SlideShare uma empresa Scribd logo
1 de 22
Protecting and empowering children online
“ Helping to make the internet  a great and safe place for children” Promoting the positive   Responding to the negative
The potential risks online Commerce ,[object Object],[object Object],[object Object],Content ,[object Object],[object Object],[object Object],[object Object],Contact ,[object Object],[object Object],[object Object]
Cyberbullying - How can this feel? See film online at   http://www.digizen.org/cyberbullying/film.aspx
Strategic Partnerships Education & Awareness Legislation and Law Enforcement Self-regulation and Hotlines Filtering and technical tools
Education
Children and Young People ,[object Object],[object Object],[object Object],[object Object]
Kidsmart website and resources ,[object Object]
Skills School
Parents ,[object Object],[object Object],[object Object],[object Object]
www.childnet.com/kia
Schools ,[object Object],[object Object]
Know IT All resources ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cyberbullying Guidance for Schools Cyberbullying: Understanding Preventing Responding
[object Object],[object Object],[object Object]
Targeted quality resources
UK Safer Internet Centre ,[object Object],[object Object]
www.teachtoday.eu
CEOP The Child Exploitation Online Protection Centre www.ceop.gov.uk
Lessons from Education ,[object Object],[object Object],[object Object],[object Object],[object Object]
www.childnet.com
CONTACT:  Thank you [email_address]

Mais conteúdo relacionado

Mais procurados

Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
ConnectSafely
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
mwedwards
 
Digitalrights
DigitalrightsDigitalrights
Digitalrights
cdavis12
 

Mais procurados (18)

Common sense technology policy2
Common sense technology policy2Common sense technology policy2
Common sense technology policy2
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
 
Online Safety
Online SafetyOnline Safety
Online Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
McKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullyingMcKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullying
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
 
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Digitalrights
DigitalrightsDigitalrights
Digitalrights
 
Fv
FvFv
Fv
 
Teaching digital citizenship in a not so-digital setting
Teaching digital citizenship in a not so-digital settingTeaching digital citizenship in a not so-digital setting
Teaching digital citizenship in a not so-digital setting
 
It’s time to talk about privacy
It’s time to talk about privacyIt’s time to talk about privacy
It’s time to talk about privacy
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Sara
SaraSara
Sara
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Technology & Mental Health Parents Seminar: Sophie Linington
Technology & Mental Health Parents Seminar: Sophie LiningtonTechnology & Mental Health Parents Seminar: Sophie Linington
Technology & Mental Health Parents Seminar: Sophie Linington
 

Destaque

Globo.com & Varnish
Globo.com & VarnishGlobo.com & Varnish
Globo.com & Varnish
lokama
 
Prezentacja korzysci Fm Mobile dla Biznesfm.pl
Prezentacja korzysci Fm Mobile dla Biznesfm.plPrezentacja korzysci Fm Mobile dla Biznesfm.pl
Prezentacja korzysci Fm Mobile dla Biznesfm.pl
biznesfm.pl
 
Hiv aids sample questions based on neet pg , usmle, plab and fmge pattern (mc...
Hiv aids sample questions based on neet pg , usmle, plab and fmge pattern (mc...Hiv aids sample questions based on neet pg , usmle, plab and fmge pattern (mc...
Hiv aids sample questions based on neet pg , usmle, plab and fmge pattern (mc...
Medico Apps
 
Diapositivas de Web profunda
Diapositivas de Web profundaDiapositivas de Web profunda
Diapositivas de Web profunda
mcmazon
 
presentacion cibersociedad
presentacion cibersociedadpresentacion cibersociedad
presentacion cibersociedad
Garcia505
 

Destaque (20)

Elevador eléctrico para video proyector
Elevador eléctrico para video proyectorElevador eléctrico para video proyector
Elevador eléctrico para video proyector
 
Scel adc
Scel adcScel adc
Scel adc
 
Previsiones de la demanda energía
Previsiones de la demanda energíaPrevisiones de la demanda energía
Previsiones de la demanda energía
 
Quien ordena a quien, y que se ordena en el territorio
Quien ordena a quien, y que se ordena en el territorioQuien ordena a quien, y que se ordena en el territorio
Quien ordena a quien, y que se ordena en el territorio
 
¡¡CUIDA TU PIEL !!
¡¡CUIDA TU PIEL  !!¡¡CUIDA TU PIEL  !!
¡¡CUIDA TU PIEL !!
 
