SlideShare uma empresa Scribd logo
1 de 45
How Safe  Are  Our Kids Online? (and what does  ‘safe’  mean , anyway?) Anne Collier Co-director,  ConnectSafely.org  Editor,  NetFamilyNews.org
Net safety as we know it is  obsolete ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A living  Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Students ’ perspective ‘ Joe’s Non-Netbook’ Science Leadership Academy Philadelphia
What we now know from...
What are they  doing   in there? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What  else  are they doing  in there? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Online socializing reflects ‘real life’ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: Pew Internet & American Life survey 9/09 & 1/07
2 types of social networking ,[object Object],[object Object],Source: Digital Youth Project, November 2008 ...on all devices, fixed and mobile:
Social networking’s progression ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile  social tools
Teens prefer texting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
In other words... © 2010 Columbus Dispatch
Virtual worlds too ,[object Object],[object Object],[object Object],[object Object]
What we now know ,[object Object],[object Object],[object Object],[object Object]
Types  of Online Safety ,[object Object],[object Object],[object Object],[object Object]
The  ‘ Net  effect’ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: danah boyd:  Taken out of Context, 2008
What  else  we know ,[object Object],[object Object],[object Object]
3.4X “ Posting personal information does not by itself increase risk.”   --Archives of Pediatrics & Adolescent Medicine, 2/07
Teens ’ response to strangers ,[object Object],[object Object],[object Object],[object Object],[object Object]
As for predators in social network sites...  “ There is  no evidenc e predators are stalking or abducting unsuspecting victims based on information they posted in social sites.” –  Crimes Against Children Research Center, March  ’09
Question Has the growth in  young people ’s use of the Internet  correlated with a rise in  sexual abuse against children?
SA Sub 1990-2005* Rate per 10,000 Children (<18) Source: NCANDS / Finkelhor & Jones, 2006  51% Decline  ( during  the period of the Web ’s existence) Answer: No Confirmed cases of child sexual abuse
Source: FBI & CACRC, 2009 &  ‘10  The trend  continues ,[object Object],[object Object],[object Object]
As for other risk factors... “ Youth  violence  is  way down , as is  teen pregnancy ,  smoking ,  alcohol and drug use ,  suicides , and high school  drop-out rates  – whereas civic engagement has improved along with youth taking more AP classes in high school. Standardized educational achievement scores have either remained steady or improved slightly.  Aside from obesity, perhaps, most trends in youth behavior are moving in a positive direction.” –  Prof. Christopher Ferguson, Texas A&M
What is cyberbullying? ,[object Object],[object Object],[object Object],[object Object],[object Object],Sources: UNH CACRC,  ‘07; Agatston, Kowalski, Limber, ‘09; Burgess-Proctor, Hinduja, Patchin, ‘09
More cyberbullying facts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Sources: UNH CACRC,  ‘07; Agatston, Kowalski, Limber, ‘09; Burgess-Proctor, Hinduja, Patchin, ‘09
Causes  of bullying/cyberbullying ,[object Object],[object Object],[object Object],[object Object],[object Object]
Signs of cyberbullying ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What to tell kids facing cyberbullying ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
‘ Sexting’
‘ Sexting ’  defined ,[object Object],[object Object],[object Object],[object Object]
How common is sexting? Earliest study reported that 20% of US teens had sent a sexting message.   The latest study found  4%  had. Received: 15-17% Forwarded:  3% Sources : Harris Interactive/Cox/NCMEC 5/09; AP/MTV 12/09; Pew 12/09  Sent: 4-10%
Possible non-legal consequences ,[object Object],[object Object],[object Object],[object Object]
Why  do some kids  ‘sext’? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The sexting messages went to... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: Cox Communications Teen Online & Wireless Safety Survey, 2009
2%  –  “Photo was forwarded to an authority figure and I got in  trouble.”  1%  –  “Photo was posted online where many people could see  it.”  4%  –  “The person I sent the photo to threatened to send it to  someone else.”  2%  –  “I accidentally sent the photo to the wrong person.” 2%  –  “The person I sent the photo to made fun of me.”  2%  –  “The photo was forwarded to someone I didn't want to  see it” Did bad things happen after sexting messages were sent? Source: Cox Communications Teen Online & Wireless Safety Survey, 2009
What should a parent do? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Whole school approach needed ,[object Object],[object Object]
The Illinois approach ,[object Object],[object Object],[object Object],[object Object]
“ Promote digital citizenship in  pre-K-12 education as a national priority.” –  Youth Safety on a Living Internet: Report of the Online Safety & Technology Working Group Our report to Congress,  June 2010...
The most basic definition “ The central task of citizenship  is learning how  to be good to one another.”  –  A.J. Patrick Liszkiewicz
Digital citizenship’s... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Net safety  from the  inside-out ,[object Object],[object Object],[object Object],[object Object]
Thank you! ,[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Larry Magid
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...Stevecd
 
Cyberbullying edc105
Cyberbullying edc105Cyberbullying edc105
Cyberbullying edc105CarolRusch1
 
2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_texting2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_textingDustianne North
 
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_1107112012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711Dustianne North
 
2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrains2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrainsDustianne North
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointhmorrell1
 
2011 social media adolhxreport
2011 social media adolhxreport2011 social media adolhxreport
2011 social media adolhxreportDustianne North
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)amalgarn
 
Can social media save kids' lives?
Can social media save kids' lives?Can social media save kids' lives?
Can social media save kids' lives?Securly
 

Mais procurados (20)

Web safety
Web safetyWeb safety
Web safety
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
 
Teens and social media
Teens and social mediaTeens and social media
Teens and social media
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
Cyberbullying edc105
Cyberbullying edc105Cyberbullying edc105
Cyberbullying edc105
 
2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_texting2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_texting
 
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_1107112012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
 
2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrains2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrains
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
2011 social media adolhxreport
2011 social media adolhxreport2011 social media adolhxreport
2011 social media adolhxreport
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)
 
Teen Content Creators
Teen Content CreatorsTeen Content Creators
Teen Content Creators
 
Can social media save kids' lives?
Can social media save kids' lives?Can social media save kids' lives?
Can social media save kids' lives?
 

