SlideShare ist ein Scribd-Unternehmen logo
1 von 41
Emily Ensign
Dir. of Content Development
iKeepsafe
2iKeepSafe.org CONFIDENTIAL
OPENING ACTIVITY
Break into small groups.
Discuss your children’s technology use and share:
• Three trends you’ve noticed
• Two concerns you have
• One question you hope to have answered
3iKeepSafe.org CONFIDENTIAL
YOUTH AND CONNECTED DEVICES
How many hours per day do
kids spend with digital
devices—cell phones,
computers, iPods, iPads,
tablets, gaming?
4iKeepSafe.org CONFIDENTIAL
YOUTH AND CONNECTED DEVICES
• 7.5 hours a day
• 7 days a week
• 52.5 hours a
week
Kaiser Family Foundation study:
"Generation M2: Media in the Lives of 8- to 18-Year-Olds," January 2010.
5iKeepSafe.org CONFIDENTIAL
WHAT KIDS ARE DOING ONLINE
6iKeepSafe.org CONFIDENTIAL
PARENTS ARE THE KEY
New research: kids look to parents
above any other source for
their connected/mobile behaviors.
[Lenhart, A., et. al., “Teens, kindness and cruelty on social networks.” Pew Internet & American Life Project, 2011.]
7iKeepSafe.org CONFIDENTIAL
DEFINING SUCCESS
• Ethical
• Responsible
• Resilient
ALANCE
THICS
RIVACY
EPUTATION &
RELATIONSHIPS
NLINE SECURITY
B
E
A
P
R
O
Digital Citizenship is:
ALANCEB
GRADE POINT AVERAGE (GPA)
falls __ for each hour per day that a
student averaged with digital media.
10iKeepSafe.org CONFIDENTIAL
BALANCE
GPA falls .05 for each hour per day
that a student averaged with digital media.
Cyberpsychology, Behavior, and Social Networking, “Facebook, texting help Freshmen Students,” October, 2010.
11iKeepSafe.org CONFIDENTIAL
BALANCE
The American Academy of Pediatrics (AAP)
recommends that parents limit screen time (TV,
computer, etc.) to:
• ?_ hrs/day for children under two
• ?_ hrs/day for children over two
Pediatrics: "Adolescents Living the 24/7 Lifestyle: Effects of Caffeine and Technology on Sleep Duration and Daytime Functioning,"
February 2009.
12iKeepSafe.org CONFIDENTIAL
BALANCE
AAP Recommendations:
• Children under 2 years: 0 hrs/day
(No TV or computers!)
• Children over 2 years: 1‒ 2 hrs/day
Pediatrics: "Adolescents Living the 24/7 Lifestyle: Effects of Caffeine and Technology on Sleep Duration and Daytime Functioning,"
February 2009.
13iKeepSafe.org CONFIDENTIAL
Create an “electronic media free” environment in children’s
bedrooms
• Kids who sacrifice sleep time for screen time are at a greater risk for sleep
disorders, mood swings, anxiety and depression
• Log off a few hours before bed
• Consider charging phones in central location or contact your carrier to turn off
texting and phone service during certain hours
14iKeepSafe.org CONFIDENTIAL
BALANCE
Set Limits:
Directly involve your kids
Both sides should benefit
Write it out
Sign and hang up
THICSE
At what age does
cyberbullying and digital
piracy (illegally downloading
movies and music) start?
16iKeepSafe.org CONFIDENTIAL
ETHICS
• Cyberbullying begins in 2nd grade1
• Piracy begins in 4th grade1
• Hacking begins in 7th grade1
• Most young people are devoid of ethical thinking or
consideration for others when using the web2
1. Rochester Institute of Technology, 2008.
2. Harvard School of Education, “Good Play Project”, 2008.
17iKeepSafe.org CONFIDENTIAL
ETHICAL USE — CYBERBULLYING
18iKeepSafe.org CONFIDENTIAL
ETHICS
Use your children’s terminology
Online communities are everyone’s business:
• Upstander vs. bystander
• Report bad behavior
19iKeepSafe.org CONFIDENTIAL
ETHICS
19
Whether or not downloading music and movies is illegal depends on the
particular copyright attached to it.
Go to a trustworthy sites…
Movies: stream shows from legal sites such as network television stations
websites (CBS, Fox, NBC, and ABC), or rent/buy movies online through
authorized vendors and dealers like Amazon, Unbox, Netflicks, and iTunes. Also,
because sites like Yahoo! and MySpace have developed relationships with
movie studios, they are sometimes able to show clips or even full-length
versions of films.
20iKeepSafe.org CONFIDENTIAL
ETHICS
20
Music: iTunes, 7digital, Napster, Amazon, Playlouder, HMV, and Virgin.
Pandora Radio streams music for free and provides links for legal
downloads.
Sometimes it’s difficult for children to understand the legal protection that