Globo.com & Varnish
Globo.com & VarnishGlobo.com & Varnish
Globo.com & Varnish
 
Empleo ENFINET 241
Empleo  ENFINET 241Empleo  ENFINET 241
Empleo ENFINET 241
 
PRESENTATION CPGID AKKERMAN
PRESENTATION CPGID AKKERMANPRESENTATION CPGID AKKERMAN
PRESENTATION CPGID AKKERMAN
 
Casos| 2da Sesión| Alejandra Jazmín Simental Franco
Casos| 2da Sesión| Alejandra Jazmín Simental FrancoCasos| 2da Sesión| Alejandra Jazmín Simental Franco
Casos| 2da Sesión| Alejandra Jazmín Simental Franco
 
Fulltext01
Fulltext01Fulltext01
Fulltext01
 
Presentación Institucional 2014
Presentación Institucional 2014Presentación Institucional 2014
Presentación Institucional 2014
 
Qué es IMS
Qué es IMSQué es IMS
Qué es IMS
 
Abadia De Melk
Abadia De MelkAbadia De Melk
Abadia De Melk
 
Prezentacja korzysci Fm Mobile dla Biznesfm.pl
Prezentacja korzysci Fm Mobile dla Biznesfm.plPrezentacja korzysci Fm Mobile dla Biznesfm.pl
Prezentacja korzysci Fm Mobile dla Biznesfm.pl
 
Kemira IR Deck - May 2015
Kemira IR Deck - May 2015Kemira IR Deck - May 2015
Kemira IR Deck - May 2015
 
SUNOPTICS VERSUS BRISTOLITE - CUANDO LO BARATO SALE CARO, EL SALVADOR
SUNOPTICS VERSUS BRISTOLITE - CUANDO LO BARATO SALE CARO, EL SALVADORSUNOPTICS VERSUS BRISTOLITE - CUANDO LO BARATO SALE CARO, EL SALVADOR
SUNOPTICS VERSUS BRISTOLITE - CUANDO LO BARATO SALE CARO, EL SALVADOR
 
Hiv aids sample questions based on neet pg , usmle, plab and fmge pattern (mc...
Hiv aids sample questions based on neet pg , usmle, plab and fmge pattern (mc...Hiv aids sample questions based on neet pg , usmle, plab and fmge pattern (mc...
Hiv aids sample questions based on neet pg , usmle, plab and fmge pattern (mc...
 
Diapositivas de Web profunda
Diapositivas de Web profundaDiapositivas de Web profunda
Diapositivas de Web profunda
 
Proyecto Grado
Proyecto GradoProyecto Grado
Proyecto Grado
 
presentacion cibersociedad
presentacion cibersociedadpresentacion cibersociedad
presentacion cibersociedad
 

Semelhante a CTO-CybersecurityForum-2010-Will Gardner

Murphy Ppt.Digital Citizenship In Our Schools
Murphy Ppt.Digital Citizenship In Our SchoolsMurphy Ppt.Digital Citizenship In Our Schools
Murphy Ppt.Digital Citizenship In Our Schools
Kevin Murphy
 
Parent meeting
Parent meetingParent meeting
Parent meeting
lightb
 
Child online protection a collective responsibillity
Child online protection   a collective responsibillityChild online protection   a collective responsibillity
Child online protection a collective responsibillity
chioma Ibe
 

Semelhante a CTO-CybersecurityForum-2010-Will Gardner (20)

ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Murphy Ppt.Digital Citizenship In Our Schools
Murphy Ppt.Digital Citizenship In Our SchoolsMurphy Ppt.Digital Citizenship In Our Schools
Murphy Ppt.Digital Citizenship In Our Schools
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachChild Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
 
Parent meeting
Parent meetingParent meeting
Parent meeting
 
C20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINEC20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINE
 
Being safe online guidelines
Being safe online guidelinesBeing safe online guidelines
Being safe online guidelines
 
Sid leaflet
Sid leafletSid leaflet
Sid leaflet
 
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptxSafeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
 
