SlideShare ist ein Scribd-Unternehmen logo
1 von 86
SOCIAL MEDIA, YOUNG PEOPLE
AND E- SAFETY
LEWISHAM EDUCATION
ARTS NETWORK
Introductions
Stephen Carrick-Davies
• Ten years at Childnet International
• Now an Independent Trainer/ Social
Entrepreneur /Parent/Learner .....
Social Media & Vulnerable YP people
IDENTITY
Impersonation
“Fraping”
RELATIONSHIPS
TRUST
“Sexting”
CONFLICT
Anger
“Game
rage”
COPING
Reporting
“I’m there
for
you”
What are your expectations and training needs ?
Risk
Reputation
The 3 Rs of digital literacy
Responsibility
Our safety, conduct
& risky behaviours
Our privacy,
security settings
and our peer group
Our leadership,
ethical code and
resilience
Understanding the risks
(not the same thing as harm!)
PART I
“Everything that’s already in the world when
you’re born is just normal.
Douglas Adams
How to stop worrying and learn to love the internet
1999
Anything that gets invented between then and
before you turn thirty is incredibly exciting and with
any luck you can make a career out of it.
Anything that gets invented after you’re thirty is
against the natural order of things and the
beginning of the end of civilisation as we know it…
…until it’s been around for
about ten years ….when it
gradually turns out to be
alright really.” 
The risk of misunderstanding
AMPLIFIER
(gives children
a voice)
ANONYMITY
ALWAYS ON
AWAY FROM
SUPERVISION
ACCEPTANCE -
IDENTITY &
STATUS
ACCESS THE
WORLD
ACTIVE NOT
PASSIVE
MEDIUM
ADDICTIVE (?)
“If you took away
my mobile phone
you would take
away a part of me”
The child’s online world
real
Play film
“I have over 120 people on my BBM but I deleted
like 30 on Saturday cause I was angry and they
pissed me off so I just deleted them. Since I’ve had
my BlackBerry only 2 people have deleted me.”
Student from Pupil Referral Unit
What is this world like for vulnerable YP ?real
Film at www.carrick-davies.com/research/films
What was the greatest fear
for the yp in the film ?
Turn to your neighbour
How did it had got out of control ?
What would you do next if you were
in that position ?
GROUP EXERCISE
A GREAT
PACIFIER !
PORTABLE
PRIVATE +
PERSONAL
EDUCATIONALLY
VALUABLE !
STATUS
SYMBOL
FUN &
GAMES
INTER
GENERATIONAL
ANYTIME,
ANYWHERE
ANYWAY
PRACTICAL
USEAGE
photo/video
Apps etc
The game changer
SMART PENS – the latest ‘Internet of Things’
AGE RESTRICTIONS
Social location
APPLICATIONS
Huge range of apps
NEWS FEEDS
“boast by post”
MESSAGES
Superseding E-mail WHO’S ONLINE
Know who is online now!
PHOTOS/TAGS
Comment and
Tag photos face
recognition
LIVE CHAT
Superseding IM
FRIENDS
Find, link, be in
constant contact
+ on your mobile
VIDEO
link and embed
Events/ Groups
ALL FOR FREE …… BUT ….WHAT PRICE IS FREE ?
TIME LINE
Facebook Timeline
Re-check
your privacy
settings using
‘View As’
function
Searchable
by years
The importance of privacy settings
31% of 12-15 year olds don’t use privacy settings on their
social networking profiles – Ofcom Media literacy Report 2009
Check
regularly
because the
settings
change
What is your experience of using FB with YP ?
Profiles have ‘friends’ and you will always need to create a
professional work profile to manage any engagement on a
profile, but you do not necessarily have to accept friend
requests from young people.
Groups have ‘members’ and can be public, private or invite
providing a discussion and media sharing space.
The creator of the group moderates members and
conversations. Groups work well when there is a clear
shared interest or sense of community between group
members. Sometimes groups are used as a form of petition
— where individuals join a group to display their support for
an idea or issue. You can message all the members of a
group direct to their Facebook inbox.
Pages have ‘fans’. A page is similar to a profile, but pages
are for organisations and projects rather than for people.
They are a good tool for sharing information and getting
feedback by allowing comments on the content you share.
You can add Facebook applications and add-on features to
your pages to make them more interactive
A word about BBM
• Be careful with your BBM PIN
• Be careful of ‘Screen Munching’
• Use the tools – like delete contact
and block future requests.
• Make sure your blackberry has a
password
See www.carrick-davies.com for film and
tutorial. (bottom of the page)
See pages 54 – 59 in Vodafone’s Digital Parenting magazine
A word about games
• The ratings are there for a reason.
• Anyone who sells a designated 12+
title to younger children will face
fines of up to ÂŁ5,000 /jail.
• Recognise the ‘compulsion’ issues.
• Younger siblings and friends.
• Misogynistic messages and casual
cruelty.
Our perception of danger
Most abuse takes place in the
context of a family or close
relative.
UPLOADED
(captured)
MUNCHED
FORWARDED
COMMENTED ON
COPIED
STORED
MORPHED/
CHANGED
LIE DORMANT
AMPLIFIED
RE- BROADCAST
An incubator ?
What terms do we use to explain this space ?
What do you think about this
description of the Internet ?
Feedback
What sort of things could
be hatched ?
GROUP EXERCISE
Classifying the risks to children online
CONTENT
CONTACT
CONDUCT
Commercial Aggressive Sexual Values
Adverts
Spam
Sponsorship
Personal info
Violent and
hateful
content
Pornographic
unwelcome
sexual content
Bias
Racist
Misleading
info or advice
Tracking
Harvesting
Personal info
Being bullied
harassed or
stalked
Meeting
strangers
Being
groomed
Self harm
Unwelcome
persuasions
Illegal
downloading
Hacking Gambling
Financial scams
Terrorism
Bullying or
harassing
another
Creating and
uploading
inappropriate
material
Providing
misleading
info/advice
Original 3 Cs Classification by
‘EU Kids’ online project
Child as Recipient
Child as Participant
Child as Actor
Contact
www.ceop.gov.uk
if you have concerns
about inappropriate
communication from an
adult to a minor.
CONTENT
Child as Recipient
CONTACT
Child as Participant
CONDUCT
Child as Actor
Commercial Aggressive Sexual Values
Pornographic
unwelcome
sexual content
Meeting
strangers
Being
groomed
Creating and
uploading
inappropriate
material
Online grooming is a
criminal offence
“One-third of those who
sexually abuse children are
just children themselves.”
BBC Newsnight programme March 2010
21,630 BEBO members had the name “Porn Star”
“Sexting” = teens sharing nude photos via mobiles and web. The practice can
have serious legal and psychological consequences
“So take a dirty
picture for me,
Take a dirty picture
Just take a dirty
picture for me
Take a dirty picture”
From Taio Cruz song
No 6 in the UK charts
April 2010.
How the risks ‘migration’ from online to
offline can affect vulnerable YP
CONTENT
CONTACT
CONDUCT
Commercial Aggressive Sexual Values
Child as Recipient
Child as Participant
Child as Actor
CRIMINAL
BEING IN THE WRONG PLACE AT THE WRONG TIME & “BAD LUCK”
OF THE 1,984 PEOPLE
CHARGED AFTER RIOTS:
 53% were under 20 years old
 42% received free school meals
(16% nat. average)
 66% of them had some special
education needs (21% of all pupils)
Figures from the Ministry of Justice
carried out by the Howard League for
Penal Reform
(published in Guardian 26.11.11)
Original 3 Cs Classification
by ‘EU Kids’ online project
ASSOCIATION
WITH
SOMEONE
COMPLICIT IN
A JOINT
ENTERPRISE
“You played no
part but
presence there
encouraged
others ”
FAIL TO
INTERVENE
FAILURE TO
WALK AWAY !
INCLUDES ONLINE EVIDENCE OF
ASSOCIATION & ENCOURAGEMENT
JOINT ENTERPRISE:
Legislation that finds people guilty of a violent crime if they are
judged to have lent encouragement to the main perpetrator.
“They planned the attack on social media the night before, the court
was told, sending messages to each other on Facebook and via
BlackBerry Messenger.”
Classifying the risks to children online
CONTENT
CONTACT
CONDUCT
Commercial Aggressive Sexual Values
Violent and
hateful
content
Being bullied
harassed or
stalked
Bullying or
harassing
another
Classification by ‘EU Kids’ online project and referenced in the Byron Report
Child as Recipient
Child as Participant
Child as Actor
22% of yp aged 11-
18 report having
been cyber bullied.
It ruins lives.
YP may not disclose
that it is happening
“Sticks and stones.... But words ...?”
From US Ad Council at
http://www.youtube.com/watch?v=bdQBurXQOeQ
How is Cyberbullying different from offline bullying?
OFFLINE ONLINE
Home is safe
Often Physical Usually words/pictures
Bully strong/victim weak Roles can change
Can be 24/7
Local & intimate Mass audience
See the impact Don’t see impact
Lack of empathy
Bystanders intervene
Bystanders take part
“If you laugh at it you’re part of it”
Often Silent It can leave a trail !
Why YP may be scared of reporting abuse ?
• “It was nobody else’s business”
• “Didn’t think it was serious or wrong”
• “Didn’t want parents/friends to find out”
• “Was frightened”
• “Didn’t think I would be believed”
• “Had been threatened by the abuser”
Source: Child Maltreatment in the UK Cawson 2000
• “My parents don’t get the internet”
• “Maybe it was my fault ! (blur)”
• “Scared if computer is confiscated”
Abuse on the internet/mobile phone
RESPONDING TO THE VICTIM
Need for reassurance – THIS IS BULLYING !
Practical advice:
RED Don’t retaliating,
Orange – Save the evidence
Green – Tell someone (who?)
See advice, resources and guidance at
Childnet’s www.digizen.org website
 Understanding and accepting the
impact of cyberbullying.
