SlideShare a Scribd company logo
Online Safety 3.0 Larry Magid, Ed.D Co-director ConnectSafely.org Founder SafeKids.com Education Committee Chair:Obama Admin’s Online Safety Technology Working Group
Other Generations  Have Worried about Youth
Kids! I don't know what's wrong with these kids today! Kids! Who can understand anything they say? Kids! They a disobedient, disrespectful oafs!Noisy, crazy, dirty, lazy, loafers! While we're on the subject: Kids! You can talk and talk till your face is blue! Kids! But they still just do what they want to do! Why can't they be like we were,Perfect in every way? What's the matter with kids today? Kids from Bye Bye Birdie, 1963. Lyrics by Lee Adams
Evolution of Online Safety Children as victims: 1.0 (most of the 90’s) Pornography & predators: Protecting  children from bad adults. Children as consumers of information, not as creators and based on assumptions of risk, not actual research 2.0(around 2007) Protecting children from peers. Recognizing that kids can create content harm other kids and themselves.  Cyberbullying  & posting inappropriate or dangerous content
Empowering approach Research-based, not fear-based, so relevant Flexible, layered – not one-size-fits-all Respectful of youth – stakeholders in positive outcomes, not just potential victims Positive: Not just safety from (bad outcomes) but safety for good outcomes Comprehensive = Incorporates safety, security, citizenship, and research/information literacy From Online Safety 3.0 (os3.connectsafely.org)
4 Types of Online Safety Physical safety – freedom from physical harm Psychological safety – freedom from cruelty, harassment, and exposure to potentially disturbing material  Reputational and legal safety – freedom from unwanted social, academic, professional, and legal consequences that could affect you for a lifetime  Identity, property, and community safety – freedom 		from theft of identity & property Items 1 through 3 are from Anne Collier’s NetFamilyNews
The ‘Net effect’ For the most part,the online world is pretty much like the “real world,” but there are a few special things to think about It can be permanent Material can be copied and pasted Lots of people can see it You don’t know for sure who’s seeing it AND Disinhibition: Lack of visual cues reducesempathy Source: adapted from danahboyd: Taken out of Context, 2008
What adults worry about ,[object Object]
Viewing inappropriate content
Posting/sending inappropriate content
Cyberbullying & harassment
Privacy and Reputation
Online addiction
Online contributing to destructive, illegal or inappropriate behavior
Device security & social engineering,[object Object]
Question:What proportion of American teens have been approached online by a predator? 1 in 20 1 in 10 1 in 7 1 in 5 Almost half
It’s a trick question
You’ve seen the headlines
The rise of the web has not resulted in increased victimization of children 51% Decline (during the period of the Web’s existence) Blue line represents 58% decline in child sex abuse from 1992 to 2008 Source: Updated Trends in Child Maltreatment, 2008: Finkelhor, Jones and Shattuck: Crimes Against Children Research Center
Inappropriate content
Seems Almost Quaint Playboy’s first cover, 1953
Today’s Internet Porn	 ,[object Object]
Easy to “hide”
Hard core porn is easier to find than soft-core erotica
Some images and videos depict things that are not appropriate – even for adults
But it’s important to understand the difference between:
Occasional exposure
Frequent exposure
Excessive exposure
Obsessive use ,[object Object]
Ultimately, the best filter runs between the child’s ears, not on a device Protection that lasts a lifetime Training wheels for young kids
Sexting Ill-advised and often illegal
‘Sexting’ ,[object Object]
 Usually via cellphones, but possible via other devices and Web
Illegal when involving minors
 A few prosecutors have charged teens with production, possession, distribution of child porn,[object Object]
But a more recent Pew Study Found ,[object Object]
15% received a “sext”Source: Pew Internet & American Life Project: Dec. 2009
Why do kids send ‘sext’ messages? Teen “romance” – expression of shared intimacy with partner Flirting Showing off (party behavior) Impulsive risk-taking Peer pressure Revenge Bullying or intimidation Blackmail
Non-legal consequences Emotional or reputational damage School discipline Invisible viewership – can be forwarded to anyone Potentially searchable on the Web, possibly forever
Legal consequences in US Potential for child-porn production, distribution, or possession charges Could be required by state law to register as a sex offender
Kids and Media Kids today spend an average of 7 hours and 38 minutes a day consuming “Entertainment media." * If you consider that kids are multi-tasking, it's actually closer to 11 hours* But before you react, consider how the are actually using it *Source: Generation M2: Media in the Lives of 8- to 18-Year-Olds.  Kaiser Family Foundation, 2010
What’s a Parent to Do	 Try to be a good role model Have dinner together as a family Encourage a balanced life that includes outdoor activities Recognize the difference between heavy use & excessive/obsessive use Be nearby while they’re doing homework Consider banning  tech devices from bedroom after bedtime Recognize that obsessive technology use could be a symptom of other issues Set limits and consider using parental controls built into game consoles and PC operating systems
Cyberbullying
Bullying has been around for a very long time, but cyberbullying… ,[object Object]