copyrights offer products and to realize the serious consequences they may
face for downloading illegal material.
RIVACY
Do young people think their friends
share too much personal information
online?
P
“Online Privacy: What Does It Mean to Parents and Kids?," Common Sense
Media, 2010, www.commonsensemedia.org/sites/default/files/privacypoll.pdf.
22iKeepSafe.org CONFIDENTIAL
PRIVACY—STATS
Most of them do. 79% of youth
think their friends share too
much personal info online.
“Online Privacy: What Does It Mean
to Parents and Kids?," Common Sense Media, 2010,
www.commonsensemedia.org/sites/default/files/privacypoll.
pdf.
23iKeepSafe.org CONFIDENTIAL
PRIVACY — THINK BEFORE YOU POST
24iKeepSafe.org CONFIDENTIAL
PRIVACY
24
Because everything
online is potentially
viewable to anyone with
Internet access, it’s
important for parents to
be aware of what
information is being
posted by or about their
child in order to protect
their child’s personal
and financial privacy.
ELATIONSHIPS
How many text messages
does an average teen send
per month?
R
RELATIONSHIPS
Average teen sends 3,400 texts
per month—seven messages
per waking hour.1
1. Nielsen Wire, 2011.
2. Ann Collier, “Teens’ social media experiences largely positive:
Study,” NetFamilyNews.org., November 10, 2011,
http://www.netfamilynews.org/?p=30933.
• Youth live out their lives online.
• Adults and youth have very different
relationships with technology.
RELATIONSHIPS
ACTIVITY: Connecting through technology
• Play one of your child’s favorite online games with them
• Connect with a loved one through technology
• Use online search tools and map features to share your
childhood home or birthplace with your child
• Role-play together the different ways that your child can
respond when they see cruelty online. Discover how to
report abuse on platforms like Facebook, YouTube and
Twitter
RELATIONSHIPS
• 70% percent of people worldwide say that the
Internet has improved their relationships
• Has the internet improved your family’s
relationships?
RELATIONSHIPS
• Harmful content impacts a child’s ability to form
and maintain healthy relationships
• Protect kids from:
– Pornography
– Violence
– Hate speech
– Promotion of eating disorders (Ana/Mia)
RELATIONSHIPS
EPUTATION
What percentage of HR
professionals/recruiters have
rejected an application based on
information they found online?
R
• 70% percent of HR professionals
(people hiring) have rejected an
applicant based on something they
found online
• There is no delete button on the
Internet!
REPUTATION
NLINE SECURITY
Take a guess — what percentage of
children have someone else using
their Social Security number?
O
Power, Richard, "Child Identity Theft: New Evidence Indicates Identity Thieves are Targeting
Children for Unused Social Security Numbers," 2011,
http://www.cylab.cmu.edu/files/pdfs/reports/2011/child-identity-theft.pdf.
35iKeepSafe.org CONFIDENTIAL
ONLINE SECURITY
• A recent study found that more than 10% of
children had someone else using their Social
Security number – 51 times higher than adults
in the same
• That’s 4,311 out of 40,000 child identities
scanned
[Power, R. (2011). Child Identity Theft: New Evidence Indicates Identity Thieves are
Targeting Children for Unused Social Security Numbers. Retrieved from
http://www.cylab.cmu.edu/files/pdfs/reports/2011/child-identity-theft.pdf]
36iKeepSafe.org CONFIDENTIAL
ONLINE SECURITY
37iKeepSafe.org CONFIDENTIAL
ONLINE SECURITY
http://www.youtube.com/watch?v=N1xFUw3bW10
http://tinyurl.com/nck9cy5
38iKeepSafe.org CONFIDENTIAL
ONLINE SECURITY
General Tips:
•Teach kids to listen to their “internal-creep-o-meter”
•Read privacy/policy fine print
•Use strictest privacy settings on social media platforms
•Use discretion when downloading apps onto mobile phones
•Passwords, passwords, passwords
39iKeepSafe.org CONFIDENTIAL
ONLINE SECURITY — PASSWORDS COUNT
How to make a strong password
that’s easy to remember:
• Use a favorite song
• Substitute numbers for letters
• Add a symbol:
• <3 for love
• @ for a
• 1 for L
• 5 for S
40iKeepSafe.org CONFIDENTIAL
BE A PRO ONLINE
For more information about how you can
download our free eBook at
www.ikeepsafe.org/google
and also visit,
www.ikeepsafe.org/be-a-pro/info/.

