Presentation on theme: "Today’s Quiz 1. The most popular social networking site among young people is Twitter. 2. Nothing is private once it is posted on the Internet. 3. Teens."— Presentation transcript:
Today’s Quiz 1. The most popular social networking site among young people is Twitter. 2. Nothing is private once it is posted on the Internet. 3. Teens should share passwords with their best friends in case they forget them. 4. About half of teens text around 60 messages a day, or 1,800 messages a month. 5. It’s ok to write embarrassing things about someone on the Internet if it’s just a joke.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very public place!
Once something is posted on the Internet, it is no longer private. The Nature of the Internet
Once something is posted on the Internet: you cannot get it back, you lose control over where it goes, you lose control over who sees it, and whatever you post is permanent.
Who’s Looking? Parents Principal, Teachers, Coaches Colleges and Universities Future employers Friends (Friends of Friends?) Strangers (Everyone?)
Strangers Online Not everyone on the Internet is who they say they are!
Predators go through social networking sites and chat rooms like catalogs, looking for information and photos that children and teens post.
Predators Are both genders, but mostly males All ages (recently - from 31 to 77) All races All levels of income All professions (Attorney, Time Warner employee, BMW executive, Lowe’s employee, former military, psychiatrist)
The Predator Isolates victim from family and friends. Wants victim to keep everything a secret. Promises victim money, clothes, etc. Wants victim to meet them offline.
Can you be certain?
Let a trusted adult know if anyone you first met on the Internet asks you to meet them in real life.
Risky Online Behaviors
Private vs. Public Most sites are on PUBLIC settings by default.
PRIVACY vs. Public - Facebook Custom
Posting personal information online such as full name, age, address, school, etc.
Phishing Definition: Theft of sensitive personal information. (credit card numbers, bank account information, SSN, passwords, etc.) UPDATE VALIDATE CONFIRM Federal Trade Commission
Steps to Avoid Getting Phished: 1.Don’t reply to or pop-up messages that ask for personal or financial information. 2.Don’t personal or financial information. 3.Review credit card and bank account statements as soon as you receive them. 4.Be cautious about opening attachments or downloading files from s you receive. 5.Never provide passwords over the phone or in response to an unsolicited Internet request. Federal Trade Commission, Federal Deposit Insurance Corporation
Sharing passwords with friends.
Accepting anyone and everyone as “friends.”
Agreeing to meet with someone s(he) meets on the Internet. Agreeing to meet in real life with someone you first met on the Internet.
TEXTING AND DRIVING
Texting and Driving City of Columbia has banned texting while driving. Fine: $100 (up to $237 with fees) Police are on board: “The distractions are so apparent, almost to the extent of being a DUI,” Chief Randy Scott said in late March.
Youth taking nude or semi-nude photos of themselves or their peers, and sending the photos to their friends, usually by cell phones. Sexting
Photos sent by cell phones: Leave your control the second you send them. Can be copied and sent to anyone and everyone. You cannot get them back.
The Good News! The majority of teens DO NOT participate in sexting. If you choose not to participate, you are not alone!
The Bad News If you choose to participate in sexting, you can be charged with: Unlawful Communication (Use of a telephone or electronic means) or Sexual Exploitation of a Minor (Child Pornography)
A Shadow Resume Jobs - Employers Colleges and Universities What type of reputation is represented by your online messages and photos?
Cyberbullying (Digital Abuse)
Definition: When the internet is used to intentionally and repeatedly hurt, embarrass, threaten or humiliate another person.
Roles Involved In Cyberbullying Cyberbully Victim Bystander Upstander
Cyberbullying can be: Threats of doing some type of harm Mean, negative comments Spreading gossip, rumors A fake profile of another person Embarrassing photos spread online Online polls, surveys
Cyberbullies Feel that they are anonymous. Will say things online that they wouldn’t say face to face. Want others to pile on. Victims Feel frustrated, isolated, depressed. Some commit suicide.
Tips for Handling Cyberbullying
Don’t respond or retaliate. Delete your account. Save evidence such as s, text messages, pictures, etc. from the cyberbully. Report it! First, try to ignore the messages.
The Good News! The majority of teens DO NOT participate in Cyberbullying! If you choose not to participate, you are not alone.
The Bad News In S.C., persons who are cyberbullies can be charged with Harassment or Stalking.