Safer Online: Strategies and Advice for Librarians...Other ways to make your library safe Web...

Post on 08-Jul-2020

0 views 0 download

transcript

Safer Online:

Strategies and

Advice for LibrariansPCI Webinars | Carrie

Rogers-Whitehead |

carrie@respons-ability.net

Welcome!My name is Carrie Rogers-Whitehead

My company Digital Respons-Ability works in the area of

digital citizenship and teaches the topics covered in this

webinar to students, teachers and parents.

You can find us at:

@digital_empower

https://respons-ability.net

carrie@respons-ability.net2

Our research aka, shameless plug

◎ A book of our curriculum, teaching models, strategies for teaching and everything digital citizenship is coming out fall 2019 with Rowman & Littlefield called Digital Citizenship: Teaching and Strategies from the Field

3

What this webinar will cover

◎Cybersecurity trends and safety◎Online privacy◎Cyberbullying◎The WHYs of cyberbullying◎Where cyberbullying occurs◎Digital sexual violence◎What librarians can do to prevent cyberbullying

◎Resources & Strategies to stay safe◎References and Q & A

4

1.Cybersecurity and

Online Safety Trends

What’s changing and what does the future bring?

5

““Companies spend millions of dollars

on firewalls, encryption and secure access devices, and it’s money wasted;

none of these measures address the weakest link in the security chain.”–

Kevin Mitnick, hacker

6

7

•The amount of items

now connected to the

Internet of Things (or

IoT), is expected grow

to over a trillion dollar

industry by 2021.

•With more items being

connected the

likelihood of

cyberattacks

increases.

•Smart speakers are

part of the IoT

• Overconfident users: According to a 2016 study at Frederich-Alexander University, "78% of people claim to be aware of the risk of phishing attacks in emails, but click anyways.”

• An IDC/AT&T study found that about 9% of companies admitted they had cybersecurity issues, but 62% of companies reported a breach in the last 12 months.

We think we know more than we do

Mobile attacks

◎ There is more malware targeted towards mobile phones than ever before

◎ Mobile scam calls have increased from about 4% in 2017 to 30% in 2018 and expected to grow more in 2019

◎ More ”neighborhood spoofing”- about 90% of calls have your local area code

9

Smart Speakers and Privacy

10

Blockchain and the future

Some thinkers and futurists believe that:

◎ Blockchain will be the tech behind the sharing economy

◎ Make transactions cheap and quicker

◎Will make the Internet of Things secure

◎ Make online transactions more secure

11

2.Online Privacy

Suggestions for individuals and institutions

12

Can we even

expect privacy

any more?

13

Tips for Mobile Privacy

◎ Change your default browser

◎ Turn off predictive text and dictation

◎ Turn off all connections and location on Android

◎ Delete inaction apps and check out their privacy grade at http://privacygrade.org

14

Privacy App/Software

Suggestions

◎Signal- End to end encryption for texts

◎Burner Email- Cuts back on SPAM with temporary “burner” emails

◎VPN- Virtual Private Network

◎Robokiller- SPAM call blockers

◎Last Pass- Easier way to share passwords

Place your screenshot here

15

Privacy tips for library desktops1. Have secure browsers installed

2. Require HTTPS for all the library website, catalog and on public

computers https://www.eff.org/https-everywhere/

3. Use anti-malware, anti-spam, anti-virus and restoration software to

protect against threats and remove user histories16

Library

Freedom

Institute has

easy-to-use

privacy

resources

17

3.Cyberbullying

Why do people cyberbully? Where does it occur? What is digital sexual violence?

18

What do you

see in your

library?

19

The WHYS of

cyberbullyingo Access

o Opportunity

o Boredom

o Jealously

o Desire for attention

o Competition for status

o Hurt feelings after a breakup

o 40% of students who cyberbully say they do not feel any feelings of guilt or shame after the bullying according to a study in the American Journal of Orthopsychiatry

20

Victims

◎ Highest risk according to a CDC report is an LGBTQ girl in ninth grade

◎ LGBTQ

◎ Female

◎ Former dating partner or friend of thee perpetrator

Who are the victims and

perpetrators of cyberbullying?

Perpetrators

◎ Former victims of cyberbullying

◎ Former friend or dating partner of the victim

◎ More likely to be female

◎ Long and unsupervised access to the Internet

◎ Traditional bullies more likely to be male

21

Where does cyberbullying happen?

◎ Online comments sections

◎ Social media

◎ Games- Men are more likely to bully and be bullied on games

◎ Social media

◎ Dating apps

◎ Anonymous message boards like Reddit

22

Risk Factors

Individuals who have

a lack of connection to

peers are more likely

to exhibit unhealthy

online behavior and

be at risk for predators

online.

Loneliness

Protective Factors

Individuals who have

more social connection

are more likely to use

technology in a positive

way and have more

resiliency to negative

online behaviors.

