SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Downloaden Sie, um offline zu lesen
Adolescent Mobile
     Safety:




Not a LOL-ing Matter
             Image from http://www.dailymail.co.uk
The
Digital Native Generation is
      at a higher risk




                 Image by Cristobal Cobo Romani
87 percent of
children aged
4-16 either
owned or had
access to a mobile
phone




                     Source: Schools Should Teach Kids Phone Safety
                                            Image by Lynell Bumark
60 percent of children take their
mobile phones to school some or
         all of the time




               Source: Schools Should Teach Kids Phone Safety
                                        Image by Jason Ohler
43 per cent of children
have internet access on
  their mobile phones




           Source: Schools Should Teach Kids Phone Safety
                                      Image by Digitpedia
There is a rising
demand for
mobile Apps for
children ages 18
months to 2
years of age!




                    Source: iPhone Apps a Hit with Preschoolers
                                         Image by David Boyle
The 5 principal dangers of mobile
     technology to children:


   1.  Data Theft
   2.  Malicious Software
   3.  Cyberbullying
   4.  Inappropriate Content
   5.  Predators



                       Source: Living With Technology, Keep Your Kids
                                                          Safe Online
                                                     Image by Arty R
Data Theft


Stolen
passwords,
addresses, Social
Security numbers,
credit card
numbers, and
other ïŹnancial
information         Source: Living With Technology,
                        Keep Your Kids Safe Online
                             Image by Lonnie Davis
Malicious Software


 Aka “Malware”- adware,
spyware, viruses, phishing
          scams



        Source: Living With Technology, Keep Your Kids Safe Online
                                            Image by James Burke
Inappropriate Content




Includes
pornography,                                      S

content focused
on violence, hate
propaganda

                    Source: Living With Technology,
                        Keep Your Kids Safe Online
                          Image by Justin Shattuck
79% of youth
inadvertent
exposure to
pornography
occurs in the
home


                Source: Enough is Enough- Protecting our
                                        Children Online
                                  Image by Anthony Kelly
Predators




 In chat rooms, text messaging,
   social networking cites etc


              Source: Living With Technology, Keep Your Kids Safe Online
16 percent of
teens considered
          meeting
 someone they've
   only talked to
           online


 Source: Enough is Enough- Protecting our
                          Children Online
                    Image by Christelle FV
Cyber-bullying
“The intentional
harm,
mistreatment,
embarrassment
or slander of
another via
electronic
media”.
                   Source: Canadian Cellular Forensics
                                Image by Pressmanwill
Approximately 26 percent of
adolescent girls will be the
 victims of Cyber-bullying




                 Source: Canadian Cellular Forensics
While approximately 16 percent of
  boys will become victims of
          cyber-bullying




                    Souce: Canadian Cellular Forensics
As many as 43 percent of
students have admitted to being
 the victim of cyber-bullying at
           least once.




                   Source: Canadian Cellular Forensics
HOWEVER



Only 21 percent of
girls and 18
percent of boys
will report this
Cyber-bullying


                     Source: Canadian Cellular Forensics
                                   Image Katy Gothorp
Indications of Victims of
     Cyber-bullying

1) anger, frustration, fear and/or
    sadness after using their cell
         phone or computer




                    Source: Canadian Cellular Forensics
                               Image by Alexander Meas
2) more
inhibited and
avoids friends
and activities
that they
formerly
relished




                 Source: Canadian Cellular Forensics
                              Image by Claire Gibbs
3) Plummeting
grades, cutting
school or other
signs of
depression
!

                  Source: Canadian Cellular Forensics
How can the
  generation of
digital natives be
 protected from
 these dangers?


                Image by Quoin Monkey
                !
9 out of 10 parents believe their
  kids should be taught about
mobile phone and internet safety
           in school




               Source: Schools Should Teach Kids Phone Safety
                                   Image by Antonio Zugaldia
The eSmart System

An interactive system designed to
  help instigate policies around
 mobile phones and the internet,
 and set up safe procedures for
  reporting incidents of cyber-
              bullying



               Source: Schools Should Teach Kids Phone Safety
                                                    Image by
Source: www.mymobilewatchdog.com
Check out all of the social
networks that your child is
     registered with.!




                     Image by Lorna Traynor
Monitor all emails and text
messages sent and received by
         your child.




                       Image by Keith Ramsey
The responsibility of ensuring
adolescent mobile safety falls on
     both parents and schools.
Vigilance and preventative action
 are key components in ensuring
   the well-being of the digital
         native generation.


                           Image by James Roe
Works Cited
Dolcourt, Jessica. "Living with Technology: Keep Your Kids Safe Online: Top 5
    Internet Dangers for Kids - CNET.com.” Product Reviews and Prices,
    Software Downloads, and Tech News - CNET. Web. 20 May 2011. <http:/   /
    www.cnet.com/4520-13384_1-6721368-1.html>.

