Winning the Cyber Security Game
In this lesson students discuss their online experiences and learn how to minimize the potential risks that may be associated with them.
In this lesson students discuss their online experiences and learn how to minimize the potential risks that may be associated with them.
My three kids all know the password to my phone.
It’s because I rely on them to play secretary for me when I’m driving. If the phone rings or there is a bing of a text, 99% of the time it’s a member of my immediate family trying to get in touch with something relatively pressing.
Recently, my nephew, age 12, received a letter in the mail. It was addressed to him personally, by name. Inside was a photocopied article about the powers of a new virility medicine, complete with the usual graphic promises for pleasuring the ladies. The article mentioned a specific “doctor” by name, but other than that, there was no contact information or order form or any other action request. It appeared to just be spam but in paper form.
The other day I was on the phone with my sister – our land line, not a cell phone – and I said to her, “You’re my person.” This is a well-known phrase from the TV show Grey’s Anatomy; Meredith Grey and Cristina Yang used to say it to each other to cement the closeness of their friendship.
In this lesson, students learn about the “sneaky excuses” that can convince us to do things that we know are wrong. After learning about the different types of these excuses, students watch and discuss a series of videos in which the excuses are used to justify forwarding sexts without the original sender’s consent. Finally, students create their own videos in which the excuses used to justify sharing sexts with other people are illustrated and most importantly, countered.
As a parent, you may find some relief in learning that fewer youth take and send sexts (nude or semi-nude photos) than you may think. However, almost half of youth who have taken and sent a sext say that the recipient then forwarded that image to other people without their consent. This culture of sharing among youth is a major concern and can have devastating consequences for the person in the picture and the person who forwards it.
Our older two teens are close to finishing high school, and we’re starting to think about moving them into the adult phase of their lives. That means managing their own online presence and technology, and making sure they have full ownership of their profiles.
And that led to the big password talk.
Exploitation: Some people use digital media to get teenagers involved in relationships they’re not ready for. They do this by finding someone who is vulnerable and then showering them with attention, sympathy, affection and kindness, all to persuade the victim that they love and understand them.
Online exploitation is when someone uses digital media to find teens and get them involved in romantic or sexual relationships.