Net safety presentation


Published on

How to stay safe online

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • [ Introduction: who you are, where you’re from .] Today I’d like to talk about some things we can do to help keep kids safer online. I’m highlighting suggestions from this publication, Net Cetera, which we have available for you today. Let’s start with a few questions: How many of you have school-aged kids? Or know a kid? What ages? Do they spend time online or on a cell phone? [NOTE TO PRESENTER : This is intended to be a 10-minute presentation if you use just the basic slides. You can lengthen it by adding discussion of any of the specific topics included under ADDITIONAL SLIDES.]
  • Most of us – and probably most kids – do all kinds of things online. We may socialize via email, IM, phone over web, or social networks Many of us post and share pictures and videos We may have profiles on social networks, sharing information with friends and Sometimes we create avatars to represent us in online spaces.
  • These activities come with some risks: Inappropriate Conduct : it’s anonymous online, and people – especially kids – can forget that their online actions can have real-world consequences. Inappropriate Contact : there are people online who have bad intentions – including bullies, predators, hackers, and scammers. Inappropriate Content : you may worry about what younger kids may run across – or what older kids might seek out.
  • By the time kids are teenagers, many are ready for more independence from their parents. They’re starting to form their own values and reflecting those of their friends. But that doesn’t mean there’s no point in talking with them. Teens have access to the internet through their mobile devices, phones, their computers and their friends computers, so it’s really hard to watch what they do. It doesn’t hurt to reinforce ‘good citizenship’ messages with teens, along with three important messages that many need to hear: Not all information is credible: just because it’s posted, doesn’t mean it’s so. Once they post something, there’s no taking it back. It’s out there in the world. No matter how impersonal it seems, screen names, profiles and avatars belong to people with real feelings. Treat them the way you’d like to be treated.
  • Adults often see socializing online and offline as separate activities, each with its own rules. Kids see it all as socializing, whether it’s online or off – and it’s good to talk with them about how they act online. Even the most tech-savvy kids can use some reminders about their online behavior: What they do online can have real-world consequences – the words they use and what they post can have a big impact on others, and on themselves. Remind kids that, once they post something, they can’t take it back. It’s a message that’s worth repeating, especially since the colleges and jobs kids may eventually want to get into will be checking their social networking profiles. While most kids are good at just deleting things they think are annoying or creepy, tell kids to trust their gut if they’re suspicious about anything – and to tell you about it. You can help them report it to the police and the social networking site. It’s a good idea to remind kids to keep personal information private. Kids should avoid posting things like where they go to school, their address or phone number.
  • If your child has a problem with a bully, tell him or her not to react. Bullies are looking for a response, so don’t give them one. Encourage your kid to talk with you about what’s going on, and to help you save the evidence. If the bullying keeps up, share the record with the school or the police. If you ever fear for your child’s safety, immediately contact the police. Block the bully online: remove him or her from “friend” or “buddy” lists, and block the email address. If your child’s social networking profile has been changed or created without his permission, get in touch with the company that runs the site to have it taken down. Tell your kid that she can help stop cyberbullying by telling the bully to stop, and by not passing on mean messages.
  • [NOTE TO PRESENTER : The first section is a basic presentation lasting about 10-15 minutes. If you’d like to add any of these topics, simply copy these slides before Slide #9. We suggest you still finish with Slides # 10-11.]
  • Net safety presentation

    1. 1. Net CeteraNet CeteraChatting with Teens AboutBeing Online
    2. 2. What We Do OnlineWhat We Do OnlineSocializeShare pictures and videosBuild online profilesCreate avatars
    3. 3. Online RisksOnline RisksInappropriate ConductInappropriate ContactInappropriate Content
    4. 4. What is Cyberbullying?What is Cyberbullying?Cyberbullying is the use of technology to harass,threaten, embarrass or target another person.
    5. 5. Broken FriendshipBroken Friendship
    6. 6. CyberbullyingCyberbullying
    7. 7. CyberbullyingCyberbullying
    8. 8. R.I.P.R.I.P.
    9. 9. Guidance at Different AgesGuidance at Different AgesTeens Independent, with mobile access Important messages:• Information credibility• Once it’s posted, you can’t take it back• Treat people the way you’d like to be treated
    10. 10. You can’t take it backYou can’t take it back
    11. 11. You can’t take it backYou can’t take it backWhat should he have done when asked to ratethe website?