 Updating existing policies and
practices. (AUP anti-bullying)
 Making reporting easier - includes
advice about removal of content.
(industry support)
 Promoting the positive use of
technology.
 Evaluating impact of prevention
activities.
PREVENTING RESPONDING
 Supporting the victim – need for
reassurance.
 Practical advice and support such as
saving evidence, not retaliating,
informing parents.
 Investigate and record incidents,
identify the bully.
 Working with the bully and sanctions
(including technology specific).
 Involve Parents /carers
Underpinned by effective education and awareness
The young person who you are responsible for (let’s say she’s a
12 year old girl) tells you that her “friends” in her class took
video clip of her at a sleep over pyjama party on their phones
which is now being circulated and she thinks it is now posted on
a social networking site.
•Is this an issue for your school/organisation
•What advice would you give to her ?
•Who should the girl report this to ?
•How would you go about trying to remove this content ?
•What if those who posted it up have circulated it more widely
?
GROUP EXERCISE
Risk
Conversations about
ADVICE
FOR YOUNG PEOPLE
“Do you know who all your online
friends are offline?”
“Do you know how to block
someone on Facebook?”
“Do you have a PIN on your mobile
phone?”
“Do any of your friends send photos
of themselves?”
“Do you know how to save that sort
of evidence?”
“Would you report that at
school/CEOP?”
FOR OUR STAFF
“Have we assessed how we as staff and
our users could be vulnerable online?”
“If we use Social Media do we set clear
guidance on use ?”
“Do we use an organisation mobile
phone if working with yp ? (ie not our
personal one?”
“Do we know how to save evidence and
intervene or reporting to CEOP?”
Questions and feedback so far ?
Let’s break for 10 minutes
WAYS IN WHICH
THE INTERNET
CAN AMPLIFY
VULNERABILITY
10 WAYS IN
WHICH THE
INTERNET CAN
AMPLIFY
OFFLINE
VULNERABILITY
‘Vulnerable’
Those who have experienced offline risk and
abuse may be more resilient and able to
protect themselves online or may not be
affected so much by the risks they encounter.
HOWEVER WE CAN IDENTIFY
A FEW COMMON FEATURES....
This is complex because:
All children are different so there are
dangers in making broad statements.
Vulnerability is not static - All
children can be vulnerable at
different stages
Many children are neglected which is
harder to spot yet makes them
vulnerable
The categorisations of risk offline
do not necessarily mirror online
experience (eg a disabled yp
may be empowered online as the
internet can be ‘leveller’
The paradox that over-
protected children can be
more vulnerable online.
The more a child uses the internet the more they can become confident and
possibly complacent and feel ‘invincible’ and don’t feel they are at risk.
What about
vulnerable
adults ?
Constantly changing
technologies. Eg, Location services
Lack of
supportive
adults in their
lives
More
unsupervised
time, fewer
structures and
boundaries
Fluid learning
environment and
gaps in education
and induction
Low self-
confidence.
Identity seen to
be part of
‘outsiders’
Influences of
alcohol, drugs and
gang culture. Risk
takers and at risk
Experience
abusive
relationships or
environments
including anger
MUNCH
POKE
PING!
See www.carrick-davies.com
“Many of the young people I work with are massive risk takers,
impulsive to the extreme and often use alcohol and/or drugs. On
average they first engage in sexual activity at a far younger age than
other students. They also have huge amounts of unsupervised time on
their hands, often till very late at night. I teach many YP who are half-
asleep as they have been online till gone 3am.”
PRU staff member from ‘MPP’ report
“I have over 120 people on my BBM but I
deleted like 30 on Saturday cause I was
angry and they pissed me off so I just
deleted them. Since I’ve had my BlackBerry
only 2 people have deleted me.”
PRU student from ‘MPP’ report
WE MAY SEE THEM AS VULNERABLE
BUT THEY MAY SEE THEMSELVES AS IN CONTROL
Unmediated Contact
Children who have been fostered can suddenly receive messages from siblings, birth
parents, or those who want to trace them for potentially harmful reasons.
WAYS IN WHICH
THE INTERNET
CAN AMPLIFY
VULNERABILITY
Guardian Newspaper article 19 June 2010
 Social Location
WAYS IN WHICH
THE INTERNET
CAN AMPLIFY
VULNERABILITY
Young People who may need to escape from an abusive relationships need to think
carefully about how they make their ‘places’ public.
Eg Facebook Timeline
 Exclusion from the ‘norm’
There are lots of online services which celebrate our ‘journey’. How do children who
don’t know their birth parents, may not have an early photo of themselves feel in these
‘boast by post’ environments ?
WAYS IN WHICH
THE INTERNET
CAN AMPLIFY
VULNERABILITY
 Blackmailing “gifting” &
grooming by peers
A young person from a disadvantaged background may be targeted with ‘gifts’ of
mobile phones, mobile payment cards etc, by older young people but in exchange for
‘favours’ which they ‘cash in’ later (including prostitution, trafficking or illegal
activity). If it sounds to good to be true .... it’s probably is (they want something ! )
Search ‘NSPCC survey on teen partner violence’ for more info
WAYS IN WHICH
THE INTERNET
CAN AMPLIFY
VULNERABILITY
Many vulnerable young people can be early adopters of tools and services which are
not yet regulated or in the public conscious. For example BBM
How will QR codes be mis-used ?
 Earlier adopters ?
Screen Munch !
WAYS IN WHICH
THE INTERNET
CAN AMPLIFY
VULNERABILITY
“Any A/C holders looking
to make a quick grand get
at me. No time wasters.”
Message on BBM about
bank scams (fraud!)
 Being ‘nudged’ into gangs
ALL CHILDREN WILL
LEAVE A FOOTPRINT
EXCEPT SOME WILL BE
IN MUDDIER SAND!
WAYS IN WHICH
THE INTERNET
CAN AMPLIFY
VULNERABILITY
Vulnerable young people who are risk takers,
impulsive or under the influence of alcohol and/or
drugs and less supervised, can be more easily
drawn into illegal activity including being ‘nudged’
through technology.
 Negative digital footprint
ALL CHILDREN WILL LEAVE A
DIGITAL FOOTPRINT
BUT SOME WILL BE MUDDIER
THAN OTHERS
WAYS IN WHICH
THE INTERNET
CAN AMPLIFY
VULNERABILITY
Those who are supported can compensate
and build positive online footprint but
what about those who aren’t ?
 Low Resilience
“When my pinger’s gone
to sleep that’s when I’ll
go to sleep.”
WAYS IN WHICH
THE INTERNET
CAN AMPLIFY
VULNERABILITY
Young people need to be cherished, have the right amount of
sleep and healthy food. What happens when you are running on
empty ?
 Special needs & learning difficulties
•WAYS IN WHICH
THE INTERNET
CAN AMPLIFY
VULNERABILITY
Some children with emotional or behavioural difficulties, attachment
difficulties, and other complex needs, may be particularly vulnerable online.
EG those with Autistim Spectrum Disorder may make literal interpretations
of content, which will affect how they respond.
Others with complex needs may not understand the concept of friendship,
and therefore trust everyone implicitly. Some children with SEN or
disabilities may not recognise that they are being bullied or appreciate how
their own online behaviour may be seen by someone else as bullying.
Attachment
Attachment
Theory
 Low levels of Language & Literacy•WAYS IN WHICH
THE INTERNET
CAN AMPLIFY
VULNERABILITY
We must not assume that all YP are confident “digital natives” and we must also
recognise that one in six people in the UK struggle with literacy (below the level
expected of an eleven year old). Hence being able to complete a ‘REPORT ABUSE’
form or read instructions about safety, privacy and ‘terms and conditions’ are real
barriers for many young people.
Do YP recognise the link between reading and being able to be safe ?
Lack of literacy skills, can mean
that messages are unclear,
ambiguous or misunderstood
In pairs discuss
GROUP EXERCISE
Do you recognise these 10 offline
vulnerabilities and agree that they
can be amplified online ?
How could you begin to talk to the YP
you look after about these issues?
Can you think of positive ways in
which the Internet minimises offline
vulnerabilities?
PART II
Reputation
Our privacy,
security settings
and our peer group
What goes online stays online
Social media challenges for youth workers
• Social media applications are mostly designed
around informality, intimacy and speed.
• Contact with students outside of the classroom is not only easier
it is actively encouraged. (VLEs, online collaboration etc).
• BUT Young people can view one-to-one communication as a very
private “chumminess” and feel especially valued.
• The boundaries between professional/private expert and learner,
home and work, formal and informal are blurring.
• The technology can be used as vehicles for false allegations,
and exposing teachers to ridicule and humiliation.
• But... there are a range of views with some teachers & Youth Workers
wanting to positively embrace technology to support pupils and there
are very real positives especially for some pupils eg excluded, SEN,
• Recent TES survey
found that 9% of
teachers were friends
with pupils on SNS*.
Challenges for teachers & other professionals
* http://community.tes.co.uk/forums/t/463065.aspx?s_cid=16
