SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
YOUNG
PEOPLE AND
sOCIAL
NETWOrKING
sITEs




A GUIDE FOR PARENTS,
CARERS & TEACHERS ABOUT
sOCIAL NETWOrKING sITEs
Social networking sites, such as MySpace, Bebo
  and Facebook, are very popular with children,
  even those as young as 8 and 9. These sites allow
  children to be incredibly creative online, keep in
  touch with their friends and express themselves
  using a whole range of different media and
  applications such as video, photos, music,
  and chat.

However, it’s important to recognise that while these are fun
and offer great possibilities for children, there are potential risks
including cyberbullying, contact by adults with a sexual
interest in children and the misuse of personal information.

  While most social networking sites stipulate
  a minimum user age of 13 or 14, users are
  often younger than this and as a parent,
  carer or teacher it’s really important that you
  familiarise yourself with these services so that
  you can help to support your children in
  using them in a safe and constructive way.

Social networking sites, alongside sites which enable users to put
up their own pictures, text and videos (known as user-generated
content) and blogging sites, are part of a social and technological
revolution that is known as Web 2.0. Web 2.0 is characterised by
the ease with which anyone can produce and publish their own
content and link with others.

Young people especially love this new environment because
they can have a powerful voice to express their identity and
opinions and many are using it to good effect. For example, some
musicians and bands have launched themselves entirely on the
strength of this new stage. And all this is for free and with just one
password – is it any wonder why young people love it?
PrIVATE Or PUBLIC
  sOCIAL LIFE?
What sometimes appears as a private space for a child can
become public very quickly and this blur between public
and private expression can potentially put a child at risk
in two main ways:


  CONTENT:
  Children creating or posting inappropriate, offensive or even illegal content
  in their or others’ Web pages could get them into trouble with their school,
  friends, and even the police, depending on the nature of the material.
  Content posted to the Web can be copied, altered and reposted by anyone
  and it’s very difficult to ‘take back’ what may be later regretted. This can
  damage reputations as well as future prospects.



  CONTACT:
  Children can also put too much personal information in these sites, exposing
  their information to adults with a sexual interest in children. Posting or
  chatting about personal details might enable someone to identify and
  contact your child online or in person. There is also the more likely risk
  of cyberbullying with young people intentionally harming another
  person online.



It is not easy talking to a young person about their social
networking online or offline. Young people often think of these
sites as their private domain, in much the same way as they would
a personal diary and address book.

However because of the public nature of this environment and
because young people have been hurt by inappropriate behaviour
in these spaces, it is important that they understand the risks and
are able to safeguard themselves with the help and support
of others.
Here are 5 Ps that should be considered about
social networking sites.

1. POsITIVE:
Stay positive about social networking sites – try to strike a balance between
educating children and young people to behave safely and trusting them to
get on with it. Get involved – ask them how to create a profile, get them to
show you theirs and ask them to add you to their friends list!


2. PrIVACY:
Make sure that children know how to protect themselves on social
networking sites through the tools provided. It’s important to discuss the
value of privacy with children. Encourage your child to keep their passwords
private and work with them to check the privacy settings on their account
which limit how much of their information can be seen by others – for
example, encourage your child to change their settings to private so that
only people they allow can see what they post and comment on their space,
rather than public which leaves their site open to be viewed by anyone.


3. PHOTOs:
It’s natural that children will want to include a photo on their site or profile,
but help them think about the implications of posting photos and what is
suitable. It is important to think about the type of picture and the kind of
attention it might attract, the information it could divulge and who could see
it. Suggest that your child ask permission of other people in the images that
they post. Also, be aware that photos can be easily copied, changed, shared,
used elsewhere, and can potentially stay online forever. One question to ask
your child is “would they want a future employer to see this photo?”


4. POsTINGs:
The ability to interact with this media and comment on other people’s sites
is part of what makes these sites so attractive. However, make sure you
help your child to think before they post. Set some ground rules about what
is and isn’t OK to say in a blog or profile. This relates to what the child says
about others as much as about themselves. What starts off as a joke or
gossip can quickly escalate to cause real pain which cannot be taken back.


