SlideShare ist ein Scribd-Unternehmen logo
1 von 101
SAFEGUARDING CHILDREN ONLINE E-SAFETY FOR FOSTER PARENTS  and those who work with vulnerable young people   By Stephen Carrick-Davies
Disclaimer, copyright and caveats  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ In the past you were what you owned.  Now you are what you share.” Charles Leadbetter
Welcome and housekeeping  Session lasts 3 hours 10-1.00  Comfort break at 11.15 – 11.30 Hands-on session after break  Not  a forum for disclosures  Fire alarm arrangements (not expecting)  Chance for group questions and action planning at 12.45 and optional one-to-one from 1-2pm Evaluation forms – Please complete  so I can improve !  Welcome
Stephen Carrick-Davies ,[object Object],[object Object],Introductions ,[object Object],If we care about - and are responsible for - young people we must care for them and help  them  be responsible online !
A little about you  Introductions One thing you  LOVE  about the internet ?  One thing you  HATE  about the internet ?  What’s the  one  thing you want to get out of this training?  Name ..........................  How long have you been a foster carer/or worked with vulnerable Young People ?
Structure and aims of training  Part I  Understanding the new Reality  Part II  Understanding the Risks Part II  Understanding our Responsibilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],REFLECT & THINK  INFORMED &  EQUIPPED  INSPIRED & EMPOWERED
On a scale of 1- 10 rank yourself as to how  confident  you are using social media. 1 ----------------------5----------------------10 “ What’s a mouse?” “ I taught  Mark Zuckerberg all he knows”
PART 1 Understanding the new “Reality”
How many of  you  have a Facebook Account ?  How many of the YP you look after have a  Facebook Account ?  Teaching swimming without a swimming pool !
“ We have created a child who will be so exposed to the media that he will be lost to his parents by the time he is 12.” David Bowie  interview with  Melody Maker  January “ There are only two states for children these days; they are either asleep or online....even if they wake up in the middle of the night they go online.”   Eric Schmidt  Executive Chairman of Google .  2010 1972   "What is happening to our young people? They disrespect their elders, they disobey their parents. They ignore the law. They riot in the streets inflamed with wild notions. Their morals are decaying. What is to become of them?”  Plato   founder of the first institution of higher learning 430 BC  Has it always been this way ?
[object Object],I used it twice a year !
[object Object],[object Object],[object Object],[object Object],NOW YOU EVEN HAVE A DIFFERENT PHONE LANGUAGE !  Parent over shoulder I hate you  Always at the keyboard Laugh out loud My Xmas hols wr CWOT. B4 we used 2go2 NY 2C my bro, his GF & 3 kids ;) FTF. ILNY it’s a gr8 plc.
My family’s first TV
“ THE FUTURE AIN’T WHAT IT USED TO BE” IPTV,  Mobile, 3D, & Interactive
What terms do we use to explain this space ?  Cyberspace ?   “ This is just the beginning, the beginning of understanding that cyberspace has no limits, no boundaries.”  Nicholas Negroponte  Founder of Massachusetts Institute of Technology's Media Lab,
What terms do we use to explain this space ?  ,[object Object],“ The idea that we are still travelling on a ‘superhighway’ towards the  future in the same bus and in the same direction, is naive. If you are a child you’re likely to be travelling alone, on a side street and probably without a crash helmet.”  S C-D
What terms do we use to explain this space ?  Virtual World “ Most people are awaiting Virtual Reality; I'm awaiting virtuous reality”.  Eli Khamarov
The favourite member of the family ?  What terms do we use to explain this space ?  “ Television:  chewing gum for the eyes”.   Frank Lloyd Wright
What terms do we use to explain this space ?  My World My library “ Calling it ‘mine’ makes the vastness more intimate, the anonymity less threatening and the chaos more orderly. But you can still feel lonely in a crowd”.  S C-D
FORWARDED  COMMENTED ON  COPIED   STORED MORPHED/  CHANGED  An incubator ? What terms do we use to explain this space ?  UPLOADED  (captured)  MUNCHED AMPLIFIED RE- BROADCAST
COPIED   STORED An incubator ? What terms do we use to explain this space ?  “ The new social web has changed the platform to that of an incubator; it is a place where communication is captured, aggregated, added to, morphed, changed and rehatched as a new broadcast or ping.  Those with the skill and confidence to narrate their lives online, manage their reputation, mitigate the risks and build up resilience, may well be able to survive and thrive. Those who have few supportive adults, low levels of literacy and are unsupervised and vulnerable to abuse, are far less confident and hence more at risk.”  Stephen Carrick-Davies  The Guardian newspaper  July 2011 FORWARDED  COMMENTED ON  MORPHED/  CHANGED  RE-HATCHED
What is true is that it is changing rapidly  Portable  Personal  Private
Social media landscape
The fastest growing segment in Facebook is older women ! PLAY VIDEO  http://www.youtube.com/watch?v=x0EnhXn5boM
“ If you took away my mobile phone you  would take away a part of me” The child’s online  world  real   AMPLIFIER  (gives children a voice) ANONYMITY   ALWAYS ON  AWAY FROM SUPERVISION  ACCEPTANCE - IDENTITY & STATUS  ACCESS THE WORLD ACTIVE NOT PASSIVE MEDIUM  ADDICTIVE (?)
Access to cheaper goods & services If you’re not connected you miss out on the  new “Knowledge economy”. Education + ICT = greater attainment If you’re not connected your children can be at an educational disadvantage . THE IMPACT  The internet is now indispensable That is why you as foster parents have been given laptop for the child you foster. Economic Social  Education YP care about their online identity ! If you’re not connected you’re missing out on today’s social life – especially SNS & games.
Communicate  Challenge   Champion   Community   Change   Co-operate  Customer service  Collaborate + co-create  But it is also changing the way  we  work and interact  +   Quick, personal, immediate Aggregate the public voice Build a movement  (not campaign   Inspire + build community  “ Wisdom of the crowds”  Efficient + global Hold providers to account Share best practice
AGE RESTRICTIONS ?  If you lie about your age .... you’ll soon have to lie about your experiences .
In pairs discuss GROUP EXERCISE What was the most technically advanced communication tool that you used when you were a teenager ?  Do you feel ‘left behind’  or excluded from this rapid change ?
“ Anything that gets invented after you’re thirty is against the natural order of things and the beginning of the end of civilisation as we know it … .until it’s been around for about ten years when it gradually turns out to be alright really.”  Douglas Adams
ALL FOR FREE …… BUT ….WHAT PRICE IS FREE ?  TIME LINE (Coming)  Social location   APPLICATIONS Huge range of apps NEWS FEEDS  “boast by post” MESSAGES  Superseding E-mail  WHO’S ONLINE Know who is online now! PHOTOS/TAGS  Comment and Tag photos  face recognition  LIVE CHAT  Superseding IM FRIENDS  Find, link, be in constant contact  + on your mobile VIDEO  link and embed  Events/ Groups
AND  ‘GIFTING’  – wonderful way of sharing something as a ‘gift’  Social location   APPLICATIONS Huge range of apps NEWS FEEDS  “boast by post” MESSAGES  Superseding E-mail  Video coming  WHO’S ONLINE Know who is online now! PHOTOS/TAGS  Comment and Tag photos  face recognition  LIVE CHAT  Superseding IM FRIENDS  Find, link, be in constant contact + on your mobile VIDEO  link and embed  Events  &  Groups TIME LINE (Coming)
Quiz Time  ,[object Object],More than 800m users  If it was a country it would be the 3 rd  biggest 70% of users are  outside  USA
Can Facebook be used for good ?  ,[object Object],[object Object]
What would Gandhi have done if he had a FACEBOOK account ?  All technology is neutral
Remember the Positive !  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Understanding the  risks  (not the same thing as  harm !) PART II
Our perception of danger Most abuse takes place in the context of a family or close relative .
[object Object],Original 3 Cs Classification by ‘EU Kids’ online project CONTENT   CONTACT  CONDUCT   Commercial  Aggressive Sexual   Values   Adverts  Spam Sponsorship  Personal info  Violent and hateful content  Pornographic unwelcome  sexual content Bias  Racist  Misleading info or advice Tracking  Harvesting Personal info Being bullied harassed or stalked Meeting strangers Being groomed Self harm  Unwelcome persuasions  Illegal  downloading  Hacking Gambling  Financial scams  Terrorism  Bullying or harassing another Creating and uploading inappropriate material  Providing misleading info/advice  Child as  Recipient Child as  Participant  Child as  Actor
