Technology has progressed so fast that life and technology are now intertwined. Kids are now introduced to technology as early as a year old or maybe even younger. Soon they will come to know about social media websites and it is the duty of their parents to teach them about privacy, security, and what information to show on the internet.
A short informational presentation for educators on the role and responsiblity they have to educate students on Cyber Safety. Includes link to lessons.
Presentation given at Pantego Christian Academy by the PCA Technology Department to middle and high school students during their enrichment series. Principles covered include: Digital Golden Rule, Digital Consciousness, and Personal Security in the Global Village
This presentation was made by my 8 year old son, Shounak Ray Chaudhuri for his class sharing activity. It shows what is cyber security and how to protect data flowing around in the internet.
The presentation I created for students to make them aware and how to be more precautious to deal with day to day cyberattacks under Teach for India Volunteers.
Technology has progressed so fast that life and technology are now intertwined. Kids are now introduced to technology as early as a year old or maybe even younger. Soon they will come to know about social media websites and it is the duty of their parents to teach them about privacy, security, and what information to show on the internet.
A short informational presentation for educators on the role and responsiblity they have to educate students on Cyber Safety. Includes link to lessons.
Presentation given at Pantego Christian Academy by the PCA Technology Department to middle and high school students during their enrichment series. Principles covered include: Digital Golden Rule, Digital Consciousness, and Personal Security in the Global Village
This presentation was made by my 8 year old son, Shounak Ray Chaudhuri for his class sharing activity. It shows what is cyber security and how to protect data flowing around in the internet.
The presentation I created for students to make them aware and how to be more precautious to deal with day to day cyberattacks under Teach for India Volunteers.
Basic tips for staying safe and protecting personal privacy on popular social media sites, including Facebook, Twitter, and Instagram. Designed for casual users of social media.
Studies and analysis the aspects of confidentiality, integrity and availability of information(data) with regard to the organisation. Identify exposure to accidental or intentional , destruction, disclosure , modification or interruption of information that may cause serious financial and or information loss Study of cyber security and incident response and has become necessary because attacks frequently cause the compromise of personal and business data. Heightened incidents concerns about national security and exposure of personally identifiable information. Racing awareness of the possible effects of computer barred attacks is the other reason.
Internet do's and don'ts. Kids safety on the Internet Queens Library
Children will learn about Internet dangers and following procedures for carefully navigating the internet. This presentation was used as a teaching tool for my computer class. Ages 7-13. Please like & download my Slides :) Leave comments also .... thanks
When it comes to social media, most of us expect that we are in control of what we share about ourselves, and who we share with. In this hands-on workshop, we will dispel common myths and misconception about social media privacy as well as discuss step-by-step instructions for securing out social media selves.
It is about the different threats that can be obtained through accessing the internet, the different government provisions and how to stay safe online.
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Larry Magid
A newly revised Online Safety 3.0 talk prepared for the Mediterranean Association of International Schools by ConnectSafely.org co-director and SafeKids.com founder Larry Magid
Basic tips for staying safe and protecting personal privacy on popular social media sites, including Facebook, Twitter, and Instagram. Designed for casual users of social media.
Studies and analysis the aspects of confidentiality, integrity and availability of information(data) with regard to the organisation. Identify exposure to accidental or intentional , destruction, disclosure , modification or interruption of information that may cause serious financial and or information loss Study of cyber security and incident response and has become necessary because attacks frequently cause the compromise of personal and business data. Heightened incidents concerns about national security and exposure of personally identifiable information. Racing awareness of the possible effects of computer barred attacks is the other reason.
Internet do's and don'ts. Kids safety on the Internet Queens Library
Children will learn about Internet dangers and following procedures for carefully navigating the internet. This presentation was used as a teaching tool for my computer class. Ages 7-13. Please like & download my Slides :) Leave comments also .... thanks
When it comes to social media, most of us expect that we are in control of what we share about ourselves, and who we share with. In this hands-on workshop, we will dispel common myths and misconception about social media privacy as well as discuss step-by-step instructions for securing out social media selves.
It is about the different threats that can be obtained through accessing the internet, the different government provisions and how to stay safe online.
