SlideShare una empresa de Scribd logo
1 de 32
Online Safety 3.0: From
Fear to Empowerment
Larry Magid
Co-director
ConnectSafely.org
Founder
SafeKids.com
Revised March 21, 2012
Slides are available at
SafeKids.com/cue2012
More at OS3.ConnectSafely.org
I wrote this in
1994. Too bad
people are still
following this old
advice
Evolution of online safety
Children as victims:
1.0 (most of the 90’s) Pornography & predators:
Protecting children from bad adults. Children as
consumers of information, not as creators and
based on assumptions of risk, not actual research
2.0 (around 2007) Protecting children from peers.
Recognizing that kids can create content harm other
kids and themselves. Cyberbullying & posting
inappropriate or dangerous content
From Guttenberg to broadcasting, the
masses were just consumers of media
And pretty much the same model online in
the 80’s and 90’s
Me, in 1981 on my
Apple II with an
acoustic MODEM
CompuServe
1981
Mosaic
browser, 1993
But, in case anyone didn’t notice,
things have changed
Media is now:
• One to one
• One to many
• Many to many
We are all publishers and
youth are leading the charge
Which calls for a new approach to
“online safety”
• Research-based, not fear-based, so relevant
• Flexible, layered – not one-size-fits-all
• Respectful of youth – stakeholders in positive
outcomes, not just potential victims
• Positive: Not just safety from (bad outcomes)
but safety for good outcomes
• Comprehensive = Incorporates safety, security,
citizenship, and research/information literacy
From Online Safety 3.0 (os3.connectsafely.org)
• View youth as participants and stakeholders in positive
Internet use rather than potential victims, and empower
them to protect themselves & each other
• Promote good citizenship
• Teach media literacy & critical thinking
• Understand the value of informal learning
• Be accurate and honest about risks
• Encourage industry to engage in best practices, including
promoting good citizenship in the communities they run
Elements of Online Safety 3.0
os3.ConnectSafely.org
The ‘net’ is mostly like the physical
world, but …
• What’s posted can be permanent
• Material can be copied and pasted
• Lots of people can see it
• You don’t know for sure who’s seeing it
AND
• Disinhibition: Lack of visual cues reduces
empathy
Source: adapted from danah boyd:
Taken out of Context, 2008
We need to understand risk,
not exaggerate it
• Of course there are risks online, but
they are not anything new or special
• Pay attention to the research
• Include children in the discussion
• Understand the limits of regulation and
the benefits of education
Fear works only if it’s
credible & actionable
• “How people respond to fear appeals depends on
their assessment of the threat and their perceived
efficacy.
• When assessing threat, the audience considers
severity, or the seriousness of it, as well as their
susceptibility, or the likelihood that it will happen to
them.”
Based on research from Kim White @ Michigan State
http://www.thcu.ca/infoandresources/publications/fear%20appeals%20-%20web%20version.pdf
Boomerang effect
If the perception of threat exceeds perception of
efficacy…
• They will avoid the message
• Deny they are at risk
• Mock the message or become angry at the source or
issue (and ignore it).
• They may even increase their unhealthy behaviors
(boomerang effect).
Fear can paralyze
And lead to irrational decisions
Predator Panic of 2004-2006
Was based on faulty interpretation of accurate data
“1 out of five youth received an unwanted “sexual
solicitation”
“Juvenoia”
“There are features of the Internet that increase risk for
young people above what they already encounter or what
they encounter in other environments, or what they used
to encounter.” BUT …
Source: David Finkelhor: The Internet,
Youth Safety and the Problem of
“Juvenoia.” http://bit.ly/AxCVVD
Things are getting better, not worse
• Sexual abuse of children down by 61% from 1992 to 2008
• Teen pregnancies (15-17) down 43% 1991-2007
• Teen suicides down 38% 1990-2007
• % of kids feeling sad down 17%
• Modest increase in math & writing proficiency
• High school drop-out rate down 33% 1995-2008
• Crimes committed by juveniles down 33% 1996-2008
