Cyber-Safe Kids Cyber-Savvy Teens
|
|
|
- Bruce Johns
- 9 years ago
- Views:
Transcription
1 Cyber-Safe Kids Cyber-Savvy Teens Helping Young People Learn to Make Safe and Responsible Choices Online By Nancy E. Willard Author of: Cyber-Safe Kids, Cyber-Savvy Teens: Helping Young People Learn to Make Safe and Responsible Choices Online More information: Introduction The Internet provides wonderful opportunities. It can enhance our children s lives and deepen their understanding of themselves, their friends, and the global community. The Internet has become an intregal part of our society. But there are dark sides to this wonderful resource. There are risks from others online. And some young people are making unsafe or irresponsible choices that result in harm to themselves or others. Our children also face risks in the Real World: Sharp knives, speeding cars, bullies, weirdos at the park, pressure to engage in sex, drug pushers, and more. Sometimes they simply do not make good choices. Keeping children and teens safe online requires applying effective Real World parenting skills to cyberspace. When children are young, we keep them in safe places and teach them simple safety rules. But as they grow, we provide them with the knowledge, skills, and values to independently make good choices ~ and remain hands-on to ensure they do. These same effective parenting strategies should be applied to the online world. When children are young, they do not have the cognitive development or experience to keep themselves safe online. Parents must establish a safe online environment and provide children with simple, easy to follow guidelines. But as children grow and their online activities expand, it is necessary to make sure they know how to independently make good choices. They need to know what the risks are. They must know how to avoid getting involved in a risky online situation, how to detect if they are at risk, how to respond effectively, and when to ask for help. They also must know the importance of engaging in responsible, ethical behavior. They must understand that it is important to keep themselves from harm, not cause harm to someone else, and make sure their friends are safe. Sometimes they may make mistakes or engage in inappropriate activity. Or someone dangerous could manipulate them. So parents must pay attention to what their children are doing online. Many young people don t tell adults about Internet concerns because they fear that adults will overreact, blame them, not know what to do, do something that will make things worse, and/or restrict their online access. It is essential to establish a trusting relationship with your child related to Internet activities. Young people are not all equally at risk online. Many competent young people are making safe and responsible choices. Naïve tweens and teens could make mistakes as they begin to engage in social networking and other teen sites. The young people who are at greatest risk online are the ones who are vulnerable because of Real World challenges with personal mental health issues, in school, and/or in relationships with family or friends. Focus on the Positive Most young people are having fun and engaged in healthy interactions with others online. Internet risks and concerns can be effectively managed through education and parental attention. This brief guide will provide an overview of Internet risks and concerns, recommended parenting approaches, and information about strategies to address foundational issues and key online risks and concerns Nancy Willard. This booklet may be copied and distributed for non-profit purposes. More resources are available on the Cyber-Safe Kids, Cyber-Savvy Teens web site at and on the Center for Safe and Responsible Internet Use site at
2 Internet Risks and Concerns Internet risks and concerns range from situations where innocent young people are victimized by others to situations where young people have engaged in actions that are risky, irresponsible, harmful, and even illegal. Safety Risks Sexually Related Risks Groomed by predators for sexual activities or pornography. Accidentally accessing online pornography. Receiving sexual harassment. Cyberbullying Being the target of harmful online material. Scams Being deceived by an scam or identity theft. Responsible Use Concerns Risky or Irresponsible Sexual Activities Intentionally accessing pornography in an addictive manner. Seeking sexual hook-ups with adults or other teens. Engaging in sexual harassment. Posting sexually provocative images or discussing sexual exploits. Cyberbullying Harming another by sending or posting harmful material online. Cyberthreats Posting material that raises concerns about violence or self-harm. Unsafe Communities Interacting with online communities that support self-harm, including cutting, anorexia, and suicide. Dangerous Groups Interacting with angry and violent online groups, including hate groups, gangs, or troublesome youth groups. Online Gaming Excessive involvement in online games, especially violent games. Online Gambling Engaging in gambling 101 game activities or actual online gambling. Hacking Breaking into or damaging computer systems. Plagiarism Inadvertently or intentionally using online information resources in an academically dishonest manner. Copyright Inappropriately copying or disseminating someone s copyrighted work. Online Activities and Technologies Social networking sites allow teens to express their personal identity and maintain electronic connections with friends. Teens create profiles and blogs to share their interests and thoughts, establish friendship links, and engage in public or private discussions. Social Networking Sites Popular social networking sites have excellent terms of use, practices to allow users to control who has access to their information, and a procedure for complaints. Commercial Sites Market Profiling Commercial sites encourage users to disclose personal information that