[object Object],CRIMINAL  Original 3 Cs Classification by ‘EU Kids’ online project  CONTENT   CONTACT  CONDUCT   Commercial  Aggressive Sexual   Values   Child as  Recipient Child as  Participant  Child as  Actor  BEING IN THE WRONG PLACE AT THE WRONG TIME & “BAD LUCK”  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Pornographic unwelcome  sexual content Meeting strangers Being groomed Creating and uploading inappropriate material  Online grooming is a criminal offence “ One-third of those who sexually abuse children are just children themselves.” BBC Newsnight programme March 2010 21,630 BEBO members had the name “Porn Star”  “ Sexting”   = teens sharing nude photos via mobiles and web. The practice can have serious legal and psychological consequences   CONTENT   Child as  Recipient   CONTACT  Child as  Participant  CONDUCT   Child as  Actor  Commercial  Aggressive Sexual   Values   “ So take a dirty picture for me, Take a dirty picture  Just take a dirty picture for me  Take a dirty picture” From Taio Cruz song  No 6 in the UK charts  April 2010 .
Film Film conceived and acted by yp from Southwark see film and documentary about how we made the film at  http://www.carrick-davies.com/research/films Play film Film at www.carrick-davies.com/research/films
[object Object],Violent and hateful content  Classification by ‘EU Kids’ online project and referenced in the Byron Report 22% of yp aged 11-18 report having been cyber bullied. It ruins lives. YP may not disclose that it is happening  CONTENT   CONTACT  CONDUCT   Commercial  Aggressive Sexual   Values   Being bullied harassed or stalked Bullying or harassing another Child as  Recipient Child as  Participant  Child as  Actor
“ Sticks and stones.... But words ...?” From Canadian Ad Council at  http://www.youtube.com/watch?v=bdQBurXQOeQ
How is Cyberbullying different from offline bullying?  OFFLINE  ONLINE  Home was sanctuary Often Physical  Usually words/pictures Bully strong/victim weak Roles can change Can be 24/7 Local & intimate  Mass audience See the impact  Don’t see impact  (lack of empathy) Bystanders intervene Bystanders take part  (using mobile/camera/social media) Often Silent  It can leave a trail !  The importance of keeping evidence
Why YP may be scared of reporting abuse ?  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Abuse on the internet/mobile phone
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],GROUP EXERCISE
WAYS IN WHICH THE INTERNET CAN  AMPLIFY  VULNERABILITY 10 WAYS IN  WHICH THE INTERNET CAN  AMPLIFY  OFFLINE VULNERABILITY
‘ Vulnerable’ Those who have experienced offline risk and abuse may be more resilient and able to protect  themselves online or may not be affected so much by the risks they encounter. HOWEVER  WE CAN IDENTIFY  A FEW COMMON FEATURES.... This is complex because:  All  children are different so there are dangers in making broad statements.  Vulnerability is not static - All children can be vulnerable at different stages Many children are neglected which is harder to spot yet makes them vulnerable The categorisations of risk  offline  do not necessarily mirror  online  experience (eg a  disabled yp may be empowered online as the internet can be ‘leveller’ The paradox that over-protected children can be more vulnerable online.  The more a child uses the internet the more they can become confident and  possibly complacent and feel ‘invincible’ and don’t feel they are at risk . What about vulnerable adults ?  Constantly changing technologies.  Eg, Location services
MUNCH POKE  PING! See www.carrick-davies.com Lack of supportive adults in their lives  More unsupervised time, fewer structures and boundaries  Fluid learning environment and gaps in education and induction  Low self-confidence. Identity seen to be part of ‘outsiders’ Influences of alcohol, drugs and gang culture. Risk takers and at risk  Experience abusive relationships or environments including anger
[object Object],[object Object],[object Object],WE MAY SEE THEM AS VULNERABLE  BUT THEY MAY SEE THEMSELVES AS IN CONTROL
   Unmediated Contact  Children who have been fostered can suddenly receive messages from siblings, birth parents, or those who want to trace them for potentially harmful reasons.  WAYS IN WHICH THE INTERNET CAN  AMPLIFY  VULNERABILITY Guardian Newspaper article 19 June 2010
   Social Location  WAYS IN WHICH THE INTERNET CAN  AMPLIFY  VULNERABILITY Young People who may need to escape from an abusive relationships need to think carefully about how they make their ‘places’ public.
Eg Facebook Timeline     Exclusion from the ‘norm’  There are lots of online services which celebrate our ‘journey’.  How do children who don’t know their birth parents, may not have an early photo of themselves feel in these ‘boast by post’ environments ? WAYS IN WHICH THE INTERNET CAN  AMPLIFY  VULNERABILITY
   Blackmailing  “ gifting” &  grooming by peers  A young person from a disadvantaged background may be targeted with ‘gifts’ of mobile phones, mobile payment cards etc, by older young people but in exchange for ‘favours’ which they ‘cash in’ later (including prostitution, trafficking or illegal activity ).  If it sounds to good to be true .... it’s  probably is (they want something ! ) Search ‘NSPCC  survey on  teen partner violence’   for more info   WAYS IN WHICH THE INTERNET CAN  AMPLIFY  VULNERABILITY
Many vulnerable young people can be early adopters of tools and services which are not yet regulated or in the public conscious.  For example BBM  How will QR codes be mis-used ?     Earlier adopters ? Screen Munch ! WAYS IN WHICH THE INTERNET CAN  AMPLIFY  VULNERABILITY
   Being ‘nudged’ into gangs  ALL CHILDREN WILL LEAVE A FOOTPRINT EXCEPT SOME WILL BE IN MUDDIER SAND !  WAYS IN WHICH THE INTERNET CAN  AMPLIFY  VULNERABILITY Vulnerable young people who are risk takers, impulsive or under the influence of alcohol and/or drugs and less supervised, can be more easily drawn into illegal activity including being ‘nudged’ through technology.
   Negative digital footprint  ALL CHILDREN WILL LEAVE A DIGITAL FOOTPRINT BUT  SOME WILL BE MUDDIER THAN OTHERS   WAYS IN WHICH THE INTERNET CAN  AMPLIFY  VULNERABILITY Those who are supported can compensate and build positive online footprint but what about those who aren’t ?
   Low Resilience “ When my pinger’s gone to sleep that’s when I’ll go to sleep.” WAYS IN WHICH THE INTERNET CAN  AMPLIFY  VULNERABILITY Young people need to be cherished, have the right amount of sleep and healthy food. What happens when you are running on empty ?
   Special needs & learning difficulties ,[object Object],Some children with emotional or behavioural difficulties, attachment difficulties, and other complex needs, may be particularly vulnerable online. EG those with Autistim Spectrum Disorder may make literal interpretations of content, which will affect how they respond.  Others with complex needs may not understand the concept of friendship, and therefore trust everyone implicitly. Some children with SEN or disabilities may not recognise that they are being bullied or appreciate how their own online behaviour may be seen by someone else as bullying .  Attachment   Attachment Theory
   Low levels of Language & Literacy  ,[object Object],We must not assume that all YP are confident “digital natives”  and  we must also recognise that one in six people in the UK struggle with literacy (below the level expected of an eleven year old).  Hence being able to complete a ‘REPORT ABUSE’ form or read instructions about safety, privacy and ‘terms and conditions’ are real barriers for many young people.  Do YP recognise the link between reading and being able to be safe ?  Lack of literacy skills, can mean that messages are unclear, ambiguous or misunderstood
In pairs discuss GROUP EXERCISE Do you recognise these 10 offline vulnerabilities and agree that they can be amplified online ?  How could you begin to talk to the YP you look after about these pressures ?
Let’s have a comfort break  15 mins.
HANDS ON SESSION  PART II To help someone swim...  you’ve got to be willing to get a little wet! Let’s  Dive  in !
[object Object],[object Object],First name: Surname:  Sex:  Dob:  HAVE TO BE OVER 13  E-mail: - see next  ?
[object Object],New  G-Mail account in 3 mins
As soon as you join you need to connect FB can migrate all your existing e-mail contacts automatically
HANDS ON EXPERIENCE  LET’S SET UP A FACEBOOK ACCOUNT TOGETHER  Let’s do this together
Questions What age shall we give her ?  What information shall we make public ?  What should we keep private ?  What friends shall we link her to? Shall we let her update from her mobile ? What about location ‘places’  What online profile and identity shall we give ?
[object Object],[object Object]
Please note the privacy settings options can change constantly !
[object Object],Name, profile picture, gender and membership of networks is always PUBLIC This information you can control  And customise further
 
