SlideShare una empresa de Scribd logo
1 de 80
SOCIAL MEDIA, YOUNG PEOPLE
AND E- SAFETY
Disclaimer, copyright and caveats
• This presentation has been written by Stephen Carrick-Davies and forms the basis of training
he has delivered for Foster Parents and other working with vulnerable adults across the UK.
• Not all of the training content is included in this presentation and these slides are NOT a
training package (either as a whole or in parts) and should not be used as such.
• It is shared on SlideShare for information and guidance only and to contribute to the debate
about how the internet can amplify offline vulnerabilities.
• It’s great to share but it is not easy to strike the right balance between sharing and copying.
Invariably these slides contain content developed by others and Stephen has sought to credit
content (including photographs) which have come from other sources at the end of this
presentation so please respect the authorship of these slides .
• The content on the slides which Stephen has personally written and produced he has
assigned with Creative Commons license. Slides showing this mark
can be used
for non-commercial purposes, as long the content is credited. see www.creativecommons.org for more
info.

• Ultimately Stephen hopes that these slides help others working with vulnerable young people
and if you have questions or have other experience to share please contact Stephen directly
(see e-mail address at the end).

“In the past you were what you owned. Now you are what you share.”
Charles Leadbetter
Introductions

Stephen Carrick-Davies
• Ten years at Childnet International
• Now an Independent Trainer/ Social
Entrepreneur /Parent/Learner .....

“Parents and the home
environment they create are the
single most important factor in
shaping their children’s well-being,
achievements and prospects”
Alan Johnson (when Education Secretary)
GROUP EXERCISE
Close your eyes and try to remember
when you were 8 years old and most
happy.
For how many of you was this experience…

Outside?
Without parental supervision?
Involved in something risky?
GROUP EXERCISE
What’s changed ?

Outside?
Without parental supervision?
Involved in something risky?
A few facts and figures*

*Source: Ofcom Oct 2013)

•91% of all 5-15 year olds used the internet in 2012:
– all 12-15 year olds (100%)

•The estimated weekly volume of internet use at home in
2012 increased with the age of the child:
– 8.1 hours for 8-11 year olds and
– 17.1 hours for 12-15 year olds.

•62% of 12-15’s own a smartphone (static)
•A tablet is the device of choice for media consumption –
their use has tripled since 2012.
•In 2012, 12-15’s spent as much time using the Internet as
watching TV.
© Stephen Carrick Davies & Tim Mungeam 2014
Facts and figures*

(*Source Ofcom 2012)

•Mobiles are the device of choice for older YP for peer
communication
•43% of children aged 5-15 years old have an active social
networking site profile.
– 22% of 8-11 year olds
– 80% of 12-15 year olds.

•98% of both 8-11 year olds and 12-15 year olds who have
an active social networking site profile use Facebook
(despite the minimum age at which you can have a profile
being 13).
•12-15’s send an average of 255 text messages per week
•They also send an average of 185 instant messages

© Stephen Carrick Davies & Tim Mungeam 2014
What are your expectations and training needs ?
Structure and aims of training
Part I “Understanding” the new Reality !
 Overview of ‘Social Media’ and web 2.0
 How technology is changing, and being changed
 Why the positive appeal for children

REFLECT &
THINK

Coffee break --------------------------------------------------------------------------------------------------------

Part II Understanding the Risks





Overview of online risks for young people
Specific challenges for Wandsworth Staff
Where we are vulnerable (privacy settings)
Case study to help us to see responses

FACE- UP
& BE
CHALLENGED

-------------------------------------------------------------------------------------------------------------------------------------

Part III Understanding our Responsibilities





Building Empathy and Resilience
What does OFSTED say ?
Keeping professional in personal spaces.
Prevention & Response strategies

INSPIRED &
EQUIPPED

All through a mixture of slides, quotes, case studies, films, small group
exercises, Q&A, and links to practical resources.
PART 1

Understanding this new reality
“Everything that’s already in the world when
you’re born is just normal.

Anything that gets invented between then and
before you turn thirty is incredibly exciting and with
any luck you can make a career out of it.
Anything that gets invented after you’re thirty is
against the natural order of things and the
beginning of the end of civilisation as we know it…

Douglas Adams
How to stop worrying and learn to love the internet
1999

…until it’s been around for
about ten years ….when it
gradually turns out to be

alright really.”
On a scale of 1- 10 rank yourself as to how
confident you are using social media.
1 ----------------------5----------------------10
“What’s a mouse?”

“I taught
Mark Zuckerberg
all he knows”
GROUP EXERCISE
Turn to your neighbour
What does the internet, social
media and mobile technology
give to young people ?
eal
r

The child’s online world
ANONYMITY

ALWAYS ON

ADDICTIVE (?)

“If you took away
my mobile phone
you would take
away a part of me”

AWAY FROM
SUPERVISION

ACCEPTANCE IDENTITY &
STATUS

ACCESS THE
WORLD
ACTIVE NOT
PASSIVE
MEDIUM
AMPLIFIER
(gives children
a voice)
What is this real world like for vulnerable YP ?
“I have over 120 people on my BBM but I deleted
like 30 on Saturday cause I was angry and they
pissed me off so I just deleted them. Since I’ve had
my BlackBerry only 2 people have deleted me.”
Student from Pupil Referral Unit

Play film

Film at www.carrick-davies.com/research/films
GROUP EXERCISE
Turn to your neighbour
What was the greatest fear
for the yp in the film ?

How did it had got out of control ?
What would you do next if you were
in that position ?
AGE RESTRICTIONS
NEWS FEEDS

“boast by post”

APPLICATIONS

Huge range of apps

Events/ Groups

LIVE CHAT

Find, link, be in
constant contact
+ on your mobile

Superseding E-mail

Comment and
Tag photos face
recognition

TIME LINE

FRIENDS

MESSAGES

PHOTOS/TAGS

Superseding IM

VIDEO

link and embed

WHO’S ONLINE

Know who is online now!

Social location

ALL FOR FREE …… BUT ….WHAT PRICE IS FREE ?
Facebook Timeline
Searchable
by years
Check
regularly
because the
settings
change
Re-check
your privacy
settings using
‘View As’
function

The importance of privacy settings

31% of 12-15 year olds don’t use privacy settings on their
social networking profiles – Ofcom Media literacy Report 2009
• Searching for yourself – example
See pages 106- 107 in Vodafone’s Digital Parenting magazine

BUT ... Remember privacy options and controls change frequently!
A word about BBM
• Be careful with your BBM PIN
• Be careful of ‘Screen Munching’
• Use the tools – like delete contact
and block future requests.
• Make sure your blackberry has a
password
See www.carrick-davies.com for film and
tutorial. (bottom of the page)
See pages 54 – 59 in Vodafone’s Digital Parenting magazine
A word about games
• The ratings are there for a reason.
• Anyone who sells a designated 12+
title to younger children will face
fines of up to £5,000 /jail.
• Recognise the ‘compulsion’ issues.
• Younger siblings and friends.
• Misogynistic messages and casual
cruelty.
Let’s break for coffee 10 minutes
PART II

Understanding the risks

(not the same thing as harm!)
All technology is neutral

What would
Gandhi have
done if he had a
FACEBOOK
account ?
Our perception of danger

Most abuse takes place in the
context of a family or close
relative.
Classifying the risks to children online
Original 3 Cs Classification by
‘EU Kids’ online project

CONTENT
Child as Recipient

CONTACT
Child as Participant

CONDUCT

Child as Actor

Commercial

Aggressive

Sexual

Adverts
Spam
Sponsorship
Personal info

Violent and
hateful
content

Pornographic
unwelcome

Tracking
Harvesting
Personal info

Being bullied
harassed or
stalked

Meeting
strangers
Being
groomed

Self harm
Unwelcome
persuasions

Illegal
downloading

Bullying or
harassing
another

Creating and
uploading
inappropriate
material

Providing
misleading
info/advice

Hacking Gambling

Financial scams
Terrorism

sexual content

Values
Bias
Racist
Misleading
info or advice
“Sexting” = teens sharing nude photos via mobiles and web. The practice can
have serious legal and psychological consequences

Commercial

CONTENT
Child as Recipient

CONTACT
Child as Participant

CONDUCT
Child as Actor

Aggressive

Online grooming is a
criminal offence

Sexual

Values

Pornographic
unwelcome
sexual content

Contact
www.ceop.gov.uk

if you have concerns
about inappropriate
communication from an
adult to a minor.
“One-third of those who
sexually abuse children are
just children themselves.”