5. POLICE:
It’s really important that you encourage your child to tell you about
inappropriate or illegal activity they may come across. If you suspect your
child is being groomed by someone with a sexual interest in children, it’s
vital that you help them keep a copy of the offending images or messages
and report them to the police via the Child Exploitation and Online Protection
Centre website www.ceop.gov.uk/reportabuse. If they are being harassed
by another user, report that person’s screen name to the SN provider which
hopefully will act on violations to its terms of service.
smArT rULEs
Childnet has produced 5 key SMART rules which
remind young people to be SMART online.
It can be helpful to go through these tips with
your children.




s       sAFE: Keep safe by being careful not to give
        out personal information, – such as your full name,
        e-mail address, phone number, home address,
        photos or school name – either to people you are
        chatting with online or by posting it online where
        other people can see it.



m       mEETING: Meeting someone you have only
        been in touch with online can be dangerous. Only
        do so with your parents’ or carers’ permission and
        even then only when they can be present.




A       ACCEPTING: Accepting e-mails, IM
        messages, or opening files, pictures or texts
        from people you don’t know or trust can lead to
        problems – they may contain viruses or
        nasty messages!




r       rELIABLE: Information you find on the
        internet may not be true, or someone online may be
        lying about who they are.




T       TELL: Tell your parent, carer or a trusted
        adult if someone or something makes you feel
        uncomfortable or worried, or if you or someone you
        know is being bullied online.
FUrTHEr rEsOUrCEs
>> www.childnet.com/blogsafety
The Childnet International website gives internet safety
advice and links for young people, parents, teachers and
other organisations.

>> www.digizen.org/socialnetworking
A new report by Childnet providing teachers with a
comprehensive guide to social networking services.

>> www.childnet.com/music
Childnet’s leaflet on Young People, Music and the Internet has
concise information to help parents, carers and teachers get up
to speed about online music and the legal issues raised when                   YOUNG PE
                                                                                        OPLE,
                                                                               MUSIC &
copyrighted music is used on social networking sites.                           THE INTER
                                                                                         NET




>> www.chatdanger.com
Chatdanger is a site all about the potential dangers on
                                                                             CHATDANGER.COM
interactive services online like chat, IM, online games,
e-mail and on mobiles. Read true stories and find out how
to chat safely.

>> www.connectsafely.org
A US-based resource site and interactive forum where parents,
teens, educators, and experts can discuss safety on the fixed
and mobile social Web.

>> www.ceop.gov.uk
The Child Exploitation and Online Protection (CEOP) Centre’s
website houses a range of information on how to stay safe
online. It includes a unique facility that enables parents and
young people to make reports of actual or attempted
abuse online.

>> www.inhope.org
This site gives details of national child pornography hotlines in
countries around the world.




This guide for parents has been written by the children’s charity
Childnet International in partnership with Net-Family-News.org and
SafeKids.com. The views of this document are solely those of Childnet.

Childnet is a non-profit organisation working in partnership with others to help
make the internet a great and safe place for children. Registered as a charity in
the UK (No 1080173) See www.childnet.com for full details.

Copyright Childnet International 2008

Mais conteúdo relacionado

Destaque

Career Path
Career PathCareer Path
Career Pathjohnee3
 
Creativecontentuclan
CreativecontentuclanCreativecontentuclan
CreativecontentuclanDina El-sofy
 
Patrick notley
Patrick notleyPatrick notley
Patrick notleybymafe
 
Kayyem case study wikipedia
Kayyem case study wikipediaKayyem case study wikipedia
Kayyem case study wikipediaSarah
 
Experiencing History: Books and Beyond
Experiencing History: Books and BeyondExperiencing History: Books and Beyond
Experiencing History: Books and Beyondannielibrarian
 
Wayfinding objects mechanism
Wayfinding objects mechanismWayfinding objects mechanism
Wayfinding objects mechanismjianfeng
 
Wilson's Associate Systems Main
Wilson's Associate Systems Main Wilson's Associate Systems Main
Wilson's Associate Systems Main wilson103566
 
