Safer internet
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
211
On Slideshare
211
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
2
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Online Safety – Issues for Professionalsand Volunteers working with Children and Young People and their Families Peter Bower Esafety Consultant Ex-Child Protection Officer Designated Teacher for Children in Care peter.bower@swgfl.org.uk
  • 2. To review children To provide you with and young self review tools, To enable dialogue To understandpeople’s behaviour and resources to with the children online identity, use online, their and support online young people and of social media andour understanding safety in your their families about it’s implications for of risk and the organisation for the their online social, and impact of online children, young experiences professional life activities on their people and the lives adults
  • 3. What is e-safety for children andyoung people about?• Empowering children and young people tokeep themselves safe when online....• Encouraging them to be responsible users ofthe technology....• Engaging children and young people torecognise the risks and benefits of onlinecommunication....• Enabling the adults around children andyoung people; whether parents, carers ,professionals or volunteers, to understand andsupport them in their online world....
  • 4. Digital Dinosaur Research Shopping Watch TV online programmesSome social Email Bankingnetworking
  • 5. Digital AntsSharing every day experiences and social life online YouTube Sharing Music Social Gaming and Film Networking Messaging Online chat Creating (with webcam) online persona Sexting
  • 6. How to...?
  • 7. Survey of 64 7year olds using Activote
  • 8. MessageSay hello to yourMum and tell herthat you will seeher later
  • 9. Here’s my message:Hello, Mother, I will see you later. Love from Peter hi c u l8r
  • 10. hi m8 u k? -sry i 4gt 2 cal u lst nyt-y dnt we go c film 2mozHi mate. Are you okay? I am sorry that Iforgot to call you last night. Why dont we goand see a film tomorrow?
  • 11. F2F POSFace to face Parents over shoulder GYPO PIR Get your pants off Parents in room GTG MOOS Go to go Members of the opposite sex 2NITE Tonight IWSN ASL KPC I want sex now Age/Sex/Location?Keeping parents confused PAW Parents are watching WYRN ROTFL LMAO Laugh my bottom offWhat’s your real name? Roll on the floor laughing 13375p34k leetspeak I knO whr 2 dl Pr0ny0ur (|-|i1dr3|| (0u1d b3 5p34ki||g 1ik3 7|-|i5 I know where to download porn4||d u w0u1d ||07 r3411y k||0w Your children could be speaking like this and you would not really know
  • 12. Taken Out of Context; American Teen Sociality in Networked Publics” danah boyd Persistence and • The net as a permanent searchable archive Searchability • The ability to copy and paste from anywhere on Replicability the net to anywhere online • High potential visibility well beyond the audience Scalability you had in mind • Never really knowing who’s seeing, reading or Invisible Audiences watching what you post Blurring of public • Boundaries aren’t clear between what is private or indeed what is physical and what is online and private • Inhibitions breakdown because of a lack of Online disinhibition visual cues and inflection
  • 13. Social Implications of Cyberspace• The internet, together with the mobile phone has changed the pattern of social relationships, their construction, negotiation, scope and timeframe• Changed concept of friends and friendship• Created new boundaries of privacy• Disinhibits• Desensitises
  • 14. What risks should we be guarding against? Content (child as recipient) Commercial Aggressive Sexual Values • Adverts • Violent / hateful • Pornographic or • Bias • Spam content unwelcome • Racist • Sponsorship sexual content • Misleading info • Personal info or advice Table developed by the EUKids Online project as and referenced in paragraph 1.3 of the Byron Review.
  • 15. What risks should we be guarding against? Contact (child as participant) Commercial Aggressive Sexual Values • Tracking • Being bullied, • Self harm harassed or • Meeting strangers • personal info • Unwelcome stalked • Being groomed persuasions harvestedTable developed by the EUKids Online projectas and referenced in paragraph 1.3 of the Byron Review.
  • 16. What risks should we be guarding against? Conduct (child as actor) Commercial Aggressive Sexual Values • Illegal downloading • Bullying or • Creating and • Providing • Hacking harassing another uploading misleading info • Gambling inappropriate or advice material • Financial scams • TerrorismTable developed by the EUKids Online projectas and referenced in paragraph 1.3 of the Byron Review.
