SlideShare une entreprise Scribd logo
1  sur  25
A PARENT’S GUIDE TO SOCIAL MEDIA
SOCIAL MEDIA
& TEENAGERS
WHAT IS SOCIAL
MEDIA?
Websites and
applications that allows
users to create and
share content or to
participate in social
networking.
How it works
SOCIAL MEDIA MISCONCEPTIONS
THERE ARE OVER 300 DIFFERENT SOCIAL MEDIA SITES
THE INTERNET IS A PUBLIC SPACE. THERE IS NO REAL PRIVACY
IF YOU CREATE IT OR SHARE IT YOU OWN IT. FREEDOM OF SPEECH DOES
NOT MEAN FREEDOM FROM CONSEQUENCES.
PERSONAL BRANDING. EVERYTHING THAT YOU CREATE/SHARE IS A
REFLECTION OF YOU.
NOTHING EVER GETS DELETED.
TYPES OF SOCIAL MEDIA
TEXTING APPS – FREE TEXTING/MESSENGER APPS
KIK MESSENGER OOVOO WHATS APP
TYPES OF SOCIAL MEDIA
MICRO-BLOGGING - ALLOWS FOR SHORT UPDATES AND PHOTOS
INSTAGRAM TUMBLR TWITTER VINE
TYPES OF SOCIAL MEDIA
SELF-DESTRUCTING/SECRET APPS - ANONYMOUS
POSTS/PHOTOS
SNAPCHAT
Disappears
WHISPER
Superimpose
YIK YAK
5 Mile Radius
BURN NOTE
Email – Limits viewing
area no screen capture.
TYPES OF SOCIAL MEDIA
CHATTING/DATING APP - ALLOWS YOU TO MEET PEOPLE WITH
SAME INTEREST AND IN YOUR AREA
OMEGLE
Talk to strangers
Pick random people
SKOUT
In area
MEET ME
In Area
TINDER
Dating App/ Interest/Area
Indicators that your child may be in contact with an
online predator
Becomes secretive about online activities
Becomes obsessive about being online
Gets angry when he or she can’t get online
Receives phone calls from people you do not know or makes calls to
numbers that you do not recognize
Receives gifts, mail, or packages from someone you do not know
Withdraws from family and friends
Changes screens or turns off computer when an adult enters a room
The dangers of social media
Cyberbullying – gesture, written, verbal, physical attack via
electronic communication that meets the criteria of state
definition of HIB.
- distinguishing characteristic
- has no time constraints – can happen outside of school
hours
Sexting/Inappropriate pictures
Egg Harbor Township Police Department
Detective Heather Stumpf
Criminal Investigation Division
Laws of Sexting
in New Jersey
Fact or Fiction
•Minors can be arrested and
convicted for taking an
explicit picture of
themselves.
•A minor can be convicted and charged if they:
•Take a picture of themselves
•Distribute
•Possess
•Store
•Post on Internet
Provocative pictures of another minor.
•Teens that post messages and
photos on social media
anonymously are completely
disguised.
•Information can be
retrieved from a cell phone
after it has been deleted.
•Juvenile criminal records
disappear once an individual
turns 18 years old.
•What should kids do if they
receive a sext?
•Tell a trusted adult
• Parent/Guardian
• School Administrator
• School Counselor
•Delete it right away
Things to look for
CODES
1. 143 – I LOVE YOU
2. 182 – I HATE YOU
3. 420 – MARIJUANA
4. ADR – ADDRESS
5. AEAP – AS EARLY AS POSSIBLE
6. ALAP – AS LATE AS POSSIBLE
7. ASL – AGE, SEX, LOCATION
8. CD9 – PARENTS ARE AROUND
9. KPC – KEEPING PARENTS CLUELESS
10. MOS – MOM OVER SHOULDER
Things to look for
CODES
1. LMIRL – LET’S MEET IN REAL LIFE
2. PAL – PARENTS ARE LISTENING
3. PAW – PARENTS ARE WATCHING
4. PIR – PARENTS IN THE ROOM
5. ZERG – TO GANG UP ON SOMEONE
** FOR MORE CODES PLEASE SEE www.enough.org
HOW TO PROTECT YOUR CHILD
Set clear rules with your children regarding when they are allowed to talk,
text and surf the Internet via their mobile device.
Your child should only communicate with parent-approved contacts.
Talk to your children about respecting others online. Your child should never
text something to someone else that they would not say to them in real life.
Communication should always be truthful, encouraging and helpful.
If your child receives a threatening, mean or sexual message from someone
they should come to you immediately.
HOW TO PROTECT YOUR CHILD
Advise your child never to share personal information through their mobile
device including date of birth, address, full name, etc.
Talk to your children about never using vulgar or sexually explicit language
through their mobile device. If anyone begins using vulgar or sexually explicit
language that should talk to you and also block further communication.
Talk to your children about privacy. Discuss with them how there is no such
thing as privacy through their mobile device--and there are no "take-backs"
with what they post, text, upload or send. Content your kids send through the
Internet or their mobile device can be distributed across the world, without
their permission or knowledge.
HOW TO PROTECT YOUR CHILD
Decide whether your children are allowed to post content to their social
networking sites and other websites through their mobile device. Content
posted should be parent-approved.
If your child receives a text message from an unknown source, they should
not reply.
Your child should never let someone they don't know use their phone.
HOW TO PROTECT YOUR CHILD
Charge all devices in your room.
Parental Controls
Monitoring Software – There are over 30 available software options
HOW TO PROTECT YOUR CHILD
These internet service providers have parental control options:
AOL 
AT&T 
Cablevision   
Comcast  
Cox  
earthLink  
Mousemail 
Netzero  
Sprint
Time Warner  
Verizon 