Enough Is Enough: Protecting Our Children Online. Web. 20 May 2011.
    <http:// enough.org/inside.php?id=2UXKJWRY8>.

Ferguson, Rob. "IPhone Apps a Hit with Preschoolers." The Star. Torstar
    Syndication Services, 07 Feb. 2011. Web. 15 May 2011.

"Need Help with Cyber Bullying." Canadian Cellular Forensics. Anadian
    Cellular Forensics Corp., 2010. Web. 15 May 2011. <http://www.cellular-
    forensics.ca/cyber%20bullying.html>.

"Schools Should Teach Kids Phone Safety." Australian and World News - Main
    Stories - Ninemsn News. Web. 20 May 2011. <http://news.ninemsn.com.au/
    national/8211585/schools-should-teach-kids-phone-safety>"
!

Weitere Àhnliche Inhalte

Was ist angesagt?

East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
Synopsis of children’s consumer protection issues in kenya by daniel asher (c...
Synopsis of children’s consumer protection issues in kenya by daniel asher (c...Synopsis of children’s consumer protection issues in kenya by daniel asher (c...
Synopsis of children’s consumer protection issues in kenya by daniel asher (c...Daniel Asher
 
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Larry Magid
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and schoolGrant Ward
 
Social networks
Social networksSocial networks
Social networksdrlizmike
 
Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatRaudhat-Rahma Shittu-Agbetola
 
ISC Presentation
ISC PresentationISC Presentation
ISC PresentationChad Landman
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011DHE2008
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0Anne Collier
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in EducationMonica Martinez
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspectiveConnectSafely
 
Being SMART about Internet Safety
Being SMART about Internet SafetyBeing SMART about Internet Safety
Being SMART about Internet SafetyErica Roberts
 
Life in the_digital_world
Life in the_digital_worldLife in the_digital_world
Life in the_digital_worldMaria Petropulos
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parentsAl Rowell
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011KanelandSvihlik
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safetyConnectSafely
 
Parenting in a Digital World
Parenting in a Digital WorldParenting in a Digital World
Parenting in a Digital WorldSugar563
 
Digital drama
Digital dramaDigital drama
Digital dramaktcole
 

Was ist angesagt? (20)

East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Synopsis of children’s consumer protection issues in kenya by daniel asher (c...
Synopsis of children’s consumer protection issues in kenya by daniel asher (c...Synopsis of children’s consumer protection issues in kenya by daniel asher (c...
Synopsis of children’s consumer protection issues in kenya by daniel asher (c...
 
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
 
Social networks
Social networksSocial networks
Social networks
 
Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhat
 
ISC Presentation
ISC PresentationISC Presentation
ISC Presentation
 
NSBA2010
NSBA2010NSBA2010
NSBA2010
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in Education
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
Being SMART about Internet Safety
Being SMART about Internet SafetyBeing SMART about Internet Safety
Being SMART about Internet Safety
 
Life in the_digital_world
Life in the_digital_worldLife in the_digital_world
Life in the_digital_world
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parents
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
 
Parenting in a Digital World
Parenting in a Digital WorldParenting in a Digital World
Parenting in a Digital World
 
Digital drama
Digital dramaDigital drama
Digital drama
 

Ähnlich wie Adolescent Mobile Safety: Not a LOL-ing Matter

KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training PresentationOCTF Industry Engagement
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationjpl17
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Larry Magid
 
6 Ways To Remain Cybersafe
6 Ways To Remain Cybersafe6 Ways To Remain Cybersafe
6 Ways To Remain CybersafeYour eKavach
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementaryemilyensign
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overviewJohn Woodring
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Larry Magid
 
International comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youthInternational comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youthThinkB4UClick
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against childrenAnchalanshri Dixit
 
CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2Anchalanshri Dixit
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 

Ähnlich wie Adolescent Mobile Safety: Not a LOL-ing Matter (20)

KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...
 
6 Ways To Remain Cybersafe
6 Ways To Remain Cybersafe6 Ways To Remain Cybersafe
6 Ways To Remain Cybersafe
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
International comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youthInternational comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youth
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 

KĂŒrzlich hochgeladen

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...gurkirankumar98700
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

KĂŒrzlich hochgeladen (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Adolescent Mobile Safety: Not a LOL-ing Matter

