Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
Online and On Guard: Protecting Image and Relating Safely on the Internet
Annie Lisowski Buffalo County 4-H & Youth Development Educator
Assistant Professor, UW-Extension
Communication is the key! ◦ Parent – Child
◦ Teacher – Student
Journal of Adolescence Research suggests
that young people that engage in unhealthy online relationships experience high levels of parental conflict, depression, and lack of attachment to school
Start a conversation with your students!
Communication is the key!
Generation Gap = Digital Divide
Parents’ & Teacher’s Beliefs:
◦ 87% say they have established rules for their kids Internet use
◦ 54% feel they are limited to monitor and shelter their kids from inappropriate material on the Internet
◦ 69% feel they know a lot about what their kids do on the Internet
◦ 31% have disciplined their child because of their Internet use
Teens’ Reality:
◦ 36% say parents have NOT made rules for their use of the Internet
◦ 41% do NOT share what they do and where they go online with their parents
◦ 29% say their parent would disapprove if they knew what they were doing online
◦ 36% have NOT discussed how to be safe on the Internet with their parent
◦ 22% say the computer they use most often is in their room
◦ 73% say there is a need for kids and teens to learn about Internet safety
Source: iSAFE survey of 55,000 youth nationwide
Again, start a conversation with your students!
Communication is the key!
Online Facts & Stats
• The Teen Internet Safety Survey indicated: • In 2006, 61% of teens had a social networking online profile • In 2007, 71% did
• Pew Internet & American Life Project 2007 surveys indicate:
• 89% of youth who post online receive feedback on their posting • 64% posted photos and videos of themselves • 39% share their artistic creations online • 28% have created their own blog • 33% work on webpages or blogs for others/groups • 9 in 10 prefer texting, instant messaging, and social networking
over email
Online Facts & Stats
• 83% of what youth post online is appropriate material
• However, 84% of those profiles also contain at least one indication of risk-taking behaviors: • Posting personal information (56%)
• Communicating with „strangers‟ (43%)
• Big Buddy/Friends Lists (35%)
• “Flaming” remarks (28%)
Source: Netsmartz 2007 survey
Online Facts & Stats
58% of youth admit to using the Internet unsafely, inappropriately, or illegally
20% have met with someone face to face that they first met online
Socialization Changes: ◦ 20% of teens feel safer in on the Internet than they do in the
“real” world ◦ 37% feel freer in Cyberspace than they do in the physical
world ◦ 25% feel more positive about themselves online than off
◦ Source: iSAFE national study 2004
Online Life is Real Life
What do students do online? ◦ Blogs ◦ Social Networking Sites ◦ Games ◦ Photos and Webcams ◦ Watch Movies and TV shows ◦ Cell phone ◦ IM, Email, Chatting ◦ File Sharing ◦ Research ◦ Shopping
Remind students that what they do online is not anonymous and does have consequences in the “real” world
SNL MySpace Skit
What‟s wrong? ◦ Parents/Teachers should try out social networking sites
◦ No personal information ◦ Predators use shared interests ◦ Screen Names shouldn‟t tell more about you ◦ Nothing revealing or inappropriate ◦ Avatar = A photo is worth a 1,000 words ◦ May not have a way to police, but teens are capable of staying safe online
◦ Staying off the Internet isn‟t the answer
Top Teen Risky Online Behaviors
1. Posting personal information
2. Talking to unknown people
3. Making strangers “friends” or “buddies”
4. Posting rude comments
5. Sending personal information to unknown people
◦ Source: Netsmartz survey 2008
Personal & Private Information
Name Friends‟ Names Age School Name, Colors
or Mascots Town or Nearby
Locations What your doing on
the weekend Likes and Dislikes Personal Opinions Vulnerabilities Photos
Full Name Address Birth date Phone Number Passwords Pin Numbers Email Mother‟s Maiden
Name Social Security
Number Credit Card Numbers
How much is too much?
Online is NOT Private
Who sees your students‟ profile? ◦ Principal
◦ College Admissions Advisor
◦ Employers
◦ Parents
◦ Friends
◦ Future Significant Others
◦ Predators
Why should students care?
Family, friends, parents, teachers, and others you care about will likely check your online life
College admissions officials often check to see what online information they can find on candidates
The same applies to employers you might want to work for in the future
Interested in a career with a public life? Beware what you post!
Profiles & blogs may be viewed by online predators
Some things are only meant to be shared with your special someone
Your online image activity
Students are in the driver’s seat!
Teens control their online image and how much
information is revealed
What can we do?
Build student online-decision making skills
Talk with students about the expectations for online conduct ◦ Make sure that teens understand that the life they
live in the cyberworld is the same life they are responsible for the physical world.
Discuss with teens the implications of a negative online image and „digital footprint‟
Remind teens that when it comes to personal information “think twice before you post.”
Online Relationships
Many types of online relationships ◦ Friendship
◦ Professional / Employers
◦ Romantic
Each type of online relationship develops differently and has different goals, therefore each has both benefits and disadvantages
◦ Ask do the risks ever outweigh the benefits?
Who is a “friend”?
Where Everyone Knows Your Name
Students should know a “friend” is NOT a person: ◦ You first met online
◦ You have only met once
◦ Who is a friend of a friend
◦ Who only “likes” you online
“Think before you post”
I Keep Safe PSA
Cyberbullying ◦ 42% have been bullied online ◦ 53% admit to bullying someone else online
Can feel easier online because there is no need
to look your victim in the eye, but research suggests that this also means it is more emotionally and psychologically destructive
Digital Regret
What can we do?
Teens should ignore the messages, but not the problem. ◦ Ensure teens do not respond to rude and harassing e-mails,
messages, and postings. ◦ Encourage teens to use the “block” or “ban” feature to keep
certain bullies at bay.
Contact the Internet Service Provider Get Law Enforcement Involved Create school bullying policies that directly address
cases of cyber harassment Help teens understand that cyberbullying has lasting
effects for both the bully and the victim. Remind teens that once you put a hurtful message in
to cyberspace: “You can’t take it back.”
“Sexting”
“Sexting” ◦ 1 in 5 girls, 1 in 4 boys “sexts”
◦ What could do this do to students‟ online image?
Beyond a ruined image young people can
also be prosecuted for possession and viewing of child pornography
And, “Sexting” has had even more horrible ramifications…
What can we do?
Make sure they know how easily others can pass on what they receive, and talk to them about how they come across when they send material like this to others.
Make it absolutely clear to students that the moment they send a digital image of themselves they completely lose control of what happens to it next. ◦ Question them about how they might feel if a sexual image of them was sent half way
around the world. ◦ Remember, that while teens are very adept at using technology, they often don‟t
consider the implications of their behavior.
Review rules for online conduct with teens before giving them access to new technologies
Discuss the consequences of violating online expectations – the removal of technology all together should be a final resort
Remind students that the short thrill of sexting is nowhere close to the intensity of the potential consequences
The truth is…
A person‟s chances of being abducted are increased when they have any type of relationship with somebody online
This means you and your students do need to know how to avoid and outsmart internet predators!
The Perfect Victim
Teenager age 11-16
Little parent communication
Access to computer 24-7
Often spends time alone at home or not
Private use of the Internet
Willing to share personal information
Reveals vulnerabilities
Internet Predator Characteristics
Male
Age 25-65
Well-Educated
Married
Kids older than those they seek online
Steady Employment
Varied Computer Expertise
Internet Predator Grooming Process
Most predators will spends months forming a friendship with a person to gain their trust. They take notes and groom their victims.
SITS Grooming Process ◦ Shared Interests
◦ Trust
◦ Secrets
Predators Entice
If anyone: ◦ Talks about inappropriate things
◦ Sends you sexually explicit material
◦ Asks for your personal information
◦ Talks about or wants you to do something that makes you uncomfortable
◦ Wants to meet you in person
They are probably an internet predator who is attempting to groom you!
Internet Predator Warning Signs
If someone tries to: ◦ Isolate you from family and friends
◦ Turn you against your parents or guardians
◦ Make you keep things secret
◦ Send inappropriate material or talk about explicit topics
◦ Threatens you
They are probably an internet predator who is attempting to groom you!