SlideShare una empresa de Scribd logo
1 de 89
SAFEGUARDING CHILDREN ONLINE




    Training session written and presented by
           Stephen Carrick-Davies for
Welcome and housekeeping
Session lasts 3 hours 10-1.00
Comfort break at 11.15 – 11.30
Chance for questions and feedback at 12.20
Not a forum for disclosures
Evaluation forms
Fire alarm arrangements
Context
Falls within the overall context of our diocesan and
parish safeguarding policies Contact Jill Sandham
for overview of these safeguarding policies.

Relates to:
   – how we include people – which involves how we
     communicate
   – how we treat each other with respect – which includes
     respecting people’s privacy
   – how we protect people from harm and abuse – especially
     children, but also those who carry responsibility for
     vulnerable people
Context
 • This is a positive look at how technology can
   enhance our work, particularly with children
   and young people
 • Towards responsible leadership
 • These are procedures in the making – today’s
   sessions will inform development of diocesan
   procedures, as well as enabling you in parishes
   to work out your own.
 • An awareness of the hazards
Introductions
           Stephen Carrick-Davies
          • Ten years at Childnet International
          • Now an Independent Trainer/ Social
            Entrepreneur /Parent/Learner .....
What are your expectations and training needs ?
Find people in this room who can answer yes to these statements.
     If someone says no move on and speak to a different person !
   I have a Facebook                   I use Farmville on my                I don’t have a Facebook
   Account with over 250               Facebook page.                       account and don’t
   Friends.                                                                 particularly want one.

   Name ............................. Name ............................. Name.............................
                                                                         .
   I use my SMART phone                I use SMART phone just            I don’t have a SMART
   for e-mail.                         for Text messages.                phone and don’t want
                                                                         one !
   Name ............................. Name.............................. Name.............................
                                                                         .
   My children know more               My pet knows more                    I know more about the
   than me about the                   than me about the                    internet than my
   Internet. this course
   I came on                           internet!
                                       I came because my                    children. this course
                                                                            I came on
   Name.............................
   because I feel like I’m             Name..............................
                                       manager thought it                   Name.............................
                                                                            because I’m concerned
   being left behind.                  would help me !                      .
                                                                            about children’s welfare

   Name............................
                       Name ............................. Name.............................
                                                          .
When you have written one person’s name in each box shout “BINGO!”
Structure and aims of training
Part I “Understanding” the new Reality
         Overview of ‘Social Media’ and web 2.0                 REFLECT &
         How technology is changing, and being changed            THINK
         Focus on Facebook (privacy settings)

Part II Understanding the Risks
         Overview of online risks for young people               FACE- UP
         Specific challenges for faith based groups                & BE
         Where we are vulnerable                               CHALLENGED

Part III Understanding our Responsibilities
         Prevention & Response strategies
         Case study to help us to see responses
         ‘PIE’ approaches and positive opportunities for       INSPIRED &
          faith-based groups learning and change.               EQUIPPED


All through a mixture of slides, quotes, case studies, films,
small group exercises, Q&A, and links to practical resources.
GROUP EXERCISE
A little about you

Name ..........................
Responsibility within your church ?


 Any incidents of internet misuse in your
 group/wider community ?

Expectation of today’s training ?
How confident are you online ?

On a scale of 1- 10 rank yourself as to how confident
you are using the internet and mobile phones.

  1 ----------------------5----------------------10
“What’s a mouse?”                                                   “I taught
                                                                Mark Zuckerberg
                                                                 all he knows”




                    How many of you have a facebook account ?
“We have created a child
   who will be so exposed to
   the media that he will be
   lost to his parents by the
   time he is 12.”
                                          David Bowie interview with
                                          Melody Maker January 1972


                                  “There are only two states for
                                  children these days; they are
                                  either asleep or online....even if
                                  they wake up in the middle of
Eric Schmidt Executive Chairman   the night they go online.”
of Google. 2010
PART 1

Understanding the new reality




                           Photo S C-D
real
         The child’s online world
                          ANONYMITY
  ALWAYS ON                                      ACCESS THE
                                                   WORLD
                “If you took away
ADDICTIVE (?)   my mobile phone                  ACTIVE NOT
                you would take                    PASSIVE
                away a part of me”               MEDIUM


   AWAY FROM             ACCEPTANCE -        AMPLIFIER
  SUPERVISION             IDENTITY &       (gives children
                           STATUS              a voice)
What is this real world like for vulnerable YP ?

“I have over 120 people on my BBM but I deleted
like 30 on Saturday cause I was angry and they
pissed me off so I just deleted them. Since I’ve had
my BlackBerry only 2 people have deleted me.”
                        Student from Pupil Referral Unit



                                                                   Play film




                                   Film at www.carrick-davies.com/research/films
GROUP EXERCISE
Turn to your neighbour

What was the greatest fear
for the yp in the film ?



How did it had got out of control ?

What would you do next if you were
in that position ?
Social media landscape
“Youth is a wonderful thing.
                 What a crime to waste it on
                 children”.
                              George Bernard Shaw




                BUT...
                The fastest growing segment in
                Facebook is older women !




Check out this video overview at
http://www.youtube.com/watch?v=x0EnhXn5boM
NOW YOU EVEN HAVE A DIFFERENT PHONE
LANGUAGE !

•    POS      Parent over shoulder
•    I8u      I hate you
•    AATK     Always at the keyboard
•    LOL      Laugh out loud



    My Xmas hols wr CWOT. B4 we used 2go2 NY
    2C my bro, his GF & 3 kids ;) FTF. ILNY it’s a gr8
    plc.
“Anything that gets
invented after you’re thirty
is against the natural order
of things and the beginning
of the end of civilisation as
we know it ….until it’s been
around for about ten years
when it gradually turns out
to be alright really.”

                                 Douglas Adams
                                        See full quote at
      http://www.douglasadams.com/dna/19990901-00-a.html
What terms do we use to explain this space ?
Cyberspace ?




“This is just the beginning, the beginning of understanding that cyberspace has
no limits, no boundaries.” Nicholas Negroponte Founder of Massachusetts Institute of Technology's Media Lab,
What terms do we use to explain this space ?
 Superhighway ?




“The idea that we are still travelling on a ‘superhighway’ towards the future in
the same bus and in the same direction, is naive. If you are a child you’re likely to
be travelling alone, on a side street and probably without a crash helmet.” S C-D
What terms do we use to explain this space ?
Virtual World




“Most people are awaiting Virtual Reality; I'm awaiting virtuous reality”.
Eli Khamarov
What terms do we use to explain this space ?
The favourite member of the family ?




 “Television: chewing gum for the eyes”. Frank Lloyd Wright
What terms do we use to explain this space ?




                                                                          My World




                                                                        My library
“Calling it ‘mine’ makes the vastness more intimate, the anonymity less threatening and
the chaos more orderly. But you can still feel lonely in a crowd”. S C-D
What terms do we use to explain this space ?
               An incubator ?

                  FORWARDED
                 COMMENTED ON
UPLOADED                            AMPLIFIED

                   COPIED
                   STORED

                  MORPHED/
                  CHANGED
MUNCHED                            RE- BROADCAST
 (captured)
What terms do we use to explain this space ?
                           An incubator ?
                                                             FORWARDED
                                                             COMMENTED ON
                                   COPIED                    MORPHED/
                                   STORED                    CHANGED
                                                             RE-HATCHED


“The new social web has changed the platform to that of an incubator; it is a
place where communication is captured, aggregated, added to, morphed,
changed and rehatched as a new broadcast or ping.
Those with the skill and confidence to narrate their lives online, manage their
reputation, mitigate the risks and build up resilience, may well be able to
survive and thrive. Those who have few supportive adults, low levels of
literacy and are unsupervised and vulnerable to abuse, are far less confident
and hence more at risk.” Stephen Carrick-Davies The Guardian newspaper July 2011
APPLICATIONS           PHOTOS/TAGS
    NEWS FEEDS                                      Comment and
    “boast by post”       Huge range of apps
                                                   Tag photos face
                                                     recognition
Events/ Groups
                                                     TIME LINE

   FRIENDS
 Find, link, be in                                   LIVE CHAT
constant contact                                    Superseding IM
+ on your mobile
                                                      VIDEO
                                                    link and embed
MESSAGES
Superseding E-mail         WHO’S ONLINE           Social location
                        Know who is online now!

             ALL FOR FREE …… BUT ….WHAT PRICE IS FREE ?
The importance of privacy settings
31% of 12-15 year olds don’t use privacy settings on their
social networking profiles – Ofcom Medial literacy Report 2009
The old view showed it clearer
                            Name, profile picture, gender and membership of
                            networks is always PUBLIC




 And customise further       This information you can control
RSS – seeing what others are doing ...




And what are people saying about you on their pages?
Digital Footprints
       • What goes online stays online




                           What will your future
                            employer think ?
Q Can Facebook be used for good ?


• Oscar Morales 33 yr old engineer started a
  Facebook group called ‘One Million
  voices’ against the FARC terrorist
  organisation in Columbia
• Over 250,000 Facebook users signed on,
  and the movement was taken up by
  newspapers and radio and TV with two
  million people taking part in pprotests in
  Colombia and 100 other cities worldwide.

