SlideShare une entreprise Scribd logo
1  sur  106
E- SAFETY TRAINING




RECOGNISING THE HARMS OF
    NEW TECHNOLOGY
Disclaimer, copyright and caveats
• This presentation has been written by Stephen Carrick-Davies and forms the basis of training
  he has delivered for Foster Parents and other working with vulnerable adults across the UK.
• Not all of the training content is included in this presentation and these slides are NOT a
  training package (either as a whole or in parts) and should not be used as such.
• It is shared on SlideShare for information and guidance only and to contribute to the debate
  about how the internet can amplify offline vulnerabilities.
• It’s great to share but it is not easy to strike the right balance between sharing and copying.
  Invariably these slides contain content developed by others and Stephen has sought to credit
  content (including photographs) which have come from other sources at the end of this
  presentation so please respect the authorship of these slides (See slide 101).
• The content on the slides which Stephen has personally written and produced he has
  assigned with Creative Commons license. Slides showing this mark                      can be used
  for non-commercial purposes, as long the content is credited. see www.creativecommons.org for more
  info.

• Ultimately Stephen hopes that these slides help others working with vulnerable young people
  and if you have questions or have other experience to share please contact Stephen directly
      (see e-mail address at the end).
“In the past you were what you owned. Now you are what you share.”
 Charles Leadbetter
Registration
• Attendance on ‘My Learning source’
Introductions
           Stephen Carrick-Davies
          • Ten years at Childnet International
          • Now an Independent Trainer/ Social
            Entrepreneur /Parent/Learner .....
           • "Stay hungry, stay foolish*"




                   But what about you ? ......
                                   *From   Steve Job’s talk at Stanford University
Find people in this room who can answer yes to these statements.
     If someone says no move on and speak to a different person !
   I have a Facebook                   I use Farmville on my                I don’t have a Facebook
   Account with over 250               Facebook page.                       account and don’t
   Friends.                                                                 particularly want one.

   Name ............................. Name ............................. Name.............................
                                                                         .
   I use my SMART phone                I use SMART phone just            I don’t have a SMART
   for e-mail.                         for Text messages.                phone and don’t want
                                                                         one !
   Name ............................. Name.............................. Name.............................
                                                                         .
   My children know more               My pet knows more                    I know more about the
   than me about the                   than me about the                    internet than my
   Internet. this course
   I came on                           internet!
                                       I came because my                    children. this course
                                                                            I came on
   Name.............................
   because I feel like I’m             Name..............................
                                       manager thought it                   Name.............................
                                                                            because I’m concerned
   being left behind.                  would help me !                      .
                                                                            about children’s welfare

   Name............................
                       Name ............................. Name.............................
                                                          .
When you have written one person’s name in each box shout “BINGO!”
What are your expectations and training needs ?
The 3 Rs of digital literacy
                               Our safety, conduct

                        Risk   & risky behaviours




                               Reputation
Responsibility                     Our privacy,
                                   security settings
                                   and our peer group
     Our leadership,
     ethical code and
     resilience
Structure and aims of training
Part I “Understanding” the new Reality !
                  Overview of ‘Social Media’ and web 2.0
                                                                                                                                                      REFLECT &
                  How technology is changing, and being changed                                                                                        THINK
                  Why the positive appeal for children
Coffee break --------------------------------------------------------------------------------------------------------

Part II Understanding the Risks
                          Overview of online risks for young people                                                                                   FACE- UP
                          Specific challenges for Southwark Staff                                                                                       & BE
                          Where we are vulnerable (privacy settings)                                                                                CHALLENGED
                          Case study to help us to see responses
Lunch       --------------------------------------------------------------------------------------------------------------------------------------


Part III Understanding our Responsibilities
                  Hands on training - Focus on Facebook                                                                                             INSPIRED &
                  Prevention & Response strategies                                                                                                  EQUIPPED
                  ‘PIE’ approaches and positive opportunities for
                   learning and change.
All through a mixture of slides, quotes, case studies, films, small group
exercises, Q&A, and links to practical resources.
By the end of this training I hope you
will have:
 A better understanding and “feel” for the way YP use
  the internet.
 Enthused about the positive opportunities for them.
 Understand the online issues for vulnerable children
 Hands’ on experience of using social media
 Challenged about the risks esp. cyberbullying
 Know what to do if there is a problem

Had opportunity to ask questions look at
other resources/ support organisations.
PART 1

Understanding this new reality
The appeal of new technology for
children
On a scale of 1- 10 rank yourself as to how
       confident you are using social media.


 1 ----------------------5----------------------10
                                                  “I taught
“What’s a mouse?”
                                              Mark Zuckerberg
                                               all he knows”
GROUP EXERCISE
Turn to your neighbour

What does the internet, social media
and mobile technology give to young
people ?


What is the single most important
thing to YP about being online ?
real
         The child’s online world
                          ANONYMITY
  ALWAYS ON                                      ACCESS THE
                                                   WORLD
                “If you took away
ADDICTIVE (?)   my mobile phone                  ACTIVE NOT
                you would take                    PASSIVE
                away a part of me”               MEDIUM


   AWAY FROM             ACCEPTANCE -        AMPLIFIER
  SUPERVISION             IDENTITY &       (gives children
                           STATUS              a voice)
Why the real world ?
“There are only two states for children
these days; they are either asleep or
online....even if they wake up in the
middle of the night they go online.”            Eric Schmidt 2010
                                            Executive Chairman of Google.



Children don’t consume media
they inhabit and have colonized it!

“We have created a child who will be so
exposed to the media that he will be lost
to his parents by the time he is 12.”
                                                  David Bowie 1972
                                                   Melody Maker
What is this real world like for vulnerable YP ?

“I have over 120 people on my BBM but I deleted
like 30 on Saturday cause I was angry and they
pissed me off so I just deleted them. Since I’ve had
my BlackBerry only 2 people have deleted me.”
                        Student from Pupil Referral Unit



                                                                   Play film




                                   Film at www.carrick-davies.com/research/films
GROUP EXERCISE
Turn to your neighbour

What was the greatest fear
for the yp in the film ?



How did it had got out of control ?

What would you do next if you were
in that position ?
My first mobile phone !




I used it twice
a year !
“Anything that gets
invented after you’re
thirty is against the
natural order of things
and the beginning of
the end of civilisation
as we know it
….until it’s been
around for about ten
years when it gradually
turns out to be alright
really.”
              Douglas Adams
NOW YOU EVEN HAVE A DIFFERENT PHONE
LANGUAGE !

•   POS    Parent over shoulder
•   I8u    I hate you
•   AATK   Always at the keyboard
•   LOL    Laugh out loud


My Xmas hols wr CWOT. B4 we used 2go2 NY 2C my
bro, his GF & 3 kids ;) FTF. ILNY it’s a gr8 plc.
My family’s first TV
AGE RESTRICTIONS
Gamechanger 1 : Global




FACEBOOK’S GLOBAL BILLION
Gamechanger 2: Converging
Gamechanger 3: Transforming politics/society/business




                      Check out this video overview at
                      http://www.youtube.com/watch?v=x0EnhXn5boM
Gamechanger 4: Revolutionising teacher/learner!


                                             “A lot of kids want to play games
                                             but now we want to MAKE them !
                                              But where do you go for advice?
                                             Not many parents have written
                                             apps !”
                                                                 Thomas Suarez



http://www.youtube.com/watch?v=ehDAP1OQ9Zw




                         Bustin Jieber ‘Whack-a-mole’
SMART PENS – the latest ‘Internet of Things’
APPLICATIONS           PHOTOS/TAGS
    NEWS FEEDS                                      Comment and
    “boast by post”       Huge range of apps
                                                   Tag photos face
                                                     recognition
Events/ Groups
                                                     TIME LINE

   FRIENDS
                                                     LIVE CHAT
 Find, link, be in
                                                    Superseding IM
constant contact
+ on your mobile
                                                      VIDEO
                                                    link and embed
MESSAGES
Superseding E-mail         WHO’S ONLINE
                        Know who is online now!
                                                  Social location

             ALL FOR FREE …… BUT ….WHAT PRICE IS FREE ?
Facebook Timeline

                                                           Searchable
                                                            by years

                                                              Check
                                                            regularly
                                                           because the
                                                             settings
                                                             change


                                                             Re-check
                                                            your privacy
                                                           settings using
                                                             ‘View As’
                                                              function



The importance of privacy settings
31% of 12-15 year olds don’t use privacy settings on their
social networking profiles – Ofcom Media literacy Report 2009
• Searching for yourself – example
See pages 106- 107 in Vodafone’s Digital Parenting magazine




BUT ... Remember privacy options and controls change frequently!
A word about BBM
          • Be careful with your BBM PIN
          • Be careful of ‘Screen Munching’
          • Use the tools – like delete contact
            and block future requests.
          • Make sure your blackberry has a
            password

          See www.carrick-davies.com for film and
           tutorial. (bottom of the page)
See pages 54 – 59 in Vodafone’s Digital Parenting magazine
A word about games
           • The ratings are there for a reason.
           • Anyone who sells a designated 12+
             title to younger children will face
             fines of up to £5,000 /jail.
           • Recognise the ‘compulsion’ issues.
           • Younger siblings and friends.
           • Misogynistic messages and casual
            cruelty.
The game changer
PORTABLE          A GREAT          STATUS
PRIVATE +        PACIFIER !        SYMBOL
PERSONAL

  ANYTIME,                        FUN &
 ANYWHERE                         GAMES
  ANYWAY
                                 PRACTICAL
EDUCATIONALLY                     USEAGE
  VALUABLE !                    photo/video
                   INTER
                                  Apps etc
                GENERATIONAL
Let’s break for coffee 15 minutes
PART II

Understanding the risks
                (not the same thing as harm!)
All technology is neutral




                            What would
                            Gandhi have
                            done if he had a
                            FACEBOOK
                            account ?
Our perception of danger


Most abuse takes place in the
context of a family or close
relative.
What terms do we use to explain this space ?
               An incubator ?

                  FORWARDED
                 COMMENTED ON
UPLOADED                            AMPLIFIED

                   COPIED
                   STORED
                  MORPHED/
                   CHANGED

MUNCHED           LIE DORMANT
 (captured)
                                   RE- BROADCAST
GROUP EXERCISE
Feedback

What do you think about this
description of the Internet ?



