Youth Internet Safety


Published on

this is a presentation from a communications seminar at Family Christian Church in Ecorse, MI. given on April 4th, 2009. It covers stats from on internet use by teens and youth. The presentation gives advice to parents on how to protect their children from internet predators, cyber-bullies, cybercriminals, and online piracy.

Published in: Education, Self Improvement
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Youth Internet Safety

  1. 1. Youth Internet Safety ---------------------------------------- What will they do when you’re NOT watching? Pastor Eric Cedo - Family Christian Church Communications Seminar April 4, 2009
  2. 2. Who’s Watching?
  3. 3. What did your parents warn you about when you were their age?
  4. 4. Today’s Kids <ul><li>Cyberbullying </li></ul><ul><li>Online Predators </li></ul><ul><li>Cybercriminals </li></ul><ul><li>Cyberterrorists </li></ul><ul><li>Piracy </li></ul><ul><li>Sexual Content </li></ul><ul><li>Propaganda </li></ul>
  5. 5. Digital Divide <ul><li>93% of parents say they have established rules for their child’s Internet activity </li></ul><ul><li>37% of students report being given no rules from their parents on using the Internet </li></ul><ul><li>47% of parents feel their ability to monitor and shelter their children from inappropriate material is limited </li></ul><ul><li>95% of parents say they know “some” or “a lot” about where their children go or what their children do on the Internet </li></ul><ul><li>41% of students do not share where they go or what they do on the Internet with their parents </li></ul><ul><li>26% of students believe their parents would be concerned if they knew what they did on the Internet </li></ul><ul><li>I-Safe Statistics ( </li></ul>
  6. 6. Train up a child in the way he should go: and when he is old, he will not depart from it. Proverbs 22:6
  7. 7. Summary: Teach children the way they should go…so when you’re not watching they will follow your teaching
  8. 8. Be sober, be watchful: your adversary the devil, as a roaring lion, walketh about, seeking whom he may devour, I Peter 5:8 (ASV)
  9. 9. Summary: Be Alert…the devil, through his disciples, is lurking online seeking whom he may prey upon
  10. 10. Wired Generation
  11. 11. Kids Online <ul><li>87% of teens use e-mail </li></ul><ul><li>60% have laptops/desktops </li></ul><ul><li>97% play video games </li></ul><ul><li>75% have cell phones </li></ul><ul><li>93% use the internet </li></ul><ul><li>30% blog (54% read blogs) </li></ul><ul><li>55% use wikipedia </li></ul><ul><li>74% have an mp3 player (aka: iPod) </li></ul><ul><li>70% use social networking sites </li></ul>
  12. 12. Kids Online <ul><li>58% of students admit to using the Internet unsafely, inappropriately, or illegally </li></ul><ul><li>12% of students have unsupervised Internet access at school </li></ul><ul><li>55% of students report having given out personal information (e.g. name, age, gender, home address) to someone they have only met online </li></ul>
  13. 13. Glossary <ul><li>Blog (short for weblog) </li></ul><ul><ul><li>A personal or corporate website where an individual will “post” stories, ideas, news, etc. in chronological order </li></ul></ul><ul><ul><li>Typically the reader can post comments about the story…creates a dialogue with the audience </li></ul></ul>
  14. 15. Glossary <ul><li>Social Networking Site (SNS) </li></ul><ul><ul><li>A site that allows users to create personal profiles to share news, events, photos, personal information, etc. with friends (peers) </li></ul></ul><ul><ul><li>Facebook, MySpace, LinkedIn, etc. </li></ul></ul>
  15. 17. Glossary <ul><li>Wiki </li></ul><ul><ul><li>Collection of web pages that are built, populated and monitored by the users and not a lone individual or company </li></ul></ul><ul><ul><li>Collaborative Website </li></ul></ul><ul><ul><li>Wikipedia </li></ul></ul>
  16. 19. Glossary <ul><li>User-generated Content Site (UGC) </li></ul><ul><ul><li>A site that allows users to post their own content and share it with other users </li></ul></ul><ul><ul><li>YouTube, Flickr, iTunes </li></ul></ul>
  17. 21. Glossary <ul><li>Peer-to-peer File Sharing Site </li></ul><ul><ul><li>A site that allows users to search other people’s computers for files to copy </li></ul></ul><ul><ul><li>Limewire, Bearshare, BitTorrent </li></ul></ul>
  18. 22. <ul><li>DANGERS!!! </li></ul>
  19. 23. Kacie Woody <ul><li>Thirteen-year-old Kacie Woody liked to play soccer, sing, and chat online. On December 3, 2002, she vanished from her home in Holland, Arkansas. Police found her body, along with that of her abductor, 19 hours later in a storage facility. She had been murdered by 47-year-old David Fuller of La Mesa, California, who then committed suicide. Kacie’s friends told police that she had an ongoing online relationship with some boy named David whom she believed was another teenager. Signs of a struggle at her home indicated that she was unaware that he was coming to see her and unwilling to go anywhere with him. </li></ul>
