fbpx

Need peaceful screen time negotiations?

Get your FREE GKIS Connected Family Screen Agreement

risks

Ain’t That a Chip in the Head

Did you know that the FDA has given the go-ahead for companies to turn human test subjects into cyborgs? Advancements in the tech industry are being made at an alarming rate, giving rise to difficult ethical issues, especially in the medical field. Currently, there is a race to develop brain-computer interfaces (BCIs) for a multitude of purposes. In today’s GKIS article, we discuss the possible benefits, risks, and ethical issues associated with developing such devices. If you are unsure of how to protect your tweens and teens growing reliance on technology and obsession with online presence, Dr. Bennett’s Social Media Readiness Online Course will give you the answers you are looking for and help you to navigate through these ever-changing waters!

What is a brain-computer interface?

A brain-computer interface (BCI) is a technological device that directly interacts with the brain with no noticeable lag time. These devices read the electrochemical signals of the brain and translate them to carry out a desired action. This action can be anything from moving a prosthetic limb to telepathic communication. The goal of these devices is to bypass the body’s natural pathways using technology. Up until recently, this was merely the stuff of science fiction fantasy, and comic books. Yet, with advances in processing speed and data storage, it’s become a reality.

Neuralink

Neuralink is a company created by Tesla founder and carnival showman, Elon Musk. The goal of this company is specifically to create BCIs. The current BCI that Neuralink is working on consists of a computer chip the size of a coin connected to extremely thin wires. The chip will be surgically implanted into the skull with the wires being inserted directly into the brain.

The original stated purpose of this company was the altruistic goal of helping disabled individuals regain lost function of limbs and mobility. Yet more recently, Elon Musk stated that the goal is “human enhancement.” In interviews, such as on Joe Rogan’s podcast, he spoke of telepathic communication and thinking capabilities to rival computer artificial intelligence (AI). Neuralink has been given FDA approval to start the human trial phase and is looking to begin drilling holes in test-subjects heads sometime this year.

Synchron

Synchron is a much smaller company based in New York with a similar purpose of developing BCIs. Synchron’s flagship BCI, the Stentrode implant, is inserted through a vein and guided into the brain. Synchron has already successfully conducted clinical trials in Australia, inserting these devices into four human subjects suffering from severe paralysis. They have also been given FDA approval to begin human trials in the United States, which will take place at Mount Sinai Hospital and involve six subjects.

Though Sychron’s current goal is to allow disabled people to control digital devices with their brains and to improve their functional independence, their ultimate stated goal is to achieve whole-brain data transfer. What that means is they want to be able to transfer a human into a digital world.

Possible Benefits of BCIs

  • Improving the lives of disabled individuals
  • Faster access to information
  • Telepathic communication
  • Virtual immortality

Possible Risks of BCIs

  • The exploitation of individuals with disabilities
  • Risky surgery
  • Disability or death
  • A wider gap between the abilities of the wealthy and the poor
  • Literal brain hacking
  • Forever altering what it means to be human

Possible Ethical Issues of BCIs

Tech to BioTech

The biggest issue with BCIs requires a discussion in ethics. When it comes to ethical questions, we are in a truly unique situation. We have multi-million-dollar for-profit tech companies entering the medical field with end goals that are not medical in nature. Is it ethical for a tech company to perform risky experiments on individuals with disabilities when the end goal is profit and ultimately may not benefit the group initially being tested upon?

It could be argued that the initial experiments will benefit disabled subjects, which is ethically sound. Yet, several ethicists have concerns that the ultimate goal of this research is for commercial means, such as using the technology to be implemented into Tesla automobiles, rather than being purely medical in nature.[1]Others have pointed out that this could be considered exploitative due to the potential for commercial gains in other areas of business.

Pain and Suffering

Recently, news broke that 15 of the 23 monkey test subjects that had the Neuralink chip implanted in their brains at UC Davis died horrible deaths.[2] Since this news broke, UC Davis has been trying to distance itself from Neuralink. The surgical device that Neuralink created to perform the surgery is currently not approved for human trials since it is not okay to put humans through a medical trial where they are more likely to die or suffer from debilitating side effects than to receive any benefits.

The Opportunity Gap

Another ethical issue revolves around the potential societal effects if everything works out according to plan. There is already a huge gap between the haves and the have-nots, those with power and those without. What would happen if one could pay to be smarter, faster, and stronger? The opportunity gap would become insurmountable!