What sort of things could
be hatched ?
Classifying the risks to children online
Original 3 Cs Classification by
‘EU Kids’ online project          Commercial         Aggressive        Sexual          Values

CONTENT                           Adverts            Violent and     Pornographic     Bias
Child as Recipient                Spam               hateful         unwelcome        Racist
                                  Sponsorship        content         sexual content   Misleading
                                  Personal info                                       info or advice

CONTACT                                                              Meeting          Self harm
                                  Tracking           Being bullied
Child as Participant              Harvesting         harassed or     strangers        Unwelcome
                                  Personal info      stalked         Being            persuasions
                                                                     groomed

CONDUCT
                                  Illegal            Bullying or     Creating and     Providing
Child as Actor
                                  downloading        harassing       uploading        misleading
                                  Hacking Gambling   another         inappropriate    info/advice
                                  Financial scams                    material
                                  Terrorism
“Sexting” = teens sharing nude photos via mobiles and web. The practice can
have serious legal and psychological consequences

                        Commercial              Aggressive     Sexual         Values

 CONTENT                                                     Pornographic
 Child as Recipient      Online grooming is a                unwelcome
                         criminal offence                    sexual content

                        Contact
 CONTACT                www.ceop.gov.uk
                                                             Meeting          “So take a dirty
 Child as Participant   if you have concerns                 strangers        picture for me,
                                                                              Take a dirty picture
                        about inappropriate                  Being            Just take a dirty
                        communication from an                groomed          picture for me
                                                                              Take a dirty picture”
                        adult to a minor.
 CONDUCT                                                                      From Taio Cruz song
                                                             Creating and
 Child as Actor         “One-third of those who              uploading        No 6 in the UK charts
                                                                              April 2010.
                        sexually abuse children are          inappropriate
                        just children themselves.”           material
                        BBC Newsnight programme March 2010



                        21,630 BEBO members had the name “Porn Star”
How the risks ‘migration’ from online to
                                    offline can affect vulnerable YP
Original 3 Cs Classification
by ‘EU Kids’ online project    Commercial     Aggressive  Sexual
                                                    CRIMINAL                           Values

CONTENT
Child as Recipient                                             OF THE 1,984 PEOPLE
                                                               CHARGED AFTER RIOTS:

                                                                53% were under 20 years old

CONTACT                                                         42% received free school meals
Child as Participant
                                                                                           (16% nat. average)
                                                                66% of them had some special
                                                               education needs           (21% of all pupils)
CONDUCT
Child as Actor                                                   Figures from the Ministry of Justice
                                                                carried out by the Howard League for
                                                                            Penal Reform
                                                                      (published in Guardian 26.11.11)



                               BEING IN THE WRONG PLACE AT THE WRONG TIME & “BAD LUCK”
Film



                                              Play film




Film conceived and acted by yp from Croydon
GROUP EXERCISE
Turn to your neighbour

What was the greatest fear
for the yp in the film ?



What would you do if you were in
teacher in this situation ?
Classifying the risks to children online
                       Commercial   Aggressive                  Sexual                    Values

CONTENT                             Violent and
Child as Recipient                  hateful
                                    content


                                                                          22% of yp aged 11-
CONTACT                                                                   18 report having
                                    Being bullied
Child as Participant                harassed or                           been cyber bullied.
                                    stalked
                                                                           It ruins lives.
                                                                          YP may not disclose
CONDUCT                                                                   that it is happening
Child as Actor                      Bullying or
                                    harassing
                                    another



                                    Classification by ‘EU Kids’ online project and referenced in the Byron Report
“Sticks and stones.... But words ...?”




From US Ad Council at
http://www.youtube.com/watch?v=bdQBurXQOeQ
Ways in which Cyberbullying is different from offline bullying?

        OFFLINE                                                                                     ONLINE

 Home was sanctuary                                                        Can be 24/7
                                                                           Usually words/pictures
  Often physical
                                                                           More complex + fast changing, invisible
  Clear to see intention                                                   audience, social rivalry, steganography*
                                                                           Power and roles can shift +
  Bully strong/victim weak                                                 change quickly even during activity.
 Local & intimate                                                           Barriers collapse with potential mass
                                                                            distribution but also wider help.
  See the impact
                                                                            Don’t see impact (lack of empathy)
 Bystanders intervene                                                       Bystanders take part (using
  Often silent                                                              mobile/SNS)
                                                                            It can leave a trail ! (keeping evidence)
  Closure is easier                                                         Closure harder - permanent, archivable
* Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects
the existence of the message, a form of security through obscurity.
Why YP may be scared of reporting abuse ?


• “It was nobody else’s business”
• “Didn’t think it was serious or wrong”
• “Didn’t want parents/friends to find out”
• “Was frightened”
• “Didn’t think I would be believed”
• “Had been threatened by the abuser”
                                      Source: Child Maltreatment in the UK Cawson 2000


 Abuse on the internet/mobile phone


           • “My parents don’t get the internet”
           • “Maybe it was my fault ! (blur)”
           • “Scared if computer is confiscated”
RESPONDING TO THE VICTIM

        Need for reassurance – THIS IS BULLYING !

           Practical advice:
              RED Don’t retaliating,
              Orange – Save the evidence
              Green – Tell someone (who?)




See advice, resources and guidance at
Childnet’s www.digizen.org website
GROUP EXERCISE
The young person who you are responsible for (let’s say she’s
a 12 year old girl) tells you that her “friends” in her class took
video clip of her at a sleep over pyjama party on their phones
which is now being circulated and she thinks it is now posted
on a social networking site.

•What advice would you give to her ?
•Who should the girl report this to ?
•Is this a school issue ?
•How would you go about trying to remove this content ?
•What if those who posted it up have circulated it more
widely ?
GROUP EXERCISE
    A 14 year old boy in your
    school has lost weight and
    you have concerns that he
    is self-harming.

•   What could be happening online ?
•   What could the online pressure be ?
•   What online support could help him ?
•   What if this person was posting images of himself
    on social networking and pro-harm sites ?
WAYS IN WHICH
THE INTERNET
 CAN AMPLIFY
VULNERABILITY




                  10 WAYS IN
                  WHICH THE
                INTERNET CAN
                   AMPLIFY
                    OFFLINE
                VULNERABILITY
‘Vulnerable’              This is complex because:

All children are different so there are         Vulnerability is not static - All
dangers in making broad statements.             children can be vulnerable at
                                                different stages
Many children are neglected which is
harder to spot yet makes them                   The categorisations of risk offline
vulnerable                                      do not necessarily mirror online
The paradox that over-       What about         experience (eg a disabled yp
protected children can be     vulnerable        may be empowered online as the
more vulnerable online.        adults ?         internet can be ‘leveller’

The more a child uses the internet the more they can become confident and
possibly complacent and feel ‘invincible’ and don’t feel they are at risk .

Those who have experienced offline risk and        Constantly changing
abuse may be more resilient and able to            technologies. Eg, Location services
protect themselves online or may not be            HOWEVER WE CAN IDENTIFY
affected so much by the risks they encounter.      A FEW COMMON FEATURES....
Low self-
                                          Fluid learning
                    confidence.
                                        environment and
                  Identity seen to
                                        gaps in education
                      be part of
                                         and induction
                     ‘outsiders’


                                                              Experience
  Lack of                                                       abusive
 supportive                                                 relationships or
adults in their                                              environments
    lives                                                   including anger
                             MUNCH
                             POKE
     More
unsupervised
                              PING!                       Influences of
                                                       alcohol, drugs and
  time, fewer                                          gang culture. Risk
structures and                                         takers and at risk
 boundaries




                      See www.carrick-davies.com
“Many of the young people I work with are massive risk takers,
impulsive to the extreme and often use alcohol and/or drugs. On
average they first engage in sexual activity at a far younger age than
other students. They also have huge amounts of unsupervised time on
their hands, often till very late at night. I teach many YP who are half-
asleep as they have been online till gone 3am.”
 PRU staff member from ‘MPP’ report
                                 LE                   L
                                                   RO
                            RAB               ON
                                                 T
                     VULNE               IN C
                                       S
                  AS              SA
             HEM           E LVE
         EET            MS
      YS            THE “I have over 120 people on my BBM but I
   MA           SEE
WE         MA
              Y             deleted like 30 on Saturday cause I was
         Y
   T THE                      angry and they pissed me off so I just
 BU                     deleted them. Since I’ve had my BlackBerry
                               only 2 people have deleted me.”
                                               PRU student from ‘MPP’ report
WAYS IN WHICH
 THE INTERNET
  CAN AMPLIFY
 VULNERABILITY
                      Unmediated Contact




                                                    Guardian Newspaper article 19 June 2010

Children who have been fostered can suddenly receive messages from siblings, birth
parents, or those who want to trace them for potentially harmful reasons.
WAYS IN WHICH
  THE INTERNET
   CAN AMPLIFY
  VULNERABILITY
                     Social Location




Young People who may need to escape from an abusive relationships need to think
carefully about how they make their ‘places’ public.
WAYS IN WHICH
   THE INTERNET
    CAN AMPLIFY
   VULNERABILITY
                       Exclusion from the ‘norm’




                                                           Eg Facebook Timeline
There are lots of online services which celebrate our ‘journey’. How do children who
don’t know their birth parents, may not have an early photo of themselves feel in these
‘boast by post’ environments ?
WAYS IN WHICH
   THE INTERNET
    CAN AMPLIFY
   VULNERABILITY
                         Blackmailing “gifting” &
                             grooming by peers




A young person from a disadvantaged background may be targeted with ‘gifts’ of
mobile phones, mobile payment cards etc, by older young people but in exchange for
‘favours’ which they ‘cash in’ later (including prostitution, trafficking or illegal
activity). If it sounds to good to be true .... it’s probably is (they want something ! )
Search ‘NSPCC survey on teen partner violence’ for more info
“Any A/C holders looking
 WAYS IN WHICH                                               to make a quick grand get
 THE INTERNET
                                                             at me. No time wasters.”
  CAN AMPLIFY
 VULNERABILITY        Earlier adopters ?                    Message on BBM about
                                                             bank scams (fraud!)