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Larry Magid
A newly revised Online Safety 3.0 talk prepared for the Mediterranean Association of International Schools by ConnectSafely.org co-director and SafeKids.com founder Larry Magid
Child Internet Safety summit: online safety and inspectionOfsted
Presentation covering the results of a survey of online safety practice carried out during all HMI-led section 5 school inspections during March 2015; and how online safety will be inspected in all education remits form September 2015.
Presented by David Brown HMI National Lead for Computing at Child Internet Safety summit (http://www.childinternetsafety.co.uk/summit/programme) on 3 July 2015.
@DavidBrownHMI; #CISafe; @childinternetsafe.
Twitter for startups - Turning Your Followers in to CustomersAmit Panchal
How to Use Twitter for Startups? How to get more followers & Turning Your Them into customers. Please feel free to Tweet me at @AmitHPanchal if you need any further information.
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyMariam Sb
Hands-On Training: Hacks for Cyber-Safety on the Web for Women and Children
Workshop by Catalyst Woman Consultancy
At Cybersecure Pakistan Conference 2015
#CSP15
NUST-SEECS, Islamabad, Pakistan
Saturday, April 11th, 2015
Link: http://cybersecurepakistan.com/sessions/workshop-women-centric-cyber-security/
A Parent’s Guide to Overcoming Common Obstacles for Kids and Outdoor Play.
National Wildlife Federation (NWF) created the Be Out There movement to give back to American children what they don’t even know they have lost: their connection to the natural world. In the process, NWF aims to help reverse alarming health trends and help families raise happier, healthier children. Signs everywhere show the spirit of the movement taking hold.
For more information, go to www.beoutthere.org/join
Sexual assault is a crime of power and control. The term sexual assault refers to sexual contact or behavior that occurs without explicit consent of the victim. Some forms of sexual assault include: Penetration of the victim's body, also known as rape. Attempted rape.
Mythologies of intergovernmental cooperation (and competition) in CanadaDavid Péloquin
In thinking about policy coordination in an intergovernmental context, it is important to step back from time to time for a bit of perspective. In Canada – to an even greater degree than in other federal countries – both the federal and provincial orders of government are typically involved in most policy areas and policy-making is often (and perhaps inherently) competitive. This presentation:
(1) argues that intergovernmental cooperation needs to be seen as a product of that competitive dynamic, rather than as its negation;
(2) identifies how the need for cooperation varies across policy areas and the variety of different forms that cooperation can take;
(3) explores implications for horizontal policy coordination of the emphasis placed on clarification of roles and responsibilities and on performance-based accountability.
Everybody wants to track you and nobody wants to get tracked!
Who tracks you online?
How is tracking done?
Why are you being tracked and how that data is used?
What are some steps you can take to prevent tracking and protect your online privacy.
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
This is not your tired old Internet Safety lecture, but a presentation by ConnectSafely.org CEO Larry Magid that emphasizes youth rights as well as responsibliities and the importance of media literacy
Cyberbullying-Identification-Prevention-Response.pdf
1
Cyberbullying:
Identification,
Prevention,
& Response
Sameer Hinduja, Ph.D.
Justin W. Patchin, Ph.D.
Cyberbullying Research Center
October 2014
2
ids have been bullying each other for gener-
ations. The latest generation, however, has
been able to utilize technology to expand
their reach and the extent of their harm. This phe-
nomenon is being called cyberbullying, defined as:
“willful and repeated harm inflicted through the use
of computers, cell phones, and other electronic de-
vices.” Basically, we are referring to incidents where
adolescents use technology to harass, threaten, hu-
miliate, or otherwise hassle their peers. For exam-
ple, youth can send hurtful text messages to others
or spread rumors using smartphones or tablets.
Teens have also created web pages, videos, and
profiles on social media platforms making fun of
others. With mobile devices, adolescents have tak-
en pictures in a bedroom, a bathroom, or another
location where privacy is expected, and posted or
distributed them online. Others have recorded un-
authorized videos of other kids and uploaded them
for the world to see, rate, tag, and discuss. Still oth-
ers are embracing anonymous apps or chat func-
tionality on gaming networks to tear down or hu-
miliate others.
What are some negative effects that cyber-
bullying can have on a person?
There are many detrimental outcomes associated
with cyberbullying that reach into the real world.
