SlideShare una empresa de Scribd logo
1 de 30
  Youth Safety on the Social Web Larry Magid & Anne Collier Co-directors ConnectSafely.org Revised 1/09 © 2009 ConnectSafely.org
What  is  the social Web? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web 1.0 …
On Web 2.0...  -- Michael Kinsley, Slate.com, 11/27/06 “ ... everybody  knows you’re a dog.”
Social networking is whatever… ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Cellphones too
Majority of teens in social sites ,[object Object],[object Object],[object Object],[object Object],Source: Pew Internet & American Life survey
Not just  MySpace & Facebook YouTube, MyYearbook, Bebo, Hi5  & many  niche  social network sites Ning:  Allows users to create their own social networks, or mini-MySpaces. Allows porn (with splash page).  Twitter & Plurk:  Micro-blogging - 140 characters or less. Kind of like blended chat & IM. Twitter mostly adults, Plurk a little younger. Second Life & other virtual worlds : Users create avatars that interact in a virtual world. Hulu:  Fast-growing video-sharing site (153 million video streams, 9/08); popular for viewing whole shows online And some are a bit more questionable …. JuicyCampus  Gossip site, total anonymity, no rules.… Stickam : Social video-streaming site with live webcam chat.
What are they  doing   in there? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What  else  are they doing  in there? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The ‘ Net  effect’ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: danah boyd:  Taken out of Context, 2008
Mostly for real-life friends ,[object Object],[object Object],Source: Pew Internet & American Life survey January 2007
Teens  do  have a clue when it comes to safety & privacy ,[object Object],[object Object],[object Object],Source: Pew Internet & American Life survey January 2007
Are they careful about photos? ,[object Object],[object Object],[object Object],[object Object],[object Object],Source: Pew Internet & American Life survey January 2007
Teens are alive today, thanks to social-networking sites… Plan To 'Shoot Up' School Foiled Jan 12, 2009: “Deputies in Transylvania County said they got a call from a sheriff's office in New York. A teenager there apparently came forward and said she met a 15-year-old on MySpace who said he had a dangerous plan.”
Question : What proportion of teens have been approached online by a predator? ,[object Object],[object Object],[object Object],[object Object],[object Object]
It’s a trick question
What the surveys really said ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Online Victimization of Youth: Five Years Later Crimes Against Children Research Center, 2006
Question Do you agree that the growth in young people’s use of the Internet correlates with a rise in sexual abuse against children?
SA Sub 1990-2005* Rate per 10,000 Children (<18) Source: NCANDS / Finkelhor & Jones, 2006  51% Decline  (during the period of the Web’s existence) Answer: No Confirmed cases of child sexual abuse
Deception rarely involved ,[object Object],[object Object],[object Object],[object Object]
What causes risk? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: Archives of Pediatrics & Adolescent Medicine, Feb 2007 Ybarra, Mitchell, Finkelhor, Wolak
The kids most at risk online are those at risk offline ,[object Object],[object Object],[object Object],[object Object],Source: Internet Safety Technical Task Force Report, January 2009
More likely risks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cyberbullying ,[object Object],[object Object],[object Object],[object Object],[object Object],Sources: Patchin and Hinduja, 2006; Pew/Internet, 2007; Crimes Against Children Research Center, 2007
Signs of cyberbullying ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],* can also be a sign of an inappropriate online relationship
What to tell kids facing cyberbullying ,[object Object],[object Object],[object Object],[object Object],[object Object]
Keys to finding solutions ,[object Object],[object Object],[object Object],[object Object]
To summarize ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank you & please visit our forum at www.ConnectSafely.org ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...
 
Social networks for parents
Social networks for parentsSocial networks for parents
Social networks for parents
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Teen Content Creators
Teen Content CreatorsTeen Content Creators
Teen Content Creators
 
Teens and social media
Teens and social mediaTeens and social media
Teens and social media
 
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakRaising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
 
Teens and Social Media: An Overview
Teens and Social Media: An OverviewTeens and Social Media: An Overview
Teens and Social Media: An Overview
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?
 
Impact of social media on teenagers
Impact of social media on  teenagersImpact of social media on  teenagers
Impact of social media on teenagers
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009
 
Cyberbullying emtech
Cyberbullying   emtechCyberbullying   emtech
Cyberbullying emtech
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Raising Children in a Digital Age (Evening Session)
Raising Children in a Digital Age (Evening Session)Raising Children in a Digital Age (Evening Session)
Raising Children in a Digital Age (Evening Session)
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 

Similar a Netsafetyoct30 Sound

Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
Ray Brannon
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
alanrgibson41217
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
jpl17
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010
paul
 
Social Media and its effects on youth
Social Media and its effects on youthSocial Media and its effects on youth
Social Media and its effects on youth
Abhishek Jain
 

Similar a Netsafetyoct30 Sound (20)

Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected Consequences
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Week 5
Week 5Week 5
Week 5
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Tech Savvy Parenting
Tech Savvy ParentingTech Savvy Parenting
Tech Savvy Parenting
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital Citizens
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and Cyberbullying
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010
 
Coping with the many faces of facebook
Coping with the many faces of facebookCoping with the many faces of facebook
Coping with the many faces of facebook
 
Social Media and its effects on youth
Social Media and its effects on youthSocial Media and its effects on youth
Social Media and its effects on youth
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Netsafetyoct30 Sound

  • 1. Youth Safety on the Social Web Larry Magid & Anne Collier Co-directors ConnectSafely.org Revised 1/09 © 2009 ConnectSafely.org
  • 2.
  • 4. On Web 2.0... -- Michael Kinsley, Slate.com, 11/27/06 “ ... everybody knows you’re a dog.”
  • 5.
  • 6.
  • 7.
  • 8. Not just MySpace & Facebook YouTube, MyYearbook, Bebo, Hi5 & many niche social network sites Ning: Allows users to create their own social networks, or mini-MySpaces. Allows porn (with splash page). Twitter & Plurk: Micro-blogging - 140 characters or less. Kind of like blended chat & IM. Twitter mostly adults, Plurk a little younger. Second Life & other virtual worlds : Users create avatars that interact in a virtual world. Hulu: Fast-growing video-sharing site (153 million video streams, 9/08); popular for viewing whole shows online And some are a bit more questionable …. JuicyCampus Gossip site, total anonymity, no rules.… Stickam : Social video-streaming site with live webcam chat.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Teens are alive today, thanks to social-networking sites… Plan To 'Shoot Up' School Foiled Jan 12, 2009: “Deputies in Transylvania County said they got a call from a sheriff's office in New York. A teenager there apparently came forward and said she met a 15-year-old on MySpace who said he had a dangerous plan.”
  • 16.
  • 17. It’s a trick question
  • 18.
  • 19. Question Do you agree that the growth in young people’s use of the Internet correlates with a rise in sexual abuse against children?
  • 20. SA Sub 1990-2005* Rate per 10,000 Children (<18) Source: NCANDS / Finkelhor & Jones, 2006 51% Decline (during the period of the Web’s existence) Answer: No Confirmed cases of child sexual abuse
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.