SlideShare a Scribd company logo
1 of 56
Download to read offline
Online Safety 3.0 Empowering  and  Protecting Youth Anne Collier Executive Director, Net Family News, Inc. Co-director ConnectSafely.org
Net safety as we know it is  obsolete ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web 1.0…
On Web 2.0...  --Michael Kinsley, Slate.com, 11/27/06 “ ... everybody  knows you’re a dog.”
A  triple  media revolution  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Students’  perspective ‘ Joe’s Non-Netbook’ Science Leadership Academy Philadelphia
A living  Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What we now know from...
What are they  doing   in there? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What  else  are they doing  in there? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Largely a positive experience ,[object Object],[object Object],[object Object],[object Object],[object Object]
The under-age question ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: Pew Internet & American Life;  Consumer Reports
2 types of social networking ,[object Object],[object Object],Source: Digital Youth Project, November 2008 ...on all devices, fixed and mobile:
Social networking’ s progression ,[object Object],[object Object],[object Object]
Interest-driven communities ,[object Object],[object Object],Source: Digital Youth Project, November 2008
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mobile  social tools
Teens prefer texting ,[object Object],[object Object],[object Object],[object Object],[object Object]
In other words... © 2010 Columbus Dispatch
Videogames huge too ,[object Object]
What we now know ,[object Object],[object Object],[object Object],[object Object],[object Object]
Types of online safety  ,[object Object],[object Object],[object Object],[object Object]
OS 3.0: A  layered  approach ,[object Object],[object Object],[object Object]
The ‘ Net  effect’ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: danah boyd:  Taken out of Context, 2008
What  else  we know ,[object Object],[object Object],[object Object]
3.4X “ Posting personal information does not by itself increase risk.”   --Archives of Pediatrics & Adolescent Medicine, 2/07
Teens’  response to strangers ,[object Object],[object Object],[object Object],[object Object],[object Object]
As for predators in social network sites...  “ There is  no evidenc e predators are stalking or abducting unsuspecting victims based on information they posted in social sites.”   –  Crimes Against Children Research Center, 3/09
Question Has the growth in  young people’ s use of the Internet  correlated with a rise in  sexual abuse against children?
Rate per 10,000 Children (<18) Source: NCANDS / Finkelhor & Jones 51% Decline  ( during  the period of the Web’ s existence) Answer: No Confirmed cases of child sexual abuse
Source: FBI & CACRC, 2009 & ‘ 10  The trend  continues ,[object Object],[object Object],[object Object]
As for other risk factors... “ Youth  violence  is  way down , as is  teen pregnancy ,  smoking ,  alcohol and drug use ,  suicides , and high school  drop-out rates  – whereas civic engagement has improved along with youth taking more AP classes in high school. Standardized educational achievement scores have either remained steady or improved slightly.  Aside from obesity, perhaps, most trends in youth behavior are moving in a positive direction.” –  Prof. Christopher Ferguson, Texas A&M
And this just in… Declines in 2 online risks  ,[object Object],[object Object],[object Object],Increase in 1 online risk
Cyberbullying Daniel Nicholls Melbourne 2004
Defining ‘cyberbullying’ better ,[object Object],[object Object],[object Object],[object Object],[object Object],Sources: UNH CACRC,  ‘07; Agatston, Kowalski, Limber, ‘09; Burgess-Proctor, Hinduja, Patchin, ‘09
More cyberbullying facts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Sources: UNH CACRC,  ‘07; Agatston, Kowalski, Limber, ‘09; Burgess-Proctor, Hinduja, Patchin, ‘09
Whole school approach needed ,[object Object],[object Object]
Most kids don’ t cyberbully Source: Cox Communications Teen Online & Wireless Safety Survey
Perception => reality: The power of ‘ social norming’ Source: Craig & Perkins, Hobart and William Smith Colleges 2008
Reinforcing social norms Source: Assessing Bullying in New Jersey Secondary Schools: Applying the Social Norms Model to Adolescent Violence: Craig, Perkins 2008
‘ Sexting’ defined ,[object Object],[object Object],[object Object],[object Object]
Sexting very rare ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Possible non-legal consequences ,[object Object],[object Object],[object Object],[object Object]
“ Promote digital citizenship and new media literacy in pre-K-12 education  as a national priority.” –  Youth Safety on a Living Internet: Report of the Online Safety & Technology Working Group Our report to Congress,  June 2010...
The  pillars  of citizenship learning Photo by Julian Turner ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Why  citizenship?
The most basic definition “ The central task of citizenship  is learning how  to be good to one another.”  –  A.J. Patrick Liszkiewicz
5 key elements ,[object Object],[object Object],[object Object],[object Object],[object Object]
Expanded definition (draft) ,[object Object],[object Object],[object Object]
[object Object],‘ With great power comes great responsibility’
So what  is  Online Safety 3.0? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Thank you! ,[object Object],[object Object],[object Object],[object Object]
 
A V3.0 school board... ,[object Object],[object Object],[object Object],[object Object]
‘ Sexting’
Why  do some kids ‘ sext’? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The  ultimate  in social norming ,[object Object]

More Related Content

What's hot

Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Larry Magid
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
International comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youthInternational comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youthThinkB4UClick
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...Stevecd
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointhmorrell1
 
Cyberbullying edc105
Cyberbullying edc105Cyberbullying edc105
Cyberbullying edc105CarolRusch1
 
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...Andy Jeter
 
2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_texting2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_textingDustianne North
 
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_1107112012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711Dustianne North
 
2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrains2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrainsDustianne North
 
2011 social media adolhxreport
2011 social media adolhxreport2011 social media adolhxreport
2011 social media adolhxreportDustianne North
 
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakRaising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakBex Lewis
 

What's hot (20)

Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
International comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youthInternational comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youth
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Cyberbullying edc105
Cyberbullying edc105Cyberbullying edc105
Cyberbullying edc105
 
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
 
2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_texting2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_texting
 
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_1107112012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
 
2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrains2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrains
 
2011 social media adolhxreport
2011 social media adolhxreport2011 social media adolhxreport
2011 social media adolhxreport
 
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakRaising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 

Similar to Online Safety 3.0

Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Larry Magid
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesFrances Harris
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, brieflyConnectSafely
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, brieflyAnne Collier
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologyScott Mills
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and CyberbullyingLouise Jones
 
Infographic Poster Report
Infographic Poster ReportInfographic Poster Report
Infographic Poster ReportFarah Sham
 
Persuasive Essay On Cyberbullying
Persuasive Essay On CyberbullyingPersuasive Essay On Cyberbullying
Persuasive Essay On CyberbullyingJennifer Simmons
 
Social Media Addiction And Internet Addiction
Social Media Addiction And Internet AddictionSocial Media Addiction And Internet Addiction
Social Media Addiction And Internet AddictionKatie Parker
 
Notes for Technology/Young Adults Presentation
Notes for Technology/Young Adults PresentationNotes for Technology/Young Adults Presentation
Notes for Technology/Young Adults PresentationFranklin Middle School
 

Similar to Online Safety 3.0 (20)

Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected Consequences
 
Persuasive Essay On Cyber Bullying
Persuasive Essay On Cyber BullyingPersuasive Essay On Cyber Bullying
Persuasive Essay On Cyber Bullying
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & Technology
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and Cyberbullying
 
Il poster
Il posterIl poster
Il poster
 
Infographic Poster Report
Infographic Poster ReportInfographic Poster Report
Infographic Poster Report
 
Informative Essay On Social Media
Informative Essay On Social MediaInformative Essay On Social Media
Informative Essay On Social Media
 
Teens and social media
Teens and social mediaTeens and social media
Teens and social media
 
Persuasive Essay On Cyberbullying
Persuasive Essay On CyberbullyingPersuasive Essay On Cyberbullying
Persuasive Essay On Cyberbullying
 
Social Media Addiction And Internet Addiction
Social Media Addiction And Internet AddictionSocial Media Addiction And Internet Addiction
Social Media Addiction And Internet Addiction
 
