SlideShare une entreprise Scribd logo
1  sur  17
Understanding the relation between risk and harm:
Theory, evidence and policy regarding children's internet use




Sonia Livingstone, LSE
A context of public anxieties
Research and policy agendas
Three phases of work
A ladder of
opportunities
Classifying risks (exemplars)

             Content                 Contact                      Conduct
             Child as receiver       Child as participant         Child as actor
             (of mass productions)   (adult-initiated activity)   (perpetrator / victim)

Aggressive   Violent / gory          Harassment,                  Bullying, hostile
             content                 stalking                     peer activity


Sexual       Pornographic            ‘Grooming’, sexual           Sexual
             content                 abuse on meeting             harassment,
                                     strangers                    ‘sexting’
Values       Racist / hateful        Ideological                  Potentially harmful
             content                 persuasion                   user-generated
                                                                  content
Commercial Embedded                  Personal data                Gambling,
             marketing               misuse                       copyright
                                                                  infringement
EU Kids Online findings

             Content                 Contact                      Conduct
             Child as receiver       Child as participant         Child as actor
             (of mass productions)   (adult-initiated activity)   (victim / perpetrator)

Aggressive   Violent / gory          Harassment,                  Bullying
             content                 stalking
                                                                                   6%
Sexual       Pornographic            Meeting ‘strangers’          ‘Sexting’

                         14%                          9%                       15%
             content

Values       Racist / hateful        Ideological                  Potentially harmful

                         12%
             content                 persuasion                   user-generated
                                                                  content      21%
Commercial Embedded                  Personal data                Gambling,

                                                      9%
             marketing               misuse                       copyright
                                                                  infringement
Did this bother or upset you?

             Content                 Contact                      Conduct
             Child as receiver       Child as participant         Child as actor
             (of mass productions)   (adult-initiated activity)   (victim / perpetrator)

Aggressive   Violent / gory          Harassment,                  Bullying
             content                 stalking
                                                                            4 in 5
Sexual       Pornographic            Meeting a ‘stranger’         ‘Sexting’

                      1 in 3                     1 in 9                     1 in 4
             content

Values       Racist / hateful        Ideological                  Potentially harmful
             content                 persuasion                   user-generated
                                                                  content
Commercial Embedded                  Personal data                Gambling,
             marketing               misuse                       copyright
                                                                  infringement
Comparing risks

                                        Sexual                Sexual           Meeting
                                                 Bullying
                                        images               messages*        new people

Experienced the risk at all              23        19              ---             ---

Experienced the risk online              14         6             15                9

Online perpetrators                       ---       3              3               ---

Felt bothered                             4        ---             4                1

Felt bothered                            32        ---            25               11
(% of those who experienced the risk)

(Fairly) upset                           44        55             45               50
(% of those who felt bothered)

                                                            Base: All children, n=25,142
                                                            * only 11-16 years
What’s on the internet that
bothers people your age?
Risks and opportunities
Comparing user types
Comparing countries


                      “Lower use, lower risk”

                      “Lower use, some risk”

                      “Higher use, some risk”

                      “Higher use, higher risk”
Refuting top 10 myths
Conclusions

   Producing evidence-based policy is impeded by the persistence of the moral panic agenda in public
    and policy discourses. The EU Kids Online network has worked in dialogue with stakeholders to
    explain the findings of its 25 country in-home survey of 25142 children aged 9-16.

   We propose a classification of risks that recognises the involvement of the child as receiver,
    participant or actor in a range of risk situations. Our findings reveal that the incidence of online risks
    is not as high as feared and the proportion of children who report harm is even lower.

   It is not my purpose to minimise the real risk of harm to children online, and the EU Kids Online
    network has worked hard to advise policy makers on how to manage or reduce this risk. But it is
    important to distinguish risk from harm – both because the factors that shape each are different,
    and because if they are confused, the harm is misleadingly exaggerated.

   We also show that risks and opportunities go hand in hand, and thus efforts to manage risk can
    have the unintended consequence of reducing opportunities, itself problematic given how few
    children benefit as yet from a deep or wide engagement with the internet.