Esafety ncn july 2014
Esafety ncn july 2014Esafety ncn july 2014
Esafety ncn july 2014
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Ruth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldRuth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital World
 
Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and Safety
 
ahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptx
 
Final project
Final projectFinal project
Final project
 
Child online protection a collective responsibillity
Child online protection   a collective responsibillityChild online protection   a collective responsibillity
Child online protection a collective responsibillity
 
KIAParentsPresentation.ppt
KIAParentsPresentation.pptKIAParentsPresentation.ppt
KIAParentsPresentation.ppt
 
Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhat
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 

Mais de segughana

CTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-KattaniCTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-Kattani
segughana
 
CTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-ReportCTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-Report
segughana
 
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Boren
segughana
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouse
segughana
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Ward
segughana
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johanson
segughana
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victor
segughana
 
CTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des WardCTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des Ward
segughana
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
segughana
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
segughana
 
CTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia AsognweCTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia Asognwe
segughana
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
segughana
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
segughana
 
CTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John CarrCTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John Carr
segughana
 
CTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John CrainCTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John Crain
segughana
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundu
segughana
 
CTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe TorresCTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe Torres
segughana
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
segughana
 
CTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-OramCTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-Oram
segughana
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
segughana
 

Mais de segughana (20)

CTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-KattaniCTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-Kattani
 
CTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-ReportCTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-Report
 
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Boren
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouse
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Ward
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johanson
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victor
 
CTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des WardCTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des Ward
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
CTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia AsognweCTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia Asognwe
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
 
CTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John CarrCTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John Carr
 
CTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John CrainCTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John Crain
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundu
 
CTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe TorresCTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe Torres
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
CTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-OramCTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-Oram
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

CTO-CybersecurityForum-2010-Will Gardner

Notas do Editor

  1. Hi, my name is Will Gardner and I am delighted to be here today. Thank you to Meldpunt for the kind invitation to share the experience in the UK on what we consider to be a very important issue.
  2. This presentation has been produced by Childnet International, a children's charity that was set up in 1995. This charity is active in a variety of areas and works directly with young people, parents, teachers, industry and government. Childnet seeks to take a balanced view and promote the positive aspects of online activity whilst being ready to respond to the negative. We go to schools every week, and talk to children, parents and teachers. We produce resources for these audiences, both online and offline resources. And we work in the policy area, being members of the Home Office Task Force on child protection on the internet and the DCSf’s (the Education ministry) taskforce on tackling cyberbullying.
  3. This slide highlights some of the potential online risks for children (and adults!). Users face 3 types of risks online: Commercial risks are often overlooked and viewed as simply being part of being online. Young people and adults regularly sign up for things online. Signing up often requires entering personal details. Ask your audience if anyone has read a privacy policy. Many people don’t read them as they are long and very dry documents. A privacy policy will often highlight if your information will be passed onto a third party and used for marketing purposes. If you sign up for something online and then get targeted by lots of SPAM/junk mail, generally this is as a result of your information being passed on. The Mousebreaker example here shows how adult advertising is prominent on a website frequented by young people. On the internet users face content risks – there is a lot of inaccurate information on the internet. Medical advice is given out for free but how can the writer be verified as having proper training? Minority groups gather on the internet and share biased views, children need to be taught how to be discerning readers in order to distinguish between fact and opinion. Adult content such as gambling and pornography sites are also available and entice users through aggressive advertising on other websites. Children can end up on these sites by accident, having unknowingly clicked on a advertisement. More and more young people are also at risk as a result of content that they create. Too much personal information and inappropriate images can attract unwanted attention from peers or others. It is important to be aware of the contact risks associated with the internet. Sex offenders do use the internet as a way of contacting young people. In addition, some people are choosing to abuse others using the internet and mobile technologies –this is commonly known as cyberbullying.
  4. Booked until mid-April 20,000 children per year. Assemblies, class. Listneing. Chlldren love to talk about this issue.
  5. Childnet have produced the Know IT All CD-ROM for Parents that can be ordered FREE of charge to maintained schools in England. For information on how to order this please see the Childnet website: www.childnet.com/kia It house information for Parents and Carers, Young People, and Teachers.