1 Living Online: Using Technology Wisely Lesson Guide Target Audience Adolescents Time Entire program 1 hour, depending on discussion Program Objectives Ways to portray a positive image online How certain images you put on social network sites can have a negative impact on you Ways to protect yourself from a negative image The correct facts about social media sites How to be cautious and responsible online Increase awareness of sexting Understanding of how to prevent/decrease sexting and intervene when sexting happens Supplies: Laptop/projector Internet Paper enough for each participant Pens/Pencils enough for each participant
2 Living Online: Using Technology Wisely A guide for middle school students Rachelle Vettern, Ph.D., Leadership and Volunteer Specialist Sharon Query, Ph.D., 4-H Youth Development Specialist Lauren Olson, B.S., Center for 4-H Intern
3 Objectives At the end of this educational program, participants will learn: How to portray a positive online image. How images put on social network sites can have a negative impact How to protect oneself from a negative image. Factual information about social media sites. How to be cautious and responsible online. How to prevent/decrease sexting and intervene when sexting happens
4 Your Online Image
5 Who Are You Online? Who Are You Online? Activity Who are you? What does your social media use look like? How do you want to be seen on social media?
6 Your Online Image
7 Social Media Sites 101 Social Media Sites 101 Activity Split into groups Identify social media site List everything known about the site Develop a list of pros and cons Appoint student leader to discuss Leaders will present group thoughts with the class The whole group will discuss findings
8 The Facts: Types of Technology
9 Snapchat What it is: Sending a picture to your friends via your phone. The picture lasts up to 10 seconds and disappears. What s Great about it: A way to share goofy, and fun photos with friends! Risky? Yes, Snapchat is very risky.
10 Twitter What it is: A way to stay connected through short, quick messages (140 characters or less). What s great about it: Fun way to share messages with friends and family. You can also favorite tweets, or retweet it, which will show on your profile. Risky? Twitter can be risky.
11 Instagram What it is: What s great about it: Free photo and video sharing app available on IPhone and Android devices. Fun way to share photos and moments going on in your life. Risky? Yes, Instagram can be risky.
12 Facebook What it is: What s great about it: Social media site where you can post photos, statuses, and add friends! Great way to stay connected with friends and family, and post what is going on in your life. Risky? Yes, Facebook is risky.
13 YouTube What it is: What s great about it: Video-Sharing media site on which users can upload, views, and share videos. Fun way to see a quirky side of friends, hear new music, and listen to reviews on products. Risky? Yes, YouTube is risky.
14 Vine What it is: A mobile app owned by Twitter that enables its users to create and post short video clips, with a maximum length of six seconds. What s great about it: Fun way to share life in motion with your friends and family. Risky? Yes, Vine is risky.
15 Ask.fm What it is: What s great about it: Users post questions about themselves or others and wait for responses. Different way to ask questions! Risky? Extremely Risky.
16 TeenOnline.com What it is: Online chat group Post, read and respond to the confessions of others What is good about it: Users can feel free to share important info Is it risky? Yes
17 Chatroulette What it is: Online chat website with users of all ages from across the globe Web-based conversations are used with audio and text What is good about it: Users can meet people from Risky? Very Risky
18 To post or not to post, that is the question Read each scenario and determine whether or not you agree with the posting An imaginary line will be drawn with one end having the Post sign with the other having the Activity Not Post sign Determine where you fall on the line and place yourself accordingly Discuss reasons that led to your decision.
19 To Post or Not to Post Cell Phone Number?
20 To Post or Not to Post Status: Want to volunteer? Come and help Fill The Dome!
21 To Post or Not to Post Facebook Status: Home alone for the weekend the parents are gone to a wedding out of town!
22 To Post or Not to Post WTF!
23 To Post or Not to Post YouTube Video: Check out the video of the fight in the hallway yesterday!
24 To Post or Not to Post Tweet: Shout out to the football team for the big win this weekend!!
25 Be Cautious and Responsible Online Be aware of what you are posting on social media sites. Everything you post is public and permanent. Be aware of friend requests. Be cautions about Checking In Understand Apps
26 Privacy Settings Social media sites
27 Privacy Settings: Facebook How to Unlike: a Page a Photo How to have your Profile Set to Private How to Delete something from your Timeline
28 Privacy Settings: Twitter and Instagram Protecting your Tweets Protecting photos on Instagram
30 Privacy Settings: Smartphone Always use passwords Download updates for latest security Check with adults before downloading apps Turn off location detecting devices
