This document provides information on social networking sites like Facebook, including tips for safe usage. It discusses features of sites like Facebook, YouTube, and Twitter. It also covers topics like cyberbullying, online privacy and safety tips for teens. Recommendations are given for creating secure usernames and passwords. The document aims to help demystify social media and networking sites while promoting their safe and responsible use.
5. What is Web 2.0?
• Web as platform (Face Your Manga)
• Collective intelligence (YouTube)
• Data driven (Online Summer Reading)
• Everything is in beta (meebo)
• Simple programming (Facebook)
• Cross platform (Twitter)
• Rich user experience (Club Penguin,
Cartoon Network Game Creator)
6. What is Social Software?
ajax.phpmagazine.net/2006/02/great_collection_of_web_20_log.html
7. Social Software
Assumptions
• Everything is meant to be shared
(“public” is the default)
• Everything is meant to be critiqued
(commenting “ON” is the default)
• Everything is meant to be remixed
(Creative Commons licensing is the default)
8. How do you feel about
Social Networking sites?
“Libraries cannot afford to ignore the social
networking potential to attract new,
younger and more technologically
interested customers.” "It's where the patrons are so we need to be
visible to them-marketing, information and
building community online. Not all patrons
have to walk through the door. We can
make connections with and serve online
those patrons who, for whatever reason,
won't be physically in the library."
“At this time we feel the
drawbacks outweigh
the benefits."
“not sure--need more info"
9. Why are Social Networks
so popular?
• It’s all about ME!
• Customizable
• Social
• Developmental Assets
10. Developmental Assets
• Support
• Empowerment
• Boundaries & Expectations
• Constructive Use of Time
• Commitment to Learn
• Positive Values
• Social Competencies
• Positive Identity
The Search Institute. 40 Developmental Assets of Adolescents/Middle Childhood/Early Childhood.
http://search-institute.org
12. Gamers
• Risk-takers
• Social
• Competitive
• Global
• Technical
Beck, John & Mitchell Wade. The Kids are Alright. Harvard Business School Press, 2007.
http://www.nslg.net/gotgamebook/index.html
18. Tips for Parents & Guardians
• Begin a dialogue with your kids about safe Internet use and
supervise their online activities
• Consider rating, blocking, monitoring, and filtering
applications for your computer
• Make Internet use a family activity
• Encourage your kids’ critical-thinking skills
• Set reasonable rules for going online
• Encourage your kids to tell you when they encounter
problems online
• If they come across lewd, obscene, or illegal material or if
they are contacted by someone who attempts to engage
them in sexual conversation, make a report to NCMEC’s
CyberTipline at www.cybertipline.com or 1-800-843-5678
http://www.missingkids.com/missingkids/servlet/PageServlet?LanguageCountry=en_US&PageId=
19. When Creating a Username,
DO Use…
• Something original and creative
• A nickname
• A character's name
• A name that references a
favorite band, animal, food, hobby...
20. When Creating a Username,
DON’T use
• Your real first or last name
Your age
Your phone number
Your zip code or location
A suggestive name or word
Pornographic or obscene words
Derogatory terms
21. Password Tips
• Choose passwords that are:
– At least 6 to 8 characters
– Combinations of letters and numbers
– Personally meaningful for easy
remembering
– Not obvious to the rest of the world
– Former address is a good one to try!
• Use a password generator for help
• Write the password down and store in
a safe place
22. Web As Platform:
Face Your Manga
• Create a digital
representation of
yourself
• Use in a variety of
applications
Face Your Manga
http://www.faceyourmanga.com
23. Face Your Manga: Uses
• Contest: create a
personal
• Contest: create a
celebrity, author,
character…
• Internet safety
session
Face Your Manga
http://www.faceyourmanga.com
31. Cross Platform:
Twitter
• Record what you are
reading, viewing,
doing, thinking
• Connect with friends
and colleagues to
share information
Twitter
http://www.twitter.com
32. Rich User Experience:
Club Penguin
• Avatar creation
• Games
• Chat
Club Penguin
http://www.clubpenguin.com/
34. Game Design
• Ben 10 Alien Force Game Creator
– http://gamecreator.cartoonnetwork.com/
35. Light Programming
Facebook
• Status Updates
• Instant Messaging
• Email
• Social Networking
• Affinity Groups
• Applications – Games!
