0
Kids & Social Media:
Facing Up to Facebook, Twitter & Beyond –
The Pros & Cons of How Students Use Social Media for
Study,...
Parents & Educators




Internet & Social Media are the New Reality
» Required Skills for Social Development/Acceptance
» ...
Why do kids need the
Internet?



        » To Connect

        » To Be Social

        » Social Planning/Events

        ...
Social Networking
Websites


16 years of age:
Friendster Online community connecting friends

14 years of age:
MySpace A P...
Social Networking
Websites: 13 Year-olds


Hi 5 Who’s in?
Xanga A weblog community
IMVU Chat with friends in 3D
There Onli...
Social Networking Sites:
  No Age Minimum


Imbee Social Networking designed for               Club Penguin Virtual world ...
What are some of the
dangers?


»Privacy/Identity Theft
»Cyber-bullying
»Online Predators
»Cybercriminals
»Piracy
»Inappro...
Quick Stats


93% of parents say they have established rules for their child’s
Internet activity
37% of students report be...
Quick Stats




58% of students admit to using the Internet unsafely,
inappropriately, or illegally
12% of students have u...
Online Predators




» 71% of teens reported receiving messages online from
  71%
  someone they did not know
» 40% report...
Online Predators Tactics


»   Seeks out provocative user names.
»   Studies your profile.
»   Starts with an innocent IM....
Cyber-bullying


» Be strong and stop it early. Don’t stoop to their level and lash back.
» Don’t suffer in silence. Tell ...
Cyber-Bullying:
Consequences & Crime




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Piracy:
Illegal Downloads

       Myth — I cannot be sued for downloading music and movies off
                     P2P si...
Piracy:
P2P Sites


P2P sites are not illegal, but trading unauthorized music and
 movies is. The argument is that P2P sit...
Piracy:
Consequences & Crime




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Cyberterrorists/
Cybercriminals
  Spam
       » Avoid opening e-mails from businesses you don’t know
       » Get anti-spa...
Pornography,
Plagiarism &
Propaganda

 Pornographic content
   » Use parental controls on internet options
   » Moderated ...
Personal Information


 Obvious:                                  Less Obvious:
 Name                                     ...
What is Sexting?



     When people take sexually revealing picture of
 themselves and send them as text message attachme...
Sexting



  Once an image is sent, it can never be retrieved -- youwill
    lose control of it. How would you feel if you...
Sexting Statistics




22% of teen girls and 20% of teen boys have sent nude or
 semi-nude photos of themselves
22% of tee...
Sexting:
Consequences & Crime




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Protecting Kids:
Tools & Strategies


 Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Common Sense Media




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
ThatsNotCool.com




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Safe Filtering &
Blocking




    Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Family Gameplan/
Contract




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Safe Search: Google




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Where Have You
Been? History




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Social Networking Sites




 Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Blogs & Blogging




» Type of website
» Regular entries/updates
» Usually allows comments/interaction with visitors
» May...
Blog On




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Microblogging



 » Blogging in short form

 » Similar to texting

 » Ability to send and receive messages

 » Ability to ...
Twitter




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Microblogging: Twitter




 Image Source: Caroline-Middlebrook.com



       Affect Strategies                  PROPRIETAR...
Twitter Profile




    Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
The Basics



   Tweet: Message – 140 Characters
   Twitter Handle: @sandrafathi
   Retweet (RT): Resending a message from...
Facebook




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Facebook: Groups &
Pages




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Facebook Privacy




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Facebook Privacy




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Facebook Privacy




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
MySpace: Individual
Profiles




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
MySpace Safety




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Closed & Open
Communities




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Create a Ning




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
You Tube




  Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
YouTube




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
YouTube Safety




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Compete.com




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Flickr: Photo & File
Sharing




    Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Flickr




    Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Advice for Kids &
Teens


Don’t say you are older than you are
The Internet is a public space
Don’t post embarrassing thin...
Advice for Parents




Start a conversation
Report inappropriate behavior
Talk about Social Networking and the Internet
Re...
Best Practices I



Kids Need Rules
 » Set time and limits for Internet usage
 » Keep computer in public space
 » Agree on...
Best Practices II




Use Privacy Controls
 » Don’t provide personal information
 » Be careful about Pictures/Videos
 » Se...
Best Practices III




Communicate Responsibly
 » Don’t hide behind a screen name
 » Block offenders
 » Report incidents
 ...
Resources/Links




 Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Internet Safety
Organizations



Net Family News (http://www.netfamilynews.org/)
Safe Kids (http://www.safekids.com/)
Wire...
Personal Assistant:
Common Craft




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Contact Information & Resources:

Sandra Fathi
sfathi@affectstrategies.com
twitter: @sandrafathi
LinkedIn, Facebook: Sandr...
Upcoming SlideShare
Loading in...5
×

Internet Safety For Parents And Kids

2,512

Published on

This presentation was created for students and parents of children from 5th to 8th grade regarding staying safe online on the Internet in general and on social networking sites in particular.

