Why Teens and Families

modern-family-tech-useMore and more Teens and their families are subject to Hackers as well as Cyber Bullying and the pressure to youths to Sexting. It is important that youths discover the ramifications of these actions as well as parents thwarting their efforts.

Children and Youth do not have the capacity because their brains are underdeveloped to understand how their actions infringe on their future; how their physiology propels their behavior and how their footprint lasts forever online.

Understanding all of this is imperative as legislation, laws and law enforcement have not caught up with the advances in technology. In addition, most parents do not keep up with the technology as fast as their children. Sometimes, it is too late when law enforcement comes to the door.

As technology has become more and more accessible a) to younger and younger audiences, b) with parents unable to keep up with and knowing less than their children to intervene, c) with the rise of autistic youths having access to technology as a tool for socialization and communication, more and more youths are subjected to unimaginable images and introductions to innocent choices that their brains, maturity and sense of belonging drive them to choose. The seeming anonymity, lack of oversight by authority figures such as parents and law enforcement, the lack of face-to-face perceptions and perspectives of human interaction is absent online and emboldens those who have anti-social, mentally ill tendencies. The very characteristics that hold us together as a civilization are used by hackers, insider threats, bullies and the most psychopathic individuals in society to hide in the ethers.
There are many psychological and anthropological studies from the decades of research that describe how these behaviors and tendencies emerge, become engrained and become part of the collective character among youths alone and in groups both as victims and predators.

Prevention strategies are imperative in this day and age. We might suggest a reading to start:

The Cyber Effect by Mary Aiken, PhD.