SlideShare ist ein Scribd-Unternehmen logo
1 von 162
Vulnerable
YP
and
social
media
–

             who’s
controlling
who
?



                                  MUNCH
                                   PING
                                  POKE!




                        Southampton Solent University
                          Tuesday 4th October 2011

info@katiebacon.co.uk
Introductions
                    Ka#e
Bacon





info@katiebacon.co.uk
Introductions
                    Ka#e
Bacon

                    •Qualified
Youth
Prac##oner





info@katiebacon.co.uk
Introductions
                    Ka#e
Bacon

                    •Qualified
Youth
Prac##oner

                    •10
years
experience
working
with
hard
to

                     reach
young
people
and
their
families.






info@katiebacon.co.uk
Introductions
                    Ka#e
Bacon

                    •Qualified
Youth
Prac##oner

                    •10
years
experience
working
with
hard
to

                     reach
young
people
and
their
families.


                        •Now
an
Independent
Trainer/Consultant




info@katiebacon.co.uk
Introductions
                    Ka#e
Bacon

                    •Qualified
Youth
Prac##oner

                    •10
years
experience
working
with
hard
to

                     reach
young
people
and
their
families.


                        •Now
an
Independent
Trainer/Consultant




info@katiebacon.co.uk
Introductions
                    Ka#e
Bacon

                    •Qualified
Youth
Prac##oner

                    •10
years
experience
working
with
hard
to

                     reach
young
people
and
their
families.


                        •Now
an
Independent
Trainer/Consultant




info@katiebacon.co.uk
Introductions
          Stephen
Carrick‐Davies




info@katiebacon.co.uk
Introductions
          Stephen
Carrick‐Davies
                    •Ten
years
at
Childnet
Interna#onal





info@katiebacon.co.uk
Introductions
          Stephen
Carrick‐Davies
                    •Ten
years
at
Childnet
Interna#onal

                        •Now
an
Independent
Trainer/Consultant




info@katiebacon.co.uk
Introductions
          Stephen
Carrick‐Davies
                    •Ten
years
at
Childnet
Interna#onal

                        •Now
an
Independent
Trainer/Consultant




info@katiebacon.co.uk
What
can
we
cover
this
morning
?





info@katiebacon.co.uk
What
can
we
cover
this
morning
?

 1)
WHY
IS
THIS
SO
IMPORTANT

?




info@katiebacon.co.uk
What
can
we
cover
this
morning
?

 1)
WHY
IS
THIS
SO
IMPORTANT

?

 2)
WHAT
WE
ALREADY
KNOW




info@katiebacon.co.uk
What
can
we
cover
this
morning
?

 1)
WHY
IS
THIS
SO
IMPORTANT

?

 2)
WHAT
WE
ALREADY
KNOW


 3)
KEY
FINDINGS
+
RECOMMENDATIONS




info@katiebacon.co.uk
What
can
we
cover
this
morning
?

 1)
WHY
IS
THIS
SO
IMPORTANT

?

 2)
WHAT
WE
ALREADY
KNOW


 3)
KEY
FINDINGS
+
RECOMMENDATIONS

 4)
ACTION
OPPORTUNITIES

 including
staff
training
needs






info@katiebacon.co.uk
How are young people using
                             hhj
                    social network sites?
                             jkjl




info@katiebacon.co.uk
Platform-hopping




             Digital dimensions of young peoples lives

info@katiebacon.co.uk
Hanging out,


                        Messing about,


                        ‘Geeking’ out.




info@katiebacon.co.uk
NEWS
FEEDS

         APPLICATIONS
     “boast
by
post”     Huge
range
of
apps      PHOTOS/TAGS

                                                 Comment
and
Tag

                                                   photos

face

                                                   recogni#on

    FRIENDS

 Find,
link,
be
in

constant
contact
+
                                 LIVE
CHAT


 on
your
mobile                                   Superseding
IM

                                                    VIDEO

                                                  link
and
embed

MESSAGES

Superseding
E‐mail
       WHO’S
ONLINE           Social
loca#on

Video
coming
          Know
who
is
online
now!
NEWS
FEEDS

           APPLICATIONS
     “boast
by
post”       Huge
range
of
apps       PHOTOS/TAGS

                                                   Comment
and
Tag

                                                     photos

face

                                                     recogni#on

    FRIENDS

 Find,
link,
be
in

constant
contact
+
                                   LIVE
CHAT


 on
your
mobile                                      Superseding
IM

                                                       VIDEO

                                                     link
and
embed

MESSAGES

Superseding
E‐mail
         WHO’S
ONLINE            Social
loca#on

Video
coming
            Know
who
is
online
now!

              ALL
FOR
FREE
……
BUT
….WHAT
PRICE
IS
FREE
?

NEWS
FEEDS

           APPLICATIONS
     “boast
by
post”       Huge
range
of
apps       PHOTOS/TAGS

                                                   Comment
and
Tag

                                                     photos

face

                                                     recogni#on

    FRIENDS

 Find,
link,
be
in

constant
contact
+
                                   LIVE
CHAT


 on
your
mobile                                      Superseding
IM

                                                       VIDEO

                                                     link
and
embed

MESSAGES

Superseding
E‐mail
         WHO’S
ONLINE            Social
loca#on

Video
coming
            Know
who
is
online
now!

              ALL
FOR
FREE
……
BUT
….WHAT
PRICE
IS
FREE
?

Classifying
the
risks
to
children
online





                                     Original 3 Cs Classification by ‘EU Kids’ online project
Classifying
the
risks
to
children
online



CONTENT




CONTACT




CONDUCT





                                     Original 3 Cs Classification by ‘EU Kids’ online project
Classifying
the
risks
to
children
online



CONTENT

Child as Recipient



CONTACT




CONDUCT





                                     Original 3 Cs Classification by ‘EU Kids’ online project
Classifying
the
risks
to
children
online



CONTENT

Child as Recipient



CONTACT

Child as Participant




CONDUCT





                                     Original 3 Cs Classification by ‘EU Kids’ online project
Classifying
the
risks
to
children
online



CONTENT

Child as Recipient



CONTACT

Child as Participant




CONDUCT

Child as Actor




                                     Original 3 Cs Classification by ‘EU Kids’ online project
Classifying
the
risks
to
children
online

                       Commercial
   Aggressive       Sexual
                    Values


CONTENT

Child as Recipient



CONTACT

Child as Participant




CONDUCT

Child as Actor




                                                  Original 3 Cs Classification by ‘EU Kids’ online project
Classifying
the
risks
to
children
online

                       Commercial
     Aggressive       Sexual
                    Values


CONTENT
               Adverts
Child as Recipient     Spam

                      Sponsorship
                       Personal info


CONTACT

Child as Participant




CONDUCT

Child as Actor




                                                    Original 3 Cs Classification by ‘EU Kids’ online project
Classifying
the
risks
to
children
online

                       Commercial
     Aggressive       Sexual
                    Values


CONTENT
               Adverts
Child as Recipient     Spam

                      Sponsorship
                       Personal info


CONTACT
               Tracking
Child as Participant   Harvesting
                       Personal info



CONDUCT

Child as Actor




                                                    Original 3 Cs Classification by ‘EU Kids’ online project
Classifying
the
risks
to
children
online

                       Commercial
        Aggressive       Sexual
                    Values


CONTENT
               Adverts
Child as Recipient     Spam

                      Sponsorship
                       Personal info


CONTACT
               Tracking
Child as Participant   Harvesting
                       Personal info



CONDUCT
               Illegal
Child as Actor
                       downloading
                       Hacking Gambling
                       Financial scams
                       Terrorism



                                                       Original 3 Cs Classification by ‘EU Kids’ online project
Classifying
the
risks
to
children
online

                       Commercial
        Aggressive            Sexual
                    Values


CONTENT
               Adverts            Violent and
Child as Recipient     Spam               hateful content

                      Sponsorship
                       Personal info


CONTACT
               Tracking
Child as Participant   Harvesting
                       Personal info



CONDUCT
               Illegal
Child as Actor
                       downloading
                       Hacking Gambling
                       Financial scams
                       Terrorism



                                                            Original 3 Cs Classification by ‘EU Kids’ online project
Classifying
the
risks
to
children
online

                       Commercial
        Aggressive            Sexual
                    Values


CONTENT
               Adverts            Violent and
Child as Recipient     Spam               hateful content

                      Sponsorship
                       Personal info


CONTACT
               Tracking           Being bullied
Child as Participant   Harvesting         harassed or
                       Personal info      stalked



CONDUCT
               Illegal
Child as Actor
                       downloading
                       Hacking Gambling
                       Financial scams
                       Terrorism



                                                            Original 3 Cs Classification by ‘EU Kids’ online project
Classifying
the
risks
to
children
online

                       Commercial
        Aggressive            Sexual
                    Values


CONTENT
               Adverts            Violent and
Child as Recipient     Spam               hateful content

                      Sponsorship
                       Personal info


CONTACT
               Tracking           Being bullied
Child as Participant   Harvesting         harassed or
                       Personal info      stalked



CONDUCT
               Illegal            Bullying or
Child as Actor
                       downloading        harassing
                       Hacking Gambling   another
                       Financial scams
                       Terrorism



                                                            Original 3 Cs Classification by ‘EU Kids’ online project
Classifying
the
risks
to
children
online

                       Commercial
        Aggressive            Sexual
                    Values


CONTENT
               Adverts            Violent and       Pornographic
Child as Recipient     Spam               hateful content   unwelcome

                      Sponsorship                          sexual content
                       Personal info


CONTACT
               Tracking           Being bullied
Child as Participant   Harvesting         harassed or
                       Personal info      stalked



CONDUCT
               Illegal            Bullying or
Child as Actor
                       downloading        harassing
                       Hacking Gambling   another
                       Financial scams
                       Terrorism



                                                            Original 3 Cs Classification by ‘EU Kids’ online project
Classifying
the
risks
to
children
online

                       Commercial
        Aggressive            Sexual
                    Values


CONTENT
               Adverts            Violent and       Pornographic
Child as Recipient     Spam               hateful content   unwelcome

                      Sponsorship                          sexual content
                       Personal info


CONTACT
               Tracking           Being bullied     Meeting
Child as Participant   Harvesting         harassed or       strangers
                       Personal info      stalked           Being
                                                            groomed


CONDUCT
               Illegal            Bullying or
Child as Actor
                       downloading        harassing
                       Hacking Gambling   another
                       Financial scams
                       Terrorism



                                                            Original 3 Cs Classification by ‘EU Kids’ online project
Classifying
the
risks
to
children
online

                       Commercial
        Aggressive            Sexual
                    Values


CONTENT
               Adverts            Violent and       Pornographic
Child as Recipient     Spam               hateful content   unwelcome

                      Sponsorship                          sexual content
                       Personal info


CONTACT
               Tracking           Being bullied     Meeting
Child as Participant   Harvesting         harassed or       strangers
                       Personal info      stalked           Being
                                                            groomed


CONDUCT
               Illegal            Bullying or       Creating and
Child as Actor
                       downloading        harassing         uploading
                       Hacking Gambling   another           inappropriate
                       Financial scams                      material
                       Terrorism



                                                            Original 3 Cs Classification by ‘EU Kids’ online project
Classifying
the
risks
to
children
online

                       Commercial
        Aggressive            Sexual
                    Values


CONTENT
               Adverts            Violent and       Pornographic                Bias
Child as Recipient     Spam               hateful content   unwelcome                   Racist

                      Sponsorship                          sexual content              Misleading
                       Personal info                                                    info or advice


CONTACT
               Tracking           Being bullied     Meeting
Child as Participant   Harvesting         harassed or       strangers
                       Personal info      stalked           Being
                                                            groomed


CONDUCT
               Illegal            Bullying or       Creating and
Child as Actor
                       downloading        harassing         uploading
                       Hacking Gambling   another           inappropriate
                       Financial scams                      material
                       Terrorism



                                                            Original 3 Cs Classification by ‘EU Kids’ online project
Classifying
the
risks
to
children
online

                       Commercial
        Aggressive            Sexual
                    Values


CONTENT
               Adverts            Violent and       Pornographic                Bias
Child as Recipient     Spam               hateful content   unwelcome                   Racist

                      Sponsorship                          sexual content              Misleading
                       Personal info                                                    info or advice


CONTACT
               Tracking           Being bullied     Meeting                     Self harm
Child as Participant   Harvesting         harassed or       strangers                   Unwelcome
                       Personal info      stalked           Being                       persuasions
                                                            groomed


CONDUCT
               Illegal            Bullying or       Creating and
Child as Actor
                       downloading        harassing         uploading
                       Hacking Gambling   another           inappropriate
                       Financial scams                      material
                       Terrorism



                                                            Original 3 Cs Classification by ‘EU Kids’ online project
Classifying
the
risks
to
children
online

                       Commercial
        Aggressive            Sexual
                    Values


CONTENT
               Adverts            Violent and       Pornographic                Bias
Child as Recipient     Spam               hateful content   unwelcome                   Racist

                      Sponsorship                          sexual content              Misleading
                       Personal info                                                    info or advice


CONTACT
               Tracking           Being bullied     Meeting                     Self harm
Child as Participant   Harvesting         harassed or       strangers                   Unwelcome
                       Personal info      stalked           Being                       persuasions
                                                            groomed