  S
What would
Gandhi have
done if he had a
FACEBOOK
account ?
PART II

Understanding the risks
                (not the same thing as harm!)
Classifying the risks to children online
                       Commercial         Aggressive          Sexual                     Values

CONTENT                Adverts            Violent and      Pornographic                Bias
Child as Recipient     Spam               hateful          unwelcome                   Racist
                       Sponsorship        content          sexual content              Misleading
                       Personal info                                                   info or advice

CONTACT                                                     Meeting                     Self harm
                       Tracking           Being bullied
Child as Participant   Harvesting         harassed or       strangers                   Unwelcome
                       Personal info      stalked           Being                       persuasions
                                                            groomed

CONDUCT
                       Illegal            Bullying or       Creating and               Providing
Child as Actor
                       downloading        harassing         uploading                  misleading
                       Hacking Gambling   another           inappropriate              info/advice
                       Financial scams                      material
                       Terrorism

 CRIMINAL                BEING IN THE WRONG PLACE AT THE WRONG TIME
                                                          Original 3 Cs Classification by ‘EU Kids’ online project
Classifying the risks to children online
                       Commercial       Aggressive       Sexual                      Values

CONTENT
Child as Recipient




CONTACT
Child as Participant




CONDUCT                Online/offline
Child as Actor         migration with
                       reputational
                       consequences


 CRIMINAL                BEING IN THE WRONG PLACE AT THE WRONG TIME
                                                     Original 3 Cs Classification by ‘EU Kids’ online project
“Sexting” = teens sharing nude photos via mobiles and web. The practice can
have serious legal and psychological consequences

                        Commercial              Aggressive     Sexual         Values

 CONTENT                                                     Pornographic
 Child as Recipient      Online grooming is a                unwelcome
                         criminal offence                    sexual content
                                                                                Include
                         Contact                                                this
 CONTACT                 www.ceop.gov.uk                                        button on
                                                             Meeting            your
 Child as Participant    if you have concerns                strangers          home
                         about inappropriate                 Being
                                                                                page
                         communication from an               groomed
                         adult to a minor.
 CONDUCT
                                                             Creating and
 Child as Actor         “One-third of those who              uploading
                        sexually abuse children are          inappropriate
                        just children themselves.”           material
                        BBC Newsnight programme March 2010


                        21,630 BEBO members have the name “Porn Star”
Remember most child abuse takes place in inter-familiar settings.
Film



                                              Play film




Film conceived and acted by yp from Croydon
Classifying the risks to children online
                       Commercial   Aggressive                  Sexual                    Values

CONTENT                             Violent and
Child as Recipient                  hateful
                                    content


                                                                          22% of yp aged 11-
CONTACT                                                                   18 report having
                                    Being bullied
Child as Participant                harassed or                           been cyber bullied.
                                    stalked
                                                                           It ruins lives.
                                                                          YP may not disclose
CONDUCT                                                                   that it is happening
Child as Actor                      Bullying or
                                    harassing
                                    another



                                    Classification by ‘EU Kids’ online project and referenced in the Byron Report
Words can hurt ...




From Canadian Ad Council at
http://www.youtube.com/watch?v=bdQBurXQOeQ
DEFINITIONS OF CYBERBULLYING
“The use of ICT, particularly mobile phones & internet,
deliberately to upset someone else”

FORMS IT CAN TAKE                           Face talk – feature in new
                                                             Iphone 4
  Threats and intimidation
  Harassment or stalking
  Vilification/defamation/ hate or bias-bullying
  Exclusion (MSN)
  Identity theft, unauthorized access and impersonation (MSN)
  Publicly posting, sending or forwarding personal or private
   information or images
  Manipulation of images - see example
Why YP may be scared of reporting abuse ?
• “It was nobody else’s business”
• “Didn’t think it was serious or wrong”
• “Didn’t want parents/friends to find out”
• “Was frightened”
• “Didn’t think I would be believed”
• “Had been threatened by the abuser”
                                      Source: Child Maltreatment in the UK Cawson 2000


 Abuse on the internet/mobile phone

            • “My parents don’t get the internet”
            • “Maybe it was my fault ! (blur)”
            • “Scared if computer is confiscated”

            • “Don’t know who to report to ?
How is Cyberbullying different from offline bullying?

  OFFLINE                              ONLINE


Home was sanctuary              Can be 24/7
Often Physical                  Usually words/pictures
Bully strong/victim weak       Roles can change

Local & intimate                Mass audience

See the impact                  Don’t see impact
                                (lack of empathy)
Bystanders intervene            Bystanders take part
Often Silent                    It can leave a trail !
WAYS IN WHICH
THE INTERNET
 CAN AMPLIFY
VULNERABILITY




                  10 WAYS IN
                  WHICH THE
                INTERNET CAN
                   AMPLIFY
                    OFFLINE
                VULNERABILITY
‘Vulnerable’              This is complex because:

All children are different so there are         Vulnerability is not static - All
dangers in making broad statements.             children can be vulnerable at
                                                different stages
Many children are neglected which is
harder to spot yet makes them                   The categorisations of risk offline
vulnerable                                      do not necessarily mirror online
The paradox that over-       What about         experience (eg a disabled yp
protected children can be     vulnerable        may be empowered online as the
more vulnerable online.        adults ?         internet can be ‘leveller’

The more a child uses the internet the more they can become confident and
possibly complacent and feel ‘invincible’ and don’t feel they are at risk .

Those who have experienced offline risk and        Constantly changing
abuse may be more resilient and able to            technologies. Eg, Location services
protect themselves online or may not be            HOWEVER WE CAN IDENTIFY
affected so much by the risks they encounter.      A FEW COMMON FEATURES....
Low self-
                                          Fluid learning
                    confidence.
                                        environment and
                  Identity seen to
                                        gaps in education
                      be part of
                                         and induction
                     ‘outsiders’


                                                              Experience
  Lack of                                                       abusive
 supportive                                                 relationships or
adults in their                                              environments
    lives                                                   including anger
                             MUNCH
                             POKE
     More
unsupervised
                              PING!                       Influences of
                                                       alcohol, drugs and
  time, fewer                                          gang culture. Risk
structures and                                         takers and at risk
 boundaries




                      See www.carrick-davies.com
“Many of the young people I work with are massive risk takers,
impulsive to the extreme and often use alcohol and/or drugs. On
average they first engage in sexual activity at a far younger age than
other students. They also have huge amounts of unsupervised time on
their hands, often till very late at night. I teach many YP who are half-
asleep as they have been online till gone 3am.”
 PRU staff member from ‘MPP’ report
                                 LE                   L
                                                   RO
                            RAB               ON
                                                 T
                     VULNE               IN C
                                       S
                  AS              SA
             HEM           E LVE
         EET            MS
      YS            THE “I have over 120 people on my BBM but I
   MA           SEE
WE         MA
              Y             deleted like 30 on Saturday cause I was
         Y
   T THE                      angry and they pissed me off so I just
 BU                     deleted them. Since I’ve had my BlackBerry
                               only 2 people have deleted me.”
                                               PRU student from ‘MPP’ report
WAYS IN WHICH
 THE INTERNET
  CAN AMPLIFY
 VULNERABILITY
                      Unmediated Contact




                                                    Guardian Newspaper article 19 June 2010

Children who have been fostered can suddenly receive messages from siblings, birth
parents, or those who want to trace them for potentially harmful reasons.
WAYS IN WHICH
  THE INTERNET
   CAN AMPLIFY
  VULNERABILITY
                     Social Location




Young People who may need to escape from an abusive relationships need to think
carefully about how they make their ‘places’ public.
WAYS IN WHICH
   THE INTERNET
    CAN AMPLIFY
   VULNERABILITY
                       Exclusion from the ‘norm’




                                                           Eg Facebook Timeline
There are lots of online services which celebrate our ‘journey’. How do children who
don’t know their birth parents, may not have an early photo of themselves feel in these
‘boast by post’ environments ?
WAYS IN WHICH
   THE INTERNET
    CAN AMPLIFY
   VULNERABILITY
                         Blackmailing “gifting” &
                             grooming by peers




A young person from a disadvantaged background may be targeted with ‘gifts’ of
mobile phones, mobile payment cards etc, by older young people but in exchange for
‘favours’ which they ‘cash in’ later (including prostitution, trafficking or illegal
activity). If it sounds to good to be true .... it’s probably is (they want something ! )
Search ‘NSPCC survey on teen partner violence’ for more info
“Any A/C holders looking
 WAYS IN WHICH                                               to make a quick grand get
 THE INTERNET
                                                             at me. No time wasters.”
  CAN AMPLIFY
 VULNERABILITY        Earlier adopters ?                    Message on BBM about
                                                             bank scams (fraud!)




                                                                   Screen Munch !




