SlideShare a Scribd company logo
1 of 45
Net CeteraNet Cetera
Chatting with Teens About
Being Online
What We Do OnlineWhat We Do Online
Socialize
Share pictures and videos
Build online profiles
Create avatars
Online RisksOnline Risks
Inappropriate Conduct
Inappropriate Contact
Inappropriate Content
What is Cyberbullying?What is Cyberbullying?
Cyberbullying is the use of technology to harass,
threaten, embarrass or target another person.
Broken FriendshipBroken Friendship
CyberbullyingCyberbullying
CyberbullyingCyberbullying
R.I.P.R.I.P.
Guidance at Different AgesGuidance at Different Ages
Teens
 Independent, with mobile access
 Important messages:
• Information credibility
• Once it’s posted, you can’t take it back
• Treat people the way you’d like to be treated
You can’t take it backYou can’t take it back
You can’t take it backYou can’t take it back
What should he have done when asked to rate
the website?
Think before you post.Think before you post.
PredatorPredator
Although children are far more likely to come
across sexually oriented content online than to
encounter an online predator, the tragedy that
can result from having a child cross paths with a
predator makes it imperative that a parent
understand this issue.
Tracking TeresaTracking Teresa
PredatorPredator
In the physical world, a predator or child molester
is usually someone a parent or child knows—
someone who might even be trusted by the
family. Online, however, it can be a different
story. Predators can use the Internet to seek out
children they don’t know.
Online PredatorsOnline Predators
PredatorPredator
Modus Operandi
Young teens have a real desire to be free of their
parents’ authority and to gain acceptance as
grown-ups. But teens are also naïve and
inexperienced, especially in dealing with adults
who have ulterior motives. Sexual predators take
advantage of these qualities. They manipulate
kids in an effort to gain trust, which they use to
gradually turn seemingly innocent online
relationships into real-life sexual interactions.
Texas teen killed before she could testify,
family friend says
Killer used Facebook to lure teen girl, NonaKiller used Facebook to lure teen girl, Nona
Belomesoff, to her deathBelomesoff, to her death
By Michael Sheridan / DAILYBy Michael Sheridan / DAILY
NEWS STAFF WRITERNEWS STAFF WRITER
Monday, May 17, 2010, 10:14Monday, May 17, 2010, 10:14
AMAM
Read more:Read more:
http://www.nydailynews.com/nhttp://www.nydailynews.com/n
ews/world/cops-killer-ews/world/cops-killer-
facebook-lure-teen-girl-nona-facebook-lure-teen-girl-nona-
belomesoff-death-article-belomesoff-death-article-
1.449703#ixzz26jmwFwp21.449703#ixzz26jmwFwp2
Read more: http://www.dailymail.co.uk/news/article-1175512/Teenagers-raped-girl-met-Read more: http://www.dailymail.co.uk/news/article-1175512/Teenagers-raped-girl-met-
Facebook-jailed-years.html#ixzz26klwBtfPFacebook-jailed-years.html#ixzz26klwBtfP
Teenagers who raped girl they met onTeenagers who raped girl they met on
Facebook jailed for six yearsFacebook jailed for six years
Teenagers who raped a girl they
met on Facebook have been
locked up for six years.
John-Claude Rugero, 19, and
Prince Afriyie, 17, were found
guilty of raping the a 17-year-old
on a roundabout in Colchester,
Essex.
The girl, who cannot be named,
told jurors how she first chatted to
the defendants on social
networking sites Facebook and
Bebo, two years before she was
raped on August 12 last year.
Survivor diariesSurvivor diaries
Brainstorming Activity (CyberbullyingBrainstorming Activity (Cyberbullying
Think of a situation that may have placed you or
another in a uncomfortable position. (Bullying,
Harassment, Stalking, Text messaging, Twitter
Too much information, etc.) How did you handle
it and what would you have done differently after
watching some of the PowerPoint?
GroomingGrooming
Grooming
refers to actions deliberately undertaken with the
aim of befriending and establishing an emotional
connection with a child or teen, in order to lower
their inhibitions in preparation for sexual activity
with the child/teen, or exploitation; such as child
pornography and/or prostitution.
Amy’s choiceAmy’s choice
Julie’s journeyJulie’s journey
Predator/GroomingPredator/Grooming
A predator usually approaches a child target
through initially harmless chat room or instant-
message dialogue. Over time—perhaps weeks or
even months—the stranger, having obtained as
much personal information as possible, grooms
the child, gaining his or her trust through
compliments, positive statements, and other
forms of flattery to build an emotional bond.
Be careful what you shareBe careful what you share
Revealing too much informationRevealing too much information
According to MSNBC, police in Connecticut
arrested a 21-year-old man, accusing him of
raping a 14-year-old girl he found on MySpace.
On Long Island, New york investigators say
another man found the work address of a 16-year-
old girl on one of the Web sites last fall, lured her
to a parking lot, and sexually assaulted her after
he found her information online.
Too much informationToo much information
TMITMI
Sometimes posting information on the internet,
even though it may seem safe, can be risky. You
might be giving out a bit more information then
you know.
