Need peaceful screen time negotiations?

Get your FREE GKIS Connected Family Screen Agreement

children

The GKIS Sensible Parent’s Guide to Twitter

Twitter is a popular social media app that allows users to communicate with their peers through short “tweets” or posts. Many users post whatever is on their mind, what happened to them during the day or to reach out to their friends. Twitter has the potential for cyberbullying, communicating with strangers, sharing fake news, and viewing inappropriate content. This GKIS Sensible Guide provides the information parents need to know to be familiar with Twitter and make informed decisions on when and how to allow their children to use Twitter.

What is Twitter?

Twitter is a social media platform that allows users to communicate with others using short messages. Twitter messages are called “tweets” and may include text, photos, and videos. Many people use Twitter to follow and reach out to others and to post tweets that aim at becoming “viral.”

Many companies like Target, Starbucks, and fast-food restaurants have Twitter accounts and use them to advertise their products and reach customers. Twitter is also useful for customer service and reporting issues to companies. During highly political times, it is not uncommon to see politicians and their followers using Twitter to garner support and attack opposing opinions.

Twitter has produced many popular influencers. Katy Perry and Justin Bieber are the popular influencers for entertainment/celebrity. Elon Musk, inventor of Tesla, and Jack Dorsey, founder of Twitter, are the top influencers in the technology area. There are several other areas with influencers including The Frugal Traveler as a travel influencer, Jamie Oliver as a health influencer, and Atelier Dore as a fashion influencer.[1]

How long has Twitter been around and how popular is it?

Twitter was founded by Jack Dorsey and officially launched in July of 2006. It is based in San Francisco and has over 25 offices around the world. In a statistic published in February 2020, 56.2% of United States Twitter users were male.[2] There is a wide age range of users with the most common ages 25 to 34 and 55 to 64.[3] In 2019, 330 million monthly active users were reported.[4]

How old is old enough for adoption?

According to Twitter’s Terms of Service, a user “must be at least 13 years old to use the Services.” [5] This age is selected for compliance with the U.S.’s Children’s Online Privacy Protection Act (COPPA). However, in Dr. Bennett’s book Screen Time in the Mean Time, she recommends no social media app adoption until at least the second semester of sixth grade, when kids have more social experience for creative problem solving and are no longer transitioning into middle school. (If the seventh grade is a transition year in your community, she recommends waiting until spring semester for the introduction). Because every child has unique strengths and vulnerabilities, parents are well suited to make the best-informed decision for their family.

What is included in the personal profile?

To create a Twitter account, you will need to enter your name, phone number or email, and create a password. The name you enter does not have to be your real name. It can also be a nickname. You will be directed to set a profile photo that will be used as a thumbnail for all your tweets. A cover photo may also be uploaded and will appear at the top of your profile.

A profile also includes your birthday, including the year, and the month and year that you joined Twitter. It also displays the number of people who follow you and the number of people that you follow. The profile also has four tabs that include Tweets, Tweets & replies, Media, and Likes.

  • Tweets: Shows all tweets the user has posted or retweeted.
  • Tweets, retweets, & replies: Shows all tweets the user has posted or retweeted and any replies to tweets.
  • Media: Shows any photos, videos, or gifs the user has tweeted.
  • Likes: Shows all tweets the user has liked.

When clicking on a stranger’s profile, it will display if they are following you. It will also list everyone that follows them and that you follow. It also gives you an option to follow the user, turn on their notifications, send them a direct message, and mute, block, or report.

What are the privacy options?

When clicking on “Privacy and Safety” in your settings, Twitter gives you several options which include information on protecting your tweets, direct messages, discoverability and contacts, safety, and personalization and data.

  • Tweets
    • The Protect your Tweets option allows users to only show their tweets to those that follow them. This also requires users to approve their followers.
    • The location information option allows users to add their location to each of their tweets. Users also have the ability to delete all location information.
    • The photo tagging option allows users to block others from tagging them in photos.
  • Direct Messages
    • Users are able to block others from messaging them
    • Users are able to turn on or off their read receipts which notify the sender with the time they read their message.
  • Discoverability and Contacts
    • Users are able to allow people to find their accounts using their phone number or email address.
  • Safety
    • Users have the option of blocking media that may contain sensitive content
    • User can also mark the media they tweet as containing sensitive content
    • Users have the option of muting works or account
    • Users can block accounts which means they will no longer see the account and the account will no longer see their account
    • Users can change their notification settings or turn off notifications
  • Personalization and Data
    • Through these settings, users can control how Twitter personalizes content and collects and shares certain data
    • Users can block Twitter from sharing their data with business partners.

What are the risks for use?

Inappropriate Content

It is easy for users to stumble upon potentially inappropriate content for their age and/or fake news. If one user retweets or shares something potentially inappropriate, all their followers will see that post. The best way to prevent your child from viewing inappropriate content on their Twitter feed is to go through their privacy settings and make sure to block inappropriate accounts. Requiring your child to get approval before the following accounts is another way to prevent inappropriate content. Please note, however, that once on Twitter it is impossible to filter out all inappropriate content.

Cyberbullying

Twitter carries a major risk for cyberbullying due to the anonymous nature of the platform. Twitter users may use a fake name and photo in order to remain anonymous and then send harmful messages or leave harmful comments on others’ tweets. The best way to prevent cyberbullying is to have the Twitter profile set on private and only approve people who are known by the user.

Sub tweeting is another common form of cyberbullying that is found on the platform. Sub tweeting means posting a tweet about someone without specifically naming that person. Most subtweets are harmful and are used as a way to attack a person without having an explicit connection to that person. Once again, even with best efforts, it’s impossible to block all cyberbully behaviors once on the Twitter platform.

