Raising Responsible Digital Citizens (Without Pretending We Can Eliminate Technology)

Raising Responsible Digital Citizens (Without Pretending We Can Eliminate Technology)

There isn’t one right way to parent around technology.

Every family brings a different background, comfort level, and set of assumptions. Some parents grew up largely offline. Others — like me — have been online since childhood.

I was programming in BASIC by kindergarten. I spent time on bulletin boards and AOL chat rooms before most adults understood what those spaces were. We were curious, unsupervised in many ways, and unaware of risks that feel obvious now.

And yet, the internet also brought real good into our lives. Many of my friends met their spouses by talking to strangers online — on JDate, on “I Saw You at Sinai,” in spaces that once felt new and risky and are now entirely ordinary.

Technology is not inherently dangerous. It is powerful.

And power requires literacy.

We Don’t Take Away. We Teach.

My philosophy has never been to eliminate technology, but to use it as an opportunity to teach and model usage.

What we did with our oldest isn’t exactly what we are doing with our youngest. We have learned. We have adjusted. And I am not going to prescribe a “right age” for devices — because context matters: maturity, school environment, personality, peer culture, family structure.

What matters more than age is behavior.

And behavior is taught.

It is also modeled.

Phones are not the only issue. Tablets, gaming consoles, school-issued laptops, shared home devices — all of them shape habits. Digital citizenship is not a phone conversation. It’s a household culture.

The Structures We’ve Put in Place

None of these are perfect. All of them evolve. We adjust and re-evaluate constantly. What works for one kid, isn’t going to work for the other. We parent our kids differently on purpose because they all have different needs.

1. Shabbat as a Weekly Digital Detox

For 25 hours, there are no phones, tablets, TVs, or devices.

It’s not framed as deprivation. It’s a rhythm. A reminder that we are capable of being fully present without constant connection.

2. Dinner Is (Mostly) Phone-Free

For the most part, dinner is protected time.

Occasionally my job requires me to step away — when something is happening in the world that cannot wait. But when that happens, I verbalize what I am doing. Transparency matters. Modeling matters.

The goal is focus on one another.

One small practice we’ve adopted is vocalizing intention. If I need to reach for my phone at dinner because something work-related truly cannot wait, I say so. “I’m responding to X. I’ll be right back.” Naming the purpose changes the posture. It turns a reflex into a decision. It also teaches our children that device use should be intentional, not ambient.

3. Screen Time Has Limits — and Context

We limit TV time. We use screen limits. We review them regularly and adjust as needed.

We are more disciplined with our younger children than we were with our older ones. Snow days look different than school days. Family movie night is intentional — right now we’re somewhere between Doctor Who and The Librarians.

Technology isn’t the enemy. Unbounded consumption is.

We’ve learned that not all screen time functions the same way. Some digital activities are inherently open-ended and stimulating, while others are more bounded and task-oriented. Ari’s piece on “Choice and No-Choice Activities” articulates this distinction well — the idea that certain activities require stronger scaffolding because they rely heavily on internal regulation.

4. Before You Press Send

Before sending a message, posting something, or sharing an image, our children are asked one question:

Would you be comfortable showing this to someone you deeply respect?

That framing shifts behavior more effectively than rules.

5. Password Transparency

We keep copies of our children’s passwords.

Not to hover. Not to spy. But to reinforce that digital accounts are not fully private spaces at young ages. There is an understanding that we can check in if needed.

Trust and accountability coexist.

6. Devices and Bedrooms

No devices when changing. We try to limit devices in bedrooms generally, though reading Kindles are allowed.

Phones are docked during homework when possible. And about 30 minutes before bedtime, reminders (thank you, Alexa) prompt phones to be docked for the night.

We’ve also learned that technology can support executive functioning when used intentionally. Tools like voice reminders, shared calendars, and structured prompts can reduce friction and support follow-through. Ari writes Alexa, Help Me With My Executive Functioning.”

7. Active Oversight

Our kids check with us before installing new apps so we can review them. That doesn’t eliminate risk — they can still access sites independently, including on school devices — but it creates conversation.

Some families block websites at the router level. Some carriers, including Verizon, offer family management tools. iPhones have built-in family protections (though approving purchases from a dead iPad can be its own frustration).

Tools help. They don’t replace teaching.

The Incident That Reminded Us Why This Matters

Recently, one of my children came across a site called Human or Not — a game built around interacting with an AI system and guessing whether responses are human.

