E  safety Presentation for foster carers by stephen carrick-davies
Upcoming SlideShare
Loading in...5
×
 

E safety Presentation for foster carers by stephen carrick-davies

on

  • 2,784 views

Presentation by Stephen Carrick-Davies for Foster Parents or those working with Vulnerable Young People. This 100 slide presentation is used in a 3 hour training session. ...

Presentation by Stephen Carrick-Davies for Foster Parents or those working with Vulnerable Young People. This 100 slide presentation is used in a 3 hour training session.
This presentation and forms the basis of training Stephen has delivered for Foster Parents and other working with vulnerable adults across the UK.
Not all of the training content is included in this presentation and these slides are NOT a training package (either as a whole or in parts) and should not be used as such.
It is shared on SlideShare for information and guidance only and to contribute to the debate about how the internet can amplify offline vulnerabilities.

Statistics

Views

Total Views
2,784
Views on SlideShare
1,741
Embed Views
1,043

Actions

Likes
1
Downloads
29
Comments
0

3 Embeds 1,043

http://www.carrick-davies.com 1039
http://carrick-davies.com 3
http://translate.googleusercontent.com 1

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Number of home computers is at around 50%
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Self evident – important to stress the value in SN sites for YP. Unintended consequences if these sites were closed down. Really important to stress the need for YP to understand identity and risk as well as “hanging out” ! Daniel Broughton MD a pediatrician at the Mayo Clinic says we are doing our children a disservice if we try to remove all risks from their lives !
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Whenever I start talking about Childnet’s work I start with this picture. They say a picture speaks a thousand words. This is Tomison Adeloye – a friend of mine. I took this picture of him to illustrate just what it is that children access when going online – The whole world – the positive as well as the potentially harmful. There’s a further point to this picture in that Tomi is deaf. As he told me when I took this photo of him – no-one knows you are deaf on the Internet ! – he uses the same method of communicating – his fingers. – Again this is a powerful reminder that Children don’t really know who they are talking to on line. Of course with mobile technology the Internet is now not just in our hands but in our pockets ! As you are seeing in Japan, children are able to access sites such as dating agency sites from their internet enabled phones . I read last week that the National Police Agency here want to ban anyone under 18 from accessing dating sties and we are facing similar calls in the UK and I’ll say something about this later. However, before we talk about the present and the future and the challenges and opportunities I want to go back to one of the founders of the Internet – Tim Berners Lee – generally credited for inventing the WWW. In his book “weaving the web he says”
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies "The web is more a social creation than a technical one. I designed it for social effect - to help people work together - and not as a technical toy. The ultimate goal of the web is to support and improve our weblike existence in the world...... We have to ensure that the society we build with the web is the sort we intend.” This is one of the motivations behind our work. Childnet is not first and foremost a technology charity, we don’t have too many techies on staff. We are motivated to ensure that children benefit from the net – that the future society is one in which the net is used positively to benefit children and that their rights are protected and promoted online. I am sure that many of you here today are committed to this ideal and want to ensure that our future society is shaped by positive applications of the net.
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies

E  safety Presentation for foster carers by stephen carrick-davies E safety Presentation for foster carers by stephen carrick-davies Presentation Transcript