More Related Content

What's hot

Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
Sarah K Miller
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
Avanzo net
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
harriscountypubliclibrary
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
kgoldberg01
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
Queens Library
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
Marian Merritt
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Marc Kuhn
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
Del Belcher
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
CoachElrod
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
Arunmozhi Ramesh
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
mcmullan
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
SrijanMukhopadhyay1
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
Arah Louise
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
Yash Jain
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Niti Arora
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 

What's hot (20)

Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 

Viewers also liked

The Mobile Internet: Meeting Demand and Growing Profitably
The Mobile Internet: Meeting Demand and Growing ProfitablyThe Mobile Internet: Meeting Demand and Growing Profitably
The Mobile Internet: Meeting Demand and Growing ProfitablyBytemobile
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Larry Magid
 
Child Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspectionChild Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspection
Ofsted
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
2 A Ks Slide Show 2010
2 A Ks Slide Show 20102 A Ks Slide Show 2010
2 A Ks Slide Show 2010
Regina Hammerschmidt
 
Twitter for startups - Turning Your Followers in to Customers
Twitter for startups - Turning Your Followers in to CustomersTwitter for startups - Turning Your Followers in to Customers
Twitter for startups - Turning Your Followers in to Customers
Amit Panchal
 
Sats meeting
Sats meetingSats meeting
Sats meeting
lavabread
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Mariam Sb
 
prevention of arising crime against women
prevention of arising crime against women prevention of arising crime against women
prevention of arising crime against women
moin khan
 
Outdoor Play for Every Day
Outdoor Play for Every DayOutdoor Play for Every Day
Outdoor Play for Every Day
National Wildlife Federation
 
How can social bonds prevent rape?
How can social bonds prevent rape?How can social bonds prevent rape?
How can social bonds prevent rape?
Shahla Khan
 
101 things you can do to prevent sexual assault
101 things you can do to prevent sexual assault101 things you can do to prevent sexual assault
101 things you can do to prevent sexual assault
Abhishek Jaguessar
 
Mythologies of intergovernmental cooperation (and competition) in Canada
Mythologies of intergovernmental cooperation (and competition) in CanadaMythologies of intergovernmental cooperation (and competition) in Canada
Mythologies of intergovernmental cooperation (and competition) in Canada
David Péloquin
 
Au psy492 e_portfolio_template_for_slideshare
Au psy492 e_portfolio_template_for_slideshareAu psy492 e_portfolio_template_for_slideshare
Au psy492 e_portfolio_template_for_slidesharenrslone
 
Kid Safety On The Internet
Kid Safety On The InternetKid Safety On The Internet
Kid Safety On The InternetJennifer Chilek
 
Protecting your online privacy
Protecting your online privacyProtecting your online privacy
Protecting your online privacy
Ram Parthasarathy
 
Untangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe OnlineUntangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe Online
Todd Stanfield
 
