Updated Online Safety 3.0 Talk for Mediterranean Association of International...Larry Magid
A newly revised Online Safety 3.0 talk prepared for the Mediterranean Association of International Schools by ConnectSafely.org co-director and SafeKids.com founder Larry Magid
Everything I know about protecting children I learned from a visit to Nairobi...Larry Magid
ConnectSafely.org co-director Larry Magid's presentation at the child protection panel at the Internet Governance Forum (IGF) in Nairobi, Kenya. September 30, 2011
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Larry Magid
A newly revised Online Safety 3.0 talk prepared for the Mediterranean Association of International Schools by ConnectSafely.org co-director and SafeKids.com founder Larry Magid
Everything I know about protecting children I learned from a visit to Nairobi...Larry Magid
ConnectSafely.org co-director Larry Magid's presentation at the child protection panel at the Internet Governance Forum (IGF) in Nairobi, Kenya. September 30, 2011
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
This is not your tired old Internet Safety lecture, but a presentation by ConnectSafely.org CEO Larry Magid that emphasizes youth rights as well as responsibliities and the importance of media literacy
ONLINE SAFETY conference for Parents in Escuela Americana - What every parent should know about impact of new technologies on their children - www.ideaworks.la - @rokensa
Social Media 101 for Parents: Do you know where your children are?Sarah Welstead
Designed as an introduction to social media and social networking for parents of kids aged 5-18, the presentation contains an overview of leading social networks, information about security and privacy of particular interest to parents, and practical tips on how to ensure kids are being smart and safe online.
Perfect for an audience of parents who are comfortable with the internet but whose social media knowledge/experience is limited.
The goal of this presentation is to increase your knowledge about social media and create a sense of awareness about social networking trends including cyber-dangers: sexting, bullying, stalking. Share social networking and media best practices and ultimately, start a conversation about a values-based approach to social networking.
This was a presentation to 9th graders to help them explore how to take control of their online persona. Examples reach back in time and project into the future when things like augmented reality amplify the information we put online.
Social Media: To Fear or Not - What's the Facts? Presented @ Atlantis Rising Campus in Second Life for Bernajean Porter. See AtlantisSeekers.ning.com for more details and information to join us in more conversations.
An updated look at the research and definitions around bullying and cyberbullying. Presented to the Youth Online Safety Working Group assembled by NCMEC, this talk unpacks both what current research can tell us about cyberbullying as well as where the gaps our understanding of this issue lie.
Presented by senior researchers from the UTS Health Psychology Unit, this lecture unravels the facts about cyber bullying. It debunks media stereotypes of perpetrators and victims, lays bare its costs to individuals and communities and offers practical pathways for solutions and healing.
Fear is our ultimate enemy. A very patronising, largely unfunny, basically unwelcomed guest with an enormous capacity to cripple who we are emotionally, financially, physically and reveal how shallow we are spiritually by freezing our faith.
Fear could also be defined as an emotion experienced in anticipation of some specific pain or danger (usually accompanied by a desire to flee or fight)
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
This is not your tired old Internet Safety lecture, but a presentation by ConnectSafely.org CEO Larry Magid that emphasizes youth rights as well as responsibliities and the importance of media literacy
ONLINE SAFETY conference for Parents in Escuela Americana - What every parent should know about impact of new technologies on their children - www.ideaworks.la - @rokensa
Social Media 101 for Parents: Do you know where your children are?Sarah Welstead
Designed as an introduction to social media and social networking for parents of kids aged 5-18, the presentation contains an overview of leading social networks, information about security and privacy of particular interest to parents, and practical tips on how to ensure kids are being smart and safe online.
Perfect for an audience of parents who are comfortable with the internet but whose social media knowledge/experience is limited.
The goal of this presentation is to increase your knowledge about social media and create a sense of awareness about social networking trends including cyber-dangers: sexting, bullying, stalking. Share social networking and media best practices and ultimately, start a conversation about a values-based approach to social networking.
This was a presentation to 9th graders to help them explore how to take control of their online persona. Examples reach back in time and project into the future when things like augmented reality amplify the information we put online.
Social Media: To Fear or Not - What's the Facts? Presented @ Atlantis Rising Campus in Second Life for Bernajean Porter. See AtlantisSeekers.ning.com for more details and information to join us in more conversations.
