SlideShare a Scribd company logo
1 of 27
Norms Approach Beats Fear & Exaggeration
        for Motivating Behavior




                Larry Magid
               (not pictured above)
           Co-director, ConnectSafely.org
              Founder, SafeKids.com
             larry@ConnectSafely.org
Everything I know about bullying prevention, I
        learned from a New Orleans street artist




Taken in Jackson Square,
New Orleans
After 9/11, flying was “dangerous”

 So people drove more and deaths per
 passenger mile went up
Some parents fear inoculations
Which means fewer kids are protected
against preventable diseases
And sometimes fear can lead to
questionable invasive procedures
Some panicked over:
•   Y2K
•   Killer bees
•   Swine flu
•   Stranger danger
•   Stock market “crash”
•   Al Qaeda and nuclear weapons in Iraq
•   Unemployment
•   Not enough people to fill available jobs
•   Inflation
•   Deflation
•   Obama getting elected
•   McCain getting elected
And, of course
But fear can also be protective
Fear works only if it’s
     credible & actionable
“According to EPPM*, how people respond to fear appeals depends on
their assessment of the threat and their perceived efficacy. When
assessing threat, the audience considers severity, or the seriousness of
it, as well as their susceptibility, or the likelihood that it will happen to
them.”

*Extended Parallel Process Model

Based on research from Kim White @ Michigan State
http://www.thcu.ca/infoandresources/publications/fear%20appeals%2
0-%20web%20version.pdf
Boomerang effect
If the perception of threat exceeds perception of
efficacy…
• They will avoid the message
• Deny they are at risk
• Mock the message or become angry at the source or
    issue (and ignore it).
• They may even increase their unhealthy behaviors
    (boomerang effect).
Fear can paralyze




And lead to irrational decisions
Predator Panic of 2004-2006
The rise of the web has not resulted in
             increased victimization of children


                                                                          51% Decline
                                                                          (during the period of the
                                                                          Web’s existence)




           Blue line represents 58% decline in child sex abuse from
           1992 to 2008
Source: Updated Trends in Child Maltreatment, 2008: Finkelhor, Jones and Shattuck: Crimes Against
Children Research Center
Moving right along
The Internet Safety Technical Task Force found that:

“Bullying and harassment, most often by peers, are the
most salient threats that minors face, both online and
offline.”

Which naturally leads to ….
Cyberbullying Panic!
It’s a problem, not an epidemic
                  Data is not consistent but the consensus is that
                   about 20% of kids experienced cyberbullying




Chart: Cox Communications Teen Online & Wireless Safety Survey
Most children are neither victims
                   nor monsters
                    • Not every interaction that makes kids
                      uncomfortable is bullying
                    • While some are very vulnerable,
                      most children are reasonably
                      resilient.
                    • Across Europe, 6% of 9 to 16-year-
                      old internet users have been bullied
                      online. 3% confess to having bullied
                      others. *
                    • Far more have been bullied offline,
                      with 19 per cent saying they have
                      been bullied at all – and 12 per cent
                      have bullied someone else*

* EU Kids Online
And bullying may be going down, not up

     “The percentage of youth (2-17) reporting
     physical bullying in the past year went down
     from 22 percent to 15 percent between 2003
     and 2008.”
     Source: Trends in Childhood Violence and Abuse Exposure ..
     Finkelhor, et al)
Danger of exaggeration



• Can destroy credibility
• Can cause “boomerang effect”
• Can cause people to believe that behaviors are
  “normal”
Being honest reduces risk
                        “Youth are less likely to get involved
                        in bullying and less likely to remain
                        as bystanders ignoring bullying
                        when they accurately perceive peer
                        norms.”

“Honest Abe”
didn’t say this,
but he might
have


            Source: Using Social Norms to Prevent Bullying in Middle Schools.
            Craig & Perkins, August 2011
Social Norms
            • People emulate how they think their peers
              behave
            • If people think their friends don’t smoke,
              they’re less likely to smoke
            • Same is true with over-eating, excessive
              alcohol use and other negative behaviors,
              including bullying*




*Assessing Bullying in New Jersey Secondary Schools: Applying the Social
Norms Model to Adolescent Violence: Craig, Perkins 2008
Perception matters




Source: Perkins, H. Wesley, David W. Craig, and Jessica M. Perkins. "Using Social Norms to Reduce Bullying: A
Research Intervention in Five Middle Schools." Group Processes and Intergroup Relations, 2011.
Bullying behavior in school – last 30 days



                                                            Actual behaviors
                                                          lower than perceived
                                                               behaviors




Source: Using Social Norms to Prevent
Bullying in Middle Schools. Craig & Perkins,
August 2011
Alternative to fear messaging
“Social-norms marketing campaigns have emerged
as an alternative to more traditional approaches
(e.g., information campaigns, moral exhortation,
fear inducing messages) designed to reduce
undesirable conduct.”

Donaldson, Graham, Piccinin, & Hansen, 1995
http://www.csom.umn.edu/assets/118375.pdf
Emphasize the positive

• People, especially youth, can benefit from
  positive images and role models
• Creating a culture of respect actually can lead
  to respect
• Respectful behavior truly is normal. Most kids
  do not bully
Example of positive norming




Source: Assessing Bullying in New Jersey Secondary Schools: Applying the Social Norms
Model to Adolescent Violence: Craig, Perkins 2008
Thanks
 View this presentation:
 SafeKids.com/ibpa2011
       Larry Magid
Co-director, ConnectSafely.org
   Founder, SafeKids.com
    larry@ConnectSafely.org

More Related Content

What's hot (20)

NSBA2010
NSBA2010NSBA2010
NSBA2010
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Web safety
Web safetyWeb safety
Web safety
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
Olmv cyberbullying
Olmv cyberbullyingOlmv cyberbullying
Olmv cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…
 
Cyberbullying - LIS 5620
Cyberbullying - LIS 5620Cyberbullying - LIS 5620
Cyberbullying - LIS 5620
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber Bullying
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 

Similar to Norms Approach Beats Fear & Exaggeration for Motivating Positive Behavior

Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Conceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskConceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskMarcelo Pesallaccia
 
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...Alan Bruce
 
Bullying powerpoint
Bullying powerpointBullying powerpoint
Bullying powerpointbanksmc11
 
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docx
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docxRunning head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docx
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docxjoellemurphey
 
E-learning: The Dark Side?
E-learning: The Dark Side?E-learning: The Dark Side?
E-learning: The Dark Side?eLearning Papers
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 

Similar to Norms Approach Beats Fear & Exaggeration for Motivating Positive Behavior (20)

Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Cyrenne Madlangsakay
Cyrenne MadlangsakayCyrenne Madlangsakay
Cyrenne Madlangsakay
 
Bullying in the digital age
Bullying in the digital ageBullying in the digital age
Bullying in the digital age
 
Teens and social media
Teens and social mediaTeens and social media
Teens and social media
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Meet the e strangers
Meet the e strangersMeet the e strangers
Meet the e strangers
 
Conceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskConceptual approaches to adolescent online risk
Conceptual approaches to adolescent online risk
 
David finkelhor
David finkelhorDavid finkelhor
David finkelhor
 
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
Teacher Rolee and Digital Threats: preventing and addressing cyberbullying in...
 
Cyberbullying: Advice for Schools
Cyberbullying: Advice for SchoolsCyberbullying: Advice for Schools
Cyberbullying: Advice for Schools
 
Bullying powerpoint
Bullying powerpointBullying powerpoint
Bullying powerpoint
 
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docx
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docxRunning head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docx
Running head ANNOTATED BIBLIOGRAPHY FOR CYBER BULLYING TOPIC1.docx
 
Directed research 050114_EmpathyinDigital
Directed research 050114_EmpathyinDigitalDirected research 050114_EmpathyinDigital
Directed research 050114_EmpathyinDigital
 
E-learning: The Dark Side?
E-learning: The Dark Side?E-learning: The Dark Side?
E-learning: The Dark Side?
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internet harassment and bullying behaviors: Implications for youth development
Internet harassment and bullying behaviors: Implications for youth developmentInternet harassment and bullying behaviors: Implications for youth development
Internet harassment and bullying behaviors: Implications for youth development
 

Recently uploaded

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Norms Approach Beats Fear & Exaggeration for Motivating Positive Behavior

  • 1. Norms Approach Beats Fear & Exaggeration for Motivating Behavior Larry Magid (not pictured above) Co-director, ConnectSafely.org Founder, SafeKids.com larry@ConnectSafely.org
  • 2. Everything I know about bullying prevention, I learned from a New Orleans street artist Taken in Jackson Square, New Orleans
  • 3. After 9/11, flying was “dangerous” So people drove more and deaths per passenger mile went up
  • 4. Some parents fear inoculations Which means fewer kids are protected against preventable diseases
  • 5. And sometimes fear can lead to questionable invasive procedures
  • 6. Some panicked over: • Y2K • Killer bees • Swine flu • Stranger danger • Stock market “crash” • Al Qaeda and nuclear weapons in Iraq • Unemployment • Not enough people to fill available jobs • Inflation • Deflation • Obama getting elected • McCain getting elected
  • 8. But fear can also be protective
  • 9. Fear works only if it’s credible & actionable “According to EPPM*, how people respond to fear appeals depends on their assessment of the threat and their perceived efficacy. When assessing threat, the audience considers severity, or the seriousness of it, as well as their susceptibility, or the likelihood that it will happen to them.” *Extended Parallel Process Model Based on research from Kim White @ Michigan State http://www.thcu.ca/infoandresources/publications/fear%20appeals%2 0-%20web%20version.pdf
  • 10. Boomerang effect If the perception of threat exceeds perception of efficacy… • They will avoid the message • Deny they are at risk • Mock the message or become angry at the source or issue (and ignore it). • They may even increase their unhealthy behaviors (boomerang effect).
  • 11. Fear can paralyze And lead to irrational decisions
  • 12. Predator Panic of 2004-2006
  • 13. The rise of the web has not resulted in increased victimization of children 51% Decline (during the period of the Web’s existence) Blue line represents 58% decline in child sex abuse from 1992 to 2008 Source: Updated Trends in Child Maltreatment, 2008: Finkelhor, Jones and Shattuck: Crimes Against Children Research Center
  • 14. Moving right along The Internet Safety Technical Task Force found that: “Bullying and harassment, most often by peers, are the most salient threats that minors face, both online and offline.” Which naturally leads to ….
  • 16. It’s a problem, not an epidemic Data is not consistent but the consensus is that about 20% of kids experienced cyberbullying Chart: Cox Communications Teen Online & Wireless Safety Survey
  • 17. Most children are neither victims nor monsters • Not every interaction that makes kids uncomfortable is bullying • While some are very vulnerable, most children are reasonably resilient. • Across Europe, 6% of 9 to 16-year- old internet users have been bullied online. 3% confess to having bullied others. * • Far more have been bullied offline, with 19 per cent saying they have been bullied at all – and 12 per cent have bullied someone else* * EU Kids Online
  • 18. And bullying may be going down, not up “The percentage of youth (2-17) reporting physical bullying in the past year went down from 22 percent to 15 percent between 2003 and 2008.” Source: Trends in Childhood Violence and Abuse Exposure .. Finkelhor, et al)
  • 19. Danger of exaggeration • Can destroy credibility • Can cause “boomerang effect” • Can cause people to believe that behaviors are “normal”
  • 20. Being honest reduces risk “Youth are less likely to get involved in bullying and less likely to remain as bystanders ignoring bullying when they accurately perceive peer norms.” “Honest Abe” didn’t say this, but he might have Source: Using Social Norms to Prevent Bullying in Middle Schools. Craig & Perkins, August 2011
  • 21. Social Norms • People emulate how they think their peers behave • If people think their friends don’t smoke, they’re less likely to smoke • Same is true with over-eating, excessive alcohol use and other negative behaviors, including bullying* *Assessing Bullying in New Jersey Secondary Schools: Applying the Social Norms Model to Adolescent Violence: Craig, Perkins 2008
  • 22. Perception matters Source: Perkins, H. Wesley, David W. Craig, and Jessica M. Perkins. "Using Social Norms to Reduce Bullying: A Research Intervention in Five Middle Schools." Group Processes and Intergroup Relations, 2011.
  • 23. Bullying behavior in school – last 30 days Actual behaviors lower than perceived behaviors Source: Using Social Norms to Prevent Bullying in Middle Schools. Craig & Perkins, August 2011
  • 24. Alternative to fear messaging “Social-norms marketing campaigns have emerged as an alternative to more traditional approaches (e.g., information campaigns, moral exhortation, fear inducing messages) designed to reduce undesirable conduct.” Donaldson, Graham, Piccinin, & Hansen, 1995 http://www.csom.umn.edu/assets/118375.pdf
  • 25. Emphasize the positive • People, especially youth, can benefit from positive images and role models • Creating a culture of respect actually can lead to respect • Respectful behavior truly is normal. Most kids do not bully
  • 26. Example of positive norming Source: Assessing Bullying in New Jersey Secondary Schools: Applying the Social Norms Model to Adolescent Violence: Craig, Perkins 2008
  • 27. Thanks View this presentation: SafeKids.com/ibpa2011 Larry Magid Co-director, ConnectSafely.org Founder, SafeKids.com larry@ConnectSafely.org

Editor's Notes

  1. THERE NEVER HAS BEEN A STUDY ON HOW MUCH CHILDREN ARE SOLICITED BY “PREDATORS.” NOTE THE HEADLINE: “All Children Vulnerable to Online Predators”. IT’S A TRICK QUESTION BECAUSE THE SURVEY WASN’T ABOUT PREDATORS. It was about unwanted sexual solicitations from anybody – flirting is often an unwanted sexual solicitation, as the researchers defined the term. Here’s what the 2000 study this refers to – updated in 2006 with the figure 1 in 7, so the no. of solicitations had gone down – actually said....READ THIS:“Youth identify most sexual solicitors as being other adolescents (48% in 2000; 43% in 2006) or young adults 18-24 (20%; 30%), with few (4%; 9%) coming from older adults, and the remaining being of unknown age.” THE TOTALS: 68% teens & 18-24-year-olds in 2000; 73% in 2006.
  2. From 1990 to 2005 – the period of time that the Web was born and grew most rapidly – there was a 51% decline in overall child sexual – the chart’s showing that: out of every 10,000 US minors, 23 were abused, with that no. going down to 11 in 2005.UPDATE: 58% decline thru 2008, latest figure available (reported by CCRC here “Updated Trends in Child Maltreatment, 2008” <http://www.unh.edu/ccrc/pdf/CV203_Updated%20Trends%20in%20Child%20Maltreatment%202008_8-6-10.pdf>)NCANDS = National Data Archives on Child Abuse & Neglect