Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children.

Slides:



Advertisements
Similar presentations
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
TECHNICOOL A Technology Safety Program © 2011 PCAV.
Keeping Your Child Safe on the Internet
NICOLE STACEY, MSW, LISW-S MENTAL HEALTH SPECIALIST BRUNSWICK HIGH SCHOOL Social Media and Your Teen.
Forms of Cyberbullying
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
Cyberbullying Donna Kozica, LCSW Social Work Department Chairperson.
Internet Safety and Awareness Cyberbullies and Predators Enfield High School Computer Network.
Washburn High School Student “Responsible Use” Guidelines for Electronic Technologies.
Harmless Joke or Cyber-Bullying?
CYBER BULLYING…. What Is Cyber Bullying??? 0 "Cyber bullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed.
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
The Internet is Forever
CYBERBULLYING INFORMATION AND PREVENTION August 2009.
Cyberbullying Internet Saftey: Information for H.S. Students.
Where does bullying occur? OFSTED Report % at school 55% at school 24% at home 24% at home 18% around where children live 18% around where children.
An Internet Safety Presentation for Middle School Adopted from netsmartz with video from netsmartz.org, center for missing & exploited children, and Saturday.
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
 FOOD, WATER, SLEEP, AIR  SAFETY FROM THREATS AND VIOLENCE  LOVE OF FRIENDS AND FAMILY  RESPECT.
Cyberbullying By: Kayla Banks EDF 204 Spring 2015.
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
Internet Safety Part II CyberBullying. Judson Independent School District … strives to provide a safe, positive learning environment for students in our.
Anti-Bullying Presentation September 24 th, 2012.
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
Jennifer Carter RCMS Spring 2012 COWBOY CIRCUIT: Electronic Safety & Your Teen.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
What you should know as parents by Charles McKinley Parents’ Technology Night, 2013, sponsored by your PTSO.
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
Digital Citizenship Texting vs. Sexting Cyberbullying.
Fil Santiago Director of Staff Development and Technology West Orange Public Schools.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Do pictures always give truthful information? Can publishing it be hurtful??
August 24 th 2011 Digital Citizenship. Cell/Smart phones Slates and Tablets Social Network Sites Video Conferencing Online Gaming.
S TOP B ULLYING !. Source:
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
A PARENT’S GUIDE TO CYBER BULLYING BY: SHIRLEY JONES.
CYBER BULLYING CODY KLARMAN. TYPES OF CYBER BULLYING Sending mean messages or threats to a person's account or cell phone Spreading rumors online.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Welcome!! CyberBullying SkyCast. CyberBullying Today’s Aims: To create a therapeutic ‘online space’ during the SkyCast! To understand more about cyberbullying:
Today we are teaching the Millennial Generation!!!!
Miller Middle School Counseling Department Presentation Deedra Grier-Jackson, Professional School Counselor Eundra Brown, Professional School Counselor.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Patti Fowler Internet Safety Education Coordinator SC ICAC Task Force Office of the Attorney General Internet Safety.
What is it? Spreading rumors and gossip Posting pictures without consent Obtaining a password to assume a person’s identity Harassing or threatening.
PROTECT YOURSELF Cyberbullying. Why do you think people cyberbully? How does your school deal with cyberbullying? Have you ever sent a mean message because.
70% were female; 30% were male 86% of offenders were people youth first “met” online 37% of incidents happened in chatrooms 40% in instant messages.
“Doing the Right thing online” Online Safety. Questions How many of you have like to go off by yourself and get on the internet? What do you like to use.
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
Cybersafety 4 Kids: Smart Moves in an Online World.
Danielle Hildebrant  Acceptable Use Policies ◦ document stating the use and limits of the network or internet  Cyberbullying ◦ Bullying that takes.
Cyberbullying.
GOSSIP and CYBERBULLYING
Sexting and Cyber Safety
laws/mississippi Cyberbullying: When does inappropriate online behavior cross the line to cyberbullying, and what can.
Pics, Flicks, and Sexting
Virtual Battles: Cyberbullies
Issues In media studies: Cyberbullying
Digital Citizenship Tech in TUSD.
Bullying and Harassment
Conyers Middle School Advisement Lesson October 20, 2014
Digital Citizenship Tech in TUSD.
Cyberbullying.
GOSSIP and CYBERBULLYING
Digital Citizenship Tech in TUSD.
Cyberbullying and Mental Health Awareness
Presentation transcript:

Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children

Cyberbullies use technology such as , instant messaging, cell phones, and websites to spread rumors and gossip, steal passwords to assume someone else’s identity, post pictures of someone without their consent, and threaten or harass with offensive language. The speed at which information travels online can be frightening, and because most people use aliases, Cyberbullies are hard to track.

