Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW

Size: px
Start display at page:

Download "Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW"

Transcription

1 Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW

2 I know all my online friends. What I post online is private. I can delete what I post. Freedom of Speech allows me to express myself online without consequence. Intent can be misunderstood online. Bullying is a normal part of a school s environment.

3 Digital Citizen someone who is able to think critically about the ethical opportunities and challenges of the digital world and make safe, respectful, and responsible choices (Common Sense Media, 2010) Who R U Exploitation Cyberbullying Sexting Piracy P Content

4 Factors Social Emotional Cognitive Physical Prefrontal Cortex Final area to develop Rely on emotional centers Difficult to think long-term

5 In contrast, 53% teens who witness online cruelty have sought advice about how to handle it from friends or peers and only 36% sought advice from parents Family 58% of teen internet and cell phone users say their parents are the biggest influence on them about what they think is appropriate and inappropriate Community Child Friends Teachers 18% said their friends were the biggest influence

6 What technology are students using? Are they allowed to use in room, den, etc? How long are they on technology? Are you checking, friending, following? What apps are they using and games are they playing? Who are they interacting with? What are they sharing, posting, downloading, uploading?

7 Downloading programs without permission (boys) Viewing/downloading inappropriate material Communicating with strangers (girls) Posting personal information or photos Sharing passwords with friends (girls) Sharing password: 47% of online girls vs. 27% boys Sharing secrets online online journal vs paper/pencil Acting rude or mean online Harassing or posting embarrassing information Use of credit card without permission Hiding online behaviors (teens) Pieters, A., & Krupin, C. (2010). Youth Online Behavior Study. Harris Interactive. Retrieved from htpp://safekids.com/mcafee_harris.pd Lenhart A., Madden, M., Purcell K., Rainie, L., Smith, A. & Zickuhr, K. (2011). Teens, Kindness and Cruelty on Social Network Sites, Pew Internet & American Life Project.

8 FOSI & Hart Research Associates. (2013). Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online. Teens report concern with someone stealing information they ve posted online, although most are not fearful of their own identity being stolen. 34% of teens have shared their usernames and passwords with someone other than their parent/guardian 43% of teens use privacy settings for only SOME or NONE of their online accounts

9 60% have their FB profiles set to private, yet 64% leave their Tweets open to the public Over 90% of all teens share/use their real name (slightly less for year olds) About 90% post/share pictures of themselves About 1 out of 4 (25%) post/share videos of themselves on their favorite site About 80% use their birthdates Close to 70% post/share where they live (city/town) 76% of year olds use their school name (56% of year olds) Less than 25% give out their cell phone numbers

10 Lenhart A., Madden, M., Purcell K., Rainie, L., Smith, A. & Zickuhr, K. (2011). Teens, Kindness and Cruelty on Social Network Sites, Pew Internet & American Life Project. FOSI & Hart Research Associates. (2012). The Online Generation Gap: contrasting attitudes and behaviors of parents and teens. 87% of parents of teens ARE online 67% of these parents use Social Networking Sites 91% of parents of teens HAVE cell phones 86% of these parents text 80% of parents who use social media, and also have a child who uses social media, have friended their child 91% of parents say they are well informed about what their teens do online and on their cell phones 94% of parents of online teens say they have talked with their teen about what they should and should not share online what does this conversation look like? 84% of parents state they monitor their child s online activity very (31%) or fairly (53%) closely

11 FOSI & Hart Research Associates. (2012). The Online Generation Gap: contrasting attitudes and behaviors of parents and teens. Pieters, A., & Krupin, C. (2010). Youth Online Behavior Study. Harris Interactive. Retrieved from htpp://safekids.com/mcafee_harris.pdf. Common Sense Media. (2012). Social Media, Social Life: How Teens View Their Digital Lives. Retrieved from: 31% (of teens) would change their online behavior if they knew parents were watching 58% say parents don t regularly ask them what they do online 21% wish parents spent less time on digital media 41% describe themselves as addicted to their phones 43% wish they could unplug 36% wish they could go back to a time before Facebook Only 21% of teens say their parents are very well informed about their online behavior 39% of teens say their parents monitor their online activity very or somewhat closely

