2009 - NYS Internet Crimes Against Children Task Force

advertisement
Internet Safety - WMS
Williamsburg Middle School
What Are They Doing Online?
• 8 through 18 year olds are:
–
–
–
–
–
25% - Social networking sites
19% - Playing games
16% - Video sites
13% - Instant messaging
12% - On other Websites
Source: Kaiser Family Foundation:Generation M2: Media in
the Lives of 8- to 18-Year-Olds. January 2010
Teen Online Activities
Cell Phones
Online Gaming
Blogging
File Sharing
Social
Networking
E-mail, IM, and
Chatrooms
Video & images
Risky Online Behaviors
1 Wolak, Janis, David Finkelhor, Kimberly J. Mitchell, and Michele Ybarra. “Online ‘Predators’ and their Victims: Myths,
Realities, and Implications for Prevention and Treatment.” American Psychologist 63:2. February-March 2008: 111-128.
• Cell phones
–
–
–
–
Technology Tools to
Communicate
Text messaging
Image sharing
Email
Online social networking
• Interactive gaming
– Xbox® Live, Nintendo Wii, Sony Playstation
– Installed games on computers
• Computers
• iPod Touch, Zune and other MP3 players
– Wireless capabilities
Communication with Your
Child
• Some material may be “unsettling,” but
this is unavoidable.
• Philosophy: “Instill a sense of caution, not
a sense of fear.”
• The good does outweigh the bad.
• Ask questions … offer thoughts
 2009 - NYS Internet Crimes Against Children Task Force
Discuss Expectations
•
•
•
•
Online activities
How much time they spend online
How much information to put online
Never meet anyone in person that you
met online
Talk to them about what they are doing online.
What To Do When…
• Receive a IM chat request, email from an
unknown person
– Block or report as spam
• Receive an uncomfortable or aggressive
email or text message
–
–
–
–
Block that person
Change username/password
Contact the company
Talk to an adult
What To Do When…
• Your account has been compromised
– Contact the company
– Contact your ISP provider
– Create new account
Evaluate Sources
•
•
•
•
Websites
Files (email or file-sharing)
Images
Online identities
– How to verify people’s online profiles
– Make sure to verify before adding as friends in
social networking sites.
Talk their Talk
• L2G
– Like to go?
• 511
– Too much information
• *w*
– Wink
• P911
– Parent coming into room alert
Additional Strategies
Learn…
• Cell phones
– Text
– Image captures
– Internet access
• IPods and other MP3 players
• Gaming devices
– Internet access
• Social networking sites
– Youtube
– Facebook
Do…
• Put computer(s) in areas of home where it
would be easy to monitor
– Not in bedrooms
• Check Internet history and/or buddy lists
• Use filtering programs
– Net Nanny, Safe Eyes, CyberSitter, etc.
• “Google” your child
– Search for them on Facebook.
Do…
• Avoid webcams.
• Limit the amount of time online.
• Know your children’s user ids and
passwords.
• Look into the Internet history and/or
temporary files
Cyberbullying
• 32% teens have been victimized by
cyber-bullying. (2007)
What is Cyberbullying?
– Sending mean, vulgar, or threatening messages
or images
– Posting sensitive, private information about
another person
– Pretending to be someone else in order to make
that person look bad
– Intentionally excluding someone from an online
group
Source: Cyberbullying, Stop Bullying Now! (U.S. Department of Health and Human Services)
Possible Warning Signs - Victims
– Complaining that other children or a group of children
do not like them.
– Preoccupation with friendship concerns.
– Poor self-esteem. Feeling they are not as good as
others.
– Not wanting to go to school or other activities.
– Spending a great deal of time on the computer.
– Being secretive about online activities.
– Lacking interest and involvement with other kids
 2009 - NYS Internet Crimes Against Children Task Force
Possible Warning Signs - Bully
• Acting like their group (clique) is superior.
• Bragging that they use the Internet to play practical
jokes or steal other kids’ passwords as a joke.
• Continuing to make fun of other kids.
• Getting in trouble at school or in the community for
inappropriate computer use.
• Spending a great deal of time on the computer.
• Being secretive about online activities.
 2009 - NYS Internet Crimes Against Children Task Force
If You Suspect Cyberbullying….
– Preserve evidence – this is crucial for identifying the bully
and making a case.
– Attempt to enlist assistance from the service provider.
– If able to identify the bully, contact him or her and/or
parents.
– Use available blocking technology (i.e., block the user on
IM, email and chat.)
– Cybertipline.com
– In serious cases, seek assistance from the police (i.e.
threats of physical harm, unrelenting or unable to stop.)
 2009 - NYS Internet Crimes Against Children Task Force
Download