Transcript Document

Soccer
in a digital world
An overview
US Youth Soccer Risk Management Committee
Meeting Purpose
to:
Inform you
Educate you
to run your States, Leagues & Clubs
in the
DIGITAL WORLD
Different Channels to Monitor:
•
•
•
•
•
•
Websites
Online chat
Email
Blog sites
Social networking
Mobile text messaging
Who is Online?
• 71% of American adults go online
• 93% of American teens ages 12 to 17 use the
internet
• 87% of all parents are online
• 73% of all families have broadband @ home
• 68% of online Americans have home
broadband
• 7% of teens do not use the internet
Club/Team Websites
• Technology exists for almost any team to
create its own website.
– Create using website design templates or
packaged software (eteamz, school, business or
privately sponsored sites).
• The Risks?
– Many of these team web sites can be used by
those who would prey on our children to identify,
single out, and make contact with a victim –
whether at home or during soccer events.
Example: Too Much Info
10/2/2007 - Important information
There will not be practice tomorrow (Wednesday). Thursday is a
game in Novi. The game begins at 5:30pm. Please have your
daughter there between 4:15pm and 4:30pm. They are wearing
the black uniform. There may be practice on Friday depending
on how Thursday goes.
If you have not paid your August payment, please so
immediately, the next statements are coming soon!
(Game/Practice sites were listed in another area on the site)
9/29/2007 - Practice on Sunday!!!!!
Congratulations on the convincing win over Brighton!
Also, if Ashley use to text your daughter changes in the
schedules, please have her resend Ashley her number. Her
phone died and we were unable to retrieve the numbers.
Ashley's cell is 888-555-1234. Please e-mail me to let me know
you received this, if there is someone you know that may not
check their e-mail, please let them know.
Example: Just a Name
A unique name from a roster and a quick search:
• Her first, last name, and approximate age based on her team.
• Her jersey number and a team photo with her image.
• By Googling her name, a press photo was found on an unrelated
article which confirmed which player she was in the team photo.
• Her parents first name, last name, and place of employment.
• Her school, teacher's name, and school address and schedule.
• A phone number to contact her mother.
• A photo of her father and her mother from the father's Facebook
website.
How do kids communicate?
• It’s a new language
• And, it’s spoken in many places
including chat rooms, text messaging &
instant messaging by cell phones and
computers
R U NtheNo about Chat?
LOL
LAUGH OUT LOUD
LMIRL
POS
BRB
BF
LET’S MEET IN REAL LIFE
PARENT OVER SHOULDER
BE RIGHT BACK
BEST FRIEND
IOW
IMO
LULAS
IN OTHER WORDS
IN MY OPINION
LOVE YOU LIKE A SISTER
TMI
WU
YBS
TOO MUCH INFORMATION
WHAT’S UP
YOU’LL BE SORRY
Email Communication
• Most email accounts aren't specifically
designed for children.
• Email accounts allow anyone to send your
child an email at any time – whether it’s
spam (unsolicited commercial email) or
communication by unknown parties –
potential pedophiles.
Email Communication
• Parents have a responsibility to monitor
kids’ emails to assure no inappropriate
communication occurs.
• There are known communications
between coaches and players that were
deemed “too friendly”.
• Be aware!
Email Help by Legislation
• KIDS 2008
– Keeping the Internet Devoid of Sexual Predators Act of 2008 or
the KIDS Act of 2008 - Directs the Attorney General to:
– (1) require sex offenders to provide to the National Sex Offender
Registry all Internet identifiers (i.e., email addresses and other
designations used for self-identification or routing in Internet
communication or posting) used by such offenders;
– (2) specify requirements for keeping Internet identifier
information current;
– (3) exempt Internet identifiers provided by a sex offender from
public disclosure; and
– (4) establish procedures to notify sex offenders of changes in
requirements for providing Internet identifier information.
– http://www.govtrack.us/congress/bill.xpd?bill=s110-431
Blog Sites
• A Blog1 Site is a Website, usually
maintained by an individual with regular
entries of commentary, descriptions of
events, or other material such as graphics
or video.
1 –Blog. (2009, January 6). In Wikipedia, The Free Encyclopedia. Retrieved 03:39, January 6, 2009, from
http://en.wikipedia.org/w/index.php?title=Blog&oldid=262221554
Social Networking
2
• A social network is a social structure made of
nodes --generally individuals or organizations-that are tied by subjects such as values, visions,
ideas, financial exchange, friendship, kinship,
dislike, conflict or trade. “Soccer” could be a subject
tying a network together.
2 –Social network. (2009, January 4). In Wikipedia, The Free Encyclopedia. Retrieved 03:37, January 6,
2009, from http://en.wikipedia.org/w/index.php?title=Social_network&oldid=261912053
Social Networking
• Some familiar social networking sites:
– MySpace
– Facebook
– Twitter
– YouTube
Some thoughts to consider
• The focus of concerns over social networking sites has so far
focused on incidents where online predators have used the
sites to "groom" potential child victims for abuse.
