Presentation is loading. Please wait.

Presentation is loading. Please wait.

Soccer in a digital world An overview US Youth Soccer Risk Management Committee.

Similar presentations

Presentation on theme: "Soccer in a digital world An overview US Youth Soccer Risk Management Committee."— Presentation transcript:


2 Soccer in a digital world An overview US Youth Soccer Risk Management Committee

3 Meeting Purpose to: Inform you Educate you to run your States, Leagues & Clubs in the DIGITAL WORLD

4 Different Channels to Monitor: Websites Online chat Email Blog sites Social networking Mobile text messaging

5 Who is Online? 71% of American adults go online 93% of American teens ages 12 to 17 use the internet 87% of all parents are online 73% of all families have broadband @ home 68% of online Americans have home broadband 7% of teens do not use the internet

6 Club/Team Websites Technology exists for almost any team to create its own website. –Create using website design templates or packaged software (eteamz, school, business or privately sponsored sites). The Risks? –Many of these team web sites can be used by those who would prey on our children to identify, single out, and make contact with a victim – whether at home or during soccer events.

7 Example: Too Much Info 10/2/2007 - Important information There will not be practice tomorrow (Wednesday). Thursday is a game in Novi. The game begins at 5:30pm. Please have your daughter there between 4:15pm and 4:30pm. They are wearing the black uniform. There may be practice on Friday depending on how Thursday goes. If you have not paid your August payment, please so immediately, the next statements are coming soon! (Game/Practice sites were listed in another area on the site) 9/29/2007 - Practice on Sunday!!!!! Congratulations on the convincing win over Brighton! Also, if Ashley use to text your daughter changes in the schedules, please have her resend Ashley her number. Her phone died and we were unable to retrieve the numbers. Ashley's cell is 888-555-1234. Please e-mail me to let me know you received this, if there is someone you know that may not check their e-mail, please let them know.

8 Example: Just a Name A unique name from a roster and a quick search: Her first, last name, and approximate age based on her team. Her jersey number and a team photo with her image. By Googling her name, a press photo was found on an unrelated article which confirmed which player she was in the team photo. Her parents first name, last name, and place of employment. Her school, teacher's name, and school address and schedule. A phone number to contact her mother. A photo of her father and her mother from the father's Facebook website.

9 How do kids communicate? It’s a new language And, it’s spoken in many places including chat rooms, text messaging & instant messaging by cell phones and computers


11 Email Communication Most email accounts aren't specifically designed for children. Email accounts allow anyone to send your child an email at any time – whether it’s spam (unsolicited commercial email) or communication by unknown parties – potential pedophiles.

12 Email Communication Parents have a responsibility to monitor kids’ emails to assure no inappropriate communication occurs. There are known communications between coaches and players that were deemed “too friendly”. Be aware!

13 Email Help by Legislation KIDS 2008 –Keeping the Internet Devoid of Sexual Predators Act of 2008 or the KIDS Act of 2008 - Directs the Attorney General to: –(1) require sex offenders to provide to the National Sex Offender Registry all Internet identifiers (i.e., email addresses and other designations used for self-identification or routing in Internet communication or posting) used by such offenders; –(2) specify requirements for keeping Internet identifier information current; –(3) exempt Internet identifiers provided by a sex offender from public disclosure; and –(4) establish procedures to notify sex offenders of changes in requirements for providing Internet identifier information. –

14 Blog Sites A Blog 1 Site is a Website, usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video. 1 –Blog. (2009, January 6). In Wikipedia, The Free Encyclopedia. Retrieved 03:39, January 6, 2009, from

15 Social Networking A social network 2 is a social structure made of nodes --generally individuals or organizations-- that are tied by subjects such as values, visions, ideas, financial exchange, friendship, kinship, dislike, conflict or trade. “Soccer” could be a subject tying a network together. 2 –Social network. (2009, January 4). In Wikipedia, The Free Encyclopedia. Retrieved 03:37, January 6, 2009, from

16 Social Networking Some familiar social networking sites: –MySpace –Facebook –Twitter –YouTube

17 Some thoughts to consider The focus of concerns over social networking sites has so far focused on incidents where online predators have used the sites to "groom" potential child victims for abuse. "It is much easier to be deceived or trashed on the Internet. Things spread a lot quicker online than off. The anonymity of the Web makes other people feel less inhibited about posting videos Online friendships can offer a false sense of security 1/1226228704295630.xml&coll=3&thispage=1

18 Example from Facebook: Online friendships can offer a false sense of security 1/1226228704295630.xml&coll=3&thispage=1 ODP sucked a**, it's nothing but full of stuck up b******. And they can't handle when someone better comes along and takes their best friends spot on the team...