Weitere ähnliche Inhalte

Was ist angesagt?

Secondary and special good practice - innovating safely
Secondary and special good practice - innovating safelySecondary and special good practice - innovating safely
Secondary and special good practice - innovating safelyDan Bowen
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)Sumaiya Ismail
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBloxx
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymegbg
 
Student Safety Reimagined - Product Brief
Student Safety Reimagined - Product BriefStudent Safety Reimagined - Product Brief
Student Safety Reimagined - Product BriefSecurly
 
Social Media for School Districts - OTA 15
Social Media for School Districts - OTA 15Social Media for School Districts - OTA 15
Social Media for School Districts - OTA 15Diana Benner
 
A 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible UseA 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible UseLouise Jones
 
Making the Most out of Social Media!
Making the Most out of Social Media!Making the Most out of Social Media!
Making the Most out of Social Media!Louise Jones
 
Cybersafety
Cybersafety Cybersafety
Cybersafety Sue Noor
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriersJohn Oxley
 
Considerations for ICT in Learning
Considerations for ICT in Learning Considerations for ICT in Learning
Considerations for ICT in Learning Louise Jones
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomGabriella Maree Wheeler
 
A student’s right to privacy1
A student’s right to privacy1A student’s right to privacy1
A student’s right to privacy1Heidi Siwak
 
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueNL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueMichael Barbour
 
Black Coffee Texarkana
Black Coffee TexarkanaBlack Coffee Texarkana
Black Coffee TexarkanaDavid Jakes
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely
 
How to Take Digital Citizenship Schoolwide?
How to Take Digital Citizenship Schoolwide?How to Take Digital Citizenship Schoolwide?
How to Take Digital Citizenship Schoolwide?archana cks
 

Was ist angesagt? (19)

Secondary and special good practice - innovating safely
Secondary and special good practice - innovating safelySecondary and special good practice - innovating safely
Secondary and special good practice - innovating safely
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for Education
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Student Safety Reimagined - Product Brief
Student Safety Reimagined - Product BriefStudent Safety Reimagined - Product Brief
Student Safety Reimagined - Product Brief
 
Social Media for School Districts - OTA 15
Social Media for School Districts - OTA 15Social Media for School Districts - OTA 15
Social Media for School Districts - OTA 15
 
A 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible UseA 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible Use
 
Making the Most out of Social Media!
Making the Most out of Social Media!Making the Most out of Social Media!
Making the Most out of Social Media!
 
Cybersafety
Cybersafety Cybersafety
Cybersafety
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safe
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
Considerations for ICT in Learning
Considerations for ICT in Learning Considerations for ICT in Learning
Considerations for ICT in Learning
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroom
 
A student’s right to privacy1
A student’s right to privacy1A student’s right to privacy1
A student’s right to privacy1
 
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueNL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
 
Black Coffee Texarkana
Black Coffee TexarkanaBlack Coffee Texarkana
Black Coffee Texarkana
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
 
parenting-CoSN2016
parenting-CoSN2016parenting-CoSN2016
parenting-CoSN2016
 
How to Take Digital Citizenship Schoolwide?
How to Take Digital Citizenship Schoolwide?How to Take Digital Citizenship Schoolwide?
How to Take Digital Citizenship Schoolwide?
 

