top of page

327 results found for "AI"

  • This Is Why “Stranger Danger” Doesn’t Work, Especially in Today’s Onlife World

    are left unprepared for the reality that danger often wears a smiling face (especially true now given AI

  • Artificial Intelligence, Teachers, Students, and Critical Thinking

    and applicability of AI-generated content, and continuously refining and guiding AI processes. Here’s how: Encouraging AI as a brainstorming tool: Instead of banning AI-generated content, teachers Teaching AI literacy: Educators who acknowledge AI’s presence can teach students how to critically evaluate Using AI for personalized learning: AI-driven tutoring systems can help teachers identify students who By fostering responsible AI use, encouraging students to engage critically with AI-generated content,

  • Why Criminal Laws Alone Can’t Stop Online Harms To Youth and Teens - The Illusion of Protection 

    Some tech companies say they use AI and moderators, to detect harmful content, but investigative reports

  • We Can Identify Travel-Related Content From Screen Shots, So Why Not Child Sexual Abuse Material (CSAM)

    However, the same AI-driven capabilities that allow companies like Google to analyze screenshots for AI-powered systems, such as Google’s new Gemini, are already being developed to recognize travel-related If AI can recognize landmarks in travel photos, it could also be trained to compare images against known If Google’s AI can analyze screenshots for travel metadata for their financial benefit, isn’t it reasonable AI has the power to revolutionize digital safety, but its implementation must be carefully considered

  • Why Teens and Young Adults Are Downloading Other Chinese Apps: A Case of Malicious Compliance Over A Potential TikTok Ban In The US 

    The prospect of banning TikTok in the United States has been a topic of fierce debate for years. Concerns about data security, national sovereignty, and the app's connection to the Chinese government have prompted legislators to push for restrictions or outright bans that could take place by January 19th in the US, depending on a pending decision from their Supreme Court. However, the very demographic most affected by such actions, teens and young adults, seems to be responding in a way that few policymakers might have anticipated - they are downloading other Chinese apps as a form of protest and, more intriguingly,  what we see as a form of malicious compliance. So why is this phenomenon occurring, what it signifies, and what lessons policymakers and parents can take from it. Malicious compliance is a term used to describe when individuals follow rules or demands so literally or excessively that their compliance undermines the intent of those rules. It’s often a form of subtle rebellion, where the act of "obeying" is designed to highlight perceived absurdity, unfairness, or hypocrisy. In the case of TikTok, teens and young adults are keenly aware of the broader societal and political controversies surrounding the app. Rather than passively accepting a potential ban, some are downloading alternative apps from Chinese developers, such as RedNote, CapCut, or Lemon8, as a way to say, “If TikTok is banned for being Chinese-owned, what about these apps?” So Why Are Teens and Young Adults Doing This? For many, social media is more than just entertainment; it's a cornerstone of their social lives, creativity, and personal expression. The prospect of losing access to TikTok feels like a violation of their autonomy. Downloading similar apps is a way to reclaim control over their online experiences. Many young people view the potential TikTok ban as performative politics - an attempt to gain favour by appearing “tough on China” rather than addressing broader issues of data privacy or the monopolistic tendencies of tech giants. By downloading other apps from Chinese companies, they’re calling attention to what they see as the inconsistency or inadequacy of these policies. Teens and young adults are highly attuned to trends, especially those that align with their values. Malicious compliance offers a way to both rebel and bond with others over shared frustration, creating a sense of collective resistance. Apps like CapCut, which offers advanced video editing tools, or Lemon8, a lifestyle and shopping-focused platform, (both owned by ByteDance a Chinese based company that also owns TikTok) align well with the content creation habits of TikTok users. Curiosity about these alternatives provides a practical motivation, even if the initial download is driven by defiance. While downloading additional apps might feel like a clever act of rebellion, it isn’t without risks. Many of the same concerns surrounding TikTok, such as data collection, privacy issues, and potential foreign influence, apply to these alternatives. By increasing the number of apps tied to the same Chinese based ecosystem, users may inadvertently amplify their exposure to vulnerabilities. This response also raises questions about the efficacy of legislative approaches to online safety. Banning a single app without addressing systemic issues like data regulation and user privacy across all platforms is unlikely to resolve the root concerns. Some thoughts for Policymakers based upon the malicious compliance we are presently seeing: Teens and young adults are demonstrating that bans targeting specific apps are ineffective without broader regulations. Policymakers should focus on universal standards for data security and privacy across all platforms, regardless of ownership including those based in North America. Young people are not passive recipients of policy, they are active participants in shaping digital culture. Policymakers must involve them in discussions about online safety, not dismiss their concerns or assume compliance. Singling out specific apps without addressing the practices of other platforms (many of which also engage in extensive data collection) fosters skepticism and resistance. A consistent approach to online safety will earn more respect and compliance. Parents and caregivers should view this trend as an opportunity to discuss broader digital literacy topics with their teens, including data privacy, security, and the implications of app ownership. Rather than framing these apps as "bad" or inherently dangerous, focus on teaching critical thinking and responsible online behaviour. These conversations can empower young people to navigate the digital world thoughtfully, rather than reactively. The rise of malicious compliance through the current trend of downloading Chinese apps is a fascinating example of how young people can wield technology as a tool of resistance. It underscores the need for policies that go beyond performative measures to address the real challenges surrounding the use of technology. For parents and policymakers alike, it’s a reminder of the importance of engaging with, rather than dictating to, youth and young adults. The trend of teens and young adults downloading alternative Chinese apps in response to potential TikTok bans highlights a deeper, multifaceted issue at the intersection of technology, politics, and youth culture. This phenomenon of malicious compliance serves as a powerful statement against perceived inconsistencies in policymaking, demonstrating the active role young people play in shaping digital culture and resisting top-down decisions they find unreasonable. For policymakers, this is a call to move beyond symbolic gestures and adopt comprehensive strategies that address systemic issues like data privacy and security across all platforms. Engaging youth in meaningful dialogue about these policies can foster trust and more effective outcomes. For parents, this trend underscores the importance of promoting digital literacy and critical thinking, enabling young people to make informed decisions about their online behaviours. Ultimately, this moment serves as a reminder that young people are not merely passive consumers of technology but active participants in its evolution, capable of using it to assert their autonomy and challenge the status quo. A collaborative approach that respects their voices will not only strengthen online safety but also bridge generational gaps in understanding the onlife world As the January 19th TikTok deadline approaches, the debate over TikTok will continues and one thing is being made clear - teens and young adults will not be silent spectators. They are active participants in today’s onlife world, and their actions, even in defiance, reflect their values, frustrations, and hopes. As Brandon stated in his FaceBook posting on the App RedNote yesterday, “The scale of anti-government protests and public outrage over a possible TikTok ban, centred around free speech and personal choice, is hard to ignore. It’s quite remarkable.” Related Article: NOTE - We have attempted to read the RedNote privacy policy and we can't given that it is written in Chinese. Given this fact, we DO NOT recommend that this app to be download on your device. Digital Food For Thought The White Hatter Facts Not Fear, Facts Not Emotions, Enlighten Not Frighten, Know Tech Not No Tech

