430 likes | 598 Views
Have You Googled Your Child’s Name?. http://www.youtube.com/watch?v=sIFYPQjYhv8&feature=player_embedded. It’s a People Driven Economy…. March 21, 2011 Have You Googled Your Child’s Name? A values-based approach to social media Rashi School, Dedham MA. Doreen Nicastro, MPH
E N D
Have You Googled Your Child’s Name? http://www.youtube.com/watch?v=sIFYPQjYhv8&feature=player_embedded It’s a People Driven Economy…
March 21, 2011Have You Googled Your Child’s Name?A values-based approach to social media Rashi School, Dedham MA Doreen Nicastro, MPH Social Media Strategist Networlding Facilitator www.nicastroconsultants.com
Introduction • Speaker: My passion for this topic • Donny Claxton video • http://www.youtube.com/watch?v=6DA9Ayy72dg • Participants: Your name • Child’s grade • What brings you here tonight? • What do you want to leave with? • What keeps you up at night?
Learning Objectives • Increase your knowledge about Social Media and Facebook, a social revolution captivating children and teens • Create a sense of awareness about social networking trends including cyber-dangers: • sexting, bullying, stalking • Share social networking and media best practices • Start a conversation about values-based social networking
Join the Social Media Revolution What is it?
What is Social Media? Three components: Concept (art, information) Media (physical, electronic, or verbal). Social interface (intimate direct, community engagement, social viral, electronic broadcast or PHONE, syndication) en.wiktionary.org/wiki/social_networking http://en.wikipedia.org/wiki/Social_media ackrebel.com
What is Social Networking? People build relationships and bookmark important sites with like-minded peoplewww.omega2webdesign.com/glossaryofterms.html Social Networking sites focuses on building online communities of people who share interests and/or activities en.wikipedia.org/wiki/Social_networking Interaction between a group of people who share a common interest en.wiktionary.org/wiki/social_networking www.icis.com/.../teens-social-networking.jpg
The Social Media Revolution Web 1.0 consumer Web 2.0 consumer, producer, entertainer, entrepreneur, communicator and collaborator Social Media Ecommerce Brochureware 1994 1998 2000 2003 2006 2009 Global Internet Users 77M 400M 500M 1000M 1400M Smart Phones
The Social Media Revolution Web 1.0 consumer Web 2.0 consumer, producer, entertainer, entrepreneur, communicator and collaborator Social Media Ecommerce Brochureware 1994 1998 2000 2003 2006 2009 Global Internet Users 77M 400M 500M 1000M 1400M Smart Phones
Social Global Cultural Shift Youth are seeking connection, communication, and entertainment with their friends on social networking sites Parents, adult mentors, digital immigrants, do not understand the digital activities kids are engaged in Schools and organizations are managing it by locking it down Smart, young and savvy digital natives will continue to unlock the possibilities www.icis.com/.../teens-social-networking.jpg
Teens and Social Networking Socializing Environments: Off & online lives converge Face 2 face & online Social networks Living with digital devices Cell smart-phones Real-time, content driven media Evolving into a constant living thing NTIA Web site: http>//www.ntia.doc.gov/advisory/onlinesafety www.icis.com/.../teens-social-networking.jpg
Digital Ethics* Confused kids are making naïve and ethically ambiguous choices 4% of American teens have sent sexually suggestive images of themselves via- phone 15% have received such an image from someone they know, not gender specific (Pew Internet & American Life Project) www.icis.com/.../teens-social-networking.jpg *Carrie James, Harvard University School of Education, Our Space: Being a Responsible Citizen of the Digital World.
Adults and Social Networking Best software between the ears Susan Crawford, Assistant Director for Science and Technology. June 24, 2009 Youth need direction in this new virtual world Teens are embracing it with out much guidance What can parents, teaches, coaches, adults do to help teens become responsible cyber-citizens? NTIA Web site: http>//www.ntia.doc.gov/advisory/onlinesafety www.icis.com/.../teens-social-networking.jpg
Adult Mentors, Teens andSocial Networking Promote digital ethics from Pre K-12 education Establish mutually agreed upon ground rules and best practices Respect teens digital expertise Engage and partner with them Subscribe to digital citizen ship curriculum Support –incorporate -digital education with professional development for kids, parents and teachers www.icis.com/.../teens-social-networking.jpg
Cyber-space Ground Rules Draft a parent/guardian-teen contract about use of Internet and mobile devices With new technology comes new responsibility. Is it appropriate for parent-guardian to monitor email, chat, social networking sites?Yes/No? Is there a difference between reading a diary and monitoring electronic dialog? Yes/No? Read: an opinion on the subject www.icis.com/.../teens-social-networking.jpg http://learning.blogs.nytimes.com/2010/06/28/resources-on-bullying-and-cyberbullying/?scp=1&sq=cyberspies%20in%20cyberspace&st=cse
Cyber-space Ground Rules After reading “The Undercover Parent”: What did the author mean not to confuse government with family? What does that mean? Do you agree? Do you think installing spyware is being over protective? Do you agree that parental blocks are not enough? What is the primary motivation for monitoring kids activities online? www.icis.com/.../teens-social-networking.jpg http://learning.blogs.nytimes.com/2010/06/28/resources-on-bullying-and-cyberbullying/?scp=1&sq=cyberspies%20in%20cyberspace&st=cse
Children Internet Privacy Balance What is the right balance between invasion of privacy and the evolving challenges presented by the Internet? Do you agree posting on a social networking page is akin to a diary? Do you agree not installing spyware is similar to negligence? What are your values around online privacy, confidentiality, security? After reading “The Undercover Parent”: What did the author mean not to confuse government with family? What does that mean? Do you agree? Do you think installing spyware is being over protective or intrusive? Do you agree that parental blocks are not enough? What is the primary motivation for monitoring kids activities online? http://www.nytimes.com/learning/teachers/featured_articles/20080317monday.html
Current Trends, Kids Social Media • Social engagement and entertainment is moving from computer and laptop to mobile devices and smart phones • Phone is not a phone in hands of children and teens • Texting • Cameras • Gaming consoles • Video players • MP3 player http://blog.nielsen.com/nielsenwire/consumer/a-pocket-guide-to-social-media-and-kids/
Current Trends Kids and Social Media • 93% of American teens (12 to 17 year-olds) use the Internet • 73% of American teens use social networking sites • 75% of American teens own cell phones • 50% of parents do not apply parental controls offered by service providers http://blog.nielsen.com/nielsenwire/consumer/a-pocket-guide-to-social-media-and-kids/ Amanda Lenhart, Pew Internet and American Life Project, February 4, 2010
Kids, Social Media and Current Trends • 27% -twelve to fifteen-year olds believe search engines only return results from sites with accurate and truthful information • 40% -eight to eleven-year-olds believed that most or all of the information found on social networking sites was true • 27% -twelve to fifteen-year olds believe search engines only return results from sites with accurate and truthful information http://www.techwatch.co.uk/2010/03/29/quarter-of-under-13s-on-social-networking-sites/http://www.pjnews.org/?p=5508
The Youth Voice Project • National Survey of Students Grades 5-12 • Twenty-five schools • Twelve states • N=11,893 students completed the survey • Twenty-two % reported victimization • 46% Mild • 36 % Moderate • 11% Severe • 7% Very Severe felt unsafe • N=2,614 those who were victimized • Majority students traumatized 6-8 grades www.stopbullyingnow.com Stan Davis and Charisse Nixon Ph.D. Source: Stan Davis Charisse Nixon, Ph.D. The Youth Voice Project
The Youth Voice Project • Focus of mistreatment reported • 55% Looks • 37% Body shape • 16% Race • Self action • 75% Pretend it doesn’t bother me • 42% Told an adult @ school • Makes it better • Tell a friend • Told an adult at home www.stopbullyingnow.com Stan Davis and Charisse Nixon Ph.D. Source: Stan Davis Charisse Nixon, Ph.D. The Youth Voice Project
2008 Cyber-bullying Findings http://www.cyberbullying.us/research.php http://news.cnet.com/8301-19518310272311-238.html Middle school students • 82% said the person who bullied them via technology was from • 26% their school • 21% a friend • 20% ex-friend • 12% ex-boy or girlfriend • 19% of teens say they have been victims of cyber-bullying • 10% report they’ve cyber-bullied someone else
Keep lines of communication open • Listen carefully to what teens are talking about • Define agreed upon social media ground rules • Review social networking sites • Educate your child to the signs of bullying • Talk about your values around privacy, confidentiality and security • It is a fine line between care-giver and over protective parent http://familyinternet.about.com/od/computingsafetyprivacy/a/cyberbully.htm
Signs of Cyber-bullying • Behavior that includes (email, chat, IM, blog, social networking sites): • Teasing • Lying • Making fun, being rude • Threatening • Same as real world usually a link between the two • Focus is on psychological bullying • Anonymity • Peer based http://familyinternet.about.com/od/computingsafetyprivacy/a/cyberbully.htm
Cyber-bullying Dangers • Easy to impersonate, gain someone’s trust and turn on them • More difficult to stop a cyber-bully • Emotional violence can be more damaging than physical violence • Long term effects as gossip, lies, photos and videos stay long after bruises fade • Follow people into the home, which would normally be considered a safe haven from this type of activity http://familyinternet.about.com/od/computingsafetyprivacy/a/cyberbully.htm http://familyinternet.about.com/od/computingsafetyprivacy/a/cyberbully.htm
Combat Cyber-Stalking • Do not respond or engage a stalker • Contact your service provider explain situation • Change your phone, email and cell numbers • Ask to block-trace phone • Contact ISP to report abuse and close the account • Change your email to a non-descript string that does not identify you. • Activate all security settings on social networking sites and email accounts
It’s not a matter of targeting cell phones, it’s a matter of targeting responsible use of electronic communication and it’s a fine line….. Principal, Robert Stevens York ME High School www.seacoastonline.com Cyber-bullying Threats Current Solutions
“We have to work harder with our students to make certain that they understand their responsibility as ethical citizens…..” Maryann Minard Director of Curriculum York School www.seacoastonline.com Bullying-grow ‘endless school yard’ Vision for the future
“The best course of action is education and communication – educate students as to safe practices on the Internet, educateteachers and parents as to the potential dangers, and encourageparents to communicate with and monitor their children’s online social networking activities. .” http://www.randomconnections.com/?p=2406&cpage=1#comment-103432 Bottom Line
Social Media & Youth Reality • No one size fits all solutions • Social Media is embedded in kids day to day experiences • Off line has merged with online • Develop mutually agreed upon ground rules, best practices • Create a tool box; leverage you child’s tech expertise • Establish parental controls on email, networking sites and mobile devices • New tools require new rules • Keep an eye on child’s social networking activities http://www.nytimes.com/learning/teachers/featured_articles/20080317monday.html
Children Social Media Best Practices • Listen to your child • A mobile phone is a lifeline for teens and a communication tool for parents • Define appropriate age for a social networking presence • Explain to your child the value of privacy (nothing on social media is private) • Create a social networking and mobile device contract • Know the social networking policies of your school and your child’s friends http://www.pjnews.org/?p=5508
Children Social Media Best Practices • Set boundaries: supervise time and duration • Control social networking accounts and passwords • Set security settings and review them frequently • Keep laptop/computer/ in family room with monitor facing out don’t let kids go to bed with cell-smart phone • Limit friends to those they known personally • Go through friend list to make sure child knows the people • Set posting-photo standards - kids are impulsive about what they write on social networking sites – the results last forever http://www.pjnews.org/?p=5508
Parental Social Media Safety Values • Keep lines of face to face communication with your kids • Friend your kids face book page • Friend the parents of your kids’ friends • PC and smart phones to be used in common family area • Monitor tweets, YouTube, Facebook posting & videos • Monitor cell phone bill • Random cell phone checks • Check the browser history • Create mutually agreed upon rules -time and usage • Shut it down completely for a day http://www.zdnet.com/blog/btl/spy-software-10-other-ways-to-keep-your-sociallynetworked-kids-safe/37716
Cyber-Core Values • Discuss on and offline core values and their importance: • Privacy (do not share personal data elements: home town, address, ssn, dob, mother’s maiden name ) • Confidentiality (keep personal and private matters off social networking sites) • Security and safety (control site login, password, account security settings) • “Friending”(define off and online-friendship, acquaintance) • Talk about consequences when values are compromised on and off line- Donny Claxton message
Social Media Safety Values • Do not post personal information, such as cell phone number, address, or the name of school or school team • Never give out password to anyone • Never meet in person with anyone you first “met” on a social networking site. Some people may not be whom they say they are • Reconsider posting your photos • Never respond to harassing or rude comments posted on your profile http://tcs.cybertipline.com/knowthedangers7.htm
Social Media Safety Values • Check the privacy settings on sites that you use: • Set privacy so that people can only be added as your friend if you approve it • Set privacy so that people can only view your profile if you have approved them as a friend • Protect your friends do not post names, passwords, ages, phone numbers, school names, or locations • Do not post plans, travel and activities on your site • Online posts are not private • If you don’t have anything good to say..don’t post! http://tcs.cybertipline.com/knowthedangers7.htm
Final Thoughts “ Online safety is a journey not a destination…” “A holistic approach must be taken in order for us to have significant impact on the online safety of our nation’s youth..” “Youth can benefit from adults being more open to forms of experimentation with digital technology…” “Parents and teachers report they don’t understand digital technology, much less teach digital literacy…” Hemanshu Nigam, Co-Chair Online Safety and Technology Group June, 2010
Support for Parents Common Sense Guidelines http://buurl.com?opwx2k3 Safe Kids http://www.safekids.com/cell-phone-safety-tips/ New Social Networking Site Worrying Parents, Educators http://buurl.com?ogqxyof Social Rupture http://buurl.com?oin631t Chatroullete http://buurl.com?g6dhzvx Facebook Security http://www.sophos.com/security/best-practice/facebook/
Join me on Facebookhttp://buurl.com?j7lnn4c Sign up to my news letter www.nicastroconsultants.com Send me commentsdoreen@nicastroconsultants.com Purchase my video-book http://compuworks.myvbookstore.com/have-you-googled-your-child-s-name.html Let’s continue the conversation to.. create a values-based approach to Social Media