On its surface, it feels harmless. It’s framed as a puzzle. A curiosity. A way to test perception.

But experiences like this are a useful reminder that many digital spaces — especially those involving AI or anonymous interaction — operate on layers that aren’t visible to the user.

Even when something feels like a game, it may still involve:

  • Data collection

  • Stored conversations

  • Behavioral tracking

  • Unknown audiences

And often, those mechanics are invisible to children.

When a site is accessible — particularly on school-issued devices — it’s easy for young users to assume that access implies safety or endorsement. But accessibility and safety are not the same thing.

Digital literacy has to include understanding the invisible architecture behind the screen. Part of the challenge is that digital access now often outpaces developmental readiness. Ari writes thoughtfully about this tension in “Digital Access Outpaces Childhood Development,” noting that children are navigating environments designed for engagement long before they have the cognitive scaffolding to evaluate risk, permanence, or manipulation.

It must include:

  • Understanding anonymity

  • Recognizing data permanence

  • Questioning who is collecting information

  • Knowing when not to share

  • And perhaps most importantly — knowing how to pause before engaging

The goal isn’t suspicion. It’s awareness.

Because today’s digital environments are layered, dynamic, and often monetized in ways that are not obvious at first glance. Teaching children to navigate them responsibly requires more than installing filters. It requires helping them understand how these systems actually work.

Addictive Patterns Are Not Just a Teen Problem

We cannot talk about digital citizenship without acknowledging that adults struggle too.

Research increasingly links excessive smartphone use to decreased focus and cognitive strain. Many adults express a desire to reduce screen time, yet systems and habits keep pulling us back in.

If we are constantly reaching for our devices, multitasking conversations, or scrolling during downtime, our children notice.

Modeling matters more than enforcement.

What We’re Still Working On

We are working on:

  • Docking phones consistently during homework

  • Strengthening conversations about time spent, not just limits set

  • Revisiting rules as children mature

What worked at 13 does not work at 17. What worked for one child may not work for another.

Parenting in the digital age is iterative.

The Goal

The goal is not to create children who fear technology.

It is to raise young adults who understand:

  • That technology is powerful

  • That attention is limited

  • That privacy is not intuitive

  • That boundaries are learned

Digital citizenship is not about banning devices. It is about forming habits strong enough to carry into independence.

We cannot remove risk entirely.

But we can teach discernment.

And that may be the most durable protection of all.

When Security Depends on a Single Device

When Security Depends on a Single Device

Yesterday was a reminder of how fragile some of our most relied-upon systems actually are.

A service outage meant text messages didn’t reliably come through. In practical terms, two-factor authentication codes never arrived. Accounts couldn’t be accessed. Work stalled — not because credentials were wrong, but because the delivery mechanism failed.

In theory, two-factor authentication increases security. In practice, when it depends on a single device and a single channel, it can introduce a different kind of vulnerability.

I use authenticator apps for many accounts. I also sometimes rely on text-based codes because they are quick and widely supported. But as anyone who uses internet-based phone numbers or travels internationally knows, SMS-based authentication isn’t always dependable — especially when services are disrupted or numbers don’t behave like traditional mobile lines.

What struck me most wasn’t just the inconvenience. It was the way the system forced a context switch.

Regaining access usually requires reaching for a phone, which immediately reintroduces notifications, messages, and ambient noise — even on days when active use is minimal. During yesterday’s outage, that reliance became more apparent. The device was checked repeatedly for codes that never arrived, while its battery continued to drain, highlighting how much background activity persists even without meaningful engagement.

There is growing research showing that mobile phone use fragments attention and increases cognitive load, particularly when interruptions are frequent and unplanned. The cost isn’t just momentary distraction; it’s the gradual erosion of sustained focus over time.

This is the deeper tension I keep coming back to.

We design security systems that assume constant device availability. At the same time, many of us are actively trying to be more intentional about how and when we use those devices — for focus, for presence, and for the ability to stay on task. The result is a system that protects accounts while quietly undermining attention.

This tension becomes even more pronounced for students and young adults.

College students studying abroad often lose access to U.S.-based phone numbers. Text-based authentication fails. Backup methods haven’t been configured. Account recovery becomes complicated precisely when independence is supposed to increase. What feels like a minor oversight at home turns into a significant barrier elsewhere.