  • SAFEGUARDING CHILDREN ONLINE E-SAFETY FOR FOSTER PARENTS and those who work with vulnerable young people By Stephen Carrick-Davies
  • Disclaimer, copyright and caveats
    • This presentation has been written by Stephen Carrick-Davies and forms the basis of training he has delivered for Foster Parents and other working with vulnerable adults across the UK.
    • Not all of the training content is included in this presentation and these slides are NOT a training package (either as a whole or in parts) and should not be used as such.
    • It is shared on SlideShare for information and guidance only and to contribute to the debate about how the internet can amplify offline vulnerabilities.
    • It’s great to share but it is not easy to strike the right balance between sharing and copying. Invariably these slides contain content developed by others and Stephen has sought to credit content (including photographs) which have come from other sources at the end of this presentation so please respect the authorship of these slides (See slide 101).
    • The content on the slides which Stephen has personally written and produced he has assigned with Creative Commons license . Slides showing this mark can be used for non-commercial purposes, as long the content is credited. See www.creativecommons.org for more info.
    • Ultimately Stephen hopes that these slides help others working with vulnerable young people and if you have questions or have other experience to share please contact Stephen directly (see e-mail address at the end).
    “ In the past you were what you owned. Now you are what you share.” Charles Leadbetter
  • Welcome and housekeeping Session lasts 3 hours 10-1.00 Comfort break at 11.15 – 11.30 Hands-on session after break Not a forum for disclosures Fire alarm arrangements (not expecting) Chance for group questions and action planning at 12.45 and optional one-to-one from 1-2pm Evaluation forms – Please complete so I can improve ! Welcome
  • Stephen Carrick-Davies
    • Ten years at Childnet International
    • Now an Independent Trainer/ Social Entrepreneur /Parent/Learner .....
    Introductions
    • Here to help YOU better support the Young People you are responsible for .
    If we care about - and are responsible for - young people we must care for them and help them be responsible online !
  • A little about you Introductions One thing you LOVE about the internet ? One thing you HATE about the internet ? What’s the one thing you want to get out of this training? Name .......................... How long have you been a foster carer/or worked with vulnerable Young People ?
  • Structure and aims of training Part I Understanding the new Reality Part II Understanding the Risks Part II Understanding our Responsibilities
        • Overview of ‘Social Media’ and web 2.0
        • How technology is changing, and changing us !
        • What is this changing ‘space’ we call the Internet ?
        • Overview of online risks for young people
        • How the internet can amplify offline vulnerability
        • *Hands-on training* (with focus on privacy tools)
        • Specific challenges for Foster Parents
        • Prevention & Response strategies
        • The role of schools
        • Further resources, support networks, and action plans.
    REFLECT & THINK INFORMED & EQUIPPED INSPIRED & EMPOWERED
  • On a scale of 1- 10 rank yourself as to how confident you are using social media. 1 ----------------------5----------------------10 “ What’s a mouse?” “ I taught Mark Zuckerberg all he knows”
  • PART 1 Understanding the new “Reality”
  • How many of you have a Facebook Account ? How many of the YP you look after have a Facebook Account ? Teaching swimming without a swimming pool !
  • “ We have created a child who will be so exposed to the media that he will be lost to his parents by the time he is 12.” David Bowie interview with Melody Maker January “ There are only two states for children these days; they are either asleep or online....even if they wake up in the middle of the night they go online.” Eric Schmidt Executive Chairman of Google . 2010 1972 "What is happening to our young people? They disrespect their elders, they disobey their parents. They ignore the law. They riot in the streets inflamed with wild notions. Their morals are decaying. What is to become of them?” Plato founder of the first institution of higher learning 430 BC Has it always been this way ?
    • My first mobile phone !
    I used it twice a year !
    • POS
    • I8u
    • AATK
    • LOL
    NOW YOU EVEN HAVE A DIFFERENT PHONE LANGUAGE ! Parent over shoulder I hate you Always at the keyboard Laugh out loud My Xmas hols wr CWOT. B4 we used 2go2 NY 2C my bro, his GF & 3 kids ;) FTF. ILNY it’s a gr8 plc.
  • My family’s first TV
  • “ THE FUTURE AIN’T WHAT IT USED TO BE” IPTV, Mobile, 3D, & Interactive
  • What terms do we use to explain this space ? Cyberspace ? “ This is just the beginning, the beginning of understanding that cyberspace has no limits, no boundaries.” Nicholas Negroponte Founder of Massachusetts Institute of Technology's Media Lab,
