SlideShare a Scribd company logo
1 of 14
From Child Exploitation to Bubble
                  Wrapped Kids




                                       Larry Magid
                                         Co-Director
                                      ConnectSafely.org
Creative Commons images from Flickr                       Safer Internet Day
                                                          Moscow, February 2012
We’ve come a long way in some
       countries, but …

      • There is such a thing as being “too
        protective”

      • Risk is inevitable, the question is how to
        manage it

      • We need to strike a balance between
        protection and freedom

      • Teach critical thinking so that people
        learn to manage their own risks
As we think about how to protect children,
      we need to consider the rights of the child


"The child shall have the right to
freedom of expression; this right shall
include freedom to seek, receive and
impart information and ideas of all
kinds, regardless of frontiers, either
orally, in writing or in print, in the
form of art, or through any other
media of the child's choice.”

Article 13 of the U.N. Convention on the Rights of the Child
We need to understand risk,
                  not exaggerate it

•   Of course there are risks online, but
    they are not anything new or special
•   Pay attention to the research
•   Include children in the discussion
•   Understand the limits of regulation and
    the benefits of education
In the U.S., the rise of the Web has not
resulted in increased victimization of children




   Blue line represents 58% decline in child sex abuse from 1992 to
   2008.
   Source: Updated Trends in Child Maltreatment, 2008: Finkelhor, Jones and Shattuck: Crimes Against Children
   Research Center
Moving right along
The Internet Safety Technical Task Force found that:

  “Bullying and harassment, most often by peers, are
  the most salient threats that minors face, both
  online and offline.”

  Which lead to …
Cyberbullying Panic!
Cyberbullying is a problem, but most
   children are neither victims nor monsters
                   • Not every interaction that makes kids
                     uncomfortable is bullying
                   • While some are very vulnerable, most
                     children are reasonably resilient
                   • Across Europe, 6% of 9-to-16-year-old
                     Internet users have been bullied
                     online. 3% confess to having bullied
                     others
                   • Far more have been bullied offline, with
                     19% saying they have been bullied, and
                     12% saying them have bullied someone
                     else*


* EU Kids Online
Sexting Panic
A 2008 survey found that 20% of teens had sent or posted
“nude or semi-nude images of themselves”




  Which led to stories like this:
But a 2011 U.S. study found
                   •     1.3% sent an image where they
                         showed breasts, genitals or
                         someone’s bottom

                   •     2.5% sent an image where they
                         were nude or partially nude



Source: Crimes Against Children Research Center, Dec , 2011
Ultimately, the best filter runs
           between the child’s ears, not on a
                 device or a network




Protection that lasts a lifetime




                                   Training wheels for young kids
Talk with your children

• Parents should talk with their children. Ask the
  kids about what they do online, what they
  consider to be the risks and what strategies
  they’re already using
• Don’t overreact if your child tells you about
  problems online. You want them to feel
  comfortable bringing issues to your attention
Basic advice for kids & teens
Be your own person. Don't let friends or strangers pressure you to
be someone you aren't.

Be nice online. People who are nasty and aggressive online are at
greater risk of being bullied or harassed themselves.

Think about what you post. Sharing provocative photos or intimate
details online, even in private emails, can cause you problems later
on.

Passwords are private. Don't share your password even with
friends

Don't talk about sex with strangers. Don't lead them on - you don’t
want to be the target of a predator's grooming

Avoid in-person meetings. The only way someone can physically
harm you is if you're both in the same location

Be smart when using a cellphone. All the same tips apply with
phones. Be careful who you give your number to and how you use
you’re phone’s camera, location services, apps, and other features

       Adapted from ConnectSafely’s Social Web Tips for Teens
Thank you!
      Larry Magid
larry@connectsafely.org
For more see, OS3.ConnectSafely.org
        These slides are online at
       ConnectSafely.org/nobubble

More Related Content

More from ConnectSafely

Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenship
ConnectSafely
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely
 

More from ConnectSafely (13)

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook Privacy
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
App Privacy
App PrivacyApp Privacy
App Privacy
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some Context
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenship
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenship
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

From child exploitation to bubble wrapped kids

  • 1. From Child Exploitation to Bubble Wrapped Kids Larry Magid Co-Director ConnectSafely.org Creative Commons images from Flickr Safer Internet Day Moscow, February 2012
  • 2. We’ve come a long way in some countries, but … • There is such a thing as being “too protective” • Risk is inevitable, the question is how to manage it • We need to strike a balance between protection and freedom • Teach critical thinking so that people learn to manage their own risks
  • 3. As we think about how to protect children, we need to consider the rights of the child "The child shall have the right to freedom of expression; this right shall include freedom to seek, receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in writing or in print, in the form of art, or through any other media of the child's choice.” Article 13 of the U.N. Convention on the Rights of the Child
  • 4. We need to understand risk, not exaggerate it • Of course there are risks online, but they are not anything new or special • Pay attention to the research • Include children in the discussion • Understand the limits of regulation and the benefits of education
  • 5. In the U.S., the rise of the Web has not resulted in increased victimization of children Blue line represents 58% decline in child sex abuse from 1992 to 2008. Source: Updated Trends in Child Maltreatment, 2008: Finkelhor, Jones and Shattuck: Crimes Against Children Research Center
  • 6. Moving right along The Internet Safety Technical Task Force found that: “Bullying and harassment, most often by peers, are the most salient threats that minors face, both online and offline.” Which lead to …
  • 8. Cyberbullying is a problem, but most children are neither victims nor monsters • Not every interaction that makes kids uncomfortable is bullying • While some are very vulnerable, most children are reasonably resilient • Across Europe, 6% of 9-to-16-year-old Internet users have been bullied online. 3% confess to having bullied others • Far more have been bullied offline, with 19% saying they have been bullied, and 12% saying them have bullied someone else* * EU Kids Online
  • 9. Sexting Panic A 2008 survey found that 20% of teens had sent or posted “nude or semi-nude images of themselves” Which led to stories like this:
  • 10. But a 2011 U.S. study found • 1.3% sent an image where they showed breasts, genitals or someone’s bottom • 2.5% sent an image where they were nude or partially nude Source: Crimes Against Children Research Center, Dec , 2011
  • 11. Ultimately, the best filter runs between the child’s ears, not on a device or a network Protection that lasts a lifetime Training wheels for young kids
  • 12. Talk with your children • Parents should talk with their children. Ask the kids about what they do online, what they consider to be the risks and what strategies they’re already using • Don’t overreact if your child tells you about problems online. You want them to feel comfortable bringing issues to your attention
  • 13. Basic advice for kids & teens Be your own person. Don't let friends or strangers pressure you to be someone you aren't. Be nice online. People who are nasty and aggressive online are at greater risk of being bullied or harassed themselves. Think about what you post. Sharing provocative photos or intimate details online, even in private emails, can cause you problems later on. Passwords are private. Don't share your password even with friends Don't talk about sex with strangers. Don't lead them on - you don’t want to be the target of a predator's grooming Avoid in-person meetings. The only way someone can physically harm you is if you're both in the same location Be smart when using a cellphone. All the same tips apply with phones. Be careful who you give your number to and how you use you’re phone’s camera, location services, apps, and other features Adapted from ConnectSafely’s Social Web Tips for Teens
  • 14. Thank you! Larry Magid larry@connectsafely.org For more see, OS3.ConnectSafely.org These slides are online at ConnectSafely.org/nobubble

Editor's Notes

  1. Civilized countries have a long history of protecting children against exploitation and neglect but sometimes they can go too far
  2. Harvard Law Berkman force found that the #1 risk peer harassment and bullying. Law enforcement dominates the discussion
  3. THESE ARE ALL IMPORTANT BUT VERY GENERAL – CERTAINLY EACH INCIDENT IS UNIQUE AND NEEDS CARING INDIVIDUAL TREATMENT - a full, nonconfrontational, child-caregiver discussion that looks at the situation’s circumstances. The psychological damage can be considerable – some kids have suicidal thoughts.School counselor I spoke with several years ago would find out all the parties involved, get them in a room, and do bully-victim reverse role-playing (empathy training). In families and schools, some of these incidents can be turned into TEACHABLE MOMENTS (maybe anonymized?) for all parties’ benefit.