Kids and teens love YouTube’s colorful celebrities who cater to their specific interests. But many influencers use their celebrity status to lead fans into harmful situations. In today’s GKIS article, find out how these YouTube celebrities promised big earnings from online gambling, offered poorly planned conventions, attacked other influencers, and encouraged fans to harass other online competitors. Using unethical tactics and no disclosure, many of these profit-making schemes succeed unchallenged.
What’s a YouTube influencer?
A YouTube influenceris a person with a YouTube profile that has a large number of followers and can influence trends, products, and purchasing habits. Their content is typically videos of product recommendations or reviews. Other times, it’s a video (vlog) with influencers talking to their audience about anything that strikes their fancy. Most vlogs include colorful opinions, vulgar language, and provocative topics.
Most influencers are trained marketers who profit from ads, partnerships, and paid sponsorships. Although some provide harmless entertainment, others intentionally mislead or introduce content that can harm their followers.
“Oops, I didn’t mean it.”
One-time mistakes are getting increasingly rare among YouTube celebrities. For some, a string of mistakes results in more fame and profit. For instance, PewDiePie is one of the world’s most famous YouTube celebrities with 91 million subscribers. In 2108, he was criticized for promoting an Anti-Semitic YouTube channel [1], delivering Anti-Semitic jokes [2], and using the hard N-word to thousands of viewers in a live stream video [3].
In 2019, PewDiePie stoked fan fires by encouraging “a fight” with a YouTube channel T-Series and Indian production house. Competing for subscribers, PewDiePie fanned a competition between American YouTube culture versus Indian YouTube Culture. The rallying cry resulted in hacking printers and Google homes, a vandalized World War II memorial in Brooklyn (“subscribe to Pewdiepie”), and, most horrifying, a Christchurch mass murderer yelling “subscribe to PewDiePie” during the live stream of his shooting.
YouTube Influencers Encourage Gambling
CSGOLotto: In 2016, YouTubers TmarTn and ProSyndicate promoted and advertised a site called CSGOLotto. On this site, players bought in-game items that were placed into an online pot alongside other people’s purchased merchandise. The goal was to gamble to win the biggest pot of merchandise.
Video ads for the GSGOLotto showed TmarTn and ProSyndicate having fun gambling large amounts of money trying to win big. Most times, they did win BIG – up to three times the amount they started with up to $20,000 worth of merchandise!
Based on our research, at no point in the ads or written copy did either influencer mention to their collective audience of 13.5 million that they owned this site and were profiting directly. We found the ads to be misleading, looking like the celebrities were simply players rather than profiteers.
Mystery Brand: In 2018, Jake Paul and RiceGum created a similar gambling site called Mystery Brand. In this game, players purchase $5 to $100 virtual boxes that would contain a mystery item worth either less or more than the amount paid. The promised a chance to win a $250 million house with only a $15 buy-in.
The influencers were reportedly paid $100,000 for promotion to their collective 30 million subscribers. In their videos, they narrated how they “teamed up” with Mystery Brand to show how “dope” it was to play.
After demonstrating the easy signup process, the two spent big. Once a player buys in, their money stays in. Players can’t cash out. They can only earn sponsored prizes shown on the site, like a virtual shopping mall. For example, in one video RiceGum shows off his $15,000 profit after only spending $3,000. Neither RiceGum nor Jake Paul refers to the site as “gambling,” but instead call it a “game” with “good value,” promising “there is no losing in this.” Based on our research, no place on the site states the players’ chances of winning.
A Poorly Planned Convention
Tana Mongeau is a content creator with 3.7 million subscribers. In 2018, 5,000 people showed up at a hotel in Anaheim to attend her convention, advertised to be a cheaper and more accessible version of Vidcon (which is a large-scale event hosted by YouTube to meet your favorite YouTuber). Due to poor planning, over 4,000 people waited for over four hours in the sweltering heat outside of the hotel. There were little shade, food, or water available, and many attendees got sunburned, passed out, and rioted due to poor accommodations and security.
Although promised to be free, it wasn’t. While 4,000 waited outside, the 1,000 inside were greeted with a $60 “VIP” pass, with a lack of entertainment, overcrowding, and almost the same issues as those outside the hotel. The videos of this event are upsetting to watch.
