SlideShare uma empresa Scribd logo
1 de 17
Understanding the relation between risk and harm:
Theory, evidence and policy regarding children's internet use




Sonia Livingstone, LSE
A context of public anxieties
Research and policy agendas
Three phases of work
A ladder of
opportunities
Classifying risks (exemplars)

             Content                 Contact                      Conduct
             Child as receiver       Child as participant         Child as actor
             (of mass productions)   (adult-initiated activity)   (perpetrator / victim)

Aggressive   Violent / gory          Harassment,                  Bullying, hostile
             content                 stalking                     peer activity


Sexual       Pornographic            ‘Grooming’, sexual           Sexual
             content                 abuse on meeting             harassment,
                                     strangers                    ‘sexting’
Values       Racist / hateful        Ideological                  Potentially harmful
             content                 persuasion                   user-generated
                                                                  content
Commercial Embedded                  Personal data                Gambling,
             marketing               misuse                       copyright
                                                                  infringement
EU Kids Online findings

             Content                 Contact                      Conduct
             Child as receiver       Child as participant         Child as actor
             (of mass productions)   (adult-initiated activity)   (victim / perpetrator)

Aggressive   Violent / gory          Harassment,                  Bullying
             content                 stalking
                                                                                   6%
Sexual       Pornographic            Meeting ‘strangers’          ‘Sexting’

                         14%                          9%                       15%
             content

Values       Racist / hateful        Ideological                  Potentially harmful

                         12%
             content                 persuasion                   user-generated
                                                                  content      21%
Commercial Embedded                  Personal data                Gambling,

                                                      9%
             marketing               misuse                       copyright
                                                                  infringement
Did this bother or upset you?

             Content                 Contact                      Conduct
             Child as receiver       Child as participant         Child as actor
             (of mass productions)   (adult-initiated activity)   (victim / perpetrator)

Aggressive   Violent / gory          Harassment,                  Bullying
             content                 stalking
                                                                            4 in 5
Sexual       Pornographic            Meeting a ‘stranger’         ‘Sexting’

                      1 in 3                     1 in 9                     1 in 4
             content

Values       Racist / hateful        Ideological                  Potentially harmful
             content                 persuasion                   user-generated
                                                                  content
Commercial Embedded                  Personal data                Gambling,
             marketing               misuse                       copyright
                                                                  infringement
Comparing risks

                                        Sexual                Sexual           Meeting
                                                 Bullying
                                        images               messages*        new people

Experienced the risk at all              23        19              ---             ---

Experienced the risk online              14         6             15                9

Online perpetrators                       ---       3              3               ---

Felt bothered                             4        ---             4                1

Felt bothered                            32        ---            25               11
(% of those who experienced the risk)

(Fairly) upset                           44        55             45               50
(% of those who felt bothered)

                                                            Base: All children, n=25,142
                                                            * only 11-16 years
What’s on the internet that
bothers people your age?
Risks and opportunities
Comparing user types
Comparing countries


                      “Lower use, lower risk”

                      “Lower use, some risk”

                      “Higher use, some risk”

                      “Higher use, higher risk”
Refuting top 10 myths
Conclusions

   Producing evidence-based policy is impeded by the persistence of the moral panic agenda in public
    and policy discourses. The EU Kids Online network has worked in dialogue with stakeholders to
    explain the findings of its 25 country in-home survey of 25142 children aged 9-16.

   We propose a classification of risks that recognises the involvement of the child as receiver,
    participant or actor in a range of risk situations. Our findings reveal that the incidence of online risks
    is not as high as feared and the proportion of children who report harm is even lower.

   It is not my purpose to minimise the real risk of harm to children online, and the EU Kids Online
    network has worked hard to advise policy makers on how to manage or reduce this risk. But it is
    important to distinguish risk from harm – both because the factors that shape each are different,
    and because if they are confused, the harm is misleadingly exaggerated.

   We also show that risks and opportunities go hand in hand, and thus efforts to manage risk can
    have the unintended consequence of reducing opportunities, itself problematic given how few
    children benefit as yet from a deep or wide engagement with the internet.

