SlideShare a Scribd company logo
1 of 37
PRESENTED BY…
G E N E V I E V E L A C H A N C E
V A S I M P L E S E R V I C E S . C
O M
VA Simple Services
Digital & Social Media
Marketing
For your business
Success!
V A S I M P L E S E R V I C E S . C O M 2
V A S I M P L E S E R V I C E S . C O M 3
As internet users, we need to take an active role in
protecting our privacy and safety, and to help our
children do the same by teaching them about
appropriate online behaviour and how to be
responsible digital citizens.
DIGITAL SAVVY TEENS
V A S I M P L E S E R V I C E S . C O M 4
Always connected through various devices, 95% of teens are
using the internet today which makes them an extremely
digitally savvy generation. (source: pewinternet.org)
But many parents are totally clueless!
According to a study, around 80% of parents said that they don’t
even know how to find out what their kids are doing online.
(source: internet-safety.yoursphere.com)
TEENS AND SOCIAL MEDIA
V A S I M P L E S E R V I C E S . C O M 5
• 16% of teen social media users have set up their profile
to automatically include their location in posts.
• 19% have posted updates, comments, photos, or videos
that they later regretted sharing.
• 26% say that they post false information like a fake
name, age, or location to help protect their privacy.
(Source: pewinternet.org)
SOCIAL MEDIA: WHAT TEENS POST
V A S I M P L E S E R V I C E S . C O M 6
Source: pewinternet.org
V A S I M P L E S E R V I C E S . C O M 7
SOCIAL NETWORK USAGE
V A S I M P L E S E R V I C E S . C O M 8
Source:pewinternet.org
PRIVACY RISKS
*this is my own interpretation and rating system
V A S I M P L E S E R V I C E S . C O M 9
HIGH Account is totally Public.
MEDIUM Account includes Privacy settings but you have to turn
them on.
LOW The default settings are Private.
Geo-location services will publish a user's physical location.
Make sure to have those turned off on all devices including
mobile.
Facebook is a social
networking website launched
in February 2004 with over
1.11 billion monthly active
users as of March 2013.
10V A S I M P L E S E R V I C E S . C O M
FACEBOOK STATS
11
• The typical (median) teen Facebook user has 300
friends
• 33% are Facebook friends with other people they have
not met in person.
• Some 60% of teens ages 12-17 who use Facebook say
they have their profile set to private, so that only their
friends can see it.
• Another 25% have a partially private profile, set so that
friends of their friends can see what they post.
• 14% of teens say that their profile is completely public.
Source: pewinternet.org
V A S I M P L E S E R V I C E S . C O M
Threat Factor
• Bullying
• Privacy
• Peer rejection
• Oversharing
• Self-Esteem issues
• Facebook Depression*
Privacy Risks
MEDIUM
• name, profile picture,
cover photo are public
• Privacy settings work
differently for minors
than for adults
• Can control how they
share information and
set their privacy
• Geo-location option
should be off at all times
12
WHAT YOU SHOULD KNOW ABOUT FACEBOOK
V A S I M P L E S E R V I C E S . C O M
RESOURCES
V A S I M P L E S E R V I C E S . C O M 13
• Facebook Family Safety Center
http://on.fb.me/186K1pJ
• How privacy works on Facebook for minors
http://on.fb.me/1aQnfSy
• Parents Guide to Facebook 2012
http://bit.ly/186K5pr
• How to Report Things
http://on.fb.me/186K7gY
Online social networking service that
enables its users to send text-
based messages of up to 140
characters.
Created in 2006, Twitter has more
than 500 million users (although
many are not active).
14V A S I M P L E S E R V I C E S . C O M
TWITTER STATS
V A S I M P L E S E R V I C E S . C O M 15
• Teen Twitter use has grown significantly: 24% of online teens
use Twitter, up from 16% in 2011.
• 64% of teens with Twitter accounts say that their tweets are
public, while 24% say their tweets are private.
• 12% of teens with Twitter accounts say that they “don’t know” if
their tweets are public or Private.
Source: pewinternet.org
Threat Factor
• Bullying
• Privacy
• Oversharing
• Self-Esteem issues
Privacy Risks
MEDIUM
• Default setting is
public
• Can set account to
protected Tweets which
require manual
approval of every
person who view your
account's Tweets.
• Geo-location option
should be off at all
times
16
WHAT YOU SHOULD KNOW ABOUT TWITTER
V A S I M P L E S E R V I C E S . C O M
RESOURCES
V A S I M P L E S E R V I C E S . C O M 17
• TWITTER AND YOUR CHILD, A PARENT’S GUIDE TO
PRIVACY AND SAFETY
http://bit.ly/17pu7Yh
• Reporting an abusive user
http://bit.ly/186KjNj
Blogging platform. Users
can follow other users'
blogs, post their own
content or “reblog” other
people’s content.
Tumblr has 300 million
monthly unique visitors.
18V A S I M P L E S E R V I C E S . C O M
TUMBLR STATS
V A S I M P L E S E R V I C E S . C O M 19
• Tumblr is the number one social media network for
teens, with 61% of teenagers and 57% of young adults liking
the blogging site. Source: http://blog.garrytan.com
• There are currently 116.9 blogs on Tumblr and 53.5 billion
blog posts. Source: Tumblr.com
Threat Factor
• Sexual and violent
content exposure
• Privacy