Using Their Platform to Attack People
When some YouTube influencers don’t like other content creators or other people in general, they sometimes rant with name-calling and unfair accusations. This cyberbullying can result in a cyber flash mob of dedicated fans that cyber attack through doxing(showing private information), pranking, and cyber-harassment.
False Accusations Against a Competitive Influencer
Jackie Aina is a popular beauty guru who creates and shares videos of makeup applications with 2.9 million subscribers. In 2018, she made a video accusing another YouTuber, Petty Paige (128 thousand subscribers), of stealing $1,500 from her personal bank account.
This accusation appeared to have no proof of legitimacy. Although she never stated Petty Paige’s name in the video, she put up a picture of a video Paige had made, making it easy for her subscribers to identify the accused perpetrator. Jackie Aina’s fans took to social media to harass Paige for weeks. Paige even stated that many business and job opportunities were canceled because of harassment.
Targeting Their Audience
The Gabbie show (6.4 million subscribers) is one of many YouTubers who have targeted everyday people with no regard to how the fan base would react to it. When a young girl in her audience made a negative comment on one of Gabbie’s tweets, Gabbie screenshotted it along with the girl’s account and posted it on her Twitter (2.7 million followers). This led fans to spam and harass the girl, flooding her inbox with hateful messages.
Are there legal consequences?
Too often, when malicious or unethical online behavior is identified, the scandal is fleeting. For example, in the case of TmarTns and ProSyndicate’s gambling scam, the Federal Trade Commission (FTC) filed a case for lying about ownership of a product. Yet somehow, both influencers avoided legal prosecution, only suffering a mild loss in subscribers and yearly income due to a damaged reputation. They still have a net worth of around $5 million.
For Jake Paul and RiceGum, absolutely nothing happened. RiceGum created a video justifying his behavior as the same as what others do. Jake Paul made a joke about the situation. When asked, “You loved being called out for selling a gambling scam to underage kids?” He responded, “Yes, love it.”
Of the influencers covered in this article, Tana Monogue probably received the biggest consequences. After months of backlash and hate from fans and YouTubers, Tana made multiple apologies. But she still suffered no legal consequences. And as for what Jackie Aina and Gabby Shows did, many just see it as insignificant errors in judgment.
What can be learned?
Influencers are not your friends and most often cannot be trusted.
Fanning follower anger is often fake and staged.
On the internet, bad behavior makes influencers money and often goes unpunished.
If you believe the hype, you’re gullible. It’s probably not worth the drama. Think for yourself instead of following blindly.
Thanks to GKIS intern Jack Riley for researching and writing this article. If you learned from this article, stay tuned for part 2, which details the irresponsibility and scams that YouTube influencers continue to feed their audience as well as the marketing and social manipulations used to make sure viewers keep coming back.
Onward to More Awesome Parenting,
Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
Works Cited
YouTube Influencers Encourage Gambling
Fluff, TMARTN GAMBLING ON CSGO LOTTO & DECEIVING OWNERSHIP (Full Video Reupload), YouTube.com
(2016, July) YouTube gamers caught in gambling row, bbc.com
Virtual kidnapping scams are on the rise and, since it is difficult to identify the perpetrator, they are unlikely to go away. Last week a Facebook friend posted about a terrifying telephone scam. She encouraged me to share her story. Be warned, it’s really upsetting, and it’s a true story! It’s worth the read so you won’t fall emotional and financial victim to scammers, phishers, and extortionists.
“Mommy! Mommy! Mommy! He’s got me! He’s got me!”
A mother’s WORST NIGHTMARE, and it happened to me Saturday morning.
I was at home working in my office when my cell phone rang. I picked it up and heard a girl screaming and crying, “Mommy! Mommy! Mommy! He’s got me! He’s got me!” Then a male voice saying, “Shut the f__ up b___!” The girl’s voice sounded like my daughter who is living away for graduate school.
The world beneath me fell away. I can’t tell you the fear I felt. This VILE man spoke to me in a thick accent telling me what he is going to do to her, and after he’s finished with her he will send her home to me in pieces if I don’t give him money right now.
I kept talking to him on speaker while dialing 911. The dispatcher said, “Stay on the phone, police have been dispatched.” Within minutes a special crime unit arrived.
For the next twenty minutes, I spoke to the “kidnapper” while the police coached my questions and traced the call. I demanded he put her on the phone and text me her picture. He continued to threaten terrible things. Meanwhile, our calls to my daughter went to voicemail, so they sent Arizona police her work.
