Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW
|
|
- John Carter
- 8 years ago
- Views:
Transcription
1 Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW
2 I know all my online friends. What I post online is private. I can delete what I post. Freedom of Speech allows me to express myself online without consequence. Intent can be misunderstood online. Bullying is a normal part of a school s environment.
3 Digital Citizen someone who is able to think critically about the ethical opportunities and challenges of the digital world and make safe, respectful, and responsible choices (Common Sense Media, 2010) Who R U Exploitation Cyberbullying Sexting Piracy P Content
4 Factors Social Emotional Cognitive Physical Prefrontal Cortex Final area to develop Rely on emotional centers Difficult to think long-term
5 In contrast, 53% teens who witness online cruelty have sought advice about how to handle it from friends or peers and only 36% sought advice from parents Family 58% of teen internet and cell phone users say their parents are the biggest influence on them about what they think is appropriate and inappropriate Community Child Friends Teachers 18% said their friends were the biggest influence
6 What technology are students using? Are they allowed to use in room, den, etc? How long are they on technology? Are you checking, friending, following? What apps are they using and games are they playing? Who are they interacting with? What are they sharing, posting, downloading, uploading?
7 Downloading programs without permission (boys) Viewing/downloading inappropriate material Communicating with strangers (girls) Posting personal information or photos Sharing passwords with friends (girls) Sharing password: 47% of online girls vs. 27% boys Sharing secrets online online journal vs paper/pencil Acting rude or mean online Harassing or posting embarrassing information Use of credit card without permission Hiding online behaviors (teens) Pieters, A., & Krupin, C. (2010). Youth Online Behavior Study. Harris Interactive. Retrieved from htpp://safekids.com/mcafee_harris.pd Lenhart A., Madden, M., Purcell K., Rainie, L., Smith, A. & Zickuhr, K. (2011). Teens, Kindness and Cruelty on Social Network Sites, Pew Internet & American Life Project.
8 FOSI & Hart Research Associates. (2013). Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online. Teens report concern with someone stealing information they ve posted online, although most are not fearful of their own identity being stolen. 34% of teens have shared their usernames and passwords with someone other than their parent/guardian 43% of teens use privacy settings for only SOME or NONE of their online accounts
9 60% have their FB profiles set to private, yet 64% leave their Tweets open to the public Over 90% of all teens share/use their real name (slightly less for year olds) About 90% post/share pictures of themselves About 1 out of 4 (25%) post/share videos of themselves on their favorite site About 80% use their birthdates Close to 70% post/share where they live (city/town) 76% of year olds use their school name (56% of year olds) Less than 25% give out their cell phone numbers
10 Lenhart A., Madden, M., Purcell K., Rainie, L., Smith, A. & Zickuhr, K. (2011). Teens, Kindness and Cruelty on Social Network Sites, Pew Internet & American Life Project. FOSI & Hart Research Associates. (2012). The Online Generation Gap: contrasting attitudes and behaviors of parents and teens. 87% of parents of teens ARE online 67% of these parents use Social Networking Sites 91% of parents of teens HAVE cell phones 86% of these parents text 80% of parents who use social media, and also have a child who uses social media, have friended their child 91% of parents say they are well informed about what their teens do online and on their cell phones 94% of parents of online teens say they have talked with their teen about what they should and should not share online what does this conversation look like? 84% of parents state they monitor their child s online activity very (31%) or fairly (53%) closely
11 FOSI & Hart Research Associates. (2012). The Online Generation Gap: contrasting attitudes and behaviors of parents and teens. Pieters, A., & Krupin, C. (2010). Youth Online Behavior Study. Harris Interactive. Retrieved from htpp://safekids.com/mcafee_harris.pdf. Common Sense Media. (2012). Social Media, Social Life: How Teens View Their Digital Lives. Retrieved from: 31% (of teens) would change their online behavior if they knew parents were watching 58% say parents don t regularly ask them what they do online 21% wish parents spent less time on digital media 41% describe themselves as addicted to their phones 43% wish they could unplug 36% wish they could go back to a time before Facebook Only 21% of teens say their parents are very well informed about their online behavior 39% of teens say their parents monitor their online activity very or somewhat closely
