Quick viewing(Text Mode)

Bully Behaviors and Prevention for Parents

Bully Behaviors and Prevention for Parents

Bully Behaviors and Prevention for Parents:

Presenter: Rod Pruitt, MA Web Resource for Bullying • Federal Government Resource for Bullying- www.bullyinginfo.org • State Initiative for Bullying Prevention- www.esc14.net/default.aspx?name=bullying or http://tinyurl.com/Reg14bully • Texas School Safety Center- http://www.txssc.txstate.edu/K12/downloads-videos Bullying by the numbers • Each day 160,000 students miss school for fear of being bullied.

• Research shows that bullying can be a sign of other serious antisocial or violent behavior. Children and youth who frequently bully their peers are more likely than others to get into frequent fights, be injured in a fight, vandalize or steal property, drink alcohol, smoke, be truant from school, drop out of school, and carry a weapon (Nansel et al., 2003; Olweus, 1993).

• Bullying creates a climate of fear and disrespect in schools and has a negative impact on student learning (NEA1, 2003). References

• 25 percent of teachers see nothing wrong with bullying or putdowns and consequently intervene in only 4 percent of bullying incidents (Cohn & Canter, 2002).

What Is Bullying? • A behavior that is: – Written or Verbal expression – Expression through Electronic means – Or Physical conduct

• That occurred: – On school property – At a school sponsored or school related activity – Or in a vehicle operated by the district

• That Either/Or: – Has the effect of will have the effect of Physically harming a student – Damages a student’s property – Or places the student in reasonable fear of harm to the student’s person or of damage to the student’s property; • Or the conduct is sufficiently severe, persistent and pervasive that it creates and educational environment that is: – Intimidating – Threatening – Or Abusive

• This Behavior: – Exploits an Imbalance of power between the student perpetrator and the student victim through: – Written or Verbal expression or Physical conduct

• This Either or: – Interferes with the student education – Or Substantially Disrupts the operation of a school

Bullying Behavior Chart Bullying behaviors can be described under four headings:

Physical Social Emotional Cyber

• Bullying Behavior: Verbal or Nonverbal and Range From Less to More Severe

• From teasing to extortion to death threats.

• From dirty looks to ostracizing

No-Bullying Program Parent Pamphlet Bully Reports by the Numbers

67% Told a Friend 22% Told a parent or family member 20% Told no one 11% Told a teacher

Presentation by Schwartz and Eichelbaum- Harassment: Bullying, Cyber-bullying and Sexting e-Bully • Pass word protection • Social Networking Disclosure • Proper online conduct

If you are being hurt online • Parent- Always report to a parent • Principal- Report it to a principal if it happens on school ground, during school time, on school equipment, or disrupts the learning environment • Police- Report to police if the person has stated they will physically harm you or encourages you to harm yourself.

Warning Signs of Being Cyber Bullied • unexpectedly stops using the computer • appears nervous or jumpy when an Instant Message, text message, or email appears • appears uneasy about going to school or outside in general • appears to be angry, depressed, or frustrated after using the computer • avoids discussions about what they are doing on the computer • becomes abnormally withdrawn from usual friends and family members

Rod Pruitt, MA- [email protected]

SECTION 1. Chapter 33, Penal Code, is amended by adding Section 33.07 to read as follows:

Sec. 33.07. ONLINE HARASSMENT. (a) A person commits an offense if the person uses the name or persona of another person to create a web page on or to post one or more messages on a commercial social networking site : (1) without obtaining the other person’s consent; and (2) with the intent to harm, defraud, intimidate, or threaten any person. (b) A person commits an offense if the person sends an electronic mail, instant message, text message, or similar communication that references a name, domain address, phone number, or other item of identifying information belonging to any person: (1) without obtaining the other person’s consent; (2) with the intent to cause a recipient of the communication to reasonably believe that the other person authorized or transmitted the communication; and (3) with the intent to harm or defraud any person. (c) An offense under Subsection (a) is a felony of the third degree. An offense under Subsection (b) is a Class A misdemeanor, except that the offense is a felony of the third degree if the actor commits the offense with the intent to solicit a response by emergency personnel. (d) If conduct that constitutes an offense under this section also constitutes an offense under any other law, the actor may be prosecuted under this section, the other law, or both. SECTION 2. This Act takes effect September 1, 2009.