Ähnlich wie BEaPRO Presentation: Lafayette Elementary

Parenting the MySpace Generation
Parenting the MySpace GenerationParenting the MySpace Generation
Parenting the MySpace Generationdlevin
 
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop PresentationLydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop PresentationLydia Smith-Davis
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptlival1
 
Dangers of Social Media What we know about teens
Dangers of Social Media What we know about teensDangers of Social Media What we know about teens
Dangers of Social Media What we know about teenscontactcareergyani
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptYadetaHailu
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptchellakaruppasamy
 
5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.Your eKavach
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online SafetyDonna Murray
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and ChldrenJoe Drumgoole
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
 
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundOnline Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundStephanie Barnhart
 
Safety Net: A Parent's Guide (Infographic)
Safety Net: A Parent's Guide (Infographic)Safety Net: A Parent's Guide (Infographic)
Safety Net: A Parent's Guide (Infographic)uKnow.com
 
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016Kathryn White
 

Ähnlich wie BEaPRO Presentation: Lafayette Elementary (20)

Parenting the MySpace Generation
Parenting the MySpace GenerationParenting the MySpace Generation
Parenting the MySpace Generation
 
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop PresentationLydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
CYP E-Safety
CYP E-SafetyCYP E-Safety
CYP E-Safety
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
 
Dangers of Social Media What we know about teens
Dangers of Social Media What we know about teensDangers of Social Media What we know about teens
Dangers of Social Media What we know about teens
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
 
5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundOnline Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber Playground
 
Safety Net: A Parent's Guide (Infographic)
Safety Net: A Parent's Guide (Infographic)Safety Net: A Parent's Guide (Infographic)
Safety Net: A Parent's Guide (Infographic)
 
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016
 

Mehr von emilyensign

Wise Tech Choices June 27th Event
Wise Tech Choices June 27th EventWise Tech Choices June 27th Event
Wise Tech Choices June 27th Eventemilyensign
 
NCE Presentation, Feb. 2015
NCE Presentation, Feb. 2015 NCE Presentation, Feb. 2015
NCE Presentation, Feb. 2015 emilyensign
 
Education Privacy Presentation
Education Privacy Presentation Education Privacy Presentation
Education Privacy Presentation emilyensign
 
Building a Positive Online Reputation
Building a Positive Online ReputationBuilding a Positive Online Reputation
Building a Positive Online Reputationemilyensign
 
CETPA Presentation: Building A Successful BYOD Program
CETPA Presentation: Building A Successful BYOD ProgramCETPA Presentation: Building A Successful BYOD Program
CETPA Presentation: Building A Successful BYOD Programemilyensign
 
National Conference on Youth Cyber Safety
National Conference on Youth Cyber SafetyNational Conference on Youth Cyber Safety
National Conference on Youth Cyber Safetyemilyensign
 
Take Charge of Your Digital Life
Take Charge of Your Digital LifeTake Charge of Your Digital Life
Take Charge of Your Digital Lifeemilyensign
 
2nd Grade Class Presentation
2nd Grade Class Presentation 2nd Grade Class Presentation
2nd Grade Class Presentation emilyensign
 

Mehr von emilyensign (8)

Wise Tech Choices June 27th Event
Wise Tech Choices June 27th EventWise Tech Choices June 27th Event
Wise Tech Choices June 27th Event
 
NCE Presentation, Feb. 2015
NCE Presentation, Feb. 2015 NCE Presentation, Feb. 2015
NCE Presentation, Feb. 2015
 
Education Privacy Presentation
Education Privacy Presentation Education Privacy Presentation
Education Privacy Presentation
 
Building a Positive Online Reputation
Building a Positive Online ReputationBuilding a Positive Online Reputation
Building a Positive Online Reputation
 
CETPA Presentation: Building A Successful BYOD Program
CETPA Presentation: Building A Successful BYOD ProgramCETPA Presentation: Building A Successful BYOD Program
CETPA Presentation: Building A Successful BYOD Program
 
National Conference on Youth Cyber Safety
National Conference on Youth Cyber SafetyNational Conference on Youth Cyber Safety
National Conference on Youth Cyber Safety
 
Take Charge of Your Digital Life
Take Charge of Your Digital LifeTake Charge of Your Digital Life
Take Charge of Your Digital Life
 
2nd Grade Class Presentation
2nd Grade Class Presentation 2nd Grade Class Presentation
2nd Grade Class Presentation
 

Kürzlich hochgeladen

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Kürzlich hochgeladen (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