12 Develop household rules for usage and time limits Determine appropriate age to introduce into child's life Review definition of private information with child Understand and enforce terms of service agreements Gain understanding of digital devices prior to access Review applications/websites before use Emphasize protection and use of passwords (friendships & intimate relationships) Model healthy boundaries with digital media (dining/driving) Create safe space without digital media Reinforce the need for empathy when using technology Maintain ongoing open communication and education
13 Bernstein, N. (2001). How to Keep your Teenager out of Trouble and What to do if You Can't. Workman Publishing Company. Werner, N. (2008, March). Children's Internet Use and Cyber Bullying. Pullman, WA: Washington State University. Behavior Expectations Set limits Be reasonable Negotiate Communicate Internet Behavior Expectations Parents who employed few rules Increased levels of anxiety and depression Parents who employed rules Increased pro-social behavior
14 Is my online content Hurtful Rude Dangerous or Harmful? Would I want a parent, guardian, grandparent or trusted adult to see my online content? Would I want someone to treat me this way? What are the consequences of what I post? (short and long term) What is the difference between writing secrets in a diary versus online? What s my digital story? What reputation am I building for myself? How will online content affect my future.. Education Employment Military or Relationships? What are my responsibilities as a digital citizen to keep the digital world safe and violent free? What is my responsibility if I see violence? How do I know this person.. Family Friend Acquaintance - Stranger? How do the qualities of my real life friends compare to those of my online friends?
15 Most parents report having a safety conversations with their children regarding online safety and limitations to their use. 93% set rules and limits to monitor children s Internet usage and 75% for amount of time children can spend in a given day 60% of parents NOT using parental controls say they are not necessary because they have rules/limits already in place Over 60% of parents whose child has a cell/smartphone or FB account have checked their phones or FB account. 59% of parents whose child has a cell/smartphone set time limits or rules for phone use, but only 25% have set up parental controls 53% of parents have used parental controls for Internet use Mobile Devices tend to pose the greatest challenges to parents when it comes to parental control use. FOSI & Hart Research Associates. (2011). Using Parental Controls? You re Not Alone.
16
17
18 97% of teens (12-17) play computer, web, portable, or console games Gaming is often a social experience, of the 27% of teens who play via internet: 47% play players known offline 27% play people they first met online 23% play with friends & family from offline and online Games genres and ratings vary by age and gender Average rating of games is Teen 50% of boys play a game that is rated Mature or Adult Only Lenhart A., Kahne J., Middaugh E., Macgill A., Evans C., & Vitak, J. (2008). Teens, Video Games, and Civics. Pew Internet & American Life Project.
19 Teens sharing more information: 2011 vs 2006 (photo of self, school name, city they live, address, cell phone number) 24% of teens now on Twitter (16% in 2011) Median teen has 300 Facebook friends, 79 followers on Twitter 60% of teen Facebook users keep their profile private 74% of teens have deleted people from their network or friends list Not concerned with third party access to their information Madden, M., Lenhart A., Cortesi, S., Gasser, U., Duggan, M., Smith, A., Beaton, M. (2013). Teens, Social Media, and Privacy. Pew Internet & American Life Project.
20 65% say they visit social networking sites several times a day (compared to 27% of teens with 150 friends or less) More likely to have a Twitter and Instagram account also Less likely to be friends with their parents or guardians More likely to friend people they ve never met in person More likely to include their phone number, picture of self, school name on their profile Madden, Lenhart, Cortesi, Gasser, Duggan, Smith, Beaton. (2013). Teens, Social Media, and Privacy. Pew Internet & American Life Project.
