7 Social Media Safety Tips for Kids*

Total Page:16

File Type:pdf, Size:1020Kb

7 Social Media Safety Tips for Kids* 7 Social Media Safety Tips for Kids* Whether they use Club Penguin or Facebook, read up on these social media safety tips for kids From Club Penguin to Facebook, the ever-increasing presence of social media in kids' lives has prompted the American Academy of Paediatrics to issue a new report aimed at moms and dads. “The digital world is an evolving landscape that parents have to learn to navigate,” says co-author Kathleen Clarke-Pearson, M.D. Social networking certainly has its advantages. It strengthens connections with friends and family and encourages participation in community service, collaboration on school projects, and communication with coaches and teammates. It can even help kids who don't quite “fit in” foster their identity and unique social skills. How does it go wrong? Impulsive kids may comment on an inappropriate post without thinking, which can snowball and become very hurtful, says Dr. Clarke-Pearson. Here, some ways to help your child use social media appropriately: 1. Immerse yourself. Know how to create a profile, “friend” your child, and be a part of his online life. He may insist that you don't embarrass him by posting comments his friends can see, but that's okay. You still get a window into his world. 2. Be a model. If you're constantly on the cell or computer, your tween will want to be, too. 3. Power down. Insist that meals be device-free and set a reasonable bedtime. 4. Chat him up. Don't rely solely on a “net nanny” software program to keep your kid from questionable sites. Talk about your and his social-media experiences. 5. Go public. Keep the computer centrally located in the family room or kitchen. 6. Be kind. Discourage meanness, gossiping, and posting anything that's untrue or potentially harmful. 7. Take action. For more info, go to cybersafebook.com. * Acknowledgements - http://www.parenting.com/article/social-media-safety Whether we like it or not, there are social networks and apps that our children use with free abandon. Below are some that we have found for parents to look out for: 4chan.org Probably a collection of the worst of the Internet in one place. Users are mostly anonymous. 8chan (8ch.net) On 8chan, you can create an imageboard for free with no experience or programming knowledge needed, which can result in extremely inappropriate content. 9Gag.com An image/social board that consists mostly of very inappropriate content. After School Advertised as “Funny Anonymous School News For Confessions & Compliments” in the AppleStore, this anonymous app by Ambient is much like YikYak and Whisper. This app allows sexual and graphic images. Learn more about AfterSchool in this Safe Smart Social video. Airtime This mobile app is a video-based chat and is advertised as almost feeling like being in the same room as your friend. Appear.in A registration-free video chatting site. Also a mobile app. ASKfm ASKfm is a social network where members interact by inviting others to ask anonymous questions. ASKfm has a Safety Center to “empower users with the information, guidance and tools they need to navigate safely and enjoy the service.” Watch this Safe Smart Social video to learn more. Avocado A chatting app for couples. Users can share pictures, calendars, chat privately and doodle on photos. Backpage.com A classified advertising website launched in 2004 notorious for allowing ads that sell children for sex (sex trafficking). Badoo Mobile messaging. Less popular than Whatsapp or Kik. Bebo This is an older, defunct website that has relaunched as an app on both Android and iOS. The main component is video group chatting. Utilizing your contacts, it adds people to your friends’ list. Best Secret Folder An iOS app that is used if you don’t want anyone to know that you downloaded a privacy app. The icon is disguised as “My Utilities,” so no one will ever guess there are private photos tucked away in your phone. There is an “Intruder stopper” option plays fake video upon opening. Bubble A private messaging app that takes from your existing social media profiles and adds them to your “bubble.” The content is posted for all of your friends to see. Direct messaging is one of the main features of this app. Burn Note A texting app that erases messages after a set period. Messages are stored until first viewed and then deleted. Chatbulb.com A free web-based chat room. Enter any username of your choice and start chatting. There is no signup or age verification. The usernames are often sexually graphic. ChatRoulette.com This website allows people to anonymously video chat online with anyone and without any security blocks or filters. Frequently people are unclothed in the chats. Creepypasta Internet horror stories passed around on forums and other sites to disturb and frighten readers. Includes stories from Slender Man, a fictional character that inspired two 12-year-old Wisconsin girls to stab and nearly kill a friend. Disney LOL An app designed especially for kids that mimics most social media apps, but consists entirely Disney-related content. Disney Mix An app designed by Disney for safe messaging with your friends. There are strict community guidelines and the app has 24-hour support moderation. DOWN – Dating Formerly named Bang With Friends it has been criticized for not delivering what it promises for adults 18 and older. The premise of the website is to setup discrete sexual encounters with Facebook friends. Those friends only know about somebody’s interest when they reciprocate through the app. Down to Lunch An app used for inviting a group of friends to a particular place or