Exploring online safety issues
This presentation is the property of its rightful owner.
Sponsored Links
1 / 64

Exploring Online Safety Issues PowerPoint PPT Presentation


  • 101 Views
  • Uploaded on
  • Presentation posted in: General

Exploring Online Safety Issues. Dr. Steve Broskoske Misericordia University. Outline. Being found online. Internet “lingo”. Sexting . Cyberbullying . Identity theft. Introduction / Background. Internet Usage. According to the U.S. Department of Education:

Download Presentation

Exploring Online Safety Issues

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Exploring online safety issues

Exploring Online Safety Issues

Dr. Steve Broskoske

Misericordia University


Outline

Outline

  • Being found online.

  • Internet “lingo”.

  • Sexting.

  • Cyberbullying.

  • Identity theft.


Introduction background

Introduction / Background


Internet usage

Internet Usage

  • According to the U.S. Department of Education:

    • 23% of nursery school children in the U.S. use the Internet.

    • 32% of kindergartners go online.

    • By high school, 80% of children use the Internet.


Remember children can get online almost anywhere

Remember: Children Can GetOnline Almost Anywhere

  • Home computer, or one at a friend’s home, library, or school.

  • Wireless “hotspots” at coffee shops, bookstores, restaurants.

  • Internet-enabled, video-game systems (compete against and chat with players around the world).

  • Cell phone wireless connections (surf the Web, exchange messages, photographs, and short videos).


Internet safety is needed

Internet Safety Is Needed

  • Threats that affect children:

    • Many of the old threats are still out there.

    • Many threats are updated & enhanced to work on new technology.

    • There are new threats that a few years ago no one could even imagine.


Recipe for trouble

Recipe for Trouble

Curious, sometimes precocious children

Anonymity for users

Teacher and guardian lack of technology knowledge

Technology

Innocence

Ubiquitous communication


What can must we do

What Can/Must We Do?

  • As teachers of children, we must:

    • Educate children on dangers associated with online communication.

    • Monitor children’s behavioral changes.

    • Stay up-to-date with online threats.


Can you be found online

Can You Be Found Online?


Can you be found

Can You Be Found?

  • Imagine that you just have a name and a state.

    • Try to find a phone number and address for this name.

  • Pretend that you only have a phone number.

    • Try locating a name for this person.

Anywho.com


Protect children

Protect Children

  • Place family PC in a public place (vs. in a child’s room).

  • Don’t allow children to be online late at night without your supervision.

  • If something looks strange, there might be something wrong: investigate!

  • Be aware of the “lingo.”


Knowing the lingo

Knowing the “Lingo”


Internet lingo that every teacher must know

Internet “Lingo” that Every Teacher Must Know

  • Children and adults alike use acronyms (text shortcuts) because it saves time and typing (e.g., BRB, TTFN).

  • Acronyms can also be used to conceal messages from teachers and guardians.


Internet lingo a interacting with guardians

MOS

POS

P911

PAL

PAW

PRW

PIR

CD9

KPC

Mom Over Shoulder

Parent Over Shoulder

Parent Alert

Parents Are Listening

Parents Are Watching

Parents Are Watching

Parent In Room

Code 9 (Parents Are Around)

Keeping Parents Clueless

Internet LingoA: Interacting with Guardians


Internet lingo b getting acquainted

MOOS

MOSS

ADR

ASL

RU/18

WYCM

LMIRL

Member(s) Of The Opposite Sex

Member(s) Of The Same Sex

Address

Age/Sex/Location

Are You Over 18?

Will You Call Me?

Let's Meet In Real Life

Internet LingoB: Getting Acquainted


Internet lingo c getting better acquainted

KFY/K4Y

RUH

1174

SorG

GYPO

GNOC

NIFOC

IMEZRU

IWSN

Kiss For You

Are You Horny?

Nude club

Straight or Gay

Get Your Pants Off

Get Naked On Cam

Nude In Front Of The Computer

I Am Easy, Are You?

