What are the goals of social media companies?
Increasing engagement, growing the number of users, and tailoring advertisements.
What are some examples of information you should keep private?
Many correct answers!
Your full name, passwords, current location, home or school address, social Security number/id number/bank info, names of family members
I can post anything I want because it can easily be deleted later.
FALSE! Cookies (trackers), caches (extra memory storage), and the ability to screenshot means that many posts cannot be deleted entirely. Posts can also remain on the profiles of individuals who are tagged or comment on them.
What are some general tips to keep in mind before posting?
Many correct answers! Keep it positive, be yourself, DON'T post anything you'd be embarrassed about or provide identifying information.
Is it hard to fake an online profile?
NO! Individuals on the internet can pass themselves off as a different age or gender, fake their location, pretend that they share common interests or traits...etc. It is also relatively easy to remain anonymous.
How do social media companies make money?
Getting users to view advertisements and selling user information.
How can you make a strong password?
The more characters, the better.
A mixture of both uppercase and lowercase letters.
A mixture of letters and numbers.
Inclusion of at least one special character, e.g., ! @ # ? ]
Cyberbullying is wrong but not illegal.
FALSE! Cyberbullying is unlawful in California. Prosecutors may bring criminal charges for either posting personal information to cause fear or using electronic devices to harass others.
"Bullying" - conduct that leads to fear of harm to person/property/ physical or mental health OR substantial interference with academic performance/ ability to access school services or activities.
Will potential colleges and/or employers care what I post?
Yes! One 2020 survey found that 36% of admissions officers polled visit applicants' social media profiles. Another study found that 67% of employers screen job candidates through social networks.
What are some signs that a profile is fake?
Many correct answers!
The use of certain key words, posts or messages that don't make sense, few photos, empty profiles or networks, and/or claiming to be someone famous.
**These keywords found in the majority of fake online profiles include the words Catholic, widowed, female, Ph.D., Nigeria, engineer, self-employed, and Royalty.
Is social media designed to be addictive?
Yes! Social media is meant to use our attention, get us to keep clicking, and then intermittently rewards us for doing so.
"Much of what we do online releases dopamine into the brain's pleasure centers, resulting in obsessive pleasure-seeking behavior. "
-Bill Davidow (The Atlantic)
How can you recognize fake emails attempting to steal your information (phishing)?
Generic domain name ("@gmail.com"), misspelled domain ("@microsft.com"), poor grammar or spelling, suspicious links or attachment, and/or tells you it is urgent.
More time spent on social media is related to increased risk for depression and sleep issues.
True!
Should you be able to post anything you want about your group on a public profile?
AVOID DRAMA by checking in before posting about others. Be clear that you’ll delete any posts or pictures that are inappropriate or make others uncomfortable.
How can you respond if a stranger asks for information that you don't want to give?
Tell someone you trust, change the subject, reframe the question be vague, excuse yourself, be straightforward and tell them you're uncomfortable, ask a different question back and/or create a distraction.
What is the neurotransmitter that gets released when we spend time on social media?
Dopamine
What is identity theft?
Someone using another's identifying information (name, ID, or credit card number) without their permission to commit fraud or other crimes.
I can send a private picture of myself with someone and not get into legal trouble.
False. According to Nebraska laws, it is unlawful to: Knowingly make, publish, direct, create, provide, or in any manner generate an image of a minor engaged in sexual conduct. It is also illegal to share or transmit them.
Have you ever posted something you regretted?
Many correct answers.
What are some steps you should take when planning an in-person meeting with online friends?
Make sure to double check with a trusted adult first, do further research into the individual's online presence, meet somewhere public, and have someone you know nearby as well as your own transport. Always make sure someone knows where you are---be truthful!
DON'T leave food or drinks unattended or provide personal information too soon.
How can you take control of time spent on social media?
Many correct answers!
Keep track of screen time, use a site-blocking app, set goals for time spent on social media, set designated "no screen" time, and block unhelpful people or content.
How can you avoid identity theft?
Set up alerts on your accounts to monitor for unusual activity,
only use secure websites for online shopping,
never transmit sensitive data over a public Wi-Fi network,
use complex passwords/two-step authentication,
store sensitive information like bank statements and your Social Security card in a secure location.
Social media sites collect very little personal information.
FALSE! A study by pCloud found that these sites collect a variety of information including purchases, location, contact information, contacts, browsing history, identifiers, usage data, financial information, and health/fitness information.
What are some ways you can clean your digital footprint?
(1) Review your accounts and profiles.
(2) Delete and deactivate: Delete overly personal information as well as any inappropriate material and deactivate old accounts.
(3) Manage your privacy settings.
(4) Google your name to see what still comes up once you've finished!
What should you do if you or someone you know is being victimized online?
You can discuss the situation with a trusted adult, report the individual to the police and/or contact the National Center for Missing and Exploited Children's CyberTipline.