                                                                   Screen Munch !




Many vulnerable young people can be early adopters of tools and services which are
not yet regulated or in the public conscious. For example BBM
How will QR codes be mis-used ?
WAYS IN WHICH
   THE INTERNET
    CAN AMPLIFY
   VULNERABILITY
                       Being ‘nudged’ into gangs




Vulnerable young people who are risk takers,
impulsive or under the influence of alcohol and/or
drugs and less supervised, can be more easily          ALL CHILDREN WILL
drawn into illegal activity including being ‘nudged’   LEAVE A FOOTPRINT
through technology.
                                                       EXCEPT SOME WILL BE
                                                       IN MUDDIER SAND!
WAYS IN WHICH
THE INTERNET
 CAN AMPLIFY
VULNERABILITY
                 Negative digital footprint




                            ALL CHILDREN WILL LEAVE A
                            DIGITAL FOOTPRINT
                            BUT SOME WILL BE MUDDIER
                            THAN OTHERS
                            Those who are supported can compensate
                            and build positive online footprint but
                            what about those who aren’t ?
WAYS IN WHICH
THE INTERNET
 CAN AMPLIFY
VULNERABILITY    Low Resilience

                                    “When my pinger’s gone
                                    to sleep that’s when I’ll
                                    go to sleep.”




Young people need to be cherished, have the right amount of
sleep and healthy food. What happens when you are running on
empty ?
•WAYS IN WHICH
  THE INTERNET
  CAN AMPLIFY
  VULNERABILITY
                     Special needs & learning difficulties

                                                                    Attachment
                                                                        Theory




                                                                    Attachment

Some children with emotional or behavioural difficulties, attachment
difficulties, and other complex needs, may be particularly vulnerable online.
EG those with Autistim Spectrum Disorder may make literal interpretations
of content, which will affect how they respond.
Others with complex needs may not understand the concept of friendship,
and therefore trust everyone implicitly. Some children with SEN or
disabilities may not recognise that they are being bullied or appreciate how
their own online behaviour may be seen by someone else as bullying .
•WAYS IN WHICH
                     Low levels of Language & Literacy
  THE INTERNET
  CAN AMPLIFY
  VULNERABILITY




Lack of literacy skills, can mean
that messages are unclear,
ambiguous or misunderstood


We must not assume that all YP are confident “digital natives” and we must also
recognise that one in six people in the UK struggle with literacy (below the level
expected of an eleven year old). Hence being able to complete a ‘REPORT ABUSE’
form or read instructions about safety, privacy and ‘terms and conditions’ are real
barriers for many young people.
Do YP recognise the link between reading and being able to be safe ?
GROUP EXERCISE

In pairs discuss
Do you recognise these 10 offline
vulnerabilities and agree that they
can be amplified online ?
Can you think of positive ways in
which the Internet minimises offline
vulnerabilities?
How could you begin to talk to the YP
you look after about these issues?
Questions and feedback on the
      morning session




Let’s break for lunch (50mins)
PART III

UNDERSTANDING OUR
RESPONSIBILITIES




Hands on training
AN ABSENCE OF KNOWLEDGE IS NOT
AN EXCUSE FOR AN ABSENCE OF
RESPONSIBILITY AND CARE.

         WHAT IS POTENTIALLY
         CRIMINAL, HARMFUL,
         INAPPROPRIATE OR ILLEGAL
         OFFLINE, IS THE SAME ONLINE.


         ULTIMATELY THIS COMES
         DOWN TO LEADERSHIP.
SCHOOLS




In the context of an inspection,
e-safety may be described as the
school’s ability:
to protect and educate pupils and
staff in their use of technology
to have the appropriate
mechanisms to intervene and
support any incident where
appropriate.
See articles at
http://www.guardian.co.uk/education/2009/sep/23/teacher-pupil-sexual-relationship?INTCMP=SRCH
http://www.bbc.co.uk/newsround/14542636
http://www.bbc.co.uk/news/uk-scotland-16379494
Assemblies, tutorial time, personal,
                                   social, health and education lessons,
                                   and an age-appropriate curriculum
                                   for e-safety


                                                          Pupils were more
Schools need                                              vulnerable overall
to make good                                              when schools used
use of the                                                locked down
views of pupils                                           systems because
and their
                         WHAT                             they were not
parents to              DOES                              given enough
develop their                                             opportunities to
e-safety                 GOOD                             learn how to
provision.                                                assess and manage
                        E-SAFETY                          risk for
                          LOOK                            themselves.
                          LIKE?
The outstanding
schools recognised                                In the outstanding
that, relationships                               schools, senior leaders,
with families, needed                             governors, staff and
to keep developing to                             families worked together
support e-safety at                               to develop a clear strategy
home.                                             for e-safety. Policies were
                                                  reviewed regularly in the
                                                  light of technological
                                                  developments.
10 THINGS SCHOOLS CAN DO TO REACH PARENTS
1. Update and publicise your school’s Acceptable Use Policy
    (AUP) stating how you use technology including mobiles and
    photographs . Include e-safety advice on this.
2. Include news items in school newsletter especially at time of
    national news story or concern
3. Advice posters in the corridors/playground.
4. Survey – using ‘Survey Monkey’ or students to get feedback
                which you can then respond to (more buy in).
5. Advice and reporting buttons on School website
6. Regular sessions with students with take home advice
7. Assembly or play involving pupils which parents come to.
8. Creative sessions during mainstream activities
    (winter or summer fair, SATs meetings, trips etc)
9. Re-enforced during induction sessions when a child
    joins the school AND staff induction.
10. Investing in free resources Eg Digital Parenting.
The role of schools in respond to Cyberbullying ?

• All UK schools must have an anti-bullying policy by law.
• If your child is bullied online by other children in a
  school even if it takes place outside of school hours or
  holidays it IS a school issue.
• Ofsted inspects on safeguarding very closely (limiting
  factor !)
• Government Guidance on cyberbullying is
  comprehensive and includes bullying of school staff!
• Increasingly vital to have clear whole-school E-Safety
  and Acceptable Use Policies (AUPs)
• Involving parents is crucial to a ‘whole-school’ policy
PIE    all 3 ‘legs’ are vital

                                Policies
                     E-safety policy, Acceptable Use Policy,
                     Anti-Bullying policy, Mobile use policy




Infrastructure                                            Education
Managed learning environment                      Whole-school ongoing education
with high quality access and                      & prevention programme which is
equipment which is filtered,                      targeted at both pupils, parents
monitored and supervised.                         and the whole school work-force.
PREVENTING                                         RESPONDING

 Understanding and accepting the       Supporting the victim – need for
  impact of cyberbullying.               reassurance.
 Updating existing policies and        Practical advice and support such as
                                         saving evidence, not retaliating,
  practices. (AUP anti-bullying)
                                         informing parents.
 Making reporting easier - includes    Investigate and record incidents,
  advice about removal of content.       identify the bully.
  (industry support)                    Working with the bully and sanctions
 Promoting the positive use of          (including technology specific).
  technology.                           Involve Parents /carers
 Evaluating impact of prevention
  activities.

      Underpinned by effective education and awareness
Social media challenges for teachers
• Recent TES survey
  found that 9% of
  teachers were friends
  with pupils on SNS*.

• General advice from unions and GTS is:
  Do not ‘friend’ pupils on personal accounts or ask to be
  added to their contact lists. WHY ?
 You could make yourself                     You could make yourself                      You could make yourself
 vulnerable by sharing your                   vulnerable by being able to                   open to allegations of
 personal information (and                    access their personal                         inappropriate contact or be
 that of your friends)                        information                                   misunderstood.

  http://community.tes.co.uk/forums/t/463065.aspx?s_cid=16
 See http://www.childnet.com/kia/downloads/Social-networking.pdf for Childnet/TDA leaflet
OTHER WAYS TO PROTECTING YOURSELF

1. Update your AUPs stating how and when personally owned
   equipment (including camera phones) can be used.
2. Make sure you have a strong password and set a password or
   pin for your phone. Increasingly important for Facebook
   ‘Fraping’
3. Close down computers quickly if you have to leave a room and
   don’t allow cookies to ‘remember your password’
4. Do not post information about yourself publically that you
   wouldn’t want employers, colleagues, pupils or parents to see.
5. Make sure you do not retaliate but keep all records – screen
   prints and record time, date & website addresses
6. Report any incident to the appropriate member of staff
   promptly
7. Make sure the school informs parents about incidents and
   delivers appropriate sanctions
GROUP EXERCISE


SETTING UP A
FACEBOOK PAGE
Dilemmas and decisions:
Setting up a Facebook account




                                First name:
                                Surname:
                                Sex:
                                Dob: HAVE TO BE OVER 13
                                E-mail: - see next
So easy to set up a free e-mail account




                                          New
                                          G-Mail
                                          account in
                                          3 mins
As soon as you join you need to connect




                                     FB can migrate
                                     all your
                                     existing e-mail
                                     contacts
                                     automatically
HANDS ON EXPERIENCE
LET’S SET UP A FACEBOOK ACCOUNT TOGETHER




                                           Let’s do this
                                           together
What online profile and identity shall we give ?




                        Questions
                        What age shall we give her ?
                        What information shall we make
                        public ?
                        What should we keep private ?
                        What friends shall we link her to?
                        Shall we let her update from her
                        mobile ?
GROUP EXERCISE – In Pairs

Having completed that exercise discuss the
challenges and dilemmas and imagine yourself as a
13 year old uploading a profile for the first time.
•Do you say you are “in a relationship”?
•Who do you accept as your friends ?
•What groups would it be cool to join ?
•What level of privacy would you give yourself ?
REACHING PARENTS/CARERS




 “Parents and the home environment they create are the
 single most important factor in shaping their children’s
        well-being, achievements and prospects”
              Alan Johnson (when Education Secretary)
MODELLING GOOD BEHAVIOUR
“Present but absent”

Kids don't do what you say
they do what you do !
Try to ...Be consistent and set examples
yourself; - eg no phones at the table,
mobiles on the landing at night.

Try to... Think about your history browser !

Try to ...detox yourself – leave it at home on
holiday, try not to take it to the cinema !

Try to ...be consistent across ratings.
They are there for a reason.
Influence of older siblings/uncles, aunts.... !
“it’s not fair ...”