C:\documents and settings\kathryn3823\my documents\dream interpretations
C:\documents and settings\kathryn3823\my documents\dream interpretationsC:\documents and settings\kathryn3823\my documents\dream interpretations
C:\documents and settings\kathryn3823\my documents\dream interpretationsKtjones
 
P catch the moment
P catch the momentP catch the moment
P catch the momentbymafe
 
Saul_PPT_PeerReview
Saul_PPT_PeerReviewSaul_PPT_PeerReview
Saul_PPT_PeerReviewsaulgc
 
Properly publishing a website
Properly publishing a websiteProperly publishing a website
Properly publishing a websiteMohamed Refaei
 
Ian downey elevationburger
Ian downey elevationburgerIan downey elevationburger
Ian downey elevationburgerguesta22580
 
JavaScript 脚本控件(二)
JavaScript 脚本控件(二)JavaScript 脚本控件(二)
JavaScript 脚本控件(二)RANK LIU
 
Pastor Appreciation Day 2010
Pastor Appreciation Day 2010Pastor Appreciation Day 2010
Pastor Appreciation Day 2010guest563ded
 
Manual Utilizare All Energy1.0 Apartamente
Manual Utilizare All Energy1.0 ApartamenteManual Utilizare All Energy1.0 Apartamente
Manual Utilizare All Energy1.0 ApartamenteAlgorithm+
 
How Can A Parent Find Peace Of Mind
How Can A Parent Find Peace Of MindHow Can A Parent Find Peace Of Mind
How Can A Parent Find Peace Of Mindtatianasimpson
 
تصاميمي
تصاميميتصاميمي
تصاميميbotareq
 
Sustaining Your Business After A Disaster Fmj Jan Feb 2012
Sustaining Your Business After A Disaster   Fmj Jan Feb 2012Sustaining Your Business After A Disaster   Fmj Jan Feb 2012
Sustaining Your Business After A Disaster Fmj Jan Feb 2012afpizzitola
 

Destaque (20)

OpenFlow
OpenFlowOpenFlow
OpenFlow
 
Career Path
Career PathCareer Path
Career Path
 
Creativecontentuclan
CreativecontentuclanCreativecontentuclan
Creativecontentuclan
 
Patrick notley
Patrick notleyPatrick notley
Patrick notley
 
Kayyem case study wikipedia
Kayyem case study wikipediaKayyem case study wikipedia
Kayyem case study wikipedia
 
Experiencing History: Books and Beyond
Experiencing History: Books and BeyondExperiencing History: Books and Beyond
Experiencing History: Books and Beyond
 
Wayfinding objects mechanism
Wayfinding objects mechanismWayfinding objects mechanism
Wayfinding objects mechanism
 
Wilson's Associate Systems Main
Wilson's Associate Systems Main Wilson's Associate Systems Main
Wilson's Associate Systems Main
 
NBiz June 2012
NBiz June 2012NBiz June 2012
NBiz June 2012
 
C:\documents and settings\kathryn3823\my documents\dream interpretations
C:\documents and settings\kathryn3823\my documents\dream interpretationsC:\documents and settings\kathryn3823\my documents\dream interpretations
C:\documents and settings\kathryn3823\my documents\dream interpretations
 
P catch the moment
P catch the momentP catch the moment
P catch the moment
 
Saul_PPT_PeerReview
Saul_PPT_PeerReviewSaul_PPT_PeerReview
Saul_PPT_PeerReview
 
Properly publishing a website
Properly publishing a websiteProperly publishing a website
Properly publishing a website
 
Ian downey elevationburger
Ian downey elevationburgerIan downey elevationburger
Ian downey elevationburger
 
JavaScript 脚本控件(二)
JavaScript 脚本控件(二)JavaScript 脚本控件(二)
JavaScript 脚本控件(二)
 
Pastor Appreciation Day 2010
Pastor Appreciation Day 2010Pastor Appreciation Day 2010
Pastor Appreciation Day 2010
 
