Safeguarding Children Online. Training from Stephen Carrick-Davies for Southwark Diocese- autumn 2011

1,982 views
1,839 views

Published on

Presentation on Safeguarding children online produced and presented by Stephen Carrick-Davies to the Diocese of Southwark. This training presentation was for a 3 hour session and looked at key issues of
Understadaning the reality
Understadngin the risks
Understanding our responsibilities.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,982
On SlideShare
0
From Embeds
0
Number of Embeds
366
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies A nice way of describing the new environment (I’m sure we’ve missed something else out here – but this helps to illustrate some of the changes. – The “Corporate” is not really the right word but for YP it felt that Webvs 1 was much like the other media “power” – big companies just moving into the digital space. – eg Disney, Microsoft, even Amizon and Google are now big corporates. – the new Web2 is more personal – user generated content.
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Number of home computers is at around 50%
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies A nice way of describing the new environment (I’m sure we’ve missed something else out here – but this helps to illustrate some of the changes. – The “Corporate” is not really the right word but for YP it felt that Webvs 1 was much like the other media “power” – big companies just moving into the digital space. – eg Disney, Microsoft, even Amizon and Google are now big corporates. – the new Web2 is more personal – user generated content.
  • The technology itself it neutral (advance) This poster which is currently displayed in the London underground reminds us that people have often misused communication technology for years.
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies A nice way of describing the new environment (I’m sure we’ve missed something else out here – but this helps to illustrate some of the changes. – The “Corporate” is not really the right word but for YP it felt that Webvs 1 was much like the other media “power” – big companies just moving into the digital space. – eg Disney, Microsoft, even Amizon and Google are now big corporates. – the new Web2 is more personal – user generated content.
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Whenever I start talking about Childnet’s work I start with this picture. They say a picture speaks a thousand words. This is Tomison Adeloye – a friend of mine. I took this picture of him to illustrate just what it is that children access when going online – The whole world – the positive as well as the potentially harmful. There’s a further point to this picture in that Tomi is deaf. As he told me when I took this photo of him – no-one knows you are deaf on the Internet ! – he uses the same method of communicating – his fingers. – Again this is a powerful reminder that Children don’t really know who they are talking to on line. <Advance> Of course with mobile technology the Internet is now not just in our hands but in our pockets ! As you are seeing in Japan, children are able to access sites such as dating agency sites from their internet enabled phones . I read last week that the National Police Agency here want to ban anyone under 18 from accessing dating sties and we are facing similar calls in the UK and I’ll say something about this later. However, before we talk about the present and the future and the challenges and opportunities I want to go back to one of the founders of the Internet – Tim Berners Lee – generally credited for inventing the WWW. In his book “weaving the web he says”
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies "The web is more a social creation than a technical one. I designed it for social effect - to help people work together - and not as a technical toy. The ultimate goal of the web is to support and improve our weblike existence in the world...... We have to ensure that the society we build with the web is the sort we intend.” This is one of the motivations behind our work. Childnet is not first and foremost a technology charity, we don’t have too many techies on staff. We are motivated to ensure that children benefit from the net – that the future society is one in which the net is used positively to benefit children and that their rights are protected and promoted online. I am sure that many of you here today are committed to this ideal and want to ensure that our future society is shaped by positive applications of the net.
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Safeguarding Children Online. Training from Stephen Carrick-Davies for Southwark Diocese- autumn 2011

    1. 1. SAFEGUARDING CHILDREN ONLINE Training session written and presented by Stephen Carrick-Davies for
    2. 2. Welcome and housekeeping Session lasts 2.5 hours 10-12.30 Comfort break at 11.15 – 11.30 Chance for questions and feedback at 12.20 Not a forum for disclosures Evaluation forms Fire alarm arrangements
    3. 3. Context <ul><li>Relates to: </li></ul><ul><ul><li>how we include people – which involves how we communicate </li></ul></ul><ul><ul><li>how we treat each other with respect – which includes respecting people’s privacy </li></ul></ul><ul><ul><li>how we protect people from harm and abuse – especially children, but also those who carry responsibility for vulnerable people </li></ul></ul>Falls within the overall context of our diocesan and parish safeguarding policies Contact Jill Sandham for overview of these safeguarding policies.
    4. 4. <ul><li>This is a positive look at how technology can enhance our work, particularly with children and young people </li></ul><ul><li>Towards responsible leadership </li></ul><ul><li>These are procedures in the making – today’s sessions will inform development of diocesan procedures, as well as enabling you in parishes to work out your own. </li></ul><ul><li>An awareness of the hazards </li></ul>Context
    5. 5. Introductions Stephen Carrick-Davies <ul><li>Ten years at Childnet International </li></ul><ul><li>Now an Independent Trainer/ Social Entrepreneur /Parent/Learner ..... </li></ul><ul><li>&quot;Stay hungry, stay foolish * &quot; </li></ul>* From Steve Job’s talk at Stanford University
    6. 6. Structure and aims of training <ul><li>Part I “Understanding” the new Reality </li></ul><ul><ul><ul><li>Overview of ‘Social Media’ and web 2.0 </li></ul></ul></ul><ul><ul><ul><li>How technology is changing, and being changed </li></ul></ul></ul><ul><ul><ul><li>Focus on Facebook (privacy settings) </li></ul></ul></ul><ul><li>Part II Understanding the Risks </li></ul><ul><ul><ul><li>Overview of online risks for young people </li></ul></ul></ul><ul><ul><ul><li>Specific challenges for faith based groups </li></ul></ul></ul><ul><ul><ul><li>Where we are vulnerable </li></ul></ul></ul><ul><li>Part III Understanding our Responsibilities </li></ul><ul><ul><ul><li>Prevention & Response strategies </li></ul></ul></ul><ul><ul><ul><li>Case study to help us to see responses </li></ul></ul></ul><ul><ul><ul><li>‘ PIE’ approaches and positive opportunities for faith-based groups learning and change. </li></ul></ul></ul>All through a mixture of slides, quotes, case studies, films, small group exercises, Q&A, and links to practical resources. REFLECT & THINK FACE- UP & BE CHALLENGED INSPIRED & EQUIPPED
    7. 7. Name .......................... A little about you Responsibility within your church ? GROUP EXERCISE Any incidents of internet misuse in your group/wider community ? Expectation of today’s training ?
    8. 8. On a scale of 1- 10 rank yourself as to how confident you are using the internet and mobile phones. How confident are you online ? 1 ----------------------5----------------------10 “ What’s a mouse?” “ I taught Mark Zuckerberg all he knows” How many of you have a facebook account ?
    9. 9. “ We have created a child who will be so exposed to the media that he will be lost to his parents by the time he is 12.” David Bowie interview with Melody Maker January “ There are only two states for children these days; they are either asleep or online....even if they wake up in the middle of the night they go online.” Eric Schmidt Executive Chairman of Google. 2010 1972
    10. 10. Understanding the new reality PART 1 Photo S C-D
    11. 11. Social media landscape
    12. 12. “ Youth is a wonderful thing.  What a crime to waste it on children”.  George Bernard Shaw BUT... The fastest growing segment in Facebook is older women ! Check out this video overview at http://www.youtube.com/watch?v=x0EnhXn5boM
    13. 13. <ul><li>POS </li></ul><ul><li>I8u </li></ul><ul><li>AATK </li></ul><ul><li>LOL </li></ul>NOW YOU EVEN HAVE A DIFFERENT PHONE LANGUAGE ! Parent over shoulder I hate you Always at the keyboard Laugh out loud My Xmas hols wr CWOT. B4 we used 2go2 NY 2C my bro, his GF & 3 kids ;) FTF. ILNY it’s a gr8 plc.
    14. 14. “ Anything that gets invented after you’re thirty is against the natural order of things and the beginning of the end of civilisation as we know it ….until it’s been around for about ten years when it gradually turns out to be alright really.” Douglas Adams See full quote at http://www.douglasadams.com/dna/19990901-00-a.html
    15. 15. “ If you took away my mobile phone you would take away a part of me” THE ONLINE WORLD IS THE CHILD’S WORLD ! The importance of technology for YP AMPLIFIER (gives children a voice) ANONYMITY ALWAYS ON AWAY FROM SUPERVISION ACCEPTANCE - IDENTITY & STATUS ACCESS THE WORLD ACTIVE NOT PASSIVE MEDIUM ADDICTIVE
    16. 16. WEB v 1 WEB v 2 Downloading + Uploading Consuming + Creating “ Corporate” + Personal Separate media + Converged media Static + Truly interactive Fast changing technology and applications + Location MOBILE iPhone 4 “ Every photo is geo-tagged with information about your location”.
    17. 17. Wider shifts in the way we work
    18. 18. Access to cheaper goods & services If you’re not connected you miss out on the new “Knowledge economy”. Education + ICT = greater attainment If you’re not connected your children can be at an educational disadvantage . THE IMPACT The internet is now indispensable DIGITAL DIVIDE Some 35 per cent of families have no access to the internet and around a million children have no computer at home. 9.2 million non-users of the internet in the UK ! (Oct 2010) Economic Social Education YP care about their online identity ! If you’re not connected you’re missing out on today’s social life – especially SNS & games.
    19. 19. ALL FOR FREE …… BUT ….WHAT PRICE IS FREE ? TIME LINE (Coming) Social location APPLICATIONS Huge range of apps NEWS FEEDS “boast by post” MESSAGES Superseding E-mail WHO’S ONLINE Know who is online now! PHOTOS/TAGS Comment and Tag photos face recognition LIVE CHAT Superseding IM FRIENDS Find, link, be in constant contact + on your mobile VIDEO link and embed Events/ Groups
    20. 20. AND ‘GIFTING’ – wonderful way of sharing something as a ‘gift’ Social location APPLICATIONS Huge range of apps NEWS FEEDS “boast by post” MESSAGES Superseding E-mail Video coming WHO’S ONLINE Know who is online now! PHOTOS/TAGS Comment and Tag photos face recognition LIVE CHAT Superseding IM FRIENDS Find, link, be in constant contact + on your mobile VIDEO link and embed Events & Groups TIME LINE (Coming)
    21. 21. <ul><li>The importance of privacy settings </li></ul><ul><li>31% of 12-15 year olds don’t use privacy settings on their social networking profiles – Ofcom Medial literacy Report 2009 </li></ul>
    22. 23. <ul><li>The old view showed it clearer </li></ul>Name, profile picture, gender and membership of networks is always PUBLIC This information you can control And customise further
    23. 25. <ul><li>And what are people saying about you on their pages? </li></ul>RSS – seeing what others are doing ...
    24. 26. Digital Footprints <ul><li>What goes online stays online </li></ul>What will your future employer think ?
    25. 27. <ul><li>Oscar Morales 33 yr old engineer started a Facebook group called ‘One Million voices’ against the FARC terrorist organisation in Columbia </li></ul><ul><li>Over 250,000 Facebook users signed on, and the movement was taken up by newspapers and radio and TV with two million people taking part in p protests in Colombia and 100 other cities worldwide. </li></ul>S Q Can Facebook be used for good ?
    26. 28. What would Gandhi have done if he had a FACEBOOK account ?
    27. 29. Understanding the risks (not the same thing as harm !) PART II
    28. 30. <ul><li>Classifying the risks to children online </li></ul>Original 3 Cs Classification by ‘EU Kids’ online project CRIMINAL CONTENT CONTACT CONDUCT Commercial Aggressive Sexual Values Adverts Spam Sponsorship Personal info Violent and hateful content Pornographic unwelcome sexual content Bias Racist Misleading info or advice Tracking Harvesting Personal info Being bullied harassed or stalked Meeting strangers Being groomed Self harm Unwelcome persuasions Illegal downloading Hacking Gambling Financial scams Terrorism Bullying or harassing another Creating and uploading inappropriate material Providing misleading info/advice Child as Recipient Child as Participant Child as Actor BEING IN THE WRONG PLACE AT THE WRONG TIME
    29. 31. <ul><li>Classifying the risks to children online </li></ul>Original 3 Cs Classification by ‘EU Kids’ online project CRIMINAL CONTENT CONTACT CONDUCT Commercial Aggressive Sexual Values Child as Recipient Child as Participant Child as Actor BEING IN THE WRONG PLACE AT THE WRONG TIME Online/offline migration with reputational consequences
    30. 32. <ul><li>Contact </li></ul><ul><li>www.ceop.gov.uk </li></ul><ul><li>if you have concerns about inappropriate communication from an adult to a minor . </li></ul>Pornographic unwelcome sexual content Meeting strangers Being groomed Creating and uploading inappropriate material Online grooming is a criminal offence Include this button on your home page “ One-third of those who sexually abuse children are just children themselves.” BBC Newsnight programme March 2010 21,630 BEBO members have the name “Porn Star” “ Sexting” = teens sharing nude photos via mobiles and web. The practice can have serious legal and psychological consequences CONTENT Child as Recipient CONTACT Child as Participant CONDUCT Child as Actor Commercial Aggressive Sexual Values
    31. 33. Remember most child abuse takes place in inter-familiar settings.
    32. 34. Film Film conceived and acted by yp from Southwark see film and documentary about how we made the film at http://www.carrick-davies.com/research/films From ‘Munch Poke Ping’ report by Stephen Carrick-Davies.
    33. 35. <ul><li>Classifying the risks to children online </li></ul>Violent and hateful content Classification by ‘EU Kids’ online project and referenced in the Byron Report 22% of yp aged 11-18 report having been cyber bullied. It ruins lives. YP may not disclose that it is happening CONTENT CONTACT CONDUCT Commercial Aggressive Sexual Values Being bullied harassed or stalked Bullying or harassing another Child as Recipient Child as Participant Child as Actor
    34. 36. Words can hurt ... From Canadian Ad Council at http://www.youtube.com/watch?v=bdQBurXQOeQ
    35. 37. Why YP may be scared of reporting abuse ? <ul><li>“ It was nobody else’s business” </li></ul><ul><li>“ Didn’t think it was serious or wrong” </li></ul><ul><li>“ Didn’t want parents/friends to find out” </li></ul><ul><li>“ Was frightened” </li></ul><ul><li>“ Didn’t think I would be believed” </li></ul><ul><li>“ Had been threatened by the abuser” </li></ul><ul><li>Source: Child Maltreatment in the UK Cawson 2000 </li></ul><ul><li>“ My parents don’t get the internet” </li></ul><ul><li>“ Maybe it was my fault ! (blur)” </li></ul><ul><li>“ Scared if computer is confiscated” </li></ul>Abuse on the internet/mobile phone <ul><li>“ Don’t know who to report to ? </li></ul>
    36. 38. DEFINITIONS OF CYBERBULLYING <ul><li>Threats and intimidation </li></ul><ul><li>Harassment or stalking </li></ul><ul><li>Vilification/defamation/ hate or bias-bullying </li></ul><ul><li>Exclusion (MSN) </li></ul><ul><li>Identity theft, unauthorized access and impersonation (MSN) </li></ul><ul><li>Publicly posting, sending or forwarding personal or private information or images </li></ul><ul><li>Manipulation of images - see example </li></ul>“ The use of ICT, particularly mobile phones & internet, deliberately to upset someone else” FORMS IT CAN TAKE Face talk – feature in new Iphone 4
    37. 39. Example of online abuse What can start as a joke ...... <ul><li>Photos not included in hand outs. </li></ul><ul><li>(why do you think that is ?) </li></ul>
    38. 40. How is Cyberbullying different from offline bullying? OFFLINE ONLINE Home was sanctuary Often Physical Usually words/pictures Bully strong/victim weak Roles can change Can be 24/7 Local & intimate Mass audience See the impact Don’t see impact (lack of empathy) Bystanders intervene Bystanders take part Often Silent It can leave a trail !
    39. 41. <ul><li>More subtle Risks </li></ul>Guardian Newspaper article 19 June 2010
    40. 42. Facebook: Friend or Fiend ? GROUP EXERCISE Training Scenario In pairs read through the scenario (see handout)
    41. 43. Let’s have a coffee break 15 mins. <ul><li>Talk to someone about what you’ve heard so far ! </li></ul>
    42. 44. FEEDBACK GROUP EXERCISE Is this a serious situation ? What went wrong ? How can we safeguard against this situation ? How can FB be used more safely ? What have you learnt ?
    43. 45. UNDESTANDING OUR RESPONSIBILITIES PART III
    44. 46. * http://www.dcsf.gov.uk/everychildmatters / Every Child Matters * <ul><li>be healthy </li></ul><ul><li>stay safe </li></ul><ul><li>enjoy and achieve </li></ul><ul><li>make a positive contribution </li></ul><ul><li>achieve economic well-being </li></ul>Government Strategic Framework <ul><li>More telephones than people </li></ul><ul><li>Age of ownership decreasing </li></ul><ul><li>Children vulnerable in new ways </li></ul><ul><li>Schools encouraging digital learning </li></ul><ul><li>Parents & carers time-poor </li></ul>ESPECIALY ONLINE
    45. 47. <ul><li>From ‘Risk vs Opportunity’ to drawing on the wider framework of the UN Rights of the Child – 3 Ps </li></ul>FROM TIM DAVIES’ Rethinking Responses to Young People and the Internet Beyond Opportunity and Risk - EU Kids Online II - September 2011
    46. 48. What does Leadership look like in this space? <ul><li>Professional/Personal </li></ul><ul><li>Personal integrity </li></ul><ul><li>Principle centred AND people centred </li></ul>
    47. 49. <ul><li>Pause for thought. </li></ul><ul><li>And now, dear brothers and sisters, one final thing. Fix your thoughts on what is true, and honourable, and right, and pure, and lovely, and admirable. Think about things that are excellent and worthy of praise . Philippians 4:8 </li></ul>
    48. 50. Leadership – how can you lead with SM ? MANAGING YOURSELF MANAGING UP MANAGING STAKEHOLDERS MANAGING OTHERS MANAGING CHANGE & CRISIS Wikis to work on joint policy Brilliant for managing volunteers Increasingly donors are giving via social media – eg just giving RSS – keeping ontop of the changes + influencing
    49. 51. Communicate (with parishioners and wider world) Challenge (individual, opinion formers and public) Champion (beliefs and values) Community (build, enhance, transform) Change (facilitate and provide vision) Co-operate + collaborate (with others- hopefully!) Customer service (provide real genuine trust) What do Faith Groups want to do?
    50. 52. Communicate Challenge Champion Community Change Co-operate + collaborate Customer service Collaborate + co-create What can social networks do + ? Quick, personal, immediate Aggregate the public voice Build a movement (not campaign Inspire + build community “ Wisdom of the crowds” Efficient + global Hold providers to account Share best practice
    51. 53. Choose your tool
    52. 54. Top tips to help <ul><li>3. Find just 3 or 4 resources which you can use and sign up to learn and contribute. Slideshare, bookmarking </li></ul>5. Start narrating your lives and experience – blog or micro blog (140 characters) <ul><li>Start scheduling this activity into your work. </li></ul>2. Learn all you can and reflect on how these tools can help you with your work. 4. Subscribe to a few blogs and try to use RSS to aggregate the content you want and need. 6. Get mobile ! It will save you time and keep you engaged.
    53. 55. P olicies I nfrastructure E ducation Opportunities for church groups to engage in education & prevention programmes which are targeted at young users, parents or the wider library community. E-safety policy, Acceptable Use Policy, Mobile use policy Managed learning environment with high quality access and equipment which is filtered, monitored and supervised. PIE
    54. 56. <ul><li>Dynamic education programs and ways for YP to understand the issues (including resilience) </li></ul>See http://whatsyourstory.trendmicro.com/internet-safety/pg/winners-2011) Or do a Linked In positive profile exercise to help vulnerable YP get a positive online reputation
    55. 57. <ul><li>Understanding and accepting the impact of cyberbullying. </li></ul><ul><li>Updating existing policies and practices. (AUP) </li></ul><ul><li>Making reporting easier - includes advice about removal of content. </li></ul><ul><li>Promoting the positive use of technology. </li></ul><ul><li>Evaluating impact of prevention activities. </li></ul><ul><li>Reaching out to your parents </li></ul>PREVENTING RESPONDING <ul><li>Supporting the victim – need for reassurance. </li></ul><ul><li>Practical advice and support such as saving evidence, not retaliating, informing parents. </li></ul><ul><li>Investigate and record incidents, identify the bully. </li></ul><ul><li>Sanctions (if explicit in AUP) </li></ul><ul><li>Involve Parents /carers </li></ul><ul><li>Training your parishioners </li></ul>Underpinned by effective education and awareness What CHURCHES must do
    56. 58. AUP P olicies <ul><li>All staff understand (induction) </li></ul><ul><li>All staff enforce </li></ul><ul><li>All staff review regularly </li></ul><ul><li>and </li></ul><ul><li>Is updated in pace with changes </li></ul>Church safeguarding policies should be explicit about use of social media/mobile technology. Who to report to ? Church safeguarding policies should include how the organisation is inducting and supporting youth workers in all areas of their work
    57. 59. <ul><li>Update your AUPs stating how and when personally owned equipment (including camera phones) can be used. </li></ul><ul><li>If you have a social network site do not ‘friend’ young church users or add them to your contact list. </li></ul><ul><li>Make sure you keep ALL personal information (profiles, passwords, photos. Etc) private and do not post information about yourself publically that you wouldn’t want employers, or colleagues to see. </li></ul><ul><li>Close down computers quickly if you have to leave a room. </li></ul><ul><li>If misuse - make sure you do not retaliate but keep all records, screen prints and record time, date & website addresses </li></ul><ul><li>Make sure the church workers inform parents about incidents and delivers appropriate sanctions </li></ul><ul><li>Hold each other accountable ! </li></ul>PROTECTING YOURSELF
    58. 60. <ul><li>Searching for yourself – example </li></ul>
    59. 61. Infrastructure <ul><li>Recognise the impact of mobile phones to access internet. </li></ul><ul><li>Ofsted reflection for schools about ‘Lock down’ vs ‘trusting’ </li></ul><ul><li>Should your church have it’s own staff mobile phone for youth to use ? </li></ul>
    60. 62. Education <ul><li>Finding creative ways to educate users about safety and responsibility </li></ul>For Young people <ul><li>Always respect others be careful what you say. </li></ul><ul><li>Think before you send, what goes online stays online ! </li></ul><ul><li>Treat your password like your toothbrush ! </li></ul><ul><li>Learn how to block the bully and save the evidence </li></ul><ul><li>Make sure you tell someone </li></ul><ul><li>Support others – how would you feel if no-one stood up for you ! </li></ul>
    61. 63. R isk R eputation R esilience The 3 Rs of digital literacy
    62. 64. SHOW <ul><li>Interactive video tutorial for parents </li></ul><ul><li>Designed for schools to give away free (1.5 million copies) </li></ul><ul><li>Promoting the benefits of technology </li></ul><ul><li>In 9 languages </li></ul><ul><li>Pre-loaded for new users </li></ul>Practical resources See www.childnet.com/kia Also search for Facebook tutorials but be warned they change every 6 months !
    63. 65. In pairs discuss Did we do what we said we would ? What has been the most helpful aspect of this training? What is the one thing you will do as a result of this training ? REFLECT & THINK FACE- UP & BE CHALLENGED INSPIRED & EQUIPPED
    64. 66. <ul><li>Questions about anything which has come up today ? </li></ul>
    65. 67. Think how can we improve and develop this course and roll-out across the diocese ? EVALUATION FORMS
    66. 68. Useful websites <ul><li>1) UK law Enforcement agency and part of VGTF </li></ul><ul><li>www.ceop.gov.uk </li></ul><ul><li>2) UK Council for Child Internet Safety </li></ul><ul><li>www.dcsf.gov.uk/ukccis/ </li></ul><ul><li>3) Childnet International </li></ul><ul><li>www.childnet.com/ including Cyberbullying film </li></ul>
    67. 69. And Finally….
    68. 70. &quot;The web is more a social creation than a technical one. I designed it for social effect - to help people work together - and not as a technical toy…. The ultimate goal of the web is to support and improve our web like existence in the world...... Tim Berners-Lee ‘Weaving the Web’ 1999 We have to ensure that the society we build with the web is the sort we intend.”
    69. 71. THANK YOU ! www.carrick-davies.com [email_address] Complete Evaluation forms MUNCH PING POKE! See my current work re social media and vulnerable yp
    70. 72. <ul><li>Slide 10, Photo by Stephen Carrick-Davies </li></ul><ul><li>Slide 11 from slide share photo Fred Cavazza/flickr.com http://www.flickr.com/photos/fredcavazza/ </li></ul><ul><li>Slide 12 from Is social media a fad?’ http://www.youtube.com/watch?v=45izI2jw0zA </li></ul><ul><li>Slide 14 photo library slide, quote from Douglas Adams see http://www.goodreads.com/author/quotes/4.Douglas_Adams </li></ul><ul><li>Slide 17 – from Social Text </li></ul><ul><li>Slide 19 – Facebook screen grab from old SC-D Facebook page Slide 20 Dali Lama screen grab from Facebook user sharing </li></ul><ul><li>Slide 28 – Photo of typewriter by SC-D from Imperial War Museum exhibition. Quote re Gandhi use of Facebook SC-D </li></ul><ul><li>Slide 29 from EU kids online project http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/Home.aspx </li></ul><ul><li>Slide 30 – pictures from Google images of London Riots Aug 2011 </li></ul><ul><li>Slide 35 Screen grab from Canadian Ad Council at http://www.youtube.com/watch?v=bdQBurXQOeQ </li></ul><ul><li>Slide 40 – Photo of Guardian Newspaper article 19 June 2010 </li></ul><ul><li>Slide 44 – unknown – sorry ! </li></ul><ul><li>Slide 49 - from Tim Davies seehttp://www.timdavies.org.uk/2011/09/24/the-risk-opportunity-discourse-is-broken-rethinking-responses/ </li></ul><ul><li>Slide 61 cartoon drawn by Jim Byrne and for Childnet International www.childnet.com/kia Childnet international </li></ul><ul><li>This slide image from www.flickr.com/photos/55279617@Noo/124659356 from http://www.slideshare.net/jisc_bce/ncl-bceweb2?src=related_normal&rel=2745614 </li></ul><ul><li>Slide 68 – Photo by Stephen C-D. </li></ul><ul><li>If I’ve missed anyone else out so sorry ! </li></ul>I am happy for this presentation to be circulated across Faith Groups as a pdf document but please don’t distribute further or use for wider training or commercial purposes without contacting me as it is important to respect the copyright of images and text used in this presentation. Available on SLIDE SHARE (Search for Stephen Carrick-Davies) Photos content used from other sources is credited below. Credits and sources

    ×