31 Sexting The New Norm? Activity What is sexting?
32 What is Sexting? Webster s: the sending of sexually explicit messages or images by cell phone Sexting generally refers to sending sexual images and sometimes sexual texts via cell phone and other electronic devices Defined as sending, receiving, or forwarding sexually explicit messages or nude, partially nude, or sexually suggestive digital images of one s self or others via a cell phone, , internet, or SNS
33 Statistics in Sexting 78% of teens have a cell phone, and almost half (47%) of those own smartphones. 28% of teens have admitted to sending a sext. Girls were asked more often to send a sext (68%) than boys (42%). 6% of sexters report pressure from strangers online to sext (Dake, et al., 2012)
34 Reasons Behind Sexting Most Common Reasons loose relationship As a prank or joke Pressured sexters are more likely to report engaging in self-cyber bullying, anxiety, and dating violence; more likely to report picture seen by one or more other people
35 Sexting Sexting has a very serious and negative side to it, and can lead to many consequences. You may think that you are sending the sext or picture to one person, yet that one person might send it to others.
36 Consequences of Sexting Legal Emotional
37 If Sexting and Cyberbullying Take Place: Save all communication from cyberbullying Document when it was received and sender information Report incident(s) to Internet providers and appropriate authorities Block they cyberbully Change online contact information (Kowalski, et. Al., 2008)
38 Who s Watching School administrators Employers Parents Teachers/professors Predators and bullies Law enforcement Attorneys and the court system Coaches/co-curricular activity advisers
39 Questions to Ask Would you want your parent or guardian to see this video/picture or read this message? Would you want your boss or teacher to see and/or read this? Is posting or sharing this message/video/picture helpful or hurtful? Would you want someone you don t know seeing this picture or video?
40 Be an Example of the Six Pillars! Trustworthiness Respect Responsibility Fairness Caring Citizenship (John Templeton Foundation, 2008)
41 What Can You Take From All of This? Be in control of your privacy settings Be aware of what is being posted, and how it is being posted Do not sext. As discussed, it can lead to many negative consequences Post a positive image of yourself If you see it, stop it! Take a stand!
42 Contact Information For more information, contact: Sharon Query, Ph.D., 4-H Youth Development specialist Rachelle Vettern, Ph.D., Leadership and Volunteer specialist
43 References Dake, J. A., Price, J. H., Maziarz, L., & Ward, B. (2012). Prevalence and correlates of sexting behavior in adolescents. American Journal of Sexuality Education, 7(1), Retrieved from Dowell, E. B., Burgress, A. W., & Cavanaugh, D. J. (2009). Clustering of internet risk behaviors in a middle school student population. Journal of School Heath, 79(11), Facebook. (2013). Retrieved from https://www.facebook.com/facebook/info Instagram. (2013). Retrieved from Kowalski, R. M., Limber, S. P. & Agatston, P.W. (2008). Cyber Bullying: Bullying in the Digital Age. Malden, MA: Wiley-Blackwell. Pew Internet & American Life Project. (2013). Summary of Findings: Teens, Social Media, and Privacy. Retrieved September 9, 2013, from Pew Internet & American Life Project. (2013). Teens and Technology. Retrieved September 9, 2013, from Snapchat. (2013). Retrieved from Twitter. (2013). Retrieved from https://twitter.com/about Van Maren, J. (2013, August 28). Personalized pornography: the explosive growth of sexting among teens. Retrieved teens/ from Vine. (2013). Retrieved from YouTube. (2013). Retrieved from Zemmels, D. (2012). Youth and new media: Studying identity and meaning in an evolving media environment. Communication Research Trends, 31(4), Retrieved from
PARENTING IN THE DIGITAL AGE Patti Agatston, Ph.D. www.cyberbullyhelp.org firstname.lastname@example.org Teens and Technology Use 78% have a cell phone 95% use the Internet 91% have an email address 74% access the
15 Dangerous Apps Every Parent Should Know About It s safe to say that the advent of the digital age and specifically the Internet, smartphones and social media have brought unique and daunting challenges
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
Camp Watwuzithinkin How To Avoid The Identity Theft Predators Predator 0 An organism that lives by preying on other organisms Identity Thief 0 A person who makes a living by preying on other people Outsmart
Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual
Kingsley Park Primary School 1-1 ipad Program BYOD 2016 Kingsley Park Primary School ipad 1-1 BYOD Program In 2015 KPPS implemented a 1-1 BYOD [bring your own device] Program for Grades 4-6. We will be
Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications email@example.com 404-269-8057 Cox Communications
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
LESSON PLAN Digital Life 102 UNIT 1 Essential Question What is the place of digital media in our lives? Lesson Overview Students test their knowledge of digital media and learn some statistics about media
A Parents' Guide to 2014 ConnectSafely.org Top 5 Questions Parents Have About Instagram 1. Why do kids love Instagram? Because they love media, sharing it and socializing with it on their phones, and Instagram
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
App Guide App Name App Symbol Description BBM Instagram Age 13+. The BlackBerry Messenger (BBM) app allows you to share messages and images. It also allows you to make free calls anywhere around the world.