Manual Utilizare All Energy1.0 Apartamente
Manual Utilizare All Energy1.0 ApartamenteManual Utilizare All Energy1.0 Apartamente
Manual Utilizare All Energy1.0 Apartamente
 
How Can A Parent Find Peace Of Mind
How Can A Parent Find Peace Of MindHow Can A Parent Find Peace Of Mind
How Can A Parent Find Peace Of Mind
 
تصاميمي
تصاميميتصاميمي
تصاميمي
 
Sustaining Your Business After A Disaster Fmj Jan Feb 2012
Sustaining Your Business After A Disaster   Fmj Jan Feb 2012Sustaining Your Business After A Disaster   Fmj Jan Feb 2012
Sustaining Your Business After A Disaster Fmj Jan Feb 2012
 

Semelhante a Social networking leaflet

Hurd, lindse slide share presentation
Hurd, lindse slide share presentationHurd, lindse slide share presentation
Hurd, lindse slide share presentationlhurd01
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshareLoreto Normanurst
 
Protecting Your Children's Online Experience
Protecting Your Children's Online Experience  Protecting Your Children's Online Experience
Protecting Your Children's Online Experience Lisa McKenzie ★
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sbSafeChildUAE1
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversationlippertnicole
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014- Mark - Fullbright
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptxSafeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptxajav252888
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaAndri Priyatna
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
Internet Use for Third & Fourth Graders
Internet Use for Third & Fourth GradersInternet Use for Third & Fourth Graders
Internet Use for Third & Fourth GradersBarb Jansen
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetykirshee
 

Semelhante a Social networking leaflet (20)

Hurd, lindse slide share presentation
Hurd, lindse slide share presentationHurd, lindse slide share presentation
Hurd, lindse slide share presentation
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshare
 
Protecting Your Children's Online Experience
Protecting Your Children's Online Experience  Protecting Your Children's Online Experience
Protecting Your Children's Online Experience
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sb
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversation
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptxSafeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Internet Use for Third & Fourth Graders
Internet Use for Third & Fourth GradersInternet Use for Third & Fourth Graders
Internet Use for Third & Fourth Graders
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Mais de Katherine Lyddon

Professional development 2012
Professional development 2012 Professional development 2012
Professional development 2012 Katherine Lyddon
 
Pointers for sermons on giving
Pointers for sermons on givingPointers for sermons on giving
Pointers for sermons on givingKatherine Lyddon
 
Christmas story with actions
Christmas story with actionsChristmas story with actions
Christmas story with actionsKatherine Lyddon
 
Find someone who.. (All-age setting)
Find someone who.. (All-age setting)Find someone who.. (All-age setting)
Find someone who.. (All-age setting)Katherine Lyddon
 
Find someone who (version for all-age setting)
Find someone who (version for all-age setting)Find someone who (version for all-age setting)
Find someone who (version for all-age setting)Katherine Lyddon
 
Find someone who (version for children)
Find someone who (version for children)Find someone who (version for children)
Find someone who (version for children)Katherine Lyddon
 
Mi test-intelligences-descriptions
Mi test-intelligences-descriptionsMi test-intelligences-descriptions
Mi test-intelligences-descriptionsKatherine Lyddon
 
Learning Styles activity with answers
Learning Styles activity with answersLearning Styles activity with answers
Learning Styles activity with answersKatherine Lyddon
 
Learning styles presentation
Learning styles presentationLearning styles presentation
Learning styles presentationKatherine Lyddon
 

Mais de Katherine Lyddon (20)

Professional development 2012
Professional development 2012 Professional development 2012
Professional development 2012
 
Devon County Show 2012
Devon County Show 2012Devon County Show 2012
Devon County Show 2012
 
Devon County Show 2012
Devon County Show 2012Devon County Show 2012
Devon County Show 2012
 
Children's Spirituality
Children's SpiritualityChildren's Spirituality
Children's Spirituality
 
Pointers for sermons on giving
Pointers for sermons on givingPointers for sermons on giving
Pointers for sermons on giving
 
