{"id":225,"date":"2008-06-29T14:55:00","date_gmt":"2008-06-29T14:55:00","guid":{"rendered":"http:\/\/www.ssedro.com\/blog\/?p=225"},"modified":"2008-06-29T14:55:00","modified_gmt":"2008-06-29T14:55:00","slug":"cybersafety-workshop","status":"publish","type":"post","link":"https:\/\/www.ssedro.com\/blog\/2008\/06\/29\/cybersafety-workshop\/","title":{"rendered":"Cybersafety Workshop"},"content":{"rendered":"<p>Great workshop with Davina Pruit-Mentle and Nancy Willard<br \/>These are very incomplete notes.  Please check out their <a href=\"http:\/\/www.cyberbully.org\/\">website<\/a> for great information. Even better, go hear them speak.<br \/><span style=\"font-size:130%;\"><br \/><span style=\"font-weight: bold;\">Tactics that don&#8217;t work to keep kids safe&#8230;<\/span><\/span><br \/><span style=\"font-weight: bold;\">Fear-based Tactics<\/span><\/p>\n<ul>\n<li>stranger danger warnings<\/li>\n<li>kids view adults as not knowing what is really going on with teh internet<\/li>\n<\/ul>\n<p><span style=\"font-weight: bold;\"><br \/>Misleading Use of Data<\/span><\/p>\n<ul>\n<li>1 in 7 youth have been sexually solicieted online &#8211; not true<\/li>\n<li>generally received by teenagers from other teens<\/li>\n<\/ul>\n<p><span style=\"font-weight: bold;\">Reliance on Filtering<\/span><\/p>\n<ul>\n<li>won&#8217;t block porn traps<\/li>\n<li>won&#8217;t protect against online communication<\/li>\n<li>won&#8217;t deter determined teens because they know how to bypass the filter<\/li>\n<li>frequently blocks appropriate sites<\/li>\n<li>over reliance on this has created false security and doesn&#8217;t teach kids safety skills, responsible choices<\/li>\n<\/ul>\n<p><span style=\"font-weight: bold;\">Simplistic Rules<\/span><\/p>\n<ul>\n<li>&#8220;Don&#8217;t post personal information online.&#8221;<\/li>\n<li>&#8220;Just say no&#8221; didn&#8217;t work with drugs<\/li>\n<li>Simple rules are appropriate for children but not tweens and teens<\/li>\n<\/ul>\n<p><span style=\"font-weight: bold;\">Sole Reliance on Adults<\/span><\/p>\n<ul>\n<li>Tell an adult if you feel uncomfortable &#8211; assumes adults know what to do<\/li>\n<li>Teens won&#8217;t tell adults if they think the adults will blame them, restrict their online access, or make the problem workse<\/li>\n<li>Most at-risk kids don&#8217;t have great relationships with adults so they don&#8217;t have someone they can go to for help. We need to educate those savvy teens on how to protect themselves and their less able friends<\/li>\n<\/ul>\n<p><span style=\"font-weight: bold;\">Avoiding Uncomfortable Information<\/span><\/p>\n<ul>\n<li>Some programs don&#8217;t discuss the intentions of predators, behaviors of the teen that might attract predators&#8230;<\/li>\n<\/ul>\n<p><span style=\"font-size:130%;\"><span style=\"font-weight: bold;\">Successful Tactics<\/span><\/span><br \/>Children should not be out surfing the internet. Period.  They don&#8217;t have the cognitive capacity to independently make good choices online.  <\/p>\n<p>For middle school students, teach them practical problem solving.  Teach them the values and standards they should uses in their ethical decision making.  (Nancy has a great list of ethical decision-making questions.)<\/p>\n<p>Risk Prevention Approach- we are pretty good at addressing the needs of the naive kids. We are failing at addressing the needs of the at-risk kids.  Needs to happen at school, district, state and national level.  People who understand technology often don&#8217;t understand what they need to know about youth risk, and vice versa.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Great workshop with Davina Pruit-Mentle and Nancy WillardThese are very incomplete notes. Please check out their website for great information. Even better, go hear them speak.Tactics that don&#8217;t work to keep kids safe&#8230;Fear-based Tactics<\/p>\n<p> stranger danger warnings kids view adults as not knowing what is really going on with teh internet <\/p>\n<p>Misleading Use of Data<\/p>\n<p> [&#8230;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[55],"tags":[],"class_list":["post-225","post","type-post","status-publish","format-standard","hentry","category-cybersafety-necc2008","odd"],"_links":{"self":[{"href":"https:\/\/www.ssedro.com\/blog\/wp-json\/wp\/v2\/posts\/225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ssedro.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ssedro.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ssedro.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ssedro.com\/blog\/wp-json\/wp\/v2\/comments?post=225"}],"version-history":[{"count":0,"href":"https:\/\/www.ssedro.com\/blog\/wp-json\/wp\/v2\/posts\/225\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.ssedro.com\/blog\/wp-json\/wp\/v2\/media?parent=225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ssedro.com\/blog\/wp-json\/wp\/v2\/categories?post=225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ssedro.com\/blog\/wp-json\/wp\/v2\/tags?post=225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}