Destaque

Destaque (20)

Ten Lessons in Designing Content for Mobile
Ten Lessons in Designing Content for MobileTen Lessons in Designing Content for Mobile
Ten Lessons in Designing Content for Mobile
 
Methopedia
MethopediaMethopedia
Methopedia
 
NewsletterIMS2015_w
NewsletterIMS2015_wNewsletterIMS2015_w
NewsletterIMS2015_w
 
bbliografia.doc
bbliografia.docbbliografia.doc
bbliografia.doc
 
The Connected Library
The Connected LibraryThe Connected Library
The Connected Library
 
Interesting Times: Will Business Survive?
Interesting Times: Will Business Survive?Interesting Times: Will Business Survive?
Interesting Times: Will Business Survive?
 
The United States Penal System
The United States Penal SystemThe United States Penal System
The United States Penal System
 
SHU Diplomacy & UNA-USA Post 2015 UN Dev. Agenda Webinar
SHU Diplomacy & UNA-USA Post 2015 UN Dev. Agenda WebinarSHU Diplomacy & UNA-USA Post 2015 UN Dev. Agenda Webinar
SHU Diplomacy & UNA-USA Post 2015 UN Dev. Agenda Webinar
 
Blog
BlogBlog
Blog
 
Culminating Project
Culminating ProjectCulminating Project
Culminating Project
 
Connecting Web 2.0 with learning
Connecting Web 2.0 with learningConnecting Web 2.0 with learning
Connecting Web 2.0 with learning
 
Dukengineer2012
Dukengineer2012Dukengineer2012
Dukengineer2012
 
Pepperdine Flu Impact on Small and Medium-sized Businesses 2013
Pepperdine Flu Impact on Small and Medium-sized Businesses 2013Pepperdine Flu Impact on Small and Medium-sized Businesses 2013
Pepperdine Flu Impact on Small and Medium-sized Businesses 2013
 
CP Presentation
CP PresentationCP Presentation
CP Presentation
 
Asis13
Asis13Asis13
Asis13
 
My Very Own Washington Exhibition
My Very Own Washington ExhibitionMy Very Own Washington Exhibition
My Very Own Washington Exhibition
 
Police.power
Police.powerPolice.power
Police.power
 
Wordcampuk 09 (wordcampuk)
Wordcampuk 09 (wordcampuk)Wordcampuk 09 (wordcampuk)
Wordcampuk 09 (wordcampuk)
 
Day2
Day2Day2
Day2
 
Sample_Energy_Survey_Report
Sample_Energy_Survey_ReportSample_Energy_Survey_Report
Sample_Energy_Survey_Report
 

Semelhante a How Safe Are Our Kids Online?

Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensAndrew Kohl
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Larry Magid
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesFrances Harris
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullyingsepulvedamd
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyinglheikkila
 

Semelhante a How Safe Are Our Kids Online? (20)

Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital Citizens
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected Consequences
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Week 5
Week 5Week 5
Week 5
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Mais de Anne Collier

Fixing those 'Monday morning social media blues'
Fixing those 'Monday morning social media blues'Fixing those 'Monday morning social media blues'
Fixing those 'Monday morning social media blues'Anne Collier
 
Inspired digital citizenship: The essential elements
Inspired digital citizenship: The essential elementsInspired digital citizenship: The essential elements
Inspired digital citizenship: The essential elementsAnne Collier
 
Online Safety & Efficacy: Research Milestones
Online Safety & Efficacy: Research MilestonesOnline Safety & Efficacy: Research Milestones
Online Safety & Efficacy: Research MilestonesAnne Collier
 
The Safety Part of Game-Based Learning
The Safety Part of Game-Based LearningThe Safety Part of Game-Based Learning
The Safety Part of Game-Based LearningAnne Collier
 
A new social contract (for the digital age)
A new social contract (for the digital age)A new social contract (for the digital age)
A new social contract (for the digital age)Anne Collier
 
Digital citizenship basics
Digital citizenship basicsDigital citizenship basics
Digital citizenship basicsAnne Collier
 
A fresh look at digital safety, citizenship
A fresh look at digital safety, citizenshipA fresh look at digital safety, citizenship
A fresh look at digital safety, citizenshipAnne Collier
 
A (very) brief history of US Internet safety
A (very) brief history of US Internet safetyA (very) brief history of US Internet safety
A (very) brief history of US Internet safetyAnne Collier
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, brieflyAnne Collier
 
Digital reputations
Digital reputationsDigital reputations
Digital reputationsAnne Collier
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenshipAnne Collier
 

Mais de Anne Collier (11)

Fixing those 'Monday morning social media blues'
Fixing those 'Monday morning social media blues'Fixing those 'Monday morning social media blues'
Fixing those 'Monday morning social media blues'
 
Inspired digital citizenship: The essential elements
Inspired digital citizenship: The essential elementsInspired digital citizenship: The essential elements
Inspired digital citizenship: The essential elements
 
Online Safety & Efficacy: Research Milestones
Online Safety & Efficacy: Research MilestonesOnline Safety & Efficacy: Research Milestones
Online Safety & Efficacy: Research Milestones
 
The Safety Part of Game-Based Learning
The Safety Part of Game-Based LearningThe Safety Part of Game-Based Learning
The Safety Part of Game-Based Learning
 
A new social contract (for the digital age)
A new social contract (for the digital age)A new social contract (for the digital age)
A new social contract (for the digital age)
 
Digital citizenship basics
Digital citizenship basicsDigital citizenship basics
Digital citizenship basics
 
A fresh look at digital safety, citizenship
A fresh look at digital safety, citizenshipA fresh look at digital safety, citizenship
A fresh look at digital safety, citizenship
 
A (very) brief history of US Internet safety
A (very) brief history of US Internet safetyA (very) brief history of US Internet safety
A (very) brief history of US Internet safety
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenship
 

Último

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 

Último (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 

How Safe Are Our Kids Online?