Encouraging giving
Encouraging givingEncouraging giving
Encouraging giving
 
Children and giving
Children and givingChildren and giving
Children and giving
 
Christmas story with actions
Christmas story with actionsChristmas story with actions
Christmas story with actions
 
Dramas for creation time
Dramas for creation timeDramas for creation time
Dramas for creation time
 
Lego nativity
Lego nativityLego nativity
Lego nativity
 
Find someone who.. (All-age setting)
Find someone who.. (All-age setting)Find someone who.. (All-age setting)
Find someone who.. (All-age setting)
 
Find someone who (version for all-age setting)
Find someone who (version for all-age setting)Find someone who (version for all-age setting)
Find someone who (version for all-age setting)
 
Find someone who (version for children)
Find someone who (version for children)Find someone who (version for children)
Find someone who (version for children)
 
Ice breakers
Ice breakersIce breakers
Ice breakers
 
The Christmas story
The Christmas storyThe Christmas story
The Christmas story
 
Mi test-intelligences-descriptions
Mi test-intelligences-descriptionsMi test-intelligences-descriptions
Mi test-intelligences-descriptions
 
Learning Styles activity with answers
Learning Styles activity with answersLearning Styles activity with answers
Learning Styles activity with answers
 
Learning from Jesus
Learning from JesusLearning from Jesus
Learning from Jesus
 
Learning styles presentation
Learning styles presentationLearning styles presentation
Learning styles presentation
 
Picture of your ministry
Picture of your ministryPicture of your ministry
Picture of your ministry
 

