We live in an increasingly technology-based society. Children need to be prepared to navigate a world and a workforce in which computers are an essential part of daily life. The Internet can be used as a learning tool or a weapon. Social networking sites, like Facebook and Twitter, are popular Internet destinations for millions of children nationwide. Unfortunately, these sites are also popular with sexual predators, cyber bullies, and con artists. Attend this informative workshop to gain a clearer understanding of the issues children are facing, and what message to communicate to your child about making safer decisions.
1. Online Safety: Practical
Practices for Parents
Kristi Richburg
Coordinator, FDLRSAdministration-HRD Project
richburgk@nefec.org
June 7, 2013
2. Top 5Tips
1. Talk toYour Child
2. Password Protection
3. Don’t RevealToo Much
Information
4. Be Aware of
Cyberbullying
5. Use Social Networks
Safely
http://billmullins.files.wordpress.com/2008/08/windowslivewriterthinkyoureinternetsafetysavvythinkagain-bc5binternet-safety-43.jpg
4. Password Protection
Keep passwords secure.
Do not share passwords.
Change your password every
90 days.
Do not use the same user name and password for
different sites.
Passwords should have at least 8 characters and
include numbers and symbols and numbers.
http://tweakyourbiz.com/technology/files/shutterstock_87170332.jpg
5. Stranger Danger in the
20th Century
http://newteacherwife.files.wordpress.com/2010/11/free_candy.jpg
6. Stranger Danger in the
21st Century
http://www.blogcdn.com/blog.games.com/media/2011/10/charles-conway-scam-detectives.png
7. What Kids Don’t KnowThat Could HurtThem
Four in five children can’t tell when they are talking to
an adult posing as a child on the internet.
Four in five kids thought they were chatting to a teen
when in fact it was an adult
Students as old as 17 struggle to tell the difference
between an adult posing as a child or a real child
“befriending” them online
Overall only 18% of children taking part in the
experiment guessed correctly as to the age of the
“predator”
8.
9. Revealing too much
Limit what you
post.
Use privacy settings
to limit your
audience.
Change your
default settings to
limit the amount of
sharing from your
account.
http://www.intuitive.com/blog/images/facebook-privacy-settings-update-1.png
10. Cyberbullying
http://www.intuitive.com/blog/images/facebook-privacy-settings-update-1.png
32% of online teens have experienced one of the following forms
of online harassment:
15% of teens reported having private material (IM, txt, email)
forwarded without permission
13% had received threatening messages
13% said someone had spread a rumor about them online
6% had someone post an embarrassing picture of them online
without permission (Lenhart, 2007)
26% of teens have been harassed via their cell phones either by
voice or text (Lenhart, 2010)
12. Use Social Networks Safely
Provide only information that you are required (*) to provide.
Keep some things private:
Last Name
Phone Numbers
Home Address
Date of Birth
School/SportsTeam Name
Travel Plans
THINK before you post!
http://socialmediainbusiness.com/wp-content/uploads/2012/03/Social-Media-in-Business-Social-Media-Applications-Guide.jpg
13. References
Lenhart,A. (2007)Cyberbullying. Pew Internet & American Life
Project,Washington, DC.
http://www.pewinternet.org/Reports/2007/Cyberbullying.aspx
Lenhart,A., et al. (2010)Teens and Mobile Phones. Pew Research
Center’s Internet & American Life Project.Washington, DC.
http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-
Phones.aspx
Conner, M (2012) 10Tests of Good DigitalCitizenship. Blog.
http://marciaconner.com/blog/digital-citizenship/
FOSI.orgTop Internet SafetyTips for Parents.
http://www.fosi.org/downloads/resources/fosi-parent-tips.pdf
Software DevelopersTackleChild Grooming On the Net. Accessed June
1, 2013 from:
http://www.sciencedaily.com/releases/2010/06/100601083403.htm
We live in an increasingly technology-based society. Children need to be prepared to navigate a world and a workforce in which computers are an essential part of daily life. The Internet can be used as a learning tool or a weapon. Social networking sites, like Facebook and Twitter, are popular Internet destinations for millions of children nationwide. Unfortunately, these sites are also popular with sexual predators, cyber bullies, and con artists. Attend this informative workshop to gain a clearer understanding of the issues children are facing, and what message to communicate to your child about making safer decisions.
