Technology: Things Parents Should Know Diane W. Doersch Neenah Joint School District
Agenda Why do WE need to know? Topics we will cover: Social Networking Internet Predators Cyberbullying Sexting Copyright Infringement Things you can do Questions/Discussion http://www.apsva.us/156320102410943543/lib/156320102410943543/internet_safety_check.gif
Why? The number of children using the Internet has grown 24% in the past 4 years.  Pew Research on Teens and Internet use 87% of teens between 12-17 are now online.  Pew Research on Teens and Internet use 1 in 5 children are sexually solicited or approached over the Internet in a one-year period of time.  Online Victimization: A Report on the Nation's Youth Kids know a heck of a lot more than us!
Social Media The Social Media Revolution http://www.youtube.com/watch?v=JAWfSuiQask&feature=player_embedded
Facebook Facebook is a global social networking website that is operated and privately owned by Facebook, Inc. Users can add friends and send them messages, and update their personal profiles to notify friends about themselves.  Users can join networks organized by city, workplace, school, and region.  The website's name stems from the colloquial name of books given at the start of the academic year by university administrations with the intention of helping students get to know each other better. http://en.wikipedia.org/wiki/Main_Page
The Guts THE LOGIN SCREEN
A Page
Security
Be Pro-Active Ask to see your child’s Facebook page Set up your own page and be their friend Urge your child to only friend people they know F2F Set security settings together Warn your child about posting pictures and that pictures on the Internet never really go away Remind your child that what they write is a reflection on them http://ilearntechnology.com/wordpress/wp-content/uploads/2008/01/bunny.png
Internet Safety Predator http://www.aroundhawaii.com/entertainment/streaming_media/i-safe-video-cyber-predator.html The Christina Long Story http://www.wbrschools.net/technology/isafe/parent/PARENT.wmv http://christina-long.memory-of.com/photos.aspx http://www.isafe.org /
The M.O. of a Predator Ultimate goal: To meet the child in person Chat online Gain trust Have telephone conversations Promise gifts Tell the child they will report them to their parents Desensitize child http://wwwimage.cbsnews.com/images/2002/09/25/image523245g.jpg http://www.isafe.org /
About the Offender Knows how to listen to children Has access to technology Searches out children who need somebody Knows the law http://www.isafe.org /
Be Pro-Active Talk with your child about their online friends Ask to see their online pages Review basic online safety procedures Limit your child’s time on the computer or other electronic devices Keep computers in public places of the house Be vigilant http://ilearntechnology.com/wordpress/wp-content/uploads/2008/01/bunny.png
Cyberbullying What it is: http://www.stopcyberbullying.org / "Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. It has to have a minor on both sides, or at least have been instigated by a minor against another minor. Once adults become involved, it is plain and simple cyber-harassment or cyberstalking. Adult cyber-harassment or cyberstalking is NEVER called cyberbullying.
The Impact Childnet International http://www. youtube .com/watch? v=fNumIY9D7uY & feature=fvst
How are teens cyberbullied? Being a victim of cyberbullying can be a common and painful experience.  Some youth who cyberbully: Pretend they are other people online to trick others Spread lies and rumors about victims Trick people into revealing personal information Send or forward mean text messages Post pictures of victims without their consent http://www.ncpc.org/cyberbullying
Why? When teens were asked why they think others cyberbully, 81 percent said that cyberbullies think it’s funny.  Other teens believe that youth who cyberbully Don’t think it’s a big deal Don’t think about the consequences Are encouraged by friends Think everybody cyberbullies Think they won’t get caught http://www.ncpc.org/cyberbullying
How do victims react? Contrary to what cyberbullies may believe, cyberbullying is a big deal, and can cause a variety of reactions in teens.  Some teens have reacted in positive ways to try to prevent cyberbullying by Blocking communication with the cyberbully Deleting messages without reading them Talking to a friend about the bullying Reporting the problem to an Internet service provider or website moderator http://www.ncpc.org/cyberbullying
More reactions Many youth experience a variety of emotions when they are cyberbullied. Youth who are cyberbullied report feeling angry, hurt, embarrassed, or scared.  These emotions can cause victims to react in ways such as: Seeking revenge on the bully Avoiding friends and activities Cyberbullying back Some teens feel threatened because they may not know who is cyberbullying them. Although cyberbullies may think they are anonymous, they can be found. If you are cyberbullied or harassed and need help, save all communication with the cyberbully and talk to a parent, teacher, law enforcement officer, or other adult you trust. http://www.ncpc.org/cyberbullying
The Megan Meier Story ABC News Story http://www.youtube.com/watch?v=F7WllPVA-A4
Be Pro-Active Tell your child: Refuse to pass along cyberbullying messages Tell friends to stop cyberbullying Block communication with cyberbullies Report cyberbullying to a trusted adult http://ilearntechnology.com/wordpress/wp-content/uploads/2008/01/bunny.png