21 Social Networking - Teens Social Networks & Games Video Chat Downloads for Files
22 Ability to choose to leave page open to the public or set page to private Can be searched by name, age, location, etc Post text, pictures, share others posts 36% of year olds friend people they have never met in person 25% of year olds would do the same Madden, Lenhart, Cortesi, Gasser, Duggan, Smith, Beaton. (2013). Teens, Social Media, and Privacy. Pew Internet & American Life Project. Has private message feature Ability to check-in
23 Platform for enhancing photos and sharing across social media 13+ Age Rating Photos are public by default Confirm geo-tagging is off Launched by Facebook Now has Instagram Direct feature
24 64% of teens using Twitter say their Tweets are public. Although teens on Twitter also tend to have less followers than on other sites. Madden, Lenhart, Cortesi, Gasser, Duggan, Smith, Beaton. (2013). Teens, Social Media, and Privacy. Pew Internet & American Life Project. Microblogging social networking site Users can post brief 140 character tweets Tweets are public by default Ability to individually approve followers IF you keep tweets private Ability to add location
25 Video creation app where all videos are 6 seconds or less (launched by Twitter) Age Rating: 17+ Ability to limit followers, but followers could share your information with strangers Post own videos or revine by posting/sharing others videos
26 Messaging app for exchanging usergenerated photos Images last 1 to 10 seconds Age Rating: 13+ Ability to import friends SnapKidz for under 13 users
27 App based messaging Age Rating: 17+ Does not have messaging fees Kik available on all devices
28 Ability to ask other users questions (with anonymity) Age Rating: 13+
29
30 Relationship of Abuser to Child 1 Parent/Guardian 10% 27% 7% 3% 14% 15% 18% 3% 3% Other Relative Neighbor/Family Friend Babysitter/Coach Guardian's Partner Online Enticement Self-produced Human Trafficker Unknown to Child Abuser data based upon victim information submitted to NCMEC by law enforcement, as of December 31, The data represent the known relationships from 2,836 series (4,103 identified victims). 2. Online Enticement includes either (1) victims who met a perpetrator online and transmitted self-produced images or (2) victims and offenders who met online and then met offline, producing images. 3. Self-produced includes those victims who have produced and distributed images of themselves. 4. Human Trafficker includes victims of commercial trafficking. 5. Unknown to Child includes un-established relationships, i.e. photographers, child sex tourism, runaways, etc. National Center for Missing and Exploited Children, January 1, 2011.
31 Understand that children are at a greater risk from someone they know Learn about everyone your child encounters Discuss online and offline relationships with your child what relationships are appropriate Review Illinois Sex Offender Information: Report child sexual abuse (IL DCFS): (800)25-ABUSE or Report child pornography (IL OAG): illinoisicactip@atg.state.il.us reportchildporn@atg.state.il.us
32 Predators seek youths vulnerable to seduction, including those: with histories of sexual or physical abuse who post sexually provocative photos/video who talk about sex with unknown people online Wolak, J., Finkelhor D., Mitchell, & K. Ybarr, M. (2008, February-March). Online "Predators" and Their Victims: Myths, Realities and Implications for Prevention and Treatment. American Psychologist, pp
33 Sexual Solicitation & Approaches 1 in 7 youth received online requests to talk about sex, answer personal questions about sex or do something sexual (occasionally by other youth) Aggressive Sexual Solicitation 4% of youth asked to meet in person 4% of youth asked to take sexual pictures of themselves Unwanted Exposure to sexual material 34% of youth exposed Wolak, J. & Finkelhor, D. (2006). Online Victimization of Youth: Five Years Later. Alexandria, VA: National Center for Missing & Exploited Children. Wolak, Finkelhor, Mitchell. (2007). 1 in 7 Youth: The Statistics about Online Sexual Solicitations. Crimes against Children Research Center.
