PresentationLydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop PresentationLydia Smith-Davis
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?Sarah Welstead
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and ChldrenJoe Drumgoole
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for ParentsRodolfo Salazar
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship RedefinedConnectSafely
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SBbrawl1sl
 

Was ist angesagt? (20)

How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Online safety Ofsted 2015
Online safety Ofsted 2015Online safety Ofsted 2015
Online safety Ofsted 2015
 
Iowa Bullying Prevention
Iowa Bullying Prevention Iowa Bullying Prevention
Iowa Bullying Prevention
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
A (very) brief history of US Internet safety
A (very) brief history of US Internet safetyA (very) brief history of US Internet safety
A (very) brief history of US Internet safety
 
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop PresentationLydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
Teens and social media
Teens and social mediaTeens and social media
Teens and social media
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SB
 

Ähnlich wie How Children Can Protect Themselves Online

Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)Sumaiya Ismail
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online SafetyDonna Murray
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, brieflyConnectSafely
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, brieflyAnne Collier
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and schoolGrant Ward
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
 
Strategies for Teaching Internet Safety and Responsible Use
Strategies for Teaching Internet Safety and Responsible Use Strategies for Teaching Internet Safety and Responsible Use
Strategies for Teaching Internet Safety and Responsible Use Ollie Bray
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 

Ähnlich wie How Children Can Protect Themselves Online (20)

NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Pgce e safety 2016
Pgce e safety 2016Pgce e safety 2016
Pgce e safety 2016
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
 
Strategies for Teaching Internet Safety and Responsible Use
Strategies for Teaching Internet Safety and Responsible Use Strategies for Teaching Internet Safety and Responsible Use
Strategies for Teaching Internet Safety and Responsible Use
 
Web safety
Web safetyWeb safety
Web safety
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 

