Cyber Safety: Protecting Young Children Online

Cyber Safety: Protecting Young Children Online

Cyber Safety: Protecting young children online FVHD 2018 More than half of toddlers can use an ipad before they are 1 years old 8 yo girls spend 3.5hrs per day with screen time 75% of children are willing to share personal info online to receive goods/services 10.3years is average age of first smart phone By age 12, 50% of kids have Facebook, Instagram, Statistics don’t lie Devices are designed for toddler use Online games with chat features Self reported use is unreliable and kids wont report accessing sites they shouldn’t be on The reality Self reported bullying statistics are not accurate as kids are bullied on sites they shouldn’t be on or are bullied for isn’t pretty actions they are embarrassed to admit to – so they do not report but its Normal tween curiosity takes on serious level of risk due to necessary to ease of access and 24/7 nature of problem talk about…… Online gaming is often the portal of entry to cyber bullying and pornography Jailbreak • https://www.youtube.com/watch?v=Yqtyw o0cuUs • Allows kid to access internet and override parental locks and leaves no trace Hide it pro Private photo vault Keep Safe FotoX Ghost Apps Photo Locker App lock Private photo(icon looks like a calculator) KYMS (icon looks like a calculator) Social Media Impact We have known the dangers of the internet and social media for This behavior can have short quite some time now. However, term and long term effects to Children and teens are now both mental and physical well- using software applications being. (apps) to engage in risky and sometimes illegal behavior. 24/7 Where once we were Saturated in sex, violence, sneaking a look at music, where once it was a someone's fathers playboy Desensitization of youth weekly tv music show it is magazine, it is now 2 now 24/7. there is no keystrokes away and live, escape. animated and again 24/7 Cyberbullying Percent of students who reported being electronically bullied in the past 12 months: 38% • Blue Whale, also known as Blue Whale Challenge, is a social network phenomenon dating from 2016 that is claimed to exist in several countries. It is a "game" reportedly consisting of a series of tasks assigned to players by administrators over a 50-day period, initially innocuous before introducing elements of self- harm and the final challenge requiring the player to commit suicide. 2016 Blue Whale Challenge Online Challenges • Tide Pod Challenge • Condom Snorting Challenge • Duct Tape Challenge • Fire Challenge • Blue Whale Challenge Who are your child's online Roles Models • Dab dance move is actually derived from drug culture and the reaction to stimulants (but is popular in tweens and totally miss understood) • Every gang has a you tube clip/recruiting material/glorifying • Gang/criminal/drug elements from all over the world in one key stroke – desensitization • Eugenia Cooney • Greenwhich, CT BODY IMAGE Danielle Cohn over 831,000 subscribers 73 million views 14 years old *Had to crop photos because this is a CHILD Social media applications make children easy prey… This Photo by Unknown Author is licensed under CC BY-NC • Adults use platforms targeted towards a younger audience to gain access to children and teens they would have not otherwise had access to. • Teens with a large social media following may present themselves sexually in order to gain popularity • Lauren Gray • 16 yrs. Old • 14 million Instagram followers • 30 million Tik Tok followers • Available on just normal web • If age verification is required it is self nominated scrolling • Its as simple as requesting your desire and hitting enter Availability of Violent Pornography Online Predators use common apps to groom children Your child wants to spend more time online or playing games through a console but won’t tell you why. Your child does not want to discuss what he or she does online or what websites he or she visits. Grooming You notice that your child is using inappropriate language that he or she would not have heard within your home or at school. When you walk in a room, your child quickly changes the computer screen, mutes the volume on his or her gaming console, or turns it off altogether Geotagging is the process of adding geographical data to social media platforms “Checking in” “Sharing your location” Mobile devices automatically attach a location when a photo is taken, so consider the following when you or your child is posting a photo: 1. Are your location services on or off? Geotagging 2. Does this photo give away too much information? (street names in background etc.) 3. Wait until you get home to post images from an event Why is it dangerous? Makes you a target for burglary, assault, abduction, scams, and worse. Kids will assume online Kids WILL access these profiles you do not things know about Avoidance is Reduce access to smart If they do not access in futile – open devices until old enough your home they will in (include tablets and another dialogue is online gaming) vital You have to talk to them/open Help them to process/ communication is the understand the risks only answer • http://www.breakthecycle.org/talking-your-child- about-pornography-0 • https://www.webwise.ie/parents/play-it-safe-an- introductory-guide-to-online-gaming-for-parents/ • https://www.stopbullying.gov/cyberbullying/how- to-report/index.html Where to go • https://cyberbullying.org/report • https://www.connectsafely.org/tips-for-dealing- for help with-teen-sexting/ • https://kidshealth.org/en/parents/2011- sexting.html • https://www.internetmatters.org/issues/online- grooming/ • https://staysafeonline.org/stay-safe-online/ .

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    23 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us