cyber safety cyberbullying · 2007‐teens and social media –pew/internet ... to hunt for victims...
TRANSCRIPT
1
Dave Adkins
Voorheesville
CYBER SAFETY &
Community Forum
CYBER SAFETY & CYBERBULLYING
Agenda
1. What is Cyber Safety?y y2. Areas of Cyber Safety
Content, Social NetworkingPredators, Privacy
3. Cyberbullying4. What can you do as a parent?
TipsResources
2
1. What is Cyber Safety?
“Cyber safety” refers to the safe and responsible use of the Internet
Information SecurityProtection from PredatorsMany other areas…
For tonight:For tonight:“Making sure our teens are using the Internet Safely”
2. What are my kids doing on the Internet?
S fi b itSurfing websitesEmail – need one to do other thingsInstant MessagingBlogging (web‐log)Posting Photos/VideosMusic Downloads
Social Networking
3
Some quick teen statistics
93% Teens use the internet55% Age 12‐17 use social Networking Sites (Dec. 2006)47% upload photos14% post videos
l h l d48% log on to the sites at least once a day or more
2007‐Teens and Social Media – Pew/Internet
Surfing WebsitesGamesMulti‐user, chat rooms, talk to playerswww.shockwave.com ‐ inklink
Doing Homeworkwww.dictionary.comSearch Engineswww.google.com (language translator)www.ask.com, www.ajkids.com (for kids)www.ask.com, www.ajkids.com (for kids)
Following Bands
4
“That’s so yesterday…”Kids have moved onNeed email address to sign on Facebook, other sitesReplaced by
I M iInstant MessagingTextingSocial Network Sites (Facebook)
Instant Messaging (IM)
Background:Free service – anyone can sign up – no verification process, no age check
Providers include:AIM (AOL), MSN, Yahoo, Google
Screen NamesScreen NamesMany kids have multiple screen names
5
Instant Messaging (IM)
Chat RoomsInstead of one‐on‐one, many chat togetherRestricted by invitation or open by category
VocabularyPOS – Parent over shoulderLOL – Laughing out loudTTYL –Talk to you laterW RU? Wh ?Wr RU? –Where are you?http://www.aim.com/acronyms.adp?aolp=
Blogging (Web Log)
Online DiaryJournalAuthor makes entries and readers are free to comment (anybody can comment)Blog at www.xanga.com
l kNow moving to Social Networking
6
Posting Photos/VideosOnline Photo Albums
www.webshots.comhttp://www.shutterfly.comwww.flickr.com
www.snapfish.comVideo Sites
bwww.youtube.com
What’s the problem?http://www.webshots.com
Listening to Music
Music Purchasingwww.itunes.comwww.walmart.com –mp3 files
File sharing siteswww limewire comwww.limewire.comwww.bittorrent.comKazaa, Gnutella
7
Social Networking (Huge)
Connecting with Friends and people connected by school, music, causes and other groups MySpace is losing market shareFacebook is the New Giant in Town
www.facebook.com ‐ FactsMore than 150 million active users (doubling every 6 months)
Facebook is the 4th most‐trafficked website in the world
Facebook is the most‐trafficked social media site in the world
More than half of Facebook users are outside of college age
The fastest growing demographic is those 30 years old and older
People spend an average of 20 minutes on the site daily p p g y
No. 1 photo sharing application on the Web
800 million photos uploaded to the site each month
All this started in 2005!
8
How are your kids using Facebook?
Reinforcing pre‐existing relationships91% stay in touch with friends they see a lot82% stay in touch with friends they rarely see in personMeeting new people49% make new friends 49(more for boys, less for girls)17% flirt
(mostly older boys – 29% of them say they use the sites to flirt vs. 13% of older girls)
Facebook Activities
Share Photos/TaggingWrite on your Wall – Everyone can see itPoking ‐ Private MessageJoining Groups (Networks)Relationship Status
Bottom Line ‐ Being Social
9
MacArthur Foundation Report
Teens go online to:Hang OutExtend Existing FriendshipGrapple with Social NormsExplore InterestsDevelop Technical SkillsSelf‐expressionp
Mizuko Ito – Digital Youth Project“Adults should facilitate young people’s engagement with Digital Media”http://www.youtube.com/watch?v=58X7YPebJVo&feature=channel
Isn’t it the same as when we were kids?
People Hang outJockey for Social StatusWork through how to present themselvesTry things that help determine the boundaries of the social world they inhabitboundaries of the social world they inhabit
10
2. Areas of Teen Cyber Safety
Inappropriate Contentpp pSocial NetworkingInternet PredatorsPrivacy – Identity Protection
Inappropriate Content
Definition: visual depictions that areobscene, child pornography, or material"harmful to minors"
It can also include images of violence, hate group or extremist material illegal activities and online or extremist material, illegal activities and online advertising
11
Unraveling the facts…A white supremacist group registered the
Inappropriate Content
p g p gdomain name www.martinlutherking.org in order to masquerade as a legitimate resourceSpell Alike:
www.Disey.com instead of www.disney.com
Just because its posted does not make it right…Just because its posted does not make it right…Colbert Report –African Elephants
Unraveling the facts…Inappropriate content can occur on any
Inappropriate Content
computer by accident
Only a small fraction of the materials on the Internet could reasonably be classified as inappropriate for children…
Unfortunately, that small fraction is highly visible and controversial.
12
Social networking sites gather data submitted by members as “profiles”
Social Networking
members as “profiles”
Profiles can then be shared among members
Unraveling the facts…Posting a picture on Facebook is like posting it on
Social Networking
g p p ga public campus bulletin board, that anyone can access and deface
Use the Privacy Controlshttp://kids getnetwise org/safetyguide/technologhttp://kids.getnetwise.org/safetyguide/technology/facebook/facebook‐private‐audioBlogs.timesunion.com/tech
13
How are Online Networks different from face‐to‐face Networks?
d d f1. Persistence – Recorded for posterity2. Searchability – Find by who, what, etc.3. Replicability – Cut and paste, duplicate4. Invisible Audience – Don’t know who is 4
“eavesdropping”
Definition: A Cyber predator uses the Internet to hunt for victims to take advantage of in ANY
Predators
gway, including sexually, emotionally, psychologically or financially
Cyber predators know how to manipulate kids, ti t t d f i d hi h h ld creating trust and friendship where none should
exist
Target victims
14
Predator Statistics
43% of teens have been contacted by strangers31% have online friends they have never met23% of teens have been scared by an online encounter
What children need to look out for is not a t i t t f d b t
Predators
certain stereotype of a dangerous person but certain types of behavior…
Use teachable moments, even headline news, to make discussion and education relevant.
15
Privacy ‐ Identity
Personal information identifies you,your location or your financial assets.
Obvious: name, age, sex, picture, phone number, addressLess obvious: hobbies interests school mascot Less obvious: hobbies, interests, school mascot, gaming identities
Used for phishing scams
16
Identity thieves are clever, posing as friends, relatives and banks, to get people to reveal
Privacy ‐ Identity
personal information.
Teens are just as likely as adults to become victims of identity theft -- when applying for a driver's license they may find one already has been issued using their name and SSN.
Warn kids about giving out any information
Definition: Cyberbullying is the use of
3. Cyber Bullying
technology for harassment, impersonation,denigration, trickery, exclusion and stalking.
Cyberbullies may use email, chat rooms, discussion forums instant messaging text discussion forums, instant messaging, text messaging or social networking sites. Bullying and harassment are the most frequent threats that minors face, both online and offline
17
Cyber Bullying
Using a random sample of approximately 2000 middle‐school students from a large school district in southern United States, about 10% of respondents had been cyber‐bullied in the previous 30 days while over 17%reported being cyber‐bullied at least once in their lifetime ‐ (2009). Bullying beyond the schoolyard: Preventing and responding to cyberbullying.
Cyber Bullying ‐ Examples
Sending cruel, vicious, and sometimes threatening messages.
Creating web sites that have stories, cartoons, pictures, and jokes ridiculing others.
Posting pictures of classmates online and asking Posting pictures of classmates online and asking students to rate them, with questions such “Who is the biggest ___ (add a derogatory term)?”
18
Breaking into an e‐mail account and sending
Cyber Bullying ‐ Examples
vicious or embarrassing material to others.
Engaging someone in IM (instant messaging), tricking that person into revealing sensitive personal information, and forwarding that information to others.
Taking a picture of a person in the locker room using a digital phone camera and sending that picture to others or posting
4. What can you do as a parent?
Be involved with your child’s use of technologyKnow not only what your kids are doing online, but the technology behind itComputer vs. Phone
We understand the phoneWe understand the phone
19
Parental Tips
Use the internet togetherEstablish Ground rulesTeach kids to protect their privacyEstablish Rules
www.safekids.com
Rules for Kids1. I will not give out personal information such as my
address, telephone number, parents' work address/telephone number, or the name and location of my school without my parents' permission.
2. I will tell my parents right away if I come across any information that makes me feel uncomfortable, scared or threatened in any way.
3. I will never agree to get together with someone I "meet" online without first checking with my parents. If meet online without first checking with my parents. If my parents agree to the meeting, I will be sure that it is in a public place and bring my mother or father along.
4. I will never send a person (that I don't know) my picture or anything else personal without first checking with my parents.
20
5. I will not respond to any messages that are mean or in any way make me feel uncomfortable. It is not my fault if I get a message like that. If I do, I will tell my parents right away so that they can contact the service provider.
Rules for Kids
y p6. I will talk with my parents so that we can set up rules for
going online. We will decide upon the time of day that I can be online, the length of time I can be online, and appropriate areas for me to visit. I will not access other areas or break these rules without their permission.
7. I will not give out my Internet password to anyone (even my best friends) other than my parents or guardian my best friends) other than my parents or guardian.
8. I will be a good online citizen and not do anything that hurts other people or breaks the law. It is important to treat people with respect, the same way I want them to treat me.
Tips for Parents
Encourage your kids to share their Internet experiences with you. Enjoy the Internet along with your children.
Teach your kids to trust their instincts. If they feel nervous about anything online they should tell you about itabout anything online, they should tell you about it.
If your kids visit chat rooms, use instant messaging (IM) programs, online video games, or other activities on the Internet that require a login name to identify themselves, help them choose that name and make sure it doesn't reveal any personal information about them.
I i t th t kid i t dd h Insist that your kids never give out your address, phone number, or other personal information, including where they go to school or where they like to play.
Teach your kids that the difference between right and wrong is the same on the Internet as it is in real life.
21
Show your kids how to respect others online. Make sure they know that rules for good behavior don't change just because they're on a computer.
Insist that your kids respect the property of others online Explain that making illegal copies of other
Tips for Parents
online. Explain that making illegal copies of other people's work—music, video games, and other programs—is just like stealing it from a store.
Tell your kids that they should never meet online friends in person. Explain that online friends may not be who they say they are.
T h kid th t t thi th d Teach your kids that not everything they read or see online is true. Encourage them to ask you if they're not sure.
Control your children's online activity with advanced Internet software. Parental controls can help you filter out harmful content, monitor the sites your child visits, and find out what they do there.
Can I monitor my kids internet usage?Issues
T iTrust versus protection
Location of computer – Public AreaTime of day allowed ‐CurfewsSoftware monitoring/Parental Control
Many productsMany products
Spot Check you KidsWhat are you doing?What sites have you been to lately?Internet History – Internet Explorer 7
22
Browser History
All Browsers have a history functionInternet Explorer ‐CRTL‐SHIFT‐H
Show the websites that have visited over the past days and weeks…
Take Aways…
Get involved in your child’s “technological” lifelifeReview their Cyber SafetyBe aware of Cyberbullying
Learn More:blog.timesunion.com/tech – updates weeklyGoogle “teen cybersafety”Experiment !