Source: David Finkelhor: The Internet, Youth Safety and the
Problem of “Juvenoia.” http://bit.ly/AxCVVD
Moving right along
The Internet Safety Technical Task Force found that:
“Bullying and harassment, most often by peers, are the
most salient threats that minors face, both online and
offline.”
Which naturally leads to ….
Cyberbullying Panic!
It’s a problem, not an epidemic
Source: Teens, Kindness and Cruelty on Social Networks : Pew Internet & American Life,
November, 2011
Sexting Panic
A 2008 survey found that 20% of teens had sent or posted
“nude or semi-nude images of themselves”
Which led to stories like this:
Source: Crimes Against Children Research Center, Dec , 2011
• 1.3% sent an image where they
showed breasts, genitals or
someone’s bottom
• 2.5% sent an image where they
were nude or partially nude
But a 2011 study found
Should we eliminate all risks?
Why do we allow
sports, sharp
pencils &
“dangerous” books
in school, but ban
social media?
Fences have their place but …
To keep kids safe around all water,
we teach kids to swim
Ultimately, the best filter runs
between the child’s ears, not on a
device
Protection that lasts a lifetime &
works on any “device”
Training wheels for young kids
How you treat others affects your risk
* EU Kids Online +Internet Safety Technology Taskforce
“Youth who engage in online
aggressive behavior by making rude
or nasty comments or frequently
embarrassing others are more than
twice as likely to report online
interpersonal victimization.” +
“Among those who do not bully
others, being bullied is relatively rare
8% offline only, and 4% online”*
Approaches to empowerment
• Encourage student-led initiatives
• Work on “cultural change” initiatives like:
• Pink Shirt Day
• Friend Zone
• Poll your students about bullying and attitudes
• Celebrate “random acts of kindness”
• Celebrate diversity & bravery
Based on: Changing the Culture: Ideas for Student Action by
Anne Collier, Mia Doces and Lisa Jones
A few tips for educators
• Create a bullying prevention team
• Involve parents and community
• Integrate “reflection” into discipline program
• Support for targets (“it’s not your fault”)
• Connect students with positive adults
• Increases resiliency, reinforces positive
behavior
• Positive staff behavior: Don’t let students see
staff acting as bullies
Source: Empowering Bystanders in Bullying Prevention, by
Stan Davis
Bullying prevention programs
• A structured curriculum that provides youth with materials
over at least several sessions.
• One-shot assemblies or pulling a few bits and pieces from
a program is not going to make a difference.
• Teach youth new skills. These should be spelled out in the
program
• Activities must let youth practice these new skills in active
ways
• Take a whole school or community approach to prevention.
Offer training for school staff, involvement of parents, and
assistance to help the school improve its response to bullying
concerns and reports
Source: Implementing Bullying Prevention Programs in Schools: A How-To Guide.
By Lisa Jones, Mia Doces, Susan Swearer, and Anne Collier
(cyber.law.harvard.edu/node/7491)
Social norms approach
• People emulate how they think their peers
behave
• If people think their friends don’t smoke,
they’re less likely to smoke.
• Same is true with over-eating, excessive
alcohol use and other negative behaviors,
including bullying*
*Assessing Bullying in New Jersey Secondary Schools: Applying the Social
Norms Model to Adolescent Violence: Craig, Perkins 2008
Example of positive norming
Source: Assessing Bullying in New Jersey Secondary Schools: Applying the Social Norms
Model to Adolescent Violence: Craig, Perkins 2008
Resources
• Born This Way Foundation (BornThisWay.org)
• Center for Safe & Responsible Internet Use (CSRIU.org)
• Committee for Children (http://www.cfchildren.org/)
• ConnectSafely.org
• Cyberbullying Research Center (cyberbullying.us)
• GenYes.org
• Kinder & Gentler World Working Papers
(cyber.law.harvard.edu/node/7491)
• Olweaus Bullying Prevention Program (Olweus.org)
• RulerApproach.org: Social & emotional learning
• StopBullying.gov
Thank you!
Larry Magid
larry@connectsafely.org
Slides are available at
SafeKids.com/cue2012
More at OS3.ConnectSafely.org

