SlideShare a Scribd company logo
1 of 60
Internet Safety Fahzy Abdul-Rahman Family Resource Management Specialist fahzy@nmsu.edu ::: @nmmoney &
SM Internet Safety ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Social Media (SM) ,[object Object],[object Object],[object Object]
What we Cover Today! > 250 SM Applications
SM Internet Safety ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SM Predatory Activities ,[object Object],[object Object],[object Object],[object Object],[object Object],Inappropriate  Conduct, Contact, Content
A Thin Line Study ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],I. Overall digital abuse incidence
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],II. Sexting and digital dating abuse What’s the problem here?
[object Object],[object Object],[object Object],[object Object],III. Digital discrimination
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IV. Effective responses
Cyberbullying ,[object Object],[object Object],Study #2
 
 
 
Male or Female?
SM & Internet Safety
Bullying Signs: Predator ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bullying Signs: Prey (1 of 3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bullying Signs: Prey (2 of 3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bullying Signs: Prey (3 of 3) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Stop Online Delinquencies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Reporting  Trouble When discussions does not seem to resolve the situation …
Whom To Contact for Help ,[object Object],[object Object],National Crime Prevention Council www.ncpc.org
Whom To Contact  (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],National Crime Prevention Council www.ncpc.org
Whom To Contact  (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],National Crime Prevention Council www.ncpc.org
What to Do to Avoid ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
History ,[object Object],[object Object],[object Object]
History ,[object Object]
Block Sites ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Open DNS
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Block Sites
Other Internet Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other Internet Tools ,[object Object],[object Object],[object Object],[object Object]
The Best Thing to Do …
Internet Safety Fahzy Abdul-Rahman Family Resource Management Specialist fahzy@nmsu.edu ::: @nmmoney &
Resources ,[object Object],[object Object],[object Object]
Talking with Kids ,[object Object]
Where to Start ,[object Object],[object Object],[object Object]
Where to Start ,[object Object],[object Object]
Guidance for Different Ages ,[object Object],[object Object],[object Object],[object Object]
Guidance at Different Ages ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Net Cetera : What Else? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Net Cetera :  Spread the Word! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Net Cetera ,[object Object],[object Object]
Additional Slides (please copy them into the body of the presentation, after the slide about Teens)
Socializing Online ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cyberbullying ,[object Object],[object Object],[object Object],[object Object]
Cyberbullying ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mobile Phones ,[object Object],[object Object],[object Object],[object Object],[object Object]
Mobile Phones ,[object Object],[object Object],[object Object],[object Object]
Mobile Phones ,[object Object],[object Object],[object Object],[object Object]
Tips for  Safe Online Social  Networking National Crime Prevention Council www.ncpc.org
Tips for Socializing Safely  ,[object Object],[object Object],[object Object],[object Object],National Crime Prevention Council www.ncpc.org
Tips for Socializing Safely Online  (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],National Crime Prevention Council www.ncpc.org
Tips for Parents National Crime Prevention Council www.ncpc.org
Tips for Parents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],National Crime Prevention Council www.ncpc.org
Tips for Parents  (continued) ,[object Object],[object Object],[object Object],[object Object],National Crime Prevention Council www.ncpc.org
Tips for Youth National Crime Prevention Council www.ncpc.org
Tips for Youth ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],National Crime Prevention Council www.ncpc.org
Tips for Youth  (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],National Crime Prevention Council www.ncpc.org

More Related Content

What's hot

Disadvantages of Social Media
Disadvantages of Social MediaDisadvantages of Social Media
Disadvantages of Social MediaZain Abid
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For EducatorsMaria Petropulos
 
Advantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social NetworkingAdvantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social NetworkingSofia Naznim
 
Effect of social media on youth
Effect of social media on youthEffect of social media on youth
Effect of social media on youthDeepti Kulkarni
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Bullying in social media presentation
Bullying in social media presentationBullying in social media presentation
Bullying in social media presentationmitchell_shannon
 