  • What terms do we use to explain this space ?
    • Superhighway ?
    “ The idea that we are still travelling on a ‘superhighway’ towards the future in the same bus and in the same direction, is naive. If you are a child you’re likely to be travelling alone, on a side street and probably without a crash helmet.” S C-D
  • What terms do we use to explain this space ? Virtual World “ Most people are awaiting Virtual Reality; I'm awaiting virtuous reality”. Eli Khamarov
  • The favourite member of the family ? What terms do we use to explain this space ? “ Television:  chewing gum for the eyes”.   Frank Lloyd Wright
  • What terms do we use to explain this space ? My World My library “ Calling it ‘mine’ makes the vastness more intimate, the anonymity less threatening and the chaos more orderly. But you can still feel lonely in a crowd”. S C-D
  • FORWARDED COMMENTED ON COPIED STORED MORPHED/ CHANGED An incubator ? What terms do we use to explain this space ? UPLOADED (captured) MUNCHED AMPLIFIED RE- BROADCAST
  • COPIED STORED An incubator ? What terms do we use to explain this space ? “ The new social web has changed the platform to that of an incubator; it is a place where communication is captured, aggregated, added to, morphed, changed and rehatched as a new broadcast or ping. Those with the skill and confidence to narrate their lives online, manage their reputation, mitigate the risks and build up resilience, may well be able to survive and thrive. Those who have few supportive adults, low levels of literacy and are unsupervised and vulnerable to abuse, are far less confident and hence more at risk.” Stephen Carrick-Davies The Guardian newspaper July 2011 FORWARDED COMMENTED ON MORPHED/ CHANGED RE-HATCHED
  • What is true is that it is changing rapidly Portable Personal Private
  • Social media landscape
  • The fastest growing segment in Facebook is older women ! PLAY VIDEO http://www.youtube.com/watch?v=x0EnhXn5boM
  • “ If you took away my mobile phone you would take away a part of me” The child’s online world real AMPLIFIER (gives children a voice) ANONYMITY ALWAYS ON AWAY FROM SUPERVISION ACCEPTANCE - IDENTITY & STATUS ACCESS THE WORLD ACTIVE NOT PASSIVE MEDIUM ADDICTIVE (?)
  • Access to cheaper goods & services If you’re not connected you miss out on the new “Knowledge economy”. Education + ICT = greater attainment If you’re not connected your children can be at an educational disadvantage . THE IMPACT The internet is now indispensable That is why you as foster parents have been given laptop for the child you foster. Economic Social Education YP care about their online identity ! If you’re not connected you’re missing out on today’s social life – especially SNS & games.
  • Communicate Challenge Champion Community Change Co-operate Customer service Collaborate + co-create But it is also changing the way we work and interact + Quick, personal, immediate Aggregate the public voice Build a movement (not campaign Inspire + build community “ Wisdom of the crowds” Efficient + global Hold providers to account Share best practice
  • AGE RESTRICTIONS ? If you lie about your age .... you’ll soon have to lie about your experiences .
  • In pairs discuss GROUP EXERCISE What was the most technically advanced communication tool that you used when you were a teenager ? Do you feel ‘left behind’ or excluded from this rapid change ?
  • “ Anything that gets invented after you’re thirty is against the natural order of things and the beginning of the end of civilisation as we know it … .until it’s been around for about ten years when it gradually turns out to be alright really.” Douglas Adams
  • ALL FOR FREE …… BUT ….WHAT PRICE IS FREE ? TIME LINE (Coming) Social location APPLICATIONS Huge range of apps NEWS FEEDS “boast by post” MESSAGES Superseding E-mail WHO’S ONLINE Know who is online now! PHOTOS/TAGS Comment and Tag photos face recognition LIVE CHAT Superseding IM FRIENDS Find, link, be in constant contact + on your mobile VIDEO link and embed Events/ Groups
  • AND ‘GIFTING’ – wonderful way of sharing something as a ‘gift’ Social location APPLICATIONS Huge range of apps NEWS FEEDS “boast by post” MESSAGES Superseding E-mail Video coming WHO’S ONLINE Know who is online now! PHOTOS/TAGS Comment and Tag photos face recognition LIVE CHAT Superseding IM FRIENDS Find, link, be in constant contact + on your mobile VIDEO link and embed Events & Groups TIME LINE (Coming)
  • Quiz Time
    • How members does Facebook have ?
    More than 800m users If it was a country it would be the 3 rd biggest 70% of users are outside USA
  • Can Facebook be used for good ?
    • Oscar Morales 33 yr old engineer started a Facebook group called ‘One Million voices’ against the FARC terrorist organisation in Columbia
    • Over 250,000 Facebook users signed on, and the movement was taken up by newspapers and radio and TV with two million people taking part in p protests in Colombia and 100 other cities worldwide.
  • What would Gandhi have done if he had a FACEBOOK account ? All technology is neutral
