parent
Transcription
parent
The Online Lives of our Digital Natives How can we ensure the safety of our children on the Internet? Presentation at Sidwell Friends School March 6, 2007 Jenni Swanson Voorhees Charmaine Thompson Julianne Himelstein Welcome to the New World As soon as we think we understand what our children are experiencing online, things change. We must constantly keep abreast of the latest developments to stay aware of our own children’s daily experiences and dangers. They ARE Different Adapted from Marc Prensky –Digital Game-Based Learning and “Defining Success in an Information Age” by Jonathon P. Costa, Sr. Digital Immigrants Digital Natives Digital Interpreters Digital fluency Mostly text - linear Mostly media – non-linear Paper based – top-to-bottom Screen based – snatches and fragments Information stream Information flood One task at a time Multi-tasking Fonts Graphics Logical order Random access One conversation Networked Reward in the end Instant gratification Serious work Games and engagement Deliberation Twitch speed Legacy content Future content 8 FACT: Between 2000 and 2002, children increased their access to the Internet, regardless of income or age, with the greatest growth happening in the home. 70 60 50 40 2000 2002 30 % of Total 20 10 0 All Home School Library Source: Grunwald Associates as quoted by the Corporation for Public Broadcasting Report on Children’s Internet Use To keep kids safe, parents need to understand & teach these topics at home. o Cyber Community Citizenship o Cyber Security o Personal Safety o Plagiarism & Theft of Intellectual Property o Predator Identification & the Grooming Process Parent and Students Perspectives Differ 8 FACT: 14% of students polled stated that their parents have no idea where they go or what they do on the Internet. Parents vs. Students • 87% stated that they had established rules for their child’s Internet use. • Only 64% stated that they have established rules for their Internet use. • 69% feel they have a good idea of what their child does while online. • Only 59% said they share what they do on the Internet with their parents. • 54% feel limited in monitoring & sheltering their child from inappropriate material on the Internet. • 22% say the computer they use most often is in their room Source: i-SAFE Student/Parent Assessments 2003-’05 “I do not share what I do and where I go on the Internet with my parents.” 60 50 40 % of Total 30 Students 20 10 0 5th 6th 7th 8th Frosh Soph Junior Senior Source: i-SAFE Student/Parent Assessments 2003-’04 How do we bridge the “Parent-Child Digital Divide”? Using the Internet before knowing how to be safe is needlessly risky. Would you let your children drive before they knew the rules of the road? Average ages targeted for online sexual solicitation 25 20 15 % of Total Students 10 5 0 10yrs 11yrs 12yrs 13yrs 14yrs 15yrs 16yrs 17yrs Source: Crimes Against Children Research Center – Online Victimization: A Report on the Nation’s Youth “I have met a new person from the Internet ‘face to face’” 20 18 16 14 12 % of Total 10 8 6 4 2 0 Girls Boys 5th 6th 7th 8th Frosh Soph Junior Senior Source: i-SAFE Student/Parent Assessments 2003-’04 Prosecution of Predators o Undercover policemen described how they masquerade as young teens to attract online predators in chat rooms. o The following slide shows a chat between the undercover cop (Kalishopper2) and a 48-year old Navy doctor. “I go into a chat room…” 50 45 40 35 30 % of Total 25 20 15 10 5 0 Girls Boys 3rd 4th 5th 6th 7th 8th Frosh Soph JuniorSenior Source: i-SAFE Student/Parent Assessments 2003-’04 Instant Messaging - “IM-ing” • Many teen chat rooms encourage “IM-ing” to meet “new” friends. • Some websites provide private IM addresses to those who register, post a photo, and request a personalized IM address. • Some websites have specialized search functions allowing any visitor to choose who to IM by gender, age, interest, geography, etc. IM allows private, silent communication anytime • Instant messages – “IMs” - can be sent and received almost anywhere anytime using a computer or cell phone •IM addresses are located and used by strangers if posted on the Internet. •IMs are more difficult to trace and retrieve allowing two people to communicate privately/secretly. Examples of “Chat Language” ASLP Age, Sex, Location, Picture? TMI Too Much Information F2F Face To Face WYP What's Your Problem? POS Parents Over Shoulder GYPO Get Your Pants Off W8AM Wait A Minute SNERT Snot-Nosed Egotistical Rude Teenager Blogs, Wikis, Social Networking Sites Blogs have proved to be useful on many levels, but can also be a place to post too much information. Wikis provide interactive, cooperative opportunities. The most recent means of meeting and grooming children online has been through Social Networking sites. Blogs o Blogs are another name for Web Logs or Journals. Web Logs are maintained in chronological order by date of post. People who read the blog are usually welcome to post replies, their thoughts, etc. This makes most blogs interactive. o Blogging makes the writer feel like they are writing confidentially because they are behind a screen. However, the reality is that anyone online can read the blog. This can be dangerous. Wikis o Wiki is unusual among group communication mechanisms in that it allows the organization of contributions to be edited in addition to the content itself. o Like many simple concepts, "open editing" has some profound and subtle effects on Wiki usage. Allowing everyday users to create and edit any page in a Web site is exciting in that it encourages democratic use of the Web and promotes content composition by nontechnical users. Social Networking o Myspace, Facebook, LiveJournal are social networking sites that provide a means for kids age 14 and older to post information about themselves and search for those who share interests. o These sites, unfortunately, offer predators too much opportunity. o However, they are here. We need to work with our children to stay safe and be wise. www.wiredsafety.org o Parry Aftab, an Internet privacy and security lawyer, is WiredSafety's Executive Director. o She has an agreement with MySpace to provide security and a system for taking down pages that are unsafe. o They are also responsible for the safety tips on www.myspace.com Safety Reminders on MySpace o o o o Please read these safety tips before posting any photos or personal info. MySpace is a public space. Don't post anything you wouldn't want the world to know (e.g. your phone number, address, instant messenger screen name, or specific whereabouts). Don’t post any nudity, violent, or offensive material, or copyrighted images. If you violate these terms, your account will be deleted. [ photo policy ] People aren’t always say who they are. Exercise caution when communicating with strangers and avoid meeting people in person whom you do not fully know. If you must meet someone, do it in a public place and bring a friend or trusted adult. Harassment, hate speech, and inappropriate content should be reported. If you feel someone’s behavior is inappropriate, react. Talk with a trusted adult, or report it to MySpace or the authorities. “I have posted my photo on the Internet” 60 50 40 Girls Boys % of Total 30 20 10 0 3rd 4th 5th 6th 7th 8th Frosh Soph Junior Senior Source: i-SAFE Student/Parent Assessments 2003-’04 New Media to Consider o YouTube, Google Video, and other sites – the opportunity to post homemade video – with or without permission o Cell Phones n Connected to the Internet n Text messaging continues the online conversations away from the computer n Harder to keep an eye on What Employers and Colleges Say… Experts to students: Watch what you post online Information on sites such as MySpace.com could come back to haunt users (eSchool News March 1, 2006) Many employers hire companies to conduct background checks, but "Googling" job applicants serves as an additional hiring toolCharles Fleischer, an employment lawyer and author of The Complete Hiring and Firing Handbook. David Hawkins, director of public policy for the National Association for College Admissions Counseling commented on the use of MySpace by college admissions people. Hawkins said, “…the potential for a student to trip himself up [during the admissions process] is certainly greater than it was even 10 years ago." Student charged for death threat By Tony Lystra Gazette-Times reporter o o o The senior says he sees the teacher as a friend, post was just ‘something to do’ Sheriff’s deputies arrested a 17-year-old Alsea high school student this week after he posted a message on the Internet saying he planned to kill his math teacher, the Benton County Sheriff’s Office said. The student, a senior at Alsea High School, posted an animated counter on the social networking site MySpace.com. Beneath the graphic, which counts down days, hours and minutes, are the words, “Until I kill Mr. …” The math teacher’s name is included at the end of the sentence. A sheriff’s office report said the teacher feared for his life after learning of the posting. Deputies arrested the boy Monday in the school’s parking lot. He was taken to the Linn-Benton juvenile facility, then released. Benton County District Attorney Scott Heiser said his office planned to file disorderly conduct charges against the boy Thursday evening. The student, whose name was not released, has been unofficially suspended pending a psychological evaluation, said Jason Larson, the school’s principal. Larson said he learned of the threat after an anonymous tipster printed the Web page and left a copy in his office mailbox. Since, Larson said, school officials have asked MySpace administrators to remove the posting. As of Thursday evening it was still accessible on the Web. Boys' MySpace.com Prank Results in Arrest o Mar 07 6:55 AM US/Eastern--FONTANA, Calif. A group of boys who posed as a 15-year-old girl for an Internet prank ended up helping police arrest a 48-year-old man who tried to meet the fictitious teenager for sex, authorities said. The five boys had created a fake profile of a girl on MySpace.com _ a social networking Web site _ to cheer up a friend who had recently broken up with his girlfriend. But soon, a man began sending messages to the "girl" and their conversations began to have sexual overtones, said Fontana police Sgt. William Megenney. The man also sent the "girl" his picture and arranged to meet her at a public park. The boys went to the park and, when the man arrived, they called police. Michael Ramos, 48, of Fontana, was booked into West Valley Detention Center on Monday for investigation of felony attempted lewd and lascivious conduct with a child and for an outstanding warrant, Megenney said. Two men were arrested last week in what prosecutors said were the first federal sexual assault charges involving MySpace. The unrelated cases involved Connecticut girls who were 11 and 14, the FBI said. Justin Berry – Child Pornography o A New York Times expose is causing a disruption in the business of child pornography carried on the Internet through Web cams. o The Times story profiled 19-year-old Justin Berry. He described a lucrative business he started when he was 13 -- disrobing and later, performing sex acts on camera for paying customers -- some of whom he met; and some of whom assaulted him. o At the urging of The New York Times, Berry gave information to federal prosecutors about the teenage Web cam industry and the adults who support it. In exchange, he was given immunity from prosecution. (from NPR website) www.archive.org o Have you visited the WAYBACK Machine? o On Archive.org you can type in a URL and choose a date and see just what was posted on that site back in time. o That means nothing really goes away…There is a record that can be viewed! The single most important concept to teach our children is that the Internet is NOT a private space. It is quite the opposite! How Can a Parent Protect their Child on the Internet? o The most effective way to accomplish this is for the PARENT to become integrally involved in their child’s online activities. o Does your child understand what should and should NOT be done on the Internet? o Open these lines of communication early! Possible Methods o Direct: Limit time on the computer. o Monitoring software: Set up software that limits sites that are available. o Indirect: Agree on rules and keep checking in that rules are being followed. o For Everyone: Locate computers in public spaces in the house. No private screens. Knowledge is Key o The best form of prevention is information. n Visit sites together to read safety information and learn about the site. n Discuss articles in the paper that relate to behavior on the Internet. o Let your child share his or her opinions. o Integrity is also key. Our online behavior reflects who we are. Who do you want to be? i-Parent Tips 2 Use @ Home ü Have fun being part of your child’s online experience. ü Respect your child’s privacy but make certain they know personally everyone on their “buddy” list. No Strangers Allowed! ü Keep the computer where everyone sees the screen. No Hidden Screens! ü Keep personal information private. No Personal Posting! ü Report strangers who solicit meetings with any child. ü Teach your child how to recognize & avoid predators. ü Keep informed about trends and events.