First, many targets report feeling depressed, sad,
angry, and frustrated. As one teenager stated: “It
makes me hurt both physically and mentally. It
scares me and takes away all my confidence. It
makes me feel sick and worthless.” Those who are
victimized by cyberbullying also reveal that they are
often afraid or embarrassed to go to school. In ad-
dition, research has revealed a link between cyber-
bullying and low self-esteem, family problems, aca-
demic difficulties, school violence, and various de-
linquent behaviors. Finally, cyberbullied youth also
report having suicidal thoughts, and there have
been a number of examples in the United States
and abroad where youth who were victimized end-
ed up taking their own lives.
Where does cyberbullying commonly occur?
Cyberbullying occurs across a variety of venues and
mediums in cyberspace, and it shouldn’t come as a
surprise that it occurs most often where teenagers
congregate. Initially, many kids hung out in chat
rooms, and as a result that is where most harass-
ment took place. In recent years, most youth are
have been drawn to social media (such as Insta-
gram, Snapchat, and Twitter) and video-sharing
sites (such as YouTube). This trend has led to in-
creased reports of cyberbullying occurring in those
environments. Voice chat, textual chat, and texting
via phones or tablets also can provide an environ-
ment in whi.
This was a presentation to 9th graders to help them explore how to take control of their online persona. Examples reach back in time and project into the future when things like augmented reality amplify the information we put online.
Social Media: To Fear or Not - What's the Facts? Presented @ Atlantis Rising Campus in Second Life for Bernajean Porter. See AtlantisSeekers.ning.com for more details and information to join us in more conversations.
Everything I know about protecting children I learned from a visit to Nairobi...Larry Magid
ConnectSafely.org co-director Larry Magid's presentation at the child protection panel at the Internet Governance Forum (IGF) in Nairobi, Kenya. September 30, 2011
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
A talk for middle school and high school students by ConnectSafely.org's Larry Magid about digital literacy, digital citizenship, cyberbullying, sexting and how to thrive online.
Designed for community leaders, Parenting the Net Generation addresses family interests and concerns on issues that arise when young people go online. The workshop touches briefly on many key Internet issues including safety, privacy, marketing, ethics and cyberbullying, and evaluation of online information.
Youth are getting exposed to high‐tech devices such assmart phones and internet at earlier ages. While there are many benefits of these devices,they have opened up opportunities for others to negatively exploit users. This workshopwill educate educators and youth about these predatory activities, ways to avoid them, andwhat to do when you or others encounter them.
A comprehensive guide on cyberbullying for parents, teachers & children.
You can also read this on our website here: https://homeguides.co.uk/cyberbullying/
Similar to Online Safety 3.0 - Presentation for Parents and Teachers (20)
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
3. Kids! I don't know what's wrong with these kids today! Kids! Who can understand anything they say? Kids! They a disobedient, disrespectful oafs!Noisy, crazy, dirty, lazy, loafers! While we're on the subject: Kids! You can talk and talk till your face is blue! Kids! But they still just do what they want to do! Why can't they be like we were,Perfect in every way? What's the matter with kids today? Kids from Bye Bye Birdie, 1963. Lyrics by Lee Adams
4. Evolution of Online Safety Children as victims: 1.0 (most of the 90’s) Pornography & predators: Protecting children from bad adults. Children as consumers of information, not as creators and based on assumptions of risk, not actual research 2.0(around 2007) Protecting children from peers. Recognizing that kids can create content harm other kids and themselves. Cyberbullying & posting inappropriate or dangerous content
5. Empowering approach Research-based, not fear-based, so relevant Flexible, layered – not one-size-fits-all Respectful of youth – stakeholders in positive outcomes, not just potential victims Positive: Not just safety from (bad outcomes) but safety for good outcomes Comprehensive = Incorporates safety, security, citizenship, and research/information literacy From Online Safety 3.0 (os3.connectsafely.org)
