Upload
melodie-black
View
21
Download
0
Embed Size (px)
DESCRIPTION
Cyber bullying and Social Interaction with Technology– How to Talk to Your Child. Tuesday, November 10 Marquette University Restorative Justice Initiative Conference 12:45-1:45pm. Introduction and Welcome. Paul Kaye, School Resource Officer, New Berlin Eisenhower MS & HS - PowerPoint PPT Presentation
Citation preview
1
Cyber bullying and Social Interaction with Technology–
How to Talk to Your Child
Tuesday, November 10Marquette University
Restorative Justice Initiative Conference12:45-1:45pm
2
Introduction and WelcomePaul Kaye,
School Resource Officer,
New Berlin Eisenhower MS & HS
Melissa Thompson,
Principal,
Waukesha West High School
Mary Jane Whitty
Guidance Counselor,
New Berlin Eisenhower HS
3
Statistics you should know…• MySpace recently cancelled 90,000 accounts
• Facebook users are often imposters- how can a “Class of 2009” for a school with a class of 350 have more than 420 members?
• One in 5 youth received a sexual approach or solicitation over the Internet in the past year.
• More than 25% of kids recently polled had sent or received a pornographic picture via cell phone or an email account.
• 71% of teens reported receiving messages online from someone they don’t know
• 45% have been asked for personal information by someone they don’t know
• College admissions counselors AND employers search for kids on social networking sites
4
Sexual Solicitations Online
• 1 in 5 regular internet users have received a sexual solicitation– 2006: 1 in 7
• 97% of the solicitors were met online– 2006: 86% were met online
• 66% of victims of solicitations are female• 65% occurred in Chat Rooms• 92% on a home computer
5
Purpose of our presentation
• Discuss elements of cyber bullying and social interaction to promote understanding
• Identify common emotions, circumstances and after effects when cyber bullying happens or social interaction with technology goes amiss
• Keep kids from being victims, suspects, and defendants
6
Cyber bullying
• Definition
• Examples
• Where it takes place
7
Trends in Child Exploitation• Peer to peer sources
– Napster– BearShare– Morpheous– Kazaa
• Technology– X Box 360
• One on one voice chat• Matchmaking features• Enhanced “friends” list
• Web Cameras• Camera phones
8
Trends in Child Exploitation
• Social Networking Sites– Myspace.com– Facebook.com– Friendster.com– Xanga.com– Livejournal.com– Friendsfusion.com– Prisonpenpals.com
9
Prevention and Investigation• Family
– Computer placement, filters, monitoring software– Discussion and ground rules– Relationship as parent, not friend
• School – Strong, trusting relationships with adults– Process defined for conducting investigation(s)– Accessible by parents and students
• Community– SRO– Cybercrimes or other similar unit
10
Trust BUT VERIFY
• Search your child’s cell phone/computer
• No law gives your minor child a privacy right relative to you– Set clear expectations, so it feels fair
• Myths– “None of this could happen to my child”– “This only happens to the bad kids”
11
Response and Recovery
Ms. Mary Jane Whitty