[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],GROUP EXERCISE – In Pairs
UNDERSTANDING OUR RESPONSIBILITIES  PART  III “ Parents  and the home environment they create are the  single most important factor  in shaping their children’s well-being, achievements and prospects”  Alan Johnson (when Education Secretary)   [+ foster parents]
THEORY  THE DIGITAL  DIVIDE     View youth as participants, not ‘potential victims ’ .      Don’t over-react but show respect  and humility. Parents/Carers     Find ways of empowering  them  to protect  themselves ,[object Object],[object Object],[object Object],   Validate their world and  keep up to date.  ,[object Object],[object Object],[object Object],PRACTICE   THEORY  ,[object Object],[object Object],[object Object],   Show how to build positive digital footprints & reputation  PRACTICE     Show them the ‘mirror test’  - how would they feel? ‘ ROPE’ BRIDGE     Help them build resilience for  when things go wrong  (and they will!)  ,[object Object],[object Object],Young People ,[object Object],[object Object],[object Object]
Specific challenges for foster parents  ,[object Object],[object Object]
Why can online contact be so painful ?  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The specific dangers for looked after children in unmediated contact  ,[object Object],[object Object],[object Object]
Can adults contact children via facebook ?  ,[object Object],[object Object],[object Object],[object Object]
What information posted on Facebook could put a ‘looked after child’ at risk from being contacted inappropriately by a birth parent or sibling ?  Feedback to the group  GROUP EXERCISE  -  Discuss in pairs
How do you respond if this happens ?  ,[object Object],[object Object],[object Object],[object Object],[object Object],Advice from  Facing up to Facebook  http://www.baaf.org.uk/bookshop/book_fufa
[object Object],[object Object],[object Object],* From BAAF website  Advice from  Facing up to Facebook  http://www.baaf.org.uk/bookshop/book_fufa
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
The role of schools in respond to Cyberbullying ?  ,[object Object],[object Object],[object Object],[object Object],[object Object]
P olicies I nfrastructure E ducation Whole-school ongoing education  & prevention  programme which is targeted at both pupils, parents and the whole school work-force. E-safety policy, Acceptable Use Policy,  Anti-Bullying policy , Mobile use policy  Managed learning environment with high quality access and equipment which is filtered, monitored and  supervised . PIE  all 3 ‘legs’ are vital
R isk R eputation R esilience A 3 RS FOR DIGITAL LITERACY
Useful websites ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SHOW ,[object Object],[object Object],[object Object],[object Object],[object Object],Useful resources for parents
[object Object],See http://whatsyourstory.trendmicro.com/internet-safety/pg/winners-2011)  Using ‘Linked In’ to showcase a positive exercise to help vulnerable YP get a positive online reputation
EVALUATION  Please give feedback.  We want to continue to improve this training and YOU are now the expert !  
Have we done what we said we would ?  Part I  Understanding the new Reality  Part II  Understanding the Risks Part II  Understanding our Responsibilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],REFLECT & THINK  INFORMED &  EQUIPPED  INSPIRED & EMPOWERED
Action Plans  Before you leave write down 3 things which you are going to do as a result of attending this training.
And Finally….
"The web is more a social creation than a technical one.  I designed it for social effect - to help people work together - and not as a technical toy….  The ultimate goal of the web is to support and improve our web like existence in the world...... Tim   Berners-Lee ‘Weaving the Web’ 1999   We have to ensure that the society we build with the web is the sort we intend.”
THANK YOU !  www.carrick-davies.com [email_address] Complete Evaluation forms  MUNCH PING POKE! See my current work re social media and vulnerable yp on my website
[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],This presentation has been designed by Stephen Carrick-Davies.  The slides are available on Slide Share.net and I am happy for this presentation to be circulated as a pdf document. However please don’t distribute further or use for training or commercial purposes without contacting me as it is important to respect the author’s content and copyright of images and text used in this presentation.  Photos content used from other sources are acknowledged on slides or credited below. Credits and sources  Sorry if I’ve missed anyone else out,  Please  let me know  !  This image from  www.flickr.com/photos/55279617@Noo/124659356

