SlideShare a Scribd company logo
1 of 8
Download to read offline
Undertakings toward
developing a safe internet environment for children in
Japan




                             Yuji Sonoda
      Deputy Director, Telecommunications Consumer Policy Division
                      Telecommunications Bureau
            Ministry of Internal Affairs and Communications
                                 JAPAN
1 Main efforts by concerned parties                ーAct on Development of Internet Environment for
Young Peopleー
                 Act on Development of Internet Environment for Young People
   ◆The Act on Development of an Environment that Provides Safe and Secure Internet Use for Young People (“Act on
    Development of Internet Environment for Young People”) was enforced on April 1, 2009.
   ◆By improving ICT literacy and promoting filtering, etc. as 2 pillars for developing a safe internet environment for young
    people, concrete activities by both the government and private sector will be promoted.

                                                 Fundamental principles
                                                                                           Initiative by the private
        Improving ICT literacy                   Promoting filtering, etc.                 sector (with Government
                                                                                                    support)
                       Government                                                         Private sector
                                                                          Mobile phone
      The Headquarters for the Promotion of                                 carriers
     Development and Support for Children and                           Internet service         Mandatory supply of
                                                                                               filtering services (with
                  Young People                                              providers              some conditions)
                                                                           PC makers
                        Formulation                                                                 Obligation to make
                                                                           Filtering




                                                                                                                          Young people
                                                           Support
                                                                                                       efforts for
                                                                          developers/                 development
                       Basic plan                                          suppliers
    -Basic policy
    -Education and awareness raising concerning the                                             Obligation to make
    adequate ability to utilize the Internet                                Server              efforts to prevent
    -Improvement of performance/diffusion of                             administrators              browsing
                                                                                              of harmful information
    filtering services
    -Support for the private sector’s efforts, etc.
                                                                                                Obligation to make
                                                                         Other parties        efforts for education,
                                                                          concerned                    etc.

                                                                                                                                         1
2 Main initiatives of the MIC as regards preparation of an Internet environment for
young people

 ○Improving ICT literacy

 In order to overcome the risks that ICT use entails and ensure that young people can enjoy ICT use as much as
 possible, it is necessary to improve ICT literacy among young people and their parents. Especially in the age of
 the smart phone, it is essential that users acquire an even higher level of literacy.
 Educational courses have been implemented mainly for parents and teachers (e-net safety courses) across the
 nation in cooperation with the Ministry of Education, Culture, Sports, Science and Technology, and
 telecommunication-related organizations, etc. (“e-Net Caravan) (Implementation result in FY2011: 900)
 The dissemination and educational activities (such as symposiums and workshops) of “The Safer Internet of
 Japan” have been supported. (Implementation result in FY2011: 16)

 ○Promoting improvement and diffusion of filtering

 Restricting access to internet content that is harmful to young people is primarily a parental role. However, in
 the case of mobile phones, which are difficult for parents to monitor, filtering is applied unless the parents
 request non-use of filtering.
  cooperation with mobile phone carriers and third party organizations that provide screening of sites
  In
 harmful to young people, the supply of diverse filtering services, such as customized functions of mobile phone
 filtering, will be promoted.
 Based on the agreement among related ministries, the diffusion of filtering will be promoted by requiring
 mobile phone carriers to reinforce explanations to parents, etc. (Number of users of mobile phone filtering
 service as of the end of December 2011: approx. 8.23 million)

                                                                                                                    2
3-1 Literacy indicator for young people’s safe and secure utilization of the internet
     -ILAS (Internet Literacy Assessment indicator for Students)-
                                             ILAS
                                           ILAS
       Abilitiessrequired



                                                                   Analysis of the pre-test (year 2011)
                                                 Digitalization            All: approximately 550 young people
                                                 of the                       Average score:73 out of 100
                                                 abilities by                           General
                                                 the test
                                                                                        100         1a Illegal content
                                                                    3b Security


                                                                                          0
                                                                  3a Privacy risks                      1b Harmful
                                                                                                           content