19 Concerns in Online Safety Sphere Inappropriate contact –Strangers –Bullies Inappropriate content –Exposure –Prevention courtesy of Richie Diesterheft

20 Cyber-Bullying Cyber-bullying refers to the new, growing practice of using technology to harass, or bully, someone else. Bullies are no longer restricted to methods such as physical intimidation, postal mail, or the telephone. Now, developments in electronic media offer forums such as email, instant messaging, web pages, and digital photos to add to the arsenal. Computers, cell phones, and PDAs are new tools that can be applied to an old practice. Cyber Security Tip ST06-005 Dealing with Cyberbullies

21 Cyber-Bullying Forms of cyber-bullying can range in severity from cruel or embarrassing rumors to threats, harassment, or stalking. It can affect any age group; however, teenagers and young adults are common victims, and cyberbullying is a growing problem in schools. One third of US online teenagers have been victims of cyber-bullying according to research by the Pew Internet Project. Cyber Security Tip ST06-005 Dealing with Cyberbullies

22 Cyber-Bullying The most common complaint from teens was about private information being shared rather than direct threats. Girls were more likely than boys to be targets and teens who share their identities online are the most vulnerable, the survey found. But, teenagers still think that the majority of bullying happens offline.

23 Cyber-Bullying Statistics Some 32% of teenagers questioned had experienced one of more of the following: Cyber-bullying gathers pace in US ; June 28, 2007 15% of teens reported having private material (IM, txt, email) forwarded without permission 13% had received threatening message 13% said someone had spread a rumor about them online 6% had someone post an embarrassing picture of them online without permission

24 24 Contact – Bullies Girls, particularly older girls, report more online bullying; 38% of all online girls reported experiencing some type of online bullying Social network users are also more likely to report online bullying – 39% of SNS users have experienced it. But most teens (67%) think bullying happens more OFFLINE

25 How to protect yourself Be careful where you post personal information - Limit the number of people who have access to your contact information or details about your interests, habits, or employment. Reduce your exposure to bullies. Avoid escalating the situation - Responding with hostility is likely to provoke a bully. Consider ignoring the issue. If you change your account and continue to get messages, you may have a stronger case for legal action.

26 How to protect yourself Document the activity - Keep a record of any online activity (emails, web pages, instant messages, etc.), including relevant dates and times. In addition to archiving an electronic version, consider printing a copy. Report cyber-bullying to the appropriate authorities - If you are being harassed or threatened, report the activity to the local authorities.

27 Contact - Strangers 32% of online teens have been contacted online by a complete stranger. Of teens who have been contacted, 23% say they were made scared or uncomfortable by the stranger contact. Overall, 7% of online teens experienced disturbing stranger contact. Definition of “complete stranger:” “…[someone] who has no connection at all to you or any of your friends.”

28 Contact – Strangers Factors that predict a greater likelihood of online contact –Posting photos (49%) –Having a profile online (44%) –Female (39%) –Flirting via social networks (53%) Factors that predict a greater likelihood of scary or uncomfortable online contact –Female (11% vs. 4% of males)

29 Contact -- Strangers No association between stranger contact and any other content posted to online profiles Social network users more likely to have been contacted by strangers, but not more likely to find that contact scary or uncomfortable Having internet monitoring software (but not filters) is correlated with lower reported levels of contact by someone unknown to the teen or his/her friends.

30 December 6, 200730 Contact – Strangers How did teens respond to stranger contact? –Of teens who were contacted by a stranger: 65% just ignored it or deleted it 21% responded so they could find out more about the person 8% responded and asked to be left alone 3% told an adult or someone in authority

31 Content – Access 42% of online youth 10-17 have been exposed to online pornography (Wolak et al, 2007) Some steps families take: –74% of families have their computers in a public location –65% of parents say they check up on their teens after they go online –53% of families filter –45% of families have monitoring software on the computer that their child uses

32 Content – Access Parents more likely to report rules around content viewed rather than time spent with media –Content rules: 77% of parents have rules about what TV shows their child can watch 68% of parents have rules about what internet sites their child can or cannot visit 67% of parents have rules about video games their child can play

33 Content – Access More than half of parents have rules for time spent with media in the home –58% have rules about how much time their child can spend watching TV –58% have rules about how much time their child can spend playing video games (rises to 64% of households w/gamers) –55% have rules about how much time their child can spend online

34 Content – Access Parents also have rules about information that may be shared online –68% of parents of online teens say that they have rules about what kind of information their child may share over the internet Only 7% of parents have no rules about media use at all

35 FBI’s Kids Internet Safety Tips Never to give out personal information such as name, home address, school name, or phone number in a chat room or on bulletin boards. Never send a picture of themselves to someone they chat with on the computer without their parent's permission. Never write to someone who has made them feel uncomfortable or scared.

36 FBI’s Kids Internet Safety Tips Do not meet someone or have them visit them without the permission of their parents. Tell their parents right away if they read anything on the Internet that makes them feel uncomfortable. People online may not be who they say they are. Someone who says that "she" is a "12-year-old girl" could really be an older man.

37 What is cyber security? It seems that everything relies on computers and the Internet now — communication (email, cell phones), entertainment (digital cable, mp3s), transportation (car engine systems, airplane navigation), shopping (online stores, credit cards), medicine (equipment, medical records), and the list goes on. How much of your daily life relies on computers? How much of your personal information is stored either on your own computer or on someone else's system? Cyber security involves protecting that information by preventing, detecting, and responding to attacks.

38 Are you really safe..? On Facebook, for instance, applications can only be downloaded if a user checks a box allowing its developers to "know who I am and access my information," which means everything on a profile, except contact info. Given little thought, agreeing to the terms has become a matter of routine for over 140 million Facebook users worldwide who use applications to spruce up their pages and to flirt, play and bond with friends online.,2933,353121,00.html

39 Are you really safe..? Every time you download or install an application – such as a game or gadget – you may be freely handing over personal information to perfect strangers. This happens on a growing number of social networking sites that are designed by third-party developers for anything from games and sports teams to trivia quizzes and virtual gifts.,2933,353121,00.html

40 How Anonymous Are You? What information is collected? –When you visit a web site, a certain amount of information is automatically sent to the site. This information may include the following: IP address Domain name Page visits –If a web site uses cookies, the organization may be able to collect even more information, such as your browsing patterns, which include other sites you've visited. If the site you're visiting is malicious, files on your computer, as well as passwords stored in the temporary memory, may be at risk.

41 What are the risks? There are many risks, some more serious than others. –Viruses erasing your entire system –Someone breaking into your system and altering files –Someone using your computer to attack others –Someone stealing your credit card information and making unauthorized purchases. There is no 100% guarantee that even with the best precautions some of these things won't happen. You can take steps to minimize the chances.

42 Ways to Protect Computer Security Capabilities Use Security Software Suites –Make sure you have robust security software that protects your computer against viruses, hackers, and spyware. It should also filter offensive content, pictures, and web sites. This software should be updated frequently, as new threats are emerging daily. Ideally, security that updates automatically. Use Parental Controls –Use options that filter and block inappropriate material. Of course, these tools have their limitations. Nothing can take the place of attentive and responsive parents who monitor their children when they are online. Create & use passwords that are difficult to crack

43 Best Practices Never log in with user names that reveal true identity or that are provocative Never reveal your passwords Never reveal phone numbers or addresses Never post information that reveals your identity Never post inappropriate photos or ones that may reveal your identity (for example: school names on shirts) Never share any information with strangers met online Never meet face-to-face with strangers met online Never open attachments from strangers

44 Final Thoughts Only a very small number of teens report uncomfortable online contact; most ably handle the contact by deleting or ignoring it Very little association between contact and information posted online Bullying is reported by same % of teens as stranger contact; and yet happens more offline Parents more likely to use non-technical methods of protection; rulemaking around content Balance promise of technology with pitfalls Safety in a mobile environment?


Download ppt "Soccer in a digital world An overview US Youth Soccer Risk Management Committee."

Similar presentations

Ads by Google