Weitere ähnliche Inhalte

Was ist angesagt?

Unplug or Plug-in
Unplug or Plug-inUnplug or Plug-in
Unplug or Plug-inBrody Hatch
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipAndrew Kohl
 
E safety training for lewisham arts and education network (advance) by steph...
E  safety training for lewisham arts and education network (advance) by steph...E  safety training for lewisham arts and education network (advance) by steph...
E safety training for lewisham arts and education network (advance) by steph...Stephen Carrick-Davies
 
Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012Stephen Carrick-Davies
 
Safeguarding children online training from steve c-d for southwark diocese-...
Safeguarding children online   training from steve c-d for southwark diocese-...Safeguarding children online   training from steve c-d for southwark diocese-...
Safeguarding children online training from steve c-d for southwark diocese-...Stephen Carrick-Davies
 
Gov 2.0 for Environmental Protection Agency and Executive Women in Government
Gov 2.0 for Environmental Protection Agency and Executive Women in GovernmentGov 2.0 for Environmental Protection Agency and Executive Women in Government
Gov 2.0 for Environmental Protection Agency and Executive Women in GovernmentAndrew Krzmarzick
 
Missouri Social Networking and Older Adults
Missouri Social Networking and Older AdultsMissouri Social Networking and Older Adults
Missouri Social Networking and Older AdultsAllan Kleiman
 
Parenting primary
Parenting primaryParenting primary
Parenting primaryWebwise
 
Youth Matters: Evening Event
Youth Matters: Evening EventYouth Matters: Evening Event
Youth Matters: Evening EventBex Lewis
 
Raising Children in a Digital Age for Foundation Business Degree @MMUBS
Raising Children in a Digital Age for Foundation Business Degree @MMUBSRaising Children in a Digital Age for Foundation Business Degree @MMUBS
Raising Children in a Digital Age for Foundation Business Degree @MMUBSBex Lewis
 
Elearning session for Secondary PGCE and GTP trainees
Elearning session for Secondary PGCE and GTP traineesElearning session for Secondary PGCE and GTP trainees
Elearning session for Secondary PGCE and GTP traineeswkidd
 
Online Reputation Management Etourism forum
Online Reputation Management Etourism forumOnline Reputation Management Etourism forum
Online Reputation Management Etourism forumPatrick Heuchenne
 
Social media romania day 3
Social media romania day 3Social media romania day 3
Social media romania day 3Bex Lewis
 
E safety training for lewisham arts and education network by stephen carrick...
E  safety training for lewisham arts and education network by stephen carrick...E  safety training for lewisham arts and education network by stephen carrick...
E safety training for lewisham arts and education network by stephen carrick...Stephen Carrick-Davies
 
Introducing Generation Z
Introducing Generation ZIntroducing Generation Z
Introducing Generation ZCallum McGeoch
 
Parenting Post Primary Presentation
Parenting Post Primary Presentation Parenting Post Primary Presentation
Parenting Post Primary Presentation Webwise
 
Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)Bex Lewis
 
Week 4 Digital Overload and Privacy Summer 2013 HUM140
Week 4 Digital Overload and Privacy Summer 2013 HUM140Week 4 Digital Overload and Privacy Summer 2013 HUM140
Week 4 Digital Overload and Privacy Summer 2013 HUM140Ray Brannon
 

Was ist angesagt? (20)

Unplug or Plug-in
Unplug or Plug-inUnplug or Plug-in
Unplug or Plug-in
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
E safety training for lewisham arts and education network (advance) by steph...
E  safety training for lewisham arts and education network (advance) by steph...E  safety training for lewisham arts and education network (advance) by steph...
E safety training for lewisham arts and education network (advance) by steph...
 
Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012
 
Safeguarding children online training from steve c-d for southwark diocese-...
Safeguarding children online   training from steve c-d for southwark diocese-...Safeguarding children online   training from steve c-d for southwark diocese-...
Safeguarding children online training from steve c-d for southwark diocese-...
 
Gov 2.0 for Environmental Protection Agency and Executive Women in Government
Gov 2.0 for Environmental Protection Agency and Executive Women in GovernmentGov 2.0 for Environmental Protection Agency and Executive Women in Government
Gov 2.0 for Environmental Protection Agency and Executive Women in Government
 
Missouri Social Networking and Older Adults
Missouri Social Networking and Older AdultsMissouri Social Networking and Older Adults
Missouri Social Networking and Older Adults
 
Parenting primary
Parenting primaryParenting primary
Parenting primary
 
Youth Matters: Evening Event
Youth Matters: Evening EventYouth Matters: Evening Event
Youth Matters: Evening Event
 
Raising Children in a Digital Age for Foundation Business Degree @MMUBS
Raising Children in a Digital Age for Foundation Business Degree @MMUBSRaising Children in a Digital Age for Foundation Business Degree @MMUBS
Raising Children in a Digital Age for Foundation Business Degree @MMUBS
 
Elearning session for Secondary PGCE and GTP trainees
Elearning session for Secondary PGCE and GTP traineesElearning session for Secondary PGCE and GTP trainees
Elearning session for Secondary PGCE and GTP trainees
 
Online Reputation Management Etourism forum
Online Reputation Management Etourism forumOnline Reputation Management Etourism forum
Online Reputation Management Etourism forum
 
Social media romania day 3
Social media romania day 3Social media romania day 3
Social media romania day 3
 
Short Web2.0
Short Web2.0Short Web2.0
Short Web2.0
 
E safety training for lewisham arts and education network by stephen carrick...
E  safety training for lewisham arts and education network by stephen carrick...E  safety training for lewisham arts and education network by stephen carrick...
E safety training for lewisham arts and education network by stephen carrick...
 
Introducing Generation Z
Introducing Generation ZIntroducing Generation Z
Introducing Generation Z
 
Parenting Post Primary Presentation
Parenting Post Primary Presentation Parenting Post Primary Presentation
Parenting Post Primary Presentation
 
Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)
 
Week 4 Digital Overload and Privacy Summer 2013 HUM140
Week 4 Digital Overload and Privacy Summer 2013 HUM140Week 4 Digital Overload and Privacy Summer 2013 HUM140
Week 4 Digital Overload and Privacy Summer 2013 HUM140
 
Lauryns flipbook
Lauryns flipbookLauryns flipbook
Lauryns flipbook
 

Ähnlich wie E safety Presentation for foster carers by stephen carrick-davies

E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013Stevecd
 
'Parenting in the digital age' on slideshare
'Parenting in the digital age' on slideshare'Parenting in the digital age' on slideshare
'Parenting in the digital age' on slideshareDave Truss
 
Highland Life Online Presentation (5)
Highland Life Online Presentation (5)Highland Life Online Presentation (5)
Highland Life Online Presentation (5)aluxenburg
 
Parenting In A Media Driven World Slideshare
Parenting In A Media Driven World SlideshareParenting In A Media Driven World Slideshare
Parenting In A Media Driven World Slidesharechrisweber
 
Adape Social Marketing Overview
Adape   Social Marketing OverviewAdape   Social Marketing Overview
Adape Social Marketing OverviewClive Lam
 
Social Networking What Are The Ramificationsv2
Social Networking What Are The Ramificationsv2Social Networking What Are The Ramificationsv2
Social Networking What Are The Ramificationsv2Richard Bush
 
Social Media: The new buddies' concept
Social Media: The new buddies' conceptSocial Media: The new buddies' concept
Social Media: The new buddies' conceptJudith (Judi) Samuels
 
Insight You Need to Successfully Market to Tweens and Teens
Insight You Need to Successfully Market  to Tweens and TeensInsight You Need to Successfully Market  to Tweens and Teens
Insight You Need to Successfully Market to Tweens and TeensAquent
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...Stevecd
 
Digital Footprints - NDP
Digital Footprints - NDPDigital Footprints - NDP
Digital Footprints - NDPmiawalsh
 
iCAAD London 2019 - Dr Don Grant - LEFT TO OUR OWN DEVICES: PRACTICING HEALT...
 iCAAD London 2019 - Dr Don Grant - LEFT TO OUR OWN DEVICES: PRACTICING HEALT... iCAAD London 2019 - Dr Don Grant - LEFT TO OUR OWN DEVICES: PRACTICING HEALT...
iCAAD London 2019 - Dr Don Grant - LEFT TO OUR OWN DEVICES: PRACTICING HEALT...iCAADEvents
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?Sarah Welstead
 
Social Media101 V5
Social Media101 V5Social Media101 V5
Social Media101 V5KimBenedict
 
What Children Get Up To Online (and how we can try to keep them safe)
What Children Get Up To Online (and how we can try to keep them safe)What Children Get Up To Online (and how we can try to keep them safe)
What Children Get Up To Online (and how we can try to keep them safe)MrYoung
 
Social Media in Government - Human Resources and EEO
Social Media in Government - Human Resources and EEOSocial Media in Government - Human Resources and EEO
Social Media in Government - Human Resources and EEOGovLoop
 
Social work and social media presentation
Social work and social media presentationSocial work and social media presentation
Social work and social media presentationcomcareandy
 

Ähnlich wie E safety Presentation for foster carers by stephen carrick-davies (20)

E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013
 
'Parenting in the digital age' on slideshare
'Parenting in the digital age' on slideshare'Parenting in the digital age' on slideshare
'Parenting in the digital age' on slideshare
 
Highland Life Online Presentation (5)
Highland Life Online Presentation (5)Highland Life Online Presentation (5)
Highland Life Online Presentation (5)
 