CONDUCT
               Illegal            Bullying or       Creating and                Providing
Child as Actor
                       downloading        harassing         uploading                   misleading
                       Hacking Gambling   another           inappropriate               info/advice
                       Financial scams                      material
                       Terrorism



                                                            Original 3 Cs Classification by ‘EU Kids’ online project
Classifying
the
risks
to
children
online

                       Commercial
        Aggressive            Sexual
                    Values


CONTENT
               Adverts            Violent and       Pornographic                Bias
Child as Recipient     Spam               hateful content   unwelcome                   Racist

                      Sponsorship                          sexual content              Misleading
                       Personal info                                                    info or advice


CONTACT
               Tracking           Being bullied     Meeting                     Self harm
Child as Participant   Harvesting         harassed or       strangers                   Unwelcome
                       Personal info      stalked           Being                       persuasions
                                                            groomed


CONDUCT
               Illegal            Bullying or       Creating and                Providing
Child as Actor
                       downloading        harassing         uploading                   misleading
                       Hacking Gambling   another           inappropriate               info/advice
                       Financial scams                      material
                       Terrorism

 CRIMINAL

                                                            Original 3 Cs Classification by ‘EU Kids’ online project
Classifying
the
risks
to
children
online

                       Commercial
        Aggressive            Sexual
                    Values


CONTENT
               Adverts            Violent and       Pornographic                Bias
Child as Recipient     Spam               hateful content   unwelcome                   Racist

                      Sponsorship                          sexual content              Misleading
                       Personal info                                                    info or advice


CONTACT
               Tracking           Being bullied     Meeting                     Self harm
Child as Participant   Harvesting         harassed or       strangers                   Unwelcome
                       Personal info      stalked           Being                       persuasions
                                                            groomed


CONDUCT
               Illegal            Bullying or       Creating and                Providing
Child as Actor
                       downloading        harassing         uploading                   misleading
                       Hacking Gambling   another           inappropriate               info/advice
                       Financial scams                      material
                       Terrorism

 CRIMINAL
               BEING IN THE WRONG PLACE AT THE WRONG TIME
                                                            Original 3 Cs Classification by ‘EU Kids’ online project
Commercial
   Aggressive     Sexual
        Values


CONTENT
                                 Pornographic
                                         unwelcome
Child
as
                                sexual content

Recipient

CONTACT
                                 Meeting
Child
as
                                strangers
                                         Being
Par#cipant
                              groomed


CONDUCT
                                 Creating and
                                         uploading
Child
as
                                inappropriate
Actor
                                   material
Commercial
   Aggressive     Sexual
        Values


CONTENT
                                 Pornographic
                                         unwelcome
Child
as
                                sexual content

Recipient

CONTACT
                                 Meeting
Child
as
                                strangers
                                         Being
Par#cipant
                              groomed


CONDUCT
                                 Creating and
                                         uploading
Child
as
                                inappropriate
Actor
                                   material
Commercial
    Aggressive     Sexual
        Values


CONTENT
                                  Pornographic
              Online
grooming
is
a
       unwelcome
Child
as
     criminal
offence             sexual content

Recipient

CONTACT
                                  Meeting
Child
as
                                 strangers
                                          Being
Par#cipant
                               groomed


CONDUCT
                                  Creating and
                                          uploading
Child
as
                                 inappropriate
Actor
                                    material
Commercial
         Aggressive     Sexual
        Values


CONTENT
                                       Pornographic
              Online
grooming
is
a
            unwelcome
Child
as
     criminal
offence                  sexual content

Recipient
    Contact

CONTACT
      www.ceop.gov.uk

                Meeting
              if
you
have
concerns

Child
as
     about
inappropriate

                                               strangers
                                               Being
Par#cipant
   communicaWon
from
an

                                               groomed


CONDUCT
      adult
to
a
minor.

                                               Creating and
                                               uploading
Child
as
                                      inappropriate
Actor
                                         material
Commercial
              Aggressive     Sexual
        Values


CONTENT
                                            Pornographic
               Online
grooming
is
a
                unwelcome
Child
as
      criminal
offence                      sexual content

Recipient
     Contact

CONTACT
       www.ceop.gov.uk

                    Meeting
               if
you
have
concerns

Child
as
      about
inappropriate

                                                    strangers
                                                    Being
Par#cipant
    communicaWon
from
an

                                                    groomed


CONDUCT
       adult
to
a
minor.

                                                    Creating and
              “One‐third
of
those
who
              uploading
Child
as
     sexually
abuse
children
are
just
     inappropriate
Actor
        children
themselves.”
              BBC Newsnight programme March 2010
                                                    material
Commercial
              Aggressive     Sexual
        Values


CONTENT
                                            Pornographic
               Online
grooming
is
a
                unwelcome
Child
as
      criminal
offence                      sexual content

Recipient
     Contact

CONTACT
       www.ceop.gov.uk

                    Meeting
               if
you
have
concerns

Child
as
      about
inappropriate

                                                    strangers
                                                    Being
Par#cipant
    communicaWon
from
an

                                                    groomed


CONDUCT
       adult
to
a
minor.

                                                    Creating and
              “One‐third
of
those
who
              uploading
Child
as
     sexually
abuse
children
are
just
     inappropriate
Actor
        children
themselves.”
              BBC Newsnight programme March 2010
                                                    material



              21,630
BEBO
members
have
the
name
“Porn
Star”


“Sex%ng”
=
teens
sharing
nude
photos
via
mobiles
and
web.
The
practice
can

have
serious
legal
and
psychological
consequences



                     Commercial
             Aggressive     Sexual
        Values


 CONTENT
                                                 Pornographic
                     Online
grooming
is
a
                unwelcome
 Child
as
           criminal
offence                      sexual content

 Recipient
          Contact

 CONTACT
            www.ceop.gov.uk

                    Meeting
                     if
you
have
concerns

 Child
as
           about
inappropriate

                                                          strangers
                                                          Being
 Par#cipant
         communicaWon
from
an

                                                          groomed


 CONDUCT
            adult
to
a
minor.

                                                          Creating and
                    “One‐third
of
those
who
              uploading
 Child
as
          sexually
abuse
children
are
just
     inappropriate
 Actor
             children
themselves.”
                    BBC Newsnight programme March 2010
                                                          material



                    21,630
BEBO
members
have
the
name
“Porn
Star”


“Sex%ng”
=
teens
sharing
nude
photos
via
mobiles
and
web.
The
practice
can

have
serious
legal
and
psychological
consequences



                     Commercial
             Aggressive     Sexual
        Values


 CONTENT
                                                 Pornographic
                     Online
grooming
is
a
                unwelcome
 Child
as
           criminal
offence                      sexual content
                                                                            Include
 Recipient
          Contact
                                               this button
                                                                            on your
 CONTACT
            www.ceop.gov.uk

                    Meeting           home
                     if
you
have
concerns
                                  page
 Child
as
           about
inappropriate

                                                          strangers
                                                          Being
 Par#cipant
         communicaWon
from
an

                                                          groomed


 CONDUCT
            adult
to
a
minor.

                                                          Creating and
                    “One‐third
of
those
who
              uploading
 Child
as
          sexually
abuse
children
are
just
     inappropriate
 Actor
             children
themselves.”
                    BBC Newsnight programme March 2010
                                                          material



                    21,630
BEBO
members
have
the
name
“Porn
Star”


Classifying
the
risks
to
children
online

                       Commercial
     Aggressive                     Sexual
                    Values


CONTENT
                               Violent and
Child as Recipient

                                      hateful content




CONTACT
                               Being bullied
Child as Participant                   harassed or
                                       stalked



CONDUCT

Child as Actor                         Bullying or
                                       harassing
                                       another




                                     Classification by ‘EU Kids’ online project and referenced in the Byron Report
Classifying
the
risks
to
children
online

                       Commercial
     Aggressive                     Sexual
                    Values


CONTENT
                               Violent and
Child as Recipient

                                      hateful content



                                                                                22% of yp aged 11-18
CONTACT
                               Being bullied                            report having been
Child as Participant                   harassed or                              cyber bullied.
                                       stalked



CONDUCT

Child as Actor                         Bullying or
                                       harassing
                                       another




                                     Classification by ‘EU Kids’ online project and referenced in the Byron Report
Classifying
the
risks
to
children
online

                       Commercial
     Aggressive                     Sexual
                    Values


CONTENT
                               Violent and
Child as Recipient

                                      hateful content



                                                                                22% of yp aged 11-18
CONTACT
                               Being bullied                            report having been
Child as Participant                   harassed or                              cyber bullied.
                                       stalked
                                                                                It ruins lives.

CONDUCT

Child as Actor                         Bullying or
                                       harassing
                                       another




                                     Classification by ‘EU Kids’ online project and referenced in the Byron Report
Classifying
the
risks
to
children
online

                       Commercial
     Aggressive                     Sexual
                    Values


CONTENT
                               Violent and
Child as Recipient

                                      hateful content



                                                                                22% of yp aged 11-18
CONTACT
                               Being bullied                            report having been
Child as Participant                   harassed or                              cyber bullied.
                                       stalked
                                                                                It ruins lives.

                                                                                YP may not disclose
CONDUCT
                                                                        that it is happening
Child as Actor                         Bullying or
                                       harassing
                                       another




                                     Classification by ‘EU Kids’ online project and referenced in the Byron Report
EU Kids Online Report
                        25,000 children, young people & parents


                          Digital natives know it all.
                          Only 36 per cent of 9-16-year-olds say it is very true that they know more about
                          the internet than their parents. This myth obscures their needs to develop
                          digital skills.



                          Everyone watches porn online.
                          One in seven children saw sexual images online in the past year. Even allowing
                          for under-reporting, this myth has been partly created by media hype.



                           Offline risks migrate online
                           This is not necessarily true. Young people who lead risky offline lives are more
                           likely to expose themselves to danger online, it cannot be assumed that those
                           who are low-risk offline are protected while online.




info@katiebacon.co.uk
info@katiebacon.co.uk
info@katiebacon.co.uk
info@katiebacon.co.uk
What
addi#onal
risks
do

vulnerable
YP
encounter,

and
bring
to
social
media?


                               What
are
the

                                 risks?
What
addi#onal
risks
do

      vulnerable
YP
encounter,

      and
bring
to
social
media?


                                     What
are
the

                                       risks?




What
can
we
learn
from
those

who
are
working
in
this
area
?

What
addi#onal
risks
do

      vulnerable
YP
encounter,

      and
bring
to
social
media?


                                          What
are
the

                                            risks?




What
can
we
learn
from
those
                What
do
staff

who
are
working
in
this
area
?
                need
?




                                     What
training
and
support
do
professionals

                                     need
re
social
media
risk
in
their
prac#ce
?

2)
OVERVIEW
OF
PROJECT
      What
addi#onal
risks
do

      vulnerable
YP
encounter,

      and
bring
to
social
media?


                                          What
are
the

                                            risks?




What
can
we
learn
from
those
                What
do
staff

who
are
working
in
this
area
?
                need
?




                                     What
training
and
support
do
professionals

                                     need
re
social
media
risk
in
their
prac#ce
?

We
have
idenWfied
a
group
who
do
share
many
common
vulnerabiliWes

We
have
idenWfied
a
group
who
do
share
many
common
vulnerabiliWes


  Those
outside
of
school
in
Pupil
Referral
Units
or
NEET
sebngs

We
have
idenWfied
a
group
who
do
share
many
common
vulnerabiliWes


  Those
outside
of
school
in
Pupil
Referral
Units
or
NEET
sebngs


  How are these YP susceptible to risk, abuse, attack, exposure, harm online ?
We
have
idenWfied
a
group
who
do
share
many
common
vulnerabiliWes


  Those
outside
of
school
in
Pupil
Referral
Units
or
NEET
sebngs


  How are these YP susceptible to risk, abuse, attack, exposure, harm online ?




      Recognising of course that there are other vulnerable groups and overlapping issues
We
have
idenWfied
a
group
who
do
share
many
common
vulnerabiliWes


  Those
outside
of
school
in
Pupil
Referral
Units
or
NEET
sebngs


  How are these YP susceptible to risk, abuse, attack, exposure, harm online ?




      Recognising of course that there are other vulnerable groups and overlapping issues


     Special
EducaWon
               Marginalised
groups
                  Looked
acer

          Needs                        in
our
society
                       children

      DisabiliWes
and
or
emoWonal
    System
neglect,
language,
migrant
   “ChaoWc”
family/home

         behavioural
difficulWes                communiWes
etc                   environments
Methodology
A Grounded Theory approach with data taken from:
 Reviews of relevant literature and recent studies


 Focus group interviews with YP (using drama and film to

  build a rapport and engage the group)
 Feedback from professional’s surveys, interviews, site visits

  & workshops
 Researcher's field notes, diaries and reflections
Eight
main
findings
under
4
main
themes
of





info@katiebacon.co.uk
3)
KEY
FINDINGS
+
RECOMMENDATIONS



        Eight
main
findings
under
4
main
themes
of





info@katiebacon.co.uk
info@katiebacon.co.uk
1




info@katiebacon.co.uk
1                     The
task
of
assessing
the
correla#on

                        between
offline
vulnerabili#es
and

                        online
risk
for
certain
groups
of
young

                        people
is
problema#c
but
nevertheless

                        broad
principles
can
be
extrapolated.






info@katiebacon.co.uk
1                     The
task
of
assessing
the
correla#on

                        between
offline
vulnerabili#es
and

                        online
risk
for
certain
groups
of
young

                        people
is
problema#c
but
nevertheless

                        broad
principles
can
be
extrapolated.




