Inside the black-box. children rights in the digital age. Conceição Costa José Rogado Carla Sousa Sara Henriques

Similar documents
COMMISSION OF THE EUROPEAN COMMUNITIES COMMISSION RECOMMENDATION

Enabling ICT for. development

What is Digital Literacy and Why is it Important?

Policy recommendations. Digital literacy

Media Literacy Expert Group Draft 2006

G20 Initiative #eskills4girls

Running Head: CULMINATING PROJECT 1

DIGITAL CITIZENSHIP EDUCATION (DCE)

INTERNET SAFETY. OBJECTIVES: 1. Internet safety what is true and what is false? 2. & Instant Messaging safety 3. Strangers on the Internet

Media Literacy Policy

networked Youth Research for Empowerment in the Digital society MANIFESTO

SOCIAL DECODING OF SOCIAL MEDIA: AN INTERVIEW WITH ANABEL QUAN-HAASE

DIGITAL TECHNOLOGY, ECONOMIC DIVERSIFICATION AND STRUCTURAL TRANSFORMATION XIAOLAN FU OXFORD UNIVERSITY

Culturally and Linguistically Diverse Young People and Digital Citizenship:

VOICES OF YOUTH CITIZENS Digital Citizenship and Safety

Chromebook Information Meeting

Betsy Braziel Burkhart Communication and Media Director Contra Costa County November 2, 2016

BUILDING DIGITAL COMPETENCIES TO BENEFIT FROM EXISTING AND EMERGING TECHNOLOGIES, WITH A SPECIAL FOCUS ON GENDER AND YOUTH DIMENSIONS

What is Networking? and (drumroll) the answer is C

Media and Information Literacy - Policies and Practices. Introduction to the research report Albania

UNITED NATIONS EDUCATIONAL, SCIENTIFIC AND CULTURAL ORGANIZATION

COMMISSION OF THE EUROPEAN COMMUNITIES

Outline. IPTS and the Information Society Unit IPTS Research Agenda on ICT for Governance

Take 1 minute to read the following questions. Listen to the recording. Mark down useful notes and answer the following questions.

Personal Data Protection Competency Framework for School Students. Intended to help Educators

We re on the winning track! REGIONAL INNOVATION STRATEGY FOR EAST SWEDEN

Women and Minorities in STEM Careers Advancing our World

Data users and data producers interaction: the Web-COSI project experience

The Digital Divide. Factors that contribute towards widening the digital divide gap: Poverty. Education

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

The Initiative of the Government of Portugal and the TaC-Together against Cybercrime International

Disruptive SBC strategies for the future of Africa

Chromebook Information Meeting

Living in Purpose: 6-Month Mastery Program for Miracle-Minded Thinking Transcript for the Living in Purpose video by Lisa Natoli

Computer Science as a Discipline

INVESTIGATION ON BEST PRACTICES IN INNOVATION AND RESEARCHES ON EXTRACURRICULAR MEDIA COMPETENCES

TRENDS IN TECHNOLOGY: LOOKING AHEAD FOR OUTDOOR RECREATION

APEC Internet and Digital Economy Roadmap

MODULE 5 FACEBOOK PROMOTION AND MARKETING STRATEGIES

Coming Out. Making the Virtual Library Visible in Today s World. Dr Grace Saw and Janine Schmidt

Robin Gaines Lanzi, PhD, MPH

Running Head: IDENTIFYING GENERATIONAL DIFFERENCES OF IDENTITY

EUROPEAN APPROACH TO MEDIA LITERACY

Public Education and Outreach for Supporting Nuclear Program in Indonesia

INFORMATION LITERACY AND ARTICLE NINETEEN. Paul Sturges and Almuth Gastinger

Know your skills and know what you love, I am going to talk about that and it will make more sense later. And, a very cheesy, believe in yourself.

A Balanced Introduction to Computer Science, 3/E

PROJECT FACT SHEET GREEK-GERMANY CO-FUNDED PROJECT. project proposal to the funding measure

WE ARE THE FLOW. About the Győr 2023 application for the title of the European Capital of Culture

Strategic Policy Forum: A Roadmap for Digital Entrepreneurship

The number theory behind cryptography

Why Affiliate Marketing Doesn t Work for You

HOW TO CHOOSE The Right College For You.

