Wednesday, September 26, 2012

DEALING WITH CHILD ONLINE VULNERABILITY


A few years after I was born, my father met with a stranger.  From the beginning, dad invited him to live with our family and the stranger quickly accepted and was around from then on.  As I grew up, I never questioned his place in my family.  In my young mind, he had a special niche.  My parents were complementary instructors: mum taught me good from evil and dad taught me to obey.  But the stranger…he was our storyteller.  He would keep us spell bound for hours on end with adventures, mysteries and comedies.  If I wanted to know anything about politics, history or science, he always knew the answers about the past, understood the present and even seemed to predict the future!  He made me laugh and he made me cry.  The stranger never stopped talking but dad did not seem to mind.

Many years have passed since the stranger moved in with our family.  He has blended right in and is not nearly as fascinating as he was at first.  His name?  We just call him TV.  He has a wife now.  We call her Computer.  Their first child is Cell Phone; second child is iPod.  By the way, they now have a wonderful grandchild.  She is a genius!  She is fondly called Blackberry; BB for short.  She is nearly more popular than her mum.  Her new baby cousin is iPad.  This stranger has decided to take up permanent residence in our house.  What can we do?

The internet is neutral can be asked to do anything.  So, if there is any problem, it is with those that give it instruction.  The information society in which children and young people all over the world are growing up offers an unprecedented level of services and information which can be accessed through the computer, mobile phone, game console, iPod, iPad, personal digital assistants etc.  As a neutral tool for disseminating data, the internet can be used for good or for ill.  It has enormous potential as a source of education for people of all ages and capacities.  It can also be used to set online traps to exploit users for criminal purposes.  Among those who are most vulnerable to such traps are children.

The risks and vulnerabilities related to the use of the internet include: exposure to illegal and harmful content such as pornography, gambling, brain washing and recruitment for terrorist activities, cyber bullying and inappropriate content; disclosure of personal information leading to the risk of physical harm, sexual abuse and identity theft; creation, reception and dissemination of illegal and harmful content; and excessive use of the internet to the detriment of social and or outdoor activities important for health, confidence building and social development and general well being.  Others are unauthorized use of the parents’ credit cards to pay for online services and merchandise and targeting through spam and advertisements from companies using internet sites to promote age or interest targeted products.

Child abuse materials emanating from other countries are thriving in Nigeria, exploiting children users’ ignorance and vulnerability of the internet infrastructure.  As Nigeria comes to terms with issues of child abuse materials and commits to the protection, Nigeria does not have sufficient legislation to combat child pornography and related matters.  Internet has become the single largest domain where Nigerian youths are presently being engaged.  The reality in today’s Nigeria digital world has transformed individual lifestyle.  The Nigerian youth’s daily life, from villages to cities, is full with SMS, e-mail, chats, online dating, multiplayer gaming, virtual worlds and digital multimedia.  Although, these technologies mean added convenience and enjoyment for many, government and users alike are often one step behind the fast paced innovation in these areas.

RECOMMENDATIONS

Stakeholders are to work in parallel and in unity at strategic, operational and tactical levels to address child online protection, to conduct a high level strategic planning session across relevant government bodies and to ensure dissemination of clean contents from operators’ networks.

Furthermore, they should conduct awareness workshops across the country in separate areas – local governments, local schools/teachers, private sector and parents and to design a framework, guidelines, policies and other regulations and transit same to appropriate organs of government for assent and implementation.

There should be an all inclusive multi-stakeholder and multi-sector collaboration, partnership and alliances to create more awareness among children on the negative consequences of improper use of cyber content.

Child online protection should be merged with the cyber crime policy of the government while asking that a separate agency should be established to handle the issue of child online protection to ensure that it is not submerged in the larger cyber crime policy.

For operators, they should implement technical mechanisms to prevent access to websites identified as hosting contents that are offensive to children and to implement processes to enable the removal of any child sexual abuse content on their own web services.

Thursday, September 13, 2012

GO TO THE RIGHT PERSON

"We are his people, the sheep he tends."  Psalm 100:3

Like sheep, most of our wounds come from living in the pasture.  Thorns prick.  Rocks cut.  Heads butt.  Mosquitoes bite.  So our Shepherd regularly inspects His sheep searching for wounds.  That is because He does not want today's wound to become tomorrow's infection.  Hence, David writes, "We are his people, the sheep he tends."  Others may guide us to God, but no one does the work of God for only God can heal. He "heals the brokenhearted" [Psalm 147:3].

So, your first step is to go to the right person - go to God.  Your second step is to assume the right posture - bow before God.  To be anointed with the oil that heals and protects, the sheep must stand still, lower its head and let the shepherd do his work.  Peter writes, "Be humble under God's powerful hand so he will lift you up when the right time comes" [1Peter 5:6].  When we come to God we make requests, not demands.  We state what we want, but we pray for what is right.  Like Paul, if God gives us the prison in Rome instead of the mission in Spain, we accept it because we know God will always give what is right to His people [Luke 18:7].  Now, the sheep do not understand how the oil repels mosquitoes or heals wounds.  In fact, all the sheep know is that something happens in the presence of their shepherd that does not happen anywhere else.  And that is all we need to know as well.  Hence David writes, "Lord, I give myself to you; my God, I trust you" [Psalm 25:1 - 2].