Meeting
strangers
Being
groomed
Creating and
uploading
inappropriate
material

BBC Newsnight programme March 2010

21,630 BEBO members had the name “Porn Star”

“So take a dirty
picture for me,
Take a dirty picture
Just take a dirty
picture for me
Take a dirty picture”
From Taio Cruz song
No 6 in the UK charts
April 2010.
How the risks ‘migration’ from online to
offline can affect vulnerable YP
Original 3 Cs Classification
by ‘EU Kids’ online project

CONTENT
Child as Recipient

Commercial

Aggressive
Sexual
CRIMINAL

Values

OF THE 1,984 PEOPLE
CHARGED AFTER RIOTS:
 53% were under 20 years old

CONTACT
Child as Participant

 42% received free school meals
(16% nat. average)

 66% of them had some special

CONDUCT

Child as Actor

education needs

(21% of all pupils)

Figures from the Ministry of Justice
carried out by the Howard League for
Penal Reform
(published in Guardian 26.11.11)

BEING IN THE WRONG PLACE AT THE WRONG TIME & “BAD LUCK”
JOINT ENTERPRISE:
Legislation that finds people guilty of a violent crime if they are
judged to have lent encouragement to the main perpetrator.

FAIL TO
INTERVENE

FAILURE TO
WALK AWAY !

COMPLICIT IN
A JOINT
ENTERPRISE

ASSOCIATION
WITH
SOMEONE
“You played no
part but
presence there
encouraged
others ”

INCLUDES ONLINE EVIDENCE OF
ASSOCIATION & ENCOURAGEMENT
“They planned the attack on social media the night before, the court
was told, sending messages to each other on Facebook and via
BlackBerry Messenger.”
Classifying the risks to children online
Commercial

CONTENT
Child as Recipient

CONTACT
Child as Participant

CONDUCT

Child as Actor

Aggressive

Sexual

Values

Violent and
hateful
content

Being bullied
harassed or
stalked

Bullying or
harassing
another

22% of yp aged 1118 report having
been cyber bullied.
It ruins lives.
YP may not disclose
that it is happening

Classification by ‘EU Kids’ online project and referenced in the Byron Report
“Sticks and stones.... But words ...?”

From US Ad Council at
http://www.youtube.com/watch?v=bdQBurXQOeQ
How is Cyberbullying different from offline bullying?
OFFLINE
Home is safe
Often Physical
Bully strong/victim weak
Local & intimate
See the impact
Bystanders intervene
Often Silent

ONLINE
Can be 24/7
Usually words/pictures
Roles can change
Mass audience
Don’t see impact
Lack of empathy
Bystanders take part
“If you laugh at it you’re part of it”
It can leave a trail !
Why YP may be scared of reporting abuse ?
• “It was nobody else’s business”
• “Didn’t think it was serious or wrong”
• “Didn’t want parents/friends to find out”
• “Was frightened”
• “Didn’t think I would be believed”
• “Had been threatened by the abuser”
Source: Child Maltreatment in the UK Cawson 2000

Abuse on the internet/mobile phone

• “My parents don’t get the internet”
• “Maybe it was my fault ! (blur)”
• “Scared if computer is confiscated”
RESPONDING TO THE VICTIM
Need for reassurance – THIS IS BULLYING !
Practical advice:
RED Don’t retaliating,
Orange – Save the evidence
Green – Tell someone (who?)

See advice, resources and guidance at
Childnet’s www.digizen.org website
PREVENTING
 Understanding and accepting the
impact of cyberbullying.
 Updating existing policies and
practices. (AUP anti-bullying)
 Making reporting easier - includes
advice about removal of content.
(industry support)
 Promoting the positive use of
technology.
 Evaluating impact of prevention
activities.

RESPONDING
 Supporting the victim – need for
reassurance.
 Practical advice and support such as
saving evidence, not retaliating,
informing parents.
 Investigate and record incidents,
identify the bully.
 Working with the bully and sanctions
(including technology specific).
 Involve Parents /carers

Underpinned by effective education and awareness
The importance of reaching parents/carers

For Parents
• Be aware that your children may as
likely cyberbully as be a target of
cyberbullying.
• Talk to your children and understand
the ways in which they are using the
internet and mobile phones.
• Use the tools on the services
• Remind your children not to retaliate
• Remind yp to keep the evidence
• Know where to report (see later)

For Young people

• Always respect others be careful what
you say.
• Think before you send, what goes
online stays online !
• Treat your password like your
toothbrush !
• Learn how to block the bully and save
the evidence
• Make sure you tell someone
• Support others – how would you feel
if no-one stood up for you !
• Encourage them to produce their own
peer advice media !
GROUP EXERCISE
The young person who you are responsible for (let’s say she’s a
12 year old girl) tells you that her “friends” in her class took
video clip of her at a sleep over pyjama party on their phones
which is now being circulated and she thinks it is now posted on
a social networking site.
•Is this an issue for your school/organisatinon
•What advice would you give to her ?
•Who should the girl report this to ?
•How would you go about trying to remove this content ?
•What if those who posted it up have circulated it more widely
?
WAYS IN WHICH
THE INTERNET
CAN AMPLIFY
VULNERABILITY

10 WAYS IN
WHICH THE
INTERNET CAN
AMPLIFY
OFFLINE
VULNERABILITY
‘Vulnerable’

This is complex because:

All children are different so there are

dangers in making broad statements.
Many children are neglected which is
harder to spot yet makes them
vulnerable
What about
The paradox that overvulnerable
protected children can be
adults ?
more vulnerable online.

Vulnerability is not static - All
children can be vulnerable at
different stages
The categorisations of risk offline
do not necessarily mirror online
experience (eg a disabled yp
may be empowered online as the
internet can be ‘leveller’

The more a child uses the internet the more they can become confident and
possibly complacent and feel ‘invincible’ and don’t feel they are at risk .
Those who have experienced offline risk and
abuse may be more resilient and able to
protect themselves online or may not be
affected so much by the risks they encounter.

Constantly changing
technologies. Eg, Location services
HOWEVER WE CAN IDENTIFY
A FEW COMMON FEATURES....
Low selfconfidence.
Identity seen to
be part of
‘outsiders’

Lack of
supportive
adults in their
lives

More
unsupervised
time, fewer
structures and
boundaries

Fluid learning
environment and
gaps in education
and induction

MUNCH
POKE
PING!

See www.carrick-davies.com

Experience
abusive
relationships or
environments
including anger

Influences of
alcohol, drugs and
gang culture. Risk
takers and at risk
WAYS IN WHICH
THE INTERNET
CAN AMPLIFY
VULNERABILITY

 Unmediated Contact

Guardian Newspaper article 19 June 2010

Children who have been fostered can suddenly receive messages from siblings, birth
parents, or those who want to trace them for potentially harmful reasons.
WAYS IN WHICH
THE INTERNET
CAN AMPLIFY
VULNERABILITY

 Social Location

Young People who may need to escape from an abusive relationships need to think
carefully about how they make their ‘places’ public.
WAYS IN WHICH
THE INTERNET
CAN AMPLIFY
VULNERABILITY

 Exclusion from the ‘norm’

Eg Facebook Timeline
There are lots of online services which celebrate our ‘journey’. How do children who
don’t know their birth parents, may not have an early photo of themselves feel in these
‘boast by post’ environments ?
WAYS IN WHICH
THE INTERNET
CAN AMPLIFY
VULNERABILITY

 Blackmailing “gifting” &
grooming by peers

A young person from a disadvantaged background may be targeted with ‘gifts’ of
mobile phones, mobile payment cards etc, by older young people but in exchange for
‘favours’ which they ‘cash in’ later (including prostitution, trafficking or illegal
activity). If it sounds to good to be true .... it’s probably is (they want something ! )
Search ‘NSPCC survey on teen partner violence’ for more info
WAYS IN WHICH
THE INTERNET
CAN AMPLIFY
VULNERABILITY

 Earlier adopters ?

“Any A/C holders looking
to make a quick grand get
at me. No time wasters.”
Message on BBM about
bank scams (fraud!)

Screen Munch !

Many vulnerable young people can be early adopters of tools and services which are
not yet regulated or in the public conscious. For example BBM
How will QR codes be mis-used ?
WAYS IN WHICH
THE INTERNET
CAN AMPLIFY
VULNERABILITY

 Being ‘nudged’ into gangs

Vulnerable young people who are risk takers,
impulsive or under the influence of alcohol and/or
drugs and less supervised, can be more easily
drawn into illegal activity including being ‘nudged’
through technology.

