Feeds

Kids more likely to be bullied than pestered online

Web dangers mirror real-life dangers? Whodathunkit?

The essential guide to IT transformation

Research paid for by US state attorneys general has found the dangers of life online for US kids are pretty much the same as those they face in real life - and that the solutions are better parenting and education rather than technological silver bullets.

The final report of the Internet Safety Technical Task Force, available here, found that the greatest danger faced by kids was bullying and harrassment. It spent almost a year looking at online child safety particularly regarding use of social networks like Bebo and Facebook.

The Task Force said sexual predation of minors by adults remains a concern, but: "Youth report sexual solicitation of minors by minors more frequently, but these incidents, too, are understudied, underreported to law enforcement and not part of most conversations about online safety." The report noted that most research on internet related child exploitation pre-dates the rise of social networks.

On the subject of problematic or illegal content the report said: "Unwanted exposure to pornography does occur online, but those most likely to be exposed are those seeking it out, such as older male minors."

It found that social networks were not the most common place for dodgy content but were frequently used for bullying - because they reinforce and reflect existing social relationships.

It reviewed 40 types of technology aimed at reducing issues of child safety but found none entirely satisfactory.

The Task Force was cautious of the likelihood of a technology solution to these problems.

Technology can play a helpful role, but there is no one technological solution or specific combination of technological solutions to the problem of online safety for minors. Instead, a combination of technologies, in concert with parental oversight, education, social services, law enforcement, and sound policies by social network sites and service providers may assist in addressing specific problems that minors face online.

The group called for better funding for schools and libraries to provide online safety education, and research into exactly what risks children run online and on the use of new technologies by registered sex offenders. Finally it recommended that parents and caregivers educate themselves about the internet and how their kids are using it, and be engaged with their child's internet use. ®

The essential guide to IT transformation

More from The Register

next story
Britain's housing crisis: What are we going to do about it?
Rent control: Better than bombs at destroying housing
Top beak: UK privacy law may be reconsidered because of social media
Rise of Twitter etc creates 'enormous challenges'
GCHQ protesters stick it to British spooks ... by drinking urine
Activists told NOT to snap pics of staff at the concrete doughnut
What do you mean, I have to POST a PHYSICAL CHEQUE to get my gun licence?
Stop bitching about firearms fees - we need computerisation
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
We need less U.S. in our WWW – Euro digital chief Steelie Neelie
EC moves to shift status quo at Internet Governance Forum
Oz biz regulator discovers shared servers in EPIC FACEPALM
'Not aware' that one IP can hold more than one Website
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.