Más contenido relacionado

La actualidad más candente

How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safetyConnectSafely
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Raising Children in a Digital Age (Evening Session)
Raising Children in a Digital Age (Evening Session)Raising Children in a Digital Age (Evening Session)
Raising Children in a Digital Age (Evening Session)Bex Lewis
 
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop PresentationLydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop PresentationLydia Smith-Davis
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)amalgarn
 
Online safety Ofsted 2015
Online safety Ofsted 2015Online safety Ofsted 2015
Online safety Ofsted 2015bellla33
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010paul
 
Iowa Bullying Prevention
Iowa Bullying Prevention Iowa Bullying Prevention
Iowa Bullying Prevention emilyensign
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SBbrawl1sl
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?Sarah Welstead
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and ChldrenJoe Drumgoole
 

La actualidad más candente (20)

How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
Web safety
Web safetyWeb safety
Web safety
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Raising Children in a Digital Age (Evening Session)
Raising Children in a Digital Age (Evening Session)Raising Children in a Digital Age (Evening Session)
Raising Children in a Digital Age (Evening Session)
 
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop PresentationLydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Online safety Ofsted 2015
Online safety Ofsted 2015Online safety Ofsted 2015
Online safety Ofsted 2015
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010
 
Iowa Bullying Prevention
Iowa Bullying Prevention Iowa Bullying Prevention
Iowa Bullying Prevention
 
Teens and social media
Teens and social mediaTeens and social media
Teens and social media
 
Powerpoint SB
Powerpoint SBPowerpoint SB
Powerpoint SB
 
Ethics Half Day
Ethics Half DayEthics Half Day
Ethics Half Day
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
 

Similar a Online Safety 3.0: From Fear to Empowerment

Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...Stevecd
 
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...Andy Jeter
 
Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingDr. Conrath
 
Safeguarding Children & Young People Online
Safeguarding Children & Young People OnlineSafeguarding Children & Young People Online
Safeguarding Children & Young People OnlineClaudia Megele
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementaryemilyensign
 
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...Alan Bruce
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)Sumaiya Ismail
 
Using Your WITS To Deal With Cyberbullying
Using Your WITS To Deal With CyberbullyingUsing Your WITS To Deal With Cyberbullying
Using Your WITS To Deal With Cyberbullyingwitsprograms
 
Tech Savvy Parenting
Tech Savvy ParentingTech Savvy Parenting
Tech Savvy Parentingbermandry
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009bermandry
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingckeeling
 
Co-designing online safety with young people in a post-crisis world.pptx
Co-designing online safety with young people in a post-crisis world.pptxCo-designing online safety with young people in a post-crisis world.pptx
Co-designing online safety with young people in a post-crisis world.pptxUniversity of Sydney
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship RedefinedConnectSafely
 

Similar a Online Safety 3.0: From Fear to Empowerment (20)

Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
 
Cyberbullying: Advice for Schools
Cyberbullying: Advice for SchoolsCyberbullying: Advice for Schools
Cyberbullying: Advice for Schools
 
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
 
Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullying
 
Robert final conference 2012 UNICEF presentation
Robert final conference 2012   UNICEF presentationRobert final conference 2012   UNICEF presentation
Robert final conference 2012 UNICEF presentation
 
Safeguarding Children & Young People Online
Safeguarding Children & Young People OnlineSafeguarding Children & Young People Online
Safeguarding Children & Young People Online
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
 
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
 
Using Your WITS To Deal With Cyberbullying
Using Your WITS To Deal With CyberbullyingUsing Your WITS To Deal With Cyberbullying
Using Your WITS To Deal With Cyberbullying
 
Tech Savvy Parenting
Tech Savvy ParentingTech Savvy Parenting
Tech Savvy Parenting
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Co-designing online safety with young people in a post-crisis world.pptx
Co-designing online safety with young people in a post-crisis world.pptxCo-designing online safety with young people in a post-crisis world.pptx
Co-designing online safety with young people in a post-crisis world.pptx
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 

Más de ConnectSafely

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for SeniorsConnectSafely
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawConnectSafely
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyConnectSafely
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsConnectSafely
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some ContextConnectSafely
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenshipConnectSafely
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidConnectSafely
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenshipConnectSafely
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, brieflyConnectSafely
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely
 

Más de ConnectSafely (13)

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook Privacy
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
 
App Privacy
App PrivacyApp Privacy
App Privacy
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some Context
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenship
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
 
Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenship
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
 