                                                                     2c Inappropriate               2a Inappropriate
                                                                         usage
                                                                                         2b Improper contact
                                                                                         transactions




                                                            Comparison and analysis of
                                                            abilities digitalized




                                                                                                                         3
3-2 The development process of ILAS
Online Risk Categorization                                               Literacy to bebe acquired (examples)
                                                                          《literacy to acquired》(examples)
         (based on OECD report’s categorization)
  Major Category     Medium Category      Sub-Category
                                                                          Knowledge(●)                                   Behavior(○)
                                                                          [Principles]
  I               A                       Copyrights, portrait            ●Understand that smartphones are
                                          rights,       criminal
  Illegal       & Illegal content         threats, dating sites,
                                                                          advanced mobile phones with computer-level
                                                                          advanced information processing functions,
  Harmful                                 etc.                            and that many functions are offered via
  Content Risks   B                       Content offensive to            applications (software).
                                          public   order     and          ●Understand that some smartphone
                  Harmful content         morality, adults-only           applications automatically send out private
                                          content, etc.                   and/or personal information.
                                                                          ●Understand that when downloading              ○Download applications after
  II                 A                    Libel                           smartphone applications,                       confirming their trustworthiness, etc.
                                                                          ●one must confirm the trustworthiness and      ○Confirm what information applications
  Inappropriate      Inappropriate        Anonymous SNS                   safety of the site and application supplier.   access, and take appropriate measures
  Usage Risks        Contact              Non-anonymous SNS                                                              (limit accessible information, etc.).

                                          Spam
                                          Applications (*)
                     B                    Fraud,     sale    of
                                          improper    products,
                     Improper                                      Users can freely install applications to add functionality to their smartphone.
                                          etc.
                     Transactions                                  Which of the following items must the most amount of care be given to when
                     C                    Excess Internet use      installing applications?
                     Inappropriate        Dependence               (1)     The relationship between the application’s operational requirements and
                     Usage                                                 the items that appear under “access permission”
  III                A                    Leakage of private
                                                                   (2)    Evaluation from other users displayed on the installation screen
                                          and/or        personal
  Privacy          & Privacy Risks        information,
  Security Risks                          inappropriate
                                                                   (3)    Whether the application has been introduced in magazine articles, etc.
                                          disclosure
                     B                    Impersonation
                                          through unauthorized     (4)    The application’s rank in rankings published on the internet
                     Security Risks
                                          access, etc.
                                          Viruses

            (*) Smartphone applications


                                                                                                                                                              4
4-1 The Safer Internet of Japan

《Key comments of the Safer Internet of Japan (http://good-net.jp/ )》


    “The Safer Internet of Japan carries out three key activities which are indispensable for
  providing conditions for safer use of the internet.
   Firstly, we promote comprehensive activities to improve the ICT literacy of users, which include
  awareness raising activities concerning the merits of the internet as well as the risks that using the
  internet entails. Through such activities, we contribute to fostering children with the capacity to use
  ICT as they like, patiently watched over by their parents .
   Secondly, we encourage the private sector to implement voluntary activities. By formulating and
  disseminating a voluntary charter on which private companies and other bodies can depend, we will
  visualize a safer and securer internet environment.
   Thirdly, we strive to put together all the knowledge concerning the provision of good conditions for
  the use of the internet. We provide opportunities for discussion to share ideas and further innovation
  among interested parties by collecting and introducing various activities of private companies
  nationwide.
   The Safer Internet of Japan, through such activities, is determined to contribute to providing
  better conditions for internet use through the private initiatives.”

                                                                                                            5
4-2 The Safer Internet of Japan

○ Outcomes of previous activities

 Awareness-raising Activities
 Users, industries and people from education gather in the Safer Internet of Japan. Thus the body can link activities
 conducted so far by each group regarding the improvement of information morale and literacy. The body implements
 all the activities under the shared goal of ‘Motto Good Net (Let’s make the internet better)’ for all the citizens.



 To improve young people’s information morale, etiquette in using the internet, and literacy, the Safer Internet of
 Japan has carried out symposia for parents and teachers and workshop for young people.