34 PROFILE CREATION Review Terms of Service Use of nickname Do not provide zip code Set profile settings to private Review profile image and others Review geo-location settings WHAT NOT TO SHARE First & last name Telephone numbers Street address Name of school Social security number Date of birth Itineraries Favorite locations Credit card information Images that identify you, your school, your location
35
36 Instant crowd Anonymity Don t have to face reaction/emotion/hurt Invincible
37 Basis actual or perceived race, color, religion, sex, national origin, ancestry age, marital status, physical or mental disability, military status, sexual orientation, gender-related identity or expression, unfavorable discharge from military service, association with a person or group with one or more of the aforementioned actual or perceived characteristics, or any other distinguishing characteristic. Forms harassment, threats, intimidation, stalking, physical violence, sexual harassment, sexual violence, theft, public humiliation, destruction of property, or retaliation for asserting or alleging an act of bullying 105 ILCS 5/
38 One in five teens say they were bullied in the past year. The most common occurrence was in-person bullying. Fewer than one in ten teens report being bullied by phone, text, or online. Lenhart A., Madden, M., Purcell K., Rainie, L., Smith, A. & Zickuhr, K. (2011). Teens, Kindness and Cruelty on Social Network Sites, Pew Internet & American Life Project.
39 16% 14% 12% 10% 8% 6% 4% 2% 0% Text Messaging Online Phone In Person (Older teens) Males Females Lenhart A., Madden, M., Purcell K., Rainie, L., Smith, A. & Zickuhr, K. (2011). Teens, Kindness and Cruelty on Social Network Sites, Pew Internet & American Life Project.
40 Establish rules offline or online, ability to inflict harm Make sure school has Internet Safety Educate your children Model appropriate technology usage Monitor your child s activities Use filtering and blocking software Look for warning signs Utilize an Internet/ Cell Phone Use Contract Cultivate and maintain open, candid communication Teach and reinforce positive morals and values Hinduja, S. & Patchin J.W. (2012). Preventing Cyberbullying Top Ten Tips for Parents Retrieved from
41 VICTIM Stops using computer/cell Nervous w/ or text Angry, depressed, frustrated Avoids discussions about the computer Abnormally withdrawn Decline in grades Ditching classes Avoids activities BULLY Switches screens Always uses the computer Gets upset when he/she cannot use the computer Laughing a lot while using the computer Avoids discussions about the computer Has multiple accounts Refuses to show screen Falling out with friends Hinduja, S. & Patchin J.W. (2005). Research summary: Cyberbullying victimization. Retrieved from
42 Provide support to child Run Internet searches on screen names Print out all incidents of cyberbullying Electronic evidence must be preserved Stop Block Tell -> Parent -Teacher - Law Enforcement Model Appropriate response to conflict -Assertive/Aggressive Model Tolerance
43
44 Common Sense Media. (2012). Social Media, Social Life: How Teens View Their Digital Lives. Retrieved from: 31% of social media users say they ve flirted with someone online that they wouldn t have flirted with in person Posting pictures online takes an emotional toll Will someone tag them in an unattractive photos? How do they look in photos? Will someone comment on or like the photos they post? Should they edit photos before posting?
45 EXPERIMENTAL Romantic Within an established relationship Sexual Attention Seeking Create romantic interest Other Attention-seeking AGGRAVATED Intent to Harm Extortion, threats No consent in creation/sending Reckless Misuse Malicious conduct Wolak, J. & Finkelhor, D. (2011). Sexting: A Typology, University of New Hampshire, Crimes Against Children Research Center.
46 9.6% of teens reported creating nude or nearly nude images or receiving such images 2.5% created or appeared in photos 1.8 % created image themselves 0.3 % someone else created 0.4 % created for someone else Girls > Boys 7.1% received them but did not create/appear Mitchell, K., Finkelhor, D., Jones, Lisa, & Wolak, J. (2012, January). Prevalence and Characteristics of Youth Sexting: A National Study. PEDIATRICS.