   Thus it is important to recognise that in our increasingly risk-averse culture, opportunities are too
    easily sacrificed to risk management, the grey zone between risks and opportunities („risky
    opportunities‟) is misunderstood, and children cannot gain the experiences that build resilience.
The EU Kids Online Network

 Our multi- national collaboration
   has produced two books:




 Reports, methods and data are
   at: www.eukidsonline.net
Selected reports

   Dürager, A. & Livingstone, S. (2012) How can parents support children's internet safety?
    http://eprints.lse.ac.uk/id/eprint/42872
   Livingstone, S., Haddon, L., Görzig, A., and Ólafsson (2011) EU Kids Online Final Report.
    http://eprints.lse.ac.uk/39351/
   O‟Neill, B., Livingstone, S. and McLaughlin, S. (2011). Final recommendations for policy,
    methodology and research. http://eprints.lse.ac.uk/39410/
   Livingstone, S., Haddon, L., Görzig, A. and Ólafsson, K. (2011) Risks and safety on the
    internet: The perspective of European children. http://eprints.lse.ac.uk/33731/
   Livingstone, S., Haddon, L., Görzig, A., & Ólafsson, K. (2011) Disadvantaged children and
    online risk. http://eprints.lse.ac.uk/39385/
   Görzig, A. (2011) Who bullies and who is bullied online? A study of 9-16 year old internet users
    in 25 European countries. http://eprints.lse.ac.uk/39601/
   Livingstone, S., Ólafsson, K. and Staksrud, E. (2011) Social networking, age and privacy.
    http://eprints.lse.ac.uk/35849/
   Sonck, N., Livingstone, S., Kuiper, E. and de Haan, J. (2011) Digital literacy and safety skills.
    http://eprints.lse.ac.uk/33733/
   Livingstone, S. and Ólafsson, K. (2011) Risky communication online.
    http://eprints.lse.ac.uk/33732/

Contenu connexe

Tendances

Online safety for children
Online safety for childrenOnline safety for children
Online safety for childrenKumar Manish
 
Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 ParentsIwith.org
 
Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesMarian Merritt
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignKimberly Gonzalez
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011KanelandSvihlik
 
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...Stevecd
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Jim Adler
 
Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internetmerlyna
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013KanelandSvihlik
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011DHE2008
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Munch, poke, ping presentation
Munch, poke, ping presentationMunch, poke, ping presentation
Munch, poke, ping presentationonlineyouthwork
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...Rajeev Ranjan
 

Tendances (20)

Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 Parents
 
What Parents Should Know
What Parents Should KnowWhat Parents Should Know
What Parents Should Know
 
Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and Consequences
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education Campaign
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
 
Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internet
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Munch, poke, ping presentation
Munch, poke, ping presentationMunch, poke, ping presentation
Munch, poke, ping presentation
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...
 

Similaire à Understanding the Relation Between Online Risk and Harm

E safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-daviesE safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-daviesStephen Carrick-Davies
 
Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)Stephen Carrick-Davies
 
Advertisement pitch
Advertisement pitchAdvertisement pitch
Advertisement pitchacbtec
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013Stevecd
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Eu Kids Online II key findings 11 april 2011
Eu Kids Online II key findings 11 april 2011Eu Kids Online II key findings 11 april 2011
Eu Kids Online II key findings 11 april 2011daniel_eukids
 
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakRaising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakBex Lewis
 
Safeguarding Children & Young People Online
Safeguarding Children & Young People OnlineSafeguarding Children & Young People Online
Safeguarding Children & Young People OnlineClaudia Megele
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetysharon7111
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internetmalissa_1041
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Larry Magid
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...Stevecd
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetinganniebee3509
 

Similaire à Understanding the Relation Between Online Risk and Harm (20)

E safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-daviesE safety training ~ what ofsted are looking for by stephen carrick-davies
E safety training ~ what ofsted are looking for by stephen carrick-davies
 
Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)Digital citizenship ~ presentation for schools (oct 2012)
Digital citizenship ~ presentation for schools (oct 2012)
 
Technology and vulnerable users tink palmer (1)
Technology and vulnerable users   tink palmer (1)Technology and vulnerable users   tink palmer (1)
Technology and vulnerable users tink palmer (1)
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
NSBA2010
NSBA2010NSBA2010
NSBA2010
 
Advertisement pitch
Advertisement pitchAdvertisement pitch
Advertisement pitch
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Eu Kids Online II key findings 11 april 2011
Eu Kids Online II key findings 11 april 2011Eu Kids Online II key findings 11 april 2011
Eu Kids Online II key findings 11 april 2011
 
Web safety
Web safetyWeb safety
Web safety
 
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakRaising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
 
Safeguarding Children & Young People Online
Safeguarding Children & Young People OnlineSafeguarding Children & Young People Online
Safeguarding Children & Young People Online
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meeting
 

Dernier

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Dernier (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Understanding the Relation Between Online Risk and Harm

