110 likes | 202 Views
Cyber bullying and Social Interaction with Technology– How to Talk to Your Child. Tuesday, November 10 Marquette University Restorative Justice Initiative Conference 12:45-1:45pm. Introduction and Welcome. Paul Kaye, School Resource Officer, New Berlin Eisenhower MS & HS
E N D
Cyber bullying and Social Interaction with Technology– How to Talk to Your Child Tuesday, November 10 Marquette University Restorative Justice Initiative Conference 12:45-1:45pm
Introduction and Welcome Paul Kaye, School Resource Officer, New Berlin Eisenhower MS & HS Melissa Thompson, Principal, Waukesha West High School Mary Jane Whitty Guidance Counselor, New Berlin Eisenhower HS
Statistics you should know… • MySpace recently cancelled 90,000 accounts • Facebook users are often imposters- how can a “Class of 2009” for a school with a class of 350 have more than 420 members? • One in 5 youth received a sexual approach or solicitation over the Internet in the past year. • More than 25% of kids recently polled had sent or received a pornographic picture via cell phone or an email account. • 71% of teens reported receiving messages online from someone they don’t know • 45% have been asked for personal information by someone they don’t know • College admissions counselors AND employers search for kids on social networking sites
Sexual Solicitations Online • 1 in 5 regular internet users have received a sexual solicitation • 2006: 1 in 7 • 97% of the solicitors were met online • 2006: 86% were met online • 66% of victims of solicitations are female • 65% occurred in Chat Rooms • 92% on a home computer
Purpose of our presentation • Discuss elements of cyber bullying and social interaction to promote understanding • Identify common emotions, circumstances and after effects when cyber bullying happens or social interaction with technology goes amiss • Keep kids from being victims, suspects, and defendants
Cyber bullying • Definition • Examples • Where it takes place
Trends in Child Exploitation • Peer to peer sources • Napster • BearShare • Morpheous • Kazaa • Technology • X Box 360 • One on one voice chat • Matchmaking features • Enhanced “friends” list • Web Cameras • Camera phones
Trends in Child Exploitation • Social Networking Sites • Myspace.com • Facebook.com • Friendster.com • Xanga.com • Livejournal.com • Friendsfusion.com • Prisonpenpals.com
Prevention and Investigation • Family • Computer placement, filters, monitoring software • Discussion and ground rules • Relationship as parent, not friend • School • Strong, trusting relationships with adults • Process defined for conducting investigation(s) • Accessible by parents and students • Community • SRO • Cybercrimes or other similar unit
Trust BUT VERIFY • Search your child’s cell phone/computer • No law gives your minor child a privacy right relative to you • Set clear expectations, so it feels fair • Myths • “None of this could happen to my child” • “This only happens to the bad kids”
Response and Recovery Ms. Mary Jane Whitty