1 / 34

Washtenaw Area Council For Children

Washtenaw Area Council For Children. Committed to preventing child abuse through educational services to parents, children, community members, as well as youth-serving professionals. Founding Member Washtenaw Cyber Citizenship Coalition. CyberSafety Program.

bkennedy
Télécharger la présentation

Washtenaw Area Council For Children

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Washtenaw Area Council For Children Committed to preventing child abuse through educational services to parents, children, community members, as well as youth-serving professionals. Founding Member Washtenaw Cyber Citizenship Coalition

  2. CyberSafety Program Educates students, parents, youth serving professionals and others in the community on how to keep safe as they used technology to communicate.

  3. Gaming Visiting virtual worlds Creating Socializing Texting Streaming

  4. The Facts 94% of teens are online 75% of teens have cell phones 31% send more than 100 texts per day 80% of teens have gaming systems; 97% play video games 73% of 12- to 17-year olds have at least one social networking profile Kids 8-18 spend more time with media (53 hours a week) than with parents or at school.

  5. 3 C’s • CyberSAFETY • CyberSECURITY • CyberETHICS

  6. CyberSAFETY Everything we do ONLINE is intertwined with our life OFFLINE: -Cyberbullying -Sharing TMI -Posting inappropriate pictures

  7. CyberETHICS Treating others online like YOU would like to be treated: -Posting online can be more hurtful than saying in person -Illegally downloading media is like stealing from a store -Creating unnecessary drama

  8. CyberSECURITY Know how to protect your data -Keep software and virus protection up to date -Set privacy settings -Keep a clean machine

  9. Cyberbullying

  10. Cyberbullying Numbers 60% of middle school students say that they have been bullied, while 16% of staff believe that students are bullied. (www.behavioral-management.com) 58% have not told their parents or an adult about something mean or hurtful that happened to them online. (I-SAFE survey)

  11. Why Cyberbully? The “normal” place to communicate Much easier to say something mean in a text or facebook post Feeling of anonymity Fun/Funny Peer Pressure Inadvertent

  12. What’s The Difference? Bullying At school Face to face Limited Audience CyberBullying Anywhere/ Anytime Anonymous Larger Audience Victim not participant

  13. A cyberbullying victim might: • Stop using computer or cell • Act nervous when receiving email or text • Become abnormally withdrawn • Ditching classes or avoid activities

  14. Pertinent Michigan Laws Michigan law prohibits a person from contacting another individual with the intent to frighten or harass that individual. (up to 1 year, or 5 years if involving a “credible threat of death”) Michigan law also separately prohibits using a computer to communicate with any person for the purpose of stalking. (up to 2 years in prison) A 2001 law criminalizes the posting of personal or embarrassing information about another person without their consent. (up to 2 years in prison)

  15. WHAT CAN YOU DO? Tell the bully to STOP BLOCK the person TELL a trusted adult

  16. But isn’t that Snitching? NO! Whether it happens to you or you witness it, you are NOT alone and you are NOT powerless! Standing up is done to protect you or another person from harm. “Snitching” is done to get someone in trouble.

  17. Online Predators A predator can be anyone online Can be male or female Can be young or old Can look like anyone that you know

  18. Online Predators 54% of teens have communicated online with someone they have not met in person source: Polly Klaas Foundation 25% of victims are boys source: Netsmartz 100% of the children molested by Internet sexual predators went willingly to a meeting, often thinking they were meeting someone else. Source:WiredSafety.org

  19. How do predators “groom”? • Kids they target: • Lonely, want attention, angry at parents, questioning sexuality, want to appear older and more mature • Relate to things kids are saying, build trust, make them angrier with parents • How they find kids: • Chat rooms, Facebook, gaming systems, instant messenger, etc. • Adult predators rarely pose as teens- they are open about intent

  20. Larry Bostwick arranged to meet a 14-year-old girl he met on the internet for sex.

  21. Anthony Stancl

  22. Information Travels

  23. “Sexting” Sending sexually explicit images, videos, and/or language using cell phones or other communication technology

  24. Why? Pressure from a significant other It’s “fun or flirtatious” Responding to content they received (I’ll show you mine if you show me yours) As a “joke”

  25. A teen who has self-produced and distributed sexually explicit images could be charged with prostitution, solicitation, indecent exposure, child pornography. • Knowingly producing – up to 20 years • Knowingly distributing – up to 7 years • Knowingly possessing – up to 4 years • Soliciting a minor (under 16) for immoral purposes – up to 4 years • Whoever took the photo would be charged with “producing”. • Charges can result in jail, probation, and/or listing on Sex Offender Registry Possible Charges

  26. Phillip Alpert

  27. Remember… Don’t let other people convince you to send or post inappropriate pictures People can print, save and share ANYTHING you post, text or type Once you hit SEND, you can never truly delete it

  28. Risky Online Behaviors • Friending unknown people • Posting TMI • Embarrassing or harassing others • Talking about sex • Sending or sharing provocative pictures • Sharing passwords • Clicking on pop-up ads

  29. Unethical Behavior Downloading “free” media content Not only is it stealing, it exposes your computer to viruses and malware Peer to Peer networks (P2P) Exposes computer network to hacking, viruses, theft Plagiarism Presenting work found online as your own

  30. Keep a Clean Machine Keep security software up to date -Ask your parents if they update software regularly Make passwords long and strong -Create a combination that includes numbers, symbols, upper and lower case letters Beware of free WiFi hot spots -They might not be secure and could expose your device to criminals

  31. Offline Consequences

  32. Think Before You Post! Only about half of young people say they have thought about the idea that things they post online could come back to hurt them later. Colleges and employers can (and do) access information, looking at social networking sites and conducting google searches: remember the GRANDMA RULE. There are no secrets on the internet- it is not anonymous, it is not private.

  33. Robin Batten & Julie Perea, CyberSafety Facilitators www.washtenawchildren.org internetsafety@washtenawchildren.org (734) 434-4215

More Related