EFFECT OF SOCIAL MEDIA ON US
EFFECT OF SOCIAL MEDIA ON USEFFECT OF SOCIAL MEDIA ON US
EFFECT OF SOCIAL MEDIA ON USManish Kumar
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.jessy0121
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media SecurityDel Belcher
 

What's hot (20)

cyber crime
cyber crimecyber crime
cyber crime
 
Disadvantages of Social Media
Disadvantages of Social MediaDisadvantages of Social Media
Disadvantages of Social Media
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
social network
social networksocial network
social network
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Advantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social NetworkingAdvantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social Networking
 
Effect of social media on youth
Effect of social media on youthEffect of social media on youth
Effect of social media on youth
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Social media addiction
Social media addictionSocial media addiction
Social media addiction
 
Bullying in social media presentation
Bullying in social media presentationBullying in social media presentation
Bullying in social media presentation
 
EFFECT OF SOCIAL MEDIA ON US
EFFECT OF SOCIAL MEDIA ON USEFFECT OF SOCIAL MEDIA ON US
EFFECT OF SOCIAL MEDIA ON US
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Social Media Awareness
Social Media AwarenessSocial Media Awareness
Social Media Awareness
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Social_Networking_Project
Social_Networking_ProjectSocial_Networking_Project
Social_Networking_Project
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 

Viewers also liked

Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Cyberstalking and safety tips for social networks
Cyberstalking and safety tips for social networksCyberstalking and safety tips for social networks
Cyberstalking and safety tips for social networksMarketingatBahrain
 
Staying safe online
Staying safe onlineStaying safe online
Staying safe onlinePaul OBriant
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
KAEFER KIPS Safety Presentation
KAEFER KIPS Safety PresentationKAEFER KIPS Safety Presentation
KAEFER KIPS Safety PresentationMitchell Harris
 
Wiki Presentation Cyber Safety
Wiki Presentation Cyber SafetyWiki Presentation Cyber Safety
Wiki Presentation Cyber SafetyJulie
 
Encyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety PresentationEncyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety Presentationqgecko
 
Online safety for teens
Online safety for teensOnline safety for teens
Online safety for teensJennifer Tecla
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipHiram Cuevas
 

Viewers also liked (20)

Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Cyberstalking and safety tips for social networks
Cyberstalking and safety tips for social networksCyberstalking and safety tips for social networks
Cyberstalking and safety tips for social networks
 
Social Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartzSocial Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartz
 
Staying safe online
Staying safe onlineStaying safe online
Staying safe online
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
KAEFER KIPS Safety Presentation
KAEFER KIPS Safety PresentationKAEFER KIPS Safety Presentation
KAEFER KIPS Safety Presentation
 
safe children film
safe children filmsafe children film
safe children film
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Wiki Presentation Cyber Safety
Wiki Presentation Cyber SafetyWiki Presentation Cyber Safety
Wiki Presentation Cyber Safety
 
Encyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety PresentationEncyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety Presentation
 
Digital Cybersafety Kit
Digital Cybersafety KitDigital Cybersafety Kit
Digital Cybersafety Kit
 
Teen Online Behavior
Teen Online BehaviorTeen Online Behavior
Teen Online Behavior
 
Online safety
Online safetyOnline safety
Online safety
 
Online safety for teens
Online safety for teensOnline safety for teens
Online safety for teens
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Cyber Issues
Cyber IssuesCyber Issues
Cyber Issues
 

Similar to Social Networking and Internet Safety

Teen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesTeen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesMs. D
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentationrenumann
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and CyberbullyingLouise Jones
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online SafetyDonna Murray
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentationgrp4.ed451
 
Chatting with Kids About Being Online
Chatting with Kids About Being OnlineChatting with Kids About Being Online
Chatting with Kids About Being Online- Mark - Fullbright
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 

Similar to Social Networking and Internet Safety (20)

