SlideShare une entreprise Scribd logo
1  sur  12
Online Child Safety
An ICT Practitioner’s Perspective
             Charles Mok
      Internet Society Hong Kong
             Feb 11 2012
Online Child Safety 1.0 -> 2.0
• Web 1.0
  – Top-down content-based
  – Crime, illegal content, pornography
  – Solutions: primarily by filtering
• Web 2.0
  –   User-created content, social media
  –   “Peer-related harms”
  –   Filtering is not “enough”
  –   Children/youth: from potential victims to possible
      aggressors/predators
Our Net Today
Today’s Internet              Typical Risks
Social media services         Privacy concerns
- Facebook, Twitter, Weibo,
  etc.                        Human flesh search
- Forums such as HKGolden
- YouTube etc.                Cyber-bullying/harassment

Smartphones and Tablets       Intellectual property
                              violations
The Ubiquitous Net
- Faster, wider, everywhere Other crimes
How bad things really are?
• Some think that the Internet has made
  everything worse.
   – E.g. The Police keeps reporting that the number of
     Internet related crime is rising every year
   – But what does that prove?
      • Nothing, except more people use the Internet
• The Dilemma of the Digital Native vs. the Digital
  Immigrant
   – A matter of power balance and different vantage
     points
   – By whose standards?
Myths? Reality?
• Example: number of actual confirmed cases of
  child sexual abuse declined between 1990 and
  2005 by 51% in the US*
  – Growth in young people’s use of the Internet has
    not coincided with any rise in sexual abuse against
    young people

  * NCANDS/Finkelhor & Jones 2006
Can we accept that…
• …young people today are smarter than before
• …not all young people are equally at risk

• Not to understate the problems either
   – Reach of the Internet
   – Speed and irreversibility, just to name a couple

• How do we tackle the problem areas / individuals but
  not overstate the issue or adversely affect the proper
  and positive use of the Internet by the rest of the
  majority?
“Teach Your Children Well”
• Students “given a greater degree of freedom
  to surf the Internet at school are less
  vulnerable to online dangers in the long-
  term.”*

* UK government watchdog Ofsted (official
body for inspecting schools)
“With Great Power Comes Great
            Responsibility”
• “As a society, we have spent too much time
  focused on what media are doing to young
  people and not enough time asking what young
  people are doing with media. Rather, we need to
  embrace an approach based on media ethics, one
  that empowers young people to take greater
  responsibilities for their own actions and holds
  them accountable for the choices they make as
  media producers or as members of online
  communities”
      - Prof Henry Jenkins, USC media scholar
Possible Way to Go
• Media Literacy and Digital Citizenship
  – Rights and responsibilities of using the Internet
  – Our general studies subject is already out-of-sync at
    its start?
  – Does teachers, parents, and other stakeholders truly
    understand what to do to help children?
  – The very nature of the Internet calls for citizenship
     • Bottom-up
     • “No one owns the Internet” (we all own the Internet)
     • Internet governance model is based on multistakeholderism
The ICT Industry Perspective
• 1.0: Passive
  – Driven by liabilities and short-term cost
    considerations
  – Corporate social citizenship is almost by nature
    passive and even forced by regulations
• 2.0: More active
  – Reputation risks (partly as a result of social media)
  – Short- to Long-term cost consideration, partly due
    to more regulatory requirements
     • Evident in intellectual property regulations
What are the Gaps?
• Understanding what online child safety is
  – Regulation vs Education?
• Dr Fu mentioned Multistakeholderism
  – Experience from IGF Rio de Janeiro
• Roles and engagement of:
  –   Parents and Teachers
  –   Policymakers and Government
  –   Industry
  –   NGOs
  –   Last but not least: Children themselves!
Thank you!
Charles Mok
Internet Society Hong Kong

mok@isoc.hk
Facebook: Charles Mok B
Twitter: @charlesmok
Sina Weibo: charlespmok
www.isoc.hk

Contenu connexe

Plus de Charles Mok

Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyCharles Mok
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsCharles Mok
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital RepressionCharles Mok
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and EthicsCharles Mok
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇Charles Mok
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdfCharles Mok
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCharles Mok
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdfCharles Mok
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldCharles Mok
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsCharles Mok
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and IdentityCharles Mok
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckCharles Mok
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsCharles Mok
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T Charles Mok
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點Charles Mok
 
在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由Charles Mok
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Charles Mok
 
香港科技罪行法例改革:何去何從?
香港科技罪行法例改革:何去何從?香港科技罪行法例改革:何去何從?
香港科技罪行法例改革:何去何從?Charles Mok
 
Driving Hong Kong Forward in the Age of 5G and Innovation
Driving Hong Kong Forward in the Age of 5G and InnovationDriving Hong Kong Forward in the Age of 5G and Innovation
Driving Hong Kong Forward in the Age of 5G and InnovationCharles Mok
 

Plus de Charles Mok (20)

Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點
 
在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
 
香港科技罪行法例改革:何去何從?
香港科技罪行法例改革:何去何從?香港科技罪行法例改革:何去何從?
香港科技罪行法例改革:何去何從?
 
