SlideShare una empresa de Scribd logo
1 de 27
“3 Rs” of Internet Safety: Rights,
Responsibilities and Risk Management
Larry Magid
(not pictured above)
CEO, ConnectSafely.org
Founder, SafeKids.com
Larry@ConnectSafely.org
NOT THAT TIRED OLD INTERNET SAFETY
LECTURE
• We know, you’ve heard lots of Internet safety
lectures, but this is (at least somewhat)
different.
• In many ways, the Internet is safer than
the physical world
• People tend to focus on the wrong risks
• Youth have rights as well as responsibilities
• There are risks but they can be managed
• Adults need to respect young people
and their rights
WHICH IS SCARIER?
.
Sometimes we focus on the wrong risks
WHAT’S MOST SCARY MIGHT NOT
BE MOST DANGEROUS
Illustrations from Washington Post based on data from Centers for Disease Control
(tiny.cc/sharkdata)
AFTER 9/11, FLYING WAS
“DANGEROUS”
So people drove more and deaths
per passenger mile went up
SOME PARENTS FEAR INOCULATIONS
Which means fewer kids are
protected against preventable
diseases
FEAR CAN PARALYZE
And lead to irrational decisions
BUT FEAR CAN ALSO BE
PROTECTIVE
WHAT ARE THE RISKS?
• Harassment and bullying
• Posting material that could harm your
reputation
• Security
• Privacy
• Legal and financial risks
• Exposure to inappropriate or unwanted
material
• Online predators and physical molestation
RISE OF THE WEB & VICTIMIZATION OF
CHILDREN
Blue line represents 58% decline in
child sex abuse from 1992 to 2008.
Source: Updated Trends in Child Maltreatment, 2008:
Finkelhor, Jones and Shattuck: Crimes Against Children
Research Center
Sex crimes reported to police and child
welfare authorities and sex crimes self-
reported by victims are down
Fewer teen pregnancies and births for 15-17
year olds
Teen suicide down
Percentage of kids engaged in extra-
curricular activities up
Source: The Internet, Youth Safety and the Problem of
“Juvenoia” by David Finkelor, director of Crimes Against
Children Research Center
INTERNET PREDATORS…
 It’s very rare
 Very few (<5%) predators pose online as kids
 Much higher risk from people the child knows
 Still, precautions are in order
 Concern should be based on how people act, not who
they are or where you meet them
Predator panic subsided, but then came ….
CYBERBULLYING PANIC!
IT’S A PROBLEM, NOT AN EPIDEMIC
Chart: Cox Communications Teen Online & Wireless Safety Survey
Data is not consistent but the consensus
is that about 20% of kids experienced
cyberbullying
In a 2013 nationwide survey, ‘
• 20% of high school students reported being
bullied on school property in the 12 months
preceding the
• An estimated 15% of high school students
reported in 2013 that they were bullied
electronically in the 12 months before the
• During the 2012-2013 school year, 8% of
public school students ages 12-18 reported
being bullied on a weekly basis.
Source: Centers for Disease Control’s Understanding Bullying Fact
Sheet
CDC BULLYING DATA 2013
“The percentage of youth (2-17) reporting physical bullying in the
past year went down from 22 percent to 15 percent between
2003 and 2008.”
Source: Trends in Childhood Violence and Abuse Exposure ..
Finkelhor, et al)
“Between 1992 and 2013, the total victimization rates for students
ages 12–18 generally declined both at and away from school. This
pattern also held for thefts, violent victimizations, and serious
violent victimizations between 1992 and 2013.”
(Source: Nat’l Center for Educational Statistics)
AND MOVING IN THE RIGHT DIRECTION
Research has shown that if people
think their peers bully, then they are
more likely to bully. So let’s not
artificially “normalize” bad behavior.
It’s not normal, it’s not common and
it’s not acceptable.
WHY THIS IS IMPORTANT
TYPES OF CYBERBULLYING
 Posting mean things about others
 Creating or joining a “hate” group about
someone
 Spreading rumors or gossip
 Excluding someone
 Stealing someone’s identity or creating a fake
profile
CONSEQUENCES OF BEING MEAN ONLINE
YOU CAN
 Hurt others
 Harm your reputation
 Get you in trouble with school or law
 Be impacted way in the future
IT’S NOT BULLYING, BUT …
 You can be sad by what you see others post
 Parties you weren’t invited to
 Things they have or are doing that make you jealous
 Friends of theirs that are not your friends
 REMEMBER: What people post is selective. Their lives
aren’t as perfect as they may appear.
RISKY BEHAVIORS
 Sending rude or mean messages
 Sharing inappropriate photos
 Posting anything that can harm your reputation
 Talking about inappropriate subjects with strangers
 Sharing your devices or passwords with others
 Using untrusted apps or software
REPUTATION MANAGEMENT
 Having no information about you online can be
damaging to your reputation. People might wonder
whether you’ve ever accomplished anything
 The more good stuff there is about you online, the
harder it is to find the bad stuff
 Know how to manage your social media profiles and
delete things that could give the wrong impression
 Learn how to politely and effectively ask people to
remove posts about you that might be harmful or
embarrassing
 But remember there is always the risk that something
you post can be copied, pasted and reposted
SEXTING CAN GO WRONG
 Sharing intimate photos may seem like an act
of love.
BUT
 They can accidentally or deliberately be shared with others
 Sharing a photo meant only for you is a violation of trust
 They be can used to bully or intimidate you
 You could get in trouble for having ANYTHING to do with certain
types of photos
 Only sure way to avoid negative consequences is to not do it
 And by the way, it’s not as common as you might think
KIDS HAVE RIGHTS
 You have free speech rights & the right to assemble
(online & off). The first amendment has no age limits,
 You have the right to control your own image (within
limits)
 It’s a crime to post certain types of images without the
consent of the subject
 You have the right to say no
 You have the right to block or unfriend
 You have the right to report abuse
 You have a right to privacy, which includes controlling
your own information
CYBER SECURITY
 Much higher risk than other issues
 Children are at significant risk of
identity theft
 Important to have strong, secure
and unique passwords
 Know your apps – get them from
legitimate places and read privacy
disclosures
 Lock your phone & other devices
Heads of CIA & DHS were
victims of email hacks in 2015
MEDIA LITERACY
 Knowing how to find & cite sources
 Not spreading false information & rumors
(Snopes.com is your friend)
 Use your critical thinking skills
 Understand the difference between opinions
and facts
 Recognize bias, spin and misleading
information
 Know how to use services’ privacy & security
tools
 Today, everyone on social media is a media
personality
RECOMMENDATION:
These words from the National Cyber Security Security Alliance make a lot
of sense:
STOP to THINK and then, by all means
DO CONNECT
THANKS
Larry Magid
CEO, ConnectSafely.org
Founder, SafeKids.com
Larry@ConnectSafely.org