Many vulnerable young people can be early adopters of tools and services which are
not yet regulated or in the public conscious. For example BBM
How will QR codes be mis-used ?
WAYS IN WHICH
   THE INTERNET
    CAN AMPLIFY
   VULNERABILITY
                       Being ‘nudged’ into gangs




Vulnerable young people who are risk takers,
impulsive or under the influence of alcohol and/or
drugs and less supervised, can be more easily          ALL CHILDREN WILL
drawn into illegal activity including being ‘nudged’   LEAVE A FOOTPRINT
through technology.
                                                       EXCEPT SOME WILL BE
                                                       IN MUDDIER SAND!
WAYS IN WHICH
THE INTERNET
 CAN AMPLIFY
VULNERABILITY
                 Negative digital footprint




                            ALL CHILDREN WILL LEAVE A
                            DIGITAL FOOTPRINT
                            BUT SOME WILL BE MUDDIER
                            THAN OTHERS
                            Those who are supported can compensate
                            and build positive online footprint but
                            what about those who aren’t ?
WAYS IN WHICH
THE INTERNET
 CAN AMPLIFY
VULNERABILITY    Low Resilience

                                    “When my pinger’s gone
                                    to sleep that’s when I’ll
                                    go to sleep.”




Young people need to be cherished, have the right amount of
sleep and healthy food. What happens when you are running on
empty ?
•WAYS IN WHICH
  THE INTERNET
  CAN AMPLIFY
  VULNERABILITY
                     Special needs & learning difficulties

                                                                    Attachment
                                                                        Theory




                                                                    Attachment

Some children with emotional or behavioural difficulties, attachment
difficulties, and other complex needs, may be particularly vulnerable online.
EG those with Autistim Spectrum Disorder may make literal interpretations
of content, which will affect how they respond.
Others with complex needs may not understand the concept of friendship,
and therefore trust everyone implicitly. Some children with SEN or
disabilities may not recognise that they are being bullied or appreciate how
their own online behaviour may be seen by someone else as bullying .
•WAYS IN WHICH
                     Low levels of Language & Literacy
  THE INTERNET
  CAN AMPLIFY
  VULNERABILITY




Lack of literacy skills, can mean
that messages are unclear,
ambiguous or misunderstood


We must not assume that all YP are confident “digital natives” and we must also
recognise that one in six people in the UK struggle with literacy (below the level
expected of an eleven year old). Hence being able to complete a ‘REPORT ABUSE’
form or read instructions about safety, privacy and ‘terms and conditions’ are real
barriers for many young people.
Do YP recognise the link between reading and being able to be safe ?
GROUP EXERCISE

 Training Scenario
Facebook:
Friend or Fiend ?

In pairs read
through the scenario

(see handout)
Let’s have a coffee break
              15 mins.
Talk to someone about what you’ve heard so far !
GROUP EXERCISE

FEEDBACK
Is this a serious
situation?
What went wrong ?
How can we safeguard
against this situation ?
How can FB be used more
safely ?
What have you learnt ?
PART III
UNDESTANDING
OUR
RESPONSIBILITIES
Government Strategic Framework
Every Child Matters                           *

              be healthy
              stay safe
              enjoy and achieve
              make a positive contribution
              achieve economic well-being

                                              ESPECIALY ONLINE
                                              More telephones than people
                                              Age of ownership decreasing
                                              Children vulnerable in new ways
                                              Schools encouraging digital learning
                                              Parents & carers time-poor
* http://www.dcsf.gov.uk/everychildmatters/
From ‘Risk vs Opportunity’ to drawing on the wider framework of
the UN Rights of the Child – 3 Ps




                              FROM TIM DAVIES’ Rethinking Responses to Young People and the Internet
                              Beyond Opportunity and Risk - EU Kids Online II - September 2011
What does Leadership look like in this space?

•Professional/Personal


               •Principle centred AND people centred




• Personal integrity
Pause for thought.

And now, dear brothers and sisters, one final
thing. Fix your thoughts on what is true, and
honourable, and right, and pure, and lovely,
and admirable. Think about things that are
excellent and worthy of praise. Philippians 4:8
Leadership – how can you lead with SM ?
                       Wikis to work on joint policy


                               MANAGING
                                  UP

Brilliant for
managing        MANAGING        MANAGING                MANAGING      RSS –
volunteers       OTHERS         YOURSELF                CHANGE &     keeping
                                                         CRISIS    ontop of the
                                                                    changes +
                                                                   influencing

                                MANAGING
                             STAKEHOLDER
                                      S
                       Increasingly donors are giving
                         via social media – eg just
                                    giving
What do Faith Groups want to do?
Communicate (with parishioners and wider world)
Challenge (individual, opinion formers and public)
Champion (beliefs and values)
Community (build, enhance, transform)
Change (facilitate and provide vision)
Co-operate + collaborate (with others- hopefully!)
Customer service (provide real genuine trust)
What can social networks do + ?
Communicate              Quick, personal, immediate

Challenge                Aggregate the public voice

Champion                 Build a movement   (not campaign




Community                Inspire + build community

Change                   “Wisdom of the crowds”

Co-operate + collaborate Efficient + global
Customer service         Hold providers to account


Collaborate + co-create Share best practice
Choose your tool
Top tips to help
1. Start scheduling this activity into your work.
2. Learn all you can and reflect on how these
   tools can help you with your work.
3. Find just 3 or 4 resources which you can use and
   sign up to learn and contribute. Slideshare, bookmarking
4. Subscribe to a few blogs and try to use RSS to
   aggregate the content you want and need.
5. Start narrating your lives and experience –
   blog or micro blog (140 characters)
6. Get mobile ! It will save you time and keep you
   engaged.
PIE                            Policies
                  E-safety policy, Acceptable Use Policy,
                            Mobile use policy




Infrastructure                                         Education
                                                Opportunities for church groups
Managed learning environment                    to engage in education &
with high quality access and                    prevention programmes which
equipment which is filtered,                    are targeted at young users,
                                                parents or the wider library
monitored and supervised.                       community.
What CHURCHES must do


   PREVENTING                                          RESPONDING

 Understanding and accepting the       Supporting the victim – need for
  impact of cyberbullying.               reassurance.
 Updating existing policies and        Practical advice and support such as
                                         saving evidence, not retaliating,
  practices. (AUP)
                                         informing parents.
 Making reporting easier - includes    Investigate and record incidents,
  advice about removal of content.       identify the bully.
 Promoting the positive use of         Sanctions (if explicit in AUP)
  technology.                           Involve Parents /carers
 Evaluating impact of prevention       Training your parishioners
  activities.
 Reaching out to your parents

      Underpinned by effective education and awareness
Church safeguarding

AUP Policies                         policies should be explicit
                                     about use of social
                                     media/mobile technology.

                                     Church safeguarding
• All staff understand (induction)   policies should include
                                     how the organisation is
• All staff enforce                  inducting and supporting
• All staff review regularly         youth workers in all areas
                                     of their work
and                                  Who to report to ?

•Is updated in pace with changes
PROTECTING YOURSELF
1. Update your AUPs stating how and when personally owned
   equipment (including camera phones) can be used.
2. If you have a social network site do not ‘friend’ young church
   users or add them to your contact list.
3. Make sure you keep ALL personal information (profiles,
   passwords, photos. Etc) private and do not post information
   about yourself publically that you wouldn’t want employers, or
   colleagues to see.
4. Close down computers quickly if you have to leave a room.
5. If misuse - make sure you do not retaliate but keep all records,
   screen prints and record time, date & website addresses
6. Make sure the church workers inform parents about incidents
   and delivers appropriate sanctions
7. Hold each other accountable !
• Searching for yourself – example
Infrastructure
• Recognise the impact of mobile
  phones to access internet.
• Ofsted reflection for schools
  about ‘Lock down’ vs ‘trusting’
• Should your church have it’s own
  staff mobile phone for youth to
  use ?
Education                           For Young people
                             • Always respect others be careful
• Finding creative ways to     what you say.
 educate users about         • Think before you send, what goes
                               online stays online !
 safety and responsibility   • Treat your password like your
                               toothbrush !
                             • Learn how to block the bully and
                               save the evidence
                             • Make sure you tell someone
                             • Support others – how would you
                               feel if no-one stood up for you !
The 3 Rs of digital literacy

                      Risk




    Resilience                 Reputation
Did we do what we said we would ?