BEaPRO Presentation: Lafayette Elementary

  • 1. Emily Ensign Dir. of Content Development iKeepsafe
  • 2. 2iKeepSafe.org CONFIDENTIAL OPENING ACTIVITY Break into small groups. Discuss your children’s technology use and share: • Three trends you’ve noticed • Two concerns you have • One question you hope to have answered
  • 3. 3iKeepSafe.org CONFIDENTIAL YOUTH AND CONNECTED DEVICES How many hours per day do kids spend with digital devices—cell phones, computers, iPods, iPads, tablets, gaming?
  • 4. 4iKeepSafe.org CONFIDENTIAL YOUTH AND CONNECTED DEVICES • 7.5 hours a day • 7 days a week • 52.5 hours a week Kaiser Family Foundation study: "Generation M2: Media in the Lives of 8- to 18-Year-Olds," January 2010.
  • 6. 6iKeepSafe.org CONFIDENTIAL PARENTS ARE THE KEY New research: kids look to parents above any other source for their connected/mobile behaviors. [Lenhart, A., et. al., “Teens, kindness and cruelty on social networks.” Pew Internet & American Life Project, 2011.]
  • 7. 7iKeepSafe.org CONFIDENTIAL DEFINING SUCCESS • Ethical • Responsible • Resilient
  • 9. ALANCEB GRADE POINT AVERAGE (GPA) falls __ for each hour per day that a student averaged with digital media.
  • 10. 10iKeepSafe.org CONFIDENTIAL BALANCE GPA falls .05 for each hour per day that a student averaged with digital media. Cyberpsychology, Behavior, and Social Networking, “Facebook, texting help Freshmen Students,” October, 2010.
  • 11. 11iKeepSafe.org CONFIDENTIAL BALANCE The American Academy of Pediatrics (AAP) recommends that parents limit screen time (TV, computer, etc.) to: • ?_ hrs/day for children under two • ?_ hrs/day for children over two Pediatrics: "Adolescents Living the 24/7 Lifestyle: Effects of Caffeine and Technology on Sleep Duration and Daytime Functioning," February 2009.
  • 12. 12iKeepSafe.org CONFIDENTIAL BALANCE AAP Recommendations: • Children under 2 years: 0 hrs/day (No TV or computers!) • Children over 2 years: 1‒ 2 hrs/day Pediatrics: "Adolescents Living the 24/7 Lifestyle: Effects of Caffeine and Technology on Sleep Duration and Daytime Functioning," February 2009.
  • 13. 13iKeepSafe.org CONFIDENTIAL Create an “electronic media free” environment in children’s bedrooms • Kids who sacrifice sleep time for screen time are at a greater risk for sleep disorders, mood swings, anxiety and depression • Log off a few hours before bed • Consider charging phones in central location or contact your carrier to turn off texting and phone service during certain hours
  • 14. 14iKeepSafe.org CONFIDENTIAL BALANCE Set Limits: Directly involve your kids Both sides should benefit Write it out Sign and hang up
  • 15. THICSE At what age does cyberbullying and digital piracy (illegally downloading movies and music) start?
  • 16. 16iKeepSafe.org CONFIDENTIAL ETHICS • Cyberbullying begins in 2nd grade1 • Piracy begins in 4th grade1 • Hacking begins in 7th grade1 • Most young people are devoid of ethical thinking or consideration for others when using the web2 1. Rochester Institute of Technology, 2008. 2. Harvard School of Education, “Good Play Project”, 2008.
  • 18. 18iKeepSafe.org CONFIDENTIAL ETHICS Use your children’s terminology Online communities are everyone’s business: • Upstander vs. bystander • Report bad behavior
  • 19. 19iKeepSafe.org CONFIDENTIAL ETHICS 19 Whether or not downloading music and movies is illegal depends on the particular copyright attached to it. Go to a trustworthy sites… Movies: stream shows from legal sites such as network television stations websites (CBS, Fox, NBC, and ABC), or rent/buy movies online through authorized vendors and dealers like Amazon, Unbox, Netflicks, and iTunes. Also, because sites like Yahoo! and MySpace have developed relationships with movie studios, they are sometimes able to show clips or even full-length versions of films.
  • 20. 20iKeepSafe.org CONFIDENTIAL ETHICS 20 Music: iTunes, 7digital, Napster, Amazon, Playlouder, HMV, and Virgin. Pandora Radio streams music for free and provides links for legal downloads. Sometimes it’s difficult for children to understand the legal protection that copyrights offer products and to realize the serious consequences they may face for downloading illegal material.