ALL CHILDREN WILL
LEAVE A FOOTPRINT
EXCEPT SOME WILL BE
IN MUDDIER SAND!
WAYS IN WHICH
THE INTERNET
CAN AMPLIFY
VULNERABILITY

 Negative digital footprint

ALL CHILDREN WILL LEAVE A
DIGITAL FOOTPRINT
BUT SOME WILL BE MUDDIER
THAN OTHERS
Those who are supported can compensate
and build positive online footprint but
what about those who aren’t ?
WAYS IN WHICH
THE INTERNET
CAN AMPLIFY
VULNERABILITY

 Low Resilience
“When my pinger’s gone
to sleep that’s when I’ll
go to sleep.”

Young people need to be cherished, have the right amount of
sleep and healthy food. What happens when you are running on
empty ?
•WAYS IN WHICH
THE INTERNET
CAN AMPLIFY
VULNERABILITY

 Special needs & learning difficulties
Attachment
Theory

Attachment

Some children with emotional or behavioural difficulties, attachment
difficulties, and other complex needs, may be particularly vulnerable online.
EG those with Autistim Spectrum Disorder may make literal interpretations
of content, which will affect how they respond.
Others with complex needs may not understand the concept of friendship,
and therefore trust everyone implicitly. Some children with SEN or
disabilities may not recognise that they are being bullied or appreciate how
their own online behaviour may be seen by someone else as bullying .
•WAYS IN WHICH
THE INTERNET
CAN AMPLIFY
VULNERABILITY

 Low levels of Language & Literacy

Lack of literacy skills, can mean
that messages are unclear,
ambiguous or misunderstood

We must not assume that all YP are confident “digital natives” and we must also
recognise that one in six people in the UK struggle with literacy (below the level
expected of an eleven year old). Hence being able to complete a ‘REPORT ABUSE’
form or read instructions about safety, privacy and ‘terms and conditions’ are real
barriers for many young people.
Do YP recognise the link between reading and being able to be safe ?
GROUP EXERCISE

In pairs discuss
Do you recognise these 10 offline
vulnerabilities and agree that they
can be amplified online ?
Can you think of positive ways in
which the Internet minimises offline
vulnerabilities?
How could you begin to talk to the YP
you look after about these issues?
Questions and feedback so far ?
PART III

UNDERSTANDING OUR
RESPONSIBILITIES

Hands on training
The dangers and opportunities
of adults leaving children to it !

EMPATHY, RESILIENCE
AND LEADERSHIP
Equipping children to be safe and secure online
involves addressing issues such as Empathy
acquisition, Resilience and Leadership. These
are the true foundation blocks for children to
become good digital citizens.
“You never really understand a
person until you consider things
from his point of view.
Until you climb inside of his skin
and walk around in it.”
Harper Lee, To Kill a Mockingbird
“Empathy is the ability to put ourselves in another’s
place and to understand their experience.
We are deeply present to their thoughts and
feelings with such compassionate accuracy that
they can hear their own thoughts more clearly.
With empathy, we
reflect on how our
actions affect others.
Empathy inspires us
to be giving and
selfless. Empathy
connects our hearts.
Source
www.boundlessconnections.org/weeklyvirtuesblog/wp-

Empathy connect us with our
common humanity.
It protects us from prejudice,
blame, and judgment – those
things that divide us from each
other. It moves us to seek
justice for every person. Even
those with whom we disagree.”
“Empathy is the ability to put ourselves in another’s
place and to understand their experience.
We are deeply present to their thoughts and
feelings with such compassionate accuracy that
they can hear their own thoughts more clearly.
With empathy, we
reflect on how our
actions affect others.
Empathy inspires us
to be giving and
selfless. Empathy
connects our hearts.
Source
www.boundlessconnections.org/weeklyvirtuesblog/wp-

Empathy connect us with our
common humanity.
It protects us from prejudice,
blame, and judgment – those
things that divide us from each
other. It moves us to seek
justice for every person. Even
those with whom we disagree.”
AN ABSENCE OF KNOWLEDGE IS NOT
AN EXCUSE FOR AN ABSENCE OF
RESPONSIBILITY AND CARE.
WHAT IS POTENTIALLY
CRIMINAL, HARMFUL,
INAPPROPRIATE OR ILLEGAL
OFFLINE, IS THE SAME ONLINE.

ULTIMATELY THIS COMES
DOWN TO OUR DUTY OF
CARE & LEADERSHIP.
PIE

all 3 ‘legs’ are vital

Policies

Organisation E-safety policy, Acceptable Use
Policy, Anti-Bullying policy, Mobile use policy

Infrastructure
Managed learning environment
with high quality access and
equipment which is filtered,
monitored and supervised.

Education

Ongoing education &
prevention programme which is
targeted at both YP, parents and
the whole work-force.
d
Up

at e

an
nJ
di

u

20
ry
a

14

In the context of an inspection,
e-safety may be described as the
school’s ability:
to protect and educate pupils and
staff in their use of technology
to have the appropriate
mechanisms to intervene and
support any incident where
appropriate.

What can we learn
from schools ?
Assemblies, tutorial time, personal,
social, health and education lessons,
and an age-appropriate curriculum
for e-safety

Schools need
to make good
use of the
views of pupils
and their
parents to
develop their
e-safety
provision.

The outstanding
schools recognised
that, relationships
with families, needed
to keep developing to
support e-safety at
home.

WHAT
DOES
GOOD
E-SAFETY
LOOK
LIKE?

Pupils were more
vulnerable overall
when schools used
locked down
systems because
they were not
given enough
opportunities to
learn how to
assess and manage
risk for
themselves.

In the outstanding
schools, senior leaders,
governors, staff and
families worked together
to develop a clear strategy
for e-safety. Policies were
reviewed regularly in the
light of technological
developments.
d
Up

at e

n
Ja
in
d

ry
ua

20

Everyone knows what school-based
reporting routes are and external
abuse buttons (eg CEOP) and
effective peer mentoring and
support

14

Personal data
is managed
securely and in
accordance
with statutory
requirements

WHAT
DOES
GOOD
E-SAFETY
LOOK
LIKE?

Risk assessment taken
seriously and used to
good effect in
promoting e-safety .

All teaching and
non-teaching staff
receive regular and
up-to-date training
and one or more
members have
higher level of
expertise and
defined
responsibilities
assess and manage
risk for
themselves.
Written in plain English
updated regularly and
ratified by governors +
incorporate an AUP that is
understood and respected
by parents, pupils and
staff.
Challenges for teachers & other professionals
• Recent TES survey
found that 9% of
teachers were friends
with pupils on SNS*.
• General advice from unions and GTS is:
Do not ‘friend’ pupils on personal accounts or ask to be
added to their contact lists. WHY ?
You could make yourself
vulnerable by sharing your
personal information (and
that of your friends)

You could make yourself
vulnerable by being able to
access their personal
information

* http://community.tes.co.uk/forums/t/463065.aspx?s_cid=16
See http://www.childnet.com/kia/downloads/Social-networking.pdf for Childnet/TDA leaflet

You could make yourself
open to allegations of
inappropriate contact or be
misunderstood.
OTHER WAYS TO PROTECTING YOURSELF
1. Update your AUPs stating how and when personally owned
equipment (including camera phones) can be used.
2. Make sure you have a strong password and set a password or
pin for your phone. Increasingly important for Facebook
‘Fraping’
3. Close down computers quickly if you have to leave a room and
don’t allow cookies to ‘remember your password’
4. Do not post information about yourself publically that you
wouldn’t want employers, colleagues, pupils or parents to see.
5. Make sure you do not retaliate but keep all records – screen
prints and record time, date & website addresses
6. Report any incident to the appropriate member of staff
promptly
7. Make sure the school informs parents about incidents and
delivers appropriate sanctions
Where to start ?

Risk

Responsibility
Our leadership,
ethical code and
resilience

Our safety, conduct
& risky behaviours

Reputation
Our privacy,
security settings
and our peer group
CE
VI Conversations about
AD

Risk

FOR YOUNG PEOPLE
“Do you know who all your online
friends are offline?”
“Do you know how to block
someone on Facebook?”
“Do you have a PIN on your mobile
phone?”
“Do any of your friends send photos
of themselves?”
“Do you know how to save that sort
of evidence?”
“Would you report that at
school/CEOP?”

FOR OUR STAFF
“Have we assessed how we as staff and
our users could be vulnerable online?”
“If we use Social Media do we set clear
guidance on use ?”
“Do we use an organisation mobile
phone if working with yp ? (ie not our
personal one?”
“Do we know how to save evidence and
intervene or reporting to CEOP?”
CE
VI Conversations about
AD

Reputation

FOR YOUNG PEOPLE
 “Remember what goes online
stays online”
 “When did you last check your
privacy settings?”
 “Can you help me check my
settings”
 “Are you changing your
password regularly?”
 “Do you know the best way to
get offending material taken
down?”

