Safer Online:
Strategies and
Advice for LibrariansPCI Webinars | Carrie
Rogers-Whitehead |
Welcome!My name is Carrie Rogers-Whitehead
My company Digital Respons-Ability works in the area of
digital citizenship and teaches the topics covered in this
webinar to students, teachers and parents.
You can find us at:
@digital_empower
https://respons-ability.net
Our research aka, shameless plug
◎ A book of our curriculum, teaching models, strategies for teaching and everything digital citizenship is coming out fall 2019 with Rowman & Littlefield called Digital Citizenship: Teaching and Strategies from the Field
3
What this webinar will cover
◎Cybersecurity trends and safety◎Online privacy◎Cyberbullying◎The WHYs of cyberbullying◎Where cyberbullying occurs◎Digital sexual violence◎What librarians can do to prevent cyberbullying
◎Resources & Strategies to stay safe◎References and Q & A
4
1.Cybersecurity and
Online Safety Trends
What’s changing and what does the future bring?
5
““Companies spend millions of dollars
on firewalls, encryption and secure access devices, and it’s money wasted;
none of these measures address the weakest link in the security chain.”–
Kevin Mitnick, hacker
6
7
•The amount of items
now connected to the
Internet of Things (or
IoT), is expected grow
to over a trillion dollar
industry by 2021.
•With more items being
connected the
likelihood of
cyberattacks
increases.
•Smart speakers are
part of the IoT
• Overconfident users: According to a 2016 study at Frederich-Alexander University, "78% of people claim to be aware of the risk of phishing attacks in emails, but click anyways.”
• An IDC/AT&T study found that about 9% of companies admitted they had cybersecurity issues, but 62% of companies reported a breach in the last 12 months.
We think we know more than we do
Mobile attacks
◎ There is more malware targeted towards mobile phones than ever before
◎ Mobile scam calls have increased from about 4% in 2017 to 30% in 2018 and expected to grow more in 2019
◎ More ”neighborhood spoofing”- about 90% of calls have your local area code
9
Smart Speakers and Privacy
10
Blockchain and the future
Some thinkers and futurists believe that:
◎ Blockchain will be the tech behind the sharing economy
◎ Make transactions cheap and quicker
◎Will make the Internet of Things secure
◎ Make online transactions more secure
11
2.Online Privacy
Suggestions for individuals and institutions
12
Can we even
expect privacy
any more?
13
Tips for Mobile Privacy
◎ Change your default browser
◎ Turn off predictive text and dictation
◎ Turn off all connections and location on Android
◎ Delete inaction apps and check out their privacy grade at http://privacygrade.org
14
Privacy App/Software
Suggestions
◎Signal- End to end encryption for texts
◎Burner Email- Cuts back on SPAM with temporary “burner” emails
◎VPN- Virtual Private Network
◎Robokiller- SPAM call blockers
◎Last Pass- Easier way to share passwords
Place your screenshot here
15
Privacy tips for library desktops1. Have secure browsers installed
2. Require HTTPS for all the library website, catalog and on public
computers https://www.eff.org/https-everywhere/
3. Use anti-malware, anti-spam, anti-virus and restoration software to
protect against threats and remove user histories16
Library
Freedom
Institute has
easy-to-use
privacy
resources
17
3.Cyberbullying
Why do people cyberbully? Where does it occur? What is digital sexual violence?
18
What do you
see in your
library?
19
The WHYS of
cyberbullyingo Access
o Opportunity
o Boredom
o Jealously
o Desire for attention
o Competition for status
o Hurt feelings after a breakup
o 40% of students who cyberbully say they do not feel any feelings of guilt or shame after the bullying according to a study in the American Journal of Orthopsychiatry
20
Victims
◎ Highest risk according to a CDC report is an LGBTQ girl in ninth grade
◎ LGBTQ
◎ Female
◎ Former dating partner or friend of thee perpetrator
Who are the victims and
perpetrators of cyberbullying?
Perpetrators
◎ Former victims of cyberbullying
◎ Former friend or dating partner of the victim
◎ More likely to be female
◎ Long and unsupervised access to the Internet
◎ Traditional bullies more likely to be male
21
Where does cyberbullying happen?
◎ Online comments sections
◎ Social media
◎ Games- Men are more likely to bully and be bullied on games
◎ Social media
◎ Dating apps
◎ Anonymous message boards like Reddit
22
Risk Factors
Individuals who have
a lack of connection to
peers are more likely
to exhibit unhealthy
online behavior and
be at risk for predators
online.
Loneliness
Protective Factors
Individuals who have
more social connection
are more likely to use
technology in a positive
way and have more
resiliency to negative
online behaviors.