      “Many
of
the
young
people
I
work
with
are
massive
risk
takers,
impulsive

      to
the
extreme
and
o>en
use
alcohol
and/or
drugs.
On
average
they
first

      engage
in
sexual
ac%vity
at
a
far
younger
age
than
other
students.
They

      also
have
huge
amounts
of
unsupervised
%me
on
their
hands,
o>en
%ll
very

      late
at
night.
I
teach
many
YP
who
are
half‐asleep
as
they
have
been
online

      %ll
gone
3am.”

PRU
staff
member



info@katiebacon.co.uk
Low self-
                                           Fluid learning
                     confidence.
                                         environment and
                  Identity seen to be
                                         gaps in education
                   part of ‘outsiders’
                                           and induction



                                                               Experience
  Lack of                                                        abusive
 supportive                                                  relationships or
adults in their                                               environments
    lives                                                    including anger



     More                                                  Influences of
unsupervised                                            alcohol, drugs and
  time, fewer                                           gang culture. Risk
structures and                                           takers and at risk
  boundaries
ns
             tio
         n da
       e
      m
  c om
 e
R
ns
             tio
         n da
       e
      m
  c om
 e
R
ns
             tio
         n da
      m
       e                

  c om
R
 e                   Dedicated
staff
working
with
vulnerable
young
in
PRUs
(and

                     elsewhere)
must
be
given
ongoing
support
and
training
to
beger

                     understand
how
young
people
are
harnessing
social
media
and

                     mobile
communicaWon
and
why
it
is
now
the
single
most
important

                     ac%vity
many
vulnerable
young
people
rely
on
to
give
them

                     iden%ty,
connec%on
and
a
sense
of
community.

                     SignposWng
staff
to
the
exisWng
high‐quality,
age‐appropriate
E‐safety

                     resources
and
guidance
is
important.
But
there
is
no
subsWtute
for
high

                     quality
‘hands‐on’
training
so
staff
can
fully
understand

the
language,

                     tools
and

applicaWons
ns
             tio
         n da
      m
       e                

  c om
R
 e                   Dedicated
staff
working
with
vulnerable
young
in
PRUs
(and

                     elsewhere)
must
be
given
ongoing
support
and
training
to
beger

                     understand
how
young
people
are
harnessing
social
media
and

                     mobile
communicaWon
and
why
it
is
now
the
single
most
important

                     ac%vity
many
vulnerable
young
people
rely
on
to
give
them

                     iden%ty,
connec%on
and
a
sense
of
community.

                     SignposWng
staff
to
the
exisWng
high‐quality,
age‐appropriate
E‐safety

                     resources
and
guidance
is
important.
But
there
is
no
subsWtute
for
high

                     quality
‘hands‐on’
training
so
staff
can
fully
understand

the
language,

                     tools
and

applicaWons




                 “I
don’t
use
social
networking
so
probably
understand
less
than

                 my
students.”

                 PRU
staff
member.

2
2   For
most
young
people,
the
primary

    gateway
to
the
internet
is
now
their
mobile

    phone.
Furthermore
because
of
the
way
in

    which
young
people
are
able
to
‘screen

    grab’
messages
and
use
private
message

    services
such
as
Blackberry
Messenger

    (BBM)
to
communicate
one‐to‐many,
there

    is
much
less
disWncWon
between
what
is

    private
and
what
is
public
which
creates

    very
real
safeguarding
issues.
2        For
most
young
people,
the
primary

         gateway
to
the
internet
is
now
their
mobile

         phone.
Furthermore
because
of
the
way
in

         which
young
people
are
able
to
‘screen

         grab’
messages
and
use
private
message

         services
such
as
Blackberry
Messenger

         (BBM)
to
communicate
one‐to‐many,
there

         is
much
less
disWncWon
between
what
is

         private
and
what
is
public
which
creates

         very
real
safeguarding
issues.

    “I
have
over
120
people
on
my
BBM
but
I
deleted
like

    30
on
Saturday
cause
I
was
angry
and
they
pissed
me

    off
so
I
just
deleted
them.
Since
I’ve
had
my

    BlackBerry
only
2
people
have
deleted
me.”
Q3)
In
your
experience
are
the
young
people
you
work
with

involved
in
risky
behaviour
online
or
via
mobile
phone
?


                                                  Clear
picture

                                                  emerged
that
staff

                                                  felt
that
YP
in
these

                                                  sebngs
were

                                                  involved
in
risky

                                                  behaviour
online.

                                                  81%
yes
13.2%
not

                                                  sure

and
5.7%
said

                                                  “no”.




info@katiebacon.co.uk
Feedback
from
survey
and
interviews
                                 34%
replied
saying

                                 that
they
were

                                 very
equipped
to

                                 deal
with
abuse

                                 and
12%
saying

                                 they
felt
they
were

                                 not
equipped.
info@katiebacon.co.uk
This
report
reviews
whether
technology,
as
well
as

being
an
amplifier,
can
somehow
also
act
as
an

‘incubator’.
Does
the
constant
stream
of

communicaWon
which
is
created,
uploaded,
stored,

mutated
or
morphed
and
then
re‐broadcast

somehow
create
a
new
dimension?
For
example,

content
originally
intended
as
private
can
be

captured,
allowed
to
gestate,
commented
upon,

added
to
and
altered.
It
can
then
re‐surface
later
as

a
broadcast
as
something
very
different.

This
report
reviews
whether
technology,
as
well
as

being
an
amplifier,
can
somehow
also
act
as
an

‘incubator’.
Does
the
constant
stream
of

communicaWon
which
is
created,
uploaded,
stored,

mutated
or
morphed
and
then
re‐broadcast

somehow
create
a
new
dimension?
For
example,

content
originally
intended
as
private
can
be

captured,
allowed
to
gestate,
commented
upon,

added
to
and
altered.
It
can
then
re‐surface
later
as

a
broadcast
as
something
very
different.


Staff
need
to
understand
the
new
subtle

safeguarding
issues
of
converged
services.
For

example,
smart
phones
now
give
users
access
to
GPS

services
which
will
pin‐point
users’
locaWons
and

face
recogniWon
opWons.
3
3   It
is
impera#ve
to
be
informed
by
young

    people’s
own
experience
of
online
risk.
To

    understand
whether
and
exactly
how
young

    people
are
at
risk
online,
it
is
imperaWve
to

    understand
young
people’s
experience
of
risk

    through
their
own
narraWve
accounts
and
to

    analyse
the
contextualised
social
phenomena

    found
there.

3            It
is
impera#ve
to
be
informed
by
young

             people’s
own
experience
of
online
risk.
To

             understand
whether
and
exactly
how
young

             people
are
at
risk
online,
it
is
imperaWve
to

             understand
young
people’s
experience
of
risk

             through
their
own
narraWve
accounts
and
to

             analyse
the
contextualised
social
phenomena

             found
there.



    “I
go
to
bed
like
at
2
o’clock
in
the
morning
cause
I’m
tex%ng.

When
my

    pinger’s
gone
to
sleep
that’s
when
I
go
to
sleep.
If
there’s
no‐one
to

    ping
I’ll
go
to
sleep.
If
<name>
is
up
%ll
6am
I
would
stay
up
all
night.”





                                                                                  

    Student
from
Focus
Group
ns
             tio
         n da
       e
      m
  c om
 e
R
ns
             tio
         n da
       e
      m
  c om
 e
R
ns
            tio
        n da
       e
   om
      m             E‐safety
needs
to
be
embedded
into
the
wider

 ec
R
                    teaching
of
emo#onal,
social
and
digital

                    literacies
in
all
schools
from
an
early
age.

ns
            tio
        n da
       e
   om
      m             E‐safety
needs
to
be
embedded
into
the
wider

 ec
R
                    teaching
of
emo#onal,
social
and
digital

                    literacies
in
all
schools
from
an
early
age.


                    A resource looking specifically at the compulsive
                    nature of mobiles and understanding the ‘need’ for
                    constantly checking for messages, could be a
                    really positive resource for PRUS and could be a
                    great ‘way in’ to addressing issues of identity and
                    belonging.
ns
            tio
        n da
       e
   om
      m                 E‐safety
needs
to
be
embedded
into
the
wider

 ec
R
                        teaching
of
emo#onal,
social
and
digital

                        literacies
in
all
schools
from
an
early
age.


                        A resource looking specifically at the compulsive
                        nature of mobiles and understanding the ‘need’ for
                        constantly checking for messages, could be a
                        really positive resource for PRUS and could be a
                        great ‘way in’ to addressing issues of identity and
                        belonging.

                    “Schools
should
be
more
serious
about
this
subject,
like
they
don’t
know
what’s

                    really
going
on
like,
ah
it’s
just
a
mobile
phone
and
they’re
just
pinging
each
other

                    but
it’s
more
serious
than
that
and
there
ought
to
be
a
law
about
what
phone
you

                    should
have.”

Student
from
focus
group
Q
11)

In
your
work
with
vulnerable
young
people
have
you

used
Social
Media
or
mobile
technology
posi#vely
to
engage

with
your
young
learners
?
                                                 Just
under
half
of

                                                 those
interviewed

                                                 had
used
social

                                                 media
posiWvely
to

                                                 engage
with
young

                                                 learners.

Of
those

                                                 who
hadn’t
30%

                                                 said
that
they

                                                 would
like
to.
ns
             tio
         n da
       e
      m
    om
 ec
R
ns
             tio
         n da
       e
    om
      m
                      More
research
about
the
targeWng
of
young
girls
by

 ec
R
                      older
boys
via
technology
should
be
undertaken

                      and
a
mulW‐agency‐supported
campaign
about

                      peer‐grooming
aimed
at
vulnerable
young
people

                      should
be
considered.

ns
             tio
         n da
       e
    om
      m
                      More
research
about
the
targeWng
of
young
girls
by

 ec
R
                      older
boys
via
technology
should
be
undertaken

                      and
a
mulW‐agency‐supported
campaign
about

                      peer‐grooming
aimed
at
vulnerable
young
people

                      should
be
considered.





                “More
and
more
‘Facebook’
style
bullying
issues
and
confronta%ons

                are
arriving
in
the
classroom
with
no
warnings
accessed
through

                mobiles
(not
PCs).
All
our
young
people,
despite
their
socio‐economic

                group,
have
mobile
phones
‐
most
with
internet
access.

We
have
seen

                serious
incidences
of
grooming
through
mobile,
using
a
mixture
of
SN

                and
conversa%ons.”

Q6)
Thinking
about
the
young
people
you
work
with,
do
you

feel
that
they
are
more
at
risk
than
other
young
people
when
it

comes
to
bullying
and
abuse
online
or
via
mobile
phones
?


                                                    Most
felt
that
they

                                                    were
either
more,

                                                    or
slightly
more
at

                                                    risk,
than
other
YP

                                                    when
it
came
to

                                                    bullying
and
abuse

                                                    online
or
via

                                                    mobiles
(62%

                                                    combined)


THE POSITIVE !




Work in progress

IDENTIFYING
GOOD PRACTICE
TO INSPIRE
OTHERS!

Could these be little
‘vignettes’ re specific
practical actions EG
‘Facebook Fridays’
THE POSITIVE !




            Good

          pracWce/
          examples



Work in progress

IDENTIFYING
GOOD PRACTICE
TO INSPIRE
OTHERS!

Could these be little
‘vignettes’ re specific
practical actions EG
‘Facebook Fridays’
THE POSITIVE !
                          Our PRU set up its own internal social network to allow
                          interaction between staff and pupils. Southampton



            Good
         “We don’t have a culture of panic here – especially
          pracWce/        re ICT issues. ICT is embedded in all we do - it’s
          examples        now a life skill.” Parkside, Ipswich


                          “Those who are shy are much more likely to use
Work in progress          social media more than face to face as it helps break
                          down communication barriers, esp for those with
IDENTIFYING               learning difficulties. Also – online games and tools
GOOD PRACTICE             for learning is a great way for children to learn and
TO INSPIRE                can be used at optimum times to suit different
OTHERS!                   learning styles.” Suffolk


Could these be little     “We use it [SM] to keep in contact with YP, especially
                          those who go missing.” Sheffield.
‘vignettes’ re specific
practical actions EG
‘Facebook Fridays’        “We would like to start a sheltered environment to
                          aid transition” Derbyshire
“Blended facilitation”

                                  Offline
                         Online




info@katiebacon.co.uk
“Blended facilitation”

                                  Offline
                         Online




info@katiebacon.co.uk
“Blended facilitation”

                                  Offline
                         Online




info@katiebacon.co.uk
“Blended facilitation”

                                  Offline
                         Online




info@katiebacon.co.uk
“Blended facilitation”

                                  Offline
                         Online




info@katiebacon.co.uk
“Blended facilitation”

                                  Offline
                         Online




info@katiebacon.co.uk
“Blended facilitation”

                                  Offline
                         Online




info@katiebacon.co.uk
“Blended facilitation”

                                  Offline
                         Online




info@katiebacon.co.uk
“Blended facilitation”

                                  Offline
                         Online




info@katiebacon.co.uk
ns
             tio
         n da
       e
      m
    om
 ec
R
ns
             tio
         n da
       e
      m
    om                If
the
support
and
guidance
which
PRUs
give
students
in
this
area
is
to

 ec
R
                      be
effecWve,
it
has
to
be
consistent
across

mulW‐agencies.

