Presentation is loading. Please wait.

Presentation is loading. Please wait.

Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children.

Similar presentations


Presentation on theme: "Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children."— Presentation transcript:

1

2 Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children

3 Cyberbullies use technology such as e-mail, instant messaging, cell phones, and websites to spread rumors and gossip, steal passwords to assume someone else’s identity, post pictures of someone without their consent, and threaten or harass with offensive language. The speed at which information travels online can be frightening, and because most people use aliases, Cyberbullies are hard to track.

4  Internet is almost universal among 12-17, rising slightly from 87% in 2004 to 95% by 2011. (Pew Internet Research Center 2012)  In November 2006 over 90% of teens used the Internet, but less than half used a social networking site. (Pew Internet Research Center 2012)  As of July 2011 the number of teens (on the Internet) using a social networking site was to 80%.  As of July 2011 the number of teens (on the Internet) using a social networking site was to 80%.  Of that 93% have an account on Facebook. 41% have accounts on multiple sites. (Pew Internet Research Center 2012)

5  90% of social media-using teens who have witnessed online cruelty say they have ignored mean behavior on social media; 35% have done this frequently. (Pew Internet Research Center, FOSI, Cable in the Classroom, 2011)  80% say they have defended the victim; 25% have done so frequently  79% have told Cyberbullies to stop being mean and cruel; 20% have done so frequently

6 Parents, educators, and law enforcement face special challenges when it comes to taking action. Anonymity. By using the Internet, Cyberbullies can choose to remain anonymous. This makes it more difficult to pinpoint the offender. Outside of school hours. Cyberbullying can take place outside of school, which makes it more difficult for school personnel to prevent. Lack of school policies and procedures to handle cyberbullying. School personnel may not have policies in place to guide them in dealing with a cyberbullying incident. Varying law enforcement and prosecution responses. Cyberbullying is not a crime in all areas. This may limit the scope of resources law enforcement can provide when a cyberbullying incident occurs. It also makes it more difficult for law enforcement to take further action to stop the abuse.

7  Avoids the computer, cell phone, and other technological devices or appears stressed when receiving an e-mail, instant message, or text  Withdraws from family and friends or acts reluctant to attend school and social events  Avoids conversations about computer use  Exhibits signs of low self-esteem including depression and/or fear  Has declining grades  Has poor eating or sleeping habits

8 Be Involved and Proactive  Only 13% of parents know their child was bothered by something online. (Pew Internet Research Center 2012)  Only 7% of U.S. parents are worried about cyberbullying, even though 33% of teenagers have been victims of cyberbullying (Pew Internet and American Life Survey, 2011)

9  In 2011, 18% of children 12-17 possessing cells phones have received “sexts” (Pew Internet Research Center 2012)  4% of 12 year olds  20% of 16 years old  30% 17 year olds  17% of children who pay for their own phone sent “sext” compared to 3% who’s parent/guardian pays (Pew Internet Research Center 2012)

10 Privacy Controls  62% of teens most often have their social media profile set to be private. (Pew Internet Research Center 2012)  19% say their profile is partially private and just  17% say their profile is set to public so that everyone can see it.  Teens who have had at least one negative outcome from an experience on a social network site are almost twice as likely as those who have not had a bad experience to say that their profile is public, 23% vs. 12%. (Pew Internet Research Center 2012)

11  If your child receives harassing e-mails, have them delete their current account and open a new one. This new e-mail address should only be given to a few people who can be trusted with it.  If your child is receiving harassing messages through instant messaging (IM), help them use the “block” or “ban” feature. This feature can be used to block specific people from being able to communicate with your child.  If you have found that a cyberbully has set up a website to defame or mock your child, contact your ISP or the site administrator immediately. If necessary, inform law enforcement to try to get that website removed.  Get your child’s school involved. Learn about the school’s cyberbullying policy and urge the administrators to take a stance against all forms of bullying.

12  Contact your Internet service provider (ISP) or the website where the abuse is occurring.  Talk to your children about the possible consequences of sending inappropriate pictures to anyone. Check your home computer and your child's cell phone for any pictures that can be misconstrued if seen by others.  Talk to your children about the possible consequences of sending inappropriate pictures to anyone. Check your home computer and your child's cell phone for any pictures that can be misconstrued if seen by others.  Contact the CyberTipline if you find that sexually explicit pictures of your child are being circulated.  Call law enforcement if necessary. NOVA ICAC - 1-800-572-4510

13

14

15 Copyright © 2012 The National Center for Missing & Exploited Children®. All rights reserved.


Download ppt "Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children."

Similar presentations


Ads by Google