  • 1. Adolescent Mobile Safety: Not a LOL-ing Matter Image from http://www.dailymail.co.uk
  • 2. The Digital Native Generation is at a higher risk Image by Cristobal Cobo Romani
  • 3. 87 percent of children aged 4-16 either owned or had access to a mobile phone Source: Schools Should Teach Kids Phone Safety Image by Lynell Bumark
  • 4. 60 percent of children take their mobile phones to school some or all of the time Source: Schools Should Teach Kids Phone Safety Image by Jason Ohler
  • 5. 43 per cent of children have internet access on their mobile phones Source: Schools Should Teach Kids Phone Safety Image by Digitpedia
  • 6. There is a rising demand for mobile Apps for children ages 18 months to 2 years of age! Source: iPhone Apps a Hit with Preschoolers Image by David Boyle
  • 7. The 5 principal dangers of mobile technology to children: 1.  Data Theft 2.  Malicious Software 3.  Cyberbullying 4.  Inappropriate Content 5.  Predators Source: Living With Technology, Keep Your Kids Safe Online Image by Arty R
  • 8. Data Theft Stolen passwords, addresses, Social Security numbers, credit card numbers, and other ïŹnancial information Source: Living With Technology, Keep Your Kids Safe Online Image by Lonnie Davis
  • 9. Malicious Software Aka “Malware”- adware, spyware, viruses, phishing scams Source: Living With Technology, Keep Your Kids Safe Online Image by James Burke
  • 10. Inappropriate Content Includes pornography, S content focused on violence, hate propaganda Source: Living With Technology, Keep Your Kids Safe Online Image by Justin Shattuck
  • 11. 79% of youth inadvertent exposure to pornography occurs in the home Source: Enough is Enough- Protecting our Children Online Image by Anthony Kelly
  • 12. Predators In chat rooms, text messaging, social networking cites etc Source: Living With Technology, Keep Your Kids Safe Online
  • 13. 16 percent of teens considered meeting someone they've only talked to online Source: Enough is Enough- Protecting our Children Online Image by Christelle FV
  • 14. Cyber-bullying “The intentional harm, mistreatment, embarrassment or slander of another via electronic media”. Source: Canadian Cellular Forensics Image by Pressmanwill
  • 15. Approximately 26 percent of adolescent girls will be the victims of Cyber-bullying Source: Canadian Cellular Forensics
  • 16. While approximately 16 percent of boys will become victims of cyber-bullying Souce: Canadian Cellular Forensics
  • 17. As many as 43 percent of students have admitted to being the victim of cyber-bullying at least once. Source: Canadian Cellular Forensics
  • 18. HOWEVER
 Only 21 percent of girls and 18 percent of boys will report this Cyber-bullying Source: Canadian Cellular Forensics Image Katy Gothorp
  • 19. Indications of Victims of Cyber-bullying 1) anger, frustration, fear and/or sadness after using their cell phone or computer Source: Canadian Cellular Forensics Image by Alexander Meas
  • 20. 2) more inhibited and avoids friends and activities that they formerly relished Source: Canadian Cellular Forensics Image by Claire Gibbs
  • 21. 3) Plummeting grades, cutting school or other signs of depression ! Source: Canadian Cellular Forensics
  • 22. How can the generation of digital natives be protected from these dangers? Image by Quoin Monkey !
  • 23. 9 out of 10 parents believe their kids should be taught about mobile phone and internet safety in school Source: Schools Should Teach Kids Phone Safety Image by Antonio Zugaldia
  • 24. The eSmart System An interactive system designed to help instigate policies around mobile phones and the internet, and set up safe procedures for reporting incidents of cyber- bullying Source: Schools Should Teach Kids Phone Safety Image by
  • 26. Check out all of the social networks that your child is registered with.! Image by Lorna Traynor
  • 27.
  • 28. Monitor all emails and text messages sent and received by your child. Image by Keith Ramsey
  • 29. The responsibility of ensuring adolescent mobile safety falls on both parents and schools. Vigilance and preventative action are key components in ensuring the well-being of the digital native generation. Image by James Roe
  • 30. Works Cited Dolcourt, Jessica. "Living with Technology: Keep Your Kids Safe Online: Top 5 Internet Dangers for Kids - CNET.com.” Product Reviews and Prices, Software Downloads, and Tech News - CNET. Web. 20 May 2011. <http:/ / www.cnet.com/4520-13384_1-6721368-1.html>. Enough Is Enough: Protecting Our Children Online. Web. 20 May 2011. <http:// enough.org/inside.php?id=2UXKJWRY8>. Ferguson, Rob. "IPhone Apps a Hit with Preschoolers." The Star. Torstar Syndication Services, 07 Feb. 2011. Web. 15 May 2011. "Need Help with Cyber Bullying." Canadian Cellular Forensics. Anadian Cellular Forensics Corp., 2010. Web. 15 May 2011. <http://www.cellular- forensics.ca/cyber%20bullying.html>. "Schools Should Teach Kids Phone Safety." Australian and World News - Main Stories - Ninemsn News. Web. 20 May 2011. <http://news.ninemsn.com.au/ national/8211585/schools-should-teach-kids-phone-safety>" !