Any
agreed

                      policies
should
also
be
understood
by
those
working
with
vulnerable

                      young
people
outside
the
PRU
system,
including
those
responsible
for

                      caring
for
young
people
(parents
and
carers,
or
foster
providers,
care

                      homes
etc).

This
is
challenging
as
some
of
the
environments
in
which

                      these
young
people
live
can
be
‘chaoWc’.

ns
             tio
         n da
       e
      m
    om                If
the
support
and
guidance
which
PRUs
give
students
in
this
area
is
to

 ec
R
                      be
effecWve,
it
has
to
be
consistent
across

mulW‐agencies.

Any
agreed

                      policies
should
also
be
understood
by
those
working
with
vulnerable

                      young
people
outside
the
PRU
system,
including
those
responsible
for

                      caring
for
young
people
(parents
and
carers,
or
foster
providers,
care

                      homes
etc).

This
is
challenging
as
some
of
the
environments
in
which

                      these
young
people
live
can
be
‘chaoWc’.





                “We
don’t
need
more
guidance
from
the
top
down.
What
we
need
is
support,

                resources
and
trust
to
develop
appropriate
responses
based
on
our
considerable

                professional
experience
and
understanding
of
vulnerable
young
people.”

LA
advisor.

ns
             tio
         n da
       e
      m
    om
 ec
R
ns
             tio
         n da
       e
    om
      m               It
is
important
to
pilot
more
creaWve

R
 ec                   approaches
to
the
use
of
mobile
technology

                      and
access
to
social
networking
within

                      PRUs.
Examples
of
vulnerable
young

                      people’s
posiWve
engagement
with
social

                      media
should
be
beger
promoted
and

                      disseminated
within
the
field.
The

                      www.prus.org.uk
network
could
help
in

                      disseminaWng
good
examples
to
members

                      and
help
link
pracWWoners
wanWng
to

ns
             tio
         n da
       e
    om
      m                     It
is
important
to
pilot
more
creaWve

R
 ec                         approaches
to
the
use
of
mobile
technology

                            and
access
to
social
networking
within

                            PRUs.
Examples
of
vulnerable
young

                            people’s
posiWve
engagement
with
social

                            media
should
be
beger
promoted
and

                            disseminated
within
the
field.
The

                            www.prus.org.uk
network
could
help
in

                            disseminaWng
good
examples
to
members

                            and
help
link
pracWWoners
wanWng
to



                “Those
who
are
shy
are
much
more
likely
to
use
social
media
more
than

                face
to
face
as
it
helps
break
down
communica%on
barriers,
especially


                for
those
with
learning
difficul%es.

Also
online
games
and
tools
for

                learning
are
a
great
way
for
children
to
learn
and
can
be
used
at

                op%mum
%mes
to
suit
different
learning
styles.”

Teacher
Feedback


            Do
you
recognise
these
reflec#ons
from

              staff
members
and
young
people
?





info@katiebacon.co.uk
Film
Film

Film

        FEEDBACK
        Showcasing
how
tools
can
put
the

          learner
in
the
centre
and
become
co‐
          researchers
and
parWcipants
in
the

          delivery
of
learning.

Youtube (search for) NICE PICS
                        hgp://www.carrick‐davies.com/research/films


info@katiebacon.co.uk
UN Rights of the Child




info@katiebacon.co.uk
UN Rights of the Child




            Provision




info@katiebacon.co.uk
UN Rights of the Child




            Provision                 Protection




info@katiebacon.co.uk
UN Rights of the Child




            Provision                    Protection




                         Participation
info@katiebacon.co.uk
PIE
PIE
PIE   Policies
PIE   Policies
PIE              Policies



Infrastructure
PIE              Policies



Infrastructure
PIE              Policies



Infrastructure              Educa#on
PIE              Policies



Infrastructure              Educa#on
PIE                  Policies
        E‐safety
policy,
Acceptable
Use
Policy,


An#‐
              Bullying
policy,
Mobile
use
policy





Infrastructure                                  Educa#on
PIE                             Policies
                 E‐safety
policy,
Acceptable
Use
Policy,


An#‐
                       Bullying
policy,
Mobile
use
policy





Infrastructure                                           Educa#on
Managed
learning
environment

with
high
quality
access
and

equipment
which
is
filtered,

monitored
and
supervised.
PIE                             Policies
                 E‐safety
policy,
Acceptable
Use
Policy,


An#‐
                       Bullying
policy,
Mobile
use
policy





Infrastructure                                           Educa#on
Managed
learning
environment
                      Whole‐school
ongoing
educa#on
&

with
high
quality
access
and
                      preven#on
programme
which
is

equipment
which
is
filtered,
                       targeted
at
both
pupils,
parents
and
monitored
and
supervised.                          the
whole
school
work‐force.
Digital Youth Work Practice Model


                                        Support


                                        Campaign


                                         Educate




info@katiebacon.co.uk
Legalities of handling online disclosures. What is our
                       duty of care and legal ramifications of viewing.
     What
do

   staff
need
?
                       We need positive examples of use for learning and
        1
             meaningful engagement


                       We need ‘hands-on’ catch up sessions on the basics
                       and new trends of social media especially for our older
                       staff (digital divide). (set up dummy A/Cs)
“I
don’t
use
social

networking
so
         Operational knowledge with clear guidance on how
probably
understand
   would you handle a certain situation not just
less
than
my
          theoretical discussion. + real information on % of risks
                       not over-exaggeration
students.”

                       Clear guidance on boundary issues for all staff ‘Friending’
                       YP eg fundraising, mentoring, organising events etc.
                       including advice on recording, transparency, disclosure
                       etc
Need help to embed this topic into wider Digital and Social
                        and emotional literacy schemes to help develop resilience
                        and reduce inappropriate actions.
     What
do

   staff
need
?
         We need advice about sanctions that work and advice
                        about what to do re inappropriate and threatening
        2               messages from parents to other pupils.

                       Not having access to Facebook in school is problematic
                       as we can’t demonstrate safe use. We need clear
                       guidance on how to use it in school breaks
“
I
am
sad
and

amazed
at
how
li`le
   There is a really important international dimension and we
young
people
know
     need to learn from how other countries are tackling the
how
to
protect
        use of social media in schools – Spain ‘A’ level in Moodle !
themselves.”

                       We must also learn the lessons which are coming from
                       Serious Case Reviews
“Deliverables” need to be dynamic and not a set of do’s
                          and don’ts. AUPS need to be positive NOT negative -
                          expectation is that you do something wrong!
      What
do

    staff
need
?           Advice needs to include the importance of putting the
        3
                learner at the heart – including being the teacher.
                          “Teachers are sometimes the worst learners!”


                          We need really clear advice about ‘Taking, making and
                          distributing’ inappropriate images (inc legal advice). So
“We
need
to
build
on
     YP are not criminalised at early stage.
this
work
and

conWnue
to
allow

students
to
be
co‐        We need to recognise the affects of increased exposure to
                          more extreme pornography is having on issues of sexual
researchers
and
make
     discovery/identity and experience.
sure
that
the
focus
is

on
parWcipaWon
in

the
delivery
of
          “We need good quality advice & training which is updated
                          and ‘REAL’ to our context as we learn to exist more online
learning”.                for our YP.”


The
3
Rs
of
digital
literacy

The
3
Rs
of
digital
literacy

The
3
Rs
of
digital
literacy


                        Risk
The
3
Rs
of
digital
literacy


                        Risk




     Resilience
The
3
Rs
of
digital
literacy


                        Risk




     Resilience                 Reputa#on
Stephen@carrick‐davies.com
               www.onlineyouthoutreach.co.uk

                        info@katiebacon.co.uk

                        Twitter @Katie_bacon

         Facebook page – onlineyouthoutreach



info@katiebacon.co.uk

Weitere ähnliche Inhalte

Was ist angesagt?

Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And KidsSandra Fathi
 
Child online safety_gsma_2019[1] 3
Child online safety_gsma_2019[1] 3Child online safety_gsma_2019[1] 3
Child online safety_gsma_2019[1] 3Gambo Kumwo
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kidskwazy
 
Oman presentation revised
Oman presentation revisedOman presentation revised
Oman presentation revisedSudesh Sood
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshareMarian Merritt
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Internet Safety Program for Parents
Internet Safety Program for ParentsInternet Safety Program for Parents
Internet Safety Program for ParentsJamie Tubbs
 
How good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this oneHow good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this oneXxxCelesteTxxX
 
Glen Grove Internet Safety
Glen Grove Internet SafetyGlen Grove Internet Safety
Glen Grove Internet Safetybrianmengle
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet AddictionRossehna Mari Magtoto
 

Was ist angesagt? (18)

Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
Child online safety_gsma_2019[1] 3
Child online safety_gsma_2019[1] 3Child online safety_gsma_2019[1] 3
Child online safety_gsma_2019[1] 3
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kids
 
Oman presentation revised
Oman presentation revisedOman presentation revised
Oman presentation revised
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Lotrecchiano grace
Lotrecchiano graceLotrecchiano grace
Lotrecchiano grace
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Internet Safety Program for Parents
Internet Safety Program for ParentsInternet Safety Program for Parents
Internet Safety Program for Parents
 
Internet manners
Internet mannersInternet manners
Internet manners
 
How good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this oneHow good are your internet manners proj. slideshare project this one
How good are your internet manners proj. slideshare project this one
 
Glen Grove Internet Safety
Glen Grove Internet SafetyGlen Grove Internet Safety
Glen Grove Internet Safety
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet Addiction
 

Andere mochten auch

New microsoft office power point presentation
New microsoft office power point presentationNew microsoft office power point presentation
New microsoft office power point presentationAlex Jey
 
Lacobel T by AGC Glass Europe EN
Lacobel T by AGC Glass Europe ENLacobel T by AGC Glass Europe EN
Lacobel T by AGC Glass Europe ENAGC Glass Europe
 
Stopray Neo presentation by AGC Glass Europe EN
Stopray Neo presentation by AGC Glass Europe  ENStopray Neo presentation by AGC Glass Europe  EN
Stopray Neo presentation by AGC Glass Europe ENAGC Glass Europe
 
Structura Duo by AGC Glass Europe EN
Structura Duo by AGC Glass Europe ENStructura Duo by AGC Glass Europe EN
Structura Duo by AGC Glass Europe ENAGC Glass Europe
 
Matelux by AGC Glass Europe EN
Matelux by AGC Glass Europe ENMatelux by AGC Glass Europe EN
Matelux by AGC Glass Europe ENAGC Glass Europe
 

Andere mochten auch (7)

Park
ParkPark
Park
 
New microsoft office power point presentation
New microsoft office power point presentationNew microsoft office power point presentation
New microsoft office power point presentation
 
Lacobel T by AGC Glass Europe EN
Lacobel T by AGC Glass Europe ENLacobel T by AGC Glass Europe EN
Lacobel T by AGC Glass Europe EN
 
Stopray Neo presentation by AGC Glass Europe EN
Stopray Neo presentation by AGC Glass Europe  ENStopray Neo presentation by AGC Glass Europe  EN
Stopray Neo presentation by AGC Glass Europe EN
 
Email marketing UAE
Email marketing UAEEmail marketing UAE
Email marketing UAE
 
Structura Duo by AGC Glass Europe EN
Structura Duo by AGC Glass Europe ENStructura Duo by AGC Glass Europe EN
Structura Duo by AGC Glass Europe EN
 
Matelux by AGC Glass Europe EN
Matelux by AGC Glass Europe ENMatelux by AGC Glass Europe EN
Matelux by AGC Glass Europe EN
 

Ähnlich wie Munch, poke, ping presentation

Walworth academy e-safety (staff)
Walworth academy   e-safety (staff)Walworth academy   e-safety (staff)
Walworth academy e-safety (staff)esolate
 
E safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-daviesE safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-daviesStephen Carrick-Davies
 
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...Stevecd
 
Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012Stephen Carrick-Davies
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013Stevecd
 
E safety training for lewisham arts and education network (advance) by steph...
E  safety training for lewisham arts and education network (advance) by steph...E  safety training for lewisham arts and education network (advance) by steph...
E safety training for lewisham arts and education network (advance) by steph...Stephen Carrick-Davies
 
Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)Stephen Carrick-Davies
 
Willow pk 2011
Willow pk 2011Willow pk 2011
Willow pk 2011Bitbuzz
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sbSafeChildUAE1
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...Stevecd
 
E safety training for southwark staff - stephen carrick-davies january 2013
E  safety training for southwark staff - stephen carrick-davies january 2013E  safety training for southwark staff - stephen carrick-davies january 2013
E safety training for southwark staff - stephen carrick-davies january 2013Stephen Carrick-Davies
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and schoolGrant Ward
 
Benefitsandhazards
BenefitsandhazardsBenefitsandhazards
Benefitsandhazardsdgieseler1
 
Parenting In A Media Driven World Slideshare
Parenting In A Media Driven World SlideshareParenting In A Media Driven World Slideshare
Parenting In A Media Driven World Slidesharechrisweber
 
Imbee corporate deck
Imbee corporate deck Imbee corporate deck
Imbee corporate deck marcbrogdon
 
ADP01 - Why It's Important
ADP01 - Why It's ImportantADP01 - Why It's Important
ADP01 - Why It's ImportantChad Landman
 
Teen safe2017appblacklist slideshare
Teen safe2017appblacklist   slideshareTeen safe2017appblacklist   slideshare
Teen safe2017appblacklist slideshareTeenSafe
 

Ähnlich wie Munch, poke, ping presentation (20)

Walworth academy e-safety (staff)
Walworth academy   e-safety (staff)Walworth academy   e-safety (staff)
Walworth academy e-safety (staff)
 
E safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-daviesE safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-davies
 
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
 
Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013
 
E safety training for lewisham arts and education network (advance) by steph...
E  safety training for lewisham arts and education network (advance) by steph...E  safety training for lewisham arts and education network (advance) by steph...
E safety training for lewisham arts and education network (advance) by steph...
 