is used to tailor advertisements based on their known interests. They frequently offer gifts or prizes in exchange for completing online marketing surveys. Advertising Web site advertisements may promote unhealthy consumption, lifestyle, values, and behavior. Stickiness Web sites use specific strategies designed to enhance stickiness. This entices young people to spend lots of time on their site. Chat Rooms and Discussion Groups In chat rooms and discussion groups teens can discuss issues with a friends, acquaintances, or strangers. The level of safety depends on the site, subject discussed, members, and whether there is a moderator. Instant Messaging Social Networking Concerns Posting inappropriate or unsafe material. Unsafe connections. Sexual solicitation. Cyberbullying. Addictive access. Tweens lie about age to participate on teen sites. Online Advertising Techniques Advergaming ~ advertising integrated into online games and activities. Permission marketing ~ asking young people to sign up for newsletters and coupons. Viral marketing ~ encouraging young people to promote products and services to friends. Instant messaging (IM) is real time electronic communications. The level of safety depends on who is on your child s contact list. Cell Phones and Personal Digital Devices Today s young people are totally wired. Many can go online anytime, anywhere. This limits your ability to effectively supervise. Digital Cameras, Cell Phone Cameras, and Web Cams Young people can easily capture, modify, send, and post images. Inappropriate images posted by your child ~ or others ~ could damage your child s reputation, attract an unsafe person, be used for cyberbullying, or lead to criminal charges.
3 General Internet Safety Guidelines Discuss values and standards regarding online activities frequently. Effectively address computer security. Keep the computer in a public area of your house, so you can peek over your child s shoulder frequently. Establish standards regarding Internet use when you are not present. Internet Use Through the Ages Younger Children Younger children should only use the Internet in safe places: Safe, bookmarked Web sites. Electronic communications limited to known friends. Older Children Older children will want to expand their online activities. Involve your older child in deciding what sites are appropriate and why. Introduce safety and responsible use issues in a manner consistent with your child s development and online activities. Restrict communications to known friends or well-moderated sites. Tweens Tweens are expanding their online activities. Many tweens want to participate in sites for teens and adults ~ which is not advisable. Allow more freedom in finding new appropriate sites. Increase discussions of risks and concerns, consistent with your child s development and online activities. Continue restricting communications to known friends or well-moderated sites. Early Teens Early teens are at greater risk because they will be participating on sites with older teens and young adults. Consistently monitor online activities. Make sure your child has a good understanding of risks and protection strategies. Develop common Internet use standards with the parents of your child s friends. Older Teens By this age, your child should know how to independently use the Internet safely and responsibly. This provides time for fine-tuning before your child turns 18. Allow your child to earn the right to have a computer with Internet access in his or her room or a personal digital device with Internet access ~ by demonstrating a history of good choices online and willingness to discuss online issues. Continue to discuss issues and, if concerned, check the history file. Important Rules for Children Don t go outside the safe online places without an adult. Never type your name, address, or phone number online. If something yucky appears, turn off the monitor and tell an adult. Social Networking Protections Set profile to private ~ but emphasize that a private profile is still public! Limit friendship links to known friends and friends of friends. Regularly review your child s profile and friends. Promptly remove inappropriate material posted on profile. I m Your Parent. It s My Responsibility Monitoring Online Activity Parents should pay close attention to what children and tweens are doing online. Teens naturally are more concerned about personal privacy. Teens will argue that their privacy should be respected. Public posts are not private. Personal communications are generally considered more private. Recommended monitoring approach: It is necessary for me to make sure you are making good choices online because I am your parent and I am responsible for you. I will periodically review your history file and your postings in public places. Remember, what you post in public is public. As I see that you are making good choices, I will be able to reduce this monitoring. I will review your personal communications only if I have reason to suspect something is wrong. In most cases, I will discuss my concerns with you before any review. Making Inappropriate Choices Online It is important to consider why young people might make inappropriate choices online. These are some of the reasons: You can t see me. Teens perceive they are invisible online, or they can take steps to be anonymous. This reduces concerns about detection, leading to disapproval or punishment. I can t see you. Teens do not receive tangible feedback about the consequences of online activities. This interferes with empathy, the recognition that their actions have caused harm, and remorse. Didn t think. Teen s brains are a work in progress ~ developing the capacity for effective decision-making. Sometimes they are biologically incapable of thinking clearly. Who am I and where do I fit it? The major life task for teens is establishing their personal identity, values, and relationships with others. Often they use the number of friendship