event. There have been rumours about the app being connected to sex trafficking, but the makers assure they are not true. The comments by some teenagers who use it mention that scheduled fights, rumours and sexual encounters are often found on the app. Ello Basically, Tumblr meets Pinterest. This site caters to artists who want to reach out to a broader audience. It has a “Not Safe For Work” (NSFW) mode and does not ask for age at sign up. Facebook & Facebook Messenger A leading social network. Facebook Messenger allows for photo and video exchange as well as phone calls. Learn more about Facebook in this Safe Smart Social video. Access the Parent’s Guide to Facebook from CyberWise. Fess An anonymous app for high schoolers to post confessions. Users are validated that they’re in high school through their Facebook accounts. FireChat App that lets users chat without an internet or phone connection. FireChat uses a hidden iOS feature known as Multipeer Connectivity Framework (MCF) to relay messages instead of sending messages using a mobile signal. The free app creates its own network where each mobile device on it becomes a ‘node.’ Foursquare Goal-based location sharing. Kids can share their exact location to a public audience at any time. Gallery Lock An Android app used to hide photos. It lets you put the app icon in “Stealth Mode,” so it doesn’t appear on your phone. It will also catch a photo of any intruder with your phone’s front-facing camera after three failed password attempts. Google Duo Duo is a very easy to use 1-to-1 video chatting app. It can be used over cellular data as well as Wi-Fi. Grom Social An online social networking website for kids between the ages of 5–16 years. Founded with the intention of creating a safe social networking site for kids. Groupme For iOS and Android, this app is a group texting app that can also be used through your native SMS. Happn This app saves the profiles of other users if you are in the same vicinity. Happn has a mature rating. Features include sending secret likes as well as “charms.” Hater A dating app targeted at millennials with the concept that it can match users with someone based on what each user hates. Instead of swiping on people, you swipe on topics Hello For both iOS and Android, this app contains categories of interests you can pick from. Based on what you like, post and the response from the community you will move up or down the leaderboard. Hide It Pro An Android and iOS app disguised as a fully functional audio manager. It’s a secret vault that protects all your secret content. The program will disappear from the recent apps list, too, leaving all tracks covered. Hitwe A free dating app available on Apple and Android. The app seems to be riddled with spambots. One of the promotional elements involves meeting the people you discover and contains location information. IMVU This site is a virtual world where users control their avatars to navigate and chat with other users. There are over 50 million accounts and the site continues to grow. Instagram Users can post photos and have their followers comment. Recently Instagram has been in the news regarding its growing popularity for trading or selling drugs online. KeepSafe A simple Android and iOS app with basic password protection for photos and videos. Capable of sending ‘self-destructing’ photos to others. Kik An instant message app that also allows photo sharing. It is loaded with sex and porn spammers. Kik also announced Kin, a digital currency for use on its platform; based on the ethereum blockchain, the value of Kin is expected to rise as more people use the service. Gaggle has seen many incidents via this app with inappropriate photos. Watch a real story about an incident on Kik involving a real student.
Recommended publications
  • DETECTING BOTS in INTERNET CHAT by SRITI KUMAR Under The
    DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR (Under the Direction of Kang Li) ABSTRACT Internet chat is a real-time communication tool that allows on-line users to communicate via text in virtual spaces, called chat rooms or channels. The abuse of Internet chat by bots also known as chat bots/chatterbots poses a serious threat to the users and quality of service. Chat bots target popular chat networks to distribute spam and malware. We first collect data from a large commercial chat network and then conduct a series of analysis. While analyzing the data, different patterns were detected which represented different bot behaviors. Based on the analysis on the dataset, we proposed a classification system with three main components (1) content- based classifiers (2) machine learning classifier (3) communicator. All three components of the system complement each other in detecting bots. Evaluation of the system has shown some measured success in detecting bots in both log-based dataset and in live chat rooms. INDEX WORDS: Yahoo! Chat room, Chat Bots, ChatterBots, SPAM, YMSG DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR B.E., Visveswariah Technological University, India, 2006 A Thesis Submitted to the Graduate Faculty of The University of Georgia in Partial Fulfillment of the Requirements for the Degree MASTER OF SCIENCE ATHENS, GEORGIA 2010 © 2010 Sriti Kumar All Rights Reserved DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR Major Professor: Kang Li Committee: Lakshmish Ramaxwamy Prashant Doshi Electronic Version Approved: Maureen Grasso Dean of the Graduate School The University of Georgia December 2010 DEDICATION I would like to dedicate my work to my mother to be patient with me, my father for never questioning me, my brother for his constant guidance and above all for their unconditional love.