Internet Texting Bullies Convicted

Rod Pruitt, MA- Region 14 ESC Protected Work Internet Texting Bullies Convicted

Rod Pruitt, MA- Region 14 ESC Protected Work Internet Bullies Convicted Road Rules Keeping Your Personal Information Private Never give the following information online: Full Name Address (even the city you live in) Phone number (even cell phones) Name of school Friends’ names Age Photos Credit Card number or information.

Road Rules Keeping Your Personal Information Private

• “Go Stratford Spartans!!”

• “We are going to beat Snyder in the game on Friday!”

• “Jenny is going to be the best cheerleader Cooper HS ever had! Tryouts are in the gym Friday at 4:00. She is going to be awesome!”

Road Rules Keeping Your Personal Information Private • Would you put your information on a billboard? Road Rules Never Meet Face-to Face With Someone You “Meet” Online. • People are not always who they say they are.

• Many predators use social networking, games, and chat sites as a catalog to choose their next victim.

• 1 in 8 females on the internet are really males.

Road Rules Most Internet Predators follow the same process. Meet in a CHAT ROOM, Social Networking site, Game site Ask to talk in a PRIVATE ROOM, BUDDY LIST, IM, or text messaging. Talk nightly, conversation goes from general to personal Become mentor/counselor/confidant/friend E-MAIL is exchanged Photos are exchanged Letters and gifts are sent Plans are made to meet with the Predator (sometimes they help with money or travel plans) They meet Predator does what they will with the victim What puts a target in the greatest risk is engaging in sexually provocative conversations or sending or posting explicit photos or videos to people that they don't know.

Road Rules Never respond to messages that are mean, inappropriate, or make you feel uncomfortable.

If someone is angry, hostile, rude, or makes you feel uncomfortable, don’t respond and report it to a parent, principal, or policeman.

Hit Shift + Print Screen to copy the desk top and then paste it to a word document. Hit the power and home button on an iPhone to screen capture. Hit Power and Volume down or Power and Home button on most Android phone to screen capture. Now you have evidence of the threat. If it continues report them to: www.cybertipline.com or call 1-800-843-5678.

Road Rules Never respond to messages that are mean, inappropriate, or make you feel uncomfortable.

• Tell or text the person to “Stop”. Any calls or texts after that would be considered harassment if reported to the phone company or law enforcement. • Screen capture and save all texts, calls, or comments and report them to the service provider. • To record a phone call record yourself saying, “This call is being recorded” and state the date and time.

Road Rules Never respond to messages that are mean, inappropriate, or make you feel uncomfortable. • *67 calls can be traced by the phone company and law enforcement. The phone number will show up on a detailed or enhanced phone bill.

• *57 will have the phone company trace the last call and send the results to law enforcement. Nothing is done with this information until you call AT&T at 800-288-2020.

• *72 Forwards you calls to another phone. Many calls to a long distance phone number will show up on that callers phone bill and may even show on that callers caller id system.

• *77 Anonymous call rejection- rejects all calls that block caller ID. To disable the service, dial "*87."

Road Rules Never respond to messages that are mean, inappropriate, or make you feel uncomfortable. • *67 calls can be traced by the phone company and law enforcement.

• iPhone Android

Cell Phone and Texting • Set a contract with your child before you get a cell phone. • Check with the cell phone provider on parental controls. • Don’t let your child sleep with a cell phone in their room. Have them turn it in to charge at a set time each night. • Look at content. If there is no content then you could have a problem. • If your child loans their phone to a friend then everything their friend said will be blamed on your child.

Rod Pruitt, MA- [email protected]