  • 1. How Safe Are Our Kids Online? (and what does ‘safe’ mean , anyway?) Anne Collier Co-director, ConnectSafely.org Editor, NetFamilyNews.org
  • 2.
  • 3.
  • 4. Students ’ perspective ‘ Joe’s Non-Netbook’ Science Leadership Academy Philadelphia
  • 5. What we now know from...
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. In other words... © 2010 Columbus Dispatch
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. 3.4X “ Posting personal information does not by itself increase risk.” --Archives of Pediatrics & Adolescent Medicine, 2/07
  • 20.
  • 21. As for predators in social network sites... “ There is no evidenc e predators are stalking or abducting unsuspecting victims based on information they posted in social sites.” – Crimes Against Children Research Center, March ’09
  • 22. Question Has the growth in young people ’s use of the Internet correlated with a rise in sexual abuse against children?
  • 23. SA Sub 1990-2005* Rate per 10,000 Children (<18) Source: NCANDS / Finkelhor & Jones, 2006 51% Decline ( during the period of the Web ’s existence) Answer: No Confirmed cases of child sexual abuse
  • 24.
  • 25. As for other risk factors... “ Youth violence is way down , as is teen pregnancy , smoking , alcohol and drug use , suicides , and high school drop-out rates – whereas civic engagement has improved along with youth taking more AP classes in high school. Standardized educational achievement scores have either remained steady or improved slightly.  Aside from obesity, perhaps, most trends in youth behavior are moving in a positive direction.” – Prof. Christopher Ferguson, Texas A&M
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 32.
  • 33. How common is sexting? Earliest study reported that 20% of US teens had sent a sexting message. The latest study found 4% had. Received: 15-17% Forwarded: 3% Sources : Harris Interactive/Cox/NCMEC 5/09; AP/MTV 12/09; Pew 12/09 Sent: 4-10%
  • 34.
  • 35.
  • 36.
  • 37. 2% – “Photo was forwarded to an authority figure and I got in trouble.” 1% – “Photo was posted online where many people could see it.” 4% – “The person I sent the photo to threatened to send it to someone else.” 2% – “I accidentally sent the photo to the wrong person.” 2% – “The person I sent the photo to made fun of me.” 2% – “The photo was forwarded to someone I didn't want to see it” Did bad things happen after sexting messages were sent? Source: Cox Communications Teen Online & Wireless Safety Survey, 2009
  • 38.
  • 39.
  • 40.
  • 41. “ Promote digital citizenship in pre-K-12 education as a national priority.” – Youth Safety on a Living Internet: Report of the Online Safety & Technology Working Group Our report to Congress, June 2010...
  • 42. The most basic definition “ The central task of citizenship is learning how to be good to one another.” – A.J. Patrick Liszkiewicz
  • 43.
  • 44.
  • 45.