When I was in Kindergarten, my teacher gave me a pair of scissors and showed me how to use them and what to be careful doing. I believe the same philosophy should be used with the Internet.
It may take multiple discussions for this message to sink in, but be patient.Digital CitizenshipAre you treating others the way that they would want to be treated?Would you want to be tagged in that photo?Would you want someone saying that about you online?How are you affecting their online reputation? The Offline TestWould you be comfortable doing this in front of a Police Officer or Teacher?Would you still do what you are doing in real life?Your TestHow is what you are doing reflect on you as a person?Is the action in line with your personal values?Know what your child is doing onlinePut your computer in a public area at home. Check your child’s phone for text messages including picture downloads.What should you do as a parent?You don't want your child or teen to hesitate to come to you about something scary or upsetting because they are afraid that you will pull the plug on their Internet privileges. Teach them to turn off the monitor, not turn off the computer. You will be able to look at the screen to find out why your child is upset and be able to have a conversation. Also, you will know what to report to your Internet Service Provider or the CyberTipLine (check resources). It is important to create an honest, open environment. Listen to your child without judgment.
Don’t invite people to be your friends on-line if you do not know them in the real world.If you must accept a “friend” that you do not know, do so cautiously, recognizing that often people are not who they claim to be.Never give a stranger a photograph of yourselfNever agree to meet a stranger
Statistics from a study done by Computer Scientists at Lancaster University in England.
By using the privacy settings offered on Facebook or other social media sites, you decrease the chances that online predators can view photos you post for family and friends, says Vivian Shic, spokesperson for Trend Micro, an Internet security firm.8. Be alert for unusual activities aside from your child's time on the computer. Pay attention if your child receives mail, gifts, or packages from someone you don’t know, or receives calls from or makes calls to people you don’t recognize. Another warning sign may be that he or she becomes withdrawn from the family. 9. Heed the possible warning signs, including finding pornography on your child’s computer, or your child receiving phone calls from people you don’t recognize; address these situations and don’t just ignore the problem or hope it will go away.
Pew data is measuring online harassment, as our questions did not ask about repetition or power imbalance.15% had private comm forwarded with out permission13% had a rumor spread about them13% received a threatening message or comm6% had embarrassing picture posted w/out permissionLimitations: we missed a big oneMissing spoofed/faked profileBut Teens are also endlessly creative when it comes to bullying (and many other things)e.g., Text bombing=when a person sends 1000 of texts to one number… can be difficult to block, must pay for each text – can run up $100s in bills & makes it impossible to receive communication from others.Bullying in games – e.g., killing a player’s character quickly and repeatedly so gamer can’t play the game.Sources in this slide: Lenhart, A. (2007) Cyberbullying. Pew Internet & American Life Project, Washington, DC. http://www.pewinternet.org/Reports/2007/Cyberbullying.aspxLenhart, A., et al. (2010) Teens and Mobile Phones. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx
Don't react to the bully.If your child is targeted by a cyberbully, keep a cool head. Remind your child that most people realize bullying is wrong. Tell your child not to respond in kind. Instead, encourage him or her to work with you to save the evidence and talk to you about it. If the bullying persists, share the record with school officials or local law enforcement.Protect your child’s profile.If your child finds a profile that was created or altered without his or her permission, contact the site to have it taken down.Block or delete the bully.If the bullying involves instant messaging or another online service that requires a "friend" or "buddy" list, delete the bully from the lists or block their user name or email address.
There are some exceptionsBirth Date: You may be required to provide your birth date to sign up for a social network or other online service.Arrange your privacy settings so the birth date is not visible on your profile. If you want to display your birthday, show the day of the month but not your birth year.School Name: Although you generally should not provide your school name online, some sites feature school-specific networks, and the name of the network will reveal your school online.