47
48 Downloading files without paying the producermusic, games, movies Using File-Sharing Networks Sharing your files for free or a fee to you Downloading files others shared for free or a fee to them Burning CDs or DVDs for others (even if you paid for them)
49 Sharing files online movies, music, games, software through a network of computers running the same program has gained popularity among teens Additional Risks Download disturbing content Computer viruses
50 was the bully/cyberbully? took inappropriate pictures/videos of themselves? Received from a friend? Received from a stranger/adult? was pirating music/movies/etc? created SNS accounts when they are underage? Lied about their age online? Or created a fake account? Was chatting with someone they met online?
51
52
53 Netsmartz411.org Commonsensemedia.org Bewebsmart.com Ikeepsafe.org Cyberbullying.us
54 Melissa Hemzacek, LSW
Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW
Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW Most parents report having a safety conversations with their children regarding online safety
More informationInternet Safety Fact Sheet Facts about Social Networking:
Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting
More informationAffirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
More informationCurrent Internet Facts
Current Internet Facts Facts about Online Predators and Strangers online: Twenty-eight percent of tweens (ages 8 to 12) have been contacted over the Internet by someone they don t know (COX Tween Internet
More informationCyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction
Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual
More informationSarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
More informationYouth Online Behavior
Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology
More informationOnline Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
More informationDigital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
More informationPARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com
PARENTING IN THE DIGITAL AGE Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com Teens and Technology Use 78% have a cell phone 95% use the Internet 91% have an email address 74% access the
More informationE-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationDallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
More informationEmpowering young people to be safe on the Internet. Information for parents, teachers and community members
Empowering young people to be safe on the Internet Information for parents, teachers and community members Empowering parents, teachers, & community members!! IBM is providing the following information
More informationCyber safety Parent Easy Guide 63
Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed
More informationLt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain
More informationeffects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor
Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences
More informationThe Digital Divide: How the Online Behavior of Teens is Getting Past Parents
June 2012 The Digital Divide: How the Online Behavior of Teens is Getting Past Parents Parent Disconnect Despite the obvious disconnect between teens online behaviors and parents knowledge of them, parents
More informationCounselors Guidelines for the Healthy Development of Youth in the Digital Age
Suggested APA style reference information can be found at http://www.counseling.org/library/ Article 40 Counselors Guidelines for the Healthy Development of Youth in the Digital Age Lakitta D. Johnson
More informationSocial Media Guidelines Resource
Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationToday s teens use technology more than ever. Most have
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
More informationCyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )
Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.
More information2014 Teen Internet Safety Survey. Conducted by The Futures Company
2014 Teen Internet Safety Survey Conducted by The Futures Company Contents Background, Objectives, Methodology Major Findings Important Trends Next Steps 2 Background + Objectives Cox s commitment to Online
More informationTeens, Online Stranger Contact and Cyberbullying What the research is telling us
Teens, Online Stranger Contact and Cyberbullying What the research is telling us Amanda Lenhart Internet Safety Task Force April 30, 2008 Washington, DC Methodology Interviewed 700 parent-child pairs in
More informationTeen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online
Research Conducted By: Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online [ photo here The Teen Online Identity Generation Theft Gap November November 20132012
More informationONLINE PREDATORS & PREDATORS
the myths and realities of ONLINE PREDATORS & PREDATORS Center For Child Advocacy Sixth Annual National Conference Crimes Against Children: The Multiple Faces of Child Victimization Joseph Hanley B.A.
More informationTeen Online & Wireless Safety Survey
Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications kimberly.thomas@cox.com 404-269-8057 Cox Communications
More informationGuideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
More informationSCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?
SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers
More informationFAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
More informationesmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2
Online Safety Handbook for Students and Parents 2014 Table of Contents Table of Contents... 2 Overview of Program... 2 Aims... 2 Relevant Technology... 3 Appropriate Online Conduct... 3 Online Responsibilities...