  • Remember the Positive !
    • “ HANGING OUT” & IDENTITY Young people need a space to hang out and express themselves and “gather” in adult free space, in much the same way as YP used to at the youth club or shopping centre
    • SHIFT FROM CONSUMPTION TO CREATION The opportunity to be creative, and express themselves with original content, customise pages and engage in collective self expression and collaboration.
    • RISK ASSESSMENT Young People need a space to manage risks for identity and test boundaries. Most appear to be capable of self-regulation if they are made aware of the risks.
    • PEER TO PEER EDUCATION Active communication, strengthening existing relationships, sharing ideas, supporting and helping each other.
    • INFORMAL LEARNING Acquiring new skills which are highly valued in the new knowledge economy. EG - creativity, presentation, team building, retrieving information, assessing value, analysing, reviewing etc.
  • Understanding the risks (not the same thing as harm !) PART II
  • Our perception of danger Most abuse takes place in the context of a family or close relative .
    • Classifying the risks to children online
    Original 3 Cs Classification by ‘EU Kids’ online project CONTENT CONTACT CONDUCT Commercial Aggressive Sexual Values Adverts Spam Sponsorship Personal info Violent and hateful content Pornographic unwelcome sexual content Bias Racist Misleading info or advice Tracking Harvesting Personal info Being bullied harassed or stalked Meeting strangers Being groomed Self harm Unwelcome persuasions Illegal downloading Hacking Gambling Financial scams Terrorism Bullying or harassing another Creating and uploading inappropriate material Providing misleading info/advice Child as Recipient Child as Participant Child as Actor
    • How the risks ‘migration’ from online to offline can affect vulnerabile YP
    CRIMINAL Original 3 Cs Classification by ‘EU Kids’ online project CONTENT CONTACT CONDUCT Commercial Aggressive Sexual Values Child as Recipient Child as Participant Child as Actor BEING IN THE WRONG PLACE AT THE WRONG TIME & “BAD LUCK”
    • OF THE 1,984 PEOPLE CHARGED AFTER RIOTS:
    • 53% were under 20 years old
    • 42% received free school meals
    • ( 16% nat. average )
    • 66% of them had some special education needs (21% of all pupils)
    • Figures from the Ministry of Justice carried out by the Howard League for Penal Reform
    • (published in Guardian 26.11.11)
    • Contact
    • www.ceop.gov.uk
    • if you have concerns about inappropriate communication from an adult to a minor .
    Pornographic unwelcome sexual content Meeting strangers Being groomed Creating and uploading inappropriate material Online grooming is a criminal offence “ One-third of those who sexually abuse children are just children themselves.” BBC Newsnight programme March 2010 21,630 BEBO members had the name “Porn Star” “ Sexting” = teens sharing nude photos via mobiles and web. The practice can have serious legal and psychological consequences CONTENT Child as Recipient CONTACT Child as Participant CONDUCT Child as Actor Commercial Aggressive Sexual Values “ So take a dirty picture for me, Take a dirty picture Just take a dirty picture for me Take a dirty picture” From Taio Cruz song No 6 in the UK charts April 2010 .
  • Film Film conceived and acted by yp from Southwark see film and documentary about how we made the film at http://www.carrick-davies.com/research/films Play film Film at www.carrick-davies.com/research/films
    • Classifying the risks to children online
    Violent and hateful content Classification by ‘EU Kids’ online project and referenced in the Byron Report 22% of yp aged 11-18 report having been cyber bullied. It ruins lives. YP may not disclose that it is happening CONTENT CONTACT CONDUCT Commercial Aggressive Sexual Values Being bullied harassed or stalked Bullying or harassing another Child as Recipient Child as Participant Child as Actor
  • “ Sticks and stones.... But words ...?” From Canadian Ad Council at http://www.youtube.com/watch?v=bdQBurXQOeQ
  • How is Cyberbullying different from offline bullying? OFFLINE ONLINE Home was sanctuary Often Physical Usually words/pictures Bully strong/victim weak Roles can change Can be 24/7 Local & intimate Mass audience See the impact Don’t see impact (lack of empathy) Bystanders intervene Bystanders take part (using mobile/camera/social media) Often Silent It can leave a trail ! The importance of keeping evidence
  • Why YP may be scared of reporting abuse ?
    • “ It was nobody else’s business”
    • “ Didn’t think it was serious or wrong”
    • “ Didn’t want parents/friends to find out”
    • “ Was frightened”
    • “ Didn’t think I would be believed”
    • “ Had been threatened by the abuser”
    • Source: Child Maltreatment in the UK Cawson 2000
    • “ My parents don’t get the internet”
    • “ Maybe it was my fault ! (blur)”
    • “ Scared if computer is confiscated”
    Abuse on the internet/mobile phone
