Download presentation
Presentation is loading. Please wait.
Published byPierce Williamson Modified over 9 years ago
1
Committed to preventing child abuse through educational services to parents, children, community members, as well as youth-serving professionals. Founding Member Washtenaw Cyber Citizenship Coalition
2
Educates students, parents, youth serving professionals and others in the community on how to keep safe as they used technology to communicate.
3
Socializing Texting Creating Gaming Visiting virtual worlds Streaming
4
94% of teens are online 75% of teens have cell phones 31% send more than 100 texts per day 80% of teens have gaming systems; 97% play video games 73% of 12- to 17-year olds have at least one social networking profile Kids 8-18 spend more time with media (53 hours a week) than with parents or at school.
5
CyberSAFETY CyberSECURITY CyberETHICS
6
Everything we do ONLINE is intertwined with our life OFFLINE: -Cyberbullying -Sharing TMI -Posting inappropriate pictures
7
Treating others online like YOU would like to be treated: -Posting online can be more hurtful than saying in person -Illegally downloading media is like stealing from a store -Creating unnecessary drama
8
Know how to protect your data -Keep software and virus protection up to date -Set privacy settings -Keep a clean machine
9
Cyberbullying
10
60% of middle school students say that they have been bullied, while 16% of staff believe that students are bullied. (www.behavioral-management.com) 58% have not told their parents or an adult about something mean or hurtful that happened to them online. (I-SAFE survey)
11
? Why Cyberbully ? The “normal” place to communicate Much easier to say something mean in a text or facebook post Feeling of anonymity Fun/Funny Peer Pressure Inadvertent
12
What’s The Difference? Bullying At school Face to face Limited Audience CyberBullying Anywhere/ Anytime Anonymous Larger Audience Victim not participant
13
Stop using computer or cell Act nervous when receiving email or text Become abnormally withdrawn Ditching classes or avoid activities A cyberbullying victim might:
14
Pertinent Michigan Laws Michigan law prohibits a person from contacting another individual with the intent to frighten or harass that individual. (up to 1 year, or 5 years if involving a “credible threat of death”) Michigan law also separately prohibits using a computer to communicate with any person for the purpose of stalking. (up to 2 years in prison) A 2001 law criminalizes the posting of personal or embarrassing information about another person without their consent. (up to 2 years in prison)
15
Tell the bully to STOP BLOCK the person TELL a trusted adult
16
Whether it happens to you or you witness it, you are NOT alone and you are NOT powerless! Standing up is done to protect you or another person from harm. “Snitching” is done to get someone in trouble.
17
A predator can be anyone online Can be male or female Can be young or old Can look like anyone that you know
18
54% of teens have communicated online with someone they have not met in person source: Polly Klaas Foundation 100% of the children molested by Internet sexual predators went willingly to a meeting, often thinking they were meeting someone else. Source:WiredSafety.org 25% of victims are boys source: Netsmartz
19
Kids they target: ◦ Lonely, want attention, angry at parents, questioning sexuality, want to appear older and more mature Relate to things kids are saying, build trust, make them angrier with parents How they find kids: ◦ Chat rooms, Facebook, gaming systems, instant messenger, etc. Adult predators rarely pose as teens- they are open about intent
20
Larry Bostwick arranged to meet a 14-year-old girl he met on the internet for sex.
22
Information Travels
23
Sending sexually explicit images, videos, and/or language using cell phones or other communication technology “Sexting”
24
Pressure from a significant other It’s “fun or flirtatious” Responding to content they received (I’ll show you mine if you show me yours) As a “joke”
25
A teen who has self-produced and distributed sexually explicit images could be charged with prostitution, solicitation, indecent exposure, child pornography. ◦ Knowingly producing – up to 20 years ◦ Knowingly distributing – up to 7 years ◦ Knowingly possessing – up to 4 years ◦ Soliciting a minor (under 16) for immoral purposes – up to 4 years Whoever took the photo would be charged with “producing”. Charges can result in jail, probation, and/or listing on Sex Offender Registry
28
Remember… Don’t let other people convince you to send or post inappropriate pictures People can print, save and share ANYTHING you post, text or type Once you hit SEND, you can never truly delete it
29
Risky Online Behaviors Friending unknown people Posting TMI Embarrassing or harassing others Talking about sex Sending or sharing provocative pictures Sharing passwords Clicking on pop-up ads
30
Downloading “free” media content Not only is it stealing, it exposes your computer to viruses and malware Unethical Behavior Peer to Peer networks (P2P) Exposes computer network to hacking, viruses, theft Plagiarism Presenting work found online as your own
31
Keep security software up to date -Ask your parents if they update software regularly Keep a Clean Machine Make passwords long and strong - Create a combination that includes numbers, symbols, upper and lower case letters Beware of free WiFi hot spots -They might not be secure and could expose your device to criminals
32
Offline Consequences
33
Only about half of young people say they have thought about the idea that things they post online could come back to hurt them later. Colleges and employers can (and do) access information, looking at social networking sites and conducting google searches: remember the GRANDMA RULE. There are no secrets on the internet- it is not anonymous, it is not private.
34
Robin Batten & Julie Perea, CyberSafety Facilitators www.washtenawchildren.org internetsafety@washtenawchildren.org (734) 434-4215
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.