SlideShare uma empresa Scribd logo
1 de 17
Texting, Tweeting, and
the Teenage Cyberworld
Frederick S. Lane
FSLane3@gmail.com
Parent Information Night,
Burlington High School, Burlington, VT
17 April 2013
www.CybertrapsfortheYoung.comwww.FrederickLane.com
Background
• Attorney, Educational
Consultant & Lecturer
• 10 Years -- Burlington
(VT) School Board
• Author of 7 Books
• Computer Forensics
Expert
• Technology & Privacy
Specialist
• Student Safety Advocate
www.FrederickLane.com www.CybertrapsfortheYoung.com
Motivation for Cybertraps
• Parenting
• School Board Service
• VT Legislative Action
• Computer Forensics
Cases
www.FrederickLane.com www.CybertrapsfortheYoung.com
Younger and Younger
www.FrederickLane.com www.CybertrapsfortheYoung.com
The Crimes
• Cyberbullying
• Cyberharassment
• Identity Theft / Spoofing
• Sexting
• Sextortion
www.FrederickLane.com www.CybertrapsfortheYoung.com
Convergence
• Computers
• Tablets
• Gaming Devices
• Cellphones
• Smartphones
www.FrederickLane.com www.CybertrapsfortheYoung.com
Obsession
•4,020
•2,400
•Sleep-texting
•Sleep Deprivation
www.FrederickLane.com www.CybertrapsfortheYoung.com
Channels for Bullying
• Text Messages (SMS/MMS)
• Instant Messaging (IM)
• Chat Rooms
• VOIP / In-Game Chat
• Social Media Networks
• Mobile Apps
• Email
www.FrederickLane.com www.CybertrapsfortheYoung.com
The Usual Suspects
• Facebook
• YouTube
• Twitter
• Instagram
• Google+
• Tumblr
www.FrederickLane.com www.CybertrapsfortheYoung.com
The Unusual Suspects
• Tango
• OoVoo
• Pheed
• Kik Messenger
• Snapchat
• Vine
• WhatsApp
• Kakao Talk
• WeChat
• And Dozens of Others
www.FrederickLane.com www.CybertrapsfortheYoung.com
Potential Victims
• Kids, K-12
– All are potentially at risk
• Teachers and
Administrators
• Perpetrators and Families
• School Districts
www.FrederickLane.com www.CybertrapsfortheYoung.com
Important Questions
• What devices does your child use, both at
home and at other locations?
• “What are your passwords?”
• “What social networks or web sites do
you use?”
• “What apps do you and your friends use?”
• When was the last time you looked at
your child’s phone?
• Do you know how to review your child’s
text messages, both native and in-app?
www.FrederickLane.com www.CybertrapsfortheYoung.com
Parental Solutions
• Household Education
• Communication
• Supervision
• Partnerships with Schools
• Networking and Advocacy
www.FrederickLane.com www.CybertrapsfortheYoung.com
Age-Appropriate Curricula
• Elementary School:
– The Limits of Sharing
– Personal Boundaries
• Middle School:
– Much More on Personal Boundaries
– Anti-Cyberbullying and Anti-Harassment
– Introduction to Criminal Consequences and
Cyberethics
• High School:
– Much More on Criminal Consequences and
Cyberethics
– Long-Term Consequences of Digital Stupidity
www.FrederickLane.com www.CybertrapsfortheYoung.com
District Solutions
• Schedule Annual Information Sessions
for Teachers, Parents, and Students
• Require Students and Parents to Read
and Sign Acceptable Use Policies
• Incorporate Cybertraps Training Into
Professional Development for Teachers
and Administrators
• Liaise With Student Resource
Officers, Law Enforcement, and
Legislatorswww.FrederickLane.com www.CybertrapsfortheYoung.com
Slides and Contact Info
• Download a PDF of slides
from:
CybertrapsfortheYoung.com
• E-mail or Call Me:
FSLane3@gmail.com
802-318-4604
www.FrederickLane.com www.CybertrapsfortheYoung.com
Texting, Tweeting, and
the Teenage Cyberworld
Frederick S. Lane
FSLane3@gmail.com
Parent Information Night,
Burlington High School, Burlington, VT
17 April 2013
www.CybertrapsfortheYoung.comwww.FrederickLane.com

Mais conteúdo relacionado

Mais de Frederick Lane

2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital MobFrederick Lane
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational ToolFrederick Lane
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social MediaFrederick Lane
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for EducatorsFrederick Lane
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and ProfessionalFrederick Lane
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEEFrederick Lane
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?Frederick Lane
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR ProfessionalsFrederick Lane
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEEFrederick Lane
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEEFrederick Lane
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...Frederick Lane
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & CybersecurityFrederick Lane
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get CaughtFrederick Lane
 
2019-06-10 Cybertraps 2.0
2019-06-10 Cybertraps 2.02019-06-10 Cybertraps 2.0
2019-06-10 Cybertraps 2.0Frederick Lane
 