Safer internet
Safer internetSafer internet
Safer internet
 
Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)
 
Willow pk 2011
Willow pk 2011Willow pk 2011
Willow pk 2011
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sb
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
 
E safety training for southwark staff - stephen carrick-davies january 2013
E  safety training for southwark staff - stephen carrick-davies january 2013E  safety training for southwark staff - stephen carrick-davies january 2013
E safety training for southwark staff - stephen carrick-davies january 2013
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
 
Benefitsandhazards
BenefitsandhazardsBenefitsandhazards
Benefitsandhazards
 
Parenting In A Media Driven World Slideshare
Parenting In A Media Driven World SlideshareParenting In A Media Driven World Slideshare
Parenting In A Media Driven World Slideshare
 
Imbee corporate deck
Imbee corporate deck Imbee corporate deck
Imbee corporate deck
 
ADP01 - Why It's Important
ADP01 - Why It's ImportantADP01 - Why It's Important
ADP01 - Why It's Important
 
Teen safe2017appblacklist slideshare
Teen safe2017appblacklist   slideshareTeen safe2017appblacklist   slideshare
Teen safe2017appblacklist slideshare
 

Kürzlich hochgeladen

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 

Kürzlich hochgeladen (20)

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 

Munch, poke, ping presentation

  • 1. Vulnerable
YP
and
social
media
–
 who’s
controlling
who
?
 MUNCH PING POKE! Southampton Solent University Tuesday 4th October 2011 info@katiebacon.co.uk
  • 2. Introductions Ka#e
Bacon
 info@katiebacon.co.uk
  • 3. Introductions Ka#e
Bacon
 •Qualified
Youth
Prac##oner
 info@katiebacon.co.uk
  • 4. Introductions Ka#e
Bacon
 •Qualified
Youth
Prac##oner
 •10
years
experience
working
with
hard
to
 reach
young
people
and
their
families.

 info@katiebacon.co.uk
  • 5. Introductions Ka#e
Bacon
 •Qualified
Youth
Prac##oner
 •10
years
experience
working
with
hard
to
 reach
young
people
and
their
families.

 •Now
an
Independent
Trainer/Consultant info@katiebacon.co.uk
  • 6. Introductions Ka#e
Bacon
 •Qualified
Youth
Prac##oner
 •10
years
experience
working
with
hard
to
 reach
young
people
and
their
families.

 •Now
an
Independent
Trainer/Consultant info@katiebacon.co.uk
  • 7. Introductions Ka#e
Bacon
 •Qualified
Youth
Prac##oner
 •10
years
experience
working
with
hard
to
 reach
young
people
and
their
families.

 •Now
an
Independent
Trainer/Consultant info@katiebacon.co.uk
  • 8. Introductions Stephen
Carrick‐Davies info@katiebacon.co.uk
  • 9. Introductions Stephen
Carrick‐Davies •Ten
years
at
Childnet
Interna#onal
 info@katiebacon.co.uk
  • 10. Introductions Stephen
Carrick‐Davies •Ten
years
at
Childnet
Interna#onal
 •Now
an
Independent
Trainer/Consultant info@katiebacon.co.uk
  • 11. Introductions Stephen
Carrick‐Davies •Ten
years
at
Childnet
Interna#onal
 •Now
an
Independent
Trainer/Consultant info@katiebacon.co.uk
  • 16. What
can
we
cover
this
morning
?
 1)
WHY
IS
THIS
SO
IMPORTANT

? 2)
WHAT
WE
ALREADY
KNOW 3)
KEY
FINDINGS
+
RECOMMENDATIONS 4)
ACTION
OPPORTUNITIES
 including
staff
training
needs



 info@katiebacon.co.uk
  • 17. How are young people using hhj social network sites? jkjl info@katiebacon.co.uk
  • 18. Platform-hopping Digital dimensions of young peoples lives info@katiebacon.co.uk
  • 19. Hanging out, Messing about, ‘Geeking’ out. info@katiebacon.co.uk
  • 20.
  • 21. NEWS
FEEDS

 APPLICATIONS “boast
by
post” Huge
range
of
apps PHOTOS/TAGS
 Comment
and
Tag
 photos

face
 recogni#on
 FRIENDS
 Find,
link,
be
in
 constant
contact
+
 LIVE
CHAT

 on
your
mobile Superseding
IM VIDEO
 link
and
embed
 MESSAGES
 Superseding
E‐mail
 WHO’S
ONLINE Social
loca#on
 Video
coming
 Know
who
is
online
now!
  • 22. NEWS
FEEDS

 APPLICATIONS “boast
by
post” Huge
range
of
apps PHOTOS/TAGS
 Comment
and
Tag
 photos

face
 recogni#on
 FRIENDS
 Find,
link,
be
in
 constant
contact
+
 LIVE
CHAT

 on
your
mobile Superseding
IM VIDEO
 link
and
embed
 MESSAGES
 Superseding
E‐mail
 WHO’S
ONLINE Social
loca#on
 Video
coming
 Know
who
is
online
now! ALL
FOR
FREE
……
BUT
….WHAT
PRICE
IS
FREE
?

  • 23. NEWS
FEEDS

 APPLICATIONS “boast
by
post” Huge
range
of
apps PHOTOS/TAGS
 Comment
and
Tag
 photos

face
 recogni#on
 FRIENDS
 Find,
link,
be
in
 constant
contact
+
 LIVE
CHAT

 on
your
mobile Superseding
IM VIDEO
 link
and
embed
 MESSAGES
 Superseding
E‐mail
 WHO’S
ONLINE Social
loca#on
 Video
coming
 Know
who
is
online
now! ALL
FOR
FREE
……
BUT
….WHAT
PRICE
IS
FREE
?

  • 24. Classifying
the
risks
to
children
online
 Original 3 Cs Classification by ‘EU Kids’ online project
  • 25. Classifying
the
risks
to
children
online
 CONTENT
 
 CONTACT
 CONDUCT
 Original 3 Cs Classification by ‘EU Kids’ online project
  • 27. Classifying
the
risks
to
children
online
 CONTENT
 Child as Recipient 
 CONTACT
 Child as Participant CONDUCT
 Original 3 Cs Classification by ‘EU Kids’ online project
  • 28. Classifying
the
risks
to
children
online
 CONTENT
 Child as Recipient 
 CONTACT
 Child as Participant CONDUCT
 Child as Actor Original 3 Cs Classification by ‘EU Kids’ online project
  • 29. Classifying
the
risks
to
children
online
 Commercial
 Aggressive Sexual
 Values
 CONTENT
 Child as Recipient 
 CONTACT
 Child as Participant CONDUCT
 Child as Actor Original 3 Cs Classification by ‘EU Kids’ online project
  • 30. Classifying
the
risks
to
children
online
 Commercial
 Aggressive Sexual
 Values
 CONTENT
 Adverts Child as Recipient Spam 
 Sponsorship Personal info CONTACT
 Child as Participant CONDUCT
 Child as Actor Original 3 Cs Classification by ‘EU Kids’ online project
  • 31. Classifying
the
risks
to
children
online
 Commercial
 Aggressive Sexual
 Values
 CONTENT
 Adverts Child as Recipient Spam 
 Sponsorship Personal info CONTACT
 Tracking Child as Participant Harvesting Personal info CONDUCT
 Child as Actor Original 3 Cs Classification by ‘EU Kids’ online project
  • 32. Classifying
the
risks
to
children
online
 Commercial
 Aggressive Sexual
 Values
 CONTENT
 Adverts Child as Recipient Spam 
 Sponsorship Personal info CONTACT
 Tracking Child as Participant Harvesting Personal info CONDUCT
 Illegal Child as Actor downloading Hacking Gambling Financial scams Terrorism Original 3 Cs Classification by ‘EU Kids’ online project
  • 33. Classifying
the
risks
to
children
online
 Commercial
 Aggressive Sexual
 Values
 CONTENT
 Adverts Violent and Child as Recipient Spam hateful content 
 Sponsorship Personal info CONTACT
 Tracking Child as Participant Harvesting Personal info CONDUCT
 Illegal Child as Actor downloading Hacking Gambling Financial scams Terrorism Original 3 Cs Classification by ‘EU Kids’ online project
  • 34. Classifying
the
risks
to
children
online
 Commercial
 Aggressive Sexual
 Values
 CONTENT
 Adverts Violent and Child as Recipient Spam hateful content 
 Sponsorship Personal info CONTACT
 Tracking Being bullied Child as Participant Harvesting harassed or Personal info stalked CONDUCT
 Illegal Child as Actor downloading Hacking Gambling Financial scams Terrorism Original 3 Cs Classification by ‘EU Kids’ online project
  • 35. Classifying
the
risks
to
children
online
 Commercial
 Aggressive Sexual
 Values
 CONTENT
 Adverts Violent and Child as Recipient Spam hateful content 
 Sponsorship Personal info CONTACT
 Tracking Being bullied Child as Participant Harvesting harassed or Personal info stalked CONDUCT
 Illegal Bullying or Child as Actor downloading harassing Hacking Gambling another Financial scams Terrorism Original 3 Cs Classification by ‘EU Kids’ online project
  • 36. Classifying
the
risks
to
children
online
 Commercial
 Aggressive Sexual
 Values
 CONTENT
 Adverts Violent and Pornographic Child as Recipient Spam hateful content unwelcome 
 Sponsorship sexual content Personal info CONTACT
 Tracking Being bullied Child as Participant Harvesting harassed or Personal info stalked CONDUCT
 Illegal Bullying or Child as Actor downloading harassing Hacking Gambling another Financial scams Terrorism Original 3 Cs Classification by ‘EU Kids’ online project
  • 37. Classifying
the
risks
to
children
online
 Commercial
 Aggressive Sexual
 Values
 CONTENT
 Adverts Violent and Pornographic Child as Recipient Spam hateful content unwelcome 
 Sponsorship sexual content Personal info CONTACT
 Tracking Being bullied Meeting Child as Participant Harvesting harassed or strangers Personal info stalked Being groomed CONDUCT
 Illegal Bullying or Child as Actor downloading harassing Hacking Gambling another Financial scams Terrorism Original 3 Cs Classification by ‘EU Kids’ online project
  • 38. Classifying
the
risks
to
children
online
 Commercial
 Aggressive Sexual
 Values
 CONTENT
 Adverts Violent and Pornographic Child as Recipient Spam hateful content unwelcome 
 Sponsorship sexual content Personal info CONTACT
 Tracking Being bullied Meeting Child as Participant Harvesting harassed or strangers Personal info stalked Being groomed CONDUCT
 Illegal Bullying or Creating and Child as Actor downloading harassing uploading Hacking Gambling another inappropriate Financial scams material Terrorism Original 3 Cs Classification by ‘EU Kids’ online project
  • 39. Classifying
the
risks
to
children
online
 Commercial
 Aggressive Sexual
 Values
 CONTENT
 Adverts Violent and Pornographic Bias Child as Recipient Spam hateful content unwelcome Racist 
 Sponsorship sexual content Misleading Personal info info or advice CONTACT
 Tracking Being bullied Meeting Child as Participant Harvesting harassed or strangers Personal info stalked Being groomed CONDUCT
 Illegal Bullying or Creating and Child as Actor downloading harassing uploading Hacking Gambling another inappropriate Financial scams material Terrorism Original 3 Cs Classification by ‘EU Kids’ online project
  • 40. Classifying
the
risks
to
children
online
 Commercial
 Aggressive Sexual
 Values
 CONTENT
 Adverts Violent and Pornographic Bias Child as Recipient Spam hateful content unwelcome Racist 
 Sponsorship sexual content Misleading Personal info info or advice CONTACT
 Tracking Being bullied Meeting Self harm Child as Participant Harvesting harassed or strangers Unwelcome Personal info stalked Being persuasions groomed CONDUCT
 Illegal Bullying or Creating and Child as Actor downloading harassing uploading Hacking Gambling another inappropriate Financial scams material Terrorism Original 3 Cs Classification by ‘EU Kids’ online project
  • 41. Classifying
the
risks
to
children
online
 Commercial
 Aggressive Sexual
 Values
 CONTENT
 Adverts Violent and Pornographic Bias Child as Recipient Spam hateful content unwelcome Racist 
 Sponsorship sexual content Misleading Personal info info or advice CONTACT
 Tracking Being bullied Meeting Self harm Child as Participant Harvesting harassed or strangers Unwelcome Personal info stalked Being persuasions groomed CONDUCT
 Illegal Bullying or Creating and Providing Child as Actor downloading harassing uploading misleading Hacking Gambling another inappropriate info/advice Financial scams material Terrorism Original 3 Cs Classification by ‘EU Kids’ online project
  • 42. Classifying
the
risks
to
children
online
 Commercial
 Aggressive Sexual
 Values
 CONTENT
 Adverts Violent and Pornographic Bias Child as Recipient Spam hateful content unwelcome Racist 
 Sponsorship sexual content Misleading Personal info info or advice CONTACT
 Tracking Being bullied Meeting Self harm Child as Participant Harvesting harassed or strangers Unwelcome Personal info stalked Being persuasions groomed CONDUCT
 Illegal Bullying or Creating and Providing Child as Actor downloading harassing uploading misleading Hacking Gambling another inappropriate info/advice Financial scams material Terrorism CRIMINAL
 Original 3 Cs Classification by ‘EU Kids’ online project
  • 43. Classifying
the
risks
to
children
online
 Commercial
 Aggressive Sexual
 Values
 CONTENT
 Adverts Violent and Pornographic Bias Child as Recipient Spam hateful content unwelcome Racist 
 Sponsorship sexual content Misleading Personal info info or advice CONTACT
 Tracking Being bullied Meeting Self harm Child as Participant Harvesting harassed or strangers Unwelcome Personal info stalked Being persuasions groomed CONDUCT
 Illegal Bullying or Creating and Providing Child as Actor downloading harassing uploading misleading Hacking Gambling another inappropriate info/advice Financial scams material Terrorism CRIMINAL
 BEING IN THE WRONG PLACE AT THE WRONG TIME Original 3 Cs Classification by ‘EU Kids’ online project
  • 44. Commercial
 Aggressive Sexual
 Values
 CONTENT
 Pornographic unwelcome Child
as
 sexual content Recipient
 CONTACT
 Meeting Child
as
 strangers Being Par#cipant
 groomed CONDUCT
 Creating and uploading Child
as
 inappropriate Actor
 material
  • 45. Commercial
 Aggressive Sexual
 Values
 CONTENT
 Pornographic unwelcome Child
as
 sexual content Recipient
 CONTACT
 Meeting Child
as
 strangers Being Par#cipant
 groomed CONDUCT
 Creating and uploading Child
as
 inappropriate Actor
 material
  • 46. Commercial
 Aggressive Sexual
 Values
 CONTENT
 Pornographic Online
grooming
is
a
 unwelcome Child
as
 criminal
offence sexual content Recipient
 CONTACT
 Meeting Child
as
 strangers Being Par#cipant
 groomed CONDUCT
 Creating and uploading Child
as
 inappropriate Actor
 material
  • 47. Commercial
 Aggressive Sexual
 Values
 CONTENT
 Pornographic Online
grooming
is
a
 unwelcome Child
as
 criminal
offence sexual content Recipient
 Contact
 CONTACT
 www.ceop.gov.uk