At the same time, there is a growing movement toward more mindful and intentional phone use, not through bans, but through structure. Approaches that emphasize boundaries, awareness, and deliberate engagement — rather than constant availability — are increasingly recognized as sustainable ways to reduce habitual distraction. This broader conversation is grounded in data. Surveys indicate that Americans now spend more than five hours per day on their phones, and many express a desire to cut back on usage. Research also suggests that excessive smartphone use can disrupt memory and reduce focus, particularly when use becomes habitual rather than intentional. Among students and young adults, recent evidence links heavy smartphone use to both cognitive and psychosocial effects, underscoring how closely attention, emotional regulation, and technology use are intertwined.

A few years ago, we made a modest household decision: phones don’t belong at the dinner table.

It wasn’t about discipline or nostalgia. It was about protecting a narrow window of shared presence — time that didn’t need to be optimized, documented, or interrupted. That decision has held, even as work has changed. Even in environments that occasionally require rapid response, it’s usually possible to step away briefly. The result isn’t perfection. It’s intention.

When we need to plan — meals, schedules, logistics — we often start with tools that feel almost like we are still in last century: paper, a whiteboard, a pen. These tools do something deceptively powerful. They hold complexity without competing for attention. They allow multiple people to see, contribute, and adjust without pulling anyone into a private digital space. Only later do we translate that thinking into digital systems.

In Jewish tradition, intention matters. Kavanah is not only about what we do, but about how we structure the conditions that make meaningful action possible. Boundaries around time, space, and tools are not limitations; they are enablers. Paper planning at a table is not a rejection of technology. It is a way of saying: this moment deserves a different kind of container.

I’ve been thinking a lot about approaches that don’t involve banning devices, but contextualizing them:

  • Verbalizing intention before picking up a phone (“I’m using this for one task.”)

  • Setting aside regular device-free time — something Jewish life already models well with Shabbat.

  • Using and actually honoring app time limits, especially for platforms designed to pull attention sideways.

From a systems perspective, this matters.

Protective mechanisms are not neutral. They shape behavior. They pull people across devices. They interrupt concentration. And they assume levels of infrastructure stability that don’t always exist, especially across borders, carriers, and time zones.

This isn’t an argument against two-factor authentication. It’s an argument for designing it with redundancy, context, and human behavior in mind — particularly for families and organizations preparing young adults for independence.

That reality became especially clear as our school reminded families that many seniors will be abroad over the next several months. College applications that rely on text-based two-factor authentication tied to U.S. phone numbers can create unexpected barriers, not only to receiving acceptances, but also to accessing critical financial aid and scholarship information at a pivotal moment in the decision-making process.

Security should protect access.

Security should protect access.
Good design should protect attention.

As phones increasingly function as authentication tools, communication devices, and attention hubs, the way we design security systems has consequences well beyond cybersecurity. We don’t need to choose between security and presence — but we do need to acknowledge the tradeoffs when we ignore how systems actually get used.

Amazon | TOP #CYBERMONDAY FINDS

Amazon | TOP #CYBERMONDAY FINDS

Amazon Devices

Household

Clothing, Accessories

Kitchen

Groceries

Beauty & Personal Well-being

Electronics & Software

Amazon | BEST PRICE: H&R Block Tax Software Deluxe + State

Amazon | BEST PRICE: H&R Block Tax Software Deluxe + State

[amazon_link asins=’B07YH24MYL’ template=’ProductAd’ store=’yares-20′ marketplace=’US’ link_id=’5dac70c8-1f03-4f9d-b164-771e8a58c7d6′]

  • Five free federal e-files and unlimited federal preparation and printing with this H&R Block Tax Software Suite
  • One state program download included – a $39.95 value
  • Guidance on maximizing mortgage interest and real estate tax deductions
  • Reporting assistance on income from investments, stock options, home sales, and retirement
  • Quickly import your W-2, 1099, 1098, last year’s personal tax return
  • Free live product help via chat – or get tax help from a tax expert for a fee
  • Help Center has more than 13,000 articles, frequently asked questions, and tips in case you get stuck while preparing your taxes
  • Must allocate all or a portion of Federal refund to Amazon.com Gift Card to receive 4% Refund Bonus
Amazon | BEST PRICE: Laptop Deals

