Committed to preventing child abuse through educational services to parents, children, community...
-
Upload
pierce-williamson -
Category
Documents
-
view
214 -
download
1
Transcript of Committed to preventing child abuse through educational services to parents, children, community...
Committed to preventing child abuse through educational services to parents, children, community members, as well as youth-serving professionals.
Founding Member Washtenaw Cyber Citizenship Coalition
Educates students, parents, youth serving professionals and others in the community on how to keep safe as they used technology to communicate.
Socializing
Texting
Creating
Gaming
Visiting virtual worlds
Streaming
94% of teens are online
75% of teens have cell phones
31% send more than 100 texts per day
80% of teens have gaming systems; 97% play
video games
73% of 12- to 17-year olds have at least one
social networking profile
Kids 8-18 spend more time with media (53
hours a week) than with parents or at
school.
•CyberSAFETY
•CyberSECURITY
•CyberETHICS
Everything we do ONLINE is intertwined with our life OFFLINE:
-Cyberbullying-Sharing TMI-Posting inappropriate pictures
Treating others online like YOU would like to be treated:
-Posting online can be more hurtful than saying in person-Illegally downloading media is like stealing from a store-Creating unnecessary drama
Know how to protect your data
-Keep software and virus protection up to date
-Set privacy settings-Keep a clean machine
Cyberbullying
60% of middle school students say that they have been bullied, while
16% of staff believe that students are bullied.
(www.behavioral-management.com)
58% have not told their parents or an adult about something mean or hurtful
that happened to them online.(I-SAFE survey)
The “normal” place to communicate
Much easier to say something mean in a text or facebook post
Feeling of anonymity Fun/Funny Peer Pressure Inadvertent
What’s The Difference?
Bullying
At school
Face to face
Limited Audience
CyberBullying
Anywhere/ Anytime
Anonymous
Larger Audience
Victim not participant
Stop using computer or cell
Act nervous when receiving email or
text
Become abnormally withdrawn
Ditching classes or avoid activities
A cyberbullying victim might:
Michigan law prohibits a person from contacting another individual with the intent to frighten or harass that individual. (up to 1 year, or 5 years if involving a “credible threat of death”)
Michigan law also separately prohibits using a computer to communicate with any person for the purpose of stalking. (up to 2 years in prison)
A 2001 law criminalizes the posting of personal or embarrassing information about another person without their consent. (up to 2 years in prison)
Tell the bully to STOP
BLOCK the person
TELL a trusted adult
Whether it happens to you or you witness it, you are NOT alone and you are NOT powerless!
Standing up is done to protect you or another person from harm. “Snitching” is done to get
someone in trouble.
A predator can be anyone online
Can be male or female
Can be young or old
Can look like anyone that you know
54% of teens have communicated online with someone they have not met in person
source: Polly Klaas Foundation
100% of the children molested by Internet sexual predators went willingly to a meeting, often thinking they were meeting someone else. Source:WiredSafety.org
25% of victims are boyssource: Netsmartz
Kids they target: ◦ Lonely, want attention, angry at parents, questioning
sexuality, want to appear older and more mature Relate to things kids are saying, build trust, make them angrier
with parents How they find kids:
◦ Chat rooms, Facebook, gaming systems, instant messenger, etc.
Adult predators rarely pose as teens- they are open about intent
Larry Bostwick arranged to meet a 14-year-old girl he met on the internet for sex.
Information Travels
Sending sexually explicit images, videos, and/or language using cell phones or other
communication technology
“Sexting”
Pressure from a significant other
It’s “fun or flirtatious”
Responding to content they received (I’ll show you mine if you show me yours)
As a “joke”
A teen who has self-produced and distributed sexually explicit images could be charged with prostitution, solicitation, indecent exposure, child pornography.◦ Knowingly producing – up to 20 years◦ Knowingly distributing – up to 7 years◦ Knowingly possessing – up to 4 years◦ Soliciting a minor (under 16) for immoral
purposes – up to 4 years Whoever took the photo would be charged
with “producing”. Charges can result in jail, probation, and/or
listing on Sex Offender Registry
Remember…
Don’t let other people convince you to send or post inappropriate pictures
People can print, save and share ANYTHING you post, text or type
Once you hit SEND, you can never truly delete it
Risky Online Behaviors
Friending unknown peoplePosting TMIEmbarrassing or harassing othersTalking about sexSending or sharing provocative picturesSharing passwordsClicking on pop-up ads
Downloading “free” media contentNot only is it stealing, it exposes your computer to viruses and malware
Unethical Behavior
Peer to Peer networks (P2P)Exposes computer network to hacking, viruses, theft
PlagiarismPresenting work found online as your own
Keep security software up to date-Ask your parents if they update software regularly
Keep a Clean Machine
Make passwords long and strong-Create a combination that includes numbers, symbols, upper and lower case letters
Beware of free WiFi hot spots-They might not be secure and could expose
your device to criminals
Offline Consequences
Only about half of young people say they have thought about the idea that things they post online could come back to hurt them later.
Colleges and employers can (and do) access information, looking at social networking sites and conducting google searches: remember the GRANDMA RULE.
There are no secrets on the internet- it is not anonymous, it is not private.
Robin Batten & Julie Perea, CyberSafety Facilitators
[email protected](734) 434-4215