An updated look at the research and definitions around bullying and cyberbullying. Presented to the Youth Online Safety Working Group assembled by NCMEC, this talk unpacks both what current research can tell us about cyberbullying as well as where the gaps our understanding of this issue lie.
Presented by senior researchers from the UTS Health Psychology Unit, this lecture unravels the facts about cyber bullying. It debunks media stereotypes of perpetrators and victims, lays bare its costs to individuals and communities and offers practical pathways for solutions and healing.
Fear is our ultimate enemy. A very patronising, largely unfunny, basically unwelcomed guest with an enormous capacity to cripple who we are emotionally, financially, physically and reveal how shallow we are spiritually by freezing our faith.
Fear could also be defined as an emotion experienced in anticipation of some specific pain or danger (usually accompanied by a desire to flee or fight)
How are bullying and bias related? How does gender bias, sexism, and homophobia affect the ways boys and girls experience bullying/cyberbullying and harassment? How do young people identify bullies and victims around social factors like race, gender, sexual orientation, ethnicity, and class? Gain practical methods and tools which can be used to prevent and combat this growing problem.
9 questions to stop making you feel like a failure!Inspire99
If you ever felt like a failure or are feeling like a failure, here are 9 questions which will set you off the guilt and on a quest to find the real solutions to your problems
How to Overcome Fear to Get What You Wantnoah kagan
What do you want most right now?
What is holding you back from getting where you want to be?
Here are a few of the most common responses:
1. Not enough ideas
2. Not enough time
3. Not enough money
Most people also say either:
"I don't know what to do next."
or
"I don't know the right people and I'm afraid of doing it alone."
The underlying cause is fear. Fear of being alone. Fear of failure. Even fear of success.
—
Get the CreativeLIVE Course here: http://www.creativelive.com/courses/overcome-fear-get-what-you-want-noah-kagan
Have you ever not made a much-needed change because you were afraid of breaking something? Caution is wise, but too much fear can leave even the most agile of software organizations with a crippling aversion to change. This talk will discuss what makes us scared, why it hurts us, and my experiences helping a team I managed get rid of some of our fears.
Here are 11 practical ways to help you overcome your fears
Ppt on How To Overcome Fear: This presentation takes you through 11 slides, each targeting various aspects of fear and the ways to target fear and overcome these fears in life
Here are 9 out of 24 tips on how to overcome fear of failure. For 13 more tips of this type, click the link: http://vkool.com/how-to-overcome-fear-of-failure/.
1. Identify Causes
Identifying where the fear of failure starts is the first step to get over it. You should sit down, breathe deeply, and try to figure out why the fear of failure appeared. The reasons may be negative thoughts, pessimism, or wrong predictions.
2. Research Alternatives
You should think of as many potential consequences as possible. Doing it this way helps you aware of all difficulties you may have, and be able to determine what should be done for success.
You should prepare at least one alternative solution to use when the initial plan does not work.
3. Treat Failure As A Lesson
One of the most efficient tips on how to overcome fear of failure is to consider it a good lesson or experience. If you fail this time, you will still get something called experience. With this experience, you will get success easier next time.
4. Make A Concrete Plan
Making a concrete plan is another tip on how to overcome fear of failure. What you need to do is to prepare carefully for every single step in the plan. The more detailed your plan is, the easier the success comes.
5. Take Action
The best way to eliminate fear of failure is to take action. Practice makes perfect. Taking action is a chance to experience the facts and gain knowledge. If you dare not do anything, you will never know how to do them right. Everything is difficult when you do it the first time. After that, it will be easier.
6. Balance Your Life
No matter how important the success is, you should still balance your life with other activities rather than focusing on the success only. You should spend time doing your hobbies to refresh your body and mind so as to come closer to success.
7. Believe In Yourself
You should believe that if you try, you will be able to overcome difficulties. Do not give up easily. If you try hard, you will have chances to succeed no matter how hard the case is. If you give up, you will no longer have any chance to be successful.
8. Learn From Others
Learning from others’ stories or successes is also a tip on how to overcome fear of failure. Successful stories will encourage you to move forward. You can also learn from those people the way to carry out their plans for success.
9. Free Your Mind
This is the most important technique on how to overcome fear of failure at work and in life. The fear is from your mind. If your mind is full of negative or pessimistic thoughts, it will create fears. Therefore, you should learn to clean, and refresh your mind by doing yoga or meditation every day. The quieter the mind is, the better it can hear and see, and the easier you can get success.
