Internet safety presentation 2012


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Read slide
  • to understand this complex issue, it is important to start with perspective. Brief uses by adults
  • Brief uses by students
  • Points: cell phone is highest, and many have data plans the uses lists are almost all related to communication/social this survey was done before the release of tablets (ipad, kindle, nook…)
  • An article on Cnet stated it very concisely, the tope 5 dangers for kids….
  • Unfortunately the exposure to sexual and pornographic materials have become more of a problem as internet access becomes easierHarassment via digital devices has also increased
  • A video I saw was about a HS boy adding a ‘female’ ‘friend’ to his fb…. This person scowered his account to find out all he could about him, convinced him to do a video chat, took images, and then tried to blackmail the boy when the ‘female friend’ who was actually an older man, was threatened to be exposed because he was reported.
  • Cyber predators are skilled at getting what they want. The process they use is called grooming. They gain trust, make the child open up, then try and control them by fear.
  • What do we tell our kids to do?
  • Internet safety presentation 2012

    1. 1.  Welcome Internet Landscape Dangers on the Internet  Internet Predators  Personal profiles  Internet Chat  Gaming  Cyberbullying Cell phones Plagiarism & Intellectual Property Malicious Codes, Viruses, and Spyware Parent Tips and resources Q&A
    2. 2. ―everything that‘s already in the world whenyou‘re born is just normal;anything that gets invented between then andbefore you turn thirty is incredibly exciting andcreative and with any luck you can make acareer out of it;anything that gets invented after you‘re thirty isagainst the natural order of things and thebeginning of the end of civilization as we know ituntil it‘s been around for about ten years when itgradually turns out to be alright really.‖
    3. 3. The Internet has dramatically changed our world and is a part of our everyday livesADULTS’ VIEW Communication – email, texting Shopping and services (booking travel) Financial management News and product research Entertainment – videos, music, games
    4. 4. The Internet has dramatically changed our world and is a part of our everyday livesSTUDENTS’ VIEW Communication – texting, instant messaging, email Entertainment – games, music, videos Research – homework, study sites
    5. 5. 1. Predators--social networking sites, chat rooms2. Data theft--stolen passwords, addresses, Social Security numbers, credit card numbers, and other financial information3. Malicious software (also known as malware)-- adware, spyware, viruses, phishing scams4. Inappropriate content--pornography, content focused on violence, hate propaganda5. Cyberbullying--bullying peers via instant messages, social networking sites, online games
    6. 6.  Educate parents Educate students
    7. 7.  Youth internet safety survey, ages 10-17 YISS-1 (2000) YISS-2 (2005) ChangeSexual solicitation 19% 13% -6%Unwanted exposure 25% 34% +9%to sexual materialsHarassment 6% 9% +3%
    8. 8.  ―Google‖ yourself › Type in first and last name, email addresses, screen names, addresses, phone numbers › search for images as well
    9. 9.  Facebook ,Myspace › Age requirements  “No information from children under age 13.” › Public vs Private › Know who you add: friends vs cyberfriends › Have access to your child‘s site › Be conscientious of pictures/videos  Protecting reputations online, in plain English (
    10. 10.  Make sure that your child takes advantage of the privacy settings on social networking sites. Pre-approve the pictures and videos your child posts online. Remind your child never to post e-mail addresses or cell phone numbers. Tell your child that passwords should only be shared with parents and guardians. Teach your child not to respond to any e-mails requesting personal information and to delete e-mails from unknown senders. Discuss how to keep screen names and e-mail addresses gender-neutral, appropriate, and free of any information that could reveal identity. Encourage your child to tell you right away if anything happens online that bothers or frightens him or her.  Information from Netsmartz Kids:
    11. 11.  Text messaging Chat rooms Instant messaging (‗IMing‘) Online gaming – gaming devices Message boards Blogs and wikis
    12. 12. LOL POS BRB ASL SMS (short message service) aka texting Wikipedia and list of internet slang › et_slang ›
    13. 13.  Online: Webkinz, Neopets, Miniclip, Gaming systems: PSP, Xbox Live, PS3, Wii Handheld devices: Ipod touch, Ipad, cell phones
    14. 14.  Know which safety features are available on the gaming equipment that your child uses—a headset may have voice- masking features, for example. Keep gaming consoles in an easy-to-supervise location and be aware of other places where your child may be accessing games. Tell your child never to give out personal information while gaming or agree to meet anyone outside of the game. Teach your child not to respond to anyone who is being rude or bullying while playing the game. Set rules for how long your child may play, what types of games are appropriate, and who else may participate. Have your child check with you before using a credit or debit card online. Check to see if the games your child plays have reporting features or moderators.  Information from Netsmartz Kids:
    15. 15.  Cyberbullying is emerging as one of the more challenging issues facing educators and parents as young people embrace the Internet and other mobile communication technologies.
