Need peaceful screen time negotiations?

Get your FREE GKIS Connected Family Screen Agreement

getkidsinternetsafe

GKIS Sensible Guide to a Social Media Cleanse

Feeling unproductive, unmotivated, and notice that you are wasting countless hours scrolling through social media? A social media cleanse may be a great decision to improve your well-being. In this week’s GKIS article, we will provide a step-by-step guide to putting down your phone and getting that much-needed break your mental health deserves. To help your tween or teen demonstrate they have the knowledge, problem solving ability, and judgment for social media, check out our Social Media Readiness Course. It’s an online course for tweens and teens that offers information about the risks of digital injury due to social media and psychological wellness tools. With a quiz for each module, they work their way through independently so their graduation certification demonstrates mastery of content. Of course, you can take it too if you’d like. It’s like driver’s training but for the internet!

According to pewresearch.org, 70% of Americans use social media.[1] For adults, the most popular social media platforms include YouTube (73%) and Facebook (68%). In contrast, 63% of teens use Instagram, making it the most popular social media platform amongst young users ages 15-25.[2]

According to the American Academy of Child & Adolescent Psychiatry, 90% of teens have used social media and teens spend an average of nine hours a day on social media.[3] Participants of a research study conducted by the Pew Research Center found that 74% of Facebook users visit Facebook daily. People of varying ages spend a lot of time on social media.

We use social media to view funny memes, stay connected to friends and family, meet new people, share opinions and information, show off passions and creative pursuits, advertise businesses, and even get news. Most of us find it extremely rewarding and feel we’ve got it under control. But for others, social media can negatively impact mental health.

Risks of Social Media Use

I’m a millennial who’s been using social media for 10 years. I’ve experienced a wide range of negative effects due to my social media use, including feelings of insecurity and not being good enough, anxiety, and the big one, fear of missing out (FOMO).

For years, I followed my friends’ and Instagram influencers’ profiles and wondered why I wasn’t as happy as them or why I couldn’t travel the world and have a life of fun and excitement. I often compared myself to others on social media and it hurt my mental health. In her book, Screen Time in the Mean Time, Dr. Bennett calls that “compare and despair” and believes it is a common contributor to teen anxiety and depression.

Social media can be a toxic place, especially during these unprecedented times. It’s too easy to spend hours on Google trying to figure out if you have COVID-19 and spend another 45 minutes scrolling through Facebook comments of people arguing over politics. Feelings are high and extreme opinions are rampant. According to helpguide.org, social risks include increased feelings of isolation, depression, anxiety, and insecurity.[4]

The Benefits of a Social Media Cleanse

To get away from negativity, a social media cleanse may be the answer. The benefits of a social media detox include:

  • More free time for other things, like research about a favorite topic
  • Improved self-esteem
  • Improved mood
  • Increased mindfulness and awareness
  • Improved sleep quality
  • Helping you overcome FOMO
  • Reconnecting with others offline[5]

To research this article, I deleted all of my social media apps including my all-time favorite, Instagram, about a month ago. I was concerned that I was averaging too much screen time (6 hours a day), and I wanted to be more productive and connect more with my boyfriend and family.

My first week of being social media free was by far the hardest. But it became much easier after that. I often felt the urge to redownload my Instagram app, but for the most part I have been able to stay away.

The benefits of staying offline have really paid off for me. Almost immediately, I felt it was easier to fall asleep at night (since I was not on Instagram or TikTok late). I’ve also felt a reduction in stress, anxiety, and anger. Now I don’t feel the need to check my friend’s social media just to see what they’re doing all the time. Instead, I reach out directly to friends to reconnect.

I worried that if I deleted my social media accounts, I would feel more disconnected from my friends. But instead, I’ve kept in touch with them more than before my social media cleanse. Relationships and connections are important to me, and I’m glad that I’ve been able to connect in a more meaningful and sincere way. Overall, I’m happy with the results. I feel more mindful and present in my everyday life, my sleep has improved, I’ve experienced less stress and anxiety, and I have more free time to get work done and spend time reconnecting with the people I love.

Do You Need a Social Media Break?

Here are some red flags that may signal that you are ready for a social media cleanse:

  • You spend most of your free time on social media.
  • You feel like you need to share or post often.
  • You find it hard to focus on schoolwork or other life responsibilities.
  • You feel an increase in anxiety and stress after spending time on social media.
  • You feel more lonely, unmotivated, and less creative.
  • You are experiencing feelings of low self-esteem or low self-confidence.
  • You feel anxious without your phone.
  • You feel guilty or ashamed about the amount of time spent on social media.

