SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Downloaden Sie, um offline zu lesen
Everything I know about protecting children I learned from a visit to Nairobi National Park,[object Object],Larry Magid,[object Object],Co-director,[object Object],ConnectSafely.org,[object Object],larry@connectsafely.org,[object Object],Photos taken by Larry Magid in Nairobi Nat’l Park on Sept 24, 2011 ,[object Object]
Some children need to be rescued or protected,[object Object]
But all children …,[object Object]
Need to be nurtured,[object Object]
Encouraged to nurture themselves,[object Object]
To present themselves properly,[object Object]
Pay attention to what’s around them,[object Object]
Get support from peers,[object Object]
To stand tall,[object Object]
And allowed to be free,[object Object]
We are in the midst of a global information & social revolution, led by youth,[object Object]
Of course there are risks in life, so…,[object Object]
Who can best protect youth?,[object Object],Government?,[object Object],Law enforcement?,[object Object],Parents?,[object Object]
Or young people themselves?,[object Object]
4 Types of Online Safety,[object Object],Physical safety – freedom from physical harm,[object Object],Psychological safety – freedom from cruelty, harassment, and exposure to potentially disturbing material ,[object Object],Reputational and legal safety – freedom from unwanted social, academic, professional, and legal consequences that could affect you for a lifetime ,[object Object],Identity, property, and community safety – freedom 		from theft of identity & property,[object Object],Items 1 through 3 are from Anne Collier’s NetFamilyNews,[object Object]
The ‘Net effect’,[object Object],For the most part,the online world is pretty much like the “real world,” but there are a few special things to think about,[object Object],It can be permanent,[object Object],Material can be copied and pasted,[object Object],Lots of people can see it,[object Object],You don’t know for sure who’s seeing it,[object Object],AND,[object Object],Disinhibition: Lack of visual cues reducesempathy,[object Object],Source: adapted from danahboyd: Taken out of Context, 2008,[object Object]
Elements of Online Safety 3.0,[object Object],Make Net safety relevant to youth in the context of how they use social media, learn, and live their lives. ,[object Object],View youth as participants and stakeholders in positive Internet use rather than potential victims, and empower them to protect themselves.,[object Object],Promote good citizenship,[object Object],Teach new media literacy,[object Object],Understand the value of informal learning,[object Object],Be accurate and honest about risks,[object Object],Encourage industry to engage in best practices, including promoting good citizenship in the communities they run,[object Object],os3.ConnectSafely.org,[object Object]
Fences have their place but …,[object Object],To keep kids safe around all water, we teach kids to swim,[object Object]
Ultimately, the best filter runs between the child’s ears, not on a device,[object Object],Protection that lasts a lifetime,[object Object],Training wheels for young kids,[object Object]
Putting risks into perspective,[object Object],[object Object]
Fear messaging & exaggerating risk can backfire
Fear paralyzes & can lead to irrational decisionsIllustration: CustumeHum.com (Creative Commons License),[object Object]
Building resilience through digital skills,[object Object],Encouraging children to do more online will improve their digital skill set. ,[object Object],Teaching safety skills is likely to improve other skills, while teaching instrumental and informational skills will also improve safety skills. ,[object Object],Inequalities in digital skills persist – in terms of SES, age and, to a lesser degree, gender. So efforts to overcome these are needed. ,[object Object],Low skills among younger children are a priority for teachers and parents, as ever younger children go online ,[object Object]
Predator panic,[object Object],[object Object]
But the risk was highly exaggerated
Media and politicians confused “unwanted sexual solicitation” with predationIllustration: CustumeHum.com (Creative Commons License),[object Object]
The rise of the web in the U.S. has not resulted in increased victimization of children,[object Object],51% Decline (during the period of the Web’s existence),[object Object],Blue line represents 58% decline in child sex abuse from 1992 to 2008,[object Object],Source: Updated Trends in Child Maltreatment, 2008: Finkelhor, Jones and Shattuck: Crimes Against Children Research Center,[object Object]
Moving right along,[object Object],The Internet Safety Technical Task Force found that:,[object Object],“Bullying and harassment, most often by peers, are the most salient threats that minors face, both online and offline.” ,[object Object],Which naturally leads to ….,[object Object]
Cyberbullying Panic!,[object Object],“85% of  12 and 13 year-olds have had experience with cyberbullying,” according to one claim,[object Object]
Most children are neither victims nor monsters,[object Object],[object Object]
While some are very vulnerable, most children are reasonably resilient.

Weitere ähnliche Inhalte

Was ist angesagt?