Notes for Technology/Young Adults Presentation
Notes for Technology/Young Adults PresentationNotes for Technology/Young Adults Presentation
Notes for Technology/Young Adults Presentation
 

More from Anne Collier

Fixing those 'Monday morning social media blues'
Fixing those 'Monday morning social media blues'Fixing those 'Monday morning social media blues'
Fixing those 'Monday morning social media blues'Anne Collier
 
Inspired digital citizenship: The essential elements
Inspired digital citizenship: The essential elementsInspired digital citizenship: The essential elements
Inspired digital citizenship: The essential elementsAnne Collier
 
Online Safety & Efficacy: Research Milestones
Online Safety & Efficacy: Research MilestonesOnline Safety & Efficacy: Research Milestones
Online Safety & Efficacy: Research MilestonesAnne Collier
 
The Safety Part of Game-Based Learning
The Safety Part of Game-Based LearningThe Safety Part of Game-Based Learning
The Safety Part of Game-Based LearningAnne Collier
 
A new social contract (for the digital age)
A new social contract (for the digital age)A new social contract (for the digital age)
A new social contract (for the digital age)Anne Collier
 
Digital citizenship basics
Digital citizenship basicsDigital citizenship basics
Digital citizenship basicsAnne Collier
 
A fresh look at digital safety, citizenship
A fresh look at digital safety, citizenshipA fresh look at digital safety, citizenship
A fresh look at digital safety, citizenshipAnne Collier
 
A (very) brief history of US Internet safety
A (very) brief history of US Internet safetyA (very) brief history of US Internet safety
A (very) brief history of US Internet safetyAnne Collier
 
Digital reputations
Digital reputationsDigital reputations
Digital reputationsAnne Collier
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenshipAnne Collier
 

More from Anne Collier (10)

Fixing those 'Monday morning social media blues'
Fixing those 'Monday morning social media blues'Fixing those 'Monday morning social media blues'
Fixing those 'Monday morning social media blues'
 
Inspired digital citizenship: The essential elements
Inspired digital citizenship: The essential elementsInspired digital citizenship: The essential elements
Inspired digital citizenship: The essential elements
 
Online Safety & Efficacy: Research Milestones
Online Safety & Efficacy: Research MilestonesOnline Safety & Efficacy: Research Milestones
Online Safety & Efficacy: Research Milestones
 
The Safety Part of Game-Based Learning
The Safety Part of Game-Based LearningThe Safety Part of Game-Based Learning
The Safety Part of Game-Based Learning
 
A new social contract (for the digital age)
A new social contract (for the digital age)A new social contract (for the digital age)
A new social contract (for the digital age)
 
Digital citizenship basics
Digital citizenship basicsDigital citizenship basics
Digital citizenship basics
 
A fresh look at digital safety, citizenship
A fresh look at digital safety, citizenshipA fresh look at digital safety, citizenship
A fresh look at digital safety, citizenship
 
A (very) brief history of US Internet safety
A (very) brief history of US Internet safetyA (very) brief history of US Internet safety
A (very) brief history of US Internet safety
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenship
 

Recently uploaded

IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 

Recently uploaded (20)

IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 

Online Safety 3.0

  • 1. Online Safety 3.0 Empowering and Protecting Youth Anne Collier Executive Director, Net Family News, Inc. Co-director ConnectSafely.org
  • 2.
  • 4. On Web 2.0... --Michael Kinsley, Slate.com, 11/27/06 “ ... everybody knows you’re a dog.”
  • 5.
  • 6. Students’ perspective ‘ Joe’s Non-Netbook’ Science Leadership Academy Philadelphia
  • 7.
  • 8. What we now know from...
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. In other words... © 2010 Columbus Dispatch
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. 3.4X “ Posting personal information does not by itself increase risk.” --Archives of Pediatrics & Adolescent Medicine, 2/07
  • 26.
  • 27. As for predators in social network sites... “ There is no evidenc e predators are stalking or abducting unsuspecting victims based on information they posted in social sites.” – Crimes Against Children Research Center, 3/09
  • 28. Question Has the growth in young people’ s use of the Internet correlated with a rise in sexual abuse against children?
  • 29. Rate per 10,000 Children (<18) Source: NCANDS / Finkelhor & Jones 51% Decline ( during the period of the Web’ s existence) Answer: No Confirmed cases of child sexual abuse
  • 30.
  • 31. As for other risk factors... “ Youth violence is way down , as is teen pregnancy , smoking , alcohol and drug use , suicides , and high school drop-out rates – whereas civic engagement has improved along with youth taking more AP classes in high school. Standardized educational achievement scores have either remained steady or improved slightly.  Aside from obesity, perhaps, most trends in youth behavior are moving in a positive direction.” – Prof. Christopher Ferguson, Texas A&M
  • 32.
  • 34.
  • 35.
  • 36.
  • 37. Most kids don’ t cyberbully Source: Cox Communications Teen Online & Wireless Safety Survey
  • 38. Perception => reality: The power of ‘ social norming’ Source: Craig & Perkins, Hobart and William Smith Colleges 2008
  • 39. Reinforcing social norms Source: Assessing Bullying in New Jersey Secondary Schools: Applying the Social Norms Model to Adolescent Violence: Craig, Perkins 2008
  • 40.
  • 41.
  • 42.
  • 43. “ Promote digital citizenship and new media literacy in pre-K-12 education as a national priority.” – Youth Safety on a Living Internet: Report of the Online Safety & Technology Working Group Our report to Congress, June 2010...
  • 44.
  • 45.
  • 46. The most basic definition “ The central task of citizenship is learning how to be good to one another.” – A.J. Patrick Liszkiewicz
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.  
  • 53.
  • 55.
  • 56.