links and amount of messages as measurements of personal value. Am I hot? Teens are exploring their emerging sexuality in a online environments that also attract young adults and feature highly sexualized advertising images. If I can do it online, it must be okay. Teens may forget that Real Life values should control their online choices. Everybody does it. Other teens and adults are making inappropriate choices online. Doing what they say. Dangerous individuals and groups, as well as commercial sites, use sophisticated techniques to manipulate online users. Looking for love. Teens who face temporary or continuing challenges ~ including personal mental health issues, difficulties in school, and/or challenges in relationships with family or friends ~ are at high risk online. They are not likely to pay attention to obvious risks or make good choices. They are highly vulnerable to manipulation by dangerous individuals or groups.
4 Protection Technologies Computer Security Parents must ensure that all family computers have adequate computer security ~ including firewalls and protections against viruses and spam. Configure your browser to block pop-up ads. Do not install peer-to-peer networking software. Set your search engine preference to filter search results. Filtering Software Filtering software may provide some protection against accidental access. But it will frequently not block the most dangerous porn traps because the traps generally access new sites that likely have not yet been detected and blocked. Filtering software will not deter a determined teen ~ because the filter can be easily bypassed using proxy sites or the teen will use another computer or personal digital device. (Search for: bypass, internet, filter.) Time Limiting Software Time limiting software can limit access when you are not present or late at night, when you are asleep. It can also be used to enforce time limits. Monitoring Software Use of monitoring software could interfere with a relationship based on trust. However, use of monitoring software might be an appropriate consequence if your child has engaged in irresponsible online behavior. Tell your child it has been installed and under what circumstances you will review the records. Monitoring software can also be used if you fear your child is in significant danger from someone online. Do not tell your child it has been installed. Protection Strategies The following pages will address: Foundational Protection Protect privacy and personal information. Enhance information literacy. Prevent addictive access. Develop stranger literacy. Strategies to Protect Against Key Risks and Concerns Sexual predators. Accidental access of online pornography. Scams and identity theft. Cyberbullying. Other Risks and Concerns For more information on all issues addressed in this handbook, as well as other risks and concerns, please read Cyber-Safe Kids, Cyber-Savvy Teens: Helping Young People Learn to Use the Internet Safely and Responsibly. None of Your Business Privacy and Personal Information Some teens Reveal significant amounts of personal information online. Appear to be unaware that public postings are public or that information shared privately in electronic form can easily become very public. Do not recognize this disclosure may place them at risk, damage their reputation, or interfere with their future education and career plans. Teach your child how to protect different kinds of personal information online. Make sure your child knows to demand that others remove any of their personal information ~ and to tell you if someone has posted this material. Personal Contact and Financial Identity Information. What: Full name, address, phone number, personal identity or financial account numbers, or passwords. Protect: Should only be provided on a secure site for an appropriate purpose. Children, tweens, and early teens should not post without parent permission. Older teens must know how to provide such information safely on secure sites. Intimate Personal Information. What: Private, personal, sensitive ~ comunicates I am vulnerable. Protect: Tell your child never to post this on public sites ~ this is high risk. Although there is some risk, may be appropriate to share in a private message with a very trustworthy friend or on a professional online social support service. Reputation-Damaging Material What: Any information or images that could damage your child s reputation or interfere with future educational and career plans. Protect: Tell your child to never post this material or provide to anyone. Personal Interest Information. What: General information about personal interests and activities. Protect: Generally safe for teens to share in protected environments on social networking sites. If provided in an online survey will be used for advertising. Personal Information About Others. Respect: Personal information about other people is their business and should not be shared online, publicly or privately. Read With Your Eyes Open Information Literacy There are no Cyberspace Truth Monitors. Too many people determine credibility based on appearance ~ which can be very deceptive. To assess credibility: Consider how important it is that the information be credible. Assess how controversial the issue is, because this affects potential bias. Reflect on how you got to a site or received the information. Evaluate the source of the information looking for potential bias and what the source is seeking or has to gain if you agree with their information. Determine whether the information is fact-based or opinion-based. Determine whether the information is consistent with information found through other sources. If there is conflict, there is need for greater care. Find out who links to this site and thinks the information is credible? Ask for the opinions of others, especially parents, teachers, and librarians. Evaluate the information itself. Is it consistent with what is known to be true?