23

Digital Sexual Violence Includes

o Privacy violations

o Cyberstalking

o Cyberbullying

o Doxing

o Trolling

o Unsolicited sharing of pornography

o Posting shaming and other information or pictures

without consent

o Hacking and stealing personal images

o Taking explicit pictures or videos without consent

o Harassment, particularly with online gaming 24

Your teens at the library are most

likely higher risk

◎ The average victim of sextortion is a 15 year old female

◎ Risk factors for child sex trafficking are runaways, homeless youth, LGBTQ, refugee and migrant children, 50-90% of sex trafficking victims have been involved in child welfare.

25

Women are more likely to be

sexually harassed online than

men, particularly young women

26

However, men are slightly more

likely to be harassed online than

women

2/3 of American adults have

witnessed online harassment

What can librarians do to combat

cyberbullying?

Keep them Busy

Youth involved in after school programs are less likely to engage in delinquent behavior. This can also be a positive space with peers. Offering things to do afterschool can help with cyberbullying.

Do not Shame

If a young person doesn’t believe cyberbullying is wrong, then an adult comes in and tells them what they’re doing is hurtful, this can increase defensiveness. Encourage empathy; don’t adopt a no tolerance policy.

Rove and be aware

Individuals with long, unsupervised access to the Internet are more likely to cyberbully. Rove around the public PCs and check in with young people. Let them know you’re present and a safe space.

27

Organizational Advice to deal with

cyberbullying

Clear lines of communication

and policiesStaff training

Treat cyberbullying

as victimization,

not conflict

28

Where can you report internet crimes

and other suspicions?

◎ National Center for Missing and Exploited Children http://api.missingkids.org/home

◎ FBI’s Internet Complaint Center https://www.ic3.gov/complaint/default.aspx

◎ National Human Trafficking Hotline https://humantraffickinghotline.org/report-trafficking

29

Other ways to make your library safe

Web AnalyticsLimit personal data collected from library websites.

Limit LMS data collectionLimit the amount of personal data your LMS collects

LMS safetyUnderstand that through plug ins and links to reviews people can go outside the LMS.

EncourageEncourage young people to report incidents they see online.

Utilize Plug-insOn top of using a secure browser, consider installing plug-ins like Disconnect, Ghostery and Do Not Track.

Regularly update devicesMake sure software and updates are current.

30

5.References and Q&A

Any questions?

31

Thank you

Any questions or comments?

You can find me at:

@digital_empower

carrie@respons-ability.net

https://respons-ability.net

32

References

◎Adler, Sara Elizabeth “Scam Calls are Epidemic-and Getting Worse,” AARP https://www.aarp.org/money/scams-fraud/info-2018/scammer-calls-increasing.html

◎Rogers-Whitehead, Carrie “Here’s what you need to know about cyberbullying,” KSL https://www.ksl.com/article/46407726/heres-what-you-need-to-know-about-cyberbullying

◎Centers for Disease Control and Prevention, “Youth Risk Behavior Surveillance- United States, 2017,” MMWR, https://www.cdc.gov/healthyyouth/data/yrbs/pdf/2017/ss6708.pdf

◎Pew Research, “Online Harassment 2017” http://www.pewinternet.org/2017/07/11/online-harassment-2017/

◎Hoffman, Andrews, Jacob “What every librarian needs to know about HTTPS,” Electronic Frontier Foundation, https://www.eff.org/deeplinks/2015/05/what-every-librarian-needs-know-about-https

33

References

◎Adler, Sara Elizabeth “Scam Calls are Epidemic-and Getting Worse,” AARP https://www.aarp.org/money/scams-fraud/info-2018/scammer-calls-increasing.html

◎American Library Association “Library Privacy Guidelines for Public Access Computers and Networks,” http://www.ala.org/advocacy/privacy/guidelines/public-access-computer

◎We are Thorn, ”Stop Sextortion” https://www.stopsextortion.com

◎Hood, Michelle, and Amanda L. Duffy. "Understanding the Relationship between Cyber-victimisation and Cyber-bullying on Social Network Sites: The Role of Moderating Factors." Personality and Individual Differences 133 (2018): 103-08. doi:10.1016/j.paid.2017.04.004.

34

References

◎Hill, Jacob, “The Cybersecurity Overconfidence Trap,” AT&T https://www.business.att.com/learn/secure-networking/the-cybersecurity-overconfidence-trap.html

◎Surveillance Self Defense, Electronic Frontier Foundation https://ssd.eff.org

◎Library Freedom Project, https://libraryfreedomproject.org

◎Fowler, Geoffrey, “I live with Alexa, Google Assistant and Siri. Here’s which one you should pick.” Washington Post, https://www.washingtonpost.com/technology/2018/11/21/i-live-with-alexa-google-assistant-siri-heres-which-you-should-pick/?noredirect=on&utm_term=.db5571fb9bf6

◎ Presentation template by SlidesCarnival

◎ Photographs by Unsplash & Death to the Stock Photo (license)

35