Driving Hong Kong Forward in the Age of 5G and Innovation
Driving Hong Kong Forward in the Age of 5G and InnovationDriving Hong Kong Forward in the Age of 5G and Innovation
Driving Hong Kong Forward in the Age of 5G and Innovation
 

Dernier

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Dernier (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Online child safety

  • 1. Online Child Safety An ICT Practitioner’s Perspective Charles Mok Internet Society Hong Kong Feb 11 2012
  • 2. Online Child Safety 1.0 -> 2.0 • Web 1.0 – Top-down content-based – Crime, illegal content, pornography – Solutions: primarily by filtering • Web 2.0 – User-created content, social media – “Peer-related harms” – Filtering is not “enough” – Children/youth: from potential victims to possible aggressors/predators
  • 3. Our Net Today Today’s Internet Typical Risks Social media services Privacy concerns - Facebook, Twitter, Weibo, etc. Human flesh search - Forums such as HKGolden - YouTube etc. Cyber-bullying/harassment Smartphones and Tablets Intellectual property violations The Ubiquitous Net - Faster, wider, everywhere Other crimes
  • 4. How bad things really are? • Some think that the Internet has made everything worse. – E.g. The Police keeps reporting that the number of Internet related crime is rising every year – But what does that prove? • Nothing, except more people use the Internet • The Dilemma of the Digital Native vs. the Digital Immigrant – A matter of power balance and different vantage points – By whose standards?
  • 5. Myths? Reality? • Example: number of actual confirmed cases of child sexual abuse declined between 1990 and 2005 by 51% in the US* – Growth in young people’s use of the Internet has not coincided with any rise in sexual abuse against young people * NCANDS/Finkelhor & Jones 2006
  • 6. Can we accept that… • …young people today are smarter than before • …not all young people are equally at risk • Not to understate the problems either – Reach of the Internet – Speed and irreversibility, just to name a couple • How do we tackle the problem areas / individuals but not overstate the issue or adversely affect the proper and positive use of the Internet by the rest of the majority?
  • 7. “Teach Your Children Well” • Students “given a greater degree of freedom to surf the Internet at school are less vulnerable to online dangers in the long- term.”* * UK government watchdog Ofsted (official body for inspecting schools)
  • 8. “With Great Power Comes Great Responsibility” • “As a society, we have spent too much time focused on what media are doing to young people and not enough time asking what young people are doing with media. Rather, we need to embrace an approach based on media ethics, one that empowers young people to take greater responsibilities for their own actions and holds them accountable for the choices they make as media producers or as members of online communities” - Prof Henry Jenkins, USC media scholar
  • 9. Possible Way to Go • Media Literacy and Digital Citizenship – Rights and responsibilities of using the Internet – Our general studies subject is already out-of-sync at its start? – Does teachers, parents, and other stakeholders truly understand what to do to help children? – The very nature of the Internet calls for citizenship • Bottom-up • “No one owns the Internet” (we all own the Internet) • Internet governance model is based on multistakeholderism
  • 10. The ICT Industry Perspective • 1.0: Passive – Driven by liabilities and short-term cost considerations – Corporate social citizenship is almost by nature passive and even forced by regulations • 2.0: More active – Reputation risks (partly as a result of social media) – Short- to Long-term cost consideration, partly due to more regulatory requirements • Evident in intellectual property regulations
  • 11. What are the Gaps? • Understanding what online child safety is – Regulation vs Education? • Dr Fu mentioned Multistakeholderism – Experience from IGF Rio de Janeiro • Roles and engagement of: – Parents and Teachers – Policymakers and Government – Industry – NGOs – Last but not least: Children themselves!
  • 12. Thank you! Charles Mok Internet Society Hong Kong mok@isoc.hk Facebook: Charles Mok B Twitter: @charlesmok Sina Weibo: charlespmok www.isoc.hk