How to Get Started  

There are many ways to jump-start your social media cleanse. You can stop your phone use cold turkey, or you can delete one or two apps at a time. You can also cut down your friend list to only those you have a close, personal relationship with to cut out the less meaningful posts. Find whatever works best for you.

Here are some tips for getting started:

  • Deactivate or delete your social media accounts.
  • Delete social media apps from your phone.
  • Connect with family and friends in alternative ways.
  • Set a time limit on your phone to cut back on overall phone use.
  • Check your daily Screen Use and make adjustments if needed.
  • Set a specific “phone bedtime” before your actual bedtime (At least 3o minutes before you go to bed is recommended).
  • Make your bedroom a phone-free zone.
  • Turn your phone on “Night Mode” to decrease blue light emissions.[6]

Most importantly, remind yourself why you decided to go on a cleanse in the first place.  And remember, your cleanse doesn’t have to be a permanent decision, you can always go back.

Enriching Activities to Reconnect Offline 

There are endless possibilities for new enriching activities. You can practice meditation, pick up a new skill, or do that thing you’ve been meaning to do. Here are some fun ideas to reconnect with your loved ones:

  • Family game night
  • Family movie night
  • Cook a family dinner. Make it exciting by trying a new recipe or cooking an old family favorite.
  • Have a family yoga or workout session.
  • Practice meditation and deep breathing (alone or with family).

Using this extra time to reconnect and spend valuable time with your family is great, but it’s also important to spend time hanging out with yourself. Start by catching up on your sleep, creating a playlist, or reading a favorite book. Don’t feel pressured to constantly look for something to keep you busy unless that’s what you want to do. This is a well-deserved break. Do whatever you want with it and enjoy!

If you’re interested in learning more helpful tips about parenting in the digital age, check out the GKIS Connected Family Course. The GKIS Connected Family Course is family-tested and outcome-based and helps you close screen risk gaps and improve family cooperation and closeness.

Thanks to CSUCI intern, Remi Ali Khan for researching social media cleanses for this article.

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
GetKidsInternetSafe

Photo Credits

Photo by ijmaki from Pixabay

Photo by ROMAN ODINTSOV from Pexels

Photo by Andrea Piacquadio from Pexels

Works Cited

[1] Demographics of Social Media Users and Adoption in the United States. (2020, June 5). https://www.pewresearch.org/internet/fact-sheet/social-media/.

[2] Clement, J. (2020, September 23). U.S. teens: most popular social media apps 2019. https://www.statista.com/statistics/199242/social-media-and-networking-sites-used-by-us-teenagers/.

[3] Aacap. https://www.aacap.org/AACAP/Families_and_Youth/Facts_for_Families/FFF-Guide/Social-Media-and-Teens-100.aspx.

[4] Robinson, L. Social Media and Mental Health. https://www.helpguide.org/articles/mental-health/social-media-and-mental-health.htm.

[5] Parenta, & *, N. (2017, May 8). 7 amazing benefits of doing a social media detox. Parenta.com. https://www.parenta.com/2017/05/05/7-amazing-benefits-of-doing-a-social-media-detox/.

[6] Pacheo, D. (2020, November 21). Can Electronics Affect Quality Sleep? Sleep Foundation. https://www.sleepfoundation.org/articles/why-electronics-may-stimulate-you-bed

 

 

 

 

 

 

 

 

 

 

Is Artificial Intelligence Facial Recognition Threatening Our Privacy?

In 2014, the Founder of GetKidsInternetSafe Dr. Tracy Bennett wrote an article on artificial intelligence (AI) facial recognition and the potential dangers associated with such technology. Fast-forward 6 years to 2020 and many of her predictions have proven true plus more than could have been anticipated. AI facial recognition has boomed to an extent that many companies are using our social media data to increase profits. Big tech is willing to do to capitalize on us, even if it is not in our best interest. For a glimpse into the scary future possibilities of privacy invasion and trampling on our civil rights, check out what’s happening in China in today’s GKIS article.

Artificial intelligence (AI) facial recognition has come a long way in the past few years especially since engineers have been using artificial neural networks. These neural networks are similar to an actual human brain. They consist of a connection of nodes called artificial neurons and can transmit a signal to other nodes. Once a node receives a signal, it can process the signal and relay the information to the other nodes connected to it. When it comes to neural networks, a person can input any type of information. In face recognition technology, an image of the face is entered. AI marks each feature as a nodal point, collecting more data with each image.

