Generation Y & Technology: What’s Going On? Presented by: Dr. Holly Nikels Michele Aurand To: Geneseo Schools February 27, 2008 Tonight’s Agenda/Objectives : Identify some characteristics of today’s youth culture, especially Technology use Discuss Cyber-Bullying vs Bullying Behaviors “Tour” of Social Networking Sites Information about Keeping Kids Safe online Resources: On-Line and Community 2 Who is Generation Y? • First and foremost, it was important to recognize that today’s youth are a culture in and of themselves. Known as “Generation Y”, today’s youth number approximately 60 million. • Originally coined by teen expert Eric Chester, Generation Y is typified by youth who continually question the standards and expectations imposed by society • Why does it matter? • Why should I care? 3 Generation Y The National School Safety Center (2002) defined the culture of today’s youth as: They are roughly between the ages of 4 and 22. They have been using computers since before they were in kindergarten. They will be the bulk of the population within the next 20 years. 4 Generation Y & Technology Research show that 53% of Generation Y goes online everyday 73% report being on-line five or more days a week. Teens use the InterNet to send e-mail (82%); exchange IM’s (72%); do homework (71%) and play on-line games (65%) 5 GENERATION Y & TECHNOLOGY Today’s youth are more technologically savvy than any other generation… As such, they are susceptible to issues related to cyber-bullying, social networking sites and online safety… 6 6 For example.. 89% of sexual solicitations are made in either chat rooms or Instant Messages 20% of children age 10-17 have received unwanted sexual solicitations online; that's one out of every five kids 75% of youth who received an online sexual solicitation did not tell a parent 4,000,000 children are posting content to the Web everyday 15,000,000 youth use Instant Messaging 7 More examples… 95% of parents didn't recognize the lingo kids use to let people know that their parents are watching 81% of parents of online youth say that kids aren't careful enough when giving out information about themselves online 76% of parents don't have rules about what their kids can do on the computer 65% of parents believe that kids do things online that they wouldn't want their parents to know about 8 How Technologically Savvy are you?? Working in groups of 3-5 people, look at the following InterNet acronyms and Text messaging terms and decide what you think they mean: InterNet Acronyms & Text Terms 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 143 : 182 : 420 : CD9 : MorF : MOS : P911 : PAL : PAW : PIR : POS : F2F : LOL : GNOC : KPC : LMIRL : 10 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 143 - I love you 182 - I hate you 420 - refers to marijuana CD9 - Code 9 = parents are around MorF - Male or Female MOS - Mom Over Shoulder P911 - Parent Alert PAL - Parents Are Listening PAW - Parents Are Watching PIR - Parent In Room POS - Parent Over Shoulder F2F - Face To Face LOL - Laugh Out Loud GNOC - Get Naked On Cam (webcam) KPC - Keeping Parents Clueless LMIRL - Let's Meet In Real Life 11 Bullying and Cyber-Bullying Bullying Defined Bullying takes place on school premises or while traveling to or from school Victim is harmed by the physical, verbal or social/emotional tactics employed by the bully. Power imbalance or unfair match between bully and victim Harmful actions are repeated over time Hazler, 1996 13 What is Cyber-Bullying? Cyber-Bullying (CB) is using computers, cell phones, and other electronic devices to harass or intimidate someone. Examples of Cyber-Bullying are: Posting negative comments or spreading rumors about someone on-line. Posting embarrassing photos on Web Sites, or sending them by e-mail or cell phone. Sending threatening or abusive messages 14 How is Cyber-Bullying Different from Bullying? While bullying usually happens at school, cyberbullying usually takes place in a person’s home. The effects are often carried over onto the school grounds The victim typically feels that no place is safe from harassment. 15 Key Players in Bullying and Cyber-Bullying Bullying Victim/s Bully/ies Bystanders Cyber-Bullying Victim/s Active CB- Bully/ies Initiates CB actions Passive CB-Bully/ies Does not initiate but plays along by forwarding, reading, etc Bystanders 16 17 17 18 18 Social Networking What are we talking about? Cell phones/ text messages Instant messages/ e-mails Social networking sites - www.facebook.com -www.myspace.com -www.youtube.com 20 What is MySpace? MySpace is a social networking website offering an interactive network of blogs, user profiles, groups, photos, and an internal email system. According to Alexa Internet, as of February, 2008 it is the third most popular website in the United States and the sixth most popular English-speaking in the world. 