Último

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Social networking leaflet

  • 1. YOUNG PEOPLE AND sOCIAL NETWOrKING sITEs A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT sOCIAL NETWOrKING sITEs
  • 2. Social networking sites, such as MySpace, Bebo and Facebook, are very popular with children, even those as young as 8 and 9. These sites allow children to be incredibly creative online, keep in touch with their friends and express themselves using a whole range of different media and applications such as video, photos, music, and chat. However, it’s important to recognise that while these are fun and offer great possibilities for children, there are potential risks including cyberbullying, contact by adults with a sexual interest in children and the misuse of personal information. While most social networking sites stipulate a minimum user age of 13 or 14, users are often younger than this and as a parent, carer or teacher it’s really important that you familiarise yourself with these services so that you can help to support your children in using them in a safe and constructive way. Social networking sites, alongside sites which enable users to put up their own pictures, text and videos (known as user-generated content) and blogging sites, are part of a social and technological revolution that is known as Web 2.0. Web 2.0 is characterised by the ease with which anyone can produce and publish their own content and link with others. Young people especially love this new environment because they can have a powerful voice to express their identity and opinions and many are using it to good effect. For example, some musicians and bands have launched themselves entirely on the strength of this new stage. And all this is for free and with just one password – is it any wonder why young people love it?
  • 3. PrIVATE Or PUBLIC sOCIAL LIFE? What sometimes appears as a private space for a child can become public very quickly and this blur between public and private expression can potentially put a child at risk in two main ways: CONTENT: Children creating or posting inappropriate, offensive or even illegal content in their or others’ Web pages could get them into trouble with their school, friends, and even the police, depending on the nature of the material. Content posted to the Web can be copied, altered and reposted by anyone and it’s very difficult to ‘take back’ what may be later regretted. This can damage reputations as well as future prospects. CONTACT: Children can also put too much personal information in these sites, exposing their information to adults with a sexual interest in children. Posting or chatting about personal details might enable someone to identify and contact your child online or in person. There is also the more likely risk of cyberbullying with young people intentionally harming another person online. It is not easy talking to a young person about their social networking online or offline. Young people often think of these sites as their private domain, in much the same way as they would a personal diary and address book. However because of the public nature of this environment and because young people have been hurt by inappropriate behaviour in these spaces, it is important that they understand the risks and are able to safeguard themselves with the help and support of others.
  • 4. Here are 5 Ps that should be considered about social networking sites. 1. POsITIVE: Stay positive about social networking sites – try to strike a balance between educating children and young people to behave safely and trusting them to get on with it. Get involved – ask them how to create a profile, get them to show you theirs and ask them to add you to their friends list! 2. PrIVACY: Make sure that children know how to protect themselves on social networking sites through the tools provided. It’s important to discuss the value of privacy with children. Encourage your child to keep their passwords private and work with them to check the privacy settings on their account which limit how much of their information can be seen by others – for example, encourage your child to change their settings to private so that only people they allow can see what they post and comment on their space, rather than public which leaves their site open to be viewed by anyone. 3. PHOTOs: It’s natural that children will want to include a photo on their site or profile, but help them think about the implications of posting photos and what is suitable. It is important to think about the type of picture and the kind of attention it might attract, the information it could divulge and who could see it. Suggest that your child ask permission of other people in the images that they post. Also, be aware that photos can be easily copied, changed, shared, used elsewhere, and can potentially stay online forever. One question to ask your child is “would they want a future employer to see this photo?” 4. POsTINGs: The ability to interact with this media and comment on other people’s sites is part of what makes these sites so attractive. However, make sure you help your child to think before they post. Set some ground rules about what is and isn’t OK to say in a blog or profile. This relates to what the child says about others as much as about themselves. What starts off as a joke or gossip can quickly escalate to cause real pain which cannot be taken back. 5. POLICE: It’s really important that you encourage your child to tell you about inappropriate or illegal activity they may come across. If you suspect your child is being groomed by someone with a sexual interest in children, it’s vital that you help them keep a copy of the offending images or messages and report them to the police via the Child Exploitation and Online Protection Centre website www.ceop.gov.uk/reportabuse. If they are being harassed by another user, report that person’s screen name to the SN provider which hopefully will act on violations to its terms of service.
  • 5. smArT rULEs Childnet has produced 5 key SMART rules which remind young people to be SMART online. It can be helpful to go through these tips with your children. s sAFE: Keep safe by being careful not to give out personal information, – such as your full name, e-mail address, phone number, home address, photos or school name – either to people you are chatting with online or by posting it online where other people can see it. m mEETING: Meeting someone you have only been in touch with online can be dangerous. Only do so with your parents’ or carers’ permission and even then only when they can be present. A ACCEPTING: Accepting e-mails, IM messages, or opening files, pictures or texts from people you don’t know or trust can lead to problems – they may contain viruses or nasty messages! r rELIABLE: Information you find on the internet may not be true, or someone online may be lying about who they are. T TELL: Tell your parent, carer or a trusted adult if someone or something makes you feel uncomfortable or worried, or if you or someone you know is being bullied online.
  • 6. FUrTHEr rEsOUrCEs >> www.childnet.com/blogsafety The Childnet International website gives internet safety advice and links for young people, parents, teachers and other organisations. >> www.digizen.org/socialnetworking A new report by Childnet providing teachers with a comprehensive guide to social networking services. >> www.childnet.com/music Childnet’s leaflet on Young People, Music and the Internet has concise information to help parents, carers and teachers get up to speed about online music and the legal issues raised when YOUNG PE OPLE, MUSIC & copyrighted music is used on social networking sites. THE INTER NET >> www.chatdanger.com Chatdanger is a site all about the potential dangers on CHATDANGER.COM interactive services online like chat, IM, online games, e-mail and on mobiles. Read true stories and find out how to chat safely. >> www.connectsafely.org A US-based resource site and interactive forum where parents, teens, educators, and experts can discuss safety on the fixed and mobile social Web. >> www.ceop.gov.uk The Child Exploitation and Online Protection (CEOP) Centre’s website houses a range of information on how to stay safe online. It includes a unique facility that enables parents and young people to make reports of actual or attempted abuse online. >> www.inhope.org This site gives details of national child pornography hotlines in countries around the world. This guide for parents has been written by the children’s charity Childnet International in partnership with Net-Family-News.org and SafeKids.com. The views of this document are solely those of Childnet. Childnet is a non-profit organisation working in partnership with others to help make the internet a great and safe place for children. Registered as a charity in the UK (No 1080173) See www.childnet.com for full details. Copyright Childnet International 2008