狠狠撸

狠狠撸Share a Scribd company logo
What Will They Text Next:
Teen, Social Media, and
Technology
The Screen Challenge
Take a moment to total how much time you
spend daily looking at a screen.
Then,
Take some time to estimate how much time
your teenager spends looking at a screen.
Kids Today…
? 78% of teens have cell phones, almost half own
smartphones
? 1 in 4 are “cell-mostly” internet users
? 23% of teens have a tablet
? 81% use social networking sites
? 8-18 year olds devote an average of 7 hours and 38
minutes to using entertainment media across a typical
day
? 100% of EHS students have a laptop and access to the
internet
POP Quiz!
What Social Media Are They
Using?
What are they posting?
Brain Changes:
https://www.youtube.com/watch?v=
HffWFd_6bJ0
Dangers of Social Media
What we know about teens:
? They are constantly trying
to define themselves.
? They crave positive
feedback to help them
see how their identity fits
into their world.
? They use social media for
this feedback... but they
are looking in a dangerous
place.
How is this harmful:
? The danger exists in the
possibility of a very public
rejection because
negative feedback is there
for anyone and everyone
to see.
? Another danger is that
teens ask for feedback
without learning first that
not everyone will respond
in a supportive way.
What Can You Do
? In order to teach your children how to seek
feedback from genuine sources, parents
should start early by helping their children
identify trustworthy sources.
? Most importantly, parents need to
reinforce that the most influential voice
should come from within.
Engage Your Family
? Engage your teen in meaningful conversation about internet
use
? Talk to other parents, deans, counselors
? Validate your teen's reality and their need to be connected
? Engage your child in drafting the rules for the family:
– guidelines for use
– consequences for breaking those rules
? Model appropriate use of technology:
– minimize texting
– don't use cell phone/laptop at meals
– don't use cell phone in the car
Let Your Teen Know
? That you have the right to check their laptop,
phone, etc..
? What apps/media are okay and what are not
? That you need to know their passwords
? What their online responsibilities are:
– Protecting their privacy
– Not engaging in cyber bullying
What Are You Worried About?
? Invading your kid’s privacy?
? Not feeling comfortable with being on social
media?
? That they have secret accounts?
Just as you would establish ground rules and do
diligence in person, there is a need to do the same
things - or even more - with the internet.
Other Parental Concern
? 81% are worried about how much advertisers can
learn about their kid’s through their behavior
online
? 72% are worried their kid is interacting with
people they do not know online
? 70% are worried about how their online activity
might affect their future academic or
employment opportunities
? 60% are worried about their kids reputation
online
(Pew Research Center, 2013)
Apps to Protect Your Kid in the Car
? Canary
? MamaBear Child Tracker app
? Rapid Protect
? OnStar Family Link
? Travelers Insurance IntelliDrive
? Progressive's Snapshot
? AT&T DriveMode
? Sprint Drive First
? Cellcontrol
? Drive Scribe
Apps to Protect Your Teen’s
Phone
? My Mobile Watchdog
? Mobile Spy
? Text Guard
? WebWatcher
Scripture to Empower
Matthew 18.6-7
‘If any of you put a stumbling-block before one of
these little ones who believe in me, it would be better
for you if a great millstone were fastened around your
neck and you were drowned in the depth of the
sea. Woe to the world because of stumbling-blocks!
Occasions for stumbling are bound to come, but woe to
the one by whom the stumbling-block comes!”
Tech_and_social_media_PF.ppt

More Related Content

Similar to Tech_and_social_media_PF.ppt (20)

Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
Mohamed ElGabry
?
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016
Kathryn White
?
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
HomeGuides
?
eSafety Presentation
eSafety PresentationeSafety Presentation
eSafety Presentation
Mr_Elliott
?
Technology Influence
Technology Influence Technology Influence
Technology Influence
Ilaxi Patel
?
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
emilyensign
?
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
Kumar Manish
?
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)
amalgarn
?
The TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech SafetyThe TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech Safety
TeenSafe
?
Cyber safety & social media deck
Cyber safety & social media deckCyber safety & social media deck
Cyber safety & social media deck
sagedayschool
?
Parenting the MySpace Generation
Parenting the MySpace GenerationParenting the MySpace Generation
Parenting the MySpace Generation
dlevin
?
Digital Natives Presentation
Digital Natives PresentationDigital Natives Presentation
Digital Natives Presentation
avarry
?
KPS Appy night out
KPS Appy night out KPS Appy night out
KPS Appy night out
Greg Fry
?
Fall 2017 digital safety savvy parent meeting presentation
Fall 2017 digital safety savvy parent meeting presentationFall 2017 digital safety savvy parent meeting presentation
Fall 2017 digital safety savvy parent meeting presentation
Ruth Doering
?
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
jun ijan
?
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-tr
Elmer Sunga
?
Yew Chung International School of Beijing - Computers and your Children
Yew Chung International School of Beijing - Computers and your ChildrenYew Chung International School of Beijing - Computers and your Children
Yew Chung International School of Beijing - Computers and your Children
Yew Chung International School of Beijing
?
Raising Kids in a Digital World 2016
Raising Kids in a Digital World 2016Raising Kids in a Digital World 2016
Raising Kids in a Digital World 2016
Holly Gerla
?
Tipsfor parents
Tipsfor parentsTipsfor parents
Tipsfor parents
faystonelementaryschool
?
International comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youthInternational comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youth
ThinkB4UClick
?
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
HomeGuides
?
eSafety Presentation
eSafety PresentationeSafety Presentation
eSafety Presentation
Mr_Elliott
?
Technology Influence
Technology Influence Technology Influence
Technology Influence
Ilaxi Patel
?
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
emilyensign
?
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
Kumar Manish
?
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)
amalgarn
?
The TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech SafetyThe TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech Safety
TeenSafe
?
Cyber safety & social media deck
Cyber safety & social media deckCyber safety & social media deck
Cyber safety & social media deck
sagedayschool
?
Parenting the MySpace Generation
Parenting the MySpace GenerationParenting the MySpace Generation
Parenting the MySpace Generation
dlevin
?
Digital Natives Presentation
Digital Natives PresentationDigital Natives Presentation
Digital Natives Presentation
avarry
?
KPS Appy night out
KPS Appy night out KPS Appy night out
KPS Appy night out
Greg Fry
?
Fall 2017 digital safety savvy parent meeting presentation
Fall 2017 digital safety savvy parent meeting presentationFall 2017 digital safety savvy parent meeting presentation
Fall 2017 digital safety savvy parent meeting presentation
Ruth Doering
?
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
jun ijan
?
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-tr
Elmer Sunga
?
Raising Kids in a Digital World 2016
Raising Kids in a Digital World 2016Raising Kids in a Digital World 2016
Raising Kids in a Digital World 2016
Holly Gerla
?
International comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youthInternational comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youth
ThinkB4UClick
?

Recently uploaded (20)