  • 1. Understanding the relation between risk and harm: Theory, evidence and policy regarding children's internet use Sonia Livingstone, LSE
  • 2. A context of public anxieties
  • 6. Classifying risks (exemplars) Content Contact Conduct Child as receiver Child as participant Child as actor (of mass productions) (adult-initiated activity) (perpetrator / victim) Aggressive Violent / gory Harassment, Bullying, hostile content stalking peer activity Sexual Pornographic ‘Grooming’, sexual Sexual content abuse on meeting harassment, strangers ‘sexting’ Values Racist / hateful Ideological Potentially harmful content persuasion user-generated content Commercial Embedded Personal data Gambling, marketing misuse copyright infringement
  • 7. EU Kids Online findings Content Contact Conduct Child as receiver Child as participant Child as actor (of mass productions) (adult-initiated activity) (victim / perpetrator) Aggressive Violent / gory Harassment, Bullying content stalking 6% Sexual Pornographic Meeting ‘strangers’ ‘Sexting’ 14% 9% 15% content Values Racist / hateful Ideological Potentially harmful 12% content persuasion user-generated content 21% Commercial Embedded Personal data Gambling, 9% marketing misuse copyright infringement
  • 8. Did this bother or upset you? Content Contact Conduct Child as receiver Child as participant Child as actor (of mass productions) (adult-initiated activity) (victim / perpetrator) Aggressive Violent / gory Harassment, Bullying content stalking 4 in 5 Sexual Pornographic Meeting a ‘stranger’ ‘Sexting’ 1 in 3 1 in 9 1 in 4 content Values Racist / hateful Ideological Potentially harmful content persuasion user-generated content Commercial Embedded Personal data Gambling, marketing misuse copyright infringement
  • 9. Comparing risks Sexual Sexual Meeting Bullying images messages* new people Experienced the risk at all 23 19 --- --- Experienced the risk online 14 6 15 9 Online perpetrators --- 3 3 --- Felt bothered 4 --- 4 1 Felt bothered 32 --- 25 11 (% of those who experienced the risk) (Fairly) upset 44 55 45 50 (% of those who felt bothered) Base: All children, n=25,142 * only 11-16 years
  • 10. What’s on the internet that bothers people your age?
  • 13. Comparing countries “Lower use, lower risk” “Lower use, some risk” “Higher use, some risk” “Higher use, higher risk”
  • 15. Conclusions  Producing evidence-based policy is impeded by the persistence of the moral panic agenda in public and policy discourses. The EU Kids Online network has worked in dialogue with stakeholders to explain the findings of its 25 country in-home survey of 25142 children aged 9-16.  We propose a classification of risks that recognises the involvement of the child as receiver, participant or actor in a range of risk situations. Our findings reveal that the incidence of online risks is not as high as feared and the proportion of children who report harm is even lower.  It is not my purpose to minimise the real risk of harm to children online, and the EU Kids Online network has worked hard to advise policy makers on how to manage or reduce this risk. But it is important to distinguish risk from harm – both because the factors that shape each are different, and because if they are confused, the harm is misleadingly exaggerated.  We also show that risks and opportunities go hand in hand, and thus efforts to manage risk can have the unintended consequence of reducing opportunities, itself problematic given how few children benefit as yet from a deep or wide engagement with the internet.  Thus it is important to recognise that in our increasingly risk-averse culture, opportunities are too easily sacrificed to risk management, the grey zone between risks and opportunities („risky opportunities‟) is misunderstood, and children cannot gain the experiences that build resilience.
  • 16. The EU Kids Online Network  Our multi- national collaboration has produced two books:  Reports, methods and data are at: www.eukidsonline.net
  • 17. Selected reports  Dürager, A. & Livingstone, S. (2012) How can parents support children's internet safety? http://eprints.lse.ac.uk/id/eprint/42872  Livingstone, S., Haddon, L., Görzig, A., and Ólafsson (2011) EU Kids Online Final Report. http://eprints.lse.ac.uk/39351/  O‟Neill, B., Livingstone, S. and McLaughlin, S. (2011). Final recommendations for policy, methodology and research. http://eprints.lse.ac.uk/39410/  Livingstone, S., Haddon, L., Görzig, A. and Ólafsson, K. (2011) Risks and safety on the internet: The perspective of European children. http://eprints.lse.ac.uk/33731/  Livingstone, S., Haddon, L., Görzig, A., & Ólafsson, K. (2011) Disadvantaged children and online risk. http://eprints.lse.ac.uk/39385/  Görzig, A. (2011) Who bullies and who is bullied online? A study of 9-16 year old internet users in 25 European countries. http://eprints.lse.ac.uk/39601/  Livingstone, S., Ólafsson, K. and Staksrud, E. (2011) Social networking, age and privacy. http://eprints.lse.ac.uk/35849/  Sonck, N., Livingstone, S., Kuiper, E. and de Haan, J. (2011) Digital literacy and safety skills. http://eprints.lse.ac.uk/33733/  Livingstone, S. and Ólafsson, K. (2011) Risky communication online. http://eprints.lse.ac.uk/33732/