Recognise the influence
and pressure and their
need to differentiate
themselves.

Recognise ratings are
there for a reason ! – The
ages are not based on
the age of ability !

Recognise that underage
                             “You can’t choose your kid’s best
use of gaming brings up
                             friend’s parents.”
important issues which you
need to have a view on.      Recognise other parents will have
                             different views and values from you.
CE
  VI Conversations about
AD
      Risk
“Do you know who all your online friends are offline?”
“Do you know how to block someone on Facebook?”
“Do you have a PIN on your mobile phone?”
“Do any of your friends send photos of themselves?”
“Do you know how to save that sort of evidence?”
“Would you report that at school/CEOP?”
CE
  VI Conversations about
AD
     Reputation
   “Remember what goes online stays online”
   “When did you last check your privacy settings?”
   “Can you help me check my settings”
   “Are you changing your password regularly?”
   “Do you know the best way to get offending
    material taken down?”
CE
  VI
AD      Conversations about
      Responsibility
 “Have you come across any good social
  initiatives?”
 “What do you think about the KONY 2012
  campaign?”
 “What would you do as parent about how long you
  should stay online?”
 “I trust you to make good decisions, but I also need
  to learn from you.”
The importance of reaching parents/carers


   For Parents                                      For Young people


• Be aware that your children may as      • Always respect others be careful what
  likely cyberbully as be a target of       you say.
  cyberbullying.                          • Think before you send, what goes
• Talk to your children and understand      online stays online !
  the ways in which they are using the    • Treat your password like your
  internet and mobile phones.               toothbrush !
                                          • Learn how to block the bully and save
• Use the tools on the services
                                            the evidence
• Remind your children not to retaliate   • Make sure you tell someone
• Remind yp to keep the evidence          • Support others – how would you feel
• Know where to report (see later)          if no-one stood up for you !
                                          • Encourage them to produce their own
                                            peer advice media !
Useful resources for parents




                               Interactive video tutorial
                                for parents
                               Designed for schools to
                                give away free (1.5
                                million copies)
                               Promoting the benefits of
                                technology
                               In 9 languages
                               Pre-loaded for new users



                                                  SHOW
Dynamic education programs and ways for YP to
   understand the issues (including resilience)




See http://whatsyourstory.trendmicro.com/internet-safety/pg/winners-2011)

                                                                   Or do a Linked In positive profile exercise to help
                                                                   vulnerable YP get a positive online reputation
Useful websites
          1) UK law Enforcement agency and part of VGTF
          www.ceop.gov.uk

          2) UK Council for Child Internet Safety
          www.dcsf.gov.uk/ukccis/


          3) Childnet International
          www.childnet.com/ including Cyberbullying film

          4) British Association for Adoption and Fostering
          www.baaf.org.uk - including advice on Facebook
GROUP EXERCISE !        -   Discuss in pairs




What has been ONE thing which you
have found helpful from torday’s
training ?

What ONE thing will you do as a result
of this training ?
EVALUATION
         Please give feedback.
                   
And Finally….
• Questions about anything which has come up
  today ?
Have we done what we said we would ?


A better understanding and “feel” for the way YP
 use the internet.
Enthused about the positive opportunities for them.
Understand the online issues for vulnerable children
Hands’ on experience of using social media
Challenged about the risks esp. cyberbullying
Know what to do if there is a problem
CAF as Referral to CSC
•   The inter agency referral form to Children's Social Care (CSC) is being replaced
•   The CAF assessment record now replaces the inter agency referral form
•   If you complete a CAF assessment record and send it to Children’s Social Care, it should
    clearly outline your understanding of children and families needs. It will be helpful to
    also indicate what has been tried already to meet these needs
•   We will also be seeking clarity about what support you feel is required to meet the
    needs you have identified
•   Where there is a safeguarding concern a referral should be made immediately
•   We are happy to be contacted or consulted where there is a concern about a child
    (Social Care Duty: 020 7525 1921)

If you are using the record to make a referral to Children’s Social Care, please send it to
    RAD@southwark.gov.uk

•   CAF continues to be used as part of providing early help in Southwark. The record
    remains the mechanism by which you assess needs in partnership with children, young
    people and their families; and the method by which targeted services understand why
    you have requested their involvement. Training is available on
    www.mylearningsource.co.uk
I’m sticking around for a further
hour to help anyone individually
with questions or their action plans
THANK YOU !          Complete Evaluation
                     forms

                                        MUNCH
                                         PING
                                        POKE!


                                 See my current work re
                                 social media and vulnerable
                                 yp on my website
                                 www.carrick-davies.com
stephen@carrick-davies.com

Contenu connexe

Tendances

Nano technology 6 abstract
Nano technology 6 abstractNano technology 6 abstract
Nano technology 6 abstractRameez Raja
 
Business on TikTok: After the Hype, the New Norm?
Business on TikTok: After the Hype, the New Norm?Business on TikTok: After the Hype, the New Norm?
Business on TikTok: After the Hype, the New Norm?Vanksen
 
3dtotal speed sculpting zbrush tutorial.
3dtotal speed sculpting zbrush tutorial.3dtotal speed sculpting zbrush tutorial.
3dtotal speed sculpting zbrush tutorial.Zbrush tiếng Việt
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
Website Codes and Conventions
Website Codes and ConventionsWebsite Codes and Conventions
Website Codes and ConventionsJohn DF
 
Tik Tok Trend Report by Open Influence
Tik Tok Trend Report by Open InfluenceTik Tok Trend Report by Open Influence
Tik Tok Trend Report by Open InfluenceShareDocView.com
 
Binance Cryptocurrency Trading Guide
Binance Cryptocurrency Trading GuideBinance Cryptocurrency Trading Guide
Binance Cryptocurrency Trading GuideramadanSalman
 
1 introduction to uiux
1 introduction to uiux1 introduction to uiux
1 introduction to uiuxSudirman
 
Metaverse - The Future of Marketing and Web 3.0 (1) Linked.pdf
Metaverse - The Future of Marketing and Web 3.0 (1) Linked.pdfMetaverse - The Future of Marketing and Web 3.0 (1) Linked.pdf
Metaverse - The Future of Marketing and Web 3.0 (1) Linked.pdfthetechnologynews
 
Typography and User Experience - WCSF
Typography and User Experience -  WCSFTypography and User Experience -  WCSF
Typography and User Experience - WCSFSara Cannon
 
Social Marketing and Leveraging Influencers
Social Marketing and Leveraging InfluencersSocial Marketing and Leveraging Influencers
Social Marketing and Leveraging InfluencersBolaji Okusaga
 
Modern Brand Building
Modern Brand BuildingModern Brand Building
Modern Brand BuildingPaul Isakson
 
Using Social Software To Get Your Word Out
Using Social Software To Get Your Word OutUsing Social Software To Get Your Word Out
Using Social Software To Get Your Word OutMatt Ganis
 

Tendances (20)

Nano technology 6 abstract
Nano technology 6 abstractNano technology 6 abstract
Nano technology 6 abstract
 
Business on TikTok: After the Hype, the New Norm?
Business on TikTok: After the Hype, the New Norm?Business on TikTok: After the Hype, the New Norm?
Business on TikTok: After the Hype, the New Norm?
 
3dtotal speed sculpting zbrush tutorial.
3dtotal speed sculpting zbrush tutorial.3dtotal speed sculpting zbrush tutorial.
3dtotal speed sculpting zbrush tutorial.
 
Computer security
Computer securityComputer security
Computer security
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Website Codes and Conventions
Website Codes and ConventionsWebsite Codes and Conventions
Website Codes and Conventions
 
Tik Tok Trend Report by Open Influence
Tik Tok Trend Report by Open InfluenceTik Tok Trend Report by Open Influence
Tik Tok Trend Report by Open Influence
 
Binance Cryptocurrency Trading Guide
Binance Cryptocurrency Trading GuideBinance Cryptocurrency Trading Guide
Binance Cryptocurrency Trading Guide
 
1 introduction to uiux
1 introduction to uiux1 introduction to uiux
1 introduction to uiux
 
What is web3?
What is web3?What is web3?
What is web3?
 
NFTS Explained
NFTS ExplainedNFTS Explained
NFTS Explained
 
Metaverse - The Future of Marketing and Web 3.0 (1) Linked.pdf
Metaverse - The Future of Marketing and Web 3.0 (1) Linked.pdfMetaverse - The Future of Marketing and Web 3.0 (1) Linked.pdf
Metaverse - The Future of Marketing and Web 3.0 (1) Linked.pdf
 
Typography and User Experience - WCSF
Typography and User Experience -  WCSFTypography and User Experience -  WCSF
Typography and User Experience - WCSF
 
Facebook ppt
Facebook pptFacebook ppt
Facebook ppt
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Social Marketing and Leveraging Influencers
Social Marketing and Leveraging InfluencersSocial Marketing and Leveraging Influencers
Social Marketing and Leveraging Influencers
 
Modern Brand Building
Modern Brand BuildingModern Brand Building
Modern Brand Building
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
Using Social Software To Get Your Word Out
Using Social Software To Get Your Word OutUsing Social Software To Get Your Word Out
Using Social Software To Get Your Word Out
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

En vedette

eSafety for Teachers
eSafety for TeacherseSafety for Teachers
eSafety for TeachersMark S. Steed
 
Protection Insurance Sevices 2010 2011
Protection Insurance Sevices 2010  2011Protection Insurance Sevices 2010  2011
Protection Insurance Sevices 2010 2011shobaaj
 
Micro Soft Staff It Presentation
Micro Soft Staff It PresentationMicro Soft Staff It Presentation
Micro Soft Staff It Presentationacraig21
 
E safety Presentation for foster carers by stephen carrick-davies
E  safety Presentation for foster carers by stephen carrick-daviesE  safety Presentation for foster carers by stephen carrick-davies
E safety Presentation for foster carers by stephen carrick-daviesStevecd
 
Training and awareness raising in Critical Infrastructure Protection & Resili...
Training and awareness raising in Critical Infrastructure Protection & Resili...Training and awareness raising in Critical Infrastructure Protection & Resili...
Training and awareness raising in Critical Infrastructure Protection & Resili...Global Risk Forum GRFDavos
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 

En vedette (8)

eSafety for Teachers
eSafety for TeacherseSafety for Teachers
eSafety for Teachers
 
Protection Insurance Sevices 2010 2011
Protection Insurance Sevices 2010  2011Protection Insurance Sevices 2010  2011
Protection Insurance Sevices 2010 2011
 
Micro Soft Staff It Presentation
Micro Soft Staff It PresentationMicro Soft Staff It Presentation
Micro Soft Staff It Presentation
 
E safety Presentation for foster carers by stephen carrick-davies
E  safety Presentation for foster carers by stephen carrick-daviesE  safety Presentation for foster carers by stephen carrick-davies
E safety Presentation for foster carers by stephen carrick-davies
 
Powerpoint group1.1
Powerpoint group1.1Powerpoint group1.1
Powerpoint group1.1
 
Pgce e safety 2016
Pgce e safety 2016Pgce e safety 2016
Pgce e safety 2016
 
Training and awareness raising in Critical Infrastructure Protection & Resili...
Training and awareness raising in Critical Infrastructure Protection & Resili...Training and awareness raising in Critical Infrastructure Protection & Resili...
Training and awareness raising in Critical Infrastructure Protection & Resili...
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 

Similaire à E safety training for staff who work with children and young people - Stephen Carrick-Davies 2013

Safeguarding children online training from steve c-d for southwark diocese-...
Safeguarding children online   training from steve c-d for southwark diocese-...Safeguarding children online   training from steve c-d for southwark diocese-...
Safeguarding children online training from steve c-d for southwark diocese-...Stephen Carrick-Davies
 
E safety training for lewisham arts and education network by stephen carrick...
E  safety training for lewisham arts and education network by stephen carrick...E  safety training for lewisham arts and education network by stephen carrick...
E safety training for lewisham arts and education network by stephen carrick...Stephen Carrick-Davies
 
E safety training for southwark staff - stephen carrick-davies january 2013
E  safety training for southwark staff - stephen carrick-davies january 2013E  safety training for southwark staff - stephen carrick-davies january 2013
E safety training for southwark staff - stephen carrick-davies january 2013Stephen Carrick-Davies
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013Stevecd
 
Dwe m2 self-image online offline identities
Dwe m2   self-image   online offline identities Dwe m2   self-image   online offline identities
Dwe m2 self-image online offline identities Data-Set
 
#ACPA15 SNEAK PREVIEW of What Happens on Campus Stays On YouTube By @equalman
#ACPA15 SNEAK PREVIEW of What Happens on Campus Stays On YouTube By @equalman#ACPA15 SNEAK PREVIEW of What Happens on Campus Stays On YouTube By @equalman
#ACPA15 SNEAK PREVIEW of What Happens on Campus Stays On YouTube By @equalmanLaura Pasquini
 
Future Kids Future Customers v2
Future Kids Future Customers v2Future Kids Future Customers v2
Future Kids Future Customers v2Andy Hadfield
 
How Can We Stop the Information Economy From Leaching the Value Our of Our Ha...
How Can We Stop the Information Economy From Leaching the Value Our of Our Ha...How Can We Stop the Information Economy From Leaching the Value Our of Our Ha...
How Can We Stop the Information Economy From Leaching the Value Our of Our Ha...BeingSocial.Us
 
Magic If Play Analysis
Magic If Play AnalysisMagic If Play Analysis
Magic If Play AnalysisKendra Cote
 
Johnston wequests 10-4-2012
Johnston wequests 10-4-2012Johnston wequests 10-4-2012
Johnston wequests 10-4-2012jmj57
 
Selling e books for big profits
Selling e books for big profitsSelling e books for big profits
Selling e books for big profitsStephen Pierce
 
Social Business: The Irresistible Force To Overcome Immovable Objections
Social Business: The Irresistible Force To Overcome Immovable ObjectionsSocial Business: The Irresistible Force To Overcome Immovable Objections
Social Business: The Irresistible Force To Overcome Immovable ObjectionsStuart McIntyre
 
Reaching net-generation learners with social technologies
Reaching net-generation learners with social technologiesReaching net-generation learners with social technologies
Reaching net-generation learners with social technologiesguestba21f9
 
Reaching Net Generation Learners with social technologies - CDIO 2008
Reaching Net Generation Learners with social technologies - CDIO 2008Reaching Net Generation Learners with social technologies - CDIO 2008
Reaching Net Generation Learners with social technologies - CDIO 2008Maarten Cannaerts
 
Future Kids. Future Customers.
Future Kids. Future Customers.Future Kids. Future Customers.
Future Kids. Future Customers.Andy Hadfield
 
sponsor-ed: Social media pd
sponsor-ed: Social media pdsponsor-ed: Social media pd
sponsor-ed: Social media pdguest353f1
 
Social Networking What Are The Ramificationsv2
Social Networking What Are The Ramificationsv2Social Networking What Are The Ramificationsv2
Social Networking What Are The Ramificationsv2Richard Bush
 
Alternate Reality Games In Enterprise
Alternate Reality Games In EnterpriseAlternate Reality Games In Enterprise
Alternate Reality Games In EnterpriseCraig Harkness
 
Rethinking Grades: Assessment and Motivation in the 21st Century
Rethinking Grades: Assessment and Motivation in the 21st CenturyRethinking Grades: Assessment and Motivation in the 21st Century
Rethinking Grades: Assessment and Motivation in the 21st Centurymedmonds1
 

Similaire à E safety training for staff who work with children and young people - Stephen Carrick-Davies 2013 (20)

Safeguarding children online training from steve c-d for southwark diocese-...
Safeguarding children online   training from steve c-d for southwark diocese-...Safeguarding children online   training from steve c-d for southwark diocese-...
Safeguarding children online training from steve c-d for southwark diocese-...
 
E safety training for lewisham arts and education network by stephen carrick...
E  safety training for lewisham arts and education network by stephen carrick...E  safety training for lewisham arts and education network by stephen carrick...
E safety training for lewisham arts and education network by stephen carrick...
 
E safety training for southwark staff - stephen carrick-davies january 2013
E  safety training for southwark staff - stephen carrick-davies january 2013E  safety training for southwark staff - stephen carrick-davies january 2013
E safety training for southwark staff - stephen carrick-davies january 2013
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013
 
Dwe m2 self-image online offline identities
Dwe m2   self-image   online offline identities Dwe m2   self-image   online offline identities
Dwe m2 self-image online offline identities
 
#ACPA15 SNEAK PREVIEW of What Happens on Campus Stays On YouTube By @equalman
#ACPA15 SNEAK PREVIEW of What Happens on Campus Stays On YouTube By @equalman#ACPA15 SNEAK PREVIEW of What Happens on Campus Stays On YouTube By @equalman
#ACPA15 SNEAK PREVIEW of What Happens on Campus Stays On YouTube By @equalman
 
Future Kids Future Customers v2
Future Kids Future Customers v2Future Kids Future Customers v2
Future Kids Future Customers v2
 
How Can We Stop the Information Economy From Leaching the Value Our of Our Ha...
How Can We Stop the Information Economy From Leaching the Value Our of Our Ha...How Can We Stop the Information Economy From Leaching the Value Our of Our Ha...
How Can We Stop the Information Economy From Leaching the Value Our of Our Ha...
 
Magic If Play Analysis
Magic If Play AnalysisMagic If Play Analysis
Magic If Play Analysis
 
Johnston wequests 10-4-2012
Johnston wequests 10-4-2012Johnston wequests 10-4-2012
Johnston wequests 10-4-2012
 
Webquest:Cyberbullying
Webquest:CyberbullyingWebquest:Cyberbullying
Webquest:Cyberbullying
 
Selling e books for big profits
Selling e books for big profitsSelling e books for big profits
Selling e books for big profits
 
Social Business: The Irresistible Force To Overcome Immovable Objections
Social Business: The Irresistible Force To Overcome Immovable ObjectionsSocial Business: The Irresistible Force To Overcome Immovable Objections
Social Business: The Irresistible Force To Overcome Immovable Objections
 
Reaching net-generation learners with social technologies
Reaching net-generation learners with social technologiesReaching net-generation learners with social technologies
Reaching net-generation learners with social technologies
 
Reaching Net Generation Learners with social technologies - CDIO 2008
Reaching Net Generation Learners with social technologies - CDIO 2008Reaching Net Generation Learners with social technologies - CDIO 2008
Reaching Net Generation Learners with social technologies - CDIO 2008
 
Future Kids. Future Customers.
Future Kids. Future Customers.Future Kids. Future Customers.
Future Kids. Future Customers.
 
sponsor-ed: Social media pd
sponsor-ed: Social media pdsponsor-ed: Social media pd
sponsor-ed: Social media pd
 
Social Networking What Are The Ramificationsv2
Social Networking What Are The Ramificationsv2Social Networking What Are The Ramificationsv2
Social Networking What Are The Ramificationsv2
 
Alternate Reality Games In Enterprise
Alternate Reality Games In EnterpriseAlternate Reality Games In Enterprise
Alternate Reality Games In Enterprise
 
Rethinking Grades: Assessment and Motivation in the 21st Century
Rethinking Grades: Assessment and Motivation in the 21st CenturyRethinking Grades: Assessment and Motivation in the 21st Century
Rethinking Grades: Assessment and Motivation in the 21st Century
 

Dernier

ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 

Dernier (20)

ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 

E safety training for staff who work with children and young people - Stephen Carrick-Davies 2013