• "It is much easier to be deceived or trashed on the Internet.
Things spread a lot quicker online than off.
• The anonymity of the Web makes other people feel less
inhibited about posting videos
Online friendships can offer a false sense of security
http://www.mlive.com/entertainment/citpat/index.ssf?/base/features1/1226228704295630.xml&coll=3&thispage=1
Example from Facebook:
ODP sucked a**, it's nothing but full
of stuck up b******. And they can't
handle when someone better
comes along and takes their best
friends spot on the team...
Online friendships can offer a false sense of security
http://www.mlive.com/entertainment/citpat/index.ssf?/base/features1/1226228704295630.xml&coll=3&thispage=1
Concerns in Online Safety
Sphere
• Inappropriate contact
– Strangers
– Bullies
• Inappropriate content
– Exposure
– Prevention
courtesy of Richie Diesterheft
Cyber-Bullying
• Cyber-bullying refers to the new, growing practice of using
technology to harass, or bully, someone else.
• Bullies are no longer restricted to methods such as physical
intimidation, postal mail, or the telephone.
• Now, developments in electronic media offer forums such as
email, instant messaging, web pages, and digital photos to
add to the arsenal. Computers, cell phones, and PDAs are
new tools that can be applied to an old practice.
Cyber Security Tip ST06-005 Dealing with Cyberbullies
http://www.us-cert.gov/cas/tips/ST06-005.html
Cyber-Bullying
• Forms of cyber-bullying can range in severity from cruel or
embarrassing rumors to threats, harassment, or stalking.
• It can affect any age group; however, teenagers and young
adults are common victims, and cyberbullying is a growing
problem in schools.
• One third of US online teenagers have been victims of
cyber-bullying according to research by the Pew Internet
Project.
Cyber Security Tip ST06-005 Dealing with Cyberbullies
http://www.us-cert.gov/cas/tips/ST06-005.html
Cyber-Bullying
• The most common complaint from teens was about
private information being shared rather than direct
threats.
• Girls were more likely than boys to be targets and teens
who share their identities online are the most vulnerable,
the survey found.
• But, teenagers still think that the majority of bullying
happens offline.
http://www.stopcyberbullying.org/parents/index.html
Cyber-Bullying Statistics
• Some 32% of teenagers questioned had
experienced one of more of the following:
• 15% of teens reported having private material
(IM, txt, email) forwarded without permission
• 13% had received threatening message
• 13% said someone had spread a rumor about
them online
• 6% had someone post an embarrassing picture of
them online without permission
Cyber-bullying gathers pace in US ; June 28, 2007
http://news.bbc.co.uk/2/hi/technology/6245798.stm
Contact – Bullies
• Girls, particularly older girls, report more
online bullying; 38% of all online girls
reported experiencing some type of
online bullying
• Social network users are also more likely
to report online bullying – 39% of SNS
users have experienced it.
• But most teens (67%) think bullying
happens more OFFLINE
24
How to protect yourself
• Be careful where you post personal
information - Limit the number of people who
have access to your contact information or details
about your interests, habits, or employment.
Reduce your exposure to bullies.
• Avoid escalating the situation - Responding
with hostility is likely to provoke a bully. Consider
ignoring the issue. If you change your account
and continue to get messages, you may have a
stronger case for legal action.
How to protect yourself
• Document the activity - Keep a record of any
online activity (emails, web pages, instant
messages, etc.), including relevant dates and
times. In addition to archiving an electronic
version, consider printing a copy.
• Report cyber-bullying to the appropriate
authorities - If you are being harassed or
threatened, report the activity to the local
authorities.
Contact - Strangers
Definition of “complete stranger:” “…[someone] who has no
connection at all to you or any of your friends.”
• 32% of online teens have been contacted
online by a complete stranger.
• Of teens who have been contacted, 23%
say they were made scared or
uncomfortable by the stranger contact.
• Overall, 7% of online teens experienced
disturbing stranger contact.
Contact – Strangers
• Factors that predict a greater likelihood of
online contact
– Posting photos (49%)
– Having a profile online (44%)
– Female (39%)
– Flirting via social networks (53%)
• Factors that predict a greater likelihood of
scary or uncomfortable online contact
– Female (11% vs. 4% of males)
Contact -- Strangers
• No association between stranger contact and any
other content posted to online profiles
• Social network users more likely to have been
contacted by strangers, but not more likely to find
that contact scary or uncomfortable
• Having internet monitoring software (but not
filters) is correlated with lower reported levels of
contact by someone unknown to the teen or
his/her friends.
Contact – Strangers
How did teens respond to stranger contact?