FOR OUR STAFF
 “Do we have an organisational
policy on using social media with
users ?”
 Do we check regularly what
people are saying about our
service on social media ?
 Do we promote ourselves
positively on social media ?
 Are we reaching our users
through social media effectively?
CE
VI
Conversations about
AD

Responsibility

FOR YOUNG PEOPLE
 “Have you come across any
good social initiatives?”
 “What advice do you need
about using social media ?”
 “I trust you to make good
decisions, but I also need
to learn from you.”

FOR OUR STAFF





“Can we involve the YP we work with
in developing our policy and
practice ?”
“What expectations are we making for
our staff in being online so much ?”
Are we pioneering new and
imaginative ways of Educating and
inspiring our younger users via social
media ?
WHAT IS ONE THING YOU ARE GOING TO
ACT UPON ?

Risk
Reputation
Responsibility

Safety, conduct &
risky behaviour

Privacy, security
settings and peer
group

Leadership, ethical
code and resilience
EVALUATION
Please give feedback.

Useful websites
1) UK law Enforcement agency and part of VGTF
www.ceop.gov.uk
2) UK Council for Child Internet Safety
www.dcsf.gov.uk/ukccis/
3) Childnet International
www.childnet.com/ including Cyberbullying film
4) British Association for Adoption and Fostering
www.baaf.org.uk - including advice on Facebook
And Finally….
Tim Berners-Lee ‘Weaving the Web’ 1999
"The web is more a social
creation than a technical one.
I designed it for social effect to help people work together and not as a technical toy….
The ultimate goal of the web is
to support and improve our web
like existence in the world......
We have to ensure that the
society we build with the web
is the sort we intend.”
THANK YOU !

Complete Evaluation
forms
MUNCH
PING
POKE!

See my current work re
social media and vulnerable
yp on my website
www.carrick-davies.com

stephen@carrick-davies.com

Más contenido relacionado

La actualidad más candente

Social Media for Youth Leaders, May 2014, for @c_of_e
Social Media for Youth Leaders, May 2014, for @c_of_eSocial Media for Youth Leaders, May 2014, for @c_of_e
Social Media for Youth Leaders, May 2014, for @c_of_eBex Lewis
 
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakRaising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakBex Lewis
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesFrances Harris
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?Sarah Welstead
 
Parenting post primary
Parenting post primaryParenting post primary
Parenting post primaryWebwise
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsCreepSquash
 
03 internet addiction
03 internet addiction03 internet addiction
03 internet addictionoffaq
 
Tuscola County Social Media & Parents 3.14.15
Tuscola County Social Media & Parents 3.14.15Tuscola County Social Media & Parents 3.14.15
Tuscola County Social Media & Parents 3.14.15PNMI
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Larry Magid
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYgailmowal
 
Digital footprint presentation
Digital footprint presentationDigital footprint presentation
Digital footprint presentationsahrdebeck52
 
Parenting primary
Parenting primary Parenting primary
Parenting primary Webwise
 
Digital literacy skills for social workers - North West London ASYE Programme
Digital literacy skills for social workers - North West London ASYE ProgrammeDigital literacy skills for social workers - North West London ASYE Programme
Digital literacy skills for social workers - North West London ASYE ProgrammeClaudia Megele
 
Social Media: Risks and Benefits
Social Media: Risks and BenefitsSocial Media: Risks and Benefits
Social Media: Risks and BenefitsSteve Young
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
Vtc2013 digital citizenship
Vtc2013 digital citizenshipVtc2013 digital citizenship
Vtc2013 digital citizenshipClint Hamada
 

La actualidad más candente (19)

Social Media for Youth Leaders, May 2014, for @c_of_e
Social Media for Youth Leaders, May 2014, for @c_of_eSocial Media for Youth Leaders, May 2014, for @c_of_e
Social Media for Youth Leaders, May 2014, for @c_of_e
 
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakRaising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected Consequences
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?
 
Parenting post primary
Parenting post primaryParenting post primary
Parenting post primary
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
 
03 internet addiction
03 internet addiction03 internet addiction
03 internet addiction
 
Tuscola County Social Media & Parents 3.14.15
Tuscola County Social Media & Parents 3.14.15Tuscola County Social Media & Parents 3.14.15
Tuscola County Social Media & Parents 3.14.15
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
 
NSBA2010
NSBA2010NSBA2010
NSBA2010
 
Digital footprint presentation
Digital footprint presentationDigital footprint presentation
Digital footprint presentation
 
Parenting primary
Parenting primary Parenting primary
Parenting primary
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Digital literacy skills for social workers - North West London ASYE Programme
Digital literacy skills for social workers - North West London ASYE ProgrammeDigital literacy skills for social workers - North West London ASYE Programme
Digital literacy skills for social workers - North West London ASYE Programme
 
Social Media: Risks and Benefits
Social Media: Risks and BenefitsSocial Media: Risks and Benefits
Social Media: Risks and Benefits
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
Vtc2013 digital citizenship
Vtc2013 digital citizenshipVtc2013 digital citizenship
Vtc2013 digital citizenship
 

Destacado

Intro to CEOP and Online Safety
Intro to CEOP and Online SafetyIntro to CEOP and Online Safety
Intro to CEOP and Online SafetyNeil Winton
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Presentation Skills for Teachers version 3.0
Presentation Skills for Teachers  version 3.0Presentation Skills for Teachers  version 3.0
Presentation Skills for Teachers version 3.0Simon Jones
 
Online safety coaching module teachers
Online safety coaching module teachersOnline safety coaching module teachers
Online safety coaching module teachersAmber Burkholder
 

Destacado (6)

Intro to CEOP and Online Safety
Intro to CEOP and Online SafetyIntro to CEOP and Online Safety
Intro to CEOP and Online Safety
 
E safety inset
E safety insetE safety inset
E safety inset
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Presentation Skills for Teachers version 3.0
Presentation Skills for Teachers  version 3.0Presentation Skills for Teachers  version 3.0
Presentation Skills for Teachers version 3.0
 
Online safety coaching module teachers
Online safety coaching module teachersOnline safety coaching module teachers
Online safety coaching module teachers
 

Similar a E safety training for southwark staff - stephen carrick-davies january 2013

E safety Presentation for foster carers by stephen carrick-davies
E  safety Presentation for foster carers by stephen carrick-daviesE  safety Presentation for foster carers by stephen carrick-davies
E safety Presentation for foster carers by stephen carrick-daviesStevecd
 
E safety training for lewisham arts and education network (advance) by steph...
E  safety training for lewisham arts and education network (advance) by steph...E  safety training for lewisham arts and education network (advance) by steph...
E safety training for lewisham arts and education network (advance) by steph...Stephen Carrick-Davies
 
'Parenting in the digital age' on slideshare
'Parenting in the digital age' on slideshare'Parenting in the digital age' on slideshare
'Parenting in the digital age' on slideshareDave Truss
 
Parenting post primary (3)
Parenting post primary (3)Parenting post primary (3)
Parenting post primary (3)Webwise
 
Walworth academy e-safety (staff)
Walworth academy   e-safety (staff)Walworth academy   e-safety (staff)
Walworth academy e-safety (staff)esolate
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Esafety ncn july 2014
Esafety ncn july 2014Esafety ncn july 2014
Esafety ncn july 2014Martin Cooke
 
Social Media101 V5
Social Media101 V5Social Media101 V5
Social Media101 V5KimBenedict
 
Fostering in a digial age training for foster carers - june 2016
Fostering in a digial age    training for foster carers  - june 2016Fostering in a digial age    training for foster carers  - june 2016
Fostering in a digial age training for foster carers - june 2016Stephen Carrick-Davies
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013Stevecd
 
Parenting primary
Parenting primaryParenting primary
Parenting primaryWebwise
 
Maddie is Online Series 1 Booklet with resources
Maddie is Online Series 1 Booklet with resources Maddie is Online Series 1 Booklet with resources
Maddie is Online Series 1 Booklet with resources Konstantina Martzoukou
 
Safeguarding Children & Young People Online
Safeguarding Children & Young People OnlineSafeguarding Children & Young People Online
Safeguarding Children & Young People OnlineClaudia Megele
 
Digital Footprints - NDP
Digital Footprints - NDPDigital Footprints - NDP
Digital Footprints - NDPmiawalsh
 
Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)Bex Lewis
 
Cyber safety & social media deck
Cyber safety & social media deckCyber safety & social media deck
Cyber safety & social media decksagedayschool
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parentsamelialouise
 
Parenting In A Media Driven World Slideshare
Parenting In A Media Driven World SlideshareParenting In A Media Driven World Slideshare
Parenting In A Media Driven World Slidesharechrisweber
 

Similar a E safety training for southwark staff - stephen carrick-davies january 2013 (20)

E safety Presentation for foster carers by stephen carrick-davies
E  safety Presentation for foster carers by stephen carrick-daviesE  safety Presentation for foster carers by stephen carrick-davies
E safety Presentation for foster carers by stephen carrick-davies
 
E safety training for lewisham arts and education network (advance) by steph...
E  safety training for lewisham arts and education network (advance) by steph...E  safety training for lewisham arts and education network (advance) by steph...
E safety training for lewisham arts and education network (advance) by steph...
 
