Is that a phone in your pocket?

"What's in a name? That which we call a rose
By any other name would smell as sweet."

Words are important!

Although there is ongoing debate as to the degree, most linguists would agree that the principle of 'linguistic relativity' suggests that language has an influence on certain kinds of cognitive processes.

In short, vocabulary can effect not just the ability for an individual or society to communicate a concept, it may have an effect on their ability to formulate certain abstract concepts.

In '1984' Orwell famously explores the link between language and cognition as his authoritarian state implements their created language "Newspeak" to make it impossible for people to think critically about the government.

In everyday life we can cite examples of the sanitising of our own language through the use of euphemism to soften impact or deflect deeper thought. Corporate executives talk of 'down sizing' rather than 'mass redundancy' or the reality of putting people out of work. Our military reports on 'Collateral Damage' rather than civilian casualties.

Whether by nefarious design or for social expediency, the use of these terms arguably lessen the emotional impact of the signal.

Within a specific domain words are used to communicate meaning with precision. Where a lay person may attack the use of 'computer jargon' there is very good reason why a computer scientist may wince when someone says Internet when they mean World Wide Web - they are very different things.

Language can be fun too of course. Where would a comedian be without the ambiguity in language that is the basis for all puns? The lyricist, novelist, playwright or poet would be rendered impotent without the tools for linguistic mis-direction, simile and metaphor.

What has all this to do with e-safety?

Well, let us consider the Smartphone.

Although the term originated in the late nineties it is really the release in quick succession of Apple's iPhone in 2007 and the Google Android operating system in 2008 which defines the characteristics of what we currently think of as a Smartphone.

Curiously though, if you list the features and functions of a Smartphone, those that would be considered to be characteristics of a telephone pale when stacked up against those which would be associated with a computer.

Would it not be far more sensible for Smartphones to be known as 'Pocket Computers'? They are, after all mostly powerful computers in a small form factor with telephonic capability rather than telephones with extra features.

For a while, the pocket computer and the mobile telephone coexisted, though the pocket computer itself had developed out of the 'personal organiser' - a glorified electronic diary and address book.

As technology improved it was inevitable that the inefficiency of carrying two devices when the functionality of both could so easily by combined within a single box, would see their eventual combination.
In fact, strictly speaking we should add the camera and personal media player to the list of discrete gadgets which have also be subsumed into this single class of device.

There are several obvious reasons why the resultant devices would popularly derive a name evolved from phone as opposed to computer, among them:
i) More people habitually carried mobile phones than personal organisers
ii) The devices required monthly contracts with telephone companies for their primary network connection
iii) Personal organisers had something of a corporate or work related air about them
iv) Verbal communication is an extremely prominent facet of the human interaction
v) Telephones are 'old' comfortable technology whereas computers still have a certain perception of geeky complexity to many

It is partially recognised that these devices are not just 'telephones with extras', hence the coining of the term Smartphone.

When it comes to e-safety, most problems are caused by a mis-perception as to the level of risk. Problems arise when inadequate precaution or education is put in place due to holes in knowledge or gaps in understanding.

The concern is that if our language guides us to conceptualise Smartphones too much in terms of 'Telephones with extras' rather than as powerful portable computing devices, there is a real e-safety risk. Locking down a computing network or adding parental filters to computers in the home have no impact on a device which is capable of independent connectivity and can attach to any number of WiFi networks in cafes, shops and urban areas.

Smartphones are capable of communicating with pretty much all the social networks and other online services which cause e-safety concerns.

In reality, the capability these devices provide for computing, education, communication and organisation are extremely positive and do out-way the risks, but more can be done to mitigate potential problems.

These devices are in the hands of young people and are in your schools and in your homes. They need considering with the same importance as other more obvious computing devices and where prohibition or technical encumbering of capability is not possible or appropriate, education must fill the gap.

Now it is quite likely that the etymology of the word 'phone' will fall out of the public consciousness and be banished to antiquity along with many words we still use today, the origins of which have long been forgotten. In time the word 'phone' may well change it's meaning to 'pocket computer' or encompass whatever this device's next evolutionary step may be. Until that happens however, we must make sure that we don't underestimate the risks and capabilities of these devices by continuing to conceptualise them as being at their heart, a simple portable telephone because we lack the appropriate language to describe them otherwise.



Photo from FreeDigitalPhotos.net

Written by Safeguarding Essentials on November 13, 2013 16:23

Facebook Privacy Changes Explained

If you have had a Facebook account for a while, and statistically you probably have, you should have received an email recently explaining some changes that are being made to your account settings.

Facebook had a setting called "Who can look up your Timeline by name". This setting allowed you to control what sort of people would be able to find your profile by using Facebook's 'search' function.
It allowed you to be findable by all users, friends of friends or only friends.

This means that if you wanted your account to be a bit like an ex-directory phone number you could ensure that people with who you were not already connected could not discover you by typing your name into the search box.

Not being discoverable via search however is not the same as being completely undiscoverable or invisible. Your profile page was still available to all users (unless you had specifically blocked them) provided they could get to your page. There are several ways to find you which do not rely on search. For instance if you comment on someone else's profile, your comment accreditation will link to your Timeline. If a friend tags you in a photo, this tag will link to your Timeline. If people search for phrases like "People who like cake" in Graph Search, links to the profiles of any self confessed cake lovers will be served up.

It is for these reasons that Facebook thinks the ability to limit "Who can look up your Timeline by name" is no longer a relevant setting.

Now, one could argue that there are many valid reasons why an individual may not want to be discoverable on Facebook and that actually, not being discoverable in a search would be a useful partial defence in many cases.

Facebook however, would prefer that privacy was maintained at the level of publishing rather than publisher. i.e. not to control who can see that you have an account, but instead control what activity on that account they can see. Facebook provide settings for this in the 'Privacy Settings' section of your account admin.

There is a lot to be said for restricting discoverability but Facebook clearly don't agree and whether that be for usability or for commercial reasons the e-safety focus must be to ensure people understand how and why they should think about their privacy settings.

There is no doubt that many users are mistaken about who can see their activities and the fact that Facebook had settings for both discoverability and content privacy did little to aid comprehension.

By placing focus on the privacy settings around activity, it may make it easier at least to educate Facebook users about the activity trail they are leaving and who can see it.

In short, we should be encouraging people to make informed and considered decisions as to the privacy setting for each of their activities and not just stick with the defaults, which ofter lean towards the less restriction and wider visibility.

Written by Safeguarding Essentials on November 05, 2013 17:10

Why E-safety Education is Essential at Primary School

With many of the headline stories in relation to e-safety largely involving teenagers, it’s easy to forget that children as young as 9 are reporting to have met strangers both online and subsequently offline. Many also claim to have been bothered or upset by something encountered online including sexual images. (Source: Haddon, Leslie; Livingstone, Sonia; and EU Kids Online Network (2012) EU Kids Online: national perspectives)

Further statistics from the Ofcom - Children and parents: media use and attitudes report 2013 indicate that:

  • 82% of 5-7 year olds and 96% of 8-11 year olds access the internet

  • 22% of 8-12 year olds who use the internet at home say they have a profile on Facebook, Bebo or MySpace (despite the minimum age at which you can have a profile on these sites being 13)

  • Only 43% of parents whose children used the internet at home had parental controls installed on the PC/ laptop/netbook that their children use
  • While these statistics are worrying enough, we must also remember that ‘internet access’ now comes in many forms, some of which may not be immediately obvious to younger (and indeed older) users. Take for example connecting to other players on a WII game or using an installed App on an iphone or tablet device. This is still ‘internet access’ and therefore the potential risks are inherent too.

    Placing security controls on computers and using child friendly search engines are no doubt a great starting point for younger children, but these actions are not guaranteed to filter out all the dangers. Arming students with some basic knowledge at an early age will help to reinforce e-safety awareness for when their natural curiosity inevitably leads them to an online area of possible danger.

    Amid all the stories of concern and risk, it’s also worth remembering that the internet does offer a rich environment for information and learning, so its use should be encouraged. As with many things in a child’s education, we must first show them how to do it safely under supervision, before letting them take control.

    Written by Safeguarding Essentials on October 31, 2013 16:52


    Join Safeguarding Essentials

    • Protect your pupils
    • Support your teachers
    • Deliver outstanding practice

    Recent Stories
    Story Tags
    addiction anti_bullying_alliance anti-radicalisation apps ask.fm assembly avatars awards awareness bett Breck_Foundation bug bullying BYOD calendar cber_bullying censorship ceop chatfoss checklist child child_exploitation childline childnet child_protection childwise christmas ClassDojo classroom competition cookies CPD creepshot CSE curriculum cyberbullying cyber_bullying cyber_crime cybersmile_foundation cybersurvey data_protection DCMS Demos development devices DfE digital_citizenship digital_footprint digital_forensics digital_leaders digital_literacy digital_native digital_reputation digital_wellbeing eCadets education e-learning emoticon e-safe esafety e-safety e-safety, e-safety_support #esscomp #esstips ethics events exa exploitation extreemism extremism extremism, facebook fake_news fantastict fapchat FAPZ film filtering freemium friendly_wifi gaming GDPR #GetSafeOnline glossary GoBubble gogadgetfree google governor grooming #GSODay2016 guidance hacker hacking icon information innovation inspection instagram instragram internet internet_matters internet_of_things internet_safety into_film ipad iphone ipod irights IWF KCSIE #KeepMeSafe language leetspeak lesson like linkedin live_streaming lscb malware media mental_health mobile monitor monitoring naace national_safeguarding_month navigation neknominate netiquette network news NHCAW nomophobia nspcc NWG ofcom offline ofsted omegle online online_safety oracle parents phishing phone Point2Protect policy pornography power_for_good pressure PREVENT primary privacy professional_development protection PSHE #pupilvoiceweek radicalisation ratting rdi reporting research risk robots RSPH safeguarding safeguarding, safer_internet_day safety SCD2015 #SCD2016 school sdfsdf security self-harm selfie sexting sextortion ShareAware sid SID SID2016 SID2017 SID2018 SID2019 smartphone snapchat snappening social_media social_media, social_networking staff staff_training #standuptobullying statutory_guidance Stop_CSE stop_cyberbullying_day stress students survey swgfl SWGfL tablet teach teachers technology terrorism texting tootoot training TrainingToolz troll trolling twitter UKCCIS uk_safer_internet_centre UK_youth unplug2015 video virus webinar website we_protect what_is_e-safety wifi wi-fi windows wizard working_together yik_yak young_people youthworks youtube YPSI yubo
    Archive