 Gain insight into issues associated with the digital revolution  Discuss primary online risks (what they are)  Explore our roles in protecting our.

Slides:



Advertisements
Similar presentations
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
TECHNICOOL A Technology Safety Program © 2011 PCAV.
Keeping Your Child Safe on the Internet
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
Forms of Cyberbullying
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
Cyberbullying.
What to Do About Cyberbullying. What is Cyberbullying? Using tech devices to post things that hurt someone’s feelings or threaten someone.
Cyberbullying Donna Kozica, LCSW Social Work Department Chairperson.
Cyber bullying and internet safety Parents meeting: staying safe online.
CYBERSAFETY Acting Sergeant Kate Brown Christchurch Police Youth Education.
Cyberbullying Not just on the playground anymore… What is it? Where does it happen? Why do we care? What can we do? Alcott Elementary 2010 Laura Lynch.
Cyber Bullying By B Bryant.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
Cyber and Internet Safety El Rodeo School September 11, 2013.
Cyber- Bullying. CYBER-BULLYING Cyber-bullying is being cruel to others by sending or posting harmful materials using cell phone or internet.
Bullying & Cyber Bullying Presented by… Teresa Errickson, SMS Counselor A-L Stephanie Davis, SMS Counselor M-Z.
Cyberbullying Internet Saftey: Information for H.S. Students.
Growing up Digital Opportunities and challenges for parents.
Youth and the Internet Info for Parents. Internet: Strengths and Weaknesses Internet is the free exchange of ideas Little to no regulation on information.
 FOOD, WATER, SLEEP, AIR  SAFETY FROM THREATS AND VIOLENCE  LOVE OF FRIENDS AND FAMILY  RESPECT.
CYBER BULLYING Cody O’Brien. Goals for Today’s Presentation Introduce Cyber bulling Identify forms of cyber bulling Steps to prevent it What to do if.
Awareness raising session for Parents and Carers.
By: Sophia Dermouche & Maheen Khalid
Establishing boundaries where there appear to be none.
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children.
Cyber Bullying: Not Something To Be Ignored A Presentation By Tyler Mulford.
BULLYING It’s Everyone’s Problem. No Student Should Ever Be Bullied.
 Cyber Etiquette and Bullying What Should You Know………… Sophomore Advisory – April 27, 2015.
BULLYING PREVENTION Presented By School Climate Committee.
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
BE AN UP-STANDER NOT A BY-STANDER. Caring We care about others and the world around us. We are committed to having a positive impact on the world. Caring.
Fil Santiago Director of Staff Development and Technology West Orange Public Schools.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
As of 8/31/15 Cyberbullying. Learning Target: I can learn how to protect myself from cyberbullies. Success Criterion: I can identify 3 types of cyberbullying.
Parenting in the Internet Age Tips for Keeping Kids Safe and you Connected to your Teen.
What’s the Big Deal About Bullying?
 FOOD, WATER, SLEEP, AIR  SAFETY FROM THREATS AND VIOLENCE  LOVE OF FRIENDS AND FAMILY  RESPECT.
1. ONLINE. Bullying behaviour is no longer restricted to the school yard. It is often online, out of sight and earshot of teachers and parents.... ONLINE.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
August 24 th 2011 Digital Citizenship. Cell/Smart phones Slates and Tablets Social Network Sites Video Conferencing Online Gaming.
1 CYBER SAFETY.  Online Actions  Offline Consequences  What you type, say, or do online can have a short and/or long-term effect on your life. 2.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Cyberbullying 8/14/2013. Learning Target I can learn how to protect myself from cyberbullies. Success Criterion: – I can identify 3 types of cyberbullying.
Tips for Students 1 Prepared by Tina Dixon School Counselor Geneva High School.
 Form of bullying online  Hatred in texts  Can causes self-harm or suicidal thoughts  Repeated offence  Threats, harassment, humiliation, embarrassment.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Welcome!! CyberBullying SkyCast. CyberBullying Today’s Aims: To create a therapeutic ‘online space’ during the SkyCast! To understand more about cyberbullying:
CYBERBULLYING. What kind of legacy will you choose? Last week we learned through Rachel’s Challenge how one person can have a positive impact on others.
Preventing Bullying Presented by; Pat Pinkham Safety & Loss Control.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
E-safety Helping your children stay safe on-line A presentation for Parents.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
What is it? Spreading rumors and gossip Posting pictures without consent Obtaining a password to assume a person’s identity Harassing or threatening.
PROTECT YOURSELF Cyberbullying. Why do you think people cyberbully? How does your school deal with cyberbullying? Have you ever sent a mean message because.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
GOSSIP and CYBERBULLYING
Dignity for All Students Act (The Dignity Act)
Pics, Flicks, and Sexting
GOSSIP and CYBERBULLYING
Cyberbullying PREPARED FOR STUDENTS OF SHAC ST. JOHN’S COLLEGE.
Bullying, Cyber-Bullying, Internet Safety
Presentation transcript:

 Gain insight into issues associated with the digital revolution  Discuss primary online risks (what they are)  Explore our roles in protecting our kids through appropriate prevention and intervention (what we can do)

 Nearly all young people are online  Teens are multi-media multi-taskers (research, SNS, videos, blogs, content creation, gaming, smart phones)  Most technologically literate generation

Digital Risks: Inappropriate Conduct Inappropriate Contact Inappropriate Content Inappropriate Content

June 27, “An all purpose text-chat-app-gaming-photo sharing-Internet media hub.” How About Talking???

Cell Phones…..

 Using technology with the intent to repeatedly intimidate, harass, annoy, threaten, embarrass or otherwise cause harm  text and images communicated via computer ( , IM, S.N. web-sites, online gaming, chat rooms)  …or via cell-phone (text messages, pics, online) or other device  Aggression/ Abuse

Youth Voice Project, Stan Davis and Charisse Nixon.

 An abusive or threatening text, , IM, or post (words, pics, drawings, videos) (Harassment)  A website set up to mock others (Denigration)  Pretending to be another while posting a message (Impersonation)  Forwarding or posting supposedly private messages, pictures, or video to others (Outing & Trickery)  Intentionally leaving out of conversations(Exclusion)  Spreading rumors (Defamation)

 Lack social skills/close peer relationships-lonely  Have low self-esteem  Are often fearful and intimidated, resulting in lower attendance and lower achievement  Anxious and insecure  Depression  Emotional/Physical Pain Lonely Low self-esteem Afraid and intimidated AnxiousDepressionHumiliation Emotional Pain IMPACT

 Is it easier to be cruel to someone online or in person?  Why?

 “You cant see me” (invisible/anonymous)  “I can’t see you” (no tangible feedback)  Role playing (personas/avatars)  Think that it is not real (no one gets hurt-just drama)  Distance and Dehumanization

 "I always say how bullied I am, but no one listens," he wrote Sept. 9. "What do I have to do so people will listen to me?“  Formspring: "I wouldn't care if you died. No one would. So just do it :) It would make everyone WAY more happier!" "JAMIE IS STUPID, GAY, FAT ANND UGLY. HE MUST DIE!" read one post.

Advice for Victims of Cyber bullying DO NOT reply to messages from cyberbullies Do not erase or delete messages from cyberbullies, keep them as evidence Do not keep this to yourself! Tell an adult you know and trust! Report to Facebook or Youtube, Internet Service Provider (ISP) or cell phone/pager service provider You can also report to police… DO NOT reply to harassing messagesDO NOT reply to harassing messages DO NOT delete harassing messages-DO NOT delete harassing messages- keep them as evidence DO NOT keep this to yourself!DO NOT keep this to yourself! Tell an adult you know and trust! Report to School, Facebook or Youtube, Report to School, Facebook or Youtube, Provider (ISP), or cell phone/pager service provider You can also report to police… You can also report to police…

Support targets Consequences for aggression: inevitable, predictable, escalating Activate bystanders Bullying Prevention Safe and affirming school climate Positive feeling tone and modeling Time spent with young people Counsel bullies Stan Davis © 2001 Schools: Policies, Education, and Interventions

Youth Voice Research Project: Top three adult actions reported by youth as helpful:  Listened to me  Gave me advice  Checked in with me after to see if harassing behavior stopped *Remember that kids often do not report harassment and bullying because they think adults will make it worse (we need to build trust)

 Recognizing and managing emotions  Developing caring and concern for others  Establishing positive relationships  Making responsible decisions  Problem solving  Handling challenging situations  Behaving ETHICALLY-Benefitsv. Consequences *Are we doing this now, and how can we do it better? Are we modeling appropriate behavior?

 Educate  Educate: our children need to be taught how to use technology safely, responsibly, and ethically  This is a shared responsibility  Disinhibition…  What happens in the online world…  Values-treatment of others-Small V. Tall?  P4:Pause and Ponder Prior to Posting!  Miranda Warning!

 Only give your number to those you know and trust  Don’t take/send/possess pics that are sexual in nature  Remember that your texts/pics can be easily forwarded  Everything on your phone can be used against you- digital footprints!  Don’t text and drive!

 Most cyber predators are NOT violent killers, kidnappers, or pedophiles  They are adult male sex offenders (no profile) who are attracted to, and seek out sexual relationships with adolescents (vulnerable)  Many lie about who they are but many do not use deception: are open about wanting sex from victim  Don’t believe the type!

 Check your online persona monthly: search your name; remove anything you do not want posted know and trust all  Do you know and trust all of your online friends? Or are you going for the record? WANT WIDE  Post information and images that you WANT to share with a WIDE audience……  Cyber predators try to find you based on the information that YOU provide!  Watch your privacy settings!

 Establishenforce  Establish and enforce rules (don’t JUST caution them)  Talk to kids: be interested and involved with their tech use-stay Current, Communicate, and Check  Start with parental controls and filters- cell phone providers also have blocking and tracking capabilities-Open DNS  Family AUP/Internet use contract-clearly specify what can and cannot be done online/with cell-phones  Be reasonable-the “hammer” can cut off communications, reduce trust

 reveals-his-greatest-trick-its-actually-kind- of-terrifying- 2?c=upw1&goback=%2Egde_62650_member_