Bullying and Protecting Children in the Virtual World Dan Wilchek Exeter Township School Distirct...

18
Bullying and Protecting Children in the Virtual World Dan Wilchek Exeter Township School Distirct [email protected]

Transcript of Bullying and Protecting Children in the Virtual World Dan Wilchek Exeter Township School Distirct...

Bullying and Protecting Children in the Virtual World

Dan WilchekExeter Township School [email protected]

Exeter Townsh

ip School District

Most important thing

About one-third of online teens (ages 12-17) have been cyberbullied. Girls are more likely to be targeted.

Nearly 43% of kids have been bullied online. One in four has had it happen more than once.

Nine out of ten middle school students have had their feelings hurt online.

Four out of ten middle school students have had their password(s) stolen and changed by a bully who then locked them out of their own account or sent communications posing as them

90% of victims will not inform a parent or trusted adult of their abuse.

Exeter Townsh

ip School District

• Bullying/Cyber Bullying

• Internet Usage and Exposure to inappropriate material

• Facebook (Online profiles)

• Texting/Sexting

Types of Issues we are going to cover

http://www.netsmartz.org/Parents

Exeter Townsh

ip School District

What was the last time you spoke to your kids about

these issues?

Exeter Townsh

ip School District

Some ideas to start the conversation.

Don’t get discouraged if they don’t respond immediately!

Ask positive questions

• How does your school deal with cyber bullying? • What would you do if someone created a mean,

fake profile for you or one of your friends? • Who would you talk to if it happened to you?• Why do you think people cyberbully? • Have you ever sent a mean message because

you were upset? • How was your day?• What do you like the most about school?

Credit: http://www.netsmartz.org/Parents

Exeter Townsh

ip School District

Flaming and Trolling – sending or posting hostile messages intended to “inflame” the emotions of others

Happy-Slapping – recording someone being harassed or bullied in a way that usually involves physical abuse, then posting the video online for public viewing

Identity Theft/Impersonation – stealing someone’s password and/or hijacking their online accounts to send or post incriminating or humiliating pictures, videos, or information

Photoshopping – doctoring digital images so that the main subject is placed in a compromising or embarrassing situation

Physical Threats – sending messages that involve threats to a person’s physical safety

Rumor Spreading – spreading gossip through e-mail, text messaging, or social networking sites

Credit: http://www.netsmartz.org/Parents

Common Forms of Cyberbullying

Exeter Townsh

ip School District

Hope for the best,prepare for the worst

Reveal personal information

Encounter inappropriate material

Download malicious software

Experience Bullying

Others may expose kids’ information

Kids may:

1. Set clear rules for use of

technology

2. Put technology to work

Set clear rules

Establish ground rules of how computers,

phones and cameras, are to be used and

accessed

Keep personal information private

Have discussions with your child about what

they are doing on the internet. Let them know

you are available if something happens

Be honest about how you are monitoring their

useStep 1

Step 2Put technology to work

What to Use For the Internet?

http://netsmartz.org/Parents (General Overview)

Microsoft Family Security http://www.microsoft.com/security/family-safety/default.aspx#Overview

http://windows.microsoft.com/en-US/windows-live/essentials-other-programs

Other Web Monitoring Toolshttp://www.cyberpatrol.com/

http://www.netnanny.com/

http://www1.k9webprotection.com/

Step 2We offer this collection of Internet links as potential resources and make no endorsements or promises about any specific sites.

Tom Jones

Tom

What to Use for Facebook and Texting?

Favebook and online profileshttp://www.minormonitor.com/

http://www.uknowkids.com/what-is-uknowkids/ (Monitor)

Texting and Phonehttp://www.uknowkids.com/what-is-uknowkids/ (monitor)

http://www.securafone.com/home

http://www.textplus.com/ (sends copy of text to parents)

http://www.tcaps.net/Parents/OnlineSafety/tabid/67/Default.aspx

http://www.noslang.com/

Step 2We offer this collection of Internet links as potential resources and make no endorsements or promises about any specific sites.

What to Use for Identify Theft

Identity Thefthttp://www.idtheftcenter.org/artman2/publish/v_fact_sheets/Fact_Sheet_120.shtml

http://www.ftc.gov/bcp/edu/microsites/idtheft/

https://www.annualcreditreport.com/cra/index.jsp

http://www.lifelock.com/

Virus Protection http://www.microsoft.com/windows/antivirus-partners/windows-7.aspx

http://windows.microsoft.com/en-US/windows/products/security-essentials

Step 2We offer this collection of Internet links as potential resources and make no endorsements or promises about any specific sites.

What to do if there is a problem

Teach kids to trust their instincts

Don’t curtail privileges

Always report physical threats and cyberbullying

Comments? Questions?

Contact Information

Dan Wilchek610-898-9550

[email protected]