Beruflich Dokumente
Kultur Dokumente
Resource Packet*
www.safetyweb.com
*This work is licensed under the Creative Commons Attribution-NoDerivs 3.0 Unported License. To view a copy of this license, visit
http://creativecommons.org/licenses/by-nd/3.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco,
California, 94105, USA.
Contents
Teens and Depression ............................................................................. 3
Social Network Safety Tips ...................................................................... 7
National Internet Safety Month ............................................................ 13
Daddying in the Digital Age ................................................................... 20
Video Sharing ........................................................................................ 25
Cyberbullying ........................................................................................ 29
Sexting 101 ........................................................................................... 33
Internet Addiction ................................................................................. 36
Kids and Online Commerce ................................................................... 40
Online Reputation ................................................................................. 44
Teens and Mobile Phones ..................................................................... 48
Bad Online Content ............................................................................... 52
Online Friends ....................................................................................... 56
Online Photos and Videos ..................................................................... 60
2|Page
Teens and Depression
3|Page
Depression and suicidal tendencies are often preceded by changes in behavior and mood. The
most easily identifiable clue may be a sudden lack of interest in activities that once brought
delight or pleasure. This lack of pleasure may be a side effect of other stressors that will be
discussed in the next section. Additional signs of depression include:
-Excessive crying or moodiness
-Feelings of guilt, sadness or hopelessness
-Persistent low self-esteem
-Easily irritated
-Sleep pattern changes: either sleeping too much or not sleeping enough
-Eating patterns change: not eating enough or over-eating
-Self-isolation
-Excessive Internet use or phone/texting
Signs of suicidal tendencies may be more pronounced and advanced than depressed behavior.
Often times with teens, depressed behavior is a pre-cursor to suicidal behavior, especially when
it is prolonged. In addition to signs of depression, suicidal behaviors and tendencies to look out
for include:
-Suicide notes
-Verbal threats of suicide
-Expressing strong feeling of being “trapped”
-Saying phrases like “Everyone would be better off without me”
-Pre-occupation with death and dying
-Final arrangements such as giving away personal belongings
-Acting recklessly as if having a death wish
-Sudden change in friends and social activities
-Sudden switch from being depressed to calm and even happy
-Self-injurious behavior
-Change in music preferences (to a darker, moodier genre)
4|Page
Technology has its benefits of making communication and research easier, but these
advantages bring with them a unique set of challenges and additional social pressures for teens.
In addition to traditional causes of depression, there may be events that precipitate from online
(also referred to as “cyber” or “virtual”) social situations.
6|Page
Social Network Safety Tips
Introduction
Children are inherently social creatures. Take one look at a playground and you’ll see young
kids interacting with one another, practicing their social skills, and learning the lay of the land.
So, it’s only natural that children would want to follow the popular trend of joining an online
social network…right? After all, their friends are doing it.
In this article, we will explore social networking websites and how children below the required
age to join are able to open accounts. We will also discuss the social networking dangers and
positive effects of social networks on young children and offer helpful tips for parents who wish
to guide their kids towards a safe direction.
7|Page
Upon close examination of those numbers, one can only assume that peer pressure is a
significant factor, and for the twelve-year-olds in question– either the parents are lying about
their child’s age, or the kids themselves are fibbing.
8|Page
· It’s Permanent!- Anything your child says or does online will leave a trace. Chances are, years
from now, a potential employer or college will be able to do a search on your child and find
his/her profile page. Read about how Facebook can kill your career on SafetyWeb’s blog here.
Positive Effects
With all the criticism about kids using social networks, these types of sites can have positive
effects on children as well. Social interaction of any kind provides lessons in both life and social
skills, as they teach children how to build strong friendships and long-lasting relationships.
· Relationship Building & Cultural Awareness- Social networks enable children to meet new
friends from distant lands, helping them become more worldly and sensitive to cultural
differences. Kids can also stay in touch or reunite with friends from their past who may have
moved away.
· Identity- Children can share their interests with others, join groups, experience a sense of
independence [14], and engage in positive self-expression by personalizing profile pages and
participating in discussions about topics that interest them. [9] This greatly facilitates the
building of a child’s sense of identity.
· Self-esteem- In correlation with identity building, social networks can help build self-esteem
and boost confidence.
· Battling Depression- Danah Boyd, a Ph.D. candidate at the School of Information, University of
California-Berkeley, and fellow at the Harvard University Berkman Center for Internet and
Society recently told The New York Times that homosexual teens living in rural areas may use
social networks to battle depression. “Thanks to such tools, many teens have chosen not to
take the path of suicide, knowing that there are others like them.” *18+
The use of blogging can also be very therapeutic. A 17-year-old named Tamaryn Stevens was
diagnosed with kidney disease when she was 10 and underwent transplant surgery. She logs on
to a social network called Livewire every day to chat with online friends, post her thoughts and
even upload original poetry. She says Livewire is “hugely beneficial… Especially the days that
you feel [down] in real social situations like school and things like that. You go home and you go
into Livewire and there’s people to talk to and it makes your day that much better.” *19+
· Education- A 2008 study conducted by the University of Minnesota discovered that “students
using social networking sites are actually practicing the kinds of 21st century skills we want
them to develop to be successful today.” Those skills include developing a positive attitude
towards technology and sharing creative, original content. [17] Social networks can help
educate kids in more formal academic areas like science, mathematics, history and more. [1]
9|Page
3. Does the site have clear safety, security and privacy policies posted online?
4. Does the site have a TRUSTe Children’s Privacy seal, an ESRB Privacy Online Program seal,
or a VeriSign Secured seal visible?
5. Will my child be exposed to any inappropriate content in the form of advertising or links?
6. What will my child learn? [9]
7. Will I be notified of any dangerous activity?
Below is a list of safe social networks for children under the age of 13.
· Kidswirl- social network with interface similar to Facebook’s
· Club Penguin- operated by Walt Disney Corporation, online gaming site
· Webkinz- a site that features virtual pet caring for kids
· Whyville- educational Internet site with games
· Kidzworld- a content-driven community for tweens
· Kidzui- a special web browser and filter to keep kids safe
· FaceChipz- a social network for kids created by parents
· Kidzrocket- a social network for pre-teens
10 | P a g e
6. Start your own account on the same websites and let your child know you’re there. Tread
carefully, however, and keep in mind that you can’t watch them 24/7, and some kids may
resent your monitoring. [3]
7. Take advantage of parental control features on your computer by restricting inappropriate
content.
8. Review your child’s friend list and ask questions if you see a friend unfamiliar to you.
9. Ask your child to refrain from positing photographs. Photos of children may be targets for
pedophiles. If you do allow photos, be sure they don’t include any identifiable information like
the exterior of your homes, as this may be a target for criminals. [4]
10. Do Facebook “reviews” with them. Log on together and review your child’s recent activity
so you can show that you trust him/her but you are still their parent. [4]
11. Teach your child to trust their “uh-oh” feeling. [12] Encourage them to tell you or another
reliable adult if they feel threatened or awkward because of something somebody said or did
online. Do your best to collect and print any threats that occur via email, instant messages,
postings, etc. If you feel that your child is in danger, report the incident to the police as well as
the social networking Web site.
Important Laws
Children’s Online Privacy Protection Act (COPPA) www.coppa.org- This law requires websites to
acquire parental consent for children under the age of 13 years old before collecting, using or
disclosing personal information. [6]
The California Online Privacy Protection Act (OPPA) This California state law requires websites
to post and comply with a privacy policy that can be found easily by its users. The law applies
to any website that is accessible by California residents. [7]
Helpful Organizations
Federal Trade Commission www.ftc.org
Children’s Advertising Review Unit (CARU) www.caru.org
National Center for Missing & Exploited Children
(NCMEC) www.missingkids.com orwww.netsmartz.org
i-SAFE www.i-safe.org
References
11 | P a g e
1 “How Does Social Networking Help Children (PDF)” Surf Net Parents.
2 “Why Kids Lie Age by Age” Parenting.com.
3 “How Young is To Young for Facebook” Komando.com (1-16-10).
4 “Why Children Lie to Get a Facebook Page” Surfnetkids.com (11-25-09).
5 “Principal to parents:Take kids off Facebook” CNN.com (04-30-10).
