How Much Time Kids Spend Online?
Transcription
How Much Time Kids Spend Online?
• 94% of teens ages 12-17 go online •75% own cell phones • 73% use a social networking site Online Cell Phones Social Networks Social Media Responsibility and Digital Footprint: Protecting Kids Against High‐ Tech Troubles • 72% are texting • 97% are playing video games Texting Gaming Pew Internet & American Life 2010 Dr. Kim Mason Youth’s Online Life How Much Time Kids Spend Online? 8‐18 year‐olds devote an average of 7 hours and 38 minutes (up from 6:21) to using entertainment media across a typical day (more than 53 hours a week) Media multitasking‐they jam about 10 hours and 45 minutes worth of media content into those 7½ hours. About half (47%) of heavy media users say they usually get fair or poor grades (mostly Cs or lower), compared to about a quarter (23%) of light users. What's important to you in your digital world?* 90 79 80 70 60 52 50 % 40 34 35 30 21 20 12 10 Cell Phones Dr. Kim Mason, 2012 Laptops Gaming Devices Tablets 0 Playing Games Keeping in touch with friends Homework Browsing the web Downloading music Creating own content 1 The Importance of Technology for Youth Aggressive Behavior Verbal Psychological Carried Out Repeatedly and Over Time Imbalance of Power Techie‐Uses Technology Psychological Control Behavior is Intended to Harm or Disturb Direct Bullying Directly sends a message to other Indirect Bullying cyberbullying by proxy by using others to help cyberbully a victim, with or without the accomplice’s consent Kim Mason Would u say this 2 her ? Dr. Kim Mason, 2012 2 Differences Between F2F & Cyberbullying Bullying Cyber Bullying Direct Anonymous On Campus Anywhere Lot of energy and courage Not so much Mostly verbal and physical Multimedia Poor relationships with teachers Good relationship with teachers Fear retribution Fear loss of technology Requires strength Requires skills & knowledge Cyberbully Roles (cont) Targets Targets of entitlement bullies: individuals who get picked on because bullies think they are different or inferior. Example: Inadvertent Cyberbullies Victims of retaliators: Usually individuals who have been cyberbullying, but are now receiving the cruelty Cyberbully Roles (cont) Flaming/ Flame Wars Exclusion Bystanders Harassment Forms of Cyberbullying Masquerading Denigration Cyberstalking Outing/ Trickery Cyberbully Roles Cyberbullies Entitlement bullies: “Put downers” Individuals who think they are superior and the right to harass or demean others especially if the person is different. Example: Mean Girls Retaliators: “Get‐backers” They have been bullied by others and are using the Internet to retaliate. see as righting wrongs; protecting friend/others Example: Revenge of the Nerds & Vengeful Angel Bystanders who are part of the problem Individuals who encourage and support the bully or who watch the bullying from the sidelines but do nothing to help the victim. Bystanders who are part of the solution Individuals who seek to stop the bullying, protest it, and provide support to the victim. Prevalence of Cyberbullying Reasons cyberbullies said they engaged in cyberbullying: To show off to friends (11%); To be mean (14%); To embarrass (21%); For fun/entertainment (28%); Person deserved it (58%); To get back at someone (58%); Something else (16%) Cyberbullies spend more time online (38.4 hours compared to 26.8 hours) SNS users (39%) reported online harassment 81% of teens agree that bullying online is easier to get away with than bullying in person. Moessner, 2007; Teen Online & Wireless Safety Survey, 2009 Dr. Kim Mason, 2012 3 All races are pretty evenly represented as victims or offenders. http://www.cyberbullying.us/research.php Cyberbullying and Bystanders 45% of young people report that they see people being mean to each other on social networking sites (Gatti, 2008). http://www.cyberbullying.us/research.php Cyberbullying by Gender Adolescent girls are significantly more likely than boys to have experienced cyberbullying in their lifetimes (25.8% vs. 16%) and report cyberbullying others during their lifetime (21.1% vs. 18.3%). Girls are more likely to spread rumors while boys are more likely to post hurtful pictures or videos. Dr. Kim Mason, 2012 Why Cyberbully? You don’t know me anonymity experimentation with multiple identities sense of entitlement empowerment You can’t see me illusion of invisibility different moral values and social expectations reduction of social and contextual cues and tangible feedback underdeveloped empathy skills instant gratification It’s just a game entertainment – mass audience lack of impulse control underdeveloped an internal behavior control mechanism ineffective problem solving skills 4 Physical, Social, Psychological, and Emotional •Health concerns •Stopped socializing out of school •Fear, anxiety, anger, hurt, embarrassed •School failure, school avoidance, and school violence Dr. Kim Mason, 2012 “Cyberbullicide” Megan Meier, 13, Asher Brown, 13, hanged herself after shot himself in the her nude photo, meant Tyler Clementi,18, jumped off of the George Washington Bridge as a result of being cyberbullied. for her boyfriend, was head at home as a sent to teenagers at result of being several high schools. bullied. 