Computer awareness i logo
Computer awareness i logoComputer awareness i logo
Computer awareness i logoMadhan Kumar
 

Viewers also liked (20)

The Mobile Internet: Meeting Demand and Growing Profitably
The Mobile Internet: Meeting Demand and Growing ProfitablyThe Mobile Internet: Meeting Demand and Growing Profitably
The Mobile Internet: Meeting Demand and Growing Profitably
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
Child Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspectionChild Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspection
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
2 A Ks Slide Show 2010
2 A Ks Slide Show 20102 A Ks Slide Show 2010
2 A Ks Slide Show 2010
 
Twitter for startups - Turning Your Followers in to Customers
Twitter for startups - Turning Your Followers in to CustomersTwitter for startups - Turning Your Followers in to Customers
Twitter for startups - Turning Your Followers in to Customers
 
Sats meeting
Sats meetingSats meeting
Sats meeting
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
 
prevention of arising crime against women
prevention of arising crime against women prevention of arising crime against women
prevention of arising crime against women
 
Outdoor Play for Every Day
Outdoor Play for Every DayOutdoor Play for Every Day
Outdoor Play for Every Day
 
How can social bonds prevent rape?
How can social bonds prevent rape?How can social bonds prevent rape?
How can social bonds prevent rape?
 
101 things you can do to prevent sexual assault
101 things you can do to prevent sexual assault101 things you can do to prevent sexual assault
101 things you can do to prevent sexual assault
 
Mythologies of intergovernmental cooperation (and competition) in Canada
Mythologies of intergovernmental cooperation (and competition) in CanadaMythologies of intergovernmental cooperation (and competition) in Canada
Mythologies of intergovernmental cooperation (and competition) in Canada
 
Au psy492 e_portfolio_template_for_slideshare
Au psy492 e_portfolio_template_for_slideshareAu psy492 e_portfolio_template_for_slideshare
Au psy492 e_portfolio_template_for_slideshare
 
Mdia5000 presentation
Mdia5000 presentationMdia5000 presentation
Mdia5000 presentation
 
Kid Safety On The Internet
Kid Safety On The InternetKid Safety On The Internet
Kid Safety On The Internet
 
Protecting your online privacy
Protecting your online privacyProtecting your online privacy
Protecting your online privacy
 
Untangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe OnlineUntangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe Online
 
Computer awareness i logo
Computer awareness i logoComputer awareness i logo
Computer awareness i logo
 
Cnwl e safety-tutorial_2013
Cnwl e safety-tutorial_2013Cnwl e safety-tutorial_2013
Cnwl e safety-tutorial_2013
 

Similar to Online Safety 3.0 - Presentation for Parents and Teachers

Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
Larry Magid
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
Anne Collier
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
Larry Magid
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
ConnectSafely
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Donna Murray
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
alanrgibson41217
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
Pat Sine
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
Bernajean Porter
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...
Larry Magid
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
Larry Magid
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
MediaSmarts | HabiloMédias
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
NMSU - Family Resource Management
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
Karen Brooks
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
pardolopez
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010paul
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online SafetyDonna Murray
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
HomeGuides
 

Similar to Online Safety 3.0 - Presentation for Parents and Teachers (20)

Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Online Safety 3.0 - Presentation for Parents and Teachers