6 “Children’s Online Privacy Protection Act” en.wikipedia.org.
7 “Online Privacy Protection Act” en.wikipedia.org.
8 “Social Networking Sites: A Parent’s Guide” FBI.gov(09-2007).
9 “How to Choose a Safe Social Network for Your Kids” Hubpages.com.
10 “Why Social Networks Are Good for the Kids” techcrunch.com (02-24-09).
11 “Kids’ Top 100 Searches of 2009” Norton Online Family.
12 “Facebook and Bebo risk ‘infantilising’ the human mind” guardian.co.uk (02-24-09).
14 “Parents balance freedom, safety on Facebook” The Atlanta Journal-Constitution (12-11-09).
15 “Pew Internet Addendum” Pew Internet.
16 “25% of 8 to 12 year olds have a social networking profile” Network World (03-31-10).
17 “Educational Benefits Of Social Networking Sites Uncovered” Science Daily (06-21-08).
18 “Is MySpace Good for Society? A Freakonomics Quorum” Freakonomics (02-15-08).
19 “The health benefits of social networking” ABC.net.au (04-30-09).
20 “Moscardelli, D.M. & Divine, R., 2007. Adolescents’ Concern for Privacy When Using the
Internet: An Empirical Analysis of Predictors and Relationships With Privacy-Protecting
Behaviors.” Family and Consumer Sciences Research Journal, 35(3), 232-252.
21 “Moscardelli, D.M. & Liston-Heyes, C., 2004. Teens Surfing The Net: How Do They Learn To
Protect Their Privacy?” Journal of Business and Economics Research, 2(9), 43-56.
12 | P a g e
National Internet Safety Month
Introduction
The United States Senate has declared June as National Internet Safety Month. The resolutions
establishing National Internet Safety Month do not recommend any specific course of action in
honor of this designation. Rather, they commend the work that has been done thus far to
promote the safety of our nation’s youth online and make a call to increase “efforts to raise the
level of awareness in the United States regarding the need for online safety.” *1+
The goals of the United States Senate were to 1) Raise awareness about Internet safety issues,
and 2) challenge each of us to educate ourselves about online safety, and properly educate our
nation’s youth to behave responsibly when using the Internet. This resource article will provide
you with information to meet the challenge; it features information about some of the most
prominent areas in cyberspace where we are vulnerable, and what you can do to minimize your
exposure.
13 | P a g e
search for and manage information on the web. Ultimately, Google is making these moves to
stay relevant and competitive in the marketplace.
Just like recent issues raised about the changing privacy policies of social networking giant
Facebook, Google has dealt with criticism of how it handles its users’ information – specifically
that the company saves individuals’ searches forever. The fact that Google has this
information, and is legally able to maintain it as long as they please, makes many individuals
and privacy advocates very uncomfortable. Our own federal government is unable to maintain
such private and specific information about individuals. However, if they ever needed to access
the information maintained by Google and other search engine companies, it could be legally
possible.
In 2007, when Google acquired online advertising company DoubleClick, Google’s ability to
“record, analyze and track” certain information was called into question, and the Electronic
Privacy Information Center (EPIC) requested an investigation of Google’s information collection
practices. [2] Well before the 2007 Google-DoubleClick merger, DoubleClick’s plans to build a
database of consumer profiles raised concerns amongst privacy advocates, and those plans
would result in less privacy for consumers. [3]
The first half of this year has been a tough one for Google. In March 2010, The European Union
opened an Anti-Trust investigation of the web giant, concerning results displayed by the search
engine. Google’s competitors assert that their company names are omitted from search results
conducted on Google’s web browser. *4+ Just two months later, Google has come under
immense scrutiny in Europe for violating privacy in its efforts to collect data for its street view
mapping service. Google’s co-founder, Sergey Brin said, “We screwed up,” referring to the
company’s act of collecting information from Wi-Fi networks for Street View. [5]
The most recent privacy-violating snafus by the Internet giant – its launch of social networking
component, GoogleBuzz – galvanized privacy officials from 10 countries to co-sign a letter
urging Google to build more privacy controls around its many offerings: “It calls on Google to
create ‘privacy-protective’ default settings and make it easy for people to delete their accounts,
among other measures.” *6+ Users have taken to the blogosphere to discuss how the clash of a
privacy-based tool like electronic mail and a social-based application like Buzz are diametrically
opposed and don’t have an inherent synergy. *7+
14 | P a g e
As one of the first well-publicized victims of cyberstalking, Jayne Hitchcock became a
cyberstalking victim’s advocate, writing a book and establishing a
website, www.haltabuse.org as a resource to prevent cyberstalking, and educate individuals
who are victims of cyberstalking. Jayne’s story is one that unfortunately, is becoming more
common. Her email was hacked and used by a third party to send suggestive emails in spam
messages to various people on the web. She began receiving unwanted messages in her email.
She and her husband even began receiving items in the mail that they had not ordered. [8]
Making changes to various online profiles every time a site makes a privacy policy modification
can be tedious, overwhelming, and confusing. So, there are a few things that everyone should
do regardless of what service they use to email, or how many social networking profiles they
maintain:
-Make sure that all of your accounts are password protected, and change your password often,
at least 4 times per year. Email accounts, bank accounts, or any site where you enter sensitive
information like your social security number, address, or any financial information should be
protected by a password. Your password should be something that no one can guess. This
makes it more difficult for cyberstalkers to guess your passwords and hack your accounts.
-Use a national Internet Service Provider (ISP) where possible rather than a local ISP. An
Internet Service Provider supplies a connection that allows you to plug into the Internet and
surf the web. A local ISP can reveal your physical location, leading a traditional stalker to your
doorstep or providing fuel for a cyberstalker to concentrate on making life difficult for you in
your hometown. This articleprovides an overview of regional vs. national ISPs and the pros and
cons of each.
-Never respond to any of the messages you receive that are inappropriate or make you feel
uncomfortable. You should record the messages and save them in a separate file so that you
can have a record for the authorities if the situation escalates to a legal contest.
-If you are transmitting information on a website, make sure it begins with https…https means
it’s secure. *9+
-Make sure the sites where you have social interactions or share information have an anti-
harassment policy. If it is violated, be sure to notify the site administrator as well as the ISP on
which the harassment occurred.
It is important to talk with your child about the signs of cyberstalking. When interacting with
their friends or just conducting their normal socializing online, your child should take note of:
-A sudden increase in unsolicited and inappropriate messages on their email
-Unwanted telephone calls or messages on their social networking profile pages
-Packages or mail delivered to them that they did not order
-Receiving anonymous notes or threats via email, U.S. mail, or notes on their car, school locker,
etc.
If any of these things occur, you should:
15 | P a g e
-Collect all the messages sent to an email or social networking profile site, and properly
document the time, date and source of the unsolicited message(s).
-Block the senders address so that they cannot send any additional messages to free email
accounts or social networking profile inboxes.
-If blocking the messages does not work, suspend or close any social networking profiles or free
email accounts to which the messages are being sent.
-Contact the United States Postal Service or other mail house that is delivering unsolicited
packages and mail to your home and alert them to the situation. Make sure they put a flag on
your address and clear any packages with you before they deliver them.
-Report the unwanted messages to the sites that they are being posted on, and your Internet
Service Provider.
Utilizing a reputable parental controls program to monitor your child’s activities online –
especially if you are the parent of a very young minor – can give you added peace of mind. As a
parent, you will be able to respond in a timely manner if your child is unable to recognize the
signs of cyberstalking, or if they are hesitant to tell you of their trouble. In many instances, time
is of the essence when preventing cyber crime from translating into real-world crime. If a
parent has information in real-time almost as simultaneously as it is being posted, they can take
action quickly to protect their child.
Finally, as a parent, there are steps you can take to insure that your actions do not jeopardize
your children. When you post photos of your family or child online, be aware that those photos
can be copied and used for purposes other than your intended purpose. Also, photos of your
children can possibly attract the attention of child predators. Make sure the photos of your
child on the Internet are as innocent as possible, and are posted on a site that has policies in
place to respond to your concerns should any occur.
16 | P a g e
you are away. Our modern advancements and culture of being open with our information has
afforded burglars all the information they need to be successful in their chosen field!