12 Develop household rules for usage and time limits Determine appropriate age to introduce into child's life Review definition of private information with child Understand and enforce terms of service agreements Gain understanding of digital devices prior to access Review applications/websites before use Emphasize protection and use of passwords (friendships & intimate relationships) Model healthy boundaries with digital media (dining/driving) Create safe space without digital media Reinforce the need for empathy when using technology Maintain ongoing open communication and education

13 Bernstein, N. (2001). How to Keep your Teenager out of Trouble and What to do if You Can't. Workman Publishing Company. Werner, N. (2008, March). Children's Internet Use and Cyber Bullying. Pullman, WA: Washington State University. Behavior Expectations Set limits Be reasonable Negotiate Communicate Internet Behavior Expectations Parents who employed few rules Increased levels of anxiety and depression Parents who employed rules Increased pro-social behavior

14 Is my online content Hurtful Rude Dangerous or Harmful? Would I want a parent, guardian, grandparent or trusted adult to see my online content? Would I want someone to treat me this way? What are the consequences of what I post? (short and long term) What is the difference between writing secrets in a diary versus online? What s my digital story? What reputation am I building for myself? How will online content affect my future.. Education Employment Military or Relationships? What are my responsibilities as a digital citizen to keep the digital world safe and violent free? What is my responsibility if I see violence? How do I know this person.. Family Friend Acquaintance - Stranger? How do the qualities of my real life friends compare to those of my online friends?

15 Most parents report having a safety conversations with their children regarding online safety and limitations to their use. 93% set rules and limits to monitor children s Internet usage and 75% for amount of time children can spend in a given day 60% of parents NOT using parental controls say they are not necessary because they have rules/limits already in place Over 60% of parents whose child has a cell/smartphone or FB account have checked their phones or FB account. 59% of parents whose child has a cell/smartphone set time limits or rules for phone use, but only 25% have set up parental controls 53% of parents have used parental controls for Internet use Mobile Devices tend to pose the greatest challenges to parents when it comes to parental control use. FOSI & Hart Research Associates. (2011). Using Parental Controls? You re Not Alone.

16

17

18 97% of teens (12-17) play computer, web, portable, or console games Gaming is often a social experience, of the 27% of teens who play via internet: 47% play players known offline 27% play people they first met online 23% play with friends & family from offline and online Games genres and ratings vary by age and gender Average rating of games is Teen 50% of boys play a game that is rated Mature or Adult Only Lenhart A., Kahne J., Middaugh E., Macgill A., Evans C., & Vitak, J. (2008). Teens, Video Games, and Civics. Pew Internet & American Life Project.

19 Teens sharing more information: 2011 vs 2006 (photo of self, school name, city they live, address, cell phone number) 24% of teens now on Twitter (16% in 2011) Median teen has 300 Facebook friends, 79 followers on Twitter 60% of teen Facebook users keep their profile private 74% of teens have deleted people from their network or friends list Not concerned with third party access to their information Madden, M., Lenhart A., Cortesi, S., Gasser, U., Duggan, M., Smith, A., Beaton, M. (2013). Teens, Social Media, and Privacy. Pew Internet & American Life Project.

20 65% say they visit social networking sites several times a day (compared to 27% of teens with 150 friends or less) More likely to have a Twitter and Instagram account also Less likely to be friends with their parents or guardians More likely to friend people they ve never met in person More likely to include their phone number, picture of self, school name on their profile Madden, Lenhart, Cortesi, Gasser, Duggan, Smith, Beaton. (2013). Teens, Social Media, and Privacy. Pew Internet & American Life Project.

21 Social Networking - Teens Social Networks & Games Video Chat Downloads for Files

22 Ability to choose to leave page open to the public or set page to private Can be searched by name, age, location, etc Post text, pictures, share others posts 36% of year olds friend people they have never met in person 25% of year olds would do the same Madden, Lenhart, Cortesi, Gasser, Duggan, Smith, Beaton. (2013). Teens, Social Media, and Privacy. Pew Internet & American Life Project. Has private message feature Ability to check-in

23 Platform for enhancing photos and sharing across social media 13+ Age Rating Photos are public by default Confirm geo-tagging is off Launched by Facebook Now has Instagram Direct feature

