Internet and Cellular Phone Usage - Safety Concerns for Parents

Twenty-first century technology, such as immediate Internet access to virtually any kind of information, and instant communication via cellular phones has improved our economy and the American lifestyle.

Most uses of the Internet and social networking sites provide a positive atmosphere in which people can make new friends and have fun. However, with each beneficial aspect of these technologies comes the greater risk that criminal predators can take advantage of our children.

Parents have the right, and the responsibility to monitor their children’s Internet and cellular phone activities.

The two most common incidents reported to police are:

1) Children that have been victimized by sexual predators

2) Bad behavior of teenagers harassing others through text-messaging, and verbal threats of harm. (Often these incidents become criminal charges.)

Internet Concerns It is highly recommended that parents discuss proper use of Internet technologies, impressing upon their children the dangers involved in using websites such as Myspace or Facebook (or any similar social networking site).

Intended to be sites where teenagers and young adults can communicate with their friends, often the content and conduct through these sites can cause great concern for their safety.

It is suggested that if parents allow their children to create a Myspace or other account, that the parents have full access to monitor the content and conduct within that account.

  • Review the child’s profiles and sites regularly. Teenagers especially hate it when parents invade their ‘privacy’. Many heated arguments result from teen angst and ‘trust’ issues involving parental involvement in their personal lives.
  • It is a parent’s duty to watch over and protect their children – sometimes that means being the parent, and not necessarily the child’s best friend.
  • The parent may be the last, or the only barrier that stops a child from being victimized by a sexual predator.
  • Sometimes teens have accessed and created web communication accounts using a computer not available to the parent.


Most schools prohibit use of its computers for Internet communication, blocking students from accessing those kinds of websites. However, children often access these sites from a friend’s home, or at the local library.

The child may be naïvely continuing contact with someone intent on sexually abusing him/her at a later date. Most incidents of non-family related sexual abuse is by a sexual predator that spends an enormous amount of time (weeks, months or even years) grooming a child for future sexual abuse.

The abuser befriends the child, and earns that child’s trust over an extended time period. This is easily accomplished through Internet social networking contact, while parents have absolutely no idea the child is in danger. Maintain an open dialog with your children. Ask what they know about the dangers of communicating on social networking sites.  Ask for examples or specific details to ensure your children fully understand the risks.

Some questions you may wish to discuss are:

 

  • Predators - Myspace, Facebook, and similar social networking sites are also used by criminals ready to prey on naïve and incorrigible children, teens and young adults. Teens post a lot of personal information about themselves. Teens post details like date of birth, hair color and style, favorite hobbies or after-school activities, where they attend school, names of their best friends, etc. The teens usually also post photos of themselves on these sites.

    This information makes it frighteningly easy for a predator to locate and begin contact with the teen. Talk about what kinds of contacts on the Internet are unsuitable.

    People your child meets online could be lying about their age. Sometimes the user is truthful about his age, and the contact might begin innocently enough, but how safe is it for a 12-year-old daughter to be having conversations with an 18 or 19-year-old male? Children (including teens) are often too young to make informed decisions – the parents are the appropriate buffer of protection the child needs.
     

  • Written Content. Information on social networking websites are not censored for language or subject matter. The content often contains talk about drinking alcohol and using illegal drugs. It might use sexual overtones, use dark undertones related to suicidal thoughts or suggest violent deeds.
     
  • Photo Images. Some of the images posted on this type of website are sexually suggestive. Often these images are graphic enough to disturb some viewers, and sometimes enter the realm of criminal activity, such as child pornography, endangering the welfare of a minor, or encouraging the sexual abuse of a minor. Also seen on some sites are horrid photos of animal abuse or other violent behavior.

Bad Behavior.  Sometimes the problem isn’t caused by other people – it might be your child making the poor choice. Out of anger, a child might make threats of harm toward another individual. Perhaps in a fit of teen hormone-induced frustration the child writes threats to burn down an adversary’s house, or threaten to shoot someone.