Facebook uses neural networks and processes over 350 million new pictures daily. Amazon also has a service called recognition where customers can pay to acquire Clearview AI is a controversial service that many in Silicon Valley have opposed due to implications on privacy. Clearview AI searches social media platforms and has acquired over 3 billion pictures in their inventory. When someone searching Clearview gets a match, they get data AND a link to the social media accounts where the facial data was acquired. Many have concerns that this takes the privacy breach a step further.

Beneficial Ways Facial Intelligence is Being Used

  • AI has led to the recovery of many missing children that have been sex trafficked or sexually exploited.
  • Taylor Swift’s security team used facial recognition at her concerts to see if any of her stalkers were in the audience.
  • Law enforcement uses AI to identify people that cannot identify themselves, like people with severe mental illnesses, people high on drugs, or people that are refusing to identify themselves. With a three-minute turnaround time, law enforcement is saving a ton of money and time so they can focus on other crimes.

 Controversial Ways Facial Intelligence is Being Used

  • A man seen stealing beer at a CVS in New York City looked a lot like Woody Harrelson. The police entered a picture of Woody Harrelson into facial recognition technology and found a match. Although police were able to locate and apprehend the suspect, this technology could implicate the wrong person with similar facial geometry.
  • People of color are more likely to be misidentified due to AI facial recognition not being as good at differentiating people with darker skin.
  • The government could enable continued surveillance of certain individuals like they are doing in China. China uses facial recognition to follow Uighurs, a largely Muslim minority, as well as monitor all Chinese citizens using a social credit score.

Dystopian Surveillance

 AI advancements worry people due to fear of one day living in a dystopian surveillance taped society. Having this type of society would mean that all citizens would be tracked, and privacy would cease to exist. One might think that with the civil rights protections in the United States we are not at risk. I wonder if Chinese citizens have concerns…

China has more AI facial recognition CCTV cameras than any other country in the world and is a prime example of dystopian surveillance. The Chinese government claims to use AI to lower crime and increase prosocial behavior using a social credit system by a company called Sesame Credit. They contend that this system encourages citizens to behave in a socially appropriate manner and if someone is a good citizen, then they have nothing to hide and the cameras should not be a concern.

Specifically, using Sesame Credit in China, if a Chinese citizen is caught on camera doing anything that is not considered “socially appropriate” like jaywalking, littering, smoking, or buying too much alcohol or too many video games, their social credit score will decrease. A low social credit score may result in the inability to purchase airline or train tickets or book at certain hotels, or they may be barred from certain schools and jobs. Citizens can also have their dog taken away if it isn’t walked on a leash or is a public disturbance. It is also mandatory for blacklisted citizens to register to a public blacklist which typically results in social stigmatization. Parent scores can affect other family members, like preventing kids from being accepted to private schools. Public shaming is a big part of the social credit system. Pictures of blacklisted and low scoring citizens are shown on TikTok, pictures and videos with names play on public LED screens, and addresses are shown on a map on WeChat.

People with good social credit scores appreciate the system since they get rewarded. Perks consist of discounts on hotels, entertainment, and energy bills and one can rent bikes without a deposit. High scorers also get into better schools and get access to better jobs. Users on dating apps are required to put in their social credit score; good scores get more dates.

 Ways Citizens Can Raise Their Scores

  • Donating to college funds for poor students
  • Caring for elderly or disabled people
  • Repaying a loan even if the bank canceled it

How the United States is Implementing Social Credit

 The U.S. has not implemented AI as comprehensively as China. However, it is used in some industries. For example, life insurance companies in New York are allowed to look at a person’s public social media account to see if they are engaging in risky behavior. They base a person’s premium on what they find. In fact, a 2020 survey found that 98% of professionals do a background check on new hires and 79% disqualified a job candidate due to unfavorable social media content.

There is also a company called PatronScan which was designed to help restaurants and bars manage customers. It can help spot fake IDs and troublemakers by scanning an ID upon entry. A public list is shown for all PatronScan customers. The problem is that judgment about what constitutes a “troublemaker” is subjected and may result in an unfair listing without the owner’s consent.

Rideshares like Uber and Lyft have reviews for both drivers and riders that may result in a customer being refused a ride. Airbnb also works by reviewing both hosts and renters. Many hosts refuse to rent to certain people based on their past reviews, and many hosts may not be booked based on renter reviews.

China is a prime example of the dangers of AI facial recognition and how it can affect our privacy and freedoms. There is not yet much legislation preventing AI from being used in the United States and there’s a need to push for it. Like the frog in the pot, people adapt so willingly to advancing technology that it’s difficult to recognize possible consequences.

For information and safety tips about how to keep you and your family safe, we highly recommend Dr. B’s Cybersecurity and Red Flags supplement. In an age where technology is advancing at such a fast rate, it is important to keep you and your family informed on current technological risks and how to prevent them.