Privacy and Cybercrime

There is also the issue of privacy. All technology that can access the internet can be accessed by others. The most advanced encryption and security safeguards eventually become obsolete as technological advances are made that allow people to bypass them. Imagine if every thought or memory could be hacked and stolen from you. An entire person’s being could be manipulated, altered, or even held for ransom. Cybercrime is already an issue when it comes to ransomware, identity theft, and phishing scams. Think about the new problems that would arise if people’s brains were connected to the internet!

Technology Weaponized

For every technological achievement, there is always someone who will use it for evil. BCIs could eventually be used for military applications. Powerful organizations could utilize this technology to create heavily modified super soldiers. The possibilities become endless when physical and mental enhancement is on the table.

I know this sounds crazy, like something out of a comic book. Yet, flying cars are currently being tested for manufacture by multiple auto companies. Thirty years ago, no one could have imagined where we would be today from a technological standpoint. As computer chips become smaller and more powerful, there is no telling where we will be by 2050. The question is now whether something should be possible rather than if it could be possible.

Staying Informed

Dr. B is in a unique position to help you to learn more about the potential dangers that your family could face when engaging with technology. She can help you to navigate safely throughout your journey as a practicing psychologist, university professor, and mother.

In Dr. B’s book, Screen Time in the Mean Time, she discusses and attacks the issue of raising a family while safely integrating technology rather than fearing it. Also, you can download the free GKIS Connected Family Agreement simply by creating a GKIS account on our website home page. If you are looking for our most comprehensive toolkit to achieve screen safety and family cooperation, our Screen Safety Essentials Course offers useful tips about how to make the internet a safer place for your family with weekly parenting and family coaching videos, important teaching materials and infographics, webinars, articles, and other valuable information.

Thanks to CSUCI intern, Michael Watson for researching brain-computer interfaces and the potential bioethical issues surrounding them.

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
GetKidsInternetSafe.com

Works Cited

[1] Axe, D. (2022). Experts are ringing alarms about Elon Musk’s brain implants. The Daily Beast. https://www.thedailybeast.com/elon-musks-neuralink-inches-closer-to-human-trials-and-experts-are-ringing-alarms

[2] Ryan, H. (2022). Elon Musk’s Neuralink admits monkeys died in project, denies animal cruelty claims. CNN. https://www.cnn.com/2022/02/17/business/elon-musk-neuralink-animal-cruelty-intl-scli/index.html

Photo Credits

Photo by National Cancer Institute (https://unsplash.com/photos/z8ofh6Zkn4k)

Photo by ThisisEngineering RAEng (https://unsplash.com/photos/sbVu5zitZt0)

Photo by Nagara Oyodo (https://unsplash.com/photos/5iMFc05sQUA)

Photo by Robina Weermeijer (https://unsplash.com/photos/3KGF9R_0oHs)

Thanks to Kent Williams for the beautiful painting used for the thumbnail. (https://www.kentwilliams.com/paintings/2018/8/16/2018/8/16/m-w)

GKIS Guide to Teletherapy Services

With COVID-19 quarantine guidelines and stay-at-home orders, many aspects of our daily lives have transitioned into virtual worlds. Online school, work, communication, socialization, and even grocery shopping are accessible from the safety of our homes. Mental health services are no exception to this virtual transition. With face-to-face meetings impossible, telehealth psychology services became the only viable option. As a result, state and federal regulatory agencies and insurance companies temporarily relaxed rules and regulations to ensure that more people could receive the services they need. Today’s GKIS article covers the critical issues you need to know about teletherapy.

What is teletherapy?

Teletherapy is a branch of the broader service of telehealth (or telemedicine). Generally, teletherapy facilitates remote mental health services through technology. In other words, teletherapy allows clients to receive therapeutic or psychiatric treatment from practitioners over the phone, through video chat, or even text message.[1]

How does it work?

Teletherapy involves entirely virtual interactions between mental health experts and clients through the use of smartphones, computers, or tablets. In general, teletherapy sessions are supposed to work in the same way that traditional therapy sessions work. Therapists work with clients remotely to provide talk therapy, teach therapeutic techniques, and develop coping strategies. Teletherapy can be used for one-on-one, family, marriage, and group counseling.[1]

Who offers teletherapy services?

Teletherapy services are offered by licensed mental health professionals.[1] Many of us have recently seen an increase in advertisements for teletherapy services from companies such as Talkspace and BetterHelp. These companies are online therapy platforms that hire clinicians to work for them in exchange for a steady number of clients. To apply, clinicians must provide proof of credentials, proof of competence in therapeutic treatment, and undergo a rigorous screening process.[2] Unfortunately, it is impossible to ensure that this standard of hiring and assessment is upheld by every online therapy company.