24 64% of teens using Twitter say their Tweets are public. Although teens on Twitter also tend to have less followers than on other sites. Madden, Lenhart, Cortesi, Gasser, Duggan, Smith, Beaton. (2013). Teens, Social Media, and Privacy. Pew Internet & American Life Project. Microblogging social networking site Users can post brief 140 character tweets Tweets are public by default Ability to individually approve followers IF you keep tweets private Ability to add location

25 Video creation app where all videos are 6 seconds or less (launched by Twitter) Age Rating: 17+ Ability to limit followers, but followers could share your information with strangers Post own videos or revine by posting/sharing others videos

26 Messaging app for exchanging usergenerated photos Images last 1 to 10 seconds Age Rating: 13+ Ability to import friends SnapKidz for under 13 users

27 App based messaging Age Rating: 17+ Does not have messaging fees Kik available on all devices

28 Ability to ask other users questions (with anonymity) Age Rating: 13+

29

30 Relationship of Abuser to Child 1 Parent/Guardian 10% 27% 7% 3% 14% 15% 18% 3% 3% Other Relative Neighbor/Family Friend Babysitter/Coach Guardian's Partner Online Enticement Self-produced Human Trafficker Unknown to Child Abuser data based upon victim information submitted to NCMEC by law enforcement, as of December 31, The data represent the known relationships from 2,836 series (4,103 identified victims). 2. Online Enticement includes either (1) victims who met a perpetrator online and transmitted self-produced images or (2) victims and offenders who met online and then met offline, producing images. 3. Self-produced includes those victims who have produced and distributed images of themselves. 4. Human Trafficker includes victims of commercial trafficking. 5. Unknown to Child includes un-established relationships, i.e. photographers, child sex tourism, runaways, etc. National Center for Missing and Exploited Children, January 1, 2011.

31 Understand that children are at a greater risk from someone they know Learn about everyone your child encounters Discuss online and offline relationships with your child what relationships are appropriate Review Illinois Sex Offender Information: Report child sexual abuse (IL DCFS): (800)25-ABUSE or Report child pornography (IL OAG): illinoisicactip@atg.state.il.us reportchildporn@atg.state.il.us

32 Predators seek youths vulnerable to seduction, including those: with histories of sexual or physical abuse who post sexually provocative photos/video who talk about sex with unknown people online Wolak, J., Finkelhor D., Mitchell, & K. Ybarr, M. (2008, February-March). Online "Predators" and Their Victims: Myths, Realities and Implications for Prevention and Treatment. American Psychologist, pp

33 Sexual Solicitation & Approaches 1 in 7 youth received online requests to talk about sex, answer personal questions about sex or do something sexual (occasionally by other youth) Aggressive Sexual Solicitation 4% of youth asked to meet in person 4% of youth asked to take sexual pictures of themselves Unwanted Exposure to sexual material 34% of youth exposed Wolak, J. & Finkelhor, D. (2006). Online Victimization of Youth: Five Years Later. Alexandria, VA: National Center for Missing & Exploited Children. Wolak, Finkelhor, Mitchell. (2007). 1 in 7 Youth: The Statistics about Online Sexual Solicitations. Crimes against Children Research Center.

34 PROFILE CREATION Review Terms of Service Use of nickname Do not provide zip code Set profile settings to private Review profile image and others Review geo-location settings WHAT NOT TO SHARE First & last name Telephone numbers Street address Name of school Social security number Date of birth Itineraries Favorite locations Credit card information Images that identify you, your school, your location

35

36 Instant crowd Anonymity Don t have to face reaction/emotion/hurt Invincible

37 Basis actual or perceived race, color, religion, sex, national origin, ancestry age, marital status, physical or mental disability, military status, sexual orientation, gender-related identity or expression, unfavorable discharge from military service, association with a person or group with one or more of the aforementioned actual or perceived characteristics, or any other distinguishing characteristic. Forms harassment, threats, intimidation, stalking, physical violence, sexual harassment, sexual violence, theft, public humiliation, destruction of property, or retaliation for asserting or alleging an act of bullying 105 ILCS 5/

38 One in five teens say they were bullied in the past year. The most common occurrence was in-person bullying. Fewer than one in ten teens report being bullied by phone, text, or online. Lenhart A., Madden, M., Purcell K., Rainie, L., Smith, A. & Zickuhr, K. (2011). Teens, Kindness and Cruelty on Social Network Sites, Pew Internet & American Life Project.

