SlideShare a Scribd company logo
1 of 16
Dr. Ahmad Sofian
ECPAT Indonesia
Email : ahsofian@gmail.com
 One in three Internet users is a child and more than 175,000 children go online for
the first time every day
 Globally, children and young people are the major users of information and
communication technologies (ICTs)
 Technology has created possibilities for children to be connected and to access all
kinds of information
 But, they also become more vulnerable to its harmful aspects
 The danger is increased due to lack of protection for children
 To design effective measures against these threats and dangers, it is necessary to
have an in-depth understanding of children's activities on the internet
Age
Rang
e
Popular online activities Main dangers and risks
1-4 Music listening and videos watching,
random access to websites
Whatever they look at is received at
face value
5-7 Use computers or smartphones in order to
play games
Victims of online marketers, personal
information leaks
8-10 Online gaming, surfing, chatting They can contact older (unknown)
children and/or adults
11-13 Web search, online games, chatting, use of
e-mail, use of OSN (Online Social Networks)
Victims of sexual predators, illegal
content, cyberbullying
15-18 Extensive use OSN, any internet activity Recipients and senders of sexual
content, cyber grooming
Source : ITU (International Communication Union), 2021
 According to a 2017 UNICEF report, as many as five million child profiles in the
digital world have been stolen
 INTERPOL’s database contains 2.7 million images of child victims (2019)
 In 2017, INTERPOL identified 10,000 child sexual abuse victims
 The production and distribution of criminal child pornography has an estimated
value of between $3 billion and $20 billion.
 NCMEC reported that during the first six months of 2020, reports of child sexual
abuse materials surged 90 percent to more than 12 million
Growing
Complexity
through ICT
Increased
criminalization of
the Internet
Lack of
understanding on
the harms posed
to children by new
technologies
Lack of expertise
and capacity to
investigate these
crimes
Lack of national
laws that protect
children online
present in every
country
Type of Abuse Technologies Characteristics that
increase the danger
• Child sexual • Mobile phones • Ease of access
• Lack of laws
• Lack of anonymity
• Scale and scope of
internet use
• Permanence
• Real and unreal
abuse/exploitation • Games consoles
material
• Online grooming for
sexual purposes
• Internet
• Webcams
• Sexting
• Sexual extortion
• Live online child sexual
abuse/live streaming
• Harassment and
intimidation.
Risks arising from the interaction of two minors
such as cyberbullying.
Risks arising from interactions between children
and adults, such as cyber grooming.
Risks arising from data collection, to privacy
protection, such as viruses and other malware
Content risks
Contact risks
Children targeted as consumers
Economics risks
Online privacy risks
No. Risks Explanation
1. Content risks Illegal content (content about sexual exploitation of children), age
inappropriate content (pornography, hatred, violence related content) and
harmful advice (children are exposed dangers , child consume alcohol,
drugs, to commit suicide, different psychological and nutritional disorder)
2. Contact risks Children have direct interaction online, either with other children or with
adults : cyber grooming, cyber bulling, cyber stalking, cyber harassment
3. Children targeted
as consumers
Mostly for products and services designed only for adults : alcohol,
tobacco, drugs, and prescription medicines (doping substances).
Gambling, pornography contents, dating services
4. Economics risks Spent exorbitantly if they have access to payment methods either through a
mobile phone or other online services : registering and transferring money
in gambling and online games
5. Online privacy
risks
Children give out personal information easier than adults in order to receive
an award, offering quiz, discount or free service
The DQ Institute (https://www.dqinstitute.org/) launched
the Child Online Safety Index on Safer Internet Day 2020,
after surveying 145,426 children and youth in 30 countries
over the past three years. The Child Online Safety Index
(COSI) measures the level of online safety for children
worldwide based on six pillars:
 Internet access, activities and skills
 Risky online activities
 Children’s experiences of online sexual exploitation and abuse
 Disclosure and reporting of online sexual exploitation and abuse
 Identification and investigation of OCSEA cases
 Children's experiences with law enforcement mechanisms, the justice
process and social services
 Current initiatives for children
 We need stronger political will and investment from the governments in term of
financial and human resources and we need more commitments and actions from
companies.
 Engage the public – including children, caregivers and teachers – in awareness
about exploitation and abuse of children via existing national programmes
 Invest in digital literacy programmes for children, caregivers and teachers
 Engage with children to encourage open dialogue
 When children do not know about sex, it enables offenders to take advantage
 Age-appropriate education and awareness raising approaches need to reach all
children
 Inform children about their right to be protected from all forms of emotional,
physical and sexual abuse and exploitation
 Impose legal duties on domestic internet service providers
 Inform children about their right to be protected from all forms of emotional,
physical and sexual abuse and exploitation, including OCSEA
 Facilitate access to trusted sources of information online for children
 Responses to disclosures of OCSEA should always convey that the abuse is never
the child’s fault.
 Engage with children to encourage open dialogue about their online and offline
interactions and behaviour
 children, caregivers, teachers, and those working with children to understand the
full extent of the risks when sharing sexual content online.
 Train all staff of social support services (not just specialist services) to recognize
the unique risks and harms of OCSEA
 When children do not know about sex, it enables offenders to take advantage.
Seventy-two percent of children surveyed in Indonesia have not received any sex
education.

More Related Content

Similar to ahmadsofiang20stcfinal-220308055846 (1).pptx

CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2Anchalanshri Dixit
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011DHE2008
 
SENATOR Mike Crapo (Cyber Bullying Law)
SENATOR Mike Crapo (Cyber Bullying Law)SENATOR Mike Crapo (Cyber Bullying Law)
SENATOR Mike Crapo (Cyber Bullying Law)VogelDenise
 
Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Daniel Asher
 
Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Daniel Asher
 
Children's Rights in Digital Age
Children's Rights in Digital AgeChildren's Rights in Digital Age
Children's Rights in Digital AgeKentCharlesNotario1
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and schoolGrant Ward
 
Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatRaudhat-Rahma Shittu-Agbetola
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaAndri Priyatna
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eveSimonBalle
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionThomas Müller
 
Being SMART about Internet Safety
Being SMART about Internet SafetyBeing SMART about Internet Safety
Being SMART about Internet SafetyErica Roberts
 
Benefitsandhazards
BenefitsandhazardsBenefitsandhazards
Benefitsandhazardsdgieseler1
 
Identifying and dealing with online bullying
Identifying and dealing with online bullyingIdentifying and dealing with online bullying
Identifying and dealing with online bullyingJisc RSC East Midlands
 
Parents guide to cyberbullying
Parents guide to cyberbullyingParents guide to cyberbullying
Parents guide to cyberbullyingSaraMitchell40
 

Similar to ahmadsofiang20stcfinal-220308055846 (1).pptx (20)

Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011
 
SENATOR Mike Crapo (Cyber Bullying Law)
SENATOR Mike Crapo (Cyber Bullying Law)SENATOR Mike Crapo (Cyber Bullying Law)
SENATOR Mike Crapo (Cyber Bullying Law)
 
Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)
 
Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)
 
Children's Rights in Digital Age
Children's Rights in Digital AgeChildren's Rights in Digital Age
Children's Rights in Digital Age
 
Robert final conference 2012 UNICEF presentation
Robert final conference 2012   UNICEF presentationRobert final conference 2012   UNICEF presentation
Robert final conference 2012 UNICEF presentation
 
Disrupting harm — Project brief
Disrupting harm — Project briefDisrupting harm — Project brief
Disrupting harm — Project brief
 
Global kids online — Project brief
Global kids online — Project briefGlobal kids online — Project brief
Global kids online — Project brief
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
 
Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhat
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online Protection
 
Being SMART about Internet Safety
Being SMART about Internet SafetyBeing SMART about Internet Safety
Being SMART about Internet Safety
 
Benefitsandhazards
BenefitsandhazardsBenefitsandhazards
Benefitsandhazards
 
Identifying and dealing with online bullying
Identifying and dealing with online bullyingIdentifying and dealing with online bullying
Identifying and dealing with online bullying
 
Parents guide to cyberbullying
Parents guide to cyberbullyingParents guide to cyberbullying
Parents guide to cyberbullying
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 

ahmadsofiang20stcfinal-220308055846 (1).pptx

  • 1. Dr. Ahmad Sofian ECPAT Indonesia Email : ahsofian@gmail.com
  • 2.  One in three Internet users is a child and more than 175,000 children go online for the first time every day  Globally, children and young people are the major users of information and communication technologies (ICTs)  Technology has created possibilities for children to be connected and to access all kinds of information  But, they also become more vulnerable to its harmful aspects  The danger is increased due to lack of protection for children  To design effective measures against these threats and dangers, it is necessary to have an in-depth understanding of children's activities on the internet
  • 3. Age Rang e Popular online activities Main dangers and risks 1-4 Music listening and videos watching, random access to websites Whatever they look at is received at face value 5-7 Use computers or smartphones in order to play games Victims of online marketers, personal information leaks 8-10 Online gaming, surfing, chatting They can contact older (unknown) children and/or adults 11-13 Web search, online games, chatting, use of e-mail, use of OSN (Online Social Networks) Victims of sexual predators, illegal content, cyberbullying 15-18 Extensive use OSN, any internet activity Recipients and senders of sexual content, cyber grooming Source : ITU (International Communication Union), 2021
  • 4.  According to a 2017 UNICEF report, as many as five million child profiles in the digital world have been stolen  INTERPOL’s database contains 2.7 million images of child victims (2019)  In 2017, INTERPOL identified 10,000 child sexual abuse victims  The production and distribution of criminal child pornography has an estimated value of between $3 billion and $20 billion.  NCMEC reported that during the first six months of 2020, reports of child sexual abuse materials surged 90 percent to more than 12 million
  • 5. Growing Complexity through ICT Increased criminalization of the Internet Lack of understanding on the harms posed to children by new technologies Lack of expertise and capacity to investigate these crimes Lack of national laws that protect children online present in every country
  • 6. Type of Abuse Technologies Characteristics that increase the danger • Child sexual • Mobile phones • Ease of access • Lack of laws • Lack of anonymity • Scale and scope of internet use • Permanence • Real and unreal abuse/exploitation • Games consoles material • Online grooming for sexual purposes • Internet • Webcams • Sexting • Sexual extortion • Live online child sexual abuse/live streaming • Harassment and intimidation.
  • 7.
  • 8. Risks arising from the interaction of two minors such as cyberbullying. Risks arising from interactions between children and adults, such as cyber grooming. Risks arising from data collection, to privacy protection, such as viruses and other malware
  • 9. Content risks Contact risks Children targeted as consumers Economics risks Online privacy risks
  • 10. No. Risks Explanation 1. Content risks Illegal content (content about sexual exploitation of children), age inappropriate content (pornography, hatred, violence related content) and harmful advice (children are exposed dangers , child consume alcohol, drugs, to commit suicide, different psychological and nutritional disorder) 2. Contact risks Children have direct interaction online, either with other children or with adults : cyber grooming, cyber bulling, cyber stalking, cyber harassment 3. Children targeted as consumers Mostly for products and services designed only for adults : alcohol, tobacco, drugs, and prescription medicines (doping substances). Gambling, pornography contents, dating services 4. Economics risks Spent exorbitantly if they have access to payment methods either through a mobile phone or other online services : registering and transferring money in gambling and online games 5. Online privacy risks Children give out personal information easier than adults in order to receive an award, offering quiz, discount or free service
  • 11. The DQ Institute (https://www.dqinstitute.org/) launched the Child Online Safety Index on Safer Internet Day 2020, after surveying 145,426 children and youth in 30 countries over the past three years. The Child Online Safety Index (COSI) measures the level of online safety for children worldwide based on six pillars:
  • 12.
  • 13.
  • 14.  Internet access, activities and skills  Risky online activities  Children’s experiences of online sexual exploitation and abuse  Disclosure and reporting of online sexual exploitation and abuse  Identification and investigation of OCSEA cases  Children's experiences with law enforcement mechanisms, the justice process and social services  Current initiatives for children
  • 15.  We need stronger political will and investment from the governments in term of financial and human resources and we need more commitments and actions from companies.  Engage the public – including children, caregivers and teachers – in awareness about exploitation and abuse of children via existing national programmes  Invest in digital literacy programmes for children, caregivers and teachers  Engage with children to encourage open dialogue  When children do not know about sex, it enables offenders to take advantage  Age-appropriate education and awareness raising approaches need to reach all children  Inform children about their right to be protected from all forms of emotional, physical and sexual abuse and exploitation  Impose legal duties on domestic internet service providers
  • 16.  Inform children about their right to be protected from all forms of emotional, physical and sexual abuse and exploitation, including OCSEA  Facilitate access to trusted sources of information online for children  Responses to disclosures of OCSEA should always convey that the abuse is never the child’s fault.  Engage with children to encourage open dialogue about their online and offline interactions and behaviour  children, caregivers, teachers, and those working with children to understand the full extent of the risks when sharing sexual content online.  Train all staff of social support services (not just specialist services) to recognize the unique risks and harms of OCSEA  When children do not know about sex, it enables offenders to take advantage. Seventy-two percent of children surveyed in Indonesia have not received any sex education.