SlideShare ist ein Scribd-Unternehmen logo
1 von 14
From Child Exploitation to Bubble
                  Wrapped Kids




                                       Larry Magid
                                         Co-Director
                                      ConnectSafely.org
Creative Commons images from Flickr                       Safer Internet Day
                                                          Moscow, February 2012
We’ve come a long way in some
       countries, but …

      • There is such a thing as being “too
        protective”

      • Risk is inevitable, the question is how to
        manage it

      • We need to strike a balance between
        protection and freedom

      • Teach critical thinking so that people
        learn to manage their own risks
As we think about how to protect children,
      we need to consider the rights of the child


"The child shall have the right to
freedom of expression; this right shall
include freedom to seek, receive and
impart information and ideas of all
kinds, regardless of frontiers, either
orally, in writing or in print, in the
form of art, or through any other
media of the child's choice.”

Article 13 of the U.N. Convention on the Rights of the Child
We need to understand risk,
                  not exaggerate it

•   Of course there are risks online, but
    they are not anything new or special
•   Pay attention to the research
•   Include children in the discussion
•   Understand the limits of regulation and
    the benefits of education
In the U.S., the rise of the Web has not
resulted in increased victimization of children




   Blue line represents 58% decline in child sex abuse from 1992 to
   2008.
   Source: Updated Trends in Child Maltreatment, 2008: Finkelhor, Jones and Shattuck: Crimes Against Children
   Research Center
Moving right along
The Internet Safety Technical Task Force found that:

  “Bullying and harassment, most often by peers, are
  the most salient threats that minors face, both
  online and offline.”

  Which lead to …
Cyberbullying Panic!
Cyberbullying is a problem, but most
   children are neither victims nor monsters
                   • Not every interaction that makes kids
                     uncomfortable is bullying
                   • While some are very vulnerable, most
                     children are reasonably resilient
                   • Across Europe, 6% of 9-to-16-year-old
                     Internet users have been bullied
                     online. 3% confess to having bullied
                     others
                   • Far more have been bullied offline, with
                     19% saying they have been bullied, and
                     12% saying them have bullied someone
                     else*


* EU Kids Online
Sexting Panic
A 2008 survey found that 20% of teens had sent or posted
“nude or semi-nude images of themselves”




  Which led to stories like this:
But a 2011 U.S. study found
                   •     1.3% sent an image where they
                         showed breasts, genitals or
                         someone’s bottom

                   •     2.5% sent an image where they
                         were nude or partially nude



Source: Crimes Against Children Research Center, Dec , 2011
Ultimately, the best filter runs
           between the child’s ears, not on a
                 device or a network




Protection that lasts a lifetime




                                   Training wheels for young kids
Talk with your children

• Parents should talk with their children. Ask the
  kids about what they do online, what they
  consider to be the risks and what strategies
  they’re already using
• Don’t overreact if your child tells you about
  problems online. You want them to feel
  comfortable bringing issues to your attention
Basic advice for kids & teens
Be your own person. Don't let friends or strangers pressure you to
be someone you aren't.

Be nice online. People who are nasty and aggressive online are at
greater risk of being bullied or harassed themselves.

Think about what you post. Sharing provocative photos or intimate
details online, even in private emails, can cause you problems later
on.

Passwords are private. Don't share your password even with
friends

Don't talk about sex with strangers. Don't lead them on - you don’t
want to be the target of a predator's grooming

Avoid in-person meetings. The only way someone can physically
harm you is if you're both in the same location

Be smart when using a cellphone. All the same tips apply with
phones. Be careful who you give your number to and how you use
you’re phone’s camera, location services, apps, and other features

       Adapted from ConnectSafely’s Social Web Tips for Teens
Thank you!
      Larry Magid
larry@connectsafely.org
For more see, OS3.ConnectSafely.org
        These slides are online at
       ConnectSafely.org/nobubble

Weitere ähnliche Inhalte

Mehr von ConnectSafely

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for SeniorsConnectSafely
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawConnectSafely
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyConnectSafely
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentConnectSafely
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some ContextConnectSafely
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenshipConnectSafely
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenshipConnectSafely
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, brieflyConnectSafely
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspectiveConnectSafely
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely
 

Mehr von ConnectSafely (13)

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook Privacy
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
App Privacy
App PrivacyApp Privacy
App Privacy
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some Context
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenship
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenship
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
 

