The Internet is one of the five most remarkable inventions of all time.
The good and bad thing about it is that it allows news to travel fast. Lies travel to.
”It is said that a lie can travel halfway around the world via the Internet in the time it takes to tie your shoes.” Imran Idris
A social media post you did as a teen can haunt you later. A child, teen or adult can be targeted by a cyber predator with harmful, even tragic consequences. Everyone must learn the fundamentals of digital citizenship and safety to explore the online world confidently.
For a child, a cell phone or PC is a privilege, not a necessity.
- Necessities are love, food, oxygen, clothing, schooling and safety.
- Privileges should always come with rules and safety measures.
Monitoring your child’s online behaviour is not helicoptering; it is parenting.
The Bureau of Youth Research released the following statistics at UNISA ¹ in 2017 concerning the nature, extent and impact of bullying among secondary school learners in Gauteng. Learners who shared personal information with known friends online/offline • Shared cell phone password (66.1%) • Shared social network login details (33.9%) • Shared email login details (16.8%) Learners who shared personal information with an unknown person met online • Shared cell phone password (25.5%) • Shared social network login details (20.7%) • Shared email login details (8.1%)
58.7% of all learners shared personal information online and offline. (Bureau of Market Research. UNISA. Research Report No 479. 2017)
Guidelines for cybersafety
BE INTERNET AWESOME
Kids: Play the game!
Digital Wellbeing.
Tools to help you understand and manage your tech use.
The Internet can be a handy tool for young people. But instant messaging, chat rooms, emails and social networking sites can also bring trouble – from cyber-bullying to more serious Internet dangers, including exposure to sexual predators. Cyber safety is trying to be safe on the Internet. It is the knowledge of maximizing the user’s safety and security risks to private information and property associated with internet use and self-protection from computer crime.
What you need to know:
- Once you upload content on the internet, it becomes public and accessible to anyone.
- Once it’s out there, it’s permanent. Even if you delete it, it doesn’t truly disappear from the internet. The information may not be visible, but it’s still retained in some form.
- Online anonymity is a lie – your IP (internet protocol) address can give you away. Exceptions
- Your freedom of speech ends the moment it violates another person’s human rights in any way.
How do they know it was me?
Remember when you had to go through a lengthy registration and setup process to get your phone started? Every device has a unique identifier, like a fingerprint. Every time your device connects to the Internet, it keeps track of all your activity. It links every action to you. Everything you do online is tracked, whether you give permission or not, and the Internet never forgets.
How to stay safe on social media
Login: Two-factor authentication is a security feature that helps protect your Facebook account and password. If you set up two-factor authentication, you’ll be asked to enter a unique login code or confirm your login attempt each time someone tries accessing Facebook from a browser or mobile device we don’t recognize. You can also get alerts when someone tries logging in from a browser or mobile device we don’t recognize. Password: Use a strong password. NEVER EVER share your password with anyone. Check the strength of your password on howsecureismypassword.net Privacy settings: Check-in: Put your location on the off setting. By checking in everywhere, you give predators or criminals information on where you are. They can use the information to break into your home if you are not home or home alone or abduct you from the location where you have checked in. Remember that a child goes missing every 5 hours in South Africa, which is an average of 5 children every day! Timeline: Are you aware that universities and potential employers scan your “digital CV”? If you sit with a glass of wine on every second post, your potential employer will be advised that you might have a drinking problem, and they won’t even interview you. Likewise, a university might not accept you because your digital CV portrays a party animal if you have posted many partying pics on your timeline. Be aware of the image you portray of yourself online. Keep most of your life private. Sharing & liking: Be careful what you share and like. You may feel strongly about sharing a post on politics or shaming a person. Once you share it, you have no idea what the next person will comment on. It might be a racist or defamatory comment. Legal action can be taken against everyone who shared or commented on a post. Also, remember that more than 40% of all Facebook posts are fake. There are people out there who post phoney information to stir people up. Always check where the information comes from. Google the information to double-check whether it is true or false. The best advice is to read a post and scroll past without liking, sharing or commenting. Tagging: Set your settings to approve all tags. You don’t want to be implicated in something if you weren’t even there. Posts: Set your settings so only your friends/contacts can see your posts. You don’t want a paedophile who stalks young boys and girls online to like your post on your last beach holiday. Groups: Be aware of what is posted in groups. If you like a post – and someone comes later and makes a defamatory comment – you have to distance yourself from that comment by stating that you are dissatisfied with the comment. If you don’t, it can be viewed that you agree with the comment – and you can be held legally responsible for what was said online. Instead, leave a group immediately if it violates another person’s fundamental human rights. Best practice: Avoid using like buttons. Avoid leaving comments – you can think it – but don’t post it. Playing games: If you play a game posted on Facebook or complete a quiz – it gives 3rd parties access to your information. It is how Facebook and its advertisers make money. They need you to click on their post. The more clicks, the more money they make. Their excuse is that they want to present you with more specific online content – for example, if you looked at clothing, you would notice more and more clothing adverts jumping up when surfing Facebook. Don’t click on adverts, quizzes or games if you don’t want them to have information on your interests and likes. An internal Facebook report leaked this year, for example, revealed that the company could identify when teens feel “insecure”, “worthless”, and “need a confidence boost“. Tech companies can exploit such vulnerabilities to keep people hooked, manipulating, for example, when people receive “likes” for their posts, ensuring they arrive when they are likely to feel vulnerable, in need of approval, or maybe just bored. Blocking: Know how to block and delete unwanted contacts. Delete: WhatsApp now allows you to delete a post you wrongfully posted for the first time —you can choose between “delete for me” or “delete for everyone”.
Are there apps that can pose dangers?
Yes, there are continuously new apps being developed. It’s important to research any new app’s pros and cons thoroughly. Make sure to check the apps your children have on their phones. It’s good to set a rule that they may not install any app without your permission.
Resources:
- Exposure to online sexual content among secondary school learners in Gauteng (Technical Report). Research report No, 479. 2017. Bureau of Market Research
- https://www.inc.com/melanie-curtin/bill-gates-says-this-is-the-safest-age-to-give-a-child-a-smartphone.html
- https://howsecureismypassword.net/
- https://beinternetawesome.withgoogle.com/en_za
- https://www.financialinstitutionslegalsnapshot.com/2015/10/can-you-be-traced-through-your-internet-activity/
- https://wellbeing.google/
Good read:
Selfies, Sexts and Smartphones: A teenager’s online survival guide. SADLEIR, EMMA. 2017. ISBN 9781776092758
References:
How do I set up the Two-Factor Authentication ? — Zynga Poker Help Center. https://zyngasupport.helpshift.com/hc/en/27-zynga-poker/faq/2127-how-do-i-protect-my-account-from-hacks/?s=vip-sweepstakes&f=zynga-poker—vip-dream-vacation-sweepstakes—terms-and-conditions
Lewis, P. (2017). How tech hijacked our brains. The Week, (1148), 60-61.