In pairs discuss                     REFLECT &
                                       THINK


What has been the most helpful
aspect of this training?              FACE- UP
                                        & BE
                                    CHALLENGED
What is the one thing you will do
as a result of this training ?
                                    INSPIRED &
                                    EQUIPPED
Developing policy
AREA OF     IMPORTANCE OF THE                     POSITIVE ACTION
CONCERN     SAFEGUARDING ISSUE                    AND POLICY
                                                  IMPLICATION
           While the issues which are
            discussed in this guidance may         Use the resources
AN          be challenging to those who are         listed in section III
ABSENCE     not confident in using new              of this guidance to
OF          social media and mobile                 gain a better
KNOWLED     platforms and services, it is vital     understanding of
GE IS NOT   to remember that, an absence            the technology.
                                                   Find someone to
AN          of knowledge is not an excuse
                                                    help you set up a
EXCUSE      for an absence of responsibility        social networking
FOR AN      and care to those who we are            page or download
ABSENCE     responsible for.                        an app on your
OF                                                  phone to see how
            If as part of the work or               new services work.
RESPONSI    services of the church you             Talk to other
BILITY      are providing internet                  churches about
AND CARE.   access (such as in a youth              how they are
            club for example) or are                developing their
                                                    policies.
            have a website, a Facebook             Attend one of
            Group page or have                      Southwark
            accepted ‘Friend’ requests              Dioceses Social
            on Facebook or other                    media and
            service or given a minor                safeguarding
                                                    training courses.
            your mobile phone number,              Agree a timetable
            than you must have a                    for the drafting of
            written policy in place and             your policy
            must ensure that those in
            your church understand this
            policy.
• Questions about anything which has come up
  today ?
EVALUATION FORMS




Think how can we improve and
develop this course and
roll-out across the diocese ?
Useful websites
          1) UK law Enforcement agency and part of VGTF
          www.ceop.gov.uk



          2) UK Council for Child Internet Safety
          www.dcsf.gov.uk/ukccis/


          3) Childnet International
          www.childnet.com/ including Cyberbullying film
And Finally….
THANK YOU !       Complete Evaluation
                  forms

                                                      MUNCH
                                                       PING
                                                      POKE!
                  See my current work re
                  social media and
                  vulnerable yp


 www.carrick-davies.com                    stephen@carrick-davies.com
Credits and sources
I am happy for this presentation to be circulated across Faith
Groups as a pdf document but please don’t distribute further or
use for wider training or commercial purposes without contacting
me as it is important to respect the copyright of images and text
used in this presentation.
Available on SLIDE SHARE (Search for Stephen Carrick-Davies)
Photos content used from other sources is credited below.


Slide 10, Photo by Stephen Carrick-Davies
Slide 11 from slide share photo Fred Cavazza/flickr.com http://www.flickr.com/photos/fredcavazza/
Slide 12 from Is social media a fad?’ http://www.youtube.com/watch?v=45izI2jw0zA
Slide 14 photo library slide, quote from Douglas Adams see http://www.goodreads.com/author/quotes/4.Douglas_Adams
Slide 17 – from Social Text
Slide 19 – Facebook screen grab from old SC-D Facebook page Slide 20 Dali Lama screen grab from Facebook user sharing
Slide 28 – Photo of typewriter by SC-D from Imperial War Museum exhibition. Quote re Gandhi use of Facebook SC-D
Slide 29 from EU kids online project http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/Home.aspx
Slide 30 – pictures from Google images of London Riots Aug 2011
Slide 35 Screen grab from Canadian Ad Council at http://www.youtube.com/watch?v=bdQBurXQOeQ
Slide 40 – Photo of Guardian Newspaper article 19 June 2010
Slide 44 – unknown – sorry !
Slide 49 - from Tim Davies seehttp://www.timdavies.org.uk/2011/09/24/the-risk-opportunity-discourse-is-broken-rethinking-responses/
Slide 61 cartoon drawn by Jim Byrne and for Childnet International www.childnet.com/kia Childnet international
This slide image from www.flickr.com/photos/55279617@Noo/124659356 from http://www.slideshare.net/jisc_bce/ncl-bceweb2?
src=related_normal&rel=2745614
Slide 68 – Photo by Stephen C-D.
If I’ve missed anyone else out so sorry !

Más contenido relacionado

La actualidad más candente

Surviving and Thriving in Deeply Weird World
Surviving and Thriving in Deeply Weird WorldSurviving and Thriving in Deeply Weird World
Surviving and Thriving in Deeply Weird WorldPeter Bromberg
 
Personalized Learning IAGC 2016
Personalized Learning IAGC 2016Personalized Learning IAGC 2016
Personalized Learning IAGC 2016Brian Housand
 
Networking, Networking, Networking
Networking, Networking, NetworkingNetworking, Networking, Networking
Networking, Networking, Networkingbizgrownet
 
When Data Gets Up Close and Personal
When Data Gets Up Close and PersonalWhen Data Gets Up Close and Personal
When Data Gets Up Close and PersonalStephen Anderson
 
Cultivating Curiosity
Cultivating Curiosity Cultivating Curiosity
Cultivating Curiosity Brian Housand
 
Gavin Bell Toc09 Long Tail Needs Community Sm
Gavin Bell Toc09 Long Tail Needs Community SmGavin Bell Toc09 Long Tail Needs Community Sm
Gavin Bell Toc09 Long Tail Needs Community SmGavin Bell
 

La actualidad más candente (7)

Surviving and Thriving in Deeply Weird World
Surviving and Thriving in Deeply Weird WorldSurviving and Thriving in Deeply Weird World
Surviving and Thriving in Deeply Weird World
 
Personalized Learning IAGC 2016
Personalized Learning IAGC 2016Personalized Learning IAGC 2016
Personalized Learning IAGC 2016
 
Networking, Networking, Networking
Networking, Networking, NetworkingNetworking, Networking, Networking
Networking, Networking, Networking
 
When Data Gets Up Close and Personal
When Data Gets Up Close and PersonalWhen Data Gets Up Close and Personal
When Data Gets Up Close and Personal
 
Cultivating Curiosity
Cultivating Curiosity Cultivating Curiosity
Cultivating Curiosity
 
Parenting the Digital Generation
Parenting the Digital GenerationParenting the Digital Generation
Parenting the Digital Generation
 
Gavin Bell Toc09 Long Tail Needs Community Sm
Gavin Bell Toc09 Long Tail Needs Community SmGavin Bell Toc09 Long Tail Needs Community Sm
Gavin Bell Toc09 Long Tail Needs Community Sm
 

Similar a Safeguarding children online training from steve c-d for southwark diocese- autumn 2012

E safety training for staff who work with children and young people - Stephe...
E  safety training for staff who work with children and young people - Stephe...E  safety training for staff who work with children and young people - Stephe...
E safety training for staff who work with children and young people - Stephe...Stevecd
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013Stevecd
 
E safety training for lewisham arts and education network by stephen carrick...
E  safety training for lewisham arts and education network by stephen carrick...E  safety training for lewisham arts and education network by stephen carrick...
E safety training for lewisham arts and education network by stephen carrick...Stephen Carrick-Davies
 
Essay Marks Css 2014. Online assignment writing service.
Essay Marks Css 2014. Online assignment writing service.Essay Marks Css 2014. Online assignment writing service.
Essay Marks Css 2014. Online assignment writing service.Yolanda Allrich
 
E safety training for lewisham arts and education network (advance) by steph...
E  safety training for lewisham arts and education network (advance) by steph...E  safety training for lewisham arts and education network (advance) by steph...
E safety training for lewisham arts and education network (advance) by steph...Stephen Carrick-Davies
 
Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)Stephen Carrick-Davies
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009bermandry
 
Reaching net-generation learners with social technologies
Reaching net-generation learners with social technologiesReaching net-generation learners with social technologies
Reaching net-generation learners with social technologiesguestba21f9
 
Reaching Net Generation Learners with social technologies - CDIO 2008
Reaching Net Generation Learners with social technologies - CDIO 2008Reaching Net Generation Learners with social technologies - CDIO 2008
Reaching Net Generation Learners with social technologies - CDIO 2008Maarten Cannaerts
 
Future Kids Future Customers v2
Future Kids Future Customers v2Future Kids Future Customers v2
Future Kids Future Customers v2Andy Hadfield
 
Young Leaders Social Media Cafe Cairo Nov 2010
Young Leaders Social Media Cafe Cairo Nov 2010Young Leaders Social Media Cafe Cairo Nov 2010
Young Leaders Social Media Cafe Cairo Nov 2010Joakim Jardenberg
 
MicroLearning 2007
MicroLearning 2007MicroLearning 2007
MicroLearning 2007David Smith
 
The Bullying Psyche
The Bullying Psyche The Bullying Psyche
The Bullying Psyche ClaraMaynard
 
Future Kids. Future Customers.
Future Kids. Future Customers.Future Kids. Future Customers.
Future Kids. Future Customers.Andy Hadfield
 
RSA-KMLF Presentation for Gurteen Knowledge Cafe
RSA-KMLF Presentation for Gurteen Knowledge CafeRSA-KMLF Presentation for Gurteen Knowledge Cafe
RSA-KMLF Presentation for Gurteen Knowledge CafeGeoff Brown
 
Playing safe
Playing safePlaying safe
Playing safehutchison
 
Developing Digital Citizens
Developing Digital CitizensDeveloping Digital Citizens
Developing Digital CitizensAlec Couros
 
E safety training for southwark staff - stephen carrick-davies january 2013
E  safety training for southwark staff - stephen carrick-davies january 2013E  safety training for southwark staff - stephen carrick-davies january 2013
E safety training for southwark staff - stephen carrick-davies january 2013Stephen Carrick-Davies
 
Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012Stephen Carrick-Davies
 

Similar a Safeguarding children online training from steve c-d for southwark diocese- autumn 2012 (20)

E safety training for staff who work with children and young people - Stephe...
E  safety training for staff who work with children and young people - Stephe...E  safety training for staff who work with children and young people - Stephe...
E safety training for staff who work with children and young people - Stephe...
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013
 
E safety training for lewisham arts and education network by stephen carrick...
E  safety training for lewisham arts and education network by stephen carrick...E  safety training for lewisham arts and education network by stephen carrick...
E safety training for lewisham arts and education network by stephen carrick...
 