Cyber Bully- Preteen Media Use • It’s not uncommon seen a gaggle around a phone or tablet watching YouTube, Vine, and other video content. Interactive games that allow you to post high scores are popular. Texting and photos are most likely why your preteen wants a phone. This will lead to social networking sooner. Developmentally • They don’t always connect that “anonymous behavior” is hurtful, harmful and illegal. • The tech ability is often better than their judgment. • Social pressure is strong but they do know right from wrong and what they would not want done to them. Cyber Bully- Preteen Tech Tips • Monitor technology use. See what they're posting, check their mobile messages. Mobicip and other programs let you track what your preteen is doing. • Tell your kids what to do if they're harassed. • If your kid is doing the bullying, establish strict consequences and stick to them. That also goes for cruel or sexual comments about teachers, friends, and relatives. • Chat in online games and virtual worlds can get ugly fast. Make sure your kids are respectful, because hurtful retaliation happens all the time. • Review anti-bullying controls like flagging and blocking. Cyber Bully- Preteen Talking Points • Ask preteens how it makes them feel when they see kids mistreating each other online. How would you feel if you were the target of derogatory comments? • Ask whether they would stick up for someone who was being bullied. • If your kid has ever been a bully, talk about ways to stop. • Explain that things like lying, telling secrets, and being mean still hurt in cyberspace. Cyber Bully- Middle School Media Use Social media, cell phones, and multiplayer gaming are the norm. 13 is the age social media is “legal” to start but many have an online presence already established. Information flows from the school hallways to social sites freely. Cyber bullying is experienced by all by having it done to you, seeing it done to others, or being directly a part of it. Developmentally • Acceptance and appearance to peers is high in importance. • Vying for positions socially, in sports, and academically make school and other areas rewarding and harsh at the same time. • They are less likely to tell parents or other adults about cyber bullying for fear of of have the technology taken away and grown-ups not knowing how the app or social media works.

Cyber Bully- Middle School Tech Tips • Explain what is and isn't appropriate to post -- and at this age, make sure you're on their friend list. • Remind them that all private information can be made public. Posts on friends' walls, private IMs, intimate photos, and little in-jokes can all be cut, pasted, and sent around. • It's normal for teens to explore their identity, but keep an eye on the persona they're creating. • Anonymity is never an excuse for bullying behavior. Ignoring bully behavior helps the bully and makes seem that the target deserved it. • Tell kids to think before they reveal. • Remind your teens that anything they post can be misused by someone else.

Cyber Bully- Middle School Talking Points • Discuss how your teen can be a positive force if they encounter cyber bullying. • Tell them that you'd rather know about cyber bullying than not know -- but explain that they can always confide in a teacher or another grown-up, too. • Discuss the consequences for social or discriminatory behavior (and enforce them whenever necessary). • Explain how colleges and employers might take their harsh words and use them in a way that might lower their chances for employment and education. • Explain how the phone and online service is in the parent’s name and legally you are responsible for content that is sent and received.

Cyber Bully- High School

Media Use • Teens can register for sites without your knowledge or permission, and a lot of the sites they go on encourage sharing (of music, photos, videos, etc.), socializing (with people they may not know), and (which includes video chatting). • Many have their phone 24-7 with little or no monitoring. Taking phones to bed leads to a lack of sleep, lack of impulse and emotional control ,and social media issues blowout or implode easily. Developmentally • Exploring identity comes in many forms. • Peer relationships (friendship and romantic) intensify. • Pulling away from parents is normal. • Social media with my peer makes me feel like I am a performer on the stage. Social media with my parents makes me feel like they are peeping toms. Cyber Bully- High School Tech Tips • So you can keep an eye on what's going on in their world, ask your teen to give you access to their social network and pages. • Emphasize the importance of responsible and respectful online and mobile behavior. • Remind teens to think before they self-reveal: Anything they post online -- from text to photos to videos -- can be used against them by others and tarnish their reputation and inflict emotional injury. • Remind them they aren't too old to ask for your help. There are things some kids can handle on their own, but sometimes, they just need help. Sometimes they can’t do what needs to be done because the phone is not in their name with the phone company. Cyber Bully- High School Talking Points • Ethical standards really develop at this age -- both in life and online. • Talk about how their technology is them. If it is sent from their phone, then they did it. Passwords protection, lending, loaning, or losing a phone or other technology is a big deal that needs to be dealt with quickly. • Encourage teens to stand up to bullying situations. • Talk about how they can use digital media for creative and educational purposes -- not just socializing. • Talk about how their social media sites are viewed like resume pages when colleges and employers look at them. • Talk about how things can easily be misunderstood -- jokes can be taken the wrong way, and drama can escalate quickly. Discuss ways to nip tension in the bud.