Más contenido relacionado

La actualidad más candente

Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentationRoel Palmaers
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace Karnika Seth
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpscl
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safetySarah K Miller
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social mediaAM Oh
 
Expressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber SecurityExpressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber SecurityExpressworks International
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019KanelandSvihlik
 
Digital privacy
Digital privacyDigital privacy
Digital privacyAnna Adel
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfSoo Chin Hock
 
impact of social media on youth
impact of social media on youthimpact of social media on youth
impact of social media on youthSu Kee
 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIAcharitha garimella
 

La actualidad más candente (20)

Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
CYBER CRIME ppt
CYBER CRIME pptCYBER CRIME ppt
CYBER CRIME ppt
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 
Expressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber SecurityExpressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber Security
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Digital privacy
Digital privacyDigital privacy
Digital privacy
 
Cyber Safe Parenting
Cyber Safe ParentingCyber Safe Parenting
Cyber Safe Parenting
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
impact of social media on youth
impact of social media on youthimpact of social media on youth
impact of social media on youth
 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIA
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 

Destacado

How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsConnectSafely
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship RedefinedConnectSafely
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidConnectSafely
 
Internet Safety Presentation For Parent Night
Internet Safety Presentation For Parent NightInternet Safety Presentation For Parent Night
Internet Safety Presentation For Parent NightAllen Martin
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentationrenumann
 
Step6 troubleshooting
Step6   troubleshootingStep6   troubleshooting
Step6 troubleshootingricharddxd
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Planificación clase a clase abril
Planificación clase a clase   abrilPlanificación clase a clase   abril
Planificación clase a clase abrilRuth Ulloa
 
Bullying Presentation
Bullying PresentationBullying Presentation
Bullying Presentationdreamingmoi
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying PowerpointPrissykrissy
 
Anti-bullying Presentation #1
Anti-bullying Presentation #1Anti-bullying Presentation #1
Anti-bullying Presentation #1itunaschool
 
Cision Study: Gig Economy Media Reporting Disconnected from Worker Reality
Cision Study: Gig Economy Media Reporting Disconnected from Worker RealityCision Study: Gig Economy Media Reporting Disconnected from Worker Reality
Cision Study: Gig Economy Media Reporting Disconnected from Worker RealityCision
 
Planificacion de proyecto recreativo
Planificacion de proyecto recreativoPlanificacion de proyecto recreativo
Planificacion de proyecto recreativoadrimel
 

Destacado (17)

Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
 
Internet Safety Presentation For Parent Night
Internet Safety Presentation For Parent NightInternet Safety Presentation For Parent Night
Internet Safety Presentation For Parent Night
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentation
 
Step6 troubleshooting
Step6   troubleshootingStep6   troubleshooting
Step6 troubleshooting
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Teens and social media
Teens and social mediaTeens and social media
Teens and social media
 
Planificación clase a clase abril
Planificación clase a clase   abrilPlanificación clase a clase   abril
Planificación clase a clase abril
 
Bullying Presentation
Bullying PresentationBullying Presentation
Bullying Presentation
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying Powerpoint
 
Anti-bullying Presentation #1
Anti-bullying Presentation #1Anti-bullying Presentation #1
Anti-bullying Presentation #1
 
Bully Powerpoint
Bully PowerpointBully Powerpoint
Bully Powerpoint
 
Cision Study: Gig Economy Media Reporting Disconnected from Worker Reality
Cision Study: Gig Economy Media Reporting Disconnected from Worker RealityCision Study: Gig Economy Media Reporting Disconnected from Worker Reality
Cision Study: Gig Economy Media Reporting Disconnected from Worker Reality
 
Planificacion de proyecto recreativo
Planificacion de proyecto recreativoPlanificacion de proyecto recreativo
Planificacion de proyecto recreativo
 

Similar a 3Rs of Internet Safety: Rights, Responsibilities and Risk Management

Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28thJohn Field
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying John Field
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullyingsepulvedamd
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28thDoctora2017
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 

Similar a 3Rs of Internet Safety: Rights, Responsibilities and Risk Management (20)

Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 

Más de ConnectSafely

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for SeniorsConnectSafely
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawConnectSafely
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyConnectSafely
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentConnectSafely
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safetyConnectSafely
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some ContextConnectSafely
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenshipConnectSafely
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenshipConnectSafely
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, brieflyConnectSafely
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspectiveConnectSafely
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely
 

Más de ConnectSafely (14)

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook Privacy
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
App Privacy
App PrivacyApp Privacy
App Privacy
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some Context
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenship
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenship
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
 

Último

在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptxAsmae Rabhi
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 

Último (20)