• Oversharing
Privacy Risks
MEDIUM
• Awkward privacy
settings
• Default is public and
viewable by anyone
on the Internet.
• "ask box" feature (can
be turned off)
20
WHAT YOU SHOULD KNOW ABOUT TUMBLR
V A S I M P L E S E R V I C E S . C O M
RESOURCES
V A S I M P L E S E R V I C E S . C O M 21
• Tumblr – Why Kids Love It and What Parents Need To
Know
http://bit.ly/186KwQM
• Tumblr saved me
http://bit.ly/186KAzX
• Report something: try this email
abuse@tumblr.com
Social Q&A
website, launched in
2010.
Users invite questions from
other members of the
site. The responses can
be received
anonymously.
22V A S I M P L E S E R V I C E S . C O M
Threat Factor
• Bullying
• Privacy
• Peer rejection
• Oversharing
• Self-Esteem issues
Privacy Risks
HIGH
• Anyone on Ask.fm, and
on the Web can see
your profile and
content.
• Replies are publicly
viewable data.
• Can choose to remove
anonymous option.
23
WHAT YOU SHOULD KNOW ABOUT ASK.FM
V A S I M P L E S E R V I C E S . C O M
*Out of all websites or social network, this is definitely one you should supervise very closely.
RESOURCES
V A S I M P L E S E R V I C E S . C O M 24
• What parents need to know about ask.fm
http://bit.ly/197Otpr
• Social Media Site Ask.fm Is Putting Teens At Risk
http://bit.ly/197Pj5s
• Contact Ask.fm
http://bit.ly/186KUP1
Third most visited website
in the world, Youtube
allows you to post and
view videos about
virtually anything you
can imagine.
25V A S I M P L E S E R V I C E S . C O M
YOUTUBE STATS
V A S I M P L E S E R V I C E S . C O M 26
• 64% of teens listen to music through YouTube.
Source: nielsen.com
• 100 hours of video are uploaded to YouTube every minute.
Source: youtube.com
• Video usage among teens increase with age.
Source: pewinternet.org
Threat Factor
• Bullying
• Oversharing
• Privacy
• Inappropriate content
exposure
Privacy Risks
MEDIUM
• Videos are public and
searchable unless
privacy settings are
turned on.
• Able to limit who can
see the videos you
post.
27
WHAT YOU SHOULD KNOW ABOUT YOUTUBE
V A S I M P L E S E R V I C E S . C O M
RESOURCES
V A S I M P L E S E R V I C E S . C O M 28
• Cyberbullying on YouTube: Six Things All Parents Should
Know
http://bit.ly/197Rq9z
• Parent Resources on Youtube
http://bit.ly/123obPD
• Video Guide: How to Set Up YouTube Safety Mode
http://bit.ly/197SrOG
• Policy and Safety Hub
http://bit.ly/123ogmo
MOBILE APPS
29
78% of teens now have a cell phone, and almost half (47%) of
those own smartphones.
One in four teens are “cell-mostly” internet users, who say
they mostly go online using their phone and not using some
other device such as a desktop or laptop computer.
(Source: pewinternet.org)
V A S I M P L E S E R V I C E S . C O M
Free mobile app.
Allows to Snap photos and
videos with your mobile
phone and apply filters. You
can also share your photos or
videos on Flickr, Facebook,
and Twitter.
Owned by Facebook, Instagram
has 100 million monthly
active users.
30V A S I M P L E S E R V I C E S . C O M
Threat Factor
• Privacy
• Oversharing
• Bullying
• Self-esteem issues
Privacy Risks
MEDIUM
• You can choose to
make your account
private. Only people
who follow you will be
able to see your
photos.
• Able to approve all
follow requests when
private
• Geo-location service
should be off at all
times
31
WHAT YOU SHOULD KNOW ABOUT INSTAGRAM
V A S I M P L E S E R V I C E S . C O M
RESOURCES
V A S I M P L E S E R V I C E S . C O M 32
• Tips for Parents
http://bit.ly/186LJHG
• Report Something
http://bit.ly/186LHPZ
• ConnectSafely’s Parents’ Guide to Instagram
http://bit.ly/186LNXP
• Instagram – Is It Okay for Kids? What Parents Need to
Know
http://bit.ly/186LOLE
Snapchat is a free mobile app
which allows users to
capture pictures and videos
and send them as
messages to other users.
The messages will self-
destruct a few seconds after
they're viewed.
33V A S I M P L E S E R V I C E S . C O M
Threat Factor
• Oversharing
• Privacy
• Explicit content sharing
• Sexting
• Harassment
Privacy Risks
MEDIUM
• By default, anyone who
knows your username
or phone number can
send you a message
• Screenshots can be
taken of shared content
34
WHAT YOU SHOULD KNOW ABOUT SNAPCHAT
V A S I M P L E S E R V I C E S . C O M
RESOURCES
V A S I M P L E S E R V I C E S . C O M 35
• SNAPCHAT GUIDE FOR PARENTS
http://bit.ly/186LXyq
• Report Something
Send email to safety@snapchat.com
• ConnectSafely’s Parents’ Guide to Snapchat
http://bit.ly/186M0dO
WHAT PARENTS CAN DO:
V A S I M P L E S E R V I C E S . C O M 36
1. Ask questions and set limits (do it often, kids forget fast!)
2. Keep up to date with Technology
3. Follow your child on social media sites
4. Google your child’s name under search and images
5. Install Parental Control
6. Be a good role model
7. Use a Technology Agreement (example: http://bit.ly/123lgXo
via Internet Safety Yoursphere.com).
REMEMBER
V A S I M P L E S E R V I C E S . C O M 37
Teach your children and live by “The Grandma Rule”:
Is what you’re posting something you’d want your
grandmother, boss, future employer, parents, school officials
or future in-laws to see?
If not…it’s probably not a great idea to post it!

