Child online safety in the developing world: Difference between revisions

From Youth and Media
Jump to navigation Jump to search
 
(38 intermediate revisions by 8 users not shown)
Line 1: Line 1:
[[Image:Berkuniceflogo.png‎|thumb|300px|[http://cyber.law.harvard.edu/ Harvard's Berkman Center for Internet and Society] and [http://unicef.org UNICEF].]]
[[Image:Berkuniceflogo.png|thumb|300px|[http://cyber.law.harvard.edu/ Harvard's Berkman Center for Internet and Society] and [http://unicef.org UNICEF].]]




Line 8: Line 8:
Many organizations are working to make information and communication technologies (ICT) available to children in developing countries to improve education and quality of life. While some of these groups acknowledge online safety as an issue that should be addressed in the future, this has not, as yet, been targeted as a priority. Because of basic resource constraints, the time and resources of the organizations are instead focused on increasing accessibility of ICT in these communities. We hope that this project will be an opportunity to provide the additional time and resources necessary to work towards solving the safety issues that have been identified but not yet addressed.
Many organizations are working to make information and communication technologies (ICT) available to children in developing countries to improve education and quality of life. While some of these groups acknowledge online safety as an issue that should be addressed in the future, this has not, as yet, been targeted as a priority. Because of basic resource constraints, the time and resources of the organizations are instead focused on increasing accessibility of ICT in these communities. We hope that this project will be an opportunity to provide the additional time and resources necessary to work towards solving the safety issues that have been identified but not yet addressed.


As of July 23rd, 2009, the [[Community contributions|community participation]] page is now live. An important part of our research relies on personal observations and experiences, and here you will find some questions to encourage this kind of dialogue. [[#How_you_can_contribute|Read more]] about how you can contribute.
As of July 23rd, 2009, the [[Community contributions|community participation]] page is live and frequently updated (last update July 2010). An important part of our research relies on personal observations and experiences, and here you will find some questions designed to encourage this kind of dialogue that you can respond to. [[#How_you_can_contribute|Read more]] about how you can contribute.


== Literature review and findings ==
== Literature review and findings ==


In June/July 2009, Berkman conducted a preliminary literature review of the existing body of research on these issues. This is a brief summary of some of our key finidngs; we hope to make a PDF version of the full text available soon.
As a result of  collaboration between the Berkman Center for and UNICEF, Berkman conducted a preliminary literature review of the existing body of research on these issues. The brief summary of our key findings have been published in the exploratory study [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1628276 Working Towards a Deeper Understanding of Digital Safety for Children and Young People in Developing Nations]. The objectives of the exploratory study are threefold: First (and foremost), it seeks to raise awareness about issues related to digital safety for youth in developing nations. Second, it aims to provide a tentative map of these issues and give insights into the current state of the respective research based on an exploratory literature review. Third, the paper seeks to outline the contours of a research framework through a series of working hypotheses that might inform subsequent research efforts on these issues by connecting efforts in developing and industrialized nations.


=== Existing Research ===
=== Existing Research ===
Line 43: Line 43:


This overall problem encompasses many more specific issues, and it will be important to take a multi-pronged approach. One of the next steps should be identifying the problems children in developing nations are facing and map these issues in the respective technological, social, and economic context; from there, we will be better equipped to develop tangible, accessible targeted solutions and resources. Drawing upon ideas from the ITU's Child Online Protection initiative, we will need to engage all levels of players: children, parents/educators, industry, and government.
This overall problem encompasses many more specific issues, and it will be important to take a multi-pronged approach. One of the next steps should be identifying the problems children in developing nations are facing and map these issues in the respective technological, social, and economic context; from there, we will be better equipped to develop tangible, accessible targeted solutions and resources. Drawing upon ideas from the ITU's Child Online Protection initiative, we will need to engage all levels of players: children, parents/educators, industry, and government.
Strategic Framework (2011)
Phase one:
1) Determine policies in place or in the process of development
2) Determine big obvious issues that need new policy solutions (gap analysis) & pursue some of them
3) Start a research process that is translational in nature (and other forms of capacity-building)
4) Advocate on an ongoing basis for attention to digital child safety issues and education of policy-making community, teachers, kids
5) Development of a knowledge network: FB group, wiki
6) Publish a pamphlet-type one-pager as a primer to the issues involved
7) Develop an assessment framework and process for successful policy interventions
Phase two:
1) Develop and implement a process for sharing of best practices by region etc.
2) Develop and implement a process for sharing data across regions
3) Develop and implement a process for integrating data into policy approaches