    [Show full text]
  • Expectation of Privacy in Internet Communications
    Fourth Amendment Aspects of Internet Communications and Technology Dennis Nicewander Assistant State Attorney 17th Judicial Circuit Ft. Lauderdale, Florida The emergence of Internet technology has revolutionized the world of communication and information sharing. Unfortunately, criminals have seized this opportunity to enhance the efficiency and productivity of their criminal pursuits. The task ahead of law enforcement is daunting, to say the least. New forms of technology emerge before we are able to master the old ones. The most significant legal issue to arise in this struggle to make order out of chaos is the application of the Fourth Amendment to these emerging technologies. If our economy is going to continue to grow at the rapid pace promised by Internet technology, we must find a way to balance our citizens‟ right to privacy with the necessity of establishing law and order in this new frontier. As our culture and legal system suffer the growing pains of radical change, it is responsibility of prosecutors to work together with law enforcement to strike a balance between effective police work and privacy rights afforded by the Fourth Amendment. Understanding the role of “reasonable expectation of privacy” is critical to this role. Since most information placed on the Internet is designed for mass distribution, a reasonable expectation of privacy will not apply in the majority of cases. The purpose of this paper is to provide basic guidance and case law concerning this issue as it relates to some of the most common forms Internet technology. The topics will be divided into the following categories: General Privacy Cases Email Chatrooms Peer-to-Peer Internet Service Provider Records Websites Bulletin Boards University Usage Logs Text Messages General Privacy Cases Katz v.
    [Show full text]
  • Free, Hateful, and Posted: Rethinking First Amendment Protection of Hate Speech in a Social Media World
    Boston College Law Review Volume 60 Issue 7 Article 6 10-30-2019 Free, Hateful, and Posted: Rethinking First Amendment Protection of Hate Speech in a Social Media World Lauren E. Beausoleil Boston College Law School, [email protected] Follow this and additional works at: https://lawdigitalcommons.bc.edu/bclr Part of the First Amendment Commons, and the Internet Law Commons Recommended Citation Lauren E. Beausoleil, Free, Hateful, and Posted: Rethinking First Amendment Protection of Hate Speech in a Social Media World, 60 B.C.L. Rev. 2100 (2019), https://lawdigitalcommons.bc.edu/bclr/vol60/iss7/6 This Notes is brought to you for free and open access by the Law Journals at Digital Commons @ Boston College Law School. It has been accepted for inclusion in Boston College Law Review by an authorized editor of Digital Commons @ Boston College Law School. For more information, please contact [email protected]. FREE, HATEFUL, AND POSTED: RETHINKING FIRST AMENDMENT PROTECTION OF HATE SPEECH IN A SOCIAL MEDIA WORLD Abstract: Speech is meant to be heard, and social media allows for exaggeration of that fact by providing a powerful means of dissemination of speech while also dis- torting one’s perception of the reach and acceptance of that speech. Engagement in online “hate speech” can interact with the unique characteristics of the Internet to influence users’ psychological processing in ways that promote violence and rein- force hateful sentiments. Because hate speech does not squarely fall within any of the categories excluded from First Amendment protection, the United States’ stance on hate speech is unique in that it protects it.
    [Show full text]
  • Tiktok Y La Creación De Marca Personal
    Tiktok y la creación de marca personal Tiktok y la creación de marca personal 1. ÍNDICE - ¿Qué es TikTok? - Historia de TikTok - Evolución de TikTok y expansión imparable (boom durante la pandemia) - Target principal de TikTok (más que la Generación Z) - Las claves del éxito de TikTok - Cómo publicar en TikTok - Consejos para publicar en TikTok - TikTok y su gran engagement - Inversión publicitaria y formatos de anuncios de TikTok - Pasos para hacer una campaña de publicidad serfserve en TikTok - La alianza de TikTok con Shopify: e-commerce - ¿Qué son y para qué sirven el Video Template, Automated Creative Optimisation y Smart Video Soundtrack? - Ventajas de activar una cuenta PRO en TikTok - Otras opciones de privacidad y seguridad en TikTok - Desintoxicación digital: ‘Gestión de Tiempo en Pantalla’, ‘Sincronización familiar’, ‘Modo Restringido’ - Estrategia de influencers, fondo de creadores y compra de monedas virtuales (programa Diamante) - Influencers que más ganan en TikTok - Verificación de cuentas en TikTok - Rumores de espionaje y censura - Cómo crear tu imagen de marca personal en TikTok - Conclusión 2. ¿QUÉ ES TIKTOK? TikTok es una red social china que nace en 2016 y que se basa en la publicación de vídeos cortos y verticales (de entre 3 y 60 segundos) en los que la música y el baile juegan un papel destacado. En China mantiene el nombre original de DouYin, pero en 2018 se extendió por todo el planeta con el nombre de TikTok tras su fusión con la app Musical.ly. Actualmente, se ha convertido en una de las apps más descargadas del mundo por su afinidad y popularidad entre los jóvenes de la Generación Z (nacidos entre 1994 y 2010) y un público de edad cada vez más amplio a raíz del aumento de su popularidad durante la pandemia del Covid- 19.
    [Show full text]
  • Helpful Definitions
    HELPFUL DEFINITIONS Internet – an immense, global network that connects computers via telephone lines and/or fiber networks to storehouses of electronic information. With only a computer, a modem, a telephone line and a service provider, people from all over the world can communicate and share information with little more than a few keystrokes. Bulletin Board Systems (BBSs) – electronic networks of computers that are connected by a central computer setup and operated by a system administrator or operator and are distinguishable from the internet by their “dial up” accessibility. BBS users link their individual computers to the central BBS computer by a modem which allows them to post messages, read messages left by others, trade information, or hold direct conversations. Access to a BBS can, and often is, privileged and limited to those users who have access privileges granted by the systems operator. Commercial Online Service (COS) – examples of COSs are America Online, Prodigy, CompuServe and Microsoft Network, which provide access to their service for a fee. COSs generally offer limited access to the internet as part of their total service package. Internet Service Provider (ISP) – These services offer direct, full access to the internet at a flat, monthly rate and often provide electronic mail service for their customers. ISPs often provide space on their servers for their customers to maintain World Wide Web (WWW) sites. Not all ISPs are commercial enterprises. Educational, governmental and nonprofit organizations also provide internet access to their members. Public Chat Rooms – created, maintained, listed and monitored by the COS and other public domain systems such as Internet Relay Chat.
    [Show full text]
  • JMP Securities Elite 80 Report (Formerly Super 70)
    Cybersecurity, Data Management & ,7 Infrastructure FEBRUARY 201 ELITE 80 THE HOTTEST PRIVATELY HELD &<%(5SECURITY, '$7$0$1$*(0(17 AND ,7,1)5$6758&785( COMPANIES &RS\ULJKWWLWLSRQJSZO6KXWWHUVWRFNFRP Erik Suppiger Patrick Walravens Michael Berg [email protected] [email protected] [email protected] (415) 835-3918 (415) 835-8943 (415)-835-3914 FOR DISCLOSURE AND FOOTNOTE INFORMATION, REFER TO JMP FACTS AND DISCLOSURES SECTION. Cybersecurity, Data Management & IT Infrastructure TABLE OF CONTENTS Executive Summary ............................................................................................................................ 4 Top Trends and Technological Changes ............................................................................................ 5 Funding Trends ................................................................................................................................ 11 Index by Venture Capital Firm .......................................................................................................... 17 Actifio ................................................................................................................................................ 22 Alert Logic ......................................................................................................................................... 23 AlgoSec ............................................................................................................................................ 24 AnchorFree ......................................................................................................................................
    [Show full text]
  • A Linguistic Analysis of Their Written Discourse
    Spanish politicians in Twitter : A linguistic analysis of their written discourse Ricardo Casañ Pitarch Universitat Politècnica de València (Spain) [email protected] Abstract In Spain, politics is often seen as a profession rather than a service, and thus political discourse should be considered a specialized genre subjected to specific rules and convention. In the 2010s, a new tendency to campaign in politics was the use of social networks, allowing the publication of messages in a virtual environment and the possibility of interacting with other users, Twitter being a popular network. The purpose of this research is to analyze a corpus of 630 tweets published by four Spanish political leaders in their personal Twitter accounts, and consequently to describe their communication style in this social network with the hypothesis that their political views and interests influence their messages. In order to achieve our aim, this research focused on the analysis of written text, emoji, multimedia affordances, and hashtags, and how these elements influenced the politicians’ communication style when dealing with some relevant topics at the time this study was carried out. Keywords: written discourse, Spanish politicians, social networks, Twitter, communication. Resumen Los políticos españoles en Twitter: un análisis lingüístico de su discurso escrito En España, la política suele concebirse como una profesión más que como un servicio, y, por ello, el discurso político debe interpretarse como un género especializado que está sometido a una serie de reglas y convenciones específicas. En la década de los años 2010 surgió una nueva manera de hacer campaña en política mediante el uso de las redes sociales, las cuales permitían la publicación de mensajes cortos en un entorno virtual y la posibilidad de interactuar con otros usuarios.
    [Show full text]
  • Systematic Scoping Review on Social Media Monitoring Methods and Interventions Relating to Vaccine Hesitancy
    TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy www.ecdc.europa.eu ECDC TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy This report was commissioned by the European Centre for Disease Prevention and Control (ECDC) and coordinated by Kate Olsson with the support of Judit Takács. The scoping review was performed by researchers from the Vaccine Confidence Project, at the London School of Hygiene & Tropical Medicine (contract number ECD8894). Authors: Emilie Karafillakis, Clarissa Simas, Sam Martin, Sara Dada, Heidi Larson. Acknowledgements ECDC would like to acknowledge contributions to the project from the expert reviewers: Dan Arthus, University College London; Maged N Kamel Boulos, University of the Highlands and Islands, Sandra Alexiu, GP Association Bucharest and Franklin Apfel and Sabrina Cecconi, World Health Communication Associates. ECDC would also like to acknowledge ECDC colleagues who reviewed and contributed to the document: John Kinsman, Andrea Würz and Marybelle Stryk. Suggested citation: European Centre for Disease Prevention and Control. Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy. Stockholm: ECDC; 2020. Stockholm, February 2020 ISBN 978-92-9498-452-4 doi: 10.2900/260624 Catalogue number TQ-04-20-076-EN-N © European Centre for Disease Prevention and Control, 2020 Reproduction is authorised, provided the
    [Show full text]
  • Muusic: Mashup De Servicios Musicales
    Universidad Carlos III de Madrid Campus de Colmenarejo Ingeniería Técnica en Informática de Gestión Proyecto de Fín de Carrera Muusic: mashup de servicios web musicales Alumno: Félix Manuel Lamazares Montes Tutor: César de Pablo Sánchez Noviembre de 2008 2 Agradecimientos Quiero agradecer el apoyo de mi familia durante todos mis estudios: a mis padres Manolo y Maria Jesús; y a mi hermana Paloma. Gracias por ayudarme con la carrera. Gracias a mi padre por leer toda la memoria para corregir errores ortográficos. Gracias a mi tutor César que me ha ayudado mucho; y me ha dado ánimo en momentos de estrés. Gracias también a Pilar y a todos mis amigos que siempre están ahí. 3 0. Índice 0. Índice ............................................................................................................................ 4 1. Introducción.................................................................................................................. 6 1.a. Prefacio.................................................................................................................. 7 1.a.i. Multimedia....................................................................................................... 7 1.a.ii. Servicios Web................................................................................................. 7 1.b. Ámbito................................................................................................................... 8 1.c. Objetivos...............................................................................................................
    [Show full text]
  • Trojans and Malware on the Internet an Update
    Attitude Adjustment: Trojans and Malware on the Internet An Update Sarah Gordon and David Chess IBM Thomas J. Watson Research Center Yorktown Heights, NY Abstract This paper continues our examination of Trojan horses on the Internet; their prevalence, technical structure and impact. It explores the type and scope of threats encountered on the Internet - throughout history until today. It examines user attitudes and considers ways in which those attitudes can actively affect your organization’s vulnerability to Trojanizations of various types. It discusses the status of hostile active content on the Internet, including threats from Java and ActiveX, and re-examines the impact of these types of threats to Internet users in the real world. Observations related to the role of the antivirus industry in solving the problem are considered. Throughout the paper, technical and policy based strategies for minimizing the risk of damage from various types of Trojan horses on the Internet are presented This paper represents an update and summary of our research from Where There's Smoke There's Mirrors: The Truth About Trojan Horses on the Internet, presented at the Eighth International Virus Bulletin Conference in Munich Germany, October 1998, and Attitude Adjustment: Trojans and Malware on the Internet, presented at the European Institute for Computer Antivirus Research in Aalborg, Denmark, March 1999. Significant portions of those works are included here in original form. Descriptors: fidonet, internet, password stealing trojan, trojanized system, trojanized application, user behavior, java, activex, security policy, trojan horse, computer virus Attitude Adjustment: Trojans and Malware on the Internet Trojans On the Internet… Ever since the city of Troy was sacked by way of the apparently innocuous but ultimately deadly Trojan horse, the term has been used to talk about something that appears to be beneficial, but which hides an attack within.
    [Show full text]
  • ISPA International Society for the Performing Arts
    International Society for the ISPA Performing Arts TODAY’S FUTURE FOR THE ARTS NEW YORK CONGRESS JANUARY 8–10, 2019 Theatre buildings by theatre people for theatre people. Clockwise from top left: Linbury Theatre, Royal Opera House; The Yard at Chicago Shakespeare Theater; Hudson Theatre, Broadway; Studio Theatre, Bristol Old Vic. MESSAGE FROM THE CHAIR OF ISPA Dear Friends, ransitions. We all think about them. Some of us worry about them. But we are all impacted by them. As much as we may try to be present each moment of our days, it is the rare person who does not ponder what comes next. Transitions can be as exhilarating as they are scary. In these times of rapid-fire change and volatility (mostly beyond our personal control), it is Teasy to default to a position of wanting to hang on to what we know. Stay the course. Be steady. Reduce risk. WELCOME Yet continuing to do the same thing that works for us today may be the very act that fails us tomorrow. Our Congress Co-chairs Collette Brennan and Steinunn Ragnarsdóttir have given us a brilliantly provocative theme to consider with an array of thought-leaders from within our field and beyond offering varied perspectives on how we might navigate the inevitability of the transitions we encounter. For me, transitions is a particularly apt theme as I prepare to pass on the chairmanship of ISPA to our colleague Tisa Ho. As an ISPA member for 20 years and board member for most of that time, I have been fortunate to work with so many gifted members who have given selflessly in leading ISPA through incredible Transitions.
    [Show full text]
  • Public Poll Findings and Methodology
    PUBLIC POLL FINDINGS AND METHODOLOGY Misinformation around U.S. Capitol unrest, election spreading among Americans New Ipsos poll shows Capitol rioters viewed as “criminals,” “right-wing terrorists,” but views divided sharply along partisan lines Topline Findings Washington, DC, January 19, 2021 – In the wake of the January 6th storming of the U.S. Capitol, Ipsos took another look at beliefs toward misinformation and election-related conspiracy theories. There is over a 60-point gap between Democrats and Republicans regarding whether Joe Biden legitimately won the 2020 presidential election, a sign of how politically divided this country is, and what facts we are willing to accept. Following the attack last week, most Americans see the people who entered the Capitol as criminals or right-wing domestic terrorists and, as a result, support the suspension of the president’s social media accounts. Detailed Findings 1. Most of the American public views the people who entered the Capitol as criminals or right-wing domestic terrorists. A plurality support social media outlets removing President Trump and QAnon accounts as a result of the event. • Nearly one in three (31%) say they are criminals, and 26% say they are right-wing terrorists. • Just four percent believe they are patriots who were fighting to preserve our freedoms. • News consumption plays a role in views of the events, as does partisanship. • For example, one in four who get their news from FOX or conservative online outlets believe they were left-wing terrorists or Antifa, compared to just 7% of CNN or MSNBC viewers. Forty-five percent of Democrats see these people as right-wing domestic terrorists, while 10% of Republicans feel the same.
    [Show full text]