E-Bully Prevention For Teens • Don’t add fuel to the fire. If someone contacts you and says something mean or confrontational, don’t respond. Cyber bullies don’t deserve your attention - and if you refuse to participate, they might decide to move on. • Make sure it’s really a cyber bully. If you don’t reply and the person continues to harass you - or does other things like contacting your friends to talk about you, or writing bad things about you on a web page or social networking site - chances are good that you’re dealing with a cyber bully. • Don’t keep this to yourself. No one likes to think of themselves as a victim, but cyber bullies can be dangerous if they are not stopped. That’s why it’s really important to share this information - right away - with a parent, a teacher, or another trusted adult. Show them everything received. If this is related in any way to school, report the problem to a teacher or the principal. • Say “Stop!” This is where you ignore rule #1, but just once. With the help of an adult, contact the cyber bully once and tell him or her to stop bothering you. Simple as that. No explanations, no questions, just say “stop.” After you do this, don’t contact the cyber bully again. If you’re bullied through IM or chat, block the person. • Save every contact from the cyber bully. It might be tempting to delete comments that are mean or threatening, but it’s important to save each contact from a cyber bully; e- mail, copies of IM, chat logs, web pages…everything. This is evidence that you are being harassed. Be sure to keep the note you sent telling he cyber bully to stop. E-Bully Prevention For Teens • Check your rep online. If a cyber bully is writing nasty e-mails to you, don’t assume that’s all there is. Enter your name in a search engine and see what you find. If someone is writing about you online, you should try to find out what they are saying. Be sure to use at least a few different search engines since each one can provide different types of information. • Still being harassed? Take your case to the authorities. If ignoring the cyber bully doesn’t stop the harassment, start complaining. If you’ve been contacted by e-mail, notify the cyber bully’s ISP. If you’re harassed in a chat room, tell the person who runs the server. IM and similar services all have harassment policies, and they provide information about what to do and who to contact if you’re having problems with another user. Check the FAQ page of the social network. • If you receive a threat, contact the police. It is bad enough when someone says mean things about you, but if a cyber bully threatens you with harm; it’s time to alert the police. This is where saving all the cyber bully’s messages will come in handy, because it provides the evidence needed to make a case. • http://criminaljustice.state.ny.us/missing/i_safety/cyberbullying.htm

Facebook Settings • Privacy Policy: http://www.facebook.com/policy.php • There are ways to control all portions of your information • Facebook also allows you to block certain users by name or only share limited information • Visit: http://www.facebook.com/sitetour/privacy.php • A Guide to Facebook Security For Young Adults, Parents, and Educators - https://www.facebook.com/safety/attachment/Guide%20to%2 0Facebook%20Security.pdf • (from www.facebook.com)

Instagram Safety is a platform that lets users snap, edit, and share photos and 15-second videos -- either publicly or with a network of followers. Why it's popular • Instagram unites the most popular features of social media sites: sharing, seeing, and commenting on photos. Instagram also lets you apply fun filters and effects to your photos, making them look high quality and artistic. What parents need to know • Teens are on the lookout for "Likes." Similar to Facebook, teens may measure the "success" of their photos -- even their self-worth -- by the number of likes or comments they receive. Posting a photo or video can be problematic if teens post it to validate their popularity. • Public photos are the default. Photos and videos shared on Instagram are public and may have location information unless privacy settings are adjusted. can make photos even more visible to communities beyond a teen's followers. • Mature content can slip in. The terms of service specify that users should be at least 13 years old and shouldn't post partially nude or sexually suggestive photos - - but they don't address violence, swear words, or drugs.

http://m.commonsensemedia.org/blog/11-sites-and-apps-kids-are-heading-to-after-facebook Instagram Safety The single most important thing to realize is that, by default, anyone can view the photos that you upload to Instagram. • Go to your profile page (tap the Profile tab) • Scroll down to the bottom of the Profile page, where you’ll see a “Photos are private” switch • Toggle the “Photos are private” switch to ON to turn on privacy. • Once you set your profile to private, anyone who wants to see your photos will need to be your friend/follower first, meaning they’ll have to send a request and you’ll have to approve.

Instagram Safety • During the process of uploading a photo, the geo-location data of the photo you’re uploading can easily be shared with your followers if you’re not careful. • When uploading a photo, be sure to avoid tapping the button shown in this screenshot. If you do, you can always tap it again to turn it off. • Geotagging is a huge risk to your privacy online. Instagram Safety Blocking a user – • Navigate to their profile page (tap Profile > Search Instagram > Names and usernames, then search for and tap on their username). • Tap the button in the top right corner of the screen (gear icon). • Tap “Block user” to prevent the user from viewing your account.

Instagram Safety Reporting a photo – • Tap the “…” below the photo you would like to report and then “Flag for review” • Select the proper reason for reporting from the list and, if prompted, a short description.

Do not talk to people you meet on Instagram anywhere but Instagram. • Don’t talk on a chat site • Don’t text, Kik, message, email, or phone

Twitter Safety is a site that allows users to post brief, 140-character messages -- called "tweets" -- and follow other users' activities. Why it's popular • Teens like using it to share quick tidbits about their lives with friends. It's also great for keeping up with what's going on in the world -- breaking news, celebrity gossip, etc. What parents need to know • Public tweets are the norm for teens. Though you can choose to keep your tweets private, most teens report having public accounts (Pew Internet & American Life Project, 2013). Talk to your kids about what they post and how a post can spread far and fast. • Updates appear immediately. Even though you can remove tweets, your followers can still read what you wrote until it's gone. This can get kids in trouble if they say something in the heat of the moment. • It's a promotional tool for celebs. Twitter reels teens in with behind-the-scenes access to celebrities' lives, adding a whole new dimension to celebrity worship. You may want to point out how much marketing strategy goes into the tweets of those they admire.

http://m.commonsensemedia.org/blog/11-sites-and-apps-kids-are-heading-to-after-facebook Twitter Rules Content Boundaries and Use of Twitter These limitations comply with legal requirements and make Twitter a better experience for all. We may need to change these rules from time to time and reserve the right to do so. Please check back here to see the latest. • Impersonation: You may not impersonate others through the Twitter service in a manner that does or is intended to mislead, confuse, or deceive others. • Trademark: We reserve the right to reclaim usernames on behalf of businesses or individuals that hold legal claim or trademark on those usernames. Accounts using business names and/or logos to mislead others may be permanently suspended. • Private information: You may not publish or post other people's private and confidential information, such as credit card numbers, street address or Social Security/National Identity numbers, without their express authorization and permission. • Violence and Threats: You may not publish or post direct, specific threats of violence against others. • Copyright: We will respond to clear and complete notices of alleged copyright infringement. Our copyright procedures are set forth in the Terms of Service. • Unlawful Use: You may not use our service for any unlawful purposes or in furtherance of illegal activities. International users agree to comply with all local laws regarding online conduct and acceptable content. • Misuse of Twitter Badges: You may not use badges, such as but not limited to the Promoted or Verified Twitter badge, unless provided by Twitter. Accounts using these badges as part of profile photos, header photos, background images, or in a way that falsely implies affiliation with Twitter may be suspended. Twitter Safety Think before you Tweet • Information you post on Twitter is public, so your Tweets can be read by someone you didn’t intend, or made available or shared on other websites. • You can protect your Tweets so only approved followers can view them by making protected. Even if your Tweets are set to protected, be mindful of who you authorize to view your account.

Don’t share your account • If you share your account username and password with someone else, that person could post Tweets pretending to be you, or change the password and email on your account and lock you out.

Respect others • Avoid getting into fights or confrontations with others online. If someone posts something about you that you do not like, consider asking them to take it down. Likewise, if you post a photo or information about someone else and they ask you to remove it, respect their privacy and retain their trust by taking it down.

Keep a healthy life balance • Regardless of how positive your online experience is, remember that there is a world outside of your computer.

Twitter Safety To unfollow from your following list: • Click on Following on your homepage or profile page. • Hover over the blue Following button next to any user on your following list, it will change to a red Unfollow. • Click the button to unfollow the account.

To unfollow via SMS/text message: • If you're using Twitter for SMS to follow others, you can choose to unfollow the user by texting UNFOLLOW username to your carrier's short code. (Example: UNFOLLOW support) • If you don't want to unfollow the user completely, but only wish to stop receiving their updates via SMS, you can text LEAVE username or OFF username to the same short code. (Example: OFF support or LEAVE support)

Twitter Safety To block a Twitter user: • Log in to your Twitter account. • Go to the profile page of the person you wish to block. • Click the person icon on their profile page. This brings up a drop-down actions menu. • Select Block from the options listed.

Blocked users cannot: • Add your Twitter account to their lists. • Have their @replies or mentions show in your mentions tab (although these Tweets may still appear in search). • Follow you. • See your profile picture on their profile page or in their timeline.

To unblock a Twitter user: • Visit the blocked account's profile on Twitter. • Click Unblock from the blocked user's dropdown menu.

Twitter Safety What is the difference between public and protected Tweets? • When you sign up for Twitter, you have the option to keep your Tweets public (the default account setting) or to protect your Tweets. • Accounts with protected Tweets require manual approval of each and every person who may view that account's Tweets.