  • 1. Online Safety 3.0 Larry Magid, Ed.D Co-director ConnectSafely.org Founder SafeKids.com Education Committee Chair:Obama Admin’s Online Safety Technology Working Group
  • 2. Other Generations Have Worried about Youth
  • 3. Kids! I don't know what's wrong with these kids today! Kids! Who can understand anything they say? Kids! They a disobedient, disrespectful oafs!Noisy, crazy, dirty, lazy, loafers! While we're on the subject: Kids! You can talk and talk till your face is blue! Kids! But they still just do what they want to do! Why can't they be like we were,Perfect in every way? What's the matter with kids today? Kids from Bye Bye Birdie, 1963. Lyrics by Lee Adams
  • 4. Evolution of Online Safety Children as victims: 1.0 (most of the 90’s) Pornography & predators: Protecting children from bad adults. Children as consumers of information, not as creators and based on assumptions of risk, not actual research 2.0(around 2007) Protecting children from peers. Recognizing that kids can create content harm other kids and themselves. Cyberbullying & posting inappropriate or dangerous content
  • 5. Empowering approach Research-based, not fear-based, so relevant Flexible, layered – not one-size-fits-all Respectful of youth – stakeholders in positive outcomes, not just potential victims Positive: Not just safety from (bad outcomes) but safety for good outcomes Comprehensive = Incorporates safety, security, citizenship, and research/information literacy From Online Safety 3.0 (os3.connectsafely.org)
  • 6. 4 Types of Online Safety Physical safety – freedom from physical harm Psychological safety – freedom from cruelty, harassment, and exposure to potentially disturbing material Reputational and legal safety – freedom from unwanted social, academic, professional, and legal consequences that could affect you for a lifetime Identity, property, and community safety – freedom from theft of identity & property Items 1 through 3 are from Anne Collier’s NetFamilyNews
  • 7. The ‘Net effect’ For the most part,the online world is pretty much like the “real world,” but there are a few special things to think about It can be permanent Material can be copied and pasted Lots of people can see it You don’t know for sure who’s seeing it AND Disinhibition: Lack of visual cues reducesempathy Source: adapted from danahboyd: Taken out of Context, 2008
  • 8.
  • 14. Online contributing to destructive, illegal or inappropriate behavior
  • 15.
  • 16. Question:What proportion of American teens have been approached online by a predator? 1 in 20 1 in 10 1 in 7 1 in 5 Almost half
  • 17. It’s a trick question
  • 18. You’ve seen the headlines
  • 19. The rise of the web has not resulted in increased victimization of children 51% Decline (during the period of the Web’s existence) Blue line represents 58% decline in child sex abuse from 1992 to 2008 Source: Updated Trends in Child Maltreatment, 2008: Finkelhor, Jones and Shattuck: Crimes Against Children Research Center
  • 21. Seems Almost Quaint Playboy’s first cover, 1953
  • 22.
  • 24. Hard core porn is easier to find than soft-core erotica
  • 25. Some images and videos depict things that are not appropriate – even for adults
  • 26. But it’s important to understand the difference between:
  • 30.
  • 31. Ultimately, the best filter runs between the child’s ears, not on a device Protection that lasts a lifetime Training wheels for young kids
  • 32. Sexting Ill-advised and often illegal
  • 33.
  • 34. Usually via cellphones, but possible via other devices and Web
  • 36.
  • 37.
  • 38. 15% received a “sext”Source: Pew Internet & American Life Project: Dec. 2009
  • 39. Why do kids send ‘sext’ messages? Teen “romance” – expression of shared intimacy with partner Flirting Showing off (party behavior) Impulsive risk-taking Peer pressure Revenge Bullying or intimidation Blackmail
  • 40. Non-legal consequences Emotional or reputational damage School discipline Invisible viewership – can be forwarded to anyone Potentially searchable on the Web, possibly forever
  • 41. Legal consequences in US Potential for child-porn production, distribution, or possession charges Could be required by state law to register as a sex offender