More informationBy Augusta Epuli Anjoh April 2013 Cyber security forum 2013
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary
More informationExecutive Summary Key Findings
Executive Summary Key Findings What does online life look like for the average young Canadian? First and foremost, these are highly connected children and teens, most of who are accustomed to online access
More informationCyberbullying: What Parents Can Do to Protect Their Children
Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,
More informationOnline Safety How to Protect Yourself and Your Family
Online Safety How to Protect Yourself and Your Family Introduction Surfing the internet can be a very positive experience, it opens up a world of possibilities for everyone, expanding our horizons by exposing
More informationBe it enacted by the People of the State of Illinois,
AN ACT concerning education. Be it enacted by the People of the State of Illinois, represented in the General Assembly: Section 5. The School Code is amended by changing Section 27-23.7 as follows: (105
More informationBack Cover. Copyright 2006, 2009, and 2011 National Center for Missing & Exploited Children. All rights reserved.
1 2 3 5 6 7 8 9 10 12 Back Cover Where Do Kids Connect? Browsing the Internet Social Networking Using E-Mail Instant Messaging Cell Phones/ Wireless Devices and Texting Posting Videos and Photos Online
More informationi-safe America Internet Safety Tips for Parents
i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and
More informationInternet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
More informationTeacher Guide TEEN SAFETY
The Vulnerable Teacher Guide TEEN SAFETY This companion to the online course provides questions and topics for classroom discussion and activities. 2012 ShieldTheVulnerable.org 1277 Treat Blvd #530 Walnut
More informationLiving Online: Using Technology Wisely Lesson. Guide
Living Online: Using Technology Wisely Lesson Guide Target Audience Adolescents 11-14 Time Entire program 1 hour, depending on discussion Program Objectives Ways to portray a positive image online How
More informationThe Online Generation Gap. Contrasting attitudes and behaviors of parents and teens
The Online Generation Gap Contrasting attitudes and behaviors of parents and teens The Online Generation Gap: Contrasting attitudes and behaviors of parents and teens Submitted to: The Family Online Safety
More informationCyberbullying, Sexting & Predators Oh My!
Cyberbullying, Sexting & Predators Oh My! Addressing Youth Risk in the Digital Age in a Positive and Restorative Manner Nancy Willard Center for Safe and Responsible Internet Use Cyber Savvy Cyber Savvy
More informationHOW TO STAY SAFE. Smartphones
HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these
More informationwww.xxxchurch.com Online Predators & Strangers
www.xxxchurch.com Online Predators & Strangers When children go online, they have direct access to their friends and family members, but they also may come into contact with complete strangers. Through
More informationTeen Online Safety & Digital Reputation Survey
Teen Online Safety & Digital Reputation Survey Cox Communications Teen Online Safety & Digital Reputation Survey in Partnership with the National Center for Missing & Exploited Children (NCMEC) (Fielded
More informationCyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
More informationThe webcast will begin shortly. Please stand by.
The webcast will begin shortly. Please stand by. @Gaggle_K12 Making Student Safety A Priority @Gaggle_K12 Webcast Tips ü To switch from computer audio to your phone, locate the Audio Pane, select Use Telephone
More informatione-rate toolkit Cyberbullying: Crossing the Line
e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview
More informationHEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
More informationParents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.
Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications
More informationFIRBANK GRAMMAR SCHOOL
FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...
More informationChapter 3. Online Bullying
Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.
More informationStaying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
More informationthink before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities
More informationAre Social Networking Sites a Source of Online Harassment for Teens? Evidence from Survey Data
Are Social Networking Sites a Source of Online Harassment for Teens? Evidence from Survey Data Anirban Sengupta 1 Anoshua Chaudhuri 2 Abstract Media reports on incidences of abuse on the internet, particularly
More informationChicago Public Schools Policy Manual
Chicago Public Schools Policy Manual Title: ANTI-BULLYING POLICY Section: 705.5A Board Report: 14-0625-PO1 Date Adopted: June 25, 2014 Policy: ANTI-BULLYING POLICY Purpose The Illinois General Assembly
More informationSchool Policy Regarding Computer Use, Technology and Internet Access
School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school
More informationBack Cover. Copyright 2006 and 2009 National Center for Missing & Exploited Children. All rights reserved.
