SlideShare uma empresa Scribd logo
1 de 65
Baixar para ler offline
Bess Auer
Navigating the
Social Media
Playground
Bess Auer
Educator.
Full time blogger and social media consultant.
Host of one of the largest blogging and
social media conferences in the southeast.
Owner of FloridaSwimNetwork.com.
Wife and mom.
Bess Auer
BessAuer.com @Bess_Auer
Is this your back seat?
BessAuer.com @Bess_Auer
Social Media Stats
Source: Pew Research Center’s Internet and American Life Project
95% of all teens ages 12-17 are now online
80% of those online teens are users of social
media
77% of adolescents have a mobile device
22% say they access a social media account
over 10 times per day
BessAuer.com @Bess_Auer
Social Media Stats
Source: Pew Research Center’s Internet and American Life Project
7.5 million users on Facebook are under age 13
50% of teens say they have lied about their
age in order to access a site
80% of those Facebook users are under age 10
COPPA Child’s Online Privacy Protection Act
BessAuer.com @Bess_Auer
endless number of social media sites:
A tiny glimpse at the
BessAuer.com @Bess_Auer
What’s a
parent to do?
BessAuer.com @Bess_Auer
BessAuer.com @Bess_Auer
RELAX
BessAuer.com @Bess_Auer
Breath
Deep
BessAuer.com @Bess_Auer
Socrates on Technology
Weaken the mind
Cause humans to rely
upon it rather than rely
on themselves
Ruin society as he
knew it
BessAuer.com @Bess_Auer
You want to have
pencils in the
classroom?!
BessAuer.com @Bess_Auer
BessAuer.com @Bess_Auer
BessAuer.com @Bess_Auer
#PencilChat
BessAuer.com @Bess_Auer
BessAuer.com @Bess_Auer
BessAuer.com @Bess_Auer
BessAuer.com @Bess_Auer
Status updates
BessAuer.com @Bess_Auer
BessAuer.com @Bess_Auer
BessAuer.com @Bess_Auer
BessAuer.com @Bess_Auer
Private
BessAuer.com @Bess_Auer
Friends
BessAuer.com @Bess_Auer
Off
BessAuer.com @Bess_Auer
BessAuer.com @Bess_Auer
BessAuer.com @Bess_Auer
BessAuer.com @Bess_Auer
BessAuer.com @Bess_Auer
BessAuer.com @Bess_Auer
BessAuer.com @Bess_Auer
BessAuer.com @Bess_Auer
Read
articles
Connect with
Experts
Find
information
Tweet
celebrities
Search
Engine!
My favorite!
BessAuer.com @Bess_Auer
BessAuer.com @Bess_Auer
BessAuer.com @Bess_Auer
Social Impact
Mixed results from research studying social media
and self-esteem
Positive uses and influences
Negative uses and influences
BessAuer.com @Bess_Auer
Positive Uses
Stay in touch with current/old friends
Reach out and make new friends
Reinforcement of achieving goals and “brag” items
Learning important social skills
Increased social engagement and connectedness
BessAuer.com @Bess_Auer
Negative Uses
Bullying or just plain mean behavior
Inappropriate photos/videos posted
Cliques or feeling left out
Dishonest use - anonymous/imposters
Time suck
BessAuer.com @Bess_Auer
BessAuer.com @Bess_Auer
Academic Impact
Results have shown technology aids in learning
Schools are using social media in and out of the
classroom
Access to more information than at any time
period in history
BessAuer.com @Bess_Auer
Positive Uses
Discuss homework/group study
Post reminders
Learning important skills
Building a resume for college and then career
BessAuer.com @Bess_Auer
Negative Uses
Multi-tasking to the detriment
Cheating
Posting something a school will view negatively:
Offensive language
Sexually-explicit content
Violent or bullying behavior
Drugs or alcohol references
In 2012 one-third of colleges say they denied
an applicant due to social media postings
57% of colleges now pay companies to monitor
their student-athlete postings
Looking to College
Google searches catalog 9 years of online
history
Digital
Footprint
BessAuer.com @Bess_Auer
You’re a member
I’m a member
#1
BessAuer.com @Bess_Auer
I’m a member#1
Be a silent observer
Ask before tagging photos
Check your child and his or her
friends
Expect the limit to be pushed
BessAuer.com @Bess_Auer
I’m a member#1
OMG!
What is my
son
thinking?
BessAuer.com @Bess_Auer
Take This Down
Put This Up
#2
BessAuer.com @Bess_Auer
#2Take This Down
BessAuer.com @Bess_Auer
#2Put this Up
BessAuer.com @Bess_Auer
Multitaksing
Singletasking
#3
BessAuer.com @Bess_Auer
Singletasking#3
Homework in a common area
Put the cell phone away
Set a timer
Self-Control app
Kid’s Time app
BessAuer.com @Bess_Auer
Fun Builders
Future Builders
#4
BessAuer.com @Bess_Auer
Fun Builders#4
BessAuer.com @Bess_Auer
Future Builders#4
BessAuer.com @Bess_Auer
Future Builders#4
BessAuer.com @Bess_Auer
Future Builders#4
Digital
Footprint!
BessAuer.com @Bess_Auer
Your behavior
My behavior
#5
BessAuer.com @Bess_Auer
My behavior#5
Be aware your child will see your posting
Set the best example
Look for the teachable opportunities
Ask your child’s advice
BessAuer.com @Bess_Auer
Resources
CommonSenseMedia.org
Bess@BessAuer.com
KidsHealth.org
Google.com
YouTube.com

Mais conteúdo relacionado

Destaque

Mandibular Movements
Mandibular MovementsMandibular Movements
Mandibular Movements
Rohan Bhoil
 

Destaque (12)

End Hunger - Meet Kate
End Hunger - Meet Kate End Hunger - Meet Kate
End Hunger - Meet Kate
 
Social Media for Coaches
Social Media for CoachesSocial Media for Coaches
Social Media for Coaches
 
Social Media for Elementary
Social Media for ElementarySocial Media for Elementary
Social Media for Elementary
 
Blogging for a Cause
Blogging for a CauseBlogging for a Cause
Blogging for a Cause
 
Livro juris consolidada(4)
Livro juris consolidada(4)Livro juris consolidada(4)
Livro juris consolidada(4)
 
Informationsmöte förskoleklass inför läsår 15-16
Informationsmöte förskoleklass inför läsår 15-16Informationsmöte förskoleklass inför läsår 15-16
Informationsmöte förskoleklass inför läsår 15-16
 
Live Streaming on WordPress
Live Streaming on WordPressLive Streaming on WordPress
Live Streaming on WordPress
 
Kurbanlık Seçimi, Kesimi ve Etin Muhafazası Nasıl Olmalıdır?
Kurbanlık Seçimi, Kesimi ve Etin Muhafazası Nasıl Olmalıdır?Kurbanlık Seçimi, Kesimi ve Etin Muhafazası Nasıl Olmalıdır?
Kurbanlık Seçimi, Kesimi ve Etin Muhafazası Nasıl Olmalıdır?
 
Bournvita 3
Bournvita 3Bournvita 3
Bournvita 3
 
Metasploit (Module-1) - Getting Started With Metasploit
Metasploit (Module-1) - Getting Started With MetasploitMetasploit (Module-1) - Getting Started With Metasploit
Metasploit (Module-1) - Getting Started With Metasploit
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Mandibular Movements
Mandibular MovementsMandibular Movements
Mandibular Movements
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Parents and Social Media