More Related Content

What's hot

Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel
 
Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014Resourceful Nonprofit
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldProjectsByJen.com
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parentsagoldberghvs
 
Social media research and children
Social media research and childrenSocial media research and children
Social media research and childrenNatachaPittet
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safetyFred Miller
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents Jennifer Holena
 
The Truth About Internet Safety
The Truth About Internet SafetyThe Truth About Internet Safety
The Truth About Internet SafetyJessica Punke
 
DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...
DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...
DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...iCAADEvents
 
What the #Hashtag is #SocialMedia?
What the #Hashtag is #SocialMedia?What the #Hashtag is #SocialMedia?
What the #Hashtag is #SocialMedia?Joan Vinall-Cox
 
Community Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social NetworkingCommunity Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social NetworkingShotzy Paugh
 
2010: NJ GMIS: Getting Your Message Out
2010: NJ GMIS: Getting Your Message Out2010: NJ GMIS: Getting Your Message Out
2010: NJ GMIS: Getting Your Message OutCarol Spencer
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
#KCSafeOnline: A free forum about online safety for parents
#KCSafeOnline: A free forum about online safety for parents#KCSafeOnline: A free forum about online safety for parents
#KCSafeOnline: A free forum about online safety for parentsKSHB
 
Social Media for College Students
Social Media for College StudentsSocial Media for College Students
Social Media for College StudentsRobin J Phillips
 

What's hot (20)

Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
 
Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
Research
ResearchResearch
Research
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital World
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parents
 
Social media research and children
Social media research and childrenSocial media research and children
Social media research and children
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
The Truth About Internet Safety
The Truth About Internet SafetyThe Truth About Internet Safety
The Truth About Internet Safety
 
Be a well aware mom !
Be a well aware mom !Be a well aware mom !
Be a well aware mom !
 
Digital Tattoo Website Orientation
Digital Tattoo Website OrientationDigital Tattoo Website Orientation
Digital Tattoo Website Orientation
 
DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...
DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...
DR DON GRANT - UNPLUG TO RECONNECT: HEALTHY DEVICE MANAGEMENT & THE PRACTICE ...
 
What the #Hashtag is #SocialMedia?
What the #Hashtag is #SocialMedia?What the #Hashtag is #SocialMedia?
What the #Hashtag is #SocialMedia?
 