   Thus it is important to recognise that in our increasingly risk-averse culture, opportunities are too
    easily sacrificed to risk management, the grey zone between risks and opportunities („risky
    opportunities‟) is misunderstood, and children cannot gain the experiences that build resilience.
The EU Kids Online Network

 Our multi- national collaboration
   has produced two books:




 Reports, methods and data are
   at: www.eukidsonline.net
Selected reports

   Dürager, A. & Livingstone, S. (2012) How can parents support children's internet safety?
    http://eprints.lse.ac.uk/id/eprint/42872
   Livingstone, S., Haddon, L., Görzig, A., and Ólafsson (2011) EU Kids Online Final Report.
    http://eprints.lse.ac.uk/39351/
   O‟Neill, B., Livingstone, S. and McLaughlin, S. (2011). Final recommendations for policy,
    methodology and research. http://eprints.lse.ac.uk/39410/
   Livingstone, S., Haddon, L., Görzig, A. and Ólafsson, K. (2011) Risks and safety on the
    internet: The perspective of European children. http://eprints.lse.ac.uk/33731/
   Livingstone, S., Haddon, L., Görzig, A., & Ólafsson, K. (2011) Disadvantaged children and
    online risk. http://eprints.lse.ac.uk/39385/
   Görzig, A. (2011) Who bullies and who is bullied online? A study of 9-16 year old internet users
    in 25 European countries. http://eprints.lse.ac.uk/39601/
   Livingstone, S., Ólafsson, K. and Staksrud, E. (2011) Social networking, age and privacy.
    http://eprints.lse.ac.uk/35849/
   Sonck, N., Livingstone, S., Kuiper, E. and de Haan, J. (2011) Digital literacy and safety skills.
    http://eprints.lse.ac.uk/33733/
   Livingstone, S. and Ólafsson, K. (2011) Risky communication online.
    http://eprints.lse.ac.uk/33732/

Mais conteúdo relacionado

Mais procurados

Online safety for children
Online safety for childrenOnline safety for children
Online safety for childrenKumar Manish
 
Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 ParentsIwith.org
 
Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesMarian Merritt
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignKimberly Gonzalez
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011KanelandSvihlik
 
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...Stevecd
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Jim Adler
 
Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internetmerlyna
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013KanelandSvihlik
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011DHE2008
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Munch, poke, ping presentation
Munch, poke, ping presentationMunch, poke, ping presentation
Munch, poke, ping presentationonlineyouthwork
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...Rajeev Ranjan
 

Mais procurados (20)

Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 Parents
 
What Parents Should Know
What Parents Should KnowWhat Parents Should Know
What Parents Should Know
 
Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and Consequences
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education Campaign
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
 
Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internet
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Munch, poke, ping presentation
Munch, poke, ping presentationMunch, poke, ping presentation
Munch, poke, ping presentation
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...
 

Semelhante a Understanding the relation between risk and harm. EU Kids Online.

E safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-daviesE safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-daviesStephen Carrick-Davies
 
Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)Stephen Carrick-Davies
 
Advertisement pitch
Advertisement pitchAdvertisement pitch
Advertisement pitchacbtec
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013Stevecd
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Eu Kids Online II key findings 11 april 2011
Eu Kids Online II key findings 11 april 2011Eu Kids Online II key findings 11 april 2011
Eu Kids Online II key findings 11 april 2011daniel_eukids
 
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakRaising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakBex Lewis
 
Safeguarding Children & Young People Online
Safeguarding Children & Young People OnlineSafeguarding Children & Young People Online
Safeguarding Children & Young People OnlineClaudia Megele
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetysharon7111
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internetmalissa_1041
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Larry Magid
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...Stevecd
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetinganniebee3509
 

Semelhante a Understanding the relation between risk and harm. EU Kids Online. (20)

E safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-daviesE safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-davies
 
Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)
 
Technology and vulnerable users tink palmer (1)
Technology and vulnerable users   tink palmer (1)Technology and vulnerable users   tink palmer (1)
Technology and vulnerable users tink palmer (1)
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
NSBA2010
NSBA2010NSBA2010
NSBA2010
 
Advertisement pitch
Advertisement pitchAdvertisement pitch
Advertisement pitch
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Eu Kids Online II key findings 11 april 2011
Eu Kids Online II key findings 11 april 2011Eu Kids Online II key findings 11 april 2011
Eu Kids Online II key findings 11 april 2011
 
Web safety
Web safetyWeb safety
Web safety
 
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakRaising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
 
Safeguarding Children & Young People Online
Safeguarding Children & Young People OnlineSafeguarding Children & Young People Online
Safeguarding Children & Young People Online
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meeting
 

Último

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Understanding the relation between risk and harm. EU Kids Online.