Essay Marks Css 2014. Online assignment writing service.
Essay Marks Css 2014. Online assignment writing service.Essay Marks Css 2014. Online assignment writing service.
Essay Marks Css 2014. Online assignment writing service.
 
E safety training for lewisham arts and education network (advance) by steph...
E  safety training for lewisham arts and education network (advance) by steph...E  safety training for lewisham arts and education network (advance) by steph...
E safety training for lewisham arts and education network (advance) by steph...
 
Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009
 
Reaching net-generation learners with social technologies
Reaching net-generation learners with social technologiesReaching net-generation learners with social technologies
Reaching net-generation learners with social technologies
 
Reaching Net Generation Learners with social technologies - CDIO 2008
Reaching Net Generation Learners with social technologies - CDIO 2008Reaching Net Generation Learners with social technologies - CDIO 2008
Reaching Net Generation Learners with social technologies - CDIO 2008
 
Future Kids Future Customers v2
Future Kids Future Customers v2Future Kids Future Customers v2
Future Kids Future Customers v2
 
Young Leaders Social Media Cafe Cairo Nov 2010
Young Leaders Social Media Cafe Cairo Nov 2010Young Leaders Social Media Cafe Cairo Nov 2010
Young Leaders Social Media Cafe Cairo Nov 2010
 
MicroLearning 2007
MicroLearning 2007MicroLearning 2007
MicroLearning 2007
 
The Bullying Psyche
The Bullying Psyche The Bullying Psyche
The Bullying Psyche
 
Future Kids. Future Customers.
Future Kids. Future Customers.Future Kids. Future Customers.
Future Kids. Future Customers.
 
RSA-KMLF Presentation for Gurteen Knowledge Cafe
RSA-KMLF Presentation for Gurteen Knowledge CafeRSA-KMLF Presentation for Gurteen Knowledge Cafe
RSA-KMLF Presentation for Gurteen Knowledge Cafe
 
Playing safe
Playing safePlaying safe
Playing safe
 
Developing Digital Citizens
Developing Digital CitizensDeveloping Digital Citizens
Developing Digital Citizens
 
Sime 100% (en)
Sime 100% (en)Sime 100% (en)
Sime 100% (en)
 
E safety training for southwark staff - stephen carrick-davies january 2013
E  safety training for southwark staff - stephen carrick-davies january 2013E  safety training for southwark staff - stephen carrick-davies january 2013
E safety training for southwark staff - stephen carrick-davies january 2013
 
Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012
 

Más de Stephen Carrick-Davies

Fostering in a digial age training for foster carers - june 2016
Fostering in a digial age    training for foster carers  - june 2016Fostering in a digial age    training for foster carers  - june 2016
Fostering in a digial age training for foster carers - june 2016Stephen Carrick-Davies
 
Principles of effective activity based participative learning. - updated. pptx
Principles of effective activity based participative learning. - updated. pptxPrinciples of effective activity based participative learning. - updated. pptx
Principles of effective activity based participative learning. - updated. pptxStephen Carrick-Davies
 
An introduction to Social Entrepreneurship workshop presented by Stephen Ca...
An introduction to Social Entrepreneurship   workshop presented by Stephen Ca...An introduction to Social Entrepreneurship   workshop presented by Stephen Ca...
An introduction to Social Entrepreneurship workshop presented by Stephen Ca...Stephen Carrick-Davies
 
Speaking and Listening Teacher's powerpoint
Speaking and Listening Teacher's powerpoint Speaking and Listening Teacher's powerpoint
Speaking and Listening Teacher's powerpoint Stephen Carrick-Davies
 
FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint
FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint
FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint Stephen Carrick-Davies
 
Presentation on understanding and preventing bullying by stephen carrick davi...
Presentation on understanding and preventing bullying by stephen carrick davi...Presentation on understanding and preventing bullying by stephen carrick davi...
Presentation on understanding and preventing bullying by stephen carrick davi...Stephen Carrick-Davies
 
Munch, poke, ping! understanding the language of safety and responsibility
Munch, poke, ping! understanding the language of safety and responsibilityMunch, poke, ping! understanding the language of safety and responsibility
Munch, poke, ping! understanding the language of safety and responsibilityStephen Carrick-Davies
 
Screenless presentation for secondary schools
Screenless presentation   for secondary schoolsScreenless presentation   for secondary schools
Screenless presentation for secondary schoolsStephen Carrick-Davies
 
Screenless presentation for primary schools
Screenless presentation   for primary schoolsScreenless presentation   for primary schools
Screenless presentation for primary schoolsStephen Carrick-Davies
 
E safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-daviesE safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-daviesStephen Carrick-Davies
 
Munch Poke Ping Conference ~powerpoint combined presentations. pptx
Munch Poke Ping Conference ~powerpoint combined presentations. pptxMunch Poke Ping Conference ~powerpoint combined presentations. pptx
Munch Poke Ping Conference ~powerpoint combined presentations. pptxStephen Carrick-Davies
 

Más de Stephen Carrick-Davies (15)

Fostering in a digial age training for foster carers - june 2016
Fostering in a digial age    training for foster carers  - june 2016Fostering in a digial age    training for foster carers  - june 2016
Fostering in a digial age training for foster carers - june 2016
 
Principles of effective activity based participative learning. - updated. pptx
Principles of effective activity based participative learning. - updated. pptxPrinciples of effective activity based participative learning. - updated. pptx
Principles of effective activity based participative learning. - updated. pptx
 
An introduction to Social Entrepreneurship workshop presented by Stephen Ca...
An introduction to Social Entrepreneurship   workshop presented by Stephen Ca...An introduction to Social Entrepreneurship   workshop presented by Stephen Ca...
An introduction to Social Entrepreneurship workshop presented by Stephen Ca...
 
Speaking and Listening Teacher's powerpoint
Speaking and Listening Teacher's powerpoint Speaking and Listening Teacher's powerpoint
Speaking and Listening Teacher's powerpoint
 
Problem Solving Teacher's Powerpoint
Problem Solving   Teacher's Powerpoint Problem Solving   Teacher's Powerpoint
Problem Solving Teacher's Powerpoint
 
FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint
FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint
FACEWORK - Enterprise and Customer Service - Teacher's Powerpoint
 
Team working powerpoint
Team working powerpointTeam working powerpoint
Team working powerpoint
 
Self management teacher's powerpoint
Self management   teacher's powerpointSelf management   teacher's powerpoint
Self management teacher's powerpoint
 
Presentation on understanding and preventing bullying by stephen carrick davi...
Presentation on understanding and preventing bullying by stephen carrick davi...Presentation on understanding and preventing bullying by stephen carrick davi...
Presentation on understanding and preventing bullying by stephen carrick davi...
 
Munch, poke, ping! understanding the language of safety and responsibility
Munch, poke, ping! understanding the language of safety and responsibilityMunch, poke, ping! understanding the language of safety and responsibility
Munch, poke, ping! understanding the language of safety and responsibility
 
Screenless presentation for secondary schools
Screenless presentation   for secondary schoolsScreenless presentation   for secondary schools
Screenless presentation for secondary schools
 
Screenless presentation for primary schools
Screenless presentation   for primary schoolsScreenless presentation   for primary schools
Screenless presentation for primary schools
 
E safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-daviesE safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-davies
 
Munch Poke Ping Conference ~powerpoint combined presentations. pptx
Munch Poke Ping Conference ~powerpoint combined presentations. pptxMunch Poke Ping Conference ~powerpoint combined presentations. pptx
Munch Poke Ping Conference ~powerpoint combined presentations. pptx
 
Mpp conference powerpoint
Mpp conference powerpointMpp conference powerpoint
Mpp conference powerpoint
 

Último

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 

Último (20)

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 

Safeguarding children online training from steve c-d for southwark diocese- autumn 2012