How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safetyConnectSafely
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)amalgarn
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010paul
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymegbg
 
Online safety Ofsted 2015
Online safety Ofsted 2015Online safety Ofsted 2015
Online safety Ofsted 2015bellla33
 
Iowa Bullying Prevention
Iowa Bullying Prevention Iowa Bullying Prevention
Iowa Bullying Prevention emilyensign
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
A (very) brief history of US Internet safety
A (very) brief history of US Internet safetyA (very) brief history of US Internet safety
A (very) brief history of US Internet safetyAnne Collier
 
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop PresentationLydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop PresentationLydia Smith-Davis
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?Sarah Welstead
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and ChldrenJoe Drumgoole
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for ParentsRodolfo Salazar
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship RedefinedConnectSafely
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SBbrawl1sl
 

Was ist angesagt? (20)

How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Online safety Ofsted 2015
Online safety Ofsted 2015Online safety Ofsted 2015
Online safety Ofsted 2015
 
Iowa Bullying Prevention
Iowa Bullying Prevention Iowa Bullying Prevention
Iowa Bullying Prevention
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
A (very) brief history of US Internet safety
A (very) brief history of US Internet safetyA (very) brief history of US Internet safety
A (very) brief history of US Internet safety
 
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop PresentationLydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
Teens and social media
Teens and social mediaTeens and social media
Teens and social media
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SB
 

Ähnlich wie Everything I know about protecting children I learned from a visit to Nairobi National Park

Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)Sumaiya Ismail
 
Unit 2 Safe Internet Awareness
Unit 2 Safe Internet AwarenessUnit 2 Safe Internet Awareness
Unit 2 Safe Internet AwarenessManchester24
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online SafetyDonna Murray
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, brieflyConnectSafely
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, brieflyAnne Collier
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Cyberbullying And Its Harmful Effects On Teens
Cyberbullying And Its Harmful Effects On TeensCyberbullying And Its Harmful Effects On Teens
Cyberbullying And Its Harmful Effects On TeensRenee Franco
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and schoolGrant Ward
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
 

Ähnlich wie Everything I know about protecting children I learned from a visit to Nairobi National Park (20)

NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
The Education On Internet Safety
The Education On Internet SafetyThe Education On Internet Safety
The Education On Internet Safety
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
Unit 2 Safe Internet Awareness
Unit 2 Safe Internet AwarenessUnit 2 Safe Internet Awareness
Unit 2 Safe Internet Awareness
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
Digital Safety
Digital SafetyDigital Safety
Digital Safety
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Internet Safety Essay
Internet Safety EssayInternet Safety Essay
Internet Safety Essay
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Web Filters
Web FiltersWeb Filters
Web Filters
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullying And Its Harmful Effects On Teens
Cyberbullying And Its Harmful Effects On TeensCyberbullying And Its Harmful Effects On Teens
Cyberbullying And Its Harmful Effects On Teens
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 

Kürzlich hochgeladen

Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 

Kürzlich hochgeladen (20)

Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 

Everything I know about protecting children I learned from a visit to Nairobi National Park

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. Fear messaging & exaggerating risk can backfire
  • 22.
  • 23.
  • 24.
  • 25. But the risk was highly exaggerated
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. While some are very vulnerable, most children are reasonably resilient.
  • 32. Across Europe, 6% of 9 to 16-year-old internet users have been bullied online. 3% confess to having bullied others. *
  • 33.
  • 34.
  • 35.
  • 36. If people think their friends don’t smoke, they’re less likely to smoke.
  • 37.
  • 38.
  • 39.
  • 40.

Hinweis der Redaktion

  1. ONLINE SAFETY CAN’T BE ONE-SIZE FITS ALL FOR MANY REASONS.... because the Web is huge and diverse and its use is highly individual, just as people’s lives are.. ...but also because there are many types of safety or well-being online and offline. In fact, online wellbeing, set in the context of what it’s FOR – full, constructive engagement in participatory culture & democracy – is more appropriately considered in terms of rights and freedoms: SO HERE ARE THE FORMS OF SAFETY WE ALL DESERVE:Physical is essential but not the all of it (playground metaphor).Psychological – we want them to have this freedom online just as much as we’ve always sought it for them offline, and their behavior is a factor in their well-being. Reputational and legal – we have a lot of work to do to develop awareness in this area, since users themselves are key to maintaining this freedom for themselves.Identity, property, and community – imposter profiles are a big one; we need to teach youth not only to protect their privacy & property but also their identity (first and foremost by protecting their passwords and not falling prey to manipulation, social engineering - like phishing scams).
  2. Putting up a fence might keep a kid away from a specific swimming pool but teaching them to swim protects them around all water and helps them enjoy the water as well.
  3. From 1990 to 2005 – the period of time that the Web was born and grew most rapidly – there was a 51% decline in overall child sexual – the chart’s showing that: out of every 10,000 US minors, 23 were abused, with that no. going down to 11 in 2005.UPDATE: 58% decline thru 2008, latest figure available (reported by CCRC here “Updated Trends in Child Maltreatment, 2008” <http://www.unh.edu/ccrc/pdf/CV203_Updated%20Trends%20in%20Child%20Maltreatment%202008_8-6-10.pdf>)NCANDS = National Data Archives on Child Abuse & Neglect