5 Keeping Life in Balance Addictive Behavior Internet addictive behavior is an excessive amount of time spent using the Internet, resulting in lack of healthy engagement in other areas of life ~ school, work, friends, family, and sleep. Excessive time spent online is a risk, in and of itself, and an indicator of other possible risk. Social networking sites can be very addicting for those teens who are highly concerned about their social status and relationships with peers. Online gaming sites, especially multiplayer, role-playing games, are also highly addictive because leaving the game will result in letting a team down. Children and teens need to spend time with their family and friends ~ engaged in play, sports activities, arts, social service, or just hanging out. Parent involvement is necessary to ensure that these Real World interactions occur. Do not allow the Internet to be your child s baby-sitter. Time spent online should only be a small part of your child s life. If your child is spending too much time online... Develop a mutual agreement about the amount of time to be spent online and strategies to support engagement in other activities. Use time limiting software to support this arrangement, if necessary. Young people often engage in media-multitasking while doing homework. This can interfere with effective learning. Make sure your child is not surfing, gabbing, or gaming online when there is homework to be done. Don t Take Candy From Strangers Stranger Safety Children and tweens should be protected against communications with online strangers, except on very well-moderated, anonymous sites. Teens can be expected to have online interactions with people who they do not know ~ or know only as an acquaintance. The vast majority of online strangers are perfectly safe. BUT some are not... Adult sexual predators or teens seeking sexual hook-ups. Recruiters for dangerous groups. At risk teens who are engaged in unsafe, irresponsible, or illegal activities. Protection Strategies Teens must learn to determine the safety and trustworthiness of an online stranger. How: Carefully review this person s online postings and friends. If there are ever any concerns, block all communications from this person. Teens may want to meet with someone they met online and must know how to do so safety. How: Meet in a public place with trusted friend or parent nearby. Teens must recognize the RED FLAGS! Watch out for anyone, especially an adult, who sends overly-friendly messages, tells you how special or wonderful you are, offers gifts or opportunities, tries to establish a special or secret relationship, asks for a sexy picture, or tries to turn you against your parents or friends. These are signs of danger! Tell your child to save any red flag messages and show them to you. Promise your child in advance that you will not overreact or restrict their Internet access. Don t Hook-up With Online Losers Sexual Predators Online predators generally target teens, not children. Teens can more easily be groomed to engage in sex and can more easily travel to meet. Real World predators may create child pornography using their child or teen victims. Teens may also be at risk from predatory teens who are seeking sexual hook-ups. Not Equally at Risk All teens are not equally at risk from sexual predators. Predators may seek out vulnerable teens who post information online that reveals they are emotionally upset, have problems with parents or friends, are exploring sexual issues, or are seeking to understand their sexual orientation. Predators are most interested in teens who post sexually provocative images, use sexually inviting usernames, or go to chat rooms or sites where people discuss sex and arrange for sexual hook-ups. Protection Pay attention to material your child is posting to make sure none of indicates vulnerability or sexual interest, as well as the sites your child visits. Regularly review your child s social networking and IM friends. Seek professional assistance, if warranted. Your child must know to watch out for the online stranger danger Red Flags and respond appropriately. If your child does tell you about an inappropriate contact, do not overreact. Acknowledge and applaud their attention to potential danger. If you suspect that your child is communicating with a predator, contact the police. Do not inform your child that you are doing so. Your child could warn or run off with the predator. Avoid the Porn Accidental Access of Pornography Children or teens may accidentally access online pornography. (Preventing intentional access requires a focus on values and effective monitoring.) Prevention Make sure you have implemented effective computer security, see above. Protect your younger child by limiting access to reviewed bookmarked sites and closely supervising any open explorations. Tweens and teens must know how to surf safely. Read, think, then click. Don t click, if you do not know what it will access. Don t type a URL. Type the name of the site in a search engine. Can the porn spam. Don t open suspicious messages or click on links in messages unless you are absolutely sure they are legitimate. Response Children: If yucky material appears, immediately turn off the monitor (teach them how), and get your help. Tweens and teens: Turn off the monitor, force-quit the browser, or turn off the computer, and tell you what happened so you know it was a mistake. After any incident: Evaluate your computer security. Review what happened to prevent future incidents. Use the teachable moment to discuss values. Never punish your child for accidental access. If there is any doubt, assume it was an accident.