  • 1. SAFEGUARDING CHILDREN ONLINE Training session written and presented by Stephen Carrick-Davies for
  • 2. Welcome and housekeeping Session lasts 3 hours 10-1.00 Comfort break at 11.15 – 11.30 Chance for questions and feedback at 12.20 Not a forum for disclosures Evaluation forms Fire alarm arrangements
  • 3. Context Falls within the overall context of our diocesan and parish safeguarding policies Contact Jill Sandham for overview of these safeguarding policies. Relates to: – how we include people – which involves how we communicate – how we treat each other with respect – which includes respecting people’s privacy – how we protect people from harm and abuse – especially children, but also those who carry responsibility for vulnerable people
  • 4. Context • This is a positive look at how technology can enhance our work, particularly with children and young people • Towards responsible leadership • These are procedures in the making – today’s sessions will inform development of diocesan procedures, as well as enabling you in parishes to work out your own. • An awareness of the hazards
  • 5. Introductions Stephen Carrick-Davies • Ten years at Childnet International • Now an Independent Trainer/ Social Entrepreneur /Parent/Learner .....
  • 6. What are your expectations and training needs ?
  • 7. Find people in this room who can answer yes to these statements. If someone says no move on and speak to a different person ! I have a Facebook I use Farmville on my I don’t have a Facebook Account with over 250 Facebook page. account and don’t Friends. particularly want one. Name ............................. Name ............................. Name............................. . I use my SMART phone I use SMART phone just I don’t have a SMART for e-mail. for Text messages. phone and don’t want one ! Name ............................. Name.............................. Name............................. . My children know more My pet knows more I know more about the than me about the than me about the internet than my Internet. this course I came on internet! I came because my children. this course I came on Name............................. because I feel like I’m Name.............................. manager thought it Name............................. because I’m concerned being left behind. would help me ! . about children’s welfare Name............................ Name ............................. Name............................. . When you have written one person’s name in each box shout “BINGO!”
  • 8. Structure and aims of training Part I “Understanding” the new Reality  Overview of ‘Social Media’ and web 2.0 REFLECT &  How technology is changing, and being changed THINK  Focus on Facebook (privacy settings) Part II Understanding the Risks  Overview of online risks for young people FACE- UP  Specific challenges for faith based groups & BE  Where we are vulnerable CHALLENGED Part III Understanding our Responsibilities  Prevention & Response strategies  Case study to help us to see responses  ‘PIE’ approaches and positive opportunities for INSPIRED & faith-based groups learning and change. EQUIPPED All through a mixture of slides, quotes, case studies, films, small group exercises, Q&A, and links to practical resources.
  • 9. GROUP EXERCISE A little about you Name .......................... Responsibility within your church ? Any incidents of internet misuse in your group/wider community ? Expectation of today’s training ?
  • 10. How confident are you online ? On a scale of 1- 10 rank yourself as to how confident you are using the internet and mobile phones. 1 ----------------------5----------------------10 “What’s a mouse?” “I taught Mark Zuckerberg all he knows” How many of you have a facebook account ?
  • 11. “We have created a child who will be so exposed to the media that he will be lost to his parents by the time he is 12.” David Bowie interview with Melody Maker January 1972 “There are only two states for children these days; they are either asleep or online....even if they wake up in the middle of Eric Schmidt Executive Chairman the night they go online.” of Google. 2010
  • 12. PART 1 Understanding the new reality Photo S C-D
  • 13. real The child’s online world ANONYMITY ALWAYS ON ACCESS THE WORLD “If you took away ADDICTIVE (?) my mobile phone ACTIVE NOT you would take PASSIVE away a part of me” MEDIUM AWAY FROM ACCEPTANCE - AMPLIFIER SUPERVISION IDENTITY & (gives children STATUS a voice)
  • 14. What is this real world like for vulnerable YP ? “I have over 120 people on my BBM but I deleted like 30 on Saturday cause I was angry and they pissed me off so I just deleted them. Since I’ve had my BlackBerry only 2 people have deleted me.” Student from Pupil Referral Unit Play film Film at www.carrick-davies.com/research/films
  • 15. GROUP EXERCISE Turn to your neighbour What was the greatest fear for the yp in the film ? How did it had got out of control ? What would you do next if you were in that position ?
  • 17. “Youth is a wonderful thing. What a crime to waste it on children”. George Bernard Shaw BUT... The fastest growing segment in Facebook is older women ! Check out this video overview at http://www.youtube.com/watch?v=x0EnhXn5boM
  • 18. NOW YOU EVEN HAVE A DIFFERENT PHONE LANGUAGE ! • POS Parent over shoulder • I8u I hate you • AATK Always at the keyboard • LOL Laugh out loud My Xmas hols wr CWOT. B4 we used 2go2 NY 2C my bro, his GF & 3 kids ;) FTF. ILNY it’s a gr8 plc.
  • 19. “Anything that gets invented after you’re thirty is against the natural order of things and the beginning of the end of civilisation as we know it ….until it’s been around for about ten years when it gradually turns out to be alright really.” Douglas Adams See full quote at http://www.douglasadams.com/dna/19990901-00-a.html
  • 20. What terms do we use to explain this space ? Cyberspace ? “This is just the beginning, the beginning of understanding that cyberspace has no limits, no boundaries.” Nicholas Negroponte Founder of Massachusetts Institute of Technology's Media Lab,
  • 21. What terms do we use to explain this space ? Superhighway ? “The idea that we are still travelling on a ‘superhighway’ towards the future in the same bus and in the same direction, is naive. If you are a child you’re likely to be travelling alone, on a side street and probably without a crash helmet.” S C-D
  • 22. What terms do we use to explain this space ? Virtual World “Most people are awaiting Virtual Reality; I'm awaiting virtuous reality”. Eli Khamarov
  • 23. What terms do we use to explain this space ? The favourite member of the family ? “Television: chewing gum for the eyes”. Frank Lloyd Wright
  • 24. What terms do we use to explain this space ? My World My library “Calling it ‘mine’ makes the vastness more intimate, the anonymity less threatening and the chaos more orderly. But you can still feel lonely in a crowd”. S C-D
  • 25. What terms do we use to explain this space ? An incubator ? FORWARDED COMMENTED ON UPLOADED AMPLIFIED COPIED STORED MORPHED/ CHANGED MUNCHED RE- BROADCAST (captured)
  • 26. What terms do we use to explain this space ? An incubator ? FORWARDED COMMENTED ON COPIED MORPHED/ STORED CHANGED RE-HATCHED “The new social web has changed the platform to that of an incubator; it is a place where communication is captured, aggregated, added to, morphed, changed and rehatched as a new broadcast or ping. Those with the skill and confidence to narrate their lives online, manage their reputation, mitigate the risks and build up resilience, may well be able to survive and thrive. Those who have few supportive adults, low levels of literacy and are unsupervised and vulnerable to abuse, are far less confident and hence more at risk.” Stephen Carrick-Davies The Guardian newspaper July 2011
  • 27. APPLICATIONS PHOTOS/TAGS NEWS FEEDS Comment and “boast by post” Huge range of apps Tag photos face recognition Events/ Groups TIME LINE FRIENDS Find, link, be in LIVE CHAT constant contact Superseding IM + on your mobile VIDEO link and embed MESSAGES Superseding E-mail WHO’S ONLINE Social location Know who is online now! ALL FOR FREE …… BUT ….WHAT PRICE IS FREE ?
  • 28. The importance of privacy settings 31% of 12-15 year olds don’t use privacy settings on their social networking profiles – Ofcom Medial literacy Report 2009
  • 29.
  • 30. The old view showed it clearer Name, profile picture, gender and membership of networks is always PUBLIC And customise further This information you can control
  • 31.
  • 32. RSS – seeing what others are doing ... And what are people saying about you on their pages?
  • 33. Digital Footprints • What goes online stays online What will your future employer think ?
  • 34. Q Can Facebook be used for good ? • Oscar Morales 33 yr old engineer started a Facebook group called ‘One Million voices’ against the FARC terrorist organisation in Columbia • Over 250,000 Facebook users signed on, and the movement was taken up by newspapers and radio and TV with two million people taking part in pprotests in Colombia and 100 other cities worldwide. S
  • 35. What would Gandhi have done if he had a FACEBOOK account ?
  • 36. PART II Understanding the risks (not the same thing as harm!)
  • 37. Classifying the risks to children online Commercial Aggressive Sexual Values CONTENT Adverts Violent and Pornographic Bias Child as Recipient Spam hateful unwelcome Racist Sponsorship content sexual content Misleading Personal info info or advice CONTACT Meeting Self harm Tracking Being bullied Child as Participant Harvesting harassed or strangers Unwelcome Personal info stalked Being persuasions groomed CONDUCT Illegal Bullying or Creating and Providing Child as Actor downloading harassing uploading misleading Hacking Gambling another inappropriate info/advice Financial scams material Terrorism CRIMINAL BEING IN THE WRONG PLACE AT THE WRONG TIME Original 3 Cs Classification by ‘EU Kids’ online project
  • 38. Classifying the risks to children online Commercial Aggressive Sexual Values CONTENT Child as Recipient CONTACT Child as Participant CONDUCT Online/offline Child as Actor migration with reputational consequences CRIMINAL BEING IN THE WRONG PLACE AT THE WRONG TIME Original 3 Cs Classification by ‘EU Kids’ online project
  • 39. “Sexting” = teens sharing nude photos via mobiles and web. The practice can have serious legal and psychological consequences Commercial Aggressive Sexual Values CONTENT Pornographic Child as Recipient Online grooming is a unwelcome criminal offence sexual content Include Contact this CONTACT www.ceop.gov.uk button on Meeting your Child as Participant if you have concerns strangers home about inappropriate Being page communication from an groomed adult to a minor. CONDUCT Creating and Child as Actor “One-third of those who uploading sexually abuse children are inappropriate just children themselves.” material BBC Newsnight programme March 2010 21,630 BEBO members have the name “Porn Star”
  • 40. Remember most child abuse takes place in inter-familiar settings.
  • 41. Film Play film Film conceived and acted by yp from Croydon
  • 42. Classifying the risks to children online Commercial Aggressive Sexual Values CONTENT Violent and Child as Recipient hateful content 22% of yp aged 11- CONTACT 18 report having Being bullied Child as Participant harassed or been cyber bullied. stalked It ruins lives. YP may not disclose CONDUCT that it is happening Child as Actor Bullying or harassing another Classification by ‘EU Kids’ online project and referenced in the Byron Report
  • 43. Words can hurt ... From Canadian Ad Council at http://www.youtube.com/watch?v=bdQBurXQOeQ
  • 44. DEFINITIONS OF CYBERBULLYING “The use of ICT, particularly mobile phones & internet, deliberately to upset someone else” FORMS IT CAN TAKE Face talk – feature in new Iphone 4  Threats and intimidation  Harassment or stalking  Vilification/defamation/ hate or bias-bullying  Exclusion (MSN)  Identity theft, unauthorized access and impersonation (MSN)  Publicly posting, sending or forwarding personal or private information or images  Manipulation of images - see example
  • 45. Why YP may be scared of reporting abuse ? • “It was nobody else’s business” • “Didn’t think it was serious or wrong” • “Didn’t want parents/friends to find out” • “Was frightened” • “Didn’t think I would be believed” • “Had been threatened by the abuser” Source: Child Maltreatment in the UK Cawson 2000 Abuse on the internet/mobile phone • “My parents don’t get the internet” • “Maybe it was my fault ! (blur)” • “Scared if computer is confiscated” • “Don’t know who to report to ?
  • 46. How is Cyberbullying different from offline bullying? OFFLINE ONLINE Home was sanctuary Can be 24/7 Often Physical Usually words/pictures Bully strong/victim weak Roles can change Local & intimate Mass audience See the impact Don’t see impact (lack of empathy) Bystanders intervene Bystanders take part Often Silent It can leave a trail !
  • 47. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY 10 WAYS IN WHICH THE INTERNET CAN AMPLIFY OFFLINE VULNERABILITY
  • 48. ‘Vulnerable’ This is complex because: All children are different so there are Vulnerability is not static - All dangers in making broad statements. children can be vulnerable at different stages Many children are neglected which is harder to spot yet makes them The categorisations of risk offline vulnerable do not necessarily mirror online The paradox that over- What about experience (eg a disabled yp protected children can be vulnerable may be empowered online as the more vulnerable online. adults ? internet can be ‘leveller’ The more a child uses the internet the more they can become confident and possibly complacent and feel ‘invincible’ and don’t feel they are at risk . Those who have experienced offline risk and Constantly changing abuse may be more resilient and able to technologies. Eg, Location services protect themselves online or may not be HOWEVER WE CAN IDENTIFY affected so much by the risks they encounter. A FEW COMMON FEATURES....
  • 49. Low self- Fluid learning confidence. environment and Identity seen to gaps in education be part of and induction ‘outsiders’ Experience Lack of abusive supportive relationships or adults in their environments lives including anger MUNCH POKE More unsupervised PING! Influences of alcohol, drugs and time, fewer gang culture. Risk structures and takers and at risk boundaries See www.carrick-davies.com