Teen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesTeen Cybersafety & Database Resources
Teen Cybersafety & Database Resources
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentation
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and Cyberbullying
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentation
 
Chatting with Kids About Being Online
Chatting with Kids About Being OnlineChatting with Kids About Being Online
Chatting with Kids About Being Online
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 

More from NMSU - Family Resource Management

Small Steps to Health and Wealth [Prezi]- NM Conference on Aging 2013
Small Steps to Health and Wealth [Prezi]- NM Conference on Aging 2013Small Steps to Health and Wealth [Prezi]- NM Conference on Aging 2013
Small Steps to Health and Wealth [Prezi]- NM Conference on Aging 2013NMSU - Family Resource Management
 
Where are We Getting the Online Hits? A Google Analytics Study on Personal Fi...
Where are We Getting the Online Hits? A Google Analytics Study on Personal Fi...Where are We Getting the Online Hits? A Google Analytics Study on Personal Fi...
Where are We Getting the Online Hits? A Google Analytics Study on Personal Fi...NMSU - Family Resource Management
 
Payment Instrument Utilization for Specific Transaction Types
Payment Instrument Utilization for  Specific Transaction TypesPayment Instrument Utilization for  Specific Transaction Types
Payment Instrument Utilization for Specific Transaction TypesNMSU - Family Resource Management
 
Social Media Tool Utilization Among New Mexico Home Economist County Agents ...
Social Media Tool Utilization Among  New Mexico Home Economist County Agents ...Social Media Tool Utilization Among  New Mexico Home Economist County Agents ...
Social Media Tool Utilization Among New Mexico Home Economist County Agents ...NMSU - Family Resource Management
 

More from NMSU - Family Resource Management (20)

Junk Your Junk Mail
Junk Your Junk MailJunk Your Junk Mail
Junk Your Junk Mail
 
Health Insurance Literacy – eXtention Ask an Expert
Health Insurance Literacy – eXtention Ask an Expert Health Insurance Literacy – eXtention Ask an Expert
Health Insurance Literacy – eXtention Ask an Expert
 
Survey on Personal Finance Important Topics
Survey on Personal Finance Important TopicsSurvey on Personal Finance Important Topics
Survey on Personal Finance Important Topics
 
Small Steps to Health and Wealth [Prezi]- NM Conference on Aging 2013
Small Steps to Health and Wealth [Prezi]- NM Conference on Aging 2013Small Steps to Health and Wealth [Prezi]- NM Conference on Aging 2013
Small Steps to Health and Wealth [Prezi]- NM Conference on Aging 2013
 
Where are We Getting the Online Hits? A Google Analytics Study on Personal Fi...
Where are We Getting the Online Hits? A Google Analytics Study on Personal Fi...Where are We Getting the Online Hits? A Google Analytics Study on Personal Fi...
Where are We Getting the Online Hits? A Google Analytics Study on Personal Fi...
 
Financial Wellness Project
Financial Wellness ProjectFinancial Wellness Project
Financial Wellness Project
 
4-H Build a Million - New Mexico
4-H Build a Million - New Mexico4-H Build a Million - New Mexico
4-H Build a Million - New Mexico
 
Using Data from Google Analytics
Using Data from Google AnalyticsUsing Data from Google Analytics
Using Data from Google Analytics
 
America Saves 2012 in NM
America Saves 2012 in NMAmerica Saves 2012 in NM
America Saves 2012 in NM
 
America Saves 2011 in New Mexico
America Saves 2011 in New MexicoAmerica Saves 2011 in New Mexico
America Saves 2011 in New Mexico
 
Home Canning - Cost
Home Canning - CostHome Canning - Cost
Home Canning - Cost
 
Mi Propia Casa, Home of My Own
Mi Propia Casa, Home of My OwnMi Propia Casa, Home of My Own
Mi Propia Casa, Home of My Own
 
Emergency Preparedness at Home
Emergency Preparedness at HomeEmergency Preparedness at Home
Emergency Preparedness at Home
 
Payment Instrument Utilization for Specific Transaction Types
Payment Instrument Utilization for  Specific Transaction TypesPayment Instrument Utilization for  Specific Transaction Types
Payment Instrument Utilization for Specific Transaction Types
 
Social Media Tool Utilization Among New Mexico Home Economist County Agents ...
Social Media Tool Utilization Among  New Mexico Home Economist County Agents ...Social Media Tool Utilization Among  New Mexico Home Economist County Agents ...
Social Media Tool Utilization Among New Mexico Home Economist County Agents ...
 
Foot in the Door
Foot in the DoorFoot in the Door
Foot in the Door
 
What I've Learned from Google Docs
What I've Learned from Google DocsWhat I've Learned from Google Docs
What I've Learned from Google Docs
 
Social Media Use in 4‐H Activities
Social Media Use in 4‐H ActivitiesSocial Media Use in 4‐H Activities
Social Media Use in 4‐H Activities
 
Achieving Financial Security In New Normal
Achieving Financial Security In New NormalAchieving Financial Security In New Normal
Achieving Financial Security In New Normal
 
Financial Planning Needs for Women
Financial Planning Needs for WomenFinancial Planning Needs for Women
Financial Planning Needs for Women
 

Social Networking and Internet Safety

Editor's Notes

  1. Youth are getting exposed to high‐tech devices such as smart phones and internet at earlier ages. While there are many benefits of these devices, they have opened up opportunities for others to negatively exploit users. This workshop will educate educators and youth about these predatory activities, ways to avoid them, and what to do when you or others encounter them. [ Introduction: who you are, where you’re from .] Today I’d like to talk about some things we can do to help keep kids safer online. I’m highlighting suggestions from this publication, Net Cetera, which we have available for you today. Let’s start with a few questions: How many of you have school-aged kids? Or know a kid? What ages? Do they spend time online or on a cell phone? [NOTE TO PRESENTER : This is intended to be a 10-minute presentation if you use just the basic slides. You can lengthen it by adding discussion of any of the specific topics included under ADDITIONAL SLIDES.]
  2. these predatory activities, ways to avoid them, and what to do when you or others encounter them.
  3. The term Web 2.0 is associated with web applications that facilitate participatory information sharing , interoperability , user-centered design , [1] and collaboration on the World Wide Web . A Web 2.0 site allows users to interact and collaborate with each other in a social media dialogue as creators ( prosumers ) of user-generated content in a virtual community , in contrast to websites where users ( consumers ) are limited to the passive viewing of content that was created for them. Examples of Web 2.0 include social networking sites , blogs , wikis , video sharing sites, hosted services , web applications , mashups and folksonomies .
  4. http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/ISTTF_Final_Report-Executive_Summary.pdf
  5. http://www.athinline.org/pdfs/MTV-AP_2011_Research_Study-Exec_Summary.pdf
  6. http://www.athinline.org/pdfs/MTV-AP_2011_Research_Study-Exec_Summary.pdf
  7. Youth are aware that sexting can be a serious problem, but still 1 in 3 have engaged in some form of sexting. Many who “sext” do so as a result of pressure. http://www.athinline.org/pdfs/MTV-AP_2011_Research_Study-Exec_Summary.pdf
  8. Youth are aware that sexting can be a serious problem, but still 1 in 3 have engaged in some form of sexting. Many who “sext” do so as a result of pressure. http://www.athinline.org/pdfs/MTV-AP_2011_Research_Study-Exec_Summary.pdf
  9. Youth are aware that sexting can be a serious problem, but still 1 in 3 have engaged in some form of sexting. Many who “sext” do so as a result of pressure. http://www.athinline.org/pdfs/MTV-AP_2011_Research_Study-Exec_Summary.pdf
  10. http://puresight.com/Cyberbullying/cyber-bullying-statistics.html http://www.cyberbullying.us/research.php http://www.cyberbullying.us/2010_charts/teen_tech_use_2010.jpg
  11. http://www.stopbullying.gov/parents/bully_proofing/index.html What You Can Do Talk with your child. Ask for their account of the situation. Be objective and listen carefully. Calmly explain what your child is accused of and ask for an explanation of the incident and their role. Make it clear to your child that you take bullying seriously.   Calmly let them know that you will not tolerate this behavior.  Help your child learn that bullying hurts everyone involved.  Develop clear and consistent rules for your child's behavior. Praise your child when they follow the rules. Decide on fair consequences and follow through if your child breaks the rules.  Spend more time with your child . Carefully supervise and monitor their activities, including when they are online or texting. Be aware of who your child's friends are. Find out how they spend their free time. Build on your child's talents and positive attributes.   Encourage him or her to get involved in social activities.  Work with your child’s school to ensure the bullying does not happen again. Ask the school to keep you informed. Develop strategies together to address bullying. Work together to send clear messages to your child that the bullying must stop. Talk with a school counselor or health professional. They may be able to provide your child with additional help.
  12. Trainer: Give a phone number for local law enforcement. Remind the audience not to use 9-1-1 unless it is an emergency.
  13. Many of these agencies provide specialized services and assistance. They run 24 hour help lines, provide educational materials, and make referrals for family support groups.
  14. Many times an Internet crime falls under a federal jurisdiction. In a non-emergency situation in which you encounter a criminal activity that involves your child, consider contacting law enforcement at the federal level. Trainer: Before moving on to the resource slides, review the objectives you set out in the beginning of the presentation.
  15. http://mashable.com/2012/01/03/block-internet-distractions-apps/#view_as_one_page-gallery_box3669 - https://addons.mozilla.org/en-US/firefox/addon/leechblock/ http://labnol.blogspot.com/2005/12/how-to-access-blocked-websites.html
  16. Youth are getting exposed to high‐tech devices such as smart phones and internet at earlier ages. While there are many benefits of these devices, they have opened up opportunities for others to negatively exploit users. This workshop will educate educators and youth about these predatory activities, ways to avoid them, and what to do when you or others encounter them. [ Introduction: who you are, where you’re from .] Today I’d like to talk about some things we can do to help keep kids safer online. I’m highlighting suggestions from this publication, Net Cetera, which we have available for you today. Let’s start with a few questions: How many of you have school-aged kids? Or know a kid? What ages? Do they spend time online or on a cell phone? [NOTE TO PRESENTER : This is intended to be a 10-minute presentation if you use just the basic slides. You can lengthen it by adding discussion of any of the specific topics included under ADDITIONAL SLIDES.]
  17. So keeping in mind these risks, the Federal Trade Commission wrote a guide for parents called Net Cetera . It’s based on the idea that the first step to protecting kids online is more about talking than technology. When kids want important information, they turn to their parents. This guide can help parents talk with their kids about being safe online.
  18. We often heard from parents – especially those with tech-savvy kids – that they didn’t know where to start. So, for parents who wonder where to begin, here are some tips: Start early : Even toddlers see their parents using communications tools. What toddler doesn’t want to get little hands on a cell phone? As soon as these kids use a computer or phone themselves, it’s time to talk with them about safety. If your kids are already going online: Create an honest, open environment : Listen to what kids have to say, and be supportive. Initiate conversations : Don’t wait for kids to come to you. Use everyday chances to talk with kids: news stories about cyberbullying, a storyline on TV – both can be the start of a worthwhile conversation.
  19. Communicate your values – and how they apply online: You’re the only one in a position to guide your kids this way. Be very clear with kids about this. It’ll help them make smarter decisions when they’re faced with tricky situations. Be patient : Most kids need small bits of information repeated – and often – for it to really sink in. Keep talking; chances are it’ll pay off.
  20. Kids need different levels of attention and guidance at different ages – and it’s really up to you to decide where your own kids fit. Starting with very young kids , it’s a good idea to supervise them while they’re online – maybe even choosing the sites they can visit. As they’re ready to explore a little more, consider limiting their exploration to sites you’ve already checked out and that you think are OK for their educational and entertainment value. Moving on to tweens , aged 8-12, who usually are ready to explore a bit more on their own – it’s still a good idea to be close by. Having the computer in a family area is a good idea. Parents also may want to talk about how much time their tween can spend online.