    • The young person who you are responsible for (let’s say she’s a 12 year old girl) tells you that her “friends” in her class took video clip of her at a sleep over pyjama party on their phones which is now being circulated and she thinks it is now posted on a social networking site.
    • What advice would you give to her ?
    • Who should the girl report this to ?
    • Is this a school issue ?
    • How would you go about trying to remove this content ?
    • What if those who posted it up have circulated it more widely ?
    GROUP EXERCISE
  • WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY 10 WAYS IN WHICH THE INTERNET CAN AMPLIFY OFFLINE VULNERABILITY
  • ‘ Vulnerable’ Those who have experienced offline risk and abuse may be more resilient and able to protect themselves online or may not be affected so much by the risks they encounter. HOWEVER WE CAN IDENTIFY A FEW COMMON FEATURES.... This is complex because: All children are different so there are dangers in making broad statements. Vulnerability is not static - All children can be vulnerable at different stages Many children are neglected which is harder to spot yet makes them vulnerable The categorisations of risk offline do not necessarily mirror online experience (eg a disabled yp may be empowered online as the internet can be ‘leveller’ The paradox that over-protected children can be more vulnerable online. The more a child uses the internet the more they can become confident and possibly complacent and feel ‘invincible’ and don’t feel they are at risk . What about vulnerable adults ? Constantly changing technologies. Eg, Location services
  • MUNCH POKE PING! See www.carrick-davies.com Lack of supportive adults in their lives More unsupervised time, fewer structures and boundaries Fluid learning environment and gaps in education and induction Low self-confidence. Identity seen to be part of ‘outsiders’ Influences of alcohol, drugs and gang culture. Risk takers and at risk Experience abusive relationships or environments including anger
      • “ Many of the young people I work with are massive risk takers , impulsive to the extreme and often use alcohol and/or drugs. On average they first engage in sexual activity at a far younger age than other students . They also have huge amounts of unsupervised time on their hands , often till very late at night. I teach many YP who are half-asleep as they have been online till gone 3am.”
      • PRU staff member from ‘MPP’ report
      • “ I have over 120 people on my BBM but I deleted like 30 on Saturday cause I was angry and they pissed me off so I just deleted them. Since I’ve had my BlackBerry only 2 people have deleted me.” PRU student from ‘MPP’ report
    WE MAY SEE THEM AS VULNERABLE BUT THEY MAY SEE THEMSELVES AS IN CONTROL
  •  Unmediated Contact Children who have been fostered can suddenly receive messages from siblings, birth parents, or those who want to trace them for potentially harmful reasons. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY Guardian Newspaper article 19 June 2010
  •  Social Location WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY Young People who may need to escape from an abusive relationships need to think carefully about how they make their ‘places’ public.
  • Eg Facebook Timeline  Exclusion from the ‘norm’ There are lots of online services which celebrate our ‘journey’. How do children who don’t know their birth parents, may not have an early photo of themselves feel in these ‘boast by post’ environments ? WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY
  •  Blackmailing “ gifting” & grooming by peers A young person from a disadvantaged background may be targeted with ‘gifts’ of mobile phones, mobile payment cards etc, by older young people but in exchange for ‘favours’ which they ‘cash in’ later (including prostitution, trafficking or illegal activity ). If it sounds to good to be true .... it’s probably is (they want something ! ) Search ‘NSPCC survey on teen partner violence’ for more info WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY
  • Many vulnerable young people can be early adopters of tools and services which are not yet regulated or in the public conscious. For example BBM How will QR codes be mis-used ?  Earlier adopters ? Screen Munch ! WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY
  •  Being ‘nudged’ into gangs ALL CHILDREN WILL LEAVE A FOOTPRINT EXCEPT SOME WILL BE IN MUDDIER SAND ! WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY Vulnerable young people who are risk takers, impulsive or under the influence of alcohol and/or drugs and less supervised, can be more easily drawn into illegal activity including being ‘nudged’ through technology.
  •  Negative digital footprint ALL CHILDREN WILL LEAVE A DIGITAL FOOTPRINT BUT SOME WILL BE MUDDIER THAN OTHERS WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY Those who are supported can compensate and build positive online footprint but what about those who aren’t ?