  • 1. E- SAFETY TRAINING RECOGNISING THE HARMS OF NEW TECHNOLOGY
  • 2. Disclaimer, copyright and caveats • This presentation has been written by Stephen Carrick-Davies and forms the basis of training he has delivered for Foster Parents and other working with vulnerable adults across the UK. • Not all of the training content is included in this presentation and these slides are NOT a training package (either as a whole or in parts) and should not be used as such. • It is shared on SlideShare for information and guidance only and to contribute to the debate about how the internet can amplify offline vulnerabilities. • It’s great to share but it is not easy to strike the right balance between sharing and copying. Invariably these slides contain content developed by others and Stephen has sought to credit content (including photographs) which have come from other sources at the end of this presentation so please respect the authorship of these slides (See slide 101). • The content on the slides which Stephen has personally written and produced he has assigned with Creative Commons license. Slides showing this mark can be used for non-commercial purposes, as long the content is credited. see www.creativecommons.org for more info. • Ultimately Stephen hopes that these slides help others working with vulnerable young people and if you have questions or have other experience to share please contact Stephen directly (see e-mail address at the end). “In the past you were what you owned. Now you are what you share.” Charles Leadbetter
  • 3. Registration • Attendance on ‘My Learning source’
  • 4. Introductions Stephen Carrick-Davies • Ten years at Childnet International • Now an Independent Trainer/ Social Entrepreneur /Parent/Learner ..... • "Stay hungry, stay foolish*" But what about you ? ...... *From Steve Job’s talk at Stanford University
  • 5. Find people in this room who can answer yes to these statements. If someone says no move on and speak to a different person ! I have a Facebook I use Farmville on my I don’t have a Facebook Account with over 250 Facebook page. account and don’t Friends. particularly want one. Name ............................. Name ............................. Name............................. . I use my SMART phone I use SMART phone just I don’t have a SMART for e-mail. for Text messages. phone and don’t want one ! Name ............................. Name.............................. Name............................. . My children know more My pet knows more I know more about the than me about the than me about the internet than my Internet. this course I came on internet! I came because my children. this course I came on Name............................. because I feel like I’m Name.............................. manager thought it Name............................. because I’m concerned being left behind. would help me ! . about children’s welfare Name............................ Name ............................. Name............................. . When you have written one person’s name in each box shout “BINGO!”
  • 6. What are your expectations and training needs ?
  • 7. The 3 Rs of digital literacy Our safety, conduct Risk & risky behaviours Reputation Responsibility Our privacy, security settings and our peer group Our leadership, ethical code and resilience
  • 8. Structure and aims of training Part I “Understanding” the new Reality !  Overview of ‘Social Media’ and web 2.0 REFLECT &  How technology is changing, and being changed THINK  Why the positive appeal for children Coffee break -------------------------------------------------------------------------------------------------------- Part II Understanding the Risks  Overview of online risks for young people FACE- UP  Specific challenges for Southwark Staff & BE  Where we are vulnerable (privacy settings) CHALLENGED  Case study to help us to see responses Lunch -------------------------------------------------------------------------------------------------------------------------------------- Part III Understanding our Responsibilities  Hands on training - Focus on Facebook INSPIRED &  Prevention & Response strategies EQUIPPED  ‘PIE’ approaches and positive opportunities for learning and change. All through a mixture of slides, quotes, case studies, films, small group exercises, Q&A, and links to practical resources.
  • 9. By the end of this training I hope you will have:  A better understanding and “feel” for the way YP use the internet.  Enthused about the positive opportunities for them.  Understand the online issues for vulnerable children  Hands’ on experience of using social media  Challenged about the risks esp. cyberbullying  Know what to do if there is a problem Had opportunity to ask questions look at other resources/ support organisations.
  • 10. PART 1 Understanding this new reality The appeal of new technology for children
  • 11. On a scale of 1- 10 rank yourself as to how confident you are using social media. 1 ----------------------5----------------------10 “I taught “What’s a mouse?” Mark Zuckerberg all he knows”
  • 12. GROUP EXERCISE Turn to your neighbour What does the internet, social media and mobile technology give to young people ? What is the single most important thing to YP about being online ?
  • 13. real The child’s online world ANONYMITY ALWAYS ON ACCESS THE WORLD “If you took away ADDICTIVE (?) my mobile phone ACTIVE NOT you would take PASSIVE away a part of me” MEDIUM AWAY FROM ACCEPTANCE - AMPLIFIER SUPERVISION IDENTITY & (gives children STATUS a voice)
  • 14. Why the real world ? “There are only two states for children these days; they are either asleep or online....even if they wake up in the middle of the night they go online.” Eric Schmidt 2010 Executive Chairman of Google. Children don’t consume media they inhabit and have colonized it! “We have created a child who will be so exposed to the media that he will be lost to his parents by the time he is 12.” David Bowie 1972 Melody Maker
  • 15. What is this real world like for vulnerable YP ? “I have over 120 people on my BBM but I deleted like 30 on Saturday cause I was angry and they pissed me off so I just deleted them. Since I’ve had my BlackBerry only 2 people have deleted me.” Student from Pupil Referral Unit Play film Film at www.carrick-davies.com/research/films
  • 16. GROUP EXERCISE Turn to your neighbour What was the greatest fear for the yp in the film ? How did it had got out of control ? What would you do next if you were in that position ?
  • 17. My first mobile phone ! I used it twice a year !
  • 18. “Anything that gets invented after you’re thirty is against the natural order of things and the beginning of the end of civilisation as we know it ….until it’s been around for about ten years when it gradually turns out to be alright really.” Douglas Adams
  • 19. NOW YOU EVEN HAVE A DIFFERENT PHONE LANGUAGE ! • POS Parent over shoulder • I8u I hate you • AATK Always at the keyboard • LOL Laugh out loud My Xmas hols wr CWOT. B4 we used 2go2 NY 2C my bro, his GF & 3 kids ;) FTF. ILNY it’s a gr8 plc.
  • 22. Gamechanger 1 : Global FACEBOOK’S GLOBAL BILLION
  • 24. Gamechanger 3: Transforming politics/society/business Check out this video overview at http://www.youtube.com/watch?v=x0EnhXn5boM
  • 25. Gamechanger 4: Revolutionising teacher/learner! “A lot of kids want to play games but now we want to MAKE them ! But where do you go for advice? Not many parents have written apps !” Thomas Suarez http://www.youtube.com/watch?v=ehDAP1OQ9Zw Bustin Jieber ‘Whack-a-mole’
  • 26. SMART PENS – the latest ‘Internet of Things’
  • 27. APPLICATIONS PHOTOS/TAGS NEWS FEEDS Comment and “boast by post” Huge range of apps Tag photos face recognition Events/ Groups TIME LINE FRIENDS LIVE CHAT Find, link, be in Superseding IM constant contact + on your mobile VIDEO link and embed MESSAGES Superseding E-mail WHO’S ONLINE Know who is online now! Social location ALL FOR FREE …… BUT ….WHAT PRICE IS FREE ?
  • 28. Facebook Timeline Searchable by years Check regularly because the settings change Re-check your privacy settings using ‘View As’ function The importance of privacy settings 31% of 12-15 year olds don’t use privacy settings on their social networking profiles – Ofcom Media literacy Report 2009
  • 29.
  • 30.
  • 31. • Searching for yourself – example
  • 32. See pages 106- 107 in Vodafone’s Digital Parenting magazine BUT ... Remember privacy options and controls change frequently!
  • 33. A word about BBM • Be careful with your BBM PIN • Be careful of ‘Screen Munching’ • Use the tools – like delete contact and block future requests. • Make sure your blackberry has a password See www.carrick-davies.com for film and tutorial. (bottom of the page)
  • 34. See pages 54 – 59 in Vodafone’s Digital Parenting magazine
  • 35. A word about games • The ratings are there for a reason. • Anyone who sells a designated 12+ title to younger children will face fines of up to £5,000 /jail. • Recognise the ‘compulsion’ issues. • Younger siblings and friends. • Misogynistic messages and casual cruelty.
  • 36. The game changer PORTABLE A GREAT STATUS PRIVATE + PACIFIER ! SYMBOL PERSONAL ANYTIME, FUN & ANYWHERE GAMES ANYWAY PRACTICAL EDUCATIONALLY USEAGE VALUABLE ! photo/video INTER Apps etc GENERATIONAL
  • 37. Let’s break for coffee 15 minutes
  • 38. PART II Understanding the risks (not the same thing as harm!)
  • 39. All technology is neutral What would Gandhi have done if he had a FACEBOOK account ?
  • 40. Our perception of danger Most abuse takes place in the context of a family or close relative.
  • 41. What terms do we use to explain this space ? An incubator ? FORWARDED COMMENTED ON UPLOADED AMPLIFIED COPIED STORED MORPHED/ CHANGED MUNCHED LIE DORMANT (captured) RE- BROADCAST
  • 42. GROUP EXERCISE Feedback What do you think about this description of the Internet ? What sort of things could be hatched ?
  • 43. Classifying the risks to children online Original 3 Cs Classification by ‘EU Kids’ online project Commercial Aggressive Sexual Values CONTENT Adverts Violent and Pornographic Bias Child as Recipient Spam hateful unwelcome Racist Sponsorship content sexual content Misleading Personal info info or advice CONTACT Meeting Self harm Tracking Being bullied Child as Participant Harvesting harassed or strangers Unwelcome Personal info stalked Being persuasions groomed CONDUCT Illegal Bullying or Creating and Providing Child as Actor downloading harassing uploading misleading Hacking Gambling another inappropriate info/advice Financial scams material Terrorism
  • 44. “Sexting” = teens sharing nude photos via mobiles and web. The practice can have serious legal and psychological consequences Commercial Aggressive Sexual Values CONTENT Pornographic Child as Recipient Online grooming is a unwelcome criminal offence sexual content Contact CONTACT www.ceop.gov.uk Meeting “So take a dirty Child as Participant if you have concerns strangers picture for me, Take a dirty picture about inappropriate Being Just take a dirty communication from an groomed picture for me Take a dirty picture” adult to a minor. CONDUCT From Taio Cruz song Creating and Child as Actor “One-third of those who uploading No 6 in the UK charts April 2010. sexually abuse children are inappropriate just children themselves.” material BBC Newsnight programme March 2010 21,630 BEBO members had the name “Porn Star”
  • 45. How the risks ‘migration’ from online to offline can affect vulnerable YP Original 3 Cs Classification by ‘EU Kids’ online project Commercial Aggressive Sexual CRIMINAL Values CONTENT Child as Recipient OF THE 1,984 PEOPLE CHARGED AFTER RIOTS:  53% were under 20 years old CONTACT  42% received free school meals Child as Participant (16% nat. average)  66% of them had some special education needs (21% of all pupils) CONDUCT Child as Actor Figures from the Ministry of Justice carried out by the Howard League for Penal Reform (published in Guardian 26.11.11) BEING IN THE WRONG PLACE AT THE WRONG TIME & “BAD LUCK”
  • 46. Film Play film Film conceived and acted by yp from Croydon
  • 47. GROUP EXERCISE Turn to your neighbour What was the greatest fear for the yp in the film ? What would you do if you were in teacher in this situation ?
  • 48. Classifying the risks to children online Commercial Aggressive Sexual Values CONTENT Violent and Child as Recipient hateful content 22% of yp aged 11- CONTACT 18 report having Being bullied Child as Participant harassed or been cyber bullied. stalked It ruins lives. YP may not disclose CONDUCT that it is happening Child as Actor Bullying or harassing another Classification by ‘EU Kids’ online project and referenced in the Byron Report
  • 49. “Sticks and stones.... But words ...?” From US Ad Council at http://www.youtube.com/watch?v=bdQBurXQOeQ
  • 50. Ways in which Cyberbullying is different from offline bullying? OFFLINE ONLINE Home was sanctuary Can be 24/7 Usually words/pictures Often physical More complex + fast changing, invisible Clear to see intention audience, social rivalry, steganography* Power and roles can shift + Bully strong/victim weak change quickly even during activity. Local & intimate Barriers collapse with potential mass distribution but also wider help. See the impact Don’t see impact (lack of empathy) Bystanders intervene Bystanders take part (using Often silent mobile/SNS) It can leave a trail ! (keeping evidence) Closure is easier Closure harder - permanent, archivable * Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.
  • 51. Why YP may be scared of reporting abuse ? • “It was nobody else’s business” • “Didn’t think it was serious or wrong” • “Didn’t want parents/friends to find out” • “Was frightened” • “Didn’t think I would be believed” • “Had been threatened by the abuser” Source: Child Maltreatment in the UK Cawson 2000 Abuse on the internet/mobile phone • “My parents don’t get the internet” • “Maybe it was my fault ! (blur)” • “Scared if computer is confiscated”
  • 52. RESPONDING TO THE VICTIM Need for reassurance – THIS IS BULLYING ! Practical advice: RED Don’t retaliating, Orange – Save the evidence Green – Tell someone (who?) See advice, resources and guidance at Childnet’s www.digizen.org website
  • 53. GROUP EXERCISE The young person who you are responsible for (let’s say she’s a 12 year old girl) tells you that her “friends” in her class took video clip of her at a sleep over pyjama party on their phones which is now being circulated and she thinks it is now posted on a social networking site. •What advice would you give to her ? •Who should the girl report this to ? •Is this a school issue ? •How would you go about trying to remove this content ? •What if those who posted it up have circulated it more widely ?
  • 54. GROUP EXERCISE A 14 year old boy in your school has lost weight and you have concerns that he is self-harming. • What could be happening online ? • What could the online pressure be ? • What online support could help him ? • What if this person was posting images of himself on social networking and pro-harm sites ?
  • 55. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY 10 WAYS IN WHICH THE INTERNET CAN AMPLIFY OFFLINE VULNERABILITY
  • 56. ‘Vulnerable’ This is complex because: All children are different so there are Vulnerability is not static - All dangers in making broad statements. children can be vulnerable at different stages Many children are neglected which is harder to spot yet makes them The categorisations of risk offline vulnerable do not necessarily mirror online The paradox that over- What about experience (eg a disabled yp protected children can be vulnerable may be empowered online as the more vulnerable online. adults ? internet can be ‘leveller’ The more a child uses the internet the more they can become confident and possibly complacent and feel ‘invincible’ and don’t feel they are at risk . Those who have experienced offline risk and Constantly changing abuse may be more resilient and able to technologies. Eg, Location services protect themselves online or may not be HOWEVER WE CAN IDENTIFY affected so much by the risks they encounter. A FEW COMMON FEATURES....
  • 57. Low self- Fluid learning confidence. environment and Identity seen to gaps in education be part of and induction ‘outsiders’ Experience Lack of abusive supportive relationships or adults in their environments lives including anger MUNCH POKE More unsupervised PING! Influences of alcohol, drugs and time, fewer gang culture. Risk structures and takers and at risk boundaries See www.carrick-davies.com