My husband and other daughter could see my texts, CALL HOME NOW!!!! URGENT!!! and were freaking out. Neighbors told them the police were everywhere, and they couldn’t get through.
Finally she texted after the police located her at work. They checked her apartment and verified it was safe. I broke down crying.
I don’t want ANYONE, EVER to go through what we did! The fear and possible reality were there for me for what seemed like hours! All I have thought about ALL weekend is “These VILE people are putting someone else through this!” Please share this story about the new horrible scam out there.
Source of the Theft
A few days after my friend posted this story, I followed up with her. She informed me that another family from the same university was scammed by the same man minutes after he hung up on her. They were about to wire $7000 before they were able to contact their daughter. This incident made her wonder if the information was gathered from hacked university data. A few weeks later, another Facebook friend posted this one:
Today my parents got a phone call from someone pretending to be my son. He told my dad that he went to the store to get cold medicine with a friend from school who was driving, they got pulled over, and his friend had pot in the car, so he was arrested and now was in jail. He begged my dad not to tell “my mom.”
My dad asked a few questions and was thinking it may be a scam, but he said the person on the phone sounded young, so he wasn’t quite sure. After a few questions, the kid hung up. We’re pretty sure that he would have asked for money to wire or something. My son is safe at school (I checked). But wanted to pass this on to you guys. Maybe this scam has been going around? Obviously, they are targeting older people, and I can see some people falling for it. My dad is pretty sharp, and it still tricked him at first.
Other Scams to Look Out For
Other types of extortion scams involve the perpetrator posing as the IRS or a crime cartel framing you for a false crime that will result in a suspension of your bank accounts, criminal charges, or a threat to you or your family’s safety if you do not send money. For instance, there have been reports of victims on vacation receiving a call in their hotel room stating that they are being targeted by a drug cartel and should turn off their phones to remain safe. While the victim is out of communication, the virtual kidnappers demand money from friends and family.
Another type of scam involves ransomware, which is a virus that infects your computer and encrypts the data. The scammer sends a message threatening to keep your hijacked computer data unless a ransom is received.
To avoid this kind of virus:
learn how to identify typical phishing strategies,
do not click on unknown email links or websites,
install premium security software, and
keep your software updated.
It is also important to backup computer data on a secure cloud-based backup service with revision history. Even legitimate websites can be hacked to spread malware, so awareness and preparation are key.
Here are GetKidsInternetSafe tips to avoid being a victim of virtual kidnapping:
Stay up to date about the scams popular in your area.
Set your social media profiles to private and avoid giving out personal information. Teach your kids to do the same with GetKidsInternetSafe techniques.
Occasionally cleanse your social media profile of photos. A backlog of photos tells a detailed blueprint of your family’s activities and personalities. When viewed by a perpetrator, those details can be used against you.
Keep your telephone landline.
Download GPS location-sharing apps to family member phones, such as Find My iPhone, Find Friends, or Life360.
Create an emergency plan, which includes a list sharing of names and phone numbers of workplace landlines, friends, and extended family. Create and include family nicknames to use in case of a need for emergency telephone identification.
If you get a suspicious call, assess its authenticity. For example, if the call is not from the victim’s telephone and they want you to stay on the phone until the money is delivered, be suspect.
If they are on the victim’s phone, recognize that the phone may have been hacked and forwarded to another phone or lost or stolen. Just because the number shows up as your child’s phone doesn’t necessarily mean the scammer has possession of the phone or the phone’s owner.
Recognize that scammers often ask for money to be wired through services like Western Union or online currency like Bitcoin, as these methods of payment are untraceable.
Stay calm, slow the caller down, and do not share any personal information. Ask them to answer a question only the victim would know. Don’t challenge or argue with the caller. Buy time by saying you are writing down the demand and need time to comply.
Use another device to call the police while on the phone.
Ask questions and, if feasible, demand a call from the victim’s phone or a picture of the victim.
Get to a safe place as soon as possible.
These tips do not constitute legal advice from GetKidsInternetSafe. Although many of these suggestions are offered by the Federal Bureau of Investigation website, recognize that nothing outweighs your instincts. Err on the side of caution and seek expert help from your local police department or the FBI.