See http://www.childnet.com/kia/downloads/Social-networking.pdf for Childnet/TDA leaflet
• General advice from unions and GTS is:
Do not ‘friend’ pupils on personal accounts or ask to be
added to their contact lists.
You could make yourself
vulnerable by sharing your
personal information (and
that of your friends)
You could make yourself
vulnerable by being able to
access their personal
information
You could make yourself
open to allegations of
inappropriate contact or be
misunderstood.
WHY ?
1. Update your AUPs stating how and when personally owned
equipment (including camera phones) can be used.
2. Make sure you have a strong password and set a password or
pin for your phone. Increasingly important for Facebook
‘Fraping’
3. Close down computers quickly if you have to leave a room and
don’t allow cookies to ‘remember your password’
4. Do not post information about yourself publically that you
wouldn’t want employers, colleagues, pupils or parents to see.
5. Make sure you do not retaliate but keep all records – screen
prints and record time, date & website addresses
6. Report any incident to the appropriate member of staff
promptly
7. Make sure the school/organisation informs parents about
incidents and delivers appropriate sanctions
WAYS TO PROTECTING YOURSELF
POSITIVE ONLINE IDENTITY
Reputation
ADVICE
Conversations about
FOR YOUNG PEOPLE
 “Remember what goes online
stays online”
 “When did you last check your
privacy settings?”
 “Can you help me check my
settings”
 “Are you changing your
password regularly?”
 “Do you know the best way to
get offending material taken
down?”
FOR OUR STAFF
 “Do we have an organisational
policy on using social media with
users ?”
 Do we check regularly what
people are saying about our
service on social media ?
 Do we promote ourselves
positively on social media ?
 Are we reaching our users
through social media effectively?
UNDERSTANDING OUR
RESPONSIBILITIES
PART III
“with great power
comes....”
AN ABSENCE OF KNOWLEDGE IS NOT
AN EXCUSE FOR AN ABSENCE OF
RESPONSIBILITY AND CARE.
WHAT IS POTENTIALLY
CRIMINAL, HARMFUL,
INAPPROPRIATE OR ILLEGAL
OFFLINE, IS THE SAME ONLINE.
ULTIMATELY THIS COMES
DOWN TO OUR DUTY OF
CARE & LEADERSHIP.
Policies
Infrastructure Education
Ongoing education &
prevention programme which is
targeted at both YP, parents and
the whole work-force.
Organisation E-safety policy, Acceptable Use
Policy, Anti-Bullying policy, Mobile use policy
Managed learning environment
with high quality access and
equipment which is filtered,
monitored and supervised.
PIE all 3 ‘legs’ are vital
Policies
Need to be:
 Owned -don’t simply cut and paste another
 Updated for constantly changing technology
 Obeyed – new staff, volunteers, sanctions ?
 Monitored – are they effective, out of date?
 Promoted – made accessible to all users
http://network.youthworkonline.org.uk/forum/topics/use-of-facebook-examples-of
A few examples
Resources
Using social media Positively from
Using social media for youth engagement can help organisations:
 Reach young people where they already are spending hours a day connected to social
networking platforms. Too often engagement opportunities are based on expecting
young people to come to us, when we should go to where young people are.
 Be found— as many young people turn to search engines to find or confirm
information. If you’re not online and easy to find, you’re probably missing many
opportunities for youth engagement.
 Communicate with young people in familiar settings — using the same forms of media
young people are comfortable interacting with. Social media tools make it easy to
create rich multi-media communication that you can use to make ideas and
opportunities accessible to young people.
 Meet changing expectations as older methods of communication and participation lose
ground in a social media-rich environment. Young people will expect media they can
interact with.
 Take advantage of networks to spread engagement opportunities— creating content
and opportunities that young people can easily share with their friends through social
media and social networking tools.
Ten top tips to managing social media in adoption*
1 Talk openly and honestly with your children about
social media, contact issues and the risks involved.
Then work together to come up with solutions.
2 Look at privacy settings so that your children’s
profile can not be seen publicly, and also hide lists
of ‘friends’.
* From BAAF website
Advice from
Facing up to
Facebook
http://www.baaf.org.uk/
bookshop/book_fufa
3 Explain to your children the risks involved in
accepting random unknown people as ‘friends’.
4 Make sure they are not making public
information that could help identify them, such
as their date of birth or address.
5 Discuss the possibility of using a nickname
online instead of their real name, perhaps even
having an unusual spelling (e.g N1ck Sm1th)
6 Avoid using profile pictures. Instead use the
default pictures or something generic like
flowers, landscapes, football team logos etc.
7 Children should be discouraged from posting
any information about their school or local area
8 Don’t tag children in photos posted online, and
ask friends and family to be aware of this also.
9 Make sure your children are aware of the
risks of joining groups or networks that
identify where they live or go to school.
10 Make sure your children know how to ‘block’
people so that if they do receive unwanted
contact it can be managed.
See page 53
In the context of an inspection,
e-safety may be described as the
school’s ability:
to protect and educate pupils and
staff in their use of technology
to have the appropriate
mechanisms to intervene and
support any incident where
appropriate.
What can we learn
from schools ?
Assemblies, tutorial time, personal,
social, health and education lessons,
and an age-appropriate curriculum
for e-safety
Pupils were more
vulnerable overall
when schools used
locked down
systems because
they were not
given enough
opportunities to
learn how to
assess and manage
risk for
themselves.
In the outstanding
schools, senior leaders,
governors, staff and
families worked together
to develop a clear strategy
for e-safety. Policies were
reviewed regularly in the
light of technological
developments.
The outstanding
schools recognised
that, relationships
with families, needed
to keep developing to
support e-safety at
home.
Schools need
to make good
use of the
views of pupils
and their
parents to
develop their
e-safety
provision.
WHAT
DOES
GOOD
E-SAFETY
LOOK
LIKE?
REACHING PARENTS/CARERS
“Parents and the home environment they create are the
single most important factor in shaping their children’s
well-being, achievements and prospects”
Alan Johnson (when Education Secretary)
• Does the technology contribute
to an erosion of empathy ?
If so how ?
• What happens when we
become “comfortably numb”
• How can we build empathy
online ?
EMPATHY
“You never really understand a
person until you consider things
from his point of view.
Until you climb inside of his skin
and walk around in it.”
Harper Lee, To Kill a Mockingbird
“Empathy is the ability to put ourselves in another’s
place and to understand their experience.
We are deeply present to their thoughts and
feelings with such compassionate accuracy that
they can hear their own thoughts more clearly.
Empathy connect us with our
common humanity.
It protects us from prejudice,
blame, and judgment – those
things that divide us from each
other. It moves us to seek
justice for every person. Even
those with whom we disagree.”
With empathy, we
reflect on how our
actions affect others.
Empathy inspires us
to be giving and
selfless. Empathy
connects our hearts.
Source
www.boundlessconnections.org/weeklyvirtuesblog/wp-
“Empathy is the ability to put ourselves in another’s
place and to understand their experience.
We are deeply present to their thoughts and
feelings with such compassionate accuracy that
they can hear their own thoughts more clearly.
Empathy connect us with our
common humanity.
It protects us from prejudice,
blame, and judgment – those
things that divide us from each
other. It moves us to seek
justice for every person. Even
those with whom we disagree.”
With empathy, we
reflect on how our
actions affect others.
Empathy inspires us
to be giving and
selfless. Empathy
connects our hearts.
Source
www.boundlessconnections.org/weeklyvirtuesblog/wp-
Risk
Reputation
Where to start ?
Responsibility
Our safety, conduct
& risky behaviours
Our privacy,
security settings
and our peer group
Our leadership,
ethical code and
resilience
Responsibility
Conversations aboutADVICE
FOR YOUNG PEOPLE
 “Have you come across any
good social initiatives?”
 “What advice do you need
about using social media ?”
 “I trust you to make good
decisions, but I also need
to learn from you.”
FOR OUR STAFF
 “Can we involve the YP we work with
in developing our policy and
practice ?”
 “What expectations are we making for
our staff in being online so much ?”
 Are we pioneering new and
imaginative ways of Educating and
inspiring our younger users via social
media ?
WHAT IS ONE THING YOU ARE GOING TO
ACT UPON ?
Risk Safety, conduct &
risky behaviour
Reputation
Privacy, security
settings and peer
group
Leadership, ethical
code and resilience
Responsibility
EVALUATION
Please give feedback.

