CyberEye Focus Article: Cyberbullying: Through the eyes of the
Transcription
CyberEye Focus Article: Cyberbullying: Through the eyes of the
Child Safety Online: Are you aware of what your child is doing on the Internet? “How it happened, I don’t know...but it did! She was right in front of me. Watch your children folks!” - Father of a teen kidnapped by someone she met online From the Editor’s Desk! CyberEye Focus Article: Cyberbullying: Through the eyes of the victim Greetings from IMPACT! Everyone is speeding down the information highway, and children, teenagers and young adults are no exception to this. Children get a lot of benefits from being online, but they can also be targets of crime, exploitation, and harassment in this as in any other environment. Children can go online from personal computers at home, a friend’s house, in school, a library, club, or cafe. Many game consoles can be connected to the Internet and used for chatting and other online interactions. It is also possible to access the Internet on mobile devices such as cellular telephones and other handheld devices. In other words, children don’t have to be in the company of responsible adults to use the Internet. Tips for managing your child’s social media presence Fact finder: What initiatives to protect children online are active in your country or organisation? News from around the world: Statistics, laws, more tools experiences So how do we ensure that they have a beneficial and wholesome experience on the Internet? Acknowledging the problem is a good place to start. Beyond the basics of opening communication lines, increased parental involvement and supervision, acknowledgement comes with education and awareness about recent and foreseen threats. One could, for instance, learn about the latest social media sites and become familiar with online lingo. One could also interest oneself and others on areas that are under-researched like minor-minor solicitation, creation of harmful content by minors, and the intersection of different mobile and Internet-based technologies. The more aware we are of what is out there, the better equipped we will be to assist the young community to protect themselves on the Internet. and The Child Online Protection (COP) Global Initiative: Past, ongoing and future activities “ITU-IMPACT at a glance!”: Events, country projects and training programmes Take some time to respond to our global fact finder. Enjoy the read! Yours truly, Amelia Gowa Policy Analyst, Centre for Policy and International Cooperation Volume No16: August - September 2012 www.impact-alliance.org 1 CYBERBULLYING: A VICTIM’S TALE OF LIES, AND THE MADNESS OF THE CROWDS In the Philippines, where virtually everyone who has an Internet connection is on Facebook, it becomes all too easy to change - and even destroy - peoples’ lives without a moment’s hesitation. entertainment eventually turned out to be the medium for his oppression: he became the victim of a very ugly prank. One morning, on checking his account, he found messages from an anonymous user accusing him of having HIV and allegedly spreading it. His picture was on a poster and had been distributed far and wide. Life as he knew it was not the same from then on and that understates the horror he went through. Just like millions of other Pinoys, 27 year old Raymond Malinay is a confessed Facebook fanatic: he spends every free minute online updating his status, sharing his thoughts, and liking his friends’ posts. He even made his account public to reach more people. But what Raymond considered nothing more than a tool for Read more about this real-life story here. H ow you handle your child’s web presence has serious implications for both you and your children’s finances, not to mention their safety. According to Norton’s 2010 Online Family Report, 62% have had a negative experience online, and 33% have downloaded a virus. Two in five children have had an anonymous person try to add them as a friend on a social site. No matter how old your child is, you’ve likely confronted questions surrounding his social media usage. You may have posted pictures of your baby on Facebook or had your child beg you for his own Club Penguin/Twitter/Facebook account. Below are a few tips on how to manage social media. MANAGING YOUR CHILD’S SOCIAL MEDIA PRESENCE Teach Good Internet Practices. Why: As your children get older, make sure they know the social media blunders that will hurt their career. “No technology can take the place of talking to your children about the importance of managing and protecting their own privacy. Your child will be poking around on the internet (either at your own home, at a friend’s home or at school) so be proactive and teach as much as you can about staying safe.” Give Social Media Training Wheels. Why: Your child will probably want to hang out online long before she reaches the age when Facebook allows her. So let her play in a safe area designed just for kids, with strong privacy controls in place. Ensure your kids follow age limits on the site. Why: The recommended age for signing up for social websites is usually 13 and over. If your children are under the recommended age for these sites, do not let them use the sites. It is important to remember that you cannot rely on the services themselves to keep your underage child from signing up. Be smart about details in photographs. Why: Explain to your children that photographs can reveal a lot of personal information. Encourage your children not to post photographs of themselves or their friends with clearly identifiable details such as street signs, license plates on their cars, or the name of their school on their sweatshirts. Warn your child about expressing emotions to strangers. Why: You've probably already