 (1)Symposia for Parents and Teachers
          Year               Times held    Participants
          2009               20            6,600
          2010               10            4,000
          2011               12            5,600                          <PTA Symposium in the Kinki district
                                                                          >
 (2)Workshops for Young People
          Year                Times held   Participants
          2009                3            3,000
          2010                3            3,600
          2011                4            4,400             <Workshop Collection>           <Kids Festa in Marunouchi>



                                                                                                                          6
4-3 The Safer Internet of Japan

Topical Research and Investigation
  The Safer Internet of Japan conducts necessary research and investigations to promote voluntary activities in the private
sector related to a safer and securer internet. It also examines new issues as they come up.



    Working Group on Basic Issues
     The body conducted large-scale questionnaires and statistical analysis on the topics of ‘Violence and bullying,’ ‘Sexual
   behavior,’ ’Suicide,’ ‘Over Dependence.’


   Working Group on Child Pornography
     The body deliberately examined the legal and technological issues on the blocking of child pornography images, which is
   one of the measures to limit access to such images. It contributes to providing conditions for effective blocking as a
   voluntary activity of the private sector.


   Working Group on Community Sites
    The body conducted information sharing and examined effective measures regarding various issues arising from the use
  of SNS and other communication sites.


    Working Group on Smart phones                 (From October 2011)

     The body shares information and examines issues on business activities on the safer smart phone use in cases like
   Wireless LAN internet access or application use.


                                                                                                                                7

More Related Content

What's hot

Case Study City Of Brentwood
Case Study City Of BrentwoodCase Study City Of Brentwood
Case Study City Of Brentwood
AVG Technologies
 
Dr bakari presentation
Dr bakari  presentationDr bakari  presentation
Dr bakari presentation
mojtahedi
 
Cloud Computing Summit 2011
Cloud Computing Summit 2011 Cloud Computing Summit 2011
Cloud Computing Summit 2011
ONI_PLC
 
ITU News Issue 1 2007 - Sharing out spectrum for ENG
ITU News Issue 1 2007 - Sharing out spectrum for ENGITU News Issue 1 2007 - Sharing out spectrum for ENG
ITU News Issue 1 2007 - Sharing out spectrum for ENG
Roger G Bunch
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online Protection
Thomas Müller
 
Tutorial 2 bong up cho
Tutorial 2 bong up choTutorial 2 bong up cho
Tutorial 2 bong up cho
egovernment
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYOD
stefriche0199
 
UNICEF Digital Citizenship and Safety- Russia presentation
UNICEF Digital Citizenship and Safety- Russia presentationUNICEF Digital Citizenship and Safety- Russia presentation
UNICEF Digital Citizenship and Safety- Russia presentation
Akshay Sinha
 
UNICEF Ukraine digital landscape exploratory paper
UNICEF Ukraine digital landscape exploratory paperUNICEF Ukraine digital landscape exploratory paper
UNICEF Ukraine digital landscape exploratory paper
Akshay Sinha
 
Enhancing Cybersecurity Readiness Through International Cooperation
Enhancing Cybersecurity Readiness Through International CooperationEnhancing Cybersecurity Readiness Through International Cooperation
Enhancing Cybersecurity Readiness Through International Cooperation
Positive Hack Days
 

What's hot (20)

Case Study City Of Brentwood
Case Study City Of BrentwoodCase Study City Of Brentwood
Case Study City Of Brentwood
 
Connecting the Unconnected - Bridging the Digital Divide Using WiMAX
Connecting the Unconnected - Bridging the Digital Divide Using WiMAXConnecting the Unconnected - Bridging the Digital Divide Using WiMAX
Connecting the Unconnected - Bridging the Digital Divide Using WiMAX
 
Dr bakari presentation
Dr bakari  presentationDr bakari  presentation
Dr bakari presentation
 
Cloud Computing Summit 2011
Cloud Computing Summit 2011 Cloud Computing Summit 2011
Cloud Computing Summit 2011
 
Improve Public Safety
Improve Public SafetyImprove Public Safety
Improve Public Safety
 