Notas do Editor

  1. Parents, we have been misinformed. The Internet has been portrayed in the news media, on shows like “To Catch a Predator,” and by some politicians as risky for kids. Well, LIFE is risky for kids. Right? We ’re here to help them learn how to navigate life. The same goes for the Internet. DON’T believe everything you hear in the news about kids and the Internet.
  2. Don ’t believe online safety messages that have these characteristics. I hope this talk will explain why. Let ’s consider what fear does: When we ’re afraid and overreact, kids want to get as far away from us as possible – especially if they feel we’re clueless or unwilling to understand. They go “underground,” find workarounds, are on their own, which can put them at greater risk. Adults need to be in the mix – just as we’re in the mix in their OFFLINE lives! [Last bullet:] If we don ’t base our understanding on what the research – about how kids and teens ACTUALLY USE technology, we won’t have any credibility with them.
  3. Here ’s what we’re ALL dealing with (everybody who has anything to do with media). This is the new media environment we’re all in.... Media is SOCIAL now – behavioral. USER -driven – not produced in New York and L.A. by professionals and regulated in Washington like it used to be. It ’s the lives, thoughts, social experiences, research, productions, and activism of a growing proportion of humanity all over the world. Facebook, for example, is used in every country. It ’s not something in ADDITION to ppl’s lives, it’s embedded in them. It ’s on phones, game players, music players, and game consoles as well as computers; it’s completely mobile, so it’s virtually everywhere. How can we or anyone control that (including governments and even Internet companies)? Because it reflects virtually all of human life, it reflects and displays the bad as well as the good, including the full spectrum of self-destructive, malicious, and criminal behaviors. I ’ll get into those more later, but first: more on how young people are using the Net....
  4. A little bit on young people’s perspective just for fun. The students in the video are at Philadelphia&apos;s Science Leadership Academy. The principal, Chris Lehmann, said in a recent interview: &amp;quot;In too many schools we have this idea that we have the school we&apos;ve always had plus some computers.” He said, “Technology needs to be like oxygen - ubiquitous, necessary, invisible. It&apos;s got to be everywhere ... just part of the day-to-day work that we all do. Stanford Psychology Prof. Philip Zimbardo &lt;http://www.youtube.com/watch?v=A3oIiH7BLmg&gt; talks about how their use of new media is rewiring our children’s brains. Because of their active, nearly constant use of digital media from social media to cellphones to videogames, they are used to being active participants . But every 9 seconds a student drops out of school somewhere in the US, Professor Zimbardo says. Why? Because school is designed for passive consumption – it’s analog, somebody talks at you (usually without even cool pictures, much less video). It’s incredibly and increasingly BORING to these rewired brains. “They have to be controlling something” in the learning environment. So do we shut out the technology that’s everywhere else in their lives? NO!!! [Prof. Zimbardo says that would be a disaster.] [See also “School &amp; social media” about how we might think of digital media as the new book: http://www.netfamilynews.org/2009/05/school-social-media-uber-big-picture.html .] Joe’s Non-Netbook: http://www.youtube.com/watch?v=SkhpmEZWuRQ
  5. Now I ’ll tell you a bit about what we’ve learned from the growing body of social-media research.... A big start was the “Digital Youth Project” begun more than three years ago, funded by the MacArthur Foundation to the tune of $50 million and involving more than 2 dozen researchers, studying young people’s use of social media in school, at home, and in after-school programs.... NOW IT ’S A BOOK!: Hanging Out, Messing Around, and Geeking Out: Kids Living and Learning with New Media (from MIT Press) Missouri 8 th -gradecommunic.-arts teacher Tom Maerke reviewed it in the National Writing Project (NWP.org) site, saying “ it’s important to read this book because it presents in extensive detail the diverse learning opportunities available to young people” in social media. Lots of examples. “ *Serious* informal learning: Key online youth study” &lt;http://www.netfamilynews.org/2008/11/serious-informal-learning-online-youth.html&gt; “ Why participatory media need to be in school” http://www.netfamilynews.org/2009/06/why-participatory-media-need-to-be-in.htm]l
  6. This is just a partial list of activities and behaviors occurring on the social Web. But of course it ’s not all positive....
  7. ...There ’s plenty of neutral and negative behavior too, but not from all young people – a lot of what has always been going on during the adolescent years, except that now it’s a lot more visible. Which can be scary but certainly not all bad. This visibility can help parents and educators with early detection before problems get out of hand, and it helps researchers and risk-prevention practitioners as well as law enforcement.
  8. ONLINE SOCIALIZING IS JUST AS COMPLEX AND DIVERSE AS THEIR OFFLINE SOCIAL LIVES – both what ’s going on in their individual lives and in the cultural environment around them.
  9. Social-media researchers have helped us see that youth are actually engaged in two kinds of online social networking: FRIENDSHIP-DRIVEN is the way most of us think of social networking – the online extension of their RL social lives. INTEREST-DRIVEN is about where young musicians, videographers, athletes, game designers, anime-translaters, code-writers, etc., get feedback, context for their work, mentors, inspiration, healthy competition – where geography is not a factor, and they don ’t have to grow up to find their professional peer groups. [Data from qualitative study of 61 people aged 15-25 by Harvard GoodPlay Project.] In this INFORMAL LEARNING environment . THE DIGITAL YOUTH STUDY FOUND THAT IN BOTH forms young people “create and navigate new forms of expression and rules for social behavior. By exploring new interests, tinkering, and “messing around” with new forms of media, they acquire various forms of technical and media literacy.... By its immediacy &amp; breadth of information, the digital world lowers barriers to self-directed learning .” – Mimi Ito, Cal Berkeley Hanging Out, Messing Around &amp; Geeking Out: Kids Living &amp; Learning with New Media , MIT Press (2009) &lt;http://mitpress.mit.edu/catalog/item/default.asp?ttype=2&amp;tid=11889&gt;