    16. 16.  Outing and Trickery – Sharing someone‘s secrets or embarrassing information or images online Exclusion – Intentionally keeping someone from being able to take part in an online group, such as a ―buddy list.‖ Cyberstalking – Repeatedly sending unwanted messages that may include threats of harm; intimidating
    17. 17.  Flaming – Online ―fights‖ using electronic messages with inappropriate language Harassment – Repeatedly sending offensive, rude, and insulting messages Denigration – Sending or posting gossip or rumors about a person Impersonation – Posing to be someone else and making them look bad
    18. 18.  Tell your child not to respond to rude e-mails, messages, and comments. Save the evidence, such as e-mail and text messages, and take screenshots of comments and images. Also, take note of the date and time when the harassment occurs. Contact your Internet service provider (ISP) or cell phone provider. Ask the website administrator or ISP to remove any Web page created to hurt your child. If harassment is via e-mail, social networking sites, IM, and chat rooms, instruct your child to ―block‖ bullies or delete your child‘s current account and open a new one. Check out phone features that may allow the number to be blocked. Make a report to, and if you feel something illegal has occurred, inform law enforcement  Information from Netsmartz Kids:
    19. 19.  About 75% of teens (12-17) carry cell phones 1 in 3 teens (13-19) use their cell phone to surf the web  Results from Teens and Mobile phones, Pew Internet and Americnl Life Project, 2010  A Generation Unplugged, Harris Interactive, 2008
    20. 20.  Review cell phone records for any unknown numbers and late night phone calls and texts. Remind your child that texting is viral—anything sent in a text can be easily forwarded and shared. Teach your child never to reveal cell phone numbers or passwords online. Talk to your child about the possible consequences of sending sexually explicit or provocative images or text messages. When shopping for a cell phone for your child, research the security settings that are available.  From Netsmartz Kids :
    21. 21.  At+T › Phones and internet: mct/smct_is Verizon › /uc/uc_overview.jsp Sprint › y.html
    22. 22.  Music Downloads › Napster › Itunes › Kazaa › WinMX › Limewire › etorrent Copyright Material Identity Theft Website Validity
    23. 23.  Computer system › Keeping bad stuff (predatory software) out – keeping valuables(personal information) in Malicious codes: viruses, worms, trojan Parasitical malware: spyware, adware article: FBI: Disinfect Your Computer Or Risk Losing Internet Access Come July (DNS Changer – 2007) ›
    24. 24. Anti spyware and adware programs (Spybot S &D) (lavasoft product)
    25. 25.  Guard your identity › Make username generic and anonymous › Little information is needed to get to know you Monitor your child‘s computer use Use favorites Understand the services your child uses Know usernames, passwords, and e-mail
    26. 26.  Know child‘s ―online friends‖ Don‘t overreact to anything your child tells you (fear you will take computer away) Never meet anyone met online Keep your computer up-to-date › › Virus protection › Firewall
    27. 27.  /safesurfing/
    28. 28.  ault.aspx /pguidee.htm
    29. 29.  Bullying, Beyond the Schoolyard, by Hinduja and Patchin 6721368-1.html Top 5 Dangers article 6721401-1.html?tag=lwt;lcol Think Before You Click Worksheet
    30. 30. Thank you for your attendance at today‘s presentation!Make sure you have signed in before you leave We hope you found it useful.