加拿大毕业证购买(百年理工学院成绩单)颁颁文凭学历认证
加拿大毕业证购买(百年理工学院成绩单)颁颁文凭学历认证加拿大毕业证购买(百年理工学院成绩单)颁颁文凭学历认证
加拿大毕业证购买(百年理工学院成绩单)颁颁文凭学历认证
taqyed
?
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
IJCNCJournal
?
加拿大毕业证(鲍罢惭成绩单)多伦多大学毕业证如何办理
加拿大毕业证(鲍罢惭成绩单)多伦多大学毕业证如何办理加拿大毕业证(鲍罢惭成绩单)多伦多大学毕业证如何办理
加拿大毕业证(鲍罢惭成绩单)多伦多大学毕业证如何办理
taqyed
?
Mastering FortiWeb: An Extensive Admin Guide for Secure Deployments
Mastering FortiWeb: An Extensive Admin Guide for Secure DeploymentsMastering FortiWeb: An Extensive Admin Guide for Secure Deployments
Mastering FortiWeb: An Extensive Admin Guide for Secure Deployments
Atakan ATAK
?
Advantages of Outsourcing IT Security Solutions
Advantages of Outsourcing IT Security SolutionsAdvantages of Outsourcing IT Security Solutions
Advantages of Outsourcing IT Security Solutions
Dalin Owen
?
complete On-Page SEO Best Practices guide
complete On-Page SEO Best Practices guidecomplete On-Page SEO Best Practices guide
complete On-Page SEO Best Practices guide
Rana Hassan
?
Introduction on how unique identifier systems are managed and coordinated - R...
Introduction on how unique identifier systems are managed and coordinated - R...Introduction on how unique identifier systems are managed and coordinated - R...
Introduction on how unique identifier systems are managed and coordinated - R...
APNIC
?
IDM Crack 2025 Internet Download Manger Patch
IDM Crack 2025 Internet Download Manger PatchIDM Crack 2025 Internet Download Manger Patch
IDM Crack 2025 Internet Download Manger Patch
wistrendugftr
?
2a Solving Equations Bar Method.pkdkdmptx
2a Solving Equations Bar Method.pkdkdmptx2a Solving Equations Bar Method.pkdkdmptx
2a Solving Equations Bar Method.pkdkdmptx
alvinlibre
?
Choking_Death_Statistics_2025_Presentation.pptx
Choking_Death_Statistics_2025_Presentation.pptxChoking_Death_Statistics_2025_Presentation.pptx
Choking_Death_Statistics_2025_Presentation.pptx
Joseph897315
?
Antorik Q Final.pptx999999999999999999999
Antorik Q Final.pptx999999999999999999999Antorik Q Final.pptx999999999999999999999
Antorik Q Final.pptx999999999999999999999
PrayasChatterjee1
?
KeepItOn-2024-Internet-Shutdowns-Annual-Report.pdf
KeepItOn-2024-Internet-Shutdowns-Annual-Report.pdfKeepItOn-2024-Internet-Shutdowns-Annual-Report.pdf
KeepItOn-2024-Internet-Shutdowns-Annual-Report.pdf
sabranghindi
?
Importance of understanding buyer behaviors.pptx
Importance of understanding buyer behaviors.pptxImportance of understanding buyer behaviors.pptx
Importance of understanding buyer behaviors.pptx
ankitregmi20580419
?
The-Evolution-of-Media-Media and information literacy.pptx
The-Evolution-of-Media-Media and information literacy.pptxThe-Evolution-of-Media-Media and information literacy.pptx
The-Evolution-of-Media-Media and information literacy.pptx
febiemae2007
?
IPv6 - Global and Malaysia's Perspectives
IPv6 - Global and Malaysia's PerspectivesIPv6 - Global and Malaysia's Perspectives
IPv6 - Global and Malaysia's Perspectives
APNIC
?
QasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartupQasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartup
AidarIsakhanov
?
Intelligent-Systems-in-Manufacturing.pptx
Intelligent-Systems-in-Manufacturing.pptxIntelligent-Systems-in-Manufacturing.pptx
Intelligent-Systems-in-Manufacturing.pptx
ErickWasonga2
?
A Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beachA Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beach
sethiserena
?
AstuteAP: AI-Powered Supplier Invoice Automation for Seamless Accounts Payabl...
AstuteAP: AI-Powered Supplier Invoice Automation for Seamless Accounts Payabl...AstuteAP: AI-Powered Supplier Invoice Automation for Seamless Accounts Payabl...
AstuteAP: AI-Powered Supplier Invoice Automation for Seamless Accounts Payabl...
AstuteBusiness
?
cyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online moneycyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online money
VEENAKSHI PATHAK
?