  •  Low Resilience “ When my pinger’s gone to sleep that’s when I’ll go to sleep.” WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY Young people need to be cherished, have the right amount of sleep and healthy food. What happens when you are running on empty ?
  •  Special needs & learning difficulties
    • WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY
    Some children with emotional or behavioural difficulties, attachment difficulties, and other complex needs, may be particularly vulnerable online. EG those with Autistim Spectrum Disorder may make literal interpretations of content, which will affect how they respond. Others with complex needs may not understand the concept of friendship, and therefore trust everyone implicitly. Some children with SEN or disabilities may not recognise that they are being bullied or appreciate how their own online behaviour may be seen by someone else as bullying . Attachment Attachment Theory
  •  Low levels of Language & Literacy
    • WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY
    We must not assume that all YP are confident “digital natives” and we must also recognise that one in six people in the UK struggle with literacy (below the level expected of an eleven year old). Hence being able to complete a ‘REPORT ABUSE’ form or read instructions about safety, privacy and ‘terms and conditions’ are real barriers for many young people. Do YP recognise the link between reading and being able to be safe ? Lack of literacy skills, can mean that messages are unclear, ambiguous or misunderstood
  • In pairs discuss GROUP EXERCISE Do you recognise these 10 offline vulnerabilities and agree that they can be amplified online ? How could you begin to talk to the YP you look after about these pressures ?
  • Let’s have a comfort break 15 mins.
  • HANDS ON SESSION PART II To help someone swim... you’ve got to be willing to get a little wet! Let’s Dive in !
    • Dilemmas and decisions:
    • Setting up a Facebook account
    First name: Surname: Sex: Dob: HAVE TO BE OVER 13 E-mail: - see next ?
    • So easy to set up a free e-mail account
    New G-Mail account in 3 mins
  • As soon as you join you need to connect FB can migrate all your existing e-mail contacts automatically
  • HANDS ON EXPERIENCE LET’S SET UP A FACEBOOK ACCOUNT TOGETHER Let’s do this together
  • Questions What age shall we give her ? What information shall we make public ? What should we keep private ? What friends shall we link her to? Shall we let her update from her mobile ? What about location ‘places’ What online profile and identity shall we give ?
    • The importance of privacy settings
    • 31% of 12-15 year olds don’t use privacy settings on their social networking profiles – Ofcom Medial literacy Report 2009
  • Please note the privacy settings options can change constantly !
    • The old view showed it clearer
    Name, profile picture, gender and membership of networks is always PUBLIC This information you can control And customise further
  •  
    • Searching for yourself – example
    • Having completed that exercise discuss the challenges and dilemmas and imagine yourself as a 13 year old uploading a profile for the first time.
    • Do you say you are “in a relationship”?
    • Who do you accept as your friends ?
    • What groups would it be cool to join ?
    • What level of privacy would you give yourself ?
    GROUP EXERCISE – In Pairs
  • UNDERSTANDING OUR RESPONSIBILITIES PART III “ Parents and the home environment they create are the single most important factor in shaping their children’s well-being, achievements and prospects” Alan Johnson (when Education Secretary) [+ foster parents]
  • THEORY THE DIGITAL DIVIDE  View youth as participants, not ‘potential victims ’ .  Don’t over-react but show respect and humility. Parents/Carers  Find ways of empowering them to protect themselves
    • Learn how to block the bully and save the evidence.
    • Recognise that lack of visual cues can reduce empathy
    • The response to negative is positive; focus on the good & use the media to look out for your friends.
     Validate their world and keep up to date.
    • If you care for children you have to care for them online.
    • Recognise how the internet amplifies offline vulnerability.
    • Accept that your children can be as likely to cyberbully as be a target of cyberbullying!
    PRACTICE THEORY
    • What goes online stays online. The true value of privacy is priceless
    • Digital literacy includes safety and ethics.
    • Wrong is wrong, offline or online !
     Show how to build positive digital footprints & reputation PRACTICE  Show them the ‘mirror test’ - how would they feel? ‘ ROPE’ BRIDGE  Help them build resilience for when things go wrong (and they will!)
    • Don’t demonise the Internet.
    • “ It’s life Jim, but not as we knew it!”
    Young People
    • Learn and show how to use tools of Privacy, Blocking, Reporting.
    • Remind your children not to retaliate and the importance of keeping evidence.
    • Model positive usage. Kids don’t do what we say but what we do !
  • Specific challenges for foster parents