Parenting In A Media Driven World Slideshare
Parenting In A Media Driven World SlideshareParenting In A Media Driven World Slideshare
Parenting In A Media Driven World Slideshare
 
Adape Social Marketing Overview
Adape   Social Marketing OverviewAdape   Social Marketing Overview
Adape Social Marketing Overview
 
Social Networking What Are The Ramificationsv2
Social Networking What Are The Ramificationsv2Social Networking What Are The Ramificationsv2
Social Networking What Are The Ramificationsv2
 
Social Media: The new buddies' concept
Social Media: The new buddies' conceptSocial Media: The new buddies' concept
Social Media: The new buddies' concept
 
Solid foundation Media workshop Social Media and You (june 2012)
Solid foundation Media workshop   Social Media and You (june 2012)Solid foundation Media workshop   Social Media and You (june 2012)
Solid foundation Media workshop Social Media and You (june 2012)
 
Insight You Need to Successfully Market to Tweens and Teens
Insight You Need to Successfully Market  to Tweens and TeensInsight You Need to Successfully Market  to Tweens and Teens
Insight You Need to Successfully Market to Tweens and Teens
 
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
E safety and vulnerable yp -Presentation for PRUS conference July 2011pr us c...
 
Digital Footprints - NDP
Digital Footprints - NDPDigital Footprints - NDP
Digital Footprints - NDP
 
Status update 1
Status update 1Status update 1
Status update 1
 
iCAAD London 2019 - Dr Don Grant - LEFT TO OUR OWN DEVICES: PRACTICING HEALT...
 iCAAD London 2019 - Dr Don Grant - LEFT TO OUR OWN DEVICES: PRACTICING HEALT... iCAAD London 2019 - Dr Don Grant - LEFT TO OUR OWN DEVICES: PRACTICING HEALT...
iCAAD London 2019 - Dr Don Grant - LEFT TO OUR OWN DEVICES: PRACTICING HEALT...
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?
 
Social Media101 V5
Social Media101 V5Social Media101 V5
Social Media101 V5
 
What Children Get Up To Online (and how we can try to keep them safe)
What Children Get Up To Online (and how we can try to keep them safe)What Children Get Up To Online (and how we can try to keep them safe)
What Children Get Up To Online (and how we can try to keep them safe)
 
Social Media in Government - Human Resources and EEO
Social Media in Government - Human Resources and EEOSocial Media in Government - Human Resources and EEO
Social Media in Government - Human Resources and EEO
 
Ma cultural policy and tourism - Social Media Class
Ma cultural policy and tourism - Social Media ClassMa cultural policy and tourism - Social Media Class
Ma cultural policy and tourism - Social Media Class
 
April27 dyc
April27 dycApril27 dyc
April27 dyc
 
Social work and social media presentation
Social work and social media presentationSocial work and social media presentation
Social work and social media presentation
 

Kürzlich hochgeladen

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 

Kürzlich hochgeladen (20)