  • 21. RIVACY Do young people think their friends share too much personal information online? P “Online Privacy: What Does It Mean to Parents and Kids?," Common Sense Media, 2010, www.commonsensemedia.org/sites/default/files/privacypoll.pdf.
  • 22. 22iKeepSafe.org CONFIDENTIAL PRIVACY—STATS Most of them do. 79% of youth think their friends share too much personal info online. “Online Privacy: What Does It Mean to Parents and Kids?," Common Sense Media, 2010, www.commonsensemedia.org/sites/default/files/privacypoll. pdf.
  • 24. 24iKeepSafe.org CONFIDENTIAL PRIVACY 24 Because everything online is potentially viewable to anyone with Internet access, it’s important for parents to be aware of what information is being posted by or about their child in order to protect their child’s personal and financial privacy.
  • 25. ELATIONSHIPS How many text messages does an average teen send per month? R
  • 26. RELATIONSHIPS Average teen sends 3,400 texts per month—seven messages per waking hour.1 1. Nielsen Wire, 2011. 2. Ann Collier, “Teens’ social media experiences largely positive: Study,” NetFamilyNews.org., November 10, 2011, http://www.netfamilynews.org/?p=30933.
  • 27. • Youth live out their lives online. • Adults and youth have very different relationships with technology. RELATIONSHIPS
  • 28. ACTIVITY: Connecting through technology • Play one of your child’s favorite online games with them • Connect with a loved one through technology • Use online search tools and map features to share your childhood home or birthplace with your child • Role-play together the different ways that your child can respond when they see cruelty online. Discover how to report abuse on platforms like Facebook, YouTube and Twitter RELATIONSHIPS
  • 29. • 70% percent of people worldwide say that the Internet has improved their relationships • Has the internet improved your family’s relationships? RELATIONSHIPS
  • 30. • Harmful content impacts a child’s ability to form and maintain healthy relationships • Protect kids from: – Pornography – Violence – Hate speech – Promotion of eating disorders (Ana/Mia) RELATIONSHIPS
  • 31. EPUTATION What percentage of HR professionals/recruiters have rejected an application based on information they found online? R
  • 32. • 70% percent of HR professionals (people hiring) have rejected an applicant based on something they found online • There is no delete button on the Internet! REPUTATION
  • 33.
  • 34. NLINE SECURITY Take a guess — what percentage of children have someone else using their Social Security number? O Power, Richard, "Child Identity Theft: New Evidence Indicates Identity Thieves are Targeting Children for Unused Social Security Numbers," 2011, http://www.cylab.cmu.edu/files/pdfs/reports/2011/child-identity-theft.pdf.
  • 35. 35iKeepSafe.org CONFIDENTIAL ONLINE SECURITY • A recent study found that more than 10% of children had someone else using their Social Security number – 51 times higher than adults in the same • That’s 4,311 out of 40,000 child identities scanned [Power, R. (2011). Child Identity Theft: New Evidence Indicates Identity Thieves are Targeting Children for Unused Social Security Numbers. Retrieved from http://www.cylab.cmu.edu/files/pdfs/reports/2011/child-identity-theft.pdf]
  • 38. 38iKeepSafe.org CONFIDENTIAL ONLINE SECURITY General Tips: •Teach kids to listen to their “internal-creep-o-meter” •Read privacy/policy fine print •Use strictest privacy settings on social media platforms •Use discretion when downloading apps onto mobile phones •Passwords, passwords, passwords
  • 39. 39iKeepSafe.org CONFIDENTIAL ONLINE SECURITY — PASSWORDS COUNT How to make a strong password that’s easy to remember: • Use a favorite song • Substitute numbers for letters • Add a symbol: • <3 for love • @ for a • 1 for L • 5 for S
  • 41. For more information about how you can download our free eBook at www.ikeepsafe.org/google and also visit, www.ikeepsafe.org/be-a-pro/info/.