  • 1. Understanding the relation between risk and harm: Theory, evidence and policy regarding children's internet use Sonia Livingstone, LSE
  • 2. A context of public anxieties
  • 6. Classifying risks (exemplars) Content Contact Conduct Child as receiver Child as participant Child as actor (of mass productions) (adult-initiated activity) (perpetrator / victim) Aggressive Violent / gory Harassment, Bullying, hostile content stalking peer activity Sexual Pornographic ‘Grooming’, sexual Sexual content abuse on meeting harassment, strangers ‘sexting’ Values Racist / hateful Ideological Potentially harmful content persuasion user-generated content Commercial Embedded Personal data Gambling, marketing misuse copyright infringement
  • 7. EU Kids Online findings Content Contact Conduct Child as receiver Child as participant Child as actor (of mass productions) (adult-initiated activity) (victim / perpetrator) Aggressive Violent / gory Harassment, Bullying content stalking 6% Sexual Pornographic Meeting ‘strangers’ ‘Sexting’ 14% 9% 15% content Values Racist / hateful Ideological Potentially harmful 12% content persuasion user-generated content 21% Commercial Embedded Personal data Gambling, 9% marketing misuse copyright infringement
  • 8. Did this bother or upset you? Content Contact Conduct Child as receiver Child as participant Child as actor (of mass productions) (adult-initiated activity) (victim / perpetrator) Aggressive Violent / gory Harassment, Bullying content stalking 4 in 5 Sexual Pornographic Meeting a ‘stranger’ ‘Sexting’ 1 in 3 1 in 9 1 in 4 content Values Racist / hateful Ideological Potentially harmful content persuasion user-generated content Commercial Embedded Personal data Gambling, marketing misuse copyright infringement
  • 9. Comparing risks Sexual Sexual Meeting Bullying images messages* new people Experienced the risk at all 23 19 --- --- Experienced the risk online 14 6 15 9 Online perpetrators --- 3 3 --- Felt bothered 4 --- 4 1 Felt bothered 32 --- 25 11 (% of those who experienced the risk) (Fairly) upset 44 55 45 50 (% of those who felt bothered) Base: All children, n=25,142 * only 11-16 years
  • 10. What’s on the internet that bothers people your age?
  • 13. Comparing countries “Lower use, lower risk” “Lower use, some risk” “Higher use, some risk” “Higher use, higher risk”
  • 15. Conclusions  Producing evidence-based policy is impeded by the persistence of the moral panic agenda in public and policy discourses. The EU Kids Online network has worked in dialogue with stakeholders to explain the findings of its 25 country in-home survey of 25142 children aged 9-16.  We propose a classification of risks that recognises the involvement of the child as receiver, participant or actor in a range of risk situations. Our findings reveal that the incidence of online risks is not as high as feared and the proportion of children who report harm is even lower.  It is not my purpose to minimise the real risk of harm to children online, and the EU Kids Online network has worked hard to advise policy makers on how to manage or reduce this risk. But it is important to distinguish risk from harm – both because the factors that shape each are different, and because if they are confused, the harm is misleadingly exaggerated.  We also show that risks and opportunities go hand in hand, and thus efforts to manage risk can have the unintended consequence of reducing opportunities, itself problematic given how few children benefit as yet from a deep or wide engagement with the internet.  Thus it is important to recognise that in our increasingly risk-averse culture, opportunities are too easily sacrificed to risk management, the grey zone between risks and opportunities („risky opportunities‟) is misunderstood, and children cannot gain the experiences that build resilience.
  • 16. The EU Kids Online Network  Our multi- national collaboration has produced two books:  Reports, methods and data are at: www.eukidsonline.net
  • 17. Selected reports  Dürager, A. & Livingstone, S. (2012) How can parents support children's internet safety? http://eprints.lse.ac.uk/id/eprint/42872  Livingstone, S., Haddon, L., Görzig, A., and Ólafsson (2011) EU Kids Online Final Report. http://eprints.lse.ac.uk/39351/  O‟Neill, B., Livingstone, S. and McLaughlin, S. (2011). Final recommendations for policy, methodology and research. http://eprints.lse.ac.uk/39410/  Livingstone, S., Haddon, L., Görzig, A. and Ólafsson, K. (2011) Risks and safety on the internet: The perspective of European children. http://eprints.lse.ac.uk/33731/  Livingstone, S., Haddon, L., Görzig, A., & Ólafsson, K. (2011) Disadvantaged children and online risk. http://eprints.lse.ac.uk/39385/  Görzig, A. (2011) Who bullies and who is bullied online? A study of 9-16 year old internet users in 25 European countries. http://eprints.lse.ac.uk/39601/  Livingstone, S., Ólafsson, K. and Staksrud, E. (2011) Social networking, age and privacy. http://eprints.lse.ac.uk/35849/  Sonck, N., Livingstone, S., Kuiper, E. and de Haan, J. (2011) Digital literacy and safety skills. http://eprints.lse.ac.uk/33733/  Livingstone, S. and Ólafsson, K. (2011) Risky communication online. http://eprints.lse.ac.uk/33732/