  • 42. Kids and Media Kids today spend an average of 7 hours and 38 minutes a day consuming “Entertainment media." * If you consider that kids are multi-tasking, it's actually closer to 11 hours* But before you react, consider how the are actually using it *Source: Generation M2: Media in the Lives of 8- to 18-Year-Olds. Kaiser Family Foundation, 2010
  • 43. What’s a Parent to Do Try to be a good role model Have dinner together as a family Encourage a balanced life that includes outdoor activities Recognize the difference between heavy use & excessive/obsessive use Be nearby while they’re doing homework Consider banning tech devices from bedroom after bedtime Recognize that obsessive technology use could be a symptom of other issues Set limits and consider using parental controls built into game consoles and PC operating systems
  • 45.
  • 46. Can often be in both “real world” & online
  • 47. Can follow them home – hard to escape
  • 49. The “Net Effect”Illustration: CustumeHum.com (Creative Commons License)
  • 50.
  • 51. Viral: (Hurtful actions of a cyberbully are viral; that is, a large number of people (at school, in the neighborhood, in the city, in the world!) can be involved in a cyber-attack on a victim, or at least find out about the incident… The perception is that absolutely everyone is in on the joke.
  • 52. Easy: Often easier to be cruel using technology because cyberbullying can be done from a physically distant location, and the bully doesn’t have to see the immediate response by the targetSource: Overview of Cyberbullying (Hinduja and Patchin – cyberbullying.us
  • 53.
  • 62.
  • 69. CyberstalkingSource: Nancy Willard, Center for Safe & Responsible Use of the Internet
  • 70.
  • 71. Talk to trusted adults and peers
  • 74. Be civil / don't be a bully
  • 75.
  • 76. Make sure child is and feels safe
  • 78. Encourage child not to retaliate
  • 79. Gather facts & save the evidence
  • 80. Get the child to help solve the problem
  • 81. Teach self-esteem & resilience
  • 82. Bring in school officials if there is a “nexus” with school
  • 83. Encourage child to reach out to friends
  • 84.
  • 85. Review existing polices to see how they apply to cyberbullying
  • 86. Work with students to create anti-bullying campaigns and posters
  • 87. Be cautious about use of law-enforcement Create a positive school climate
  • 91. Emphasize that most kids don’t bullySource: Overview of Cyberbullying (Hinduja and Patchin – cyberbullying.us
  • 92. It’s in Youth’s Own Interest to Treat others Well “Youth who engage in online aggressive behavior by making rude or nasty comments or frequently embarrassing others are more than twice as likely to report online interpersonal victimization."
  • 93. Cyberbullying Panic! “85% of 12 and 13 year-olds have had experience with cyberbullying,” according to one claim
  • 94. Cyberbullying is a serious problem, but … Source: Cox Communications Teen Online & Wireless Safety Survey
  • 95.
  • 96. If people think their friends don’t smoke, they’re less likely to smoke.
  • 97. Same is true with over-eating, excessive alcohol use and other negative behaviors, including bullying**Assessing Bullying in New Jersey Secondary Schools: Applying the Social Norms Model to Adolescent Violence: Craig, Perkins 2008
  • 98. Examples of positive norming Source: Assessing Bullying in New Jersey Secondary Schools: Applying the Social Norms Model to Adolescent Violence: Craig, Perkins 2008
  • 99. Privacy & Reputation Management
  • 100. It’s About Having a Good Digital Footprint A online reputation is better than none at all One of the best ways to bury embarrassing search results is to create with good ones
  • 101. What is digital citizenship? A “citizen” has responsibilities and rights You have the responsibility to: Be civil & respectful You have the right to: Be treated respectfully by kids & adults Access media and express yourself* *U.N. Convention on the Rights of the Child. Signed by all countries except U.S. & Somalia
  • 102.
  • 103.
  • 104. Thank you! Larry Magid larry@connectsafely.org os3.connectsafely.org

