{"id":438,"date":"2011-08-21T18:20:15","date_gmt":"2011-08-22T02:20:15","guid":{"rendered":"http:\/\/internetsafety.trendmicro.com\/?p=438"},"modified":"2011-08-21T18:27:30","modified_gmt":"2011-08-22T02:27:30","slug":"this-school-year-help-kids-with-the-safe-responsible-use-of-social-networks","status":"publish","type":"post","link":"https:\/\/www.trendmicro.com\/internet-safety\/blog\/this-school-year-help-kids-with-the-safe-responsible-use-of-social-networks\/","title":{"rendered":"This School Year, Help Kids with the Safe &#038; Responsible Use of Social Networks"},"content":{"rendered":"<p><a href=\"\/internet-safety\/wp-content\/uploads\/2011\/08\/LynetteOwens_Trend_bw_edit1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-thumbnail wp-image-440\" title=\"LynetteOwens_Trend_bw_edit\" src=\"\/internet-safety\/wp-content\/uploads\/2011\/08\/LynetteOwens_Trend_bw_edit1-150x150.jpg\" alt=\"\" width=\"150\" height=\"150\" \/><\/a>Guest Post by Lynette Owens\u00a0featured on <a href=\"http:\/\/www.kiwicommons.com\/\">KiwiCommons<\/a><\/p>\n<p>With the arrival of another school year, many students my also return to a renewed and heavier use of their social networks to keep up with everything from school activities to the social scene.\u00a0 So it\u2019s important to teach and remind young people about the safe and responsible use of social media.<\/p>\n<p>Social networks mirror social landscapes in real life, where there are both good and bad actors.<\/p>\n<p>While a lot of the focus has been on peer-related issues such as bullying, sexting, and privacy there is one overlooked area that should be included when we talk to kids about using social networks safely and responsibly: cybercrime.<\/p>\n<p>In many cases, cybercriminals are not necessarily targeting kids, but they always gather wherever people do.\u00a0 And their crimes are designed to fool people into doing something they didn\u2019t realize was harmful.\u00a0 In other cases, they may in fact be targeting youth when child identity theft is their motive.\u00a0 Criminals can use a child\u2019s personal information to open lines of credit, for example, and not be discovered for a long time because parents do not typically check their kids\u2019 credit histories as there wouldn\u2019t usually be a reason to do so.<\/p>\n<p>Cybercriminals\u2019 tricks are sometimes as benign as making you click on something because they get paid by advertisers for every click (click fraud).\u00a0 They can also fool you into clicking on links in wall posts that lead you to a fake site designed to install spyware on your system, get you to download what you thought was free music but is actually a bot, or convince you to enter personal information like a userid and password on a hacked site.<\/p>\n<p><strong>Some tips you can give to kids who use social networking sites include:<\/strong><\/p>\n<ol>\n<li>Only connect with those you know or those you are certain can be trusted.<\/li>\n<li>Use the strongest privacy settings that still allow you the flexibility you need to use the site in the way you want.<\/li>\n<li>\u00a0Share only information that is absolutely necessary, especially when you may not know who your network of friends might be sharing it with.<\/li>\n<li>Be wary of posts that are either offering something too good to be true. Trust your instinct if something seems suspicious.\u00a0 And if you KNOW it\u2019s a fraud, report it to the social networking site.<\/li>\n<li>Always have up-to-date, reputable security software installed on every device you are using to connect to the Internet\/social networking sites.\u00a0Cybercriminals will, for the most part, be unable to harm you because good security software or service will know that the links\/sites they are leading you to are malicious and won\u2019t let you visit them.<\/li>\n<\/ol>\n<p>As parents and educators, we should remember that kids need to be as savvy about avoiding cybercrime as they do about treating others respectfully online and maintaining their online privacy and reputations.\u00a0 Also, their futures most certainly will include using the Internet regularly.\u00a0 They won\u2019t be kids forever, so our goal should be to help kids make good decisions online on their own as early as we can.<\/p>\n<p>Follow Lynette on Twitter @LynetteTOwens<\/p>\n<p>For more tips and resources on safe social networking go to:<\/p>\n<p><a href=\"http:\/\/www.trendmicro.com\/internetsafety\">www.trendmicro.com\/internetsafety<\/a><\/p>\n<p>Or watch &#8220;The Wrong Hands&#8221; (2 minute engaging video for youth on online safety)<br \/>\n<a href=\"http:\/\/whatsyourstory.trendmicro.com\/internet-safety\/Video.do?ident=the-wrong-hands-0-1-2\">http:\/\/whatsyourstory.trendmicro.com\/internet-safety\/Video.do?ident=the-wrong-hands-0-1-2<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the arrival of another school year, many students may also return to a renewed and heavier use of their social networks to keep up with everything from school activities to the social scene.  So it\u2019s important to teach and remind young people about the safe and responsible use of social media.<\/p>\n<p>Social networks mirror social landscapes in real life, where there are both good and bad actors.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"footnotes":""},"categories":[3,4],"tags":[7,47,16,5,48,10,23,12,21],"class_list":["post-438","post","type-post","status-publish","format-standard","hentry","category-for-parents","category-for-teachers","tag-cyberbullying","tag-digital-literacy","tag-facebook","tag-internet-safety","tag-media-literacy","tag-online-safety","tag-privacy","tag-social-networking","tag-teens","wpautop"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts\/438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/comments?post=438"}],"version-history":[{"count":0,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts\/438\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/media?parent=438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/categories?post=438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/tags?post=438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}