Communicating with Strangers

Users who have a public profile are able to be contacted by any Twitter user. This means that strangers of any age can message a user and send them text or photos. Predators have the ability to send messages to young users. A private Twitter account is the best way to prevent contact with strangers.

Distractibility & Constant Access

Twitter produces a wide variety of content which makes it easy to keep scrolling for hours. Users often start looking at one tweet which leads to others of similar content. The cycle can go on for hours. Also, consider how comfortable you are having your child’s friends have constant screen access with your child. Social media fills one’s digital inbox constantly, all-the-time.

GetKidsInternetSafe rates Twitter as a yellow-light app due to the easy access to strangers, inappropriate content, and the potential for cyberbullying. Twitter tries to block inappropriate content from being posted, but there are millions of users who post multiple times a day. If you do opt to allow Twitter, be sure and get your child’s username and password and monitor posts.

Thank you to CSUCI intern Makenzie Stancliff for co-authoring this article. For more information on keeping your child safe on social media, check out the Get Kids Internet Safe Screen Safety Toolkit. Be sure to add Twitter on to the free GKIS Connected Family Agreement as a “not yet.”

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
GetKidsInternetSafe.com

Works Cited

[1] Meet The Top Twitter Influencers by Topic. (2018, February 20). Retrieved from https://izea.com/2018/02/20/influencers-on-twitter/

[2] Clement, J. (2020, February 18). U.S. Twitter user distribution by gender 2020. Retrieved from https://www.statista.com/statistics/678794/united-states-twitter-gender-distribution/

[3] Clement, J. (2019, August 9). Twitter: U.S. user age distribution 2018. Retrieved from https://www.statista.com/statistics/192703/age-distribution-of-users-on-twitter-in-the-united-states/

[4] Clement, J. (2019, August 14). Twitter: number of active users 2010-2019. Retrieved from https://www.statista.com/statistics/282087/number-of-monthly-active-twitter-users/

[5] Twitter Terms of Service. (n.d.). Retrieved from https://twitter.com/en/tos

Photo Credits

Photo by Sara Kurfeß on Unsplash

The GKIS Sensible Parent’s Guide to Minecraft

Minecraft is a virtual 3D game that allows users to create unlimited worlds using online building blocks while unlocking resources along the way. From cities to rollercoasters, the possibilities are nearly endless. We at GKIS are big fans of Minecraft because it fosters creativity, problem-solving, new skill development, and socialization opportunities. But like any online tool, there are also associated risks. This GKIS Sensible Guide provides information that parents need to optimize Minecraft’s benefits while keeping your children safe.

How long has Minecraft been around and how popular is it?

Minecraft was created in 2011 by Swedish game developer Markus Persson and purchased by Microsoft in 2014. Nearly 176 million copies were sold by late 2019. In 2019, Minecraft has over 112 million players every month and can be played on various platforms including smartphones, tablets, Xbox, and other gaming stations. It has evolved to include more elements and has a series of spin-off g

ames with different themes. Users also post Let’s Play videos YouTube to show how they build their worlds and different ways to create items.

Getting Started on Minecraft

 According to Minecraft’s Terms of Service, “If you are young and you are having trouble understanding these terms and conditions, please ask a responsible adult such as your parent or guardian.” Minecraft also insists that children under age 13 have their parents download and register for an account. However, children can easily change their age before signing up to go around that rule.

Minecraft varies in price depending on the type of platform. Signing up for an account is simple. Just create an account with a unique username and email address. Users are given one profile by default but have the option to make multiple profiles.

Features of Minecraft

 Minecraft allows users to collect resources and build their own worlds. Users can dig, build, and enchant items to transform their world into whatever they want. Users can also select different game modes, each with unique challenges and features.

Survival Mode

  • One of the main game modes
  • Players must collect resources, build structures, battle mobs, find food.
  • The goal is to survive and thrive.

Creative Mode

  • Players are able to build with an unlimited number of blocks.
  • Players are given all the items needed to build.
  • Mobs still exist, but there is no threat to survival.
  • Players are able to fly around the world.

Adventure Mode

  • Players use maps to navigate the world.
  • Depending on the device played on, blocks can either be destroyed or placed.
  • Hunger and dying is possible.

Spectator Mode

  • Users have the ability to fly around and observe the worlds without interacting with it
  • Players are invisible and can move through blocks and buildings.

Hardcore Mode

  • Available only on the online version.
  • The world is locked to hard difficulty and the player cannot respawn after they die.
  • Only specific worlds enable hardcore mode and not individual players.

Minecraft has two different play modes, single-player and multiplayer. In single-player mode, a user only interacts with their own character and their own world. In multiplayer, users can join any game with any player, friends or strangers. Parents have the ability to sign their child up for a family-friendly multiplayer mode that is supervised and has restrictions on the chats and interactions.

The Benefits of Minecraft

Minecraft allows players to use their imagination and create what they desire. Users develop problem-solving skills while they are creating their world. Minecraft also helps users develop computer literacy skills, teamwork, and collaboration. For example, while in multiplayer mode, players are able to communicate and work together to build their worlds. Mathematics and spacial skills are also developed while playing the game. For example, it takes six planks to build one door. If players have 60 planks, they can calculate how many doors they are able to build.

Parents have the ability to limit their child to only single-player mode or a family-friendly version of multiplayer. There are several Minecraft servers that have been designed for children in mind. They are designed with a code of conduct and have full moderation. Parents are able to sign their children on to a family-friendly server where they will be safe from interacting with strangers in a negative way.