  • How Criminals Target Facebook

    Given that approximately 20% of Facebook users have been exposed to malware, and that over 600,000 accounts are hacked almost daily, www.247Wallst.com released an article that they called “9 Ways that a Criminal Uses Facebook” that, I think, we should all be aware of and that I will share with you here: • HACKING ACCOUNTS: Common tools used to complete a successful hack using common passwords, names, and dates. • COMMANDEERING ACCOUNTS: Criminals login to an existing user account using an illegally-obtained password and ID. Immediately after logging in, they access the victim’s friend list. One of the best schemes is to ask friends for money. The hacker will claim that the person they’re hacking is stranded somewhere and needs money quickly. It’s effective because a high level of trust exists among users. • USER PROFILE CLONING: The act of using unprotected images and information to create a Facebook account with the same name and details of an existing user is profile cloning. Cloners will send friend requests to the same friends the victim has and gain access to others’ information to commit fraud. This is scary, yet simple. • CROSS-PLATFORM PROFILE CLONING: occurs when the cyber thief obtains information and images from Facebook and uses them to create false profiles on another social-networking site. This fraud is dangerous because victims may never realize they’ve been hacked. • PHISHING: When a hacker poses as a respected organization or individual and asks for personal data, it’s phishing. This occurs mostly via wall posts and direct messages. Once users click on the link, they are sent to a website loaded with malware or to a website where they are asked to provide information. • FAKE FACEBOOK: Scammers will direct a user to some sort of clickable enticement, to a Facebook login page designed to look like the real thing. When the victim enters a username and password, they are collected in a database, which the scammer will then sell. • AFFINITY FRAUD: When the con artist assumes the identity of a person to earn the trust of those close to them. The criminals will exploit the earned trust by stealing information or money. Facebook, unfortunately, facilitates this type of fraud because its network is based around “friending” anyone and everyone. • MINING UNPROTECTED INFO: Facebook users tend to reveal their emails, phone numbers, addresses, birth dates, and other private data. A hacker’s basic training is to start with this kind of information to access accounts. While the majority of unprotected information is mined for targeted advertising, it can be a means to more pernicious ends such as profile cloning and, ultimately, identity theft. SPAM: “Clickjacking” is illegal and it involves the hacking of a personal account using an advertisement for a viral video or article. The user clicks on the ad, which then leads the program to send an advertisement to the person’s friends through their account without their knowledge. It’s important to be educated and aware of these subjects so you can spot them before any harm can be done. Digital Food For Thought Darren Laur AKA #thewhitehatter

  • Online Gaming

    Those who flew into the twin towers had no hands-on training to fly a jet airliner – their skills, strategies

  • “Wicked Problems” and the Online Safety of Youth: Why Digital Literacy Demands Integrated Solutions Rather Than A Simplistic Banning Approach.

    Today, with AI-generated deepfake content becoming more realistic and accessible, the urgency to educate Teaching youth to think critically about social media, AI, sextortion, or digital manipulation is not Trying to solve “online safety” in isolation is like putting a Band-Aid on a leaking dam.

  • Meta Makes Some Updates To Teen Accounts - A Step in the Right Direction, But More Needs To Be Done!

    Additionally, Meta has implemented artificial intelligence (AI) tools to help detect instances where If AI detects discrepancies, the account may be reverted to the more restrictive teen settings. 5. perfect, the ongoing conversation about digital safety, along with the use of innovative tools like AI

  • Perspective 2025 - What 10 Teens from Around the World Taught Us About Their Use Of Technology & Social Media

    These teens were well aware of the potential for misinformation and AI “hallucinations.” This shows a critical shift, students are not blindly trusting AI, they’re starting to critically engaging Because when students are using AI not to bypass learning, but to deepen it, that’s not a threat to education They aren’t naive about the risks of misinformation and disinformation, from conspiracy theories and AI-generated From their nuanced understanding of privacy to their responsible use of AI, the beginning signs that

  • Parenting and Technology: Lead as a Lighthouse Parent Instead of a Detached, Helicopter, or Snowplow Parent