23
Digital Sexual Violence Includes
o Privacy violations
o Cyberstalking
o Cyberbullying
o Doxing
o Trolling
o Unsolicited sharing of pornography
o Posting shaming and other information or pictures
without consent
o Hacking and stealing personal images
o Taking explicit pictures or videos without consent
o Harassment, particularly with online gaming 24
Your teens at the library are most
likely higher risk
◎ The average victim of sextortion is a 15 year old female
◎ Risk factors for child sex trafficking are runaways, homeless youth, LGBTQ, refugee and migrant children, 50-90% of sex trafficking victims have been involved in child welfare.
25
Women are more likely to be
sexually harassed online than
men, particularly young women
26
However, men are slightly more
likely to be harassed online than
women
2/3 of American adults have
witnessed online harassment
What can librarians do to combat
cyberbullying?
Keep them Busy
Youth involved in after school programs are less likely to engage in delinquent behavior. This can also be a positive space with peers. Offering things to do afterschool can help with cyberbullying.
Do not Shame
If a young person doesn’t believe cyberbullying is wrong, then an adult comes in and tells them what they’re doing is hurtful, this can increase defensiveness. Encourage empathy; don’t adopt a no tolerance policy.
Rove and be aware
Individuals with long, unsupervised access to the Internet are more likely to cyberbully. Rove around the public PCs and check in with young people. Let them know you’re present and a safe space.
27
Organizational Advice to deal with
cyberbullying
Clear lines of communication
and policiesStaff training
Treat cyberbullying
as victimization,
not conflict
28
Where can you report internet crimes
and other suspicions?
◎ National Center for Missing and Exploited Children http://api.missingkids.org/home
◎ FBI’s Internet Complaint Center https://www.ic3.gov/complaint/default.aspx
◎ National Human Trafficking Hotline https://humantraffickinghotline.org/report-trafficking
29
Other ways to make your library safe
Web AnalyticsLimit personal data collected from library websites.
Limit LMS data collectionLimit the amount of personal data your LMS collects
LMS safetyUnderstand that through plug ins and links to reviews people can go outside the LMS.
EncourageEncourage young people to report incidents they see online.
Utilize Plug-insOn top of using a secure browser, consider installing plug-ins like Disconnect, Ghostery and Do Not Track.
Regularly update devicesMake sure software and updates are current.
30
5.References and Q&A
Any questions?
31
Thank you
Any questions or comments?
You can find me at:
@digital_empower
https://respons-ability.net
32
References
◎Adler, Sara Elizabeth “Scam Calls are Epidemic-and Getting Worse,” AARP https://www.aarp.org/money/scams-fraud/info-2018/scammer-calls-increasing.html
◎Rogers-Whitehead, Carrie “Here’s what you need to know about cyberbullying,” KSL https://www.ksl.com/article/46407726/heres-what-you-need-to-know-about-cyberbullying
◎Centers for Disease Control and Prevention, “Youth Risk Behavior Surveillance- United States, 2017,” MMWR, https://www.cdc.gov/healthyyouth/data/yrbs/pdf/2017/ss6708.pdf
◎Pew Research, “Online Harassment 2017” http://www.pewinternet.org/2017/07/11/online-harassment-2017/
◎Hoffman, Andrews, Jacob “What every librarian needs to know about HTTPS,” Electronic Frontier Foundation, https://www.eff.org/deeplinks/2015/05/what-every-librarian-needs-know-about-https
33
References
◎Adler, Sara Elizabeth “Scam Calls are Epidemic-and Getting Worse,” AARP https://www.aarp.org/money/scams-fraud/info-2018/scammer-calls-increasing.html
◎American Library Association “Library Privacy Guidelines for Public Access Computers and Networks,” http://www.ala.org/advocacy/privacy/guidelines/public-access-computer
◎We are Thorn, ”Stop Sextortion” https://www.stopsextortion.com
◎Hood, Michelle, and Amanda L. Duffy. "Understanding the Relationship between Cyber-victimisation and Cyber-bullying on Social Network Sites: The Role of Moderating Factors." Personality and Individual Differences 133 (2018): 103-08. doi:10.1016/j.paid.2017.04.004.
34
References
◎Hill, Jacob, “The Cybersecurity Overconfidence Trap,” AT&T https://www.business.att.com/learn/secure-networking/the-cybersecurity-overconfidence-trap.html
◎Surveillance Self Defense, Electronic Frontier Foundation https://ssd.eff.org
◎Library Freedom Project, https://libraryfreedomproject.org
◎Fowler, Geoffrey, “I live with Alexa, Google Assistant and Siri. Here’s which one you should pick.” Washington Post, https://www.washingtonpost.com/technology/2018/11/21/i-live-with-alexa-google-assistant-siri-heres-which-you-should-pick/?noredirect=on&utm_term=.db5571fb9bf6
◎ Presentation template by SlidesCarnival
◎ Photographs by Unsplash & Death to the Stock Photo (license)
35