The Risks of Minecraft

There are relatively few risks for children playing Minecraft. With the exception of playing too often, for too long, or getting frustrated with gameplay, single-player mode is relatively safe because kids can be restricted from interacting with players they don’t know. However, violence can be easily found in the game. For example, there are multiple ways to kill users, mobs, or animals, such as:

  • setting another player on fire using lava or a torch
  • hanging an animal or another player
  • using canons and bombs
  • using sand to trap and suffocate mobs
  • using a zombie as a weapon to kill a villager
  • shooting with a gun or stabbing with a sword

There is also a chance for cyberbullying in multiplayer mode. It is not uncommon to come across a user who is intentionally irritating and harassing other users. They often use parts of the game in unintended ways. For example, they may curse, cheat, and kill without reason. Cyberbullying also includes players who deliberately kick players off the server and anger others for their own enjoyment.

Multiplayer mode carries the risk of children chatting with strangers. For example, in 2017 a Minecraft user was jailed for meeting two children on Minecraft and persuading them to carry out sexual acts. [i]

There is a potential for users to track down your IP address from playing Minecraft. An IP address is n unique number for an internet network. The IP address provides the location of where your network is coming from. If users are able to hack into the server, they can find another player’s IP address. This can lead the user to the location of the player within a couple of miles.

If your child wants to play Minecraft, GKIS recommends that you:

  • Add it to your free GKIS Connected Family Agreement (If you haven’t downloaded it yet, enter your name and email on our GetKidsInternetSafe home page and it will be emailed immediately)
  • Discuss the risks of chatting with strangers with your child. For ideas about how to do this, check out our GKIS Connected Family Course.
  • Add sensible filters and monitors on your devices with recommendations from our GKIS Screen Safety Toolkit.

GetKidsInternetSafe rates Minecraft as a green-light app due to the safety of the game and the benefits it can have on children’s development. Dr. Bennett has found that her kids and the kids in her practice love Minecraft when they are young and even return to it as teens! They tell her they appreciate the simplicity of it and especially love the relatively stress-free atmosphere with no in-game purchase requirements.

Thank you to CSUCI intern Makenzie Stancliff for writing this article. If you love to encourage creativity with your kids, you won’t want to miss the Makerspace ideas in our Connected Family Course.

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
GetKidsInternetSafe.com

Works Cited

[i] Herd, G. (2017, January 20). Minecraft: Grooming dangers for children gaming online. Retrieved from https://www.bbc.com/news/uk-wales-38284216.

 

 

Is Wi-Fi Dangerous to Our Health?

We love our Wi-Fi hotspots for Internet connectivity practically everywhere we go. But do you ever wonder if Wi-Fi radio wave exposure is dangerous? Here’s a quick and dirty GKIS crash course on the magic that is Wi-Fi, and its possible impact on the brain and body.

How Often Are We Exposed to Wi-Fi?

The average American spends eight hours and forty-one minutes a day on screen devices, with Wi-Fi-dependent mobile devices making up most of that time.[1] The demand for increased Wi-Fi availability and speed has caused nations to vastly increase production, which will ultimately increase mobile device use for all ages.

In India, for example, the government is working on a 1,050 hotspot Wi-Fi program that is estimated to cost $62 billion.[2]

What is Wi-Fi?

Wi-Fi, or wireless fidelity, is a wireless technology that uses radio waves to transmit information across a two-way wireless network, information received from the Internet, and from the Wi-Fi-enabled electronic device. Smartphones have adapters that translate data into a radio signal, which is then sent to a decoder, called a router.

Every router has a unique IP address. Once the data is decoded by the router, it is first sent to the Internet through a wired Ethernet connection. Returning data from the Internet will pass through the router a second time for decoding, then on to the smartphone’s wireless adapter.[3] Wi-Fi-enabled devices include smartphones, gaming devices, tablets, printers, appliances, toys, cars, and computers.

Low- and High-Intensity Radiation

There are two kinds of radiation, ionizing and non-ionizing. Ionizing radiation is the high-intensity radiation that is emitted from x-rays and nuclear bombs that is strong enough to penetrate our cells and damage our DNA.

The radiation emitted by Wi-Fi-enabled devices is non-ionizing radiation. It is the same low-intensity radiation that is emitted by the sun. Cancer research has clearly shown that the radiation from the sun can harm you. However, the sun’s radiation is at a vastly higher level than the radiation emitted from our Wi-Fi devices.

Old smartphones used 2G, 3G, and 4G technology (ranging from 800 megahertz (MHz) to 27 gigahertz (GHz). 5G technology ranges from 600 MHz to 39 GHz. Lower radio frequencies penetrate the body more than higher radio frequencies. Current safety standards limit smartphones to a maximum of 1.6 watts per kg, which is not enough to warm the body.[4] If your smartphone gets hot, it’s the battery heating up, not the radiofrequency.

Are Wi-Fi Radio Waves Dangerous?

The World Health Organization (WHO) has classified mobile phones as a “possible carcinogen,” meaning that current research is not conclusive enough to show that cell phone radiation does or does not cause cancer.[5]

A study conducted in 2015 revealed that rats who were exposed to high levels of cell phone radiation were at higher risk for developing brain and heart tumors. However, it’s important to realize that the radiation used in this rat study was much higher than the radiation experienced when on the phone or using Wi-Fi.[6]

Other studies have shown that high levels of Wi-Fi exposure cause hormonal shifts and oxidative stress, which can promote cancer and brain diseases.[6] High exposure to Wi-Fi has also been hypothesized to cause neurodevelopmental issues and reproductive harm in humans, especially among the vulnerable like pregnant women and children.[5]

Security Risks

The ability to connect your device to the Internet via Wi-Fi has allowed us to be more productive on the go. However, utilizing unsecured Wi-Fi sources exposes us to hacking dangers.

