E-safety, Bullying Transition

E-safety, Bullying Transition

Helping to Keep Children Safe On line LornaNaylor Anti-bullying Coordinator CFCS September 2014 What are Zero to Eight children doing online? Over the last 5-6 years there has been a substantial increase in

internet usage by children under 9 Children under 9 enjoy watching videos, playing games, searching for information, homework, socialising with others. More toddlers and pre-schoolers use internet connected devices especially touch screen. Children often have a digital

footprint pre-birth. (Zero to Eight young children and their internet use, www.eukidsonline.net 2013) What do we know about young peoples 10-17 on-line behaviour? The ABA and McAfee commissioned a survey in October and November 2013. The survey polled 1012 UK children (between the ages of 10 and 17) and their parents

A quarter of young people spend between four to six hours online every day and much of this internet Currently more than half (53%) go online in their own room, nearly the same amount (43%) on a games console and two-thirds (66%) also use their smartphone for internet access. What are the risks? lack of technical, critical and social skills may pose risk especially for under 8(Livingstone et al 2011) Lack of research for under 8 age group.

Concern over socialising online either within age appropriate virtual worlds or as under age participants in sites intended for teenagers and adults Some devices may put children at risk by compromising their safety and privacy Digital footprints created for children may cause problems for them in the future But what about the benefits? Children today

enter formal school years with significant experience in computers and use of the internet Have skills in assessing, understanding, viewing and creating in multiple, digital formats Have digital social skills Are digital citizens Enjoy online play What main issues for young people?

Too much personal information given online Contact with unsuitable people Cyberbullying

Fake profiles Exposure to inappropriate content Damage to online reputation Not following safety advice Where?

Social Networking sites/sharing sites Gaming Mobile technology Webcams Social networking sites Popular sites/Apps for young people

Sharing Chatting Messaging Also watch out for! WeChat

Vine KakaoTalk Kik WhatsAp Pheed

Whisper Tinder Opening a Facebook account Facebook summary

Use your email address If you must lie , lie small! Limit the personal information Friends only!

If you wouldnt show your gran, dont post it Check privacy Know how to report a problem Think before you post What is Cyberbullying? Threats Hacking Prejudice

Stalking Manipulation Exclusion Public postings Advice for parents on cyberbullying

Discuss behaviour online with your children - always respect others - treat your passwords with care - block/delete contacts & save conversations - dont reply/retaliate - save evidence

- make sure you tell Report the cyberbullying - school - service provider - police Webcams Skype-some tips Monitor your children when they use Skype.

They should be aware that they should avoid contact with strangers. They should also know what to do when a stranger tries to communicate with them through Skype. It would help if you protect your childs account with a long and unique password. Filter those who can contact your childs account by using the privacy settings The more private your childs profile is, the better. Include as little personal details on your childs Skypeprofile as possible.

Skype-some tips Monitor your children when they use Skype. They should be aware that they should avoid contact with strangers. They should also know what to do when a stranger tries to communicate with them through Skype. It would help if you protect your childs account with a long and unique password. Filter those who can contact your childs account by using the

privacy settings The more private your childs profile is, the better. Include as little personal details on your childs Skype profile as possible. How does it happen? An abuser might pretend to be a boy or girl of the same age. They might even pretend to be someone they know. They chat and flirt online. They start to chat about sex. They ask for naked selfies, or to go naked on webcam.

Then they threaten: I will share this pic with everyone you know if you dont do more things on webcam/ hurt yourself/ give me money... Sexting The exchange of sexual messages or images and Creating, sharing and forwarding sexually suggestive nude or nearly nude images through mobile phones and the internet .

NSPCC Study 2013 This is usually a result of peer pressure It is friends in their social network not usually strangers It can lead to bullying and violence There appears to be double standards where girls are reluctant to discuss this but boys risk social exclusion if they dont. There is a reluctance to ask for help/discuss

with adults The Message for Young People Stay Safe Dont do anything on webcam you wouldnt want your friends or family to see.

Advice If it has already happened, it is never too late to get help. It is not your fault. You wont be in trouble. 1.If someone pressures or threatens you, block them and report them to CEOP. 2.Tell an adult you trust as soon as possible. 3.Call Childline at any time on 0800 1111. 4.The abuser has broken the law. The police will find and arrest

them. Share aware-NSPCC www.nspcc.org.uk/preventing-abuse/keepingchildren-safe/share-aware Share Aware is a campaign for parents of children aged 8-12 it will help to reassure you, and give you everything you need to keep your children safe. It has straightforward, no-nonsense advice Gaming

Gaming Gaming Gaming Bullying through Games Consoles Some of the behaviour reported by our young people when using their games console Receiving messages from someone who was not who they said they were That tried to make them do something Asking to meet up

Threats, name calling ,insults, sexual language PEGI PEGI (The Pan-European Game Information age rating system) was established in 2003 to help European parents make informed choices Violence - Game contains depictions of violence Discrimination - Game contains depictions of, or material which may encourage, discrimination Sex - Game depicts nudity and/or sexual behaviour or sexual references Drugs - Game refers to or depicts the use of drugs

Fear - Game may be frightening or scary for young children Bad Language - Game contains bad language i-Tune apps 4+ Applications in this category contain no objectionable material. 9+ Applications in this category may contain mild or infrequent occurrences of cartoon, fantasy or realistic violence, and infrequent or mild mature, suggestive, or horror-themed content which may not be suitable for

children under the age of 9. 12+ Applications in this category may also contain infrequent mild language, frequent or intense cartoon, fantasy or realistic violence, and mild or infrequent mature or suggestive themes, and simulated gambling which may not be suitable for children under the age of 12. 17+ You must be at least 17 years old to purchase this application. Applications in this category may also contain frequent and intense offensive language; frequent and intense cartoon, fantasy or realistic violence; and frequent and intense mature, horror, and suggestive themes; plus sexual content, nudity, alcohol, tobacco, and drugs which

may not be suitable for children under the age of 17. Digital footprints Online reputations What is my online reputation? Your online reputation is the perception, estimation and opinion that is formed when you are encountered online. This could be when someone visits your social networking profile, but could also be when anyone reads a comment you posted on another profile. It could also be when someone sees your online photo albums or an image with you in it, indeed any

instance or reference of you that either you posted or someone else did - what your digital footprint says about you. Your online reputation will be formed through: Posts by you Posts by others but about you or linked to you Posts by others pretending to be you Who does it affect? Everyone! Obviously it applies to those who post online, however as other people could be posting information about you, you don't even have to have been on the internet before to have an online reputation! Rory Cellan-Jones commented on a survey conducted by AVG

which concluded that 23% of unborn children already have a digital footprint. What is your childs digital footprint and how may it influence their future? What employers look for According to the same survey, 35% of employers have rejected candidates based on: Provocative or inappropriate photos or information Drinking or using drugs Bad-mouthing previous employees, colleagues or clients Poor communication skills

Discriminatory comments Lied about qualifications Young people should understand 2,3 or 5 years may seem like a long time in their world but actions today could hurt them in the future. Mobile Phones Tips Is my child old enough to have a mobile phone? Set boundaries Before buying your child a mobile, find out what functions it has Internet, private messaging, built in applications

Set parental controls where required Set mobile rules - no mobile phone in the bedroom at night, mobile free time before bed, no use after lights out Parental Parental Controls Controls Set controls on:

Computers Laptops Tablets

Mobile devices Games Consoles ALL internet enabled devices Set on all devices that link to the internet Remember they are not 100% accurate and not a substitute for open communication!

HowParental can they help? controls Block sites that are not age appropriate limit inappropriate and illegal material Set timings automatic switch off at bedtime Monitor activity The Parent and Carers guide to the Internet

Vodaphone Guides www.vodaphone.com www.vodaphone.com The Child Exploitation and Online Protection Centre CEOP is the UK national lead agency who deal with the sexual exploitation of children in the UK and abroad

www.ceop.police.uk www.facebook.com/ceop Click CEOP Some Final Thoughts Do you think before you post? What is your childs digital footprint?

Do you know the e-safety and acceptable use policy for your school and do you respect it? Do your online and mobile habits set a good example to your children?

Recently Viewed Presentations

  • Simon Andrews LET-DOS - Portal - UEA

    Simon Andrews LET-DOS - Portal - UEA

    The models (frameworks) Gibbs (1988) Driscoll. Johns (2006) "To think about what one is doing whilst one is doing it; it is typically stimulated by surprise, by something which puzzled the practitioner concerned"(Greenwood, 1993).
  • Francesco A Controlled Study of NeurOptimal Neurofeedback in

    Francesco A Controlled Study of NeurOptimal Neurofeedback in

    We are offering NeurOptimal training to up to 60 recruited patients with a run-in using "sham" training to establish the control value or baseline.. The "sham" training should last for 5 weeks (10 sessions) and the standard training should last...
  • Cutaneous Fungal Infections - PPT

    Cutaneous Fungal Infections - PPT

    Teleomorph is an ascomycete called Arthroderma otae. Almost all clinical isolates are minus mating type. Macroconidia are abundant, thick-walled with many septa, up to 15.
  • The Rotary Foundation of Rotary International Mission Statement

    The Rotary Foundation of Rotary International Mission Statement

    The Rotary Foundation of Rotary International Mission Statement The mission of The Rotary Foundation is to enable Rotarians to advance world understanding, goodwill, and peace through the improvement of health, the support of education, and the alleviation of poverty.
  • CSE 471/598 - Subbarao Kambhampati

    CSE 471/598 - Subbarao Kambhampati

    Cost of computing. the heuristic. Cost of searching. with the heuristic. Total cost. incurred in search. Not always clear where the total minimum occurs. Old wisdom was that the global min was closer to cheaper heuristics. Current insights are that...
  • Diamante Poems Goal: To express your creativity by

    Diamante Poems Goal: To express your creativity by

    Haiku. Haiku is a Japanese verse in three lines. In the most common form of haiku here are 17 syllables. Line 1 is 5 syllables . Line 2 is 7 syllables . Line 3 is 5 syllables . Haikus are...
  • SD63 Energy Management Trevor Billy SD63 May 7,

    SD63 Energy Management Trevor Billy SD63 May 7,

    SD63 Energy Management Trevor Billy SD63 May 7, 2019 Results 14% reduction in GHG emissions $749,000 in external funding recovered over five years $280,000 annual savings Cost-effective projects with average 4 year payback (+ve budget impact) GHG Emissions by Source...
  • TEXT

    TEXT

    CSF tau Is it an informative biomarker of AD pathology Chris Clark Alzheimer's Disease Center University of Pennsylvania Disclosures T-tau and p-tau 181 ELISA kits Provided by Innogenetics CSF tau Increased tau predicts AD pathology at autopsy tau increased when...