  • 17. CHILD safeguarding and Promoting welfare Family andEnvironmental factors
  • 18. Research Highlightshttp://www.education.gov.uk/ukccis/researchandstrategy/a0077608/research-highlights-series © SWGfL Trust 2011
  • 19. A Context of Rapid Change © SWGfL Trust 2011
  • 20. What support can we give?
  • 21. Supporting children and young people
  • 22. Giving out personal information andcommunicating with people you don’t know Exposed
  • 23. School Curriculum “E-safety” clearly defined with separate strands Progressions through Foundation Stage to Key Stage 5 Lesson Plans and Resources
  • 24. Two strands:Firstly : supporting thechildren and young people andfamilies we work withSecondly: evaluating the E-safety in the organisation
  • 25. Other issues:How can we manage our ownonline environment?How can we ensure that thechildren and young peoplewe interact with cannotaccess our online privatelives?
  • 26. Worried by Facebook?
  • 27. Why should we be concerned about Privacy, Personal Information and what we publish online?
  • 28. 4000+Average 300+
  • 29. 10 Strategies to Reduce Visibility and Vulnerability on Facebook• Understand Your Friend Lists• Remove Yourself From Facebook Search Results• Remove Yourself From Google• Limit Photo Tagging• Protect Your Albums• Avoid Embarrassing Status Messages• Control What Information Applications Can Access• Make Your Contact Information Private• Avoid Embarrassing Wall Posts• Keep Your Friendships Private
  • 30. How should I Can I respond respond if I amCan I use an official subjected to cyber computer to book to a comment from a child or bullying by a childholidays etc during or young person or lunch time or after parent on Facebook? by a member of work? their family? Can I use my Can work limit mobile to take my private photos or online videos of publishing? children? Should I text a child or parentCan I use Twitter to Should I in the eveningdiscuss a topic with continue to use to remind them the people I work my social of an with? network site? appointment?
  • 31. Guidance for Safer Working Practice for Adults who Work with Children and Young People.Section 12 Communication with Children and Young People (including the Use of Technology) Communication between children and Adults should not share adults, by whatever any personal method, should take information with a child place within clear and or young person. They explicit professional should not request, or Adults should ensure boundaries. This respond to, any that all communications includes the wider use personal information are transparent and of technology such as from the child/young open to scrutiny. mobile phones text person, other than that messaging, e-mails, which might bedigital cameras, videos, appropriate as part of web-cams, websites their professional role. and blogs.
  • 32. Considering our own digital footprint
  • 33. http://mashable.com/2011/10/23/how-recruiters-use-social-networks-to-screen-candidates-infographic/
  • 34. UK Safer Internet Centre
  • 35. Self Review - For schools
  • 36. For any agency, voluntary organisation or faith group© SWGfL Trust 2011
  • 37. © SWGfL Trust 2011
  • 38. © SWGfL Trust 2011
  • 39. © SWGfL Trust 2011
  • 40. © SWGfL Trust 2011
  • 41. © SWGfL Trust 2011
  • 42. © SWGfL Trust 2011
  • 43. © SWGfL Trust 2011
  • 44. © SWGfL Trust 2011
  • 45. © SWGfL Trust 2011
  • 46. © SWGfL Trust 2011
  • 47. Become an E-Safety Aider• Part of your CPD• Practical and applicable skills• Evidence of commitment to e-safety for you and your organisationFind out more at:www.swgfl.org.uk/Epict © SWGfL Trust 2011
  • 48. Training and Development
  • 49. Useful Contacts• SWGfL www.swgfl.org.uk/safe• Schools/Colleges• Internet Service Provider• Mobile phone provider• Local Authority - LSCB• National organisation• Police• CEOP www.thinkuknow.co.uk
  • 50. Thank YouWWW.SWGFL.ORG.UK/DELEGATEEVALUATIONAdd your email address to enter a monthly draw for £25 AmazonVoucher