The Child’s Psychological Use of the Parent: A Workshop James Tobin, Ph.D.
This workshop is designed for parents who would like to improve the quality of their relationship with their children. Dr. Tobin provides a roadmap for parents based on a core paradox of the human condition, i.e., the initial need to bond (to form and sustain early life) and the subsequent need to separate/individuate (in order for the child to secure a distinct personal identity unencumbered by unresolved issues with the family of origin). According to Dr. Tobin, both the parent and the developing child simultaneously press for separation/individuation and resist it. This workshop attempts to alert parents to the underlying dynamics that prolong this ambivalence and provides pragmatic suggestions for how parents can be "of use" psychologically so that their child is more successfully primed for the achievement of autonomy.
Running Head JUVENILE PROSTITUTIONJUVENILE PROSTITUTION.docxcowinhelen
Running Head: JUVENILE PROSTITUTION
JUVENILE PROSTITUTION
Juvenile Prostitution
Human Development and Environments
Name
University Of xxxxxx
Abstract
Juvenile prostitution has disastrous effects to the mental, social, and physical development of a child. The paper explores the causes, effects, and prevention approaches that will eliminate juvenile prostitution. The research will use eco-developmental theory provides a premise for exploring the investigation on juvenile prostitution. Effort need to focus on broadening the prevention programs that are community based that helps to identify vulnerable children before they end up on the streets. The paper will provide stakeholders with an opportunity to understand the gravity of juvenile prostitution and develop appropriate interventions.
Background
In many conventions and tourist cities, child prostitution is rampant and growing at an alarming rate. According to the federal bureau of investigation, Atlanta tops among the cities with the highest number of children who engage in prostitution. There are concerted efforts of religious groups, lawmakers, and advocates for juvenile justice in the state. These efforts have not been fruitful since there is less focus on a lasting solution to the problem. Critics argue that efforts should be providing a sustainable program that will prevent vulnerable children from taking part in the vice. There has been a focus on increasing penalties for offenders without addressing the cause of the problem. Despite the stringent laws and penalties, the vice has continued to thrive. It is critical to note that efforts should be placed on developing treatment programs that help children who are sexually exploited. The efforts need to focus on broadening the prevention programs that are community-based that contribute to identify vulnerable children before they end up on the streets.
Introduction
Juvenile prostitution is an issue of concern in the society since it fuels human trafficking, kidnapping, serial rape, abuse of human rights, and exploitation. Most of these children are lured or abducted by traffickers who brand them or beaten into submission. Those that try to get away are either killed or tortured. Review of foster care is imperatives since many of these children are raped and abused in these placements. It is imperative to note that these children decide to run away since foster-care homes are inhabitable (Plumridge & Abel, 2001). It is imperative that the discourse should be placed on the role of child welfare systems since they have failed to identify children who are trafficked for sex. Even in their knowledge on the existence of these problems, the child welfare systems argue that the responsibility is outside their jurisdiction and purview. The argument is that the perpetrators of the vices are not caregivers or parents; thus, they shift the responsibility to law enforcement officers. Breggin (2008) says, “These children are not ...
Does the Internet harm children's health? A critical review of the evidenceMonica Bulger
Presentation delivered at MeCCSA 2013 by Dr. Vera Slavtcheva-Petkova, highlighting findings of a paper co-authored with Dr. Monica Bulger and Dr. Victoria Nash of the Oxford Internet Institute
Abstract: Moral panics about the Internet’s “harmful effects” have been ongoing in current years, recently exacerbated by a UK parliamentary inquiry into online child protection. Is there scientific evidence supporting these fears? Does the Internet harm children and especially their health? This paper will present the findings from a narrative review of more than 300 journal articles discussing the scale and scope of online harms that young people experience. We will first present the three main types of harms identified in the literature: health-related harms, sex-related harms and cyber-bullying. Then the paper will focus in more detail on the evidence about health-related harms incurred as a result of online risks. We not only identify the kinds of health harms discussed in the literature – mainly related to pro-eating disorder websites, self-injury websites and problematic Internet use – but we also investigate whether and how the researchers operationalize harm. We also scrutinize the research methods used in the studies, which tend to differ significantly among the disciplines studied.