Editor's Notes

  1. Remember Web 1.0, when media “audiences” were first called users , but we were still pretty much using the Web as passive consumers, downloaders, readers – when we were interacting with content ? Many adults – including parents, government, educators, and news reporters writing about new media – still view the Web through that mass-media lens, not really basing our work on the research, not understanding how very individual media-use is, and trying to think up one-size-fits-all solutions. Consider what fear does: When adults are afraid and overreact, kids want to get as far away as possible. They don ’t want their social lives and media use restricted. They go “underground,” which is very easy; they find workarounds, are on their own, which can actually put them at greater risk. Adults need to be in the mix. The guidance and media literacy school has provided young people for generations has been left out of the equation with social media, and young people have been left one their own. Both tech literacy and life literacy, which adults bring to the table, are needed. [Last bullet:] If we don’ t base our messaging on how youth ACTUALLY USE technology, if it’s not based on the growing bodies of both youth-online-risk and social-media research, we are talking to ourselves when we talk to youth about Internet safety . http://os3.connectsafely.org
  2. This was the mid-’ 90s, more than a decade and a half ago!!... The Internet was more anonymous in 1993; there was more separation between “real life” and what’s happening on the screen, things were more binary. Tim Berners-Lee , the Web ’s inventor, said recently that first the Internet was about connecting computers ; then, with Web 1.0 in the late ‘90s and 1 st half of this decade, it was about connecting documents ...
  3. NOW THE WEB, MEDIA ARE CONNECTING PEOPLE – but not just any people – your and my “social network,” the people we associate with in “real life.” The Web is now integrated into RL, especially for youth, for whom it‘’ just another “hang out” or place to socialize, communicate, collaborate, negotiate, etc. – so, more and more, everybody does know you’re a dog. It’ s no longer binary – the Web and “real life.” Young people – the so-called beneficiaries of our Net-safety wisdom – don’t make a distinction between online and offline. Now the Web increasingly MIRRORS all of human life.... www.slate.com/id/2154507/fr/rss
  4. This is an amazing time to be a parent, educator, journalist – a fascinating time to be a human being. We are in the middle of a profound media shift – as profound as the time when the printing press was invented, right before the Renaissance . Author and professor Clay Shirky recently said in a talk at the U.S. State Dept.: “This moment we’re living through is the largest increase in expressive capability in human history.” So, if we adults feel uneasy, it’ s understandable ... We’re in good company. But, for our children’s sake, we do need to embrace this change and play with it – fast, so as not to hold them back. Prof. Shirky said the INTERNET does two revolutionary things: 1) blends real-time two-way communication with one-to-many mass media and is USER-produced ... and 2) it pulls all this together into one distribution pipe or platform. But it&apos;s really a triple revolution . Because, in addition to Shirky’ s, the 3 rd revolutionary change is that media is SOCIAL now – it’s behavioral . [&amp;quot;How social media can make history&amp;quot; &lt;http://psdblog.worldbank.org/psdblog/2009/06/clay-shirky-at-the-state-department.html&gt;]
  5. HOWEVER ... IT ’S ALSO REALLY NO BIG DEAL – TO YOUNG PEOPLE . The students in the video are at Philadelphia&apos;s Science Leadership Academy, a three-year-old &amp;quot;inquiry-driven, project-based high school focused on 21 st -century learning. The school ’s principal, Chris Lehmann, said in a recent interview: &amp;quot;In too many schools we have this idea that we have the school we&apos;ve always had plus some computers.” He said, “Technology needs to be like oxygen - ubiquitous, necessary, invisible. It&apos;s got to be everywhere ... just part of the day-to-day work that we all do.” HE ALSO SAID: “Social media is part of kids’ lives. Either we acknowledge it exists and allow ourselves to be part of the conversation, or it’s one more way school becomes irrelevant to kids.” &lt;http://www.tolerance.org/magazine/number-39-spring-2011/your-students-love-social-media-and-so-can-you&gt; [See also this post in NetFamilyNews: “School &amp; social media” about how we might think of digital media as the new book: http://www.netfamilynews.org/2009/05/school-social-media-uber-big-picture.html .] Joe’ s Non-Netbook: http://www.youtube.com/watch?v=SkhpmEZWuRQ
  6. This kind of sums up what our new media environment is like. It’s the title of the report the Online Safety &amp; Tech Working Group I co-chaired sent to Congress in 2010: “Youth Safety on a Living Internet” (http://www.netfamilynews.org/?p=29092). Why did we call it the living Internet? Because [SLIDE]… • What this means is a very different notion of risk and safety than what parents heard in the first 10+ years of online safety. Because young people ’s online experiences are grounded in real life , the online risk spectrum matches that of real life.
  7. SO HERE ’S what we know from the growing body of social-media research.... A big start was the 3-year, $50 million “Digital Youth Project” begun in 2006, funded by the MacArthur Foundation to the tune of $50 million and involving more than 2 dozen researchers, studying young people’s use of social media in school, at home, and in after-school programs.... NOW IT ’S A BOOK: Hanging Out, Messing Around, and Geeking Out: Kids Living and Learning with New Media (from MIT Press) Missouri 8 th -grade teacher Tom Maerke reviewed it in the National Writing Project (NWP.org) site, saying “ it’s important to read this book because it presents in extensive detail the diverse learning opportunities available to young people” in social media. Lots of examples. “ *Serious* informal learning: Key online youth study” &lt;http://www.netfamilynews.org/2008/11/serious-informal-learning-online-youth.html&gt; “ Why participatory media need to be in school” http://www.netfamilynews.org/2009/06/why-participatory-media-need-to-be-in.htm]l
  8. This is just a partial list of activities and behaviors occurring on the social Web. Young people are not just socializing and playing games. Sure they’re doing those things but also holding meetings, negotiating, strategizing, community building, learning social norms, forming teams.... In World of Warcraft, educators who play the game tell me players are analyzing statistics and probabilities, learning how to save currency, how to budget, do marketing, and explore supply &amp; demand. So they’ re learning in the fields of economics, math, sociology, diplomacy, and business. They’re also doing a lot of strategic thinking in collaboration. In his recent book, The Element: how finding your passion changes everything, Sir Ken Robinson describes how many people – artists, writers, scientists, etc. – find their way &amp; find success when they find their tribe , or community of shared interest. There, they find validation, feedback, supportive friends to test their ideas on, a safe place to experiment – all this is what young people are finding thru social media before they grow up, outside of school. BUT ALSO they find comfort, support, validation (good and bad) – a risk-prevention expert in MA: “In our research we asked kids if they go online when they feel lonely or depressed or anxious, and many said YES, and when we asked if it made them feel better, most said YES, IT DOES. So [SN] may be a mild form of self-treatment or relief from other difficulties in life.” But of course it’ s not all positive, any more than life is....
  9. ...There ’s plenty of neutral and negative behavior too – a lot of what has always been going on during the adolescent years, except that now it’s a lot more visible. [Visibility is not all bad, though, is it? A lot of adolescent behavior and activity that was private when we were kids is now exposed for research , prevention , and intervention .] Solutions to negative behaviors such as cyberbullying or sexting incidents are often a process – incidents or “ teachable moments are opportunities to teach kids not to forget that those are real human beings with feelings behind the screennames, avatars, and profiles, and they are partly responsible for the impact of their words and behaviors on those human beings. [-- ”Unsupervised online teens &amp; other myths” about some recent studies on teen social networking, including a Los Angeles Times/Bloomberg study http://www.netfamilynews.org/nl060818.html#1 --Also our book, MySpace Unraveled , chapters 1, 2, and 8]
  10. ONLINE SOCIALIZING IS JUST AS COMPLEX AND DIVERSE AS THEIR OFFLINE SOCIAL LIVES – both what’ s going on in their individual lives and what’s going on around us all – because it’s in-coming all the time, right? So, as in real-life socializing, Pew found their online experiences mostly positive. [Link to study at http://www.netfamilynews.org/?p=30933.] “ Good outcomes” were defined as ”felt good about myself” (65%) or “felt closer to someone else” (58%) as the result of an experience in a social site. Pew found a range of “ bad outcomes” – the worst was 25% - had experienced a f2f argument or confrontation w/ someone (compare this to RL); 22% an exper that ended a friendship; 13% an exper that caused a prob w/ their parents; 13% felt nervous about going to school the next day; 8% had gotten into a physical fight; 6% had gotten in trouble in school because of an exper in a social site.