Hinweis der Redaktion

  1. Here’s a quick video to show us how kids are using their connected technology. [Play video.]   What stood out to you in that video? . . . What did you notice? . . . Is this what you’re kids are experiencing? [Take response.]
  2. This is good news for parents. Kids are looking to us more than their peers or anyone else for guidance on their digital devices. What that means for us is, we don’t need to be shy about communicating our expectations — our kids are looking for this kind of guidance and need it more than ever. It also means our example really counts.
  3. Frontal Lobe doesn’t develop until early 20s.
  4. Many students are reticent to admit that they are being bullied — online or offline. Recent research by Danah Boyd found evidence that students in a particular high school were in fact being cyberbullied. Yet, when she asked the students what they thought, they denied that there was any cyberbullying. The students called it, “drama.” Source: [Marwick, Alice E. and boyd, danah, The Drama! Teen Conflict, Gossip, and Bullying in Networked Publics (September 12, 2011). A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society, September 2011. Available at SSRN: http://ssrn.com/abstract=1926349] This is Part one of a four part series on cyberbullying. It has excellent information on what constitutes cyberbullying, how to recognize it, prevent it, and manage cyberbullying situations. You can find these online at the Verizon website. [NOTE to presenter: Depending on what you consider to be relevant for your student body, you may want to select another video to play.] Part 1: Is Your Child Being Cyberbullied? Part 2: When Does "Rude" Cross the Line, Online? Part 3: Why Kids Cyberbully - Recognizing Differences Part 4: Understanding and Preventing Cyberbullying - The Family Approach
  5. Danah Boyd NYU research Professor Cyberbullying = DRAMA = use your child’s terminology
  6. 30-Second PSA: “Think Before You Post” (Meredith Salenger) — This PSA shows how kids’ online behavior might look coming from a parent. (Embarrassed?) http://www.youtube.com/watch?v=2r2jNCyuV6U [Play video.] What did you think of that? . . . Kids, how would you like your mom to be posting online like this? ALTERNATE VIDEO 30-Second PSA (more serious): “Think Before You Post” (Anti-sexting) —This shows how creepy it can get when you put too much personal information online. [Play from YouTube: http://www.youtube.com/watch?v=4w4_Hrwh2XI]
  7. Youth are living out their lives online. What they do in the digital environment affects how they feel about themselves and the relationships around them. What they post and how they communicate impacts their future academic and employment opportunities.   YOUTH: Technology is a lifestyle. They emotionally connect with each other through their digital devices and web platforms. They are emotionally connected THROUGH their technology. They use these platforms to define their relationships and live out their lives in the digital environment. What youth do with their digital devices affects how they feel about themselves and the relationships around them.   It is important to recognize that adults and youth have different relationships with digital technology. PARENTS: Technology is a TOOL. It is not necessarily the vehicle that makes them feel more loved or close to someone. Technology is something that is used for efficiency, to enhance their offline lives. This is why, as caring adults, we need to be in this space.
  8. Someone else using your Social Security number means the theft of your identity, and almost always, it indicates debt in your name. Often, it’s massive debt that no one knows about until the child applies for student loans for college. Ten percent represents a massive hassle for the victims.
  9. Steering Clear of Cyber Tricks This video is appropriate for younger audiences and covers concepts of ETHICAL USE (avoiding piracy) and ONLINE SECURITY (safe downloading). It is available for download for educational use at the iKeepSafe YouTube channel. Download and embed in this slide: http://www.youtube.com/watch?v=N1xFUw3bW10
  10. VIDEO: Paw Goes and the Dangerous Download This video is appropriate for younger audiences and covers concepts of ETHICAL USE (avoiding piracy) and ONLINE SECURITY (safe downloading). It is available for download for educational use at the iKeepSafe YouTube channel. Download and embed in this slide: http://www.youtube.com/watch?v=N1xFUw3bW10
  11. Online security begins with strong passwords. A weak password can create vulnerabilities for everyone. Help kids understand the importance of strong passwords. [Do a demonstration.] Use the first letter of the opening words of a favorite song. Make sure one of your letters is a capital. Substitute a number for a letter. Add a symbol.
  12. Online security begins with strong passwords. A weak password can create vulnerabilities for everyone. Help kids understand the importance of strong passwords. [Do a demonstration.] Use the first letter of the opening words of a favorite song. Make sure one of your letters is a capital. Substitute a number for a letter. Add a symbol. I love my daughter, Hailey, i<3md,H,4eVr
  13. Here’s an introduction to the BE a PRO concepts of digital citizenship. [Play video.]   What stood out to you in that video? [Take response.]