Friend requests


Published on

This slideshow aligns with the YouTube video: This webinar has been developed by the Academy Technology Seminar 3 students of Palisades High school (11th grade). Guided by Mr. Robert Reilly (teacher) and Mrs. Karen Hornberger (librarian). The topic was the issues that accompany friend requests. This specific webinar was produced for the 4th, 5th, and 6th grade levels; the 11th grade students felt that the primary age group could use the guidance.

Published in: Education
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Friend requests

  1. 1. FRIEND REQUESTSBarry Weaver, Jessica Shafer, Dan Finney, Daniella Ellis, Dylan Rodd AND Will Lyons
  2. 2. FRIEND REQUEST WHAT IS IT? A friend, in real life, is someone you are close with and comfortable around. An online friend, however, is person added to your list of friends on a social networking website.For example, on Facebook, you can select a user and click "Add as Friend" to send a friend request to that user. When the user receives your friend request, he or she may choose to accept or decline the invitation. If the user accepts your request, he or she will be added to your list of friends. Likewise, you will be added to that users list of friends as the same time. Xbox Live, as well as other organizations include similar features.Once you become friends with a user, that person will be able to access your profile with the additionalviewing rights. This means he or she may be able to view more of your profile and post comments on the "wall" of your profile page. (definition adapted from:
  3. 3. ACCEPTING FRIENDSOnline friends can be a great way to:Connect with friends when you can’t get together in personStrengthen friendships through shared interestsBuild a group of online friends who are safe and fun to interactwith
  4. 4. ACCEPTING FRIENDSIs chatting while gaming the same as a friend request? Image taken from google images
  5. 5. THE GOOD AND THE BADOnline friendships can be great, but they can also be dangerous.Chatting with or friending strangers can put you at risk to becontacted by an online predator (a person who intends to harmanother person by first contacting them online).
  6. 6. CHATTING DURING GAMINGYou may think chatting to strategize during gaming is harmless, but itcan be dangerous, too.Predators will listen carefully to anything you say. You may only givetiny bits of information, but a predator can actually be very good atpiecing information together with intent to harm you.
  7. 7. ACCEPTING EVERYONEDo you accept anyone who requests you?When do you draw the line of who to accept and who not to? - Do you know them or just know their name? - If you don’t know them, just hit “ignore” or “decline” and do not even ask them who they are.
  8. 8. AVATARSAn Avatar is either a graphic image to represent a person or a screen name thatis completely different from the person’s name. Avatars are a smart way tokeep your identity private when gaming or publicly posting.If a friend request comes from an Avatar account, you can - Ask your friends if they know who the person isIf you use an Avatar account, you can - tell your friends in person what your account name is - attach a message telling them who you are
  9. 9. ACCEPTING FRIENDSDo you know the person in person? -Outside of the social network you are using. -Does your friendship just stay in school?Would they come to your house? -Would you care to spend time with them outside of school?
  10. 10. ACCEPTING FRIENDSJust because you have mutual friends, do you accept them? Image taken from google images
  11. 11. ACCEPTING THE WRONG PEOPLEOver the summer my sister was involved in a chat room using my phone. She wastalking to this guy and somehow this guy had gotten all of my information throughFacebook because I had Facebook connected through my phone. Later that night Ireceived a friend request from this guy and I accepted him because I had a few mutualfriends. The next day I had 5 or 6 messages from him stating all of my information. Hestarted calling me inappropriate names and asked how far my home town was from hislocation. He also asked how I was doing in school and stated my school by name. I wasscared. I had to delete my Facebook then, I ended making up a new one.
  12. 12. SOMETHING TO SERIOUSLY CONSIDERYou may think that just because someone goes to your school that you aresafe. It has happened that people have accepted friends with a personthat they knew from school who downloaded photos and used them ininappropriate ways. Imagine seeing yourself in a place where you actuallyweren’t, or on a body that is not yours, or even seeing your personalphoto for sale! You may think someone is harmless just because you doknow who they are, but you have to think about how well you know themand trust them.
  13. 13. WHAT TO DO?If someone that you trusted turns out to be untrustworthy, do not beembarrassed. It is more important that if something is going wrongthat you tell at least two adults. In certain circumstances, the adultsmay need to call the police.Do not perform pranks on your friends online. Pranks often gowrong and you may find yourself in big trouble with adults andpossibly the police.
  14. 14. DO YOU REALLY KNOW THE PERSON?Do you actually know the person? - What is their personality like? - Where are they from? -Can you trust them with your photos, and your personal information?
  15. 15. ASK YOURSELF…Do you really know all of your friends?Do you have a limit on how many friends you should have?Have you talked to every one of your friends in the past 6 months?
  16. 16. IF A FRIEND IS NOT BEING A FRIENDIf you have a friend who is not being nice to you online, you have a few choices. You can:-Take a break by ignoring them-Tell a trusted adult-Temporarily block them-Un-friend themPlease realize that friending and un-friending should not be taken lightly. It hurts anotherperson’s feelings. Try to only un-friend someone if they are a person who doesn’t make youhappy to be around them a lot of the time. It is important to surround yourself in life and onlinewith people who make you feel good about yourself and are comfortable to be around.
  18. 18. DR. NICOLE YETTERDr. Nicole Yetter is extremely passionate about creating a safe and respectfulworking/learning environment for all! She received her Bachelor’s Degree inRehabilitation Services Education and a Minor in Psychology from The PennsylvaniaState University. She obtained her Masters Degree in Guidance K-12 from the StateUniversity of West Georgia. Recently, she earned her Doctorate in Education fromGrand Canyon University. Dr. Yetters dissertation reviewed the effect ofimplementing classroom meetings on student performance indicators including;academic performance, attendance, documented discipline, and bullying behaviors.
  19. 19. DR. NICOLE YETTER, CONT.Dr. Yetter is also a Certified Olweus Trainer and has her AAC II (Associate AddictionsCounselor). Over the past 16 years, Dr. Yetter has worked with and spoken to thousandsof students, educators, parents, and community members on an array of topics. Theseincluded; Substance Abuse, Grief & Loss, Decision Making, Empathy, Bullying, InternetSafety, and other related topics. Most recently, she was a featured presenter at the 2012National Conference on Bullying in Orlando, Florida. Dr. Yetter also acts as an EducationalConsultant for various School Districts across the country, the PA Bullying PreventionSupport Plan Workgroup, and The CyberBully Hotline, just to name a few. She currently residesin suburban Philadelphia with her husband and children where she is employed at a largesuburban high school as a Guidance Counselor and Safe Schools Coach.
  20. 20. RESOURCESArticle:How Internet Predators Select Their Victims:Xbox Live Privacy Settings:Facebook Privacy Settings:Facebook Friend Requests – Is “Not Now” a Safe, Polite Option or a Privacy Problem?
  21. 21. CREDITSA HUGE thank you to:Kurt Schollin, from Bucks County Intermediate Unit, for guiding Palisades High Schoolstudents through Elluminate webinar software.Dr. Nicole Yetter, for generously volunteering her time and expertise on cyber-safety.Janice Conger and her 4th Grade students at Arrowhead Elementary, for being wonderfulparticipants.Joel Filling and all of the 6th graders who filled out our student surveys.Jaime Guthier and the Academy teachers who made this a truly interdisciplinary project.Palisades High School and School District Administrators for supporting our webinar.
  22. 22. CREDITSTeachers involved in this lesson:Rob Reilly, Academy Teacher, Palisades High SchoolKaren Hornberger, Library Media Specialist, Palisades High School