'Parenting in the digital age' on slideshare
'Parenting in the digital age' on slideshare'Parenting in the digital age' on slideshare
'Parenting in the digital age' on slideshare
 
Parenting post primary (3)
Parenting post primary (3)Parenting post primary (3)
Parenting post primary (3)
 
Walworth academy e-safety (staff)
Walworth academy   e-safety (staff)Walworth academy   e-safety (staff)
Walworth academy e-safety (staff)
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Esafety ncn july 2014
Esafety ncn july 2014Esafety ncn july 2014
Esafety ncn july 2014
 
Social Media101 V5
Social Media101 V5Social Media101 V5
Social Media101 V5
 
Fostering in a digial age training for foster carers - june 2016
Fostering in a digial age    training for foster carers  - june 2016Fostering in a digial age    training for foster carers  - june 2016
Fostering in a digial age training for foster carers - june 2016
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013
 
Parenting primary
Parenting primaryParenting primary
Parenting primary
 
Maddie is Online Series 1 Booklet with resources
Maddie is Online Series 1 Booklet with resources Maddie is Online Series 1 Booklet with resources
Maddie is Online Series 1 Booklet with resources
 
Safeguarding Children & Young People Online
Safeguarding Children & Young People OnlineSafeguarding Children & Young People Online
Safeguarding Children & Young People Online
 
Digital Footprints - NDP
Digital Footprints - NDPDigital Footprints - NDP
Digital Footprints - NDP
 
Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)
 
Cyber safety & social media deck
Cyber safety & social media deckCyber safety & social media deck
Cyber safety & social media deck
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parents
 
Parenting In A Media Driven World Slideshare
Parenting In A Media Driven World SlideshareParenting In A Media Driven World Slideshare
Parenting In A Media Driven World Slideshare
 
Esafety 2014
Esafety 2014Esafety 2014
Esafety 2014
 

Más de Stephen Carrick-Davies

Principles of effective activity based participative learning. - updated. pptx
Principles of effective activity based participative learning. - updated. pptxPrinciples of effective activity based participative learning. - updated. pptx
Principles of effective activity based participative learning. - updated. pptxStephen Carrick-Davies
 
An introduction to Social Entrepreneurship workshop presented by Stephen Ca...
An introduction to Social Entrepreneurship   workshop presented by Stephen Ca...An introduction to Social Entrepreneurship   workshop presented by Stephen Ca...
An introduction to Social Entrepreneurship workshop presented by Stephen Ca...Stephen Carrick-Davies
 
Speaking and Listening Teacher's powerpoint
Speaking and Listening Teacher's powerpoint Speaking and Listening Teacher's powerpoint
Speaking and Listening Teacher's powerpoint Stephen Carrick-Davies
 
FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint
FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint
FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint Stephen Carrick-Davies
 
Presentation on understanding and preventing bullying by stephen carrick davi...
Presentation on understanding and preventing bullying by stephen carrick davi...Presentation on understanding and preventing bullying by stephen carrick davi...
Presentation on understanding and preventing bullying by stephen carrick davi...Stephen Carrick-Davies
 
Munch, poke, ping! understanding the language of safety and responsibility
Munch, poke, ping! understanding the language of safety and responsibilityMunch, poke, ping! understanding the language of safety and responsibility
Munch, poke, ping! understanding the language of safety and responsibilityStephen Carrick-Davies
 
Screenless presentation for secondary schools
Screenless presentation   for secondary schoolsScreenless presentation   for secondary schools
Screenless presentation for secondary schoolsStephen Carrick-Davies
 
Screenless presentation for primary schools
Screenless presentation   for primary schoolsScreenless presentation   for primary schools
Screenless presentation for primary schoolsStephen Carrick-Davies
 
E safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-daviesE safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-daviesStephen Carrick-Davies
 
Munch Poke Ping Conference ~powerpoint combined presentations. pptx
Munch Poke Ping Conference ~powerpoint combined presentations. pptxMunch Poke Ping Conference ~powerpoint combined presentations. pptx
Munch Poke Ping Conference ~powerpoint combined presentations. pptxStephen Carrick-Davies
 
Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)Stephen Carrick-Davies
 
Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012Stephen Carrick-Davies
 
Safeguarding children online training from steve c-d for southwark diocese-...
Safeguarding children online   training from steve c-d for southwark diocese-...Safeguarding children online   training from steve c-d for southwark diocese-...
Safeguarding children online training from steve c-d for southwark diocese-...Stephen Carrick-Davies
 

Más de Stephen Carrick-Davies (17)

Principles of effective activity based participative learning. - updated. pptx
Principles of effective activity based participative learning. - updated. pptxPrinciples of effective activity based participative learning. - updated. pptx
Principles of effective activity based participative learning. - updated. pptx
 
An introduction to Social Entrepreneurship workshop presented by Stephen Ca...
An introduction to Social Entrepreneurship   workshop presented by Stephen Ca...An introduction to Social Entrepreneurship   workshop presented by Stephen Ca...
An introduction to Social Entrepreneurship workshop presented by Stephen Ca...
 
Speaking and Listening Teacher's powerpoint
Speaking and Listening Teacher's powerpoint Speaking and Listening Teacher's powerpoint
Speaking and Listening Teacher's powerpoint
 
Problem Solving Teacher's Powerpoint
Problem Solving   Teacher's Powerpoint Problem Solving   Teacher's Powerpoint
Problem Solving Teacher's Powerpoint
 
FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint
FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint
FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint
 
Team working powerpoint
Team working powerpointTeam working powerpoint
Team working powerpoint
 
Self management teacher's powerpoint
Self management   teacher's powerpointSelf management   teacher's powerpoint
Self management teacher's powerpoint
 
Presentation on understanding and preventing bullying by stephen carrick davi...
Presentation on understanding and preventing bullying by stephen carrick davi...Presentation on understanding and preventing bullying by stephen carrick davi...
Presentation on understanding and preventing bullying by stephen carrick davi...
 
Munch, poke, ping! understanding the language of safety and responsibility
Munch, poke, ping! understanding the language of safety and responsibilityMunch, poke, ping! understanding the language of safety and responsibility
Munch, poke, ping! understanding the language of safety and responsibility
 
Screenless presentation for secondary schools
Screenless presentation   for secondary schoolsScreenless presentation   for secondary schools
Screenless presentation for secondary schools
 
Screenless presentation for primary schools
Screenless presentation   for primary schoolsScreenless presentation   for primary schools
Screenless presentation for primary schools
 
E safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-daviesE safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-davies
 
Munch Poke Ping Conference ~powerpoint combined presentations. pptx
Munch Poke Ping Conference ~powerpoint combined presentations. pptxMunch Poke Ping Conference ~powerpoint combined presentations. pptx
Munch Poke Ping Conference ~powerpoint combined presentations. pptx
 
Mpp conference powerpoint
Mpp conference powerpointMpp conference powerpoint
Mpp conference powerpoint
 
Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)
 
Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012
 
Safeguarding children online training from steve c-d for southwark diocese-...
Safeguarding children online   training from steve c-d for southwark diocese-...Safeguarding children online   training from steve c-d for southwark diocese-...
Safeguarding children online training from steve c-d for southwark diocese-...
 