21 What is Facebook? Facebook, is a social networking service for middle school, high school, college and students. The site is free to users and is financed by advertising. It is the ninth most-visited website today! It is NOT a private site viewed only by students and their peers 22 What’s on Facebook? Users of Facebook can post a photo and a profile of themselves for free. The profiles include as little or as much information as the user desires, including basic biographies, lists of hobbies and interests, even home address and cell phone number. Users control who can see their profiles - from only friends to all other users. Other users can then search the profiles for classmates, childhood acquaintances, people who share common interests. When users identify someone on the site they'd like to meet, they can ask to be designated as a "friend," a characteristic of other social networking Web sites. 23 YouTube YouTube is a video sharing website where users can upload, view and share video clips. YouTube was created in February 2005 by three former PayPal employees. The San Bruno-based service uses Adobe Flash technology to display a wide variety of video content, including movie clips, TV clips and music videos, as well as amateur content such as videoblogging and short original videos. In October 2006, Google Inc, announced that it had reached a deal to acquire the company for $1.65 billion in Google stock Wikapedia, 2008 24 YouTube Unregistered users can watch most videos on the site, while registered users are permitted to upload an unlimited number of videos. Some videos are available only to users of age 18 or older (e.g. videos containing potentially offensive content). The uploading of pornography is prohibited. Few statistics are publicly available regarding the number of videos on YouTube. However, in July 2006, the company revealed that more than 100 million videos were being watched every day, and 2.5 billion videos were watched in June 2006. 50,000 videos were being added per day in May 2006, and this increased to 65,000 by July. 25 Resources and Information for On-Line Safety Where do we start? Technology is constantly changing and expanding.. As such, educational systems and families must respond to the challenges it presents. Developing empathy, critical thinking skills and the ability to take another’s perspective are foundational in reducing and preventing cyberbullying. 27 What to talk about when… K-1st Demonstrate awareness of safe ways to explore the internet. Describe another person’s feelings. 2nd-3rd Demonstrate proper internet etiquette. Name ways to protect themselves from cyberbullying. Identify strengths in others. 28 28 What to talk about when… 4th-5th Distinguish between right and wrong online behavior. Identify strategies to avoid and stop bullying behavior. 29 29 What to talk about when… 6-8th Make choices that consider others’ feelings. Demonstrate awareness of another’s perspective. Define personal information and identify ways to keep identity private. Identify actions that will help trace cyberbullies. Identify ways to address cyberbullying as a bystander. List helpful, appropriate ways to respond if they are a victim of cyberbullying. 30 30 What to talk about when… 9th- 12th Identify how the internet can be used to promote tolerance and respect. List rules for safe use of the internet. Establish a list of internet etiquette rules. Identify ways to be safe online. Establish personal internet standards To practice useful responses to uncomfortable online scenarios. 31 31 Prevention and Intervention Strategies for Parents/ Caregivers Set up rules: Post clear, simple, easy to read rules on or near the monitor. Create your own computer rules or print out rules from on-line resources Use filters: Consider using filtering or monitoring software for your computer. Look into safeguarding programs or options your on-line service provider might offer. Have your child use child friendly search engines when completing homework. Check out privacy policies: Always read a website’s privacy policy before you or your children provide any personal information. Also make sure the website offers a secure connection before giving credit-card information. 32 Prevention and Intervention Strategies for Parents/ Caregivers Talk about the dangers of e-mail and chat: If your children use chat or e-mail, talk to them about never meeting an on-line “friend” face to face. Talk to your child about not responding to offensive or dangerous e-mail, chat or other communication. Report such instances to local law enforcement. Know what’s going on: Keep the computer in the family room or another open area of your home. Let your child show you what they can do on-line, and visit their favorite sites or chat rooms with them. Avoid over-reacting with harsh sanctions E.g. banning use of computer 33 On-Line Resources Net-Lingo NetSmartz Net Family News SafeKids McGruff the Crime Dog- National Crime Prevention Council 34 Remember… “The promise of technology is absolutely brilliant! But we have to understand that the world our kids are growing up in is different than it was in the past. We can’t condemn it, but we need to give our kids enough information to cope with the world they are living in… We need to show kids all the positive potential for teaching and learning that all this connectivity brings.” Belsey, 2007 35