  10. It ’s a mistake to think social networking is either a single activity and even more of a mistake to think it’s a waste of time, as many people of my generation seem to believe. According to a 2010 German study, although many teens can have Facebook running in the background all day long, it hasn’t replaced offline interests http://www.netfamilynews.org/?p=29448 ). Hanging out or “chilling” with friends (casual socializing) Messing around (info-gathering, exploring an idea, tinkering with digital media, experimenting, play ) Geeking out (more professional - using digital media the way a musician practices w/ an instrument - more intensive and frequent use, developing higher levels of skill or specialized knowledge) “ Youth engage in peer-based, self-directed learning online. In both friendship-driven and interest-driven online activity, youth create and navigate new forms of expression and rules for social behavior. By exploring new interests, tinkering, and ‘ messing around’ with new forms of media, they acquire various forms of technical and media literacy. Through trial and error, youth add new media skills to their repertoire, such as how to create a video or game, or customize their MySpace page. Teens then share their creations and receive feedback from others online. By its immediacy and breadth of information, the digital world lowers barriers to self-directed learning. Some youth ‘geek out’ and dive into a topic or talent. Contrary to popular images, geeking out is highly social and engaged, although usually not driven primarily by local friendships. Youth turn instead to specialized knowledge groups of both teens and adults from around the country or world, with the goal of improving their craft and gaining reputation among expert peers. While adults participate, they are not automatically the resident experts by virtue of their age. Geeking out in many respects erases the traditional markers of status and authority” (Digital Youth Project summary http://digitalyouth.ischool.berkeley.edu/files/report/digitalyouth-TwoPageSummary.pdf and a review of it &lt;http://www.nwp.org/cs/public/print/resource/3052&gt;).
  11. YOU KNOW THIS, RIGHT? PHONES INCREASINGLY HAVE ALL THE SAME FEATURES AND CAPABILITIES AS COMPUTERS – AND JUST-RELEASED RESEARCH FROM THE PEW PROJECT SHOWS THAT 75% OF US 12-TO-17-YR-OLDS NOW HAVE CELLPHONES [2/3/10 http://www.pewinternet.org/Reports/2010/Social-Media-and-Young-Adults/Part-2/1-Cell-phones.aspx?r=1 ] [How can the ESRB just rate console and Web games when there are 1,000s of games on the iPhone alone?] Rosalind Wiseman, author of Queen Bees &amp; Wannabes : “18 mos. ago I would never have said to a school that their firewalls are irrelevant. Now they are. There is no purpose in any school having any blocks or filters because kids are coming into school with cellphones that have Internet access. More and more the real safety issue has to be about how we treat each other.” 47:45 http://blog.anniefox.com/tag/rosalind-wiseman/ Of course there are phone-only social-network sites (accessible via the Web but designed for phone screens), and MySpace and Facebook – all the major social sites – allow users to update their profiles from their phones. [Based on a study of experts, Pew said cellphones will soon be “the world’s primary tool...” http://www.informationweek.com/news/showArticle.jhtml?articleID=212500798 ; “Big sign of increasingly mobile Web” http://www.netfamilynews.org/2010/01/big-sign-of-increasingly-mobile-web.html ; and “Google Moves to Keep Its Lead as Web Goes Mobile,” 1/4/10 http://www.nytimes.com/2010/01/05/technology/internet/05google.html ]
  12. For 15-year-olds, the preferred communication methods with friends fall in this order: texting (54%), talk face-to-face (42%), calling on a cellphone (41%), social network site (40%, and SNSs have features like IM and email), calling via landline (37%), instant messaging (33%), and email (12%). PEW: “Beyond the cell phone, teens have other arenas for digital communication with their friends. More than a quarter of all teens (26%) reported using social network sites such as Facebook or MySpace to socialize or communicate with their friends daily, while another 38% of all teens never use this form of interaction. Social network sites are used for interpersonal interaction, but also to organize larger events, while the cell phone is for more personal interaction. One high school girl in the focus groups said, &amp;quot;I think Facebook is really [more] dominant than the phone for like, big activities. For just hooking up with friends, I’m on the phone.&amp;quot; Pew/Internet: April 2010 &lt;http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones/Summary-of-findings/Findings.aspx&gt;
  13. There are more than 200,000 apps for the iPhone now, Apple reports http://www.apple.com/iphone/apps-for-iphone/?cid=wwa-naus-seg-iphone10-015&amp;cp=www-seg-iphone10-apps&amp;sr=sem – productivity apps, game apps, shopping apps, news &amp; info apps, and plenty of.. ...and tens of thousands for Android phones, reports Google, creators of the Android OS http://www.apple.com/iphone/apps-for-iphone/?cid=wwa-naus-seg-iphone10-015&amp;cp=www-seg-iphone10-apps&amp;sr=sem . HOW DOES ANYBODY RATE ALL THOSE OR CONTROL ALL THOSE? APPLE CERTAINLY CAN ’T – KIDS THINK IT’S COOL TO JAILBREAK THEIR iPHONES &amp; iPOD TOUCHES SO THEY CAN DOWNLOAD ANYTHING TO THEM (and a high court just declared that legal). [Check out Georgia college student Travis Allen ’s iSchool Initiative for links to nearly 2 dozen educational apps https://www.ischoolinitiative.com/Educational_Applications.html for using cellphones as teaching tools and school and homework helpers. I wrote about him here http://www.netfamilynews.org/?p=28755 . ]