Último

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

E safety training for southwark staff - stephen carrick-davies january 2013

  • 1. SOCIAL MEDIA, YOUNG PEOPLE AND E- SAFETY
  • 2. Disclaimer, copyright and caveats • This presentation has been written by Stephen Carrick-Davies and forms the basis of training he has delivered for Foster Parents and other working with vulnerable adults across the UK. • Not all of the training content is included in this presentation and these slides are NOT a training package (either as a whole or in parts) and should not be used as such. • It is shared on SlideShare for information and guidance only and to contribute to the debate about how the internet can amplify offline vulnerabilities. • It’s great to share but it is not easy to strike the right balance between sharing and copying. Invariably these slides contain content developed by others and Stephen has sought to credit content (including photographs) which have come from other sources at the end of this presentation so please respect the authorship of these slides . • The content on the slides which Stephen has personally written and produced he has assigned with Creative Commons license. Slides showing this mark can be used for non-commercial purposes, as long the content is credited. see www.creativecommons.org for more info. • Ultimately Stephen hopes that these slides help others working with vulnerable young people and if you have questions or have other experience to share please contact Stephen directly (see e-mail address at the end). “In the past you were what you owned. Now you are what you share.” Charles Leadbetter
  • 3. Introductions Stephen Carrick-Davies • Ten years at Childnet International • Now an Independent Trainer/ Social Entrepreneur /Parent/Learner ..... “Parents and the home environment they create are the single most important factor in shaping their children’s well-being, achievements and prospects” Alan Johnson (when Education Secretary)
  • 4. GROUP EXERCISE Close your eyes and try to remember when you were 8 years old and most happy. For how many of you was this experience… Outside? Without parental supervision? Involved in something risky?
  • 5. GROUP EXERCISE What’s changed ? Outside? Without parental supervision? Involved in something risky?
  • 6.
  • 7. A few facts and figures* *Source: Ofcom Oct 2013) •91% of all 5-15 year olds used the internet in 2012: – all 12-15 year olds (100%) •The estimated weekly volume of internet use at home in 2012 increased with the age of the child: – 8.1 hours for 8-11 year olds and – 17.1 hours for 12-15 year olds. •62% of 12-15’s own a smartphone (static) •A tablet is the device of choice for media consumption – their use has tripled since 2012. •In 2012, 12-15’s spent as much time using the Internet as watching TV. © Stephen Carrick Davies & Tim Mungeam 2014
  • 8. Facts and figures* (*Source Ofcom 2012) •Mobiles are the device of choice for older YP for peer communication •43% of children aged 5-15 years old have an active social networking site profile. – 22% of 8-11 year olds – 80% of 12-15 year olds. •98% of both 8-11 year olds and 12-15 year olds who have an active social networking site profile use Facebook (despite the minimum age at which you can have a profile being 13). •12-15’s send an average of 255 text messages per week •They also send an average of 185 instant messages © Stephen Carrick Davies & Tim Mungeam 2014
  • 9. What are your expectations and training needs ?
  • 10. Structure and aims of training Part I “Understanding” the new Reality !  Overview of ‘Social Media’ and web 2.0  How technology is changing, and being changed  Why the positive appeal for children REFLECT & THINK Coffee break -------------------------------------------------------------------------------------------------------- Part II Understanding the Risks     Overview of online risks for young people Specific challenges for Wandsworth Staff Where we are vulnerable (privacy settings) Case study to help us to see responses FACE- UP & BE CHALLENGED ------------------------------------------------------------------------------------------------------------------------------------- Part III Understanding our Responsibilities     Building Empathy and Resilience What does OFSTED say ? Keeping professional in personal spaces. Prevention & Response strategies INSPIRED & EQUIPPED All through a mixture of slides, quotes, case studies, films, small group exercises, Q&A, and links to practical resources.
  • 12. “Everything that’s already in the world when you’re born is just normal. Anything that gets invented between then and before you turn thirty is incredibly exciting and with any luck you can make a career out of it. Anything that gets invented after you’re thirty is against the natural order of things and the beginning of the end of civilisation as we know it… Douglas Adams How to stop worrying and learn to love the internet 1999 …until it’s been around for about ten years ….when it gradually turns out to be  alright really.”
  • 13. On a scale of 1- 10 rank yourself as to how confident you are using social media. 1 ----------------------5----------------------10 “What’s a mouse?” “I taught Mark Zuckerberg all he knows”
  • 14. GROUP EXERCISE Turn to your neighbour What does the internet, social media and mobile technology give to young people ?
  • 15. eal r The child’s online world ANONYMITY ALWAYS ON ADDICTIVE (?) “If you took away my mobile phone you would take away a part of me” AWAY FROM SUPERVISION ACCEPTANCE IDENTITY & STATUS ACCESS THE WORLD ACTIVE NOT PASSIVE MEDIUM AMPLIFIER (gives children a voice)
  • 16. What is this real world like for vulnerable YP ? “I have over 120 people on my BBM but I deleted like 30 on Saturday cause I was angry and they pissed me off so I just deleted them. Since I’ve had my BlackBerry only 2 people have deleted me.” Student from Pupil Referral Unit Play film Film at www.carrick-davies.com/research/films
  • 17. GROUP EXERCISE Turn to your neighbour What was the greatest fear for the yp in the film ? How did it had got out of control ? What would you do next if you were in that position ?
  • 18.
  • 20. NEWS FEEDS “boast by post” APPLICATIONS Huge range of apps Events/ Groups LIVE CHAT Find, link, be in constant contact + on your mobile Superseding E-mail Comment and Tag photos face recognition TIME LINE FRIENDS MESSAGES PHOTOS/TAGS Superseding IM VIDEO link and embed WHO’S ONLINE Know who is online now! Social location ALL FOR FREE …… BUT ….WHAT PRICE IS FREE ?
  • 21. Facebook Timeline Searchable by years Check regularly because the settings change Re-check your privacy settings using ‘View As’ function The importance of privacy settings 31% of 12-15 year olds don’t use privacy settings on their social networking profiles – Ofcom Media literacy Report 2009
  • 22.
  • 23. • Searching for yourself – example
  • 24. See pages 106- 107 in Vodafone’s Digital Parenting magazine BUT ... Remember privacy options and controls change frequently!
  • 25. A word about BBM • Be careful with your BBM PIN • Be careful of ‘Screen Munching’ • Use the tools – like delete contact and block future requests. • Make sure your blackberry has a password See www.carrick-davies.com for film and tutorial. (bottom of the page)
  • 26. See pages 54 – 59 in Vodafone’s Digital Parenting magazine
  • 27. A word about games • The ratings are there for a reason. • Anyone who sells a designated 12+ title to younger children will face fines of up to £5,000 /jail. • Recognise the ‘compulsion’ issues. • Younger siblings and friends. • Misogynistic messages and casual cruelty.
  • 28. Let’s break for coffee 10 minutes
  • 29. PART II Understanding the risks (not the same thing as harm!)
  • 30. All technology is neutral What would Gandhi have done if he had a FACEBOOK account ?
  • 31. Our perception of danger Most abuse takes place in the context of a family or close relative.
  • 32. Classifying the risks to children online Original 3 Cs Classification by ‘EU Kids’ online project CONTENT Child as Recipient CONTACT Child as Participant CONDUCT Child as Actor Commercial Aggressive Sexual Adverts Spam Sponsorship Personal info Violent and hateful content Pornographic unwelcome Tracking Harvesting Personal info Being bullied harassed or stalked Meeting strangers Being groomed Self harm Unwelcome persuasions Illegal downloading Bullying or harassing another Creating and uploading inappropriate material Providing misleading info/advice Hacking Gambling Financial scams Terrorism sexual content Values Bias Racist Misleading info or advice
  • 33. “Sexting” = teens sharing nude photos via mobiles and web. The practice can have serious legal and psychological consequences Commercial CONTENT Child as Recipient CONTACT Child as Participant CONDUCT Child as Actor Aggressive Online grooming is a criminal offence Sexual Values Pornographic unwelcome sexual content Contact www.ceop.gov.uk if you have concerns about inappropriate communication from an adult to a minor. “One-third of those who sexually abuse children are just children themselves.” Meeting strangers Being groomed Creating and uploading inappropriate material BBC Newsnight programme March 2010 21,630 BEBO members had the name “Porn Star” “So take a dirty picture for me, Take a dirty picture Just take a dirty picture for me Take a dirty picture” From Taio Cruz song No 6 in the UK charts April 2010.
  • 34. How the risks ‘migration’ from online to offline can affect vulnerable YP Original 3 Cs Classification by ‘EU Kids’ online project CONTENT Child as Recipient Commercial Aggressive Sexual CRIMINAL Values OF THE 1,984 PEOPLE CHARGED AFTER RIOTS:  53% were under 20 years old CONTACT Child as Participant  42% received free school meals (16% nat. average)  66% of them had some special CONDUCT Child as Actor education needs (21% of all pupils) Figures from the Ministry of Justice carried out by the Howard League for Penal Reform (published in Guardian 26.11.11) BEING IN THE WRONG PLACE AT THE WRONG TIME & “BAD LUCK”
  • 35. JOINT ENTERPRISE: Legislation that finds people guilty of a violent crime if they are judged to have lent encouragement to the main perpetrator. FAIL TO INTERVENE FAILURE TO WALK AWAY ! COMPLICIT IN A JOINT ENTERPRISE ASSOCIATION WITH SOMEONE “You played no part but presence there encouraged others ” INCLUDES ONLINE EVIDENCE OF ASSOCIATION & ENCOURAGEMENT “They planned the attack on social media the night before, the court was told, sending messages to each other on Facebook and via BlackBerry Messenger.”
  • 36. Classifying the risks to children online Commercial CONTENT Child as Recipient CONTACT Child as Participant CONDUCT Child as Actor Aggressive Sexual Values Violent and hateful content Being bullied harassed or stalked Bullying or harassing another 22% of yp aged 1118 report having been cyber bullied. It ruins lives. YP may not disclose that it is happening Classification by ‘EU Kids’ online project and referenced in the Byron Report
  • 37. “Sticks and stones.... But words ...?” From US Ad Council at http://www.youtube.com/watch?v=bdQBurXQOeQ
  • 38. How is Cyberbullying different from offline bullying? OFFLINE Home is safe Often Physical Bully strong/victim weak Local & intimate See the impact Bystanders intervene Often Silent ONLINE Can be 24/7 Usually words/pictures Roles can change Mass audience Don’t see impact Lack of empathy Bystanders take part “If you laugh at it you’re part of it” It can leave a trail !
  • 39. Why YP may be scared of reporting abuse ? • “It was nobody else’s business” • “Didn’t think it was serious or wrong” • “Didn’t want parents/friends to find out” • “Was frightened” • “Didn’t think I would be believed” • “Had been threatened by the abuser” Source: Child Maltreatment in the UK Cawson 2000 Abuse on the internet/mobile phone • “My parents don’t get the internet” • “Maybe it was my fault ! (blur)” • “Scared if computer is confiscated”
  • 40. RESPONDING TO THE VICTIM Need for reassurance – THIS IS BULLYING ! Practical advice: RED Don’t retaliating, Orange – Save the evidence Green – Tell someone (who?) See advice, resources and guidance at Childnet’s www.digizen.org website
  • 41. PREVENTING  Understanding and accepting the impact of cyberbullying.  Updating existing policies and practices. (AUP anti-bullying)  Making reporting easier - includes advice about removal of content. (industry support)  Promoting the positive use of technology.  Evaluating impact of prevention activities. RESPONDING  Supporting the victim – need for reassurance.  Practical advice and support such as saving evidence, not retaliating, informing parents.  Investigate and record incidents, identify the bully.  Working with the bully and sanctions (including technology specific).  Involve Parents /carers Underpinned by effective education and awareness
  • 42. The importance of reaching parents/carers For Parents • Be aware that your children may as likely cyberbully as be a target of cyberbullying. • Talk to your children and understand the ways in which they are using the internet and mobile phones. • Use the tools on the services • Remind your children not to retaliate • Remind yp to keep the evidence • Know where to report (see later) For Young people • Always respect others be careful what you say. • Think before you send, what goes online stays online ! • Treat your password like your toothbrush ! • Learn how to block the bully and save the evidence • Make sure you tell someone • Support others – how would you feel if no-one stood up for you ! • Encourage them to produce their own peer advice media !
  • 43. GROUP EXERCISE The young person who you are responsible for (let’s say she’s a 12 year old girl) tells you that her “friends” in her class took video clip of her at a sleep over pyjama party on their phones which is now being circulated and she thinks it is now posted on a social networking site. •Is this an issue for your school/organisatinon •What advice would you give to her ? •Who should the girl report this to ? •How would you go about trying to remove this content ? •What if those who posted it up have circulated it more widely ?
  • 44. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY 10 WAYS IN WHICH THE INTERNET CAN AMPLIFY OFFLINE VULNERABILITY