Kürzlich hochgeladen

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Kürzlich hochgeladen (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

From child exploitation to bubble wrapped kids

  • 1. From Child Exploitation to Bubble Wrapped Kids Larry Magid Co-Director ConnectSafely.org Creative Commons images from Flickr Safer Internet Day Moscow, February 2012
  • 2. We’ve come a long way in some countries, but … • There is such a thing as being “too protective” • Risk is inevitable, the question is how to manage it • We need to strike a balance between protection and freedom • Teach critical thinking so that people learn to manage their own risks
  • 3. As we think about how to protect children, we need to consider the rights of the child "The child shall have the right to freedom of expression; this right shall include freedom to seek, receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in writing or in print, in the form of art, or through any other media of the child's choice.” Article 13 of the U.N. Convention on the Rights of the Child
  • 4. We need to understand risk, not exaggerate it • Of course there are risks online, but they are not anything new or special • Pay attention to the research • Include children in the discussion • Understand the limits of regulation and the benefits of education
  • 5. In the U.S., the rise of the Web has not resulted in increased victimization of children Blue line represents 58% decline in child sex abuse from 1992 to 2008. Source: Updated Trends in Child Maltreatment, 2008: Finkelhor, Jones and Shattuck: Crimes Against Children Research Center
  • 6. Moving right along The Internet Safety Technical Task Force found that: “Bullying and harassment, most often by peers, are the most salient threats that minors face, both online and offline.” Which lead to …
  • 8. Cyberbullying is a problem, but most children are neither victims nor monsters • Not every interaction that makes kids uncomfortable is bullying • While some are very vulnerable, most children are reasonably resilient • Across Europe, 6% of 9-to-16-year-old Internet users have been bullied online. 3% confess to having bullied others • Far more have been bullied offline, with 19% saying they have been bullied, and 12% saying them have bullied someone else* * EU Kids Online
  • 9. Sexting Panic A 2008 survey found that 20% of teens had sent or posted “nude or semi-nude images of themselves” Which led to stories like this:
  • 10. But a 2011 U.S. study found • 1.3% sent an image where they showed breasts, genitals or someone’s bottom • 2.5% sent an image where they were nude or partially nude Source: Crimes Against Children Research Center, Dec , 2011
  • 11. Ultimately, the best filter runs between the child’s ears, not on a device or a network Protection that lasts a lifetime Training wheels for young kids
  • 12. Talk with your children • Parents should talk with their children. Ask the kids about what they do online, what they consider to be the risks and what strategies they’re already using • Don’t overreact if your child tells you about problems online. You want them to feel comfortable bringing issues to your attention
  • 13. Basic advice for kids & teens Be your own person. Don't let friends or strangers pressure you to be someone you aren't. Be nice online. People who are nasty and aggressive online are at greater risk of being bullied or harassed themselves. Think about what you post. Sharing provocative photos or intimate details online, even in private emails, can cause you problems later on. Passwords are private. Don't share your password even with friends Don't talk about sex with strangers. Don't lead them on - you don’t want to be the target of a predator's grooming Avoid in-person meetings. The only way someone can physically harm you is if you're both in the same location Be smart when using a cellphone. All the same tips apply with phones. Be careful who you give your number to and how you use you’re phone’s camera, location services, apps, and other features Adapted from ConnectSafely’s Social Web Tips for Teens
  • 14. Thank you! Larry Magid larry@connectsafely.org For more see, OS3.ConnectSafely.org These slides are online at ConnectSafely.org/nobubble

Hinweis der Redaktion

  1. Civilized countries have a long history of protecting children against exploitation and neglect but sometimes they can go too far
  2. Harvard Law Berkman force found that the #1 risk peer harassment and bullying. Law enforcement dominates the discussion
  3. THESE ARE ALL IMPORTANT BUT VERY GENERAL – CERTAINLY EACH INCIDENT IS UNIQUE AND NEEDS CARING INDIVIDUAL TREATMENT - a full, nonconfrontational, child-caregiver discussion that looks at the situation’s circumstances. The psychological damage can be considerable – some kids have suicidal thoughts.School counselor I spoke with several years ago would find out all the parties involved, get them in a room, and do bully-victim reverse role-playing (empathy training). In families and schools, some of these incidents can be turned into TEACHABLE MOMENTS (maybe anonymized?) for all parties’ benefit.