11
Cyber Security and Cyber Behaviour Wednesday 11 June 2013 Alister Payne [email protected]

Cyber Security and Cyber Behaviour

  • Upload
    shaw

  • View
    66

  • Download
    0

Embed Size (px)

DESCRIPTION

Cyber Security and Cyber Behaviour. Wednesday 11 June 2013 Alister Payne [email protected]. What is driving the surge in technology?. Technology is growing at an exponential rate PM rated mobile phone as the number 1 most influential and most life changing invention - PowerPoint PPT Presentation

Citation preview

Page 1: Cyber Security and Cyber Behaviour

Cyber Security and Cyber BehaviourWednesday 11 June 2013

Alister [email protected]

Page 2: Cyber Security and Cyber Behaviour

What is driving the surge in technology?

• Technology is growing at an exponential rate• PM rated mobile phone as the number 1 most influential and

most life changing invention• Mobile phone growth is the fastest in the world

• The arrival of undersea fibre optic cables• Social media & instant messaging

Alister Payne [email protected]

Page 3: Cyber Security and Cyber Behaviour

The great divide

• Parent and kids relate to technology differently• Either not au fait with the latest technology• Or adults use it as a business or communication tool• Kids use technology as a social tool

• They are able to create personas that are different to what they are like in real life

• And so it is fair to say that the divide exists because we are using the same or similar technology for completely different reasons

Alister Payne [email protected]

Page 4: Cyber Security and Cyber Behaviour

The Statistics

• The internet is playing an ever increasing role in the daily lives of children

86%

14%Internet access at home

YesNo

% (n=1258)0

10

20

30

40

50

60

70

80

90

100

38.9%

45.3%

15.9%

Internet monitoring at home

Yes, oftenYes, but only sometimesNo, they never moni-tor my online activity

Perc

enta

ge

Payne 2012

Cellphone ownership0

102030405060708090

100

10%8%

82%

Cell phone ownership

Yes, with internetYes, but no internetNo

Perc

enta

ge

Payne 2012

Payne 2012

Alister Payne [email protected]

Page 5: Cyber Security and Cyber Behaviour

What are the risks of internet usage?

• Exposure to inappropriate content• Sexually explicit content• Self-harm material (eating disorders; suicide)• Network with like-minded people, and explore and affirm deviant

behaviour• Undesirable contact with strangers• Grooming by paedophiles

• Inappropriate conduct perpetrated by children• Sexting• Online harassment & the new phenomenon of cyberbullying

Alister Payne [email protected]

Page 6: Cyber Security and Cyber Behaviour

What is cyberbullying?

• Definition:• Bullying via electronic media or communication

• Characteristics in common with traditional bullying:• The intent to do harm;• Repetition;• Imbalance of power.

• Additional unique characteristics:• Anonymity• Lack of feedback;• Reach of perpetrator;

• Beyond school-yard;• Draw in larger audience

• Punitive fear;

Alister Payne [email protected]

Page 7: Cyber Security and Cyber Behaviour

Is my child at risk?• Age• Ages 12 to 13

• Gender• Female more at risk• Single sex girls schools

• Traditional bullying factors• Traditional bullies – Cyber bullies• Traditional victims – Cyber victims & Cyber bullies

• Academic performance• Frequency of access• Versus duration

Alister Payne [email protected]

Grade 6 Grade 7 Grade 8 Grade 9 Grade 101

1.05

1.1

1.15

1.2

1.25

Means of Cyber Victimisation and Bullying by GRADE

Victim Bully

Grade

Mea

n

Page 8: Cyber Security and Cyber Behaviour

Warning signs

• A child may be a victim of cyberbullying if he or she…• unexpectedly stops using the computer• appears nervous or jumpy when an Instant Message, text

message, or Email appears• appears uneasy about going to school or outside in general• appears to be angry, depressed, or frustrated after using the

computer• avoids discussions about what they are doing on the computer• becomes abnormally withdrawn from usual friends and family

members

Alister Payne [email protected]

Page 9: Cyber Security and Cyber Behaviour

What can I do?

• Investigate thoroughly• Find identity of person• Keep evidence• Stop responding• Become directly involved and involve a trusted adult• Contact the staff at school - you will need witnesses, don’t

meet alone

Alister Payne [email protected]

Page 10: Cyber Security and Cyber Behaviour

Striking a health balance

• Become informed• Open relationship with people, you need to be able to discuss

issues – Don’t over react• Emphasis empathy - fine line between funny & cruel• Create a technology corner in the home & have a cut-off time• Evaluate online friendships• Check safety settings on the Facebook account - Facebook

family centre• Take responsibility:• Mobiflock.com (Apple/Android/Nokia/Blackberry) | Kids Place

(android)• Parents must be Facebook friend

Alister Payne [email protected]

Page 11: Cyber Security and Cyber Behaviour

Q & A