How Much Time Kids Spend Online?

Transcription

How Much Time Kids Spend Online?
• 94% of teens
ages 12-17
go online
•75% own cell phones
• 73% use a
social
networking
site
Online
Cell
Phones
Social Networks
Social Media Responsibility and Digital Footprint: Protecting Kids Against High‐
Tech Troubles
• 72% are
texting
• 97% are
playing
video games
Texting
Gaming
Pew
Internet &
American
Life
2010
Dr. Kim Mason Youth’s Online Life
How Much Time Kids Spend Online?
8‐18 year‐olds devote an average of 7 hours and 38 minutes (up from 6:21) to using entertainment media across a typical day (more than 53 hours a week)
Media multitasking‐they jam about 10 hours and 45 minutes worth of media content into those 7½ hours.
About half (47%) of heavy media users say they usually get fair or poor grades (mostly Cs or lower), compared to about a quarter (23%) of light users.
What's important to you in your digital world?*
90
79
80
70
60
52
50
%
40
34
35
30
21
20
12
10
Cell Phones
Dr. Kim Mason, 2012
Laptops
Gaming Devices
Tablets
0
Playing Games
Keeping in touch
with friends
Homework
Browsing the web
Downloading
music
Creating own
content
1
The Importance of Technology for Youth
Aggressive Behavior
Verbal Psychological
Carried Out
Repeatedly and Over Time
Imbalance of Power
Techie‐Uses Technology Psychological Control
Behavior is Intended to Harm or Disturb
Direct Bullying
Directly sends a message to other Indirect Bullying
cyberbullying by proxy by using others to help cyberbully a victim, with or without the accomplice’s consent
Kim Mason
Would u say this 2 her ?
Dr. Kim Mason, 2012
2
Differences Between F2F & Cyberbullying
Bullying
Cyber Bullying
 Direct
 Anonymous
 On Campus
 Anywhere
 Lot of energy and courage
 Not so much
 Mostly verbal and physical
 Multimedia
 Poor relationships with teachers
 Good relationship with teachers
 Fear retribution
 Fear loss of technology
 Requires strength
 Requires skills & knowledge Cyberbully Roles (cont)
 Targets
 Targets of entitlement bullies: individuals who get picked on because bullies think they are different or inferior. Example: Inadvertent Cyberbullies  Victims of retaliators: Usually individuals who have been cyberbullying, but are now receiving the cruelty
Cyberbully Roles (cont)
Flaming/
Flame Wars
Exclusion
 Bystanders
Harassment
Forms of
Cyberbullying
Masquerading
Denigration
Cyberstalking
Outing/
Trickery
Cyberbully Roles
 Cyberbullies
 Entitlement bullies: “Put downers”  Individuals who think they are superior and the right to harass or demean others especially if the person is different.  Example: Mean Girls
 Retaliators: “Get‐backers”
 They have been bullied by others and are using the Internet to retaliate.  see as righting wrongs; protecting friend/others
 Example: Revenge of the Nerds & Vengeful Angel
 Bystanders who are part of the problem  Individuals who encourage and support the bully or who watch the bullying from the sidelines but do nothing to help the victim.  Bystanders who are part of the solution
 Individuals who seek to stop the bullying, protest it, and provide support to the victim.
Prevalence of Cyberbullying
Reasons cyberbullies said they engaged in cyberbullying:
 To show off to friends (11%); To be mean (14%); To embarrass (21%); For fun/entertainment (28%); Person deserved it (58%); To get back at someone (58%); Something else (16%)
 Cyberbullies spend more time online
 (38.4 hours compared to 26.8 hours)  SNS users (39%) reported online harassment  81% of teens agree that bullying online is easier to get away with than bullying in person.
Moessner, 2007; Teen Online & Wireless Safety Survey, 2009
Dr. Kim Mason, 2012
3
All races are pretty evenly represented as victims or offenders.
http://www.cyberbullying.us/research.php
Cyberbullying and Bystanders
45% of young people report that they see people being mean to each other on social networking sites (Gatti, 2008).
http://www.cyberbullying.us/research.php
Cyberbullying by Gender
 Adolescent girls are significantly more likely than boys to have experienced cyberbullying in their lifetimes (25.8% vs. 16%) and report cyberbullying others during their lifetime (21.1% vs. 18.3%).  Girls are more likely to spread rumors while boys are more likely to post hurtful pictures or videos.
Dr. Kim Mason, 2012
Why Cyberbully?  You don’t know me
 anonymity  experimentation with multiple identities
 sense of entitlement
 empowerment
 You can’t see me  illusion of invisibility  different moral values and social expectations  reduction of social and contextual cues and tangible feedback  underdeveloped empathy skills
 instant gratification
 It’s just a game  entertainment – mass audience
 lack of impulse control
 underdeveloped an internal behavior control mechanism  ineffective problem solving skills
4
 Physical, Social, Psychological, and Emotional
•Health concerns
•Stopped socializing out of school
•Fear, anxiety, anger,
hurt, embarrassed
•School failure, school avoidance, and school violence
Dr. Kim Mason, 2012
“Cyberbullicide”
Megan Meier, 13, Asher Brown, 13, hanged herself after shot himself in the her nude photo, meant Tyler Clementi,18, jumped off of the George Washington Bridge as a result of being cyberbullied.
for her boyfriend, was head at home as a sent to teenagers at result of being several high schools.
bullied. 5
Signs of Cyberbullying
Red Flags
Web 2.0 Tools ‐ How familiar are you?
A cyberbullying victim might
Stop using the
computer or
cell phone
Act nervous
when receiving
an e-mail,
IM, or text
Seem uneasy
about going to
school
Withdraw from
friends and
family
HB 1259: ACT 989 (2010): Cyberbullying Web 2.0 Tools ‐ How familiar are you?
 Defined as: the “transmission of any electronic textual, visual, written, or oral communication with the malicious and willful intent to coerce, abuse, torment, or intimidate a person under the age of 18” according HB 1259.
 Fine: Not more than $500 and/or imprisoned up to 6 months or both.  When the offender is under 17, the disposition of the matter shall be governed exclusively by the provisions of Title VII of the Children's Code.
 Minors under 17: Must undergo counseling for a first offense and misdemeanor charges for secondary offenses (Children’s code articles apply i.e., juvenile court intervention).
Dr. Kim Mason, 2012
6
Instant Messaging (IM)
 Chat rooms are places on the Internet where you can have live, real‐time conversations with many people at the same time.  Everyone in the chat room can see what everyone else writes, but you can still be as anonymous as you want.
• An individual or group uses information and
communication involving electronic technologies to
facilitate deliberate and repeated harassment or threat to
an individual or group.
• Being cruel to others by sending or posting harmful
material using technological means;
• Power
• Control
• Human Relationships
Chatroulette
Dr. Kim Mason, 2012
 IM is a form of Internet communication that combines the live nature of real time chat with the personal contact of email. Benefits include:
 A safer environment than chat rooms since contact lists can be better controlled.
Most IM software
allows kids to block
people
they don’t know
Review contact
lists for strangers
Use the “Keep a
history of my
conversations”
option
Text Messaging 7
Instant Messaging (IMing)& Text Messaging
 Acronyms
 POS =  Parent Over Shoulder  noob =  A derogatory remark made at people looked down upon due to behavior or a new player
 RUF2T
 Are You Free To Talk  rumf
 aRe yoU Male or Female?
 A/S/L
 Age/sex/location
 Urban Dictionary is the dictionary people write.  5,738,272 DEFINITIONS SINCE 1999
 Flamer
 Extremely flamboyant homosexual. Very bright clothing, loud speech, upbeat attitude, often noisy or annoying, intrusive. Very very gay...
 "That guy is acting out some Broadway musical in the middle of the street.. what a flamer.."  http://www.urbandictionary.com
F u cn read dis u r a txtaholic!
 Sites to post material, including writings, drawings, and pictures
 Facebook.com; Xanga.com, Blurty.com, Newsisfree.com, http://geocities.yahoo.com/
Chat Translators
www.lingo2word.com
www.teenchatdecoder.com
netling.com
noslang.com
Dr. Kim Mason, 2012
acronymfinder.com
netlingo.com
8
Formspring Examples
(c) 2011, Russell A. Sabella, Ph.D.
49
Formspring: The New Cyberscourge
52
Cyberbullying by
“Twitter is seeing a growing number of cyberbullying incidents as more and more kids figure out how to post hateful, harassing information about their friends and deliver it ‘via Tweet’ to as many followers of the site as they can.”
Cyberbullying by Video Networking
• More than 2 billion views a day
 A blog is basically a journal that is available on the web ‐ the term is a shortened form of weblog.
• Estimated 92 billion page views each month
 Updated daily using software that allows people with little or no technical background to maintain the blog. • Average person spends 15 minutes per day
 Postings on a blog are almost always arranged in chronological order with the most recent additions featured most prominently.  Blogs usually include profiles, text, photographs, and links between “friends” and interests ‐ and may include video or audio files.
• More than 400 tweets per minute contains a YouTube link Dr. Kim Mason, 2012
• 36.7% of victims say they were bullied via YouTube 9
Cyberbullying by
Virtual Worlds
Second Life
 Trickery, Blackmail, Extortion
 Mobilization of gang violence or riots
Interactive Gaming
RPG's MMORPG (Massive Multiplayer Online Role‐Playing Game)
 27% of teens (12‐17) play games with people they don’t know online.
 Communicate by chat and live Internet phone with anyone they find themselves matched with in a game online.
 Kids verbally abuse the other kids, using threats and lewd language
 Lock others out of games, passing false rumors about them or hacking into their accounts.
Webcams
 Most big instant messaging services or those that allow voice over Internet protocol (VoIP) calling, such as Skype, allow both voice and video calling at little or no cost.
 Kids make videos of themselves and post on websites
 Express themselves on video blogs
 Hide out‐of‐sight to talk about another person(s) or spread rumors
Dr. Kim Mason, 2012
“Spying” on You
Cell Phone Tapping Cell phone can be secretly hijacked and used against you
10
Online predators seek kids who:
Ideal age: 11‐15
Won't tell anyone Spend a lot of time alone Who are hurting Whose parents are busy or separated From troubled backgrounds Young and vulnerable Angry with their parents Rebellious Adventurous Bored No or little parental involvement
No definite bedtime
Can be away from home without anyone knowing where he/she is
Has exclusive use of the computer in a private area
“Characteristics of a Fictitious Child Victim: Turning a Sex Offender’s Dreams Into His Worst Nightmare” by James F. McLaughlin.
Warning Signs That a Child May Be a Victim
Online Enticement  Through use of chat rooms, e‐mail, instant messaging, “blogs” and even on‐line games, adult strangers can establish direct one‐to‐one access to children.  “Distance” and children’s natural trust can lead them to forget that these people are strangers … and many of them are very good at misrepresenting who they are. Dr. Kim Mason, 2012




Child spending long hours online, especially at night. Phone calls from people you don't know. Unsolicited gifts arriving in the mail. Child suddenly turns off the computer when you walk into the room  Withdrawal from family life.  Reluctance to discuss online activities.  By taking an active role in your child's Internet activities, you'll be ensuring that he or she can benefit from the wealth of valuable information the Internet has to offer, without being exposed to any potential dangers.
11
What do you know
about online
predators?
What would you
do if someone
asked to meet you
in person?
La Sex Offender Law (HB 55)
 Took effect on August 15, 2011.  House Bill 55 was introduced into the House of Representatives by Rep. Ledrika Thierry, and aims to stop some of Louisiana's registered sex offenders from accessing social media sites. The law bars offenders from "using or accessing" social networking sites, chat rooms and peer‐to‐peer networks.
Communicate. Monitor. Report.
 If a registered Louisiana sex offender is now caught using these sites, they could be fined up to $10,000 and put in jail for 10 years for their first offense, and fined $20,000 for their second offense along with 20 years of jail time. Investigating Predators
Problems with Social Networks
 State Sex Offender Registry Website entry point; contains links to additional resources relating to child pornography, kidnappings, and federal statutes.  www.fbi.gov/hq/cid/cac/states.htm
 National Sex Offender Registry‐ For a list with links, visit www.nsopr.gov
 Sex offender website (see where registered sex offenders are in your neighborhood) ‐ www.familywatchdog.us/
 National Center for Missing and Exploited Children (NCMEC) – maintains the CyberTipline for reporting incidents, numerous resource materials and studies online. www.ncmec.org
 Direct access to the CyberTipline for leads relating to child sexual exploitation; phone number is 1‐800‐843‐5678. www.cybertipline.com
 Perverted Justice Group ‐ Ad‐hoc group that poses as underage children in chat rooms to identify predators. www.perverted‐justice.com  The Cyber Law Enforcement Organization – www.CyberLawEnforcement.org
71
Louisiana Sex‐Offender Registration and Notification • Facebook, more than 500 million active users, an increase of 16.6% since in 2009; 145% increase since 2010.
 Louisiana State Police Information  State Sex‐Offender and Child‐Predator Registry  PO Box 66614, Box A‐6  Baton Rouge, LA 70896‐6614  Telephone: 225‐925‐6100 or 1‐800‐858‐0551  E‐mail: [email protected]
 http://www.lasocpr.lsp.org/socpr/ Dr. Kim Mason, 2012
• Users spend over 700 billion minutes per month on Facebook; over 200 million users access through their mobile devices. • 74% of all 7th‐12th graders say they have a profile on a SNS.
• 46% have open access to their online profile information.
• 62.0% of victims say they were bullied via SNS
12
Sexting
The process of adding geographical identification to photographs, video, websites and SMS messages.
Honesty Box
• The act of sharing flirtatious, nude or semi‐nude photos via cell phone or other means of texting device.
• The list included acronyms like the always romantic “DUM” (“Do you masturbate?”),
“FMLTWIA” (“F*** me like the whore I am”)
“IMEWZRU” (“I am easy, are you?”)
Set to Private
Only REAL Friends Only
- My status, photos, and posts
- Family and relationships
1 in 6 teens have received a “sext.”
- Photos and videos I’m tagged in
- Birthday
- Permission to comment on your posts
Absolutely ONLY positive
personal/private - Contact information
information
Vanessa Hudgens
Share a tagged post with friends of the friend I tag
http://www.reclaimprivacy.org/facebook
Dr. Kim Mason, 2012
13
Why do Youth ‘Sext’?
 82.2% said to get attention
 66.3% said to be “cool”
 59.4% said to be like the popular girls
 54.8% said to find a boyfriend
 Peer pressure ( 52%‐Boys) (23%‐Friend)  Teen “romance” –
expression of shared intimacy with partner
 Flirting or relationship currency






Revenge after a breakup
Blackmail
Impulsive behavior
Special present
Joke
Think it will remain private
 “Truth or Dare” (normative game gone very wrong)
 Bullying or intimidation (“pranks”)
HB 1458: ACT 755 (2010): Louisiana Schools Accountability Law
 By January 1, 2011, public schools must conduct a review of the student code of conduct amend such code to assure that the policy prohibiting the harassment, intimidation, and bullying of a student by another student to include cyberbullying.  Inform each student, in writing within 10 days, after enrolling in school of the prohibition against such incidents; the nature and consequences of such actions; and the proper process and procedure for reporting any incidents involving such prohibited actions.
 Develop and adopt a policy establishing procedures for the investigation of reports.
 Document the details of each reported incident of harassment intimidation, and bullying, including cyberbullying.
 Report all such documented incidences to the Department of Education
Sexting ‐ Serious Consequences
(c) 2011, Russell A. Sabella, Ph.D.
83
HB 1357: Act 993 (2010):“Sexting”
 It is a crime for anyone under the age of 17 to send an indecent visual depiction of himself/herself to another person via an electronic device.
 It is also a crime for a person under the age of 17 to possess or transmit an indecent visual image transmitted by another under the age of 17.
 1st Offense: fined $100‐$200 dollars and/or imprisoned for 10 days (suspended with 16 hours of community service)
 2nd Offense: fined $250‐$500 dollars and/or imprisoned for 10 ‐ 30 days (suspended with 40 hours of community service)
 3rd Offense: fined $500‐$750 dollars and/or imprisoned for 30 days‐
6 months (suspended with 80 hours of community service)
Dr. Kim Mason, 2012
14
Michael Phelps
first day at
work. omg!!
So dull.
Will she get the job when her potential employer
Googles her
name?
86
(c) 2011, Russell A. Sabella, Ph.D.
http://www.examiner.com/x-260-Seattle-ParentingExaminer~y2009m3d1-Teenage-fired-forcomplaining-on-Facebook---teaching-teens-tothink-before-the-write?comments=true
Miley Cyrus –
Does she regret it now?
Dr. Kim Mason, 2012
15
Facebook and College Admissions
Fostering good communication means no
“freaking out”
A new survey from Kaplan Test Prep reveals that 82
percent of admissions officers use Facebook in their recruiting.
Thursday, March 3, 2011
They are never really anonymous
Develop a deeper understanding of kids’:
online activities
Internet environments
use of the Net to explore roles and identity
Learn about the Internet by asking kids to teach you
everything they know
Use the Internet environments
and technological tools
yourself
Dr. Kim Mason, 2012
16
Word of Caution
Being rational or logical with adolescents may not work .. But try it!
What else YOU Can Do
 Provide structure and rules about being online:
 Only after homework is complete;
 On the average, for no more than 3 hours per day;
 For the very young, all web sites must be parent approved before visiting;
 “Report any suspicious activity”
Contact the Service Provider
Supervise
Preserve evidence, as this is crucial for making a case and identifying the bully.
Mobile phone operator
Internet service provider
Chatroom provider
Usually there is an abuse team contact Have the computer in a shared space Keep access to children’s files
Talk about their computer use
Monitor behavior and mood
Keep talking
Promote responsibility‐taking
Provide scripts
Use Technology to Block
Work with Police
Work with School
Get savvy
Use Spyware and anti‐virus
Use Blocking, a filtering technology if available, e.g. blocking user on IM and make sure blocking is up‐to‐date
Death threats or threats of other form of violence to a person or property; Any evidence of
sexual exploitation
Take Home School Agreements seriously
Get in touch about concerns
Support with incidents
Preserve the Evidence
1
4
2
5
3
6
Supervision & Restriction
Children under 10 should not be
surfing the Net alone
Keep Internet-connected computers
out of kids’ rooms and in a highly
visible area
Tasks can’t be performed effectively
when multi-tasking
No mental “downtime” to relax and
reflect
Kids with their own Internet
connection spend twice
as much time online
Dr. Kim Mason, 2012
Teach Cyberethics
Teach Chatroom Netiquette
Think Before Posting
17
Chatroom Netiquette Follow the “rules of the road”
1. Avoid Using ALL CAPS ‐ It’s considered yelling.
2. Decide What Tone the Conversation Has Before Posting ‐ Don't use offensive language or nicknames. Always avoid making personal attacks and calling names. 3. Don't "Flood" the Chatroom ‐ Flooding is repeating messages over and over, or filling the screen with gibberish, in order to impede communication in the chatroom. 4. Be Nice to Newbies ‐ Remember your first chats? If someone stumbles into your chat, who is obviously new to this medium, show some patience and help him or her get the hang of it. Think Before They Post
Character is what you do when no one is watching. Use Power Responsibly
Be Yourself
•When you are online, you‛re in control. Don‛t spread rumors, take things (like music, movies, etc.) that don‛t belong to you, or forward spam e‐mails.
•Don‛t pretend to be someone you aren‛t while online.
Respect Other’s Privacy
•Don‛t reveal secrets online or blab stuff like passwords, names, etc. This includes your own private information.
Don’t Hurt Other’s Feelings
•When you are online, people can‛t tell when you‛re joking. If you say or write something online, make sure you are clear if you are joking.
Respect other’s Online Rights
Don’t respond if Someone Insults You
Dr. Kim Mason, 2012
•Just like offline, don‛t say mean things or make threats.
•It could be that they didn‛t think before they said it. But even if they meant to be insulting, don‛t make it worse. Just ignore it.
18
Monitoring Programs
 Install extra security such as blocking, filtering, and key logging software.  Net Nanny
 CyberPatrol
 Safe Eyes
 CyberSitter
 PC Tattletale
For Internet Filter Reviews visit
http://internet‐filter‐review.toptenreviews.com/?ttreng=1&ttrkey=internet+filter
Intervention with Aggressor ...
CyberBully Alert –
www.cyberbullyalert.com
 STOP
 Think about your personal values. What are your beliefs about the way others should be treated?
 THINK
 About your reasons for bullying and alternative ways to express your feelings.
 DECIDE
 Think about how your actions might affect others
 What do you need now so that the harm can be repaired ?
TEACH THE AGGESSOR HE/SHE HAS A CHOICE!
Dr. Kim Mason, 2012
19
(c) 2011, Russell A. Sabella, Ph.D.
115
http://www.street0.com/
www.safesocial.com
Find everything about you online & Protect your personal data Remove your personal information off people search databases and control your mailbox from unwanted mail with MyPrivacy. ($7.95/month)
Parental Control Software for Mobile Phones
Mobile Spy and Mobile Nanny is a hybrid software/service which allows you to monitor your child's compatible phone in real time. This unique system allows you to monitor activities online and block activities you do not want to happen. 




You'll know where your kids have social networking accounts Displays the pictures the child is tagged in Shows who they are friends with online.
Checks out their online friends against more than 50 databases Automatically notified if dangerous situations or inappropriate words are mentioned in posts (trigger words include "drug," "suicide" or "violence") Dr. Kim Mason, 2012
Silently record every SMS message. View information about every call. See GPS positions every thirty minutes. View all photos and videos taken by the phone. See all the log results in your SSL Secured online account. www.mobilespytool.com
www.mobilenanny.com
20
Google Alerts
Circumventing the Systems
Set Parental Controls
 Peacefire.org is the world's  For Example: How to install largest distribution network for the Circumventor program, proxy sites to circumvent which gets around all Web‐
Internet censorship
blocking software.
 2.2 million subscribers as of April  Is MouseMatrix.com already 2011
blocked for you because it's  Filtering options restrict access; been widely known for so however, students are long? This is how you create circumventing the systems
(click embedded link) your  Student are circumventing filters own semi‐private URL for www.freeproxy.ru/en/free_proxy/cgi‐
getting around blocking proxy.htm; www. proxify.com; www.vtunnel.com; http://proxy.org software.
unblockmyspace.com; www.guardster.com; www.ztunnel.com; Wireless
Connection
What can it mean if history, keyword or temporary Internet files are cleared?
Monitor Laptop Activity
Dr. Kim Mason, 2012
21
Kimberly Mason, Ph.D., LPC, NCC
University of New Orleans
[email protected]
Dr. Kim Mason, 2012
22