 Meeting if
you
have
concerns
 Child
as
 about
inappropriate
 strangers Being Par#cipant
 communicaWon
from
an
 groomed CONDUCT
 adult
to
a
minor.
 Creating and uploading Child
as
 inappropriate Actor
 material
  • 48. Commercial
 Aggressive Sexual
 Values
 CONTENT
 Pornographic Online
grooming
is
a
 unwelcome Child
as
 criminal
offence sexual content Recipient
 Contact
 CONTACT
 www.ceop.gov.uk

 Meeting if
you
have
concerns
 Child
as
 about
inappropriate
 strangers Being Par#cipant
 communicaWon
from
an
 groomed CONDUCT
 adult
to
a
minor.
 Creating and “One‐third
of
those
who
 uploading Child
as
 sexually
abuse
children
are
just
 inappropriate Actor
 children
themselves.” BBC Newsnight programme March 2010 material
  • 49. Commercial
 Aggressive Sexual
 Values
 CONTENT
 Pornographic Online
grooming
is
a
 unwelcome Child
as
 criminal
offence sexual content Recipient
 Contact
 CONTACT
 www.ceop.gov.uk

 Meeting if
you
have
concerns
 Child
as
 about
inappropriate
 strangers Being Par#cipant
 communicaWon
from
an
 groomed CONDUCT
 adult
to
a
minor.
 Creating and “One‐third
of
those
who
 uploading Child
as
 sexually
abuse
children
are
just
 inappropriate Actor
 children
themselves.” BBC Newsnight programme March 2010 material 21,630
BEBO
members
have
the
name
“Porn
Star”


  • 50. “Sex%ng”
=
teens
sharing
nude
photos
via
mobiles
and
web.
The
practice
can
 have
serious
legal
and
psychological
consequences

 Commercial
 Aggressive Sexual
 Values
 CONTENT
 Pornographic Online
grooming
is
a
 unwelcome Child
as
 criminal
offence sexual content Recipient
 Contact
 CONTACT
 www.ceop.gov.uk

 Meeting if
you
have
concerns
 Child
as
 about
inappropriate
 strangers Being Par#cipant
 communicaWon
from
an
 groomed CONDUCT
 adult
to
a
minor.
 Creating and “One‐third
of
those
who
 uploading Child
as
 sexually
abuse
children
are
just
 inappropriate Actor
 children
themselves.” BBC Newsnight programme March 2010 material 21,630
BEBO
members
have
the
name
“Porn
Star”


  • 51. “Sex%ng”
=
teens
sharing
nude
photos
via
mobiles
and
web.
The
practice
can
 have
serious
legal
and
psychological
consequences

 Commercial
 Aggressive Sexual
 Values
 CONTENT
 Pornographic Online
grooming
is
a
 unwelcome Child
as
 criminal
offence sexual content Include Recipient
 Contact
 this button on your CONTACT
 www.ceop.gov.uk

 Meeting home if
you
have
concerns
 page Child
as
 about
inappropriate
 strangers Being Par#cipant
 communicaWon
from
an
 groomed CONDUCT
 adult
to
a
minor.
 Creating and “One‐third
of
those
who
 uploading Child
as
 sexually
abuse
children
are
just
 inappropriate Actor
 children
themselves.” BBC Newsnight programme March 2010 material 21,630
BEBO
members
have
the
name
“Porn
Star”


  • 52. Classifying
the
risks
to
children
online
 Commercial
 Aggressive Sexual
 Values
 CONTENT
 Violent and Child as Recipient 
 hateful content CONTACT
 Being bullied Child as Participant harassed or stalked CONDUCT
 Child as Actor Bullying or harassing another Classification by ‘EU Kids’ online project and referenced in the Byron Report
  • 53. Classifying
the
risks
to
children
online
 Commercial
 Aggressive Sexual
 Values
 CONTENT
 Violent and Child as Recipient 
 hateful content 22% of yp aged 11-18 CONTACT
 Being bullied report having been Child as Participant harassed or cyber bullied. stalked CONDUCT
 Child as Actor Bullying or harassing another Classification by ‘EU Kids’ online project and referenced in the Byron Report
  • 54. Classifying
the
risks
to
children
online
 Commercial
 Aggressive Sexual
 Values
 CONTENT
 Violent and Child as Recipient 
 hateful content 22% of yp aged 11-18 CONTACT
 Being bullied report having been Child as Participant harassed or cyber bullied. stalked It ruins lives. CONDUCT
 Child as Actor Bullying or harassing another Classification by ‘EU Kids’ online project and referenced in the Byron Report
  • 55. Classifying
the
risks
to
children
online
 Commercial
 Aggressive Sexual
 Values
 CONTENT
 Violent and Child as Recipient 
 hateful content 22% of yp aged 11-18 CONTACT
 Being bullied report having been Child as Participant harassed or cyber bullied. stalked It ruins lives. YP may not disclose CONDUCT
 that it is happening Child as Actor Bullying or harassing another Classification by ‘EU Kids’ online project and referenced in the Byron Report
  • 56. EU Kids Online Report 25,000 children, young people & parents Digital natives know it all. Only 36 per cent of 9-16-year-olds say it is very true that they know more about the internet than their parents. This myth obscures their needs to develop digital skills. Everyone watches porn online. One in seven children saw sexual images online in the past year. Even allowing for under-reporting, this myth has been partly created by media hype. Offline risks migrate online This is not necessarily true. Young people who lead risky offline lives are more likely to expose themselves to danger online, it cannot be assumed that those who are low-risk offline are protected while online. info@katiebacon.co.uk
  • 60.
  • 62. What
addi#onal
risks
do
 vulnerable
YP
encounter,
 and
bring
to
social
media?

 What
are
the
 risks? What
can
we
learn
from
those
 who
are
working
in
this
area
?

  • 63. What
addi#onal
risks
do
 vulnerable
YP
encounter,
 and
bring
to
social
media?

 What
are
the
 risks? What
can
we
learn
from
those
 What
do
staff
 who
are
working
in
this
area
?
 need
?
 What
training
and
support
do
professionals
 need
re
social
media
risk
in
their
prac#ce
?

  • 64. 2)
OVERVIEW
OF
PROJECT What
addi#onal
risks
do
 vulnerable
YP
encounter,
 and
bring
to
social
media?

 What
are
the
 risks? What
can
we
learn
from
those
 What
do
staff
 who
are
working
in
this
area
?
 need
?
 What
training
and
support
do
professionals
 need
re
social
media
risk
in
their
prac#ce
?

  • 68. We
have
idenWfied
a
group
who
do
share
many
common
vulnerabiliWes
 Those
outside
of
school
in
Pupil
Referral
Units
or
NEET
sebngs
 How are these YP susceptible to risk, abuse, attack, exposure, harm online ? Recognising of course that there are other vulnerable groups and overlapping issues
  • 69. We
have
idenWfied
a
group
who
do
share
many
common
vulnerabiliWes
 Those
outside
of
school
in
Pupil
Referral
Units
or
NEET
sebngs
 How are these YP susceptible to risk, abuse, attack, exposure, harm online ? Recognising of course that there are other vulnerable groups and overlapping issues Special
EducaWon
 Marginalised
groups
 Looked
acer
 Needs in
our
society
 children
 DisabiliWes
and
or
emoWonal
 System
neglect,
language,
migrant
 “ChaoWc”
family/home
 behavioural
difficulWes communiWes
etc environments
  • 70. Methodology A Grounded Theory approach with data taken from:  Reviews of relevant literature and recent studies  Focus group interviews with YP (using drama and film to build a rapport and engage the group)  Feedback from professional’s surveys, interviews, site visits & workshops  Researcher's field notes, diaries and reflections
  • 72. 3)
KEY
FINDINGS
+
RECOMMENDATIONS Eight
main
findings
under
4
main
themes
of
 info@katiebacon.co.uk
  • 75. 1 The
task
of
assessing
the
correla#on
 between
offline
vulnerabili#es
and
 online
risk
for
certain
groups
of
young
 people
is
problema#c
but
nevertheless
 broad
principles
can
be
extrapolated.

 info@katiebacon.co.uk
  • 76. 1 The
task
of
assessing
the
correla#on
 between
offline
vulnerabili#es
and
 online
risk
for
certain
groups
of
young
 people
is
problema#c
but
nevertheless
 broad
principles
can
be
extrapolated.

 “Many
of
the
young
people
I
work
with
are
massive
risk
takers,
impulsive
 to
the
extreme
and
o>en
use
alcohol
and/or
drugs.
On
average
they
first
 engage
in
sexual
ac%vity
at
a
far
younger
age
than
other
students.
They
 also
have
huge
amounts
of
unsupervised
%me
on
their
hands,
o>en
%ll
very
 late
at
night.
I
teach
many
YP
who
are
half‐asleep
as
they
have
been
online
 %ll
gone
3am.”

