Internet Safety - WMS Williamsburg Middle School What Are They Doing Online? • 8 through 18 year olds are: – – – – – 25% - Social networking sites 19% - Playing games 16% - Video sites 13% - Instant messaging 12% - On other Websites Source: Kaiser Family Foundation:Generation M2: Media in the Lives of 8- to 18-Year-Olds. January 2010 Teen Online Activities Cell Phones Online Gaming Blogging File Sharing Social Networking E-mail, IM, and Chatrooms Video & images Risky Online Behaviors 1 Wolak, Janis, David Finkelhor, Kimberly J. Mitchell, and Michele Ybarra. “Online ‘Predators’ and their Victims: Myths, Realities, and Implications for Prevention and Treatment.” American Psychologist 63:2. February-March 2008: 111-128. • Cell phones – – – – Technology Tools to Communicate Text messaging Image sharing Email Online social networking • Interactive gaming – Xbox® Live, Nintendo Wii, Sony Playstation – Installed games on computers • Computers • iPod Touch, Zune and other MP3 players – Wireless capabilities Communication with Your Child • Some material may be “unsettling,” but this is unavoidable. • Philosophy: “Instill a sense of caution, not a sense of fear.” • The good does outweigh the bad. • Ask questions … offer thoughts 2009 - NYS Internet Crimes Against Children Task Force Discuss Expectations • • • • Online activities How much time they spend online How much information to put online Never meet anyone in person that you met online Talk to them about what they are doing online. What To Do When… • Receive a IM chat request, email from an unknown person – Block or report as spam • Receive an uncomfortable or aggressive email or text message – – – – Block that person Change username/password Contact the company Talk to an adult What To Do When… • Your account has been compromised – Contact the company – Contact your ISP provider – Create new account Evaluate Sources • • • • Websites Files (email or file-sharing) Images Online identities – How to verify people’s online profiles – Make sure to verify before adding as friends in social networking sites. Talk their Talk • L2G – Like to go? • 511 – Too much information • *w* – Wink • P911 – Parent coming into room alert Additional Strategies Learn… • Cell phones – Text – Image captures – Internet access • IPods and other MP3 players • Gaming devices – Internet access • Social networking sites – Youtube – Facebook Do… • Put computer(s) in areas of home where it would be easy to monitor – Not in bedrooms • Check Internet history and/or buddy lists • Use filtering programs – Net Nanny, Safe Eyes, CyberSitter, etc. • “Google” your child – Search for them on Facebook. Do… • Avoid webcams. • Limit the amount of time online. • Know your children’s user ids and passwords. • Look into the Internet history and/or temporary files Cyberbullying • 32% teens have been victimized by cyber-bullying. (2007) What is Cyberbullying? – Sending mean, vulgar, or threatening messages or images – Posting sensitive, private information about another person – Pretending to be someone else in order to make that person look bad – Intentionally excluding someone from an online group Source: Cyberbullying, Stop Bullying Now! (U.S. Department of Health and Human Services) Possible Warning Signs - Victims – Complaining that other children or a group of children do not like them. – Preoccupation with friendship concerns. – Poor self-esteem. Feeling they are not as good as others. – Not wanting to go to school or other activities. – Spending a great deal of time on the computer. – Being secretive about online activities. – Lacking interest and involvement with other kids 2009 - NYS Internet Crimes Against Children Task Force Possible Warning Signs - Bully • Acting like their group (clique) is superior. • Bragging that they use the Internet to play practical jokes or steal other kids’ passwords as a joke. • Continuing to make fun of other kids. • Getting in trouble at school or in the community for inappropriate computer use. • Spending a great deal of time on the computer. • Being secretive about online activities. 2009 - NYS Internet Crimes Against Children Task Force If You Suspect Cyberbullying…. – Preserve evidence – this is crucial for identifying the bully and making a case. – Attempt to enlist assistance from the service provider. – If able to identify the bully, contact him or her and/or parents. – Use available blocking technology (i.e., block the user on IM, email and chat.) – Cybertipline.com – In serious cases, seek assistance from the police (i.e. threats of physical harm, unrelenting or unable to stop.) 2009 - NYS Internet Crimes Against Children Task Force