6. 4 Types of Online Safety Physical safety – freedom from physical harm Psychological safety – freedom from cruelty, harassment, and exposure to potentially disturbing material Reputational and legal safety – freedom from unwanted social, academic, professional, and legal consequences that could affect you for a lifetime Identity, property, and community safety – freedom from theft of identity & property Items 1 through 3 are from Anne Collier’s NetFamilyNews
7. The ‘Net effect’ For the most part,the online world is pretty much like the “real world,” but there are a few special things to think about It can be permanent Material can be copied and pasted Lots of people can see it You don’t know for sure who’s seeing it AND Disinhibition: Lack of visual cues reducesempathy Source: adapted from danahboyd: Taken out of Context, 2008
19. The rise of the web has not resulted in increased victimization of children 51% Decline (during the period of the Web’s existence) Blue line represents 58% decline in child sex abuse from 1992 to 2008 Source: Updated Trends in Child Maltreatment, 2008: Finkelhor, Jones and Shattuck: Crimes Against Children Research Center
38. 15% received a “sext”Source: Pew Internet & American Life Project: Dec. 2009
39. Why do kids send ‘sext’ messages? Teen “romance” – expression of shared intimacy with partner Flirting Showing off (party behavior) Impulsive risk-taking Peer pressure Revenge Bullying or intimidation Blackmail
40. Non-legal consequences Emotional or reputational damage School discipline Invisible viewership – can be forwarded to anyone Potentially searchable on the Web, possibly forever
41. Legal consequences in US Potential for child-porn production, distribution, or possession charges Could be required by state law to register as a sex offender
42. Kids and Media Kids today spend an average of 7 hours and 38 minutes a day consuming “Entertainment media." * If you consider that kids are multi-tasking, it's actually closer to 11 hours* But before you react, consider how the are actually using it *Source: Generation M2: Media in the Lives of 8- to 18-Year-Olds. Kaiser Family Foundation, 2010
43. What’s a Parent to Do Try to be a good role model Have dinner together as a family Encourage a balanced life that includes outdoor activities Recognize the difference between heavy use & excessive/obsessive use Be nearby while they’re doing homework Consider banning tech devices from bedroom after bedtime Recognize that obsessive technology use could be a symptom of other issues Set limits and consider using parental controls built into game consoles and PC operating systems
51. Viral: (Hurtful actions of a cyberbully are viral; that is, a large number of people (at school, in the neighborhood, in the city, in the world!) can be involved in a cyber-attack on a victim, or at least find out about the incident… The perception is that absolutely everyone is in on the joke.
52. Easy: Often easier to be cruel using technology because cyberbullying can be done from a physically distant location, and the bully doesn’t have to see the immediate response by the targetSource: Overview of Cyberbullying (Hinduja and Patchin – cyberbullying.us
91. Emphasize that most kids don’t bullySource: Overview of Cyberbullying (Hinduja and Patchin – cyberbullying.us
92. It’s in Youth’s Own Interest to Treat others Well “Youth who engage in online aggressive behavior by making rude or nasty comments or frequently embarrassing others are more than twice as likely to report online interpersonal victimization."
93. Cyberbullying Panic! “85% of 12 and 13 year-olds have had experience with cyberbullying,” according to one claim
94. Cyberbullying is a serious problem, but … Source: Cox Communications Teen Online & Wireless Safety Survey
95.
96. If people think their friends don’t smoke, they’re less likely to smoke.
97. Same is true with over-eating, excessive alcohol use and other negative behaviors, including bullying**Assessing Bullying in New Jersey Secondary Schools: Applying the Social Norms Model to Adolescent Violence: Craig, Perkins 2008
98. Examples of positive norming Source: Assessing Bullying in New Jersey Secondary Schools: Applying the Social Norms Model to Adolescent Violence: Craig, Perkins 2008
100. It’s About Having a Good Digital Footprint A online reputation is better than none at all One of the best ways to bury embarrassing search results is to create with good ones
101. What is digital citizenship? A “citizen” has responsibilities and rights You have the responsibility to: Be civil & respectful You have the right to: Be treated respectfully by kids & adults Access media and express yourself* *U.N. Convention on the Rights of the Child. Signed by all countries except U.S. & Somalia
102.
103.