Contenu connexe

Tendances

Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationjpl17
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Jamie Edmondson
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
Responsible social media usage
Responsible social media usageResponsible social media usage
Responsible social media usagedemiboyazis
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Cyber safety
Cyber safetyCyber safety
Cyber safetysmartins7
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019KanelandSvihlik
 
Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internetbeh yong hua
 
Surf smart
Surf smartSurf smart
Surf smartemekoo
 

Tendances (20)

Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Project
ProjectProject
Project
 
Responsible social media usage
Responsible social media usageResponsible social media usage
Responsible social media usage
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Online Safety
Online SafetyOnline Safety
Online Safety
 
Cyberwellness
CyberwellnessCyberwellness
Cyberwellness
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internet
 
Surf smart
Surf smartSurf smart
Surf smart
 

En vedette

Сопоставление образа пророка
Сопоставление образа пророкаСопоставление образа пророка
Сопоставление образа пророкаDarya Sviridova
 
Curriculum design week7 Diana
Curriculum design week7 DianaCurriculum design week7 Diana
Curriculum design week7 DianaDianadubisky
 
Ślub w internecie - jak angażować gości (i nie tylko!)
Ślub w internecie - jak angażować gości (i nie tylko!)Ślub w internecie - jak angażować gości (i nie tylko!)
Ślub w internecie - jak angażować gości (i nie tylko!)Magdalena Górnicka-Partyka
 
Mahnama ashrafia december 2009
Mahnama ashrafia december 2009Mahnama ashrafia december 2009
Mahnama ashrafia december 2009Muhammad Tariq
 
Greece permanent resident lee e wanta 1988_2015
Greece permanent resident lee e wanta 1988_2015Greece permanent resident lee e wanta 1988_2015
Greece permanent resident lee e wanta 1988_2015Ronald Wederfoort
 
Unit 4 file and data management
Unit 4 file and data managementUnit 4 file and data management
Unit 4 file and data managementSoushilove
 
Dynamiek - Mei 2014 - Gauthier Hecq
Dynamiek - Mei 2014 - Gauthier HecqDynamiek - Mei 2014 - Gauthier Hecq
Dynamiek - Mei 2014 - Gauthier HecqGauthier Hecq
 
Báo cáo thực tập
Báo cáo thực tậpBáo cáo thực tập
Báo cáo thực tậpThành Văn
 
Kuliah Singkat dan Cepat Kerja MIBM VOKASI UB
Kuliah Singkat dan Cepat Kerja MIBM VOKASI UBKuliah Singkat dan Cepat Kerja MIBM VOKASI UB
Kuliah Singkat dan Cepat Kerja MIBM VOKASI UBPhungky Muchlison
 
Linux principles and philosophy
Linux principles and philosophyLinux principles and philosophy
Linux principles and philosophyaljuharah
 
Creating an about me profile (1)
Creating an about me profile (1)Creating an about me profile (1)
Creating an about me profile (1)Jennifer Casa-Todd
 

En vedette (19)

Сопоставление образа пророка
Сопоставление образа пророкаСопоставление образа пророка
Сопоставление образа пророка
 
Curriculum design week7 Diana
Curriculum design week7 DianaCurriculum design week7 Diana
Curriculum design week7 Diana
 
Ślub w internecie - jak angażować gości (i nie tylko!)
Ślub w internecie - jak angażować gości (i nie tylko!)Ślub w internecie - jak angażować gości (i nie tylko!)
Ślub w internecie - jak angażować gości (i nie tylko!)
 