5 Signs of Cyberbullying Red Flags Web 2.0 Tools ‐ How familiar are you? A cyberbullying victim might Stop using the computer or cell phone Act nervous when receiving an e-mail, IM, or text Seem uneasy about going to school Withdraw from friends and family HB 1259: ACT 989 (2010): Cyberbullying Web 2.0 Tools ‐ How familiar are you? Defined as: the “transmission of any electronic textual, visual, written, or oral communication with the malicious and willful intent to coerce, abuse, torment, or intimidate a person under the age of 18” according HB 1259. Fine: Not more than $500 and/or imprisoned up to 6 months or both. When the offender is under 17, the disposition of the matter shall be governed exclusively by the provisions of Title VII of the Children's Code. Minors under 17: Must undergo counseling for a first offense and misdemeanor charges for secondary offenses (Children’s code articles apply i.e., juvenile court intervention). Dr. Kim Mason, 2012 6 Instant Messaging (IM) Chat rooms are places on the Internet where you can have live, real‐time conversations with many people at the same time. Everyone in the chat room can see what everyone else writes, but you can still be as anonymous as you want. • An individual or group uses information and communication involving electronic technologies to facilitate deliberate and repeated harassment or threat to an individual or group. • Being cruel to others by sending or posting harmful material using technological means; • Power • Control • Human Relationships Chatroulette Dr. Kim Mason, 2012 IM is a form of Internet communication that combines the live nature of real time chat with the personal contact of email. Benefits include: A safer environment than chat rooms since contact lists can be better controlled. Most IM software allows kids to block people they don’t know Review contact lists for strangers Use the “Keep a history of my conversations” option Text Messaging 7 Instant Messaging (IMing)& Text Messaging Acronyms POS = Parent Over Shoulder noob = A derogatory remark made at people looked down upon due to behavior or a new player RUF2T Are You Free To Talk rumf aRe yoU Male or Female? A/S/L Age/sex/location Urban Dictionary is the dictionary people write. 5,738,272 DEFINITIONS SINCE 1999 Flamer Extremely flamboyant homosexual. Very bright clothing, loud speech, upbeat attitude, often noisy or annoying, intrusive. Very very gay... "That guy is acting out some Broadway musical in the middle of the street.. what a flamer.." http://www.urbandictionary.com F u cn read dis u r a txtaholic! Sites to post material, including writings, drawings, and pictures Facebook.com; Xanga.com, Blurty.com, Newsisfree.com, http://geocities.yahoo.com/ Chat Translators www.lingo2word.com www.teenchatdecoder.com netling.com noslang.com Dr. Kim Mason, 2012 acronymfinder.com netlingo.com 8 Formspring Examples (c) 2011, Russell A. Sabella, Ph.D. 49 Formspring: The New Cyberscourge 52 Cyberbullying by “Twitter is seeing a growing number of cyberbullying incidents as more and more kids figure out how to post hateful, harassing information about their friends and deliver it ‘via Tweet’ to as many followers of the site as they can.” Cyberbullying by Video Networking • More than 2 billion views a day A blog is basically a journal that is available on the web ‐ the term is a shortened form of weblog. • Estimated 92 billion page views each month Updated daily using software that allows people with little or no technical background to maintain the blog. • Average person spends 15 minutes per day Postings on a blog are almost always arranged in chronological order with the most recent additions featured most prominently. Blogs usually include profiles, text, photographs, and links between “friends” and interests ‐ and may include video or audio files. • More than 400 tweets per minute contains a YouTube link Dr. Kim Mason, 2012 • 36.7% of victims say they were bullied via YouTube 9 Cyberbullying by Virtual Worlds Second Life Trickery, Blackmail, Extortion Mobilization of gang violence or riots Interactive Gaming RPG's MMORPG (Massive Multiplayer Online Role‐Playing Game) 27% of teens (12‐17) play games with people they don’t know online. Communicate by chat and live Internet phone with anyone