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 

E safety Presentation for foster carers by stephen carrick-davies

  • 1. SAFEGUARDING CHILDREN ONLINE E-SAFETY FOR FOSTER PARENTS and those who work with vulnerable young people By Stephen Carrick-Davies
  • 2.
  • 3. Welcome and housekeeping Session lasts 3 hours 10-1.00 Comfort break at 11.15 – 11.30 Hands-on session after break Not a forum for disclosures Fire alarm arrangements (not expecting) Chance for group questions and action planning at 12.45 and optional one-to-one from 1-2pm Evaluation forms – Please complete so I can improve ! Welcome
  • 4.
  • 5. A little about you Introductions One thing you LOVE about the internet ? One thing you HATE about the internet ? What’s the one thing you want to get out of this training? Name .......................... How long have you been a foster carer/or worked with vulnerable Young People ?
  • 6.
  • 7. On a scale of 1- 10 rank yourself as to how confident you are using social media. 1 ----------------------5----------------------10 “ What’s a mouse?” “ I taught Mark Zuckerberg all he knows”
  • 8. PART 1 Understanding the new “Reality”
  • 9. How many of you have a Facebook Account ? How many of the YP you look after have a Facebook Account ? Teaching swimming without a swimming pool !
  • 10. “ We have created a child who will be so exposed to the media that he will be lost to his parents by the time he is 12.” David Bowie interview with Melody Maker January “ There are only two states for children these days; they are either asleep or online....even if they wake up in the middle of the night they go online.” Eric Schmidt Executive Chairman of Google . 2010 1972 "What is happening to our young people? They disrespect their elders, they disobey their parents. They ignore the law. They riot in the streets inflamed with wild notions. Their morals are decaying. What is to become of them?” Plato founder of the first institution of higher learning 430 BC Has it always been this way ?
  • 11.
  • 12.
  • 14. “ THE FUTURE AIN’T WHAT IT USED TO BE” IPTV, Mobile, 3D, & Interactive
  • 15. What terms do we use to explain this space ? Cyberspace ? “ This is just the beginning, the beginning of understanding that cyberspace has no limits, no boundaries.” Nicholas Negroponte Founder of Massachusetts Institute of Technology's Media Lab,
  • 16.
  • 17. What terms do we use to explain this space ? Virtual World “ Most people are awaiting Virtual Reality; I'm awaiting virtuous reality”. Eli Khamarov
  • 18. The favourite member of the family ? What terms do we use to explain this space ? “ Television:  chewing gum for the eyes”.   Frank Lloyd Wright
  • 19. What terms do we use to explain this space ? My World My library “ Calling it ‘mine’ makes the vastness more intimate, the anonymity less threatening and the chaos more orderly. But you can still feel lonely in a crowd”. S C-D
  • 20. FORWARDED COMMENTED ON COPIED STORED MORPHED/ CHANGED An incubator ? What terms do we use to explain this space ? UPLOADED (captured) MUNCHED AMPLIFIED RE- BROADCAST
  • 21. COPIED STORED An incubator ? What terms do we use to explain this space ? “ The new social web has changed the platform to that of an incubator; it is a place where communication is captured, aggregated, added to, morphed, changed and rehatched as a new broadcast or ping. Those with the skill and confidence to narrate their lives online, manage their reputation, mitigate the risks and build up resilience, may well be able to survive and thrive. Those who have few supportive adults, low levels of literacy and are unsupervised and vulnerable to abuse, are far less confident and hence more at risk.” Stephen Carrick-Davies The Guardian newspaper July 2011 FORWARDED COMMENTED ON MORPHED/ CHANGED RE-HATCHED
  • 22. What is true is that it is changing rapidly Portable Personal Private
  • 24. The fastest growing segment in Facebook is older women ! PLAY VIDEO http://www.youtube.com/watch?v=x0EnhXn5boM
  • 25. “ If you took away my mobile phone you would take away a part of me” The child’s online world real AMPLIFIER (gives children a voice) ANONYMITY ALWAYS ON AWAY FROM SUPERVISION ACCEPTANCE - IDENTITY & STATUS ACCESS THE WORLD ACTIVE NOT PASSIVE MEDIUM ADDICTIVE (?)
  • 26. Access to cheaper goods & services If you’re not connected you miss out on the new “Knowledge economy”. Education + ICT = greater attainment If you’re not connected your children can be at an educational disadvantage . THE IMPACT The internet is now indispensable That is why you as foster parents have been given laptop for the child you foster. Economic Social Education YP care about their online identity ! If you’re not connected you’re missing out on today’s social life – especially SNS & games.
  • 27. Communicate Challenge Champion Community Change Co-operate Customer service Collaborate + co-create But it is also changing the way we work and interact + Quick, personal, immediate Aggregate the public voice Build a movement (not campaign Inspire + build community “ Wisdom of the crowds” Efficient + global Hold providers to account Share best practice
  • 28. AGE RESTRICTIONS ? If you lie about your age .... you’ll soon have to lie about your experiences .
  • 29. In pairs discuss GROUP EXERCISE What was the most technically advanced communication tool that you used when you were a teenager ? Do you feel ‘left behind’ or excluded from this rapid change ?
  • 30. “ Anything that gets invented after you’re thirty is against the natural order of things and the beginning of the end of civilisation as we know it … .until it’s been around for about ten years when it gradually turns out to be alright really.” Douglas Adams
  • 31. ALL FOR FREE …… BUT ….WHAT PRICE IS FREE ? TIME LINE (Coming) Social location APPLICATIONS Huge range of apps NEWS FEEDS “boast by post” MESSAGES Superseding E-mail WHO’S ONLINE Know who is online now! PHOTOS/TAGS Comment and Tag photos face recognition LIVE CHAT Superseding IM FRIENDS Find, link, be in constant contact + on your mobile VIDEO link and embed Events/ Groups
  • 32. AND ‘GIFTING’ – wonderful way of sharing something as a ‘gift’ Social location APPLICATIONS Huge range of apps NEWS FEEDS “boast by post” MESSAGES Superseding E-mail Video coming WHO’S ONLINE Know who is online now! PHOTOS/TAGS Comment and Tag photos face recognition LIVE CHAT Superseding IM FRIENDS Find, link, be in constant contact + on your mobile VIDEO link and embed Events & Groups TIME LINE (Coming)
  • 33.
  • 34.
  • 35. What would Gandhi have done if he had a FACEBOOK account ? All technology is neutral
  • 36.
  • 37. Understanding the risks (not the same thing as harm !) PART II
  • 38. Our perception of danger Most abuse takes place in the context of a family or close relative .
  • 39.
  • 40.
  • 41.
  • 42. Film Film conceived and acted by yp from Southwark see film and documentary about how we made the film at http://www.carrick-davies.com/research/films Play film Film at www.carrick-davies.com/research/films
  • 43.
  • 44. “ Sticks and stones.... But words ...?” From Canadian Ad Council at http://www.youtube.com/watch?v=bdQBurXQOeQ
  • 45. How is Cyberbullying different from offline bullying? OFFLINE ONLINE Home was sanctuary Often Physical Usually words/pictures Bully strong/victim weak Roles can change Can be 24/7 Local & intimate Mass audience See the impact Don’t see impact (lack of empathy) Bystanders intervene Bystanders take part (using mobile/camera/social media) Often Silent It can leave a trail ! The importance of keeping evidence
  • 46.
  • 47.
  • 48. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY 10 WAYS IN WHICH THE INTERNET CAN AMPLIFY OFFLINE VULNERABILITY
  • 49. ‘ Vulnerable’ Those who have experienced offline risk and abuse may be more resilient and able to protect themselves online or may not be affected so much by the risks they encounter. HOWEVER WE CAN IDENTIFY A FEW COMMON FEATURES.... This is complex because: All children are different so there are dangers in making broad statements. Vulnerability is not static - All children can be vulnerable at different stages Many children are neglected which is harder to spot yet makes them vulnerable The categorisations of risk offline do not necessarily mirror online experience (eg a disabled yp may be empowered online as the internet can be ‘leveller’ The paradox that over-protected children can be more vulnerable online. The more a child uses the internet the more they can become confident and possibly complacent and feel ‘invincible’ and don’t feel they are at risk . What about vulnerable adults ? Constantly changing technologies. Eg, Location services
  • 50. MUNCH POKE PING! See www.carrick-davies.com Lack of supportive adults in their lives More unsupervised time, fewer structures and boundaries Fluid learning environment and gaps in education and induction Low self-confidence. Identity seen to be part of ‘outsiders’ Influences of alcohol, drugs and gang culture. Risk takers and at risk Experience abusive relationships or environments including anger
  • 51.
  • 52. Unmediated Contact Children who have been fostered can suddenly receive messages from siblings, birth parents, or those who want to trace them for potentially harmful reasons. WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY Guardian Newspaper article 19 June 2010
  • 53. Social Location WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY Young People who may need to escape from an abusive relationships need to think carefully about how they make their ‘places’ public.
  • 54. Eg Facebook Timeline  Exclusion from the ‘norm’ There are lots of online services which celebrate our ‘journey’. How do children who don’t know their birth parents, may not have an early photo of themselves feel in these ‘boast by post’ environments ? WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY
  • 55. Blackmailing “ gifting” & grooming by peers A young person from a disadvantaged background may be targeted with ‘gifts’ of mobile phones, mobile payment cards etc, by older young people but in exchange for ‘favours’ which they ‘cash in’ later (including prostitution, trafficking or illegal activity ). If it sounds to good to be true .... it’s probably is (they want something ! ) Search ‘NSPCC survey on teen partner violence’ for more info WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY
  • 56. Many vulnerable young people can be early adopters of tools and services which are not yet regulated or in the public conscious. For example BBM How will QR codes be mis-used ?  Earlier adopters ? Screen Munch ! WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY
  • 57. Being ‘nudged’ into gangs ALL CHILDREN WILL LEAVE A FOOTPRINT EXCEPT SOME WILL BE IN MUDDIER SAND ! WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY Vulnerable young people who are risk takers, impulsive or under the influence of alcohol and/or drugs and less supervised, can be more easily drawn into illegal activity including being ‘nudged’ through technology.
  • 58. Negative digital footprint ALL CHILDREN WILL LEAVE A DIGITAL FOOTPRINT BUT SOME WILL BE MUDDIER THAN OTHERS WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY Those who are supported can compensate and build positive online footprint but what about those who aren’t ?
  • 59. Low Resilience “ When my pinger’s gone to sleep that’s when I’ll go to sleep.” WAYS IN WHICH THE INTERNET CAN AMPLIFY VULNERABILITY Young people need to be cherished, have the right amount of sleep and healthy food. What happens when you are running on empty ?
  • 60.
  • 61.
  • 62. In pairs discuss GROUP EXERCISE Do you recognise these 10 offline vulnerabilities and agree that they can be amplified online ? How could you begin to talk to the YP you look after about these pressures ?
  • 63. Let’s have a comfort break 15 mins.
  • 64. HANDS ON SESSION PART II To help someone swim... you’ve got to be willing to get a little wet! Let’s Dive in !
  • 65.
  • 66.
  • 67. As soon as you join you need to connect FB can migrate all your existing e-mail contacts automatically
  • 68. HANDS ON EXPERIENCE LET’S SET UP A FACEBOOK ACCOUNT TOGETHER Let’s do this together
  • 69. Questions What age shall we give her ? What information shall we make public ? What should we keep private ? What friends shall we link her to? Shall we let her update from her mobile ? What about location ‘places’ What online profile and identity shall we give ?
  • 70.
  • 71. Please note the privacy settings options can change constantly !
  • 72.
  • 73.  
  • 74.
  • 75.
  • 76. UNDERSTANDING OUR RESPONSIBILITIES PART III “ Parents and the home environment they create are the single most important factor in shaping their children’s well-being, achievements and prospects” Alan Johnson (when Education Secretary) [+ foster parents]
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82. What information posted on Facebook could put a ‘looked after child’ at risk from being contacted inappropriately by a birth parent or sibling ? Feedback to the group GROUP EXERCISE - Discuss in pairs
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89. P olicies I nfrastructure E ducation Whole-school ongoing education & prevention programme which is targeted at both pupils, parents and the whole school work-force. E-safety policy, Acceptable Use Policy, Anti-Bullying policy , Mobile use policy Managed learning environment with high quality access and equipment which is filtered, monitored and supervised . PIE all 3 ‘legs’ are vital
  • 90. R isk R eputation R esilience A 3 RS FOR DIGITAL LITERACY
  • 91.
  • 92.
  • 93.
  • 94. EVALUATION Please give feedback. We want to continue to improve this training and YOU are now the expert ! 
  • 95.
  • 96. Action Plans Before you leave write down 3 things which you are going to do as a result of attending this training.
  • 98. "The web is more a social creation than a technical one. I designed it for social effect - to help people work together - and not as a technical toy…. The ultimate goal of the web is to support and improve our web like existence in the world...... Tim Berners-Lee ‘Weaving the Web’ 1999 We have to ensure that the society we build with the web is the sort we intend.”
  • 99. THANK YOU ! www.carrick-davies.com [email_address] Complete Evaluation forms MUNCH PING POKE! See my current work re social media and vulnerable yp on my website
  • 100.
  • 101.

