{"id":34377,"date":"2025-11-22T16:07:56","date_gmt":"2025-11-22T21:07:56","guid":{"rendered":"https:\/\/knowledgeflow.org\/?post_type=resource&#038;p=34377"},"modified":"2025-11-24T13:23:56","modified_gmt":"2025-11-24T18:23:56","slug":"cybersafety-by-design-7-critical-principles","status":"publish","type":"resource","link":"https:\/\/knowledgeflow.org\/zh\/resource\/cybersafety-by-design-7-critical-principles\/","title":{"rendered":"\u7f51\u7edc\u5b89\u5168\u8bbe\u8ba1--7 \u9879\u5173\u952e\u539f\u5219"},"content":{"rendered":"<p><strong>\u975e\u8425\u5229\u7ec4\u7ec7\u7f51\u7edc\u5b89\u5168\u8bbe\u8ba1\u65b9\u6848<\/strong> \u8be5\u6846\u67b6\u7531KnowledgeFlow\u4e8e2022\u5e74\u5f00\u53d1\uff0c\u65e8\u5728\u4e3a\u7ec4\u7ec7\u6784\u5efa\u66f4\u5b89\u5168\u3001\u66f4\u5c0a\u91cd\u9690\u79c1\u7684\u6570\u5b57\u9879\u76ee\u63d0\u4f9b\u5b9e\u7528\u6307\u5357\u3002\u672c\u6587\u6240\u8ff0\u539f\u5219\u6e90\u4e8e\u521b\u59cb\u4eba\u514b\u52b3\u8fea\u4e4c\u00b7\u6ce2\u5e15\uff08Claudiu Popa\uff09\u957f\u671f\u670d\u52a1\u4e8e\u5b89\u5927\u7565\u7701\u4fe1\u606f\u4e0e\u9690\u79c1\u4e13\u5458\u529e\u516c\u5ba4\u7684\u5b9e\u8df5\u7ecf\u9a8c\uff0c\u5305\u62ec\u4ed6\u5bf9\u4ee5\u4e0b\u4e24\u9879\u6807\u51c6\u6f14\u8fdb\u6240\u4f5c\u7684\u8d21\u732e\uff1a <strong>\u9690\u79c1\u8bbe\u8ba1<\/strong> \u4ee5\u53ca\u66f4\u8fd1\u671f\u7684 <strong>\u9690\u79c1\u518d\u8bbe\u8ba1<\/strong> \u8fd9\u4e9b\u4e3e\u63aa\u4e3a\u5e0c\u671b\u4ee5\u73b0\u4ee3\u5316\u3001\u53ef\u64cd\u4f5c\u4e14\u7b26\u5408\u5f53\u4eca\u6570\u5b57\u73af\u5883\u7684\u65b9\u5f0f\u5e94\u7528\u516c\u8ba4\u9690\u79c1\u539f\u5219\u7684\u7ec4\u7ec7\u63d0\u4f9b\u4e86\u575a\u5b9e\u57fa\u7840\u3002.<\/p>\n\n\n\n<p>\u672c\u8d44\u6e90\u5c06\u8fd9\u4e9b\u6210\u719f\u7684\u9690\u79c1\u6982\u5ff5\u8f6c\u5316\u4e3a <strong>\u4e03\u9879\u7f51\u7edc\u5b89\u5168\u8bbe\u8ba1\u539f\u5219<\/strong>, \u4e13\u4e3a\u975e\u8425\u5229\u7ec4\u7ec7\u3001\u5b66\u6821\u53ca\u4efb\u4f55\u670d\u52a1\u513f\u7ae5\u3001\u9752\u5c11\u5e74\u3001\u5bb6\u5ead\u6216\u5176\u4ed6\u5f31\u52bf\u7fa4\u4f53\u7684\u673a\u6784\u91cf\u8eab\u5b9a\u5236\u3002\u91cd\u70b9\u5728\u4e8e\u63d0\u4f9b\u5207\u5b9e\u53ef\u884c\u7684\u4fdd\u969c\u63aa\u65bd\uff0c\u65e2\u80fd\u964d\u4f4e\u9690\u79c1\u6cc4\u9732\u3001\u7f51\u7edc\u4fb5\u5bb3\u3001\u76d1\u63a7\u3001\u5265\u524a\u53ca\u5176\u4ed6\u5371\u5bb3\u7684\u98ce\u9669\uff0c\u53c8\u80fd\u652f\u6301\u79ef\u6781\u3001\u4e92\u52a8\u7684\u6570\u5b57\u4f53\u9a8c\u3002.<\/p>\n\n\n\n<p>\u5728\u5185\u90e8\uff0c\u7ec4\u7ec7\u5c06\u53d1\u73b0\uff1a<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u5bf9\u2026\u2026\u7684\u6e05\u6670\u8bf4\u660e <strong>7 \u8bbe\u8ba1\u5bfc\u5411\u7684\u7f51\u7edc\u5b89\u5168\u539f\u5219<\/strong> \u4ee5\u53ca\u5b83\u4eec\u5982\u4f55\u5e94\u7528\u4e8e\u73b0\u5b9e\u4e16\u754c\u7684\u7a0b\u5e8f\u548c\u5e73\u53f0 <\/li>\n\n\n\n<li>A <strong>\u7f51\u7edc\u5b89\u5168\u98ce\u9669\u68c0\u67e5\u8868\uff08CRC\uff09<\/strong> \u7528\u4e8e\u8bc4\u4f30\u5de5\u5177\u3001\u5e94\u7528\u7a0b\u5e8f\u3001\u7f51\u7ad9\u548c\u5b66\u4e60\u6280\u672f <\/li>\n\n\n\n<li>\u5b9e\u7528 <strong>\u68c0\u6d4b\u2013\u7ea0\u6b63\u2013\u76d1\u63a7<\/strong> \u52a0\u5f3a\u73b0\u6709\u9690\u79c1\u548c\u5b89\u5168\u63a7\u5236\u7684\u6a21\u578b <\/li>\n<\/ul>\n\n\n\n<p>\u8fd9\u4e9b\u5de5\u5177\u53ef\u4f9b\u4ee5\u4e0b\u4eba\u5458\u4f7f\u7528\uff1a<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\u6821\u8463\u4f1a<\/strong> \u8bbe\u8ba1\u6216\u8bc4\u4f30\u9762\u5411\u5b66\u751f\u7684\u6280\u672f<\/li>\n\n\n\n<li><strong>\u652f\u6301\u513f\u7ae5\u3001\u9752\u5c11\u5e74\u3001\u8001\u5e74\u4eba\u6216\u65b0\u79fb\u6c11\u7684\u975e\u8425\u5229\u7ec4\u7ec7<\/strong><\/li>\n\n\n\n<li><strong>\u793e\u533a\u7ec4\u7ec7<\/strong> \u6784\u5efa\u6570\u5b57\u670d\u52a1\u6216\u5728\u7ebf\u9879\u76ee<\/li>\n\n\n\n<li><strong>\u4efb\u4f55\u8d1f\u8d23\u5904\u7406\u4e2a\u4eba\u4fe1\u606f\u7684\u56e2\u4f53<\/strong>, \u7279\u522b\u662f\u6d89\u53ca\u672a\u6210\u5e74\u4eba\u7684<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/knowledgeflow-nonprofit-resource-cybersafety-by-design.