    Caveat - We fully recognize that “some” children need more guidance and structure than others. Ultimately, choose a parenting style that fits the needs of your child. In today's onlife world, parenting styles play a crucial role in shaping how children interact with technology. From social media and online gaming to online learning and digital communication, your approach as a parent or caregiver influences your child's relationship with their onlife world. Let’s delve into the three common parenting styles that we have seen (detached, helicopter, and snowplow) and how they manifest in the context of children's technology use, along with their potential benefits and pitfalls. Lastly we will recommend why we should become “Lighthouse Parents” Detached Parents: “Hands-Off” and Uninvolved Detached parents and caregivers, or in the past something we called open-range parenting, tend to take a hands-off approach when it comes to their child’s technology use. This could be due to a lack of awareness, time constraints, or a conscious decision to allow their child to navigate the onlife world independently. In some cases, this approach can foster independence, as children learn to make decisions on their own, develop self-regulation, and enhance their critical thinking skills. Additionally, this hands-off approach can reduce conflicts at home, particularly around common issues such as screen use or app usage. However, a lack of guidance can lead to significant risks. Without parental oversight, children may encounter harmful content, fall victim to scams, or engage in risky online behaviours such as oversharing personal information. Detached parents and caregivers might also miss valuable opportunities to teach their children about digital literacy and online safety, leaving them unprepared to navigate the complexities of the onlife world and they grow into adulthood. For parents and caregivers who lean toward detachment, even small efforts can make a big difference. Regularly discussing your child’s favourite apps or online activities can help you stay informed while respecting their independence. Implementing parental controls can serve as a safety net, allowing your child some freedom while protecting them from potentially harmful content. Helicopter Parents: “Always Watching” and Over-Involved Helicopter parents and caregivers, are known for their intense involvement in their child’s life, and this extends to their use of technology. These parents and caregivers closely monitor their child’s online activities, often tracking their every move and tightly controlling access to apps, devices, and social platforms. This level of supervision can provide significant benefits, including heightened safety, as children are less likely to encounter harmful situations or make risky decisions online. Additionally, helicopter parents and caregivers often use these moments to teach their children about appropriate online behaviour and digital etiquette. On the other hand, this over-involvement can have drawbacks. Constant monitoring may stifle a child’s ability to develop critical thinking, resiliency, and self-regulation, as they rely on their parents and caregivers to make decisions for them. Furthermore, excessive involvement can lead to privacy concerns, potentially damaging trust between parent, caregivers, and child. Children who feel their personal space is being invaded may push back, creating tension in the parent-child relationship. To strike a better balance, helicopter parents and caregivers can focus on fostering trust with their children. Gradually reducing the level of monitoring as a child demonstrates responsible behaviour can help build mutual respect. Instead of controlling every aspect of their child’s online experience, parents and caregivers can empower their children by teaching them how to identify risks and make informed decisions on their own. Snowplow Parents: “Clearing the Path” and Over-Protective Snowplow parents and caregivers take a proactive and protective approach to their child’s use of technology. They often work to eliminate potential obstacles, such as harmful content or negative interactions, by preemptively blocking apps, restricting social media, or managing online interactions on behalf of their child. This approach minimizes risks, ensuring that children are less likely to encounter harmful content or online predators. It can also simplify the online experience for young children or those with limited digital literacy, making the digital world feel less overwhelming. However, this well-intentioned approach can also hinder a child’s growth. Overprotecting children may prevent them from developing the skills needed to navigate challenges independently, leaving them ill-equipped to handle online issues as they grow older. Additionally, snowplow parenting can foster dependency, as children come to rely on their parents or caregivers to resolve even minor problems in the onlife space. Snowplow parents and caregivers can adopt a more balanced approach by encouraging their children to tackle manageable online challenges. For instance, allowing a child to troubleshoot an app issue or handle an inappropriate comment with guidance can build their problem-solving skills and confidence. Gradually introducing new technology in a guided manner, rather than outright banning certain platforms, can also help children learn how to use these tools responsibly. Parenting in the onlife world doesn’t require adhering strictly to one style. Instead, parents and caregivers can combine the strengths of all three approaches to create a balanced strategy. Staying engaged in your child’s online activities without micromanaging fosters trust and understanding. Teaching digital literacy equips your child with the tools to navigate technology safely and responsibly. As your child grows, adapting your level of involvement to meet their developmental needs ensures that your approach remains effective and supportive. A parenting strategy that incorporates the best aspects of Detached, Helicopter, and Snowplow parenting is what we like to call "Lighthouse Parenting” - a term introduced by paediatrician Dr. Kenneth Ginsburg in his 2015 book, Raising Kids to Thrive: Balancing Love With Expectations and Protection With Trust. (1) Lighthouse Parenting: This approach mirrors the role of a lighthouse - providing guidance and support without being overbearing or intrusive. Parents and caregivers act as a steady presence, offering direction and safety when needed while allowing their children the space to navigate their own paths independently. Like Detached parenting, Lighthouse parenting respects a child’s autonomy, fostering independence and critical thinking. It also reflects the protective vigilance of Helicopter parenting by illuminating potential risks and challenges, helping children make informed decisions without micromanaging every aspect of their online lives. Similarly, it borrows from Snowplow parenting by clearing the way for success when necessary but ensures children develop the skills and resilience to face challenges on their own. Lighthouse parenting strikes a balance between protection, guidance, and independence, empowering children to thrive in the onlife world while fostering trust, responsibility, and self-confidence. In the ever-evolving onlife world, parenting requires adaptability, intention, and balance. Detached, Helicopter, and Snowplow parenting styles each offer valuable insights into how parents and caregivers can approach their child’s technology use. However, these approaches, when used in isolation, can sometimes miss the mark. Detached parenting risks neglecting essential teachable moments, Helicopter parenting may inadvertently hinder independence, and Snowplow parenting can stifle the development of resilience and problem-solving skills. By adopting the principles of “Lighthouse Parenting”, parents and caregivers can blend the best elements of these styles into a cohesive and effective strategy. Acting as a steady guide, lighthouse parents and caregivers illuminate risks, offer direction, and provide a safe harbour, all while giving children the freedom to explore and learn within the digital space. This approach encourages independence, fosters trust, and equips children with the critical skills they need to navigate technology responsibly. Parenting in the onlife world is not about choosing one rigid style but about embracing a dynamic, balanced strategy that evolves with your child’s growth and the ever-changing onlife landscape. By becoming a lighthouse parent or caregiver, you can empower your child to thrive in the onlife world, ensuring they are not only safe but also confident and capable in their digital journey. Ultimately, the goal is not to control your child’s relationship with technology but to guide them in developing a healthy and balanced onlife experience. Whether you identify as a detached, helicopter, snowplow, or lighthouse parent or caregiver, intentional and informed parenting will always lead to the best outcomes for your child in today’s onlife world. Digital Food For Thought The White Hatter Facts Not Fear, Facts Not Emotions, Enlighten Not Frighten, Know Tech Not No Tech References 1/ https://www.amazon.ca/Raising-Kids-Thrive-Expectations-Protection/dp/1581108672

Search Results

bottom of page