CyberEye Focus Article: Cyberbullying: Through the eyes of the

Transcription

CyberEye Focus Article: Cyberbullying: Through the eyes of the
Child Safety Online:
Are you aware of what your child is doing on the Internet?
“How it happened, I don’t know...but it did! She was right in front of me. Watch your children folks!”
- Father of a teen kidnapped by someone she met online
From the Editor’s Desk!
CyberEye Focus Article:
Cyberbullying: Through the eyes of the
victim
Greetings from IMPACT!
Everyone is speeding down the information
highway, and children, teenagers and young
adults are no exception to this. Children get a lot
of benefits from being online, but they can also be
targets of crime, exploitation, and harassment in
this as in any other environment. Children can go
online from personal computers at home, a
friend’s house, in school, a library, club, or cafe.
Many game consoles can be connected to the
Internet and used for chatting and other online
interactions. It is also possible to access the
Internet on mobile devices such as cellular
telephones and other handheld devices. In other
words, children don’t have to be in the company
of responsible adults to use the Internet.
Tips for managing your child’s social
media presence
Fact finder:
What initiatives to protect children
online are active in your country or
organisation?
News from around the world:
Statistics, laws, more tools
experiences
So how do we ensure that they have a beneficial
and wholesome experience on the Internet?
Acknowledging the problem is a good place to
start. Beyond the basics of opening
communication lines, increased parental
involvement and supervision, acknowledgement
comes with education and awareness about
recent and foreseen threats. One could, for
instance, learn about the latest social media sites
and become familiar with online lingo. One could
also interest oneself and others on areas that are
under-researched like minor-minor solicitation,
creation of harmful content by minors, and the
intersection of different mobile and Internet-based
technologies. The more aware we are of what is
out there, the better equipped we will be to assist
the young community to protect themselves on
the Internet.
and
The Child Online Protection (COP)
Global Initiative: Past, ongoing and
future activities
“ITU-IMPACT at a glance!”:
Events, country projects and training
programmes
Take some time to respond to our global fact
finder. Enjoy the read!
Yours truly,
Amelia Gowa
Policy Analyst,
Centre for Policy and International Cooperation
Volume No16: August - September 2012
www.impact-alliance.org
1
CYBERBULLYING:
A VICTIM’S TALE OF
LIES,
AND THE MADNESS OF THE
CROWDS
In the Philippines, where virtually everyone who
has an Internet connection is on Facebook, it
becomes all too easy to change - and even
destroy - peoples’ lives without a moment’s
hesitation.
entertainment eventually turned out to be the
medium for his oppression: he became the victim
of a very ugly prank.
One morning, on checking his account, he found
messages from an anonymous user accusing him
of having HIV and allegedly spreading it. His
picture was on a poster and had been distributed
far and wide. Life as he knew it was not the same
from then on and that understates the horror he
went through.
Just like millions of other Pinoys, 27 year old
Raymond Malinay is a confessed Facebook
fanatic: he spends every free minute online
updating his status, sharing his thoughts, and
liking his friends’ posts. He even made his
account public to reach more people. But what
Raymond considered nothing more than a tool for Read more about this real-life story here.
H
ow you handle your child’s web presence has serious implications for both you and
your children’s finances, not to mention their safety. According to Norton’s 2010 Online
Family Report, 62% have had a negative experience online, and 33% have downloaded a
virus. Two in five children have had an anonymous person try to add them as a friend on
a social site. No matter how old your child is, you’ve likely confronted questions
surrounding his social media usage. You may have posted pictures of your baby on
Facebook or had your child beg you for his own Club Penguin/Twitter/Facebook account.
Below are a few tips on how to manage social media.
MANAGING YOUR CHILD’S
SOCIAL MEDIA PRESENCE
Teach Good Internet Practices. Why: As your children get older, make sure they
know the social media blunders that will hurt their career. “No technology can take the
place of talking to your children about the importance of managing and protecting their
own privacy. Your child will be poking around on the internet (either at your own home, at
a friend’s home or at school) so be proactive and teach as much as you can about
staying safe.”
Give Social Media Training Wheels. Why: Your child will probably want to hang out
online long before she reaches the age when Facebook allows her. So let her play in a
safe area designed just for kids, with strong privacy controls in place.
Ensure your kids follow age limits on the site. Why: The recommended age for
signing up for social websites is usually 13 and over. If your children are under the
recommended age for these sites, do not let them use the sites. It is important to
remember that you cannot rely on the services themselves to keep your underage child
from signing up.
Be smart about details in photographs. Why: Explain to your children that
photographs can reveal a lot of personal information. Encourage your children not to post
photographs of themselves or their friends with clearly identifiable details such as street
signs, license plates on their cars, or the name of their school on their sweatshirts.
Warn your child about expressing emotions to strangers. Why: You've probably
already discouraged your children from communicating with strangers directly online.
However, they use social websites to write journals and poems that often express strong
emotions. Explain to your children that many of these words can be read by anyone with
access to the Internet and that predators often search out emotionally vulnerable
children.
Insist that your children never meet anyone in person that they've
communicated with online only, and encourage them to communicate only
with people they've met in person. Why: Children are in real danger when they meet
strangers in person whom they've communicated with online only. You can help protect
your children by encouraging them to use these sites to communicate with their friends,
but not with people they've never met in person.
See the full articles from which the above were compiled, for more tips:
9 Tips for Managing Your Child's Social Media Presence (Forbes)
How to help your kids use social websites more safely (Microsoft)
GLOBAL FACT FINDER:
What initiatives to protect children online are active in your country/organisation? Do you think that more needs to be
done to protect children, teenagers and young adults as they interact on the Internet?
Send us a short email at [email protected] to share with us.
2
Events related to cybersecurity (2012):
AROUND THE WORLD…
6th International Digital Media Fair & Festival
October 7 - 13 | Tehran, Iran
ITU TELECOM WORLD
October 14 - 18 | Dubai, United Arab Emirates
IMPACT International Advisory Board (IAB)
Meeting
October 17 | Dubai, United Arab Emirates
Global CyberLympics Security Challenge 2012,
World Finals
October 29 | Miami, United States of America
Call For Papers In Cyber Law
Deadline: October 30 | Tbilisi, Georgia
81st INTERPOL General Assembly
November 5 - 8 | Rome, Italy
The European Child Safety Online Conference
2012
November 15 | Brussels, Belgium
Georgian ICT Development and Cyber Security
Event (GITI) 2012 – “IT for Future”
November 15 - 17 | Tbilisi, Georgia
World Telecommunication Standardization
Assembly (WTSA-12)
November 20 - 29 | Dubai, United Arab Emirates
World Conference on International
Telecommunications (WCIT)
December 3 - 14 | Dubai, United Arab Emirates
Pressure on Japan for stronger laws on
child pornography
Japan is the only OECD nation that has not
universally outlawed possession of child
pornography and activists say the new, tougher
local laws in Kyoto will not change that
overnight.
wasn't long before the machine learning
approach was identifying more than 15,000
bullying-related tweets per day.
A school lesson about identity theft
It’s no secret that identity thefts have
seemingly reached near-epidemic proportions,
with scammers indiscriminately targeting young
and old alike. Identity thieves are more
frequently stealing children’s Social Security
numbers, birth certificates, photographs and
other information to obtain credit cards, apply
for loans and land jobs.
Balkans gets tough on internet crimes
against children
Regional data shows that 20 percent of
children who use the Internet become the
target of an online predator or paedophile.
Countries throughout the region are
considering ways to protect children from What kind of gamer are you?
paedophiles and other unseen dangers on the An infographic from Trend Micro showing two
kinds of gamers. It also outlines the risks of
Internet.
becoming embroiled in online gaming activities.
Young criminals fail to realize online
Screen addicted children may have newest
photos, videos can follow them to court
These days, even entry-level cell phones come mental illness
standard with a decent digital camera and Children addicted to using electronic devices
basic Internet access. That makes it easy to 24/7 will be diagnosed with a serious mental
update your Facebook status or share pictures illness if a new addiction, included as
and video with family and friends in a matter of ''internet-use disorder'' in a worldwide
seconds. But that convenience can lead to psychiatric manual, is confirmed by further
research.
trouble too.
Learning machines scour Twitter for
cyberbullying research
Typical bullying research methods rely on the
kids — victims and bullies alike — to describe
their experiences in self-reporting surveys.
Sufficiently trained, the computer went to work
on samples of the 250 million publicly visible
messages posted on Twitter on a daily basis. It
The top Internet dangers for kids
Your kids probably know more about Internet
technology than you do. That does not mean,
however, that they know how to protect
themselves from online threats. Some of the
top five concerns to talk to your kids about are
outlined here.
For more event information please visit our
page here.
Child Online Protection (COP) Global Initiative
This global initiative was launched by the International Telecommunication Union (ITU) in 2008, aimed at bringing together partners from all
sectors of the global community to ensure a safe and secure online experience for children everywhere. COP aims to tackle cybersecurity
issues faced by children, teenagers and young adults holistically, addressing legal, technical, organizational and procedural issues as well as
capacity building and international cooperation. The President of Costa Rica, Laura Chinchilla is the Patron of the COP global initiative while
Deborah Taylor Tate, a former commissioner of the United States
Federal Communications Commission is the Special Envoy.
Past activities:

ITU drafted a “Child Online Protection National Strategy
Guide”, which presents a model for developing a national
strategy that mitigates online risks to children.
February 2012: ITU started to develop a national case study in
Costa Rica, to demonstrate best practices.
Ongoing and future activities:
October 2012: ITU with the support of The Cyber Guardian, is
organising a high-level COP session during ITU Telecom World 2012,
to be held in Dubai. The main purpose of the session is to raise
awareness and share knowledge on protecting children online.
March 2012: The Connect Arab Summit in Oman affirmed the need  ITU is also working in partnership with the Commonwealth
to establish a curriculum on cybersecurity, aimed at capacity building Telecommunications Organisation (CTO) to facilitate the establishment
and raising awareness in governments, academia, and the private
of national frameworks for COP in some countries of the African
sector, focusing on the protection of children in the online world.
continent.
April 2012: The Authority for Info-Communications Technology
Industry (AITI) of Brunei Darussalam with the support of
ITU-IMPACT and its partners, organised a COP national framework
workshop to develop a sustainable action plan to be implemented in
the country over the next 12 months.
June 2012: ITU held a Regional Workshop on the Legal Aspects of
COP in Algeria, where the legal aspects of COP and the need to
create a working group on the establishment of a regional legal
framework for Arab countries were discussed.
July 2012: The COP Workshop during the ITU-IMPACT ALERT
Cyber Drill for Arab Region held in Jordan emphasised the need to
enhance on cooperation, nationally, regionally and internationally.