they find themselves matched with in a game online. Kids verbally abuse the other kids, using threats and lewd language Lock others out of games, passing false rumors about them or hacking into their accounts. Webcams Most big instant messaging services or those that allow voice over Internet protocol (VoIP) calling, such as Skype, allow both voice and video calling at little or no cost. Kids make videos of themselves and post on websites Express themselves on video blogs Hide out‐of‐sight to talk about another person(s) or spread rumors Dr. Kim Mason, 2012 “Spying” on You Cell Phone Tapping Cell phone can be secretly hijacked and used against you 10 Online predators seek kids who: Ideal age: 11‐15 Won't tell anyone Spend a lot of time alone Who are hurting Whose parents are busy or separated From troubled backgrounds Young and vulnerable Angry with their parents Rebellious Adventurous Bored No or little parental involvement No definite bedtime Can be away from home without anyone knowing where he/she is Has exclusive use of the computer in a private area “Characteristics of a Fictitious Child Victim: Turning a Sex Offender’s Dreams Into His Worst Nightmare” by James F. McLaughlin. Warning Signs That a Child May Be a Victim Online Enticement Through use of chat rooms, e‐mail, instant messaging, “blogs” and even on‐line games, adult strangers can establish direct one‐to‐one access to children. “Distance” and children’s natural trust can lead them to forget that these people are strangers … and many of them are very good at misrepresenting who they are. Dr. Kim Mason, 2012 Child spending long hours online, especially at night. Phone calls from people you don't know. Unsolicited gifts arriving in the mail. Child suddenly turns off the computer when you walk into the room Withdrawal from family life. Reluctance to discuss online activities. By taking an active role in your child's Internet activities, you'll be ensuring that he or she can benefit from the wealth of valuable information the Internet has to offer, without being exposed to any potential dangers. 11 What do you know about online predators? What would you do if someone asked to meet you in person? La Sex Offender Law (HB 55) Took effect on August 15, 2011. House Bill 55 was introduced into the House of Representatives by Rep. Ledrika Thierry, and aims to stop some of Louisiana's registered sex offenders from accessing social media sites. The law bars offenders from "using or accessing" social networking sites, chat rooms and peer‐to‐peer networks. Communicate. Monitor. Report. If a registered Louisiana sex offender is now caught using these sites, they could be fined up to $10,000 and put in jail for 10 years for their first offense, and fined $20,000 for their second offense along with 20 years of jail time. Investigating Predators Problems with Social Networks State Sex Offender Registry Website entry point; contains links to additional resources relating to child pornography, kidnappings, and federal statutes. www.fbi.gov/hq/cid/cac/states.htm National Sex Offender Registry‐ For a list with links, visit www.nsopr.gov Sex offender website (see where registered sex offenders are in your neighborhood) ‐ www.familywatchdog.us/ National Center for Missing and Exploited Children (NCMEC) – maintains the CyberTipline for reporting incidents, numerous resource materials and studies online. www.ncmec.org Direct access to the CyberTipline for leads relating to child sexual exploitation; phone number is 1‐800‐843‐5678. www.cybertipline.com Perverted Justice Group ‐ Ad‐hoc group that poses as underage children in chat rooms to identify predators. www.perverted‐justice.com The Cyber Law Enforcement Organization – www.CyberLawEnforcement.org 71 Louisiana Sex‐Offender Registration and Notification • Facebook, more than 500 million active users, an increase of 16.6% since in 2009; 145% increase since 2010. Louisiana State Police Information State Sex‐Offender and Child‐Predator Registry PO Box 66614, Box A‐6 Baton Rouge, LA 70896‐6614 Telephone: 225‐925‐6100 or 1‐800‐858‐0551 E‐mail: [email protected] http://www.lasocpr.lsp.org/socpr/ Dr. Kim Mason, 2012 • Users spend over 700 billion minutes per month on Facebook; over 200 million users access through their mobile devices. • 74% of all 7th‐12th graders say they have a profile on a SNS. • 46% have open access to their online profile information. • 62.0% of victims say they were bullied via SNS 12 Sexting The process of adding geographical identification to photographs, video, websites and SMS messages. Honesty Box • The act of sharing flirtatious, nude or semi‐nude photos via cell phone or other means of texting device. • The list included acronyms like the always romantic “DUM” (“Do you masturbate?”), “FMLTWIA” (“F*** me like the whore I am”) “IMEWZRU” (“I am easy, are you?”) Set to Private Only REAL Friends Only - My status, photos, and posts - Family and relationships 1 in 6 teens have received a “sext.” - Photos and videos I’m tagged in - Birthday - Permission to comment on your posts Absolutely ONLY positive personal/private - Contact information information Vanessa Hudgens Share a tagged post with friends of the friend I tag http://www.reclaimprivacy.org/facebook Dr. Kim Mason, 2012 13 Why do Youth ‘Sext’? 82.2% said to get attention 66.3% said to be “cool” 59.4% said to be like the popular girls 54.8% said to find a boyfriend Peer pressure ( 52%‐Boys) (23%‐Friend) Teen “romance” – expression of shared intimacy with partner Flirting or relationship currency Revenge after a breakup Blackmail Impulsive behavior Special present Joke Think it will remain private “Truth or Dare” (normative game gone very wrong) Bullying or intimidation (“pranks”) HB 1458: ACT 755 (2010): Louisiana Schools Accountability Law By January 1, 2011, public schools must conduct a review of the student code of conduct amend such code to assure that the policy prohibiting the harassment, intimidation, and bullying of a student by another student to include cyberbullying. Inform each student, in writing within 10 days, after enrolling in school of the prohibition against such incidents; the nature and consequences of such actions; and the proper process and procedure for reporting any incidents involving such prohibited actions. Develop and adopt a policy establishing procedures for the investigation of reports. Document the details of each reported incident of harassment intimidation, and bullying, including cyberbullying. Report all such documented incidences to the Department of Education Sexting ‐ Serious Consequences (c) 2011, Russell A. Sabella, Ph.D. 83 HB 1357: Act 993 (2010):“Sexting” It is a crime for anyone under the age of 17 to send an indecent visual depiction of himself/herself to another person via an electronic device. It is also a crime for a person under the age of 17 to possess or transmit an indecent visual image transmitted by another under the age of 17. 1st Offense: fined $100‐$200 dollars and/or imprisoned for 10 days (suspended with 16 hours of community service) 2nd Offense: fined $250‐$500 dollars and/or imprisoned for 10 ‐ 30 days (suspended with 40 hours of community service) 3rd Offense: fined $500‐$750 dollars and/or imprisoned for 30 days‐ 6 months (suspended with 80 hours of community service) Dr. Kim Mason, 2012 14 Michael Phelps first day at work. omg!! So dull. Will she get the job when her potential employer Googles her name? 86 (c) 2011, Russell A. Sabella, Ph.D. http://www.examiner.com/x-260-Seattle-ParentingExaminer~y2009m3d1-Teenage-fired-forcomplaining-on-Facebook---teaching-teens-tothink-before-the-write?comments=true Miley Cyrus – Does she regret it now? Dr. Kim Mason, 2012 15 Facebook and College Admissions Fostering good communication means no “freaking out” A new survey from Kaplan Test Prep reveals that 82 percent of admissions officers use Facebook in their recruiting. Thursday, March 3, 2011 They are never really anonymous Develop a deeper understanding of kids’: online activities Internet environments use of the Net to explore roles and identity Learn about the Internet by asking kids to teach you everything they know Use the Internet environments and technological tools yourself Dr. Kim Mason, 2012 16 Word of Caution Being rational or logical with adolescents may not work .. But try it! What else YOU Can Do Provide structure and rules about being online: Only after homework is complete; On the average, for no more than 3 hours per day; For the very young, all web sites must be parent approved before visiting; “Report any suspicious activity” Contact the Service Provider Supervise Preserve evidence, as this is crucial for making a case and identifying the bully. Mobile phone operator Internet service provider Chatroom provider Usually there is an abuse team contact Have the computer in a shared space Keep access to children’s files Talk about their computer use Monitor behavior and mood Keep talking Promote responsibility‐taking Provide scripts Use Technology to Block Work with Police Work with School Get savvy Use Spyware and anti‐virus Use Blocking, a filtering technology if available, e.g. blocking user on IM and make sure blocking is up‐to‐date Death threats or threats of other form of violence to a person or property; Any evidence of sexual exploitation Take Home School Agreements seriously Get in touch about concerns Support with incidents Preserve the Evidence 1 4 2 5 3 6 Supervision & Restriction Children under 10 should not be surfing the Net alone Keep Internet-connected computers out of kids’ rooms and in a highly visible area Tasks can’t be performed effectively when multi-tasking No mental “downtime” to relax and reflect Kids with their own Internet connection spend twice as much time online Dr. Kim Mason, 2012 Teach Cyberethics Teach Chatroom Netiquette Think Before Posting 17 Chatroom Netiquette Follow the “rules of the road” 1. Avoid Using ALL CAPS ‐ It’s considered yelling. 2. Decide What Tone the Conversation Has Before Posting ‐ Don't use offensive language or nicknames. Always avoid making personal attacks and calling names. 3. Don't "Flood" the Chatroom ‐ Flooding is repeating messages over and over, or filling the screen with gibberish, in order to impede communication in the chatroom. 4. Be Nice to Newbies ‐ Remember your first chats? If someone stumbles into your chat, who is obviously new to this medium, show some patience and help him or her get the hang of it. Think Before They Post Character is what you do when no one is watching. Use Power Responsibly Be Yourself •When you are online, you‛re in control. Don‛t spread rumors, take things (like music, movies, etc.) that don‛t belong to you, or forward spam e‐mails. •Don‛t pretend to be someone you aren‛t while online. Respect Other’s Privacy •Don‛t reveal secrets online or blab stuff like passwords, names, etc. This includes your own private information. Don’t Hurt Other’s Feelings •When you are online, people can‛t tell when you‛re joking. If you say or write something online, make sure you are clear if you are joking. Respect other’s Online Rights Don’t respond if Someone Insults You Dr. Kim Mason, 2012 •Just like offline, don‛t say mean things or make threats. •It could be that they didn‛t think before they said it. But even if they meant to be insulting, don‛t make it worse. Just ignore it. 18 Monitoring Programs Install extra security such as blocking, filtering, and key logging software. Net Nanny CyberPatrol Safe Eyes CyberSitter PC Tattletale For Internet Filter Reviews visit http://internet‐filter‐review.toptenreviews.com/?ttreng=1&ttrkey=internet+filter Intervention with Aggressor ... CyberBully Alert – www.cyberbullyalert.com STOP Think about your personal values. What are your beliefs about the way others should be treated? THINK About your reasons for bullying and alternative ways to express your feelings. DECIDE Think about how your actions might affect others What do you need now so that the harm can be repaired ? TEACH THE AGGESSOR HE/SHE HAS A CHOICE! Dr. Kim Mason, 2012 19 (c) 2011, Russell A. Sabella, Ph.D. 115 http://www.street0.com/ www.safesocial.com Find everything about you online & Protect your personal data Remove your personal information off people search databases and control your mailbox from unwanted mail with MyPrivacy. ($7.95/month) Parental Control Software for Mobile Phones Mobile Spy and Mobile Nanny is a hybrid software/service which allows you to monitor your child's compatible phone in real time. This unique system allows you to monitor activities online and block activities you do not want to happen. You'll know where your kids have social networking accounts Displays the pictures the child is tagged in Shows who they are friends with online. Checks out their online friends against more than 50 databases Automatically notified if dangerous situations or inappropriate words are mentioned in posts (trigger words include "drug," "suicide" or "violence") Dr. Kim Mason, 2012 Silently record every SMS message. View information about every call. See GPS positions every thirty minutes. View all photos and videos taken by the phone. See all the log results in your SSL Secured online account. www.mobilespytool.com www.mobilenanny.com 20 Google Alerts Circumventing the Systems Set Parental Controls Peacefire.org is the world's For Example: How to install largest distribution network for the Circumventor program, proxy sites to circumvent which gets around all Web‐ Internet censorship blocking software. 2.2 million subscribers as of April Is MouseMatrix.com already 2011 blocked for you because it's Filtering options restrict access; been widely known for so however, students are long? This is how you create circumventing the systems (click embedded link) your Student are circumventing filters own semi‐private URL for www.freeproxy.ru/en/free_proxy/cgi‐ getting around blocking proxy.htm; www. proxify.com; www.vtunnel.com; http://proxy.org software. unblockmyspace.com; www.guardster.com; www.ztunnel.com; Wireless Connection What can it mean if history, keyword or temporary Internet files are cleared? Monitor Laptop Activity Dr. Kim Mason, 2012 21 Kimberly Mason, Ph.D., LPC, NCC University of New Orleans [email protected] Dr. Kim Mason, 2012 22