Kids are the number one target for identity theft due to the chances that the crime won’t be detected until the child reaches adulthood and seeks their first loan. This cybercrime involves the theft and fraudulent use of a child’s personal information (like name, social security number, address, and date of birth) to open lines of credit, take out loans, or access financial accounts. This scary issue is the drive behind developing our Cybersecurity and Red Flags Supplement, a comprehensive tool to detect online scams before the worst can happen. Find out more about cybercrime and what you can do to prevent it with this GKIS article.
Identity Theft
Identity theft can be used for many types of crimes, including:
taking out a loan
buying lines of credit
accessing the victim’s financial accounts
securing a driver’s license or employment or
seeking medical care.
Personal information can be stolen from virtual sources, like screen devices, websites, and email accounts, or in real life (IRL) from skimming information from your ATM card with a special device or stealing it from your home, wallet, trash, or mail.
Who is vulnerable?
Unsuspecting victims can be tricked into revealing private information by phishing scammers. These cybercriminals impersonate legitimate companies asking for passwords and credit information necessary to process a fake change of address form, application for credit, or to avoid an IRS tax lien or fake criminal charges.
Vulnerable populations include young people, the elderly, and immigrants or workers here on a visa.
Why is it important to check for identity theft?
Once discovered, it may take several costly months or even years to get credit and criminal records cleaned up and sorted out. Your child’s financial options may be blocked or delayed when deadlines, like college and employment, are most critical.
Can you imagine dealing with that in your overtasked, underfunded life? There are companies that offer cyber protective services and others that help you clean up the catastrophic results of cybercrime.
The Child Identity Theft Bill
In 2015, I received a phone call from Assemblymember Jacqui Irwin’s office asking for a statement about a Child Identity Theft bill (AB1553) that she is sponsoring. Asm. Irwin served as Chair of the Assembly Select Committee on Cybersecurity in Sacramento.
This bill served to “amend the Civil Code to require credit agencies to allow parents or guardians to create a new credit report for a minor child for the purpose of placing a security freeze on the child’s credit. Without a credit report to freeze, protection is difficult.” She was asking for my statement and support and wondering if I knew any child victims of identity theft.
After sending out an inquiry on my GetKidsInternetSafe Facebook page, it didn’t take long before I’d uncovered three victims who were willing to share their stories. Two involved child identity theft for financial cybercrime and the other involved identity theft on social media for cyberbullying. I’m sharing the financial theft stories to demonstrate how easy it is to become a victim and suggest steps you can take to protect your kids starting today.
Megan’s Story
My first respondent was a dad whose stepdaughter had recently graduated from nursing school. When the family went to their credit union in preparation for purchasing a car, they discovered that the stepdaughter’s credit report was pages and pages long with a sub-par (mid 5’s) credit rating.
It turned out that a criminal out of Phoenix had fraudulently opened several lines of credit with her social security number. From Sprint to multiple department stores, the crook had charged a debt of over $60,000. The family filed a police report to start the long process of calling creditors and clearing her name.
Although they had the criminal’s address, they elected not to press formal charges. When I spoke to the stepfather, he did not know whether the criminal was ever charged. He also said they never discovered how or when the fraud started, but it seemed to be a single party that may have gotten her personal information when she applied for a loan for nursing school.
The fraud seemed to stop once the credit agencies were notified, and an alert was placed on her account. Ultimately, it took the family over twenty hours of filing time plus another fifteen hours from a private credit fraud service to get her credit repaired. A year after the discovery, they had finally gotten her credit score back to the 700s with letters from the creditors with apologies. Nightmare!
Jose’s Story
The second identity fraud victim shared a truly tragic tale that has spanned over thirty years. Jose, who is 40 years old now, was 13 years old when he was first contacted by the IRS and told that he owed over $10,000 in back taxes. Despite all efforts to get clear of fraud, he still has issues like denied credit (including a first-time home buyer loan because it looked like he already owned properties) to two court-ordered paternity tests for mistaken-identity child support cases.
Jose also shared a story about being pulled over on an arrest warrant while he was on his way to becoming a priest. The officer said if it turned out he was lying about the fraud, he would arrest him and make him apologize directly to his lieutenant. He responded to the police officer that if HE was correct, the officer would have to go to church and apologize directly to his bishop. He laughed when he said the officer lived up to his promise.
Despite his resilient attitude, Jose has had to change phone numbers and bank accounts, can’t pay anything with checks, and has elected to put all property in his wife’s name. Considering the decades of victimization, he has had to endure, he goes to great lengths to protect his children’s personal information.