Ngày chung đôi
Ngày chung đôiNgày chung đôi
Ngày chung đôi
 
Child labour
Child labourChild labour
Child labour
 
Mahnama ashrafia december 2009
Mahnama ashrafia december 2009Mahnama ashrafia december 2009
Mahnama ashrafia december 2009
 
Greece permanent resident lee e wanta 1988_2015
Greece permanent resident lee e wanta 1988_2015Greece permanent resident lee e wanta 1988_2015
Greece permanent resident lee e wanta 1988_2015
 
Actividades
ActividadesActividades
Actividades
 
Toy probes
Toy probesToy probes
Toy probes
 
Vantaggio competitivo 1
Vantaggio competitivo 1Vantaggio competitivo 1
Vantaggio competitivo 1
 
LisaResume1
LisaResume1LisaResume1
LisaResume1
 
Unit 4 file and data management
Unit 4 file and data managementUnit 4 file and data management
Unit 4 file and data management
 
Dynamiek - Mei 2014 - Gauthier Hecq
Dynamiek - Mei 2014 - Gauthier HecqDynamiek - Mei 2014 - Gauthier Hecq
Dynamiek - Mei 2014 - Gauthier Hecq
 
RoWIP Strategic Review
RoWIP Strategic ReviewRoWIP Strategic Review
RoWIP Strategic Review
 
Báo cáo thực tập
Báo cáo thực tậpBáo cáo thực tập
Báo cáo thực tập
 
chapter
chapterchapter
chapter
 
Kuliah Singkat dan Cepat Kerja MIBM VOKASI UB
Kuliah Singkat dan Cepat Kerja MIBM VOKASI UBKuliah Singkat dan Cepat Kerja MIBM VOKASI UB
Kuliah Singkat dan Cepat Kerja MIBM VOKASI UB
 
Linux principles and philosophy
Linux principles and philosophyLinux principles and philosophy
Linux principles and philosophy
 
Creating an about me profile (1)
Creating an about me profile (1)Creating an about me profile (1)
Creating an about me profile (1)
 

Similaire à Social Media Presentation

Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents Jennifer Holena
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and TeenagersJennifer Holena
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eveSimonBalle
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Social networks
Social networksSocial networks
Social networksdrlizmike
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GArissa Ablao
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parentsagoldberghvs
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Protecting Your Children's Online Experience
Protecting Your Children's Online Experience  Protecting Your Children's Online Experience
Protecting Your Children's Online Experience Lisa McKenzie ★
 
best social media course
best social media course best social media course
best social media course RihanaReza
 
Week 5 Presentation
Week 5 PresentationWeek 5 Presentation
Week 5 Presentationmnowacki
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshareLoreto Normanurst
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016KanelandSvihlik
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017KanelandSvihlik
 

Similaire à Social Media Presentation (20)

Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and Teenagers
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Social networks
Social networksSocial networks
Social networks
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parents
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Protecting Your Children's Online Experience
Protecting Your Children's Online Experience  Protecting Your Children's Online Experience
Protecting Your Children's Online Experience
 
best social media course
best social media course best social media course
best social media course
 
Social networking leaflet
Social networking leafletSocial networking leaflet
Social networking leaflet
 
Week 5 Presentation
Week 5 PresentationWeek 5 Presentation
Week 5 Presentation
 
Grooming.
Grooming.Grooming.
Grooming.
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshare
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 

Dernier

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 

Dernier (20)