Kürzlich hochgeladen

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

How Children Can Protect Themselves Online

  • 1. Everything I know about protecting children I learned from a visit to Nairobi National Park Larry Magid Co-director ConnectSafely.org larry@connectsafely.org Photos taken by Larry Magid in Nairobi Nat’l Park on Sept 24, 2011
  • 2. Some children need to be rescued or protected
  • 4. Need to be nurtured
  • 7. Pay attention to what’s around them
  • 10. And allowed to be free
  • 11. We are in the midst of a global information & social revolution, led by youth
  • 12. Of course there are risks in life, so…
  • 13. Who can best protect youth? Government? Law enforcement? Parents?
  • 14. Or young people themselves?
  • 15. 4 Types of Online Safety Physical safety – freedom from physical harm Psychological safety – freedom from cruelty, harassment, and exposure to potentially disturbing material Reputational and legal safety – freedom from unwanted social, academic, professional, and legal consequences that could affect you for a lifetime Identity, property, and community safety – freedom from theft of identity & property Items 1 through 3 are from Anne Collier’s NetFamilyNews
  • 16. The ‘Net effect’ For the most part,the online world is pretty much like the “real world,” but there are a few special things to think about It can be permanent Material can be copied and pasted Lots of people can see it You don’t know for sure who’s seeing it AND Disinhibition: Lack of visual cues reducesempathy Source: adapted from danahboyd: Taken out of Context, 2008
  • 17. Elements of Online Safety 3.0 Make Net safety relevant to youth in the context of how they use social media, learn, and live their lives. View youth as participants and stakeholders in positive Internet use rather than potential victims, and empower them to protect themselves. Promote good citizenship Teach new media literacy Understand the value of informal learning Be accurate and honest about risks Encourage industry to engage in best practices, including promoting good citizenship in the communities they run os3.ConnectSafely.org
  • 18. Fences have their place but … To keep kids safe around all water, we teach kids to swim
  • 19. Ultimately, the best filter runs between the child’s ears, not on a device Protection that lasts a lifetime Training wheels for young kids
  • 20.
  • 21. Fear messaging & exaggerating risk can backfire
  • 22. Fear paralyzes & can lead to irrational decisionsIllustration: CustumeHum.com (Creative Commons License)
  • 23. Building resilience through digital skills Encouraging children to do more online will improve their digital skill set. Teaching safety skills is likely to improve other skills, while teaching instrumental and informational skills will also improve safety skills. Inequalities in digital skills persist – in terms of SES, age and, to a lesser degree, gender. So efforts to overcome these are needed. Low skills among younger children are a priority for teachers and parents, as ever younger children go online
  • 24.
  • 25. But the risk was highly exaggerated
  • 26. Media and politicians confused “unwanted sexual solicitation” with predationIllustration: CustumeHum.com (Creative Commons License)
  • 27. The rise of the web in the U.S. has not resulted in increased victimization of children 51% Decline (during the period of the Web’s existence) Blue line represents 58% decline in child sex abuse from 1992 to 2008 Source: Updated Trends in Child Maltreatment, 2008: Finkelhor, Jones and Shattuck: Crimes Against Children Research Center
  • 28. Moving right along The Internet Safety Technical Task Force found that: “Bullying and harassment, most often by peers, are the most salient threats that minors face, both online and offline.”  Which naturally leads to ….
  • 29. Cyberbullying Panic! “85% of 12 and 13 year-olds have had experience with cyberbullying,” according to one claim
  • 30.
  • 31. While some are very vulnerable, most children are reasonably resilient.
  • 32. Across Europe, 6% of 9 to 16-year-old internet users have been bullied online. 3% confess to having bullied others. *
  • 33. Far more have been bullied offline, with 19 per cent saying they have been bullied at all – and 12 per cent have bullied someone else** EU Kids Online
  • 34. How you treat others affects your risk “Among those who do not bully others, being bullied is relatively rare 8% offline only, and 4% online”* “Youth who engage in online aggressive behavior by making rude or nasty comments or frequently embarrassing others are more than twice as likely to report online interpersonal victimization.” + * EU Kids Online +Internet Safety Technology Taskforce
  • 35.
  • 36. If people think their friends don’t smoke, they’re less likely to smoke.
  • 37. Same is true with over-eating, excessive alcohol use and other negative behaviors, including bullying**Assessing Bullying in New Jersey Secondary Schools: Applying the Social Norms Model to Adolescent Violence: Craig, Perkins 2008
  • 38. Example of positive norming Source: Assessing Bullying in New Jersey Secondary Schools: Applying the Social Norms Model to Adolescent Violence: Craig, Perkins 2008
  • 40. Thank you! Larry Magid larry@connectsafely.org os3.connectsafely.org

Hinweis der Redaktion

  1. ONLINE SAFETY CAN’T BE ONE-SIZE FITS ALL FOR MANY REASONS.... because the Web is huge and diverse and its use is highly individual, just as people’s lives are.. ...but also because there are many types of safety or well-being online and offline. In fact, online wellbeing, set in the context of what it’s FOR – full, constructive engagement in participatory culture & democracy – is more appropriately considered in terms of rights and freedoms: SO HERE ARE THE FORMS OF SAFETY WE ALL DESERVE:Physical is essential but not the all of it (playground metaphor).Psychological – we want them to have this freedom online just as much as we’ve always sought it for them offline, and their behavior is a factor in their well-being. Reputational and legal – we have a lot of work to do to develop awareness in this area, since users themselves are key to maintaining this freedom for themselves.Identity, property, and community – imposter profiles are a big one; we need to teach youth not only to protect their privacy & property but also their identity (first and foremost by protecting their passwords and not falling prey to manipulation, social engineering - like phishing scams).
  2. Putting up a fence might keep a kid away from a specific swimming pool but teaching them to swim protects them around all water and helps them enjoy the water as well.
  3. From 1990 to 2005 – the period of time that the Web was born and grew most rapidly – there was a 51% decline in overall child sexual – the chart’s showing that: out of every 10,000 US minors, 23 were abused, with that no. going down to 11 in 2005.UPDATE: 58% decline thru 2008, latest figure available (reported by CCRC here “Updated Trends in Child Maltreatment, 2008” <http://www.unh.edu/ccrc/pdf/CV203_Updated%20Trends%20in%20Child%20Maltreatment%202008_8-6-10.pdf>)NCANDS = National Data Archives on Child Abuse & Neglect