This presentation was created for students and parents of children from 5th to 8th grade regarding staying safe online on the Internet in general and on social networking sites in particular.
1. Kids & Social Media:
Facing Up to Facebook, Twitter & Beyond –
The Pros & Cons of How Students Use Social Media for
Study, Friendship & Fun
Prepared for Epiphany Parent & Student Seminar.
April 28, 2009
Sandra Fathi Web: www.affectstrategies.com
President, Affect Strategies Blog: www.techaffect.com
sfathi@affectstrategies.com Twitter: @sandrafathi
212 398 9680 LinkedIn, Facebook: Sandra Fathi
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
2. Parents & Educators
Internet & Social Media are the New Reality
» Required Skills for Social Development/Acceptance
» Required Skills for Education & Research
» Required Skills for Job & Career Development
Educate & Arm Yourself with Knowledge
» Investing in Your Child’s Safety
» Investing in Your Child’s Education
» Investing in Your Child’s Future
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
3. Why do kids need the
Internet?
» To Connect
» To Be Social
» Social Planning/Events
» Staying Plugged In
» To Share
» Self-Expression
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
4. Social Networking
Websites
16 years of age:
Friendster Online community connecting friends
14 years of age:
MySpace A Place For Friends
At least 13 years of age & in high school:
Facebook Social Utility that connect people with those around
them
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
5. Social Networking
Websites: 13 Year-olds
Hi 5 Who’s in?
Xanga A weblog community
IMVU Chat with friends in 3D
There Online virtual world
Chamber of Chat Harry Potter online role playing game
Second Life 3D Virtual World
Runescape Online adventure community
Bebo Social network for sharing and entertainment
Gaia Online Virtual community with games, message boards & economy
vSide Virtual music community
Windows Live Spaces Community of friends for sharing and blogging
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
6. Social Networking Sites:
No Age Minimum
Imbee Social Networking designed for Club Penguin Virtual world for kids
kids 8-12 Marapets Virtual pet site with games
Active Worlds 3D virtual world chat and chat community
Boom Bang Chat, make friends and Shining Stars Chatting, naming stars
explore a virtual world and virtual star worlds
Dofus Multi-player online role playing Neopets Virtual world for pets
game Endless Online Role playing games
Awol Chats, games, diary, friends, & Eternal Lands Role playing games
cribs Furcadia Role playing games
Sanriotown Hello Kitty games, Graal Online Role playing games
community, blogs and forums Guild Wars Role playing games
Webkinz Virtual pet community for Hero Online Role playing games
plush pets
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
7. What are some of the
dangers?
»Privacy/Identity Theft
»Cyber-bullying
»Online Predators
»Cybercriminals
»Piracy
»Inappropriate/Sexual Content
»Misleading Content/Propaganda
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
8. Quick Stats
93% of parents say they have established rules for their child’s
Internet activity
37% of students report being given no rules from their parents
on using the Internet
47% of parents feel their ability to monitor and shelter their
children from inappropriate material is limited
95% of parents say they know “some” or “a lot” about where
their children go or what their children do on the Internet
41% of students do not share where they go or what they do on
the Internet with their parents
26% of students believe their parents would be concerned if
they knew what they did on the Internet
I-Safe Statistics (www.isafe.org)
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
9. Quick Stats
58% of students admit to using the Internet unsafely,
inappropriately, or illegally
12% of students have unsupervised Internet access at school
55% of students report having given out personal information
(e.g. name, age, gender, home address) to someone they have
only met online
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
10. Online Predators
» 71% of teens reported receiving messages online from
71%
someone they did not know
» 40% reported they usually reply and begin chatting with
40%
that person
» 18% reported telling an adult about the encounter
18%
» 45% have been asked for personal information by someone
45%
they did not know
» 30% have of teens have considered meetings someone
30%
they have only talked to online
14% HAVE HAD AN ENCOUNTER
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
11. Online Predators Tactics
» Seeks out provocative user names.
» Studies your profile.
» Starts with an innocent IM.
» Asks personal questions, A/S/L.
» Wants you to private chat.
» e-
Asks you for personal info. (Phone number, e -mail address, home address,
etc.)
school name, etc.)
» Wants to be your best friend, boyfriend or girlfriend.
» Starts sexual conversations.
» Is all about keeping secrets.
» Asks for personal photos.
» Wants to send you strange gifts.
» face-to-
Wants to set up a face - to -face meeting.
» Makes threats when you no longer want to chat with him or her.
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
12. Cyber-bullying
» Be strong and stop it early. Don’t stoop to their level and lash back.
» Don’t suffer in silence. Tell an adult. Keep telling people until
someone takes action.
» Don’t open or read messages from cyber bullies.
» Contact your Internet service provider abuse department.
» If the problem continues, alert the local police department.
» Tell your school if it is school related. If your cyber bully attends
your school, contact your teacher or principal.
» Don’t erase the messages. Log all dates and time. Put them in a
folder and hold them as evidence.
» Change your e-mail address or screen name.
» If it’s happening with text messages, change your cell number.
» Take screen shots of your chat room pages.
» Save URLs, e-mail addresses, and profiles of the bully.
» Stay protected—never agree to meet with a bully face to face.
» Block the bully if you are in a chat room or IMing.
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
14. Piracy:
Illegal Downloads
Myth — I cannot be sued for downloading music and movies off
P2P sites. They’ll never catch me.
Fact — True and False. You can’t be sued if you have downloaded
songs that have been put online with the approval of record
labels and—you are violating copyright laws and you run the risk
of being sued.
The Recording Industry Association of America (RIAA) filed
3,000 lawsuits against individuals as of May 2004, and in some
cases sought financial damages of up to $150,000 per
copyrighted song.
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
15. Piracy:
P2P Sites
P2P sites are not illegal, but trading unauthorized music and
movies is. The argument is that P2P sites are not providing
the illegal files —they are only providing a way to share files
with others logged onto the site.
Downloading music and movies without paying on
unsanctioned sites is illegal and can result in criminal
penalties.
There is a good possibility of downloading a virus, creating a
gateway for a hacker to jack your personal stuff or gain
access to files on your hard drive.
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
17. Cyberterrorists/
Cybercriminals
Spam
» Avoid opening e-mails from businesses you don’t know
» Get anti-spam (GMail)
Viruses/Spyware
» Get viruses from opening attachments not e-mails
» Can also get a “Trojan horse” by downloading software and e-
mail attachments
Cyber-criminals (identity theft)
» Never give out credit card info to a site that isn’t “trusted” –
Google tools
» Use PayPal – doesn’t give credit card info to sellers
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
18. Pornography,
Plagiarism &
Propaganda
Pornographic content
» Use parental controls on internet options
» Moderated safe search on Google
» YouTube requires a login for over 18 – has strict policy
against porn
Plagiarism
» Make sure you reference your sources for school reports!
Propaganda
» Many sites won’t be pornographic but not suited for
children.
» Hate sites, false information, lies and rumors
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
19. Personal Information
Obvious: Less Obvious:
Name School Name
Address School Mascot
Age Gaming Identities
Sex Hobbies
Picture Interests
Phone Number Landmarks/Hangouts
Address Team Names
SSN Number
Bank Account
Credit Card
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
20. What is Sexting?
When people take sexually revealing picture of
themselves and send them as text message attachments,
it's called quot;sexting.“
Peoplequot;sextquot; to show off, to entice someone, to show
interest in someone, or to prove commitment. The
problem with that, is that the moment the relationship
ends (and most of them do) someone is in possession of a
highly compromising image that can be easily posted on a
social networking site or sent around via email or text.
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
21. Sexting
Once an image is sent, it can never be retrieved -- youwill
lose control of it. How would you feel if your teachers,
parents, or the entire school saw the picture, because it
happens all the time.
Talk about pressures to send revealing photos. No matter
how big the social pressure is, the potential social
humiliation and consequences will be hundreds of times
worse.
The buck stops with you. If someone sends you a photo,
delete it immediately. If you do send it on, you’re
distributing pornography -- and that’s against the law.
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
22. Sexting Statistics
22% of teen girls and 20% of teen boys have sent nude or
semi-nude photos of themselves
22% of teens admit that technology makes them personally
more forward and aggressive
38% say exchanging sexy content makes dating or hooking up
with others more likely
29% believe those exchanging sexy content are “expected” to
date or hook up
Revealing photos can be resent to a vast audience
Sending a sexual image of a minor or to a minor is illegal
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
33. Blogs & Blogging
» Type of website
» Regular entries/updates
» Usually allows comments/interaction with visitors
» May include text, pictures, video (vlogs), audio (podcasts) etc.
» Types:
» Personal
» Corporate
» News
» Blog Search Engines: Bloglines, BlogScope, Technorati
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
34. Blog On
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
35. Microblogging
» Blogging in short form
» Similar to texting
» Ability to send and receive messages
» Ability to follow and be followed
» Archive information
» Multiple delivery mechanisms
» Conversations and interactivity
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
39. The Basics
Tweet: Message – 140 Characters
Twitter Handle: @sandrafathi
Retweet (RT): Resending a message from
someone else to your followers
Message: Direct message (private) from one
Twitterer to another
Nudge: Prompt someone to Tweet
Hashtag: #eventname Easy search for
events/topic
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
55. Advice for Kids &
Teens
Don’t say you are older than you are
The Internet is a public space
Don’t post embarrassing things or things that could expose you
to danger
Think before you post – the Internet is forever
People aren’t always who they say they are
Protect your privacy
Report harassment, hate speech and inappropriate content
Avoid in-person meetings with people you don’t know in real-life
Think before you post
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
56. Advice for Parents
Start a conversation
Report inappropriate behavior
Talk about Social Networking and the Internet
Remind kids, and teens, to be cautious
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
57. Best Practices I
Kids Need Rules
» Set time and limits for Internet usage
» Keep computer in public space
» Agree on websites
» Check compliance (history, filtering, tools)
Teach Internet Safety
» Offline rules apply online
Reinforce Morality & Ethics Online
» Educate on criminal activity
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
58. Best Practices II
Use Privacy Controls
» Don’t provide personal information
» Be careful about Pictures/Videos
» Set sharing settings
» Respecting others’ privacy
» Don’t use automatic ‘remember’ settings
» Never share passwords
» Don’t meet strangers in person
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
59. Best Practices III
Communicate Responsibly
» Don’t hide behind a screen name
» Block offenders
» Report incidents
» Flag inappropriate content
Be a Skeptic
» View content critically
» Be able to identify reliable sites and verify facts
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009