  11. Consumer Reports study ( http://www.netfamilynews.org/?p=30391 ) Authors of a a more recent study – “Why Parents Help Their Children Lie to Facebook About Age” ( http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/3850/3075 , covered in NetFamilyNews http://www.netfamilynews.org/?p=30920) – say that, “ among parents of 10-to-14-year-old Facebook users, 84% were aware their children signed up and – of that 84% – nearly 64% even “ helped create [their children ’ s underage] account. ” Unintended consequences : Sites therefore collect data about children under 13 that COPPA would otherwise prohibit without explicit parental consent.” “ With deception the only means of [gaining] access [for U13s] … possibilities for discussion, collaboration and learning are hindered.” I’d boil that down to innovation – working with parents and educators to make the experience more age-appropriate. The normalization of violating sites’ Terms of Service. From the online moderation community: Less safety for U13s who don’t have engaged parents.
  12. Social-media researchers have helped us see that youth are actually engaged in two kinds of online social networking: FRIENDSHIP-DRIVEN is the way most of us think of social networking – the online extension of their RL social lives. INTEREST-DRIVEN is about where young musicians, videographers, athletes, game designers, anime-translaters, code-writers, etc., get feedback, context for their work, mentors, inspiration, healthy competition – where geography is not a factor, and they don ’t have to grow up to find their professional peer groups. [Data from qualitative study of 61 people aged 15-25 by Harvard GoodPlay Project &lt;http://www.goodworkproject.org/research/goodplay/&gt;, also discussed here &lt;http://www.netfamilynews.org/?p=29466&gt;.] In this INFORMAL LEARNING environment . THE DIGITAL YOUTH STUDY FOUND THAT IN BOTH forms young people “create and navigate new forms of expression and rules for social behavior. By exploring new interests, tinkering, and “messing around” with new forms of media, they acquire various forms of technical and media literacy.... By its immediacy &amp; breadth of information, the digital world lowers barriers to self-directed learning .” – Mimi Ito, Cal Berkeley Hanging Out, Messing Around &amp; Geeking Out: Kids Living &amp; Learning with New Media , MIT Press (2009) &lt;http://mitpress.mit.edu/catalog/item/default.asp?ttype=2&amp;tid=11889&gt;
  13. It’ s a mistake to think social networking is either a single activity and even more of a mistake to think it’s just a waste of time, as many parents fear, but we naturally think of media from the mass-media environment we grew up in – media merely as something you passively consume. Hanging out or “chilling” with friends (casual socializing) Messing around (info-gathering, exploring an idea, tinkering with digital media, experimenting, play ) Geeking out (more professional - using digital media the way a musician practices w/ an instrument - more intensive and frequent use, developing higher levels of skill or specialized knowledge) The researchers write that, “by exploring new interests, tinkering, and ‘ messing around’ with new forms of media, they acquire various forms of technical and media literacy. Through trial and error, youth add new media skills to their repertoire, such as how to create a video or game, or customize their [profile]. Teens then share their creations and receive feedback from others online. By its immediacy and breadth of information, the digital world lowers barriers to self-directed learning. Some youth ’geek out’ and dive into a topic or talent…. Geeking out is highly social and engaged, although usually not driven primarily by local friendships. Youth turn instead to specialized knowledge groups of both teens and adults from around the country or world, with the goal of improving their craft and gaining reputation among expert peers. While adults participate, they are not automatically the resident experts by virtue of their age (Digital Youth Project summary http://digitalyouth.ischool.berkeley.edu/files/report/digitalyouth-TwoPageSummary.pdf and a review of it &lt;http://www.nwp.org/cs/public/print/resource/3052&gt;).
  14. INTEREST-DRIVEN COMMUNITY is purposeful, focused. It lends itself to a form of community self-regulation, a collective understanding of social norms that ’s protective of both the community itself and its members. I call this the GUILD EFFECT: safe, civil behavior as a social norm. Gee also said that “What we’re gaining [as a society] is the ability for people to be ... smarter in community than they can be alone.” [NEXT SLIDE] [Prof. James Paul Gee, AZ State U. in video I/V for PBS “Frontline” news show http://www.pbs.org/wgbh/pages/frontline/digitalnation/virtual-worlds/video-games/the-gamers-edge.html?play ] [An example is the experience of “Clarissa,” told by the Digital Youth study. She’s 17 and an aspiring writer who “participates in an online role-playing community. Aspiring members must write lengthy char. descriptions to apply, and these are evaluated by the site administrators. Since receiving glowing reviews of her application, Clarissa has been a regular participant on the site and has developed friendships with many of the writers there. She has been doing a joint role-play with another participant in Spain, and she has a friend in Oregon who critiques her work and vice versa. She explains how this feedback from fellow writers feels more authentic to her than the evaluations she receives in school.”]
  15. And phones increasingly have all the same capabilities and features as computers. Just-released research from the Pew Internet Project shows that 75% of US 12-to-17-yearolds now have cellphones [2/3/10 http://www.pewinternet.org/Reports/2010/Social-Media-and-Young-Adults/Part-2/1-Cell-phones.aspx?r=1 ] Rosalind Wiseman , author of Queen Bees &amp; Wannabes, said: “18 mos. ago I would never have said to a school that their firewalls are irrelevant. Now they are. There is no purpose in any school having any blocks or filters because kids are coming into school with cellphones that have Internet access. More and more the real safety issue has to be about how we treat each other.” Something to think about…. 47:45 http://blog.anniefox.com/tag/rosalind-wiseman/ Of course there are phone-only social-network sites (accessible via the Web but designed for phone screens), and MySpace and Facebook – all the major social sites – allow users to update their profiles from their phones. [Based on a study of experts, Pew said cellphones will soon be “the world’s primary tool...” http://www.informationweek.com/news/showArticle.jhtml?articleID=212500798 ; “Big sign of increasingly mobile Web” http://www.netfamilynews.org/2010/01/big-sign-of-increasingly-mobile-web.html ; and “Google Moves to Keep Its Lead as Web Goes Mobile,” 1/4/10 http://www.nytimes.com/2010/01/05/technology/internet/05google.html ]
  16. For 15-year-olds, Pew found in 2010 that the preferred communication methods with friends are in this order: texting (54%), talk face-to-face (42%), calling on a cellphone (41%), social network site (40%, and SNSs have features like IM and email), calling via landline (37%), instant messaging (33%), and email (12%). Latest Nielsen figures: http://www.washingtonpost.com/business/technology/nielsen-teen-data-use-tripled-in-past-year/2011/12/15/gIQAOfBfwO_story.html Pew/Internet: April 2010 &lt;http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones/Summary-of-findings/Findings.aspx&gt;
  17. There are more than 500,000 apps for the iPhone now – productivity apps, game apps, shopping apps, news &amp; info apps – ...and more than 400,000 for phones with Google ’s Android OS &lt;http://www.androidcentral.com/android-market-surpasses-100000-apps?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+androidcentral+%28Android+Central%29&gt; [Check out Georgia college student Travis Allen ’s iSchool Initiative for links to nearly 2 dozen educational apps https://www.ischoolinitiative.com/Educational_Applications.html for using cellphones as teaching tools and school and homework helpers. I wrote about him here http://www.netfamilynews.org/?p=28755 . ]
  18. http://www.pewinternet.org/Press-Releases/2008/Major-new-study-shatters-stereotypes-about-teens-and-video-games.aspx
  19. Turning now to the youth-online-risk research. This was another task force I served on, the Harvard Berkman Center ’s Internet Safety Technical Task Force, which released its report just 6 mos. before the next one got under way. These were its key findings of the– the results of a full review of the youth-risk literature in North America up thru 2008. Harassment &amp; bullying are the risk that affects the most youth. Not all young people are equally at risk online – those who are most at risk online are those most at risk in “real life” – they’re usually labeled at-risk youth or the more old-fashioned “troubled youth,” those who come from households where there’s conflict or abuse; young people seeking love or validation in high-risk places outside the home; those engaged in self-destructive behaviors such as substance abuse, gang activity, self-harm, eating disorders. There’s a lot of correlation between risky behavior offline and risky behavior online. We also found that a child ’s psychosocial makeup and home and school environment are better predictors of risk than any tech a child uses. What we found is age verification technology, which is what we were particularly charged with looking at, can ’t solve the very rare predator problem with which the state attorneys general who formed our task force were most concerned. And – with peer-on-peer harassment &amp; bullying the most salient risk – separating youth and adults online, the aim of age verification, would only increase the Lord of the Flies conditions. Report: http://cyber.law.harvard.edu/pubrelease/isttf/
