1 / 27

Creating a Decision-Making Matrix for Digital Safety

Creating a Decision-Making Matrix for Digital Safety. The Challenge…. Prepare for today? Or Prepare for tomorrow?. Sources.

bo-reeves
Download Presentation

Creating a Decision-Making Matrix for Digital Safety

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Creating a Decision-Making Matrix for Digital Safety

  2. The Challenge…. Prepare for today? Or Prepare for tomorrow?

  3. Sources Nigam, Hemanshu, and Anne Collier. "Youth Safety on a Living Internet." National Telecommunications and Information Administration. 4 June 2010. Web. 25 Oct. 2011. http://www.ntia.doc.gov/legacy/reports/2010/OSTWG_Final_Report_060410.pdf The McArthur Foundation. "Living and Learning with New Media: Summary of Findings from the Digital Youth Project." Living and Learning with New Media: Summary of Findings from the Digital Youth Project. The McArthur Foundation, 19 Nov. 2008. Web. 25 Oct. 2011. http://www.macfound.org/atf/cf/%7BB0386CE3-8B29-4162-8098-E466FB856794%7D/DML_ETHNOG_WHITEPAPER.PDF.

  4. Teach and Model for Tomorrow “The best software is between the ears.” Susan Crawford

  5. Access is Everywhere “There is no single ‘silver bullet’ solution or technological ‘quick-fix.’ ” Youth Safety on a Living Internet

  6. Four Properties of Networked “Public” • Persistence: online expressions are automatically recorded and archived. • Replicability: content made out of bits can be duplicated. • Scalability: the potential visibility of content in networked publics is great. • Searchability: content in networked publics can be accessed through search Taken Out of Context, danahboyd

  7. From a Big World to a Small World Small world, big world, small world again.

  8. Audience is Everything “A technology’s value is shaped by its social construction—how designers create it and how people use it, interpret it, and reconfigure it. It is not an outcome of the technology alone or its potential.” Social context is driven by audience. Are you a part of your children’s audience? Taken out of context, d. boyd

  9. The New Norm of Digital Communications • Invisible audiences: not all audiences are visible when a person is contributing online, nor are they necessarily co-present. • Collapsed contexts: the lack of spatial, social, and temporal boundaries makes it difficult to maintain distinct social contexts. • The blurring of public and private: without control over context, public and private become meaningless binaries, are scaled in new ways, and are difficult to maintain as distinct. Taken out of context, d. boyd

  10. How Youth Use Digital Communications • Four participatoryactivities • Circulating media • Connecting with each other • Creating Media • Collaborating with each other McArthur Digital Youth Project

  11. Connect Safely Online • Taxonomy of Safety • Physical Safety • Psychological Safety • Reputational Safety • Identity, Property, and Community Safety www.ConnectSafely.org, Anne Collier

  12. Decision-Making Matrix Types of Safety Types of Activities

  13. Twitter Will sending this message put me at risk? Will this be hurtful to anyone? Will this risk my identity in damaging ways? Will this jeopardize my future?

  14. Twitter, as Circulating Media

  15. Twitter Will sending this message put me at risk? Will this be hurtful to anyone? Will this risk my identity in damaging ways? Will this jeopardize my future?

  16. Twitter Will sending this message put me at risk? Will this be hurtful to anyone? Will this risk my identity in damaging ways? Will this jeopardize my future?

  17. Facebook Will this be hurtful to anyone? Will this jeopardize anyone’s future? Will sending this message put me at risk? Will this risk my/others identity in damaging ways?

  18. Facebook tagging, as Connecting with Media

  19. YouTube Will this be hurtful to anyone? Will this jeopardize anyone’s future? Will sending this message put me at risk? Will this risk my/ others identity in damaging ways?

  20. Uploading Videos, as Creating Media

  21. Uploading Videos, as Creating Media “A federal judge won't end the suspension of a Kentridge High senior punished for disrupting a classroom by allegedly producing a sophomoric video that pokes fun at a teacher and was posted on YouTube.” “Two other students, one who shot the video and another who danced behind Mong, also were suspended for 40 days.” Read more: http://www.seattlepi.com/local/article/Judge-won-t-end-student-s-suspension-saying-it-s-1238196.php#ixzz1cjyUHWqH

  22. Wikipedia Will sending this message put me at risk? Will this be hurtful to anyone? Will this jeopardize anyone’s future? Will this risk my/ others identity in damaging ways?

  23. Wikipedia, as Collaborating with Media Stephen Colbert on 'Wikiality' – “the method of making something up, but getting enough people to agree with you so it becomes reality.”

  24. McArthur Digital Youth Project “Most young people are trying to make the right choices in a world that most of us don’t fully understand, yet a world where they can’t get good advice from the adults around them.”

  25. Know What the Possibilities Are • Geo-locational Technology • Memes/ Hashtags • Flash Mobs • Addiction/Obsession • Password Security • Screen Sharing

  26. Not a Map, But a Compass

More Related