6 Too Good To Be True Scams and Identity Theft Scam Indicators Too good to be true! Free lunch! Act now or you will lose! You could win! What Scammers Want Personal contact or financial identity information. Enlist participation in risky or illegal activities. Market Profiling Scams Offers for free goodies, contests, and chances to win a prize online are techniques to obtain personal contact and interest information that will be retained in an individualized market profile and used for advertising. Protection Protect personal contact and financial identity information. Be alert to all scam indicators. If it looks like a scam, it probably is. CyberbullyNOT Cyberbullying Young people being mean to each other online is a major concern. Cyberbullying can range from minor incidents to incidents that result in devastating harm. Cyberbullying may be more harmful than in-person bullying because it happens 24/7, can be very public, and bullies can be anonymous. Cyberbullying may cause significant emotional distress, school failure and avoidance, suicide, and harmful retaliation. Your child could be a target, bully, and/or a bystander. Targets ~ Prevention and Detection Ensure your child does not post information that could be misused and communicates respectfully. Pay attention to the quality of your child s online communities and friends. Work with your school to stop any school bullying. Signs of concern: Emotional distress during or after being online, disrupted friendships, school avoidance. Targets ~ Response Never retaliate. Save the harmful material. Responses to minor incidents: Calmly tell the cyberbully to stop. Ignore or block the cyberbully. File a complaint with the web site or service. Tell your child to ask for your help if these steps do not work or the cyberbullying is significant. Other response options: Send the online material to the parent with a demand that it stop. Ask for assistance from your school. Contact an attorney or the police. Bullies Deter your child from engaging in cyberbullying by emphasizing the importance of treating others kindly online and through effective monitoring. If your child has been unkind online, take proactive steps to ensure this does not continue. You can be held legally liable for harm caused by your child. Bystanders Encourage your child to promote respectful communications and to assist those who are being cyberbullied or tell a trusted adult. Detecting and Responding to Concerns Key Red Flags Appearing emotionally upset during or after Internet use. Disturbed relationships with parents, family, or friends. Spending too much time online, especially late at night. Excessively secretive behavior when you approach the computer or an empty history file. (Teens are likely to be somewhat secretive.) Receipt of packages or phone calls under strange circumstances. Subtle comments about online concerns. It is very important to respond carefully to such comments. Remain calm and try to encourage your child to talk further. Your child will likely be worried that you will overreact. Responding Do not overreact! Take the time to calm down before doing anything, Investigate further. Use monitoring software if you think your child is at significant risk. Carefully engage your child in a conversation about Internet activities. Seek professional assistance, if warranted. Respond to unsafe or irresponsible behavior with an appropriate consequence that will remedy any harm and help your child learn make better choices in the future. If you find evidence of a predator or other dangerous individual, do not confront your child. Your child could warn or run away with the predator. Contact law enforcement. What You Do Reflects on You Making Good Choices Online Common Values Support your child in making good choices online by emphasizing important values and standards. Ask your child to review the standards set forth in the school Internet use policy and the terms of use agreements for sites and note how these standards are similar to your family s values. Teachable Moments Use teachable moments, like news articles or specific incidents, to discuss online issues and problem-solving strategies. Ethical Decision-Making Questions Is this kind and respectful to others? How would I feel if someone did the same thing to me, or to my best friend? What would my mom, dad, or other trusted adult think or do? Would this violate any agreements, rules, or laws? How would I feel if my actions were reported in a newspaper? What would happen if everybody did this? Would it be okay if I did this in Real Life? How would this reflect on me? Leadership Encourage your child to be a leader ~ to model good choices, talk with friends about their choices, speak up for good values in social networking communities, and offer help to someone who is being harmed. Emphasize to your child the importance of reporting to you, or another trusted adult, if he or she witnesses online harm or thinks that someone is making or considering a bad choice.