If there are a username and password on the network, then you are using a secured network. This network can be hacked but requires more work.

An unsecured network that is free to access without a password, as you would find at your local coffee shop, is riskier. When you connect to an unsecured Wi-Fi network your device’s IP address can be seen, which is how hackers infiltrate your device. Once the hacker has infiltrated your device, they can add malware or steal personal information.

How to Limit Wi-Fi Risk

  • Employ common-sense safety measures like not sleeping with your phone by your bed, not storing your phone in pockets near your heart or reproductive organs, and keeping routers out of the bedroom. Also, use your headphones or a Bluetooth device if you spend many hours on your mobile phone.
  • Track and set limits on how many hours you spend using Wi-Fi (time management apps can help).
  • Use filtering, monitoring, and control apps with kids, especially to turn off phone activity while driving as we suggest in our GKIS Screen Safety Toolkit.
  • Develop screen-free skills by setting time and blackout day limits, like GKIS #NoTechTuesday and #NoTechThursday as we suggest in our GKIS Connect Family Course.
  • Only sign on to secure Wi-Fi sources.
  • Avoid screen fatigue by limiting multitasking.
  • Turn off Wi-Fi when not in use.
  • Most of all, disconnect and spend time with the people you love doing things that are fun and rejuvenating.

Thank you to CSUCI Intern, Dylan Smithson for tackling this challenging issue of Wi-Fi dangers. For more information about the specific risks of multitasking, check out Dr. Bennett’s GKIS article, Smartphones During Homework, Multitasking Do’s and Don’ts.

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
GetKidsInternetSafe.com

Works Cited

[1] Madlen D. (2015) Average person now spends more time on their phone and laptop than sleeping, study claims

[2] Matthew H. (2017) The Indian government is spending $62 billion on Wi-Fi hotspots http://www.businessinsider.com/the-indian-government-is-spending-62-billion-on-wi-fi-hotspots-2017-1

[3] What is Wi-Fi and How Does it Work? (Sept. 2017) CCM. http://ccm.net/faq/298-what-is-wifi-and-how-does-it-workAmanda L. (2015) Teens, Social Media & Technology Overview 2015

Do Cell Phones Cause Cancer, Memorial Sloan Kettering Cancer Center News

[5] Markham H. (2016) You Asked: Should I Worry About Wi-Fi Radiation?

[6] Yüksel M, Nazıroğlu M, Özkaya MO. (2015) Long-term exposure to electromagnetic radiation from mobile phones and Wi-Fi devices decreases plasma prolactin, progesterone, and estrogen levels but increases uterine oxidative stress in pregnant rats and their offspring. Endocrine. 2015 Nov 14.

http://www.pewInternet.org/2015/04/09/teens-social-media-technology-2015/

Andres J. (2012) One in Four Households In the World Use Wi-Fi http://www.huffingtonpost.com/2012/04/11/one-in-four-households-in-the-world-use-wi-fi_n_1419014.html

Carolyn G. (2013) How Technology Is Warping Your Memory

http://www.huffingtonpost.com/2013/12/11/technology-changes-memory_n_4414778.html

Ginny S. (2017) When Electronic Devices Become a Problem https://www.ghc.org/html/public/health-wellness/sugimoto/devices

Jack S. (2012) Wi-Fi: are there any health risks

https://www.theguardian.com/technology/askjack/2012/sep/27/wi-fi-health-risks

Kelley W. (2016) Half of teens think they’re addicted to their smartphones

http://www.cnn.com/2016/05/03/health/teens-cell-phone-addiction-parents/index.html

http://www.dailymail.co.uk/health/article-2989952/How-technology-taking-lives-spend-time-phones-laptops-SLEEPING.html

http://time.com/4508432/what-is-wifi-radiation-cancer/

Rob W. (2012) Internet addiction can cause physical damage to the brain, just like drugs, says researchers http://www.dailymail.co.uk/sciencetech/article-2085369/Internet-addiction-cause-physical-damage-brain-just-like-drugs-say-researchers.html

Weng, Chuan-Bo et al. (2013) Gray matter and white matter abnormalities in online game addiction European Journal of Radiology , Volume 82, Issue 8, 1308 – 1312

Photo Credits

Bomb Gaspard, CC BY 2.0

Holiday Fire Safety – Overloaded electrical outlet State Farm, CC BY 2.0

Internet addiction Federico Morando, CC BY-NC-ND 2.0

GKIS Quick Tips for Intellectual Enrichment Through Screen Media for Preschool Age Children

 

Families can no longer avoid screen media exposure in today’s technology driven society. Research demonstrates that exposure to different types of screen media, including television, computers, smartphones, and tablets, can have positive as well as negative effects on children depending on the age of the child, the quality of content, and the amount of exposure. How can we ensure that our children are exposed to the RIGHT type of media in ways that promote intellectual growth?

The Preoperational Child

Preschool age is between 3 to 5 years. The first 5 years of life are critical ages for learning and brain development. Let’s take a look at the different areas preschool-aged children learn and how their educational outcomes can be optimized through appropriate media use:

A Growing Brain & Motor Development

  • Ninety percent of a child’s brain development occurs between birth and 5 years of age (Frist, 2013). This makes it a pivotal time to expose children to a variety of educational information to expand their growing minds to their fullest potential.