 Internet is almost universal among 12-17, rising slightly from 87% in 2004 to 95% by (Pew Internet Research Center 2012)  In November 2006 over 90% of teens used the Internet, but less than half used a social networking site. (Pew Internet Research Center 2012)  As of July 2011 the number of teens (on the Internet) using a social networking site was to 80%.  As of July 2011 the number of teens (on the Internet) using a social networking site was to 80%.  Of that 93% have an account on Facebook. 41% have accounts on multiple sites. (Pew Internet Research Center 2012)

 90% of social media-using teens who have witnessed online cruelty say they have ignored mean behavior on social media; 35% have done this frequently. (Pew Internet Research Center, FOSI, Cable in the Classroom, 2011)  80% say they have defended the victim; 25% have done so frequently  79% have told Cyberbullies to stop being mean and cruel; 20% have done so frequently

Parents, educators, and law enforcement face special challenges when it comes to taking action. Anonymity. By using the Internet, Cyberbullies can choose to remain anonymous. This makes it more difficult to pinpoint the offender. Outside of school hours. Cyberbullying can take place outside of school, which makes it more difficult for school personnel to prevent. Lack of school policies and procedures to handle cyberbullying. School personnel may not have policies in place to guide them in dealing with a cyberbullying incident. Varying law enforcement and prosecution responses. Cyberbullying is not a crime in all areas. This may limit the scope of resources law enforcement can provide when a cyberbullying incident occurs. It also makes it more difficult for law enforcement to take further action to stop the abuse.

 Avoids the computer, cell phone, and other technological devices or appears stressed when receiving an , instant message, or text  Withdraws from family and friends or acts reluctant to attend school and social events  Avoids conversations about computer use  Exhibits signs of low self-esteem including depression and/or fear  Has declining grades  Has poor eating or sleeping habits

Be Involved and Proactive  Only 13% of parents know their child was bothered by something online. (Pew Internet Research Center 2012)  Only 7% of U.S. parents are worried about cyberbullying, even though 33% of teenagers have been victims of cyberbullying (Pew Internet and American Life Survey, 2011)

 In 2011, 18% of children possessing cells phones have received “sexts” (Pew Internet Research Center 2012)  4% of 12 year olds  20% of 16 years old  30% 17 year olds  17% of children who pay for their own phone sent “sext” compared to 3% who’s parent/guardian pays (Pew Internet Research Center 2012)

Privacy Controls  62% of teens most often have their social media profile set to be private. (Pew Internet Research Center 2012)  19% say their profile is partially private and just  17% say their profile is set to public so that everyone can see it.  Teens who have had at least one negative outcome from an experience on a social network site are almost twice as likely as those who have not had a bad experience to say that their profile is public, 23% vs. 12%. (Pew Internet Research Center 2012)

 If your child receives harassing s, have them delete their current account and open a new one. This new address should only be given to a few people who can be trusted with it.  If your child is receiving harassing messages through instant messaging (IM), help them use the “block” or “ban” feature. This feature can be used to block specific people from being able to communicate with your child.  If you have found that a cyberbully has set up a website to defame or mock your child, contact your ISP or the site administrator immediately. If necessary, inform law enforcement to try to get that website removed.  Get your child’s school involved. Learn about the school’s cyberbullying policy and urge the administrators to take a stance against all forms of bullying.

 Contact your Internet service provider (ISP) or the website where the abuse is occurring.  Talk to your children about the possible consequences of sending inappropriate pictures to anyone. Check your home computer and your child's cell phone for any pictures that can be misconstrued if seen by others.  Talk to your children about the possible consequences of sending inappropriate pictures to anyone. Check your home computer and your child's cell phone for any pictures that can be misconstrued if seen by others.  Contact the CyberTipline if you find that sexually explicit pictures of your child are being circulated.  Call law enforcement if necessary. NOVA ICAC

Copyright © 2012 The National Center for Missing & Exploited Children®. All rights reserved.