  • 50. “Many of the young people I work with are massive risk takers, impulsive to the extreme and often use alcohol and/or drugs. On average they first engage in sexual activity at a far younger age than other students. They also have huge amounts of unsupervised time on their hands, often till very late at night. I teach many YP who are half- asleep as they have been online till gone 3am.” PRU staff member from ‘MPP’ report LE L RO RAB ON T VULNE IN C S AS SA HEM E LVE EET MS YS THE “I have over 120 people on my BBM but I MA SEE WE MA Y deleted like 30 on Saturday cause I was Y T THE angry and they pissed me off so I just BU deleted them. Since I’ve had my BlackBerry only 2 people have deleted me.” PRU student from ‘MPP’ report
  • 51. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Unmediated Contact Guardian Newspaper article 19 June 2010 Children who have been fostered can suddenly receive messages from siblings, birth parents, or those who want to trace them for potentially harmful reasons.
  • 52. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Social Location Young People who may need to escape from an abusive relationships need to think carefully about how they make their ‘places’ public.
  • 53. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Exclusion from the ‘norm’ Eg Facebook Timeline There are lots of online services which celebrate our ‘journey’. How do children who don’t know their birth parents, may not have an early photo of themselves feel in these ‘boast by post’ environments ?
  • 54. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Blackmailing “gifting” & grooming by peers A young person from a disadvantaged background may be targeted with ‘gifts’ of mobile phones, mobile payment cards etc, by older young people but in exchange for ‘favours’ which they ‘cash in’ later (including prostitution, trafficking or illegal activity). If it sounds to good to be true .... it’s probably is (they want something ! ) Search ‘NSPCC survey on teen partner violence’ for more info
  • 55. “Any A/C holders looking WAYS IN WHICH to make a quick grand get THE INTERNET at me. No time wasters.” CAN AMPLIFY VULNERABILITY  Earlier adopters ? Message on BBM about bank scams (fraud!) Screen Munch ! Many vulnerable young people can be early adopters of tools and services which are not yet regulated or in the public conscious. For example BBM How will QR codes be mis-used ?
  • 56. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Being ‘nudged’ into gangs Vulnerable young people who are risk takers, impulsive or under the influence of alcohol and/or drugs and less supervised, can be more easily ALL CHILDREN WILL drawn into illegal activity including being ‘nudged’ LEAVE A FOOTPRINT through technology. EXCEPT SOME WILL BE IN MUDDIER SAND!
  • 57. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Negative digital footprint ALL CHILDREN WILL LEAVE A DIGITAL FOOTPRINT BUT SOME WILL BE MUDDIER THAN OTHERS Those who are supported can compensate and build positive online footprint but what about those who aren’t ?
  • 58. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Low Resilience “When my pinger’s gone to sleep that’s when I’ll go to sleep.” Young people need to be cherished, have the right amount of sleep and healthy food. What happens when you are running on empty ?
  • 59. •WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Special needs & learning difficulties Attachment Theory Attachment Some children with emotional or behavioural difficulties, attachment difficulties, and other complex needs, may be particularly vulnerable online. EG those with Autistim Spectrum Disorder may make literal interpretations of content, which will affect how they respond. Others with complex needs may not understand the concept of friendship, and therefore trust everyone implicitly. Some children with SEN or disabilities may not recognise that they are being bullied or appreciate how their own online behaviour may be seen by someone else as bullying .
  • 60. •WAYS IN WHICH  Low levels of Language & Literacy THE INTERNET CAN AMPLIFY VULNERABILITY Lack of literacy skills, can mean that messages are unclear, ambiguous or misunderstood We must not assume that all YP are confident “digital natives” and we must also recognise that one in six people in the UK struggle with literacy (below the level expected of an eleven year old). Hence being able to complete a ‘REPORT ABUSE’ form or read instructions about safety, privacy and ‘terms and conditions’ are real barriers for many young people. Do YP recognise the link between reading and being able to be safe ?
  • 61. GROUP EXERCISE Training Scenario Facebook: Friend or Fiend ? In pairs read through the scenario (see handout)
  • 62. Let’s have a coffee break 15 mins. Talk to someone about what you’ve heard so far !
  • 63. GROUP EXERCISE FEEDBACK Is this a serious situation? What went wrong ? How can we safeguard against this situation ? How can FB be used more safely ? What have you learnt ?
  • 65. Government Strategic Framework Every Child Matters * be healthy stay safe enjoy and achieve make a positive contribution achieve economic well-being ESPECIALY ONLINE More telephones than people Age of ownership decreasing Children vulnerable in new ways Schools encouraging digital learning Parents & carers time-poor * http://www.dcsf.gov.uk/everychildmatters/
  • 66. From ‘Risk vs Opportunity’ to drawing on the wider framework of the UN Rights of the Child – 3 Ps FROM TIM DAVIES’ Rethinking Responses to Young People and the Internet Beyond Opportunity and Risk - EU Kids Online II - September 2011
  • 67. What does Leadership look like in this space? •Professional/Personal •Principle centred AND people centred • Personal integrity
  • 68. Pause for thought. And now, dear brothers and sisters, one final thing. Fix your thoughts on what is true, and honourable, and right, and pure, and lovely, and admirable. Think about things that are excellent and worthy of praise. Philippians 4:8
  • 69. Leadership – how can you lead with SM ? Wikis to work on joint policy MANAGING UP Brilliant for managing MANAGING MANAGING MANAGING RSS – volunteers OTHERS YOURSELF CHANGE & keeping CRISIS ontop of the changes + influencing MANAGING STAKEHOLDER S Increasingly donors are giving via social media – eg just giving
  • 70. What do Faith Groups want to do? Communicate (with parishioners and wider world) Challenge (individual, opinion formers and public) Champion (beliefs and values) Community (build, enhance, transform) Change (facilitate and provide vision) Co-operate + collaborate (with others- hopefully!) Customer service (provide real genuine trust)
  • 71. What can social networks do + ? Communicate Quick, personal, immediate Challenge Aggregate the public voice Champion Build a movement (not campaign Community Inspire + build community Change “Wisdom of the crowds” Co-operate + collaborate Efficient + global Customer service Hold providers to account Collaborate + co-create Share best practice
  • 73. Top tips to help 1. Start scheduling this activity into your work. 2. Learn all you can and reflect on how these tools can help you with your work. 3. Find just 3 or 4 resources which you can use and sign up to learn and contribute. Slideshare, bookmarking 4. Subscribe to a few blogs and try to use RSS to aggregate the content you want and need. 5. Start narrating your lives and experience – blog or micro blog (140 characters) 6. Get mobile ! It will save you time and keep you engaged.
  • 74. PIE Policies E-safety policy, Acceptable Use Policy, Mobile use policy Infrastructure Education Opportunities for church groups Managed learning environment to engage in education & with high quality access and prevention programmes which equipment which is filtered, are targeted at young users, parents or the wider library monitored and supervised. community.
  • 75. What CHURCHES must do PREVENTING RESPONDING  Understanding and accepting the  Supporting the victim – need for impact of cyberbullying. reassurance.  Updating existing policies and  Practical advice and support such as saving evidence, not retaliating, practices. (AUP) informing parents.  Making reporting easier - includes  Investigate and record incidents, advice about removal of content. identify the bully.  Promoting the positive use of  Sanctions (if explicit in AUP) technology.  Involve Parents /carers  Evaluating impact of prevention  Training your parishioners activities.  Reaching out to your parents Underpinned by effective education and awareness
  • 76. Church safeguarding AUP Policies policies should be explicit about use of social media/mobile technology. Church safeguarding • All staff understand (induction) policies should include how the organisation is • All staff enforce inducting and supporting • All staff review regularly youth workers in all areas of their work and Who to report to ? •Is updated in pace with changes
  • 77. PROTECTING YOURSELF 1. Update your AUPs stating how and when personally owned equipment (including camera phones) can be used. 2. If you have a social network site do not ‘friend’ young church users or add them to your contact list. 3. Make sure you keep ALL personal information (profiles, passwords, photos. Etc) private and do not post information about yourself publically that you wouldn’t want employers, or colleagues to see. 4. Close down computers quickly if you have to leave a room. 5. If misuse - make sure you do not retaliate but keep all records, screen prints and record time, date & website addresses 6. Make sure the church workers inform parents about incidents and delivers appropriate sanctions 7. Hold each other accountable !
  • 78. • Searching for yourself – example
  • 79. Infrastructure • Recognise the impact of mobile phones to access internet. • Ofsted reflection for schools about ‘Lock down’ vs ‘trusting’ • Should your church have it’s own staff mobile phone for youth to use ?
  • 80. Education For Young people • Always respect others be careful • Finding creative ways to what you say. educate users about • Think before you send, what goes online stays online ! safety and responsibility • Treat your password like your toothbrush ! • Learn how to block the bully and save the evidence • Make sure you tell someone • Support others – how would you feel if no-one stood up for you !
  • 81. The 3 Rs of digital literacy Risk Resilience Reputation
  • 82. Did we do what we said we would ? In pairs discuss REFLECT & THINK What has been the most helpful aspect of this training? FACE- UP & BE CHALLENGED What is the one thing you will do as a result of this training ? INSPIRED & EQUIPPED
  • 83. Developing policy AREA OF IMPORTANCE OF THE POSITIVE ACTION CONCERN SAFEGUARDING ISSUE AND POLICY IMPLICATION  While the issues which are discussed in this guidance may  Use the resources AN be challenging to those who are listed in section III ABSENCE not confident in using new of this guidance to OF social media and mobile gain a better KNOWLED platforms and services, it is vital understanding of GE IS NOT to remember that, an absence the technology.  Find someone to AN of knowledge is not an excuse help you set up a EXCUSE for an absence of responsibility social networking FOR AN and care to those who we are page or download ABSENCE responsible for. an app on your OF phone to see how If as part of the work or new services work. RESPONSI services of the church you  Talk to other BILITY are providing internet churches about AND CARE. access (such as in a youth how they are club for example) or are developing their policies. have a website, a Facebook  Attend one of Group page or have Southwark accepted ‘Friend’ requests Dioceses Social on Facebook or other media and service or given a minor safeguarding training courses. your mobile phone number,  Agree a timetable than you must have a for the drafting of written policy in place and your policy must ensure that those in your church understand this policy.
  • 84. • Questions about anything which has come up today ?
  • 85. EVALUATION FORMS Think how can we improve and develop this course and roll-out across the diocese ?
  • 86. Useful websites 1) UK law Enforcement agency and part of VGTF www.ceop.gov.uk 2) UK Council for Child Internet Safety www.dcsf.gov.uk/ukccis/ 3) Childnet International www.childnet.com/ including Cyberbullying film
  • 88. THANK YOU ! Complete Evaluation forms MUNCH PING POKE! See my current work re social media and vulnerable yp www.carrick-davies.com stephen@carrick-davies.com
  • 89. Credits and sources I am happy for this presentation to be circulated across Faith Groups as a pdf document but please don’t distribute further or use for wider training or commercial purposes without contacting me as it is important to respect the copyright of images and text used in this presentation. Available on SLIDE SHARE (Search for Stephen Carrick-Davies) Photos content used from other sources is credited below. Slide 10, Photo by Stephen Carrick-Davies Slide 11 from slide share photo Fred Cavazza/flickr.com http://www.flickr.com/photos/fredcavazza/ Slide 12 from Is social media a fad?’ http://www.youtube.com/watch?v=45izI2jw0zA Slide 14 photo library slide, quote from Douglas Adams see http://www.goodreads.com/author/quotes/4.Douglas_Adams Slide 17 – from Social Text Slide 19 – Facebook screen grab from old SC-D Facebook page Slide 20 Dali Lama screen grab from Facebook user sharing Slide 28 – Photo of typewriter by SC-D from Imperial War Museum exhibition. Quote re Gandhi use of Facebook SC-D Slide 29 from EU kids online project http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/Home.aspx Slide 30 – pictures from Google images of London Riots Aug 2011 Slide 35 Screen grab from Canadian Ad Council at http://www.youtube.com/watch?v=bdQBurXQOeQ Slide 40 – Photo of Guardian Newspaper article 19 June 2010 Slide 44 – unknown – sorry ! Slide 49 - from Tim Davies seehttp://www.timdavies.org.uk/2011/09/24/the-risk-opportunity-discourse-is-broken-rethinking-responses/ Slide 61 cartoon drawn by Jim Byrne and for Childnet International www.childnet.com/kia Childnet international This slide image from www.flickr.com/photos/55279617@Noo/124659356 from http://www.slideshare.net/jisc_bce/ncl-bceweb2? src=related_normal&rel=2745614 Slide 68 – Photo by Stephen C-D. If I’ve missed anyone else out so sorry !