Useful websites
1) UK law Enforcement agency and part of VGTF
www.ceop.gov.uk
2) UK Council for Child Internet Safety
www.dcsf.gov.uk/ukccis/
3) Childnet International
www.childnet.com/ including Cyberbullying film
4) British Association for Adoption and Fostering
www.baaf.org.uk - including advice on Facebook
And Finally….
"The web is more a social
creation than a technical one.
I designed it for social effect -
to help people work together -
and not as a technical toy….
The ultimate goal of the web is
to support and improve our web
like existence in the world......
Tim Berners-Lee ‘Weaving the Web’ 1999
We have to ensure that the
society we build with the web
is the sort we intend.”
• Questions about anything which has come up
today ?
THANK YOU !
www.carrick-davies.com
stephen@carrick-davies.com
Complete Evaluation
forms
MUNCH
PING
POKE!
See my current work re
social media and vulnerable
yp on my website

Weitere ähnliche Inhalte

Was ist angesagt?

Digital drama
Digital dramaDigital drama
Digital dramaktcole
 
Good Stats on 13-24 y.o. Online Behaviour
Good Stats on 13-24 y.o. Online Behaviour Good Stats on 13-24 y.o. Online Behaviour
Good Stats on 13-24 y.o. Online Behaviour IPG Mediabrands
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullyingsepulvedamd
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingzackkay
 
Coping with the many faces of facebook
Coping with the many faces of facebookCoping with the many faces of facebook
Coping with the many faces of facebookktcole
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big ProblemGail Rebuck
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetysharon7111
 
Students I Safety
Students I SafetyStudents I Safety
Students I SafetyDesiree Caskey
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointHannahMorrell
 
Cyberbulling
CyberbullingCyberbulling
Cyberbullingeliasfiad
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationspringvillegi
 
Social Media Presentation for Teens 2015
Social Media Presentation for Teens 2015Social Media Presentation for Teens 2015
Social Media Presentation for Teens 2015Myeisha Hutchinson
 
E safety training for lewisham arts and education network by stephen carrick...
E  safety training for lewisham arts and education network by stephen carrick...E  safety training for lewisham arts and education network by stephen carrick...
E safety training for lewisham arts and education network by stephen carrick...Stephen Carrick-Davies
 
Assignment 8 draft 3
Assignment 8   draft 3Assignment 8   draft 3
Assignment 8 draft 3ksumbland
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenJanet Weninger
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingwirsi
 
Character Development, for students, by students!
Character Development, for students, by students!Character Development, for students, by students!
Character Development, for students, by students!mediaplaylab
 

Was ist angesagt? (20)

Be a well aware mom !
Be a well aware mom !Be a well aware mom !
Be a well aware mom !
 
Digital drama
Digital dramaDigital drama
Digital drama
 
Good Stats on 13-24 y.o. Online Behaviour
Good Stats on 13-24 y.o. Online Behaviour Good Stats on 13-24 y.o. Online Behaviour
Good Stats on 13-24 y.o. Online Behaviour
 
Web safety
Web safetyWeb safety
Web safety
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Coping with the many faces of facebook
Coping with the many faces of facebookCoping with the many faces of facebook
Coping with the many faces of facebook
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big Problem
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Cyberbulling
CyberbullingCyberbulling
Cyberbulling
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Digital abuse
Digital abuseDigital abuse
Digital abuse
 
Social Media Presentation for Teens 2015
Social Media Presentation for Teens 2015Social Media Presentation for Teens 2015
Social Media Presentation for Teens 2015
 
E safety training for lewisham arts and education network by stephen carrick...
E  safety training for lewisham arts and education network by stephen carrick...E  safety training for lewisham arts and education network by stephen carrick...
E safety training for lewisham arts and education network by stephen carrick...
 
Assignment 8 draft 3
Assignment 8   draft 3Assignment 8   draft 3
Assignment 8 draft 3
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-children
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Character Development, for students, by students!
Character Development, for students, by students!Character Development, for students, by students!
Character Development, for students, by students!
 

Ähnlich wie E safety training for lewisham arts and education network (advance) by stephen carrick-davies sept 2013

Walworth academy e-safety (staff)
Walworth academy   e-safety (staff)Walworth academy   e-safety (staff)
Walworth academy e-safety (staff)esolate
 
Fostering in a digial age training for foster carers - june 2016
Fostering in a digial age    training for foster carers  - june 2016Fostering in a digial age    training for foster carers  - june 2016
Fostering in a digial age training for foster carers - june 2016Stephen Carrick-Davies
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013Stevecd
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationjpl17
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyDonna Murray
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?Sarah Welstead
 
Social Media101 V5
Social Media101 V5Social Media101 V5
Social Media101 V5KimBenedict
 
Esafety: Keeping your kids safe online. New for 2018
Esafety: Keeping your kids safe online. New for 2018Esafety: Keeping your kids safe online. New for 2018
Esafety: Keeping your kids safe online. New for 2018Richard Fitzwarine-Smith
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011DHE2008
 
Parenting In A Media Driven World Slideshare
Parenting In A Media Driven World SlideshareParenting In A Media Driven World Slideshare
Parenting In A Media Driven World Slidesharechrisweber
 
E safety training for southwark staff - stephen carrick-davies january 2013
E  safety training for southwark staff - stephen carrick-davies january 2013E  safety training for southwark staff - stephen carrick-davies january 2013
E safety training for southwark staff - stephen carrick-davies january 2013Stephen Carrick-Davies
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101Chad Richards
 
DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...
DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...
DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...iCAADEvents
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
E safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-daviesE safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-daviesStephen Carrick-Davies
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...Stevecd
 
Playing safe
Playing safePlaying safe
Playing safehutchison
 
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakRaising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakBex Lewis
 

Ähnlich wie E safety training for lewisham arts and education network (advance) by stephen carrick-davies sept 2013 (20)

Walworth academy e-safety (staff)
Walworth academy   e-safety (staff)Walworth academy   e-safety (staff)
Walworth academy e-safety (staff)
 
Fostering in a digial age training for foster carers - june 2016
Fostering in a digial age    training for foster carers  - june 2016Fostering in a digial age    training for foster carers  - june 2016
Fostering in a digial age training for foster carers - june 2016
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?
 