Thank you to CSUCI intern Andres Thunstrom for co-authoring this article.

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.Mom,

Clinical Psychologist,
CSUCI Adjunct Faculty
GetKidsInternetSafe.com

Photo Credits

Photo by Burst on Pexels
Photo by Pixabay
Photo by Gamefication

 Works Cited

 Campbell, C (2019) How China is Using “Social Credit Scores” to reward and punish its citizens https://time.com/collection/davos-2019/5502592/china-social-credit-score/

Harwell, D (2019, July 9) Facial-recognition use by federal agencies draws lawmakers’ anger https://www.washingtonpost.com/technology/2019/07/09/facial-recognition-use-by-federal-agencies-draws-lawmakers-anger/

Hill, K (2020, Feb 10) The Secretive Company that might end privacy as we know it https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html

Mckeon, K (2020, Apr 28) 5 Personal Branding Tips for Your Job Search https://themanifest.com/digital-marketing/5-personal-branding-tips-job-search

Thorn (2020) Eliminate child sexual abuse material from the internet https://www.thorn.org.

Teen Dating Apps

Meeting people online can be fun and exciting, especially for teens. However, there are risks. If you want to prepare your child for these risks, check out the GKIS Social Media Readiness Course. You may have heard of popular adult dating apps like Tinder or Bumble. In this GKIS article, we cover 5 dating apps that are popularly used by teens that you probably have never heard of. 

Yubo

Yubo is a location-based social networking app advertised for making new friends, but many people describe it as a dating app for teens. 

This app contains many features such as:

  • Stream: share live stream videos with friends.
  • Chat:  chat with friends and other app users.
  • Swipe: discover new friends nearby or around the world. 
  • Find a community: connect with people who have the same interests by finding a community. The online communities range from art and sports to LGBTQ+. 
  • Play: play games with friends like Q&A, Would You Rather and Let Them Guess.

Yubo’s age rating is 17+, but there is no age verification for this app, meaning any teen can use it and lie about their birthday.

Teendr

Teendr is marketed as a dating app for teens. On this app, users can meet and chat with new friends nearby based on their common interests like music, games, and more. 

This app contains:

  • Unlimited swipe: swipe right to meet new people or left to ignore. 
  • Search nearby: discover matches based on location.
  • Game & music sharing: meet people based on their gaming and music preferences, which they can share on the app.

Teendr is also rated 17+, with no age verification.

Spotafriend

Spotafriend is an app designed for teens to meet new people in their proximity. On the app store, it is described as “not a teen dating app,” but that’s what many teens are using it for. 

Spotafriend includes:

  • Swipe: swipe right to become friends with someone. 
  • Chat: chat privately when you get a match.

Spotafriend is rated 17+, but it is designed for ages 13-19.

 The Game by Hot or Not

The Game by Hot or Not is another app that allows teens to meet people in their area. It is marketed as an app to find the ‘hottest’ people nearby.

This app includes:

  • Ratings: rate each other’s attractiveness by tapping a heart on your profiles. 
  • Direct messages: Users who match (by liking each other’s profiles) can exchange messages.
  • Location services: find people in your proximity. 

Age: Hot or Not was originally rated 17+, but is now 18+ with no age verification.

 Skout

Skout is a social networking app that allows its users to meet people nearby or around the world.

The app features:

  • Preference and location: connect with people based on preferences and proximity. 
  • Live broadcasting: broadcast live videos on the app and watch other’s videos.
  • Chat and upload photos: send direct messages, share photos, and like/comment on other users’ photos.
  • Promote: Skout claims to have in-app features that increase your chances of finding new people and chatting.

Skout is rated 17+, but only people 18+ are allowed to join. Again, there is no age verification.

Meeting and flirting with people online can be exciting and fun, but it can also come with risks.

Catfishing and Online Grooming

Not everyone on the internet is who they say they are. Some people make fake profiles to deceive other users, which is called catfishing. On dating apps and social media, your teen can get exposed to sexual predators who use catfishing and grooming techniques to gain their trust. 

Sexting

Oftentimes, teens exchange their phone numbers and Snapchat usernames when they connect with others online. This can easily lead to sending sexual messages and photos. According to Guardchild:

  • 20% of teens have sent or posted semi-nude photos or videos of themselves
  • 39% of teens have sent sexually suggestive messages online

Sexting is common among teens which can be scary if their photos end up in the wrong hands and are shared publicly. This can lead to bullying, blackmailing, and emotional distress for the victim. For more information about sexting, check out the GKIS article, How Texting Can Turn To Sexting in the Blink of an Eye.