Privacy, Technology and Economics in the 5G Environment

Looking forward: Children & young people, families & education and the future of technology

Social Media that Work in

We encourage you to print this booklet for easy reading. Blogging for Beginners 1

C>CF. Citizenship Educational Change. In My View 02:10. by Mike Ribble. p^ 1

EMSD Digital Economy - Back to Back Workshop Team: Krish Chetty (HSRC), LIU Qigun (AIF), LI Wenwei (AIF), CHEN Fang (AIF) 31 May 2017

Catalogue of Responses to Consultation Paper (Draft APEC Internet Economy Principles)

Understanding Real-World Mobile Network Experience

Here are 10 more ideas that I love from my friends and family.

Curriculum Links Twist. GCSE Drama AQA Exam board: Component 1: Understanding drama. Section A: Knowledge and Understanding

How To Make Money With CPALead

Kirsten Drotner is chair of media studies at University of South Denmark

Pacesetters Class. Lesson 8

Case 4:74-cv DCB Document Filed 09/01/17 Page 293 of 322 APPENDIX V 156

collaboration innovation visionary impactful agility integrity 4 th Industrial Revolution Its implications for South Africa

Social marketing - insight driven approaches to vaccination confidence building for all

Webinar Module Eight: Companion Guide Putting Referrals Into Action

Can we better support and motivate scientists to deliver impact? Looking at the role of research evaluation and metrics. Áine Regan & Maeve Henchion

From the foundation of innovation to the future of innovation

MODULE 4 CREATING SOCIAL MEDIA CONTENT

Impacts of media literacy to enhance right to know and access to information: democracy perspective

Information & Communication Technology Strategy

Strategic Plan Public engagement with research

The Next Era of Global Technological Development

Public Discussion. January 10, :00 a.m. to 1:15 p.m. EST. #NASEMscicomm. Division of Behavioral and Social Sciences and Education

Smart Com Group. A child at home, a colleague at work

Promoting citizen-based services through local cultural partnerships

Argumentative Interactions in Online Asynchronous Communication

BI TRENDS FOR Data De-silofication: The Secret to Success in the Analytics Economy

Arts Catalyze Placemaking Webinar: Self-Reporting Requirements

Software LEIC/LETI. Lecture 21

Public Radio Navigates the Digital Revolution. Jacobs Media #PRTS2018

FELLOWSHIP SUMMARY PAPER. Digital Inclusion in New Zealand A CALL TO ACTION

Legal Notice: The Author and Publisher assume no responsibility or liability whatsoever on the behalf of any Purchaser or Reader of these materials.

Core Content for Social Studies Assessment

mathematics and technology, including through such methods as distance

The LASAR Epistemic Insight Project Symposium

Science with and for Society Project Partner Search Form

Guidelines 12 on Sustainability Science in Research and Education 3

Formative Evaluation of Mindfulness in Schools

RADIO BEFORE ROCK AND ROLL

THE COMPUTER PARTY THE GATHERING.

Pine Hill Public Schools Curriculum

Digital Education Action Plan: priorities, actions and timeframe

OUR WORLD YOUR POTENTIAL OUR PROGRAMME

1. How would you define, or how do you understand, the theme Connecting and Enabling the Next Billion?

UNWTO Working Groups

Transcription:

Inside the black-box children rights in the digital age Conceição Costa José Rogado Carla Sousa Sara Henriques

Children Rights in the Digital Age The United Nations Convention on the Rights of the Child (1989) Children have rights and their views and voices are to be considered It has been impacting governments, civil society and the private sector and ICT driven companies on the internet should not be exception! According to Livingstone, Carr and Byrne (2015) Internet governance bodies have a everyone -based approach to online users that does not meet, respect or protect the rights of the children in a digital era ( ) The main problem is to find a balance between a protectionist approach and a responsible and mindful one that also understands children s right to access information, media and culture, the right to privacy and active participation in social and cultural forums. July 2016 2

Media literacy matters for children rights In a ICT driven economy To children fully exert their rights to participate, to have privacy and freedom of expression (among others) they may understand the technological underlying processes of digital environments Media literacy is not a stand-alone competence but is mutually defined in relation to the interpretability or legibility of the technologies with which people engage (Livingstone et al. 2013, 217) All stakeholders in charge of children education should act in order to minimize risks while not loosing the opportunities of digital environments July 2016 3

The study An exploratory study as part of Gamilerning research project Aim To understand how knowledge about security technological processes improves children s capability of managing their digital identities and online presence To understand the value of pedagogies of play Hypothesis Young citizens literate on managing their digital identities will be able to navigate, communicate, play and learn online more safely, achieving a more responsible connected presence and protecting their privacy. Using a constructionist approach and action research methodology July 2016 Playful Learning 4