GKIS Quick Tip: Choose media that introduces a wide variety of concepts to build upon for future learning. Areas can include language, math, functional skills, motor skills, creativity, and more. But make sure these concepts are delivered in small, deliberate doses. Avoid overwhelm by limiting screen time, delivering age-appropriate content, and avoiding frenetic, rapidly paced videos. Ensure appropriate engagement by co-viewing with your child and talking them through new concepts to facilitate learning and deepen your parent-child learning alliance.

  • As children progress through the preoperational stage, they learn to master gross motor skills, like running, jumping, and climbing, through exercise and play (Hanley, 2016).

GKIS Quick Tip: Interactive games that require active participation through physical activity rather than passive viewing can help improve motor, spatial, and coordination skills, particularly when outside play is not possible. For example, many Wii games encourage active participation through movement detection and feedback. Again, co-engagement is a win-win!

  • Children also learn to master fine motor skills (working with their fingers and hands) through active practice (Hanley, 2016).

GKIS Quick Tip: Tablets for children provide age-appropriate games and apps that enable children fine motor skill practice, like playing the piano, drawing shapes, as well as writing letters and words. For example, the Color and Draw for Kids app works as a virtual coloring book that helps children learn colors as well as fine-tune fine motor skills that are practiced through drawing.

Concrete & Abstract Thinking

  • According to Jean Piaget’s stages of cognitive development, children between the ages of 2 to 7 years old are undergoing the preoperational stage of development. This means kids are learning to form stable concepts but still have magic beliefs and have trouble taking the perspectives of others. With play and practice, they are constantly adding to their mental repertoire, such as major language development. In fact, children who do not develop necessary language skills by the age of 5 years are 6 times more likely to experience difficulty with reading in school (Frist, 2013).

GKIS Quick Tip: Media can benefit young children by teaching literacy and numerical skills. A recent study has shown that growth produced from watching the show Sesame Street is equally comparable to learning in a preschool classroom (Tankersley, 2015). Children exposed to the show were more likely to keep up academically at the appropriate grade level for their age. Interestingly, this effect was particularly pronounced among boys and children who grow up in disadvantaged neighborhoods. Reading skills can also be enhanced through computer games such as Teach Your Monster to Read. That means balanced use digital literacy using appropriate content can be intellectually beneficial by preschool age!

  • Thoughts are primarily generated by concrete rather than abstract ideas in early preschool years. In other words, young children learn about the world around them in a physical manner rather than through representations in their own thoughts.

GKIS Quick Tip: Choose games that allow your preschooler to be an active, rather than a passive, learner. For example, the game Sago Mini Toolbox lets players work virtually with tools, including saws and power drills, to complete building projects. These types of games teach children to work directly toward accomplishing a goal without too much emphasis on the depth of thinking that abstract ideas require. More information about this game can be found at the Common Sense Media website which provides ratings of educational media that will benefit your preschool child.

  • Although preschool children learn primarily through manipulating their environment, towards the end of this period they begin to use symbolic thinking, which means they use internal images to represent objects or people. This is evident through imaginary play. Preschool children often adopt roles such as doctor, mother, father, or cook so that they can practice using social norms and gender roles they see performed in their everyday lives. A child will also use inanimate objects as symbols for other objects (Cherry, 2016). For example, a child may use a blanket to represent a cape, therefore making him/her a real-life superhero.

GKIS Quick Tip: Because imaginative play is developing in the preschool years, exposing children to apps and computer games that emphasize pretend thinking may enhance intellectual abilities as well as creativity. Dr. Panda School is a highly rated game from the website Fundamentally Children’s “Good App Guide.” This app enables players to adopt and explore different roles in an educational context by telling stories about their experiences from the perspective of a teacher, nurse, cook, or even a janitor.

Making and Keeping Friends

  • According to Erikson’s psychosocial stages of development, preschoolers begin to practice interpersonal skills in classroom settings. They do this through participating in pretend play with others and initiating activities with others.

GKIS Quick Tip: Media can benefit preschool children by teaching social skills (Burton, 2015). Videos, television shows, and computer games can teach cooperation and sharing. An example of a beneficial program includes Toca Tea Party This program teaches social skills by allowing children to practice hosting their very own tea party with parents or friends.

  • Children at this age become increasingly curious and inquisitive. They begin to assert themselves more and ask questions to learn more about the world around them (McLeod, 2013).

GKIS Quick Tip: Try using screen activities that prompt questions that require parental input or knowledge. For example, the app Knoala requires children and parents to collaborate in a variety of activities including dancing, singing, crafts, treasure hunts, and more. These types of games not only promote learning, but also strengthen the attachment between you and your child.

  • Children in later preschool years begin to develop theory of mind, which means they gain the ability to understand the feelings and thoughts of others rather than just their own (Cherry, 2016). This particular change in mentality strengthens relationships with peers as well as adults.

GKIS Quick Tip: Computer games can provide children with the practice they need to interact with others appropriately. The game Social Express allows children to interact in simulated situations that mimic social interactions in real-life. It involves decision-making on the part of the player. Each social decision made will have a positive or negative response (Higgin, 2014). Through these experiences in a virtual world, preschool children are able to learn social cues, norms, and skills that they can apply in different settings as well as identify how their actions affect others.

Early exposure to educational media during the preschool years may contribute to intellectual growth. However, preschool children using too much screen media is associated with lower cognitive development and academic achievement (Kirkorian, Wartella, & Anderson, 2008). That means short time periods and age appropriate educational content is key for screen media benefit. Furthermore, accessibility to loving, responsive caregivers is necessary to enrich screen learning and teach important interpersonal skills such as empathy and emotional soothing. There is simply no replacement for love and one-to-one attention.