Who can see my Tweets? • Public Tweets (the default setting) are visible to anyone, whether or not they have a Twitter account. • Protected Tweets may only be visible to your approved Twitter followers.

When you protect your Tweets, the following restrictions are put in place: • People will have to request to follow you; each follow request will need approval. • Your Tweets will only be visible to users you've approved. • Other users will not be able to retweet your Tweets. • Protected Tweets will not appear in Twitter search or Google search. • @Replies you send to people who aren't following you will not be seen by those users (because you have not given them permission to see your Tweets).

Social Media Beyond Facebook Snapchat is a messaging app that lets users put a time limit on the pictures and videos they send before they disappear. Why it's popular • Snapchat's creators intended the app's fleeting images to be a way for teens to share fun, light moments without the risk of having them go public. And that's what most teens use it for: sending goofy or embarrassing photos to one another. Snapchats also seem to send and load much "faster" than email or text. What parents need to know • Many schools have yet to block it, which is one reason why teens like it so much (Pew Internet & American Life Project, 2013). • It's a myth that Snapchats go away forever. Data is data: Whenever an image is sent, it never truly goes away. (For example, the person on the receiving end can take a screenshot of the image before it disappears.) Snapchats can even be recovered. • It can make sexting seem OK. The seemingly risk-free messaging might encourage users to share pictures containing inappropriate content.

http://m.commonsensemedia.org/blog/11-sites-and-apps-kids-are-heading-to-after-facebook Social Media Beyond Facebook Tumblr is like a cross between a blog and Twitter: It's a streaming scrapbook of text, photos, and/or videos and audio clips. Users create and follow short , or "tumblelogs," that can be seen by anyone online (if made public). Why it's popular • Many teens have tumblrs for personal use -- sharing photos, videos, musings, and things they find funny with their friends. Tumblelogs with funny memes and gifs often go viral online, as well (case in point: "Texts from Hillary"). What parents need to know • Porn is easy to find. This online hangout is hip and creative but sometimes raunchy. Pornographic images and videos, depictions of violence, self-harm, drug use, and offensive language are easily searchable. • Privacy can be guarded, but only through an awkward workaround. The first profile a member creates is public and viewable by anyone on the Internet. Members who desire full privacy have to create a second profile, which they're able to password protect. • Posts are often copied and shared. on Tumblr is similar to re-tweeting: A post that's reblogged from one tumblelog then appears on another. Many teens like -- and in fact, want -- their posts reblogged. But do you really want your kids' words and photos on someone else's page?

http://m.commonsensemedia.org/blog/11-sites-and-apps-kids-are-heading-to-after-facebook Social Media Beyond Facebook Vine is a social media app that lets users post and watch looping six-second video clips. This Twitter-owned service has developed a unique community of people who post videos that are often creative and funny -- and sometimes thought-provoking. Why it's popular • Videos run the gamut from stop-motion clips of puzzles doing and undoing themselves to six-second skits showing how a teen wakes up on a school day vs. a day during summer. Teens usually use Vine to create and share silly videos of themselves and/or their friends and family. What parents need to know • It's full of inappropriate videos. In three minutes of random searching, we came across a clip full of full-frontal male nudity, a woman in a fishnet shirt with her breasts exposed, and people blowing marijuana smoke into each other's mouths. There's a lot of funny, clever expression on Vine, but much of it isn't appropriate for kids. • There are significant privacy concerns. The videos you post, the accounts you follow, and the comments you make on videos are all public by default. But you can adjust your settings to protect your posts; only followers will see them, and you have to approve new followers. • Parents can be star performers (without knowing). If your teens film you being goofy or silly, you may want to talk about whether they plan to share it.

http://m.commonsensemedia.org/blog/11-sites-and-apps-kids-are-heading-to-after-facebook Social Media Beyond Facebook Wanelo (Want, Need, Love) combines shopping, fashion blogging, and social networking all in one. It's very popular among teens, allowing them to discover, share, and buy products they like. Why it's popular • Teens keep up with the latest styles by browsing Wanelo's "trending" feed, which aggregates the items that are most popular across the site. They can also cultivate their own style through the "My Feed" function, which displays content from the users, brands, and stores they follow. What parents need to know • If you like it, you can buy it. Users can purchase almost anything they see on Wanelo by clicking through to products' original sites. As one user tweeted, "#Wanelo you can have all of my money! #obsessed." • Brand names are prominent. Upon registering, users are required to follow at least three "stores" (for example, Forever21 or Marc Jacobs) and at least three "people" (many are other everyday people in Wanelo's network, but there are also publications like Seventeen magazine). • There's plenty of mature clothing. You may not love what kids find and put on their wish lists. Wanelo could lead to even more arguments over what your teen can and can't wear.

http://m.commonsensemedia.org/blog/11-sites-and-apps-kids-are-heading-to-after-facebook Social Media Beyond Facebook Kik Messenger is an app-based alternative to standard texting that kids use for social networking. It's free to use but has lots of ads. Why it's popular • It's fast and has no message limits, character limits, or fees if you just use the basic features, making it decidedly more fun in many ways than SMS texting. What parents need to know • It's too easy to "copy all." Kik's ability to link to other Kik-enabled apps within itself is a way to drive "app adoption" (purchases) from its users for developers. The app also encourages new registrants to invite everyone in their phone's address book to join Kik, since users can only message those who also have the app. • There's some stranger danger. An app named OinkText, linked to Kik, allows communication with strangers who share their Kik usernames to find people to chat with. There's also a Kik community blog where users can submit photos of themselves and screenshots of messages (sometimes displaying users' full names) to contests. • It uses real names. Teens' usernames identify them on Kik, so they shouldn't use their full real name as their username.

http://m.commonsensemedia.org/blog/11-sites-and-apps-kids-are-heading-to-after-facebook Social Media Beyond Facebook Pheed is best described as a hybrid of Facebook, Instagram, Twitter, and YouTube -- except that you can require others to pay a premium to access your personal channel. Why it's popular • Pheed's multimedia "all in one" offering seems to be capturing teens' attention the most. Some teens also like the fact that they have more control over ownership and copyright, since Pheed allows its users to watermark their original content. What parents need to know • It's hot! According to Forbes, Pheed has swiftly become the No. 1 free social app in the App Store, thanks in large part to teens. Time will tell whether artists and celebrities will jump on the bandwagon and start using Pheed to promote themselves and charge their fans to view what they post. • Users can make money. Users can charge others a subscription fee to access their content, ranging from $1.99 to $34.99 per view, or the same price range per month. Note that a cut of all proceeds goes to Pheed. • Privacy updates are in the works. Kids should be aware that their posts are currently public by default and therefore searchable online.

http://m.commonsensemedia.org/blog/11-sites-and-apps-kids-are-heading-to-after-facebook Social Media Beyond Facebook Ask.fm is a social site that lets kids ask questions and answer those posted by other users -- sometimes anonymously. Why it's popular • Although there are some friendly interactions on Ask.fm -- Q&As about favorite foods or crushes, for example -- there are lots of mean comments and some creepy sexual posts. This iffy content is part of the site's appeal for teens. What parents need to know • Bullying is a major concern. The British news website MailOnline reported that the site has been linked to the suicides of several teens. Talk to your teens about cyberbullying and how anonymity can encourage mean behavior. • Anonymous answers are optional. Users can decide whether to allow anonymous posts and can remove their answers from streaming to decrease their profile's visibility. If your teens do use the site, they'd be best turning off anonymous answers and keeping themselves out of the live stream. • Q&As can appear on Facebook. Syncing with Facebook means that a much wider audience can see those Q&As.

http://m.commonsensemedia.org/blog/11-sites-and-apps-kids-are-heading-to-after-facebook Colleges and Social Media

• According to a survey by the testing resource Kaplan, 27% of college admission staff Google their applicants while 26% check Facebook.

• 35% of students were kept from getting into a school they applied to, based on what admissions staff found online.

• Social media can also hurt or help your chances of being recruited. According to Pew Research Center report when doing new students recruiting: – 87% of colleges use Facebook – 76% of colleges use Twitter – 63% of colleges use YouTube

• So what technology posts hurt your chances of getting into college? – Illegal activity – Photos of students drinking alcohol – Plagiarism – Vulgarity

Why I Need a Cell Phone By Joshua Pruitt I will be walking home from school each day (it takes 10 minutes) so a cell phone would let me call if I or someone else needed help. • Josh Pruitt will memorizes the numbers and proper procedures for 911, police non- emergency number, poison control, mom, dad, and grandparents. He will also know and review Boy Scout First Aid.

I could call you and let you know I got home safety. • Josh Pruitt will call or text mom and dad every school day to let them know he is home safe.

You could get a hold of me when I am doing tennis, band, scouts, and church stuff. • Josh Pruitt will always answer a call from mom or dad unless it is not allowed by the adult in charge at the time.

I need to learn about texting and using technology so I can get a good job someday. • Josh Pruitt will teach his parents at least one cool new technology trick a month.

My friends all have one and so it will help me fit in. • Josh Pruitt will get approval before adding friend to his contact list. Why I Need a Cell Phone By Joshua Pruitt My plan for cell phone problems Someone sends me a sext • Don’t show it, send it, or delete it, tell mom and dad when I get home or call them if I can, I will not take pictures of individual girls on the phone, I will only take pictures that everyone can see and will not post pictures on the internet before showing them to mom and dad

Someone send me a rude or mean text • Don’t talk trash back, save the text, don’t keep looking at it, Tell mom and dad when I get home or call them if I can

Someone asks to borrow my phone • Don’t give it to them, tell them I will send a message for them

I lose my phone • Write my name on the lid to the battery compartment, Write down the serial number to the phone and keep it in a safe place, Tell the adult in charge as soon as I know it is lost, Call my mom or dad and do a phone find trace, Call the cell phone company and cancel the account

Downloading, apps, texting, ringtones, and stuff cost Money $$$$$ • Clear it with mom and dad before I add stuff, I will review the phone bill each month, Anything over the regular calling/texting plan I will pay for or work to pay for. Why I Need a Cell Phone By Joshua Pruitt Mom and Dad’s Rules • The phone has one charger that will be in mom and dad’s bedroom. The phone will be turned in to charge every night by 9:00pm.

• Parents can check contacts, texts, photos, internet searches, and any other content at any time.

• Parents can add or take away time or features depending on grades, attitude, and schedules.

• When the family eats together or is having family time the phone will not be used.

• Promise- The phone will never be taken away as a punishment when Josh has come to report a problem or bad decision. Its time or type of use may be changed temporarily until a plan and proof of better use is shown. If you have a problem come tell your parents and we will work to help you the best we can.

Parents Working With School

You can be a champion for your child without laying siege against the school.

You want support for your child and working in cooperation with the school personnel while holding them to their obligation of protection and documenting progress is an effective way to achieve this goal. Parents Working With School

Start with the teacher who is most involved:

• Inform them of the information you have about the bullying going on. Who, Where, When, and What is critical. • Ask what they have noticed with bullying in general and specifically related to your child. • Ask what rules, policies, and procedures the campus has to deal with bullies and what you as a parent need to do to help with this issue. • Set a follow up meeting (2-5 days later) to review any changes that you notice.

Parents Working With School If no progress is made then report to the Counselor:

• Inform them of your previous work with the teacher and what has worked and what has not worked. • Ask what the counselor could do to help with the problem (social skills work, guidance lessons, reviewing with teachers the bully policy and warning signs). • Set a follow up meeting (2-5 days later) to review any changes that you notice.

Parents Working With School If no progress is made then report to the Principal:

• Inform them of your previous work with the teacher and counselor and what has worked and what has not worked. • Ask what rules, policies, and procedures the campus has to deal with bullies and what you as a parent need to do to help with this issue. • Set a follow up meeting (2-5 days later) to review any changes that you notice.

Bully Prevention on the Digital Divide Bully Prevention on the Digital Divide

Rod Pruitt, MA Rod Pruitt, MA Region 14 ESC Region 14 ESC 325-675-8646 325-675-8646 [email protected] [email protected] www.esc14.net click on Bully Prevention More Info. www.esc14.net click on Bully Prevention More Info.

Bully Prevention on the Digital Divide Bully Prevention on the Digital Divide

Rod Pruitt, MA Rod Pruitt, MA Region 14 ESC Region 14 ESC 325-675-8646 325-675-8646 [email protected] [email protected] www.esc14.net click on Bully Prevention More Info. www.esc14.net click on Bully Prevention More Info. Bully Prevention on the Digital Divide Bully Prevention on the Digital Divide

Rod Pruitt, MA Rod Pruitt, MA Region 14 ESC Region 14 ESC 325-675-8646 325-675-8646 [email protected] [email protected] www.esc14.net click on Bully Prevention More Info. www.esc14.net click on Bully Prevention More Info.