39 16% 14% 12% 10% 8% 6% 4% 2% 0% Text Messaging Online Phone In Person (Older teens) Males Females Lenhart A., Madden, M., Purcell K., Rainie, L., Smith, A. & Zickuhr, K. (2011). Teens, Kindness and Cruelty on Social Network Sites, Pew Internet & American Life Project.

40 Establish rules offline or online, ability to inflict harm Make sure school has Internet Safety Educate your children Model appropriate technology usage Monitor your child s activities Use filtering and blocking software Look for warning signs Utilize an Internet/ Cell Phone Use Contract Cultivate and maintain open, candid communication Teach and reinforce positive morals and values Hinduja, S. & Patchin J.W. (2012). Preventing Cyberbullying Top Ten Tips for Parents Retrieved from

41 VICTIM Stops using computer/cell Nervous w/ or text Angry, depressed, frustrated Avoids discussions about the computer Abnormally withdrawn Decline in grades Ditching classes Avoids activities BULLY Switches screens Always uses the computer Gets upset when he/she cannot use the computer Laughing a lot while using the computer Avoids discussions about the computer Has multiple accounts Refuses to show screen Falling out with friends Hinduja, S. & Patchin J.W. (2005). Research summary: Cyberbullying victimization. Retrieved from

42 Provide support to child Run Internet searches on screen names Print out all incidents of cyberbullying Electronic evidence must be preserved Stop Block Tell -> Parent -Teacher - Law Enforcement Model Appropriate response to conflict -Assertive/Aggressive Model Tolerance

43

44 Common Sense Media. (2012). Social Media, Social Life: How Teens View Their Digital Lives. Retrieved from: 31% of social media users say they ve flirted with someone online that they wouldn t have flirted with in person Posting pictures online takes an emotional toll Will someone tag them in an unattractive photos? How do they look in photos? Will someone comment on or like the photos they post? Should they edit photos before posting?

45 EXPERIMENTAL Romantic Within an established relationship Sexual Attention Seeking Create romantic interest Other Attention-seeking AGGRAVATED Intent to Harm Extortion, threats No consent in creation/sending Reckless Misuse Malicious conduct Wolak, J. & Finkelhor, D. (2011). Sexting: A Typology, University of New Hampshire, Crimes Against Children Research Center.

46 9.6% of teens reported creating nude or nearly nude images or receiving such images 2.5% created or appeared in photos 1.8 % created image themselves 0.3 % someone else created 0.4 % created for someone else Girls > Boys 7.1% received them but did not create/appear Mitchell, K., Finkelhor, D., Jones, Lisa, & Wolak, J. (2012, January). Prevalence and Characteristics of Youth Sexting: A National Study. PEDIATRICS.

47

48 Downloading files without paying the producermusic, games, movies Using File-Sharing Networks Sharing your files for free or a fee to you Downloading files others shared for free or a fee to them Burning CDs or DVDs for others (even if you paid for them)

49 Sharing files online movies, music, games, software through a network of computers running the same program has gained popularity among teens Additional Risks Download disturbing content Computer viruses

50 was the bully/cyberbully? took inappropriate pictures/videos of themselves? Received from a friend? Received from a stranger/adult? was pirating music/movies/etc? created SNS accounts when they are underage? Lied about their age online? Or created a fake account? Was chatting with someone they met online?

51

52

53 Netsmartz411.org Commonsensemedia.org Bewebsmart.com Ikeepsafe.org Cyberbullying.us

54 Melissa Hemzacek, LSW

Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW

Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW Most parents report having a safety conversations with their children regarding online safety

More information

Internet Safety Fact Sheet Facts about Social Networking:

Internet Safety Fact Sheet Facts about Social Networking: Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

Current Internet Facts

Current Internet Facts Current Internet Facts Facts about Online Predators and Strangers online: Twenty-eight percent of tweens (ages 8 to 12) have been contacted over the Internet by someone they don t know (COX Tween Internet

More information

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual

More information

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for

More information

Youth Online Behavior

Youth Online Behavior Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com PARENTING IN THE DIGITAL AGE Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com Teens and Technology Use 78% have a cell phone 95% use the Internet 91% have an email address 74% access the

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

Empowering young people to be safe on the Internet. Information for parents, teachers and community members