Thank you Alanna Daytona, CSUCI intern, for putting together these important tips for smart tech use. If you have recommendations for great educational online content for preschool children, please share them with the rest of the GKIS community and leave a response in the comment section below.

I’m the mom psychologist who will help you GetYourKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
GetKidsInternetSafe.com

Works Cited

Burton, L. (2015, June). Media benefits for children and teenagers. Retrieved from http://raisingchildren.net.au/articles/media_benefits.html

Cherry, K. (2016). What Is the Preoperational Stage of Cognitive Development? Retrieved from https://www.verywell.com/preoperational-stage-of-cognitive-development-2795461

Frist, B. (2013). Child’s first 5 years hold key to success. Retrieved from http://toosmall.org/news/commentaries/childs-first-5-years-hold-key-to-success

Hanley, S. (2016). Major Milestones in the Biological Development of Children. Retrieved from http://oureverydaylife.com/major-milestones-biological-development-children-1883.html

Higgin, T. (2014). Inventive Games That Teach Kids About Empathy and Social Skills. Retrieved from https://ww2.kqed.org/mindshift/2014/04/18/inventive-games-that-teach-kids-about-empathy-and-social-skills/

Kirkorian, H. L., Wartella, E. A., & Anderson, D. R. (2008). Media and Young Children’s Learning. Retrieved from http://www.futureofchildren.org/publications/journals/

McLeod, S. A. (2013). Erik Erikson. Retrieved from www.simplypsychology.org/Erik-Erikson.html

Tankersley, J. (2015). Study: Kids can learn as much from ‘Sesame Street’ as from preschool. Retrieved from https://www.washingtonpost.com/business/economy/sesame-street-and-its-surprisingly-powerful-effects-on-how-children-learn/2015/06/07/59c73fe4-095c-11e5-9e39-0db921c47b93_story.html

Photo Credit

9/365 game day by Jack Fussell, BY CC 2.0

On the Edge by Miika Silfverberg, BY CC 2.0

Student With Ipad At School – 143 by Brad Flickinger, BY CC 2.0

Child Identity Theft is on the Rise. Protect Your Family Against Cybercrime

Cybercrime concept with flag - United States

Kids are the number one target for identity theft due to the chances that the crime won’t be detected until the child reaches adulthood and seeks their first loan. This cybercrime involves the theft and fraudulent use of a child’s personal information (like name, social security number, address, and date of birth) to open lines of credit, take out loans, or access financial accounts. This scary issue is the drive behind developing our Cybersecurity and Red Flags Supplement, a comprehensive tool to detect online scams before the worst can happen. Find out more about cybercrime and what you can do to prevent it with this GKIS article.

Identity Theft

Identity theft can be used for many types of crimes, including:

  • taking out a loan
  • buying lines of credit
  • accessing the victim’s financial accounts
  • securing a driver’s license or employment or
  • seeking medical care.

Personal information can be stolen from virtual sources, like screen devices, websites, and email accounts, or in real life (IRL) from skimming information from your ATM card with a special device or stealing it from your home, wallet, trash, or mail.

Who is vulnerable?

Unsuspecting victims can be tricked into revealing private information by phishing scammers. These cybercriminals impersonate legitimate companies asking for passwords and credit information necessary to process a fake change of address form, application for credit, or to avoid an IRS tax lien or fake criminal charges.

Vulnerable populations include young people, the elderly, and immigrants or workers here on a visa.

Why is it important to check for identity theft?

Once discovered, it may take several costly months or even years to get credit and criminal records cleaned up and sorted out. Your child’s financial options may be blocked or delayed when deadlines, like college and employment, are most critical.

Can you imagine dealing with that in your overtasked, underfunded life? There are companies that offer cyber protective services and others that help you clean up the catastrophic results of cybercrime.

The Child Identity Theft Bill

In 2015, I received a phone call from Assemblymember Jacqui Irwin’s office asking for a statement about a Child Identity Theft bill (AB1553) that she is sponsoring. Asm. Irwin served as Chair of the Assembly Select Committee on Cybersecurity in Sacramento.

This bill served to “amend the Civil Code to require credit agencies to allow parents or guardians to create a new credit report for a minor child for the purpose of placing a security freeze on the child’s credit. Without a credit report to freeze, protection is difficult.” She was asking for my statement and support and wondering if I knew any child victims of identity theft.

After sending out an inquiry on my GetKidsInternetSafe Facebook page, it didn’t take long before I’d uncovered three victims who were willing to share their stories. Two involved child identity theft for financial cybercrime and the other involved identity theft on social media for cyberbullying. I’m sharing the financial theft stories to demonstrate how easy it is to become a victim and suggest steps you can take to protect your kids starting today.

Megan’s Story

My first respondent was a dad whose stepdaughter had recently graduated from nursing school. When the family went to their credit union in preparation for purchasing a car, they discovered that the stepdaughter’s credit report was pages and pages long with a sub-par (mid 5’s) credit rating.

It turned out that a criminal out of Phoenix had fraudulently opened several lines of credit with her social security number. From Sprint to multiple department stores, the crook had charged a debt of over $60,000. The family filed a police report to start the long process of calling creditors and clearing her name.

Although they had the criminal’s address, they elected not to press formal charges. When I spoke to the stepfather, he did not know whether the criminal was ever charged. He also said they never discovered how or when the fraud started, but it seemed to be a single party that may have gotten her personal information when she applied for a loan for nursing school.