  14. BUT OF COURSE YOUNG PEOPLE ’S SOCIAL TOOLS INCLUDE A LOT MORE THAN SOCIAL NETWORKING! KZERO just announced that that there are more than 1 billion VW accts worldwide and half of them are held by people under 16 &lt;http://www.betterverse.org/2010/10/kzero-over-1-billion-virtual-world-users-half-under-age-16.html&gt; 39% of 3 rd -grade girls are in VWs (Webkinz, Poptropica, BarbieGirls.com, StarDoll.com, and Disney ’s ClubPenguin and Pixie H.) 2009 FTC report on VWs: “ Although little explicit content appeared in child-oriented virtual worlds, a moderate to heavy amount appeared in virtual worlds designed for teens and adults ” &lt;http://ftc.gov/opa/2009/12/virtualworlds.shtm&gt;. Other evidence: Five major feature films and documentaries about virtual worlds and avatars are being released in the US in the 2 nd half of ‘09 and first half of ’10, SJMercury News reports (http://www.mercurynews.com/movies-dvd/ci_13453922?nclick_check=1) Last year, venture capitalists invested about $590 million in virtual worlds, and Helsinki-based Habbo for tweens and teens makes &amp;quot;close to $100m a year&amp;quot; (source: a VC in a new documentary on the subject out of the Netherlands &lt;http://www.youtube.com/watch?v=M0AvgVrnX6U&gt;). Seeing VWs as an important sector its economy going forward, Chinese government commissioned its own VW , now in business, where users can buy anything they see as virtual goods, then order them as real-world clothing and objects (previous source). Global virtual goods market (a subset of the virtual economy) is estimated at $5 billion, 80% coming from China, South Korea, and Japan and only $200-400 million from US. http://www.forbes.com/2009/08/20/virtual-worlds-economy-intelligent-technology-virtual-worlds.html / http://news.bbc.co.uk/2/hi/technology/8425623.stm
  15. SO HERE ’S WHAT WE KNOW NO ABOUT YOUTH RISK ONLINE.... These were the key findings at Harvard ’s Berkman Center Task Force, which I served on in 2008 – the results of a full review of the youth-risk literature in North America (and a good deal of English-language research in Europe). Report: http://cyber.law.harvard.edu/pubrelease/isttf/
  16. SO, REMEMBER WHAT I SAID ABOUT THE ONLINE RISK SPECTRUM REFLECTING THE RISKS OF “REAL LIFE”? WELL, HERE’S THE SPECTRUM OF ONLINE SAFETY. When we look at it this way, we start to consider the rights and freedoms of online life, the context of the new online safety that kids can relate to.
  17. I hope that when I showed you earlier what young people are doing online, you saw that most of it is normal adolescent behavior and development, and THAT is mostly good. And it ’s all tied into their OFFLINE lives, their social groups and school life. But HERE ’s where the Internet does affect what’s going on – what it brings to the table that’s NEW. [talk about list] [ “Taken Out of Context: American Teen Sociality in Networked Publics” http://www.danah.org/papers/TakenOutOfContext.pdf] We would add Disinhibition, a huge factor because of its effect on empathy because of a lack of body language, voice inflection, and facial expression to help the writer or producer understand the impact of his or her speech – why it ’s easy to be mean and hurtful. It points to the great need to help youth understand that those are human beings with feelings behind the profiles, avatars, screennames, and text messages.
  18. [READ QUOTE]. Here ’s why this is important – why it’s wrong for so-called online-safety experts to be always sending the message that young people online are potential victims. Because the research shows that a big risk factor is their own behavior. HERE ’S THE CHART.... [next slide] http://archpedi.ama-assn.org/cgi/content/full/161/2/138 [See also: “Digital risk, digital citizenship” &lt;http://www.netfamilynews.org/2009/05/digital-risk-digital-citizenship.html&gt;.]
  19. [HERE ’S THE BAR CHART:] SEE THE BREAKDOWN HERE: aggressive behavior toward peers, embarrassing peers – but then not just peer-to-peer behavior but also the behavior associated with predation or sexual victimization. Interestingly, sharing personal information in blogs or SN profiles – which is what standard online-safety messaging has been telling kids NOT to do for years – isn ’t itself inherently risky. http://archpedi.ama-assn.org/cgi/content/full/161/2/138 “ The researchers’ conclusions : Talking with people known only online (&amp;quot;strangers&amp;quot;) under some conditions is related to online interpersonal victimization, but sharing personal information is not. Engaging in a pattern of different kinds of online risky behaviors is more influential in explaining victimization than many specific behaviors alone. Pediatricians should help parents assess their child&apos;s online behaviors globally in addition to focusing on specific types of behaviors.” THIS IS THE INDIVIDUALITY FACTOR – The basic message, here, is that people need to talk with their children about how they ’re socializing/behaving online.” To be relevant, the messaging can’t come from dire stories in the news media or law enforcement – that’s like saying “be careful, be afraid about what can happen in your social life.”
  20. Here ’s what you never hear from online-safety experts. [READ QUOTE &amp; DATA, then...] Dr. Rosen ’s definition of “appropriate response” is: “ Telling the person to stop, blocking the person from commenting on their profile, removing themselves from the situation by logging off, reporting the incident to an adult or to site.” That’s what the vast majority of kids do. An earlier study by CACRC found that most solicitations are from peers or young adults, not so-called predators, and can be characterized as flirting . Dr. Rosen also found that fairly low numbers of social networkers were very or extremely upset by such behavior... sexual solicitation (19% upset) harassment (22%), and/or unwanted exposure to sexual materials (20%) Rosen study in Journal of Applied Developmental Psychology, August 2008: &amp;quot;The Association of Parenting Style and Child Age with Parental Limit Setting and Adolescent MySpace Behavior&amp;quot; &lt;http://docs.google.com/gview?attid=0.1&amp;thid=11e993adec902c4f&amp;a=v&amp;pli=1&gt;.
  21. [READ QUOTE] From a CACRC update we had been watching for since 2006: “Trends in Arrests of Online Predators,” by Wolak, Finkelhor &amp; Mitchell at Crimes Against Children Research Center at U. of New Hampshire, March 2009 &lt;http://www.unh.edu/ccrc/pdf/CV194.pdf&gt;