Social Media101 V5
Social Media101 V5Social Media101 V5
Social Media101 V5
 
Esafety: Keeping your kids safe online. New for 2018
Esafety: Keeping your kids safe online. New for 2018Esafety: Keeping your kids safe online. New for 2018
Esafety: Keeping your kids safe online. New for 2018
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Parenting In A Media Driven World Slideshare
Parenting In A Media Driven World SlideshareParenting In A Media Driven World Slideshare
Parenting In A Media Driven World Slideshare
 
E safety training for southwark staff - stephen carrick-davies january 2013
E  safety training for southwark staff - stephen carrick-davies january 2013E  safety training for southwark staff - stephen carrick-davies january 2013
E safety training for southwark staff - stephen carrick-davies january 2013
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101
 
DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...
DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...
DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
E safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-daviesE safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-davies
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
 
Playing safe
Playing safePlaying safe
Playing safe
 
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakRaising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
 

Mehr von Stephen Carrick-Davies

Principles of effective activity based participative learning. - updated. pptx
Principles of effective activity based participative learning. - updated. pptxPrinciples of effective activity based participative learning. - updated. pptx
Principles of effective activity based participative learning. - updated. pptxStephen Carrick-Davies
 
An introduction to Social Entrepreneurship workshop presented by Stephen Ca...
An introduction to Social Entrepreneurship   workshop presented by Stephen Ca...An introduction to Social Entrepreneurship   workshop presented by Stephen Ca...
An introduction to Social Entrepreneurship workshop presented by Stephen Ca...Stephen Carrick-Davies
 
Speaking and Listening Teacher's powerpoint
Speaking and Listening Teacher's powerpoint Speaking and Listening Teacher's powerpoint
Speaking and Listening Teacher's powerpoint Stephen Carrick-Davies
 
Problem Solving Teacher's Powerpoint
Problem Solving   Teacher's Powerpoint Problem Solving   Teacher's Powerpoint
Problem Solving Teacher's Powerpoint Stephen Carrick-Davies
 
FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint
FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint
FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint Stephen Carrick-Davies
 
Self management teacher's powerpoint
Self management   teacher's powerpointSelf management   teacher's powerpoint
Self management teacher's powerpointStephen Carrick-Davies
 
Presentation on understanding and preventing bullying by stephen carrick davi...
Presentation on understanding and preventing bullying by stephen carrick davi...Presentation on understanding and preventing bullying by stephen carrick davi...
Presentation on understanding and preventing bullying by stephen carrick davi...Stephen Carrick-Davies
 
Munch, poke, ping! understanding the language of safety and responsibility
Munch, poke, ping! understanding the language of safety and responsibilityMunch, poke, ping! understanding the language of safety and responsibility
Munch, poke, ping! understanding the language of safety and responsibilityStephen Carrick-Davies
 
Screenless presentation for secondary schools
Screenless presentation   for secondary schoolsScreenless presentation   for secondary schools
Screenless presentation for secondary schoolsStephen Carrick-Davies
 
Screenless presentation for primary schools
Screenless presentation   for primary schoolsScreenless presentation   for primary schools
Screenless presentation for primary schoolsStephen Carrick-Davies
 
Munch Poke Ping Conference ~powerpoint combined presentations. pptx
Munch Poke Ping Conference ~powerpoint combined presentations. pptxMunch Poke Ping Conference ~powerpoint combined presentations. pptx
Munch Poke Ping Conference ~powerpoint combined presentations. pptxStephen Carrick-Davies
 
Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012Stephen Carrick-Davies
 
Safeguarding children online training from steve c-d for southwark diocese-...
Safeguarding children online   training from steve c-d for southwark diocese-...Safeguarding children online   training from steve c-d for southwark diocese-...
Safeguarding children online training from steve c-d for southwark diocese-...Stephen Carrick-Davies
 

Mehr von Stephen Carrick-Davies (15)

Principles of effective activity based participative learning. - updated. pptx
Principles of effective activity based participative learning. - updated. pptxPrinciples of effective activity based participative learning. - updated. pptx
Principles of effective activity based participative learning. - updated. pptx
 
An introduction to Social Entrepreneurship workshop presented by Stephen Ca...
An introduction to Social Entrepreneurship   workshop presented by Stephen Ca...An introduction to Social Entrepreneurship   workshop presented by Stephen Ca...
An introduction to Social Entrepreneurship workshop presented by Stephen Ca...
 
Speaking and Listening Teacher's powerpoint
Speaking and Listening Teacher's powerpoint Speaking and Listening Teacher's powerpoint
Speaking and Listening Teacher's powerpoint
 
Problem Solving Teacher's Powerpoint
Problem Solving   Teacher's Powerpoint Problem Solving   Teacher's Powerpoint
Problem Solving Teacher's Powerpoint
 
FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint
FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint
FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint
 
Team working powerpoint
Team working powerpointTeam working powerpoint
Team working powerpoint
 
Self management teacher's powerpoint
Self management   teacher's powerpointSelf management   teacher's powerpoint
Self management teacher's powerpoint
 
Presentation on understanding and preventing bullying by stephen carrick davi...
Presentation on understanding and preventing bullying by stephen carrick davi...Presentation on understanding and preventing bullying by stephen carrick davi...
Presentation on understanding and preventing bullying by stephen carrick davi...
 
Munch, poke, ping! understanding the language of safety and responsibility
Munch, poke, ping! understanding the language of safety and responsibilityMunch, poke, ping! understanding the language of safety and responsibility
Munch, poke, ping! understanding the language of safety and responsibility
 
Screenless presentation for secondary schools
Screenless presentation   for secondary schoolsScreenless presentation   for secondary schools
Screenless presentation for secondary schools
 
Screenless presentation for primary schools
Screenless presentation   for primary schoolsScreenless presentation   for primary schools
Screenless presentation for primary schools
 
Munch Poke Ping Conference ~powerpoint combined presentations. pptx
Munch Poke Ping Conference ~powerpoint combined presentations. pptxMunch Poke Ping Conference ~powerpoint combined presentations. pptx
Munch Poke Ping Conference ~powerpoint combined presentations. pptx
 
Mpp conference powerpoint
Mpp conference powerpointMpp conference powerpoint
Mpp conference powerpoint
 
Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012
 
Safeguarding children online training from steve c-d for southwark diocese-...
Safeguarding children online   training from steve c-d for southwark diocese-...Safeguarding children online   training from steve c-d for southwark diocese-...
Safeguarding children online training from steve c-d for southwark diocese-...
 

KĂźrzlich hochgeladen

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A BeĂąa
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 

KĂźrzlich hochgeladen (20)

YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 

E safety training for lewisham arts and education network (advance) by stephen carrick-davies sept 2013