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 

Social Media Presentation

  • 1. A PARENT’S GUIDE TO SOCIAL MEDIA SOCIAL MEDIA & TEENAGERS
  • 2. WHAT IS SOCIAL MEDIA? Websites and applications that allows users to create and share content or to participate in social networking.
  • 4. SOCIAL MEDIA MISCONCEPTIONS THERE ARE OVER 300 DIFFERENT SOCIAL MEDIA SITES THE INTERNET IS A PUBLIC SPACE. THERE IS NO REAL PRIVACY IF YOU CREATE IT OR SHARE IT YOU OWN IT. FREEDOM OF SPEECH DOES NOT MEAN FREEDOM FROM CONSEQUENCES. PERSONAL BRANDING. EVERYTHING THAT YOU CREATE/SHARE IS A REFLECTION OF YOU. NOTHING EVER GETS DELETED.
  • 5. TYPES OF SOCIAL MEDIA TEXTING APPS – FREE TEXTING/MESSENGER APPS KIK MESSENGER OOVOO WHATS APP
  • 6. TYPES OF SOCIAL MEDIA MICRO-BLOGGING - ALLOWS FOR SHORT UPDATES AND PHOTOS INSTAGRAM TUMBLR TWITTER VINE
  • 7. TYPES OF SOCIAL MEDIA SELF-DESTRUCTING/SECRET APPS - ANONYMOUS POSTS/PHOTOS SNAPCHAT Disappears WHISPER Superimpose YIK YAK 5 Mile Radius BURN NOTE Email – Limits viewing area no screen capture.
  • 8. TYPES OF SOCIAL MEDIA CHATTING/DATING APP - ALLOWS YOU TO MEET PEOPLE WITH SAME INTEREST AND IN YOUR AREA OMEGLE Talk to strangers Pick random people SKOUT In area MEET ME In Area TINDER Dating App/ Interest/Area
  • 9. Indicators that your child may be in contact with an online predator Becomes secretive about online activities Becomes obsessive about being online Gets angry when he or she can’t get online Receives phone calls from people you do not know or makes calls to numbers that you do not recognize Receives gifts, mail, or packages from someone you do not know Withdraws from family and friends Changes screens or turns off computer when an adult enters a room
  • 10. The dangers of social media Cyberbullying – gesture, written, verbal, physical attack via electronic communication that meets the criteria of state definition of HIB. - distinguishing characteristic - has no time constraints – can happen outside of school hours Sexting/Inappropriate pictures
  • 11. Egg Harbor Township Police Department Detective Heather Stumpf Criminal Investigation Division
  • 12. Laws of Sexting in New Jersey Fact or Fiction
  • 13. •Minors can be arrested and convicted for taking an explicit picture of themselves.
  • 14. •A minor can be convicted and charged if they: •Take a picture of themselves •Distribute •Possess •Store •Post on Internet Provocative pictures of another minor.
  • 15. •Teens that post messages and photos on social media anonymously are completely disguised.
  • 16. •Information can be retrieved from a cell phone after it has been deleted.
  • 17. •Juvenile criminal records disappear once an individual turns 18 years old.
  • 18. •What should kids do if they receive a sext? •Tell a trusted adult • Parent/Guardian • School Administrator • School Counselor •Delete it right away
  • 19. Things to look for CODES 1. 143 – I LOVE YOU 2. 182 – I HATE YOU 3. 420 – MARIJUANA 4. ADR – ADDRESS 5. AEAP – AS EARLY AS POSSIBLE 6. ALAP – AS LATE AS POSSIBLE 7. ASL – AGE, SEX, LOCATION 8. CD9 – PARENTS ARE AROUND 9. KPC – KEEPING PARENTS CLUELESS 10. MOS – MOM OVER SHOULDER
  • 20. Things to look for CODES 1. LMIRL – LET’S MEET IN REAL LIFE 2. PAL – PARENTS ARE LISTENING 3. PAW – PARENTS ARE WATCHING 4. PIR – PARENTS IN THE ROOM 5. ZERG – TO GANG UP ON SOMEONE ** FOR MORE CODES PLEASE SEE www.enough.org
  • 21. HOW TO PROTECT YOUR CHILD Set clear rules with your children regarding when they are allowed to talk, text and surf the Internet via their mobile device. Your child should only communicate with parent-approved contacts. Talk to your children about respecting others online. Your child should never text something to someone else that they would not say to them in real life. Communication should always be truthful, encouraging and helpful. If your child receives a threatening, mean or sexual message from someone they should come to you immediately.
  • 22. HOW TO PROTECT YOUR CHILD Advise your child never to share personal information through their mobile device including date of birth, address, full name, etc. Talk to your children about never using vulgar or sexually explicit language through their mobile device. If anyone begins using vulgar or sexually explicit language that should talk to you and also block further communication. Talk to your children about privacy. Discuss with them how there is no such thing as privacy through their mobile device--and there are no "take-backs" with what they post, text, upload or send. Content your kids send through the Internet or their mobile device can be distributed across the world, without their permission or knowledge.
  • 23. HOW TO PROTECT YOUR CHILD Decide whether your children are allowed to post content to their social networking sites and other websites through their mobile device. Content posted should be parent-approved. If your child receives a text message from an unknown source, they should not reply. Your child should never let someone they don't know use their phone.
  • 24. HOW TO PROTECT YOUR CHILD Charge all devices in your room. Parental Controls Monitoring Software – There are over 30 available software options
  • 25. HOW TO PROTECT YOUR CHILD These internet service providers have parental control options: AOL  AT&T  Cablevision    Comcast   Cox   earthLink   Mousemail  Netzero   Sprint Time Warner   Verizon 

Notes de l'éditeur

  1. -We discussed the laws and offenses related to sexting -Sexting refers to incidents where minors take pictures of themselves nude or partially nude and send them to each other. <number>
  2. <number>
  3. Taking pictures of their own bodies is a prohibited sexual act and is against the law <number>
  4. The minor taking the photo can be convicted ALONG WITH anyone else that may distribute, possess, or post a picture online. <number>
  5. An IP address is a numerical ID that is attached with everything that an individual does online. Even when using public wifi there is still an IP address attached. The police can issue a subpoena request to a person’s network provider to gain information on an IP address. <number>
  6. Phone Dump - devices that are capable of retrieving data <number>
  7. Once a minor is fingerprinted and put into the system it will never go away. Excellent football players that were once considered for scholarships were turned down because of this type of conviction. <number>