Empowering young people to be safe on the Internet. Information for parents, teachers and community members Empowering young people to be safe on the Internet Information for parents, teachers and community members Empowering parents, teachers, & community members!! IBM is providing the following information

More information

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain

More information

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences

More information

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents June 2012 The Digital Divide: How the Online Behavior of Teens is Getting Past Parents Parent Disconnect Despite the obvious disconnect between teens online behaviors and parents knowledge of them, parents

More information

Counselors Guidelines for the Healthy Development of Youth in the Digital Age

Counselors Guidelines for the Healthy Development of Youth in the Digital Age Suggested APA style reference information can be found at http://www.counseling.org/library/ Article 40 Counselors Guidelines for the Healthy Development of Youth in the Digital Age Lakitta D. Johnson

More information

Social Media Guidelines Resource

Social Media Guidelines Resource Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Today s teens use technology more than ever. Most have

Today s teens use technology more than ever. Most have Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social

More information

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 ) Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.

More information

2014 Teen Internet Safety Survey. Conducted by The Futures Company

2014 Teen Internet Safety Survey. Conducted by The Futures Company 2014 Teen Internet Safety Survey Conducted by The Futures Company Contents Background, Objectives, Methodology Major Findings Important Trends Next Steps 2 Background + Objectives Cox s commitment to Online

More information

Teens, Online Stranger Contact and Cyberbullying What the research is telling us

Teens, Online Stranger Contact and Cyberbullying What the research is telling us Teens, Online Stranger Contact and Cyberbullying What the research is telling us Amanda Lenhart Internet Safety Task Force April 30, 2008 Washington, DC Methodology Interviewed 700 parent-child pairs in

More information

Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online

Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online Research Conducted By: Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online [ photo here The Teen Online Identity Generation Theft Gap November November 20132012

More information

ONLINE PREDATORS & PREDATORS

ONLINE PREDATORS & PREDATORS the myths and realities of ONLINE PREDATORS & PREDATORS Center For Child Advocacy Sixth Annual National Conference Crimes Against Children: The Multiple Faces of Child Victimization Joseph Hanley B.A.

More information

Teen Online & Wireless Safety Survey

Teen Online & Wireless Safety Survey Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications kimberly.thomas@cox.com 404-269-8057 Cox Communications

More information

Guideline on Windows 7 Parental Controls

Guideline on Windows 7 Parental Controls CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius

More information

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone? SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2 Online Safety Handbook for Students and Parents 2014 Table of Contents Table of Contents... 2 Overview of Program... 2 Aims... 2 Relevant Technology... 3 Appropriate Online Conduct... 3 Online Responsibilities...

More information

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary

More information

Executive Summary Key Findings

Executive Summary Key Findings Executive Summary Key Findings What does online life look like for the average young Canadian? First and foremost, these are highly connected children and teens, most of who are accustomed to online access

More information

Cyberbullying: What Parents Can Do to Protect Their Children

Cyberbullying: What Parents Can Do to Protect Their Children Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,

More information

Online Safety How to Protect Yourself and Your Family

Online Safety How to Protect Yourself and Your Family Online Safety How to Protect Yourself and Your Family Introduction Surfing the internet can be a very positive experience, it opens up a world of possibilities for everyone, expanding our horizons by exposing

More information

Be it enacted by the People of the State of Illinois,

Be it enacted by the People of the State of Illinois, AN ACT concerning education. Be it enacted by the People of the State of Illinois, represented in the General Assembly: Section 5. The School Code is amended by changing Section 27-23.7 as follows: (105

More information

Back Cover. Copyright 2006, 2009, and 2011 National Center for Missing & Exploited Children. All rights reserved.

Back Cover. Copyright 2006, 2009, and 2011 National Center for Missing & Exploited Children. All rights reserved. 1 2 3 5 6 7 8 9 10 12 Back Cover Where Do Kids Connect? Browsing the Internet Social Networking Using E-Mail Instant Messaging Cell Phones/ Wireless Devices and Texting Posting Videos and Photos Online

More information

i-safe America Internet Safety Tips for Parents

i-safe America Internet Safety Tips for Parents i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

Teacher Guide TEEN SAFETY

Teacher Guide TEEN SAFETY The Vulnerable Teacher Guide TEEN SAFETY This companion to the online course provides questions and topics for classroom discussion and activities. 2012 ShieldTheVulnerable.org 1277 Treat Blvd #530 Walnut

