fbpx

Need peaceful screen time negotiations?

Get your FREE GKIS Connected Family Screen Agreement

“First impressions are everything.” This once referred to tone, dress, and personality. Now, it also refers to your social media page. Teens rack up an average of 6 hours per day of social mediag.[1] They not only browse endlessly, but many also post impulsively. With immature prefrontal brain development, kids and teens are unable to anticipate consequences. Plus, the internet culture is vulgar, shocking, and celebrates pushing moral limits. Using profanity, sub-tweeting and cyberbullying are common. Using principles from Dr. Bennett’s book, Screen Time in the Mean Time: A Parenting Guide to Get Kids and Teens Internet Safe, this article covers how to best guide your teen through the social media dilemmas of cyberspace.

Social media is the perfect place to “out” your enemies.

My friend “Catherine” used to expose her ex-boyfriends on Facebook. Once she posted, “He says he’s over me, but he just came to my house and cried.” Often, she’d think twice and delete her post. Other times, her ex-boyfriends posted angry responses outing her bad behavior back.

My friend “Robert” also shared a personal story. This is one about Myspace going wrong. When he was in the eighth grade, his high school sophomore girlfriend sent him sexy selfies. Robert showed his friends the photos. Although he refused to text them directly, a friend hacked his phone and sent himself the photos. Within a few days, the girl’s family and the police were at Robert’s door. Her photos had been posted on Myspace. Although Robert did not directly post her photos, he was held responsible because they were initially on his phone.

Online Behavior Matters

We love our podcasts at GKIS. In one of our favorites called Hidden Brain. The “You Can’t Hit Unsend” episode tells the story of William, whose social media posts destroyed a golden opportunity with Harvard.[2]

William was a brilliant high school senior from Pennsylvania. He was a great student who played competitive golf and performed for the local symphony. Although he didn’t believe he was “Harvard material,” he applied anyway. He was accepted through the early admission process and was overcome with joy. In the excitement of his acceptance, Will quickly joined an online group chat to meet other incoming freshmen.

One chatroom that focused on sharing memes was particularly funny. As the chatroom friends grew closer, they exchanged increasingly “edgier” memes, riding the fence between funny and offensive. To be added to the subgroup chat, at least one edgy meme had to be shared in the main group chat. As time passed, the memes increased in explicitness, oftentimes referring to outrageous, violent, and sexual topics. Will states that members of the chat knew that their meme was good based on how many likes and fire emojis members commented afterward.

The admissions department at Harvard University learned of the private chatroom and investigated. Harvard withdrew admission offers from ten prospective students because of their participation.

Will shared that he will always remember the last sentence of the email, “Harvard can withdraw admission under various conditions, including if you engage or have engaged in behavior that brings into question your honesty, maturity, or moral character.” Now he recognizes how adults would be offended and regrets his posts. He apologized, “It is far too easy to act out of character behind a screen in a fast-paced setting and to say things I would never say or even think of in my everyday life.”

The Harvard student newspaper later published the story. Soon after, the story was everywhere, including CNN and Fox News. Will and his family were devastated.

He waited a year and applied to other schools, only to be rejected by all ivy league universities. Will’s voice broke with emotion as he spoke of the experience. Fortunately, his emotional honesty appealed to a physics department chair at a school he was waitlisted at, and he was ultimately granted admission.

College Recruiters and Managers Search Applicants Online

Social media posts can make or break a teen’s future. The relationship between your digital footprint and personality is about as constant as the relationship between personality and behavior, also known as “the personality coefficient.[3] That means that your behavior on your social media profile is a reliable source of information about your personality.[4]

Many college admission officers and employers use online data to investigate prospective students or employees. While the internet is fun and creates a space for creativity and connection, adolescents can make dire mistakes online just as they do offline. Instead of those mistakes happening in front of a few close friends and family, they can be blasted out to millions. Social media profiles produce large amounts of user-generated data that may be used and sold in ways we cannot anticipate.[5]

As social media evolves, parenting tactics must evolve as well. That means educating yourself about the risks of posting and challenging your kids to explore online risk with ongoing empowering dialogue.

Here are a few ways you can prep them today:

  • Use our free GKIS Connected Family Screen Agreement to set parameters and create a screen-friendly, cooperative dialogue.
  • Engage in fun co-viewing, both with passive screen use (TV) and interactive screen use (browsing the internet). Fun projects may include researching a particular topic using various learning formats (articles, videos, images).
  • Find food recipes and cook a meal together.
  • Co-create a movie – complete with music, still-image slides, videos, and graphics.[6]
  • Work together to purposely stylize your family’s cyber footprint. Ensure that that footprint will work for you rather than against you.
  • Act as a role model on social media and encourage responsible posting.
  • Block, filter, and track online behavior using the tools offered in our GKIS Screen Safety Toolkit.

Internet sites can collect and analyze large quantities of data from everyday devices.[7] This information provides more opportunities to use data in deceitful ways. With helpful GKIS tools, you can best prepare yourself and your teens.

Thanks to Isabel Campos for her research and help with writing this article. Interested in learning more about current cyberspace news? Signup for weekly GKIS articles by entering your name and email address at GetKidsInternetSafe.com!

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
GetKidsInternetSafe.com

Photo Credits

Photo by Pixabayon Pexels
Photo by Brett Sayles from Pexels
Photo by Nathan Dumlao on Unsplash
Photo by picjumbo.com from Pexels

Works Cited

[1](Granet 2016)
[2](Hidden Brain, 2019)
[3](Meyer, Finn, Eyde, Kay, Moreland, Dies, Reed, 2001)
[4](Meyer, Finn, Eyde, Kay, Moreland, Dies, Reed, 2001)
[5](Azucar, Marengo, & Settanni, 2018)
[6](Bennett, 2019)
[7](Granet 2016)

Isabel Campos
Isabel Campos
Facebook
Twitter
LinkedIn