  20. But there’s more than one kind of online safety.... because online safety maps to “real life,” where there are many kinds of safety. Consider how the types of online safety begin to suggest rights and freedoms ˆ∫- the language of citizenship . HERE ARE THE FORMS OF SAFETY WE ALL DESERVE: Physical is essential but not the all of it, as with playgrounds, right? [See this from Barry Joseph of NYC-based NGO Global Kids (http://www.holymeatballs.org/2009/01/staff_on_plans_to_turn_second.html#more) and this about children hurting themselves more because, in playing on such safe playgrounds, they didn ’t know how to take calculated risks, at News.com.au (http://www.news.com.au/national/childrens-play-equipment-too-safe-for-their-own-good-expert-warns/story-e6frfkvr-1226065260649).] Psychological – we want children to have this freedom online just as much as we’ ve always sought it for them offline, and their behavior is a factor in their emotional well-being. Reputational and legal – we have a lot of work to do to develop awareness in this area, since users themselves are key to maintaining this freedom for themselves. Identity, property, and community – imposter profiles are a big one; we need to teach youth not only to protect their privacy &amp; property but also their identity (first and foremost by protecting their passwords and not falling prey to manipulation, social engineering - like phishing scams).
  21. Because not all young ppl are equally at risk online, we now know that Online Safety needs a layered approach. We need to adopt the public health field ’s LEVELS OF PREVENTION. PRIMARY means baseline, universal instruction, pre-K through 12, in what is protective of ALL young people: good citizenship online as well as offline and media literacy that teaches critical thinking in new as well as traditional media – about what is posted, texted, shared, and uploaded as much as what is read, consumed, and downloaded. We have always taught good citizenship and media literacy; now we embrace new media too. We know this is protective in the new media environment, because researchers have found that aggressive behavior online increases the aggressor ’s risk online. So civil, mindful behavior are protective in all environments. SECONDARY : More specialized or targeted prevention - mentoring (incl peer) &amp; support for specific risky behaviors, such as bullying, self-destructive behavior, etc., that is reinforced online. SEC. also utilizes “teachable movements ,” when incidents in school occur (bullying, sexting, fights staged for YouTube, etc.), or perhaps annual anti-bullying empathy training for all students – a special assembly or unit in health class, when students learn about the law concerning transmitting sexually explicit images of minors. TERTIARY : Prevention AND intervention for youth with established patterns of risk behaviors. So the risk-prevention specialists, school counselors, social-service workers, and mental healthcare practitioners who work w/ at-risk youth already ... need to incorporate social media into their prevention and intervention work.
  22. The socializing, the adolescent behavior and development, etc. haven’ t really changed with the advent of the social Web. Here’s how the Internet does change things, and how social Web users who are not thinking criticall y can get into trouble. We’ re all familiar with these, but they were neatly packaged in the Jan. 2009 PhD dissertation of social-media researcher danah boyd. We add Disinhibition , that lack of body language, facial expression voice inflection that makes us forget we ’re interacting with fellow human beings – that has the effect of removing empathy. New media literacy teaches us that those are human beings with feelings behind those profiles, avatars, screennames, and text messages. [ “Taken Out of Context: American Teen Sociality in Networked Publics” http://www.danah.org/papers/TakenOutOfContext.pdf]
  23. This was a revelation to me back in 2007, when I first read it in the medical journal, ARCHIVES OF PEDIATRICS &amp; ADOLESCENT MEDICINE. This is when I realized what a big risk factor young people ’s own behavior is – in the contexts of both bullying and predation – how they are necessarily STAKEHOLDERS in their own well-being online. Here’ s the chart.... http://archpedi.ama-assn.org/cgi/content/full/161/2/138 [See also: “Digital risk, digital citizenship” &lt;http://www.netfamilynews.org/2009/05/digital-risk-digital-citizenship.html&gt;.]
  24. [HERE ’S THE BAR CHART:] SEE THE BREAKDOWN HERE: aggressive behavior toward peers, embarrassing peers – but then not just peer on peer behavior but also the behavior associated with predation or sexual victimization. Interestingly, sharing personal information in blogs or SN profiles – which is what standard online-safety messaging has been telling kids NOT to do for years – is’ ’t itself inherently risky. http://archpedi.ama-assn.org/cgi/content/full/161/2/138 “ The researchers’ conclusions : Talking with people known only online (&amp;quot;strangers&amp;quot;) under some conditions is related to online interpersonal victimization, but sharing personal information is not. Engaging in a pattern of different kinds of online risky behaviors is more influential in explaining victimization than many specific behaviors alone. Pediatricians should help parents assess their child&apos;s online behaviors globally in addition to focusing on specific types of behaviors.” THIS IS THE INDIVIDUALITY FACTOR – The basic message, here, is that people need to talk with their children about how they’ re socializing/behaving online.” To be relevant, the messaging can’t come from dire stories in the news media or law enforcement. General warnings and “be afraid” messages don’t change behavior.
  25. Here’ s what you NEVER hear in the news media: Dr. Rosen’ s definition of “appropriate response” is: “ Telling the person to stop, blocking the person from commenting on their profile, removing themselves from the situation by logging off, reporting the incident to an adult or to site.” That’s what the vast majority of kids do. An earlier study by the Crimes Against Children Research Center found that most solicitations are from peers or young adults, not so-called predators, and can be characterized as flirting . You don’t hear that in the news either. And that’s only part of the disservice we’re doing to young people. [See http://www.unh.edu/ccrc/internet-crimes/factsheet_1in7.html] Dr. Rosen also found that fairly low numbers of social networkers were very or extremely upset by such behavior... sexual solicitation (19% upset) harassment (22%), and/or unwanted exposure to sexual materials (20%) Rosen study in Journal of Applied Developmental Psychology, August 2008: &amp;quot;The Association of Parenting Style and Child Age with Parental Limit Setting and Adolescent MySpace Behavior&amp;quot; &lt;http://www.scopus.com/record/display.url?eid=2-s2.0-55249108309&amp;origin=inward&amp;txGid=Gbg8Y8TEassAYHBNRquT4pY%3a2&gt;.
  26. And from the Crimes Against Children Research Center at the University of New Hampshire. [From a CACRC update we had been watching for since 2006: “Trends in Arrests of Online Predators,” by Wolak, Finkelhor &amp; Mitchell at Crimes Against Children Research Center at U. of New Hampshire, March 2009 &lt;http://www.unh.edu/ccrc/pdf/CV194.pdf&gt;
Going even further, USATODAY &lt;http://www.usatoday.com/tech/webguide/internetlife/2009-04-02-online-friends_N.htm&gt; later cited the view of study co-author Finkelhor that “ongoing studies show that being on a social network site doesn’t create risk of sexual victimization.” And, despite all the news about thousands of registered sex offenders being booted off MySpace, there hasn ’t been a single prosecution of an offender for contact with a minor on a social network site. If there had been, it would’ve been in the news. [One reporter who blogged about RSOs on MySpace had a screenshot of a so-called offender’s profile in her article. I looked at it carefully and found that it hadn’t been updated since it had been established – there had been no activity on the profile; it was dead. Anyone can grab a photo off a sex offender Web site and create a profile because anyone can create a profile with any photo. News reporters really need to understand the facts before reporting so-called news and misleading and scaring the public. http ://www.netfamilynews.org/2009/03/major-update-on-net-predators-mostly.html ]
  27. So here ’s the question that has been on a lot of parents’ concerned minds....
  28. That chart ’s from the Crimes Against Children Research Center too, using data gathered at Cornell University. From 1990 to 2005 – the period of time that the Web was born and grew most rapidly – there was a 51% decline in overall child sexual exploitation – the chart ’s showing that : out of every 10,000 US minors, 23 were abused, with that no. going down to 11 in 2005. NCANDS = National Child Abuse &amp; Neglect Data System at Cornell University [&lt;18 per 10,000 children is less than 2/10 of 1%, I think] And the trend is continuing…
  29. When they added in the latest three years (thru 2008), the downward trend in overall child sexual victimization – which includes Internet-related cases – the overall decline going from 51% to a very substantial 58% since 1992.... “ Updated Trends in Child Maltreatment, 2008” &lt;http://www.unh.edu/ccrc/pdf/CV203_Updated%20Trends%20in%20Child%20Maltreatment%202008_8-6-10.pdf&gt; More on the long-term picture at CACRC site &lt;http://www.unh.edu/ccrc/Trends/index.html&gt;