Parent Guide to Cyber bullying and Cyber threats
School Address: 4450 S Mendenhall Rd Memphis, TN 38141 Tel: (901) 367 7814 Fax: (901) 367 7816 www.sememphis.org MEMPHIS SCHOOL OF EXCELLENCE Parent Guide to Cyber bullying and Cyber threats Young people
Staying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
Safety Tips for Social Networking
Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and
Affirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.
Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications
Internet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
National Cybersecurity Awareness Campaign Families Presentation
National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security
Chapter 3. Online Bullying
Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.
Cyberbullying and Cyberthreats Effectively Managing Internet Use Risks in Schools
Cyberbullying and Cyberthreats Effectively Managing Internet Use Risks in Schools Nancy Willard, M.S., J.D. Center for Safe and Responsible Use of the Internet Web sites: http://csriu.org and http://cyberbully.org
Parent Guide to Cyberbullying and Cyberthreats
APPENDIX K Parent Guide to Cyberbullying and Cyberthreats Young people have fully embraced the Internet as both an environment and a tool for socializing. Via the Internet and other technologies, they
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
HOW TO STAY SAFE. Smartphones
HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these
CyberbullyNOT Student Guide to Cyberbullying
CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.
How To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
Cyber safety Parent Easy Guide 63
Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed
Parent Guide to Cyberbullying and Cyberthreats
Parent Guide to Cyberbullying and Cyberthreats Young people have fully embraced the Internet as both an environment and a tool for socializing. Via the Internet and other technologies, they send e-mail,
C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
Today s teens use technology more than ever. Most have
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
Social Networking Sites A Predator s Playground?
Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every
Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty
Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty Nancy Willard, M.S., J.D., Director Center for Safe and Responsible Internet Use URL: http://cyberbully.org or http://csriu.org
A Publication of the GCPS Information Management Division
GCPS A Publication of the GCPS Information Management Division Gwinnett County Public Schools is committed to providing information related to student technology use in a manner that is clear, concise,
E-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
DARKNESS to LIGHT S 5 STEPS TO PROTECTING OUR CHILDREN. A guide for responsible adults
DARKNESS to LIGHT S 5 STEPS TO PROTECTING OUR CHILDREN A guide for responsible adults DARKNESS TO LIGHT We are a national nonprofit organization that seeks to empower adults to prevent child sexual abuse.
Chatroom and messaging safety Staying away from pornography Avoiding internet bullying. Keeping your child safe on the. internet
Chatroom and messaging safety Staying away from pornography Avoiding internet bullying Keeping your child safe on the internet AT A GLANCE Using the internet and messaging safely Not everyone who uses
SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?
SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers
Online Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
SOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
Young people and drugs
Young people and drugs Many parents worry about whether their son or daughter is taking illegal drugs, how they can tell, and what to do about it. While there s a lot of concern about illegal drugs in
Guideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
A Parents' Guide to Cyberbullying: Addressing Online Social Cruelty
A Parents' Guide to Cyberbullying: Addressing Online Social Cruelty Young people have fully embraced the Internet as both an environment and a tool for socializing. They create their own Web sites, post
Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability
Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating
Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )
Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain
Cyberbullying: What Parents Can Do to Protect Their Children
Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,
Guidelines for Preventing and Dealing with Bullying Issues
Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.