Último

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 

Último (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 

Online Safety 3.0: From Fear to Empowerment

  • 1. Online Safety 3.0: From Fear to Empowerment Larry Magid Co-director ConnectSafely.org Founder SafeKids.com Revised March 21, 2012 Slides are available at SafeKids.com/cue2012 More at OS3.ConnectSafely.org
  • 2. I wrote this in 1994. Too bad people are still following this old advice
  • 3. Evolution of online safety Children as victims: 1.0 (most of the 90’s) Pornography & predators: Protecting children from bad adults. Children as consumers of information, not as creators and based on assumptions of risk, not actual research 2.0 (around 2007) Protecting children from peers. Recognizing that kids can create content harm other kids and themselves. Cyberbullying & posting inappropriate or dangerous content
  • 4. From Guttenberg to broadcasting, the masses were just consumers of media
  • 5. And pretty much the same model online in the 80’s and 90’s Me, in 1981 on my Apple II with an acoustic MODEM CompuServe 1981 Mosaic browser, 1993
  • 6. But, in case anyone didn’t notice, things have changed Media is now: • One to one • One to many • Many to many We are all publishers and youth are leading the charge
  • 7. Which calls for a new approach to “online safety” • Research-based, not fear-based, so relevant • Flexible, layered – not one-size-fits-all • Respectful of youth – stakeholders in positive outcomes, not just potential victims • Positive: Not just safety from (bad outcomes) but safety for good outcomes • Comprehensive = Incorporates safety, security, citizenship, and research/information literacy From Online Safety 3.0 (os3.connectsafely.org)
  • 8. • View youth as participants and stakeholders in positive Internet use rather than potential victims, and empower them to protect themselves & each other • Promote good citizenship • Teach media literacy & critical thinking • Understand the value of informal learning • Be accurate and honest about risks • Encourage industry to engage in best practices, including promoting good citizenship in the communities they run Elements of Online Safety 3.0 os3.ConnectSafely.org
  • 9. The ‘net’ is mostly like the physical world, but … • What’s posted can be permanent • Material can be copied and pasted • Lots of people can see it • You don’t know for sure who’s seeing it AND • Disinhibition: Lack of visual cues reduces empathy Source: adapted from danah boyd: Taken out of Context, 2008
  • 10. We need to understand risk, not exaggerate it • Of course there are risks online, but they are not anything new or special • Pay attention to the research • Include children in the discussion • Understand the limits of regulation and the benefits of education
  • 11. Fear works only if it’s credible & actionable • “How people respond to fear appeals depends on their assessment of the threat and their perceived efficacy. • When assessing threat, the audience considers severity, or the seriousness of it, as well as their susceptibility, or the likelihood that it will happen to them.” Based on research from Kim White @ Michigan State http://www.thcu.ca/infoandresources/publications/fear%20appeals%20-%20web%20version.pdf
  • 12. Boomerang effect If the perception of threat exceeds perception of efficacy… • They will avoid the message • Deny they are at risk • Mock the message or become angry at the source or issue (and ignore it). • They may even increase their unhealthy behaviors (boomerang effect).
  • 13. Fear can paralyze And lead to irrational decisions
  • 14. Predator Panic of 2004-2006 Was based on faulty interpretation of accurate data “1 out of five youth received an unwanted “sexual solicitation”
  • 15. “Juvenoia” “There are features of the Internet that increase risk for young people above what they already encounter or what they encounter in other environments, or what they used to encounter.” BUT … Source: David Finkelhor: The Internet, Youth Safety and the Problem of “Juvenoia.” http://bit.ly/AxCVVD
  • 16. Things are getting better, not worse • Sexual abuse of children down by 61% from 1992 to 2008 • Teen pregnancies (15-17) down 43% 1991-2007 • Teen suicides down 38% 1990-2007 • % of kids feeling sad down 17% • Modest increase in math & writing proficiency • High school drop-out rate down 33% 1995-2008 • Crimes committed by juveniles down 33% 1996-2008 Source: David Finkelhor: The Internet, Youth Safety and the Problem of “Juvenoia.” http://bit.ly/AxCVVD
  • 17. Moving right along The Internet Safety Technical Task Force found that: “Bullying and harassment, most often by peers, are the most salient threats that minors face, both online and offline.” Which naturally leads to ….
  • 19. It’s a problem, not an epidemic Source: Teens, Kindness and Cruelty on Social Networks : Pew Internet & American Life, November, 2011
  • 20. Sexting Panic A 2008 survey found that 20% of teens had sent or posted “nude or semi-nude images of themselves” Which led to stories like this:
  • 21. Source: Crimes Against Children Research Center, Dec , 2011 • 1.3% sent an image where they showed breasts, genitals or someone’s bottom • 2.5% sent an image where they were nude or partially nude But a 2011 study found
  • 22. Should we eliminate all risks? Why do we allow sports, sharp pencils & “dangerous” books in school, but ban social media?
  • 23. Fences have their place but … To keep kids safe around all water, we teach kids to swim
  • 24. Ultimately, the best filter runs between the child’s ears, not on a device Protection that lasts a lifetime & works on any “device” Training wheels for young kids
  • 25. How you treat others affects your risk * EU Kids Online +Internet Safety Technology Taskforce “Youth who engage in online aggressive behavior by making rude or nasty comments or frequently embarrassing others are more than twice as likely to report online interpersonal victimization.” + “Among those who do not bully others, being bullied is relatively rare 8% offline only, and 4% online”*
  • 26. Approaches to empowerment • Encourage student-led initiatives • Work on “cultural change” initiatives like: • Pink Shirt Day • Friend Zone • Poll your students about bullying and attitudes • Celebrate “random acts of kindness” • Celebrate diversity & bravery Based on: Changing the Culture: Ideas for Student Action by Anne Collier, Mia Doces and Lisa Jones
  • 27. A few tips for educators • Create a bullying prevention team • Involve parents and community • Integrate “reflection” into discipline program • Support for targets (“it’s not your fault”) • Connect students with positive adults • Increases resiliency, reinforces positive behavior • Positive staff behavior: Don’t let students see staff acting as bullies Source: Empowering Bystanders in Bullying Prevention, by Stan Davis
  • 28. Bullying prevention programs • A structured curriculum that provides youth with materials over at least several sessions. • One-shot assemblies or pulling a few bits and pieces from a program is not going to make a difference. • Teach youth new skills. These should be spelled out in the program • Activities must let youth practice these new skills in active ways • Take a whole school or community approach to prevention. Offer training for school staff, involvement of parents, and assistance to help the school improve its response to bullying concerns and reports Source: Implementing Bullying Prevention Programs in Schools: A How-To Guide. By Lisa Jones, Mia Doces, Susan Swearer, and Anne Collier (cyber.law.harvard.edu/node/7491)
  • 29. Social norms approach • People emulate how they think their peers behave • If people think their friends don’t smoke, they’re less likely to smoke. • Same is true with over-eating, excessive alcohol use and other negative behaviors, including bullying* *Assessing Bullying in New Jersey Secondary Schools: Applying the Social Norms Model to Adolescent Violence: Craig, Perkins 2008
  • 30. Example of positive norming Source: Assessing Bullying in New Jersey Secondary Schools: Applying the Social Norms Model to Adolescent Violence: Craig, Perkins 2008
  • 31. Resources • Born This Way Foundation (BornThisWay.org) • Center for Safe & Responsible Internet Use (CSRIU.org) • Committee for Children (http://www.cfchildren.org/) • ConnectSafely.org • Cyberbullying Research Center (cyberbullying.us) • GenYes.org • Kinder & Gentler World Working Papers (cyber.law.harvard.edu/node/7491) • Olweaus Bullying Prevention Program (Olweus.org) • RulerApproach.org: Social & emotional learning • StopBullying.gov
  • 32. Thank you! Larry Magid larry@connectsafely.org Slides are available at SafeKids.com/cue2012 More at OS3.ConnectSafely.org

Notas del editor

  1. In 1994 I wrote Child Safety on the Information Highway and “My Rules for Online Safety.” I guess I must have done a pretty good job, because lots of Internet safety educators are still using those “rules.” Unfortunately, they’re more than a decade out-of-date. The world is a lot different than it was in 1994. Back then, most people in the world weren’t even on the Internet. Most of those online were using proprietary services like CompuServe or the Source or even cruder electronic bulletin boards, often running on old Apple II computers.
  2. ----- Meeting Notes (3/16/12 15:07) -----Like a deer in the headlights, people tend to be paralyzed when they're afraid
  3. THERE NEVER HAS BEEN A STUDY ON HOW MUCH CHILDREN ARE SOLICITED BY “PREDATORS.” NOTE THE HEADLINE: “All Children Vulnerable to Online Predators”. IT’S A TRICK QUESTION BECAUSE THE SURVEY WASN’T ABOUT PREDATORS. It was about unwanted sexual solicitations from anybody – flirting is often an unwanted sexual solicitation, as the researchers defined the term. Here’s what the 2000 study this refers to – updated in 2006 with the figure 1 in 7, so the no. of solicitations had gone down – actually said....READ THIS:“Youth identify most sexual solicitors as being other adolescents (48% in 2000; 43% in 2006) or young adults 18-24 (20%; 30%), with few (4%; 9%) coming from older adults, and the remaining being of unknown age.” THE TOTALS: 68% teens & 18-24-year-olds in 2000; 73% in 2006.
  4. THESE ARE ALL IMPORTANT BUT VERY GENERAL – CERTAINLY EACH INCIDENT IS UNIQUE AND NEEDS CARING INDIVIDUAL TREATMENT - a full, nonconfrontational, child-caregiver discussion that looks at the situation’s circumstances. The psychological damage can be considerable – some kids have suicidal thoughts.School counselor I spoke with several years ago would find out all the parties involved, get them in a room, and do bully-victim reverse role-playing (empathy training). In families and schools, some of these incidents can be turned into TEACHABLE MOMENTS (maybe anonymized?) for all parties’ benefit.
  5. Putting up a fence might keep a kid away from a specific swimming pool but teaching them to swim protects them around all water and helps them enjoy the water as well.
  6. Positive adults improve resilienacy
  7. Positive adults improve resilienacy