  30. As for other risk factors online and offline ... Dr. Christopher Ferguson at Texas A&amp;M wrote in the Chronicle of Higher Education, “The research on current youth is pretty clear that this generation of young people is actually one of the psychologically healthiest on record (since at least the 1960s).” And David Finkelhor at the University of New Hampshire said in a recent talk about these declines in all the social problem indicators for teens that “ I have this intuition that we ’ re going to look back on this period as one of major and widespread amelioration of social problems affecting children and families ” – not BECAUSE of the Internet of course, but certainly showing that the Internet has not increased social problems among youth. http://chronicle.com/article/Narcissism-Run-Rampant-Lets/123705/ http://christopher.ferguson.socialpsychology.org/ [See also “Juvenoia: Why Internet fear is overrated,” based on a talk given the following month by Dr. Finkelhor http://www.netfamilynews.org/?p=30220 .]
  31. http://www.netfamilynews.org/?p=31073 Last month (12/11) the Crimes Against Children Research Center reported a continuing decrease in sexual solicitations of minors online. In 2000, it was “1 in 5″ (more in a minute on the misrepresentation); the 2005 one was “1 in 7″ (13%), and the CCRC has just announced that it’s now 9% in 2010, which was when the CCRC researchers conducted this latest survey published in the Journal of Adolescent Health this week. That’s “a total 50% decrease between 2000 and 2010,” they report. Unwanted exposure to pornography was down too, the researchers report in “Trends in Youth Internet Victimization: Findings From Three Youth Internet Safety Surveys 2000–2010.” US 10-to-17-year-olds “experiencing unwanted pornography exposure declined from 34% to 23% over the same period,” they write. “However, marking the only trend to show an increase over the past 5 years, 11% of youth reported an online harassment experience, which was an increase from 9% in 2005, and 6% in 2000.”
  32. We could spend an hour just talking about this, so I ’ll just say that, as a society, we’ve expanded that definition. We’ve started throwing all sorts of mean behaviors into it – so it could be anything from a prank that turned out to be really hurtful to popular kids putting other kids down (social rivalry) to an angry reaction expressed online (conflict) to mean gossip. None of that is technically cyberbullying, but we tend to label it all as such – and then attach terrible outcomes to it. We need to calm down and think about all this – including how we adults are modeling social interaction and what the research is showing us bullying and what helps defeat it.
  33. This technical (academic) definition usually applies to the most egregious cases, the ones in the news (remember, the news reports airplane crashes, not safe landings). So when KIDS are asked what they felt when cyberbullied, they said they’ d felt sad, upset, violated, depressed, hated, stupid &amp; put down, annoyed, and exploited, they ALSO felt the bullies were stupid, pathetic, bored, and didn’t have anything better to do – which doesn’t sound like they were completely devastated by the bullying, right? 55% indicated that being cyberbullied had “no negative effect” on them . HOWEVER , these “attitudes of dismissal” were particularly common in cases of harassment rather than cyberbullying. -- “Victimization of Adolescent Girls” – Amanda Burgess-Proctor, Sameer Hinduja, and Justin Patchin http://www.cyberbullying.us/cyberbullying_girls_victimization.pdf See also: “Cyberbullying better defined” &lt;http://www.netfamilynews.org/2008/09/cyberbullying-better-defined.html&gt; 2009 ISTTF report, pp. 19-20 &amp;quot;With all three types of threats (sexual solicitation, online harassment, and problematic content), some youth are more likely to be at risk than others . Generally speaking, the characteristics of youth who report online victimization are similar to those of youth reporting offline victimization and those who are vulnerable in one online context are often vulnerable in multiple contexts (Finkelhor 2008).
  34. But the numbers are all over the map. Some studies found only about 5.9% of teens had been cyberbullied, all the way up to 72% . But MOST were in the range of 15% to 35% of teens experiencing this kind of bullying, and Sameer Hinduja and Justin Patchin say on avg about 20%. It’ s important to note that it’s generally way under-reported . Kids say that’s because they feel they’re supposed to work these things out themselves (developmentally normative), but also that they fear getting an adult involved can make things even worse (fear of social isolation, a very real fear) – IMPORTANT. It’ s also important to see that it’s about relationships &amp; behavior more than technology. Computers and the Internet are involved but are not the cause. They can amplify the problem quickly, though, as we all know. Can be anything, or set off by anything , online or offline or both (kids don’ t make distinction) – 1 person’s anger, an argument, general meanness, school drama, mean gossip, power-tripping, etc. Can be private that goes public. Psych. AND physical. Because of rapid distribution, hard to ditch (always newcomers to the issue) So the environment, or CONTEXT of cyberbullying is SCHOOL, not the Internet Cyberbullying is OUR adult term – pretty meaningless to them (boyd &amp; Marwick on drama).
  35. What the experts are saying – from all over the country – is that a whole-school approach is the only real solution.... Enlisting everybody ’s help – administrators, teachers, students, families – in building and maintaining a culture of respect and dignity, school community-wide. Profs. Yasdin and Rotella wrote: [READ SLIDE] [“Whole school” tends to involve SEL for faculty/staff as well as students, student-implemented assessment surveys, multi-disciplinary teams for incident investig., policy consistent with culture of respect goals; parent involvement, etc. ] The APA Task Force on Zero Tolerance (2008) carefully reviewed the research literature and concluded: “Schools with higher rates of school suspension and expulsion appear to have less satisfactory ratings of school climate, less satisfactory school governance structures, and to spend a disproportionate amount of time on disciplinary matters. Perhaps more importantly, recent research indicates a negative relationship between the use of school suspension and expul. and school-wide acad. achievement (p. 855).” In an email from Dr. Patti Agatston in an Atlanta school district: “Sue [Limber] wrote about this in our book. Her main point was that 1 in 5 students report regularly bullying others with some frequency, so it doesn&apos;t make sense to suspend every fifth child from our schools.  She also writes about how threats of severe punishment would discourage youth and adults from reporting. So you can cite our book if you like but I don&apos;t have a specific research study for you. But I can tell you anecdotally that Georgia had a three-strikes-you’re-out policy for bullying and so administrators found every possible way they could to record aggressive actions without putting it under the bullying policy. So our bullying discipline reports were almost nonexistent despite the fact that the Olweus bullying surveys showed fairly high rates of bullying in some of our schools. I am skeptical the new law will change that since they still have kept the suspension/expulsion piece in it, although perhaps the required reporting/investigation piece will make a difference.”
  36. Let’ s look at this chart for a moment. It’s the recent Cox Teen Online &amp; Wireless Safety Survey &lt;http://www.scribd.com/doc/20023365/2009-Cox-Teen-Online-Wireless-Safety-Survey-Cyberbullying-Sexting-and-Parental-Controls&gt;. It’s a little hard to read on the screen, but it shows cyberbullying on computers in dark blue and on cellphones in light blue. Look how low the nos. are. The highest one is “seen or heard of a friend who was bullied.” Two of the US’s top researchers in cyberbullying, authors and profs. Justin Patchin and Sameer Hinduja tell us that about 20% of teens have ever experienced cyberbullying &lt;http://cyberbullying.us/publications.php&gt;. [When we hear about cyberbullying or bullying-caused suicide in the news, suicide-prevention experts tell us the reporting is almost always inaccurate because the causes of suicide are complex – multiple factors lead to suicide.] The point is, cyberbullying is NOT rampant. Most kids are decent to each other and this is not a big surprise, right? So why is it important to point this out?