discouraged your children from communicating with strangers directly online. However, they use social websites to write journals and poems that often express strong emotions. Explain to your children that many of these words can be read by anyone with access to the Internet and that predators often search out emotionally vulnerable children. Insist that your children never meet anyone in person that they've communicated with online only, and encourage them to communicate only with people they've met in person. Why: Children are in real danger when they meet strangers in person whom they've communicated with online only. You can help protect your children by encouraging them to use these sites to communicate with their friends, but not with people they've never met in person. See the full articles from which the above were compiled, for more tips: 9 Tips for Managing Your Child's Social Media Presence (Forbes) How to help your kids use social websites more safely (Microsoft) GLOBAL FACT FINDER: What initiatives to protect children online are active in your country/organisation? Do you think that more needs to be done to protect children, teenagers and young adults as they interact on the Internet? Send us a short email at [email protected] to share with us. 2 Events related to cybersecurity (2012): AROUND THE WORLD… 6th International Digital Media Fair & Festival October 7 - 13 | Tehran, Iran ITU TELECOM WORLD October 14 - 18 | Dubai, United Arab Emirates IMPACT International Advisory Board (IAB) Meeting October 17 | Dubai, United Arab Emirates Global CyberLympics Security Challenge 2012, World Finals October 29 | Miami, United States of America Call For Papers In Cyber Law Deadline: October 30 | Tbilisi, Georgia 81st INTERPOL General Assembly November 5 - 8 | Rome, Italy The European Child Safety Online Conference 2012 November 15 | Brussels, Belgium Georgian ICT Development and Cyber Security Event (GITI) 2012 – “IT for Future” November 15 - 17 | Tbilisi, Georgia World Telecommunication Standardization Assembly (WTSA-12) November 20 - 29 | Dubai, United Arab Emirates World Conference on International Telecommunications (WCIT) December 3 - 14 | Dubai, United Arab Emirates Pressure on Japan for stronger laws on child pornography Japan is the only OECD nation that has not universally outlawed possession of child pornography and activists say the new, tougher local laws in Kyoto will not change that overnight. wasn't long before the machine learning approach was identifying more than 15,000 bullying-related tweets per day. A school lesson about identity theft It’s no secret that identity thefts have seemingly reached near-epidemic proportions, with scammers indiscriminately targeting young and old alike. Identity thieves are more frequently stealing children’s Social Security numbers, birth certificates, photographs and other information to obtain credit cards, apply for loans and land jobs. Balkans gets tough on internet crimes against children Regional data shows that 20 percent of children who use the Internet become the target of an online predator or paedophile. Countries throughout the region are considering ways to protect children from What kind of gamer are you? paedophiles and other unseen dangers on the An infographic from Trend Micro showing two kinds of gamers. It also outlines the risks of Internet. becoming embroiled in online gaming activities. Young criminals fail to realize online Screen addicted children may have newest photos, videos can follow them to court These days, even entry-level cell phones come mental illness standard with a decent digital camera and Children addicted to using electronic devices basic Internet access. That makes it easy to 24/7 will be diagnosed with a serious mental update your Facebook status or share pictures illness if a new addiction, included as and video with family and friends in a matter of ''internet-use disorder'' in a worldwide seconds. But that convenience can lead to psychiatric manual, is confirmed by further research. trouble too. Learning machines scour Twitter for cyberbullying research Typical bullying research methods rely on the kids — victims and bullies alike — to describe their experiences in self-reporting surveys. Sufficiently trained, the computer went to work on samples of the 250 million publicly visible messages posted on Twitter on a daily basis. It The top Internet dangers for kids Your kids probably know more about Internet technology than you do. That does not mean, however, that they know how to protect themselves from online threats. Some of the top five concerns to talk to your kids about are outlined here. For more event information please visit our page here. Child Online Protection (COP) Global Initiative This global initiative was launched by the International Telecommunication Union (ITU) in 2008, aimed at bringing together partners from all sectors of the global community to ensure a safe and secure online experience for children everywhere. COP aims to tackle cybersecurity issues faced by children, teenagers and young adults holistically, addressing legal, technical, organizational and procedural issues as well as capacity building and international cooperation. The President of Costa Rica, Laura Chinchilla is the Patron of the COP global initiative while Deborah Taylor Tate, a former commissioner of the United States Federal Communications Commission is the Special Envoy. Past activities: ITU drafted a “Child Online Protection National Strategy Guide”, which presents a model for developing a national strategy that mitigates online risks to children. February 2012: ITU started to develop a national case study in Costa Rica, to demonstrate best practices. Ongoing and future activities: October 2012: ITU