Editor's Notes

  1. ONLINE SAFETY CAN’T BE ONE-SIZE FITS ALL FOR MANY REASONS.... because the Web is huge and diverse and its use is highly individual, just as people’s lives are.. ...but also because there are many types of safety or well-being online and offline. In fact, online wellbeing, set in the context of what it’s FOR – full, constructive engagement in participatory culture & democracy – is more appropriately considered in terms of rights and freedoms: SO HERE ARE THE FORMS OF SAFETY WE ALL DESERVE:Physical is essential but not the all of it (playground metaphor).Psychological – we want them to have this freedom online just as much as we’ve always sought it for them offline, and their behavior is a factor in their well-being. Reputational and legal – we have a lot of work to do to develop awareness in this area, since users themselves are key to maintaining this freedom for themselves.Identity, property, and community – imposter profiles are a big one; we need to teach youth not only to protect their privacy & property but also their identity (first and foremost by protecting their passwords and not falling prey to manipulation, social engineering - like phishing scams).
  2. THERE NEVER HAS BEEN A STUDY ON HOW MUCH CHILDREN ARE SOLICITED BY “PREDATORS.” NOTE THE HEADLINE: “All Children Vulnerable to Online Predators”. IT’S A TRICK QUESTION BECAUSE THE SURVEY WASN’T ABOUT PREDATORS. It was about unwanted sexual solicitations from anybody – flirting is often an unwanted sexual solicitation, as the researchers defined the term. Here’s what the 2000 study this refers to – updated in 2006 with the figure 1 in 7, so the no. of solicitations had gone down – actually said....READ THIS:“Youth identify most sexual solicitors as being other adolescents (48% in 2000; 43% in 2006) or young adults 18-24 (20%; 30%), with few (4%; 9%) coming from older adults, and the remaining being of unknown age.” THE TOTALS: 68% teens & 18-24-year-olds in 2000; 73% in 2006.
  3. From 1990 to 2005 – the period of time that the Web was born and grew most rapidly – there was a 51% decline in overall child sexual – the chart’s showing that: out of every 10,000 US minors, 23 were abused, with that no. going down to 11 in 2005.UPDATE: 58% decline thru 2008, latest figure available (reported by CCRC here “Updated Trends in Child Maltreatment, 2008” <http://www.unh.edu/ccrc/pdf/CV203_Updated%20Trends%20in%20Child%20Maltreatment%202008_8-6-10.pdf>)NCANDS = National Data Archives on Child Abuse & Neglect
  4. Putting up a fence might keep a kid away from a specific swimming pool but teaching them to swim protects them around all water and helps them enjoy the water as well.
  5. ONLY SHOWS HOW FLUID SOCIAL NETWORKING IS....If they aren’t now, very soon, kids will be able to do everything on phones that they do on the Web – plus texting!There are phone-only social-network sites (accessible via the Web but designed for phone screens), and MySpace and Facebook – all the majors – allow users to update their profiles from their phones.
  6. THESE ARE ALL IMPORTANT BUT VERY GENERAL – CERTAINLY EACH INCIDENT IS UNIQUE AND NEEDS CARING INDIVIDUAL TREATMENT - a full, nonconfrontational, child-caregiver discussion that looks at the situation’s circumstances. The psychological damage can be considerable – some kids have suicidal thoughts.School counselor I spoke with several years ago would find out all the parties involved, get them in a room, and do bully-victim reverse role-playing (empathy training). In families and schools, some of these incidents can be turned into TEACHABLE MOMENTS (maybe anonymized?) for all parties’ benefit.
  7. http://www.connectsafely.org/Safety-Tips/tips-to-prevent-sexting.html
  8. See “US sex-offender laws, registries not conducive to child safety” <http://www.netfamilynews.org/2009/08/us-sex-offender-laws-registries-not.html>, “More on sex-offender registry flaws” <http://www.netfamilynews.org/2009/09/more-on-sex-offender-registry-flaws.html>, and more coverage in NetFamilyNews.org <http://www.netfamilynews.org/labels/teen%20sex%20offenders.html>.See also ConnectSafely.org’s “Tips to Prevent Sexting”: http://www.connectsafely.org/Safety-Tips/tips-to-prevent-sexting.html
  9. THIS WAS A REVELATION TO ME BACK IN 2007, when I first read it in the medical journal, ARCHIVES OF PEDIATRICS & ADOLESCENT MEDICINE. This is when I realized what a big risk factor young people’s own behavior is – in the contexts of both bullying and predation.HERE’S THE CHART.... [next slide]http://archpedi.ama-assn.org/cgi/content/full/161/2/138[See also: “Digital risk, digital citizenship” <http://www.netfamilynews.org/2009/05/digital-risk-digital-citizenship.html>.]