=== How you can contribute ===
=== How you can contribute ===


Because the body of formal academic research on these topics is fairly limited, the information we can gain from the thoughts, experiences and observations of individuals is going to be a critical part of this project. We've developed a list of questions that follow our line of inquiry to serve as a starting point for this process. You can access that list [[Community contributions|here]] and add your responses directly to the wiki page, or send your response to ldyson@cyber.law.harvard.edu. We encourage anyone who is interested to take a few moments to participate.
Because the body of formal academic research on these topics is fairly limited, the information we can gain from the thoughts, experiences and observations of individuals is going to be a critical part of this project. We've developed a list of questions that follow our line of inquiry to serve as a starting point for this process. You can access that list [[Community contributions|here]] and add your responses directly to the wiki page, or send your response to scortesi@cyber.law.harvard.edu. We encourage anyone who is interested to take a few moments to participate.


==Additional resources==
==Additional resources==
Line 55: Line 72:


* [http://news.bbc.co.uk/2/hi/africa/4795255.stm "BBC Wap use flourishing in Africa"], BBC News, August 15, 2006.
* [http://news.bbc.co.uk/2/hi/africa/4795255.stm "BBC Wap use flourishing in Africa"], BBC News, August 15, 2006.
* Chigona, Kamkwenda and Manjoo [http://www.sajim.co.za/default.asp?to=peer4vol10nr3 "Uses and gratifications of mobile Internet among South African students"], South African Journal of Information Management, 2008.
* [http://advocacy.globalvoicesonline.org/2009/06/11/brazil-amplified-conversations-to-fight-the-digital-crimes-bill/ "Brazil: Amplified conversations to fight the Digital Crimes Bill Diego Casaes for Global Voices"], Diego Casaes for Global Voices 2009.
* [http://www.missingkids.com/en_US/documents/CP_Legislation_Report.pdf Child Pornography: Model Legislation & Global Review], International Centre for Missing & Exploited Children, 2006.
* [http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/Documents/Reports-Presentations/2079_if09_pres_gilbertogoogle.pdf "Brazil's Experience in Obtaining ooperation from ISPs in the Fight Against Child Pornography"], Gilberto Martins de Almeida 2009.
* [http://www.ndacan.cornell.edu/NDACAN/Datasets/UserGuidePDFs/134user.pdf First Youth Internet Safety Survey], Crimes Against Children Research Center, 2000.
* [http://www.articleco.com/Article/Bullying-and-Cyber-Bullying-in-Schools--Need-to-address-the-Legal-and-Policy-Vacuum-in-India/47140 "Bullying and Cyber Bullying in Schools: Need to address the Legal and Policy Vacuum in India"], Halder & Jaishankar 2007.
* [http://www.idrc.ca/en/ev-86423-201-1-DO_TOPIC.html Internet Child Pornography and Young People in Dakar], International Development Research Centre, 2004.  
* [http://www.icmec.org/missingkids/servlet/PageServlet?LanguageCountry=en_X1&PageId=3085 "Child Pornography: Model Legislation & Global Review"], International Centre for Missing & Exploited Children, 2008.
* [http://hspa.gsmworld.com/upload/papers/documents/26052009105450.pdf "Mobile Broadband connects the unconnected in Tanzania"], Global Systems Mobile Alliance, 2008.
* [http://www.ecpat.net/WorldCongressIII/PDF/Publications/ICT_Psychosocial/Thematic_Paper_ICTPsy_ENG.pdf "Child Pornography and Sexual Exploitation of Children Online"], ECPAT International at the World Congress III, 2008.
* [http://publications.becta.org.uk/display.cfm?resID=25933&page=1835 Safeguarding Children in a Digital World], Becta, 2006.
* [http://www.unicef.org/philippines/Child_Pornography.pdf "Child Pornography in the Philippines"], Trinidad, Psychosocial Trauma and Human Right Program, 2005.
* [http://www.dcsf.gov.uk/byronreview/pdfs/Final%20Report%20Bookmarked.pdf Safer Children in a Digital World], Byron Review, 2008.
* [http://www.iyac.net/iyac_charter_supp.pdf "The Children's and Young Person's Global Online Charter Supplementary Document"], International Youth Advisory Congress, 2008.
