Cyber bullying and Social Interaction with Technology– How to Talk to Your Child Tuesday, November 10 Marquette University Restorative Justice Initiative Conference 12:45-1:45pm 1 Introduction and Welcome Paul Kaye, School Resource Officer, New Berlin Eisenhower MS & HS Melissa Thompson, Principal, Waukesha West High School Mary Jane Whitty Guidance Counselor, New Berlin Eisenhower HS 2 Statistics you should know… • MySpace recently cancelled 90,000 accounts • Facebook users are often imposters- how can a “Class of 2009” for a school with a class of 350 have more than 420 members? • One in 5 youth received a sexual approach or solicitation over the Internet in the past year. • More than 25% of kids recently polled had sent or received a pornographic picture via cell phone or an email account. • 71% of teens reported receiving messages online from someone they don’t know • 45% have been asked for personal information by someone they don’t know • College admissions counselors AND employers search for kids on social networking sites 3 Sexual Solicitations Online • 1 in 5 regular internet users have received a sexual solicitation – 2006: 1 in 7 • 97% of the solicitors were met online – 2006: 86% were met online • 66% of victims of solicitations are female • 65% occurred in Chat Rooms • 92% on a home computer 4 Purpose of our presentation • Discuss elements of cyber bullying and social interaction to promote understanding • Identify common emotions, circumstances and after effects when cyber bullying happens or social interaction with technology goes amiss • Keep kids from being victims, suspects, and defendants 5 Cyber bullying • Definition • Examples • Where it takes place 6 Trends in Child Exploitation • Peer to peer sources – Napster – BearShare – Morpheous – Kazaa • Technology – X Box 360 • One on one voice chat • Matchmaking features • Enhanced “friends” list • Web Cameras • Camera phones 7 Trends in Child Exploitation • Social Networking Sites – Myspace.com – Facebook.com – Friendster.com – Xanga.com – Livejournal.com – Friendsfusion.com – Prisonpenpals.com 8 Prevention and Investigation • Family – Computer placement, filters, monitoring software – Discussion and ground rules – Relationship as parent, not friend • School – Strong, trusting relationships with adults – Process defined for conducting investigation(s) – Accessible by parents and students • Community – SRO – Cybercrimes or other similar unit 9 Trust BUT VERIFY • Search your child’s cell phone/computer • No law gives your minor child a privacy right relative to you – Set clear expectations, so it feels fair • Myths – “None of this could happen to my child” – “This only happens to the bad kids” 10 Response and Recovery Ms. Mary Jane Whitty 11