More information

Living Online: Using Technology Wisely Lesson. Guide

Living Online: Using Technology Wisely Lesson. Guide Living Online: Using Technology Wisely Lesson Guide Target Audience Adolescents 11-14 Time Entire program 1 hour, depending on discussion Program Objectives Ways to portray a positive image online How

More information

The Online Generation Gap. Contrasting attitudes and behaviors of parents and teens

The Online Generation Gap. Contrasting attitudes and behaviors of parents and teens The Online Generation Gap Contrasting attitudes and behaviors of parents and teens The Online Generation Gap: Contrasting attitudes and behaviors of parents and teens Submitted to: The Family Online Safety

More information

Cyberbullying, Sexting & Predators Oh My!

Cyberbullying, Sexting & Predators Oh My! Cyberbullying, Sexting & Predators Oh My! Addressing Youth Risk in the Digital Age in a Positive and Restorative Manner Nancy Willard Center for Safe and Responsible Internet Use Cyber Savvy Cyber Savvy

More information

HOW TO STAY SAFE. Smartphones

HOW TO STAY SAFE. Smartphones HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these

More information

www.xxxchurch.com Online Predators & Strangers

www.xxxchurch.com Online Predators & Strangers www.xxxchurch.com Online Predators & Strangers When children go online, they have direct access to their friends and family members, but they also may come into contact with complete strangers. Through

More information

Teen Online Safety & Digital Reputation Survey

Teen Online Safety & Digital Reputation Survey Teen Online Safety & Digital Reputation Survey Cox Communications Teen Online Safety & Digital Reputation Survey in Partnership with the National Center for Missing & Exploited Children (NCMEC) (Fielded

More information

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

More information

The webcast will begin shortly. Please stand by.

The webcast will begin shortly. Please stand by. The webcast will begin shortly. Please stand by. @Gaggle_K12 Making Student Safety A Priority @Gaggle_K12 Webcast Tips ü To switch from computer audio to your phone, locate the Audio Pane, select Use Telephone

More information

e-rate toolkit Cyberbullying: Crossing the Line

e-rate toolkit Cyberbullying: Crossing the Line e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages. Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications

More information

FIRBANK GRAMMAR SCHOOL

FIRBANK GRAMMAR SCHOOL FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...

More information

Chapter 3. Online Bullying

Chapter 3. Online Bullying Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.

More information

Staying Safe Online. A Practical Guide for Parents and Children.

Staying Safe Online. A Practical Guide for Parents and Children. Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively

More information

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities

More information

Are Social Networking Sites a Source of Online Harassment for Teens? Evidence from Survey Data

Are Social Networking Sites a Source of Online Harassment for Teens? Evidence from Survey Data Are Social Networking Sites a Source of Online Harassment for Teens? Evidence from Survey Data Anirban Sengupta 1 Anoshua Chaudhuri 2 Abstract Media reports on incidences of abuse on the internet, particularly

More information

Chicago Public Schools Policy Manual

Chicago Public Schools Policy Manual Chicago Public Schools Policy Manual Title: ANTI-BULLYING POLICY Section: 705.5A Board Report: 14-0625-PO1 Date Adopted: June 25, 2014 Policy: ANTI-BULLYING POLICY Purpose The Illinois General Assembly

More information

School Policy Regarding Computer Use, Technology and Internet Access

School Policy Regarding Computer Use, Technology and Internet Access School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school

More information

Back Cover. Copyright 2006 and 2009 National Center for Missing & Exploited Children. All rights reserved.

Back Cover. Copyright 2006 and 2009 National Center for Missing & Exploited Children. All rights reserved. 1 2 3 4 5 7 8 9 10 12 Back Cover Where Do Kids Connect? Browsing the Internet Using E-mail Instant Messaging Social Networking Cellular Telephones/ Wireless Devices and Texting Posting Videos and Photographs

More information

Internet Safety Guidelines

Internet Safety Guidelines Internet Safety Guidelines Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or search for an Internet safety pledge you like. The pledge can

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

National Cybersecurity Awareness Campaign Families Presentation

National Cybersecurity Awareness Campaign Families Presentation National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security

More information

e-safety for Parents

e-safety for Parents e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology

More information

Comments made online may be misinterpreted by both receivers and third-parties, which may affect the determination of prevalence of cyberbullying.

Comments made online may be misinterpreted by both receivers and third-parties, which may affect the determination of prevalence of cyberbullying. Chapter 7 summaries Cyberbullying definitions and prevalence Many definitions have been offered for cyberbullying. Several of these definitions explicitly or implicitly indicate that the bullying behaviour

More information

E-Safety Awareness. Parents and Carers

E-Safety Awareness. Parents and Carers E-Safety Awareness Parents and Carers Bullying online by people in my school year has left me with significant mental health issues for which I am now on medication and in therapy for. So it s really damaged

More information

BERKELEY COLLEGE Equal Opportunity Policy

BERKELEY COLLEGE Equal Opportunity Policy BERKELEY COLLEGE Equal Opportunity Policy Purpose Recognizing that its diversity greatly enhances the workplace and opportunities for learning, Berkeley is firmly committed to providing all associates,

More information

Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices

Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices Office of the Attorney General of Virginia Sexting Protecting Yourself on the Internet and Mobile Devices Websites Often Used for Social Networking Monthly Visitors to Social Networking Sites 1. 750,000,000

More information

Safety Tips for Social Networking

Safety Tips for Social Networking Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and

More information

Girls & Cyber- bullying

Girls & Cyber- bullying MARC Research Results First Report March, 2010 Girls & Cyber- bullying Elizabeth K. Englander, Ph.D. Director, Massachusetts Aggression Reduction Center Bridgewater State University Bridgewater, Massachusetts

More information

September 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9

September 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9 Cyber-bullying The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside school. Cyber-bullying is a different form of

More information

Cyber-bullying. Cyber-bullying: A Digital Epidemic White Paper

Cyber-bullying. Cyber-bullying: A Digital Epidemic White Paper Cyber-bullying Cyber-bullying: A Digital Epidemic White Paper What is Cyber-bullying? The past two decades have witnessed a virtual explosion in new technology that has been eagerly embraced by adolescents

More information

SOCIAL NETWORKING SITES

SOCIAL NETWORKING SITES YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,

More information

HIGH SCHOOL FOR RECORDING ARTS

HIGH SCHOOL FOR RECORDING ARTS Adopted Revised High School for Recording Arts Bullying Prohibition Policy 1. Purpose Students have the right to be safe and free from threatening situations on school property and at school activities

More information

Chapter 10. Teens and Technology

Chapter 10. Teens and Technology Chapter 1. Teens and Technology As most people would predict, teens in today s world use technology often. In fact, understanding how to use technology and computers is a fundamental skill for youth to

More information

UNSUPERVISED AND ONLINE

UNSUPERVISED AND ONLINE UNSUPERVISED AND ONLINE Effective Identification of Negative Online Behavior and Strategies for Creating a Family Prevention Plan Follow us on: Contact us at: notmykid.org info@notmykid.org 602.652.0163

More information

Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12

Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Essential Question: What are the risks and responsibilities when you share online in a relationship? How can you respect

More information

Protect Your Privacy Online

Protect Your Privacy Online Protect Your Privacy Online By Kathiann M. Kowalski Keep personal information private for your own good! High school sophomore Karra H. never expected to see herself on a Web site featuring scantily clad

More information

Like, post, share: Young Australians experience of social media

Like, post, share: Young Australians experience of social media Like, post, share: Young Australians experience of social media Quantitative research report prepared for the Australian Communications and Media Authority 2013 CONTENTS EXECUTIVE SUMMARY 6 1.1 RESEARCH

More information

Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force

Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Crimes Against Children Unit SECTIONS CPU ICAC DFU WVMCC WV3C Crimes Against Children Unit WVSP Organizational Change December 1, 2009

More information

Cyberbullying. Welcome!

Cyberbullying. Welcome! Cyberbullying Welcome! In this tutorial, we will introduce information about cyberbullying including what it is, how it happens, technology issues related to it, and what can you do about it. We will also

More information

Techno-Panic & 21st Century Education:

Techno-Panic & 21st Century Education: Techno-Panic & 21st Century Education: Make Sure Internet Safety Messaging Does Not Undermine Education for the Future Nancy Willard, M.S., J.D. Center for Safe and Responsible Internet Use Trying to prepare

More information

Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself

More information

Computer Facilities and External Networks Acceptable Use by Students

Computer Facilities and External Networks Acceptable Use by Students Related Policies Copyright Media Usage Offshore Data Hosting Privacy Web Publishing Purpose Policy Computer facilities and external networks are made available as resources for use by students in Catholic

More information

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

More information

Under the Start Your Search Now box, you may search by author, title and key words.