  • 45. ‘Vulnerable’ This is complex because: All children are different so there are dangers in making broad statements. Many children are neglected which is harder to spot yet makes them vulnerable What about The paradox that overvulnerable protected children can be adults ? more vulnerable online. Vulnerability is not static - All children can be vulnerable at different stages The categorisations of risk offline do not necessarily mirror online experience (eg a disabled yp may be empowered online as the internet can be ‘leveller’ The more a child uses the internet the more they can become confident and possibly complacent and feel ‘invincible’ and don’t feel they are at risk . Those who have experienced offline risk and abuse may be more resilient and able to protect themselves online or may not be affected so much by the risks they encounter. Constantly changing technologies. Eg, Location services HOWEVER WE CAN IDENTIFY A FEW COMMON FEATURES....
  • 46. Low selfconfidence. Identity seen to be part of ‘outsiders’ Lack of supportive adults in their lives More unsupervised time, fewer structures and boundaries Fluid learning environment and gaps in education and induction MUNCH POKE PING! See www.carrick-davies.com Experience abusive relationships or environments including anger Influences of alcohol, drugs and gang culture. Risk takers and at risk
  • 47. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Unmediated Contact Guardian Newspaper article 19 June 2010 Children who have been fostered can suddenly receive messages from siblings, birth parents, or those who want to trace them for potentially harmful reasons.
  • 48. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Social Location Young People who may need to escape from an abusive relationships need to think carefully about how they make their ‘places’ public.
  • 49. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Exclusion from the ‘norm’ Eg Facebook Timeline There are lots of online services which celebrate our ‘journey’. How do children who don’t know their birth parents, may not have an early photo of themselves feel in these ‘boast by post’ environments ?
  • 50. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Blackmailing “gifting” & grooming by peers A young person from a disadvantaged background may be targeted with ‘gifts’ of mobile phones, mobile payment cards etc, by older young people but in exchange for ‘favours’ which they ‘cash in’ later (including prostitution, trafficking or illegal activity). If it sounds to good to be true .... it’s probably is (they want something ! ) Search ‘NSPCC survey on teen partner violence’ for more info
  • 51. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Earlier adopters ? “Any A/C holders looking to make a quick grand get at me. No time wasters.” Message on BBM about bank scams (fraud!) Screen Munch ! Many vulnerable young people can be early adopters of tools and services which are not yet regulated or in the public conscious. For example BBM How will QR codes be mis-used ?
  • 52. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Being ‘nudged’ into gangs Vulnerable young people who are risk takers, impulsive or under the influence of alcohol and/or drugs and less supervised, can be more easily drawn into illegal activity including being ‘nudged’ through technology. ALL CHILDREN WILL LEAVE A FOOTPRINT EXCEPT SOME WILL BE IN MUDDIER SAND!
  • 53. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Negative digital footprint ALL CHILDREN WILL LEAVE A DIGITAL FOOTPRINT BUT SOME WILL BE MUDDIER THAN OTHERS Those who are supported can compensate and build positive online footprint but what about those who aren’t ?
  • 54. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Low Resilience “When my pinger’s gone to sleep that’s when I’ll go to sleep.” Young people need to be cherished, have the right amount of sleep and healthy food. What happens when you are running on empty ?
  • 55. •WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Special needs & learning difficulties Attachment Theory Attachment Some children with emotional or behavioural difficulties, attachment difficulties, and other complex needs, may be particularly vulnerable online. EG those with Autistim Spectrum Disorder may make literal interpretations of content, which will affect how they respond. Others with complex needs may not understand the concept of friendship, and therefore trust everyone implicitly. Some children with SEN or disabilities may not recognise that they are being bullied or appreciate how their own online behaviour may be seen by someone else as bullying .
  • 56. •WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Low levels of Language & Literacy Lack of literacy skills, can mean that messages are unclear, ambiguous or misunderstood We must not assume that all YP are confident “digital natives” and we must also recognise that one in six people in the UK struggle with literacy (below the level expected of an eleven year old). Hence being able to complete a ‘REPORT ABUSE’ form or read instructions about safety, privacy and ‘terms and conditions’ are real barriers for many young people. Do YP recognise the link between reading and being able to be safe ?
  • 57. GROUP EXERCISE In pairs discuss Do you recognise these 10 offline vulnerabilities and agree that they can be amplified online ? Can you think of positive ways in which the Internet minimises offline vulnerabilities? How could you begin to talk to the YP you look after about these issues?
  • 60. The dangers and opportunities of adults leaving children to it ! EMPATHY, RESILIENCE AND LEADERSHIP Equipping children to be safe and secure online involves addressing issues such as Empathy acquisition, Resilience and Leadership. These are the true foundation blocks for children to become good digital citizens.
  • 61. “You never really understand a person until you consider things from his point of view. Until you climb inside of his skin and walk around in it.” Harper Lee, To Kill a Mockingbird
  • 62. “Empathy is the ability to put ourselves in another’s place and to understand their experience. We are deeply present to their thoughts and feelings with such compassionate accuracy that they can hear their own thoughts more clearly. With empathy, we reflect on how our actions affect others. Empathy inspires us to be giving and selfless. Empathy connects our hearts. Source www.boundlessconnections.org/weeklyvirtuesblog/wp- Empathy connect us with our common humanity. It protects us from prejudice, blame, and judgment – those things that divide us from each other. It moves us to seek justice for every person. Even those with whom we disagree.”
  • 63. “Empathy is the ability to put ourselves in another’s place and to understand their experience. We are deeply present to their thoughts and feelings with such compassionate accuracy that they can hear their own thoughts more clearly. With empathy, we reflect on how our actions affect others. Empathy inspires us to be giving and selfless. Empathy connects our hearts. Source www.boundlessconnections.org/weeklyvirtuesblog/wp- Empathy connect us with our common humanity. It protects us from prejudice, blame, and judgment – those things that divide us from each other. It moves us to seek justice for every person. Even those with whom we disagree.”
  • 64. AN ABSENCE OF KNOWLEDGE IS NOT AN EXCUSE FOR AN ABSENCE OF RESPONSIBILITY AND CARE. WHAT IS POTENTIALLY CRIMINAL, HARMFUL, INAPPROPRIATE OR ILLEGAL OFFLINE, IS THE SAME ONLINE. ULTIMATELY THIS COMES DOWN TO OUR DUTY OF CARE & LEADERSHIP.
  • 65. PIE all 3 ‘legs’ are vital Policies Organisation E-safety policy, Acceptable Use Policy, Anti-Bullying policy, Mobile use policy Infrastructure Managed learning environment with high quality access and equipment which is filtered, monitored and supervised. Education Ongoing education & prevention programme which is targeted at both YP, parents and the whole work-force.
  • 66. d Up at e an nJ di u 20 ry a 14 In the context of an inspection, e-safety may be described as the school’s ability: to protect and educate pupils and staff in their use of technology to have the appropriate mechanisms to intervene and support any incident where appropriate. What can we learn from schools ?
  • 67. Assemblies, tutorial time, personal, social, health and education lessons, and an age-appropriate curriculum for e-safety Schools need to make good use of the views of pupils and their parents to develop their e-safety provision. The outstanding schools recognised that, relationships with families, needed to keep developing to support e-safety at home. WHAT DOES GOOD E-SAFETY LOOK LIKE? Pupils were more vulnerable overall when schools used locked down systems because they were not given enough opportunities to learn how to assess and manage risk for themselves. In the outstanding schools, senior leaders, governors, staff and families worked together to develop a clear strategy for e-safety. Policies were reviewed regularly in the light of technological developments.
  • 68. d Up at e n Ja in d ry ua 20 Everyone knows what school-based reporting routes are and external abuse buttons (eg CEOP) and effective peer mentoring and support 14 Personal data is managed securely and in accordance with statutory requirements WHAT DOES GOOD E-SAFETY LOOK LIKE? Risk assessment taken seriously and used to good effect in promoting e-safety . All teaching and non-teaching staff receive regular and up-to-date training and one or more members have higher level of expertise and defined responsibilities assess and manage risk for themselves. Written in plain English updated regularly and ratified by governors + incorporate an AUP that is understood and respected by parents, pupils and staff.
  • 69. Challenges for teachers & other professionals • Recent TES survey found that 9% of teachers were friends with pupils on SNS*. • General advice from unions and GTS is: Do not ‘friend’ pupils on personal accounts or ask to be added to their contact lists. WHY ? You could make yourself vulnerable by sharing your personal information (and that of your friends) You could make yourself vulnerable by being able to access their personal information * http://community.tes.co.uk/forums/t/463065.aspx?s_cid=16 See http://www.childnet.com/kia/downloads/Social-networking.pdf for Childnet/TDA leaflet You could make yourself open to allegations of inappropriate contact or be misunderstood.
  • 70. OTHER WAYS TO PROTECTING YOURSELF 1. Update your AUPs stating how and when personally owned equipment (including camera phones) can be used. 2. Make sure you have a strong password and set a password or pin for your phone. Increasingly important for Facebook ‘Fraping’ 3. Close down computers quickly if you have to leave a room and don’t allow cookies to ‘remember your password’ 4. Do not post information about yourself publically that you wouldn’t want employers, colleagues, pupils or parents to see. 5. Make sure you do not retaliate but keep all records – screen prints and record time, date & website addresses 6. Report any incident to the appropriate member of staff promptly 7. Make sure the school informs parents about incidents and delivers appropriate sanctions
  • 71. Where to start ? Risk Responsibility Our leadership, ethical code and resilience Our safety, conduct & risky behaviours Reputation Our privacy, security settings and our peer group
  • 72. CE VI Conversations about AD Risk FOR YOUNG PEOPLE “Do you know who all your online friends are offline?” “Do you know how to block someone on Facebook?” “Do you have a PIN on your mobile phone?” “Do any of your friends send photos of themselves?” “Do you know how to save that sort of evidence?” “Would you report that at school/CEOP?” FOR OUR STAFF “Have we assessed how we as staff and our users could be vulnerable online?” “If we use Social Media do we set clear guidance on use ?” “Do we use an organisation mobile phone if working with yp ? (ie not our personal one?” “Do we know how to save evidence and intervene or reporting to CEOP?”
  • 73. CE VI Conversations about AD Reputation FOR YOUNG PEOPLE  “Remember what goes online stays online”  “When did you last check your privacy settings?”  “Can you help me check my settings”  “Are you changing your password regularly?”  “Do you know the best way to get offending material taken down?” FOR OUR STAFF  “Do we have an organisational policy on using social media with users ?”  Do we check regularly what people are saying about our service on social media ?  Do we promote ourselves positively on social media ?  Are we reaching our users through social media effectively?
  • 74. CE VI Conversations about AD Responsibility FOR YOUNG PEOPLE  “Have you come across any good social initiatives?”  “What advice do you need about using social media ?”  “I trust you to make good decisions, but I also need to learn from you.” FOR OUR STAFF    “Can we involve the YP we work with in developing our policy and practice ?” “What expectations are we making for our staff in being online so much ?” Are we pioneering new and imaginative ways of Educating and inspiring our younger users via social media ?
  • 75. WHAT IS ONE THING YOU ARE GOING TO ACT UPON ? Risk Reputation Responsibility Safety, conduct & risky behaviour Privacy, security settings and peer group Leadership, ethical code and resilience
  • 77. Useful websites 1) UK law Enforcement agency and part of VGTF www.ceop.gov.uk 2) UK Council for Child Internet Safety www.dcsf.gov.uk/ukccis/ 3) Childnet International www.childnet.com/ including Cyberbullying film 4) British Association for Adoption and Fostering www.baaf.org.uk - including advice on Facebook
  • 79. Tim Berners-Lee ‘Weaving the Web’ 1999 "The web is more a social creation than a technical one. I designed it for social effect to help people work together and not as a technical toy…. The ultimate goal of the web is to support and improve our web like existence in the world...... We have to ensure that the society we build with the web is the sort we intend.”
  • 80. THANK YOU ! Complete Evaluation forms MUNCH PING POKE! See my current work re social media and vulnerable yp on my website www.carrick-davies.com stephen@carrick-davies.com