104. Thank you! Larry Magid larry@connectsafely.org os3.connectsafely.org
Editor's Notes
ONLINE SAFETY CAN’T BE ONE-SIZE FITS ALL FOR MANY REASONS.... because the Web is huge and diverse and its use is highly individual, just as people’s lives are.. ...but also because there are many types of safety or well-being online and offline. In fact, online wellbeing, set in the context of what it’s FOR – full, constructive engagement in participatory culture & democracy – is more appropriately considered in terms of rights and freedoms: SO HERE ARE THE FORMS OF SAFETY WE ALL DESERVE:Physical is essential but not the all of it (playground metaphor).Psychological – we want them to have this freedom online just as much as we’ve always sought it for them offline, and their behavior is a factor in their well-being. Reputational and legal – we have a lot of work to do to develop awareness in this area, since users themselves are key to maintaining this freedom for themselves.Identity, property, and community – imposter profiles are a big one; we need to teach youth not only to protect their privacy & property but also their identity (first and foremost by protecting their passwords and not falling prey to manipulation, social engineering - like phishing scams).
THERE NEVER HAS BEEN A STUDY ON HOW MUCH CHILDREN ARE SOLICITED BY “PREDATORS.” NOTE THE HEADLINE: “All Children Vulnerable to Online Predators”. IT’S A TRICK QUESTION BECAUSE THE SURVEY WASN’T ABOUT PREDATORS. It was about unwanted sexual solicitations from anybody – flirting is often an unwanted sexual solicitation, as the researchers defined the term. Here’s what the 2000 study this refers to – updated in 2006 with the figure 1 in 7, so the no. of solicitations had gone down – actually said....READ THIS:“Youth identify most sexual solicitors as being other adolescents (48% in 2000; 43% in 2006) or young adults 18-24 (20%; 30%), with few (4%; 9%) coming from older adults, and the remaining being of unknown age.” THE TOTALS: 68% teens & 18-24-year-olds in 2000; 73% in 2006.
From 1990 to 2005 – the period of time that the Web was born and grew most rapidly – there was a 51% decline in overall child sexual – the chart’s showing that: out of every 10,000 US minors, 23 were abused, with that no. going down to 11 in 2005.UPDATE: 58% decline thru 2008, latest figure available (reported by CCRC here “Updated Trends in Child Maltreatment, 2008” <http://www.unh.edu/ccrc/pdf/CV203_Updated%20Trends%20in%20Child%20Maltreatment%202008_8-6-10.pdf>)NCANDS = National Data Archives on Child Abuse & Neglect
Putting up a fence might keep a kid away from a specific swimming pool but teaching them to swim protects them around all water and helps them enjoy the water as well.
ONLY SHOWS HOW FLUID SOCIAL NETWORKING IS....If they aren’t now, very soon, kids will be able to do everything on phones that they do on the Web – plus texting!There are phone-only social-network sites (accessible via the Web but designed for phone screens), and MySpace and Facebook – all the majors – allow users to update their profiles from their phones.
THESE ARE ALL IMPORTANT BUT VERY GENERAL – CERTAINLY EACH INCIDENT IS UNIQUE AND NEEDS CARING INDIVIDUAL TREATMENT - a full, nonconfrontational, child-caregiver discussion that looks at the situation’s circumstances. The psychological damage can be considerable – some kids have suicidal thoughts.School counselor I spoke with several years ago would find out all the parties involved, get them in a room, and do bully-victim reverse role-playing (empathy training). In families and schools, some of these incidents can be turned into TEACHABLE MOMENTS (maybe anonymized?) for all parties’ benefit.
See “US sex-offender laws, registries not conducive to child safety” <http://www.netfamilynews.org/2009/08/us-sex-offender-laws-registries-not.html>, “More on sex-offender registry flaws” <http://www.netfamilynews.org/2009/09/more-on-sex-offender-registry-flaws.html>, and more coverage in NetFamilyNews.org <http://www.netfamilynews.org/labels/teen%20sex%20offenders.html>.See also ConnectSafely.org’s “Tips to Prevent Sexting”: http://www.connectsafely.org/Safety-Tips/tips-to-prevent-sexting.html
THIS WAS A REVELATION TO ME BACK IN 2007, when I first read it in the medical journal, ARCHIVES OF PEDIATRICS & ADOLESCENT MEDICINE. This is when I realized what a big risk factor young people’s own behavior is – in the contexts of both bullying and predation.HERE’S THE CHART.... [next slide]http://archpedi.ama-assn.org/cgi/content/full/161/2/138[See also: “Digital risk, digital citizenship” <http://www.netfamilynews.org/2009/05/digital-risk-digital-citizenship.html>.]