with the support of The Cyber Guardian, is organising a high-level COP session during ITU Telecom World 2012, to be held in Dubai. The main purpose of the session is to raise awareness and share knowledge on protecting children online. March 2012: The Connect Arab Summit in Oman affirmed the need ITU is also working in partnership with the Commonwealth to establish a curriculum on cybersecurity, aimed at capacity building Telecommunications Organisation (CTO) to facilitate the establishment and raising awareness in governments, academia, and the private of national frameworks for COP in some countries of the African sector, focusing on the protection of children in the online world. continent. April 2012: The Authority for Info-Communications Technology Industry (AITI) of Brunei Darussalam with the support of ITU-IMPACT and its partners, organised a COP national framework workshop to develop a sustainable action plan to be implemented in the country over the next 12 months. June 2012: ITU held a Regional Workshop on the Legal Aspects of COP in Algeria, where the legal aspects of COP and the need to create a working group on the establishment of a regional legal framework for Arab countries were discussed. July 2012: The COP Workshop during the ITU-IMPACT ALERT Cyber Drill for Arab Region held in Jordan emphasised the need to enhance on cooperation, nationally, regionally and internationally. The world’s first Global CyberLympics – an annual series of team based cybersecurity games - will have regional championships held across the various continents globally. The final to determine the world champion will be held on 29 October in Miami, United States of America. Endorsed by ITU-IMPACT, and under the patronage of ITU Secretary General Dr Hamadoun Touré, it is organised by the EC-Council Foundation. ITU, together with its partners, is organising the African Child Online Protection (ACOP) Summit 2013 to be held in Uganda. The overall aim of the summit is to lay foundation for the implementation and coordination of national, regional and international COP policies, instruments and tools. 3 ITU-IMPACT AT A GLANCE! OCTOBER SEPTEMBER CIRT ASSESSMENT: Lebanon CIRT IMPLEMENTATION: Zambia ITU-IMPACT cybersecurity experts conducted CIRT assessment for Lebanon from 1 - 6 October. The mission was aimed at assisting the country in assessing its readiness to implement a national CIRT. The national CIRT will provide the capability to identify, respond and manage cyber threats as well as enhance the cybersecurity posture of the country. ITU-IMPACT cybersecurity experts successfully executed Computer Incident Response Team (CIRT) Implementation for Zambia from 3 - 14 September. TRAINING: Securing Networks Thailand ITU-IMPACT ALERT: Europe Region - Bulgaria ITU-IMPACT will conduct the ALERT (Applied Learning for Emergency Response Team), also known as the cyber drill, in Bulgaria this October in collaboration with the Ministry of Transport, Information Technology and Communication of Bulgaria during the Regional Forum on Cybersecurity for Europe and CIS. The forum will take place from 23 - 25 October in Sofia, Bulgaria. NOVEMBER CIRT IMPLEMENTATION: Kenya CIRT IMPLEMENTATION: Uganda & Burkina Faso ITU-IMPACT implemented the national CIRT for Kenya from 24 September - 5 October. The ten-day implementation programme was carried out by ITU-IMPACT’s team of experts. The implementation aimed to assist the country to set up its national CIRT centre which will serve as the national focus point for coordinating cybersecurity incident response in the country. The CIRT centre will act as an enabler for countries that are embarking on their projects to establish a national CIRT. ITU-IMPACT cybersecurity experts will execute the implementation of national CIRT centres for the following countries: The Securing Network course is designed to cover network security best practices and methods for participants to administer, manage and secure network-based systems better. The training, conducted in Thailand from 10 - 13 September, was organised by ITU-IMPACT, hosted by Thailand Computer Emergency Response Team (ThaiCERT) and sponsored by ABI Research. This course was attended by candidates from five countries namely: Cambodia, Laos, Myanmar, Vietnam and Thailand. Uganda | 5 - 16 November Burkina Faso | 12 - 23 November DECEMBER ITU-IMPACT ALERT: South Asia - Sri Lanka ITU-IMPACT with the National CERT|CC (Computer Emergency Readiness Team | Co-ordination Center) of Sri Lanka will be organising the ITU-IMPACT ALERT for South Asia Countries scheduled for 3 December. The South Asia Countries include: India, Sri Lanka and ABBMN countries (Afghanistan, Bhutan, Bangladesh, Maldives, Nepal). ONGOING EC- Council Information Security Training Sponsorship Programme EC-Council will be offering Information Security Training Sponsorship Programme (ISTP) to all ITU-IMPACT partner countries. For more information, email [email protected]. COP CHALLENGE 2012: Malaysia The challenge allowed children and teachers to learn and understand the COP initiatives in a fun-filled way. The main objective of the event was to assist schools to plan and deploy sustainable COP programmes for their schools. The event, organised by IMPACT and supported by Malaysian Communications and Multimedia Commission (MCMC and the International Telecommunication Union (ITU), took place on 22 September. The COP challenge was also sponsored by E-Crime Expert, F-Secure, OnGuard Online and Trend Micro. Privacy policy: If you wish to join or be removed from the e-newsletter mailing list / general enquiries, please send an email to the address below: Jalan IMPACT, T: + 60 (3) 8313 2020 63000 Cyberjaya, F: + 60 (3) 8319 2020 Malaysia. E: [email protected] impact-alliance.org 4