Teen Online & Wireless Safety Survey
Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications [email protected] 404-269-8057 Cox Communications
Internet Safety Guide for Parents
Internet Safety Guide for Parents How to Talk to Your Kids about Staying Safe Online Presented by Keith Dunn http://www.kdcop.com Page 1 Now I know each and every single one of you is extremely busy. Both
NET CETERA Chatting with Kids About Being Online
NET CETERA Chatting with Kids About Being Online People of all ages are: connecting with friends and family online Communicating online is a way of life, yet it comes with certain risks: Inappropriate
By Shanthi Balraj Ambigapathy Pandian Mohammed Zin Nordin Sumetha Nagalingam Julina Ismail
By Shanthi Balraj Ambigapathy Pandian Mohammed Zin Nordin Sumetha Nagalingam Julina Ismail Introduction New Media Landscape New Media Culture Contributes to New Meanings, Messages, Norms, Values, Interactions
Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
HEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
Internet Safety Fact Sheet Facts about Social Networking:
Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting
Back to School: Working with Teachers and Schools
Back to School: Working with Teachers and Schools Starting school each fall is a challenge for the student and parents. The following article offers some valuable suggestions as your child starts a new
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
Internet Safety Guidelines
Internet Safety Guidelines Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or search for an Internet safety pledge you like. The pledge can
National Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
Digital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
Teaching Digital Citizenship
32 Government of Newfoundland and Labrador - Education I A School-Wide Approach - Positive Behaviour Supports 2013 Education Teaching Digital Citizenship Digital citizenship can be defined as the norms
Cybersmart Guide for Families
Australia s regulator for broadcasting, the internet, radiocommunications and telecommunications www.acma.gov.au Cybersmart Guide for Families Safe internet use in the library and at home Introduction
The Digital Divide: How the Online Behavior of Teens is Getting Past Parents
June 2012 The Digital Divide: How the Online Behavior of Teens is Getting Past Parents Parent Disconnect Despite the obvious disconnect between teens online behaviors and parents knowledge of them, parents
When a Parent Has Mental Illness Helping Children Cope
When a Parent Has Mental Illness Helping Children Cope World Fellowship for Schizophrenia and Allied Disorders 124 Merton Street, Suite 507 Toronto, Ontario, M4S 2Z2, Canada Email: [email protected]
A Time to Tell Troop Meeting Guide
A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as
Online Safety How to Protect Yourself and Your Family
Online Safety How to Protect Yourself and Your Family Introduction Surfing the internet can be a very positive experience, it opens up a world of possibilities for everyone, expanding our horizons by exposing
How to Protect Students from Sexual Harassment: A Primer for Schools
How to Protect Students from Sexual Harassment: A Primer for Schools This fact sheet is part of a series of tools designed by the National Women s Law Center to help schools address the dropout crisis.
A Parents Guide to. 2014 ConnectSafely.org
A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.
Protect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
Social Media Guidelines Resource
Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding
Current Internet Facts
Current Internet Facts Facts about Online Predators and Strangers online: Twenty-eight percent of tweens (ages 8 to 12) have been contacted over the Internet by someone they don t know (COX Tween Internet
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY The Fayetteville Board of Education recognizes the need to effectively use digital technology to further enhance the educational goals of the
Teacher Guide TEEN SAFETY
The Vulnerable Teacher Guide TEEN SAFETY This companion to the online course provides questions and topics for classroom discussion and activities. 2012 ShieldTheVulnerable.org 1277 Treat Blvd #530 Walnut
St Bernadette s Catholic Primary School. E-Safety Policy
St Bernadette s Catholic Primary School E-Safety Policy St Bernadette s Catholic Primary School - e-safety policy Our Vision St Bernadette s Catholic Primary School embrace the positive impact and educational
Their stories are tragic. A new chapter starts now. now.
! Their stories are tragic. A new chapter starts now. now.! Bully is a movie that tells powerful stories about children and their families dealing with extreme pain and tragic consequences related to bullying.
Iowa Governor s Office of Drug Control Policy
Talking to kids about {prescription drug abuse Iowa Governor s Office of Drug Control Policy Talking to kids about {prescription drug abuse As a parent you re concerned about your children s health and
i-safe K 12 CURRICULUM SCOPE 06-07
i-safe K 12 CURRICULUM SCOPE 06-07 GRADES K 4 Scope and sequence i-safe materials are available in topic modules to provide the teacher with flexibility in creating a program of instruction that best suits
Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