PRU
staff
member
 info@katiebacon.co.uk
  • 77.
  • 78. Low self- Fluid learning confidence. environment and Identity seen to be gaps in education part of ‘outsiders’ and induction Experience Lack of abusive supportive relationships or adults in their environments lives including anger More Influences of unsupervised alcohol, drugs and time, fewer gang culture. Risk structures and takers and at risk boundaries
  • 79.
  • 80. ns tio n da e m c om e R
  • 81. ns tio n da e m c om e R
  • 82. ns tio n da m e 
 c om R e Dedicated
staff
working
with
vulnerable
young
in
PRUs
(and
 elsewhere)
must
be
given
ongoing
support
and
training
to
beger
 understand
how
young
people
are
harnessing
social
media
and
 mobile
communicaWon
and
why
it
is
now
the
single
most
important
 ac%vity
many
vulnerable
young
people
rely
on
to
give
them
 iden%ty,
connec%on
and
a
sense
of
community. SignposWng
staff
to
the
exisWng
high‐quality,
age‐appropriate
E‐safety
 resources
and
guidance
is
important.
But
there
is
no
subsWtute
for
high
 quality
‘hands‐on’
training
so
staff
can
fully
understand

the
language,
 tools
and

applicaWons
  • 83. ns tio n da m e 
 c om R e Dedicated
staff
working
with
vulnerable
young
in
PRUs
(and
 elsewhere)
must
be
given
ongoing
support
and
training
to
beger
 understand
how
young
people
are
harnessing
social
media
and
 mobile
communicaWon
and
why
it
is
now
the
single
most
important
 ac%vity
many
vulnerable
young
people
rely
on
to
give
them
 iden%ty,
connec%on
and
a
sense
of
community. SignposWng
staff
to
the
exisWng
high‐quality,
age‐appropriate
E‐safety
 resources
and
guidance
is
important.
But
there
is
no
subsWtute
for
high
 quality
‘hands‐on’
training
so
staff
can
fully
understand

the
language,
 tools
and

applicaWons “I
don’t
use
social
networking
so
probably
understand
less
than
 my
students.”
 PRU
staff
member.

  • 84.
  • 85. 2
  • 86. 2 For
most
young
people,
the
primary
 gateway
to
the
internet
is
now
their
mobile
 phone.
Furthermore
because
of
the
way
in
 which
young
people
are
able
to
‘screen
 grab’
messages
and
use
private
message
 services
such
as
Blackberry
Messenger
 (BBM)
to
communicate
one‐to‐many,
there
 is
much
less
disWncWon
between
what
is
 private
and
what
is
public
which
creates
 very
real
safeguarding
issues.
  • 87. 2 For
most
young
people,
the
primary
 gateway
to
the
internet
is
now
their
mobile
 phone.
Furthermore
because
of
the
way
in
 which
young
people
are
able
to
‘screen
 grab’
messages
and
use
private
message
 services
such
as
Blackberry
Messenger
 (BBM)
to
communicate
one‐to‐many,
there
 is
much
less
disWncWon
between
what
is
 private
and
what
is
public
which
creates
 very
real
safeguarding
issues. “I
have
over
120
people
on
my
BBM
but
I
deleted
like
 30
on
Saturday
cause
I
was
angry
and
they
pissed
me
 off
so
I
just
deleted
them.
Since
I’ve
had
my
 BlackBerry
only
2
people
have
deleted
me.”
  • 88. Q3)
In
your
experience
are
the
young
people
you
work
with
 involved
in
risky
behaviour
online
or
via
mobile
phone
?
 Clear
picture
 emerged
that
staff
 felt
that
YP
in
these
 sebngs
were
 involved
in
risky
 behaviour
online.
 81%
yes
13.2%
not
 sure

and
5.7%
said
 “no”. info@katiebacon.co.uk
  • 89. Feedback
from
survey
and
interviews 34%
replied
saying
 that
they
were
 very
equipped
to
 deal
with
abuse
 and
12%
saying
 they
felt
they
were
 not
equipped.
  • 91.
  • 92.
  • 94. This
report
reviews
whether
technology,
as
well
as
 being
an
amplifier,
can
somehow
also
act
as
an
 ‘incubator’.
Does
the
constant
stream
of
 communicaWon
which
is
created,
uploaded,
stored,
 mutated
or
morphed
and
then
re‐broadcast
 somehow
create
a
new
dimension?
For
example,
 content
originally
intended
as
private
can
be
 captured,
allowed
to
gestate,
commented
upon,
 added
to
and
altered.
It
can
then
re‐surface
later
as
 a
broadcast
as
something
very
different.
 Staff
need
to
understand
the
new
subtle
 safeguarding
issues
of
converged
services.
For
 example,
smart
phones
now
give
users
access
to
GPS
 services
which
will
pin‐point
users’
locaWons
and
 face
recogniWon
opWons.
  • 95.
  • 96. 3
  • 97. 3 It
is
impera#ve
to
be
informed
by
young
 people’s
own
experience
of
online
risk.
To
 understand
whether
and
exactly
how
young
 people
are
at
risk
online,
it
is
imperaWve
to
 understand
young
people’s
experience
of
risk
 through
their
own
narraWve
accounts
and
to
 analyse
the
contextualised
social
phenomena
 found
there.

  • 98. 3 It
is
impera#ve
to
be
informed
by
young
 people’s
own
experience
of
online
risk.
To
 understand
whether
and
exactly
how
young
 people
are
at
risk
online,
it
is
imperaWve
to
 understand
young
people’s
experience
of
risk
 through
their
own
narraWve
accounts
and
to
 analyse
the
contextualised
social
phenomena
 found
there.
 “I
go
to
bed
like
at
2
o’clock
in
the
morning
cause
I’m
tex%ng.

When
my
 pinger’s
gone
to
sleep
that’s
when
I
go
to
sleep.
If
there’s
no‐one
to
 ping
I’ll
go
to
sleep.
If
<name>
is
up
%ll
6am
I
would
stay
up
all
night.”




 
 Student
from
Focus
Group
  • 99. ns tio n da e m c om e R
  • 100. ns tio n da e m c om e R
  • 101. ns tio n da e om m E‐safety
needs
to
be
embedded
into
the
wider
 ec R teaching
of
emo#onal,
social
and
digital
 literacies
in
all
schools
from
an
early
age.

  • 102. ns tio n da e om m E‐safety
needs
to
be
embedded
into
the
wider
 ec R teaching
of
emo#onal,
social
and
digital
 literacies
in
all
schools
from
an
early
age.
 A resource looking specifically at the compulsive nature of mobiles and understanding the ‘need’ for constantly checking for messages, could be a really positive resource for PRUS and could be a great ‘way in’ to addressing issues of identity and belonging.
  • 103. ns tio n da e om m E‐safety
needs
to
be
embedded
into
the
wider
 ec R teaching
of
emo#onal,
social
and
digital
 literacies
in
all
schools
from
an
early
age.
 A resource looking specifically at the compulsive nature of mobiles and understanding the ‘need’ for constantly checking for messages, could be a really positive resource for PRUS and could be a great ‘way in’ to addressing issues of identity and belonging. “Schools
should
be
more
serious
about
this
subject,
like
they
don’t
know
what’s
 really
going
on
like,
ah
it’s
just
a
mobile
phone
and
they’re
just
pinging
each
other
 but
it’s
more
serious
than
that
and
there
ought
to
be
a
law
about
what
phone
you
 should
have.”

Student
from
focus
group
  • 104. Q
11)

In
your
work
with
vulnerable
young
people
have
you
 used
Social
Media
or
mobile
technology
posi#vely
to
engage
 with
your
young
learners
? Just
under
half
of
 those
interviewed
 had
used
social
 media
posiWvely
to
 engage
with
young
 learners.

Of
those
 who
hadn’t
30%
 said
that
they
 would
like
to.
  • 105.
  • 106. ns tio n da e m om ec R
  • 107. ns tio n da e om m More
research
about
the
targeWng
of
young
girls
by
 ec R older
boys
via
technology
should
be
undertaken
 and
a
mulW‐agency‐supported
campaign
about
 peer‐grooming
aimed
at
vulnerable
young
people
 should
be
considered.

  • 108. ns tio n da e om m More
research
about
the
targeWng
of
young
girls
by
 ec R older
boys
via
technology
should
be
undertaken
 and
a
mulW‐agency‐supported
campaign
about
 peer‐grooming
aimed
at
vulnerable
young
people
 should
be
considered.
 “More
and
more
‘Facebook’
style
bullying
issues
and
confronta%ons
 are
arriving
in
the
classroom
with
no
warnings
accessed
through
 mobiles
(not
PCs).
All
our
young
people,
despite
their
socio‐economic
 group,
have
mobile
phones
‐
most
with
internet
access.

We
have
seen
 serious
incidences
of
grooming
through
mobile,
using
a
mixture
of
SN
 and
conversa%ons.”

  • 109. Q6)
Thinking
about
the
young
people
you
work
with,
do
you
 feel
that
they
are
more
at
risk
than
other
young
people
when
it
 comes
to
bullying
and
abuse
online
or
via
mobile
phones
? Most
felt
that
they
 were
either
more,
 or
slightly
more
at
 risk,
than
other
YP
 when
it
came
to
 bullying
and
abuse
 online
or
via
 mobiles
(62%
 combined)


  • 110. THE POSITIVE ! Work in progress IDENTIFYING GOOD PRACTICE TO INSPIRE OTHERS! Could these be little ‘vignettes’ re specific practical actions EG ‘Facebook Fridays’
  • 111. THE POSITIVE ! Good
 pracWce/ examples Work in progress IDENTIFYING GOOD PRACTICE TO INSPIRE OTHERS! Could these be little ‘vignettes’ re specific practical actions EG ‘Facebook Fridays’
  • 112. THE POSITIVE ! Our PRU set up its own internal social network to allow interaction between staff and pupils. Southampton Good
 “We don’t have a culture of panic here – especially pracWce/ re ICT issues. ICT is embedded in all we do - it’s examples now a life skill.” Parkside, Ipswich “Those who are shy are much more likely to use Work in progress social media more than face to face as it helps break down communication barriers, esp for those with IDENTIFYING learning difficulties. Also – online games and tools GOOD PRACTICE for learning is a great way for children to learn and TO INSPIRE can be used at optimum times to suit different OTHERS! learning styles.” Suffolk Could these be little “We use it [SM] to keep in contact with YP, especially those who go missing.” Sheffield. ‘vignettes’ re specific practical actions EG ‘Facebook Fridays’ “We would like to start a sheltered environment to aid transition” Derbyshire
  • 113. “Blended facilitation” Offline Online info@katiebacon.co.uk
  • 114. “Blended facilitation” Offline Online info@katiebacon.co.uk
  • 115. “Blended facilitation” Offline Online info@katiebacon.co.uk
  • 116. “Blended facilitation” Offline Online info@katiebacon.co.uk
  • 117. “Blended facilitation” Offline Online info@katiebacon.co.uk
  • 118. “Blended facilitation” Offline Online info@katiebacon.co.uk
  • 119. “Blended facilitation” Offline Online info@katiebacon.co.uk
  • 120. “Blended facilitation” Offline Online info@katiebacon.co.uk
  • 121. “Blended facilitation” Offline Online info@katiebacon.co.uk
  • 122.
  • 123.
  • 124. ns tio n da e m om ec R
  • 125. ns tio n da e m om If
the
support
and
guidance
which
PRUs
give
students
in
this
area
is
to
 ec R be
effecWve,
it
has
to
be
consistent
across

mulW‐agencies.

Any
agreed
 policies
should
also
be
understood
by
those
working
with
vulnerable
 young
people
outside
the
PRU
system,
including
those
responsible
for
 caring
for
young
people
(parents
and
carers,
or
foster
providers,
care
 homes
etc).

This
is
challenging
as
some
of
the
environments
in
which
 these
young
people
live
can
be
‘chaoWc’.

  • 126. ns tio n da e m om If
the
support
and
guidance
which
PRUs
give
students
in
this
area
is
to
 ec R be
effecWve,
it
has
to
be
consistent
across

mulW‐agencies.

Any
agreed
 policies
should
also
be
understood
by
those
working
with
vulnerable
 young
people
outside
the
PRU
system,
including
those
responsible
for
 caring
for
young
people
(parents
and
carers,
or
foster
providers,
care
 homes
etc).

This
is
challenging
as
some
of
the
environments
in
which
 these
young
people
live
can
be
‘chaoWc’.
 “We
don’t
need
more
guidance
from
the
top
down.
What
we
need
is
support,
 resources
and
trust
to
develop
appropriate
responses
based
on
our
considerable
 professional
experience
and
understanding
of
vulnerable
young
people.”

LA
advisor.

  • 127.
  • 128.
  • 129. ns tio n da e m om ec R
  • 130. ns tio n da e om m It
is
important
to
pilot
more
creaWve
 R ec approaches
to
the
use
of
mobile
technology
 and
access
to
social
networking
within
 PRUs.
Examples
of
vulnerable
young
 people’s
posiWve
engagement
with
social
 media
should
be
beger
promoted
and
 disseminated
within
the
field.
The
 www.prus.org.uk
network
could
help
in
 disseminaWng
good
examples
to
members
 and
help
link
pracWWoners
wanWng
to

  • 131. ns tio n da e om m It
is
important
to
pilot
more
creaWve
 R ec approaches
to
the
use
of
mobile
technology
 and
access
to
social
networking
within
 PRUs.
Examples
of
vulnerable
young
 people’s
posiWve
engagement
with
social
 media
should
be
beger
promoted
and
 disseminated
within
the
field.
The
 www.prus.org.uk
network
could
help
in
 disseminaWng
good
examples
to
members
 and
help
link
pracWWoners
wanWng
to
 “Those
who
are
shy
are
much
more
likely
to
use
social
media
more
than
 face
to
face
as
it
helps
break
down
communica%on
barriers,
especially

 for
those
with
learning
difficul%es.

Also
online
games
and
tools
for
 learning
are
a
great
way
for
children
to
learn
and
can
be
used
at
 op%mum
%mes
to
suit
different
learning
styles.”