  20. 24. Online Predators <ul><li>71% of teens reported receiving messages online from someone they did not know </li></ul><ul><li>40% reported they usually reply and begin chatting with that person </li></ul><ul><li>18% reported telling an adult about the encounter </li></ul><ul><li>45% have been asked for personal information by someone they did not know </li></ul><ul><li>30% have of teens have considered meetings someone they have only talked to online </li></ul><ul><li>14% HAVE HAD SUCH AN ENCOUNTER </li></ul>
  21. 25. Online Predators and Sex <ul><li>1 in 4 Youths (10 – 17) has been exposed to sexually explicit pictures online without seeking or expecting them </li></ul><ul><li>1 in 5 Youths (10 – 17) has received unwanted sexual solicitations online </li></ul>
  22. 26. Online Predators Tactics <ul><li>Seeks out provocative user names. </li></ul><ul><li>Studies your profile. </li></ul><ul><li>Starts with an innocent IM. </li></ul><ul><li>Asks personal questions, A/S/L. </li></ul><ul><li>Wants you to private chat. </li></ul><ul><li>Asks you for personal info. (Phone number, e-mail address, home address, school name, etc.) </li></ul><ul><li>Wants to be your best friend, boyfriend or girlfriend. </li></ul><ul><li>Starts sexual conversations. </li></ul><ul><li>Is all about keeping secrets. </li></ul><ul><li>Asks for personal photos. </li></ul><ul><li>Wants to send you strange gifts. </li></ul><ul><li>Wants to set up a face-to-face meeting. </li></ul><ul><li>Makes threats when you no longer want to chat with him or her. </li></ul>
  23. 27. What to do? <ul><li>Parents </li></ul><ul><li>Allow children access only in common areas </li></ul><ul><li>Monitor conversations </li></ul><ul><li>Talk to your kids before and after they are online about the dangers </li></ul><ul><li>At risk – teens who need to talk to someone about problems </li></ul><ul><li>Monitoring software </li></ul><ul><li>Children </li></ul><ul><li>Never talk to someone online that you don’t know </li></ul><ul><li>Never give out personal information (including profiles) like school name </li></ul><ul><li>Tell your parents if you’ve been approached </li></ul><ul><li>Netiquette – same rules online and off </li></ul><ul><li>Don’t lie!!! </li></ul>
  24. 28. Cyber-bullying <ul><li>Ryan Halligan, a 13-year-old student of Albert D. Lawton School in Essex Junction, Vermont, fell victim to cyber bullying. “Ryan tried to escape the bullying at school by seeking refuge on his computer at home, but it followed him into cyberspace,” said John Halligan, Ryan’s dad. “After his death by suicide, I found out that Ryan was harassed online by his school-day bullies, and he unfortunately tried to retaliate in unhealthy ways. As a parent, I know now that I should have stepped up the monitoring of my son’s computer activities. I wish I had known the potential for this to occur and how to prevent it.” </li></ul>
  25. 29. Cyber-bullying <ul><li>Myth — I cannot be held accountable for what I say or do online. </li></ul><ul><li>Fact — False. Cyber Bullying can be considered a form of harassment in most states punishable by law as a misdemeanor, and in some cases a felony, if there is a reasonable threat to a person’s personal safety. Most schools have their own bullying plan in place with penalties that can range from detention to expulsion. The United States Data Protection Act also upholds the right to keep personal information and records private. Depending on how personal the information is, posting someone’s private and personal information on the Internet without permission can result in punishment by federal law. </li></ul>
  26. 30. Cyber-bullying <ul><li>1 in 14 Youths (10 – 17) has been threatened or harassed online </li></ul><ul><li>Only 50% of those harassed have reported it </li></ul><ul><li>52% of Youths have admitted to saying hurtful things online </li></ul>
  27. 31. Cyber-bullying <ul><li>Be strong and stop it early. Don’t stoop to their level and lash back. </li></ul><ul><li>Don’t suffer in silence. Tell an adult. Keep telling people until someone takes action. </li></ul><ul><li>Don’t open or read messages from cyber bullies. </li></ul><ul><li>Contact your Internet service provider abuse department. </li></ul><ul><li>If the problem continues, alert the local police department. </li></ul><ul><li>Tell your school if it is school related. If your cyber bully attends your school, contact your teacher or principal. </li></ul><ul><li>Don’t erase the messages. Log all dates and time. Put them in a folder and hold them as evidence. </li></ul><ul><li>Change your e-mail address or screen name. </li></ul><ul><li>If it’s happening with text messages, change your cell number. </li></ul><ul><li>Take screen shots of your chat room pages. </li></ul><ul><li>Save URLs, e-mail addresses, and profiles of the bully. </li></ul><ul><li>Stay protected—never agree to meet with a bully face to face. </li></ul><ul><li>Block the bully if you are in a chat room or IMing. </li></ul>
  28. 32. Piracy (Illegal Downloads) <ul><li>September 9, 2003 — Brianna, a shy seventh grader from Manhattan, New York, is sued for illegally downloading more than 1,000 songs. The Recording Industry Association of America filed suit against 60 other suspects in the New York area on the same day. Each person was subject to the possibilities of fines of up to $150,000 for each song. </li></ul><ul><li>— New York Daily News </li></ul>
  29. 33. Piracy (Illegal Downloads) <ul><li>Myth — I cannot be sued for downloading music and movies off P2P sites. They’ll never catch me. </li></ul><ul><li>Fact — True and False. You can’t be sued if you have downloaded songs that have been put online with the approval of record labels and artists—which usually involves paying for royalties. If you download unapproved tracks from unsanctioned sites—whether it is one song or a million—you are violating copyright laws and you run the risk of being sued. The Recording Industry Association of America (RIAA) filed 3,000 lawsuits against individuals as of May 2004, and in some cases sought financial damages of up to $150,000 per copyrighted song. </li></ul>
  30. 34. Piracy (Illegal Downloads) <ul><li>P2P sites are not illegal, but trading unauthorized music and movies is. The U.S. constitution protects P2P sites from being shut down. The argument is that P2P sites are not providing the illegal files —they are only providing a way to share files with others logged onto the site. Just because there are P2P sites doesn’t mean you have to use them. </li></ul><ul><li>Downloading music and movies without paying on unsanctioned sites is illegal and can result in criminal penalties. </li></ul><ul><li>There is a good possibility of downloading a virus when using P2P sites. </li></ul><ul><li>You are also creating a gateway for a hacker to jack your personal stuff on P2P sites. </li></ul><ul><li>Other hitchhikers unknown to you could gain access to files on your hard drive through the file-sharing network. </li></ul>
  31. 35. Piracy (Illegal Downloads) <ul><li>What to do? </li></ul><ul><li>Find a safe site where you can download legally. Songs and movies that you find on legal download sites are: </li></ul><ul><ul><li>In the public domain. </li></ul></ul><ul><ul><li>Uploaded by artists who are trying to get exposure. </li></ul></ul><ul><ul><li>Released by record companies trying to build interest in a CD. </li></ul></ul><ul><ul><li>Paid for by you for the right to download, and the site pays the artist and/or record company royalties. </li></ul></ul>
  32. 36. Cyberterrorists/ Cybercriminals <ul><li>Spam </li></ul><ul><ul><li>Avoid opening e-mails from businesses you don’t know </li></ul></ul><ul><ul><li>Get anti-spam (GMail) </li></ul></ul><ul><li>Viruses/Spyware </li></ul><ul><ul><li>Get viruses from opening attachments not e-mails </li></ul></ul><ul><ul><li>Can also get a “Trojan horse” by downloading software and e-mail attachments </li></ul></ul><ul><li>Cyber-criminals (identity theft) </li></ul><ul><ul><li>Never give out credit card info to a site that isn’t “trusted” – Google tools </li></ul></ul><ul><ul><li>Use PayPal – doesn’t give credit card info to sellers </li></ul></ul>
  33. 37. Other issues – 3 “P’s” <ul><li>Pornographic content </li></ul><ul><ul><li>Use parental controls on internet options </li></ul></ul><ul><ul><li>Moderated safe search on Google </li></ul></ul><ul><ul><li>YouTube requires a login for over 18 – has strict policy against porn </li></ul></ul><ul><li>Plagiarism </li></ul><ul><ul><li>Make sure you reference your sources for school reports! </li></ul></ul><ul><li>Propaganda </li></ul><ul><ul><li>Many sites won’t be pornographic but not suited for children. </li></ul></ul><ul><ul><li>Satanic sites, hate sites, just plain worldly sites not suitable for impressionable children </li></ul></ul>
  34. 38. Conclusion <ul><li>Rules offline apply online </li></ul><ul><li>Don’t just pull the plug – train up the child </li></ul><ul><li>Take a firm stand – computer usage is a monitored activity just like TV viewing </li></ul><ul><li>Use appropriate software and internet settings </li></ul><ul><li>Keep up – do your research and stay “plugged in” </li></ul>
  35. 39. <ul><li>COMMUNICATE </li></ul>
  36. 40. <ul><li>Thank you! </li></ul>