加拿大毕业证购买(百年理工学院成绩单)颁颁文凭学历认证
加拿大毕业证购买(百年理工学院成绩单)颁颁文凭学历认证加拿大毕业证购买(百年理工学院成绩单)颁颁文凭学历认证
加拿大毕业证购买(百年理工学院成绩单)颁颁文凭学历认证
taqyed
?
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
IJCNCJournal
?
加拿大毕业证(鲍罢惭成绩单)多伦多大学毕业证如何办理
加拿大毕业证(鲍罢惭成绩单)多伦多大学毕业证如何办理加拿大毕业证(鲍罢惭成绩单)多伦多大学毕业证如何办理
加拿大毕业证(鲍罢惭成绩单)多伦多大学毕业证如何办理
taqyed
?
Mastering FortiWeb: An Extensive Admin Guide for Secure Deployments
Mastering FortiWeb: An Extensive Admin Guide for Secure DeploymentsMastering FortiWeb: An Extensive Admin Guide for Secure Deployments
Mastering FortiWeb: An Extensive Admin Guide for Secure Deployments
Atakan ATAK
?
Advantages of Outsourcing IT Security Solutions
Advantages of Outsourcing IT Security SolutionsAdvantages of Outsourcing IT Security Solutions
Advantages of Outsourcing IT Security Solutions
Dalin Owen
?
complete On-Page SEO Best Practices guide
complete On-Page SEO Best Practices guidecomplete On-Page SEO Best Practices guide
complete On-Page SEO Best Practices guide
Rana Hassan
?
Introduction on how unique identifier systems are managed and coordinated - R...
Introduction on how unique identifier systems are managed and coordinated - R...Introduction on how unique identifier systems are managed and coordinated - R...
Introduction on how unique identifier systems are managed and coordinated - R...
APNIC
?
IDM Crack 2025 Internet Download Manger Patch
IDM Crack 2025 Internet Download Manger PatchIDM Crack 2025 Internet Download Manger Patch
IDM Crack 2025 Internet Download Manger Patch
wistrendugftr
?
2a Solving Equations Bar Method.pkdkdmptx
2a Solving Equations Bar Method.pkdkdmptx2a Solving Equations Bar Method.pkdkdmptx
2a Solving Equations Bar Method.pkdkdmptx
alvinlibre
?
Choking_Death_Statistics_2025_Presentation.pptx
Choking_Death_Statistics_2025_Presentation.pptxChoking_Death_Statistics_2025_Presentation.pptx
Choking_Death_Statistics_2025_Presentation.pptx
Joseph897315
?
Antorik Q Final.pptx999999999999999999999
Antorik Q Final.pptx999999999999999999999Antorik Q Final.pptx999999999999999999999
Antorik Q Final.pptx999999999999999999999
PrayasChatterjee1
?
KeepItOn-2024-Internet-Shutdowns-Annual-Report.pdf
KeepItOn-2024-Internet-Shutdowns-Annual-Report.pdfKeepItOn-2024-Internet-Shutdowns-Annual-Report.pdf
KeepItOn-2024-Internet-Shutdowns-Annual-Report.pdf
sabranghindi
?
Importance of understanding buyer behaviors.pptx
Importance of understanding buyer behaviors.pptxImportance of understanding buyer behaviors.pptx
Importance of understanding buyer behaviors.pptx
ankitregmi20580419
?
The-Evolution-of-Media-Media and information literacy.pptx
The-Evolution-of-Media-Media and information literacy.pptxThe-Evolution-of-Media-Media and information literacy.pptx
The-Evolution-of-Media-Media and information literacy.pptx
febiemae2007
?
IPv6 - Global and Malaysia's Perspectives
IPv6 - Global and Malaysia's PerspectivesIPv6 - Global and Malaysia's Perspectives
IPv6 - Global and Malaysia's Perspectives
APNIC
?
QasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartupQasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartup
AidarIsakhanov
?
Intelligent-Systems-in-Manufacturing.pptx
Intelligent-Systems-in-Manufacturing.pptxIntelligent-Systems-in-Manufacturing.pptx
Intelligent-Systems-in-Manufacturing.pptx
ErickWasonga2
?
A Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beachA Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beach
sethiserena
?
AstuteAP: AI-Powered Supplier Invoice Automation for Seamless Accounts Payabl...
AstuteAP: AI-Powered Supplier Invoice Automation for Seamless Accounts Payabl...AstuteAP: AI-Powered Supplier Invoice Automation for Seamless Accounts Payabl...
AstuteAP: AI-Powered Supplier Invoice Automation for Seamless Accounts Payabl...
AstuteBusiness
?
cyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online moneycyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online money
VEENAKSHI PATHAK
?