Indonesia ICT NewLetter October Edition - English Version
Indonesia ICT NewLetter October Edition - English VersionIndonesia ICT NewLetter October Edition - English Version
Indonesia ICT NewLetter October Edition - English Version
 
ITU News Issue 1 2007 - Sharing out spectrum for ENG
ITU News Issue 1 2007 - Sharing out spectrum for ENGITU News Issue 1 2007 - Sharing out spectrum for ENG
ITU News Issue 1 2007 - Sharing out spectrum for ENG
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online Protection
 
Tutorial 2 bong up cho
Tutorial 2 bong up choTutorial 2 bong up cho
Tutorial 2 bong up cho
 
Children Online Protection
Children Online ProtectionChildren Online Protection
Children Online Protection
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYOD
 
Bab I
Bab IBab I
Bab I
 
UNICEF Digital Citizenship and Safety- Russia presentation
UNICEF Digital Citizenship and Safety- Russia presentationUNICEF Digital Citizenship and Safety- Russia presentation
UNICEF Digital Citizenship and Safety- Russia presentation
 
Fortinet brochure by GTEC CxA
Fortinet brochure by GTEC CxAFortinet brochure by GTEC CxA
Fortinet brochure by GTEC CxA
 
UNICEF Ukraine digital landscape exploratory paper
UNICEF Ukraine digital landscape exploratory paperUNICEF Ukraine digital landscape exploratory paper
UNICEF Ukraine digital landscape exploratory paper
 
Next Generation Broadband In Asia: Strategies to Promote Investment
Next Generation Broadband In Asia: Strategies to Promote InvestmentNext Generation Broadband In Asia: Strategies to Promote Investment
Next Generation Broadband In Asia: Strategies to Promote Investment
 
Enhancing Cybersecurity Readiness Through International Cooperation
Enhancing Cybersecurity Readiness Through International CooperationEnhancing Cybersecurity Readiness Through International Cooperation
Enhancing Cybersecurity Readiness Through International Cooperation
 
Rethinking Responses to Young People and the Internet - beyond Opportunity an...
Rethinking Responses to Young People and the Internet - beyond Opportunity an...Rethinking Responses to Young People and the Internet - beyond Opportunity an...
Rethinking Responses to Young People and the Internet - beyond Opportunity an...
 
History of the Internet in Bhutan by Jichen Thinley [APRICOT 2015]
History of the Internet in Bhutan by Jichen Thinley [APRICOT 2015]History of the Internet in Bhutan by Jichen Thinley [APRICOT 2015]
History of the Internet in Bhutan by Jichen Thinley [APRICOT 2015]
 
Why the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceWhy the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber Defence
 

Viewers also liked

Viewers also liked (17)

Pocetnica proogramiranja (Marina Cicin Sain i Snjezana Babic)
Pocetnica proogramiranja (Marina Cicin Sain i Snjezana Babic)Pocetnica proogramiranja (Marina Cicin Sain i Snjezana Babic)
Pocetnica proogramiranja (Marina Cicin Sain i Snjezana Babic)
 
IzbornaNastava-TK-6.raz.
IzbornaNastava-TK-6.raz.IzbornaNastava-TK-6.raz.
IzbornaNastava-TK-6.raz.
 
Projekt karijernog savjetovanja ucenika (Renato Barisic)
Projekt karijernog savjetovanja ucenika (Renato Barisic)Projekt karijernog savjetovanja ucenika (Renato Barisic)
Projekt karijernog savjetovanja ucenika (Renato Barisic)
 
Sat kodiranja hour of code (Davor Banovic)
Sat kodiranja   hour of code (Davor Banovic)Sat kodiranja   hour of code (Davor Banovic)
Sat kodiranja hour of code (Davor Banovic)
 
Technology and vulnerable users tink palmer (1)
Technology and vulnerable users   tink palmer (1)Technology and vulnerable users   tink palmer (1)
Technology and vulnerable users tink palmer (1)
 
IzbornaNastava-TK-8.raz
IzbornaNastava-TK-8.razIzbornaNastava-TK-8.raz
IzbornaNastava-TK-8.raz
 
Digitalni tragovi
Digitalni tragoviDigitalni tragovi
Digitalni tragovi
 
Privatnost na drustvenim mrezama
Privatnost na drustvenim mrezamaPrivatnost na drustvenim mrezama
Privatnost na drustvenim mrezama
 
Internet novo igralište azoo_2013
Internet novo igralište azoo_2013Internet novo igralište azoo_2013
Internet novo igralište azoo_2013
 
IzbornaNastava-TK-7.raz
IzbornaNastava-TK-7.razIzbornaNastava-TK-7.raz
IzbornaNastava-TK-7.raz
 
Ucenje kroz igru (Maja Barbic)
Ucenje kroz igru (Maja Barbic)Ucenje kroz igru (Maja Barbic)
Ucenje kroz igru (Maja Barbic)
 
Ampeu comenius e_twining
Ampeu comenius e_twiningAmpeu comenius e_twining
Ampeu comenius e_twining
 
Razrednik
Razrednik Razrednik
Razrednik
 
naslov
naslovnaslov
naslov
 
IzbornaNastava-TK-5.raz
IzbornaNastava-TK-5.razIzbornaNastava-TK-5.raz
IzbornaNastava-TK-5.raz
 
Satovi razrednika
Satovi razrednikaSatovi razrednika
Satovi razrednika
 
Radionice za sat razrednika
Radionice za sat razrednikaRadionice za sat razrednika
Radionice za sat razrednika
 

Similar to Japan

Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
ITU
 
Children, mobile phones and safety
Children, mobile phones and safetyChildren, mobile phones and safety
Children, mobile phones and safety
Thomas Müller
 
3.4 itu cop shah
3.4 itu cop shah3.4 itu cop shah
3.4 itu cop shah
Mr Nyak
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
Rizkiawan Achadi
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
ftii
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
ftii
 
CTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina BuettiCTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina Buetti
segughana
 
Challenges of Integrating ICT in Education and the Way Forward(1).docx
Challenges of Integrating ICT in Education and the Way Forward(1).docxChallenges of Integrating ICT in Education and the Way Forward(1).docx
Challenges of Integrating ICT in Education and the Way Forward(1).docx
AbbahEzekielOnucheoj
 

Similar to Japan (20)

Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
 
Children, mobile phones and safety
Children, mobile phones and safetyChildren, mobile phones and safety
Children, mobile phones and safety
 
3.4 itu cop shah
3.4 itu cop shah3.4 itu cop shah
3.4 itu cop shah
 
Report on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfReport on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdf
 
Indonesia Netizen Facts (October - December 2016)
Indonesia Netizen Facts (October - December 2016) Indonesia Netizen Facts (October - December 2016)
Indonesia Netizen Facts (October - December 2016)
 
ICT for Empowerment akjhajharia.ppt
ICT for Empowerment akjhajharia.pptICT for Empowerment akjhajharia.ppt
ICT for Empowerment akjhajharia.ppt
 
Top Cited Articles International Journal of Managing Information Technology (...
Top Cited Articles International Journal of Managing Information Technology (...Top Cited Articles International Journal of Managing Information Technology (...
Top Cited Articles International Journal of Managing Information Technology (...
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureSecurity, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
 
UNESCO Regional Review: Mobile Learning Policies and Mobiles for Teacher Deve...
UNESCO Regional Review: Mobile Learning Policies and Mobiles for Teacher Deve...UNESCO Regional Review: Mobile Learning Policies and Mobiles for Teacher Deve...
UNESCO Regional Review: Mobile Learning Policies and Mobiles for Teacher Deve...
 
CTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina BuettiCTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina Buetti
 
GROUP-1 (1).pdf
GROUP-1 (1).pdfGROUP-1 (1).pdf
GROUP-1 (1).pdf
 
Challenges of Integrating ICT in Education and the Way Forward(1).docx
Challenges of Integrating ICT in Education and the Way Forward(1).docxChallenges of Integrating ICT in Education and the Way Forward(1).docx
Challenges of Integrating ICT in Education and the Way Forward(1).docx
 
DeepNines CIPA Whitepaper
DeepNines CIPA WhitepaperDeepNines CIPA Whitepaper
DeepNines CIPA Whitepaper
 
ICT and Disaster Risk Reduction
ICT and Disaster Risk ReductionICT and Disaster Risk Reduction
ICT and Disaster Risk Reduction
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 
A comparative analysis of cost and benefit of using information technology in...
A comparative analysis of cost and benefit of using information technology in...A comparative analysis of cost and benefit of using information technology in...
A comparative analysis of cost and benefit of using information technology in...
 
Schokland Agreement: IICD and partners making a difference
Schokland Agreement: IICD and partners making a differenceSchokland Agreement: IICD and partners making a difference
Schokland Agreement: IICD and partners making a difference
 

More from Agencija za odgoj i obrazovanje - Education and Teacher Training Agency

More from Agencija za odgoj i obrazovanje - Education and Teacher Training Agency (17)

Info@Edu 4_Trogir_2015
Info@Edu 4_Trogir_2015Info@Edu 4_Trogir_2015
Info@Edu 4_Trogir_2015
 
DaniTehnickeKulture_Trogir_2015.
DaniTehnickeKulture_Trogir_2015.DaniTehnickeKulture_Trogir_2015.
DaniTehnickeKulture_Trogir_2015.
 
Office mix (Zeljka Knezovic)
Office mix (Zeljka Knezovic)Office mix (Zeljka Knezovic)
Office mix (Zeljka Knezovic)
 
Office 365 za os i ss (Zeljka Knezovic)
Office 365 za os i ss (Zeljka Knezovic)Office 365 za os i ss (Zeljka Knezovic)
Office 365 za os i ss (Zeljka Knezovic)
 
Mema (Marina icin Sain i Snjezana Babic)
Mema (Marina icin Sain i Snjezana Babic)Mema (Marina icin Sain i Snjezana Babic)
Mema (Marina icin Sain i Snjezana Babic)
 
Ict4 scf (Darko Vencl)
Ict4 scf (Darko Vencl)Ict4 scf (Darko Vencl)
Ict4 scf (Darko Vencl)
 
Ict curricula (Viktorija Hrzica)
Ict curricula (Viktorija Hrzica)Ict curricula (Viktorija Hrzica)
Ict curricula (Viktorija Hrzica)
 
Code eu (Ivana Ruzic)
Code eu (Ivana Ruzic)Code eu (Ivana Ruzic)
Code eu (Ivana Ruzic)
 
Jezicni savjeti strucni ispit
Jezicni savjeti    strucni ispitJezicni savjeti    strucni ispit
Jezicni savjeti strucni ispit
 
GOO u nastavnim temama iz informatike u srednjoj skoli
GOO u nastavnim temama iz informatike u srednjoj skoliGOO u nastavnim temama iz informatike u srednjoj skoli
GOO u nastavnim temama iz informatike u srednjoj skoli
 
GOO u nastavnim temama iz informatike u osnovnoj skoli
GOO u nastavnim temama iz informatike u osnovnoj skoliGOO u nastavnim temama iz informatike u osnovnoj skoli
GOO u nastavnim temama iz informatike u osnovnoj skoli
 
Pisana priprava za polaganje SI primjer
Pisana priprava za polaganje SI primjer Pisana priprava za polaganje SI primjer
Pisana priprava za polaganje SI primjer
 
Vh mentorstvo pripravniku osijek, 7.1.2014-urucak
Vh mentorstvo pripravniku   osijek, 7.1.2014-urucakVh mentorstvo pripravniku   osijek, 7.1.2014-urucak
Vh mentorstvo pripravniku osijek, 7.1.2014-urucak
 
Vh mentorstvo pripravniku osijek, 7.1.2014
Vh mentorstvo pripravniku   osijek, 7.1.2014Vh mentorstvo pripravniku   osijek, 7.1.2014
Vh mentorstvo pripravniku osijek, 7.1.2014
 
Sid 2013-rn
Sid 2013-rnSid 2013-rn
Sid 2013-rn
 
Sid 2013-kampanja
Sid 2013-kampanjaSid 2013-kampanja
Sid 2013-kampanja
 
National cert azoo
National cert azooNational cert azoo
National cert azoo
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 

Recently uploaded (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 

Japan

  • 1. Undertakings toward developing a safe internet environment for children in Japan Yuji Sonoda Deputy Director, Telecommunications Consumer Policy Division Telecommunications Bureau Ministry of Internal Affairs and Communications JAPAN
  • 2. 1 Main efforts by concerned parties ーAct on Development of Internet Environment for Young Peopleー Act on Development of Internet Environment for Young People ◆The Act on Development of an Environment that Provides Safe and Secure Internet Use for Young People (“Act on Development of Internet Environment for Young People”) was enforced on April 1, 2009. ◆By improving ICT literacy and promoting filtering, etc. as 2 pillars for developing a safe internet environment for young people, concrete activities by both the government and private sector will be promoted. Fundamental principles Initiative by the private Improving ICT literacy Promoting filtering, etc. sector (with Government support) Government Private sector Mobile phone The Headquarters for the Promotion of carriers Development and Support for Children and Internet service Mandatory supply of filtering services (with Young People providers some conditions) PC makers Formulation Obligation to make Filtering Young people Support efforts for developers/ development Basic plan suppliers -Basic policy -Education and awareness raising concerning the Obligation to make adequate ability to utilize the Internet Server efforts to prevent -Improvement of performance/diffusion of administrators browsing of harmful information filtering services -Support for the private sector’s efforts, etc. Obligation to make Other parties efforts for education, concerned etc. 1
  • 3. 2 Main initiatives of the MIC as regards preparation of an Internet environment for young people ○Improving ICT literacy In order to overcome the risks that ICT use entails and ensure that young people can enjoy ICT use as much as possible, it is necessary to improve ICT literacy among young people and their parents. Especially in the age of the smart phone, it is essential that users acquire an even higher level of literacy. Educational courses have been implemented mainly for parents and teachers (e-net safety courses) across the nation in cooperation with the Ministry of Education, Culture, Sports, Science and Technology, and telecommunication-related organizations, etc. (“e-Net Caravan) (Implementation result in FY2011: 900) The dissemination and educational activities (such as symposiums and workshops) of “The Safer Internet of Japan” have been supported. (Implementation result in FY2011: 16) ○Promoting improvement and diffusion of filtering Restricting access to internet content that is harmful to young people is primarily a parental role. However, in the case of mobile phones, which are difficult for parents to monitor, filtering is applied unless the parents request non-use of filtering.  cooperation with mobile phone carriers and third party organizations that provide screening of sites In harmful to young people, the supply of diverse filtering services, such as customized functions of mobile phone filtering, will be promoted. Based on the agreement among related ministries, the diffusion of filtering will be promoted by requiring mobile phone carriers to reinforce explanations to parents, etc. (Number of users of mobile phone filtering service as of the end of December 2011: approx. 8.23 million) 2
  • 4. 3-1 Literacy indicator for young people’s safe and secure utilization of the internet -ILAS (Internet Literacy Assessment indicator for Students)- ILAS ILAS Abilitiessrequired Analysis of the pre-test (year 2011) Digitalization All: approximately 550 young people of the Average score:73 out of 100 abilities by General the test 100 1a Illegal content 3b Security 0 3a Privacy risks 1b Harmful content 2c Inappropriate 2a Inappropriate usage 2b Improper contact transactions Comparison and analysis of abilities digitalized 3
  • 5. 3-2 The development process of ILAS Online Risk Categorization Literacy to bebe acquired (examples) 《literacy to acquired》(examples) (based on OECD report’s categorization) Major Category Medium Category Sub-Category Knowledge(●) Behavior(○) [Principles] I A Copyrights, portrait ●Understand that smartphones are rights, criminal Illegal & Illegal content threats, dating sites, advanced mobile phones with computer-level advanced information processing functions, Harmful etc. and that many functions are offered via Content Risks B Content offensive to applications (software). public order and ●Understand that some smartphone Harmful content morality, adults-only applications automatically send out private content, etc. and/or personal information. ●Understand that when downloading ○Download applications after II A Libel smartphone applications, confirming their trustworthiness, etc. ●one must confirm the trustworthiness and ○Confirm what information applications Inappropriate Inappropriate Anonymous SNS safety of the site and application supplier. access, and take appropriate measures Usage Risks Contact Non-anonymous SNS (limit accessible information, etc.). Spam Applications (*) B Fraud, sale of improper products, Improper Users can freely install applications to add functionality to their smartphone. etc. Transactions Which of the following items must the most amount of care be given to when C Excess Internet use installing applications? Inappropriate Dependence (1) The relationship between the application’s operational requirements and Usage the items that appear under “access permission” III A Leakage of private (2) Evaluation from other users displayed on the installation screen and/or personal Privacy & Privacy Risks information, Security Risks inappropriate (3) Whether the application has been introduced in magazine articles, etc. disclosure B Impersonation through unauthorized (4) The application’s rank in rankings published on the internet Security Risks access, etc. Viruses (*) Smartphone applications 4
  • 6. 4-1 The Safer Internet of Japan 《Key comments of the Safer Internet of Japan (http://good-net.jp/ )》 “The Safer Internet of Japan carries out three key activities which are indispensable for providing conditions for safer use of the internet. Firstly, we promote comprehensive activities to improve the ICT literacy of users, which include awareness raising activities concerning the merits of the internet as well as the risks that using the internet entails. Through such activities, we contribute to fostering children with the capacity to use ICT as they like, patiently watched over by their parents . Secondly, we encourage the private sector to implement voluntary activities. By formulating and disseminating a voluntary charter on which private companies and other bodies can depend, we will visualize a safer and securer internet environment. Thirdly, we strive to put together all the knowledge concerning the provision of good conditions for the use of the internet. We provide opportunities for discussion to share ideas and further innovation among interested parties by collecting and introducing various activities of private companies nationwide. The Safer Internet of Japan, through such activities, is determined to contribute to providing better conditions for internet use through the private initiatives.” 5
  • 7. 4-2 The Safer Internet of Japan ○ Outcomes of previous activities Awareness-raising Activities Users, industries and people from education gather in the Safer Internet of Japan. Thus the body can link activities conducted so far by each group regarding the improvement of information morale and literacy. The body implements all the activities under the shared goal of ‘Motto Good Net (Let’s make the internet better)’ for all the citizens. To improve young people’s information morale, etiquette in using the internet, and literacy, the Safer Internet of Japan has carried out symposia for parents and teachers and workshop for young people. (1)Symposia for Parents and Teachers Year Times held Participants 2009 20 6,600 2010 10 4,000 2011 12 5,600 <PTA Symposium in the Kinki district > (2)Workshops for Young People Year Times held Participants 2009 3 3,000 2010 3 3,600 2011 4 4,400 <Workshop Collection> <Kids Festa in Marunouchi> 6
  • 8. 4-3 The Safer Internet of Japan Topical Research and Investigation The Safer Internet of Japan conducts necessary research and investigations to promote voluntary activities in the private sector related to a safer and securer internet. It also examines new issues as they come up. Working Group on Basic Issues The body conducted large-scale questionnaires and statistical analysis on the topics of ‘Violence and bullying,’ ‘Sexual behavior,’ ’Suicide,’ ‘Over Dependence.’ Working Group on Child Pornography The body deliberately examined the legal and technological issues on the blocking of child pornography images, which is one of the measures to limit access to such images. It contributes to providing conditions for effective blocking as a voluntary activity of the private sector. Working Group on Community Sites The body conducted information sharing and examined effective measures regarding various issues arising from the use of SNS and other communication sites. Working Group on Smart phones (From October 2011) The body shares information and examines issues on business activities on the safer smart phone use in cases like Wireless LAN internet access or application use. 7