SAFEGUARDING CHILDREN ONLINE Training for Foster Parents and those who    work with vulnerable young people    Written and...
Welcome and housekeepingSession lasts 4 hours 10-2.30Comfort break at 11.15 – 11.30Hands-on session after breakNot a forum...
Introductions          Stephen Carrick-Davies         • Ten years at Childnet International         • Now an independent t...
IntroductionsA little about youName ..........................How long have you been a foster carer/or workedwith vulnerab...
What are your expectations and training needs ?
Structure and aims of trainingPart I Understanding the new Reality                          REFLECT & Overview of ‘Social...
On a scale of 1- 10 rank yourself as to how      confident you are using social media.1 ----------------------5-----------...
Why this stuff matters ?                              Our safety, conduct                       Risk   & risky behaviours ...
PART 1Understanding the new “Reality”
How many of you have a Facebook Account ?How many of the YP you look after have a FacebookAccount ?
Film                                                                         Play film                                    ...
My first mobile phone !I used it twice a year !
NOW YOU EVEN HAVE A DIFFERENT PHONELANGUAGE !•    POS      Parent over shoulder•    I8u      I hate you•    AATK     Alway...
My family’s first TV
“THE FUTURE AIN’T WHAT IT USED TO BE” IPTV, Mobile, 3D, & Interactive
The game changerPORTABLE          A GREAT          STATUSPRIVATE +        PACIFIER !        SYMBOLPERSONAL  ANYTIME,      ...
What terms do we use to explain this space ?Cyberspace ?“This is just the beginning, the beginning of understanding that c...
What terms do we use to explain this space ? Superhighway ?“We may still be travelling on a superhighway towards the futur...
What terms do we use to explain this space ?Virtual World“Most people are awaiting Virtual Reality; Im awaiting virtuous r...
What terms do we use to explain this space ?The favourite member of the family ? “Television: chewing gum for the eyes”. F...
What terms do we use to explain this space ?                                                                  My World    ...
What terms do we use to explain this space ?               An incubator ?                  FORWARDED                 COMME...
Social media landscape
The fastest growing segment inFacebook is older women !PLAY VIDEOhttp://www.youtube.com/watch?v=x0EnhXn
AGE RESTRICTIONS ?                     If you lie about your                     age .... you’ll soon                     ...
GROUP EXERCISEIn pairs discussWhat was the most technicallyadvanced communication tool thatyou used when you were a teenag...
“Anything that getsinvented after you’rethirty is against thenatural order of thingsand the beginning ofthe end of civilis...
NEWS FEEDS                 APPLICATIONS           PHOTOS/TAGS                                                    Comment a...
A word about BBM          • Be careful with your BBM PIN          • Be careful of ‘Screen Munching’          • Use the too...
See pages 54 – 59 in Vodafone’s Digital Parenting magazine
A word about games           • The ratings are there for a reason.           • Anyone who sells a designated 12+          ...
All technology is neutral                            What would                            Gandhi have                    ...
PART IIUnderstanding the risks                (not the same thing as harm!)
Our perception of dangerMost abuse takes place in thecontext of a family or closerelative.
Classifying the risks to children onlineOriginal 3 Cs Classification by‘EU Kids’ online project          Commercial       ...
How the risks of CRIME ‘migration’ from                                    online to offline can affect vulnerabile YPOrig...
“Sexting” = teens sharing nude photos via mobiles and web. The practice canhave serious legal and psychological consequenc...
Classifying the risks to children online                       Commercial   Aggressive                  Sexual            ...
“Sticks and stones.... But words ...?”From Canadian Ad Council athttp://www.youtube.com/watch?v=bdQBurXQOeQ
How is Cyberbullying different from offline bullying?  OFFLINE                              ONLINEHome was sanctuary      ...
Why YP may be scared of reporting abuse ?• “It was nobody else’s business”• “Didn’t think it was serious or wrong”• “Didn’...
GROUP EXERCISEThe young person who you are responsible for (let’s say she’sa 12 year old girl) tells you that her “friends...
WAYS IN WHICHTHE INTERNET CAN AMPLIFYVULNERABILITY                  10 WAYS IN                  WHICH THE                I...
‘Vulnerable’              This is complex because:All children are different so there are         Vulnerability is not sta...
Low self-                                       Fluid learning                    confidence.                             ...
“Many of the young people I work with are massive risk takers,impulsive to the extreme and often use alcohol and/or drugs....
WAYS IN WHICH THE INTERNET  CAN AMPLIFY VULNERABILITY                      Unmediated Contact                            ...
WAYS IN WHICH  THE INTERNET   CAN AMPLIFY  VULNERABILITY                     Social LocationYoung People who may need to ...
WAYS IN WHICH   THE INTERNET    CAN AMPLIFY   VULNERABILITY                       Exclusion from the ‘norm’              ...