What can a parent do to avoid child identity theft?
Protect personal information at home with tools such as a locking mailbox, an in-home safe for storage, and a shredder for the disposal of personal documents.
Install cybersecurity safeguards on-screen media like passcodes and screensavers, firewalls, antivirus and encryption software, and secure passwords.
Educate your children about maintaining privacy and using discretion online. That means cautioning them about disclosing their name, address, school, date of birth, or any other personally identifying information in images (t-shirts with their school logo) or texting or posting. Geotagging on photos and social media should be turned off to hide location.
Setup up filtering and monitoring software and parent protection options like those from our Screen Safety Toolkit to block inappropriate contacts on the Internet and monitor your children’s activities, particularly in chat rooms, social media, texting, and instant messaging.
Teach your children about cybersecurity issues and skills to protect against hacking, phishing, and malware. Good habits include consistently downloading updates for security patches, using strong passwords and changing them often, and not clicking on embedded links or opening attachments from unknown sources.
If you are traveling…
Don’t post pictures that can reveal travel data, like boarding passes, passports, or travel or hotel vouchers. Not only can criminals benefit from knowing the details of your trip, but they may also read personal information from barcodes to steal your identity. The best option, wait until you’re home to post travel photos.
Avoid public WiFi. Hackers can access your private information using a man-in-the-middle attack (MITM). This means the criminal intercepts the link between your device and the server. This breach is like eavesdropping and can result in your private information being accessed and even altered. Malware can even be delivered to your device. A MITM attacker may set up a fake access point named similarly to the public network connection (called an “evil twin”) or engage in “packet sniffing” or “sidejacking,” which means using a tool to capture network traffic at the Ethernet frame level. Simple shoulder surfing at coffee shops or on airplanes can also result in privacy breaches. If you have to use public WiFi, practice situational awareness, and verify the WiFi name with staff at the public site. Avoid online tasks that involve private information like online banking or using private transaction information like date of birth, credit card numbers, tax IDs, or social security numbers. Always log out when using a hotspot to avoid the hacker continuing the session. Consider setting up a secure virtual private network (VPN) to encrypt inbound and outbound data. However, VPNs can decrease your bandwidth. Public WiFi may not be encrypted, but most major websites that use a password, like Amazon and PayPal, have encryption. If the URL has an “S” (for “secure”) at the end, as in HTTPS, then there’s some level of encryption.
Avoid using public computers for the same reasons it’s risky to use public WiFi. The software could be silently running in the background, thus capturing data from your online activities.
If your child is traveling with you, turn off location settings so criminals can’t intercept your location data and use it for targeted attacks. On Snapchat, this is called going “ghost mode.” Of course, if your child is on an independent walkabout, you may want to leave location services on so you can track them for safety.
Freeze your child’s credit.
Contact one of the three major credit card companies to see what kind of protection options they offer, like a credit freeze, which has been demonstrated to be one of the most effective strategies for preventing child identity theft. Each state has laws on how a credit freeze can be done. Remember, once a freeze has been implemented you must order a “thaw” on the account before applying for credit.
Equifax: This website explains what is needed to mail in the request. According to the person I spoke to there is no fee for minors.
Experian: This link explains what is needed to mail in the request. After 3 tries I gave up trying to upload the docs online. I couldn’t reach anybody, so I sent in a check for $10 plus 7.25% tax (Ventura County).
Transunion: I had better luck with Transunion when I called the number 888-909-8872. A polite and helpful representative informed me that neither of my minor children had credit files (a good start). He then offered the procedure necessary to get a free security freeze on my child’s account by mailing a letter with the following information:
Send in 2 pages: 1st page: Cover letter listing the minor info: full name, address, last four of social and file # (rep will give you) plus reason for security freeze (“Proactively protecting my child against fraud) plus requester info (parent): Full name, address, relationship. 2nd page: Official request in letter style format mentioning enclosure copy of minor’s social security card and birth certificate.
GetKidsInternetSafe was created to inform parents about proven preventative strategies before tragedy strikes. To get a head start today, check out my GKIS Connected Family Online Course.