Community Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social NetworkingCommunity Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social Networking
 
2010: NJ GMIS: Getting Your Message Out
2010: NJ GMIS: Getting Your Message Out2010: NJ GMIS: Getting Your Message Out
2010: NJ GMIS: Getting Your Message Out
 
Making social media safe for kids
Making social media safe for kidsMaking social media safe for kids
Making social media safe for kids
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
#KCSafeOnline: A free forum about online safety for parents
#KCSafeOnline: A free forum about online safety for parents#KCSafeOnline: A free forum about online safety for parents
#KCSafeOnline: A free forum about online safety for parents
 
Social Media for College Students
Social Media for College StudentsSocial Media for College Students
Social Media for College Students
 

Viewers also liked

SHOULD you Dump your Facebook Page in 2014
SHOULD you Dump your Facebook Page in 2014SHOULD you Dump your Facebook Page in 2014
SHOULD you Dump your Facebook Page in 2014VA Simple Services
 
10 essential elements to create a successful online business
10 essential elements to create a successful online business10 essential elements to create a successful online business
10 essential elements to create a successful online businessVA Simple Services
 
Content creation based on buyer persona
Content creation based on buyer personaContent creation based on buyer persona
Content creation based on buyer personaVA Simple Services
 
Parents Guide To Social Media Sites Dangers & How Children & Adults Interact
Parents Guide To Social Media Sites Dangers & How Children & Adults InteractParents Guide To Social Media Sites Dangers & How Children & Adults Interact
Parents Guide To Social Media Sites Dangers & How Children & Adults InteractBradley W. Deacon
 
Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!Scott Burnett
 
Presentacion #solatube. IDAE, LUZ NATURAL
Presentacion #solatube. IDAE, LUZ NATURALPresentacion #solatube. IDAE, LUZ NATURAL
Presentacion #solatube. IDAE, LUZ NATURALSOLUCIONES DEL SOL
 
Presentación Obra realizada año 2.014. Sevilla
Presentación Obra realizada año 2.014. SevillaPresentación Obra realizada año 2.014. Sevilla
Presentación Obra realizada año 2.014. SevillaSOLUCIONES DEL SOL
 
Teens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From CyberbullyingTeens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From CyberbullyingTeenSafe
 
The TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech SafetyThe TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech SafetyTeenSafe
 
Social Media Safety for Kids and Teens - A Parent's Guide to Social Media
Social Media Safety for Kids and Teens - A Parent's Guide to Social MediaSocial Media Safety for Kids and Teens - A Parent's Guide to Social Media
Social Media Safety for Kids and Teens - A Parent's Guide to Social MediaKaren Kefauver
 
Revenue, Profit & Cash Flow
Revenue, Profit & Cash FlowRevenue, Profit & Cash Flow
Revenue, Profit & Cash FlowBlaine Bertsch
 
CUENTO: LA COSA QUE MÁS DUELE EN EL MUNDO.
CUENTO: LA COSA QUE MÁS DUELE EN EL MUNDO.CUENTO: LA COSA QUE MÁS DUELE EN EL MUNDO.
CUENTO: LA COSA QUE MÁS DUELE EN EL MUNDO.Carmen Elena Medina
 

Viewers also liked (20)

SHOULD you Dump your Facebook Page in 2014
SHOULD you Dump your Facebook Page in 2014SHOULD you Dump your Facebook Page in 2014
SHOULD you Dump your Facebook Page in 2014
 
10 essential elements to create a successful online business
10 essential elements to create a successful online business10 essential elements to create a successful online business
10 essential elements to create a successful online business
 
Content creation based on buyer persona
Content creation based on buyer personaContent creation based on buyer persona
Content creation based on buyer persona
 
Parents Guide To Social Media Sites Dangers & How Children & Adults Interact
Parents Guide To Social Media Sites Dangers & How Children & Adults InteractParents Guide To Social Media Sites Dangers & How Children & Adults Interact
Parents Guide To Social Media Sites Dangers & How Children & Adults Interact
 
Parents Guide to Snapchat - Connect Safely Org
Parents Guide to Snapchat - Connect Safely OrgParents Guide to Snapchat - Connect Safely Org
Parents Guide to Snapchat - Connect Safely Org
 
Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!
 