File swapping and copyright Breaking the law:  File swapping is when kids share music, movies, games, software, or pictures using peer-to-peer (P2P) software like Limewire or Kazaa. http://blog.recordunion.com/dogblog/wp-content/uploads/2008/12/shutterstock_34744872.jpg
The Downside Using P2P client software allows your computer to act as a server.  Other clients could have access to your personal records. You are more susceptible to viruses Spyware may be installed which allows a company to track your computer use. That information is sold to other companies. http://www.voipcentral.org/entry/pc-hacking-though-voip-is-possible/
Costly Consequences Brianna Lahara, a 12 year old student from Los Angeles Put 1,000 of her songs out on the Internet using Kazaa Fined $2,000 by Recording Industry Association of America (RIAA) Lesson: You are not anonymous when you download or share music illegally http://newsimg.bbc.co.uk/media/images/44991000/jpg/_44991151_brianna_ap_226b.jpg http://www.cnn.com/2003/TECH/internet/09/09/music.swap.settlement/
Be Pro-Active Check your computer to see if you have programs like Kazaa, Limewire, or Gnuetella on it.  Inform your student about copyright laws Steer your child to sites that have many legal online resources http://www.respectcopyrights.org / http://ilearntechnology.com/wordpress/wp-content/uploads/2008/01/bunny.png
“Sexting” -  2009 poll by teenage research unlimited 80% of teens 13-17 and 93% of young adults 18-24 use cell phones. 48% of teens had been sexting. 22% admit to forwarding Sending nude or semi-nude pictures via cell phone. http://www.wcax.com/global/video.asp?clipId=3302555&autostart=true http://plethoratech.blogspot.com/2009/03/more-consequences-of-sexting.html
Long-term effects Consequences: Kicked off sports teams Can get charged with transmission of pornography, possessing pornography Halt their future plans for higher education Sued for defamation of character Might end up in jail or registered sex offender http://www.sharkscage.com/kp/brig.htm
Be Pro-Active http://www.education.com/magazine/article/child-sexting-parents/ Communication is key Be real about the risks Emphasize empathy Teach 21st Century Responsibility http://ilearntechnology.com/wordpress/wp-content/uploads/2008/01/bunny.png
Remember: You’re the parent Questions/Discussion http://www.flickr.com/photos/quinnanya/2729732389/
Resources Diane W. Doersch - Instructional Technology Leader [email_address] neenah.k12.wi.us/~ddoersch

Top Things Parents Should Know About Their Child and Technology

  • 1.
    Technology: Things ParentsShould Know Diane W. Doersch Neenah Joint School District
  • 2.
    Agenda Why doWE need to know? Topics we will cover: Social Networking Internet Predators Cyberbullying Sexting Copyright Infringement Things you can do Questions/Discussion http://www.apsva.us/156320102410943543/lib/156320102410943543/internet_safety_check.gif
  • 3.
    Why? The numberof children using the Internet has grown 24% in the past 4 years. Pew Research on Teens and Internet use 87% of teens between 12-17 are now online. Pew Research on Teens and Internet use 1 in 5 children are sexually solicited or approached over the Internet in a one-year period of time. Online Victimization: A Report on the Nation's Youth Kids know a heck of a lot more than us!
  • 4.
    Social Media TheSocial Media Revolution http://www.youtube.com/watch?v=JAWfSuiQask&feature=player_embedded
  • 5.
    Facebook Facebook isa global social networking website that is operated and privately owned by Facebook, Inc. Users can add friends and send them messages, and update their personal profiles to notify friends about themselves. Users can join networks organized by city, workplace, school, and region. The website's name stems from the colloquial name of books given at the start of the academic year by university administrations with the intention of helping students get to know each other better. http://en.wikipedia.org/wiki/Main_Page
  • 6.
    The Guts THELOGIN SCREEN
  • 7.
  • 8.
  • 9.
    Be Pro-Active Askto see your child’s Facebook page Set up your own page and be their friend Urge your child to only friend people they know F2F Set security settings together Warn your child about posting pictures and that pictures on the Internet never really go away Remind your child that what they write is a reflection on them http://ilearntechnology.com/wordpress/wp-content/uploads/2008/01/bunny.png
  • 10.
    Internet Safety Predatorhttp://www.aroundhawaii.com/entertainment/streaming_media/i-safe-video-cyber-predator.html The Christina Long Story http://www.wbrschools.net/technology/isafe/parent/PARENT.wmv http://christina-long.memory-of.com/photos.aspx http://www.isafe.org /
  • 11.
    The M.O. ofa Predator Ultimate goal: To meet the child in person Chat online Gain trust Have telephone conversations Promise gifts Tell the child they will report them to their parents Desensitize child http://wwwimage.cbsnews.com/images/2002/09/25/image523245g.jpg http://www.isafe.org /
  • 12.
    About the OffenderKnows how to listen to children Has access to technology Searches out children who need somebody Knows the law http://www.isafe.org /
  • 13.
    Be Pro-Active Talkwith your child about their online friends Ask to see their online pages Review basic online safety procedures Limit your child’s time on the computer or other electronic devices Keep computers in public places of the house Be vigilant http://ilearntechnology.com/wordpress/wp-content/uploads/2008/01/bunny.png
  • 14.
    Cyberbullying What itis: http://www.stopcyberbullying.org / "Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. It has to have a minor on both sides, or at least have been instigated by a minor against another minor. Once adults become involved, it is plain and simple cyber-harassment or cyberstalking. Adult cyber-harassment or cyberstalking is NEVER called cyberbullying.
  • 15.
    The Impact ChildnetInternational http://www. youtube .com/watch? v=fNumIY9D7uY & feature=fvst
  • 16.
    How are teenscyberbullied? Being a victim of cyberbullying can be a common and painful experience. Some youth who cyberbully: Pretend they are other people online to trick others Spread lies and rumors about victims Trick people into revealing personal information Send or forward mean text messages Post pictures of victims without their consent http://www.ncpc.org/cyberbullying
  • 17.
    Why? When teenswere asked why they think others cyberbully, 81 percent said that cyberbullies think it’s funny. Other teens believe that youth who cyberbully Don’t think it’s a big deal Don’t think about the consequences Are encouraged by friends Think everybody cyberbullies Think they won’t get caught http://www.ncpc.org/cyberbullying
  • 18.
    How do victimsreact? Contrary to what cyberbullies may believe, cyberbullying is a big deal, and can cause a variety of reactions in teens. Some teens have reacted in positive ways to try to prevent cyberbullying by Blocking communication with the cyberbully Deleting messages without reading them Talking to a friend about the bullying Reporting the problem to an Internet service provider or website moderator http://www.ncpc.org/cyberbullying
  • 19.
    More reactions Manyyouth experience a variety of emotions when they are cyberbullied. Youth who are cyberbullied report feeling angry, hurt, embarrassed, or scared. These emotions can cause victims to react in ways such as: Seeking revenge on the bully Avoiding friends and activities Cyberbullying back Some teens feel threatened because they may not know who is cyberbullying them. Although cyberbullies may think they are anonymous, they can be found. If you are cyberbullied or harassed and need help, save all communication with the cyberbully and talk to a parent, teacher, law enforcement officer, or other adult you trust. http://www.ncpc.org/cyberbullying
  • 20.
    The Megan MeierStory ABC News Story http://www.youtube.com/watch?v=F7WllPVA-A4
  • 21.
    Be Pro-Active Tellyour child: Refuse to pass along cyberbullying messages Tell friends to stop cyberbullying Block communication with cyberbullies Report cyberbullying to a trusted adult http://ilearntechnology.com/wordpress/wp-content/uploads/2008/01/bunny.png
  • 22.
    File swapping andcopyright Breaking the law: File swapping is when kids share music, movies, games, software, or pictures using peer-to-peer (P2P) software like Limewire or Kazaa. http://blog.recordunion.com/dogblog/wp-content/uploads/2008/12/shutterstock_34744872.jpg
  • 23.
    The Downside UsingP2P client software allows your computer to act as a server. Other clients could have access to your personal records. You are more susceptible to viruses Spyware may be installed which allows a company to track your computer use. That information is sold to other companies. http://www.voipcentral.org/entry/pc-hacking-though-voip-is-possible/
  • 24.
    Costly Consequences BriannaLahara, a 12 year old student from Los Angeles Put 1,000 of her songs out on the Internet using Kazaa Fined $2,000 by Recording Industry Association of America (RIAA) Lesson: You are not anonymous when you download or share music illegally http://newsimg.bbc.co.uk/media/images/44991000/jpg/_44991151_brianna_ap_226b.jpg http://www.cnn.com/2003/TECH/internet/09/09/music.swap.settlement/
  • 25.
    Be Pro-Active Checkyour computer to see if you have programs like Kazaa, Limewire, or Gnuetella on it. Inform your student about copyright laws Steer your child to sites that have many legal online resources http://www.respectcopyrights.org / http://ilearntechnology.com/wordpress/wp-content/uploads/2008/01/bunny.png
  • 26.
    “Sexting” - 2009 poll by teenage research unlimited 80% of teens 13-17 and 93% of young adults 18-24 use cell phones. 48% of teens had been sexting. 22% admit to forwarding Sending nude or semi-nude pictures via cell phone. http://www.wcax.com/global/video.asp?clipId=3302555&autostart=true http://plethoratech.blogspot.com/2009/03/more-consequences-of-sexting.html
  • 27.
    Long-term effects Consequences:Kicked off sports teams Can get charged with transmission of pornography, possessing pornography Halt their future plans for higher education Sued for defamation of character Might end up in jail or registered sex offender http://www.sharkscage.com/kp/brig.htm
  • 28.
    Be Pro-Active http://www.education.com/magazine/article/child-sexting-parents/Communication is key Be real about the risks Emphasize empathy Teach 21st Century Responsibility http://ilearntechnology.com/wordpress/wp-content/uploads/2008/01/bunny.png
  • 29.
    Remember: You’re theparent Questions/Discussion http://www.flickr.com/photos/quinnanya/2729732389/
  • 30.
    Resources Diane W.Doersch - Instructional Technology Leader [email_address] neenah.k12.wi.us/~ddoersch