Teacher
  • 132. Feedback

 Do
you
recognise
these
reflec#ons
from
 staff
members
and
young
people
?
 info@katiebacon.co.uk
  • 133. Film
  • 135. Film
 FEEDBACK Showcasing
how
tools
can
put
the
 learner
in
the
centre
and
become
co‐ researchers
and
parWcipants
in
the
 delivery
of
learning.

  • 136. Youtube (search for) NICE PICS hgp://www.carrick‐davies.com/research/films info@katiebacon.co.uk
  • 137. UN Rights of the Child info@katiebacon.co.uk
  • 138. UN Rights of the Child Provision info@katiebacon.co.uk
  • 139. UN Rights of the Child Provision Protection info@katiebacon.co.uk
  • 140. UN Rights of the Child Provision Protection Participation info@katiebacon.co.uk
  • 141.
  • 142. PIE
  • 143. PIE
  • 144. PIE Policies
  • 145. PIE Policies
  • 146. PIE Policies Infrastructure
  • 147. PIE Policies Infrastructure
  • 148. PIE Policies Infrastructure Educa#on
  • 149. PIE Policies Infrastructure Educa#on
  • 150. PIE Policies E‐safety
policy,
Acceptable
Use
Policy,


An#‐ Bullying
policy,
Mobile
use
policy
 Infrastructure Educa#on
  • 151. PIE Policies E‐safety
policy,
Acceptable
Use
Policy,


An#‐ Bullying
policy,
Mobile
use
policy
 Infrastructure Educa#on Managed
learning
environment
 with
high
quality
access
and
 equipment
which
is
filtered,
 monitored
and
supervised.
  • 152. PIE Policies E‐safety
policy,
Acceptable
Use
Policy,


An#‐ Bullying
policy,
Mobile
use
policy
 Infrastructure Educa#on Managed
learning
environment
 Whole‐school
ongoing
educa#on
&
 with
high
quality
access
and
 preven#on
programme
which
is
 equipment
which
is
filtered,
 targeted
at
both
pupils,
parents
and monitored
and
supervised. the
whole
school
work‐force.
  • 153. Digital Youth Work Practice Model Support Campaign Educate info@katiebacon.co.uk
  • 154. Legalities of handling online disclosures. What is our duty of care and legal ramifications of viewing. What
do
 staff
need
? We need positive examples of use for learning and 1
 meaningful engagement We need ‘hands-on’ catch up sessions on the basics and new trends of social media especially for our older staff (digital divide). (set up dummy A/Cs) “I
don’t
use
social
 networking
so
 Operational knowledge with clear guidance on how probably
understand
 would you handle a certain situation not just less
than
my
 theoretical discussion. + real information on % of risks not over-exaggeration students.” Clear guidance on boundary issues for all staff ‘Friending’ YP eg fundraising, mentoring, organising events etc. including advice on recording, transparency, disclosure etc
  • 155. Need help to embed this topic into wider Digital and Social and emotional literacy schemes to help develop resilience and reduce inappropriate actions. What
do
 staff
need
?
 We need advice about sanctions that work and advice about what to do re inappropriate and threatening 2 messages from parents to other pupils. Not having access to Facebook in school is problematic as we can’t demonstrate safe use. We need clear guidance on how to use it in school breaks “
I
am
sad
and
 amazed
at
how
li`le
 There is a really important international dimension and we young
people
know
 need to learn from how other countries are tackling the how
to
protect
 use of social media in schools – Spain ‘A’ level in Moodle ! themselves.” We must also learn the lessons which are coming from Serious Case Reviews
  • 156. “Deliverables” need to be dynamic and not a set of do’s and don’ts. AUPS need to be positive NOT negative - expectation is that you do something wrong! What
do
 staff
need
? Advice needs to include the importance of putting the 3
 learner at the heart – including being the teacher. “Teachers are sometimes the worst learners!” We need really clear advice about ‘Taking, making and distributing’ inappropriate images (inc legal advice). So “We
need
to
build
on
 YP are not criminalised at early stage. this
work
and
 conWnue
to
allow
 students
to
be
co‐ We need to recognise the affects of increased exposure to more extreme pornography is having on issues of sexual researchers
and
make
 discovery/identity and experience. sure
that
the
focus
is
 on
parWcipaWon
in
 the
delivery
of
 “We need good quality advice & training which is updated and ‘REAL’ to our context as we learn to exist more online learning”. for our YP.” 

  • 161. The
3
Rs
of
digital
literacy
 Risk Resilience Reputa#on
  • 162. Stephen@carrick‐davies.com www.onlineyouthoutreach.co.uk info@katiebacon.co.uk Twitter @Katie_bacon Facebook page – onlineyouthoutreach info@katiebacon.co.uk

Hinweis der Redaktion

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. It is useful to think about how these activities are similar to familiar offline activities that young people get involved in, and how they are different because they take place digitally. Young people use social networks to keep in contact, share content about their interests (music, art, fashion, films) Some young people form new contacts and friends online. Simply they just some times &amp;#x2018;hangout&amp;#x2019; nattering to each other online. They are also exploring their identity; self express, sexuality,interests, future aspirations for training or employment.\n
  15. Young people are often platform hopping, think about yourself. You may have the TV on in the back ground or music and be on the computer/laptop searching for car insurance or a holiday deal. Young people consumer and share content with their peer group - sometimes - without moderating or filtering the content. They forward or share content that is not appropriate. Encourage them to breath and just slow down. Check do they have permission to share that image? Are the comments on that link positive or negative? \n
  16. The MacArthur Foundation Digital Youth project suggests there are three main &amp;#x2018;genres&amp;#x2019; of young peoples digital media use: Hanging out, messing around and geeking out. Young peoples engagement with these different types of digital media use can be distinguished between friendship driven and interest driven. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. \n
  35. \n
  36. \n
  37. \n
  38. \n
  39. \n
  40. \n
  41. \n
  42. \n
  43. \n
  44. \n
  45. \n
  46. \n
  47. \n
  48. \n
  49. \n
  50. \n
  51. \n
  52. \n
  53. \n
  54. \n
  55. Young people are often platform hopping, think about yourself. You may have the TV on in the back ground or music and be on the computer/laptop searching for car insurance or a holiday deal. Young people consumer and share content with their peer group - sometimes - without moderating or filtering the content. They forward or share content that is not appropriate. Encourage them to breath and just slow down. Check do they have permission to share that image? Are the comments on that link positive or negative? \n
  56. Many young people do not like being in front of the camera or it is not appropriate for them to be identified in photo or film clip.\n
  57. Since the arrival of social network sites there has been a change in the way people can communicate with each other within their peer groups, community and senior decision makers. People do not have to conform to the formal hierarchical communication structure - they can now tweet, facebook or send a youtube video message to convey their views about a service, experience or aspirations.\n
  58. Since the arrival of social network sites there has been a change in the way people can communicate with each other within their peer groups, community and senior decision makers. People do not have to conform to the formal hierarchical communication structure - they can now tweet, facebook or send a youtube video message to convey their views about a service, experience or aspirations.\n
  59. \n
  60. \n
  61. \n
  62. \n
  63. \n
  64. \n
  65. \n
  66. \n
  67. \n
  68. \n
  69. \n
  70. \n
  71. \n
  72. \n
  73. \n
  74. \n
  75. \n
  76. \n
  77. \n
  78. \n
  79. \n
  80. \n
  81. \n
  82. \n
  83. \n
  84. \n
  85. \n
  86. \n
  87. \n
  88. \n
  89. \n
  90. \n
  91. \n
  92. \n
  93. \n
  94. \n
  95. \n
  96. \n
  97. \n
  98. Since the arrival of social network sites there has been a change in the way people can communicate with each other within their peer groups, community and senior decision makers. People do not have to conform to the formal hierarchical communication structure - they can now tweet, facebook or send a youtube video message to convey their views about a service, experience or aspirations.\n
  99. \n
  100. \n
  101. \n
  102. \n
  103. \n
  104. \n
  105. \n
  106. \n
  107. \n
  108. \n
  109. \n
  110. \n
  111. \n
  112. \n
  113. \n
  114. \n
  115. \n
  116. \n
  117. \n
  118. \n
  119. \n
  120. The key to generating traffic and visits to the social network profile, group or page is Blended facilitation. You need to interlink the offline with the online. Capture the activities taking place offline and post online, with comments to help frame and create an audience which hopefully will comment and contribute. Keep it human and not just a notice board, post jokes, funny photos and comments about your day - they need to connect with &amp;#x2018;you&amp;#x2019; the person not the organizational logo/brand \n
  121. The key to generating traffic and visits to the social network profile, group or page is Blended facilitation. You need to interlink the offline with the online. Capture the activities taking place offline and post online, with comments to help frame and create an audience which hopefully will comment and contribute. Keep it human and not just a notice board, post jokes, funny photos and comments about your day - they need to connect with &amp;#x2018;you&amp;#x2019; the person not the organizational logo/brand \n
  122. The key to generating traffic and visits to the social network profile, group or page is Blended facilitation. You need to interlink the offline with the online. Capture the activities taking place offline and post online, with comments to help frame and create an audience which hopefully will comment and contribute. Keep it human and not just a notice board, post jokes, funny photos and comments about your day - they need to connect with &amp;#x2018;you&amp;#x2019; the person not the organizational logo/brand \n
  123. The key to generating traffic and visits to the social network profile, group or page is Blended facilitation. You need to interlink the offline with the online. Capture the activities taking place offline and post online, with comments to help frame and create an audience which hopefully will comment and contribute. Keep it human and not just a notice board, post jokes, funny photos and comments about your day - they need to connect with &amp;#x2018;you&amp;#x2019; the person not the organizational logo/brand \n
  124. The key to generating traffic and visits to the social network profile, group or page is Blended facilitation. You need to interlink the offline with the online. Capture the activities taking place offline and post online, with comments to help frame and create an audience which hopefully will comment and contribute. Keep it human and not just a notice board, post jokes, funny photos and comments about your day - they need to connect with &amp;#x2018;you&amp;#x2019; the person not the organizational logo/brand \n
  125. The key to generating traffic and visits to the social network profile, group or page is Blended facilitation. You need to interlink the offline with the online. Capture the activities taking place offline and post online, with comments to help frame and create an audience which hopefully will comment and contribute. Keep it human and not just a notice board, post jokes, funny photos and comments about your day - they need to connect with &amp;#x2018;you&amp;#x2019; the person not the organizational logo/brand \n
  126. The key to generating traffic and visits to the social network profile, group or page is Blended facilitation. You need to interlink the offline with the online. Capture the activities taking place offline and post online, with comments to help frame and create an audience which hopefully will comment and contribute. Keep it human and not just a notice board, post jokes, funny photos and comments about your day - they need to connect with &amp;#x2018;you&amp;#x2019; the person not the organizational logo/brand \n
  127. The key to generating traffic and visits to the social network profile, group or page is Blended facilitation. You need to interlink the offline with the online. Capture the activities taking place offline and post online, with comments to help frame and create an audience which hopefully will comment and contribute. Keep it human and not just a notice board, post jokes, funny photos and comments about your day - they need to connect with &amp;#x2018;you&amp;#x2019; the person not the organizational logo/brand \n
  128. \n
  129. \n
  130. \n
  131. \n
  132. \n
  133. \n
  134. \n
  135. \n
  136. \n
  137. \n
  138. \n
  139. Many young people do not like being in front of the camera or it is not appropriate for them to be identified in photo or film clip.\n
  140. Since the arrival of social network sites there has been a change in the way people can communicate with each other within their peer groups, community and senior decision makers. People do not have to conform to the formal hierarchical communication structure - they can now tweet, facebook or send a youtube video message to convey their views about a service, experience or aspirations.\n
  141. Since the arrival of social network sites there has been a change in the way people can communicate with each other within their peer groups, community and senior decision makers. People do not have to conform to the formal hierarchical communication structure - they can now tweet, facebook or send a youtube video message to convey their views about a service, experience or aspirations.\n
  142. Since the arrival of social network sites there has been a change in the way people can communicate with each other within their peer groups, community and senior decision makers. People do not have to conform to the formal hierarchical communication structure - they can now tweet, facebook or send a youtube video message to convey their views about a service, experience or aspirations.\n
  143. \n
  144. \n
  145. \n
  146. \n
  147. \n
  148. \n
  149. \n
  150. \n
  151. \n
  152. \n
  153. \n
  154. Universal: Youth workers are equipped to respond to young people&apos;s online social networking - All workers have experience of what SNS are &amp; understand the basic safety and opportunity issues associated with them. They are able to apply good youth work practices and responses to online social networking related issues. \n\nWidespread: Youth workers are equipped to use online social networking as a youth work tool - Some workers are confident in using SNS as a tool in their work with young people for individual communication, closed group work or promoting youth work activities and opportunities. \n\nSpecialist: Youth workers are equipped as an online social networking (and social media) specialists - A small number of workers are equipped to run dedicated projects using SNS and to support other staff members making use of SNS. They may also be equipped to operate as online outreach workers. \n
  155. \n
  156. \n
  157. \n
  158. \n
  159. \n
  160. \n
  161. \n
  162. \n