1 2 3 4 5 7 8 9 10 12 Back Cover Where Do Kids Connect? Browsing the Internet Using E-mail Instant Messaging Social Networking Cellular Telephones/ Wireless Devices and Texting Posting Videos and Photographs
More informationInternet Safety Guidelines
Internet Safety Guidelines Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or search for an Internet safety pledge you like. The pledge can
More informationSTOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
More informationNational Cybersecurity Awareness Campaign Families Presentation
National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security
More informatione-safety for Parents
e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology
More informationComments made online may be misinterpreted by both receivers and third-parties, which may affect the determination of prevalence of cyberbullying.
Chapter 7 summaries Cyberbullying definitions and prevalence Many definitions have been offered for cyberbullying. Several of these definitions explicitly or implicitly indicate that the bullying behaviour
More informationE-Safety Awareness. Parents and Carers
E-Safety Awareness Parents and Carers Bullying online by people in my school year has left me with significant mental health issues for which I am now on medication and in therapy for. So it s really damaged
More informationBERKELEY COLLEGE Equal Opportunity Policy
BERKELEY COLLEGE Equal Opportunity Policy Purpose Recognizing that its diversity greatly enhances the workplace and opportunities for learning, Berkeley is firmly committed to providing all associates,
More informationOffice of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices
Office of the Attorney General of Virginia Sexting Protecting Yourself on the Internet and Mobile Devices Websites Often Used for Social Networking Monthly Visitors to Social Networking Sites 1. 750,000,000
More informationSafety Tips for Social Networking
Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and
More informationGirls & Cyber- bullying
MARC Research Results First Report March, 2010 Girls & Cyber- bullying Elizabeth K. Englander, Ph.D. Director, Massachusetts Aggression Reduction Center Bridgewater State University Bridgewater, Massachusetts
More informationSeptember 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9
Cyber-bullying The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside school. Cyber-bullying is a different form of
More informationCyber-bullying. Cyber-bullying: A Digital Epidemic White Paper
Cyber-bullying Cyber-bullying: A Digital Epidemic White Paper What is Cyber-bullying? The past two decades have witnessed a virtual explosion in new technology that has been eagerly embraced by adolescents
More informationSOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
More informationHIGH SCHOOL FOR RECORDING ARTS
Adopted Revised High School for Recording Arts Bullying Prohibition Policy 1. Purpose Students have the right to be safe and free from threatening situations on school property and at school activities
More informationChapter 10. Teens and Technology
Chapter 1. Teens and Technology As most people would predict, teens in today s world use technology often. In fact, understanding how to use technology and computers is a fundamental skill for youth to
More informationUNSUPERVISED AND ONLINE
UNSUPERVISED AND ONLINE Effective Identification of Negative Online Behavior and Strategies for Creating a Family Prevention Plan Follow us on: Contact us at: notmykid.org info@notmykid.org 602.652.0163
More informationOverexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12
Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Essential Question: What are the risks and responsibilities when you share online in a relationship? How can you respect
More informationProtect Your Privacy Online
Protect Your Privacy Online By Kathiann M. Kowalski Keep personal information private for your own good! High school sophomore Karra H. never expected to see herself on a Web site featuring scantily clad
More informationLike, post, share: Young Australians experience of social media
Like, post, share: Young Australians experience of social media Quantitative research report prepared for the Australian Communications and Media Authority 2013 CONTENTS EXECUTIVE SUMMARY 6 1.1 RESEARCH
More informationInternet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force
Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Crimes Against Children Unit SECTIONS CPU ICAC DFU WVMCC WV3C Crimes Against Children Unit WVSP Organizational Change December 1, 2009
More informationCyberbullying. Welcome!