Cyberbullying and Harassment

Using dating apps and social media increases the likelihood of your teen experiencing cyberbullying and online harassment. Your teen might experience hateful comments, stalkers, and receive unwanted sexual messages. 

Click here to read a GKIS survivor’s story about teen bullying and sexual abuse.

If you see your teen using dating apps…

  • Don’t panic. Most likely, many of your teen’s peers are also using the same apps.
  • Have an open discussion about the risks of dating or social networking apps. 
  • Teach them to turn off location services for apps to disable people from seeing where they are.
  • Encourage them to approach you if anything makes them feel uncomfortable online.
  • Remember that it’s okay to say no, especially if they are too young to have an account.

A special thank you to Alisa Araiza for researching and co-writing this article. For more information on dating apps, take a look at Instagram is the New Dating App and Hookup Apps: The GKIS Sensible Parent’s Guide to Tinder. Make sure to check out the GKIS Screen Safety Toolkit for all your screen safety needs! 

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
GetKidsInternetSafe.com

Work Cited

Betts, J. (n.d.). Teen Dating Apps. Retrieved December 03, 2020, from https://teens.lovetoknow.com/relationships/teen-dating-apps

Online Dating – The Risks For Teens. (n.d.). Retrieved December 03, 2020, from https://www.internetmatters.org/resources/teens-and-online-dating-advice-hub-for-parents/online-dating-the-risks-for-teens/

Online Dating Is Especially Risky For Teens. (2020, September 17). Retrieved December 03, 2020, from https://yourteenmag.com/social-life/tips-teen-dating/online-teen-dating

Team, F. (n.d.). Swipe right for trouble: Six teen dating apps parents need to know about. Retrieved December 03, 2020, from https://www.familyzone.com/anz/families/blog/six-teen-dating-apps-parents-need-to-know

Teenage Sexting Statistics. (n.d.). Retrieved December 03, 2020, from https://www.guardchild.com/teenage-sexting-statistics/

Updated: November 8, 2., Kelli Dugan, C., Bob D’Angelo, C., Natalie Dreier, C., & Jared Leone, C. (2019, November 08). Teen dating apps: 5 popular dating apps that parents need to know. Retrieved December 03, 2020, from https://www.whio.com/news/local/teen-dating-apps-popular-dating-apps-that-parents-need-know/KQGkhTpFCxeyrmLejeODpN/

Photo Credit

Photo by Tim Mossholder on Unsplash

How Cybercriminals Steal Sensitive Data

In last week’s GKIS article, “How Teens Overshare,” we covered the ways kids intentionally and unintentionally share location information on social media and how to prevent this safety risk. In today’s article, we detail how cybercriminals victimize teens and offer more helpful information on how to get your kids internet safe.

Cyberstalkers

Cyberstalkers are predators who track online information to extort or harass, create cybercrimes like hacking or identity theft, or intercept a victim offline. Cyberstalkers can be complete strangers or people your teen may already be acquainted with.

Hackers

Hackers are predators who steal usernames, passwords, and personal information to gain access to a victim’s screen device. Once they can access, they can still further data, change or destroy information, install malware, and even take over the device’s camera.[1]  Data can then be sold to other criminals on the dark web or be used for identity theft to take out loans and credit cards in your name.

Phishing

Phishing is a cybercrime in which a victim is contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data. Phishing can also occur through websites and social media.[2] Dr. Bennett notes in her book, Screen Time in the Mean Time that the sensitive information obtained by phishing is often used for online login information such as usernames and passwords, bank account and credit card information, and even identity theft.

The most common example of phishing is email phishing. To email phish, the cybercriminal creates a fake domain that looks trustworthy and legitimate, then sends emails to potential victims asking them to click a link, download an attachment, or “update” their passwords.

To prevent your child from falling victim to online phishing, encourage them to only open emails, online messages, and text messages from trusted individuals and advise them to never click on any links or download attachments from an unusual or suspicious-looking email or message.

Identity Theft

According to The United States Department of Justice, “Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain.”[5]

Cybercriminals often target younger individuals because children do not have bad credit (which is great for cybercriminals) and it is easy to keep it from being noticed until the child is older. In Dr. Bennett’s book, Screen Time in the Mean Time, she writes about a couple of children who were victims of identity theft.

Here are a few ways to protect your child from identity theft:

  • Install cybersecurity safeguards on phones, laptops, iPads, and any other device that need protection
  • Have family conversations about being wary of posting or sharing personal information online
  • Set up a virtual private network (VPN) to ensure the safety of your device(s)
  • Update passwords at least once a year and be sure that the new password does not include any information that may already be public such as, your teen’s name, age, pet’s name, or anything that could be easily guessed

Social Media Quizzes

Cybercriminals can also phish for information through social media by reviewing posts, asking questions, or offering an online quiz with targeted questions. Quiz questions to avoid include any that ask for your (or your mother’s) maiden name, your favorite color, the street you grew up on, your pets’ names, the first car you owned, or your best friend’s name.

The answers to these questions are often security answers on websites. With security information, personal accounts can be accessed for malicious intent. To prevent cybercrimes, ask your teen to refrain from taking online quizzes or you can encourage them to only take online quizzes from a legitimate source. Teaching your teen to withhold sharing personal information that could pose a security risk is vital to ensure their online safety.

Cyber Blackmail

Once a cybercriminal obtains sensitive information, they may use it to coerce a victim further. According to the BBC, “Cyber-blackmail is the act of threatening to share information about a person to the public, their friends or family unless a demand is met or money is paid.”[3] Cyber blackmail can take many forms and the cybercriminals who commit this crime use different tactics to take advantage of their victims.

Cybercriminals may even say that they have explicit photographs, access to their victim’s phone and computer’s webcam, or even recordings of them from their personal devices. Some of those claims may be true or false, but either way, the cybercriminal uses fear and shame to get what they want.[4]

To help prevent your teen from becoming a victim of cyber-blackmail;

  • advise them to never share sexual images of themselves (the images can end up anywhere)
  • advise them to not accept friend requests from strangers
  • advise them to be wary of things they post, share, or message others online (what they say can very well be used against them in the future)
  • require your teen to have private social media accounts

For more information and safety tips, we highly recommend parents to purchase our Cybersecurity & Red Flags Supplement. Dr. B created this tool because parents in her clinical and coaching practices frequently asked her to teach their kids the red flags that may alert them to the tricks of online predators, hate groups, and cyberbullies.  In this Supplement, she offers her clinical teaching list so you can educate your kids. Knowledge and assertiveness coaching are key elements of child resilience and good judgment online.

Also included in the supplement is Dr. B’s Online Safety Red Flags for Parents. This tool teaches parents what child behaviors to look for that may signal they are at risk – a tool she created from 25+ years of clinical practice. Being able to recognize behavioral red flags in your child may be the difference between stopping risk after one exposure versus not recognizing dangerous relationships and exposures until it’s too late.

Thanks to CSUCI intern, Remi Ali Khan for researching cybercrimes and cybersecurity for this article.

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty

Photo Credits

Photo by Gerd Altmann from Pixabay

Photo by B_A from Pixabay

Photo by Pixabay from Pexles

Photo by Tracy Leblanc

Works Cited

Bennett, T. (2017). Screen Time in the Mean Time: How to Get Kids and Teens Internet Safe.

Brant, E., & Butterly, A. (2013, September 20). Cyber-blackmail: How to keep safe and deal with it. BBC Newsbeat. http://www.bbc.co.uk/newsbeat/article/23724703/cyber-blackmail-how-to-keep-safe-and-deal-with-it.

Cyber Extortion: Ransomware vs Extortionware. Alpine Security. (2020, August 2). https://alpinesecurity.com/blog/cyber-extortion-ransomware-vs-extortionware/.

The Dangers of Hacking and What a Hacker. https://www.webroot.com/us/en/resources/tips-articles/computer-security-threats-hackers.

Identity Theft. The United States Department of Justice. (2017, February 7). https://www.justice.gov/criminal-fraud/identity-theft/identity-theft-and-identity-fraud.

KnowBe4. What Is Phishing? Phishing. https://www.phishing.org/what-is-phishing.

Kids Commonly Contact Predators on Video Chat

Four out of five GKIS interns this semester admit to visiting dangerous video chat sites as middle schoolers despite parent warnings. Could that mean it’s common these days? After surveying friends, we think so. Parents have no idea what kids are actually seeing and doing during these online chats. Today’s GKIS article is the real story from the mouth of a millennial, where I discuss how we worked around parent supervision and what actually happens in popular chat rooms. Learn what video chat rooms are, the dangers associated with them, red flags to look out for, and just how simple it is for your child to access them. With this information, you can parent smarter and prevent digital injury … our GetKidsInternetSafe mission.

Video Chat Rooms, Sites, and Apps

Video chat is a way to interact face-to-face with anyone around the world through webcams. Video chat rooms are on multiple platforms including online websites and apps on your child’s smartphone, computer, gaming system, or tablet.