Notas del editor

  1. Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  2. Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  3. Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  4. Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  5. Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  6. Whenever I start talking about Childnet’s work I start with this picture. They say a picture speaks a thousand words. This is Tomison Adeloye – a friend of mine. I took this picture of him to illustrate just what it is that children access when going online – The whole world – the positive as well as the potentially harmful. There’s a further point to this picture in that Tomi is deaf. As he told me when I took this photo of him – no-one knows you are deaf on the Internet ! – he uses the same method of communicating – his fingers. – Again this is a powerful reminder that Children don’t really know who they are talking to on line. <Advance> Of course with mobile technology the Internet is now not just in our hands but in our pockets ! As you are seeing in Japan, children are able to access sites such as dating agency sites from their internet enabled phones . I read last week that the National Police Agency here want to ban anyone under 18 from accessing dating sties and we are facing similar calls in the UK and I’ll say something about this later. However, before we talk about the present and the future and the challenges and opportunities I want to go back to one of the founders of the Internet – Tim Berners Lee – generally credited for inventing the WWW. In his book “weaving the web he says”
  7. "The web is more a social creation than a technical one. I designed it for social effect - to help people work together - and not as a technical toy. The ultimate goal of the web is to support and improve our weblike existence in the world...... We have to ensure that the society we build with the web is the sort we intend.” This is one of the motivations behind our work. Childnet is not first and foremost a technology charity, we don’t have too many techies on staff. We are motivated to ensure that children benefit from the net – that the future society is one in which the net is used positively to benefit children and that their rights are protected and promoted online. I am sure that many of you here today are committed to this ideal and want to ensure that our future society is shaped by positive applications of the net.