The Digital Life of Teens Trends, Concerns, and Impacts Yoon Hyung Choi Amanda Purington Main Themes Digital Media Usage and Access How do teens and tweens access digital media? What do they do online?
Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed
A Parents Guide to 2015 ConnectSafely.org saferinternet.org.uk At the UK Safer Internet Centre, one of our key objectives is to develop new educational and awareness-raising resources for parents in the
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
By Shanthi Balraj Ambigapathy Pandian Mohammed Zin Nordin Sumetha Nagalingam Julina Ismail Introduction New Media Landscape New Media Culture Contributes to New Meanings, Messages, Norms, Values, Interactions
Research Conducted By: Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online [ photo here The Teen Online Identity Generation Theft Gap November November 20132012
HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these
Are you social media savvy? We ve all heard of Facebook and Twitter but what about other social networks? There is now a range of social media apps and websites that young people have access to via smartphones,
Executive Summary Key Findings What does online life look like for the average young Canadian? First and foremost, these are highly connected children and teens, most of who are accustomed to online access
A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.
Online Safety Handbook for Students and Parents 2014 Table of Contents Table of Contents... 2 Overview of Program... 2 Aims... 2 Relevant Technology... 3 Appropriate Online Conduct... 3 Online Responsibilities...
K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying
www.pewresearch.org OCTOBER 28, 2013 Photo and Video Sharing Grow Online More internet users are using photos and videos as a social currency: 54% of internet users have posted original photos or videos
Mill Hill Years 9 &10 E-Safety / Social Media: Risk Danger - Harm Safely Navigating Uncharted Waters Jon Taylor Social Media - Risk Danger - Harm Risk Danger Harm Downloading and use of Apps or websites
Executive Summary Key Findings Young Canadians immersion in social networking activities, as highlighted in Life Online, provides the context for understanding young people s attitudes and behaviours relating
2014 Teen Internet Safety Survey Conducted by The Futures Company Contents Background, Objectives, Methodology Major Findings Important Trends Next Steps 2 Background + Objectives Cox s commitment to Online
Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences
Office of the Attorney General of Virginia Sexting Protecting Yourself on the Internet and Mobile Devices Websites Often Used for Social Networking Monthly Visitors to Social Networking Sites 1. 750,000,000
Cyber bullying, sexting and Facebook Know the law, know your rights 2 Cyber bullying, sexting and Facebook Contents 4 Cyber bullying 10 Sexting 14 Facebook 17 More information 18 Useful websites Disclaimer
Lessons in K 2 Social Media Curriculum Overview 1. Going Places Safely ( KINDERGARTEN) https://www.commonsensemedia.org/educators/lesson/going places safely k 2 How do I go places safely on the computer?
The Online Generation Gap Contrasting attitudes and behaviors of parents and teens The Online Generation Gap: Contrasting attitudes and behaviors of parents and teens Submitted to: The Family Online Safety
Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations Overview: Students examine their participation in digital life. They explore how information shared through digital media
Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting
It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has
The Negative Effects of Social Media on Children and Young Adults How can we reduce the negative effects of social media on children and young adults? Overview What is Social Media? Social media is defined
Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.
Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW Most parents report having a safety conversations with their children regarding online safety
Empowering young people to be safe on the Internet Information for parents, teachers and community members Empowering parents, teachers, & community members!! IBM is providing the following information
E-Safety Awareness Parents and Carers Bullying online by people in my school year has left me with significant mental health issues for which I am now on medication and in therapy for. So it s really damaged
Welcome Deborah Werner Deborah Werner Project Director SAMHSA s TA and Training on Women and Families Impacted by Substance Abuse and Mental Health Problems Technical Information Your lines will be muted
Executive Summary: Social media effects among primary school children Names Ellie Petraki 10488677 Yu Yang 10315861 Mischa van Brink 5964415 Merel Stil 6057330 Course Youth as media consumers Date 23 may
Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human
#300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital
What dangers do yourchildrenface when they go online? Allwhoparticipateinactivitiesonlinefaceriskswhentheyusethe Internet,includingadults.Theworldisconstantlychangingwithnew technologyavailabledaily.itmayfeeloverwhelmingwhenwefocuson
The Evolution of Social Media Marketing: 9 trends to know now. It s hard to think of a time when social media didn t exist when people of all ages weren t snapping photos of their food, sharing selfies
Social Media Marketing in the Film Industry A Senior Project Presented to the Faculty of the Graphic Communication Department California Polytechnic State University, San Luis Obispo In Partial Fulfillment
How to: use Twitter Twitter use in Australia is currently relatively low (compared to Facebook), however it is increasing and it is now estimated that more than 2 million Australians have Twitter accounts.
Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Essential Question: What are the risks and responsibilities when you share online in a relationship? How can you respect
Professional Teacher Development Seminars Elementary through High School Parents Place is a Program of Jewish Family and Children s Services Teacher Development Elementary through High School Jewish Family
Do you track your child s Facebook account and texting (We certainly hope so!)? Well, time for an update on alternative networking and messaging apps teens are using (often with a much more raw side of
An easy guide to... MARKETING FOR CLUBS Inspiration to Participation Lincolnshire Sport www.lincolnshiresport.com Marketing your Club and Activities Does your club have a media lead? Think about appointing
VEA Bringing Learning to Life Program Support Notes Junior - Senior Secondary Keeping Safe Online 24 mins Program Support Notes by Belinda Kime, App Sci (Home Ec)/Ed (Sec) Produced by VEA Pty Ltd Commissioning
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology
1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.
The webcast will begin shortly. Please stand by. @Gaggle_K12 Making Student Safety A Priority @Gaggle_K12 Webcast Tips ü To switch from computer audio to your phone, locate the Audio Pane, select Use Telephone
The Vulnerable Teacher Guide TEEN SAFETY This companion to the online course provides questions and topics for classroom discussion and activities. 2012 ShieldTheVulnerable.org 1277 Treat Blvd #530 Walnut
Teens, Online Stranger Contact and Cyberbullying What the research is telling us Amanda Lenhart Internet Safety Task Force April 30, 2008 Washington, DC Methodology Interviewed 700 parent-child pairs in
McAfee, an Intel company, is the world's largest dedicated security technology company. We are relentlessly focused on finding new ways to keep our customers and our communities safe, and especially our
Digital Etiquette DIGITAL CITIZENSHIP MODULE 1 Email, Texting, Cell Phone Usage, Ringtones, Social Networks, YouTube, Web Browsing, Shared Storage/Usage Space Define and apply the standards of use to daily
WHAT YOUR TEEN IS DOING ON SOCIAL MEDIA THE GUIDE 2014 EDITION It s undeniable that Social Media has changed the way teenagers experience the world. Your teens are on social media as soon as they get up,
BYOD (ipads) Acceptable Use and Care Policy Related Policies Computer Facilities and External Networks (ICT) Policy, including the Student Acceptable Use Agreement Communication Policy Mobile Phone and
GRUPPO TELECOM ITALIA Global Trends in Online Safety. Creating a National Framework Rome, 16 September 2015 Smartphones, social network and instant messaging services Challenges for children, parents and
Clarity High School Student Survey Instructions Take 10 minutes to help your school with technology in the classroom. This is an anonymous survey regarding your technology use. It will take approximately
June 2012 The Digital Divide: How the Online Behavior of Teens is Getting Past Parents Parent Disconnect Despite the obvious disconnect between teens online behaviors and parents knowledge of them, parents
Mobile & Social Media Privacy Tips General Tips Remember, no matter how you set your privacy settings, anything you post online could potentially be shared to the general public. Don t share anything you
Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW I know all my online friends. What I post online is private. I can delete what I post. Freedom
Predation, Sex Offender, Social Networking, Bullying, Sexting, and Statutory Assault Information You Need To Know Weldon W. Floyd Information Technology Specialist III firstname.lastname@example.org November 2014 Predation
Nower Hill High School An introduction to E-Safety Louise Voden, Ben Ford & PC Ian Scanlon Outcomes: Highlight the potential risks young people may face online Describe the technologies and functions Outline
PARENT UNIVERSITY OFFICER JOE BOYD OFFICER RACHAEL FREEMAN SRO DIVISION Sgt. Eric Debus Officers Chris Cobb and Diane Patterson (CHS) Officer RJ Harr (New Tech) Officer Joe Boyd (CMSW, Pinkerton, Wilson,
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
B O Y S C O U T S O F A M E R I C A Youth Protection Training For Volunteer Leaders and Parents Facilitator s Guide The Boy Scouts of America deeply appreciates your leadership in facilitating this session
Eastern University Social Media Policy & Guidelines for Use Office of University Relations August 2015 Table of Contents Eastern University and Social Media Personal Social Media Use How to Get Started
Appropriate Use of Social Media and Cell Phones Karen Haase Harding & Shultz (402) 434-3000 email@example.com H & S School Law @KarenHaase Raise your hand if You have a cell phone You use text messaging
Cyberbullying Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as:
RIDICULOUSLY EASY GUIDE TO SOCIAL MEDIA Alberta s a big place and while you could run round the province telling everyone you see about Change Day AB, it s probably not the best use of your time and could