180 likes | 271 Vues
Bullying and Protecting Children in the Virtual World. Dan Wilchek Exeter Township School Distirct djwilchek@exeter.k12.pa.us. Exeter Township School District. Most important thing. 90% of victims will not inform a parent or trusted adult of their abuse.
E N D
Bullying and Protecting Children in the Virtual World Dan Wilchek Exeter Township School Distirct djwilchek@exeter.k12.pa.us
Exeter Township School District Most important thing
90% of victims will not inform a parent or trusted adult of their abuse. Nearly 43% of kids have been bullied online. One in four has had it happen more than once. Nine out of ten middle school students have had their feelings hurt online. Four out of ten middle school students have had their password(s) stolen and changed by a bully who then locked them out of their own account or sent communications posing as them About one-third of online teens (ages 12-17) have been cyberbullied. Girls are more likely to be targeted.
Types of Issues we are going to cover http://www.netsmartz.org/Parents Exeter Township School District • Bullying/Cyber Bullying • Internet Usage and Exposure to inappropriate material • Facebook (Online profiles) • Texting/Sexting
What was the last time you spoke to your kids about these issues? Exeter Township School District
Some ideas to start the conversation. • Ask positive questions • How does your school deal with cyber bullying? • What would you do if someone created a mean, fake profile for you or one of your friends? • Who would you talk to if it happened to you? • Why do you think people cyberbully? • Have you ever sent a mean message because you were upset? • How was your day? • What do you like the most about school? • Credit: http://www.netsmartz.org/Parents Exeter Township School District Don’t get discouraged if they don’t respond immediately!
Common Forms of Cyberbullying Flaming and Trolling – sending or posting hostile messages intended to “inflame” the emotions of others Happy-Slapping – recording someone being harassed or bullied in a way that usually involves physical abuse, then posting the video online for public viewing Identity Theft/Impersonation – stealing someone’s password and/or hijacking their online accounts to send or post incriminating or humiliating pictures, videos, or information Photoshopping – doctoring digital images so that the main subject is placed in a compromising or embarrassing situation Physical Threats – sending messages that involve threats to a person’s physical safety Rumor Spreading – spreading gossip through e-mail, text messaging, or social networking sites Credit: http://www.netsmartz.org/Parents Exeter Township School District
Exeter Township School District Hope for the best, prepare for the worst
Kids may: • Reveal personal information • Encounter inappropriate material • Download malicious software • Experience Bullying • Others may expose kids’ information • 1. Set clear rules for use of technology • 2. Put technology to work
Set clear rules • Establish ground rules of how computers, phones and cameras, are to be used and accessed • Keep personal information private • Have discussions with your child about what they are doing on the internet. Let them know you are available if something happens • Be honest about how you are monitoring their use Step 1
Step 2 Put technology to work
What to Use For the Internet? • http://netsmartz.org/Parents (General Overview) • Microsoft Family Security • http://www.microsoft.com/security/family-safety/default.aspx#Overview • http://windows.microsoft.com/en-US/windows-live/essentials-other-programs • Other Web Monitoring Tools • http://www.cyberpatrol.com/ • http://www.netnanny.com/ • http://www1.k9webprotection.com/ Step 2 We offer this collection of Internet links as potential resources and make no endorsements or promises about any specific sites.
What to Use for Facebook and Texting? • Favebook and online profiles • http://www.minormonitor.com/ • http://www.uknowkids.com/what-is-uknowkids/ (Monitor) • Texting and Phone • http://www.uknowkids.com/what-is-uknowkids/ (monitor) • http://www.securafone.com/home • http://www.textplus.com/ (sends copy of text to parents) • http://www.tcaps.net/Parents/OnlineSafety/tabid/67/Default.aspx • http://www.noslang.com/ Step 2 We offer this collection of Internet links as potential resources and make no endorsements or promises about any specific sites.
What to Use for Identify Theft • Identity Theft • http://www.idtheftcenter.org/artman2/publish/v_fact_sheets/Fact_Sheet_120.shtml • http://www.ftc.gov/bcp/edu/microsites/idtheft/ • https://www.annualcreditreport.com/cra/index.jsp • http://www.lifelock.com/ • Virus Protection • http://www.microsoft.com/windows/antivirus-partners/windows-7.aspx • http://windows.microsoft.com/en-US/windows/products/security-essentials Step 2 We offer this collection of Internet links as potential resources and make no endorsements or promises about any specific sites.
What to do if there is a problem • Teach kids to trust their instincts • Don’t curtail privileges • Always report physical threats and cyberbullying
Comments? Questions? Contact Information Dan Wilchek 610-898-9550 djwilchek@exeter.k12.pa.us