  • 58. “Many of the young people I work with are massive risk takers, impulsive to the extreme and often use alcohol and/or drugs. On average they first engage in sexual activity at a far younger age than other students. They also have huge amounts of unsupervised time on their hands, often till very late at night. I teach many YP who are half- asleep as they have been online till gone 3am.” PRU staff member from ‘MPP’ report LE L RO RAB ON T VULNE IN C S AS SA HEM E LVE EET MS YS THE “I have over 120 people on my BBM but I MA SEE WE MA Y deleted like 30 on Saturday cause I was Y T THE angry and they pissed me off so I just BU deleted them. Since I’ve had my BlackBerry only 2 people have deleted me.” PRU student from ‘MPP’ report
  • 59. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Unmediated Contact Guardian Newspaper article 19 June 2010 Children who have been fostered can suddenly receive messages from siblings, birth parents, or those who want to trace them for potentially harmful reasons.
  • 60. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Social Location Young People who may need to escape from an abusive relationships need to think carefully about how they make their ‘places’ public.
  • 61. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Exclusion from the ‘norm’ Eg Facebook Timeline There are lots of online services which celebrate our ‘journey’. How do children who don’t know their birth parents, may not have an early photo of themselves feel in these ‘boast by post’ environments ?
  • 62. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Blackmailing “gifting” & grooming by peers A young person from a disadvantaged background may be targeted with ‘gifts’ of mobile phones, mobile payment cards etc, by older young people but in exchange for ‘favours’ which they ‘cash in’ later (including prostitution, trafficking or illegal activity). If it sounds to good to be true .... it’s probably is (they want something ! ) Search ‘NSPCC survey on teen partner violence’ for more info
  • 63. “Any A/C holders looking WAYS IN WHICH to make a quick grand get THE INTERNET at me. No time wasters.” CAN AMPLIFY VULNERABILITY  Earlier adopters ? Message on BBM about bank scams (fraud!) Screen Munch ! Many vulnerable young people can be early adopters of tools and services which are not yet regulated or in the public conscious. For example BBM How will QR codes be mis-used ?
  • 64. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Being ‘nudged’ into gangs Vulnerable young people who are risk takers, impulsive or under the influence of alcohol and/or drugs and less supervised, can be more easily ALL CHILDREN WILL drawn into illegal activity including being ‘nudged’ LEAVE A FOOTPRINT through technology. EXCEPT SOME WILL BE IN MUDDIER SAND!
  • 65. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Negative digital footprint ALL CHILDREN WILL LEAVE A DIGITAL FOOTPRINT BUT SOME WILL BE MUDDIER THAN OTHERS Those who are supported can compensate and build positive online footprint but what about those who aren’t ?
  • 66. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Low Resilience “When my pinger’s gone to sleep that’s when I’ll go to sleep.” Young people need to be cherished, have the right amount of sleep and healthy food. What happens when you are running on empty ?
  • 67. •WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY  Special needs & learning difficulties Attachment Theory Attachment Some children with emotional or behavioural difficulties, attachment difficulties, and other complex needs, may be particularly vulnerable online. EG those with Autistim Spectrum Disorder may make literal interpretations of content, which will affect how they respond. Others with complex needs may not understand the concept of friendship, and therefore trust everyone implicitly. Some children with SEN or disabilities may not recognise that they are being bullied or appreciate how their own online behaviour may be seen by someone else as bullying .
  • 68. •WAYS IN WHICH  Low levels of Language & Literacy THE INTERNET CAN AMPLIFY VULNERABILITY Lack of literacy skills, can mean that messages are unclear, ambiguous or misunderstood We must not assume that all YP are confident “digital natives” and we must also recognise that one in six people in the UK struggle with literacy (below the level expected of an eleven year old). Hence being able to complete a ‘REPORT ABUSE’ form or read instructions about safety, privacy and ‘terms and conditions’ are real barriers for many young people. Do YP recognise the link between reading and being able to be safe ?
  • 69. GROUP EXERCISE In pairs discuss Do you recognise these 10 offline vulnerabilities and agree that they can be amplified online ? Can you think of positive ways in which the Internet minimises offline vulnerabilities? How could you begin to talk to the YP you look after about these issues?
  • 70. Questions and feedback on the morning session Let’s break for lunch (50mins)
  • 72. AN ABSENCE OF KNOWLEDGE IS NOT AN EXCUSE FOR AN ABSENCE OF RESPONSIBILITY AND CARE. WHAT IS POTENTIALLY CRIMINAL, HARMFUL, INAPPROPRIATE OR ILLEGAL OFFLINE, IS THE SAME ONLINE. ULTIMATELY THIS COMES DOWN TO LEADERSHIP.
  • 73. SCHOOLS In the context of an inspection, e-safety may be described as the school’s ability: to protect and educate pupils and staff in their use of technology to have the appropriate mechanisms to intervene and support any incident where appropriate.
  • 75. Assemblies, tutorial time, personal, social, health and education lessons, and an age-appropriate curriculum for e-safety Pupils were more Schools need vulnerable overall to make good when schools used use of the locked down views of pupils systems because and their WHAT they were not parents to DOES given enough develop their opportunities to e-safety GOOD learn how to provision. assess and manage E-SAFETY risk for LOOK themselves. LIKE? The outstanding schools recognised In the outstanding that, relationships schools, senior leaders, with families, needed governors, staff and to keep developing to families worked together support e-safety at to develop a clear strategy home. for e-safety. Policies were reviewed regularly in the light of technological developments.
  • 76. 10 THINGS SCHOOLS CAN DO TO REACH PARENTS 1. Update and publicise your school’s Acceptable Use Policy (AUP) stating how you use technology including mobiles and photographs . Include e-safety advice on this. 2. Include news items in school newsletter especially at time of national news story or concern 3. Advice posters in the corridors/playground. 4. Survey – using ‘Survey Monkey’ or students to get feedback which you can then respond to (more buy in). 5. Advice and reporting buttons on School website 6. Regular sessions with students with take home advice 7. Assembly or play involving pupils which parents come to. 8. Creative sessions during mainstream activities (winter or summer fair, SATs meetings, trips etc) 9. Re-enforced during induction sessions when a child joins the school AND staff induction. 10. Investing in free resources Eg Digital Parenting.
  • 77. The role of schools in respond to Cyberbullying ? • All UK schools must have an anti-bullying policy by law. • If your child is bullied online by other children in a school even if it takes place outside of school hours or holidays it IS a school issue. • Ofsted inspects on safeguarding very closely (limiting factor !) • Government Guidance on cyberbullying is comprehensive and includes bullying of school staff! • Increasingly vital to have clear whole-school E-Safety and Acceptable Use Policies (AUPs) • Involving parents is crucial to a ‘whole-school’ policy
  • 78. PIE all 3 ‘legs’ are vital Policies E-safety policy, Acceptable Use Policy, Anti-Bullying policy, Mobile use policy Infrastructure Education Managed learning environment Whole-school ongoing education with high quality access and & prevention programme which is equipment which is filtered, targeted at both pupils, parents monitored and supervised. and the whole school work-force.
  • 79. PREVENTING RESPONDING  Understanding and accepting the  Supporting the victim – need for impact of cyberbullying. reassurance.  Updating existing policies and  Practical advice and support such as saving evidence, not retaliating, practices. (AUP anti-bullying) informing parents.  Making reporting easier - includes  Investigate and record incidents, advice about removal of content. identify the bully. (industry support)  Working with the bully and sanctions  Promoting the positive use of (including technology specific). technology.  Involve Parents /carers  Evaluating impact of prevention activities. Underpinned by effective education and awareness
  • 80. Social media challenges for teachers • Recent TES survey found that 9% of teachers were friends with pupils on SNS*. • General advice from unions and GTS is: Do not ‘friend’ pupils on personal accounts or ask to be added to their contact lists. WHY ? You could make yourself You could make yourself You could make yourself vulnerable by sharing your vulnerable by being able to open to allegations of personal information (and access their personal inappropriate contact or be that of your friends) information misunderstood. http://community.tes.co.uk/forums/t/463065.aspx?s_cid=16 See http://www.childnet.com/kia/downloads/Social-networking.pdf for Childnet/TDA leaflet
  • 81. OTHER WAYS TO PROTECTING YOURSELF 1. Update your AUPs stating how and when personally owned equipment (including camera phones) can be used. 2. Make sure you have a strong password and set a password or pin for your phone. Increasingly important for Facebook ‘Fraping’ 3. Close down computers quickly if you have to leave a room and don’t allow cookies to ‘remember your password’ 4. Do not post information about yourself publically that you wouldn’t want employers, colleagues, pupils or parents to see. 5. Make sure you do not retaliate but keep all records – screen prints and record time, date & website addresses 6. Report any incident to the appropriate member of staff promptly 7. Make sure the school informs parents about incidents and delivers appropriate sanctions
  • 82. GROUP EXERCISE SETTING UP A FACEBOOK PAGE
  • 83. Dilemmas and decisions: Setting up a Facebook account First name: Surname: Sex: Dob: HAVE TO BE OVER 13 E-mail: - see next
  • 84. So easy to set up a free e-mail account New G-Mail account in 3 mins
  • 85. As soon as you join you need to connect FB can migrate all your existing e-mail contacts automatically
  • 86. HANDS ON EXPERIENCE LET’S SET UP A FACEBOOK ACCOUNT TOGETHER Let’s do this together
  • 87. What online profile and identity shall we give ? Questions What age shall we give her ? What information shall we make public ? What should we keep private ? What friends shall we link her to? Shall we let her update from her mobile ?
  • 88. GROUP EXERCISE – In Pairs Having completed that exercise discuss the challenges and dilemmas and imagine yourself as a 13 year old uploading a profile for the first time. •Do you say you are “in a relationship”? •Who do you accept as your friends ? •What groups would it be cool to join ? •What level of privacy would you give yourself ?
  • 89. REACHING PARENTS/CARERS “Parents and the home environment they create are the single most important factor in shaping their children’s well-being, achievements and prospects” Alan Johnson (when Education Secretary)
  • 90. MODELLING GOOD BEHAVIOUR “Present but absent” Kids don't do what you say they do what you do ! Try to ...Be consistent and set examples yourself; - eg no phones at the table, mobiles on the landing at night. Try to... Think about your history browser ! Try to ...detox yourself – leave it at home on holiday, try not to take it to the cinema ! Try to ...be consistent across ratings. They are there for a reason.
  • 91. Influence of older siblings/uncles, aunts.... ! “it’s not fair ...” Recognise the influence and pressure and their need to differentiate themselves. Recognise ratings are there for a reason ! – The ages are not based on the age of ability ! Recognise that underage “You can’t choose your kid’s best use of gaming brings up friend’s parents.” important issues which you need to have a view on. Recognise other parents will have different views and values from you.
  • 92. CE VI Conversations about AD Risk “Do you know who all your online friends are offline?” “Do you know how to block someone on Facebook?” “Do you have a PIN on your mobile phone?” “Do any of your friends send photos of themselves?” “Do you know how to save that sort of evidence?” “Would you report that at school/CEOP?”
  • 93. CE VI Conversations about AD Reputation  “Remember what goes online stays online”  “When did you last check your privacy settings?”  “Can you help me check my settings”  “Are you changing your password regularly?”  “Do you know the best way to get offending material taken down?”
  • 94. CE VI AD Conversations about Responsibility  “Have you come across any good social initiatives?”  “What do you think about the KONY 2012 campaign?”  “What would you do as parent about how long you should stay online?”  “I trust you to make good decisions, but I also need to learn from you.”
  • 95. The importance of reaching parents/carers For Parents For Young people • Be aware that your children may as • Always respect others be careful what likely cyberbully as be a target of you say. cyberbullying. • Think before you send, what goes • Talk to your children and understand online stays online ! the ways in which they are using the • Treat your password like your internet and mobile phones. toothbrush ! • Learn how to block the bully and save • Use the tools on the services the evidence • Remind your children not to retaliate • Make sure you tell someone • Remind yp to keep the evidence • Support others – how would you feel • Know where to report (see later) if no-one stood up for you ! • Encourage them to produce their own peer advice media !
  • 96. Useful resources for parents Interactive video tutorial for parents Designed for schools to give away free (1.5 million copies) Promoting the benefits of technology In 9 languages Pre-loaded for new users SHOW
  • 97. Dynamic education programs and ways for YP to understand the issues (including resilience) See http://whatsyourstory.trendmicro.com/internet-safety/pg/winners-2011) Or do a Linked In positive profile exercise to help vulnerable YP get a positive online reputation
  • 98. Useful websites 1) UK law Enforcement agency and part of VGTF www.ceop.gov.uk 2) UK Council for Child Internet Safety www.dcsf.gov.uk/ukccis/ 3) Childnet International www.childnet.com/ including Cyberbullying film 4) British Association for Adoption and Fostering www.baaf.org.uk - including advice on Facebook
  • 99. GROUP EXERCISE ! - Discuss in pairs What has been ONE thing which you have found helpful from torday’s training ? What ONE thing will you do as a result of this training ?
  • 100. EVALUATION Please give feedback. 
  • 102. • Questions about anything which has come up today ?
  • 103. Have we done what we said we would ? A better understanding and “feel” for the way YP use the internet. Enthused about the positive opportunities for them. Understand the online issues for vulnerable children Hands’ on experience of using social media Challenged about the risks esp. cyberbullying Know what to do if there is a problem
  • 104. CAF as Referral to CSC • The inter agency referral form to Children's Social Care (CSC) is being replaced • The CAF assessment record now replaces the inter agency referral form • If you complete a CAF assessment record and send it to Children’s Social Care, it should clearly outline your understanding of children and families needs. It will be helpful to also indicate what has been tried already to meet these needs • We will also be seeking clarity about what support you feel is required to meet the needs you have identified • Where there is a safeguarding concern a referral should be made immediately • We are happy to be contacted or consulted where there is a concern about a child (Social Care Duty: 020 7525 1921) If you are using the record to make a referral to Children’s Social Care, please send it to RAD@southwark.gov.uk • CAF continues to be used as part of providing early help in Southwark. The record remains the mechanism by which you assess needs in partnership with children, young people and their families; and the method by which targeted services understand why you have requested their involvement. Training is available on www.mylearningsource.co.uk
  • 105. I’m sticking around for a further hour to help anyone individually with questions or their action plans
  • 106. THANK YOU ! Complete Evaluation forms MUNCH PING POKE! See my current work re social media and vulnerable yp on my website www.carrick-davies.com stephen@carrick-davies.com