Certain statuses may seem casual, but giving out
information about where you are, what you’re
doing and when you won’t be home could
potentially put you into dangerous situations.
SextingSexting
Sexting is the act of sending sexually explicit
messages or photographs, primarily between
mobile phones.
News reports are increasingly documenting legal
repercussions after indecent photo appear online. And
attorneys say there are many unanswered questions about
whether young people who send their own photos could
face prosecution for obscenity or child pornography.
This year in Wisconsin, a 17-year-old was charged with
possessing child pornography after he posted naked
pictures of his 16-year-old ex-girlfriend online.
SextingSexting
A third of teen boys and 40% of young men say
they've seen nude or semi-nude images sent to
someone else; about a quarter of teen girls and
young adult women have.
And 39% of teens and 59% of those ages 20-26
say they've sent suggestive text messages. Most
of those surveyed (73%) said they knew sending
sexually suggestive content "can have serious
negative consequences," yet 22% said it's "no big
deal."
Catholic High School Football Star Expelled, Loses Scholarship OverCatholic High School Football Star Expelled, Loses Scholarship Over
Racist, Sexual TweetsRacist, Sexual Tweets
Early last week, the Supreme Court decided not to hear cases pertaining
to student punishment regarding their free speech rights on social media
sites off campus. A day after this decision, a highly recruited New Jersey
high school football star with a scholarship offer from the University of
Michigan was expelled from his private school over what officials
considered highly offensive tweets.
ESPN.com reported that Yuri Wright, a senior from Bosco Prep High
School in Ramsey, N.J., who was sought after by all major college
football conferences,
Catholic High School Football Star Expelled, Loses ScholarshipCatholic High School Football Star Expelled, Loses Scholarship
Over Racist, Sexual TweetsOver Racist, Sexual Tweets
was expelled and his scholarship offer from U of M withdrawn over
sexually explicit and racially charged tweets:
“He was expelled from the school for the things he had written on Twitter,”
[coach Greg] Toal told ESPNNewYork.com. “It was pretty simple
really, what he wrote were some graphic sex things. This is a Catholic
school, things like that cannot happen. It was totally inappropriate.”
The reason, his coach said, was because of a series of tweets that began
last July. Among the schools he is considering are Michigan, Rutgers,
Notre Dame and Colorado. A number of outlets reported that Michigan
has stopped recruiting him.
The cornerback was warned by school officials for months, according to
ESPN.com, to stop using the micro-blogging site because he couldn’t
curb his language, but failed to comply at the time. His Twitter handle
(@YuriWright3) no longer exists now.
Here are some of Wright’s “cleaner” tweets:
Catholic High School Football Star Expelled, Loses ScholarshipCatholic High School Football Star Expelled, Loses Scholarship
Over Racist, Sexual TweetsOver Racist, Sexual Tweets
Offline consequencesOffline consequences
What is CyberstalkingWhat is Cyberstalking
Cyberstalking can be defined as threatening
behavior or unwanted advances directed at
another using the Internet and other forms of
online and computer communications.
Man Convicted of Cyber StalkingMan Convicted of Cyber Stalking
CyberstalkingCyberstalking
I Dare You
Kirsten PrattKirsten Pratt
Answer all questions in paragraph form.
What happened to Kristen Pratt?
How did her stalker meet her?
What happened to the stalker?
How has Kristen been affected by this crime?
What advice does Kristen Pratt gives to stalking
victims?
What happened in the lollipop ad?
How can one avoid being a victim of a stalker?
CyberstalkingCyberstalking
Similar to stalking off-line, online stalking can be a
terrifying experience for victims, placing them at
risk of psychological trauma, and possible
physical harm. Many cyberstalking situations do
evolve into off-line stalking, and a victim may
experience abusive and excessive phone calls,
vandalism, threatening or obscene mail,
trespassing, and physical assault.
Socializing OnlineSocializing Online
Socializing is socializing – online or off
Reminders:
 Online actions have off line, real-world consequences
 Careful when posting – you can’t take it back
 Trust your gut if you feel they’re suspicious, you might
be right
 It is imperative to know what info should stay private
CyberbullyingCyberbullying
If you have a problem with a bully,
don’t react to the bully
 Encourage your kid to talk with you about what’s up
 Save the evidence
 Block the bully online
 Have any bogus profiles taken down
Help stop cyberbullying – by not passing on other
messages and telling the bully to stop.
ReflectionsReflections
Write a 150+ word summary on
your reflections on the topics
learned this week.
Computer Safety Final ExamComputer Safety Final Exam
Use this time to study in groups or solo. (25
minutes) You may use the PowerPoint’s to assist
you.
Complete computer safety poster. Submit
completed poster to me (print) and in the student
shared drive:>Ms. Rijo>Class>Computer safety
poster