    12. 12. Think before you post.Think before you post.
    13. 13. PredatorPredatorAlthough children are far more likely to comeacross sexually oriented content online than toencounter an online predator, the tragedy thatcan result from having a child cross paths with apredator makes it imperative that a parentunderstand this issue.
    14. 14. Tracking TeresaTracking Teresa
    15. 15. PredatorPredatorIn the physical world, a predator or child molesteris usually someone a parent or child knows—someone who might even be trusted by thefamily. Online, however, it can be a differentstory. Predators can use the Internet to seek outchildren they don’t know.
    16. 16. Online PredatorsOnline Predators
    17. 17. PredatorPredatorModus OperandiYoung teens have a real desire to be free of theirparents’ authority and to gain acceptance asgrown-ups. But teens are also naïve andinexperienced, especially in dealing with adultswho have ulterior motives. Sexual predators takeadvantage of these qualities. They manipulatekids in an effort to gain trust, which they use togradually turn seemingly innocent onlinerelationships into real-life sexual interactions.
    18. 18. Texas teen killed before she could testify,family friend says
    19. 19. Killer used Facebook to lure teen girl, NonaKiller used Facebook to lure teen girl, NonaBelomesoff, to her deathBelomesoff, to her deathBy Michael Sheridan / DAILYBy Michael Sheridan / DAILYNEWS STAFF WRITERNEWS STAFF WRITERMonday, May 17, 2010, 10:14Monday, May 17, 2010, 10:14AMAMRead more:Read more:
    20. 20. Read more: more: who raped girl they met onTeenagers who raped girl they met onFacebook jailed for six yearsFacebook jailed for six yearsTeenagers who raped a girl theymet on Facebook have beenlocked up for six years.John-Claude Rugero, 19, andPrince Afriyie, 17, were foundguilty of raping the a 17-year-oldon a roundabout in Colchester,Essex.The girl, who cannot be named,told jurors how she first chatted tothe defendants on socialnetworking sites Facebook andBebo, two years before she wasraped on August 12 last year.
    21. 21. Survivor diariesSurvivor diaries
    22. 22. Brainstorming Activity (CyberbullyingBrainstorming Activity (CyberbullyingThink of a situation that may have placed you oranother in a uncomfortable position. (Bullying,Harassment, Stalking, Text messaging, TwitterToo much information, etc.) How did you handleit and what would you have done differently afterwatching some of the PowerPoint?
    23. 23. GroomingGroomingGroomingrefers to actions deliberately undertaken with theaim of befriending and establishing an emotionalconnection with a child or teen, in order to lowertheir inhibitions in preparation for sexual activitywith the child/teen, or exploitation; such as childpornography and/or prostitution.
    24. 24. Amy’s choiceAmy’s choice
    25. 25. Julie’s journeyJulie’s journey
    26. 26. Predator/GroomingPredator/GroomingA predator usually approaches a child targetthrough initially harmless chat room or instant-message dialogue. Over time—perhaps weeks oreven months—the stranger, having obtained asmuch personal information as possible, groomsthe child, gaining his or her trust throughcompliments, positive statements, and otherforms of flattery to build an emotional bond.
    27. 27. Be careful what you shareBe careful what you share
    28. 28. Revealing too much informationRevealing too much informationAccording to MSNBC, police in Connecticutarrested a 21-year-old man, accusing him ofraping a 14-year-old girl he found on MySpace.On Long Island, New york investigators sayanother man found the work address of a 16-year-old girl on one of the Web sites last fall, lured herto a parking lot, and sexually assaulted her afterhe found her information online.
    29. 29. Too much informationToo much information
    30. 30. TMITMISometimes posting information on the internet,even though it may seem safe, can be risky. Youmight be giving out a bit more information thenyou know.Certain statuses may seem casual, but giving outinformation about where you are, what you’redoing and when you won’t be home couldpotentially put you into dangerous situations.
    31. 31. SextingSextingSexting is the act of sending sexually explicitmessages or photographs, primarily betweenmobile phones.News reports are increasingly documenting legalrepercussions after indecent photo appear online. Andattorneys say there are many unanswered questions aboutwhether young people who send their own photos couldface prosecution for obscenity or child pornography.This year in Wisconsin, a 17-year-old was charged withpossessing child pornography after he posted nakedpictures of his 16-year-old ex-girlfriend online.