在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 

3Rs of Internet Safety: Rights, Responsibilities and Risk Management

  • 1. “3 Rs” of Internet Safety: Rights, Responsibilities and Risk Management Larry Magid (not pictured above) CEO, ConnectSafely.org Founder, SafeKids.com Larry@ConnectSafely.org
  • 2. NOT THAT TIRED OLD INTERNET SAFETY LECTURE • We know, you’ve heard lots of Internet safety lectures, but this is (at least somewhat) different. • In many ways, the Internet is safer than the physical world • People tend to focus on the wrong risks • Youth have rights as well as responsibilities • There are risks but they can be managed • Adults need to respect young people and their rights
  • 4. . Sometimes we focus on the wrong risks WHAT’S MOST SCARY MIGHT NOT BE MOST DANGEROUS Illustrations from Washington Post based on data from Centers for Disease Control (tiny.cc/sharkdata)
  • 5. AFTER 9/11, FLYING WAS “DANGEROUS” So people drove more and deaths per passenger mile went up
  • 6. SOME PARENTS FEAR INOCULATIONS Which means fewer kids are protected against preventable diseases
  • 7. FEAR CAN PARALYZE And lead to irrational decisions
  • 8. BUT FEAR CAN ALSO BE PROTECTIVE
  • 9. WHAT ARE THE RISKS? • Harassment and bullying • Posting material that could harm your reputation • Security • Privacy • Legal and financial risks • Exposure to inappropriate or unwanted material • Online predators and physical molestation
  • 10. RISE OF THE WEB & VICTIMIZATION OF CHILDREN Blue line represents 58% decline in child sex abuse from 1992 to 2008. Source: Updated Trends in Child Maltreatment, 2008: Finkelhor, Jones and Shattuck: Crimes Against Children Research Center Sex crimes reported to police and child welfare authorities and sex crimes self- reported by victims are down Fewer teen pregnancies and births for 15-17 year olds Teen suicide down Percentage of kids engaged in extra- curricular activities up Source: The Internet, Youth Safety and the Problem of “Juvenoia” by David Finkelor, director of Crimes Against Children Research Center
  • 11. INTERNET PREDATORS…  It’s very rare  Very few (<5%) predators pose online as kids  Much higher risk from people the child knows  Still, precautions are in order  Concern should be based on how people act, not who they are or where you meet them Predator panic subsided, but then came ….
  • 13. IT’S A PROBLEM, NOT AN EPIDEMIC Chart: Cox Communications Teen Online & Wireless Safety Survey Data is not consistent but the consensus is that about 20% of kids experienced cyberbullying
  • 14. In a 2013 nationwide survey, ‘ • 20% of high school students reported being bullied on school property in the 12 months preceding the • An estimated 15% of high school students reported in 2013 that they were bullied electronically in the 12 months before the • During the 2012-2013 school year, 8% of public school students ages 12-18 reported being bullied on a weekly basis. Source: Centers for Disease Control’s Understanding Bullying Fact Sheet CDC BULLYING DATA 2013
  • 15. “The percentage of youth (2-17) reporting physical bullying in the past year went down from 22 percent to 15 percent between 2003 and 2008.” Source: Trends in Childhood Violence and Abuse Exposure .. Finkelhor, et al) “Between 1992 and 2013, the total victimization rates for students ages 12–18 generally declined both at and away from school. This pattern also held for thefts, violent victimizations, and serious violent victimizations between 1992 and 2013.” (Source: Nat’l Center for Educational Statistics) AND MOVING IN THE RIGHT DIRECTION
  • 16. Research has shown that if people think their peers bully, then they are more likely to bully. So let’s not artificially “normalize” bad behavior. It’s not normal, it’s not common and it’s not acceptable. WHY THIS IS IMPORTANT
  • 17. TYPES OF CYBERBULLYING  Posting mean things about others  Creating or joining a “hate” group about someone  Spreading rumors or gossip  Excluding someone  Stealing someone’s identity or creating a fake profile
  • 18. CONSEQUENCES OF BEING MEAN ONLINE YOU CAN  Hurt others  Harm your reputation  Get you in trouble with school or law  Be impacted way in the future
  • 19. IT’S NOT BULLYING, BUT …  You can be sad by what you see others post  Parties you weren’t invited to  Things they have or are doing that make you jealous  Friends of theirs that are not your friends  REMEMBER: What people post is selective. Their lives aren’t as perfect as they may appear.
  • 20. RISKY BEHAVIORS  Sending rude or mean messages  Sharing inappropriate photos  Posting anything that can harm your reputation  Talking about inappropriate subjects with strangers  Sharing your devices or passwords with others  Using untrusted apps or software
  • 21. REPUTATION MANAGEMENT  Having no information about you online can be damaging to your reputation. People might wonder whether you’ve ever accomplished anything  The more good stuff there is about you online, the harder it is to find the bad stuff  Know how to manage your social media profiles and delete things that could give the wrong impression  Learn how to politely and effectively ask people to remove posts about you that might be harmful or embarrassing  But remember there is always the risk that something you post can be copied, pasted and reposted
  • 22. SEXTING CAN GO WRONG  Sharing intimate photos may seem like an act of love. BUT  They can accidentally or deliberately be shared with others  Sharing a photo meant only for you is a violation of trust  They be can used to bully or intimidate you  You could get in trouble for having ANYTHING to do with certain types of photos  Only sure way to avoid negative consequences is to not do it  And by the way, it’s not as common as you might think
  • 23. KIDS HAVE RIGHTS  You have free speech rights & the right to assemble (online & off). The first amendment has no age limits,  You have the right to control your own image (within limits)  It’s a crime to post certain types of images without the consent of the subject  You have the right to say no  You have the right to block or unfriend  You have the right to report abuse  You have a right to privacy, which includes controlling your own information
  • 24. CYBER SECURITY  Much higher risk than other issues  Children are at significant risk of identity theft  Important to have strong, secure and unique passwords  Know your apps – get them from legitimate places and read privacy disclosures  Lock your phone & other devices Heads of CIA & DHS were victims of email hacks in 2015
  • 25. MEDIA LITERACY  Knowing how to find & cite sources  Not spreading false information & rumors (Snopes.com is your friend)  Use your critical thinking skills  Understand the difference between opinions and facts  Recognize bias, spin and misleading information  Know how to use services’ privacy & security tools  Today, everyone on social media is a media personality
  • 26. RECOMMENDATION: These words from the National Cyber Security Security Alliance make a lot of sense: STOP to THINK and then, by all means DO CONNECT
  • 27. THANKS Larry Magid CEO, ConnectSafely.org Founder, SafeKids.com Larry@ConnectSafely.org

Notas del editor

  1. From 1990 to 2005 – the period of time that the Web was born and grew most rapidly – there was a 51% decline in overall child sexual – the chart’s showing that: out of every 10,000 US minors, 23 were abused, with that no. going down to 11 in 2005. UPDATE: 58% decline thru 2008, latest figure available (reported by CCRC here “Updated Trends in Child Maltreatment, 2008” <http://www.unh.edu/ccrc/pdf/CV203_Updated%20Trends%20in%20Child%20Maltreatment%202008_8-6-10.pdf>) NCANDS = National Data Archives on Child Abuse & Neglect