– Of teens who were contacted by a stranger:
• 65% just ignored it or deleted it
• 21% responded so they could find out more about
the person
• 8% responded and asked to be left alone
• 3% told an adult or someone in authority
December 6, 2007
30
Content – Access
• 42% of online youth 10-17 have been exposed to
online pornography (Wolak et al, 2007)
Some steps families take:
– 74% of families have their computers in a
public location
– 65% of parents say they check up on their
teens after they go online
– 53% of families filter
– 45% of families have monitoring software
on the computer that their child uses
Content – Access
• Parents more likely to report rules around
content viewed rather than time spent with media
– Content rules:
• 77% of parents have rules about what TV
shows their child can watch
• 68% of parents have rules about what
internet sites their child can or cannot visit
• 67% of parents have rules about video
games their child can play
Content – Access
• More than half of parents have rules for time
spent with media in the home
– 58% have rules about how much time their
child can spend watching TV
– 58% have rules about how much time their
child can spend playing video games (rises
to 64% of households w/gamers)
– 55% have rules about how much time their
child can spend online
Content – Access
• Parents also have rules about information that
may be shared online
– 68% of parents of online teens say that they
have rules about what kind of information
their child may share over the internet
• Only 7% of parents have no rules about media
use at all
FBI’s Kids Internet Safety Tips
• Never to give out personal information such as
name, home address, school name, or phone
number in a chat room or on bulletin boards.
• Never send a picture of themselves to someone
they chat with on the computer without their
parent's permission.
• Never write to someone who has made them
feel uncomfortable or scared.
FBI’s Kids Internet Safety Tips
• Do not meet someone or have them visit them
without the permission of their parents.
• Tell their parents right away if they read anything
on the Internet that makes them feel
uncomfortable.
• People online may not be who they say they are.
Someone who says that "she" is a "12-year-old
girl" could really be an older man.
What is cyber security?
• It seems that everything relies on computers and the
Internet now — communication (email, cell phones),
entertainment (digital cable, mp3s), transportation (car
engine systems, airplane navigation), shopping (online
stores, credit cards), medicine (equipment, medical
records), and the list goes on.
• How much of your daily life relies on computers? How
much of your personal information is stored either on
your own computer or on someone else's system? Cyber
security involves protecting that information by
preventing, detecting, and responding to attacks.
Are you really safe..?
• On Facebook, for instance, applications can only be
downloaded if a user checks a box allowing its
developers to "know who I am and access my
information," which means everything on a profile,
except contact info.
• Given little thought, agreeing to the terms has become a
matter of routine for over 140 million Facebook users
worldwide who use applications to spruce up their pages
and to flirt, play and bond with friends online.
http://www.foxnews.com/story/0,2933,353121,00.html
Are you really safe..?
• Every time you download or install an application – such
as a game or gadget – you may be freely handing over
personal information to perfect strangers.
• This happens on a growing number of social networking
sites that are designed by third-party developers for
anything from games and sports teams to trivia quizzes
and virtual gifts.
http://www.foxnews.com/story/0,2933,353121,00.html
How Anonymous Are You?
• What information is collected?
– When you visit a web site, a certain amount of information is
automatically sent to the site. This information may include the
following:
• IP address
• Domain name
• Page visits
– If a web site uses cookies, the organization may be able to
collect even more information, such as your browsing
patterns, which include other sites you've visited. If the site
you're visiting is malicious, files on your computer, as well
as passwords stored in the temporary memory, may be at
risk.
What are the risks?
• There are many risks, some more serious than
others.
–
–
–
–
Viruses erasing your entire system
Someone breaking into your system and altering files
Someone using your computer to attack others
Someone stealing your credit card information and
making unauthorized purchases.
There is no 100% guarantee that even with the best
precautions some of these things won't happen. You
can take steps to minimize the chances.
Ways to Protect
Computer Security Capabilities
• Use Security Software Suites
– Make sure you have robust security software that protects your
computer against viruses, hackers, and spyware. It should also filter
offensive content, pictures, and web sites. This software should be
updated frequently, as new threats are emerging daily. Ideally, security
that updates automatically.
• Use Parental Controls
– Use options that filter and block inappropriate material. Of course, these
tools have their limitations. Nothing can take the place of attentive and
responsive parents who monitor their children when they are online.
• Create & use passwords that are difficult to crack
Best Practices
• Never log in with user names that reveal true identity or
that are provocative
• Never reveal your passwords
• Never reveal phone numbers or addresses
• Never post information that reveals your identity
• Never post inappropriate photos or ones that may reveal
your identity (for example: school names on shirts)
• Never share any information with strangers met online
• Never meet face-to-face with strangers met online
• Never open attachments from strangers
Final Thoughts
• Only a very small number of teens report
uncomfortable online contact; most ably handle the
contact by deleting or ignoring it
• Very little association between contact and
information posted online
• Bullying is reported by same % of teens as stranger
contact; and yet happens more offline
• Parents more likely to use non-technical methods of
protection; rulemaking around content
• Balance promise of technology with pitfalls
• Safety in a mobile environment?