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...Stevecd
Presentation given to delegates at the PRUS.org.uk network conference at Standstead Airport in July 2011. The presentation profiled the work that Stephen Carrick-Davies has been undertaking for the TDA looking at the social media and vulnerable young people. In particular what staff working with these YP need in temrs of training and support.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Do fear and exaggeration increase risk?
1. Do fear and exaggeration increase risk?
Larry Magid
(not pictured above)
Co-director, ConnectSafely.org
Founder, SafeKids.com
larry@ConnectSafely.org
6. Some panicked over:
• Y2K
• Killer bees
• Swine flu
• Stranger danger
• Stock market “crash”
• Al Qaeda and nuclear weapons in Iraq
• Unemployment
• Not enough people to fill available jobs
• Inflation
• Deflation
• Obama getting elected
• McCain getting elected
9. “You should not try to scare people into
healthy practices”
“In 50 years of research, many different theories have been
developed to explain the inconsistent results with respect to
the effects (or lack of effects) of fear appeals, but in general
health communicators have assumed for a long time that
“you should not try to scare people into healthy practices,
including smoking prevention and cessation.”
(Hill, Chapman, Donovan, 1998).
http://www.thcu.ca/infoandresources/publications/
fear%20appeals%20-%20web%20version.pdf
10. If it’s not credible & actionable, people
don’t respond
“According to EPPM*, how people respond to fear
appeals depends on their assessment of the threat and
their perceived efficacy. When assessing threat, the
audience considers severity, or the seriousness of it, as
well as their susceptibility, or the likelihood that it will
happen to them.”
*Extended Parallel Process Model
Based on research from Kim White @ Michigan State
http://www.thcu.ca/infoandresources/publications/fear%20appeals%2
0-%20web%20version.pdf
11. Boomerang effect
If the perception of threat exceeds perception of
efficacy…
• They will avoid the message
• Deny they are at risk
• Mock the message or become angry at the source or
issue (and ignore it).
• They may even increase their unhealthy behaviors
(boomerang effect).
12. Danger control
• When perceived threat is low, the audience does not
worry about efficacy and so they do not respond
• When perceived threat is high and perceived efficacy is
low(er), the result is avoidance, denial or anger towards
the source or issue (fear control)
• When perceived threat is high and perceived efficacy is
higher, the recommended behavior is adopted (danger
control)
Based on research from Kim White @ Michigan State
http://www.thcu.ca/infoandresources/publications/fear%20appeals%20-
%20web%20version.pdf
13. The DARE experience
• DARE classes were no less likely to have smoked marijuana or
cigarettes, drunk alcohol, used "illicit" drugs like cocaine or heroin, or
caved in to peer pressure than kids who’d never been exposed to DARE.
• Its panic-level assertions that "drug abuse is everywhere." Kids don’t
respond well to hyperbole, and both the "Just Say No" message and the
hysteria implied in the anti-drug rhetoric were pushing students away.
• It’s also possible, some researchers speculate, that by making drugs seem
more prevalent, or "normal" than they actually are, the DARE program
might actually push kids who are anxious to fit in towards drugs.
Time Magazine:
http://www.time.com/time/nation/article/0,8599,99564,00.html#ixzz1W0XkvmW1DD
14. DARE to keep kids away from candy
• My 6-year old daughter was afraid of Walgreens because it
sold “drugs”
• Besides, kids her age weren’t at risk of drugs – the biggest risk
in their lives was candy and junk food
Source: My wife Patti Regehr
18. The rise of the web has not resulted in increased
victimization of children
51% Decline
(during the period of the
Web’s existence)
Blue line represents 58% decline in child sex abuse from
1992 to 2008
Source: Updated Trends in Child Maltreatment, 2008: Finkelhor, Jones and Shattuck: Crimes Against
Children Research Center
19. Moving right along
The Internet Safety Technical Task Force found that:
“Bullying and harassment, most often by peers, are the
most salient threats that minors face, both online and
offline.”
Which naturally leads to ….
21. It’s a problem, not an epidemic
Data is not consistent but the consensus is that
about 20% of kids experienced cyberbullying
Chart: Cox Communications Teen Online & Wireless Safety Survey
22. Be careful about “bullycide”
• Suicide experts say there is
rarely one single reason why a
person takes his or her life
• Dramatizing or glorifying suicide
can actually lead to copycat
suicides.
• Be aware of suicide media
guidelines
23. Most children are neither victims nor
monsters
• Not every interaction that makes kids
uncomfortable is bullying
• While some are very vulnerable,
most children are reasonably
resilient.
• Across Europe, 6% of 9 to 16-year-old
internet users have been bullied
online. 3% confess to having bullied
others. *
• Far more have been bullied offline,
with 19 per cent saying they have
been bullied at all – and 12 per cent
have bullied someone else*
* EU Kids Online
24. And bullying is going down, not up
“The percentage of youth (2-17) reporting physical
bullying in the past year went down from 22 percent
to 15 percent between 2003 and 2008.”
Source: Trends in Childhood Violence and Abuse Exposure ..
Finkelhor, et al)
25. Sexting Panic
A 2008 survey found that 20% of teens sent a ‘sext’
Which led to stories like this:
26. But a 2011 study found
• 1.3% sent an image where they
showed breasts, genitals or
someone’s bottom
• 2.5% sent an image where they
were nude or partially nude
Source: Crimes Against Children Research Center, Dec , 2011
27. Danger of exaggeration
• Can destroy credibility
• Can cause “boomerang effect”
• Can cause people to believe that behaviors are
“normal”
28. Social norms approach
• People emulate how they think their peers
behave
• If people think their friends don’t smoke,
they’re less likely to smoke.
• Same is true with over-eating, excessive
alcohol use and other negative behaviors,
including bullying*
*Assessing Bullying in New Jersey Secondary Schools: Applying the Social
Norms Model to Adolescent Violence: Craig, Perkins 2008
29. Alternative to fear messaging
“Social-norms marketing campaigns have emerged
as an alternative to more traditional approaches
(e.g., information campaigns, moral exhortation,
fear inducing messages) designed to reduce
undesirable conduct.”
Donaldson, Graham, Piccinin, & Hansen, 1995
http://www.csom.umn.edu/assets/118375.pdf
30. Emphasize the positive
• People, especially youth, can benefit from
positive images and role models
• Creating a culture of respect actually can lead
to respect
• Respectful behavior truly is normal. Most kids
do not bully
31. Examples of positive norming
Source: Assessing Bullying in New Jersey Secondary Schools: Applying the Social Norms
Model to Adolescent Violence: Craig, Perkins 2008
32. Thanks
Larry Magid
Co-director, ConnectSafely.org
Founder, SafeKids.com
larry@ConnectSafely.org
Editor's Notes
THERE NEVER HAS BEEN A STUDY ON HOW MUCH CHILDREN ARE SOLICITED BY “PREDATORS.” NOTE THE HEADLINE: “All Children Vulnerable to Online Predators”. IT’S A TRICK QUESTION BECAUSE THE SURVEY WASN’T ABOUT PREDATORS. It was about unwanted sexual solicitations from anybody – flirting is often an unwanted sexual solicitation, as the researchers defined the term. Here’s what the 2000 study this refers to – updated in 2006 with the figure 1 in 7, so the no. of solicitations had gone down – actually said....READ THIS:“Youth identify most sexual solicitors as being other adolescents (48% in 2000; 43% in 2006) or young adults 18-24 (20%; 30%), with few (4%; 9%) coming from older adults, and the remaining being of unknown age.” THE TOTALS: 68% teens & 18-24-year-olds in 2000; 73% in 2006.
From 1990 to 2005 – the period of time that the Web was born and grew most rapidly – there was a 51% decline in overall child sexual – the chart’s showing that: out of every 10,000 US minors, 23 were abused, with that no. going down to 11 in 2005.UPDATE: 58% decline thru 2008, latest figure available (reported by CCRC here “Updated Trends in Child Maltreatment, 2008” <http://www.unh.edu/ccrc/pdf/CV203_Updated%20Trends%20in%20Child%20Maltreatment%202008_8-6-10.pdf>)NCANDS = National Data Archives on Child Abuse & Neglect
THESE ARE ALL IMPORTANT BUT VERY GENERAL – CERTAINLY EACH INCIDENT IS UNIQUE AND NEEDS CARING INDIVIDUAL TREATMENT - a full, nonconfrontational, child-caregiver discussion that looks at the situation’s circumstances. The psychological damage can be considerable – some kids have suicidal thoughts.School counselor I spoke with several years ago would find out all the parties involved, get them in a room, and do bully-victim reverse role-playing (empathy training). In families and schools, some of these incidents can be turned into TEACHABLE MOMENTS (maybe anonymized?) for all parties’ benefit.