I Want Sex Now

Internet LingoC: Getting Better Acquainted


Sexting

Sexting


Sexting1

Sexting

  • Sexting (sex and texting) is the act of sending sexually explicit messages or photos electronically, primarily between cell phones.

Children have not changed. Communication opportunities have.


How do teens view sexting

How Do Teens View Sexting?

  • Children (especially teenagers) view sexting as a modern form of flirting, or as a lead-in to sexual activity.

Dating Advice from David Wygant


What children do not realize

What Children Do Not Realize

  • A social danger with sexting is that material can be very easily and widely disseminated, over which the originator has no control.

can result in

widespread dissemination


What children do not realize1

What Children Do Not Realize

  • Sexting can involve them being treated as adults in sexually-based legal situations.

  • Sexting can potentially label them forever as sexual predators.


How serious is sexting

How Serious is Sexting?

  • Child pornography charges were brought against six teenagers (Greensburg,Pennsylvania) in January, 2009 after three girls sent sexually explicit photographs to three male classmates

Our legal system has not yet determined how to treat these cases.


How serious is sexting1

How Serious is Sexting?

  • A teenage boy (Fort Wayne, Indiana) was indicted on felony obscenity charges for allegedly sending a photo of his private parts to several female classmates.

  • Locally: Wyoming County DA threatened to charge 20 Tunkhannock teens with felony charges for circulating nude photos (sexting).


How serious is sexting2

How Serious is Sexting?

  • Two southwest Ohio teenagers were charged with contributing to the delinquency of a minor, a first-degree misdemeanor, for sending or possessing nude photos on their cell phones of two 15-year-old classmates.


How serious is sexting3

How Serious is Sexting?

  • A 17-year-old girl (Castalia, Ohio) allegedly sent nude pictures of herself to her former boyfriend.

  • The two got into a fight, and the pictures started circulating around the high school.

  • The girl was charged with being an “unruly child” based on her juvenile status.


Legal reaction

Legal Reaction

  • Vermont: Introduced a bill in April, 2009 to legalize the consensual exchange of graphic images between two people 13 to 18 years old. Passing along such images to others would remain a crime.


Legal reaction1

Legal Reaction

  • Ohio: Proposed a law that would reduce sexting from a felony to a first degree misdemeanor, and eliminate the possibility of a teenage offender being labeled a sex offender for years.


Legal reaction2

Legal Reaction

  • Utah: Lawmakers lessened the penalty for sexting for someone younger than 18 from a felony to a misdemeanor.


Pennsylvania

Pennsylvania

  • Miller v. Skumanick:

    • DA in Tunkhannock (Skumanick) told parents they could either enlist their kids in an education program or have the teens face felony charges of child pornography.

    • ACLU sued Skumanick on behalf of a girl threatened with prosecution.

    • Third Circuit ruled for the girl, finding that Skumanick was barred from filing charges without evidence that she had engaged in distributing the picture of herself.


Quiz how much do you know

QUIZ:How Much Do You Know?

  • How much do you know about abductions? Let’s take a brief quiz.

  • National Center for Missing & Exploited Children

  • www.missingkids.com


Question abduction survey

QuestionAbduction Survey

  • How old are the most common victims of abduction and exploitation?

    • Five years old.

    • Infants.

    • Teenagers.


Answer abduction survey

AnswerAbduction Survey

  • How old are the most common victims of abduction and exploitation?

    • (c) Teenagers.

  • Teenagers (especially girls 12-19) are the most victimized segment of the U.S. population, victimized at a rate 84% higher than the general public.


Question abduction survey1

QuestionAbduction Survey

  • Who is the most likely individual to abduct your child?

    • Someone they know.

    • Someone they don't know.


Answer abduction survey1

AnswerAbduction Survey

  • Who is the most likely individual to abduct your child?

    • (a) Someone they know.

  • According to U.S. Department of Justice:

    • 354,600 children are kidnapped by a family member.

    • Up to 5,000 are abducted by people who have at least some acquaintance with the child.

    • Random abduction of children by strangers are estimated at 200 in the U.S. each year.


Question abduction survey2

QuestionAbduction Survey

  • What is one of most important things parents can do to help keep your children safer?

    • Have their fingerprints taken by police.

    • Have their photographs taken at least annually.

    • Supervise them and talk to them early and regularly about their safety.


Answer abduction survey2

AnswerAbduction Survey

  • What is one of most important things you can do to help keep your children safer?

    • (c) Supervise them & talk to them.

  • Although it is important to plan for an emergency, nothing is more important than talking with a child and creating an atmosphere in your own home where they feel safe coming to you and confiding information about an uncomfortable experience.


What can we do

What Can We Do?

  • Teachers: Talk to teenage children about the dangers of sexting.

  • Teachers: Teach kids to never post their cell phone number anywhere online.

  • Parents: Create rules about appropriate use of phones. Set limits, including to whom and when they can talk.

  • Parents: Review phone records for any unknown numbers and late-night calls.


Cyberbullying

Cyberbullying


What is cyberbullying

What is Cyberbullying?

Cyberbullying occurs “when the Internet, cell phones, or other devices are used to send or post text or images intended to hurt or embarrass another person.”

National Crime Prevention Council


Cyberbullying1

Cyberbullying

  • Cyberbullying can be simple…

    • Continuing to send e-mail to someone who has said he/she wants no further contact.

  • Or involved…

    • Sending threatening and harassing emails, instant messages, or text messages to the victim.

  • Or even more involved…


Cyberbullying2

Cyberbullying

  • Cyberbullies may:

    • Disclose victims’ personal data.

    • Pose as the victim and post false material.

    • Post rumors or gossip and instigate others to dislike or gang up on the target.

    • Post an edited photo of a victim.


Cyberbullying stats

Cyberbullying Stats

  • A survey of 1,247 (age 14-24) found:

    • 50% have experienced digitally abusive behavior, with older teens aged 18-24 (52% vs. 47%) and females more likely to be targeted (53% vs. 42%)

    • 45% report witnessing people being mean to each other on social networking sites.

AP-MTV survey, (Sept. 2009)


Cyberbullying stats1

Cyberbullying Stats

  • 56% bullied reported they were “very” or “extremely” upset.

  • Bullied are twice as likely to have received treatment from a mental health professional.

  • Bullied are nearly 3 times more likely to consider dropping out of school!

  • Only about half (51%) of respondents reported they have thought the idea that things they post online could come back to hurt them later.

AP-MTV survey, (Sept. 2009)


Cyberbullying stats2

Cyberbullying Stats

  • According to another survey, 58% of respondents have not told their parents or an adult about something mean or hurtful that happened to them online.

  • A Canadian study of middle-schoolers found that 41% did not know the identity of the perpetrators.


Why is cyberbullying effective

Why is Cyberbullying Effective?

  • Cyberbullies can remain anonymous.

  • Cyberbullies do not face their targets. It takes little energy or courage to express hurtful comments using a keyboard.

  • Cell phones are constantly turned on.

Cyberbullying penetrates the walls of a home, traditionally a place where victims could seek refuge from other forms of bullying.


Legal response

Legal Response

  • The California state legislature passed one of the first laws in the country to deal directly with cyberbullying. This law took effect January 1, 2008.

    • The legislation (Assembly Bill 86 2008) gives school administrators the authority to discipline students for bullying others offline or online.


Legal response1

Legal Response

  • Legislation geared at penalizing cyberbullying has been introduced in a number of states.

    • Including New York, Missouri, Rhode Island, and Maryland.

  • At least seven states passed laws against digital harassment.


Legal response2

Legal Response

  • In June, 2008, representatives from California and Missouri proposed federal legislation that would criminalize acts of cyberbullying.

    • The proposed federal law would make it illegal to use electronic means to “coerce, intimidate, harass or cause other substantial emotional distress.”


Harmful effects of cyberbullying

Harmful Effects of Cyberbullying

  • Research has demonstrated that victims:

    • Have lower self-esteem.

    • Exhibit a variety of emotional responses (cyberbullying back, feeling scared, frustrated, or angry).

    • May begin to avoid friends and activities (often the intention of the cyberbully).

  • Some victims become depressed and experience increased suicidal ideas.


Pennsylvania action

Pennsylvania Action

  • Governor Ed Rendell required all schools to put a cyber bullying disciplinary code in place by January, 2009.

  • Attorney General’s office has a training program available for schools.


Harmful effects of cyberbullying1

Harmful Effects of Cyberbullying

  • Megan Meier (13 year-old from Missouri)

    • After opening an account on MySpace, Meier received a message from Lori Drew, who used a fabricated account attributed to a 16-year-old boy, Josh Evans.


Harmful effects of cyberbullying2

Harmful Effects of Cyberbullying

  • After a time, “Josh” said he did not want to talk with her any more because of the gossip he had heard about her, gossip that “everybody knows.”

  • Megan committed suicide.

  • Motive: Retaliation for gossip Megan allegedly spread about Drew’s daughter.


  • Harmful effects of cyberbullying3

    Harmful Effects of Cyberbullying

    • Jessie Logan (18-year-old from Cincinnati)

      • Sexted a nude picture of herself, that was forwarded to nearly everyone in her high school.

      • Jessie’s grades plummeted and she started skipping school.

      • On July 3, 2008, Jessie attended the funeral of a boy who had committed suicide. She went home and killed herself.

    Young people are reluctant to tell an authority figure about cyberbullying.


    Identity theft

    Identity Theft


    Are you at risk for identity theft

    Are You At Risk for Identity Theft?

    • What are you carrying in your wallet?

    • Is your mail safe?

    • Do you shred information before throwing it in the trash?

    • When someone calls on the phone…

      • Name or any personally identifying info.?


    Internet safety

    Internet Safety

    • Federal Trade Commission

    • www.ftc.gov

    • Offers:

      • Explanation in detail.

      • Resources.

      • Great information!


    Questions about ftc video

    Questions about FTC Video

    • How do thieves steal your identity?

    • What can you do to deter identity theft?

    • If you are a victim of identity theft, what do you do?

    • How can you monitor your safe identity?


    Identity theft1

    Identity Theft

    • Identity theft occurs when someone uses your personally identifying information to commit fraud or other crimes.

      • Name.

      • Social Security number.

      • Credit card number.

      • Financial institution information.


    Identity theft2

    Identity Theft

    • Sometimes costs hundreds of dollars and many days to repair damage to your good name and credit record.

      • Denied loans for education, housing or cars because of negative information on their credit reports.

      • In rare cases, people have been arrested for crimes they did not commit.


    How does identity theft occur

    How Does Identity Theft Occur?

    • Old-Fashioned Stealing:

      • Wallets and purses.

      • Mail: bank and credit card statements, pre-approved credit offers, new checks, tax information.

      • Personnel records stolen or employees bribed.

    • Pretexting: Using false pretenses to obtain personal information from financial institutions, telephone companies, and other sources.


    How does identity theft occur1

    How Does Identity Theft Occur?

    • Dumpster Diving: Rummage through trash looking for bills or other paper with your personal information on it.

    • Skimming: Steal credit/debit card numbers by using a special storage device when processing your card.

    • Phishing: Pretend to be financial institutions or companies and send spam or pop-up messages to get you to reveal your personal information.

    • Changing Your Address: Divert your billing statements to another location by completing a change of address form.


    To avoid identity theft

    To Avoid Identity Theft

    • Never give out personally identifying information to anyone (except for authorities and people you trust).

    • Always shred mail that contains your name, address, and other personally identifying information.

    • Protect against spyware.

    • Check your credit report periodically.


    Spyware

    Spyware

    • “Spying” software placed on your PC when you visit Web sites.

    • Sometimes for marketing, sometimes for theft.

    Ad-Aware atLavaSoft.com

    Find Ad-Aware atDownload.com


    Review

    Review

    • Being found online.

    • Internet “lingo”.

    • Sexting.

    • Cyberbullying.

    • Identity theft.


  • Login