* [http://www.sip-bench.org/Reports2008/sip_bench_2008_synthesis_report_en.pdf "Safer Internet: Test and benchmark of products and services to voluntarily filter Internet content for children between 6 and 16 years"], Deloitte Enterprise Risk Service, 2008.
* [http://opennet.net/chinas-green-dam-the-implications-government-control-encroaching-home-pc "China's Green Dam: The Implications of Government Control Encroaching on the Home PC"], Faris / Roberts / Wang
* [http://www.unh.edu/ccrc/pdf/CV135.pdf Second Youth Internet Safety Survey], Crimes Against Children Research Center, 2006.
* [http://www.probation.ie/pws/websitepublishing.nsf/AttachmentsByTitle/Irish+Probation+Journal+2008/$FILE/Irish+Probation+Journal+Vol+5+Sept+08.pdf#page=67 "The COPINE Project"], Quayle, E IRISH PROBATION JOURNAL Volume 5, September 2008.
* [http://white.oit.org.pe/ipec/documentos/pornografia.pdf "El combate contra la pornografía infantil en Internet: El caso de Costa Rica"], Lemineur, 2006.
* [http://www.lse.ac.uk/collections/EUKidsOnline/EU%20Kids%20I/repository.htm "EU Kids Online"]
* [http://www.ndacan.cornell.edu/NDACAN/Datasets/UserGuidePDFs/134user.pdf "First Youth Internet Safety Survey"], Crimes Against Children Research Center, 2000.
* [http://www.unctad.org/en/docs/LCW190_en.pdf "The Global Information Society: a Statistical View"], Partnership on Measuring ICT for Development, April 2008.
* [http://ifex.org/china/2008/10/27/government_imposes_new_surveillance/ "Government imposes new surveillance system for Internet cafes"], IFEX Alert - Report from China, October 27, 2008.
* [http://www.iprc.unc.edu/G8/HOW_MANY_WAYS_CAN_YOU_HURT_ME_(draft)_Mar2009.doc "How Many Ways Can You Hurt Me? An Overview of Internet and Communication Technology Crimes Against Children - A Victim's Perspective"], Cooper, S, 2009.
* [http://www.aconite.com/sites/default/files/Internet_blocking_and_Democracy.pdf "Internet Blocking: Balancing Cybercrime Responses in Democratic Societies"], Callanan/Gercke/De Marco/Dries-Ziekenheiner 2009.
* [http://www.idrc.ca/en/ev-86423-201-1-DO_TOPIC.html "Internet Child Pornography and Young People in Dakar"], International Development Research Centre, 2004.  
* [http://www.naccho.org/topics/HPDP/infectious/upload/HongWebChinessStudents07-2.pdf "Internet Use Among Chinese College Students: Implications for Sex Education and HIV Prevention "], Hong/Li/Mao/Bonitastanton, 2007.
* [http://www.ccnr.net/pratoconf2008/stillman.pdf "Is there an ideal type? Development planning and evaluation models for social inclusion projects:Digital Doorways"], Stilman, Prato CIRN 2008 Community Informatics Conference: ICTs for Social Inclusion: What is the Reality? Refereed Paper.
* [http://www.gsmworld.com/documents/26052009105450.pdf "Mobile Broadband connects the unconnected in Tanzania"], Global Systems Mobile Alliance, 2008.
* [http://www.computer.org/plugins/dl/pdf/proceedings/hicss/2008/3075/00/30750290.pdf?template=1&loginState=1&userData=anonymous-IP%253A%253AAddress%253A%2B140.247.225.112%252C%2B%255B140.247.225.112%252C%2B172.16.161.5%252C%2B127.0.0.1%255D "Morality in Cyberspace: A Comparison of Chinese and U.S. Youth's Beliefs about Acceptable Online Behavior"], Jackson/Zhao/Qiu/Kolenic/Fitzgerald/Harold/von Eye, Proceedings of the 41st Hawaii International Conference on System Sciences - 2008.
* [http://tech.sina.com.cn/it/2009-06-09/17073163327.shtml "Notice Regarding the Pre-Installation of “Green” Online Filtering Software on Computers"], Ministry of Industry and Information Technology of China Notice No. 226 2009.
* [http://www.allbusiness.com/crime-law/criminal-offenses-crimes-against/12953283-1.html "Online child safety from sexual abuse in India"], Mathew, 2009.
* [http://blogs.worldbank.org/edutech/online-safety-for-students "On-line safety for students in developing countries"], EduTech: A World Bank Blog on ICT Use in Education, October 2, 2009.
* [http://www.ecpat.net/EI/Publications/ICT/Our_Children_At_Risk_Online_ENG.pdf "Our Children At Risk Online: The Example of Thailand"], ECPAT International, 2003.