Notas del editor

  1. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  2. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  3. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  4. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  5. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  6. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  7. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  8. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies A nice way of describing the new environment (I’m sure we’ve missed something else out here – but this helps to illustrate some of the changes. – The “Corporate” is not really the right word but for YP it felt that Webvs 1 was much like the other media “power” – big companies just moving into the digital space. – eg Disney, Microsoft, even Amizon and Google are now big corporates. – the new Web2 is more personal – user generated content.
  9. The technology itself it neutral (advance) This poster which is currently displayed in the London underground reminds us that people have often misused communication technology for years.
  10. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  11. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  12. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  13. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  14. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  15. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  16. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies A nice way of describing the new environment (I’m sure we’ve missed something else out here – but this helps to illustrate some of the changes. – The “Corporate” is not really the right word but for YP it felt that Webvs 1 was much like the other media “power” – big companies just moving into the digital space. – eg Disney, Microsoft, even Amizon and Google are now big corporates. – the new Web2 is more personal – user generated content.
  17. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  18. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  19. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  20. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  21. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Whenever I start talking about Childnet’s work I start with this picture. They say a picture speaks a thousand words. This is Tomison Adeloye – a friend of mine. I took this picture of him to illustrate just what it is that children access when going online – The whole world – the positive as well as the potentially harmful. There’s a further point to this picture in that Tomi is deaf. As he told me when I took this photo of him – no-one knows you are deaf on the Internet ! – he uses the same method of communicating – his fingers. – Again this is a powerful reminder that Children don’t really know who they are talking to on line. <Advance> Of course with mobile technology the Internet is now not just in our hands but in our pockets ! As you are seeing in Japan, children are able to access sites such as dating agency sites from their internet enabled phones . I read last week that the National Police Agency here want to ban anyone under 18 from accessing dating sties and we are facing similar calls in the UK and I’ll say something about this later. However, before we talk about the present and the future and the challenges and opportunities I want to go back to one of the founders of the Internet – Tim Berners Lee – generally credited for inventing the WWW. In his book “weaving the web he says”
  22. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies