SlideShare une entreprise Scribd logo
1  sur  25
A PARENT’S GUIDE TO SOCIAL MEDIA
SOCIAL MEDIA
& TEENAGERS
WHAT IS SOCIAL
MEDIA?
Websites and
applications that allows
users to create and
share content or to
participate in social
networking.
How it works
SOCIAL MEDIA MISCONCEPTIONS
THERE ARE OVER 300 DIFFERENT SOCIAL MEDIA SITES
THE INTERNET IS A PUBLIC SPACE. THERE IS NO REAL PRIVACY
IF YOU CREATE IT OR SHARE IT YOU OWN IT. FREEDOM OF SPEECH DOES
NOT MEAN FREEDOM FROM CONSEQUENCES.
PERSONAL BRANDING. EVERYTHING THAT YOU CREATE/SHARE IS A
REFLECTION OF YOU.
NOTHING EVER GETS DELETED.
TYPES OF SOCIAL MEDIA
TEXTING APPS – FREE TEXTING/MESSENGER APPS
KIK MESSENGER OOVOO WHATS APP
TYPES OF SOCIAL MEDIA
MICRO-BLOGGING - ALLOWS FOR SHORT UPDATES AND PHOTOS
INSTAGRAM TUMBLR TWITTER VINE
TYPES OF SOCIAL MEDIA
SELF-DESTRUCTING/SECRET APPS - ANONYMOUS
POSTS/PHOTOS
SNAPCHAT
Disappears
WHISPER
Superimpose
YIK YAK
5 Mile Radius
BURN NOTE
Email – Limits viewing
area no screen capture.
TYPES OF SOCIAL MEDIA
CHATTING/DATING APP - ALLOWS YOU TO MEET PEOPLE WITH
SAME INTEREST AND IN YOUR AREA
OMEGLE
Talk to strangers
Pick random people
SKOUT
In area
MEET ME
In Area
TINDER
Dating App/ Interest/Area
Indicators that your child may be in contact with an
online predator
Becomes secretive about online activities
Becomes obsessive about being online
Gets angry when he or she can’t get online
Receives phone calls from people you do not know or makes calls to
numbers that you do not recognize
Receives gifts, mail, or packages from someone you do not know
Withdraws from family and friends
Changes screens or turns off computer when an adult enters a room
The dangers of social media
Cyberbullying – gesture, written, verbal, physical attack via
electronic communication that meets the criteria of state
definition of HIB.
- distinguishing characteristic
- has no time constraints – can happen outside of school
hours
Sexting/Inappropriate pictures
Egg Harbor Township Police Department
Detective Heather Stumpf
Criminal Investigation Division
Laws of Sexting
in New Jersey
Fact or Fiction
•Minors can be arrested and
convicted for taking an
explicit picture of
themselves.
•A minor can be convicted and charged if they:
•Take a picture of themselves
•Distribute
•Possess
•Store
•Post on Internet
Provocative pictures of another minor.
•Teens that post messages and
photos on social media
anonymously are completely
disguised.
•Information can be
retrieved from a cell phone
after it has been deleted.
•Juvenile criminal records
disappear once an individual
turns 18 years old.
•What should kids do if they
receive a sext?
•Tell a trusted adult
• Parent/Guardian
• School Administrator
• School Counselor
•Delete it right away
Things to look for
CODES
1. 143 – I LOVE YOU
2. 182 – I HATE YOU
3. 420 – MARIJUANA
4. ADR – ADDRESS
5. AEAP – AS EARLY AS POSSIBLE
6. ALAP – AS LATE AS POSSIBLE
7. ASL – AGE, SEX, LOCATION
8. CD9 – PARENTS ARE AROUND
9. KPC – KEEPING PARENTS CLUELESS
10. MOS – MOM OVER SHOULDER
Things to look for
CODES
1. LMIRL – LET’S MEET IN REAL LIFE
2. PAL – PARENTS ARE LISTENING
3. PAW – PARENTS ARE WATCHING
4. PIR – PARENTS IN THE ROOM
5. ZERG – TO GANG UP ON SOMEONE
** FOR MORE CODES PLEASE SEE www.enough.org
HOW TO PROTECT YOUR CHILD
Set clear rules with your children regarding when they are allowed to talk,
text and surf the Internet via their mobile device.
Your child should only communicate with parent-approved contacts.
Talk to your children about respecting others online. Your child should never
text something to someone else that they would not say to them in real life.
Communication should always be truthful, encouraging and helpful.
If your child receives a threatening, mean or sexual message from someone
they should come to you immediately.
HOW TO PROTECT YOUR CHILD
Advise your child never to share personal information through their mobile
device including date of birth, address, full name, etc.
Talk to your children about never using vulgar or sexually explicit language
through their mobile device. If anyone begins using vulgar or sexually explicit
language that should talk to you and also block further communication.
Talk to your children about privacy. Discuss with them how there is no such
thing as privacy through their mobile device--and there are no "take-backs"
with what they post, text, upload or send. Content your kids send through the
Internet or their mobile device can be distributed across the world, without
their permission or knowledge.
HOW TO PROTECT YOUR CHILD
Decide whether your children are allowed to post content to their social
networking sites and other websites through their mobile device. Content
posted should be parent-approved.
If your child receives a text message from an unknown source, they should
not reply.
Your child should never let someone they don't know use their phone.
HOW TO PROTECT YOUR CHILD
Charge all devices in your room.
Parental Controls
Monitoring Software – There are over 30 available software options
HOW TO PROTECT YOUR CHILD
These internet service providers have parental control options:
AOL 
AT&T 
Cablevision   
Comcast  
Cox  
earthLink  
Mousemail 
Netzero  
Sprint
Time Warner  
Verizon 

Contenu connexe

Tendances

Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationjpl17
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Jamie Edmondson
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
Responsible social media usage
Responsible social media usageResponsible social media usage
Responsible social media usagedemiboyazis
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Cyber safety
Cyber safetyCyber safety
Cyber safetysmartins7
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019KanelandSvihlik
 
Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internetbeh yong hua
 
Surf smart
Surf smartSurf smart
Surf smartemekoo
 

Tendances (20)

Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Project
ProjectProject
Project
 
Responsible social media usage
Responsible social media usageResponsible social media usage
Responsible social media usage
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Online Safety
Online SafetyOnline Safety
Online Safety
 
Cyberwellness
CyberwellnessCyberwellness
Cyberwellness
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internet
 
Surf smart
Surf smartSurf smart
Surf smart
 

En vedette

Сопоставление образа пророка
Сопоставление образа пророкаСопоставление образа пророка
Сопоставление образа пророкаDarya Sviridova
 
Curriculum design week7 Diana
Curriculum design week7 DianaCurriculum design week7 Diana
Curriculum design week7 DianaDianadubisky
 
Ślub w internecie - jak angażować gości (i nie tylko!)
Ślub w internecie - jak angażować gości (i nie tylko!)Ślub w internecie - jak angażować gości (i nie tylko!)
Ślub w internecie - jak angażować gości (i nie tylko!)Magdalena Górnicka-Partyka
 
Mahnama ashrafia december 2009
Mahnama ashrafia december 2009Mahnama ashrafia december 2009
Mahnama ashrafia december 2009Muhammad Tariq
 
Greece permanent resident lee e wanta 1988_2015
Greece permanent resident lee e wanta 1988_2015Greece permanent resident lee e wanta 1988_2015
Greece permanent resident lee e wanta 1988_2015Ronald Wederfoort
 
Unit 4 file and data management
Unit 4 file and data managementUnit 4 file and data management
Unit 4 file and data managementSoushilove
 
Dynamiek - Mei 2014 - Gauthier Hecq
Dynamiek - Mei 2014 - Gauthier HecqDynamiek - Mei 2014 - Gauthier Hecq
Dynamiek - Mei 2014 - Gauthier HecqGauthier Hecq
 
Báo cáo thực tập
Báo cáo thực tậpBáo cáo thực tập
Báo cáo thực tậpThành Văn
 
Kuliah Singkat dan Cepat Kerja MIBM VOKASI UB
Kuliah Singkat dan Cepat Kerja MIBM VOKASI UBKuliah Singkat dan Cepat Kerja MIBM VOKASI UB
Kuliah Singkat dan Cepat Kerja MIBM VOKASI UBPhungky Muchlison
 
Linux principles and philosophy
Linux principles and philosophyLinux principles and philosophy
Linux principles and philosophyaljuharah
 
Creating an about me profile (1)
Creating an about me profile (1)Creating an about me profile (1)
Creating an about me profile (1)Jennifer Casa-Todd
 

En vedette (19)

Сопоставление образа пророка
Сопоставление образа пророкаСопоставление образа пророка
Сопоставление образа пророка
 
Curriculum design week7 Diana
Curriculum design week7 DianaCurriculum design week7 Diana
Curriculum design week7 Diana
 
Ślub w internecie - jak angażować gości (i nie tylko!)
Ślub w internecie - jak angażować gości (i nie tylko!)Ślub w internecie - jak angażować gości (i nie tylko!)
Ślub w internecie - jak angażować gości (i nie tylko!)
 
Ngày chung đôi
Ngày chung đôiNgày chung đôi
Ngày chung đôi
 
Child labour
Child labourChild labour
Child labour
 
Mahnama ashrafia december 2009
Mahnama ashrafia december 2009Mahnama ashrafia december 2009
Mahnama ashrafia december 2009
 
Greece permanent resident lee e wanta 1988_2015
Greece permanent resident lee e wanta 1988_2015Greece permanent resident lee e wanta 1988_2015
Greece permanent resident lee e wanta 1988_2015
 
Actividades
ActividadesActividades
Actividades
 
Toy probes
Toy probesToy probes
Toy probes
 
Vantaggio competitivo 1
Vantaggio competitivo 1Vantaggio competitivo 1
Vantaggio competitivo 1
 
LisaResume1
LisaResume1LisaResume1
LisaResume1
 
Unit 4 file and data management
Unit 4 file and data managementUnit 4 file and data management
Unit 4 file and data management
 
Dynamiek - Mei 2014 - Gauthier Hecq
Dynamiek - Mei 2014 - Gauthier HecqDynamiek - Mei 2014 - Gauthier Hecq
Dynamiek - Mei 2014 - Gauthier Hecq
 
RoWIP Strategic Review
RoWIP Strategic ReviewRoWIP Strategic Review
RoWIP Strategic Review
 
Báo cáo thực tập
Báo cáo thực tậpBáo cáo thực tập
Báo cáo thực tập
 
chapter
chapterchapter
chapter
 
Kuliah Singkat dan Cepat Kerja MIBM VOKASI UB
Kuliah Singkat dan Cepat Kerja MIBM VOKASI UBKuliah Singkat dan Cepat Kerja MIBM VOKASI UB
Kuliah Singkat dan Cepat Kerja MIBM VOKASI UB
 
Linux principles and philosophy
Linux principles and philosophyLinux principles and philosophy
Linux principles and philosophy
 
Creating an about me profile (1)
Creating an about me profile (1)Creating an about me profile (1)
Creating an about me profile (1)
 

Similaire à Social Media Presentation

Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents Jennifer Holena
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and TeenagersJennifer Holena
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eveSimonBalle
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Social networks
Social networksSocial networks
Social networksdrlizmike
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GArissa Ablao
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parentsagoldberghvs
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Protecting Your Children's Online Experience
Protecting Your Children's Online Experience  Protecting Your Children's Online Experience
Protecting Your Children's Online Experience Lisa McKenzie ★
 
best social media course
best social media course best social media course
best social media course RihanaReza
 
Week 5 Presentation
Week 5 PresentationWeek 5 Presentation
Week 5 Presentationmnowacki
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshareLoreto Normanurst
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016KanelandSvihlik
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017KanelandSvihlik
 

Similaire à Social Media Presentation (20)

Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and Teenagers
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Social networks
Social networksSocial networks
Social networks
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parents
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Protecting Your Children's Online Experience
Protecting Your Children's Online Experience  Protecting Your Children's Online Experience
Protecting Your Children's Online Experience
 
best social media course
best social media course best social media course
best social media course
 
Social networking leaflet
Social networking leafletSocial networking leaflet
Social networking leaflet
 
Week 5 Presentation
Week 5 PresentationWeek 5 Presentation
Week 5 Presentation
 
Grooming.
Grooming.Grooming.
Grooming.
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshare
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 

Dernier

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 

Dernier (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

Social Media Presentation

  • 1. A PARENT’S GUIDE TO SOCIAL MEDIA SOCIAL MEDIA & TEENAGERS
  • 2. WHAT IS SOCIAL MEDIA? Websites and applications that allows users to create and share content or to participate in social networking.
  • 4. SOCIAL MEDIA MISCONCEPTIONS THERE ARE OVER 300 DIFFERENT SOCIAL MEDIA SITES THE INTERNET IS A PUBLIC SPACE. THERE IS NO REAL PRIVACY IF YOU CREATE IT OR SHARE IT YOU OWN IT. FREEDOM OF SPEECH DOES NOT MEAN FREEDOM FROM CONSEQUENCES. PERSONAL BRANDING. EVERYTHING THAT YOU CREATE/SHARE IS A REFLECTION OF YOU. NOTHING EVER GETS DELETED.
  • 5. TYPES OF SOCIAL MEDIA TEXTING APPS – FREE TEXTING/MESSENGER APPS KIK MESSENGER OOVOO WHATS APP
  • 6. TYPES OF SOCIAL MEDIA MICRO-BLOGGING - ALLOWS FOR SHORT UPDATES AND PHOTOS INSTAGRAM TUMBLR TWITTER VINE
  • 7. TYPES OF SOCIAL MEDIA SELF-DESTRUCTING/SECRET APPS - ANONYMOUS POSTS/PHOTOS SNAPCHAT Disappears WHISPER Superimpose YIK YAK 5 Mile Radius BURN NOTE Email – Limits viewing area no screen capture.
  • 8. TYPES OF SOCIAL MEDIA CHATTING/DATING APP - ALLOWS YOU TO MEET PEOPLE WITH SAME INTEREST AND IN YOUR AREA OMEGLE Talk to strangers Pick random people SKOUT In area MEET ME In Area TINDER Dating App/ Interest/Area
  • 9. Indicators that your child may be in contact with an online predator Becomes secretive about online activities Becomes obsessive about being online Gets angry when he or she can’t get online Receives phone calls from people you do not know or makes calls to numbers that you do not recognize Receives gifts, mail, or packages from someone you do not know Withdraws from family and friends Changes screens or turns off computer when an adult enters a room
  • 10. The dangers of social media Cyberbullying – gesture, written, verbal, physical attack via electronic communication that meets the criteria of state definition of HIB. - distinguishing characteristic - has no time constraints – can happen outside of school hours Sexting/Inappropriate pictures
  • 11. Egg Harbor Township Police Department Detective Heather Stumpf Criminal Investigation Division
  • 12. Laws of Sexting in New Jersey Fact or Fiction
  • 13. •Minors can be arrested and convicted for taking an explicit picture of themselves.
  • 14. •A minor can be convicted and charged if they: •Take a picture of themselves •Distribute •Possess •Store •Post on Internet Provocative pictures of another minor.
  • 15. •Teens that post messages and photos on social media anonymously are completely disguised.
  • 16. •Information can be retrieved from a cell phone after it has been deleted.
  • 17. •Juvenile criminal records disappear once an individual turns 18 years old.
  • 18. •What should kids do if they receive a sext? •Tell a trusted adult • Parent/Guardian • School Administrator • School Counselor •Delete it right away
  • 19. Things to look for CODES 1. 143 – I LOVE YOU 2. 182 – I HATE YOU 3. 420 – MARIJUANA 4. ADR – ADDRESS 5. AEAP – AS EARLY AS POSSIBLE 6. ALAP – AS LATE AS POSSIBLE 7. ASL – AGE, SEX, LOCATION 8. CD9 – PARENTS ARE AROUND 9. KPC – KEEPING PARENTS CLUELESS 10. MOS – MOM OVER SHOULDER
  • 20. Things to look for CODES 1. LMIRL – LET’S MEET IN REAL LIFE 2. PAL – PARENTS ARE LISTENING 3. PAW – PARENTS ARE WATCHING 4. PIR – PARENTS IN THE ROOM 5. ZERG – TO GANG UP ON SOMEONE ** FOR MORE CODES PLEASE SEE www.enough.org
  • 21. HOW TO PROTECT YOUR CHILD Set clear rules with your children regarding when they are allowed to talk, text and surf the Internet via their mobile device. Your child should only communicate with parent-approved contacts. Talk to your children about respecting others online. Your child should never text something to someone else that they would not say to them in real life. Communication should always be truthful, encouraging and helpful. If your child receives a threatening, mean or sexual message from someone they should come to you immediately.
  • 22. HOW TO PROTECT YOUR CHILD Advise your child never to share personal information through their mobile device including date of birth, address, full name, etc. Talk to your children about never using vulgar or sexually explicit language through their mobile device. If anyone begins using vulgar or sexually explicit language that should talk to you and also block further communication. Talk to your children about privacy. Discuss with them how there is no such thing as privacy through their mobile device--and there are no "take-backs" with what they post, text, upload or send. Content your kids send through the Internet or their mobile device can be distributed across the world, without their permission or knowledge.
  • 23. HOW TO PROTECT YOUR CHILD Decide whether your children are allowed to post content to their social networking sites and other websites through their mobile device. Content posted should be parent-approved. If your child receives a text message from an unknown source, they should not reply. Your child should never let someone they don't know use their phone.
  • 24. HOW TO PROTECT YOUR CHILD Charge all devices in your room. Parental Controls Monitoring Software – There are over 30 available software options
  • 25. HOW TO PROTECT YOUR CHILD These internet service providers have parental control options: AOL  AT&T  Cablevision    Comcast   Cox   earthLink   Mousemail  Netzero   Sprint Time Warner   Verizon 

Notes de l'éditeur

  1. -We discussed the laws and offenses related to sexting -Sexting refers to incidents where minors take pictures of themselves nude or partially nude and send them to each other. <number>
  2. <number>
  3. Taking pictures of their own bodies is a prohibited sexual act and is against the law <number>
  4. The minor taking the photo can be convicted ALONG WITH anyone else that may distribute, possess, or post a picture online. <number>
  5. An IP address is a numerical ID that is attached with everything that an individual does online. Even when using public wifi there is still an IP address attached. The police can issue a subpoena request to a person’s network provider to gain information on an IP address. <number>
  6. Phone Dump - devices that are capable of retrieving data <number>
  7. Once a minor is fingerprinted and put into the system it will never go away. Excellent football players that were once considered for scholarships were turned down because of this type of conviction. <number>