Just this spring, the infamous ‘Bling Ring’ was convicted for burglarizing the homes of young
celebrities in Hollywood…and they used social networking to do it: “Their methods were
simple. They tracked their victims by using social media, Facebook and Twitter. They know
when they were home and when they were away. They even used Google Earth to scope out
their homes.” *10+
The frequency of burglaries occurring as a result of online status postings is on the rise. British
insurance company and investment management firm Legal & General conducted a survey and
found “nearly 40% of social networking users share holiday plans on sites like Facebook and
Twitter. They also found about 13% of Facebook users and 92% of Twitter users tend to accept
friend requests or follows without checking up on the source.” *11+ As a result, the firm may
raise insurance premiums for parents whose children use Facebook and Twitter and update
their statuses with vacation and travel plans. [12] In fact, one firm in Great Britain has already
taken action: “Insurance firm Hiscox, which will not insure celebrities who allow details of their
holidays to be published in magazines, said it would penalise customers who state their where-
abouts on public sites.” *13+
As this is a growing trend, and one that has caught the attention of insurance carriers,
government agencies, and the media, it would behoove all users of social networking sites to
pay careful attention to what information they share, and when they share it. Follow these tips
to avoid being burgled via your social networking profile status:
-Do not post your travel plans at all.
-If you want to share your plans with your friends, family and fans, opt for letting everyone
know when you are safely back in town.
-Do not give any specific information before you depart that would let the reader know when
you are departing.
17 | P a g e
ways we can all keep our private information under lock and key. A listing by Virtual
Hosting.com highlights a few of the most active privacy blogs on the web:
1. Protect Personal and Financial Privacy: The name says it all. This blog is all about the issues
that surround keeping your identity safe, your data secure and your financial and medical
information private.
2. ID Theft Secrets Blog: This blog is dedicated to helping consumers find the resources and
information they need to protect their credit card and personal data from becoming prey to
identity fraudsters. Readers will get tips on simple things they can do to avoid becoming
victims.
3. Fight Identity Theft Blog: Here, readers will find ways they can actively work to stop identity
theft and protect themselves from those with ill intentions. The blog also posts on the latest
news, technology and scams to watch out for.
4. Privacy and Identity Theft Blog: Written by Dave Jevans, this blog posts the latest in
information and identity theft. Stories of what happened to others can help you ensure that the
same things don’t happen to you.
5. Anti-Phishing Blog: This blog acts as a resource for Internet users. It lists recent phishing
scams so that if you’re presented with them you’ll know what to look out for and what not to
fall for.
6. Mark Nestman: Preserving Your Privacy and More: As the name suggests, this blog focuses
on ways that individuals can protect their privacy. Posts on keeping your encrypted data safe
and protecting yourself from identity theft are interspersed with the latest news in privacy
politics and law.
Government Resources
Recognizing that our children are among the most vulnerable citizens in general, and
specifically online, our government has dedicated resources for parents and guardians to stay
on top of trends in cyber safety. As a parent, it is important to educate oneself and keep
abreast of Internet issues and fads. Some important sites to visit hosted by the United States
Federal Government are:
National Criminal Justice Reference Service
http://www.ncjrs.gov/internetsafety
United States Computer Emergency Readiness Team
www.us-cert.gov/cas/tips
United States Homeland Security
www.whitehouse.gov/issues/homeland-security
National Center for Missing and Exploited Children
www.missingkids.com/missingkids/servlet/PublicHomeServlet?LanguageCountry=en_US
Resources
SafetyWeb
www.safetyweb.com
18 | P a g e
Stay Safe Online
www.staysafeonline.org
Social Times
http://www.socialtimes.com
National Center for Victims of Crime Stalking Center
http://www.ncvc.org/src/Main.aspx
Online Reputation
http://www.onlinereputation.com
Privacy Rights Clearinghouse
http://www.privacyrights.org/fs/fs14-stk.htm
Cyberstalking FAQ
http://www.crime-safety-security.com/Cyber-Stalking.html
Halt Abuse – Founded by a cyberstalking victim
http://www.haltabuse.org/
Internet Safety Center
http://www.internetsafetycenter.com/internet-safety-kids-parental-control
References
1 “2005 Resolution (PDF)” The National Internet Safety Month.”(5-18-2005)
“2007 Resolution (PDF)” The National Internet Safety Month.”
2 “Google/DoubleClick Merger” EPIC”
3 “Privacy Fears Raised by DoubleClick Database Plans” CNET News”(1-25-00)
4 “Goggle Hit With Antitrust Investigation in Europe” Mashable”(2-10-10)
5 “Google Street View Privacy Probe Joined by Spain, Italy, France” Bloomberg”(5-20-10)
6 “Ten Countries Ask Google to Do More to Protect Privacy“Wall Street Journal”(4-20-10)
7 “Google Buzz Privacy Issues Have Real Life Implications“TechCrunch”(2-12-10)
8 “Abuse of Usenet: Cyberstalked How It All Began“Jahitchcock”(8-04-06)
9 “How to Avoid Someone Cyber Stalking You“Ehow”
10 “Think Twice: That Facebook Update Could Get You Robbed“Mashable”(8-27-09)
11 “Facebook and Twitter users face pricier insurance as burglars ’shop’ for victims’ personal
details on networking sites“MailOnline”(8-27-09)
12 “Facebook, Twitter users prone to burglaries, say insurers“Social News”(3-22-10)
19 | P a g e
Daddying in the Digital Age
Introduction
Being a father is something that most men cherish. Reminiscing about clapping at his
daughter’s first ballet recital or high-fiving his son after a little league game will be among most
dads’ favorite memories. When those cute kids start exploring their world and socializing with
their peers, another facet of parenting is introduced into the father-child relationship.
For today’s father, helping their children learn to socialize in the real world is not the only
matter to address when teaching their kids how to make friends. Preparing his children to
socialize responsibly on the Internet is standard on the list of fatherly responsibilities these
days. This article will examine the evolving role of fatherhood and what it means to protect
your family.
20 | P a g e
It seemed as though soothing the wounds of growing pains was easy, too. Sharing a story
about his childhood bully… you know, how everyone grew up and gained perspective, and now
everything is fine…was an effective way to assuage his child’s fears. Even teaching his child how
to stay safe when it came to strangers: “Don’t take candy from someone you don’t know”, “Tell
me if a strange car repeatedly drives by the house”…the traditional father was able to offer
tangible examples and clear rules that were easy for kids grasp and practice.
21 | P a g e
her buddy list [3]. Michael P. Clark and Geoffrey Argonne developed the idea for SafetyWeb
after noting how well documented and easy to find the dubious behavior of college applicants
was online. As fathers of young children, they realized they had to address issues of good
judgment online reputation with their children before they became teens, and that there had
to be a better system to monitor activity than logging onto each social networking site
separately.
22 | P a g e
Setting a good example is not the only thing you can do to protect your children online. As they
mature and grow older, your kids will become more independent and expect to engage in some
online activities unsupervised. Here are some tips to keep you kids safe online:
-Get to know some of the lingo. This article is brief, but gives an overview of some things kids
text each other and what they mean. Other sites like this one contain a more comprehensive
list of abbreviations people use to express themselves in cyber space.
-Surf the Internet with Your Child. Taking a few hours a week to surf the Internet with your child
allows you time to bond with them. It also affords you the opportunity time to discover your
child’s online habits and teach them in real-time the appropriateness of the content they are
viewing online. Whether they are looking at funny videos or a bullying text from one of their
classmates, you can teach them to the correct way to respond to the content, and help them
develop coping skills.
While tone and inflection do not always translate in online communications (like email and
texting), intent is conveyed loud and clear. The more time one spends online or immersed in
negative or dysfunctional behavior, the more ‘normal’ it can seem. Make sure your child is able
to make an emotional connection to their activity and the activity of others online.
-Check in With Your Child and Have Frequent Conversations About What’s Hot on the ‘Net. Hot
activities, like social networking and location-based apps can be fun and help your child learn
how to socialize. But they can also take up a lot of time, and lead to Internet addiction and
leave your child vulnerable to cyber bullies. Have discussion with your child about balancing
their online activities with real-life activities, and to protect their privacy and online reputation.
Also, educate yourself about the applications your child is using. Make sure you understand the
privacy policies and information-sharing implications of the activities your child is involved in on
the ‘net.
-Talk to Your Child About Positive Things They Can Do Online. There are a lot of activities one
can do online. A recent survey has found that many teens use the Internet to cure their
boredom and become involved in positive activities online rather than engage in risky
behavior. Whether itsblogging about their extra-curricular activities, or creating an original
trailer for one of their favorite movies, the Internet offers an environment where kids and teens
can develop hobbies and hone some digital skills.
Encourage your child to use the information and tools available on the Internet to develop
hobbies, enhance their skill-set and expand their world.
- Before Giving Your Child a Digital Device, Set Standards and Ground Rules for Use.
If you feel its time for your teen to have their own cell phone, laptop or digital camera, set
some ground rules for use. Whether you are able to control the number of minutes on a cell
phone, block certain callers or limit the number and nature of apps they use, it is important that
your teen understands not all digital products and activities are meant for them to use.
As your child uses their devices responsibly and matures, allow them more privileges.
Rewarding good behavior is just as important as setting and enforcing restrictions.
23 | P a g e
Remember that online interaction is only one facet of ways people socialize and interact. The
best gift any parent or father can give is spending time with his children.
References
[1] Galinsky, Ellen; Aumann, Kerstin; Bond, James T. Times are Changing Gender and
Generation at Work and Home.
2008 http://familiesandwork.org/site/research/reports/Times_Are_Changing.pdf
[2] Yahoo! Gives Parents a B+ for Taking Action to Protect Children Online. 10 June 2010
www.forbes.com/feeds/businesswire/2010/06/10/businesswire140890463.html
[3] Elliot, Valerie. Father designs ID card to protect children in internet chat rooms. 3 August
2006www.timesonline.co.uk/tol/news/uk/article698286.ece
[4] Barnes, Susan B. The Privacy Pardox: Social Networking in the United States. 15 August 2006
http://131.193.153.231/www/issues/issue11_9/barnes/index.html
[5] Youn, Seounmi. Parental Influence and Teens’ Attitude Toward Online Privacy Protection. 2
October 2008
www.redorbit.com/news/technology/1575192/parental_influence_and_teens_attitude_towar
d_online_privacy_protection/
[6] Family Christmas Photo Shows Up in Czech Ad. 10 June 2009
http://www.msnbc.msn.com/id/31214408
Resources
My Dad ‘N Me
www.mydadnme.com/index.php
Great Dad.com
www.greatdad.com
Dad Trends
http://dadtrends.com
National Center for Fathering
www.fathers.com
The Father’s Network
www.fathersnetwork.org
24 | P a g e
Video Sharing
25 | P a g e
The comfort level and higher frequency of sending and receiving video can be a cause for alarm
to parents, and should be. The content and subject matter of their videos is most likely
harmless – forwarding popular funny videos from the Internet, like the sneezing panda. Many
parents are concerned about how easy it is for their children to acquire and/or use video
technology. Webcams are affordable and easily accessible, and many laptops on the market
today come equipped with a built-in webcam.
Harmful Effects?
Technological advances have allowed the average consumer to acquire discreet video recording
devices, and the proliferation of video capabilities on laptops (webcams and built-in webcams
on laptops) and cell phones means that anyone of our children – - or anyone of us for that
matter – - could potentially be recorded on video at anytime without our knowledge. With
children in particular, a silly moment at a party during which they may exercise bad judgment
(or no judgment) may be caught on camera by a friend and live forever on video. One child
may send the silly video to another on a cell phone, or by email, and if interest is high enough, a
video can go ‘viral’ within hours and cause potential emotional scarring for the subject of the
video. The fact that “57% of [adult] internet users have watched videos online and most of
them share what they watch with others,”2 shows an increasing trend that a video posted or
shared will not only be viewed, but passed along to others.
An issue that is just as plausible as a child being videotaped without their knowledge is the child
who purposefully creates their own video and sends it to one person. In this case, the most
frequent cause for concern is if they are in a relationship, and an intimate video is created to
share with their mate. The danger in this situation is when the two break-up, and if it is an
unpleasant parting, one half of the couple has fuel to embarrass the other. Unfortunately, the
likelihood of this scenario is more and more likely, as according to a survey conducted by The
National Campaign, “22% of teen girls and 18% of teen boys have sent or posted nude or semi-
nude pictures or video of themselves.”3Another popular scenario becoming more common-
place is that of teens ‘sexting’ – sending sexually explicit text messages, or partial or fully nude
pictures of themselves – to someone as a way to flirt. Read about and discuss sexting here on
the SafetyWeb blog.
26 | P a g e
The creation of user-generated videos and sending or posting such private content is treated
different generationally.4 An article published by CNET News describes the ‘Naked Generation’,
and the ease with which twenty-somethings post personal information about themselves, their
relationships, and their partners. They are a generation living online. Our children witness the
actions of the generation just preceding theirs and are desensitized to ‘private’ information
being shared publicly, and further blur the line themselves. The consequences of actions taken
in a passionate moment are not considered until it is too late.
The effects on an individual as the result of a video being distributed without permission can be
devastating, far-reaching and long lasting. Obvious immediate effects are loss of self-esteem,
embarrassment, loss of friends and social alienation, which can lead to depression and other
emotional issues. Longer-lasting effects can range from losing candidacy for a job or becoming
ineligible to matriculate at an institute of higher learning. In a nutshell, some of life’s milestone
moments for a young adult may be ruined because of a decision they made as a young child or
teen.
27 | P a g e
‘good’ message or a ‘bad’ message. Spend time with your child so that they are able develop
their own judgment and readily identify good and bad images and videos. Teach them to trust
their judgment, delete the bad images, and tell you if they are really offensive or potentially
dangerous.
References
1. Rainie, Lee. Use of cell phone for pictures and video popular across all age groups. Pew
Internet & American Life Project, April 20,
2010 http://www.pewinternet.org/Infographics/2010/Use-of-cell-phone-for-picture-and-video-
by-age.aspx, accessed on May 20, 2010.
2. Madden, Mary. Online Video. Pew Internet & American Life Project, July 25,
2007,http://www.pewinternet.org/~/media//Files/Reports/2007/PIP_Online_Video_2007.pdf.
pdf, accessed on May 20, 2010
3. The National Campaign to Prevent Teen and Unplanned Pregnancy
http://www.thenationalcampaign.org/sextech/PDF/SexTech_Summary.pdf, accessed on May
20, 2010
4. McCarthy, Caroline. Welcome to the Naked Generation. CNET News, September 21,
2007http://news.cnet.com/8301-13577_3-9782224-36.html, accessed on May 20, 2010
28 | P a g e
Cyberbullying
Definition & Background
Cyberbullying simply refers to the act of bullying online. This type of bullying can consist of any
of the following actions committed by an individual or group to another individual or group:
Threats of violence
Hate speech
Harassment
Peer pressure
Bribery
Psychological abuse
Extortion
Further, these offenses are often committed by people impersonating someone else,
anonymously, or under the guise of a group, making accountability and preventability difficult.
The definition of cyberbullying has broadened over the years since it has expanded to include
any number of internet connected devices, web sites, behaviors, victims, and victimizers. For
example, in its earliest incarnations, cyberbullying mostly consisted of one person or small
group of people attacking each other via an internet-enabled desktop computer. These earlier
offenses, while certainly harmful, had some limitations in the amount of damage they could
cause because:
Most computer usage was still limited to desktop computers
Broadband internet connectivity was more limited
Most mobile devices were not equipped with cameras and/or data services
29 | P a g e
Social Networks were not mainstream
Given these constraints, you did not hear about it as much as it was generally less frequent, and
was usually confined to smaller groups.
Today, things are different. Most homes and schools have broadband connectivity, portable
Internet enabled computers and devices prevail, most mobile phones have photo, video, and
data services, and socializing online has long hit mainstream. Given the pervasiveness and social
acceptance of these technologies, it has become very easy for one person to not only capture
and share information easily, but for that information to spread almost instantly.
“Looking at the most recent victims of cyberbullying, both boys and girls are likely
to report feeling angry, sad, and embarrassed. Slightly more girls than boys feel
frustrated, while significantly more boys are scared as a result of cyberbullying.” 2
Similarities and Differences to Offline Behavior
30 | P a g e
Cyberbullying varies dramatically from offline bullying in many ways. For starters, the torment
is no longer limited to face-to-face interactions in a controlled environment. It now carries over
from the schoolyard, to the home, and the entire online community. Also, as mentioned above,
bullies can come in all shapes and sizes, with either known or unknown identities. No longer is it
about the one big bully picking on the smaller kid in the schoolyard. Anyone with an Internet
connection of any kind can bully almost anyone else. Further, not only is cyberbullying more
difficult to prevent, it can spread very quickly and leave a permanent online trail that can have
devastating long-term consequences for both the bullied and the bully.
Harmful Effects
The effects of cyberbullying can hurt and hurt quickly. There have been numerous stories in the
news of children, teens, and young adults who have been driven to suicide or violent crime as a
result of being bullied online. While these tend to be the more extreme cases, cyberbullying can
have a serious detrimental effect on a victim’s self-esteem, emotional well-being, and sense of
personal safety. As a result, this can often lead to any number of further negative consequences
including, but not limited to depression, despondence, self-destructive behavior and poor
performance in school or work just to name a few.
31 | P a g e
Cyberbullying legislation has been introduced in New York, Missouri, Rhode Island and
Maryland. In June, 2008, Rep. Linda Sanchez (D-Calif.) and Rep. Kenny Hulshof (R-Mo.)
proposed a federal law that would criminalize acts of cyberbullying. 3
External Resources
http://www.connectsafely.org/Safety-Tips/tips-to-help-stop-cyberbullying.html
http://www.isafe.org
http://www.cyberbullying.us
http://netfamilynews.org
http://www.ncpc.org/cyberbullying
References
1 http://www.isafe.org/channels/sub.php?ch=op⊂_id=media_cyber_bullying
2 http://www.cyberbullying.us/research.php
3 http://en.wikipedia.org/wiki/Cyber-bullying
32 | P a g e
Sexting 101
Definition & Background
“Sexting” is a relatively new term used for the act of sending a sexually suggestive or explicit
text message (AKA texting, SMS, MMS) to someone else. In most instances, the intended
recipient is a current or prospective boyfriend or girlfriend. These messages may vary from
simple text, to photos, or even short videos sent from a mobile phone to either another phone
and/or email account.
References to sexting in mainstream society only date back to 2006. It is a newer concept that
appears to be directly correlated with the emergence of faster mobile networks, more
sophisticated phones (with photo and video cameras and different messaging options), and the
increasing availability of these networks and devices to teens.
Sexting Statistics
Like many emerging threats to online safety and child safety, reports vary about the
proliferation and severity of texting. However, it is hard to dispute that the problem exists and
that the consequences can be dangerous. A report done by The National Campaign to Prevent
Teen and Unplanned Pregnancy in 2008 surveyed 1,280 teens and young adults. Their research
found that 75% of teens and 71% of young adults believe that sending sexually suggestive
content “can have serious negative consequences.” Despite that, 39% of teens and 59% of
young adults have sent or posted sexually suggestive emails or text messages, and 20% of teens
and 33% of young adults have sent/posted nude or semi-nude images of themselves. Perhaps
more disturbing was the study’s finding that ~38% teens and ~46% of young adults say it is
33 | P a g e
common for nude or semi-nude photos to get shared with people other than the intended
recipient.[1]
Similarities & Differences to Offline Behavior
A common thread in many threats facing online teens these days is that the behaviors creating
the threats are not new, but the manner in which these behaviors are manifested are. While a
precocious teen in the 1980s might have sent a provocative note or photograph to their
boyfriend or girlfriend, today’s teen uses mobile devices, social networks, and email to share
such content. These channels make it easy to share, reproduce, and forward such content to
unintended recipients. Even worse, unlike their counterpart of 20 years ago, today’s teen must
cope with the fact that behaviors such as sexting can not only have serious safety and legal
repercussions, but may also leave a permanent record.
Harmful Effects
A shared sexting message could have disastrous consequences. For starters, the impact of such
content getting “leaked” could result in social isolation from friends, bullying, and unwelcome
sexual solicitations. Further, in cases where such content might have been shared as the result
of revenge, it could certainly lead to violence. Aside from issues reputation and social issues,
sending, receiving, and/or sharing this type of content could lead to disciplinary action by
schools, employers, and possibly even state and federal law enforcement. Most importantly,
what might start out as a fleeting and thoughtless lapse of judgement could lead to serious
emotional and self-esteem issues for any child or young adult.
34 | P a g e
In any situation that presents a potential threat to the safety and health of anyone involved, a
parent should immediately contact the appropriate medical and law enforcement officials in
their area. If the nature of the threat is less severe, then recruiting the support of key advisors,
family members, friends, coaches, teachers, etc. might be a good place to start. Also,
depending on the situation, you might find it appropriate to discuss the situation with any other
parents or parties involved.
Again, it is imperative to understand that you are the parent and that this is a time when your
child will be coming to you for guidance and support. Whether your child is the victim or the
victimizer, it is incumbent on you to communicate with your child, assess the situation, and
select a course of action that mitigates the potential for immediate and long-term damage to
the safety and well-being of all parties involved.
References
1 “Sex and Tech (PDF)” The National Campaign to Prevent Teen and Unplanned Pregnancy. (12-
10-2008).
2 “Vermont Considers Legalizing Teen ‘Sexting’” , Associated Press (Apr. 13, 2009).
3 “Ohio to address ’sexting’ laws“, WKYC-TV (Apr. 13, 2009).
4 “Utah lawmakers OK bill on ’sexting’“, Associated Press (Mar. 11, 2009).
35 | P a g e
Internet Addiction
Definition & Background
An Internet addiction is an addiction like any other: it is defined by a compulsive loss of impulse
control resulting in damage to the user and his or her relationships, schoolwork, or
employment. Online gaming, compulsive use of social networking, and marathon Internet
surfing sessions are all included in this powerful addition. Symptoms are comparable to other
behavior addictions, most similar to pathological gambling. Because Internet addiction is
relatively new to society, there is less research on it than more established addictions, such as
drug and alcohol abuse. However, researchers believe that like other additions, it often masks
other problems such as depression, low self-esteem, social anxiety and may even stand in a
surrogate for other addictions.
36 | P a g e
If this is the case, today’s Internet-Addicted teenagers and young adults may carry it with them
into adulthood. In fact, Stanford University’s School of Medicine found that nearly one in eight
Americans suffers from at least one sign of problematic Internet abuse (although this does not
in and of itself constitute addiction).[2]
Internet abuse is so widespread that the DSM (Diagnostic and Statistic Manual of Mental
Disorders), which is published by the American Psychiatric Association, is reported to be
considering adding it to its next release, alongside such issues as bipolar disorder, schizophrenia
and borderline personality disorders.[3]
Indeed, as children and teenagers are still developing their brains, they may grow accustomed
to the speed and flashy graphics associated with the Internet and actually adapt their
physiology, developing problems such as ADHD, and becoming generally more impatient than
people raised without the instant gratification offered by the Internet.
Harmful Effects
One aspect of Internet addiction, which is statistically slanted toward boys and men, is online
gaming. According to Professor Mark Griffiths, a Psychologist at Nottingham Trent University in
the UK, “Online gaming addiction… is a real phenomenon and people suffer the same
symptoms as traditional addictions.” In one of his surveys, he found users who played online
video games for over 80 hours per week, an amount he called, “excessive.”
Griffiths was asked to comment upon reports that a young man had died of heart failure after
playing video games for 50 straight hours, with only a few brief breaks for the restroom. The
young man in question had been recently fired from his job, due to his inability to tear himself
away from his online games. According to Professor Griffiths, “*The games+ completely engross
the player. They are not games that you can play for 20 minutes and stop.”*4]
For many, time spent on social media sites such as MySpace and Facebook, has the same
deleterious effect on a user’s ability to simply stop. According to Dr. Kimberly Young, Director of
the Center for Internet Addiction Recovery in Bradford, PA, many teenagers have come to
recognize on their own that their Facebook behavior is hurting their grades, college
applications, and social life. However, she warns that withdrawal is difficult as well: “It’s like an
eating disorder. You can’t eliminate food. You just have to make better choices about what you
eat… and what you do online.”
Nonetheless, for many, the addiction is highly emotional, especially for those unsure of their
place in the world or just in their social circles. As Rachel Simmons, an educator who wrote
“The Curse of the Good Girl: Raising Authentic Girls with Courage and Confidence” explained,
“You’re getting a feed of everything everyone is doing and saying… You’re literally watching the
social landscape on the screen, and if you’re obsessed with your position in that landscape, it’s
very hard to look away.”
That said, many teens have come up with their own coping strategies, such as deactivating their
accounts, or giving a trusted friend or sibling a password, and only allowing themselves access
once in a while. Others are entering into social pacts with friends to not use the site. [5]
In addition to the psychological, physiological, social, and mental health problems associated
with Internet Addiction, children and teenagers who spend too many hours online are simply
37 | P a g e
not exercising their minds and bodies at a crucial time in their lives, when they should be
engaging in sports and other age-appropriate physical activities with like-minded peers.
External Resources
Self-diagnostic test (or you can take on behalf of your child / teen)
http://www.warningsigns.info/computer_addiction.htm
Net Addiction
http://www.netaddiction.com
Wikipedia on Internet Addiction
http://en.wikipedia.org/wiki/Internet_Addiction
Your child’s school psychologist or counselor
References
38 | P a g e
1. “The Psychometric Properties of the Internet Addiction Test”
CyberPsychology & Behavior Volume 7, Number 4, Page 449. Laura Widyanto, Ph.D. and Mary
McMurran, Ph.D. 2004.
2. Net Addiction
http://www.netaddiction.com
3. “Issues for DSM-V: Internet Addiction”
Jerald J. Block, M.D. American Psychiatric Association. March 2008.
http://ajp.psychiatryonline.org/cgi/content/full/165/3/306?nl_id=1195
4. “S Korean dies after games session”
BBC News. 10 August 2005.
http://news.bbc.co.uk/2/hi/technology/4137782.stm
5. “To Deal With Obsession, Some Defriend Facebook”
Katie Hafner. The New York Times. 21 December, 2009.
http://www.nytimes.com/2009/12/21/technology/Internet/
39 | P a g e
Kids and Online Commerce
Definition & Background
Kids and Online Commerce refers to any situation where children make monetary transactions
online. This includes purchasing items off Craigslist.com (which may not require a bank
account), selling or auctioning items, using a credit or debit card to buy items from online
sellers or retailers, and participating in online sites requiring payment (including gambling
websites). In order to shop online, one must have access to a computer and either a bank
account, online payment account, debit card, or credit card.
By law, one must be at least 18 years old to have his or her own credit card. However, those
under 18 can be added as a user to an adult’s account. PayPal offers a service to enable teens
to have their own accounts under adult supervision as well.
Online Banking is another facet of e-commerce, enabling simplified access between accounts,
the ability to manage investment portfolios (which rarely applies to children) and visibility into
most non-cash monetary transactions.
40 | P a g e
Market researchers conduct studies on the buying habits of kids and teens. ClickZ, a website
made for digital marketers, also provides information and statistics about online commerce.
Harmful Effects
The most harmful effects with regard to online commerce are overspending, getting scammed,
damaging the card holder’s credit score, and breaking the law by purchasing prohibited items.
One example of online fraud is phishing: the criminally fraudulent process of attempting to
acquire sensitive information such as usernames, passwords and credit card details by
masquerading as a trustworthy entity in an electronic communication. Some laws are easily
transgressed online, such as lying about one’s age to gain access to a site, using someone else’s
credit card, and illegally downloading music, movies, or software.
E-commerce also opens opportunities for kids to communicate with and meet strangers.
41 | P a g e
How each family discusses managing money is a personal decision, but those conversations
should address issues specific to the Internet. Familiar problems like overspending are joined
by new ones like identity theft and Internet scams. Parents should stay abreast of topics as
they arise in the news and in the lives of their children.
In the case of illegal downloading, Internet service providers might contact the account holder
if they have been alerted that illegal file sharing has occurred.
External Resources
Media Awareness Network
http://www.media-awareness.ca
Wired Safety
http://www.wiredsafety.org
References
1 “ECommerce-Guide Essentials“, ecommerce-guide.com.
2 “WeeWorld Survey Says Teen Spending On The Rise“, virtualgoodsnews.com (Jul. 7, 2009).
3 “The Girls Scouts Are Old School – Stop Cyber Cookie Promoting“, babble.com (Mar. 13,
2009).
42 | P a g e
4 “Information on personal information safety“, wiredsafety.org
5 “Controlled Substances Act“, wikipedia.org
43 | P a g e
Online Reputation
Definition & Background
As with any reputation, an child online reputation formed during one’s adolescence can haunt
for years to come. It is imperative that you and your child have an open conversation about the
possible repercussions of Internet interaction before any lasting damage occurs.
44 | P a g e
candidates, and with an already competitive job market, your children need to demonstrate
good judgment and propriety online. One employer reported rejecting a candidate after
reading that among his hobbies, he “like(s) to blow things up.”[3] To your child, this might seem
funny or cool. To a potential employer – or college admissions counselor – this is a deal-
breaker .
Similarities and Differences to Offline Behavior
Unlike with an offline reputation, where memories fade over time, an online reputation is quite
literally a permanent record, with content displayed in forever, often even information you’ve
tried to remove. An off-the-cuff remark is likely to be forgotten in time, but photos, videos and
online content can remain indefinitely. Children today simply don’t view privacy in the same
way as those who didn’t grow up communicating and sharing via the Internet. Many feel
compelled, via peer pressure or societal norms, to share intimate details of their lives online,
and as such, with perfect strangers.
Harmful Effects
In addition to impacting educational, career, and social prospects, from an outside perspective,
a bad online reputation can have a harmful effect on one’s self-esteem. There have been
several high-profile cases where online harassment, and the resulting sense of an irrevocably
tarnished reputation, resulted in personal tragedy.[4]
While instances like these are extreme, and hopefully rare in occurrence, it is not uncommon
for online content to be taken wildly out of context and either be harmful from an external or
personal perspective. You would be wise to discuss this with your child well before their online
behavioral habits are formed.
45 | P a g e
First, now that you’ve identified the sources, catalogue them so you can remedy them one by
one. If your child is the one who has posted the content, this is actually helpful, as it gives you
more control over the content and you can remove it more easily. This includes blog postings,
status messages, tweets (from Twitter), pictures, videos, and links on Facebook or MySpace,
pictures on blogs or photo sharing sites, videos on YouTube or Google Video, and content and
media on personal blogs and personal websites.
While it can take a few weeks for Google to remove references to this content from its search
results, you can immediately remove access to it from anyone who may have saved direct links
(and hope the information hasn’t been duplicated elsewhere).
Next, find out where the other content is located. If it’s on the website or Facebook / MySpace
page of a friend or classmate of your child, have your child gently ask his / her friend to remove
it. If they refuse, talk to their parents or the principal at their school. School administrators and
staff are often trained to be attuned to problems like this and are likely to be helpful and
sympathetic. If that isn’t the case at your child’s school, don’t hesitate to escalate the issue. Go
to the school district, or speak directly with the website that is hosting the content. Most of the
top trafficked sites hosting this kind of content have strict policies regarding privacy and terms
of use issues. If you contact them with your concerns, they are often responsive about getting
content removed. If that does not work, you can always contact your internet service provider
(ISP) and let them know there is inappropriate content involving minors that needs to be
removed immediately. Let them know that if they do not do so, you will involve an attorney or
the police. Even if you don’t intend to go down this path (and most will not), the threat is
usually enough to stimulate immediate action.
Next, help your child navigate and tighten the privacy settings on his or her Facebook account.
Restrict viewing of their page to friends-only, and check back regularly to ensure that they
haven’t opened viewing to the general public.
Lastly, know that while a lot of content stays on the web, it’s possible to bury it underneath
“good” content. Does your family maintain a blog? Can you write a few wholesome stories?
What about family photos depicting your child in an age-appropriate fashion? Encourage your
child to upload family photos and innocuous photos with friends, attending school events and
participating in sports teams into their Facebook accounts.
Once you and your child establish good online habits, they’re easy to maintain, and with time, it
will take a pretty determined sleuth to find older content buried beneath the more recently
updated, and more appropriate, information.
Legal Remedies
While there aren’t many laws to specifically address the issue of online reputations, there are
resources out there to help. Cyber-bullying laws are becoming more prevalent throughout the
nation, as lawmakers work to fine-tune the legal system especially following Megan Meier’s
suicide. Additionally, the Child Online Protection Act seeks to protect children from viewing
unwanted content, which could include inappropriate content involving your minor child.
Internet service providers are usually eager to work with parents if it means removing
inappropriate content involving a minor.
46 | P a g e
External Resources
Child Online Protection Act
http://epic.org/free_speech/censorship/copa.html
Your local police department and/or school district
References
1 “Forty-five Percent of Employers Use Social Networking Sites to Research Job Candidates“, Career
Builder, (Aug. 19, 2009)
2 Ibid.
3 “For Some, Online Persona Undermines a Résumé“, New York Times, (Jun. 11, 2006)
4 “Parents: Cyber Bullying Led to Teen’s Suicide“, ABCNews.com, (Nov. 19, 2007)
47 | P a g e
Teens and Mobile Phones
Definition & Background
Many kids and teens today have their own mobile phones to use for social, family, and
professional purposes. Mobile phones are equipped to send/receive phone calls and text
messages. ”Smart” phones or PDAs and other devices also enable you to access the Internet,
take/send photos/videos, play games, listen to music, use a calculator, alarm clock, and
calendar, not to mention the thousands of apps that offer a growing array of services.
Text messaging has many functions, even those with a typical 160 character limit. By sending
one text message to your Twitter account, you can immediately update all of your followers
(those who have elected to receive mobile updates). Or, you can vote on your favorite
American Idol. You can also send a text message to GOOGL (56656) with search queries, such
as looking up the definition of a word.
Many teens use a mobile phone as a part of a family plan, where the bill is sent to one person in
a household or family. However, teens are able to procure their own mobile phones without
committing to a contract by purchasing a prepaid phone.
The function of mobile phones in our lives is likely to keep expanding, as mobile phone
companies are looking to sell more goods and services through the phone, where the buyer
would pay for the goods along with the monthly mobile phone bill.
48 | P a g e
surveying teenagers about their mobile phones in its 2004 Teens and Parents project when a
survey showed that 45% of teens had a mobile phone. Since that time, mobile phone use has
climbed steadily among teens ages 12 to 17 – to 63% in fall of 2006 to 71% in early 2008.
In comparison, 77% of all adults (and 88% of parents) had a mobile phone or other mobile
device at a similar point in 2008. mobile phone ownership among adults has since risen to 85%,
based on the results of our most recent tracking survey of adults conducted in April 2009. [1]
The mobile phone has become a primary mode of socializing for teens and they will often avoid
contact with peers that don’t have mobile phones, according to a study by Context. [2]
And almost everyone, including those whom the Context study considers moderate cell-phone
users, felt anxious during the “deprivation” phase of the study that required them to give up
their phones for a few days.
Harmful Effects
Mobile phone use has several potential costs: financial, academic, social, and health.
Aside from using more minutes than allocated in your mobile phone plan, extra text messages
(both sent and received) can quickly add to your bill.
Some schools limit or restrict the use of mobile phones. Schools set restrictions because of the
use of mobile phones for cheating on tests, harassing other people, causing threats to the
schools security, and facilitating gossip and other social activity in school.
Some teens text message so much (200+ texts/day) that they have developed physical
symptoms, Texting Teen Tendonitis (TTT). So much texting can lead to pain in the hands, back
and neck soreness from poor posture while texting, impaired vision, and, possibly, many years
down the line, to arthritis. [3]
One study found that teenagers who excessively use their mobile phone are more prone to
disrupted sleep, restlessness, stress and fatigue. [4] Another found that mobile phone addiction
can result in psychological disorders. [5]
Because mobile phones emit electromagnetic radiation, concerns have been raised about
cancer risks that may pose when used for long periods of time. The current consensus view of
the scientific and medical communities is that health effects are very unlikely to be caused by
cellular phones or their base stations. At the same time, cellular phones became widely
available only relatively recently, while tumors can take decades to develop. For this reason,
some health authorities have urged that the precautionary principle be observed,
recommending that use and proximity to the head be minimized, especially by children. [6]
49 | P a g e
While the mobile phone bill provides some information about mobile phone use, other factors
effect teens’ experiences on the phone. Because researchers continue to study the harmful
effects of mobile phone use, it’s not always clear when a symptom can be traced to the mobile
phone. A teen could become depressed, for example, for a number of reasons. The best way
to recognize if mobile phones have caused any problems in your teen’s life is to speak openly.
References
1 “Teens and Mobile Phones Data Memeo“, pewinternet.org (Aug. 19, 2009)
2 “She’s Gotta Have It: mobile phone“, wired.com (May 16, 2003)
3 “Many Young People Suffer from ‘Teen Texting Tendonitis’“, associatedcontent.com (Jul. 22,
2009)
4 “Excessive Mobile Phone Use Affects Sleep In Teens, Study Finds“, sciencedaily.com (Jun. 9,
2008)
5 “Mobile-phone addiction in teenagers may cause severe psychological disorders“, news-
medical.net (Feb. 27, 2007)
6 “Mobile Phone: Privacy“, wikipedia.org
7 “She’s Gotta Have It: Cell phone“, wired.com (May 16, 2003)
51 | P a g e
Bad Online Content
Definition & Background
Bad content online includes any online material that has the ability to negatively influence kids
and/or teenagers (e.g. Adult Websites, Violent Websites Morbid Content, Shocker Content).
This contrasts with the majority of content available online which aims to at least be
entertaining, or at best can teach children valuable information and skills.
Bad content can also include violent video games, hate sites, sites that seek to mislead or
“brainwash”, and commercial sites that seek to scam youth. Negative content can be sought
[1]
out by kids or found inadvertently through search queries, pop-ups, and spam. Videos of
shocking content can spread like wildfire online and often get shared by peers in group settings
just to see what kind of reactions they elicit. It is also common for teens to actually post video
responses expressing their reactions (sometimes humorous, often disgusted, offended, and at
times offensive) to shocking content.
52 | P a g e
a sexual solicitation online. More of their research can be found at the Crimes Against Children
[2]
Research Center.
Advocacy organizations like the Campaign for a Commercial-Free Childhood (CCFC) argue that
exposure to marketing exploits children’s developmental vulnerabilities. A recent British study
found that “the pressure to consume and conform can lead to excessive levels of materialism
and competition among children leading to bullying.” CCFC also argues that marketing is a
[3]
factor in the childhood obesity epidemic.
Harmful Effects
Exposure to inappropriate material whether online or off has the potential to become harmful
and lead to psychological and social problems for children and teens. It’s difficult to measure
the effects exposure to pornography, for example, has on child development. Other harmful
effects that negative content online can lead to are isolation, Internet addiction, and phobias.
Online communities frequently share information anonymously, which can aid or provoke
dangerous behaviors, such as eating disorders, self-injurious behaviors, suicide, hacking, and
other illegal acts.
Online fora are generally open to the public, but tend to attract a self-selecting crowd, thus
narrowing the range of opinions. It may be difficult, and in some cases, harmful, for young
people who are still developing reading and reasoning skills to navigate so much information
without the guidance of a teacher or adult.
53 | P a g e
conversation if and when your child comes into contact with it. Without such dialogue,
whether or not material is harmful can seem ambiguous to your child.
Although adult content sites require visitors to certify they are above the age of 18, the onus of
responsibility lies on the visitor. As a response to the breadth of content on the web, some
parents resort to preventative measures, such as installing software that restricts access. While
these may work on a home computer, a savvy teen can often circumvent the software or just
use another computer or network.
Teenagers may resist restrictions on Internet usage and find ways around them, so it’s
advisable to ask them for their thoughts on the range of content available online and encourage
using the Internet in positive, safe ways.
External Resources
Wired Safety
http://www.wiredsafety.org
Crimes Against Children Research Center
http://www.unh.edu/ccrc
Berkman Center for Internet and Society
http://cyber.law.harvard.edu
Media Awareness Network
http://www.media-awareness.ca
Child Safety on the Information Highway
http://www.safekids.com
References
1 “Children’s Positive and Negative Experiences With the Internet – PDF” by Valkenburg and
Soeters (Oct. 2001)
2 “Children’s exposure to negative Internet content: effects of family context” Journal of
54 | P a g e
Broadcasting & Electronic Media (Dec. 1, 2005)
3 “Let’s Rewrite the Rules for Kids’ Media” – BusinessWeek.com (Feb. 28, 2008)
55 | P a g e
Online Friends
Definition & Background
The Internet makes information easily transmittable amongst both strangers and acquaintances
for business, educational, and social purposes. In the earliest days of the Internet, affinity
groups quickly formed around common interests; the ability to communicate with others in the
group was made possible through message boards, chat rooms, and newsletters.
Soon after, Social Networks (many consider Friendster to be the original) were created to
enable real life friends to share information and interact on the Internet, and potentially to
expand personal networks through mutual friends. However, the need for actual friendship or
even a common friend was soon trumped by the perceived prestige of having a large online
community, resulting in the tendency for people to become “friends” with people they had
never met.
The term Online Friends can be used to describe the presence of a real life friend in one’s
virtual (online) community, or to describe people who interact online but who may not have
met in person. It’s common for social networking sites to facilitate “friending” – the act of
becoming part of one’s online network – through searches or browsing of other community
members. While most social networking websites require that online friendships be mutually
agreed upon – that is, the sites are set up so that one person requests the friendship and the
other approves it – it is not uncommon to receive friend requests from complete strangers.
It is possible that Online Friends never interact, as having the illusion of a large friend network
is all that some people seek. However, that does not necessarily mean it’s a harmless
situation. When people allow others into their online community, they are giving them access
to personal information which may including photos, videos, schools, hobbies and details such
56 | P a g e
as their address or phone number. With all of this information, an immoral person would be
armed to do tremendous harm.
A reference to one’s Online Friend can represent a variety of realities:
“Suzy from school is my friend on facebook.”
“ilovebacon2 is my friend from the online game site; we’ve never met in person but ‘talk’ and
play cards every week.”
“I received four friend requests today from people I’ve never met.”
It is wise to not make assumptions that Online Friends are all good or all bad. If you are curious
about the origin of your child’s online friendship, it is best to ask.
57 | P a g e
strangers. While there may be a sense of friendship or trust with one’s new Online Friend, the
use of written communication, and the fact that they have not met in person act as a
‘protective’ shield, opening the door for more candid dialogue. It is through this frank dialogue
that strangers can extract personal information from an unwitting new Online Friend.
Harmful Effects
While the practice of engaging in and maintaining friendships online shouldn’t yield harm, the
reality can be much different. Firstly, even if one only engages with “real world” friends, simply
having a presence on these Online Social Networking sites puts their personal information on
the Internet. While one can try to control the information they share with others, they cannot
control information or potentially damaging content such as photos or videos posted to the
Internet by other people. Additionally, the ability to ‘tag’ content – to label it with the names of
the individuals in it – can draw a straight line back to an individual. It can sometimes seem
impossible to prevent others from sharing one’s name or image.
It has also been widely argued that the rampant use of technology as a communication medium
[3]
between friends is resulting in poor interpersonal skills and less developed writing skills.
Helping Children Manage Their Online Friends
It would be nearly impossible (and ill-advised) to try and keep your child off of Social
Networking sites (or anything similar that may emerge) and to prevent them from interacting
with their friends through the Internet. Therefore, educating your child about potential risks,
and how to safely manage their online image and privacy, seems to be the better approach.
The following recommended steps can help with keeping your children safe online:
Speak with your child and find out which Social Networks they are part of, or want to be part
of.
Find out which Social Networks their friends are part of.
Ask them who their Online Friends are, and how they know them.
Ask if you might be part of their Online Network. In addition to giving you first-hand insight
into the information they are posting about themselves and information and content posted
by others, you will be able to understand the dynamics of the particular site and to see how
common it is to be contacted by strangers online.
With younger children – particularly ones who are curious to begin interacting with their
friends online – you may require that they let you co-manage their Online Network and
consult with you prior to adding new friends to their network.
Remind your children that they cannot fully control their online image, but they can take
preventative steps by controlling who they directly share information with.
Help your children navigate the security settings on their Social Networks, and encourage
them to minimize the amount of information they make publicly available.
Advise your children to not enter chat rooms, or to engage in any conversations over the
Internet with people they don’t know, regardless of how harmless it might seem.
External Resources
58 | P a g e
Wired Safety
http://www.wiredsafety.org
Wikipedia List of Social Network Sites
http://en.wikipedia.org
References
1 “Teen Internet Safety Survey” National Center for Missing & Exploited Children and Cox
Communications, 2006. Retrieved 11-16-2009
2 “Your “Real” Friends are Your Online Friends” Sarah Perez, ReadWriteWeb, August 10, 2009.
Retrieved 11-16-2009
3 “Study Shows Online Social Networking Could Hurt Social Skills” Luke Dimik,
CentralMichiganLife, November 13, 2009.
59 | P a g e
Online Photos and Videos
Definition & Background
Online photos and videos are media produced in digital form and made available on the
Internet via websites, blogs, social networking sites, photo/video sharing sites, or email. The
key difference between online media and offline media is that online media can be easily
copied, shared, and downloaded.
There are two types of online photos and videos with which you as a parent need to concern
yourself:
Inappropriate content your child may be viewing, including pornography, violence, foul
language and gestures, and material that is simply not age appropriate.
Photos and videos featuring your child, posted either by your child or by someone else
(including members of your family).
60 | P a g e
Data and Research
In 2006, 34% of children aged 10 – 17 responded in a national survey that they had
inadvertently viewed unsolicited sexual content. (This does not take into account those who
were pleased to see, or or even sought out, such material.) Four percent of the respondents
aged 10 – 17 had received direct solicitations for sexually explicit or nude photographs. In that
same year, 61% of teenagers aged 13 – 17 reported that they had a social networking page or a
personal blog, with 37% of those teens saying they were unconcerned with what strangers
might do with such information.[1]
61 | P a g e
Another mother, Jessica Gwozdz, found her four year old daughter’s image on a Brazilian social
networking site where participants could vote on how “sexy” she was. This photo was taken
from a free photo sharing site, which had been used by the family to share up-to-date pictures
[4]
with relatives.
Further, many (if not most) universities and companies will conduct online searches for new
applicants. Any information or content about your child that is publicly posted or shared online
will be searchable and discoverable. Needless to say, any questionable content will only go to
hinder their chances of getting into a school or landing a job.
Just as photos can be taken from blogs and photo sharing sites and used elsewhere, a video
uploaded to YouTube or Google Video can be replicated and viewed millions of times by
complete strangers. Moreover, while you might have control of the photos and videos you
personally post, controlling or removing copied images and videos is a nearly impossible task.
File Types
62 | P a g e
If you decide to search your home computer to look for media files your children may have
downloaded from the Internet or from a digital camera, you can run a search by file type.
Common media file types are .jpg, .jpeg, .png, .bmp, .gif and .psd for photos, and .avi, .mpeg,
.mpg, .mp4 and .mov for online videos.
External Resources
Wired Safety
http://www.wiredsafety.org
CNet Reviews
http://reviews.cnet.com/4520-11344_7-6424378-2.html
Crimes Against Children Research Center
http://www.unh.edu/ccrc
References
1 Online Victimization of Youth: Five Years Later (2006). National Center for Missing & Exploited
Children and Cox Communications, 2006. Retrieved 11-18-2009.
2 Internet Filters Tips. Common Sense Media, 2009. Retrieved 11-18-2009.
3 Netter, Sarah. Mother Horrified Son’s Picture Was Used in Scam on Craigslist. ABC News,
August 4, 2009. Retrieved 11-18-2009.
4 Quenqua, Douglas. Guardians of Their Smiles. New York Times, October 23, 2009. Retrieved
11-18-2009.
*This work is licensed under the Creative Commons Attribution-NoDerivs 3.0 Unported License. To view a copy of this license, visit
http://creativecommons.org/licenses/by-nd/3.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco,
California, 94105, USA.
63 | P a g e
64 | P a g e