Going even further, USATODAY &lt;http://www.usatoday.com/tech/webguide/internetlife/2009-04-02-online-friends_N.htm&gt; later cited the view of study co-author Finkelhor that “ongoing studies show that being on a social network site doesn’t create risk of sexual victimization.” And, despite all the news about thousands of registered sex offenders being booted off MySpace, there hasn ’t been a single prosecution of an offender for contact with a minor on a social network site. If there had been, it would’ve been in the news. [One reporter who blogged about RSOs on MySpace had a screenshot of a so-called offender’s profile in her article. I looked at it carefully and found that it hadn’t been updated since it had been established – there had been no activity on the profile; it was dead. Anyone can grab a photo off a sex offender Web site and create a profile because anyone can create a profile with any photo. News reporters really need to understand the facts before reporting so-called news and misleading and scaring the public. http://www.netfamilynews.org/2009/03/major-update-on-net-predators-mostly.html
  22. So here ’s the question that has been on a lot of parents’ concerned minds [read it]....
  23. That chart ’s from the University of New Hampshire, using data gathered at Cornell University. From 1990 to 2005 – the period of time that the Web was born and grew most rapidly – there was a 51% decline in overall child sexual exploitation – the chart ’s showing that : out of every 10,000 US minors, 23 were abused, with that no. going down to 11 in 2005. NCANDS = National Child Abuse &amp; Neglect Data System at Cornell University [&lt;18 per 10,000 children is less than 2/10 of 1%, I think] AND THE TREND IS CONTINUING....
  24. When they added in the latest figure (2008), the downward trend in overall child sexual victimization )which would include Internet-related cases) continues, with a 6% decline from 2007 to 2008, making the overall decline from 1992 58%. “ Updated Trends in Child Maltreatment, 2008” &lt;http://www.unh.edu/ccrc/pdf/CV203_Updated%20Trends%20in%20Child%20Maltreatment%202008_8-6-10.pdf&gt; More on the long-term picture at CACRC site &lt;http://www.unh.edu/ccrc/Trends/index.html&gt;
  25. Dr. Christopher Ferguson at Texas A&amp;M wrote, “The research on current youth is pretty clear that this generation of young people is actually one of the psychologically healthiest on record (since at least the 1960s).” “ All [the above] compared to scores from 15-20 years ago when it might have been reasonable to worry greatly about youth.“ http://christopher.ferguson.socialpsychology.org / See also: * “ ‘ Juvenoia, ’ Part 1: Why Internet fear is overrated ” http://www.netfamilynews.org/?p=30220 * Net-related ‘ juvenoia, ’ Part 2: So why are we afraid? http://www.netfamilynews.org/?p=30266
  26. THESE ARE THE CHARACTERISTICS OF THE MOST EGREGIOUS CASES, THE LIFE-CHANGING ONES: Though kids who ’d experienced cyberbullying said they’d felt sad, upset, violated, depressed, hated, stupid &amp; put down, annoyed, and exploited, they ALSO felt the bullies were stupid, pathetic, bored, and didn’t have anything better to do ( which doesn’t sound like they were completely devastated by the bullying, right? – 55% indicated that being cyberbullied had “no negative effect” on them. HOWEVER , these “attitudes of dismissal” were particularly common in cases of harassment rather than cyberbullying. -- “Victimization of Adolescent Girls” – Amanda Burgess-Proctor, Sameer Hinduja, and Justin Patchin &lt;http://www.cyberbullying.us/cyberbullying_girls_victimization.pdf&gt; “ Cyberbullying better defined” &lt;http://www.netfamilynews.org/2008/09/cyberbullying-better-defined.html&gt; 2009 ISTTF report, pp. 19-20 &amp;quot;With all three types of threats (sexual solicitation, online harassment, and problematic content), some youth are more likely to be at risk than others . Generally speaking, the characteristics of youth who report online victimization are similar to those of youth reporting offline victimization and those who are vulnerable in one online context are often vulnerable in multiple contexts (Finkelhor 2008).
  27. The numbers are all over the map. Some studies found only about 5.9% of teens had been cyberbullied, all the way up to 72% . But MOST were in the range of 15% to 35% of teens experiencing this kind of bullying. It ’s important to see that it’s way under-reported . Kids say that’s because they feel they’re supposed to work these things out themselves, also that they fear getting an adult involved can make things even worse. It ’s also important to see that it’s about child development, not technology. Cyberbullying is not a problem because of computers and the Internet. It’s a behavioral problem. The anonymity of the Internet CAN make it worse, though. Blurry line because kids don ’t make that big distinction between online and offline . They just socialize or argue or gossip or whatever – online or offline doesn’t matter. So the environment we ’re mainly talking about is SCHOOL, not the Internet We need to be careful too about using only the word “cyberbullying.” It’s our adult word, not theirs [tell about how Louisa said nobody cyberbullied at HER school, but girls sure were mean to each other online!].
  28. From an excellent piece by Los Angeles middle school language arts teacher Kathie Marshall in Teacher magazine &lt;http://www.edweek.org/tm/articles/2010/07/28/tln_marshall_bullyingandproactivity.html?tkn=TQOF6Y7WJBeVc87fMrpNq2cVDU9LQ23PIYTq&amp;cmp=clp-edweek&gt; describing how she turned a serious bullying situation (students creating a “gang” and bullying non-members) into not only a “teachable moment” but a series of lesson plans involving critical thinking, research, writing, etc. “ We learned, too, that bullies who don’t outgrow or change their ways suffer long-term consequences: alcohol use, smoking, inability to make friends, and poor academic achievement.” They may be popular in m.s., but “older bullies are not. Most interesting to students was the statistic that by age 24, 60 percent of adult bullies have a criminal conviction .”
  29. These signs are important for parents to be aware of, but let ’s hope it doesn’t get this far before their child has talked with them about the problem. [See “Online harassment: Not telling parents” http://www.netfamilynews.org/2008/10/online-harassment-not-telling-parents.html ). See also ConnectSafely.org ’s “Tips to Help Stop Cyberbullying” http://www.connectsafely.org/safety-tips/safety-tips/tips-to-help-stop-cyberbullying.html .]
  30. There are all important but very general – certainly each incident is unique and needs caring individual treatment – a full, nonconfrontational, child-caregiver discussion that looks at the situation ’s circumstances. A school counselor I spoke with several years ago would find out all the parties involved, get them in a room, and do bully-victim reverse role-playing ( empathy training ). In families and schools, some of these incidents can be turned into TEACHABLE MOMENTS (maybe anonymized?) for all parties ’ benefit.
  31. Video from Bulgaria ’s “Think B4 You Post” campaign &lt;http://www.youtube.com/watch?v=HpPmo26mX9s&gt; Shows how universal youth online risk is (you don ’t need to speak Bulgarian to get the message!). [Very dramatic 10.5-min. UK version (CEOP) here &lt;http://www.youtube.com/watch?v=4ovR3FF_6us&gt;]
  32. Despite a lot of scary news coverage, it ’s important to know that a recent study [by Pew/Internet in DC] found that 96% of teens DON’T send sexting messages.... “ Teen sexting: Troubling, but don’t overreact” http://www.connectsafely.org/Safety-Advice-Articles/teen-sexting-troubling-but-dont-overreact.html “ Sexting: The new ‘spin-the-bottle’?” http://www.netfamilynews.org/2009/06/sexting-new-spin-bottle.html “ Teaching about sexting: Social Web lesson plan” http://www.netfamilynews.org/2009/06/teaching-about-sexting-social-web.html “ Sexting overblown? Yes and *no*” http://www.netfamilynews.org/2009/03/sexting-overblown-yes-and-no.html “ Fla. teen a registered sex offender for sexting” http://www.netfamilynews.org/2009/04/fl-teen-registered-sex-offender-for.html