The fraud seemed to stop once the credit agencies were notified, and an alert was placed on her account. Ultimately, it took the family over twenty hours of filing time plus another fifteen hours from a private credit fraud service to get her credit repaired. A year after the discovery, they had finally gotten her credit score back to the 700s with letters from the creditors with apologies. Nightmare!

Jose’s Story

The second identity fraud victim shared a truly tragic tale that has spanned over thirty years. Jose, who is 40 years old now, was 13 years old when he was first contacted by the IRS and told that he owed over $10,000 in back taxes. Despite all efforts to get clear of fraud, he still has issues like denied credit (including a first-time home buyer loan because it looked like he already owned properties) to two court-ordered paternity tests for mistaken-identity child support cases.

Jose also shared a story about being pulled over on an arrest warrant while he was on his way to becoming a priest. The officer said if it turned out he was lying about the fraud, he would arrest him and make him apologize directly to his lieutenant. He responded to the police officer that if HE was correct, the officer would have to go to church and apologize directly to his bishop. He laughed when he said the officer lived up to his promise.

Despite his resilient attitude, Jose has had to change phone numbers and bank accounts, can’t pay anything with checks, and has elected to put all property in his wife’s name. Considering the decades of victimization, he has had to endure, he goes to great lengths to protect his children’s personal information.

What can a parent do to avoid child identity theft?

    • Protect personal information at home with tools such as a locking mailbox, an in-home safe for storage, and a shredder for the disposal of personal documents.
    • Install cybersecurity safeguards on-screen media like passcodes and screensavers, firewalls, antivirus and encryption software, and secure passwords.
    • Educate your children about maintaining privacy and using discretion online. That means cautioning them about disclosing their name, address, school, date of birth, or any other personally identifying information in images (t-shirts with their school logo) or texting or posting. Geotagging on photos and social media should be turned off to hide location.
    • Setup up filtering and monitoring software and parent protection options like those from our Screen Safety Toolkit to block inappropriate contacts on the Internet and monitor your children’s activities, particularly in chat rooms, social media, texting, and instant messaging.
    • Teach your children about cybersecurity issues and skills to protect against hacking, phishing, and malware. Good habits include consistently downloading updates for security patches, using strong passwords and changing them often, and not clicking on embedded links or opening attachments from unknown sources.

If you are traveling…

    • Don’t post pictures that can reveal travel data, like boarding passes, passports, or travel or hotel vouchers. Not only can criminals benefit from knowing the details of your trip, but they may also read personal information from barcodes to steal your identity. The best option, wait until you’re home to post travel photos.
    • Avoid public WiFi. Hackers can access your private information using a man-in-the-middle attack (MITM). This means the criminal intercepts the link between your device and the server. This breach is like eavesdropping and can result in your private information being accessed and even altered. Malware can even be delivered to your device. A MITM attacker may set up a fake access point named similarly to the public network connection (called an “evil twin”) or engage in “packet sniffing” or “sidejacking,” which means using a tool to capture network traffic at the Ethernet frame level. Simple shoulder surfing at coffee shops or on airplanes can also result in privacy breaches. If you have to use public WiFi, practice situational awareness, and verify the WiFi name with staff at the public site. Avoid online tasks that involve private information like online banking or using private transaction information like date of birth, credit card numbers, tax IDs, or social security numbers. Always log out when using a hotspot to avoid the hacker continuing the session. Consider setting up a secure virtual private network (VPN) to encrypt inbound and outbound data. However, VPNs can decrease your bandwidth. Public WiFi may not be encrypted, but most major websites that use a password, like Amazon and PayPal, have encryption. If the URL has an “S” (for “secure”) at the end, as in HTTPS, then there’s some level of encryption.
    • Avoid using public computers for the same reasons it’s risky to use public WiFi. The software could be silently running in the background, thus capturing data from your online activities.
    • If your child is traveling with you, turn off location settings so criminals can’t intercept your location data and use it for targeted attacks. On Snapchat, this is called going “ghost mode.” Of course, if your child is on an independent walkabout, you may want to leave location services on so you can track them for safety.

Freeze your child’s credit.

Contact one of the three major credit card companies to see what kind of protection options they offer, like a credit freeze, which has been demonstrated to be one of the most effective strategies for preventing child identity theft. Each state has laws on how a credit freeze can be done. Remember, once a freeze has been implemented you must order a “thaw” on the account before applying for credit.

    • Equifax: This website explains what is needed to mail in the request. According to the person I spoke to there is no fee for minors.
    • Experian: This link explains what is needed to mail in the request. After 3 tries I gave up trying to upload the docs online. I couldn’t reach anybody, so I sent in a check for $10 plus 7.25% tax (Ventura County).
    • Transunion: I had better luck with Transunion when I called the number 888-909-8872. A polite and helpful representative informed me that neither of my minor children had credit files (a good start). He then offered the procedure necessary to get a free security freeze on my child’s account by mailing a letter with the following information:
      • Send in 2 pages: 1st page: Cover letter listing the minor info: full name, address, last four of social and file # (rep will give you) plus reason for security freeze (“Proactively protecting my child against fraud) plus requester info (parent): Full name, address, relationship. 2nd page: Official request in letter style format mentioning enclosure copy of minor’s social security card and birth certificate.

GetKidsInternetSafe was created to inform parents about proven preventative strategies before tragedy strikes. To get a head start today, check out my GKIS Connected Family Online Course.

I’m the mom psychologist who will help you GetYourKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
GetKidsInternetSafe.com

The Third Baby Then…And Now. How a Blunt Soccer Mom’s Advice Lead to the Smartest Decisions I Ever Made

Young family of five people watching a movie
Young family of five people watching a movie

Originally published by Ten to Twenty

When I was pregnant with my third child, a stranger walked up to me on the soccer field and gave me the most compassionate, rudest, wisest advice I’ve ever received. She said, “I’m going to tell you something nobody else will tell you. Having a third child changes EVERYTHING. You’re going to have to get a new car, a new house, and people will stop inviting you over.” And before I could respond, she walked away.