Under the Start Your Search Now box, you may search by author, title and key words. VISTAS Online VISTAS Online is an innovative publication produced for the American Counseling Association by Dr. Garry R. Walz and Dr. Jeanne C. Bleuer of Counseling Outfitters, LLC. Its purpose is to

More information

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.] 1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.

More information

By Shanthi Balraj Ambigapathy Pandian Mohammed Zin Nordin Sumetha Nagalingam Julina Ismail

By Shanthi Balraj Ambigapathy Pandian Mohammed Zin Nordin Sumetha Nagalingam Julina Ismail By Shanthi Balraj Ambigapathy Pandian Mohammed Zin Nordin Sumetha Nagalingam Julina Ismail Introduction New Media Landscape New Media Culture Contributes to New Meanings, Messages, Norms, Values, Interactions

More information

Internet Safety & Awareness. Dan Tomlinson 02/23/2013

Internet Safety & Awareness. Dan Tomlinson 02/23/2013 Internet Safety & Awareness Dan Tomlinson 02/23/2013 Internet risks Top six tips for online safety What to do if there is a problem Online safety resources Internet Risks Primary Threats to your Computer

More information

National Cybersecurity Awareness Campaign. Kids Presentation

National Cybersecurity Awareness Campaign. Kids Presentation National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help

More information

Sonia Livingstone, LSE

Sonia Livingstone, LSE Contextualising cyberbullying in relation to other online risks of harm to children Sonia Livingstone, LSE Presentation to the International Conference on Cyberbullying, COST IS0801, Sorbonne, Paris, 29

More information

Guidelines for Preventing and Dealing with Bullying Issues

Guidelines for Preventing and Dealing with Bullying Issues Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.

More information

How To Avoid The Identity Theft Predators

How To Avoid The Identity Theft Predators Camp Watwuzithinkin How To Avoid The Identity Theft Predators Predator 0 An organism that lives by preying on other organisms Identity Thief 0 A person who makes a living by preying on other people Outsmart

More information

Parent Guide to Cyber bullying and Cyber threats

Parent Guide to Cyber bullying and Cyber threats School Address: 4450 S Mendenhall Rd Memphis, TN 38141 Tel: (901) 367 7814 Fax: (901) 367 7816 www.sememphis.org MEMPHIS SCHOOL OF EXCELLENCE Parent Guide to Cyber bullying and Cyber threats Young people

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

IMPACT OF SOCIAL NETWORKING SITES (SNS) ON THE YOUTH

IMPACT OF SOCIAL NETWORKING SITES (SNS) ON THE YOUTH IMPACT OF SOCIAL NETWORKING SITES (SNS) ON THE YOUTH Ms. Shabnam S. Mahat Assistant Professor Department of Computer Applications Bharati Vidyapeeth Deemed University, IMRDA, Sangli. Dr. S. D. Mundhe Director,

More information

NUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE JULY 16, 2015 MEDIA CONTACT FOR THIS REPORT: Dana Page, Communications Manager

NUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE JULY 16, 2015 MEDIA CONTACT FOR THIS REPORT: Dana Page, Communications Manager NUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE JULY 16, 2015 MEDIA CONTACT FOR THIS REPORT: Dana Page, Communications Manager 202.419.4372 RECOMMENDED CITATION: Duggan, M., Lenhart, A., Lampe,

More information

Whether it happens at school or off-campus, cyberbullying disrupts and affects all aspects of students lives.

Whether it happens at school or off-campus, cyberbullying disrupts and affects all aspects of students lives. Cyberbullying Whether it happens at school or off-campus, cyberbullying disrupts and affects all aspects of students lives. By Ted Feinberg and Nicole Robey Ted Feinberg is the assistant executive director

More information

The Digital Life of Teens

The Digital Life of Teens The Digital Life of Teens Trends, Concerns, and Impacts Yoon Hyung Choi Amanda Purington Main Themes Digital Media Usage and Access How do teens and tweens access digital media? What do they do online?

More information