Amazon | BEST PRICE: Laptop Deals

[amazon_link asins=’B077P7D2B2′ template=’ProductAd’ store=’yares-20′ marketplace=’US’ link_id=’27eceaad-f1e6-11e8-baa4-cfbd459f6146′]

2018 HP 15.6″ HD (1366 x 768) Flagship High Performance Laptop PC, Intel 8th Gen Core i5-8250U Quad-Core, 12GB DDR4, 2TB HDD, DVD RW, Windows 1

  • Windows 10 Home, Intel UHD Graphics 620 with up to 6230 MB total graphics memory; 15.6-inch diagonal HD SVA BrightView WLED-backlit (1366×768) display
  • 8th Gen Intel Core i5-8250U Quad-Core processor, 1.60 GHz can up to 3.4GHz, 12GB DDR4 SDRAM, 2TB 5400 RPM SATA hard drive
  • RJ-45, 2 x USB 3.1, 1 x USB 2.0, 1 x HDMI, 1 x Headphone output/Microphone input combo, Integrated 10/100/1000 GbE LAN
  • Bluetooth, Webcam, 802.11ac, Media Reader, HD Audio with stereo speakers, Full-size island-style keyboard with numeric keypad
  • DVD-Writer, 0.94″ Thin, 4.3lbs Weight, Battery: 3-cell lithium-ion, Color: Marine Blue
  • Specs
  • Color: Marine Blue
  • Operating system: Windows 10 Home
  • Display: 15.6-inch diagonal HD SVA BrightView WLED-backlit (1366×768) display
  • Screen Resolution: 1366 x 768
  • Processor: Intel 8th Gen Core i5-8250U Quad-Core processor, 1.60 GHz can up to 3.4GHz
  • Memory: 12GB DDR4 SDRAM
  • Hard drive: 2TB 5400 RPM SATA hard drive
  • Ports: 2 x USB 3.1, 1 x USB 2.0, 1 x HDMI, 1 x Headphone output/Microphone input combo, Integrated 10/100/1000 GbE LAN, RJ-45
  • Video: Intel HD Graphics 620
  • Media Card Reader: yes
  • Optical Drive: DVD+/-RW
  • Wireless connectivity: 802.11ac and Bluetooth
  • Built-in HD webcam with microphone: YES
  • Battery: 3-cell lithium-ion
  • Bluetooth: YES
  • Dimensions(inches): 14.95″ x 9.99″ x 0.94″
  • Weight(pounds): 4.3 pounds

[amazon_link asins=’B075KCJHMD’ template=’ProductAd’ store=’yares-20′ marketplace=’US’ link_id=’0327643d-f1e8-11e8-ac21-bb0bc6641a84′]

Acer Aspire 5, 15.6″ Full HD, 8th Gen Intel Core i5-8250U, GeForce MX150, 8GB DDR4 Memory, 256GB SSD

The new Aspire 5 Series is the perfect laptop for every need. It packs a beautiful 15.6″ Full HD screen, solid performance and the latest WiFi into an attractive design that’s easy to place in a backpack and take to class. This budget friendly laptop has all the essentials you need so you can quickly browse the Web, manage a budget, or catch up on schoolwork.

  • 8th Generation Intel Core i5-8250U Processor (Up to 3.4GHz)
  • 15.6″ Full HD (1920 x 1080) ComfyView widescreen LED-backlit display
  • NVIDIA GeForce MX150 with 2 GB of dedicated GDDR5 VRAM
  • 8GB DDR4 Dual Channel Memory & 256GB SSD
  • 802.11ac WiFi (Dual-Band 2.4GHz and 5GHz)
  • 1 – USB 3.1 Type C Gen 1 port, 1 – USB 3.0 Port & 2 – USB 2.0 ports
  • 1 – HDMI port
  • Backlit Keyboard
  • 4-cell Li-Ion (3220 mAh) Battery, Up to 7 Hours Battery Life
  • Windows 10 Home

[amazon_link asins=’B075KNH1GP’ template=’ProductAd’ store=’yares-20′ marketplace=’US’ link_id=’9c7c966c-f1e7-11e8-8feb-ab7c57546063′]

Dell Inspiron 13 5000 2-in-1 – 13.3″ Touch Display – 8th Gen Intel Core i7-8550U – 8GB Memory – 1TB Hard Drive – Theoretical Gray

The Inspiron 5000 2-in-1s have a sleek new design that emphasizes more screen and less bezel, focusing your attention toward the brilliant wide-angle display. A versatile 360 hinge enables four modes to suit your environment. Use laptop mode for typing out a paper, tent mode for working in shallow footprint spaces like a kitchen counter or workbench, stand mode for streaming your favorite movie or tablet mode for keeping up on social media. Wide-viewing-angle IPS screens provide a clear view in all of these modes. The latest processors from Intel handle today’s software easily and provide zippy, responsive performance. With Windows 10, you’ll experience fast start-ups, a familiar yet expanded Start menu, and great new ways to get stuff done.