Presentacion #solatube. IDAE, LUZ NATURAL
Presentacion #solatube. IDAE, LUZ NATURALPresentacion #solatube. IDAE, LUZ NATURAL
Presentacion #solatube. IDAE, LUZ NATURAL
 
Presentación Obra realizada año 2.014. Sevilla
Presentación Obra realizada año 2.014. SevillaPresentación Obra realizada año 2.014. Sevilla
Presentación Obra realizada año 2.014. Sevilla
 
Teens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From CyberbullyingTeens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From Cyberbullying
 
The TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech SafetyThe TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech Safety
 
Social Media Safety for Kids and Teens - A Parent's Guide to Social Media
Social Media Safety for Kids and Teens - A Parent's Guide to Social MediaSocial Media Safety for Kids and Teens - A Parent's Guide to Social Media
Social Media Safety for Kids and Teens - A Parent's Guide to Social Media
 
Social Media: Kids & Teens
Social Media: Kids & TeensSocial Media: Kids & Teens
Social Media: Kids & Teens
 
Revenue, Profit & Cash Flow
Revenue, Profit & Cash FlowRevenue, Profit & Cash Flow
Revenue, Profit & Cash Flow
 
CUENTO: LA COSA QUE MÁS DUELE EN EL MUNDO.
CUENTO: LA COSA QUE MÁS DUELE EN EL MUNDO.CUENTO: LA COSA QUE MÁS DUELE EN EL MUNDO.
CUENTO: LA COSA QUE MÁS DUELE EN EL MUNDO.
 
Los Cocodrilos Copiones
Los Cocodrilos CopionesLos Cocodrilos Copiones
Los Cocodrilos Copiones
 
Ramiro Mirón o el Ratón Espia
Ramiro Mirón o el Ratón EspiaRamiro Mirón o el Ratón Espia
Ramiro Mirón o el Ratón Espia
 
EN LA BARRIGA DE PAPÁ
EN LA BARRIGA DE PAPÁEN LA BARRIGA DE PAPÁ
EN LA BARRIGA DE PAPÁ
 
El Sapo Distraido - imagenes
El Sapo Distraido - imagenesEl Sapo Distraido - imagenes
El Sapo Distraido - imagenes
 
Cuento: Besos y Achuchones
Cuento: Besos y AchuchonesCuento: Besos y Achuchones
Cuento: Besos y Achuchones
 
COCORICO
COCORICOCOCORICO
COCORICO
 

Similar to Teens on the Web: What Every Parent Should Know

Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlineLane Sutton
 
Social Media Safety for Parents
Social Media Safety for ParentsSocial Media Safety for Parents
Social Media Safety for Parentsbermandry
 
1. research + initial ideas unit 9
1. research + initial ideas   unit 91. research + initial ideas   unit 9
1. research + initial ideas unit 9Aaron Johnson
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
What Apps Your children May be using slide show final with hyperlink2015
What Apps Your children May be using slide show final with hyperlink2015What Apps Your children May be using slide show final with hyperlink2015
What Apps Your children May be using slide show final with hyperlink2015Linda Beres
 
Emerging Social Media Trends You Need to Know
Emerging Social Media Trends You Need to KnowEmerging Social Media Trends You Need to Know
Emerging Social Media Trends You Need to KnowRichard Harrington
 
How children's fingerprints on the web could mean the end of PII Authenticati...
How children's fingerprints on the web could mean the end of PII Authenticati...How children's fingerprints on the web could mean the end of PII Authenticati...
How children's fingerprints on the web could mean the end of PII Authenticati...Jisc
 
Research for doucmentary
Research for doucmentaryResearch for doucmentary
Research for doucmentaryclobebobe
 
Social Media Teen Safety Seminar Training #SocialSavvyFamily
Social Media Teen Safety Seminar Training #SocialSavvyFamily Social Media Teen Safety Seminar Training #SocialSavvyFamily
Social Media Teen Safety Seminar Training #SocialSavvyFamily Pam Moore
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
What You Should Know About Instagram and Snapchat
What You Should Know About Instagram and SnapchatWhat You Should Know About Instagram and Snapchat
What You Should Know About Instagram and SnapchatYour eKavach
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018KanelandSvihlik
 
Social Media Training for Youth Leaders, for York Diocese, November 2014.
Social Media Training for Youth Leaders, for York Diocese, November 2014.Social Media Training for Youth Leaders, for York Diocese, November 2014.
Social Media Training for Youth Leaders, for York Diocese, November 2014.Bex Lewis
 
Digital footprints final
Digital footprints finalDigital footprints final
Digital footprints finalseanclimbs
 

Similar to Teens on the Web: What Every Parent Should Know (20)

Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself online
 
Social Media Safety for Parents
Social Media Safety for ParentsSocial Media Safety for Parents
Social Media Safety for Parents
 
1. research + initial ideas unit 9
1. research + initial ideas   unit 91. research + initial ideas   unit 9
1. research + initial ideas unit 9
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
What Apps Your children May be using slide show final with hyperlink2015
What Apps Your children May be using slide show final with hyperlink2015What Apps Your children May be using slide show final with hyperlink2015
What Apps Your children May be using slide show final with hyperlink2015
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Emerging Social Media Trends You Need to Know
Emerging Social Media Trends You Need to KnowEmerging Social Media Trends You Need to Know
Emerging Social Media Trends You Need to Know
 
How children's fingerprints on the web could mean the end of PII Authenticati...
How children's fingerprints on the web could mean the end of PII Authenticati...How children's fingerprints on the web could mean the end of PII Authenticati...
How children's fingerprints on the web could mean the end of PII Authenticati...
 