2019-06-04 Cybertraps: Developments and Trends
2019-06-04 Cybertraps: Developments and Trends2019-06-04 Cybertraps: Developments and Trends
2019-06-04 Cybertraps: Developments and TrendsFrederick Lane
 
2019-05-02 Art & Ethics: Censorship
2019-05-02 Art & Ethics: Censorship2019-05-02 Art & Ethics: Censorship
2019-05-02 Art & Ethics: CensorshipFrederick Lane
 
2019-04-29 Cybertraps for Museum Professionals
2019-04-29 Cybertraps for Museum Professionals2019-04-29 Cybertraps for Museum Professionals
2019-04-29 Cybertraps for Museum ProfessionalsFrederick Lane
 

Mais de Frederick Lane (20)

2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught
 
2019-06-10 Cybertraps 2.0
2019-06-10 Cybertraps 2.02019-06-10 Cybertraps 2.0
2019-06-10 Cybertraps 2.0
 
2019-06-04 Cybertraps: Developments and Trends
2019-06-04 Cybertraps: Developments and Trends2019-06-04 Cybertraps: Developments and Trends
2019-06-04 Cybertraps: Developments and Trends
 
2019-05-02 Art & Ethics: Censorship
2019-05-02 Art & Ethics: Censorship2019-05-02 Art & Ethics: Censorship
2019-05-02 Art & Ethics: Censorship
 
2019-04-29 Cybertraps for Museum Professionals
2019-04-29 Cybertraps for Museum Professionals2019-04-29 Cybertraps for Museum Professionals
2019-04-29 Cybertraps for Museum Professionals
 

Último

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

2013-04-17 Tweeting, Texting, and the Teenage Cyberworld

  • 1. Texting, Tweeting, and the Teenage Cyberworld Frederick S. Lane FSLane3@gmail.com Parent Information Night, Burlington High School, Burlington, VT 17 April 2013 www.CybertrapsfortheYoung.comwww.FrederickLane.com
  • 2. Background • Attorney, Educational Consultant & Lecturer • 10 Years -- Burlington (VT) School Board • Author of 7 Books • Computer Forensics Expert • Technology & Privacy Specialist • Student Safety Advocate www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 3. Motivation for Cybertraps • Parenting • School Board Service • VT Legislative Action • Computer Forensics Cases www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 4. Younger and Younger www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 5. The Crimes • Cyberbullying • Cyberharassment • Identity Theft / Spoofing • Sexting • Sextortion www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 6. Convergence • Computers • Tablets • Gaming Devices • Cellphones • Smartphones www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 8. Channels for Bullying • Text Messages (SMS/MMS) • Instant Messaging (IM) • Chat Rooms • VOIP / In-Game Chat • Social Media Networks • Mobile Apps • Email www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 9. The Usual Suspects • Facebook • YouTube • Twitter • Instagram • Google+ • Tumblr www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 10. The Unusual Suspects • Tango • OoVoo • Pheed • Kik Messenger • Snapchat • Vine • WhatsApp • Kakao Talk • WeChat • And Dozens of Others www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 11. Potential Victims • Kids, K-12 – All are potentially at risk • Teachers and Administrators • Perpetrators and Families • School Districts www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 12. Important Questions • What devices does your child use, both at home and at other locations? • “What are your passwords?” • “What social networks or web sites do you use?” • “What apps do you and your friends use?” • When was the last time you looked at your child’s phone? • Do you know how to review your child’s text messages, both native and in-app? www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 13. Parental Solutions • Household Education • Communication • Supervision • Partnerships with Schools • Networking and Advocacy www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 14. Age-Appropriate Curricula • Elementary School: – The Limits of Sharing – Personal Boundaries • Middle School: – Much More on Personal Boundaries – Anti-Cyberbullying and Anti-Harassment – Introduction to Criminal Consequences and Cyberethics • High School: – Much More on Criminal Consequences and Cyberethics – Long-Term Consequences of Digital Stupidity www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 15. District Solutions • Schedule Annual Information Sessions for Teachers, Parents, and Students • Require Students and Parents to Read and Sign Acceptable Use Policies • Incorporate Cybertraps Training Into Professional Development for Teachers and Administrators • Liaise With Student Resource Officers, Law Enforcement, and Legislatorswww.FrederickLane.com www.CybertrapsfortheYoung.com
  • 16. Slides and Contact Info • Download a PDF of slides from: CybertrapsfortheYoung.com • E-mail or Call Me: FSLane3@gmail.com 802-318-4604 www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 17. Texting, Tweeting, and the Teenage Cyberworld Frederick S. Lane FSLane3@gmail.com Parent Information Night, Burlington High School, Burlington, VT 17 April 2013 www.CybertrapsfortheYoung.comwww.FrederickLane.com