Once the ‘enter’ or ‘send’ button has been pushed, there is no way to ‘take back’ what was said or implied.
Police take threats of harm seriously. Depending on the circumstances surrounding the incident, criminal charges could result. Regulations set by Myspace.com and other social networking websites specify in their terms and service agreements that persons under a certain age should not be creating a profile or accessing the site.

When illegal activities or criminally improper profiles are found to be in violation of the service agreement, the social networking site will terminate service of that profile. However, monitoring of every profile would be next to impossible. It is the responsibility of the parent or guardian to monitor the child’s access to the Internet.

  • Who are the friends accessing the site?
  • What comments are these friends posting?
  • Are the topics of discussion among the friends appropriate?

    The parent or guardian has the option of parental control of their children’s use of the Internet through businesses advertising ‘spy ware’.


Computer programs are available that allow parents to enter their child’s profile without the child’s knowledge.
This is a decision only the parent or guardian can evaluate and make.

There may be a high level of concern for those parents whose children fit one or more of the following situations:

1. The child will not allow them to see his/her Internet profile

2. The child hides the fact he/she has an Internet profile

3. The child has past incidents involving dishonesty
( i.e. he/she allows parent to see a profile, but fails to notify parent of other existing profiles)

4. The teen has a history of, or is suspected of making poor choices, such as drug use, involvement in gang activity, underage drinking, failing grades in school, unexcused absences, or skipping of school classes

5. The teen is currently on probation with the Juvenile Department for having committed criminal activity

6. The teen refuses to allow parents to meet his/her friends, or have contact with the parents of said friends.

The Internet and How It Relates to Employment and College Opportunities:

  • This is an important topic rarely thought about or discussed.
  • What profile name does your teen use on social networking sites?
  • What e-mail name does your teen use? Names like hottie123, daddyslittlegirl, almostlegal17, stoner21, and anarchydude might seem like harmless fun.

Aside from the previously discussed risk from Internet predators, prospective employers and those evaluating a student’s worth for college admittance might not be impressed. Employers and colleges seek mature individuals who can properly represent their organization.

In evaluating a person’s readiness to enter the professional world, many businesses and schools check what kind of Internet social sites a person visits, the content of blog conversations, and with whom that person associates.

Whether or not it seems fair, employers evaluate an applicant’s public image and previous behavior.

Discuss this topic with your children:

  • How appropriate is the teen’s email address name, Myspace, Facebook, or other social networking name?
  • Is there anything about the name that could lead to present or future embarrassment?

What would an employer think?

Cellular Telephone Usage and Text-Messaging Features: In this current technological age, teenagers (and some younger children) enjoy the luxury of having their own cellular phones. Parents often justify providing their children with cellular phones as a safety tool, allowing the parent to ‘locate’ or contact the kids in case of an emergency. Cellular phones are certainly a convenient and beneficial tool.

However, this device is often misused and, under certain circumstances, the abuse must be investigated by police. Just like the safety concerns related to Internet use by children, cellular phone usage should also be frequently monitored by parents.

Sometimes related to previous Internet social networking sites, the child may be continuing contact with someone intent upon sexually abusing him/her at a later date.


Most incidents of non-family related sexual abuse is by a ‘friend’ that spends an enormous amount of time (weeks, months or even years) grooming a child for future sexual abuse.

  • The abuser befriends the child, earning that child’s trust over an extended time period.
    • This is easily accomplished through cellular phone contact, while parents have absolutely no idea the child is in danger.
    • Discuss with your children the acceptable use of cellular phones and text-messaging features.
    • Leaving threatening text-messages, or continuously calling a specific number as a form of harassment can lead to criminal charges.
       
  • Many abuses surround school-related gossip, harassment, and bullying behavior.
    • Not only can inappropriate use of a cellular phone be reason for school suspension or expulsion, in certain circumstances threatening text-messages, sharing of sexually explicit digital images, or those containing evidence of a crime may be grounds for a criminal investigation and subsequent arrest.


Maintain an open dialog with your children, and monitor the use of their cell phones. Positive parental involvement can prevent their children from being victims of crime.