  • 1. SOCIAL MEDIA, YOUNG PEOPLE AND E- SAFETY LEWISHAM EDUCATION ARTS NETWORK
  • 2. Introductions Stephen Carrick-Davies • Ten years at Childnet International • Now an Independent Trainer/ Social Entrepreneur /Parent/Learner ..... Social Media & Vulnerable YP people
  • 4. What are your expectations and training needs ?
  • 5. Risk Reputation The 3 Rs of digital literacy Responsibility Our safety, conduct & risky behaviours Our privacy, security settings and our peer group Our leadership, ethical code and resilience
  • 6. Understanding the risks (not the same thing as harm!) PART I
  • 7. “Everything that’s already in the world when you’re born is just normal. Douglas Adams How to stop worrying and learn to love the internet 1999 Anything that gets invented between then and before you turn thirty is incredibly exciting and with any luck you can make a career out of it. Anything that gets invented after you’re thirty is against the natural order of things and the beginning of the end of civilisation as we know it… …until it’s been around for about ten years ….when it gradually turns out to be alright really.”  The risk of misunderstanding
  • 8. AMPLIFIER (gives children a voice) ANONYMITY ALWAYS ON AWAY FROM SUPERVISION ACCEPTANCE - IDENTITY & STATUS ACCESS THE WORLD ACTIVE NOT PASSIVE MEDIUM ADDICTIVE (?) “If you took away my mobile phone you would take away a part of me” The child’s online world real
  • 9. Play film “I have over 120 people on my BBM but I deleted like 30 on Saturday cause I was angry and they pissed me off so I just deleted them. Since I’ve had my BlackBerry only 2 people have deleted me.” Student from Pupil Referral Unit What is this world like for vulnerable YP ?real Film at www.carrick-davies.com/research/films
  • 10. What was the greatest fear for the yp in the film ? Turn to your neighbour How did it had got out of control ? What would you do next if you were in that position ? GROUP EXERCISE
  • 11.
  • 12. A GREAT PACIFIER ! PORTABLE PRIVATE + PERSONAL EDUCATIONALLY VALUABLE ! STATUS SYMBOL FUN & GAMES INTER GENERATIONAL ANYTIME, ANYWHERE ANYWAY PRACTICAL USEAGE photo/video Apps etc The game changer
  • 13. SMART PENS – the latest ‘Internet of Things’
  • 15. Social location APPLICATIONS Huge range of apps NEWS FEEDS “boast by post” MESSAGES Superseding E-mail WHO’S ONLINE Know who is online now! PHOTOS/TAGS Comment and Tag photos face recognition LIVE CHAT Superseding IM FRIENDS Find, link, be in constant contact + on your mobile VIDEO link and embed Events/ Groups ALL FOR FREE …… BUT ….WHAT PRICE IS FREE ? TIME LINE
  • 16. Facebook Timeline Re-check your privacy settings using ‘View As’ function Searchable by years The importance of privacy settings 31% of 12-15 year olds don’t use privacy settings on their social networking profiles – Ofcom Media literacy Report 2009 Check regularly because the settings change
  • 17.
  • 18. What is your experience of using FB with YP ? Profiles have ‘friends’ and you will always need to create a professional work profile to manage any engagement on a profile, but you do not necessarily have to accept friend requests from young people. Groups have ‘members’ and can be public, private or invite providing a discussion and media sharing space. The creator of the group moderates members and conversations. Groups work well when there is a clear shared interest or sense of community between group members. Sometimes groups are used as a form of petition — where individuals join a group to display their support for an idea or issue. You can message all the members of a group direct to their Facebook inbox. Pages have ‘fans’. A page is similar to a profile, but pages are for organisations and projects rather than for people. They are a good tool for sharing information and getting feedback by allowing comments on the content you share. You can add Facebook applications and add-on features to your pages to make them more interactive
  • 19. A word about BBM • Be careful with your BBM PIN • Be careful of ‘Screen Munching’ • Use the tools – like delete contact and block future requests. • Make sure your blackberry has a password See www.carrick-davies.com for film and tutorial. (bottom of the page)
  • 20. See pages 54 – 59 in Vodafone’s Digital Parenting magazine
  • 21. A word about games • The ratings are there for a reason. • Anyone who sells a designated 12+ title to younger children will face fines of up to ÂŁ5,000 /jail. • Recognise the ‘compulsion’ issues. • Younger siblings and friends. • Misogynistic messages and casual cruelty.
  • 22. Our perception of danger Most abuse takes place in the context of a family or close relative.
  • 23. UPLOADED (captured) MUNCHED FORWARDED COMMENTED ON COPIED STORED MORPHED/ CHANGED LIE DORMANT AMPLIFIED RE- BROADCAST An incubator ? What terms do we use to explain this space ?
  • 24. What do you think about this description of the Internet ? Feedback What sort of things could be hatched ? GROUP EXERCISE
  • 25. Classifying the risks to children online CONTENT CONTACT CONDUCT Commercial Aggressive Sexual Values Adverts Spam Sponsorship Personal info Violent and hateful content Pornographic unwelcome sexual content Bias Racist Misleading info or advice Tracking Harvesting Personal info Being bullied harassed or stalked Meeting strangers Being groomed Self harm Unwelcome persuasions Illegal downloading Hacking Gambling Financial scams Terrorism Bullying or harassing another Creating and uploading inappropriate material Providing misleading info/advice Original 3 Cs Classification by ‘EU Kids’ online project Child as Recipient Child as Participant Child as Actor
  • 26. Contact www.ceop.gov.uk if you have concerns about inappropriate communication from an adult to a minor. CONTENT Child as Recipient CONTACT Child as Participant CONDUCT Child as Actor Commercial Aggressive Sexual Values Pornographic unwelcome sexual content Meeting strangers Being groomed Creating and uploading inappropriate material Online grooming is a criminal offence “One-third of those who sexually abuse children are just children themselves.” BBC Newsnight programme March 2010 21,630 BEBO members had the name “Porn Star” “Sexting” = teens sharing nude photos via mobiles and web. The practice can have serious legal and psychological consequences “So take a dirty picture for me, Take a dirty picture Just take a dirty picture for me Take a dirty picture” From Taio Cruz song No 6 in the UK charts April 2010.
  • 27. How the risks ‘migration’ from online to offline can affect vulnerable YP CONTENT CONTACT CONDUCT Commercial Aggressive Sexual Values Child as Recipient Child as Participant Child as Actor CRIMINAL BEING IN THE WRONG PLACE AT THE WRONG TIME & “BAD LUCK” OF THE 1,984 PEOPLE CHARGED AFTER RIOTS:  53% were under 20 years old  42% received free school meals (16% nat. average)  66% of them had some special education needs (21% of all pupils) Figures from the Ministry of Justice carried out by the Howard League for Penal Reform (published in Guardian 26.11.11) Original 3 Cs Classification by ‘EU Kids’ online project
  • 28. ASSOCIATION WITH SOMEONE COMPLICIT IN A JOINT ENTERPRISE “You played no part but presence there encouraged others ” FAIL TO INTERVENE FAILURE TO WALK AWAY ! INCLUDES ONLINE EVIDENCE OF ASSOCIATION & ENCOURAGEMENT JOINT ENTERPRISE: Legislation that finds people guilty of a violent crime if they are judged to have lent encouragement to the main perpetrator. “They planned the attack on social media the night before, the court was told, sending messages to each other on Facebook and via BlackBerry Messenger.”
  • 29. Classifying the risks to children online CONTENT CONTACT CONDUCT Commercial Aggressive Sexual Values Violent and hateful content Being bullied harassed or stalked Bullying or harassing another Classification by ‘EU Kids’ online project and referenced in the Byron Report Child as Recipient Child as Participant Child as Actor 22% of yp aged 11- 18 report having been cyber bullied. It ruins lives. YP may not disclose that it is happening
  • 30. “Sticks and stones.... But words ...?” From US Ad Council at http://www.youtube.com/watch?v=bdQBurXQOeQ
  • 31. How is Cyberbullying different from offline bullying? OFFLINE ONLINE Home is safe Often Physical Usually words/pictures Bully strong/victim weak Roles can change Can be 24/7 Local & intimate Mass audience See the impact Don’t see impact Lack of empathy Bystanders intervene Bystanders take part “If you laugh at it you’re part of it” Often Silent It can leave a trail !
  • 32. Why YP may be scared of reporting abuse ? • “It was nobody else’s business” • “Didn’t think it was serious or wrong” • “Didn’t want parents/friends to find out” • “Was frightened” • “Didn’t think I would be believed” • “Had been threatened by the abuser” Source: Child Maltreatment in the UK Cawson 2000 • “My parents don’t get the internet” • “Maybe it was my fault ! (blur)” • “Scared if computer is confiscated” Abuse on the internet/mobile phone
  • 33. RESPONDING TO THE VICTIM Need for reassurance – THIS IS BULLYING ! Practical advice: RED Don’t retaliating, Orange – Save the evidence Green – Tell someone (who?) See advice, resources and guidance at Childnet’s www.digizen.org website
  • 34.  Understanding and accepting the impact of cyberbullying.  Updating existing policies and practices. (AUP anti-bullying)  Making reporting easier - includes advice about removal of content. (industry support)  Promoting the positive use of technology.  Evaluating impact of prevention activities. PREVENTING RESPONDING  Supporting the victim – need for reassurance.  Practical advice and support such as saving evidence, not retaliating, informing parents.  Investigate and record incidents, identify the bully.  Working with the bully and sanctions (including technology specific).  Involve Parents /carers Underpinned by effective education and awareness
  • 35. The young person who you are responsible for (let’s say she’s a 12 year old girl) tells you that her “friends” in her class took video clip of her at a sleep over pyjama party on their phones which is now being circulated and she thinks it is now posted on a social networking site. •Is this an issue for your school/organisation •What advice would you give to her ? •Who should the girl report this to ? •How would you go about trying to remove this content ? •What if those who posted it up have circulated it more widely ? GROUP EXERCISE
  • 36. Risk Conversations about ADVICE FOR YOUNG PEOPLE “Do you know who all your online friends are offline?” “Do you know how to block someone on Facebook?” “Do you have a PIN on your mobile phone?” “Do any of your friends send photos of themselves?” “Do you know how to save that sort of evidence?” “Would you report that at school/CEOP?” FOR OUR STAFF “Have we assessed how we as staff and our users could be vulnerable online?” “If we use Social Media do we set clear guidance on use ?” “Do we use an organisation mobile phone if working with yp ? (ie not our personal one?” “Do we know how to save evidence and intervene or reporting to CEOP?”
  • 37. Questions and feedback so far ? Let’s break for 10 minutes
  • 38. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY 10 WAYS IN WHICH THE INTERNET CAN AMPLIFY OFFLINE VULNERABILITY
  • 39. ‘Vulnerable’ Those who have experienced offline risk and abuse may be more resilient and able to protect themselves online or may not be affected so much by the risks they encounter. HOWEVER WE CAN IDENTIFY A FEW COMMON FEATURES.... This is complex because: All children are different so there are dangers in making broad statements. Vulnerability is not static - All children can be vulnerable at different stages Many children are neglected which is harder to spot yet makes them vulnerable The categorisations of risk offline do not necessarily mirror online experience (eg a disabled yp may be empowered online as the internet can be ‘leveller’ The paradox that over- protected children can be more vulnerable online. The more a child uses the internet the more they can become confident and possibly complacent and feel ‘invincible’ and don’t feel they are at risk. What about vulnerable adults ? Constantly changing technologies. Eg, Location services
  • 40. Lack of supportive adults in their lives More unsupervised time, fewer structures and boundaries Fluid learning environment and gaps in education and induction Low self- confidence. Identity seen to be part of ‘outsiders’ Influences of alcohol, drugs and gang culture. Risk takers and at risk Experience abusive relationships or environments including anger MUNCH POKE PING! See www.carrick-davies.com
  • 41. “Many of the young people I work with are massive risk takers, impulsive to the extreme and often use alcohol and/or drugs. On average they first engage in sexual activity at a far younger age than other students. They also have huge amounts of unsupervised time on their hands, often till very late at night. I teach many YP who are half- asleep as they have been online till gone 3am.” PRU staff member from ‘MPP’ report “I have over 120 people on my BBM but I deleted like 30 on Saturday cause I was angry and they pissed me off so I just deleted them. Since I’ve had my BlackBerry only 2 people have deleted me.” PRU student from ‘MPP’ report WE MAY SEE THEM AS VULNERABLE BUT THEY MAY SEE THEMSELVES AS IN CONTROL
  • 42. Unmediated Contact Children who have been fostered can suddenly receive messages from siblings, birth parents, or those who want to trace them for potentially harmful reasons. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY Guardian Newspaper article 19 June 2010
  • 43.  Social Location WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY Young People who may need to escape from an abusive relationships need to think carefully about how they make their ‘places’ public.
  • 44. Eg Facebook Timeline  Exclusion from the ‘norm’ There are lots of online services which celebrate our ‘journey’. How do children who don’t know their birth parents, may not have an early photo of themselves feel in these ‘boast by post’ environments ? WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY
  • 45.  Blackmailing “gifting” & grooming by peers A young person from a disadvantaged background may be targeted with ‘gifts’ of mobile phones, mobile payment cards etc, by older young people but in exchange for ‘favours’ which they ‘cash in’ later (including prostitution, trafficking or illegal activity). If it sounds to good to be true .... it’s probably is (they want something ! ) Search ‘NSPCC survey on teen partner violence’ for more info WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY
  • 46. Many vulnerable young people can be early adopters of tools and services which are not yet regulated or in the public conscious. For example BBM How will QR codes be mis-used ?  Earlier adopters ? Screen Munch ! WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY “Any A/C holders looking to make a quick grand get at me. No time wasters.” Message on BBM about bank scams (fraud!)
  • 47.  Being ‘nudged’ into gangs ALL CHILDREN WILL LEAVE A FOOTPRINT EXCEPT SOME WILL BE IN MUDDIER SAND! WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY Vulnerable young people who are risk takers, impulsive or under the influence of alcohol and/or drugs and less supervised, can be more easily drawn into illegal activity including being ‘nudged’ through technology.
  • 48.  Negative digital footprint ALL CHILDREN WILL LEAVE A DIGITAL FOOTPRINT BUT SOME WILL BE MUDDIER THAN OTHERS WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY Those who are supported can compensate and build positive online footprint but what about those who aren’t ?
  • 49.  Low Resilience “When my pinger’s gone to sleep that’s when I’ll go to sleep.” WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY Young people need to be cherished, have the right amount of sleep and healthy food. What happens when you are running on empty ?
  • 50.  Special needs & learning difficulties •WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY Some children with emotional or behavioural difficulties, attachment difficulties, and other complex needs, may be particularly vulnerable online. EG those with Autistim Spectrum Disorder may make literal interpretations of content, which will affect how they respond. Others with complex needs may not understand the concept of friendship, and therefore trust everyone implicitly. Some children with SEN or disabilities may not recognise that they are being bullied or appreciate how their own online behaviour may be seen by someone else as bullying. Attachment Attachment Theory
  • 51.  Low levels of Language & Literacy•WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY We must not assume that all YP are confident “digital natives” and we must also recognise that one in six people in the UK struggle with literacy (below the level expected of an eleven year old). Hence being able to complete a ‘REPORT ABUSE’ form or read instructions about safety, privacy and ‘terms and conditions’ are real barriers for many young people. Do YP recognise the link between reading and being able to be safe ? Lack of literacy skills, can mean that messages are unclear, ambiguous or misunderstood
  • 52. In pairs discuss GROUP EXERCISE Do you recognise these 10 offline vulnerabilities and agree that they can be amplified online ? How could you begin to talk to the YP you look after about these issues? Can you think of positive ways in which the Internet minimises offline vulnerabilities?
  • 53. PART II Reputation Our privacy, security settings and our peer group What goes online stays online
  • 54. Social media challenges for youth workers • Social media applications are mostly designed around informality, intimacy and speed. • Contact with students outside of the classroom is not only easier it is actively encouraged. (VLEs, online collaboration etc). • BUT Young people can view one-to-one communication as a very private “chumminess” and feel especially valued. • The boundaries between professional/private expert and learner, home and work, formal and informal are blurring. • The technology can be used as vehicles for false allegations, and exposing teachers to ridicule and humiliation. • But... there are a range of views with some teachers & Youth Workers wanting to positively embrace technology to support pupils and there are very real positives especially for some pupils eg excluded, SEN,
  • 55. • Recent TES survey found that 9% of teachers were friends with pupils on SNS*. Challenges for teachers & other professionals * http://community.tes.co.uk/forums/t/463065.aspx?s_cid=16 See http://www.childnet.com/kia/downloads/Social-networking.pdf for Childnet/TDA leaflet • General advice from unions and GTS is: Do not ‘friend’ pupils on personal accounts or ask to be added to their contact lists. You could make yourself vulnerable by sharing your personal information (and that of your friends) You could make yourself vulnerable by being able to access their personal information You could make yourself open to allegations of inappropriate contact or be misunderstood. WHY ?
  • 56. 1. Update your AUPs stating how and when personally owned equipment (including camera phones) can be used. 2. Make sure you have a strong password and set a password or pin for your phone. Increasingly important for Facebook ‘Fraping’ 3. Close down computers quickly if you have to leave a room and don’t allow cookies to ‘remember your password’ 4. Do not post information about yourself publically that you wouldn’t want employers, colleagues, pupils or parents to see. 5. Make sure you do not retaliate but keep all records – screen prints and record time, date & website addresses 6. Report any incident to the appropriate member of staff promptly 7. Make sure the school/organisation informs parents about incidents and delivers appropriate sanctions WAYS TO PROTECTING YOURSELF
  • 58. Reputation ADVICE Conversations about FOR YOUNG PEOPLE  “Remember what goes online stays online”  “When did you last check your privacy settings?”  “Can you help me check my settings”  “Are you changing your password regularly?”  “Do you know the best way to get offending material taken down?” FOR OUR STAFF  “Do we have an organisational policy on using social media with users ?”  Do we check regularly what people are saying about our service on social media ?  Do we promote ourselves positively on social media ?  Are we reaching our users through social media effectively?
  • 60. AN ABSENCE OF KNOWLEDGE IS NOT AN EXCUSE FOR AN ABSENCE OF RESPONSIBILITY AND CARE. WHAT IS POTENTIALLY CRIMINAL, HARMFUL, INAPPROPRIATE OR ILLEGAL OFFLINE, IS THE SAME ONLINE. ULTIMATELY THIS COMES DOWN TO OUR DUTY OF CARE & LEADERSHIP.
  • 61. Policies Infrastructure Education Ongoing education & prevention programme which is targeted at both YP, parents and the whole work-force. Organisation E-safety policy, Acceptable Use Policy, Anti-Bullying policy, Mobile use policy Managed learning environment with high quality access and equipment which is filtered, monitored and supervised. PIE all 3 ‘legs’ are vital
  • 62. Policies Need to be:  Owned -don’t simply cut and paste another  Updated for constantly changing technology  Obeyed – new staff, volunteers, sanctions ?  Monitored – are they effective, out of date?  Promoted – made accessible to all users
  • 65. Using social media Positively from Using social media for youth engagement can help organisations:  Reach young people where they already are spending hours a day connected to social networking platforms. Too often engagement opportunities are based on expecting young people to come to us, when we should go to where young people are.  Be found— as many young people turn to search engines to find or confirm information. If you’re not online and easy to find, you’re probably missing many opportunities for youth engagement.  Communicate with young people in familiar settings — using the same forms of media young people are comfortable interacting with. Social media tools make it easy to create rich multi-media communication that you can use to make ideas and opportunities accessible to young people.  Meet changing expectations as older methods of communication and participation lose ground in a social media-rich environment. Young people will expect media they can interact with.  Take advantage of networks to spread engagement opportunities— creating content and opportunities that young people can easily share with their friends through social media and social networking tools.
  • 66.
  • 67. Ten top tips to managing social media in adoption* 1 Talk openly and honestly with your children about social media, contact issues and the risks involved. Then work together to come up with solutions. 2 Look at privacy settings so that your children’s profile can not be seen publicly, and also hide lists of ‘friends’. * From BAAF website Advice from Facing up to Facebook http://www.baaf.org.uk/ bookshop/book_fufa
  • 68. 3 Explain to your children the risks involved in accepting random unknown people as ‘friends’. 4 Make sure they are not making public information that could help identify them, such as their date of birth or address. 5 Discuss the possibility of using a nickname online instead of their real name, perhaps even having an unusual spelling (e.g N1ck Sm1th)
  • 69. 6 Avoid using profile pictures. Instead use the default pictures or something generic like flowers, landscapes, football team logos etc. 7 Children should be discouraged from posting any information about their school or local area 8 Don’t tag children in photos posted online, and ask friends and family to be aware of this also.
  • 70. 9 Make sure your children are aware of the risks of joining groups or networks that identify where they live or go to school. 10 Make sure your children know how to ‘block’ people so that if they do receive unwanted contact it can be managed. See page 53
  • 71. In the context of an inspection, e-safety may be described as the school’s ability: to protect and educate pupils and staff in their use of technology to have the appropriate mechanisms to intervene and support any incident where appropriate. What can we learn from schools ?
  • 72. Assemblies, tutorial time, personal, social, health and education lessons, and an age-appropriate curriculum for e-safety Pupils were more vulnerable overall when schools used locked down systems because they were not given enough opportunities to learn how to assess and manage risk for themselves. In the outstanding schools, senior leaders, governors, staff and families worked together to develop a clear strategy for e-safety. Policies were reviewed regularly in the light of technological developments. The outstanding schools recognised that, relationships with families, needed to keep developing to support e-safety at home. Schools need to make good use of the views of pupils and their parents to develop their e-safety provision. WHAT DOES GOOD E-SAFETY LOOK LIKE?
  • 73. REACHING PARENTS/CARERS “Parents and the home environment they create are the single most important factor in shaping their children’s well-being, achievements and prospects” Alan Johnson (when Education Secretary)
  • 74. • Does the technology contribute to an erosion of empathy ? If so how ? • What happens when we become “comfortably numb” • How can we build empathy online ? EMPATHY
  • 75. “You never really understand a person until you consider things from his point of view. Until you climb inside of his skin and walk around in it.” Harper Lee, To Kill a Mockingbird
  • 76. “Empathy is the ability to put ourselves in another’s place and to understand their experience. We are deeply present to their thoughts and feelings with such compassionate accuracy that they can hear their own thoughts more clearly. Empathy connect us with our common humanity. It protects us from prejudice, blame, and judgment – those things that divide us from each other. It moves us to seek justice for every person. Even those with whom we disagree.” With empathy, we reflect on how our actions affect others. Empathy inspires us to be giving and selfless. Empathy connects our hearts. Source www.boundlessconnections.org/weeklyvirtuesblog/wp-
  • 77. “Empathy is the ability to put ourselves in another’s place and to understand their experience. We are deeply present to their thoughts and feelings with such compassionate accuracy that they can hear their own thoughts more clearly. Empathy connect us with our common humanity. It protects us from prejudice, blame, and judgment – those things that divide us from each other. It moves us to seek justice for every person. Even those with whom we disagree.” With empathy, we reflect on how our actions affect others. Empathy inspires us to be giving and selfless. Empathy connects our hearts. Source www.boundlessconnections.org/weeklyvirtuesblog/wp-
  • 78. Risk Reputation Where to start ? Responsibility Our safety, conduct & risky behaviours Our privacy, security settings and our peer group Our leadership, ethical code and resilience
  • 79. Responsibility Conversations aboutADVICE FOR YOUNG PEOPLE  “Have you come across any good social initiatives?”  “What advice do you need about using social media ?”  “I trust you to make good decisions, but I also need to learn from you.” FOR OUR STAFF  “Can we involve the YP we work with in developing our policy and practice ?”  “What expectations are we making for our staff in being online so much ?”  Are we pioneering new and imaginative ways of Educating and inspiring our younger users via social media ?
  • 80. WHAT IS ONE THING YOU ARE GOING TO ACT UPON ? Risk Safety, conduct & risky behaviour Reputation Privacy, security settings and peer group Leadership, ethical code and resilience Responsibility
  • 82. Useful websites 1) UK law Enforcement agency and part of VGTF www.ceop.gov.uk 2) UK Council for Child Internet Safety www.dcsf.gov.uk/ukccis/ 3) Childnet International www.childnet.com/ including Cyberbullying film 4) British Association for Adoption and Fostering www.baaf.org.uk - including advice on Facebook
  • 84. "The web is more a social creation than a technical one. I designed it for social effect - to help people work together - and not as a technical toy…. The ultimate goal of the web is to support and improve our web like existence in the world...... Tim Berners-Lee ‘Weaving the Web’ 1999 We have to ensure that the society we build with the web is the sort we intend.”
  • 85. • Questions about anything which has come up today ?
  • 86. THANK YOU ! www.carrick-davies.com stephen@carrick-davies.com Complete Evaluation forms MUNCH PING POKE! See my current work re social media and vulnerable yp on my website