Hinweis der Redaktion

  1. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  2. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  3. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  4. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  5. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  6. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Number of home computers is at around 50%
  7. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  8. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  9. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  10. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  11. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  12. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Self evident – important to stress the value in SN sites for YP. Unintended consequences if these sites were closed down. Really important to stress the need for YP to understand identity and risk as well as “hanging out” ! Daniel Broughton MD a pediatrician at the Mayo Clinic says we are doing our children a disservice if we try to remove all risks from their lives !
  13. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  14. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  15. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  16. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  17. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  18. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  19. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  20. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  21. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  22. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  23. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Whenever I start talking about Childnet’s work I start with this picture. They say a picture speaks a thousand words. This is Tomison Adeloye – a friend of mine. I took this picture of him to illustrate just what it is that children access when going online – The whole world – the positive as well as the potentially harmful. There’s a further point to this picture in that Tomi is deaf. As he told me when I took this photo of him – no-one knows you are deaf on the Internet ! – he uses the same method of communicating – his fingers. – Again this is a powerful reminder that Children don’t really know who they are talking to on line. <Advance> Of course with mobile technology the Internet is now not just in our hands but in our pockets ! As you are seeing in Japan, children are able to access sites such as dating agency sites from their internet enabled phones . I read last week that the National Police Agency here want to ban anyone under 18 from accessing dating sties and we are facing similar calls in the UK and I’ll say something about this later. However, before we talk about the present and the future and the challenges and opportunities I want to go back to one of the founders of the Internet – Tim Berners Lee – generally credited for inventing the WWW. In his book “weaving the web he says”
  24. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies "The web is more a social creation than a technical one. I designed it for social effect - to help people work together - and not as a technical toy. The ultimate goal of the web is to support and improve our weblike existence in the world...... We have to ensure that the society we build with the web is the sort we intend.” This is one of the motivations behind our work. Childnet is not first and foremost a technology charity, we don’t have too many techies on staff. We are motivated to ensure that children benefit from the net – that the future society is one in which the net is used positively to benefit children and that their rights are protected and promoted online. I am sure that many of you here today are committed to this ideal and want to ensure that our future society is shaped by positive applications of the net.
  25. Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies