CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims...

22
1 Dave Adkins Voorheesville CYBER SAFETY & Community Forum CYBER SAFETY & CYBERBULLYING Agenda 1. What is C yber Safety? 2. Areas of Cyber Safety Content, Social Networking Predators, Privacy 3. Cyberbullying 4. What can you do as a parent? Tips Resources

Transcript of CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims...

Page 1: CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims to take advantage of in ANY ... Identity thieves are clever, posing as friends,

1

Dave Adkins

Voorheesville 

CYBER SAFETY & 

Community Forum

CYBER SAFETY & CYBERBULLYING

Agenda

1. What is Cyber Safety?y y2. Areas of  Cyber Safety

Content, Social NetworkingPredators, Privacy

3. Cyberbullying4. What can you do as a parent?

TipsResources

Page 2: CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims to take advantage of in ANY ... Identity thieves are clever, posing as friends,

2

1. What is Cyber Safety?

“Cyber safety” refers to the safe and responsible use of the Internet

Information SecurityProtection from PredatorsMany other areas…

For tonight:For tonight:“Making sure our teens are using the Internet Safely”

2.  What are my kids doing on the Internet?

S fi   b itSurfing websitesEmail – need one to do other thingsInstant MessagingBlogging (web‐log)Posting Photos/VideosMusic Downloads

Social Networking

Page 3: CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims to take advantage of in ANY ... Identity thieves are clever, posing as friends,

3

Some quick teen statistics

93% Teens use the internet55% Age 12‐17 use social Networking Sites (Dec. 2006)47% upload photos14% post videos

l h l d48% log on to the sites at least once a day or more

2007‐Teens and Social Media – Pew/Internet

Surfing WebsitesGamesMulti‐user, chat rooms, talk to playerswww.shockwave.com ‐ inklink

Doing Homeworkwww.dictionary.comSearch Engineswww.google.com (language translator)www.ask.com, www.ajkids.com (for kids)www.ask.com, www.ajkids.com (for kids)

Following Bands

Page 4: CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims to take advantage of in ANY ... Identity thieves are clever, posing as friends,

4

Email

“That’s so yesterday…”Kids have moved onNeed email address to sign on Facebook, other sitesReplaced by

I  M iInstant MessagingTextingSocial Network Sites (Facebook)

Instant Messaging (IM)

Background:Free service – anyone can sign up – no verification process, no age check

Providers include:AIM (AOL), MSN, Yahoo, Google

Screen NamesScreen NamesMany kids have multiple screen names

Page 5: CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims to take advantage of in ANY ... Identity thieves are clever, posing as friends,

5

Instant Messaging (IM)

Chat RoomsInstead of one‐on‐one, many chat togetherRestricted by invitation or open by category

VocabularyPOS – Parent over shoulderLOL – Laughing out loudTTYL –Talk to you laterW  RU?  Wh     ?Wr RU? –Where are you?http://www.aim.com/acronyms.adp?aolp=

Blogging (Web Log)

Online DiaryJournalAuthor makes entries and readers are free to comment (anybody can comment)Blog at  www.xanga.com

l kNow moving to Social Networking

Page 6: CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims to take advantage of in ANY ... Identity thieves are clever, posing as friends,

6

Posting Photos/VideosOnline Photo Albums

www.webshots.comhttp://www.shutterfly.comwww.flickr.com

www.snapfish.comVideo Sites

bwww.youtube.com

What’s the problem?http://www.webshots.com

Listening to Music

Music Purchasingwww.itunes.comwww.walmart.com –mp3 files

File sharing siteswww limewire comwww.limewire.comwww.bittorrent.comKazaa, Gnutella 

Page 7: CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims to take advantage of in ANY ... Identity thieves are clever, posing as friends,

7

Social Networking (Huge)

Connecting with Friends and people connected by school, music, causes and other groups MySpace is losing market shareFacebook is the New Giant in Town

www.facebook.com ‐ FactsMore than 150 million active users (doubling every 6 months)

Facebook  is the 4th most‐trafficked website in the world

Facebook  is the most‐trafficked social media site in the world 

More than half of Facebook users are outside of college age

The fastest growing demographic is those 30 years old and older 

People spend an average of 20 minutes on the site daily p p g y

No. 1 photo sharing application on the Web

800 million photos uploaded to the site each month 

All this started in 2005!

Page 8: CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims to take advantage of in ANY ... Identity thieves are clever, posing as friends,

8

How are your kids using Facebook?

Reinforcing pre‐existing relationships91% stay in touch with friends they see a lot82% stay in touch with friends they rarely see in personMeeting new people49% make new friends 49(more for boys, less for girls)17% flirt 

(mostly older boys – 29% of them say they use the sites to flirt vs. 13% of older girls)

Facebook Activities

Share Photos/TaggingWrite on your Wall – Everyone can see itPoking  ‐ Private MessageJoining Groups (Networks)Relationship Status

Bottom Line ‐ Being Social

Page 9: CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims to take advantage of in ANY ... Identity thieves are clever, posing as friends,

9

MacArthur Foundation Report

Teens go online to:Hang OutExtend Existing FriendshipGrapple with Social NormsExplore InterestsDevelop Technical SkillsSelf‐expressionp

Mizuko Ito – Digital Youth Project“Adults should facilitate young people’s engagement with Digital Media”http://www.youtube.com/watch?v=58X7YPebJVo&feature=channel

Isn’t it the same as when we were kids?

People Hang outJockey for Social StatusWork through how to present themselvesTry things that help determine the boundaries of the social world they inhabitboundaries of the social world they inhabit

Page 10: CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims to take advantage of in ANY ... Identity thieves are clever, posing as friends,

10

2. Areas of Teen Cyber Safety

Inappropriate Contentpp pSocial NetworkingInternet PredatorsPrivacy – Identity Protection

Inappropriate Content

Definition: visual depictions that areobscene, child pornography, or material"harmful to minors" 

It can also include images of violence, hate group or extremist material  illegal activities and online or extremist material, illegal activities and online advertising

Page 11: CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims to take advantage of in ANY ... Identity thieves are clever, posing as friends,

11

Unraveling the facts…A white supremacist group registered the 

Inappropriate Content

p g p gdomain name www.martinlutherking.org in order to masquerade as a legitimate resourceSpell Alike:

www.Disey.com instead of www.disney.com

Just because its posted does not make it right…Just because its posted does not make it right…Colbert Report –African Elephants

Unraveling the facts…Inappropriate content can occur on any 

Inappropriate Content

computer by accident

Only a small fraction of the materials on the Internet could reasonably be classified as inappropriate for children…

Unfortunately, that small fraction is highly visible and controversial.

Page 12: CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims to take advantage of in ANY ... Identity thieves are clever, posing as friends,

12

Social networking sites gather data submitted by members as “profiles”

Social Networking

members as “profiles”

Profiles can then be shared among members

Unraveling the facts…Posting a picture on Facebook is like posting it on 

Social Networking

g p p ga public campus bulletin board, that anyone can access and deface

Use the Privacy Controlshttp://kids getnetwise org/safetyguide/technologhttp://kids.getnetwise.org/safetyguide/technology/facebook/facebook‐private‐audioBlogs.timesunion.com/tech

Page 13: CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims to take advantage of in ANY ... Identity thieves are clever, posing as friends,

13

How are Online Networks different from face‐to‐face Networks?

d d f1. Persistence – Recorded for posterity2. Searchability – Find by who, what, etc.3. Replicability – Cut and paste, duplicate4. Invisible Audience – Don’t know who is 4

“eavesdropping”

Definition: A Cyber predator uses the Internet to hunt for victims to take advantage of in ANY

Predators

gway, including sexually, emotionally, psychologically or financially

Cyber predators know how to manipulate kids, ti  t t  d f i d hi   h     h ld creating trust and friendship where none should 

exist

Target victims

Page 14: CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims to take advantage of in ANY ... Identity thieves are clever, posing as friends,

14

Predator Statistics

43% of teens have been contacted by strangers31% have online friends they have never met23% of teens have been scared by an online encounter

What children need to look out for is not a t i   t t   f   d    b t 

Predators

certain stereotype of a dangerous person but certain types of behavior…

Use teachable moments, even headline news, to make discussion and education relevant.

Page 15: CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims to take advantage of in ANY ... Identity thieves are clever, posing as friends,

15

Privacy ‐ Identity

Personal information identifies you,your location or your financial assets. 

Obvious: name, age, sex, picture, phone number, addressLess obvious: hobbies  interests  school mascot  Less obvious: hobbies, interests, school mascot, gaming identities

Used for phishing scams  

Page 16: CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims to take advantage of in ANY ... Identity thieves are clever, posing as friends,

16

Identity thieves are clever, posing as friends, relatives and banks, to get people to reveal

Privacy ‐ Identity

personal information.

Teens are just as likely as adults to become victims of identity theft -- when applying for a driver's license they may find one already has been issued using their name and SSN.

Warn kids about giving out any information

Definition: Cyberbullying is the use of

3. Cyber Bullying

technology for harassment, impersonation,denigration, trickery, exclusion and stalking.

Cyberbullies may use email, chat rooms, discussion forums  instant messaging  text discussion forums, instant messaging, text messaging or social networking sites. Bullying and harassment are the most frequent threats that minors face, both online and offline

Page 17: CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims to take advantage of in ANY ... Identity thieves are clever, posing as friends,

17

Cyber Bullying

Using a random sample of approximately 2000 middle‐school students from a large school district in southern United States, about 10% of respondents had been cyber‐bullied in the previous 30 days while over 17%reported being cyber‐bullied at least once in their lifetime ‐ (2009). Bullying beyond the schoolyard: Preventing and responding to cyberbullying.

Cyber Bullying ‐ Examples

Sending cruel, vicious, and sometimes threatening messages.

Creating web sites that have stories, cartoons, pictures, and jokes ridiculing others.

Posting pictures of classmates online and asking Posting pictures of classmates online and asking students to rate them, with questions such “Who is the biggest ___ (add a derogatory term)?”

Page 18: CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims to take advantage of in ANY ... Identity thieves are clever, posing as friends,

18

Breaking into an e‐mail account and sending 

Cyber Bullying ‐ Examples

vicious or embarrassing material to others.

Engaging someone in IM (instant messaging), tricking that person into revealing sensitive personal information, and forwarding that information to others.

Taking a picture of a person in the locker room using a digital phone camera and sending that picture to others or posting

4. What can you do as a parent?

Be involved with your child’s use of technologyKnow not only what your kids are doing online, but the technology behind itComputer vs. Phone

We understand the phoneWe understand the phone

Page 19: CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims to take advantage of in ANY ... Identity thieves are clever, posing as friends,

19

Parental Tips

Use the internet togetherEstablish Ground rulesTeach kids to protect their privacyEstablish Rules

www.safekids.com

Rules for Kids1. I will not give out personal information such as my 

address, telephone number, parents' work address/telephone number, or the name and location of my school without my parents' permission. 

2. I will tell my parents right away if I come across any information that makes me feel uncomfortable, scared or threatened in any way. 

3. I will never agree to get together with someone I "meet" online without first checking with my parents. If meet  online without first checking with my parents. If my parents agree to the meeting, I will be sure that it is in a public place and bring my mother or father along. 

4. I will never send a person (that I don't know) my picture or anything else personal without first checking with my parents.

Page 20: CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims to take advantage of in ANY ... Identity thieves are clever, posing as friends,

20

5. I will not respond to any messages that are mean or in any way make me feel uncomfortable. It is not my fault if I get a message like that. If I do, I will tell my parents right away so that they can contact the service provider. 

Rules for Kids

y p6. I will talk with my parents so that we can set up rules for 

going online. We will decide upon the time of day that I can be online, the length of time I can be online, and appropriate areas for me to visit. I will not access other areas or break these rules without their permission. 

7. I will not give out my Internet password to anyone (even my best friends) other than my parents or guardian  my best friends) other than my parents or guardian. 

8. I will be a good online citizen and not do anything that hurts other people or breaks the law. It is important to treat people with respect, the same way I want them to treat me.

Tips for Parents

Encourage your kids to share their Internet experiences with you. Enjoy the Internet along with your children.

Teach your kids to trust their instincts. If they feel nervous about anything online  they should tell you about itabout anything online, they should tell you about it.

If your kids visit chat rooms, use instant messaging (IM) programs, online video games, or other activities on the Internet that require a login name to identify themselves, help them choose that name and make sure it doesn't reveal any personal information about them.

I i t th t   kid     i   t    dd   h  Insist that your kids never give out your address, phone number, or other personal information, including where they go to school or where they like to play.

Teach your kids that the difference between right and wrong is the same on the Internet as it is in real life.

Page 21: CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims to take advantage of in ANY ... Identity thieves are clever, posing as friends,

21

Show your kids how to respect others online. Make sure they know that rules for good behavior don't change just because they're on a computer.

Insist that your kids respect the property of others online  Explain that making illegal copies of other 

Tips for Parents

online. Explain that making illegal copies of other people's work—music, video games, and other programs—is just like stealing it from a store.

Tell your kids that they should never meet online friends in person. Explain that online friends may not be who they say they are.

T h   kid  th t  t  thi  th   d     Teach your kids that not everything they read or see online is true. Encourage them to ask you if they're not sure.

Control your children's online activity with advanced Internet software. Parental controls can help you filter out harmful content, monitor the sites your child visits, and find out what they do there.

Can I monitor my kids internet usage?Issues

T     iTrust versus protection

Location of computer – Public AreaTime of day allowed ‐CurfewsSoftware monitoring/Parental Control

Many productsMany products

Spot Check you KidsWhat are you doing?What sites have you been to lately?Internet History – Internet Explorer 7

Page 22: CYBER SAFETY CYBERBULLYING · 2007‐Teens and Social Media –Pew/Internet ... to hunt for victims to take advantage of in ANY ... Identity thieves are clever, posing as friends,

22

Browser History

All Browsers have a history functionInternet Explorer ‐CRTL‐SHIFT‐H

Show the websites that have visited over the past days and weeks…

Take Aways…

Get involved in your child’s “technological” lifelifeReview their Cyber SafetyBe aware of Cyberbullying

Learn More:blog.timesunion.com/tech – updates weeklyGoogle “teen cybersafety”Experiment !