WAYS IN WHICHTHE INTERNET CAN AMPLIFYVULNERABILITY                    Blackmailing “gifting” &                        gro...
WAYS IN WHICHTHE INTERNET CAN AMPLIFYVULNERABILITY       Earlier adopters ?                                              ...
WAYS IN WHICH   THE INTERNET    CAN AMPLIFY   VULNERABILITY                       Being ‘nudged’ into gangsVulnerable you...
WAYS IN WHICHTHE INTERNET CAN AMPLIFYVULNERABILITY                 Negative digital footprint                            ...
WAYS IN WHICHTHE INTERNET CAN AMPLIFYVULNERABILITY    Low Resilience                                    “When my pinger’s...
•WAYS IN WHICH  THE INTERNET  CAN AMPLIFY  VULNERABILITY                     Special needs & learning difficultiesSome ch...
•WAYS IN WHICH                     Low levels of Language & Literacy  THE INTERNET  CAN AMPLIFY  VULNERABILITYLack of lit...
GROUP EXERCISEIn pairs discussDo you recognise these offlinevulnerabilities and agree that theycan be amplified online ?Ho...
PART IIHANDS ON SESSION                   To help                   someone                   swim...                   yo...
MODELLING GOOD BEHAVIOUR“Present but absent”Kids dont do what you saythey do what you do !Try to ...Be consistent and set ...
Influence of older siblings/uncles, aunts.... !“it’s not fair ...”Recognise the influenceand pressure and theirneed to dif...
Influence of older siblings, cousins, friends !“it’s not fair ...”Identify different times ofthe day and places fordiffere...
CE  VI Conversations aboutAD      Risk“Do you know who all your online friends are offline?”“Do you know how to block some...
CE  VI Conversations aboutAD     Reputation   “Remember what goes online stays online”   “When did you last check your p...
CE  VIAD      Conversations about      Responsibility “Have you come across any good social  initiatives?” “What do you ...
Dilemmas and decisions:Setting up a Facebook account                                                ?                     ...
So easy to set up a free e-mail account                                          New                                      ...
As soon as you join you need to connect                                     FB can migrate                                ...
HANDS ON EXPERIENCELET’S SET UP A FACEBOOK ACCOUNT TOGETHER                                           Let’s do this       ...
What online profile and identity shall we give ?                      Questions                      What age shall we giv...
The importance of privacy settings31% of 12-15 year olds don’t use privacy settings on their social networking profiles – ...
The old view showed it clearer                            Name, profile picture, gender and membership of                 ...
• Searching for yourself – example
GROUP EXERCISE – In PairsHaving completed that exercise discuss thechallenges and dilemmas and imagine yourself as a13 yea...
PART IIIUNDERSTANDING OURRESPONSIBILITIES                   ents]      [+ foster par“Parents and the home environment they...
Specific challenges for foster parents   “The use of social media needs to beincorporated more generally into understandin...
Why can online contactbe so painful ?• Sensitive information can be distressing and raw. “Instant  messaging” is in contra...
The specific dangers for looked afterchildren in unmediated contact 1. A child may not fully understand why they    came i...
Can adults contact children viafacebook ?Facebook says that over 18s cannot search forunder 18 unless there is already a l...
GROUP EXERCISE            -   Discuss in pairsWhat information posted on Facebookcould put a ‘looked after child’ at riskf...
How do you respond if this happens ?• Each situation is unique and there is “not  one right way to deal with it”.• Your re...
Ten top tips to managing social media in adoption*• Talk openly and honestly with your children about  social media, conta...
• Explain to your children the risks involved in  accepting random unknown people as ‘friends’.• Make sure they are not ma...
• Avoid using profile pictures. Instead use the  default pictures or something generic like  flowers, landscapes, football...
• Make sure your children are aware of the  risks of joining groups or networks that  identify where they live or go to sc...
The role of schools in respond to Cyberbullying ?• All schools now use and promote ICT• All UK schools must have an anti-b...
PIE    all 3 ‘legs’ are vital                                Policies                     E-safety policy, Acceptable Use ...
A NEW DIGITAL LITERACY CURRICULUMThe 3 Rs of digital literacy                    Risk    Resilience                      R...
Useful websites          1) Child Exploitation and Online Protection Centre          www.ceop.gov.uk          2) UK Counci...
Useful resources for parents                               Interactive video tutorial                                for ...
EVALUATION                         Please give feedback. We want to continue to improve this training and YOU are now the ...
Have we done what we said wewould ?Part I Understanding the new Reality                          REFLECT & Overview of ‘S...
Action PlansBefore you leave write down 3 things which you aregoing to do as a result of attending this training.
And Finally….
THANK YOU !          Complete Evaluation                     forms                                        MUNCH           ...
I’m sticking around for a furtherhour to help anyone individuallywith questions or their action plans
Credits and sourcesThis training has been designed by Stephen Carrick-Davies. Theslides are available on Slide Share.net a...