* [http://www.cyberlawtimes.com/articles/105.html "The problem of cyber bullying amongst school students in India: The loopholes in IT Act"], Halder & Jaishankar 2007.
* [http://www.ecpat.net/EI/Publications/Journals/Regional_Overview.pdf "Regional Overview on Child Sexual Abuse Images through the use of Information and Communication Technologies in Belarus, Moldova, Russia and Ukraine"], ECPAT International, 2008.
* [http://www.unicef-irc.org/worldcongress3/saguisag2_ppt.pdf "The Role of the Private Sector, Particularly ISPs and Internet Café Owners,as Active Partners in Protecting Children from Sexual Abuse and Exploitation in the Philippines"], An on-going Case Study by UNICEF Philippines.
* [http://publications.becta.org.uk/display.cfm?resID=25933&page=1835 "Safeguarding Children in a Digital World"], Becta, 2006.
* [http://www.dcsf.gov.uk/byronreview/pdfs/Final%20Report%20Bookmarked.pdf "Safer Children in a Digital World"], Byron Review, 2008.
* [http://www.unh.edu/ccrc/pdf/CV135.pdf "Second Youth Internet Safety Survey"], Crimes Against Children Research Center, 2006.
* [http://www.cct.go.kr/data/acf2006/mobile/mobile_0102_Bart%20Barendregt.pdf "Sex, phones and youth culture: Pornoaksi and the fear of new media in present day Indonesia"], Barendregt, Asia Culture Forum 2006.
* [http://igf.wgig.org/cms/2008-igf-hyderabad/event-reports/72-workshops/353-workshop-36-strategies-to-prevent-and-fight-child-pornography-on-developing-countries?format=pdf "Strategies to prevent and fight child pornography on Developing Countries"], IGF 2008 Workshop 36 Report
* [http://www.gsmworld.com/documents/GSMA_Child_Tech_Doc.pdf "Technical Solutions: Implementation of filtering of child sexual abuse images in operator networks"], GSMA/Mobile Alliance Against Child Sexual Abuse Content, 2008.
* [http://www.gsmworld.com/documents/GSMA_Child_Tech_Doc.pdf "Technical Solutions: Implementation of filtering of child sexual abuse images in operator networks"], GSMA/Mobile Alliance Against Child Sexual Abuse Content, 2008.
* [http://www.iyac.net/iyac_charter_supp.pdf The Children's and Young Person's Global Online Charter Supplementary Document], International Youth Advisory Congress, 2008.
* [http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/Documents/Reports-Presentations/2079if09pres_Azeredo_Brazil.pdf "The 2009 Status of Brazil's Legislation on the Fight Against Cybercrime"], Eduardo Azeredo 2009.
* [http://www.citizensonline.org.uk/site/media/documents/1521_UKCGO-final-report.pdf UK Children Go Online], Economic & Social Research Council, 2005.
* [http://www.citizensonline.org.uk/site/media/documents/1521_UKCGO-final-report.pdf "UK Children Go Online"], Economic & Social Research Council, 2005.
* [http://www.itu.int/ITU-D/ict/material/Youth_2008.pdf Use of Information and Communication Technology by the World’s Children & Youth], International Telecommunications Union, 2008.
* [http://www.itu.int/ITU-D/ict/material/Youth_2008.pdf "Use of Information and Communication Technology by the Worlds Children & Youth"], International Telecommunications Union, 2008.
* [http://www.ecpat.net/EI/Publications/ICT/Cyberspace_ENG.pdf Violence Against Children in Cyberspace], ECPAT, 2005.
* [http://www.ecpat.net/EI/Publications/ICT/Cyberspace_ENG.pdf "Violence Against Children in Cyberspace"], ECPAT, 2005.
* [http://www.itu.int/osg/spu/publications/worldinformationsociety/2007/WISR07-summary.pdf World Information Society Report], International Telecommunications Union, 2007.
* [http://www.itu.int/osg/spu/publications/worldinformationsociety/2007/WISR07-summary.pdf "World Information Society Report"], International Telecommunications Union, 2007.
* [http://www.itu.int/ITU-D/ict/material/Telecom09_flyer.pdf "The World in 2009: ICT Facts and Figures"], International Telecommunications Union, 2009.
* [http://emerge2008.net/presentation/item.php?item=connecting%20communities/Use%20of%20cellphones "Wots ur ASLR? Adolescent girls’ use of cellphones in Cape Town"] Bosch, Paper submitted to the e/merge 2008 online conference proceedings, 2008.
 


===Initiatives and policy guidelines===
===Initiatives and policy guidelines===


* [http://www.itu.int/ITU-D/youth/ Child and Youth Initiative], International Telecommunications Union, 2009.
* [http://www.itu.int/ITU-D/youth/ Child and Youth Initiative], International Telecommunications Union, 2009.
* [http://download.microsoft.com/download/7/5/f/75faafde-c447-4638-ae7b-ec99cc0f2f9c/Child_Safety_Online_Program.doc Child Safety Online Program in Ukraine], Microsoft/ECPAT International/others, 2008.
* [http://www.gov.mu/portal/sites/isf/files/Final%20Action%20Plan%20version.pdf Child Safety Online Action Plan for Mauritius], National Computer Board, Government of Mauritius, 2009.
* [http://www.itu.int/osg/csd/cybersecurity/gca/cop/guidelines/ Guidelines on Child Online Protection (Draft)], International Telecommunications Union, 2009.
* [http://www.itu.int/osg/csd/cybersecurity/gca/cop/guidelines/ Guidelines on Child Online Protection (Draft)], International Telecommunications Union, 2009.
* [http://www.htcia.org/isfc/ Internet Safety for Children Campaign], High Technology Crime Investigation Association, 2000-2005.
* [http://www.htcia.org/isfc/ Internet Safety for Children Campaign], High Technology Crime Investigation Association, 2000-2005.
* [http://googlepublicpolicy.blogspot.com/search/label/Child%20Safety Child Safety], Google, 2009.
* [http://smwipm.cyberpeaceinitiative.org/en/news?page=5 CyberPeace Initiative], The Cyber Peace Initiative, The Suzanne Mubarak Women’s International Peace Movement, 2009.
* [http://www.netsafe.org.nz/Doc_Library/NetAlert.pdf New Zealand Model for Internet Safety Education]
* [http://www.netsafe.org.nz/Doc_Library/NetAlert.pdf New Zealand Model for Internet Safety Education]
* [http://www.netsmartz.org/index.aspx NetSmartz], 2009.
* [http://www.ecpat.net/WorldCongressIII/PDF/Publications/ICT_Law/Thematic_Paper_ICTLAW_ENG.pdf Online Child Sexual Abuse: The Law Enforcement Response], ECPAT International at the World Congress III, 2008.
* [http://www.iyac.net/iyac_charter.pdf The Children's and Young Person's Global Online Charter], International Youth Advisory Congress, 2008.
* [http://www.iyac.net/iyac_charter.pdf The Children's and Young Person's Global Online Charter], International Youth Advisory Congress, 2008.
* [http://www.itu.int/wsis/index.html World Summit on the Information Society], 2003 & 2005.
* [http://www.itu.int/wsis/index.html World Summit on the Information Society], 2003 & 2005.
Line 82: Line 132:
===Organizations===
===Organizations===