The world’s first Global CyberLympics – an annual series of team
based cybersecurity games - will have regional championships held
across the various continents globally. The final to determine the world
champion will be held on 29 October in Miami, United States of
America. Endorsed by ITU-IMPACT, and under the patronage of ITU
Secretary General Dr Hamadoun Touré, it is organised by the
EC-Council Foundation.

ITU, together with its partners, is organising the African Child
Online Protection (ACOP) Summit 2013 to be held in Uganda. The
overall aim of the summit is to lay foundation for the implementation and
coordination of national, regional and international COP policies,
instruments and tools.
3
ITU-IMPACT AT A GLANCE!
OCTOBER
SEPTEMBER
CIRT ASSESSMENT:
Lebanon
CIRT IMPLEMENTATION:
Zambia
ITU-IMPACT cybersecurity experts conducted CIRT assessment for
Lebanon from 1 - 6 October. The mission was aimed at assisting the country
in assessing its readiness to implement a national CIRT. The national CIRT
will provide the capability to identify, respond and manage cyber threats as
well as enhance the cybersecurity posture of the country.
ITU-IMPACT cybersecurity experts
successfully executed Computer
Incident Response Team (CIRT)
Implementation for Zambia from 3 - 14
September.
TRAINING:
Securing Networks
Thailand
ITU-IMPACT ALERT:
Europe Region - Bulgaria
ITU-IMPACT will conduct the ALERT (Applied
Learning for Emergency Response Team), also
known as the cyber drill, in Bulgaria this October in
collaboration with the Ministry of Transport,
Information Technology and Communication of
Bulgaria during the Regional Forum on
Cybersecurity for Europe and CIS. The forum will
take place from 23 - 25 October in Sofia, Bulgaria.
NOVEMBER
CIRT IMPLEMENTATION:
Kenya
CIRT IMPLEMENTATION:
Uganda & Burkina Faso
ITU-IMPACT implemented the national
CIRT for Kenya from 24 September - 5
October. The ten-day implementation
programme was carried out by
ITU-IMPACT’s team of experts. The
implementation aimed to assist the country to set up its national CIRT
centre which will serve as the national
focus point for coordinating
cybersecurity incident response in the
country. The CIRT centre will act as an
enabler for countries that are
embarking on their projects to establish
a national CIRT.
ITU-IMPACT cybersecurity experts will
execute the implementation of national CIRT
centres for the following countries:


The Securing Network course is
designed to cover network security best
practices and methods for participants to
administer, manage and secure
network-based systems better. The training, conducted in Thailand
from 10 - 13 September, was organised by ITU-IMPACT, hosted by
Thailand Computer Emergency Response Team (ThaiCERT) and
sponsored by ABI Research. This course was attended by candidates
from five countries namely: Cambodia, Laos, Myanmar, Vietnam and
Thailand.
Uganda | 5 - 16 November
Burkina Faso | 12 - 23 November
DECEMBER
ITU-IMPACT ALERT:
South Asia - Sri Lanka
ITU-IMPACT with the National CERT|CC
(Computer Emergency Readiness Team |
Co-ordination Center) of Sri Lanka will be
organising the ITU-IMPACT ALERT for
South Asia Countries scheduled for 3 December. The South Asia Countries
include: India, Sri Lanka and ABBMN countries (Afghanistan, Bhutan,
Bangladesh, Maldives, Nepal).
ONGOING
EC- Council Information Security
Training Sponsorship Programme
EC-Council will be offering Information Security
Training Sponsorship Programme (ISTP) to all
ITU-IMPACT partner countries. For more
information, email [email protected].
COP
CHALLENGE
2012:
Malaysia
The challenge allowed children and
teachers to learn and understand the
COP initiatives in a fun-filled way. The
main objective of the event was to
assist schools to plan and deploy
sustainable COP programmes for their
schools. The event, organised by
IMPACT and supported by Malaysian
Communications and Multimedia
Commission (MCMC and the
International Telecommunication Union
(ITU), took place on 22 September.
The COP challenge was also
sponsored by E-Crime
Expert,
F-Secure, OnGuard Online and Trend
Micro.
Privacy policy: If you wish to join or be removed from the e-newsletter mailing list / general enquiries, please send an email to the address below:
Jalan IMPACT, T: + 60 (3) 8313 2020
63000 Cyberjaya, F: + 60 (3) 8319 2020
Malaysia. E: [email protected]
impact-alliance.org
4