SlideShare a Scribd company logo
1 of 9
A (very) brief history of  US Internet safety Anne Collier Co-Director ConnectSafely.org
Internet safety laws CDA  – passed 1996, struck down in 1997 by U.S. Supreme Court  in unanimous decision  COPA  – passed in 1998, immediately blocked by a federal court (only the beginning of its story) CIPA  – became law in 2000; challenged in courts. Supreme Court upheld but  modified  CIPA in 2004.
Internet safety education ,[object Object],[object Object],[object Object]
Decreased  exposure to harm ,[object Object],[object Object]
EU Kids Online: Risk vs. harm
US’s social-media technopanic
2008 ‘ Berkman ’ national task force ,[object Object],[object Object],[object Object],[object Object],[object Object]
“ Promote digital citizenship in  pre-K-12 education as a national priority.” –  Youth Safety on a Living Internet: Report of the Online Safety & Technology Working Group Our report to Congress,  June 2010...
Thank you! ,[object Object],[object Object]

More Related Content

Similar to Brief history of US Internet safety laws and education

Panic in the Classroom!: Youth, internet & the mobilization of risk via fede...
Panic in the Classroom!: Youth, internet &  the mobilization of risk via fede...Panic in the Classroom!: Youth, internet &  the mobilization of risk via fede...
Panic in the Classroom!: Youth, internet & the mobilization of risk via fede...Jacqueline Vickery
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Larry Magid
 
Children and Online Safety
Children and Online SafetyChildren and Online Safety
Children and Online Safetyalandang
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
Pornography on the Internet
Pornography on the Internet Pornography on the Internet
Pornography on the Internet yadith_
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internetryangregory55
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internetryangregory55
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersMemorial University
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationdh24gold
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
How to protect yourself in e world?
How to protect yourself in e world? How to protect yourself in e world?
How to protect yourself in e world? Dipak Parmar
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 

Similar to Brief history of US Internet safety laws and education (20)

Panic in the Classroom!: Youth, internet & the mobilization of risk via fede...
Panic in the Classroom!: Youth, internet &  the mobilization of risk via fede...Panic in the Classroom!: Youth, internet &  the mobilization of risk via fede...
Panic in the Classroom!: Youth, internet & the mobilization of risk via fede...
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...
 
Children and Online Safety
Children and Online SafetyChildren and Online Safety
Children and Online Safety
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
Pornography on the Internet
Pornography on the Internet Pornography on the Internet
Pornography on the Internet
 
Porno
PornoPorno
Porno
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internet
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internet
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
NSBA2010
NSBA2010NSBA2010
NSBA2010
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
David finkelhor
David finkelhorDavid finkelhor
David finkelhor
 
ISC Presentation
ISC PresentationISC Presentation
ISC Presentation
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
How to protect yourself in e world?
How to protect yourself in e world? How to protect yourself in e world?
How to protect yourself in e world?
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 

More from ConnectSafely

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for SeniorsConnectSafely
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship RedefinedConnectSafely
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawConnectSafely
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyConnectSafely
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsConnectSafely
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentConnectSafely
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some ContextConnectSafely
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenshipConnectSafely
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidConnectSafely
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenshipConnectSafely
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, brieflyConnectSafely
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspectiveConnectSafely
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely
 

More from ConnectSafely (18)

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook Privacy
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
App Privacy
App PrivacyApp Privacy
App Privacy
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some Context
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenship
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
 
Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenship
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Brief history of US Internet safety laws and education

  • 1. A (very) brief history of US Internet safety Anne Collier Co-Director ConnectSafely.org
  • 2. Internet safety laws CDA – passed 1996, struck down in 1997 by U.S. Supreme Court in unanimous decision COPA – passed in 1998, immediately blocked by a federal court (only the beginning of its story) CIPA – became law in 2000; challenged in courts. Supreme Court upheld but modified CIPA in 2004.
  • 3.
  • 4.
  • 5. EU Kids Online: Risk vs. harm
  • 7.
  • 8. “ Promote digital citizenship in pre-K-12 education as a national priority.” – Youth Safety on a Living Internet: Report of the Online Safety & Technology Working Group Our report to Congress, June 2010...
  • 9.

Editor's Notes

  1. .
  2. Communications Decency Act (see slide) – definition of indecency was vague; law threatened the First Amendment. [One of the legislative aides who helped write the law told me in the late ‘90s that, with this law, Congress was testing the Supreme Court – seeking definition and the court’s views on content in a new media environment.] Child Online Protection Act (In reaction to Supreme Court decision, Congress passed COPA). It went back and forth between the U.S. Supreme Court and the federal court of appeals in Philadelphia several times (the Supreme Court sent it back twice). The second time the Supreme Court sent it back to the Phil. Court for more work, in a 5-4 decision, it asked the lower court to see if technology (such as filtering) hadn't improved enough since the law was first passed in 1998 to take care of the child-protection problem without a law having to intervene (this will be the third time the 3rd Circuit Court of Appeals has considered COPA). Federal court issued a permanent injunction against the law in 2007, deciding basically that multiple filtering products and services available to American families made any such law unnecessary and unconstitutional. The court said filters had become easy to use, were easy to obtain, and the technology had improved a lot since '98, when the law was passed. Children’s Internet Protection Act – Introduced in Congress in 1999 and signed into law by President Clinton in 2000. Challenged by the American Civil Liberties Union, which argued that CIPA violated the Constitution by requiring public libraries to use filters on public computers. The Supreme Court upheld the law in 2004 but modified it so that if a patron asks, the library must remove the filter. 
  3. As our laws and courts have shown, while the Internet makes communication, research, and access infinitely more convenient, it of course complicates things, one of them being a historically unprecedented clash between child protection and freedom of speech. And both are As for online-safety education…. The first youth online risk research was published in 2000. So for the first five years, US safety education and messaging were based on a lot of speculation and some common sense . The most common form of education was “Internet safety nights” in schools, usually featuring a law enforcement officer. This was unfortunate, because – though these police officers had the best of intentions – they were presenting to parents very scary information based on the worst criminal cases and behavior. The problem with this was that the information did not reflect most young people’s experiences online. Research began emerging in 2000 , but – because the education up to that point was so negative – based on worst-case scenarios with no data to back them up – the research was widely misrepresented by the news media and misunderstood by the public. For example, the “1 in every 5 children” figure became very famous. It suggested that 20% of US children received unwanted sexual solicitations from online predators, when in fact the research – by the CCRC – had found that only 1% of youth had received an aggressive solicitation from an adult online, and none of the solicitations had led to any harm or even contact in “real life.” In 2002, the first national Internet-safety task force (led by former US A.G. Richard Thornburgh) released its report, “Youth, Pornography & the Internet,” recommending that education, not filtering be the first priority. It used the swimming-pool metaphor. The report said that it’s much more important and protective to teach children how to swim and when to avoid pools than to rely heavily on fences around pools – because a child who knows how to swim is much less likely to be harmed than a child who doesn’t. http ://www.netfamilynews.org/nl030905.html ). The British ed agency Ofsted made the same finding in 2010 report on filtering in UK schools (http://www.netfamilynews.org/?p=28736).
  4. When in fact , we now know from research that – since the beginning of the World Wide Web – the US has seen declines in almost all the offline social problem indicators for youth, according to the director of the Crimes Against Children Research Center at the U. of N.H.…. Just released late last year: 12-to-17-year-olds’ unwanted exposure to pornography down from 34% in 2000 to 23% in 2010 – CCRC (http://www.netfamilynews.org/?p=31073) According to the lead author of the first national youth-online-risk study in 2000, David Finkelhor, we’ve seen declines in almost all the youth social-problem indicators since the arrival of the World Wide Web (http://www.netfamilynews.org/?p=30220): Sexual abuse of minors is down ( 58% from 1992 to 2008) Teen sexual intercourse and pregnancy are down. The teen suicide rate “has dropped dramatically.” The number of crimes committed by young people has “gone down dramatically in the United States.” The only two areas where the US has seen increases: obesity and children living in poverty. Certainly he’s not saying the Internet is the CAUSE of these improvements, but equally certainly it’s also not the cause of more harm, which is the way the Internet has been portrayed for 15 years.
  5. The EU Kids Online researchers make an important distinction between risk and harm. They wrote, “ As with riding a bike or crossing the road, everyday activities online carry a risk of harm, but this harm is far from inevitable – indeed, it is fairly rare. ” Certainly there are risks online, just as there are offline. We ’ re aware of the risks, but we have a sense of proportion. We know the risk is there but it doesn ’ t paralyze us. We don ’ t stop crossing streets, cooking, or driving cars. We also know from child-development experts that risk assessment is part of growing up – part of brain development. If we really tried to remove all risk from young people’s lives, online or offline, we would actually be stunting their development. Instead, we need to be there for them, help them avoid taking extraordinary risks or making really stupid mistakes but also let them sort some things out on their own and Note that 5% felt “very upset” from being exposed to sexual images – this might be seen as equivalent to unhealthy exposure. Risk assessment is part of child and adolescent development. August 2011: EU Kids Online’s “Patterns of Risk & Safety Online” – 9-to-16-year-olds in 25 European countries (a sample of 25,000 young people) <http://www.netfamilynews.org/?p=30829>
  6. But back to 2005, when MySpace began to grow very fast. So did a lot of fear concerning online social networking…. 2006 Perfect storm of parental fear dev’t – – MySpace coming out of nowhere where adults were concerned ; MySpace ’s exponential growth ; media hype based on media ignorance about social media; nat ’ l TV program called “To Catch a Predator” was VERY popular; & the mid-term election. So why is fear-based education wrong? Because it paralyzes parents and leaves children on their own online…. One, It suggests that there are no solutions – the problem is bigger than me, than my family, and there’s nothing I can do to help my child. Somehow the conclusion becomes, gov’t needs to pass protective laws, when laws can’t protect children who are the producers of a user-driven global medium that they update with expressions of their lives 24/7, 7 days a week, a medium that is now social, or behavioral. Two, fear too often causes overreaction; a fearful parents unplugs the computer or bans the Internet. And not only do our children love digital technology and media, these technologies are necessary tools for our children’s social, academic, and professional success. So what happens? Children want to get as far away from scared parents as possible, They go underground online, so that scared parents are no longer part of their online and mobile activities – right when parents’ care and interest is more important to their children than ever. It’s much better to give parents the accurate, research-based information that their children’s internet experiences are just part of their everyday lives, mostly school life – not something new and unknown that parents don’t know how to deal with. We need to inform and empower parents as well as young people.
  7. So 49 state attorneys general threatened to sue MySpace; Harvard Law School’s Berkman Center for Internet & Society played host to a national task force formed by MySpace as basically a settlement out of court. The attorneys general had a prescription before there was a diagnosis: age verification. So we were charged with finding the best age-verification solutions. Part of our work was a review of the research literature on youth online risk – the start of a diagnosis of the youth-online-risk conditions: Here are its key findings (slide), which really advanced all of our knowledge. Report: http://cyber.law.harvard.edu/pubrelease/isttf /
  8. Larry and I also served on the next task force. We too recommended better education for the public about both online risk AND young people’s use of social media. And we wrote about the value of a broad toolbox of protective technologies for parents to choose from, based on children’s constantly changing development and online activities as well as the continuously changing nature of technology. Our task force did not recommend any new laws because laws can’t regulate child development and behavior, which is largely what determines children’s experiences on the Internet.