  21. By the time kids are teenagers, many are ready for more independence from their parents. They’re starting to form their own values and reflecting those of their friends. But that doesn’t mean there’s no point in talking with them. Teens have access to the internet through their mobile devices, phones, their computers and their friends computers, so it’s really hard to watch what they do. It doesn’t hurt to reinforce ‘good citizenship’ messages with teens, along with three important messages that many need to hear: Not all information is credible: just because it’s posted, doesn’t mean it’s so. Once they post something, there’s no taking it back. It’s out there in the world. No matter how impersonal it seems, screen names, profiles and avatars belong to people with real feelings. Treat them the way you’d like to be treated.
  22. The booklet is called Net Cetera for a reason: it covers other subjects you might want to talk about with kids: safe social networking how to handle cyberbullying what to do about sexting (which boils down to “don’t do it”) managing mobile applications understanding social mapping (a kind of GPS in mobile phones that lets people know where you are), and protecting your computer. Net Cetera also talks about phishing, parental controls, file sharing, cell phone etiquette – those subjects parents need to know to talk with their kids about being safe online.
  23. In case you’d like more copies, or if you belong to any groups that might be able to use copies, please feel free to pass it on! There are a few ways you can do that: Net Cetera is posted at OnGuardOnline.gov, the federal government’s online safety website. You’ll find the full document there, as well as a button you can grab and post on your own website. [eventually…] You can also copy sections of the guide to use in newsletters, blogs – however you can use it. The booklet is in the public domain. You also may want to order free copies at the FTC’s bulk order site: bulkorder.ftc.gov. They’re free, and they’re available in both English and Spanish.
  24. [NOTE TO PRESENTER : The first section is a basic presentation lasting about 10-15 minutes. If you’d like to add any of these topics, simply copy these slides before Slide #9. We suggest you still finish with Slides # 10-11.]
  25. Adults often see socializing online and offline as separate activities, each with its own rules. Kids see it all as socializing, whether it’s online or off – and it’s good to talk with them about how they act online. Even the most tech-savvy kids can use some reminders about their online behavior: What they do online can have real-world consequences – the words they use and what they post can have a big impact on others, and on themselves. Remind kids that, once they post something, they can’t take it back. It’s a message that’s worth repeating, especially since the colleges and jobs kids may eventually want to get into will be checking their social networking profiles. While most kids are good at just deleting things they think are annoying or creepy, tell kids to trust their gut if they’re suspicious about anything – and to tell you about it. You can help them report it to the police and the social networking site. It’s a good idea to remind kids to keep personal information private. Kids should avoid posting things like where they go to school, their address or phone number.
  26. Cyberbullying is harassment or bullying that happens online, and it can happen on social networking sites, in IMs, emails, text messages, and in games. Recent research shows that this is the online safety issue that kids are most worried about. Again, the advice is to talk to your kids. Ask them to tell you if an online message makes them feel threatened or hurt. The same goes for images. Keep an open channel of communication with your child and hopefully he or she will come to you. Tell your kids that they can’t hide behind the worlds they type or the images they post. None of us want to think that our kid might be bullying other kids. Still, remind your child that hurtful messages can make the sender look bad, and sometimes even bring punishment from the authorities.
  27. If your child has a problem with a bully, tell him or her not to react. Bullies are looking for a response, so don’t give them one. Encourage your kid to talk with you about what’s going on, and to help you save the evidence. If the bullying keeps up, share the record with the school or the police. If you ever fear for your child’s safety, immediately contact the police. Block the bully online: remove him or her from “friend” or “buddy” lists, and block the email address. If your child’s social networking profile has been changed or created without his permission, get in touch with the company that runs the site to have it taken down. Tell your kid that she can help stop cyberbullying by telling the bully to stop, and by not passing on mean messages.
  28. As communications have gone mobile, so has kids’ ability to constantly stay in touch. The fundamentals of common sense and common courtesy apply, regardless of where communications take place. Establish rules about when and where it’s appropriate to use their cell phones. Can they text at the dinner table? Do they have to give you their phone when they’re supposed to be doing homework or sleeping? Consider the example you’re setting: do you do the things you forbid your kids to do? Remember that it’s illegal to text, surf, or talk on the phone while driving in many states – and it’s dangerous in all of them. And your kids are watching. Talk to your kids about using their manners on cell phones and online (since many of them get online through their phones). Remind them to treat people the way they’d like to be treated.
  29. Talk with your kids about privacy and safety. Most mobile phones allow photo- and video-sharing, which can be fun and creative – but can also cause issues about personal privacy and reputation. Encourage kids to think about their privacy – and that of others – before posting a picture or video. With mobile phones, it’s easy to post a picture without the OK of the person in the picture, but that can be embarrassing and even unsafe. Better to think first than do damage control later. Smart phones let kids check and update their social networking pages on the go. Remember that any filters you’ve set up on the home computer don’t apply on the phone. Encourage your child to use good sense when social networking from their phone.
  30. The phone itself, as well as the mobile carrier, should give you some options about privacy settings and child safety controls. You often can turn off things like web access, downloading, or texting. Other phones let you set the number of minutes used, limit internet access, and provide number privacy. Ask your carrier what tools are available on your plan and your phone, and find out what they cost. (There may be extra charges for these features.) Do you know about social mapping? It’s GPS technology that’s in many cell phones now, and kids can use it to pinpoint where their friends are – or be pinpointed by their friends. Tell your kids to use this feature only with friends they know in person and trust – and not to broadcast their location to the world. You might want to check: some carriers have GPS services that let parents map their kid’s location.
  31. Bullet 1: Some sites will allow only a defined community of users (members only/registered users) to access posted content, while others allow anyone to view postings Bullet 2: Consider restricting access to your personal page of information that you post (e.g., limit access to your family, friends, your team, a club, etc.). Bullet 3: Don’t post your full name, Social Security number, address, phone number, school name, exact age, etc. Bullet 4: Your screen name should make you anonymous; don’t use obvious information in your screen name such as your age, hometown, pet name, or part of your real name
  32. Bullet 2: Even if you delete the information, people could have downloaded the information already or older versions of your information can exist on other peoples’ computers. Bullet 3: Your photo can be altered and distributed in ways that you may not be happy about. Never post sexually provocative pictures. Bullet 4: People lie about who they really are. You never know who you could be dealing with.
  33. Bullet 1: Make this time quality time with your children while showing them safe and responsible online surfing and socializing techniques. Bullet 4: Be open with your child about the rules from the beginning. You may want to consider having your child sign a contract with clearly stated rules. Also, learn about parental control tools.
  34. Bullet 1: Do not have the computer in your child’s room. In this way you can easily monitor your child while they are surfing and/or socializing online. Bullets 2 and 3: Software is available to monitor your child’s online experience while you are not at home or unable to monitor your child personally. Bullet 4: Sites may allow you to request an immediate cancellation of your child’s account.
  35. Bullet 1: Don’t post anything that you wouldn’t want the world to know (e.g., your phone number, address, Social Security number, or other vital info). It makes it easier for a stranger or online predator to find you. Bullet 2: While it may be fun to connect with friends from all over the world, avoid meeting someone in person you do not fully know. Bullet 3: If you feel someone’s behavior is inappropriate, react. Talk with your parents, a trusted adult, or report it to the authorities. Bullet 5: Think twice before posting a photo or information you know your parents would not approve of.