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"\u5d4c\u5165\u77e5\u8bc6\u6d41\u2014\u2014\u975e\u8425\u5229\u7ec4\u7ec7\u7f51\u7edc\u5b89\u5168\u8bbe\u8ba1\u8d44\u6e90\"><\/object><a id=\"wp-block-file--media-0a5e7d1a-b3cb-4d20-a163-65daaf297aa3\" href=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/knowledgeflow-nonprofit-resource-cybersafety-by-design.pdf\">\u77e5\u8bc6\u6d41-\u975e\u8425\u5229\u7ec4\u7ec7\u8d44\u6e90-\u7f51\u7edc\u5b89\u5168\u8bbe\u8ba1<\/a><a href=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/knowledgeflow-nonprofit-resource-cybersafety-by-design.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-0a5e7d1a-b3cb-4d20-a163-65daaf297aa3\">\u4e0b\u8f7d<\/a><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>\u901a\u8fc7\u5c06\u7f51\u7edc\u5b89\u5168\u690d\u6839\u4e8e\u516c\u8ba4\u7684\u9690\u79c1\u6846\u67b6\uff0c\u7ed3\u5408\u57fa\u4e8e\u9690\u79c1\u7684\u8bbe\u8ba1\uff08PbD\uff09\u7684\u79ef\u6781\u98ce\u9669\u7f13\u89e3\u65b9\u6cd5\u4ee5\u53ca\u57fa\u4e8e\u9690\u79c1\u7684\u98ce\u9669\u8bbe\u8ba1\uff08PbRD\uff09\u5bf9\u91cd\u5efa\u7cfb\u7edf\u4ee5\u5f25\u8865\u73b0\u6709\u6f0f\u6d1e\u7684\u5173\u6ce8\uff0c\u672c\u8d44\u6e90\u52a9\u529b\u7ec4\u7ec7\u91c7\u7528\u4e00\u81f4\u3001\u73b0\u4ee3\u5316\u4e14\u503c\u5f97\u4fe1\u8d56\u7684\u65b9\u6cd5\u6765\u4fdd\u62a4\u5176\u670d\u52a1\u5bf9\u8c61\u3002.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u300a\u975e\u8425\u5229\u7ec4\u7ec7\u7f51\u7edc\u5b89\u5168\u8bbe\u8ba1\u6307\u5357\u300b\u7531KnowledgeFlow\u4e8e2022\u5e74\u5f00\u53d1\uff0c\u4f5c\u4e3a\u5b9e\u7528\u6846\u67b6\u5e2e\u52a9\u7ec4\u7ec7\u6784\u5efa\u66f4\u5b89\u5168\u7684...<\/p>","protected":false},"featured_media":18194,"menu_order":0,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"resource-type":[547],"topic":[540,544],"resource-initiative":[],"class_list":["post-34377","resource","type-resource","status-publish","format-standard","has-post-thumbnail","hentry","resource-type-guides","topic-online-privacy-and-security","topic-online-safety-for-children-and-parents"],"acf":[],"taxonomy_info":{"resource-type":[{"value":547,"label":"Guidebooks"}],"topic":[{"value":540,"label":"Online Privacy and Security"},{"value":544,"label":"Online Safety for Children and Parents"}]},"featured_image_src_large":["https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/04\/Guidebooks-Featured-Image-1024x256.png",1024,256,true],"author_info":[],"comment_info":"","_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/resource\/34377","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/types\/resource"}],"version-history":[{"count":1,"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/resource\/34377\/revisions"}],"predecessor-version":[{"id":34380,"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/resource\/34377\/revisions\/34380"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/media\/18194"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/media?parent=34377"}],"wp:term":[{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/resource-type?post=34377"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/topic?post=34377"},{"taxonomy":"resource-initiative","embeddable":true,"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/resource-initiative?post=34377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}