34
Online and On Guard: Protecting Image and Relating Safely on the Internet Annie Lisowski Buffalo County 4-H & Youth Development Educator Assistant Professor, UW-Extension

Online and On Guard

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Online and On Guard: Protecting Image and Relating Safely on the Internet

Annie Lisowski Buffalo County 4-H & Youth Development Educator

Assistant Professor, UW-Extension

Communication is the key! ◦ Parent – Child

◦ Teacher – Student

Journal of Adolescence Research suggests

that young people that engage in unhealthy online relationships experience high levels of parental conflict, depression, and lack of attachment to school

Start a conversation with your students!

Communication is the key!

Generation Gap = Digital Divide

Parents’ & Teacher’s Beliefs:

◦ 87% say they have established rules for their kids Internet use

◦ 54% feel they are limited to monitor and shelter their kids from inappropriate material on the Internet

◦ 69% feel they know a lot about what their kids do on the Internet

◦ 31% have disciplined their child because of their Internet use

Teens’ Reality:

◦ 36% say parents have NOT made rules for their use of the Internet

◦ 41% do NOT share what they do and where they go online with their parents

◦ 29% say their parent would disapprove if they knew what they were doing online

◦ 36% have NOT discussed how to be safe on the Internet with their parent

◦ 22% say the computer they use most often is in their room

◦ 73% say there is a need for kids and teens to learn about Internet safety

Source: iSAFE survey of 55,000 youth nationwide

Again, start a conversation with your students!

Communication is the key!

“Don’t Stop the Dialogue”

Parent PSA

Think about it this way….

Online Facts & Stats

• The Teen Internet Safety Survey indicated: • In 2006, 61% of teens had a social networking online profile • In 2007, 71% did

• Pew Internet & American Life Project 2007 surveys indicate:

• 89% of youth who post online receive feedback on their posting • 64% posted photos and videos of themselves • 39% share their artistic creations online • 28% have created their own blog • 33% work on webpages or blogs for others/groups • 9 in 10 prefer texting, instant messaging, and social networking

over email

Online Facts & Stats

• 83% of what youth post online is appropriate material

• However, 84% of those profiles also contain at least one indication of risk-taking behaviors: • Posting personal information (56%)

• Communicating with „strangers‟ (43%)

• Big Buddy/Friends Lists (35%)

• “Flaming” remarks (28%)

Source: Netsmartz 2007 survey

Online Facts & Stats

58% of youth admit to using the Internet unsafely, inappropriately, or illegally

20% have met with someone face to face that they first met online

Socialization Changes: ◦ 20% of teens feel safer in on the Internet than they do in the

“real” world ◦ 37% feel freer in Cyberspace than they do in the physical

world ◦ 25% feel more positive about themselves online than off

◦ Source: iSAFE national study 2004

Online Life is Real Life

What do students do online? ◦ Blogs ◦ Social Networking Sites ◦ Games ◦ Photos and Webcams ◦ Watch Movies and TV shows ◦ Cell phone ◦ IM, Email, Chatting ◦ File Sharing ◦ Research ◦ Shopping

Remind students that what they do online is not anonymous and does have consequences in the “real” world

SNL MySpace Skit

What‟s wrong? ◦ Parents/Teachers should try out social networking sites

◦ No personal information ◦ Predators use shared interests ◦ Screen Names shouldn‟t tell more about you ◦ Nothing revealing or inappropriate ◦ Avatar = A photo is worth a 1,000 words ◦ May not have a way to police, but teens are capable of staying safe online

◦ Staying off the Internet isn‟t the answer

Top Teen Risky Online Behaviors

1. Posting personal information

2. Talking to unknown people

3. Making strangers “friends” or “buddies”

4. Posting rude comments

5. Sending personal information to unknown people

◦ Source: Netsmartz survey 2008

Personal & Private Information

Name Friends‟ Names Age School Name, Colors

or Mascots Town or Nearby

Locations What your doing on

the weekend Likes and Dislikes Personal Opinions Vulnerabilities Photos

Full Name Address Birth date Phone Number Passwords Pin Numbers Email Mother‟s Maiden

Name Social Security

Number Credit Card Numbers

How much is too much?

Screen Names

AmIdolfan09

Smith111296

Soccerqueen14

wi1Buffaloman

jackNsue4ever

54629sk8rboi

Online is NOT Private

Who sees your students‟ profile? ◦ Principal

◦ College Admissions Advisor

◦ Employers

◦ Parents

◦ Friends

◦ Future Significant Others

◦ Predators

Why should students care?

Family, friends, parents, teachers, and others you care about will likely check your online life

College admissions officials often check to see what online information they can find on candidates

The same applies to employers you might want to work for in the future

Interested in a career with a public life? Beware what you post!

Profiles & blogs may be viewed by online predators

Some things are only meant to be shared with your special someone

Your online image activity

What does your profile say about you?

Rate Your Online Profile Quiz

Students are in the driver’s seat!

Teens control their online image and how much

information is revealed

What can we do?

Build student online-decision making skills

Talk with students about the expectations for online conduct ◦ Make sure that teens understand that the life they

live in the cyberworld is the same life they are responsible for the physical world.

Discuss with teens the implications of a negative online image and „digital footprint‟

Remind teens that when it comes to personal information “think twice before you post.”

Online Relationships

Many types of online relationships ◦ Friendship

◦ Professional / Employers

◦ Romantic

Each type of online relationship develops differently and has different goals, therefore each has both benefits and disadvantages

◦ Ask do the risks ever outweigh the benefits?

Who is a “friend”?

Where Everyone Knows Your Name

Students should know a “friend” is NOT a person: ◦ You first met online

◦ You have only met once

◦ Who is a friend of a friend

◦ Who only “likes” you online

“Think before you post”

I Keep Safe PSA

Cyberbullying ◦ 42% have been bullied online ◦ 53% admit to bullying someone else online

Can feel easier online because there is no need

to look your victim in the eye, but research suggests that this also means it is more emotionally and psychologically destructive

Digital Regret

What can we do?

Teens should ignore the messages, but not the problem. ◦ Ensure teens do not respond to rude and harassing e-mails,

messages, and postings. ◦ Encourage teens to use the “block” or “ban” feature to keep

certain bullies at bay.

Contact the Internet Service Provider Get Law Enforcement Involved Create school bullying policies that directly address

cases of cyber harassment Help teens understand that cyberbullying has lasting

effects for both the bully and the victim. Remind teens that once you put a hurtful message in

to cyberspace: “You can’t take it back.”

“Sexting”

“Sexting” ◦ 1 in 5 girls, 1 in 4 boys “sexts”

◦ What could do this do to students‟ online image?

Beyond a ruined image young people can

also be prosecuted for possession and viewing of child pornography

And, “Sexting” has had even more horrible ramifications…

What can we do?

Make sure they know how easily others can pass on what they receive, and talk to them about how they come across when they send material like this to others.

Make it absolutely clear to students that the moment they send a digital image of themselves they completely lose control of what happens to it next. ◦ Question them about how they might feel if a sexual image of them was sent half way

around the world. ◦ Remember, that while teens are very adept at using technology, they often don‟t

consider the implications of their behavior.

Review rules for online conduct with teens before giving them access to new technologies

Discuss the consequences of violating online expectations – the removal of technology all together should be a final resort

Remind students that the short thrill of sexting is nowhere close to the intensity of the potential consequences

The truth is…

A person‟s chances of being abducted are increased when they have any type of relationship with somebody online

This means you and your students do need to know how to avoid and outsmart internet predators!

The Perfect Victim

Teenager age 11-16

Little parent communication

Access to computer 24-7

Often spends time alone at home or not

Private use of the Internet

Willing to share personal information

Reveals vulnerabilities

Internet Predator Characteristics

Male

Age 25-65

Well-Educated

Married

Kids older than those they seek online

Steady Employment

Varied Computer Expertise

Internet Predator Grooming Process

Most predators will spends months forming a friendship with a person to gain their trust. They take notes and groom their victims.

SITS Grooming Process ◦ Shared Interests

◦ Trust

◦ Secrets

Predators Entice

If anyone: ◦ Talks about inappropriate things

◦ Sends you sexually explicit material

◦ Asks for your personal information

◦ Talks about or wants you to do something that makes you uncomfortable

◦ Wants to meet you in person

They are probably an internet predator who is attempting to groom you!

Internet Predator Warning Signs

If someone tries to: ◦ Isolate you from family and friends

◦ Turn you against your parents or guardians

◦ Make you keep things secret

◦ Send inappropriate material or talk about explicit topics

◦ Threatens you

They are probably an internet predator who is attempting to groom you!

Remind

Students:

The Internet is

not

anonymous.

Thank you!

Any Questions?

Evaluation