Tech_and_social_media_PF.ppt

  • 1. What Will They Text Next: Teen, Social Media, and Technology
  • 2. The Screen Challenge Take a moment to total how much time you spend daily looking at a screen. Then, Take some time to estimate how much time your teenager spends looking at a screen.
  • 3. Kids Today… ? 78% of teens have cell phones, almost half own smartphones ? 1 in 4 are “cell-mostly” internet users ? 23% of teens have a tablet ? 81% use social networking sites ? 8-18 year olds devote an average of 7 hours and 38 minutes to using entertainment media across a typical day ? 100% of EHS students have a laptop and access to the internet
  • 5. What Social Media Are They Using?
  • 6. What are they posting?
  • 8. Dangers of Social Media What we know about teens: ? They are constantly trying to define themselves. ? They crave positive feedback to help them see how their identity fits into their world. ? They use social media for this feedback... but they are looking in a dangerous place. How is this harmful: ? The danger exists in the possibility of a very public rejection because negative feedback is there for anyone and everyone to see. ? Another danger is that teens ask for feedback without learning first that not everyone will respond in a supportive way.
  • 9. What Can You Do ? In order to teach your children how to seek feedback from genuine sources, parents should start early by helping their children identify trustworthy sources. ? Most importantly, parents need to reinforce that the most influential voice should come from within.
  • 10. Engage Your Family ? Engage your teen in meaningful conversation about internet use ? Talk to other parents, deans, counselors ? Validate your teen's reality and their need to be connected ? Engage your child in drafting the rules for the family: – guidelines for use – consequences for breaking those rules ? Model appropriate use of technology: – minimize texting – don't use cell phone/laptop at meals – don't use cell phone in the car
  • 11. Let Your Teen Know ? That you have the right to check their laptop, phone, etc.. ? What apps/media are okay and what are not ? That you need to know their passwords ? What their online responsibilities are: – Protecting their privacy – Not engaging in cyber bullying
  • 12. What Are You Worried About? ? Invading your kid’s privacy? ? Not feeling comfortable with being on social media? ? That they have secret accounts? Just as you would establish ground rules and do diligence in person, there is a need to do the same things - or even more - with the internet.
  • 13. Other Parental Concern ? 81% are worried about how much advertisers can learn about their kid’s through their behavior online ? 72% are worried their kid is interacting with people they do not know online ? 70% are worried about how their online activity might affect their future academic or employment opportunities ? 60% are worried about their kids reputation online (Pew Research Center, 2013)
  • 14. Apps to Protect Your Kid in the Car ? Canary ? MamaBear Child Tracker app ? Rapid Protect ? OnStar Family Link ? Travelers Insurance IntelliDrive ? Progressive's Snapshot ? AT&T DriveMode ? Sprint Drive First ? Cellcontrol ? Drive Scribe
  • 15. Apps to Protect Your Teen’s Phone ? My Mobile Watchdog ? Mobile Spy ? Text Guard ? WebWatcher
  • 16. Scripture to Empower Matthew 18.6-7 ‘If any of you put a stumbling-block before one of these little ones who believe in me, it would be better for you if a great millstone were fastened around your neck and you were drowned in the depth of the sea. Woe to the world because of stumbling-blocks! Occasions for stumbling are bound to come, but woe to the one by whom the stumbling-block comes!”

Editor's Notes

  • #5: Puts girls in a demeaning position
  • #7: Hooking up is a hard to define term that can mean anything from kissing to intercourse More on oral sex next slide Kids want to know what they are allowed to do.
  • #17: I