    32. 32. SextingSextingA third of teen boys and 40% of young men saytheyve seen nude or semi-nude images sent tosomeone else; about a quarter of teen girls andyoung adult women have.And 39% of teens and 59% of those ages 20-26say theyve sent suggestive text messages. Mostof those surveyed (73%) said they knew sendingsexually suggestive content "can have seriousnegative consequences," yet 22% said its "no bigdeal."
    33. 33. Catholic High School Football Star Expelled, Loses Scholarship OverCatholic High School Football Star Expelled, Loses Scholarship OverRacist, Sexual TweetsRacist, Sexual TweetsEarly last week, the Supreme Court decided not to hear cases pertainingto student punishment regarding their free speech rights on social mediasites off campus. A day after this decision, a highly recruited New Jerseyhigh school football star with a scholarship offer from the University ofMichigan was expelled from his private school over what officialsconsidered highly offensive reported that Yuri Wright, a senior from Bosco Prep HighSchool in Ramsey, N.J., who was sought after by all major collegefootball conferences,
    34. 34. Catholic High School Football Star Expelled, Loses ScholarshipCatholic High School Football Star Expelled, Loses ScholarshipOver Racist, Sexual TweetsOver Racist, Sexual Tweetswas expelled and his scholarship offer from U of M withdrawn oversexually explicit and racially charged tweets:“He was expelled from the school for the things he had written on Twitter,”[coach Greg] Toal told “It was pretty simplereally, what he wrote were some graphic sex things. This is a Catholicschool, things like that cannot happen. It was totally inappropriate.”The reason, his coach said, was because of a series of tweets that beganlast July. Among the schools he is considering are Michigan, Rutgers,Notre Dame and Colorado. A number of outlets reported that Michiganhas stopped recruiting him.The cornerback was warned by school officials for months, according, to stop using the micro-blogging site because he couldn’tcurb his language, but failed to comply at the time. His Twitter handle(@YuriWright3) no longer exists now.Here are some of Wright’s “cleaner” tweets:
    35. 35. Catholic High School Football Star Expelled, Loses ScholarshipCatholic High School Football Star Expelled, Loses ScholarshipOver Racist, Sexual TweetsOver Racist, Sexual Tweets
    36. 36. Offline consequencesOffline consequences
    37. 37. What is CyberstalkingWhat is CyberstalkingCyberstalking can be defined as threateningbehavior or unwanted advances directed atanother using the Internet and other forms ofonline and computer communications.
    38. 38. Man Convicted of Cyber StalkingMan Convicted of Cyber Stalking
    39. 39. CyberstalkingCyberstalkingI Dare You
    40. 40. Kirsten PrattKirsten PrattAnswer all questions in paragraph form.What happened to Kristen Pratt?How did her stalker meet her?What happened to the stalker?How has Kristen been affected by this crime?What advice does Kristen Pratt gives to stalkingvictims?What happened in the lollipop ad?How can one avoid being a victim of a stalker?
    41. 41. CyberstalkingCyberstalkingSimilar to stalking off-line, online stalking can be aterrifying experience for victims, placing them atrisk of psychological trauma, and possiblephysical harm. Many cyberstalking situations doevolve into off-line stalking, and a victim mayexperience abusive and excessive phone calls,vandalism, threatening or obscene mail,trespassing, and physical assault.
    42. 42. Socializing OnlineSocializing OnlineSocializing is socializing – online or offReminders: Online actions have off line, real-world consequences Careful when posting – you can’t take it back Trust your gut if you feel they’re suspicious, you mightbe right It is imperative to know what info should stay private
    43. 43. CyberbullyingCyberbullyingIf you have a problem with a bully,don’t react to the bully Encourage your kid to talk with you about what’s up Save the evidence Block the bully online Have any bogus profiles taken downHelp stop cyberbullying – by not passing on othermessages and telling the bully to stop.
    44. 44. ReflectionsReflectionsWrite a 150+ word summary onyour reflections on the topicslearned this week.
    45. 45. Computer Safety Final ExamComputer Safety Final ExamUse this time to study in groups or solo. (25minutes) You may use the PowerPoint’s to assistyou.Complete computer safety poster. Submitcompleted poster to me (print) and in the studentshared drive:>Ms. Rijo>Class>Computer safetyposter