  • 8th Generation Intel Core i7-8550U Processor (8MB Cache, up to 4.0 GHz)
  • 8GB 2400MHz DDR4 up to[16GB], (additional memory sold separately)
  • 1TB 5400 RPM [SATA] (HDD), No Optical Drive
  • 13.3-inch FHD (1920 x 1080) IPS True-life LED-Backlit Touch Display with Wide Viewing Angles-IR Camera
  • Be more productive. Windows 10 is the best for bringing ideas forward and getting things done

[amazon_link asins=’B07BXG7725′ template=’ProductAd’ store=’yares-20′ marketplace=’US’ link_id=’857b6a33-f1e6-11e8-bc2c-6d5bbb67b71e’]

Dell Gaming Laptop – 15″ FHD, 8th Gen Intel Core i7-8750H CPU, 16GB RAM, 256GB SSD+1TB HDD, NVIDIA GeForce GTX 1050TI, Windows 10 Home, Black

Dell Gaming

Dell gaming machines are engineered with the specific, demanding needs of the gaming audience in mind. From the latest processor to powerful discrete graphics cards, they make every experience more intense and real.

Graphically superior: Powerful NVIDIA GeForce GTX 1050 Ti with 4GB GDDR5 graphics memory allows you to game at higher settings with crystal-clear detail and smooth, realistic gameplay for a more immersive on-screen experience.

Stunning from every angle: Gameplay appears sharp from virtually every angle on the 15″ screen with a wide-viewing angle with in-plane switching, and an FHD anti-glare display.

Engineered for gaming excellence

More power. Better gameplay: 8th Gen Intel core I7 processor provide responsive, powerful performance whether you’re gaming, streaming videos, or working on CPU-intensive projects.

Stay cool under pressure: Dual fans let you experience uninterrupted gaming while your system stays cool.

Built for speed: 256GB Solid State Drive (Boot) + 1TB 5400RPM Hard Drive storage ensures faster performance and better reliability, and a new Ethernet port supports full 100/1000 Gigabit connections for quick performance.

Improved wireless: With a fast, long-range 802.11ac WiFi, you can take advantage of the superior .11ac routers for a responsive, stable wireless performance.

[amazon_link asins=’B07CTHLX8C’ template=’ProductAd’ store=’yares-20′ marketplace=’US’ link_id=’316608d1-f1e7-11e8-86b3-9930c311f583′]

Acer Predator Helios 300 Gaming Laptop, 15.6″ FHD IPS w/ 144Hz Refresh Rate, Intel 6-Core i7-8750H, Overclockable GeForce GTX 1060 6GB, 16GB DDR4, 256GB NVMe SSD

  • Offer valid for purchases ONLY shipped and sold by Amazon.com: Receive Activision Call of Duty: Black Ops 4 with Purchase – Valid 10/21/18–04/31/19 or while supplies last. An email with the code and redemption instructions will be emailed 5 to 8 days after purchase.
  • 8th Generation Intel Core i7-8750H 6-Core Processor (Up to 4.1GHz) with Windows 10 Home 64 Bit
  • NVIDIA GeForce GTX 1060 Overclockable Graphics with 6 GB of dedicated GDDR5 VRAM
  • 15.6″ Full HD (1920 x 1080) widescreen LED-backlit IPS display (144Hz Refresh Rate, 300nit Brightness & 72% NTSC )
  • 16GB DDR4 2666MHz DRAM Memory & 256GB PCIe NVMe SSD | Extra empty accessible slot for 2.5 inch hard drive or SSD
  • Gigabit Wi-Fi |Backlit Keyboard | USB 3.1 (Type C) | Dual All-Metal AeroBlade 3D Fan Cooling | Metal Chassis
  • PredatorSense gaming control panel, providing customization and control of gaming features, including system temperature, CPU fan speed and system fan speed.
  • Up to 7-hours of battery life