Loading…

Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Like this presentation? Why not share!

Like this? Share it with your network

Share
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
1,417
On Slideshare
1,150
From Embeds
267
Number of Embeds
2

Actions

Shares
Downloads
0
Comments
0
Likes
0

Embeds 267

http://infogdss.wordpress.com 266
http://translate.googleusercontent.com 1

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • Methods: Generation M 2 : Media in the Lives of 8- to 18-Year-Olds is the third in a series of large-scale, nationally representative surveys by the Foundation about young people’s media use.  The report is based on a survey conducted between October 2008 and May 2009 among a nationally representative sample of 2,002 3rd-12th grade students ages 8-18, including a self-selected subsample of 702 respondents who completed seven-day media use diaries, which were used to calculate multitasking proportions. Kaiser Family Foundation has conducted a study that found entertainment media use by children and teens has risen considerably when compared to usage five years ago. The study found that kids aged between 8 and18 years spend almost eight hours a day using entertainment media which is the same amount of time adults spent at work. The time recorded is 1 hour 17 minutes higher from time recorded in 2004. "Anything that children spend that much time doing is something that needs to be studied," warns Victoria Rideout who is the author of the study and a Kaiser official. She said that media usage cannot be branded well or bad however, from the view point of health the usage is high. The survey was conducted between October 2008 and May 2009 and included more than 2,000 American children aged between 8-18. Key findings of the report titled "Generation M2: Media in the Lives of 8- to 18-Year-Olds," are that more than half of the children use media while doing homework and female children spend more time on social networking sites, listening to music and reading. Boys on the other hand, spend more time playing video and computer games, or visiting YouTube. When the kids reach 11 their media usage goes up dramatically. Teens are found to spend about an hour and a half texting each day. About 70% of the children said that their families did not restrict the time on watching TV. Black and Hispanic youth were found to spend much more time with media than white youth. They spend 4½ hours more when compared to the white youth. As for TV, Black children spend nearly 6 hours and Hispanics just under 5½ hours while white youths spend 3½ hours a day. Showing the importance of diet and exercise , about one-fifth of U. S. teenagers was identified through tests of lipids in the blood for heart diseases. The Centers for Disease Control and Prevention published report which found that 43% of the obese children tested outside the recommended ranges. The results were on the basis of blood tests taken from 3,125 children ages 12-19 from 1999 to 2006.
  • 4% of cell-owning teens ages 12-17 say they have sent sexually suggestive nude or nearly nude images of themselves to someone else via text messaging 15% of cell-owning teens ages 12-17 say they have received sexually suggestive nude or nearly nude images of someone they know via text messaging on their cell phone. Older teens are much more likely to send and receive these images; 8% of 17-year-olds with cell phones have sent a sexually provocative image by text and 30% have received a nude or nearly nude image on their phone. The teens who pay their own phone bills are more likely to send “sexts”: 17% of teens who pay for all of the costs associated with their cell phones send sexually suggestive images via text; just 3% of teens who do not pay for, or only pay for a portion of the cost of the cell phone send these images. Our focus groups revealed that there are three main scenarios for sexting: 1) exchange of images solely between two romantic partners; 2) exchanges between partners that are shared with others outside the relationship and 3) exchanges between people who are not yet in a relationship, but where at least one person hopes to be.
  • Any website where you create a username, password and PROFILE Sites that allow you to contribute by uploading or posting your own content for rating review and remixing
  • Predators With increasing numbers of teens admitting they are meeting Internet strangers in real life (between 12% and 24 of young teens, depending on the study), they will increasingly encounter sexual predators. Working closely with law enforcement and survivors of Internet sexual exploitation, Internet Super Heroes has developed an stranger-danger message in a non-threatening format. Using Green Goblin as the predator posing as a young teen boy to lure Spider-Girl into an offline meeting, the message is delivered loud and clear. Yet, it is as appropriate for preteens as it is for teens. The program isn’t designed to scare the children or teens. It is designed to make them more careful and help them understand how the bad guys trick even the smartest children into giving away important and personal information. It helps them understand why some kids agree to meet strangers offline, and how it is never safe to do that. If they insist on meeting their online friends in real life, it also helps them understand how to reduce the risks and get their parents and other trustworthy adults involved. Privacy Privacy has several parts. One is closely related to the stranger-danger message. Teaching children not to share personal information with people they meet online is much easier when the superhero model is applied. Super Heroes always strive to keep their identities secret. It’s the only way they can protect themselves and their loved ones. By using games where Spiderman, Spider-Girl and Hulk leave behind bits of information that could be used to trace their real identities, children are taught how items of seemingly innocent information, when combined, can be very dangerous to the superhero. By learning to protect the Super Heroes, they are learning to protect themselves and their friends as well. But this isn’t only about predator issues. It’s also about responsible commercial data collection practices. Using the expertise of Parry Aftab (Internet Super Heroes’ Executive Director, cyberspace privacy lawyer and The Privacy Lawyer columnist for Information Week Magazine, informationweek.com) the children and teens will be taught how to look for and read a privacy policy and how to find trustworthy Web site. They will learn about the children’s privacy laws that protect them against unscrupulous marketing tactics and sites that misuse their personal information. And the kids will understand the importance of privacy itself and keeping some things secret, even from their best friends. These include credit card information, debit card passwords and even their e-mail passwords. Everyone knows that Super Heroes don’t share their personal and secret information with anyone else, even their non-superhero best friends. Hopefully, after understanding why, neither will your children. Pornography One of the biggest problems parents complain about online is graphic pornographic images their children encounter in their e-mail boxes and online. The pornographers in an effort to increase their advertising revenue and online profile, have used popular kid Web site. names with common misspellings and other similar tricks to lure our kids to their sites accidentally. By understanding the tricks used by pornographers to push their content to everyone online, children and teens can avoid most pornography. And learning where and how to report misleading domain names and typosquatting will make a big difference too. Pop-Ups Now, by using spyware and adware, the pornographers are reaching out to our computers to personally deliver the messages using disgusting pop-ups and graphic sexual images even when our children aren’t surfing. By being made aware of spyware and adware installation schemes, and the pop-ups they deliver, children can use pop-up blocker programs and toolbars to prevent being exposed to countless and disgusting pop-ups.