  37. So why are those numbers important to look at? Do they seem low to you? If you believe what you hear and see in the news, they should. The reason this is important is because research shows that perception actually predicts reality. Two profs. at Hobart/William Smith in upstate NY found that “The most common (and erroneous) perception among students in the schools they studied – the perception – not the reality – is that most kids engage in or support bullying.” The chart’ s impossible to read, so just look at the red and blue lines. Blue is perception – what students thought was going on with bullying. The red line represents the no. of bullying incidents. This was in 19 schools in New Jersey between 2006 and 2008. As the school started helping students see that most students don’t engage in bullying – sometimes with posters that say things “students in our school don’t bully” – the perception (misunderstanding that bullying was normative) went down and then bullying behavior also went down. It was already relatively low, but when students SAW that, it went down even more. [[Cyberbullying expert Sameer Hinduja, a prof. at FL Atlantic U.( &amp; co-dir. of the Cyberbullying Research Center) wrote that... “ Schools must work to create a climate in which responsible use of Facebook ... Is ‘what we do around here’ and ‘just how it is at our school and with our students.’ This can occur by focusing attention on the  majority  of youth who  do  utilize computers and cell phones in acceptable ways.” http://cyberbullying.us/blog/social-norms-and-cyberbullying-among-students.html]] Source : “Assessing Bullying in New Jersey Secondary Schools: Applying the Social Norms Model to Adolescent Violence”: David W. Craig and Wesley Perkins, Hobart and William Smith Colleges 2008 http://www.youthhealthsafety.org/BullyNJweb.pdf
  38. The NJ schools displayed posters like this all around the school – letting students know that taking CARE of each other is the norm. Of course it ’s not just about putting up posters around school. It’s modeling and demonstrating in multiple ways that “our community is a respectful one. This is just the visual representation of that ongoing messaging, which all community members, including and especially staff, are demonstrating throughout the day – based on stated policy.
  39. OK, turning now to “sexting,” a term coined by a PR person. Despite a lot of scary news coverage, it ’s important to know that a recent study [by Pew/Internet in DC] found that 96% of teens DON’T send sexting messages.... “ Teen sexting: Troubling, but don’t overreact” http://www.connectsafely.org/Safety-Advice-Articles/teen-sexting-troubling-but-dont-overreact.html “ Sexting: The new ‘spin-the-bottle’?” http://www.netfamilynews.org/2009/06/sexting-new-spin-bottle.html “ Teaching about sexting: Social Web lesson plan” http://www.netfamilynews.org/2009/06/teaching-about-sexting-social-web.html “ Sexting overblown? Yes and *no*” http://www.netfamilynews.org/2009/03/sexting-overblown-yes-and-no.html “ Fla. teen a registered sex offender for sexting” http://www.netfamilynews.org/2009/04/fl-teen-registered-sex-offender-for.html
  40. The latest – late last year (‘11) – data published in the medical journal Pediatrics shows that only 1% of US teens had created or appeared in sexually explicit digital photos (links at http://www.netfamilynews.org/?p=31028). Previous studies focused on various behaviors, some oddly blended sending and receiving, none on taking the photos: The range in past studies: Sending 4-10%; Receiving 15-17%; Forwarding 3%. The earliest study said 20% had either sent or rcvd a “sext.” The AP/MTV survey released in Dec. (12/3/09) was about digital abuse , not just sexting. Digital abuse is defined as ”spreading lies, violation of trust, and digital disrespect” – a much more important focus, because this is ultimately about trust and respect – for self and others – and violating that trust – something most of us want to address with our children. CCRC researchers also surveyed law enforcement agencies, so we have unprecedented findings about the kinds of that led to arrests. “Two-thirds of the [3,477] cases in 2008 and ‘09 involved an ‘aggravating’ circumstance – “either an adult was involved (36% of those cases) or a minor engaged in malicious, non-consensual, or abusive behavior (31% of cases).
  41. I mentioned the legal consequences, though laws, prosecutors and juvenile judges are slowly getting up to speed on this, but here are some serious non -legal consequences. I suggest that school administrators and law enforcement take these consequences equally seriously – be sure that any students who do engage in sexting, many of whom see their mistake immediately and starkly, not be made an example of and taken out of school in handcuffs, as in a case involving 8 th graders in Washington State reported in the New York Times http://www.nytimes.com/2011/03/27/us/27sexting.html . Sometimes the way authorities handle a case increases a child’s victimization. Again, these are extreme cases, but they point to the need for great care in dealing with young people’s use of technology, with which the laws haven’t caught up. [[See also excellent coverage of a court’ s dilemma in Ars Technica &lt;http://arstechnica.com/tech-policy/news/2011/03/14-year-old-child-pornographers-sexting-lawsuits-get-serious.ars&gt;.]] Also “ Sexting: Advice from a criminology professor and cyberbullying researcher on what to tell a kid sent nude photos via cellphone ” http://www.netfamilynews.org/?p=30118 http://www.connectsafely.org/Safety-Tips/tips-to-prevent-sexting.html
  42. So what might a school community focus on where youth online safety’s concerned? Citizenship, both digital and real-world. Because so much of our children’ s time is spent in school, school is a vital environment for them to learn and practice good citizenship online and offline. My blog post on the report (linking to it): http://www.netfamilynews.org/?p=29092 [[Here’ s what the OSTWG, which I had the honor of co-chairing, wrote to lawmakers: “We need to recognize that, by far, the most common risk to children stems from their own actions and those of their peers and that many of these risks are not new. It is the delivery mechanisms which are [new]. While technology can be used to amplify or facilitate bullying, for example, it is not the cause of the problem. In addition to sending a message that bullying and harassment will not be tolerated, work needs to be done starting in Kindergarten or earlier on “digital citizenship” – or rather a renewed effort to teach citizenship online and offline – encouraging children to respect themselves and others. This baseline (or “Primary”) online-safety education cannot take place in a vacuum – or only in a single sphere of youth activity – but must promote movement toward greater civility not just among young people but also parents, educators, youth workers and other role models..... The government can’t legislate civility, but it can encourage it. This will not be an easy fix but, like cutting down on smoking, racism, sexism and other social ills, it can be accomplished through awareness-raising over time.”]]
  43. How do we do this? By encouraging the use of social media – or social learning tools – in school! Not in add-on courses sending the message that Net use is separate from everything else, but in core classes. That creates the environment and infrastructure for learning citizenship online as well as offline. Infrastructure – the infrastructure can be a classroom, a wiki, a lesson plan, a virtual world, a Google doc, a blog but must include a philosophy or set of values, e.g. creating together a class or school culture of respect or the educational VW Quest Atlantis’ s 7 Social Commitments Practice – Citizenship is a verb ; the more opportunities young ppl have to practicing citizenship online and offline IN SCHOOL, the better – in hallways, on sports fields, and in the classroom offline and in Google docs, wikis, and other collaborative projects and spaces. This is why so many experts call for a whole-school approach. Guidance/support/teaching/moderation – This role can be played by a teacher, peer mentors, and fellow classmates. Developing citizenship is developing safety. Benefits beyond safety – social competency or literacy, civic engagement, trust, collaboration, the comfort of community, being able to function well in community More than civic engagement – it’ s about civic efficacy , students feeling like they can make a difference It ’s about developing dispositions (e.g., a disposition toward math, so math empowers them). Our aim is to develop a disposition toward citizenship.
  44. Well, I touched on this in the previous slide, but I want to make it clear that citizenship isn’t just NICE , isn’t a luxury for schools with unlimited budgets. It develops social literacy as well as media and digital literacy. [[1 st bullet: “Youth who engage in online aggressive behavior by making rude or nasty comments or frequently embarrassing others are more than twice as likely to report online interpersonal victimization.” – ARCHIVES OF PEDIATRICS &amp; ADOLESCENT MEDICINE, February 2007 http://archpedi.ama-assn.org/cgi/content/full/161/2/138 ]] 2 nd – Critical thinking is itself protective - Learning how to assess risk = long-term safety, so students need opportunities to practice assessing risk 3 rd – Agency is the kernel and substance of citizenship; children treated as passive consumers &amp; potential victims aren’ t given a good foundation for understanding that they are key to their own well-being and that of their peers and communities online and offline. THE GOAL : to support student self-actualization or agency by teaching students how they can be active agents for social good. [See also: “Digital risk, digital citizenship” &lt;http://www.netfamilynews.org/2009/05/digital-risk-digital-citizenship.html&gt;]
