SlideShare a Scribd company logo
THE USE OF SOCIAL NETWORKS
FOR KIDS UNDER 13 YEASR OLD
HARMFUL USES
• privacy – young children are more likely to post personal
information than older kids, and they do not fully understand the
possible severity and consequences of posting inappropiate
photographs or videos.
• stranger danger – we’ve all heard the “stranger danger” saying,
but the fact of the matter is that children are ofthen threatened by
people whom are actually familiar to them. That said, the internet
makes it quite easy for social networking perpetrators to pose as
other people, or to leave anonymous messages.
• It’s permanent - anything a child says or does online will leave
trace. Chances are years from now, a potential employer or college
will be able to do a search on your child and find his/her profile
page.
• Cyber-stalking - something as inncncent as posting a photograph
can reveal a lot of information about your child including what their
home looks like, what they attend, or information about their friends.
Cyber-stalking and social networking predators may even approach
your child online and use seducing techniques to lure them into
meeting face to face.
• Brain changes – lady Susan Greenfield, a neuroscientist and
professor of synaptic pharmacology at Lincoln College, Oxford, and
director of the Royal Institution, has argued that children who use
social networking sites may experience a lack of attention span, a
need for immedicy for stimulation, and a “shaky sense of identity”.
Then again, this is the same argument that naysayerrs made about
the impact tlevision and entreteinment over the past few decades.
Useful ways
 Relationship building:social networks enable children to meet new
friends from distant lands, helping them become more worldly and
sensitive to cultural differences. Kids can also stay in touch or
reunite with friends from their past who may have moved away.
 Identity: children can share their interests with others, join groups,
experience a sense of independence etc.
 Self-esteem: in correlation wioth identity building, social networks
can hepl build self-esteem and boost confidence.
PROS AND CONS
PROS CONS
• They’ll have parental
supervision. Parents will have a
mmore formalized role in their
children’s online activity.
 Younger users will be targeted
by advertisers just like the rest
of us.
• Teachers will be able to
connect with sudents in
elementary school.
 Young users may not
understand the result of their
online actions until it’s too late
• This will serve as “training
wheels” for younger usesrs who
may not be ready to jump into
the deep end of social media
just yet.
 Cyberbullying could be more
prevalent
• Young users can come out of
hiding and stop using accounts
with fake names to avoid being
found out by parents etc.
PREVENTIONS
1. Checking their friends lists, and make sure they know all
the people.
2. Check their profile to see which type of information they
upload.
3. Showing them all the risks internet and social networks
has.
4. Consantly check the information they put, their photos,
their profile etc.
BIBLIOGRAPHY
http://edudemic.com/2012/08/fscebook-lifting-age-minimum/
http://www.safetyweb.com/social-networking-safety-tips

More Related Content

What's hot

Social media effects by siraj
Social media effects by sirajSocial media effects by siraj
Social media effects by siraj
Muhammad SiRaj Munir
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?
Sarah Welstead
 
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"DefinetheLine at McGill
 
Cyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesCyber Bullying on Social Media Sites
Cyber Bullying on Social Media Sites
Swapnil Shahade
 
Bullying in social media presentation
Bullying in social media presentationBullying in social media presentation
Bullying in social media presentationmitchell_shannon
 
Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned out
Mohamed Sedky
 
Use of Social Media among Adolescents
Use of Social Media among AdolescentsUse of Social Media among Adolescents
Use of Social Media among Adolescents
Pokhara University, Pokhara, Nepal
 
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakRaising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Bex Lewis
 
children and digital privacy paper
children and digital privacy paperchildren and digital privacy paper
children and digital privacy paperMolly Kiehne
 
Social media and the christian youth
Social media and the christian youthSocial media and the christian youth
Social media and the christian youth
Folasade Adedeji
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
Rodolfo Salazar
 
Stranger danger in social media
Stranger danger in social mediaStranger danger in social media
Stranger danger in social media
Umasree Raghunath
 
Social Media Presentation
Social Media PresentationSocial Media Presentation
Social Media Presentation
kherman90
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
Suna Gurol
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social Networks
Barry Caplin
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
Nicastro Consultants
 
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year oldsRumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
YTH
 
Teens, social media and addiction 5.04.16
Teens, social media and addiction 5.04.16Teens, social media and addiction 5.04.16
Teens, social media and addiction 5.04.16
Michael Torres
 
Healthy Living CyberYou
Healthy Living CyberYouHealthy Living CyberYou
Healthy Living CyberYou
Molly Engels
 

What's hot (20)

Social networking leaflet
Social networking leafletSocial networking leaflet
Social networking leaflet
 
Social media effects by siraj
Social media effects by sirajSocial media effects by siraj
Social media effects by siraj
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?
 
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?""Cyber-bullying, Cyber-libel or Cyber-Jokes?"
"Cyber-bullying, Cyber-libel or Cyber-Jokes?"
 
Cyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesCyber Bullying on Social Media Sites
Cyber Bullying on Social Media Sites
 
Bullying in social media presentation
Bullying in social media presentationBullying in social media presentation
Bullying in social media presentation
 
Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned out
 
Use of Social Media among Adolescents
Use of Social Media among AdolescentsUse of Social Media among Adolescents
Use of Social Media among Adolescents
 
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakRaising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
 
children and digital privacy paper
children and digital privacy paperchildren and digital privacy paper
children and digital privacy paper
 
Social media and the christian youth
Social media and the christian youthSocial media and the christian youth
Social media and the christian youth
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
Stranger danger in social media
Stranger danger in social mediaStranger danger in social media
Stranger danger in social media
 
Social Media Presentation
Social Media PresentationSocial Media Presentation
Social Media Presentation
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social Networks
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year oldsRumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
 
Teens, social media and addiction 5.04.16
Teens, social media and addiction 5.04.16Teens, social media and addiction 5.04.16
Teens, social media and addiction 5.04.16
 
Healthy Living CyberYou
Healthy Living CyberYouHealthy Living CyberYou
Healthy Living CyberYou
 

Similar to The use of social networks for kids under

Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshareLoreto Normanurst
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
StemGrade
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
HomeGuides
 
Social media the good the bad and the ugly
Social media the good the bad and the uglySocial media the good the bad and the ugly
Social media the good the bad and the ugly
EMMANUEL AJAYI
 
How to Engage the GEN Y using Social Media ?
How to Engage the GEN Y using Social Media ?How to Engage the GEN Y using Social Media ?
How to Engage the GEN Y using Social Media ?
Feet Haven Reflexology/ The Influencer Network
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
Karen Brooks
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversationlippertnicole
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
- Mark - Fullbright
 
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016
Kathryn White
 
Social networking and its impact on teenagers pdf
Social networking and its impact on teenagers pdfSocial networking and its impact on teenagers pdf
Social networking and its impact on teenagers pdf
Johann Tailor
 
Social media on child development ppt.pptx
Social media on child development ppt.pptxSocial media on child development ppt.pptx
Social media on child development ppt.pptx
sarahfauzna
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sites
ner1eje
 
Markus final project
Markus final projectMarkus final project
Markus final projecterinmarkus
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
NaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
purush203
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
pscl
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009
bermandry
 
Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Bex Lewis
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentationjanemiller48
 

Similar to The use of social networks for kids under (20)

Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshare
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Social media the good the bad and the ugly
Social media the good the bad and the uglySocial media the good the bad and the ugly
Social media the good the bad and the ugly
 
How to Engage the GEN Y using Social Media ?
How to Engage the GEN Y using Social Media ?How to Engage the GEN Y using Social Media ?
How to Engage the GEN Y using Social Media ?
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversation
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016
 
Social networking and its impact on teenagers pdf
Social networking and its impact on teenagers pdfSocial networking and its impact on teenagers pdf
Social networking and its impact on teenagers pdf
 
Social media on child development ppt.pptx
Social media on child development ppt.pptxSocial media on child development ppt.pptx
Social media on child development ppt.pptx
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sites
 
Markus final project
Markus final projectMarkus final project
Markus final project
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009
 
Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 

The use of social networks for kids under

  • 1. THE USE OF SOCIAL NETWORKS FOR KIDS UNDER 13 YEASR OLD
  • 2. HARMFUL USES • privacy – young children are more likely to post personal information than older kids, and they do not fully understand the possible severity and consequences of posting inappropiate photographs or videos. • stranger danger – we’ve all heard the “stranger danger” saying, but the fact of the matter is that children are ofthen threatened by people whom are actually familiar to them. That said, the internet makes it quite easy for social networking perpetrators to pose as other people, or to leave anonymous messages. • It’s permanent - anything a child says or does online will leave trace. Chances are years from now, a potential employer or college will be able to do a search on your child and find his/her profile page.
  • 3. • Cyber-stalking - something as inncncent as posting a photograph can reveal a lot of information about your child including what their home looks like, what they attend, or information about their friends. Cyber-stalking and social networking predators may even approach your child online and use seducing techniques to lure them into meeting face to face. • Brain changes – lady Susan Greenfield, a neuroscientist and professor of synaptic pharmacology at Lincoln College, Oxford, and director of the Royal Institution, has argued that children who use social networking sites may experience a lack of attention span, a need for immedicy for stimulation, and a “shaky sense of identity”. Then again, this is the same argument that naysayerrs made about the impact tlevision and entreteinment over the past few decades.
  • 4. Useful ways  Relationship building:social networks enable children to meet new friends from distant lands, helping them become more worldly and sensitive to cultural differences. Kids can also stay in touch or reunite with friends from their past who may have moved away.  Identity: children can share their interests with others, join groups, experience a sense of independence etc.  Self-esteem: in correlation wioth identity building, social networks can hepl build self-esteem and boost confidence.
  • 5. PROS AND CONS PROS CONS • They’ll have parental supervision. Parents will have a mmore formalized role in their children’s online activity.  Younger users will be targeted by advertisers just like the rest of us. • Teachers will be able to connect with sudents in elementary school.  Young users may not understand the result of their online actions until it’s too late • This will serve as “training wheels” for younger usesrs who may not be ready to jump into the deep end of social media just yet.  Cyberbullying could be more prevalent • Young users can come out of hiding and stop using accounts with fake names to avoid being found out by parents etc.
  • 6. PREVENTIONS 1. Checking their friends lists, and make sure they know all the people. 2. Check their profile to see which type of information they upload. 3. Showing them all the risks internet and social networks has. 4. Consantly check the information they put, their photos, their profile etc.