Notes de l'éditeur

  1. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  2. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  3. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  4. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  5. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  6. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  7. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  8. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  9. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  10. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  11. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  12. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  13. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  14. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  15. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  16. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  17. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  18. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  19. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  20. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  21. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  22. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Whenever I start talking about Childnet’s work I start with this picture. They say a picture speaks a thousand words. This is Tomison Adeloye – a friend of mine. I took this picture of him to illustrate just what it is that children access when going online – The whole world – the positive as well as the potentially harmful. There’s a further point to this picture in that Tomi is deaf. As he told me when I took this photo of him – no-one knows you are deaf on the Internet ! – he uses the same method of communicating – his fingers. – Again this is a powerful reminder that Children don’t really know who they are talking to on line. <Advance> Of course with mobile technology the Internet is now not just in our hands but in our pockets ! As you are seeing in Japan, children are able to access sites such as dating agency sites from their internet enabled phones . I read last week that the National Police Agency here want to ban anyone under 18 from accessing dating sties and we are facing similar calls in the UK and I’ll say something about this later. However, before we talk about the present and the future and the challenges and opportunities I want to go back to one of the founders of the Internet – Tim Berners Lee – generally credited for inventing the WWW. In his book “weaving the web he says”
  23. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies "The web is more a social creation than a technical one. I designed it for social effect - to help people work together - and not as a technical toy. The ultimate goal of the web is to support and improve our weblike existence in the world...... We have to ensure that the society we build with the web is the sort we intend.” This is one of the motivations behind our work. Childnet is not first and foremost a technology charity, we don’t have too many techies on staff. We are motivated to ensure that children benefit from the net – that the future society is one in which the net is used positively to benefit children and that their rights are protected and promoted online. I am sure that many of you here today are committed to this ideal and want to ensure that our future society is shaped by positive applications of the net.
  24. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies