Presentation on theme: "Bullying and Protecting Children in the Virtual World Dan Wilchek Exeter Township School Distirct"— Presentation transcript:
Bullying and Protecting Children in the Virtual World Dan Wilchek Exeter Township School Distirct firstname.lastname@example.org
Exeter Township School District Most important thing
About one-third of online teens (ages 12-17) have been cyberbullied. Girls are more likely to be targeted. Nearly 43% of kids have been bullied online. One in four has had it happen more than once. Nine out of ten middle school students have had their feelings hurt online. Four out of ten middle school students have had their password(s) stolen and changed by a bully who then locked them out of their own account or sent communications posing as them 90% of victims will not inform a parent or trusted adult of their abuse.
Exeter Township School District Bullying/Cyber Bullying Internet Usage and Exposure to inappropriate material Facebook (Online profiles) Texting/Sexting Types of Issues we are going to cover http://www.netsmartz.org/Parents
Exeter Township School District What was the last time you spoke to your kids about these issues?
Exeter Township School District Some ideas to start the conversation. Don’t get discouraged if they don’t respond immediately! Ask positive questions How does your school deal with cyber bullying? What would you do if someone created a mean, fake profile for you or one of your friends? Who would you talk to if it happened to you? Why do you think people cyberbully? Have you ever sent a mean message because you were upset? How was your day? What do you like the most about school? Credit: http://www.netsmartz.org/Parents
Exeter Township School District Flaming and Trolling – sending or posting hostile messages intended to “inflame” the emotions of others Happy-Slapping – recording someone being harassed or bullied in a way that usually involves physical abuse, then posting the video online for public viewing Identity Theft/Impersonation – stealing someone’s password and/or hijacking their online accounts to send or post incriminating or humiliating pictures, videos, or information Photoshopping – doctoring digital images so that the main subject is placed in a compromising or embarrassing situation Physical Threats – sending messages that involve threats to a person’s physical safety Rumor Spreading – spreading gossip through e-mail, text messaging, or social networking sites Credit: http://www.netsmartz.org/Parents Common Forms of Cyberbullying
Exeter Township School District Hope for the best, prepare for the worst
Reveal personal information Encounter inappropriate material Download malicious software Experience Bullying Others may expose kids’ information Kids may: 1. Set clear rules for use of technology 2. Put technology to work
Set clear rules Establish ground rules of how computers, phones and cameras, are to be used and accessed Keep personal information private Have discussions with your child about what they are doing on the internet. Let them know you are available if something happens Be honest about how you are monitoring their use Step 1
What to Use For the Internet? http://netsmartz.org/Parents http://netsmartz.org/Parents (General Overview) Microsoft Family Security http://www.microsoft.com/security/family-safety/default.aspx#Overview http://windows.microsoft.com/en-US/windows-live/essentials-other-programs Other Web Monitoring Tools http://www.cyberpatrol.com/ http://www.netnanny.com/ http://www1.k9webprotection.com/ Step 2 We offer this collection of Internet links as potential resources and make no endorsements or promises about any specific sites.
What to Use for Facebook and Texting? Favebook and online profiles http://www.minormonitor.com/ http://www.uknowkids.com/what-is-uknowkids/http://www.uknowkids.com/what-is-uknowkids/ (Monitor) Texting and Phone http://www.uknowkids.com/what-is-uknowkids/http://www.uknowkids.com/what-is-uknowkids/ (monitor) http://www.securafone.com/home http://www.textplus.com/http://www.textplus.com/ (sends copy of text to parents) http://www.tcaps.net/Parents/OnlineSafety/tabid/67/Default.aspx http://www.noslang.com/ Step 2 We offer this collection of Internet links as potential resources and make no endorsements or promises about any specific sites.
What to Use for Identify Theft Identity Theft http://www.idtheftcenter.org/artman2/publish/v_fact_sheets/Fact_Sh eet_120.shtml http://www.ftc.gov/bcp/edu/microsites/idtheft/ https://www.annualcreditreport.com/cra/index.jsp http://www.lifelock.com/ Virus Protection http://www.microsoft.com/windows/antivirus-partners/windows- 7.aspx http://windows.microsoft.com/en-US/windows/products/security- essentials Step 2 We offer this collection of Internet links as potential resources and make no endorsements or promises about any specific sites.
What to do if there is a problem Teach kids to trust their instincts Don’t curtail privileges Always report physical threats and cyberbullying
Comments? Questions? Contact Information Dan Wilchek 610-898-9550 email@example.com