Hinweis der Redaktion

  1. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  2. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  3. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  4. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  5. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  6. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  7. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  8. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  9. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  10. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  11. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  12. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  13. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  14. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  15. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  16. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Whenever I start talking about Childnet’s work I start with this picture. They say a picture speaks a thousand words. This is Tomison Adeloye – a friend of mine. I took this picture of him to illustrate just what it is that children access when going online – The whole world – the positive as well as the potentially harmful. There’s a further point to this picture in that Tomi is deaf. As he told me when I took this photo of him – no-one knows you are deaf on the Internet ! – he uses the same method of communicating – his fingers. – Again this is a powerful reminder that Children don’t really know who they are talking to on line. <Advance> Of course with mobile technology the Internet is now not just in our hands but in our pockets ! As you are seeing in Japan, children are able to access sites such as dating agency sites from their internet enabled phones . I read last week that the National Police Agency here want to ban anyone under 18 from accessing dating sties and we are facing similar calls in the UK and I’ll say something about this later. However, before we talk about the present and the future and the challenges and opportunities I want to go back to one of the founders of the Internet – Tim Berners Lee – generally credited for inventing the WWW. In his book “weaving the web he says”
  17. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies "The web is more a social creation than a technical one. I designed it for social effect - to help people work together - and not as a technical toy. The ultimate goal of the web is to support and improve our weblike existence in the world...... We have to ensure that the society we build with the web is the sort we intend.” This is one of the motivations behind our work. Childnet is not first and foremost a technology charity, we don’t have too many techies on staff. We are motivated to ensure that children benefit from the net – that the future society is one in which the net is used positively to benefit children and that their rights are protected and promoted online. I am sure that many of you here today are committed to this ideal and want to ensure that our future society is shaped by positive applications of the net.
  18. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies