Your SlideShare is downloading. ×
0
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Netsafetyoct30 Sound
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Netsafetyoct30 Sound

1,294

Published on

Larry's talk in Hyderabad

Larry's talk in Hyderabad

Published in: Technology, Health & Medicine
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,294
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
33
Comments
0
Likes
3
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Transcript

    • 1. Youth Safety on the Social Web Larry Magid & Anne Collier Co-directors ConnectSafely.org Revised 1/09 © 2009 ConnectSafely.org
    • 2. What is the social Web? <ul><ul><ul><li>-- Also known as ‘Web 2.0’-- </li></ul></ul></ul><ul><ul><ul><li>User-produced, youth-driven </li></ul></ul></ul><ul><ul><ul><li>Multiple devices </li></ul></ul></ul><ul><ul><ul><li>Multimedia </li></ul></ul></ul><ul><ul><ul><li>Uploadable, downloadable </li></ul></ul></ul><ul><ul><ul><li>Difficult to control </li></ul></ul></ul>
    • 3. Web 1.0 …
    • 4. On Web 2.0... -- Michael Kinsley, Slate.com, 11/27/06 “ ... everybody knows you’re a dog.”
    • 5. Social networking is whatever… <ul><ul><ul><li>… anyone wants it to be! </li></ul></ul></ul><ul><ul><ul><li>Entertainment + socializing + homework help + media-sharing + creative outlet + friends’ latest news </li></ul></ul></ul><ul><ul><ul><li>A place to learn digital-media skills </li></ul></ul></ul><ul><ul><ul><li>A “hangout” on Web, phones, gaming </li></ul></ul></ul>
    • 6. <ul><li>Today’s phones are full-blown mobile computers with... </li></ul><ul><li>Mobile social networking </li></ul><ul><li>Social mapping </li></ul><ul><li>Photo- &amp; video-sharing </li></ul><ul><li>Web browsing </li></ul><ul><li>24/7 texting </li></ul><ul><li>Even less adult supervision </li></ul>Cellphones too
    • 7. Majority of teens in social sites <ul><li>65% of teens use social networks and create profiles (Pew/2009) </li></ul><ul><li>70% of 15-to-17-year-old girls </li></ul><ul><li>48% of teens visit sites daily or more often; 26% visit once a day </li></ul><ul><ul><ul><li>22% visit several times a day </li></ul></ul></ul>Source: Pew Internet &amp; American Life survey
    • 8. Not just MySpace &amp; Facebook YouTube, MyYearbook, Bebo, Hi5 &amp; many niche social network sites Ning: Allows users to create their own social networks, or mini-MySpaces. Allows porn (with splash page). Twitter &amp; Plurk: Micro-blogging - 140 characters or less. Kind of like blended chat &amp; IM. Twitter mostly adults, Plurk a little younger. Second Life &amp; other virtual worlds : Users create avatars that interact in a virtual world. Hulu: Fast-growing video-sharing site (153 million video streams, 9/08); popular for viewing whole shows online And some are a bit more questionable …. JuicyCampus Gossip site, total anonymity, no rules.… Stickam : Social video-streaming site with live webcam chat.
    • 9. What are they doing in there? <ul><li>Good or “normal”… </li></ul><ul><li>“ Social producing” </li></ul><ul><li>Learning social rules </li></ul><ul><li>Decorating profiles (self-expression) </li></ul><ul><li>Exploring identity </li></ul><ul><li>Writing blogs </li></ul><ul><li>Writing software code </li></ul><ul><li>Risk assessment </li></ul><ul><li>Discovering music </li></ul><ul><li>Producing &amp; editing videos </li></ul><ul><li>Discussing interests </li></ul><ul><li>Social/political activism </li></ul><ul><li>Keeping in touch with friends long-term </li></ul>
    • 10. What else are they doing in there? <ul><li>Neutral or negative… </li></ul><ul><li>Seeking validation </li></ul><ul><li>Competing in a popularity contest </li></ul><ul><li>Venting </li></ul><ul><li>Showing off </li></ul><ul><li>Embarrassing themselves </li></ul><ul><li>Pulling pranks </li></ul><ul><li>Getting even </li></ul><ul><li>Harassing </li></ul>
    • 11. The ‘ Net effect’ <ul><li>Persistence &amp; searchability: Net as permanent searchable archive </li></ul><ul><li>Replicability : ability to copy and paste from anywhere, to anywhere </li></ul><ul><li>Scalability: high potential visibility </li></ul><ul><li>Invisible audiences: you never know who’s watching </li></ul><ul><li>Collapsed contexts: different audiences hear &amp; see different things </li></ul><ul><li>Blurring of public and private: boundaries not clear </li></ul>Source: danah boyd: Taken out of Context, 2008
    • 12. Mostly for real-life friends <ul><li>72% use sites to socialize with their real-life friends. </li></ul><ul><li>Only a modest number (17%) of social-networking teens say they use the sites to flirt. </li></ul>Source: Pew Internet &amp; American Life survey January 2007
    • 13. Teens do have a clue when it comes to safety &amp; privacy <ul><li>66% of teens who have created a profile say that their profile is not visible by all Internet users. They limit access to their profiles. </li></ul><ul><li>21% say their profile is not currently visible. </li></ul><ul><li>Just 1% of social-network users say they do not know who can see their profile. </li></ul>Source: Pew Internet &amp; American Life survey January 2007
    • 14. Are they careful about photos? <ul><li>Yes and no (more on Web than on phones) </li></ul><ul><li>Cellphones : Reports of“sexting” (nude photo-sharing) are growing </li></ul><ul><li>Web : 39% say they restrict access to their photos “most of the time.” </li></ul><ul><li>38% report restricting access “only sometimes.” </li></ul><ul><li>21% of teens who post photos say they “never” restrict access to the images they upload. (Online adults are more lax in restricting access.) </li></ul>Source: Pew Internet &amp; American Life survey January 2007
    • 15. Teens are alive today, thanks to social-networking sites… Plan To &apos;Shoot Up&apos; School Foiled Jan 12, 2009: “Deputies in Transylvania County said they got a call from a sheriff&apos;s office in New York. A teenager there apparently came forward and said she met a 15-year-old on MySpace who said he had a dangerous plan.”
    • 16. Question : What proportion of teens have been approached online by a predator? <ul><li>1 in 20 </li></ul><ul><li>1 in 10 </li></ul><ul><li>1 in 7 </li></ul><ul><li>1 in 5 </li></ul><ul><li>Almost half </li></ul>
    • 17. It’s a trick question
    • 18. What the surveys really said <ul><li>The survey asked “Did you receive an unwanted sexual solicitation in the past year” </li></ul><ul><li>The response went from 1 in 5 in 2000 to 1 in 7 in 2005. An improvement </li></ul><ul><li>43% of all solicitations and 44% of aggressive solicitations came from youth </li></ul><ul><li>39% of solicitors were adult but all but 9% of those were between 18 and 25 </li></ul><ul><li>Two-thirds or more of the youth described solicitations as not particularly distressing </li></ul><ul><li>The number of children actually molested went from none in 2000 to 2 (out of 1500) in 2005. It can happen, but it’s statistically very rare. </li></ul>Online Victimization of Youth: Five Years Later Crimes Against Children Research Center, 2006
    • 19. Question Do you agree that the growth in young people’s use of the Internet correlates with a rise in sexual abuse against children?
    • 20. SA Sub 1990-2005* Rate per 10,000 Children (&lt;18) Source: NCANDS / Finkelhor &amp; Jones, 2006 51% Decline (during the period of the Web’s existence) Answer: No Confirmed cases of child sexual abuse
    • 21. Deception rarely involved <ul><li>Victims are aware of the approximate age and sexual intentions of the adults who contact them. </li></ul><ul><li>Only 5% of offenders pretend to be teens. </li></ul><ul><li>In some cases, the kids are being aggressive and sexually suggestive and pose in ways to make themselves look older than they are. </li></ul><ul><li>--Janis Wolak, University of New Hampshire’s Crimes Against Children Research Center (paraphrase, not exact quote) </li></ul>
    • 22. What causes risk? <ul><li>Aggressive behavior in the form of making rude or nasty comments increased the odds of being victimized 2.3 times </li></ul><ul><li>Frequently embarrassing others increased the risk almost 5 times </li></ul><ul><li>Meeting people in multiple ways increased the odds 3.4 times </li></ul><ul><li>Talking about sex online with strangers doubled the risk </li></ul><ul><li>Engaging in multiple risky behaviors puts you at greatest risk </li></ul><ul><li>Posting personal information is not related to victimization </li></ul>Source: Archives of Pediatrics &amp; Adolescent Medicine, Feb 2007 Ybarra, Mitchell, Finkelhor, Wolak
    • 23. The kids most at risk online are those at risk offline <ul><li>Online risks are not radically different in nature or scope than the risks minors have long faced offline. </li></ul><ul><li>Minors most at risk in the offline world continue to be most at risk online. </li></ul><ul><li>The psychosocial makeup and family dynamics surrounding a child are better predictors of risk than the technology used. </li></ul><ul><li>Messages need to be tailored to the child. One-size-fits-all doesn’t work. </li></ul>Source: Internet Safety Technical Task Force Report, January 2009
    • 24. More likely risks <ul><li>Damaged reputation </li></ul><ul><li>Emotional hurt </li></ul><ul><li>Self-created child porn </li></ul><ul><li>Negative validation </li></ul><ul><li>Defamation </li></ul><ul><li>Impersonation </li></ul><ul><li>Permanent archive </li></ul><ul><li>Inappropriate content </li></ul><ul><li>PC security </li></ul><ul><li>Cyberbullying… </li></ul>
    • 25. Cyberbullying <ul><li>The risk that affects the most children </li></ul><ul><li>2 separate studies: About 33% of US teens have been harassed or bullied* </li></ul><ul><li>Online harassment (more common) vs. bullying </li></ul><ul><li>Cyberbullying : repeated aggression; associated with real life; power imbalance </li></ul><ul><li>It’s more a developmental than a technology problem </li></ul>Sources: Patchin and Hinduja, 2006; Pew/Internet, 2007; Crimes Against Children Research Center, 2007
    • 26. Signs of cyberbullying <ul><li>Loss of friends </li></ul><ul><li>Depression </li></ul><ul><li>Anxiety </li></ul><ul><li>Loss of sleep </li></ul><ul><li>Doesn’t want to go to school </li></ul><ul><li>Covers screen or turns off device when others come into room* </li></ul>* can also be a sign of an inappropriate online relationship
    • 27. What to tell kids facing cyberbullying <ul><li>Don’t react (often the bully’s goal) </li></ul><ul><li>Don’t retaliate </li></ul><ul><li>Block the bully </li></ul><ul><li>Save the evidence </li></ul><ul><li>Talk to a trusted adult </li></ul>
    • 28. Keys to finding solutions <ul><li>Understanding that the teenage brain is “a work in progress” (brain takes up to 25 years to develop) </li></ul><ul><li>What’s happening online is more about adolescent behavior/development than tech </li></ul><ul><li>Net = amplifier, searchable archive, pretty permanent; User/producers have multiple invisible audiences </li></ul><ul><li>Collaborative solution-making needed </li></ul>
    • 29. To summarize <ul><li>The social Web… </li></ul><ul><li>is good and bad for teens </li></ul><ul><li>is a fact of life - not going away </li></ul><ul><li>is user-driven (little control) </li></ul><ul><li>Social Web safety requires… </li></ul><ul><li>Growing understanding of benefits, risks </li></ul><ul><li>Multiple forms of expertise </li></ul><ul><li>Collaborative, long-term response </li></ul><ul><li>Targeting real risks not high-frequency, low-risk behaviors </li></ul>
    • 30. Thank you &amp; please visit our forum at www.ConnectSafely.org <ul><li>Larry Magid </li></ul><ul><li>Co-director, ConnectSafely.org </li></ul><ul><li>[email_address] </li></ul><ul><li>Anne Collier, </li></ul><ul><li>Co-director </li></ul><ul><li>[email_address] </li></ul>

    ×