    • “ The use of social media needs to be incorporated more generally into understanding the importance of a child’s curiosity about their origins, and how this changes over time...... Adopters and adoption agencies need to become tech-savvy so they can talk with confidence while recognizing the natural curiosity and the need for information”.
    • David Holmes, Chief Executive of BAAF
  • Why can online contact be so painful ?
    • Sensitive information can be distressing and raw. “Instant messaging” is in contrast to prior “no messaging”
    • E-mails can contain accusations anger, grief or shocking news. You can’t see the reaction or response of the person
    • Miscommunication is common – either party could be left feeling angry and hurt at what has been said.
    • You have to wait for a response ! (agonising for some)
    • They may never get a reply leaving the person feeling rejected, confused, angry or distressed.
    • Often the communication is private so the person receiving it is alone.
    • (See page 68 )
  • The specific dangers for looked after children in unmediated contact
    • A child may not fully understand why they came into care, and therefore not understand the danger they are putting themselves in;
    • A birth parent may be unprepared for, and unable to deal with an approach from the young person;
    • Some birth mothers belong to a family or community where sex outside marriage is taboo and so may have kept the pregnancy, birth and subsequent adoption a secret.
  • Can adults contact children via facebook ?
    • Facebook says that over 18s cannot search for under 18 unless there is already a link between them However :
    • Under 18s can enter a false date of birth
    • An adult can enter a false date of birth
    • An adult can enlist the help of another under 18 to use their account to search for and contact a child (page 47)
  • What information posted on Facebook could put a ‘looked after child’ at risk from being contacted inappropriately by a birth parent or sibling ? Feedback to the group GROUP EXERCISE - Discuss in pairs
  • How do you respond if this happens ?
    • Each situation is unique and there is “not one right way to deal with it”.
    • Your response will vary according to your child’s age, what s/he wants, the circumstances and motivations of birth parents etc.
    • Who made the contact (child or birth parent)
    • Don’t ban your child from using the internet.
    • Don’t make knee-jerk decisions, get support and advice and develop a plan.
    Advice from Facing up to Facebook http://www.baaf.org.uk/bookshop/book_fufa
    • Ten top tips to managing social media in adoption*
    • 1 Talk openly and honestly with your children about social media, contact issues and the risks involved. Then work together to come up with solutions.
    • 2 Look at privacy settings so that your children’s profile can not be seen publicly, and also hide lists of ‘friends’.  
    * From BAAF website Advice from Facing up to Facebook http://www.baaf.org.uk/bookshop/book_fufa
    • 3 Explain to your children the risks involved in accepting random unknown people as ‘friends’.
    • 4 Make sure they are not making public information that could help identify them, such as their date of birth or address.
    • 5 Discuss the possibility of using a nickname online instead of their real name, perhaps even having an unusual spelling (e.g N1ck Sm1th)
    • 6 Avoid using profile pictures. Instead use the default pictures or something generic like flowers, landscapes, football team logos etc.
    • 7 Children should be discouraged from posting any information about their school or local area
    • 8 Don’t tag children in photos posted online, and ask friends and family to be aware of this also.
    • 9 Make sure your children are aware of the risks of joining groups or networks that identify where they live or go to school.
    • 10 Make sure your children know how to ‘block’ people so that if they do receive unwanted contact it can be managed.
    • See page 53
  • The role of schools in respond to Cyberbullying ?
    • All UK schools must have an anti-bullying policy by law.
    • Government Guidance on cyberbullying is available (includes bullying of school staff!)
    • Ofsted inspects on safeguarding very closely (limiting factor !)
    • If your child is bullied online by other children in a school (even if it takes place outside of school hours or holidays) it IS a school issue.
    • Really important to support the school and recognise the real challenges that school staff have in this area.
  • P olicies I nfrastructure E ducation Whole-school ongoing education & prevention programme which is targeted at both pupils, parents and the whole school work-force. E-safety policy, Acceptable Use Policy, Anti-Bullying policy , Mobile use policy Managed learning environment with high quality access and equipment which is filtered, monitored and supervised . PIE all 3 ‘legs’ are vital
  • R isk R eputation R esilience A 3 RS FOR DIGITAL LITERACY
  • Useful websites
    • Child Exploitation and Online Protection Centre