What are the potential benefits/risks of teletherapy?

Potential Benefits for Clients:

Increased Access to Mental Health Services

  • Telehealth can be very convenient. It alleviates travel restrictions, time constraints, and other barriers like childcare needs.

Greater Sense Of Security

  • Many people feel more comfortable in their homes, which allows clients to relax and be more willing to share their thoughts and feelings.

Public Health Concerns

  • The primary factor responsible for this shift to teletherapy is concern over public health during the global pandemic. Telehealth allows clients and experts to abide by stay-at-home safety protocols.

Economic Advantages

  • Teletherapy alleviates costs associated with travel and childcare.

Client Control

  • It’s much easier for a client to move to another therapist when using teletherapy because factors regarding commute and location of the new therapist are removed.[3]

Potential Benefits for Mental Health Practitioners:

Greater Access to Clients

  • Teletherapy allows therapists to meet with clients who may be unable or unwilling to travel. Many people find the prospect of meeting with a therapist in a clinical setting intimidating. For people who feel more comfortable at home, teletherapy may increase their likelihood of seeking out therapeutic treatment.

Economic Advantages

  • Teletherapy alleviates costs associated with travel, business expenses such as rent for office space, and allows practitioners to meet with more clients.

Time

  • With less time spent commuting from home to work, practitioners have greater flexibility regarding scheduling appointments with more clients.

Efficiency

  • Sessions conducted via chat or messaging automatically generate a record of the session, and video-conferencing allows the opportunity for sessions to be recorded.[3]

Potential Risks and Limitations for Clients:

Privacy

  • There are several potential risks to client privacy associated with teletherapy services.
  • It’s possible for hackers to access private data from a client’s device. Files containing sensitive client information that are unsecured may be accessed by an unwanted third party.
  • Even HIPAA compliant teletherapy services may be subject to data breaches that put client confidentiality at risk.
  • Unsecure chat and conferencing programs may expose sensitive client data, so clients should only work with therapists who have the tools and knowledge to encrypt data.
  • Some people lack access to private environments even within their own homes, this can make it difficult to protect client confidentiality as people may overhear or listen in on a private session.

Competence of the therapist

  • Therapists who are not competent regarding the use of technology and commercial software put their clients at significantly greater risk of breaches in confidentiality

Environment

  • Some people may prefer the security, and calm of a clinical office setting and have difficulty accessing a comfortable and private environment to facilitate their session.

Distractions

  • It is very easy for people to become distracted by things like notifications, emails, and text messages when using their devices and these distractions may impede upon the therapy session.[3]

Potential Risks and Limitations for Mental Health Practitioners:

Privacy

  • It is the responsibility of the clinician to protect client data, ensuring this protection is much more complex when relying on online/virtual programs than it is for clinicians in a traditional therapy setting.

Legal and ethical concerns

  • Therapists must comply with state licensing board regulations in both the state where they practice and where the client is located. Following the proper rules and regulations requires special knowledge and legal understanding which can be difficult to keep up with.

Communication

  • With the absence of face-to-face interaction comes the loss of many non-verbal cues and paralanguage that enhance overall communication among clients and clinicians. It can also be more difficult to establish a comfortable rapport with a client in a virtual setting where people feel distanced. In other words, the physical separation may impede the therapeutic dynamic.

Anonymity and client safety concerns

  • Clients can easily hide their identities online. This can make it much more difficult for clinicians who have a responsibility to report clients who may harm themselves or others to the proper authorities.[3]

Is teletherapy comparable to traditional therapy?

There is a lot of debate as to whether teletherapy is truly comparable to traditional therapeutic treatments. Some experts claim that there is a lack of research or evidence regarding teletherapy including its efficacy and effectiveness with long-term outcomes. Other experts claim that there is no significant difference between teletherapy and traditional therapy regarding the practices used and their efficacy. Some clients have reported great experiences with teletherapy, and others have expressed the opposite. As with traditional therapy, what seems to matter most is the compatibility of the client and the therapist. As of now, it seems difficult to definitively say which avenue of mental health care is superior. The bottom line is, whether it’s teletherapy or traditional, it is up to the client to decide what avenue best suits their needs.