* [http://cct.edc.org/ Center for Children and Technology, of Education Development Center, Inc]
* [http://www.ceop.gov.uk/ Child Exploitation and Online Protection Centre]
* [http://www.ceop.gov.uk/ Child Exploitation and Online Protection Centre]
* [http://www.crin.org/index.asp Child Right Exploitation Network]
* [http://www.crin.org/index.asp Child Rights Information Network]
* [http://www.Childnet-int.org Childnet International]
* [http://www.Childnet-int.org Childnet International]
* [http://www.ecpat.net/EI/index.asp ECPAT (End Child Prostitution, Child Pornography, and Trafficking of Children for Sexual Purposes)]
* [http://www.ecpat.net/EI/index.asp ECPAT (End Child Prostitution, Child Pornography, and Trafficking of Children for Sexual Purposes)]
* [http://www.fosi.org/cms/ Family Online Safety Institute]
* [http://www.globalknowledgepartnership.org/index.cfm Global Knowledge Partnership]
* [http://globalvoicesonline.org/ Global Voices]
* [http://www.icouldbe.org/ icouldbe.org]
* [http://www.intel.com/intel/worldahead/ Intel's World Ahead Program]
* [http://www.intel.com/intel/worldahead/ Intel's World Ahead Program]
* [http://iearn.org/ Internet Education and Resource Network (iEARN)]
* [http://iearn.org/ Internet Education and Resource Network (iEARN)]
* [http://www.intgovforum.org/cms/ Internet Governance Forum]
* [http://www.intgovforum.org/cms/ Internet Governance Forum]
* [https://www.inhope.org/ INHOPE]
* [http://www.isolutions4kids.org/ Internet Solutions For Kids, Inc.]
* [http://www.navegaprotegido.org/ Navega Protegido en Internet]
* [http://www.navegaprotegido.org/ Navega Protegido en Internet]
* [http://www.oecd.org/home/0,2987,en_2649_201185_1_1_1_1_1,00.html OECD]
* [http://laptop.org/en/ One Laptop Per Child (OLPC)]
* [http://laptop.org/en/ One Laptop Per Child (OLPC)]
* [http://www.fod.ac.cr/en/ Omar Dengo Foundation]
* [http://www.redbarnet.dk Red Barnet]
* [http://www.schoolnetafrica.org/english/index.htm SchoolNet Africa]
* [http://www.schoolnetafrica.org/english/index.htm SchoolNet Africa]
* [http://www.virtualglobaltaskforce.com/ Virtual Global Taskforce]
* [http://www.virtualglobaltaskforce.com/ Virtual Global Taskforce]
* [http://www.worldbank.org/ The World Bank]
* [http://www.worlded.org/WEIInternet/ World Education]
* [http://www.webfoundation.org/ World Wide Web Foundation]
*[http://www.cyberpeaceinitiative.org The Cyber Peace Initiative of the Suzanne Mubarak Women's International Peace Movement]

Latest revision as of 13:05, 17 December 2010


About the project

Harvard University's Berkman Center for Internet and Society and UNICEF are in the beginning phases of a collaborative research project concerning the online safety risks to children in developing countries. The digital divide between developed and developing countries is narrowing, and while this brings many new opportunities and resources into the lives of young people, it also exposes new groups with less digital literacy to a range of cyber threats.

Many organizations are working to make information and communication technologies (ICT) available to children in developing countries to improve education and quality of life. While some of these groups acknowledge online safety as an issue that should be addressed in the future, this has not, as yet, been targeted as a priority. Because of basic resource constraints, the time and resources of the organizations are instead focused on increasing accessibility of ICT in these communities. We hope that this project will be an opportunity to provide the additional time and resources necessary to work towards solving the safety issues that have been identified but not yet addressed.

As of July 23rd, 2009, the community participation page is live and frequently updated (last update July 2010). An important part of our research relies on personal observations and experiences, and here you will find some questions designed to encourage this kind of dialogue that you can respond to. Read more about how you can contribute.

Literature review and findings

As a result of collaboration between the Berkman Center for and UNICEF, Berkman conducted a preliminary literature review of the existing body of research on these issues. The brief summary of our key findings have been published in the exploratory study Working Towards a Deeper Understanding of Digital Safety for Children and Young People in Developing Nations. The objectives of the exploratory study are threefold: First (and foremost), it seeks to raise awareness about issues related to digital safety for youth in developing nations. Second, it aims to provide a tentative map of these issues and give insights into the current state of the respective research based on an exploratory literature review. Third, the paper seeks to outline the contours of a research framework through a series of working hypotheses that might inform subsequent research efforts on these issues by connecting efforts in developing and industrialized nations.

Existing Research

There are few studies or recommendations specifically related to addressing technological safety issues for children in developing nations. Instead, we have approached the issue tangentially by looking to two main bodies of research: those related to technological safety for children in developed nations and those focusing on technological penetration and usage in developing nations. We have found a number of organizations, such as the ITU's Children and Youth Special Initiative, that have emphasized their commitment to ensuring a safe technological environment for children in the developing world, but have found only few organizations with education modules, policy recommendations, or explicit plans of action.

During our preliminary literature review, we found that studies in developed nations indicate that the biggest risks to children online are cyberbullying, exposure to inappropriate or illegal material, and sexual or other abuse either over the Internet or in-person.

Responses

There seem to be three main approaches to protecting children online: technological measures, parental supervision, and digital literacy education.

Technological measures
This category includes any kind of hardware- or software-based tool used to make the browsing experience more secure, such as content filtering, virtual sandboxes, and age/identity verification software. With these methods, it is important to consider issues like scope creep, over- and under-blocking of content, reliability of ID verification, and cost.
Parental/Adult supervision
Much of the literature and existing curriculum for online safety education focuses on the importance of parental involvement, advising parents and guardians how to protect their children. We must consider that Internet access points for children in the developing world are much more likely to be in a school or Internet cafe instead of the home, where parents are less likely present.
Self-protection
The third approach centers on educating children about how they can take steps protect themselves online. Most existing digital literacy curricula aimed at children are not sufficiently comprehensive. However, this approach is promising because it helps reduce the reliance on a third party for protection, and can be adaptable from one country to the next based on individualized situations and needs.

Emerging issues

The mobile market has taken off in developing countries, and there are many indications that mobile Internet is soon to follow. This is predicted to be the easiest, most accessible and cost-efficient way to provide Internet access in areas where the information environment is often underdeveloped because of a barriers like lack of infrastructure for fixed-line broadband, lack of accessible computers and electricity, competition, literacy requirements, regulations, and high costs. If the trend develops as expected, this could be a good opportunity to take actions to ensure children use this medium safely as many of them encounter it for the first time, encouraging the spread of best practices.

Further questions and action

This overall problem encompasses many more specific issues, and it will be important to take a multi-pronged approach. One of the next steps should be identifying the problems children in developing nations are facing and map these issues in the respective technological, social, and economic context; from there, we will be better equipped to develop tangible, accessible targeted solutions and resources. Drawing upon ideas from the ITU's Child Online Protection initiative, we will need to engage all levels of players: children, parents/educators, industry, and government.

Strategic Framework (2011)

Phase one: 1) Determine policies in place or in the process of development 2) Determine big obvious issues that need new policy solutions (gap analysis) & pursue some of them 3) Start a research process that is translational in nature (and other forms of capacity-building) 4) Advocate on an ongoing basis for attention to digital child safety issues and education of policy-making community, teachers, kids 5) Development of a knowledge network: FB group, wiki 6) Publish a pamphlet-type one-pager as a primer to the issues involved 7) Develop an assessment framework and process for successful policy interventions

Phase two: 1) Develop and implement a process for sharing of best practices by region etc. 2) Develop and implement a process for sharing data across regions 3) Develop and implement a process for integrating data into policy approaches


How you can contribute

Because the body of formal academic research on these topics is fairly limited, the information we can gain from the thoughts, experiences and observations of individuals is going to be a critical part of this project. We've developed a list of questions that follow our line of inquiry to serve as a starting point for this process. You can access that list here and add your responses directly to the wiki page, or send your response to scortesi@cyber.law.harvard.edu. We encourage anyone who is interested to take a few moments to participate.

Additional resources

This section contains links to many of the articles, studies, initiatives and organizations that we referenced in our literature review. If you are aware of any additional sources or information - including academic research, education modules, initiatives, conferences, or firsthand reports - please add them below.

Articles and research


Initiatives and policy guidelines

Organizations