  33. Here ’s the data picture after several studies. The AP/MTV survey released in Dec. (12/3/09) – was about digital abuse , not just sexting, as the headlines implied. Digital abuse is defined as ”spreading lies, violation of trust, and digital disrespect” – what we really need to focus on in online safety going forward. This is about trust and respect – for self and others. The 50% figure you may&apos;ve seen in some headlines refers to the percentage of youth who have experienced &amp;quot;digital abuse from the mild to the extreme.” The MTV/AP study also found that 45% of sexually active youth report being involved with sexting (another confirmation of the ISTTF finding that those most at risk offline are those most at risk online). Pew – which looked only at sexting as photos shared on phones – also found that 1) older teens are more likely to engage in sexting, 2) there was no gender difference, 3) more intense cellphone users are more likely to receive sext messages, and sexting is higher among kids not on family cellphone plans (e.g., who pay for their own phones or have stealth phones a boy or girlfriend gave them). How young people view sexting is complex &amp; individual: those who ’ve engaged in it see it as everything from &amp;quot;hot” ... and &amp;quot;trusting”... to &amp;quot;uncomfortable”... and &amp;quot;slutty,&amp;quot; and those who don&apos;t engage in it call it &amp;quot;gross,&amp;quot; &amp;quot;uncomfortable,&amp;quot; and &amp;quot;stupid.” [The explanation for Pew ’s lower (4%) figure may be that it focused solely on images on cellphones because that’s the scenario where child porn law kicks in.] http://www.netfamilynews.org/2009/06/sexting-picture-bit-clearer-maybe.html , links to Cox/Harris Interactive survey 12/09 AP/MTV study on digital abuse that includes sexting: http://www.netfamilynews.org/2009/12/new-study-on-digital-abuse-youth.html (links to study exec summ) 12/09 Pew study http://www.netfamilynews.org/2009/12/sexting-new-study-truth-or-dare.html
  34. I mentioned the legal consequences, though laws, prosecutors and juvenile judges are slowly getting up to speed on this, but here are some serious non-legal consequences. http://www.connectsafely.org/Safety-Tips/tips-to-prevent-sexting.html
  35. LOTS of reasons. They range from developmentally normative adolescent behavior ... to malicious intent ... to criminal intent. E.g., “Revenge porn” in UrbanDictionary.com – “ Homemade porn uploaded by ex-girlfriend or (usually) ex-boyfriend after particularly vicious breakup as a means of humiliating the ex or just for own amusement ” E.g., “Truth or Dare” – remember that classic middle school rite-of-passage sort of game? Rosalind Wiseman of Queen Bees &amp; Wannabes tells of how, up until a few years ago, when 7 th and 8 th grade girls played it at slumber parties, there were no serious consequences, but now – when it’s “I dare you to take a naked photo of yourself and send it to the boy you like” and the girl does it because of all that peer pressure from their homies – the consequences can be very serious! Note that the boys only get involved later. My blog post: http://www.netfamilynews.org/2009/12/sexting-new-study-truth-or-dare.html Annie Fox interview of Rosalind Wisemand http://blog.anniefox.com/2009/12/07/podcast-queen-bees-go-hi-tech/ “ Sexting: The peer pressure factor ” &lt;http://www.netfamilynews.org/2009/09/sexting-peer-pressure-factor.html&gt;
  36. A survey specifically on sexting and cyberbullying earlier last year (sponsored by Cox Communications) found sext messages went to a diverse array of recipients.
  37. 90% of teens surveyed who ’d sent sext messages said “nothing bad happened” as a result, so It’s helpful to keep in mind that – though the potential impacts can be horrendous (from serious emotional harm to sex offender registries) – the vast majority of incidents had little impact, thank goodness. At the conference, someone asked if kids always knew if something bad happened. I ’m not sure the research went into that, but I think they would know. It would get back to them if the consequences were bad.
  38. The APA Task Force on Zero Tolerance (2008) carefully reviewed the research literature and concluded: “ Schools with higher rates of school suspension and expulsion appear to have less satisfactory ratings of school climate, less satisfactory school governance structures, and to spend a disproportionate amount of time on disciplinary matters. Perhaps more importantly, recent research indicates a negative relationship between the use of school suspension and expulsion and school-wide academic achievement (p. 855).” From Dr. Patti Agatston: Sue wrote about this in our book.  Her main point was that 1 in 5 students report regularly bullying others with some frequency, so it doesn&apos;t make sense to suspend every fifth child from our schools.  She also writes about how threats of severe punishment would discourage youth and adults from reporting.   So you can cite our book if you like but I don&apos;t have a specific research study for you. But I can tell you anecdotally that Georgia had a three-strikes-you ’re-out policy for bullying and so administrators found every possible way they could to record aggressive actions without putting it under the bullying policy.  So our bullying discipline reports were almost nonexistent despite the fact that the Olweus bullying surveys showed fairly high rates of bullying in some of our schools.  I am skeptical if the new law will change that since they still have kept the suspension/expulsion piece in it, although perhaps the required reporting/investigation piece will make a difference.
  39. 2 nd bullet: Program launched this fall (2010) is Net-safety professional dev ’t for educators because Illinois requires all public schools to teach online safety in grades 3-12 (and teachers didn’t know what to teach) Mary Anderson, a sr advisor to Gen ’l Madigan told me that, for cyberbullying, their office is really wanting to stress peer mediation over punishment or certainly prosecution for cyberbullying.
  40. What does the school community need to focus on? Citizenship, both digital and real-world. Because so much of our children ’s time is spent in school, school is the 2 nd most important environment (after home) for them to learn and practice good citizenship online and offline. Here ’s what the OSTWG, which I had the honor of co-chairing, wrote to lawmakers: “We need to recognize that, by far, the most common risk to children stems from their own actions and those of their peers and that many of these risks are not new. It is the delivery mechanisms which are [new]. While technology can be used to amplify or facilitate bullying, for example, it is not the cause of the problem. In addition to sending a message that bullying and harassment will not be tolerated, work needs to be done starting in Kindergarten or earlier on “digital citizenship” – or rather a renewed effort to teach citizenship online and offline – encouraging children to respect themselves and others. This baseline (or “Primary”) online-safety education cannot take place in a vacuum – or only in a single sphere of youth activity – but must promote movement toward greater civility not just among young people but also parents, educators, youth workers and other role models..... The government can’t legislate civility, but it can encourage it. This will not be an easy fix but, like cutting down on smoking, racism, sexism and other social ills, it can be accomplished through awareness-raising over time.”
  41. What IS citizenship? Artist, writer, and SUNY Buffalo instructor) A.J. Patrick Liszkiewicz recently wrote about its most basic definition (READ IT). This was confirmed by two psychology professors writing in the NYT: “ Our research on child development makes it clear that there is only one way to truly combat bullying.... As an essential part of the school curriculum, we have to teach children how to be good to one another, how to cooperate, how to defend someone who is being picked on and how to stand up for what is right.” &lt;http://www.nytimes.com/2010/07/23/opinion/23engel.html&gt; [See also: “Digital risk, digital citizenship” &lt;http://www.netfamilynews.org/2009/05/digital-risk-digital-citizenship.html&gt;.]
  42. Media literacy and digital citizenship are melting into each other now – because media are behavioral, or social and digital citizenship occurs in media. The critical thinking of media literacy and citizenship includes questions such as: what are the impacts of my speech, actions, and productions (like blogs and videos) on fellow community members, classmates, and the community itself – not just on me?
  43. For too long – for 15 years, since the beginning of online safety – we ’ve been doing Internet safety from the outside-in. Looking at the worst cases – usually criminal activity, since it was police delivering the messages for a long time – and creating education messaging base on those really bad public cases and news shows like “To Catch a Predator,” which had nothing to do with how kids use the Internet. Kids are more likely to get struck by lightning than have a stranger abduct and hurt them. So we need to work from the inside-out – the kid out, just as we do in the rest of their lives, and that means we need to keep those lines of communication open and talk with them about their technology use just like everything else. THANK you!