    • www.ceop.gov.uk
    • 2) UK Council for Child Internet Safety
    • www.dcsf.gov.uk/ukccis/
    • 3) Childnet International
    • www.childnet.com/ including Cyberbullying film
    • 4) British Association for Adoption and Fostering
    • www.baaf.org.uk - including advice on Facebook
  • SHOW
    • Interactive video tutorial for parents
    • Designed for schools to give away free (1.5 million copies)
    • Promoting the benefits of technology
    • In 9 languages
    • Pre-loaded for new users
    Useful resources for parents
    • Dynamic education programs and ways for YP to understand the issues (including resilience)
    See http://whatsyourstory.trendmicro.com/internet-safety/pg/winners-2011) Using ‘Linked In’ to showcase a positive exercise to help vulnerable YP get a positive online reputation
  • EVALUATION Please give feedback. We want to continue to improve this training and YOU are now the expert ! 
  • Have we done what we said we would ? Part I Understanding the new Reality Part II Understanding the Risks Part II Understanding our Responsibilities
        • Overview of ‘Social Media’ and web 2.0
        • How technology is changing, and changing us !
        • What is this changing ‘space’ we call the Internet ?
        • Overview of online risks for young people
        • How the internet can amplify offline vulnerability
        • *Hands-on training* (with focus on privacy tools)
        • Specific challenges for Foster Parents
        • Prevention & Response strategies
        • The role of schools
        • Further resources, support networks, and action plans.
    REFLECT & THINK INFORMED & EQUIPPED INSPIRED & EMPOWERED
  • Action Plans Before you leave write down 3 things which you are going to do as a result of attending this training.
  • And Finally….
  • "The web is more a social creation than a technical one. I designed it for social effect - to help people work together - and not as a technical toy…. The ultimate goal of the web is to support and improve our web like existence in the world...... Tim Berners-Lee ‘Weaving the Web’ 1999 We have to ensure that the society we build with the web is the sort we intend.”
  • THANK YOU ! www.carrick-davies.com [email_address] Complete Evaluation forms MUNCH PING POKE! See my current work re social media and vulnerable yp on my website
    • I’m sticking around for a further hour to help anyone individually with questions or their action plans
    • Slide 1 Assorted images from companies providing these services via Google images.
    • Slide 7 Photo from TIME magazine (r) and Google images (L)
    • Slide 8 & 97,98 Photo Stephen Carrick-Davies
    • Slide 9 & 11, 13, 14 ,15, 16, 17,18, 19, Photos from Google Images
    • Slide 21 From Slide Share photo Fred Cavazza/flickr.com http://www.flickr.com/photos/fredcavazza/
    • Slide 22 From ‘Is social media a fad?’ http://www.youtube.com/watch?v=45izI2jw0zA
    • Slide 22 Graph from Techcrunch
    • Slide 23 Social Media graph by Fred Cavazza
    • Slide 30 Google Images slide, quote from Douglas Adams see http://www.goodreads.com/author/quotes/4.Douglas_Adams From
    • Slide 31 & 32 Facebook screen grab from old SC-D Facebook page Slide 20 Dali Lama screen grab from Facebook User
    • Slide 35 Photo of typewriter by SC-D from Imperial War Museum exhibition. Quote re Gandhi use of Facebook SC-D
    • Slides 39 C lassification of online risk by ‘EU Kids’ online project Http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/Home.aspx
    • Slide 40 Updating of Classification of online risk by S C-D pictures from Google images of London Riots Aug 2011
    • Slide 42 - Photos SC-D and film by Stephen Carrick-Davies & Film by Ruined City Films from MPP report.
    • Slide 44 Screen grab from Canadian Ad Council at http://www.youtube.com/watch?v=bdQBurXQOeQ
    • Slide 47 Image (hidden) from Google Images.
    • Slide 52 – Slide grab from Guardian newspaper article 19 June 2010
    • Slide 50 -61 10 ways in which vulnerability is amplified online by Stephen Carrick-Davies from MPP work. Photos from Google images
    • Slide 78- 87 Advice summarised from BAAF publications on social media and Foster Carers http://www.baaf.org.uk/bookshop/book_fufa
    • Slide 89 PIE diagram originally developed by NETSAFE in New Zealand and used by BECTA as part of their AUP toolkit for schools document
    • Slide 90 - 3 ‘R’s of Digital Literacy by Stephen Carrick-Davies
    This presentation has been designed by Stephen Carrick-Davies. The slides are available on Slide Share.net and I am happy for this presentation to be circulated as a pdf document. However please don’t distribute further or use for training or commercial purposes without contacting me as it is important to respect the author’s content and copyright of images and text used in this presentation. Photos content used from other sources are acknowledged on slides or credited below. Credits and sources Sorry if I’ve missed anyone else out, Please let me know ! This image from www.flickr.com/photos/55279617@Noo/124659356