  • Talk to your child Caution them about responding "in kind." This is not a time for them to lash out or start a cyberwar themselves. See if they think they know the identity of the cyberbully or cyberbullies. See if this is related to an offline bullying situation, and deal with that quickly. And don't confuse the language most kids use online with cyberbullying. It may be shocking to us, but unless it is shocking to your child, it's not cyberbullying. Ignore it A one time, seemingly unthreatening act, like a prank or mild teasing should probably be ignored. (If it's a threat, you must report it.) At the same time, you may want to consider using some preventive measures: Restrict the people who can send you communications Consider restricting all incoming communications to pre-approved senders, such as those on your child's buddy list. (If the cyberbully is someone on their buddy list, though, this method won't help. In that case the cyberbully will have to be removed from the buddy list and/or blocked.) Restrict others from being able to add your child to their buddy list Cyberbullies track when your child is online by using buddy lists, and similar tracking programs. It will let them know when one of their "buddies" is online, when they are inactive and, in some cases, where they are. This is like adding a tracking device to your child's online ankle, allowing their cyberbullies to find them more easily and target them more effectively. This feature is usually found in the privacy settings or parental controls of a communications program. Google your child Make sure that the cyberbully isn't posting attacks online. When you get an early warning of a cyberbullying campaign, it is essential that you keep an eye on  your child's screen name, nick names, full name, address, telephone and cell numbers and Web sites. You can also set up an "alert" on Google to notify you whenever anything about your child is posted online. To learn more about "Googling" yourself or your child, read " Google Yourself! " Block the sender Someone who seems aggressive, or makes you uncomfortable and does not respond to verbal please or formal warnings should be blocked. This way, they will not be able to know when you are online or be able to contact you through instant messaging. Even if the communicates are not particularly aggressive or threatening, if they are annoying or, block the sender. (Most ISPs and instant messaging programs have a blocking feature to allow you to prevent the sender from getting through.) "Warn" the sender If the cyberbully uses another screen name to avoid the block , otherwise manages to get through or around the block or communicates through others, "warn" them, or "notify" the ISP. (This is usually a button on the IM application.) This creates a record of the incident for later review, and if the person is warned enough, they can lose their ISP or instant messenger account. (Unfortunately, many cyberbullies use "warning wars" or "notify wars" to harass their victims, by making it appear the victim is really the cyberbully. This is a method of cyberbullying by proxy, getting the ISP to be an unwitting accomplice of the cyberbullying.) Report to ISP Most cyberbullying and harassment incidents violate the ISP's terms of service. These are typically called a "TOS violation" (for a "terms of service" violation, and can have serious consequences for the account holder. Many ISPs will close a cyberbully's account (which will also close their parents' household account in most cases.) You should report this to the sender's ISP, not yours. (For more information about how to make a report, read "Making a Report to Their ISP." If you use a monitoring software, like Spectorsoft, this is much easier.) If your child's account has been hacked or their password compromised, or if someone is posing as your child, you should make a formal report to your ISP as well. You can call them or send an e-mail to their security department (NOT their terms of service report line). But before changing your password, you should scan your computer for any hacking programs or spyware, such as a Trojan horse. If one is on your computer, the cyberbully may be able to access the new password. Most good anti-virus programs can find and remove a hacking program. All spyware applications can. We recommend SpyBot Search and Destroy (a freeware) or Ad-Aware (by Lavasoft, they have a free "lite" program). Report to School Most cases of cyberbullying occur off school grounds and outside of school hours. In the United States , often the school has no legal authority to take action relating to an off-premises and off-hours activity, even if it has an impact on the welfare of their students. The laws are tricky, and vary jurisdiction by jurisdiction. So while you should notify the school (especially if your child suspects whom is behind the attacks), they may not be able to take disciplinary action. They can keep any eye on the situation in school, however. And since many cyberbullying incidents are combined with offline bullying incidents, your child may be safer because of the report. Also, while the school may have limited authority over disciplining the cyberbully, they can call the parents in and try and mediate the situation. They can also institute an educational and awareness program to help stop further cyberbullying by students, and to help educate parents about the problem. Report to Police Someone who threatens you physically, who is posting details about your or your child's offline contact information or instigating a cyberbullying by proxy campaign should be reported to the police. (Although you should err on the side of caution and report anything that worries you.) Using a monitoring program, such as Spectorsoft, can facilitate the investigation and any eventual prosecution by collecting and preserving electronic evidence. Print-outs, while helpful in explaining the situation, are generally not admissible evidence.) If you feel like your child, you or someone you know is in danger, contact the police immediately and cut off contact with this person or user, staying offline if need be until you are otherwise instructed. Do not install any programs, or remove any programs or take other remedial action on your computer or communication device during this process. It may adversely affect the investigation and any eventual prosecution. Take Legal Action Many cases of cyberbullying (like their adult cyber-harassment equivalent) are not criminal. They may come close to violating the law, but may not cross the line. Most of the time, the threat of closing their ISP or instant messaging account is enough to make things stop. But sometimes, either because the parents want to make an example of the cyberbully or because it isn't stopping, lawyers need to be brought in. It may also be the only way you can find out whom is behind the attacks. Think carefully before you decide to take this kind of action. Even if you win in the end, it may take you two or three years to get there and cost you tens of thousands of dollars. You may be angry enough to start it, but make sure that you have something more than anger to sustain the long months and years of litigation.  
  • Another example
  • Another example
  • Record content consumption Poll collective brain Take notes Converse De-stress
  • Click Chat, Select Options, Pick “Go Offline”

Transcript

  • 1. Taking the Mystery out of Facebook Presented by Beth Gallaway [email_address] 603-247-3196
  • 2. "Generation M2: Media in the Lives of 8- to 18-Year-Olds” http://www.kff.org/entmedia/mh012010pkg.cfm
  • 3. Teens & Sexting http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  • 4. http://www.mvtimes.com/news/2006/03/09/myspace.php
  • 5. What is Web 2.0?
    • Web as platform (Face Your Manga)
    • Collective intelligence (YouTube)
    • Data driven (Online Summer Reading)
    • Everything is in beta (meebo)
    • Simple programming (Facebook)
    • Cross platform (Twitter)
    • Rich user experience (Club Penguin, Cartoon Network Game Creator)
  • 6. What is Social Software? ajax.phpmagazine.net/2006/02/great_collection_of_web_20_log.html
  • 7. Social Software Assumptions
    • Everything is meant to be shared (“public” is the default) ‏
    • Everything is meant to be critiqued (commenting “ON” is the default) ‏
    • Everything is meant to be remixed (Creative Commons licensing is the default) ‏
  • 8. How do you feel about Social Networking sites? “ Libraries cannot afford to ignore the social networking potential to attract new, younger and more technologically interested customers.” "It's where the patrons are so we need to be visible to them-marketing, information and building community online. Not all patrons have to walk through the door. We can make connections with and serve online those patrons who, for whatever reason, won't be physically in the library." “ At this time we feel the drawbacks outweigh the benefits." “ not sure--need more info"
  • 9. Why are Social Networks so popular?
    • It’s all about ME!
    • Customizable
    • Social
    • Developmental Assets
  • 10. Developmental Assets
    • Support
    • Empowerment
    • Boundaries & Expectations
    • Constructive Use of Time
    • Commitment to L e arn
    • P ositive Values
    • Social Competencies
    • Positive Identity
    The Search Institute. 40 Developmental Assets of Adolescents/Middle Childhood/Early Childhood. http://search-institute.org
  • 11. Teen Brain Development
    • Risk Takers
    • Consequences
    • Impulse
  • 12. Gamers
    • Risk-takers
    • Social
    • Competitive
    • Global
    • Technical
    Beck, John & Mitchell Wade. The Kids are Alright. Harvard Business School Press, 2007. http://www.nslg.net/gotgamebook/index.html
  • 13.  
  • 14. 4 Ps
    • PREDATORS
    • PRIVACY
    • PORNOGRAPHY
    • POPUPS
  • 15. Cyberbullying http://www.stopcyberbullying.org
  • 16. Escalating Cyberbullying
    • Ignore it?
    • Restrict Communication
    • Restrict “Friending”
    • Google your child
    • Block Sender Warn Sender
    • Report to ISP
    • Report to School
    • Report to Police
    • Legal Action
  • 17. P E A C E F I R E http://www.peacefire.org
  • 18. Tips for Parents & Guardians
    • Begin a dialogue with your kids about safe Internet use and supervise their online activities
    • Consider rating, blocking, monitoring, and filtering applications for your computer
    • Make Internet use a family activity
    • Encourage your kids’ critical-thinking skills
    • Set reasonable rules for going online
    • Encourage your kids to tell you when they encounter problems online
    • If they come across lewd, obscene, or illegal material or if they are contacted by someone who attempts to engage them in sexual conversation, make a report to NCMEC’s CyberTipline at www.cybertipline.com or 1-800-843-5678
    http://www.missingkids.com/missingkids/servlet/PageServlet?LanguageCountry=en_US&PageId=3601
  • 19. When Creating a Username, DO Use…
    • Something original and creative
    • A nickname
    • A character's name
    • A name that references a favorite band, animal, food, hobby...
  • 20. When Creating a Username, DON’T use
    • Your real first or last name
    • Your age
    • Your phone number
    • Your zip code or location
    • A suggestive name or word
    • Pornographic or obscene words
    • Derogatory terms
  • 21. Password Tips
    • Choose passwords that are:
      • At least 6 to 8 characters
      • Combi nations of letters and numbers
      • Personally meaningful for easy remembering
      • Not obvious to the rest of the world
      • F ormer address is a good one to try!
    • Use a password generator for help
    • Write the password down and store in a safe place
  • 22. Web As Platform: Face Your Manga
    • Create a digital representation of yourself
    • Use in a variety of applications
    Face Your Manga http://www.faceyourmanga.com
  • 23. Face Your Manga: Uses
    • Contest: create a personal
    • Contest: create a celebrity, author, character…
    • Internet safety session
    Face Your Manga http://www.faceyourmanga.com
  • 24. Face Your Manga Face Your Manga http://www.faceyourmanga.com
  • 25. Collective Intelligence: YouTube
    • Home for archiving, rating, & commenting on video
    http://www.youtube.com/oceanking97
  • 26. Comments on Re: Cry of the Dolphins http://www.youtube.com/oceanking97
  • 27. Data Driven: Online Summer Reading
    • Online registration
    • Online book logs
    • Online book reviewing/rating
    MA 2008 Statewide Summer Reading Program: Wild Reads http://www.readsinMA.org
  • 28. Alternatives to Facebook
  • 29. Reads in MA MA 2009 Statewide Summer Reading Program: Go Green @ your library http://www.readsinMA.org
  • 30. Everything’s in Beta: MEEBO
    • Meebo
    • http://www.meebo.com
  • 31. Cross Platform: Twitter
    • Record what you are reading, viewing, doing, thinking
    • Connect with friends and colleagues to share information
    Twitter http://www.twitter.com
  • 32. Rich User Experience: Club Penguin
    • Avatar creation
    • Games
    • Chat
    Club Penguin http://www.clubpenguin.com/
  • 33. Club Penguin Club Penguin http://www.clubpenguin.com/
  • 34. Game Design
    • Ben 10 Alien Force Game Creator
      • http://gamecreator.cartoonnetwork.com/
  • 35. Light Programming Facebook
    • Status Updates
    • Instant Messaging
    • Email
    • Social Networking
    • Affinity Groups
    • Applications – Games!
    “ Facebook helps you connect and share with the people in your life.”
  • 36. Using Facebook
  • 37.  
  • 38. Turning off Chat – Go Offline!
  • 39. Click HELP under account to find the Safety Center
  • 40. Select Teen to get tips for your teen
  • 41. On Safety for Teens page, scroll down & click “More information on reporting abuse”
  • 42. Note section on Cyberbullying…
  • 43. Facebook Etiquette
    • Create a friending policy for yourself
    • Use filters
    • It’s okay to not use Applications or block them
    • Reply within 24-48 hours if possible
    • Etiquette article:
    • http://www.pcworld.com/article/169120/facebook_etiquette_10_rules_for_better_socializing.html
  • 44. Click Friends, then Edit Friends… Then Create list and move individuals to appropriate category
  • 45. For more resources… http://www.delicious.com/informationgoddess29/facebook
  • 46. Contact
    • Beth Gallaway
    • 603-247-3196
    • [email_address]
    • http://informationgoddess.info
    • Slides: Slideshare http://www.slideshare.net/informationgoddess29
    • Links: SocialSoftware http://www.delicious.com/informationgoddess29/socialsoftware
    • &
    • http://www.delicious.com/informationgoddess29/facebook