Research for doucmentary
Research for doucmentaryResearch for doucmentary
Research for doucmentary
 
Davy Lunch & Learn
Davy Lunch & LearnDavy Lunch & Learn
Davy Lunch & Learn
 
Socialsoftware
SocialsoftwareSocialsoftware
Socialsoftware
 
Social Media Teen Safety Seminar Training #SocialSavvyFamily
Social Media Teen Safety Seminar Training #SocialSavvyFamily Social Media Teen Safety Seminar Training #SocialSavvyFamily
Social Media Teen Safety Seminar Training #SocialSavvyFamily
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
What Parents need to know about social media in 2014
What Parents need to know about social media in 2014What Parents need to know about social media in 2014
What Parents need to know about social media in 2014
 
What You Should Know About Instagram and Snapchat
What You Should Know About Instagram and SnapchatWhat You Should Know About Instagram and Snapchat
What You Should Know About Instagram and Snapchat
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Social Media Training for Youth Leaders, for York Diocese, November 2014.
Social Media Training for Youth Leaders, for York Diocese, November 2014.Social Media Training for Youth Leaders, for York Diocese, November 2014.
Social Media Training for Youth Leaders, for York Diocese, November 2014.
 
Digital footprints final
Digital footprints finalDigital footprints final
Digital footprints final
 
Professionalism in the Age of Selfie
Professionalism in the Age of SelfieProfessionalism in the Age of Selfie
Professionalism in the Age of Selfie
 

Recently uploaded

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 

Recently uploaded (20)