To place a video chat call, all your child needs are internet access and a webcam. Video chat sites and apps can also include alternative ways of communication such as instant messaging and chatting through sharing photos. Video chat sites and apps randomly pair your child with another user.

The Most Popular Video Chat Websites and Apps

There are hundreds of video chat websites and apps that are easily accessible. Many video chat sites and apps are free, while others require purchase. The most popular sites include; Omegle.com, DirtyRoulette.com, ChatRandom.com, and Chatroullette.com.

Video chat sites accumulate millions of users a month, with the most popular being Omegle.com with a whopping 34,000,000 monthly visitors.[1] The most popular video chat apps for Android and IOS devices include Badoo, Telegram, and Azar. Similar to video chat websites, these apps are used by millions of people. The most popular video chat app is Badoo, with over 460 million users.

Why We Did It

Kids love discovery and novelty. Just as they would visit random neighborhoods in town if they could drive, they love to browse random neighborhoods on the internet if they have access. Get them with their friends and they’re even more reckless and bold. That is why we offer our GKIS Screen Safety Toolkit. Parents told us they felt overwhelmed by the number of parent-management tech options, so we made it easy for you. The GKIS Screen Safety Toolkit is a family-tested, outcome-based resource guide with our best recommendations, how-to information, and links to our favorite easy-to-onboard parental control systems. With the toolkit, you’ll be set to create the custom screen safety toolkit for your unique child. Managing your child’s access is a first step toward protecting them from dangerous choices.

Our parents didn’t have these resources. That’s why we were video chatting with strangers by middle school. When I was thirteen years old, using Omegle and Chatroulette was the fun thing to do. My friends and I would go on during sleepovers and after school hangouts. Occasionally, I would even access it late at night when I was alone in my bedroom.

We did it because it was funny and exciting. We were kids having face-to-face conversations with complete strangers; it was interesting to us. We felt like we were the ones in control, and we always felt relatively safe. Disgustingly, a majority of the random connections would connect us to older males masturbating in front of the webcam. They would continue touching themselves even when they could clearly see just how young we were.

In my personal experiences, whenever a creepy man would be touching himself, my friends and I would quickly hit the skip button in hopes to be connected with a clothed person we could talk to. But there were also times when we would chat with one of those perverts and let them know how disgusting it was.

Now that I’m in my 20s, I realize just how dangerous and repulsive our online experiences were. Luckily, nothing horrible happened to us. But if I or a friend would have shared enough information or decided to meet up with someone we met from Omegle or Chatroulette, it could have been devastating.

Dangers of Video Chatting with Predators

Psychological injury can result from children viewing sexual behaviors or being groomed by predators online. It’s not uncommon for kids to be coerced to reveal identifying information like where they live, where they go to school, and who their friends are. From there, some predators will persuade their victims to meet up in person, which can lead to a number of dangerous possibilities.

Red Flags That May Signal Risk

Your child interacting with a predator may go unnoticed, but there are a few red flags that you can look out for. For example, your child may be at risk if they

  • become secretive about what they were doing online or change screens the minute you walk into the room,
  • regularly deletes their browser history or their browser is typically on private browse,
  • spend a lot of time on the phone or computer, or
  • seem nervous when asked if the parent can check their history or search their phone.

For a more comprehensive list of child red flags, check out our Cybersecurity Red Flag Supplement. Three-tools-in-one, this supplement to your free Connected Family Agreement offers:

Our GKIS CYBERSECURITY SUPPLEMENT – Did you know that kids are the #1 targeted population for identity theft? That’s because the cybercriminal can benefit from fraudulent charges for years before the victim discovers it. Protect your family from hacking, scamming, malware, and phishing with our cybersecurity setup guide and best practices checklist (at home and while traveling).

PLUS

Our GKIS ONLINE SAFETY RED FLAGS FOR KIDS & TEENS – Parents in my clinical and coaching practices frequently ask me to teach their kids the red flags that may alert them to the tricks of online predators, hate groups, and cyberbullies. I offer you my clinical teaching list so you can educate your kids. Knowledge and assertiveness coaching are key elements of child resilience and good judgment online.

PLUS

Our GKIS ONLINE SAFETY RED FLAGS FOR PARENTS – Parents need to know the behavioral red flags that may signal their child is suffering a digital injury. This tool teaches parents what child behaviors to look for that may signal they are at risk – a tool I created from 25+ years of clinical practice. Being able to recognize behavioral red flags in your child may be the difference between stopping risk after one exposure versus not recognizing dangerous relationships and exposures until it’s too late.

With parent management tech tools, cybersecurity awareness, child education, and parenting tools to recognize risk, you are far better equipped to block anonymous strangers from predating on your kids.

Thanks to CSUCI intern, Remi Ali Khan for researching video chat websites and apps for this article.

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.

Mom, Clinical Psychologist, CSUCI Adjunct Faculty

GetKidsInternetSafe.com

Photo Credits

Photo by Andrea Piacquido from Pexels

Photo by Julia Cameron from Pexels

Works Cited

[1] ChatHub. (2020, February 13). Top 12 Sites Like Omegle in 2020 (Ordered by popularity). Retrieved September 29, 2020, from https://blog.chathub.cam/top-12-sites-like-omegle/

 

 

 

 

Virtual Reality to Treat Phobias

Psychologists have successfully treated phobias for decades. Starting with education about what anxiety is, they then offer calming tools in preparation for exposure therapy. Exposure therapy is a form of therapy where the client and therapist focus on a specific fear and attempts to relax and gain control of the situation.[1]  Initially, psychologists recommend imagining the thing their client is most afraid of. Then, over time, they work toward exposures of the event in real life. This can be difficult in situations where the real-life object can’t be found (like airplanes, spiders, and injection needles). Technology now has a solution for us. It’s called Virtual Reality Exposure.

Imagine being terrified of riding in an elevator. You sit in your therapist’s office with a headset and you are virtually walking into and riding an elevator. After several sessions with your therapist and the headset, you can walk into an elevator and ride it up several stories. Virtual reality is giving people the opportunity to overcome their phobias in the comfort and safety of their therapist’s office.

What is virtual reality?

Virtual reality projects an environment that feels real, but is not. Users wear a headset that resembles large goggles that have screens instead of lenses. Once the headset is on, users can only see what is being shown on the screens. They can no longer see anything around them. There are sensors in the headset that can tell when users move their heads. The screen view moves along with users heads to make it feel real.[2]

Top 10 Phobias

Phobias are extreme reactions to certain situations. Below are the 10 most common phobias among people

Arachnophobia: Fear of spiders

Ophidiophobia: Fear of snakes

Acrophobia: Fear of heights

Aerophobia: Fear of flying

Cynophobia: Fear of dogs

Astraphobia: Fear of thunder and lightening

Trypanophobia: Fear of injections

Social Phobia: Fear of social situations

Agoraphobia: Fear of being alone in a situation or place where escape is difficult

Mysophobia: Fear of germs and dirt[3]

How does virtual reality treat phobias?

Virtual reality (VR) exposure therapy allows the client to face the object of their phobia through the headset while being in the safety of their therapist’s office. The therapist then coaches the client to manage anxiety during virtual reality exposure.

Benefits of VR Exposure Therapy

Gradual Exposure is More Tolerable

VR exposure is less triggering than real-life exposure. It’s an awesome second step, after imaginal exposure, to get them where they need to be before direct exposures.

Saves Time and Money

Real-life exposure therapy typically requires time and money to travel to different locations to treat the phobia. With virtual reality exposure therapy, travel is not needed since the therapy takes place in the therapist’s office – convenient, inexpensive, quick, and effective.

More Confidential

Any emotion elicited from the exposures will not occur in front of anyone besides their therapist.

Therapist Has More Control

The therapist can stop the simulation if necessary for the client. The therapist could also repeat the same simulation multiple times if the client needs it.

Less Risk

The simulation can end whenever the client needs to. For example, the client can easily get off the airplane in VR but in real life, the client would have to stay on the airplane once it has started taking off.[4]

Thank you to CSUCI intern Makenzie Stancliff for co-authoring this article. For more information on anxiety, check out the article How Internet Searches can Lead to Illness Anxiety Disorder on the GetKidsInternetSafe website.

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to more awesome parenting,

Tracy S. Bennett, Ph.D.

Mom, Clinical Psychologist, CSUCI Adjunct Faculty

GetKidsInternetSafe.com

Works Cited

[1] exposure therapy. (n.d.). Retrieved from https://medical-dictionary.thefreedictionary.com/exposure therapy

[2] Emspak, J. (2016, March 22). What Is Virtual Reality? Retrieved from https://www.livescience.com/54116-virtual-reality.html

[3] Cherry, K. (2020, January 20). How Are the Most Common Phobias or Fears Treated? Retrieved from https://www.verywellmind.com/most-common-phobias-4136563

[4] Posted by Dr. Andrew Rosen, Rosen, D. A., & Anderson, J. (2017, April 7). Virtual Reality Therapy for Phobias. Retrieved from https://centerforanxietydisorders.com/virtual-reality-therapy-for-phobias/

Photo Credits

Photo by JESHOOTS.COM on Unsplash

Photo by Frank Vessia on Unsplash