Cyber bullying and Social – Interaction with Technology

advertisement
Cyber bullying and Social
Interaction with Technology–
How to Talk to Your Child
Tuesday, November 10
Marquette University
Restorative Justice Initiative Conference
12:45-1:45pm
1
Introduction and Welcome
Paul Kaye,
School Resource Officer,
New Berlin Eisenhower MS & HS
Melissa Thompson,
Principal,
Waukesha West High School
Mary Jane Whitty
Guidance Counselor,
New Berlin Eisenhower HS
2
Statistics you should know…
• MySpace recently cancelled 90,000 accounts
• Facebook users are often imposters- how can a “Class of 2009” for a
school with a class of 350 have more than 420 members?
• One in 5 youth received a sexual approach or solicitation over the
Internet in the past year.
• More than 25% of kids recently polled had sent or received a
pornographic picture via cell phone or an email account.
• 71% of teens reported receiving messages online from someone they
don’t know
• 45% have been asked for personal information by someone they don’t
know
• College admissions counselors AND employers search for kids on
social networking sites
3
Sexual Solicitations Online
• 1 in 5 regular internet users have received
a sexual solicitation
– 2006: 1 in 7
• 97% of the solicitors were met online
– 2006: 86% were met online
• 66% of victims of solicitations are female
• 65% occurred in Chat Rooms
• 92% on a home computer
4
Purpose of our presentation
• Discuss elements of cyber bullying and
social interaction to promote understanding
• Identify common emotions, circumstances
and after effects when cyber bullying
happens or social interaction with
technology goes amiss
• Keep kids from being victims, suspects, and
defendants
5
Cyber bullying
• Definition
• Examples
• Where it takes place
6
Trends in Child Exploitation
• Peer to peer sources
– Napster
– BearShare
– Morpheous
– Kazaa
• Technology
– X Box 360
• One on one voice chat
• Matchmaking features
• Enhanced “friends” list
• Web Cameras
• Camera phones
7
Trends in Child Exploitation
• Social Networking Sites
– Myspace.com
– Facebook.com
– Friendster.com
– Xanga.com
– Livejournal.com
– Friendsfusion.com
– Prisonpenpals.com
8
Prevention and Investigation
• Family
– Computer placement, filters, monitoring software
– Discussion and ground rules
– Relationship as parent, not friend
• School
– Strong, trusting relationships with adults
– Process defined for conducting investigation(s)
– Accessible by parents and students
• Community
– SRO
– Cybercrimes or other similar unit
9
Trust BUT VERIFY
• Search your child’s cell phone/computer
• No law gives your minor child a privacy
right relative to you
– Set clear expectations, so it feels fair
• Myths
– “None of this could happen to my child”
– “This only happens to the bad kids”
10
Response and Recovery
Ms. Mary Jane Whitty
11
Download