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 

Teens on the Web: What Every Parent Should Know

  • 1.
  • 2. PRESENTED BY… G E N E V I E V E L A C H A N C E V A S I M P L E S E R V I C E S . C O M VA Simple Services Digital & Social Media Marketing For your business Success! V A S I M P L E S E R V I C E S . C O M 2
  • 3. V A S I M P L E S E R V I C E S . C O M 3 As internet users, we need to take an active role in protecting our privacy and safety, and to help our children do the same by teaching them about appropriate online behaviour and how to be responsible digital citizens.
  • 4. DIGITAL SAVVY TEENS V A S I M P L E S E R V I C E S . C O M 4 Always connected through various devices, 95% of teens are using the internet today which makes them an extremely digitally savvy generation. (source: pewinternet.org) But many parents are totally clueless! According to a study, around 80% of parents said that they don’t even know how to find out what their kids are doing online. (source: internet-safety.yoursphere.com)
  • 5. TEENS AND SOCIAL MEDIA V A S I M P L E S E R V I C E S . C O M 5 • 16% of teen social media users have set up their profile to automatically include their location in posts. • 19% have posted updates, comments, photos, or videos that they later regretted sharing. • 26% say that they post false information like a fake name, age, or location to help protect their privacy. (Source: pewinternet.org)
  • 6. SOCIAL MEDIA: WHAT TEENS POST V A S I M P L E S E R V I C E S . C O M 6 Source: pewinternet.org
  • 7. V A S I M P L E S E R V I C E S . C O M 7
  • 8. SOCIAL NETWORK USAGE V A S I M P L E S E R V I C E S . C O M 8 Source:pewinternet.org
  • 9. PRIVACY RISKS *this is my own interpretation and rating system V A S I M P L E S E R V I C E S . C O M 9 HIGH Account is totally Public. MEDIUM Account includes Privacy settings but you have to turn them on. LOW The default settings are Private. Geo-location services will publish a user's physical location. Make sure to have those turned off on all devices including mobile.
  • 10. Facebook is a social networking website launched in February 2004 with over 1.11 billion monthly active users as of March 2013. 10V A S I M P L E S E R V I C E S . C O M
  • 11. FACEBOOK STATS 11 • The typical (median) teen Facebook user has 300 friends • 33% are Facebook friends with other people they have not met in person. • Some 60% of teens ages 12-17 who use Facebook say they have their profile set to private, so that only their friends can see it. • Another 25% have a partially private profile, set so that friends of their friends can see what they post. • 14% of teens say that their profile is completely public. Source: pewinternet.org V A S I M P L E S E R V I C E S . C O M
  • 12. Threat Factor • Bullying • Privacy • Peer rejection • Oversharing • Self-Esteem issues • Facebook Depression* Privacy Risks MEDIUM • name, profile picture, cover photo are public • Privacy settings work differently for minors than for adults • Can control how they share information and set their privacy • Geo-location option should be off at all times 12 WHAT YOU SHOULD KNOW ABOUT FACEBOOK V A S I M P L E S E R V I C E S . C O M
  • 13. RESOURCES V A S I M P L E S E R V I C E S . C O M 13 • Facebook Family Safety Center http://on.fb.me/186K1pJ • How privacy works on Facebook for minors http://on.fb.me/1aQnfSy • Parents Guide to Facebook 2012 http://bit.ly/186K5pr • How to Report Things http://on.fb.me/186K7gY
  • 14. Online social networking service that enables its users to send text- based messages of up to 140 characters. Created in 2006, Twitter has more than 500 million users (although many are not active). 14V A S I M P L E S E R V I C E S . C O M
  • 15. TWITTER STATS V A S I M P L E S E R V I C E S . C O M 15 • Teen Twitter use has grown significantly: 24% of online teens use Twitter, up from 16% in 2011. • 64% of teens with Twitter accounts say that their tweets are public, while 24% say their tweets are private. • 12% of teens with Twitter accounts say that they “don’t know” if their tweets are public or Private. Source: pewinternet.org
  • 16. Threat Factor • Bullying • Privacy • Oversharing • Self-Esteem issues Privacy Risks MEDIUM • Default setting is public • Can set account to protected Tweets which require manual approval of every person who view your account's Tweets. • Geo-location option should be off at all times 16 WHAT YOU SHOULD KNOW ABOUT TWITTER V A S I M P L E S E R V I C E S . C O M
  • 17. RESOURCES V A S I M P L E S E R V I C E S . C O M 17 • TWITTER AND YOUR CHILD, A PARENT’S GUIDE TO PRIVACY AND SAFETY http://bit.ly/17pu7Yh • Reporting an abusive user http://bit.ly/186KjNj
  • 18. Blogging platform. Users can follow other users' blogs, post their own content or “reblog” other people’s content. Tumblr has 300 million monthly unique visitors. 18V A S I M P L E S E R V I C E S . C O M
  • 19. TUMBLR STATS V A S I M P L E S E R V I C E S . C O M 19 • Tumblr is the number one social media network for teens, with 61% of teenagers and 57% of young adults liking the blogging site. Source: http://blog.garrytan.com • There are currently 116.9 blogs on Tumblr and 53.5 billion blog posts. Source: Tumblr.com
  • 20. Threat Factor • Sexual and violent content exposure • Privacy • Oversharing Privacy Risks MEDIUM • Awkward privacy settings • Default is public and viewable by anyone on the Internet. • "ask box" feature (can be turned off) 20 WHAT YOU SHOULD KNOW ABOUT TUMBLR V A S I M P L E S E R V I C E S . C O M
  • 21. RESOURCES V A S I M P L E S E R V I C E S . C O M 21 • Tumblr – Why Kids Love It and What Parents Need To Know http://bit.ly/186KwQM • Tumblr saved me http://bit.ly/186KAzX • Report something: try this email abuse@tumblr.com
  • 22. Social Q&A website, launched in 2010. Users invite questions from other members of the site. The responses can be received anonymously. 22V A S I M P L E S E R V I C E S . C O M
  • 23. Threat Factor • Bullying • Privacy • Peer rejection • Oversharing • Self-Esteem issues Privacy Risks HIGH • Anyone on Ask.fm, and on the Web can see your profile and content. • Replies are publicly viewable data. • Can choose to remove anonymous option. 23 WHAT YOU SHOULD KNOW ABOUT ASK.FM V A S I M P L E S E R V I C E S . C O M *Out of all websites or social network, this is definitely one you should supervise very closely.
  • 24. RESOURCES V A S I M P L E S E R V I C E S . C O M 24 • What parents need to know about ask.fm http://bit.ly/197Otpr • Social Media Site Ask.fm Is Putting Teens At Risk http://bit.ly/197Pj5s • Contact Ask.fm http://bit.ly/186KUP1
  • 25. Third most visited website in the world, Youtube allows you to post and view videos about virtually anything you can imagine. 25V A S I M P L E S E R V I C E S . C O M
  • 26. YOUTUBE STATS V A S I M P L E S E R V I C E S . C O M 26 • 64% of teens listen to music through YouTube. Source: nielsen.com • 100 hours of video are uploaded to YouTube every minute. Source: youtube.com • Video usage among teens increase with age. Source: pewinternet.org
  • 27. Threat Factor • Bullying • Oversharing • Privacy • Inappropriate content exposure Privacy Risks MEDIUM • Videos are public and searchable unless privacy settings are turned on. • Able to limit who can see the videos you post. 27 WHAT YOU SHOULD KNOW ABOUT YOUTUBE V A S I M P L E S E R V I C E S . C O M
  • 28. RESOURCES V A S I M P L E S E R V I C E S . C O M 28 • Cyberbullying on YouTube: Six Things All Parents Should Know http://bit.ly/197Rq9z • Parent Resources on Youtube http://bit.ly/123obPD • Video Guide: How to Set Up YouTube Safety Mode http://bit.ly/197SrOG • Policy and Safety Hub http://bit.ly/123ogmo
  • 29. MOBILE APPS 29 78% of teens now have a cell phone, and almost half (47%) of those own smartphones. One in four teens are “cell-mostly” internet users, who say they mostly go online using their phone and not using some other device such as a desktop or laptop computer. (Source: pewinternet.org) V A S I M P L E S E R V I C E S . C O M
  • 30. Free mobile app. Allows to Snap photos and videos with your mobile phone and apply filters. You can also share your photos or videos on Flickr, Facebook, and Twitter. Owned by Facebook, Instagram has 100 million monthly active users. 30V A S I M P L E S E R V I C E S . C O M
  • 31. Threat Factor • Privacy • Oversharing • Bullying • Self-esteem issues Privacy Risks MEDIUM • You can choose to make your account private. Only people who follow you will be able to see your photos. • Able to approve all follow requests when private • Geo-location service should be off at all times 31 WHAT YOU SHOULD KNOW ABOUT INSTAGRAM V A S I M P L E S E R V I C E S . C O M
  • 32. RESOURCES V A S I M P L E S E R V I C E S . C O M 32 • Tips for Parents http://bit.ly/186LJHG • Report Something http://bit.ly/186LHPZ • ConnectSafely’s Parents’ Guide to Instagram http://bit.ly/186LNXP • Instagram – Is It Okay for Kids? What Parents Need to Know http://bit.ly/186LOLE
  • 33. Snapchat is a free mobile app which allows users to capture pictures and videos and send them as messages to other users. The messages will self- destruct a few seconds after they're viewed. 33V A S I M P L E S E R V I C E S . C O M
  • 34. Threat Factor • Oversharing • Privacy • Explicit content sharing • Sexting • Harassment Privacy Risks MEDIUM • By default, anyone who knows your username or phone number can send you a message • Screenshots can be taken of shared content 34 WHAT YOU SHOULD KNOW ABOUT SNAPCHAT V A S I M P L E S E R V I C E S . C O M
  • 35. RESOURCES V A S I M P L E S E R V I C E S . C O M 35 • SNAPCHAT GUIDE FOR PARENTS http://bit.ly/186LXyq • Report Something Send email to safety@snapchat.com • ConnectSafely’s Parents’ Guide to Snapchat http://bit.ly/186M0dO
  • 36. WHAT PARENTS CAN DO: V A S I M P L E S E R V I C E S . C O M 36 1. Ask questions and set limits (do it often, kids forget fast!) 2. Keep up to date with Technology 3. Follow your child on social media sites 4. Google your child’s name under search and images 5. Install Parental Control 6. Be a good role model 7. Use a Technology Agreement (example: http://bit.ly/123lgXo via Internet Safety Yoursphere.com).
  • 37. REMEMBER V A S I M P L E S E R V I C E S . C O M 37 Teach your children and live by “The Grandma Rule”: Is what you’re posting something you’d want your grandmother, boss, future employer, parents, school officials or future in-laws to see? If not…it’s probably not a great idea to post it!

Editor's Notes

  1. Facebook DepressionResearchers have proposed a new phenomenon called “Facebook depression,” defined as depression that develops when preteens and teens spend a great deal of time on social media sites, such as Facebook, and then begin to exhibit classic symptoms of depression.Acceptance by and contact with peers is an important element of adolescent life. The intensity of the online world is thought to be a factor that may trigger depression in some adolescents. As with offline depression, preadolescents and adolescents who suffer from Facebook depression are at risk for social isolation and sometimes turn to risky Internet sites and blogs for “help” that may promote substance abuse, unsafe sexual practices, or aggressive or self-destructive behaviors. http://pediatrics.aappublications.org/content/127/4/800.full
  2. Out of all websites or social network, this is definitely one you should supervise very closely.
  3. Youtube has done a great job at providing resources to parents.