Cyberbullying Welcome! In this tutorial, we will introduce information about cyberbullying including what it is, how it happens, technology issues related to it, and what can you do about it. We will also
More informationTechno-Panic & 21st Century Education:
Techno-Panic & 21st Century Education: Make Sure Internet Safety Messaging Does Not Undermine Education for the Future Nancy Willard, M.S., J.D. Center for Safe and Responsible Internet Use Trying to prepare
More informationOnly talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
More informationComputer Facilities and External Networks Acceptable Use by Students
Related Policies Copyright Media Usage Offshore Data Hosting Privacy Web Publishing Purpose Policy Computer facilities and external networks are made available as resources for use by students in Catholic
More informationAppropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
More informationUnder the Start Your Search Now box, you may search by author, title and key words.
VISTAS Online VISTAS Online is an innovative publication produced for the American Counseling Association by Dr. Garry R. Walz and Dr. Jeanne C. Bleuer of Counseling Outfitters, LLC. Its purpose is to
More informationFireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]
1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.
More informationBy Shanthi Balraj Ambigapathy Pandian Mohammed Zin Nordin Sumetha Nagalingam Julina Ismail
By Shanthi Balraj Ambigapathy Pandian Mohammed Zin Nordin Sumetha Nagalingam Julina Ismail Introduction New Media Landscape New Media Culture Contributes to New Meanings, Messages, Norms, Values, Interactions
More informationInternet Safety & Awareness. Dan Tomlinson 02/23/2013
Internet Safety & Awareness Dan Tomlinson 02/23/2013 Internet risks Top six tips for online safety What to do if there is a problem Online safety resources Internet Risks Primary Threats to your Computer
More informationNational Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
More informationSonia Livingstone, LSE
Contextualising cyberbullying in relation to other online risks of harm to children Sonia Livingstone, LSE Presentation to the International Conference on Cyberbullying, COST IS0801, Sorbonne, Paris, 29
More informationGuidelines for Preventing and Dealing with Bullying Issues
Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.
More informationHow To Avoid The Identity Theft Predators
Camp Watwuzithinkin How To Avoid The Identity Theft Predators Predator 0 An organism that lives by preying on other organisms Identity Thief 0 A person who makes a living by preying on other people Outsmart
More informationParent Guide to Cyber bullying and Cyber threats
School Address: 4450 S Mendenhall Rd Memphis, TN 38141 Tel: (901) 367 7814 Fax: (901) 367 7816 www.sememphis.org MEMPHIS SCHOOL OF EXCELLENCE Parent Guide to Cyber bullying and Cyber threats Young people
More informationEADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
More informationIMPACT OF SOCIAL NETWORKING SITES (SNS) ON THE YOUTH
IMPACT OF SOCIAL NETWORKING SITES (SNS) ON THE YOUTH Ms. Shabnam S. Mahat Assistant Professor Department of Computer Applications Bharati Vidyapeeth Deemed University, IMRDA, Sangli. Dr. S. D. Mundhe Director,
More informationNUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE JULY 16, 2015 MEDIA CONTACT FOR THIS REPORT: Dana Page, Communications Manager
NUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE JULY 16, 2015 MEDIA CONTACT FOR THIS REPORT: Dana Page, Communications Manager 202.419.4372 RECOMMENDED CITATION: Duggan, M., Lenhart, A., Lampe,
More informationWhether it happens at school or off-campus, cyberbullying disrupts and affects all aspects of students lives.
Cyberbullying Whether it happens at school or off-campus, cyberbullying disrupts and affects all aspects of students lives. By Ted Feinberg and Nicole Robey Ted Feinberg is the assistant executive director
More informationThe Digital Life of Teens
The Digital Life of Teens Trends, Concerns, and Impacts Yoon Hyung Choi Amanda Purington Main Themes Digital Media Usage and Access How do teens and tweens access digital media? What do they do online?
More information