Published in: Education, Technology
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
2,512
On Slideshare
0
From Embeds
0
Number of Embeds
9
Actions
Shares
0
Downloads
211
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide

Transcript of "Internet Safety For Parents And Kids"

  1. 1. Kids & Social Media: Facing Up to Facebook, Twitter & Beyond – The Pros & Cons of How Students Use Social Media for Study, Friendship & Fun Prepared for Epiphany Parent & Student Seminar. April 28, 2009 Sandra Fathi Web: www.affectstrategies.com President, Affect Strategies Blog: www.techaffect.com sfathi@affectstrategies.com Twitter: @sandrafathi 212 398 9680 LinkedIn, Facebook: Sandra Fathi Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  2. 2. Parents & Educators Internet & Social Media are the New Reality » Required Skills for Social Development/Acceptance » Required Skills for Education & Research » Required Skills for Job & Career Development Educate & Arm Yourself with Knowledge » Investing in Your Child’s Safety » Investing in Your Child’s Education » Investing in Your Child’s Future Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  3. 3. Why do kids need the Internet? » To Connect » To Be Social » Social Planning/Events » Staying Plugged In » To Share » Self-Expression Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  4. 4. Social Networking Websites 16 years of age: Friendster Online community connecting friends 14 years of age: MySpace A Place For Friends At least 13 years of age & in high school: Facebook Social Utility that connect people with those around them Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  5. 5. Social Networking Websites: 13 Year-olds Hi 5 Who’s in? Xanga A weblog community IMVU Chat with friends in 3D There Online virtual world Chamber of Chat Harry Potter online role playing game Second Life 3D Virtual World Runescape Online adventure community Bebo Social network for sharing and entertainment Gaia Online Virtual community with games, message boards & economy vSide Virtual music community Windows Live Spaces Community of friends for sharing and blogging Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  6. 6. Social Networking Sites: No Age Minimum Imbee Social Networking designed for Club Penguin Virtual world for kids kids 8-12 Marapets Virtual pet site with games Active Worlds 3D virtual world chat and chat community Boom Bang Chat, make friends and Shining Stars Chatting, naming stars explore a virtual world and virtual star worlds Dofus Multi-player online role playing Neopets Virtual world for pets game Endless Online Role playing games Awol Chats, games, diary, friends, & Eternal Lands Role playing games cribs Furcadia Role playing games Sanriotown Hello Kitty games, Graal Online Role playing games community, blogs and forums Guild Wars Role playing games Webkinz Virtual pet community for Hero Online Role playing games plush pets Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  7. 7. What are some of the dangers? »Privacy/Identity Theft »Cyber-bullying »Online Predators »Cybercriminals »Piracy »Inappropriate/Sexual Content »Misleading Content/Propaganda Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  8. 8. Quick Stats 93% of parents say they have established rules for their child’s Internet activity 37% of students report being given no rules from their parents on using the Internet 47% of parents feel their ability to monitor and shelter their children from inappropriate material is limited 95% of parents say they know “some” or “a lot” about where their children go or what their children do on the Internet 41% of students do not share where they go or what they do on the Internet with their parents 26% of students believe their parents would be concerned if they knew what they did on the Internet I-Safe Statistics (www.isafe.org) Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  9. 9. Quick Stats 58% of students admit to using the Internet unsafely, inappropriately, or illegally 12% of students have unsupervised Internet access at school 55% of students report having given out personal information (e.g. name, age, gender, home address) to someone they have only met online Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  10. 10. Online Predators » 71% of teens reported receiving messages online from 71% someone they did not know » 40% reported they usually reply and begin chatting with 40% that person » 18% reported telling an adult about the encounter 18% » 45% have been asked for personal information by someone 45% they did not know » 30% have of teens have considered meetings someone 30% they have only talked to online 14% HAVE HAD AN ENCOUNTER Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  11. 11. Online Predators Tactics » Seeks out provocative user names. » Studies your profile. » Starts with an innocent IM. » Asks personal questions, A/S/L. » Wants you to private chat. » e- Asks you for personal info. (Phone number, e -mail address, home address, etc.) school name, etc.) » Wants to be your best friend, boyfriend or girlfriend. » Starts sexual conversations. » Is all about keeping secrets. » Asks for personal photos. » Wants to send you strange gifts. » face-to- Wants to set up a face - to -face meeting. » Makes threats when you no longer want to chat with him or her. Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  12. 12. Cyber-bullying » Be strong and stop it early. Don’t stoop to their level and lash back. » Don’t suffer in silence. Tell an adult. Keep telling people until someone takes action. » Don’t open or read messages from cyber bullies. » Contact your Internet service provider abuse department. » If the problem continues, alert the local police department. » Tell your school if it is school related. If your cyber bully attends your school, contact your teacher or principal. » Don’t erase the messages. Log all dates and time. Put them in a folder and hold them as evidence. » Change your e-mail address or screen name. » If it’s happening with text messages, change your cell number. » Take screen shots of your chat room pages. » Save URLs, e-mail addresses, and profiles of the bully. » Stay protected—never agree to meet with a bully face to face. » Block the bully if you are in a chat room or IMing. Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  13. 13. Cyber-Bullying: Consequences & Crime Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  14. 14. Piracy: Illegal Downloads Myth — I cannot be sued for downloading music and movies off P2P sites. They’ll never catch me. Fact — True and False. You can’t be sued if you have downloaded songs that have been put online with the approval of record labels and—you are violating copyright laws and you run the risk of being sued. The Recording Industry Association of America (RIAA) filed 3,000 lawsuits against individuals as of May 2004, and in some cases sought financial damages of up to $150,000 per copyrighted song. Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  15. 15. Piracy: P2P Sites P2P sites are not illegal, but trading unauthorized music and movies is. The argument is that P2P sites are not providing the illegal files —they are only providing a way to share files with others logged onto the site. Downloading music and movies without paying on unsanctioned sites is illegal and can result in criminal penalties. There is a good possibility of downloading a virus, creating a gateway for a hacker to jack your personal stuff or gain access to files on your hard drive. Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  16. 16. Piracy: Consequences & Crime Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  17. 17. Cyberterrorists/ Cybercriminals Spam » Avoid opening e-mails from businesses you don’t know » Get anti-spam (GMail) Viruses/Spyware » Get viruses from opening attachments not e-mails » Can also get a “Trojan horse” by downloading software and e- mail attachments Cyber-criminals (identity theft) » Never give out credit card info to a site that isn’t “trusted” – Google tools » Use PayPal – doesn’t give credit card info to sellers Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  18. 18. Pornography, Plagiarism & Propaganda Pornographic content » Use parental controls on internet options » Moderated safe search on Google » YouTube requires a login for over 18 – has strict policy against porn Plagiarism » Make sure you reference your sources for school reports! Propaganda » Many sites won’t be pornographic but not suited for children. » Hate sites, false information, lies and rumors Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  19. 19. Personal Information Obvious: Less Obvious: Name School Name Address School Mascot Age Gaming Identities Sex Hobbies Picture Interests Phone Number Landmarks/Hangouts Address Team Names SSN Number Bank Account Credit Card Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  20. 20. What is Sexting? When people take sexually revealing picture of themselves and send them as text message attachments, it's called quot;sexting.“ Peoplequot;sextquot; to show off, to entice someone, to show interest in someone, or to prove commitment. The problem with that, is that the moment the relationship ends (and most of them do) someone is in possession of a highly compromising image that can be easily posted on a social networking site or sent around via email or text. Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  21. 21. Sexting Once an image is sent, it can never be retrieved -- youwill lose control of it. How would you feel if your teachers, parents, or the entire school saw the picture, because it happens all the time. Talk about pressures to send revealing photos. No matter how big the social pressure is, the potential social humiliation and consequences will be hundreds of times worse. The buck stops with you. If someone sends you a photo, delete it immediately. If you do send it on, you’re distributing pornography -- and that’s against the law. Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  22. 22. Sexting Statistics 22% of teen girls and 20% of teen boys have sent nude or semi-nude photos of themselves 22% of teens admit that technology makes them personally more forward and aggressive 38% say exchanging sexy content makes dating or hooking up with others more likely 29% believe those exchanging sexy content are “expected” to date or hook up Revealing photos can be resent to a vast audience Sending a sexual image of a minor or to a minor is illegal Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  23. 23. Sexting: Consequences & Crime Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  24. 24. Protecting Kids: Tools & Strategies Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  25. 25. Common Sense Media Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  26. 26. ThatsNotCool.com Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  27. 27. Safe Filtering & Blocking Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  28. 28. Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  29. 29. Family Gameplan/ Contract Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  30. 30. Safe Search: Google Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  31. 31. Where Have You Been? History Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  32. 32. Social Networking Sites Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  33. 33. Blogs & Blogging » Type of website » Regular entries/updates » Usually allows comments/interaction with visitors » May include text, pictures, video (vlogs), audio (podcasts) etc. » Types: » Personal » Corporate » News » Blog Search Engines: Bloglines, BlogScope, Technorati Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  34. 34. Blog On Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  35. 35. Microblogging » Blogging in short form » Similar to texting » Ability to send and receive messages » Ability to follow and be followed » Archive information » Multiple delivery mechanisms » Conversations and interactivity Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  36. 36. Twitter Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  37. 37. Microblogging: Twitter Image Source: Caroline-Middlebrook.com Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  38. 38. Twitter Profile Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  39. 39. The Basics Tweet: Message – 140 Characters Twitter Handle: @sandrafathi Retweet (RT): Resending a message from someone else to your followers Message: Direct message (private) from one Twitterer to another Nudge: Prompt someone to Tweet Hashtag: #eventname Easy search for events/topic Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  40. 40. Facebook Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  41. 41. Facebook: Groups & Pages Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  42. 42. Facebook Privacy Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  43. 43. Facebook Privacy Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  44. 44. Facebook Privacy Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  45. 45. MySpace: Individual Profiles Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  46. 46. MySpace Safety Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  47. 47. Closed & Open Communities Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  48. 48. Create a Ning Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  49. 49. You Tube Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  50. 50. YouTube Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  51. 51. YouTube Safety Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  52. 52. Compete.com Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  53. 53. Flickr: Photo & File Sharing Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  54. 54. Flickr Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  55. 55. Advice for Kids & Teens Don’t say you are older than you are The Internet is a public space Don’t post embarrassing things or things that could expose you to danger Think before you post – the Internet is forever People aren’t always who they say they are Protect your privacy Report harassment, hate speech and inappropriate content Avoid in-person meetings with people you don’t know in real-life Think before you post Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  56. 56. Advice for Parents Start a conversation Report inappropriate behavior Talk about Social Networking and the Internet Remind kids, and teens, to be cautious Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  57. 57. Best Practices I Kids Need Rules » Set time and limits for Internet usage » Keep computer in public space » Agree on websites » Check compliance (history, filtering, tools) Teach Internet Safety » Offline rules apply online Reinforce Morality & Ethics Online » Educate on criminal activity Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  58. 58. Best Practices II Use Privacy Controls » Don’t provide personal information » Be careful about Pictures/Videos » Set sharing settings » Respecting others’ privacy » Don’t use automatic ‘remember’ settings » Never share passwords » Don’t meet strangers in person Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  59. 59. Best Practices III Communicate Responsibly » Don’t hide behind a screen name » Block offenders » Report incidents » Flag inappropriate content Be a Skeptic » View content critically » Be able to identify reliable sites and verify facts Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  60. 60. Resources/Links Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  61. 61. Internet Safety Organizations Net Family News (http://www.netfamilynews.org/) Safe Kids (http://www.safekids.com/) Wired Safety (http://www.wiredsafety.org/) NetSmartz (http://www.netsmartz411.org/) Wired Kids (http://www.wiredkids.org/) MySpace MyKids (http://www.myspacemykids.com/) Safe Families (http://www.safefamilies.org/) Enough is Enough (http://www.enough.org/) Connect Safely (http://www.connectsafely.org/) iKeepSafe (http://www.ikeepsafe.org/) Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  62. 62. Personal Assistant: Common Craft Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  63. 63. Contact Information & Resources: Sandra Fathi sfathi@affectstrategies.com twitter: @sandrafathi LinkedIn, Facebook: Sandra Fathi web: www.affectstrategies.com blog: www.techaffect.com Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×