Now is the age your kids are no longer looking to you for online material…they are ready to explore on their own. Don’t think for a second they are incapable of surfing right into trouble. Even if they’re not exploring now, they will soon and you’ll likely be the last to know. Be proactive with your setup rather than reactive. And by the way, if you need to review the GKIS Guidelines for 3-6 year olds, search guidelines on www.GetKidsInternetSafe/blog/. Congratulations for striving to do your best and dealing with this today. Your children’s Internet safety is important and you’re awesome for making it a priority!
GKIS Internet Safety Checklist (Staging)
Check to make sure all cybersecurity measures are online and updated.
At this age, it is reasonable to start a dialogue with your children about technology facts, such as malware, hacking, and phishing. As always, cater the sophistication of the discussion to your children’s developmental phase and interest. Be sure to specifically teach them not to share personal information (name, grade, school, city, etc.) online, nor to open emails with unknown attachments or offers for “free” programs which can make your computer vulnerable to malware.
Malware: any software that will attack or capture data on your computer; these include viruses, worms, Trojan horses (look like beneficial downloads but are actually malicious), spyware, adware, and other malicious programs.
Hacking: unauthorized computer access.
Phishing: a fraudulent attempt, usually through email, to gain personal information. Typically involves posing as a legitimate company or a distressed person in need of help.
Update parental controls on device operating systems, through your Internet service provider (ISP), from selected software programs and routers, and from kid-friendly browsers.
Ensure that you are the administrator on these systems and your children do not have your passwords or credit card information. It is essential that you authorize all system controls and new purchases.
Remember that television is screen media as well. Be sure the parent control features on your televisions block the channels that have mean-spirited, sexual, or violent programming. Co-viewing television and YouTube channels are an excellent way to set a baseline for good taste.
Provide commentary that includes your disapproval of cruel or violent solutions and challenge your children to identify or create prosocial problem-solving alternatives to increase their knowledge and overall resilience.
Update and check your home staging strategies such as screens in visible family areas only (never behind closed doors), timed routers, and family docking stations at night.
Make a list of devices, apps, and games then schedule a weekly check-in to confirm consistent monitoring.
Inform your kids about these checks, even if you don’t tell them the exact dates and times. Maintaining a healthy relationship with trust and respect is critical while you fulfill your parental responsibilities of staying informed.
Do not allow personal ownership of hand-held medias with Internet access smaller than a tablet yet.
Why? Because even if you think you’ll monitor consistently, you probably won’t based on survey statistics. The average age for cell phone ownership is now eight years old; too young in my clinical opinion. But if there’s clear justification for phone ownership that young, at least limit Internet access. Even young children will explore sexual themes and the Internet is not a safe place for sexual education.
Encourage gaming.
Yay! Today you’re the good guy! Video games tend to get a bad rap, but the ones that spur kids to make cities out of virtual blocks, like Minecraft, are great for building spatial and engineering skills, creativity, and online social interaction in a moderated setting. (My kids sometimes play together as cooperative allies and other times sabotaging enemies. It’s really fun to watch them interact and get excited with their creations and accomplishments.)
Make sure you assess game ratings and moderator/reporting features prior to purchase.
If you can’t find your answers online, go to a specialized gaming system store and ask questions.
Remind your children that the first several weeks of game or device ownership are probationary.
In other words, make sure your children understand that if any complications arise, you may choose to temporarily or permanently retire the new item.
Griefing is when a player in a multiplayer video game harasses other players as a gaming strategy. This can take the form of name-calling or actively sabotaging game play (through blocking, destroying or stealing virtual creations and property, or maiming or killing the player for example).Limit whom your children game with and keep checking. At what age are you going to cut them loose to play with the public and under what conditions (headset? text only?)? Hopefully not elementary school age where kids frequently fall victim to cyberbullying.
Trollingis when an individual intentionally provokes discord online by being tangential, argumentative, or inflammatory.
Do not allow Instant Messaging, chat rooms/forums, texting, or emailing with anyone other than adult family members.
Children 7-11 years old simply don’t yet have the complex reasoning abilities necessary to make appropriate choices or anticipate consequences. They’re still impulsive and easily influenced. Don’t overestimate their social reasoning. They still need your supervision and guidance.
Although none of us are perfect parents, our love for and commitment to our children inspire us to constantly grow and be our best. I hope today’s article provides fresh ideas and inspires you to tighten up on the strategies you already have in place. A few minutes of focused effort here and there can really make the difference.
I’m the mom psychologist who will help you GetYourKidsInternetSafe.