  45. So this is NOT ROCKET SCIENCE, right?! Artist, writer, and SUNY Buffalo instructor) A.J. Patrick Liszkiewicz recently wrote about its most basic definition. This was confirmed by two psychology professors writing in the NYT: “ Our research on child development makes it clear that there is only one way to truly combat bullying.... As an essential part of the school curriculum, we have to teach children how to be good to one another, how to cooperate, how to defend someone who is being picked on and how to stand up for what is right.” &lt;http://www.nytimes.com/2010/07/23/opinion/23engel.html&gt; So we don’t really need whole curriculums about it or hours of professional development – better to spend that on social-emotional learning! It should be nothing special, like breathing, but we can’t get there if we don’t allow social media use in school. See also: “ Citizenship &amp; the social Web mirror in our faces 24/7 “ http://www.netfamilynews.org/?p=28792 “ Next step: Crowd-source digital citizenship &lt;http://www.netfamilynews.org/?p=30619&gt; “ The goal for digital citizenship: Turn it into a verb” http://www.netfamilynews.org/?p=29268
  46. Here are the five aspects I’ve seen discussed in a number of countries, forums, and research studies: Participation or civic engagement – including social or community activism online Norms of behavior, often called &amp;quot;good citizenship&amp;quot; or etiquette Rights and responsibilities – what immediately comes to mind for a lot of people when they hear the word “citizenship” A sense of membership or belonging (not Net as whole but one’s comm.) [LITERACIES:] I first heard this trifecta talked about at the Safer Internet Forum in Luxembourg in 2009, and it made huge sense to me. I see these literacies, really, as melting into each other in a digital age, where sociality happens in digital media supported by digital technologies: digital or technical literacy, media literacy, and social literacy. I suggest these amount to much greater safety and lower risk for individuals of all ages, communities, personal property (intellectual, software, hardware), and networks. These literacies apply critical thinking about the use and impacts of technology, information, and behvavior. But I think many people don’t feel they would provide children with enough protection. I’ll leave that question with you.
  47. BUT IF IT WOULD BE HELPFUL TO DEFINE IT A LITTLE MORE, here’s one possibility: Online citizenship is the rights &amp; responsibilities of full, successful engagement in an increasingly participatory media environment, culture, and world. OR: Full, healthy, meaningful participation in the digital discourses of a networked world The rights might include (above)… The responsibilities might include… The goal is to support self-actualization or agency by teaching and modeling the literacies or competencies of successful use of digital media SO YOUTH SEE FOR THEMSELVES THE POSSIBILITIES AND BENEFITS OF BEING ACTIVE AGENTS FOR THEIR OWN AND THE SOCIAL GOOD. Resources : For educator education: From Fear to Facebook: One School ’s Journey , by Matt Levinson http://www.amazon.com/Fear-Facebook-One-Schools-Journey/dp/1564842703 “ Moving Beyond One Size Fits All to Digital Citizenship,” by educators Matt Levinson and Deb Socia http://publius.cc/moving_beyond_one_size_fits_all_digital_citizenship ) For parent education : A Facebook Guide for Parents , by Anne Collier and Larry Magid of ConnectSafely.org http://www.fbparents.org [See also: “Why digital citizenship is a hot topic (globally)” http://www.netfamilynews.org/?p=29466 and “Digital risk, digital citizenship” &lt;http://www.netfamilynews.org/2009/05/digital-risk-digital-citizenship.html&gt;.]
  48. Today’ s media give us and our children super powers compared to the days when we were mere passive consumers, so the bottom iine, really, is the Spider-Man lesson: “With great power comes great responsibility. ” USC media prof. and founder of the New Media Literacies Project Henry Jenkins sees Peter Parker, aka Spider-Man, as an apt metaphor for today’s new-media-empowered youth. He cites the advice Peter’s Uncle Ben gave him as he was discovering his powers. This quote from Dr. Jenkins is in the Introduction of “Our Space,” a new literacy &amp; citizenship curriculum created by the New Media Literacies Project and the Harvard School of Education’s GoodPlay Project to be released for the next (2010-11) school year. “ The product of a broken home, he currently is under the supervision of his aunt and uncle. Peter considers himself to be a master of the web, able to move rapidly from site to site and applying his emerging skills to promote social justice. Peter has engaged with typical identity play, adopting a flamboyant alter ego, an avatar which allows him to do and say things  he would be hesitant to do otherwise. Peter belongs to a social network with  kids from a nearby private academy who share his perception of being different ... . Peter uses FlickR to publish his photographs .... T he editor has been so impressed by Peter&apos;s work that he now lets him work freelance. Peter often interacts with adults who share his geeky interests online. Peter uses his computer to monitor suspicious activities in his community and is able to use a range of mobile technologies to respond anytime, anywhere to issues which concern him. He uses Twitter to maintain constant contact with his girl friend, Mary Jane, who often has to stay after school to rehearse for drama productions. ... Peter knows less than he thinks he does but more than the adults around him realize. While he makes mistakes, some of them costly, he is generally ready to confront the responsibilities thrust upon him by his circumstances. ”
  49. SO WHAT IS Net safety 3.0 – HOW DO WE MAKE OUR MESSAGING RELEVANT TO THE NET ’s MOST AVID USERS? When you really think about it, how effective is it, really, to say to young people: “The media you find so compelling are bad ... A time sink, a waste of time, and rife with predators, cyberbullies, and other dangers” – you are a potential victim, and there’s little you can do about that? That’s the messaging our society has been sending for almost a decade and a half now. Well-known Canadian author and professor DON TAPSCOTT wrote in the Huffington Post in “20 big ideas for 2012” http://www.huffingtonpost.com/don-tapscott/20-big-ideas-for-2012-par_b_1194462.html : “ Today&apos;s youth were told that if they graduated, worked hard, and stayed out of trouble, they would have a prosperous and fulfilling life. But that&apos;s not happening. Around the world, youth unemployment is far higher than the national average. Young people are disillusioned, and their high unemployment raises the specter of a new youth radicalization. ” Unlike the ’ 60s anti-war mvt, “ today&apos;s radicalization is deeply rooted in personal broken hopes, mistreatment, and injustice ” while “ today&apos;s frustrated youth have at their fingertips the most powerful tool ever for finding out what&apos;s going on, informing others and organizing collective responses. ” So the Q he asks is, “ How can we engage youth in finding new solutions? ” We can start by embracing the new media environment around all of us, embracing the media tools that are meaningful to them and working with them on using these tools to enable their success and healthy, constructive participation.
  50. S o, to summarize, a Version 3.0 school board …. http://os3.connectsafely.org Respectful safety tips available free for downloading and printing out, left-hand side of this page: http://www.connectsafely.org/safety-tips-and-advice.html
  51. From Bulgaria ’s “Think B4 You Post” campaign &lt;http://www.youtube.com/watch?v=HpPmo26mX9s&gt; Shows how universal youth online risk is (you don ’t need to speak Bulgarian to get the message!). [Very dramatic 10.5-min. new UK version (CEOP) here &lt;http://www.youtube.com/watch?v=4ovR3FF_6us&gt;]
  52. The range of motivations – from developmentally normative adolescent behavior ... to malicious intent ... to criminal intent E.g., “Revenge porn” in UrbanDictionary.com – “Homemade porn uploaded by ex-girlfriend or (usually) ex-boyfriend after particularly vicious breakup as a means of humiliating the ex or just for own amusement” E.g., “Truth or Dare” – remember that classic middle school rite-of-passage sort of game? Rosalind Wiseman of Queen Bees &amp; Wannabes tells of how, up until a few years ago, when 7 th and 8 th grade girls played it at slumber parties, there were no serious consequences, but now – when it’s “I dare you to take a naked photo of yourself and send it to the boy you like” and the girl does it because of all that peer pressure from their homies – the consequences can be very serious! In its study, the Pew Internet &amp; American Life Project found that sexting is more common among older teens and usually occurs between romantic partners to start or maintain a relationship, less frequently as a “joke” or “for fun.” [NEXT SLIDE] My blog post: http://www.netfamilynews.org/2009/12/sexting-new-study-truth-or-dare.html Annie Fox interview of Rosalind Wisemand http://blog.anniefox.com/2009/12/07/podcast-queen-bees-go-hi-tech/ “ Sexting: The peer pressure factor” &lt;http://www.netfamilynews.org/2009/09/sexting-peer-pressure-factor.html&gt;
  53. Canada now has a national day, Feb. 23, because of two good guys. In 2007 at their high school in Nova Scotia, Travis Price and David Shepherd. Who were. seniors, noticed a freshman boy was being picked on for wearing a pink shirt – they figured “ that ’ s enough … gotta help the kid out, ” David told NBC News. So they went out and bought a whole bunch of pink shirts and started wearing them. Soon hundreds of students at their High School were wearing pink too. Then – if it wasn ’ t already viral – the idea spread to more than 60 schools in Nova Scotia and then all over Canada. Even early in that process, though, once the story was online, Travis and David were getting emails from other countries, including Germany, Spain, and Taiwan. [NBC 2006 story 2:50 – (comes w/ ad, can ’t convert) http://dai.ly/aJX4fc ] http://www.pinkshirtday.ca/ http://www.youthhealthsafety.org/BullyNJweb.pdf