Dr. Bennett has been practicing teletherapy with her child, teen, and adult clients since the beginning of the pandemic. She says she’s had to get creative figuring out how to keep kids focused with fun games and skill-training strategies. She says she does miss the natural comfort and improved intimacy of face-to-face therapy. But she suspects that over half of her clients will opt for telehealth services in the future. She says it’s particularly convenient for busy families who have multiple children in sporting and learning activities. She even got licensed in Hawaii and Idaho so she can work remotely while she is on vacation!

GKIS Services

  •  Screen Safety Essentials Course offers a comprehensive family program with tools for fostering open communication and creating safer home screen environments.
  • Screen Time in the Mean Time is the parenting guide needed in this digital age. Dr. B’s book posits tangible ways to keep your family safe and connected while utilizing technology.

 

 

Thanks to CSUCI intern, Mackenzie Morrow for researching Teletherapy mental health services and co-authoring this article.

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
GetKidsInternetSafe.com

 

 

 

Works Cited

[1] Villines, Z. (2020). Teletherapy: How it works. Medical News Today. https://www.medicalnewstoday.com/articles/teletherapy

[2] Person, M. (2019). The pros and cons of contracting with online counseling companies. Counseling Today. https://ct.counseling.org/2019/01/the-pros-and-cons-of-contracting-with-online-counseling-companies/

[3] Stoll, J. et al. (2020). Ethical issues in online psychotherapy: A narrative review. NCBI. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7026245/

 

Photos Credited

Photo by Alex Green (https://www.pexels.com/photo/black-patient-and-psychologist-discussing-problem-in-office-5699451/)

Photo by Julia M Cameron (https://www.pexels.com/photo/person-writing-on-notebook-4144923/)

Photo by Muhammad Daudy (https://unsplash.com/photos/4eeG4Mn0HVY)

Photo by Pixababy (https://www.pexels.com/photo/gray-laptop-on-table-top-459654/)

Teen Dating Apps

Meeting people online can be fun and exciting, especially for teens. However, there are risks. If you want to prepare your child for these risks, check out the GKIS Social Media Readiness Course. You may have heard of popular adult dating apps like Tinder or Bumble. In this GKIS article, we cover 5 dating apps that are popularly used by teens that you probably have never heard of. 

Yubo

Yubo is a location-based social networking app advertised for making new friends, but many people describe it as a dating app for teens. 

This app contains many features such as:

  • Stream: share live stream videos with friends.
  • Chat:  chat with friends and other app users.
  • Swipe: discover new friends nearby or around the world. 
  • Find a community: connect with people who have the same interests by finding a community. The online communities range from art and sports to LGBTQ+. 
  • Play: play games with friends like Q&A, Would You Rather and Let Them Guess.

Yubo’s age rating is 17+, but there is no age verification for this app, meaning any teen can use it and lie about their birthday.

Teendr

Teendr is marketed as a dating app for teens. On this app, users can meet and chat with new friends nearby based on their common interests like music, games, and more. 

This app contains:

  • Unlimited swipe: swipe right to meet new people or left to ignore. 
  • Search nearby: discover matches based on location.
  • Game & music sharing: meet people based on their gaming and music preferences, which they can share on the app.

Teendr is also rated 17+, with no age verification.

Spotafriend

Spotafriend is an app designed for teens to meet new people in their proximity. On the app store, it is described as “not a teen dating app,” but that’s what many teens are using it for. 

Spotafriend includes:

  • Swipe: swipe right to become friends with someone. 
  • Chat: chat privately when you get a match.

Spotafriend is rated 17+, but it is designed for ages 13-19.

 The Game by Hot or Not

The Game by Hot or Not is another app that allows teens to meet people in their area. It is marketed as an app to find the ‘hottest’ people nearby.

This app includes:

  • Ratings: rate each other’s attractiveness by tapping a heart on your profiles. 
  • Direct messages: Users who match (by liking each other’s profiles) can exchange messages.
  • Location services: find people in your proximity. 

Age: Hot or Not was originally rated 17+, but is now 18+ with no age verification.

 Skout

Skout is a social networking app that allows its users to meet people nearby or around the world.

The app features:

  • Preference and location: connect with people based on preferences and proximity. 
  • Live broadcasting: broadcast live videos on the app and watch other’s videos.
  • Chat and upload photos: send direct messages, share photos, and like/comment on other users’ photos.
  • Promote: Skout claims to have in-app features that increase your chances of finding new people and chatting.

Skout is rated 17+, but only people 18+ are allowed to join. Again, there is no age verification.

Meeting and flirting with people online can be exciting and fun, but it can also come with risks.

Catfishing and Online Grooming

Not everyone on the internet is who they say they are. Some people make fake profiles to deceive other users, which is called catfishing. On dating apps and social media, your teen can get exposed to sexual predators who use catfishing and grooming techniques to gain their trust. 

Sexting

Oftentimes, teens exchange their phone numbers and Snapchat usernames when they connect with others online. This can easily lead to sending sexual messages and photos. According to Guardchild:

  • 20% of teens have sent or posted semi-nude photos or videos of themselves
  • 39% of teens have sent sexually suggestive messages online

Sexting is common among teens which can be scary if their photos end up in the wrong hands and are shared publicly. This can lead to bullying, blackmailing, and emotional distress for the victim. For more information about sexting, check out the GKIS article, How Texting Can Turn To Sexting in the Blink of an Eye.

Cyberbullying and Harassment

Using dating apps and social media increases the likelihood of your teen experiencing cyberbullying and online harassment. Your teen might experience hateful comments, stalkers, and receive unwanted sexual messages. 

Click here to read a GKIS survivor’s story about teen bullying and sexual abuse.

If you see your teen using dating apps…

  • Don’t panic. Most likely, many of your teen’s peers are also using the same apps.
  • Have an open discussion about the risks of dating or social networking apps. 
  • Teach them to turn off location services for apps to disable people from seeing where they are.
  • Encourage them to approach you if anything makes them feel uncomfortable online.
  • Remember that it’s okay to say no, especially if they are too young to have an account.

A special thank you to Alisa Araiza for researching and co-writing this article. For more information on dating apps, take a look at Instagram is the New Dating App and Hookup Apps: The GKIS Sensible Parent’s Guide to Tinder. Make sure to check out the GKIS Screen Safety Toolkit for all your screen safety needs! 

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
GetKidsInternetSafe.com

Work Cited

Betts, J. (n.d.). Teen Dating Apps. Retrieved December 03, 2020, from https://teens.lovetoknow.com/relationships/teen-dating-apps

Online Dating – The Risks For Teens. (n.d.). Retrieved December 03, 2020, from https://www.internetmatters.org/resources/teens-and-online-dating-advice-hub-for-parents/online-dating-the-risks-for-teens/

Online Dating Is Especially Risky For Teens. (2020, September 17). Retrieved December 03, 2020, from https://yourteenmag.com/social-life/tips-teen-dating/online-teen-dating

Team, F. (n.d.). Swipe right for trouble: Six teen dating apps parents need to know about. Retrieved December 03, 2020, from https://www.familyzone.com/anz/families/blog/six-teen-dating-apps-parents-need-to-know

Teenage Sexting Statistics. (n.d.). Retrieved December 03, 2020, from https://www.guardchild.com/teenage-sexting-statistics/

Updated: November 8, 2., Kelli Dugan, C., Bob D’Angelo, C., Natalie Dreier, C., & Jared Leone, C. (2019, November 08). Teen dating apps: 5 popular dating apps that parents need to know. Retrieved December 03, 2020, from https://www.whio.com/news/local/teen-dating-apps-popular-dating-apps-that-parents-need-know/KQGkhTpFCxeyrmLejeODpN/

Photo Credit

Photo by Tim Mossholder on Unsplash

How Cybercriminals Steal Sensitive Data

In last week’s GKIS article, “How Teens Overshare,” we covered the ways kids intentionally and unintentionally share location information on social media and how to prevent this safety risk. In today’s article, we detail how cybercriminals victimize teens and offer more helpful information on how to get your kids internet safe.

Cyberstalkers

Cyberstalkers are predators who track online information to extort or harass, create cybercrimes like hacking or identity theft, or intercept a victim offline. Cyberstalkers can be complete strangers or people your teen may already be acquainted with.

Hackers

Hackers are predators who steal usernames, passwords, and personal information to gain access to a victim’s screen device. Once they can access, they can still further data, change or destroy information, install malware, and even take over the device’s camera.[1]  Data can then be sold to other criminals on the dark web or be used for identity theft to take out loans and credit cards in your name.

Phishing

Phishing is a cybercrime in which a victim is contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data. Phishing can also occur through websites and social media.[2] Dr. Bennett notes in her book, Screen Time in the Mean Time that the sensitive information obtained by phishing is often used for online login information such as usernames and passwords, bank account and credit card information, and even identity theft.

The most common example of phishing is email phishing. To email phish, the cybercriminal creates a fake domain that looks trustworthy and legitimate, then sends emails to potential victims asking them to click a link, download an attachment, or “update” their passwords.

To prevent your child from falling victim to online phishing, encourage them to only open emails, online messages, and text messages from trusted individuals and advise them to never click on any links or download attachments from an unusual or suspicious-looking email or message.

Identity Theft

According to The United States Department of Justice, “Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain.”[5]

Cybercriminals often target younger individuals because children do not have bad credit (which is great for cybercriminals) and it is easy to keep it from being noticed until the child is older. In Dr. Bennett’s book, Screen Time in the Mean Time, she writes about a couple of children who were victims of identity theft.

Here are a few ways to protect your child from identity theft:

  • Install cybersecurity safeguards on phones, laptops, iPads, and any other device that need protection
  • Have family conversations about being wary of posting or sharing personal information online
  • Set up a virtual private network (VPN) to ensure the safety of your device(s)
  • Update passwords at least once a year and be sure that the new password does not include any information that may already be public such as, your teen’s name, age, pet’s name, or anything that could be easily guessed

Social Media Quizzes

Cybercriminals can also phish for information through social media by reviewing posts, asking questions, or offering an online quiz with targeted questions. Quiz questions to avoid include any that ask for your (or your mother’s) maiden name, your favorite color, the street you grew up on, your pets’ names, the first car you owned, or your best friend’s name.

The answers to these questions are often security answers on websites. With security information, personal accounts can be accessed for malicious intent. To prevent cybercrimes, ask your teen to refrain from taking online quizzes or you can encourage them to only take online quizzes from a legitimate source. Teaching your teen to withhold sharing personal information that could pose a security risk is vital to ensure their online safety.

Cyber Blackmail

Once a cybercriminal obtains sensitive information, they may use it to coerce a victim further. According to the BBC, “Cyber-blackmail is the act of threatening to share information about a person to the public, their friends or family unless a demand is met or money is paid.”[3] Cyber blackmail can take many forms and the cybercriminals who commit this crime use different tactics to take advantage of their victims.

Cybercriminals may even say that they have explicit photographs, access to their victim’s phone and computer’s webcam, or even recordings of them from their personal devices. Some of those claims may be true or false, but either way, the cybercriminal uses fear and shame to get what they want.[4]

To help prevent your teen from becoming a victim of cyber-blackmail;

  • advise them to never share sexual images of themselves (the images can end up anywhere)
  • advise them to not accept friend requests from strangers
  • advise them to be wary of things they post, share, or message others online (what they say can very well be used against them in the future)
  • require your teen to have private social media accounts

For more information and safety tips, we highly recommend parents to purchase our Cybersecurity & Red Flags Supplement. Dr. B created this tool because parents in her clinical and coaching practices frequently asked her to teach their kids the red flags that may alert them to the tricks of online predators, hate groups, and cyberbullies.  In this Supplement, she offers her clinical teaching list so you can educate your kids. Knowledge and assertiveness coaching are key elements of child resilience and good judgment online.

Also included in the supplement is Dr. B’s Online Safety Red Flags for Parents. This tool teaches parents what child behaviors to look for that may signal they are at risk – a tool she created from 25+ years of clinical practice. Being able to recognize behavioral red flags in your child may be the difference between stopping risk after one exposure versus not recognizing dangerous relationships and exposures until it’s too late.

Thanks to CSUCI intern, Remi Ali Khan for researching cybercrimes and cybersecurity for this article.

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty

Photo Credits

Photo by Gerd Altmann from Pixabay

Photo by B_A from Pixabay

Photo by Pixabay from Pexles

Photo by Tracy Leblanc

Works Cited

Bennett, T. (2017). Screen Time in the Mean Time: How to Get Kids and Teens Internet Safe.

Brant, E., & Butterly, A. (2013, September 20). Cyber-blackmail: How to keep safe and deal with it. BBC Newsbeat. http://www.bbc.co.uk/newsbeat/article/23724703/cyber-blackmail-how-to-keep-safe-and-deal-with-it.

Cyber Extortion: Ransomware vs Extortionware. Alpine Security. (2020, August 2). https://alpinesecurity.com/blog/cyber-extortion-ransomware-vs-extortionware/.

The Dangers of Hacking and What a Hacker. https://www.webroot.com/us/en/resources/tips-articles/computer-security-threats-hackers.

Identity Theft. The United States Department of Justice. (2017, February 7). https://www.justice.gov/criminal-fraud/identity-theft/identity-theft-and-identity-fraud.

KnowBe4. What Is Phishing? Phishing. https://www.phishing.org/what-is-phishing.