SlideShare une entreprise Scribd logo
1  sur  30
Télécharger pour lire hors ligne
  Youth Safety on the Social Web Larry Magid & Anne Collier Co-directors ConnectSafely.org Revised 1/09 © 2009 ConnectSafely.org
What  is  the social Web? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web 1.0 …
On Web 2.0...  -- Michael Kinsley, Slate.com, 11/27/06 “ ... everybody  knows you’re a dog.”
Social networking is whatever… ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Cellphones too
Majority of teens in social sites ,[object Object],[object Object],[object Object],[object Object],Source: Pew Internet & American Life survey
Not just  MySpace & Facebook YouTube, MyYearbook, Bebo, Hi5  & many  niche  social network sites Ning:  Allows users to create their own social networks, or mini-MySpaces. Allows porn (with splash page).  Twitter & Plurk:  Micro-blogging - 140 characters or less. Kind of like blended chat & IM. Twitter mostly adults, Plurk a little younger. Second Life & other virtual worlds : Users create avatars that interact in a virtual world. Hulu:  Fast-growing video-sharing site (153 million video streams, 9/08); popular for viewing whole shows online And some are a bit more questionable …. JuicyCampus  Gossip site, total anonymity, no rules.… Stickam : Social video-streaming site with live webcam chat.
What are they  doing   in there? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What  else  are they doing  in there? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The ‘ Net  effect’ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: danah boyd:  Taken out of Context, 2008
Mostly for real-life friends ,[object Object],[object Object],Source: Pew Internet & American Life survey January 2007
Teens  do  have a clue when it comes to safety & privacy ,[object Object],[object Object],[object Object],Source: Pew Internet & American Life survey January 2007
Are they careful about photos? ,[object Object],[object Object],[object Object],[object Object],[object Object],Source: Pew Internet & American Life survey January 2007
Teens are alive today, thanks to social-networking sites… Plan To 'Shoot Up' School Foiled Jan 12, 2009: “Deputies in Transylvania County said they got a call from a sheriff's office in New York. A teenager there apparently came forward and said she met a 15-year-old on MySpace who said he had a dangerous plan.”
Question : What proportion of teens have been approached online by a predator? ,[object Object],[object Object],[object Object],[object Object],[object Object]
It’s a trick question
What the surveys really said ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Online Victimization of Youth: Five Years Later Crimes Against Children Research Center, 2006
Question Do you agree that the growth in young people’s use of the Internet correlates with a rise in sexual abuse against children?
SA Sub 1990-2005* Rate per 10,000 Children (<18) Source: NCANDS / Finkelhor & Jones, 2006  51% Decline  (during the period of the Web’s existence) Answer: No Confirmed cases of child sexual abuse
Deception rarely involved ,[object Object],[object Object],[object Object],[object Object]
What causes risk? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: Archives of Pediatrics & Adolescent Medicine, Feb 2007 Ybarra, Mitchell, Finkelhor, Wolak
The kids most at risk online are those at risk offline ,[object Object],[object Object],[object Object],[object Object],Source: Internet Safety Technical Task Force Report, January 2009
More likely risks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cyberbullying ,[object Object],[object Object],[object Object],[object Object],[object Object],Sources: Patchin and Hinduja, 2006; Pew/Internet, 2007; Crimes Against Children Research Center, 2007
Signs of cyberbullying ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],* can also be a sign of an inappropriate online relationship
What to tell kids facing cyberbullying ,[object Object],[object Object],[object Object],[object Object],[object Object]
Keys to finding solutions ,[object Object],[object Object],[object Object],[object Object]
To summarize ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank you & please visit our forum at www.ConnectSafely.org ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspectiveConnectSafely
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentConnectSafely
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Larry Magid
 
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakRaising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakBex Lewis
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?Sarah Welstead
 
Impact of social media on teenagers
Impact of social media on  teenagersImpact of social media on  teenagers
Impact of social media on teenagersMiss Perfect
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009bermandry
 
Raising Children in a Digital Age (Evening Session)
Raising Children in a Digital Age (Evening Session)Raising Children in a Digital Age (Evening Session)
Raising Children in a Digital Age (Evening Session)Bex Lewis
 

Tendances (20)

Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...
 
Social networks for parents
Social networks for parentsSocial networks for parents
Social networks for parents
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Teen Content Creators
Teen Content CreatorsTeen Content Creators
Teen Content Creators
 
Teens and social media
Teens and social mediaTeens and social media
Teens and social media
 
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakRaising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
 
Teens and Social Media: An Overview
Teens and Social Media: An OverviewTeens and Social Media: An Overview
Teens and Social Media: An Overview
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?
 
Impact of social media on teenagers
Impact of social media on  teenagersImpact of social media on  teenagers
Impact of social media on teenagers
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009
 
Cyberbullying emtech
Cyberbullying   emtechCyberbullying   emtech
Cyberbullying emtech
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Raising Children in a Digital Age (Evening Session)
Raising Children in a Digital Age (Evening Session)Raising Children in a Digital Age (Evening Session)
Raising Children in a Digital Age (Evening Session)
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 

Similaire à Netsafetyoct30 Sound

Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesFrances Harris
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationjpl17
 
Tech Savvy Parenting
Tech Savvy ParentingTech Savvy Parenting
Tech Savvy Parentingbermandry
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensAndrew Kohl
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and CyberbullyingLouise Jones
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010paul
 

Similaire à Netsafetyoct30 Sound (20)

Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected Consequences
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Week 5
Week 5Week 5
Week 5
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Essay About Dealing With Cyberbullying
Essay About Dealing With CyberbullyingEssay About Dealing With Cyberbullying
Essay About Dealing With Cyberbullying
 
Informative Essay On Social Media
Informative Essay On Social MediaInformative Essay On Social Media
Informative Essay On Social Media
 
Tech Savvy Parenting
Tech Savvy ParentingTech Savvy Parenting
Tech Savvy Parenting
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital Citizens
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and Cyberbullying
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010
 

Dernier

COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 

Dernier (20)

COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 

Netsafetyoct30 Sound

  • 1. Youth Safety on the Social Web Larry Magid & Anne Collier Co-directors ConnectSafely.org Revised 1/09 © 2009 ConnectSafely.org
  • 2.
  • 4. On Web 2.0... -- Michael Kinsley, Slate.com, 11/27/06 “ ... everybody knows you’re a dog.”
  • 5.
  • 6.
  • 7.
  • 8. Not just MySpace & Facebook YouTube, MyYearbook, Bebo, Hi5 & many niche social network sites Ning: Allows users to create their own social networks, or mini-MySpaces. Allows porn (with splash page). Twitter & Plurk: Micro-blogging - 140 characters or less. Kind of like blended chat & IM. Twitter mostly adults, Plurk a little younger. Second Life & other virtual worlds : Users create avatars that interact in a virtual world. Hulu: Fast-growing video-sharing site (153 million video streams, 9/08); popular for viewing whole shows online And some are a bit more questionable …. JuicyCampus Gossip site, total anonymity, no rules.… Stickam : Social video-streaming site with live webcam chat.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Teens are alive today, thanks to social-networking sites… Plan To 'Shoot Up' School Foiled Jan 12, 2009: “Deputies in Transylvania County said they got a call from a sheriff's office in New York. A teenager there apparently came forward and said she met a 15-year-old on MySpace who said he had a dangerous plan.”
  • 16.
  • 17. It’s a trick question
  • 18.
  • 19. Question Do you agree that the growth in young people’s use of the Internet correlates with a rise in sexual abuse against children?
  • 20. SA Sub 1990-2005* Rate per 10,000 Children (<18) Source: NCANDS / Finkelhor & Jones, 2006 51% Decline (during the period of the Web’s existence) Answer: No Confirmed cases of child sexual abuse
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.