E  safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013
Upcoming SlideShare
Loading in …5
×

E safety training for foster carers by stephen carrick-davies jan 2013

1,104 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,104
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Whenever I start talking about Childnet’s work I start with this picture. They say a picture speaks a thousand words. This is Tomison Adeloye – a friend of mine. I took this picture of him to illustrate just what it is that children access when going online – The whole world – the positive as well as the potentially harmful. There’s a further point to this picture in that Tomi is deaf. As he told me when I took this photo of him – no-one knows you are deaf on the Internet ! – he uses the same method of communicating – his fingers. – Again this is a powerful reminder that Children don’t really know who they are talking to on line. <Advance> Of course with mobile technology the Internet is now not just in our hands but in our pockets ! As you are seeing in Japan, children are able to access sites such as dating agency sites from their internet enabled phones . I read last week that the National Police Agency here want to ban anyone under 18 from accessing dating sties and we are facing similar calls in the UK and I’ll say something about this later. However, before we talk about the present and the future and the challenges and opportunities I want to go back to one of the founders of the Internet – Tim Berners Lee – generally credited for inventing the WWW. In his book “weaving the web he says”
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • E safety training for foster carers by stephen carrick-davies jan 2013

    1. 1. SAFEGUARDING CHILDREN ONLINE Training for Foster Parents and those who work with vulnerable young people Written and presented by Stephen Carrick-Davies
    2. 2. Welcome and housekeepingSession lasts 4 hours 10-2.30Comfort break at 11.15 – 11.30Hands-on session after breakNot a forum for disclosuresFire alarm arrangements (not expecting)Chance for group questions and action planningat 2.00 and optional one-to-one from 2.30Evaluation forms – Please complete so we can improve !
    3. 3. Introductions Stephen Carrick-Davies • Ten years at Childnet International • Now an independent trainer, writer, and social entrepreneur • And a parent  “Children are like wet cement, whatever falls on them makes an impression” Haim Ginott
    4. 4. IntroductionsA little about youName ..........................How long have you been a foster carer/or workedwith vulnerable Young People ? One thing you LOVE about the internet ? One thing you HATE about the internet ?What’s the one thing you want to get out of this training?
    5. 5. What are your expectations and training needs ?
    6. 6. Structure and aims of trainingPart I Understanding the new Reality REFLECT & Overview of ‘Social Media’ and web 2.0 THINK How technology is changing, and changing us ! What is this changing ‘space’ we call the Internet ?Part II Understanding the Risks Overview of online risks for young people INFORMED & How the internet can amplify offline vulnerability EQUIPPED *Hands-on training* (with focus on privacy tools)Part II Understanding our Responsibilities Specific challenges for Foster Parents INSPIRED & Prevention & Response strategies EMPOWERED The role of schools Further resources, support networks, and action plans.
    7. 7. On a scale of 1- 10 rank yourself as to how confident you are using social media.1 ----------------------5----------------------10 “I taught“What’s a mouse?” Mark Zuckerberg all he knows” Teaching swimming without a swimming pool !
    8. 8. Why this stuff matters ? Our safety, conduct Risk & risky behaviours ReputationResponsibility Our privacy, security settings and our peer group Our leadership, ethical code and resilience
    9. 9. PART 1Understanding the new “Reality”
    10. 10. How many of you have a Facebook Account ?How many of the YP you look after have a FacebookAccount ?
    11. 11. Film Play film Film at www.carrick-davies.com/research/filmsFilm conceived and acted by yp from Southwark see film and documentary abouthow we made the film at http://www.carrick-davies.com/research/films
    12. 12. My first mobile phone !I used it twice a year !
    13. 13. NOW YOU EVEN HAVE A DIFFERENT PHONELANGUAGE !• POS Parent over shoulder• I8u I hate you• AATK Always at the keyboard• LOL Laugh out loud My Xmas hols wr CWOT. B4 we used 2go2 NY 2C my bro, his GF & 3 kids ;) FTF. ILNY it’s a gr8 plc.
    14. 14. My family’s first TV
    15. 15. “THE FUTURE AIN’T WHAT IT USED TO BE” IPTV, Mobile, 3D, & Interactive
    16. 16. The game changerPORTABLE A GREAT STATUSPRIVATE + PACIFIER ! SYMBOLPERSONAL ANYTIME, FUN & ANYWHERE GAMES ANYWAY PRACTICALEDUCATIONALLY USEAGE VALUABLE ! photo/video INTER Apps etc GENERATIONAL
    17. 17. What terms do we use to explain this space ?Cyberspace ?“This is just the beginning, the beginning of understanding that cyberspace hasno limits, no boundaries.” Nicholas Negroponte Founder of Massachusetts Institute of Technologys Media Lab,
    18. 18. What terms do we use to explain this space ? Superhighway ?“We may still be travelling on a superhighway towards the future but the ideathat we are travelling in the same bus in the same direction is foolish. If you are achild you’re travelling largely alone and probably without a crash helmet.”
    19. 19. What terms do we use to explain this space ?Virtual World“Most people are awaiting Virtual Reality; Im awaiting virtuous reality”.Eli Khamarov
    20. 20. What terms do we use to explain this space ?The favourite member of the family ? “Television: chewing gum for the eyes”. Frank Lloyd Wright
    21. 21. What terms do we use to explain this space ? My World My libraryCalling it ‘mine’ makes the vastness more intimate, the anonymity lessthreatening and the chaos more orderly. But you can still feel lonely in a crowd.
    22. 22. What terms do we use to explain this space ? An incubator ? FORWARDED COMMENTED ONUPLOADED AMPLIFIED COPIED STORED MORPHED/ CHANGEDMUNCHED RE- BROADCAST (captured)
    23. 23. Social media landscape
    24. 24. The fastest growing segment inFacebook is older women !PLAY VIDEOhttp://www.youtube.com/watch?v=x0EnhXn
    25. 25. AGE RESTRICTIONS ? If you lie about your age .... you’ll soon have to lie about your experiences.
    26. 26. GROUP EXERCISEIn pairs discussWhat was the most technicallyadvanced communication tool thatyou used when you were a teenager ?Do you feel ‘left behind’ or excludedfrom this rapid change ?
    27. 27. “Anything that getsinvented after you’rethirty is against thenatural order of thingsand the beginning ofthe end of civilisationas we know it….until it’s beenaround for about tenyears when it graduallyturns out to be alrightreally.” Douglas Adams
    28. 28. NEWS FEEDS APPLICATIONS PHOTOS/TAGS Comment and “boast by post” Huge range of apps Tag photos face recognitionEvents/ Groups TIME LINE FRIENDS (Coming) Find, link, be inconstant contact LIVE CHAT+ on your mobile Superseding IM VIDEO link and embedMESSAGESSuperseding E-mail WHO’S ONLINE Social location Know who is online now! ALL FOR FREE …… BUT ….WHAT PRICE IS FREE ?
    29. 29. A word about BBM • Be careful with your BBM PIN • Be careful of ‘Screen Munching’ • Use the tools – like delete contact and block future requests. • Make sure your blackberry has a password See www.carrick-davies.com for film and tutorial. (bottom of the page)
    30. 30. See pages 54 – 59 in Vodafone’s Digital Parenting magazine
    31. 31. A word about games • The ratings are there for a reason. • Anyone who sells a designated 12+ title to younger children will face fines of up to £5,000 /jail. • Recognise the ‘compulsion’ issues. • Younger siblings and friends. • Misogynistic messages and casual cruelty.
    32. 32. All technology is neutral What would Gandhi have done if he had a FACEBOOK account ?
    33. 33. PART IIUnderstanding the risks (not the same thing as harm!)
    34. 34. Our perception of dangerMost abuse takes place in thecontext of a family or closerelative.
    35. 35. Classifying the risks to children onlineOriginal 3 Cs Classification by‘EU Kids’ online project Commercial Aggressive Sexual ValuesCONTENT Adverts Violent and Pornographic BiasChild as Recipient Spam hateful unwelcome Racist Sponsorship content sexual content Misleading Personal info info or adviceCONTACT Meeting Self harm Tracking Being bulliedChild as Participant Harvesting harassed or strangers Unwelcome Personal info stalked Being persuasions groomedCONDUCT Illegal Bullying or Creating and ProvidingChild as Actor downloading harassing uploading misleading Hacking Gambling another inappropriate info/advice Financial scams material Terrorism
    36. 36. How the risks of CRIME ‘migration’ from online to offline can affect vulnerabile YPOriginal 3 Cs Classificationby ‘EU Kids’ online project Commercial Aggressive Sexual CRIMINAL ValuesCONTENTChild as Recipient OF THE 1,984 PEOPLE CHARGED AFTER RIOTS:  53% were under 20 years oldCONTACT  42% received free school mealsChild as Participant (16% nat. average)  66% of them had some special education needs (21% of all pupils)CONDUCTChild as Actor Figures from the Ministry of Justice carried out by the Howard League for Penal Reform (published in Guardian 26.11.11) BEING IN THE WRONG PLACE AT THE WRONG TIME & “BAD LUCK”
    37. 37. “Sexting” = teens sharing nude photos via mobiles and web. The practice canhave serious legal and psychological consequences Commercial Aggressive Sexual Values CONTENT Pornographic Child as Recipient Online grooming is a unwelcome criminal offence sexual content Contact CONTACT www.ceop.gov.uk Meeting “So take a dirty Child as Participant if you have concerns strangers picture for me, Take a dirty about inappropriate Being picture communication from an groomed Just take a dirty picture for me adult to a minor. Take a dirty CONDUCT picture” Creating and From Taio Cruz Child as Actor “One-third of those who uploading song sexually abuse children are inappropriate No 6 in the UK just children themselves.” material charts BBC Newsnight programme March 2010 April 2010. 21,630 BEBO members had the name “Porn Star”
    38. 38. Classifying the risks to children online Commercial Aggressive Sexual ValuesCONTENT Violent andChild as Recipient hateful content 22% of yp aged 11-CONTACT 18 report having Being bulliedChild as Participant harassed or been cyber bullied. stalked It ruins lives. YP may not discloseCONDUCT that it is happeningChild as Actor Bullying or harassing another Classification by ‘EU Kids’ online project and referenced in the Byron Report
    39. 39. “Sticks and stones.... But words ...?”From Canadian Ad Council athttp://www.youtube.com/watch?v=bdQBurXQOeQ
    40. 40. How is Cyberbullying different from offline bullying? OFFLINE ONLINEHome was sanctuary Can be 24/7Often Physical Usually words/picturesBully strong/victim weak Roles can changeLocal & intimate Mass audienceSee the impact Don’t see impact (lack of empathy)Bystanders intervene Bystanders take partOften Silent It can leave a trail !
    41. 41. Why YP may be scared of reporting abuse ?• “It was nobody else’s business”• “Didn’t think it was serious or wrong”• “Didn’t want parents/friends to find out”• “Was frightened”• “Didn’t think I would be believed”• “Had been threatened by the abuser” Source: Child Maltreatment in the UK Cawson 2000 Abuse on the internet/mobile phone • “My parents don’t get the internet” • “Maybe it was my fault ! (blur)” • “Scared if computer is confiscated”
    42. 42. GROUP EXERCISEThe young person who you are responsible for (let’s say she’sa 12 year old girl) tells you that her “friends” in her class tookvideo clip of her at a sleep over pyjama party on their phoneswhich is now being circulated and she thinks it is now postedon a social networking site.•What advice would you give to her ?•Who should the girl report this to ?•Is this a school issue ?•How would you go about trying to remove this content ?•What if those who posted it up have circulated it morewidely ?
    43. 43. WAYS IN WHICHTHE INTERNET CAN AMPLIFYVULNERABILITY 10 WAYS IN WHICH THE INTERNET CAN AMPLIFY OFFLINE VULNERABILITY
    44. 44. ‘Vulnerable’ This is complex because:All children are different so there are Vulnerability is not static - Alldangers in making broad statements. children can be vulnerable at different stagesMany children are neglected which isharder to spot yet makes them The categorisations of risk offlinevulnerable do not necessarily mirror onlineThe paradox that over- What about experience (eg a disabled ypprotected children can be vulnerable may be empowered online as themore vulnerable online. adults ? internet can be ‘leveller’The more a child uses the internet the more they can become confident andpossibly complacent and feel ‘invincible’ and don’t feel they are at risk .Those who have experienced offline risk and Constantly changingabuse may be more resilient and able to technologies. Eg, Location servicesprotect themselves online or may not be HOWEVER WE CAN IDENTIFYaffected so much by the risks they encounter. A FEW COMMON FEATURES....
    45. 45. Low self- Fluid learning confidence. environment and Identity seen to gaps in education be part of and induction ‘outsiders’ Experience Lack of abusive supportive relationships oradults in their environments lives including anger MUNCH POKE Moreunsupervised PING! Influences of alcohol, drugs and time, fewer gang culture. Riskstructures and takers and at risk boundaries
    46. 46. “Many of the young people I work with are massive risk takers,impulsive to the extreme and often use alcohol and/or drugs. Onaverage they first engage in sexual activity at a far younger age thanother students. They also have huge amounts of unsupervised time ontheir hands, often till very late at night. I teach many YP who are half-asleep as they have been online till gone 3am.” PRU staff member LE L RO RAB ON T VULNE IN C S AS SA HEM E LVE EET MS YS THE “I have over 120 people on my BBM but I MA SEEWE MA Y deleted like 30 on Saturday cause I was Y T THE angry and they pissed me off so I just BU deleted them. Since I’ve had my BlackBerry only 2 people have deleted me.” PRU student
    47. 47. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Unmediated Contact Guardian Newspaper article 19 June 2010Children who have been fostered can suddenly receive messages from siblings, birthparents, or those who want to trace them for potentially harmful reasons.
    48. 48. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Social LocationYoung People who may need to escape from an abusive relationships need to thinkcarefully about how they make their ‘places’ public.
    49. 49. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Exclusion from the ‘norm’ Eg Facebook TimelineThere are lots of online services which celebrate our ‘journey’. How do children whodon’t know their birth parents, may not have an early photo of themselves feel in these‘boast by post’ environments ?
    50. 50. WAYS IN WHICHTHE INTERNET CAN AMPLIFYVULNERABILITY  Blackmailing “gifting” & grooming by peersA young person from a disadvantaged background may be targeted with ‘gifts’ ofmobile phones, mobile payment cards etc, by older young people but in exchange for‘favours’ which they ‘cash in’ later (including prostitution, trafficking or illegalactivity). If it sounds to good to be true .... it’s probably is (they want something ! ) Search NSPCC survey on teen partner violence
    51. 51. WAYS IN WHICHTHE INTERNET CAN AMPLIFYVULNERABILITY  Earlier adopters ? Screen Munch !Many vulnerable young people can be early adopters of tools and services which are not yet regulated or in the public conscious. For example BBM How will QR codes be mis-used ?
    52. 52. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Being ‘nudged’ into gangsVulnerable young people who are risk takers,impulsive or under the influence of alcohol and/ordrugs and less supervised, can be more easily ALL CHILDREN WILLdrawn into illegal activity including being ‘nudged’ LEAVE A FOOTPRINTthrough technology. EXCEPT SOME WILL BE IN MUDDIER SAND!
    53. 53. WAYS IN WHICHTHE INTERNET CAN AMPLIFYVULNERABILITY  Negative digital footprint ALL CHILDREN WILL LEAVE A DIGITAL FOOTPRINT BUT SOME WILL BE MUDDIER THAN OTHERS Those who are supported can compensate and build positive online footprint but what about those who aren’t ?
    54. 54. WAYS IN WHICHTHE INTERNET CAN AMPLIFYVULNERABILITY  Low Resilience “When my pinger’s gone to sleep that’s when I’ll go to sleep.”Young people need to be cherished, have the right amount ofsleep and healthy food. What happens when you are running onempty ?
    55. 55. •WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Special needs & learning difficultiesSome children with emotional or behavioural difficulties, learning difficulties,and other complex needs, may be particularly vulnerable online. EG thosewith Autistim Spectrum Disorder may make literal interpretations of content,which will affect how they respond.Others with complex needs may not understand the concept of friendship,and therefore trust everyone implicitly. Some children with SEN ordisabilities may not recognise that they are being bullied or appreciate howtheir own online behaviour may be seen by someone else as bullying .
    56. 56. •WAYS IN WHICH  Low levels of Language & Literacy THE INTERNET CAN AMPLIFY VULNERABILITYLack of literacy skills, can meanthat messages are unclear,ambiguous or misunderstoodWe must not assume that all YP are confident “digital natives” and we must alsorecognise that one in six people in the UK struggle with literacy (below the levelexpected of an eleven year old). Hence being able to complete a ‘REPORT ABUSE’form or read instructions about safety, privacy and ‘terms and conditions’ are realbarriers for many young people.Do YP recognise the link between reading and being able to be safe ?
    57. 57. GROUP EXERCISEIn pairs discussDo you recognise these offlinevulnerabilities and agree that theycan be amplified online ?How could you begin to talk to the YPyou look after about these pressures ?
    58. 58. PART IIHANDS ON SESSION To help someone swim... you’ve got to be willing to Let’s get a little Dive in ! wet!
    59. 59. MODELLING GOOD BEHAVIOUR“Present but absent”Kids dont do what you saythey do what you do !Try to ...Be consistent and set examplesyourself; - eg no phones at the table,mobiles on the landing at night.Try to... Think about your history browser !Try to ...detox yourself – leave it at home onholiday, try not to take it to the cinema !Try to ...be consistent across ratings.They are there for a reason.
    60. 60. Influence of older siblings/uncles, aunts.... !“it’s not fair ...”Recognise the influenceand pressure and theirneed to differentiatethemselves.Recognise ratings arethere for a reason ! – Theages are not based onthe age of ability !Recognise that underage “You can’t choose your kid’s bestuse of gaming brings up friend’s parents.”important issues which youneed to have a view on. Recognise other parents will have different views and values from you.
    61. 61. Influence of older siblings, cousins, friends !“it’s not fair ...”Identify different times ofthe day and places fordifferent children.Empathy checking – askwhat age would YOU setthis ?Don’t get them to stop agame half-way through ! Monitor signs of attention span,Mediate and play tiredness, irritability, aggression,together and don’t be levels of concentrationafraid to say “not yet”
    62. 62. CE VI Conversations aboutAD Risk“Do you know who all your online friends are offline?”“Do you know how to block someone on Facebook?”“Do you have a PIN on your mobile phone?”“Do any of your friends send photos of themselves?”“Do you know how to save that sort of evidence?”“Would you report that at school/CEOP?”
    63. 63. CE VI Conversations aboutAD Reputation “Remember what goes online stays online” “When did you last check your privacy settings?” “Can you help me check my settings” “Are you changing your password regularly?” “Do you know the best way to get offending material taken down?”
    64. 64. CE VIAD Conversations about Responsibility “Have you come across any good social initiatives?” “What do you think about the KONY 2012 campaign?” “What would you do as parent about how long you should stay online?” “I trust you to make good decisions, but I also need to learn from you.”
    65. 65. Dilemmas and decisions:Setting up a Facebook account ? First name: Surname: Sex: Dob: HAVE TO BE OVER 13 E-mail: - see next
    66. 66. So easy to set up a free e-mail account New G-Mail account in 3 mins
    67. 67. As soon as you join you need to connect FB can migrate all your existing e-mail contacts automatically
    68. 68. HANDS ON EXPERIENCELET’S SET UP A FACEBOOK ACCOUNT TOGETHER Let’s do this together
    69. 69. What online profile and identity shall we give ? Questions What age shall we give her ? What information shall we make public ? What should we keep private ? What friends shall we link her to? Shall we let her update from her mobile ? What about location ‘places’
    70. 70. The importance of privacy settings31% of 12-15 year olds don’t use privacy settings on their social networking profiles – OfcomMedial literacy Report 2009
    71. 71. The old view showed it clearer Name, profile picture, gender and membership of networks is always PUBLIC And customise further This information you can control
    72. 72. • Searching for yourself – example
    73. 73. GROUP EXERCISE – In PairsHaving completed that exercise discuss thechallenges and dilemmas and imagine yourself as a13 year old uploading a profile for the first time.•Do you say you are “in a relationship”?•Who do you accept as your friends ?•What groups would it be cool to join ?•What level of privacy would you give yourself ?
    74. 74. PART IIIUNDERSTANDING OURRESPONSIBILITIES ents] [+ foster par“Parents and the home environment they create are the single most important factor in shaping their children’s well-being, achievements and prospects” Alan Johnson (when Education Secretary)
    75. 75. Specific challenges for foster parents “The use of social media needs to beincorporated more generally into understandingthe importance of a child’s curiosity about theirorigins, and how this changes over time......Adopters and adoption agencies need to becometech-savvy so they can talk with confidence whilerecognizing the natural curiosity and the need forinformation”. David Holmes, Chief Executive of BAAF
    76. 76. Why can online contactbe so painful ?• Sensitive information can be distressing and raw. “Instant messaging” is in contrast to prior “no messaging”• E-mails can contain accusations anger, grief or shocking news. You can’t see the reaction or response of the person• Miscommunication is common – either party could be left feeling angry and hurt at what has been said.• You have to wait for a response ! (agonising for some)• They may never get a reply leaving the person feeling rejected, confused, angry or distressed.• Often the communication is private so the person receiving it is alone. (See page 68 )
    77. 77. The specific dangers for looked afterchildren in unmediated contact 1. A child may not fully understand why they came into care, and therefore not understand the danger they are putting themselves in; 2. A birth parent may be unprepared for, and unable to deal with an approach from the young person; 3. Some birth mothers belong to a family or community where sex outside marriage is taboo and so may have kept the pregnancy,
    78. 78. Can adults contact children viafacebook ?Facebook says that over 18s cannot search forunder 18 unless there is already a link betweenthem However :• Under 18s can enter a false date of birth• An adult can enter a false date of birth• An adult can enlist the help of another under18 to use their account to search for and contacta child (page 47)
    79. 79. GROUP EXERCISE - Discuss in pairsWhat information posted on Facebookcould put a ‘looked after child’ at riskfrom being contacted inappropriatelyby a birth parent or sibling ?Feedback to the group
    80. 80. How do you respond if this happens ?• Each situation is unique and there is “not one right way to deal with it”.• Your response will vary according to your child’s age, what s/he wants, the circumstances and motivations of birth parents etc.• Who made the contact (child or birth parent) Advice from Facing up to• Don’t ban your child from using the internet. Facebook• Don’t make knee-jerk decisions, get support http://www.baaf.org.uk/ bookshop/book_fufa and advice and develop a plan.
    81. 81. Ten top tips to managing social media in adoption*• Talk openly and honestly with your children about social media, contact issues and the risks involved. Then work together to come up with solutions.• Look at privacy settings so that your children’s profile can not be seen publicly, and also hide lists of ‘friends’. * From BAAF website
    82. 82. • Explain to your children the risks involved in accepting random unknown people as ‘friends’.• Make sure they are not making public information that could help identify them, such as their date of birth or address.• Discuss the possibility of using a nickname online instead of their real name, perhaps even having an unusual spelling (e.g N1ck Sm1th)
    83. 83. • Avoid using profile pictures. Instead use the default pictures or something generic like flowers, landscapes, football team logos etc.• Children should be discouraged from posting any information about their school or local area• Don’t tag children in photos posted online, and ask friends and family to be aware of this also.