“Facebook helps you connect and share
with the people in your life.”
43. Facebook Etiquette
• Create a friending policy for yourself
• Use filters
• It’s okay to not use Applications or block them
• Reply within 24-48 hours if possible
• Etiquette article:
http://www.pcworld.com/article/169120/faceb
ook_etiquette_10_rules_for_better_socializin
g.html
44. Click Friends, then Edit Friends…
Then Create list and move
individuals to appropriate category
Methods: Generation M2: Media in the Lives of 8- to 18-Year-Olds is the third in a series of large-scale, nationally representative surveys by the Foundation about young people’s media use. The report is based on a survey conducted between October 2008 and May 2009 among a nationally representative sample of 2,002 3rd-12th grade students ages 8-18, including a self-selected subsample of 702 respondents who completed seven-day media use diaries, which were used to calculate multitasking proportions.
Kaiser Family Foundation has conducted a study that found entertainment media use by children and teens has risen considerably when compared to usage five years ago.
The study found that kids aged between 8 and18 years spend almost eight hours a day using entertainment media which is the same amount of time adults spent at work.
The time recorded is 1 hour 17 minutes higher from time recorded in 2004. "Anything that children spend that much time doing is something that needs to be studied," warns Victoria Rideout who is the author of the study and a Kaiser official.
She said that media usage cannot be branded well or bad however, from the view point of health the usage is high. The survey was conducted between October 2008 and May 2009 and included more than 2,000 American children aged between 8-18.
Key findings of the report titled "Generation M2: Media in the Lives of 8- to 18-Year-Olds," are that more than half of the children use media while doing homework and female children spend more time on social networking sites, listening to music and reading.
Boys on the other hand, spend more time playing video and computer games, or visiting YouTube. When the kids reach 11 their media usage goes up dramatically.
Teens are found to spend about an hour and a half texting each day. About 70% of the children said that their families did not restrict the time on watching TV.
Black and Hispanic youth were found to spend much more time with media than white youth. They spend 4½ hours more when compared to the white youth. As for TV, Black children spend nearly 6 hours and Hispanics just under 5½ hours while white youths spend 3½ hours a day.
Showing the importance of diet and exercise, about one-fifth of U. S. teenagers was identified through tests of lipids in the blood for heart diseases. The Centers for Disease Control and Prevention published report which found that 43% of the obese children tested outside the recommended ranges. The results were on the basis of blood tests taken from 3,125 children ages 12-19 from 1999 to 2006.
4% of cell-owning teens ages 12-17 say they have sent sexually suggestive nude or nearly nude images of themselves to someone else via text messaging
15% of cell-owning teens ages 12-17 say they have received sexually suggestive nude or nearly nude images of someone they know via text messaging on their cell phone.
Older teens are much more likely to send and receive these images; 8% of 17-year-olds with cell phones have sent a sexually provocative image by text and 30% have received a nude or nearly nude image on their phone.
The teens who pay their own phone bills are more likely to send “sexts”: 17% of teens who pay for all of the costs associated with their cell phones send sexually suggestive images via text; just 3% of teens who do not pay for, or only pay for a portion of the cost of the cell phone send these images.
Our focus groups revealed that there are three main scenarios for sexting: 1) exchange of images solely between two romantic partners; 2) exchanges between partners that are shared with others outside the relationship and 3) exchanges between people who are not yet in a relationship, but where at least one person hopes to be.
Any website where you create a username, password and PROFILE
Sites that allow you to contribute by uploading or posting your own content for rating review and remixing
Predators
With increasing numbers of teens admitting they are meeting Internet strangers in real life (between 12% and 24 of young teens, depending on the study), they will increasingly encounter sexual predators.
Working closely with law enforcement and survivors of Internet sexual exploitation, Internet Super Heroes has developed an stranger-danger message in a non-threatening format. Using Green Goblin as the predator posing as a young teen boy to lure Spider-Girl into an offline meeting, the message is delivered loud and clear. Yet, it is as appropriate for preteens as it is for teens.
The program isn’t designed to scare the children or teens. It is designed to make them more careful and help them understand how the bad guys trick even the smartest children into giving away important and personal information. It helps them understand why some kids agree to meet strangers offline, and how it is never safe to do that. If they insist on meeting their online friends in real life, it also helps them understand how to reduce the risks and get their parents and other trustworthy adults involved.
Privacy
Privacy has several parts. One is closely related to the stranger-danger message. Teaching children not to share personal information with people they meet online is much easier when the superhero model is applied. Super Heroes always strive to keep their identities secret. It’s the only way they can protect themselves and their loved ones. By using games where Spiderman, Spider-Girl and Hulk leave behind bits of information that could be used to trace their real identities, children are taught how items of seemingly innocent information, when combined, can be very dangerous to the superhero. By learning to protect the Super Heroes, they are learning to protect themselves and their friends as well.
But this isn’t only about predator issues. It’s also about responsible commercial data collection practices. Using the expertise of Parry Aftab (Internet Super Heroes’ Executive Director, cyberspace privacy lawyer and The Privacy Lawyer columnist for Information Week Magazine, informationweek.com) the children and teens will be taught how to look for and read a privacy policy and how to find trustworthy Web site. They will learn about the children’s privacy laws that protect them against unscrupulous marketing tactics and sites that misuse their personal information.
And the kids will understand the importance of privacy itself and keeping some things secret, even from their best friends. These include credit card information, debit card passwords and even their e-mail passwords. Everyone knows that Super Heroes don’t share their personal and secret information with anyone else, even their non-superhero best friends. Hopefully, after understanding why, neither will your children.
Pornography
One of the biggest problems parents complain about online is graphic pornographic images their children encounter in their e-mail boxes and online. The pornographers in an effort to increase their advertising revenue and online profile, have used popular kid Web site. names with common misspellings and other similar tricks to lure our kids to their sites accidentally. By understanding the tricks used by pornographers to push their content to everyone online, children and teens can avoid most pornography. And learning where and how to report misleading domain names and typosquatting will make a big difference too.
Pop-Ups
Now, by using spyware and adware, the pornographers are reaching out to our computers to personally deliver the messages using disgusting pop-ups and graphic sexual images even when our children aren’t surfing. By being made aware of spyware and adware installation schemes, and the pop-ups they deliver, children can use pop-up blocker programs and toolbars to prevent being exposed to countless and disgusting pop-ups.
Talk to your childCaution them about responding "in kind." This is not a time for them to lash out or start a cyberwar themselves. See if they think they know the identity of the cyberbully or cyberbullies. See if this is related to an offline bullying situation, and deal with that quickly. And don't confuse the language most kids use online with cyberbullying. It may be shocking to us, but unless it is shocking to your child, it's not cyberbullying.
Ignore itA one time, seemingly unthreatening act, like a prank or mild teasing should probably be ignored. (If it's a threat, you must report it.) At the same time, you may want to consider using some preventive measures:
Restrict the people who can send you communicationsConsider restricting all incoming communications to pre-approved senders, such as those on your child's buddy list. (If the cyberbully is someone on their buddy list, though, this method won't help. In that case the cyberbully will have to be removed from the buddy list and/or blocked.)
Restrict others from being able to add your child to their buddy listCyberbullies track when your child is online by using buddy lists, and similar tracking programs. It will let them know when one of their "buddies" is online, when they are inactive and, in some cases, where they are. This is like adding a tracking device to your child's online ankle, allowing their cyberbullies to find them more easily and target them more effectively. This feature is usually found in the privacy settings or parental controls of a communications program.
Google your childMake sure that the cyberbully isn't posting attacks online. When you get an early warning of a cyberbullying campaign, it is essential that you keep an eye on your child's screen name, nick names, full name, address, telephone and cell numbers and Web sites. You can also set up an "alert" on Google to notify you whenever anything about your child is posted online. To learn more about "Googling" yourself or your child, read "Google Yourself!"
Block the senderSomeone who seems aggressive, or makes you uncomfortable and does not respond to verbal please or formal warnings should be blocked. This way, they will not be able to know when you are online or be able to contact you through instant messaging. Even if the communicates are not particularly aggressive or threatening, if they are annoying or, block the sender. (Most ISPs and instant messaging programs have a blocking feature to allow you to prevent the sender from getting through.)
"Warn" the senderIf the cyberbully uses another screen name to avoid the block , otherwise manages to get through or around the block or communicates through others, "warn" them, or "notify" the ISP. (This is usually a button on the IM application.) This creates a record of the incident for later review, and if the person is warned enough, they can lose their ISP or instant messenger account. (Unfortunately, many cyberbullies use "warning wars" or "notify wars" to harass their victims, by making it appear the victim is really the cyberbully. This is a method of cyberbullying by proxy, getting the ISP to be an unwitting accomplice of the cyberbullying.)
Report to ISPMost cyberbullying and harassment incidents violate the ISP's terms of service. These are typically called a "TOS violation" (for a "terms of service" violation, and can have serious consequences for the account holder. Many ISPs will close a cyberbully's account (which will also close their parents' household account in most cases.) You should report this to the sender's ISP, not yours. (For more information about how to make a report, read "Making a Report to Their ISP." If you use a monitoring software, like Spectorsoft, this is much easier.)
If your child's account has been hacked or their password compromised, or if someone is posing as your child, you should make a formal report to your ISP as well. You can call them or send an e-mail to their security department (NOT their terms of service report line). But before changing your password, you should scan your computer for any hacking programs or spyware, such as a Trojan horse. If one is on your computer, the cyberbully may be able to access the new password. Most good anti-virus programs can find and remove a hacking program. All spyware applications can. We recommend SpyBot Search and Destroy (a freeware) or Ad-Aware (by Lavasoft, they have a free "lite" program).
Report to SchoolMost cases of cyberbullying occur off school grounds and outside of school hours. In the United States , often the school has no legal authority to take action relating to an off-premises and off-hours activity, even if it has an impact on the welfare of their students. The laws are tricky, and vary jurisdiction by jurisdiction. So while you should notify the school (especially if your child suspects whom is behind the attacks), they may not be able to take disciplinary action. They can keep any eye on the situation in school, however. And since many cyberbullying incidents are combined with offline bullying incidents, your child may be safer because of the report.
Also, while the school may have limited authority over disciplining the cyberbully, they can call the parents in and try and mediate the situation. They can also institute an educational and awareness program to help stop further cyberbullying by students, and to help educate parents about the problem.
Report to PoliceSomeone who threatens you physically, who is posting details about your or your child's offline contact information or instigating a cyberbullying by proxy campaign should be reported to the police. (Although you should err on the side of caution and report anything that worries you.) Using a monitoring program, such as Spectorsoft, can facilitate the investigation and any eventual prosecution by collecting and preserving electronic evidence. Print-outs, while helpful in explaining the situation, are generally not admissible evidence.) If you feel like your child, you or someone you know is in danger, contact the police immediately and cut off contact with this person or user, staying offline if need be until you are otherwise instructed. Do not install any programs, or remove any programs or take other remedial action on your computer or communication device during this process. It may adversely affect the investigation and any eventual prosecution.
Take Legal ActionMany cases of cyberbullying (like their adult cyber-harassment equivalent) are not criminal. They may come close to violating the law, but may not cross the line. Most of the time, the threat of closing their ISP or instant messaging account is enough to make things stop. But sometimes, either because the parents want to make an example of the cyberbully or because it isn't stopping, lawyers need to be brought in. It may also be the only way you can find out whom is behind the attacks.
Think carefully before you decide to take this kind of action. Even if you win in the end, it may take you two or three years to get there and cost you tens of thousands of dollars. You may be angry enough to start it, but make sure that you have something more than anger to sustain the long months and years of litigation.
Another example
Another example
Record content consumption
Poll collective brain
Take notes
Converse
De-stress