Method Sample 13 young people aged between 14 and 18 years old (Average=15,85) 5 girls and 8 boys, 2 of them are refugees Students of the 3 rd cycle of Basic Education (vocational) with an average of 8.31 years of completed formal Education Residents in disadvantaged areas Low levels of literacy in several domains Doing a media education programme at our University as supervised internship (Prática simulada in Portuguese) All of them have smartphone and use social networks Instagram, Facebook, Snapchat and WhatsApp July 2016 Playful Learning 5

Materials and Procedures 1 st step The basic concepts related to e-presence were elicited by viewing a video about digital footprints (Jaro, 2014) Focus group, to gather data on their attitudes on e- presence, focusing on data management and protection rights 2 nd step Viewing the video The secret alphabet to learn how to encrypt and decrypt messages using the Caesar Cipher: a mono alphabetic transposition cipher used since the antiquity

Materials and Procedures The Cipher Wheel 3 rd step Youth played the Secret Alphabet game with the help of a cipher wheel The rules of play were introduced 3 teams, the messengers (2 teams) and the Intruders Allowing competition and collaboration Simulating a real life scenario on the internet Playful activity and Participant observation 4rd step Six participants were selected randomly to individual semistructured interviews Data analysis using discourse analysis techniques

The Cipher Wheel: how it works Clear Text Cipher Text July 2016 8

The Game - to mimic a real life scenario Messengers Team1 Messengers Team2 Internet Intruders July 2016 Playful Learning 9

Results: Digital Footprint Focus Group Three types of attitudes/perceptions among youth They are unaware of digital footprint and online tracks, before they watched the video One boy made evident his discomfort about text exchanges while playing online : I can t repeat here what we usually say The perceptions of digital identity management Youth discussed who is in charge of managing our data and this responsibility was assigned to big internet companies, what elicited a concern about who is the owner of these companies, and what is their interest in our data: I think whoever controls our data is Google, I just don t know who owns Google. I think they are rich. Just I do not know why! All that we have installed is free and they could only make money if they oblige us to pay. Someone suggested advertisements and the entire group agreed that our data have financial value

Results: Digital Footprint Focus Group Three types of attitudes/perceptions among youth The attitudes regarding the online life vs. offline life dichotomy Youth defined online life as a different part of the real world, offering us a set of risks and opportunities The perception of opportunities is linked to all resources it can offers us, and how they can help us in our daily lives While the perception of risks is mainly bounded to the beliefs of social contact loss When we are on the Internet we interact differently, we have much more help to do what we need, while in real life we have to understand everything by ourselves. Internet spoils people s social contact. We can be all together, but we end up being always distant (using the mobile phones)

Results: Encryption Learning Activity Participant observation made evidence of a superior engagement, when compared to software training

Results: Encryption Learning Activity Interviews 6 questions related to youth perceptions about managing their online identities, online security and children rights World Cloud of youth perceptions about internet

Results: Encryption Learning Activity Interviews When questioned about Human/children rights: Most of the youth could only remember of 1 or 2 All together they talk about privacy, education, protection, equality, home conditions, and also, with the notion of all the society being responsible for children Youth s attitudes regarding the relation between human rights and internet Freedom of expression and privacy were the most referred, although, this was a contention topic: On the internet I have the right to do everything. Some youth tend to reinforce the internet s role in the dissemination of social injustices, as an attempt to sensitize people to help solve them.

Results: Encryption Learning Activity Interviews How they manage the privacy of their online accounts Youth mainly refer to accept the privacy definitions of each online game or social network When asked if they know what Institutions could help them on digital security and protection - No idea - was the answer When asked about what they have learned from the encryption activity I learned that we can make games that motivate us... we can talk using code in a fun way I have learn how to code/decode messages it could help me in the future The Caesar Cipher is related with security, only those with the secret know. We need to know how to think and it can be a game also so we will remember more of it

Conclusion These particular youth in our sample are part of those with high rates of failure at school Youth knowledge of their own rights is very superficial and a few think that on the internet they have more rights They don t knew that their online behaviors are traced but they have learned their data has monetary value The encryption/decryption activity was an effective way of learning not only basic concepts of security, but increased engagement was observed and in their blogs they created simple games applying the Caesar cipher, which became the theme for games of their own choice Academia should work side-by-side with formal Education with hands-on approaches that could create a bottom-up process of change in the way we teach and create knowledge Academia influence on policies is very important, but a move should be done to reach teachers and students in an adequate time span

Conclusion Youth slightly opened the Black Box Questions? Maybe later on? Thank you! conceicao.costa@ulusofona.pt