That quickly I was left less glowy, stunned, and speechless, unable to tell if I’d just been insulted or nurtured. But considering my haze of pregnancy idealism, illustrated by the “I want it sassy!” moment of horrific judgment at the hair salon the day before, I had it coming. It turns out she was exactly right. Several months later after the blissful delivery of that third fat, fat baby (his nickname for the first two years), we quickly graduated to a midsize SUV, a bigger house, and became the lepers of family barbeques.

The fat, fat baby happened to be the easiest of all of my kids. It wasn’t his behavior that ousted us. It was the number “5” on the RSVP card. It did our social lives in. But we didn’t actually care, because the truth was, three kids also made even the simplest of outings completely exhausting. We now had a sulking tween, a giddy toddler that could run into the elevator and hit close before we could catch her, and a fat, fat baby that strained every caregiver’s back he every had. True story.

So now, I’m that mean stranger lady giving you unwanted but sage advice. Here it is. Unless you’re one of those magnificent manicured mothers that can effortlessly quiet a sobbing baby and frantic toddler throughout a plane flight and then rest without resentment in the hotel room during naptime while everybody else tastes the exotic delicacies of your most recent vacation destination, then this article is for you.

If you’re having your third baby, vacations as you once knew them are now gone. Plane flights will be chaotic, exhausting, and outrageously expensive. One hotel room will no longer cut it, doubling your vacation budget. And forget about pleasing everybody in the family. Somebody’s going to be miserable (like adults and tween), because you will be catering to the youngest child by necessity.

At nine months pregnant due to the inspiration from that blunt soccer mom, I had the foresight of a bedraggled not-sassy shaman. I detonated any hope of a near-future vacation budget and remodeled the kitchen and put in a pool. I painted the bathroom walls a soothing citrine and sprinkled the living room with China Pear scented tea lights. The master bedroom became a Moroccan-inspired Mommy escape and the backyard was swiftly littered with genius distractions like a trampoline, hoola hoops, and a zip line. During this frantic survivalist outfitting, I also surrendered my insistence of sorted pencil drawers and matching socks. In a sentence, I transitioned our home into a constantly cluttered and littered with fishy-crackers staycation paradise.

Now that my kids are older (21, 13, and 11 years old), we can occasionally venture out of the house for fun. And we do. But no longer does the pool and hoola hoops cut it in regard to keeping them happy at home. And, once again, I employed big home structural strategies to keep us balanced. In a sentence, I identified each child’s passion and exploited it!

What do I mean by “exploit?” I mean that in order to take respite from entertaining the kids myself or allowing them to vegetate in front of screen media for too many soul-killing hours, I deliberately sprinkle their passions throughout our home so they nourish themselves with a variety of healthy activities. Here are three examples from my three kids:

My oldest daughter lives away for college now. From a very early age, she was a chatty, social child and an only for her first eight years. Little could distract her from following me around chattering incessantly. Other than her telling the grocery store clerk our most embarrassing moments, repeatedly, her chirpy little prattle was adorable. But a mom needs a break on occasion.

My secret distractor for her was crafts. When her friends helped her sort through her room before she moved out (sob), they excavated 2.4 tons of half-complete crafts kits. These projects may have only distracted her for short moments, but they were necessary moments indeed. Although she doesn’t half-craft anymore, she is a senior in college and still talking to me. So that’s a good endorsement.

11349091_10207021108665312_1471667268_n

My middle daughter LOVES animals. She got this from me, although I’m not allowed to say that, because she will sassily say, “I’m my OWN person.” We have miraculously held off horse ownership despite weekly begs, because we don’t have those kinds of riches. But animals are the number one way to keep her happy and compliant with screen media restrictions.

Our four-legged/two winged bribes have expanded into what apparently looks to others like animal hoarding. For us, it’s heaven. We now have two dogs, a cat, three bunnies, seven chickens, two pigs, and two goats that leisurely graze on top of a pet cemetery of critters long lost. I highly recommend this strategy. Although it may not be for you if you’re like my gal-pal Val with her self-described “OCD’s.” She never leaves my house without the comment, “I NEED to go home and take a Valium.” It’s the poop that takes her over the edge, so be sure to realistically assess your limitations.

My youngest son (aka fat, fat baby)…he’s the hardest to distract. He wants video games like his perimenopausal mother needs meds. We’ve had to patchwork his nonvirtual reality with a climbing tree, hip-hop, and his Golden doodle, Reggie. I wish I could show you videos of he and Reggie playing hide and seek. It’s adorable. He throws the ball as far as he can, then frantically runs giggling to some hidey-hole as Reggie tears around whining and frantically searching for his boy. Each reunion is a woofing squealing delight. They will play this for hours. Even though these two smelly, dirty, and now svelte beasts are catastrophically noisy and tail-waggingly destructive, it’s the cutest thing ever. He also swims, climbs trees, listens to loud hip hop, and follows me around whining.

The key to great parenting is obviously staying engaged and connected. But in order to sustain our homes and personal lives as adults outside of just parenting, we must encourage our children’s independence and unique journey to find who they truly are. The trick is staying engaged in a way that is sustainable in a warm, vibrant home, recognizing that a sense of humor and flexibility is the key to family harmony.

I’m the mom psychologist who will help you GetYourKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty

GetKidsInternetSafe.com