    84. 84. • Make sure your children are aware of the risks of joining groups or networks that identify where they live or go to school.• Make sure your children know how to ‘block’ people so that if they do receive unwanted contact it can be managed. See page 53
    85. 85. The role of schools in respond to Cyberbullying ?• All schools now use and promote ICT• All UK schools must have an anti-bullying policy by law.• Government Guidance on cyberbullying is available (includes bullying of school staff!)• Ofsted inspects on safeguarding very closely• If your child is bullied online by other children in a school (even if it takes place outside of school hours or holidays) it IS a school issue.• Support the school and recognise the real challenge that school staff are under.
    86. 86. PIE all 3 ‘legs’ are vital Policies E-safety policy, Acceptable Use Policy, Anti-Bullying policy, Mobile use policyInfrastructure EducationManaged learning environment Whole-school ongoing educationwith high quality access and & prevention programme which isequipment which is filtered, targeted at both pupils, parentsmonitored and supervised. and the whole school work-force.
    87. 87. A NEW DIGITAL LITERACY CURRICULUMThe 3 Rs of digital literacy Risk Resilience Reputation
    88. 88. Useful websites 1) Child Exploitation and Online Protection Centre www.ceop.gov.uk 2) UK Council for Child Internet Safety www.dcsf.gov.uk/ukccis/ 3) Childnet International www.childnet.com/ including Cyberbullying film 4) British Association for Adoption and Fostering www.baaf.org.uk - including advice on Facebook
    89. 89. Useful resources for parents Interactive video tutorial for parents Designed for schools to give away free (1.5 million copies) Promoting the benefits of technology In 9 languages Pre-loaded for new users SHOW
    90. 90. EVALUATION Please give feedback. We want to continue to improve this training and YOU are now the expert ! 
    91. 91. Have we done what we said wewould ?Part I Understanding the new Reality REFLECT & Overview of ‘Social Media’ and web 2.0 THINK How technology is changing, and changing us ! What is this changing ‘space’ we call the Internet ?Part II Understanding the Risks INFORMED & Overview of online risks for young people EQUIPPED How the internet can amplify offline vulnerability *Hands-on training* (with focus on privacy tools)Part II Understanding our Responsibilities Specific challenges for Foster Parents INSPIRED & Prevention & Response strategies EMPOWERED The role of schools Further resources, support networks, and action plans.
    92. 92. Action PlansBefore you leave write down 3 things which you aregoing to do as a result of attending this training.
    93. 93. And Finally….
    94. 94. THANK YOU ! Complete Evaluation forms MUNCH PING POKE! See my current work re social media and vulnerable yp on my website www.carrick-davies.comstephen@carrick-davies.com
    95. 95. I’m sticking around for a furtherhour to help anyone individuallywith questions or their action plans
    96. 96. Credits and sourcesThis training has been designed by Stephen Carrick-Davies. Theslides are available on Slide Share.net and I am happy for thispresentation to be circulated as a pdf document. However pleasedon’t distribute further or use for training or commercial purposeswithout contacting me as it is important to respect the author’scontent and copyright of images and text used in thispresentation.Photos content used from other sources are acknowledged onSlide 1 or credited below. companies via Google images.slides - Assorted images fromSlide 7 & 97 Photo by Stephen Carrick-DaviesSlide 21 from slide share photo Fred Cavazza/flickr.com http://www.flickr.com/photos/fredcavazza/Slide 22 from Is social media a fad?’ http://www.youtube.com/watch?v=45izI2jw0zASlide 37 Classification of online risk by ‘EU Kids’ online project Http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/Home.aspxSlide 38 – Updating of Classification of online risk by S C-D pictures from Google images of London Riots Aug 2011Slide 14 photo library slide, quote from Douglas Adams see http://www.goodreads.com/author/quotes/4.Douglas_AdamsSlide 17 – from Social TextSlide 19 – Facebook screen grab from old SC-D Facebook page Slide 20 Dali Lama screen grab from Facebook user sharingSlide 28 – Photo of typewriter by SC-D from Imperial War Museum exhibition. Quote re Gandhi use of Facebook SC-DSlide 29 from EU kids online project http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/Home.aspxSlide 40 Project and photos by Stephen Carrick-Davies / Film by Ruined City Films.Slide 42 Screen grab from Canadian Ad Council at http://www.youtube.com/watch?v=bdQBurXQOeQSlide 50– Photo of Guardian Newspaper article 19 June 2010Slides 50-60 – 10 ways of amplified vulnerability by Stephen Carrick-Davies – from Munch Poke Ping research workSlide 82-86 summarised from advice from BAAF publication http://www.baaf.org.uk/bookshop/book_fufaSlide 90 - 3 ‘R’s of Digital Literacy by Stephen Carrick-DaviesThis slide image from www.flickr.com/photos/55279617@Noo/124659356 from http://www.slideshare.net/jisc_bce/ncl-bceweb2?src=related_normal&rel=2745614If I’ve missed anyone else out so sorry !

    ×