More Related Content

What's hot

Cyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group AnonymousCyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group Anonymousccastronovo
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointHannahMorrell
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableKhy Amigable
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying CarlosE15
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingsus22
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationpamelazuley
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateMarian Merritt
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 
21st Century Bullying Crueler Than Ever
21st Century Bullying   Crueler Than Ever21st Century Bullying   Crueler Than Ever
21st Century Bullying Crueler Than Evermbernstein
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetysharon7111
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Think Before You Post
Think Before You PostThink Before You Post
Think Before You Postfrostburg
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYINGRene Ge
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingCoachElrod
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingMarc Kuhn
 

What's hot (20)

Cyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group AnonymousCyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group Anonymous
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
21st Century Bullying Crueler Than Ever
21st Century Bullying   Crueler Than Ever21st Century Bullying   Crueler Than Ever
21st Century Bullying Crueler Than Ever
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Think Before You Post
Think Before You PostThink Before You Post
Think Before You Post
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYING
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Similar to Net safety presentation

Public service announcement
Public service announcementPublic service announcement
Public service announcementkeegan333
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullyinghoskei
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullyinghoskei
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentationjpl17
 
Student X 1 Sample Student X Misaghi English .docx
 Student X 1 Sample Student X Misaghi English .docx Student X 1 Sample Student X Misaghi English .docx
Student X 1 Sample Student X Misaghi English .docxaryan532920
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Media power point 3
Media power point 3Media power point 3
Media power point 3kelsietune
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012kschermerhorn
 
Social Networking & Cyberbullying presentation
Social Networking & Cyberbullying presentationSocial Networking & Cyberbullying presentation
Social Networking & Cyberbullying presentationlucycowell
 
Social Networiking & Cyber Bullying Presentation
Social Networiking & Cyber Bullying PresentationSocial Networiking & Cyber Bullying Presentation
Social Networiking & Cyber Bullying Presentationteganjoy97
 
Your Life On The Internet
Your Life On The InternetYour Life On The Internet
Your Life On The Internetaelizabeth
 
Happy slapping!!!!!!!!
Happy slapping!!!!!!!!Happy slapping!!!!!!!!
Happy slapping!!!!!!!!asmedia
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingkpwillia
 

Similar to Net safety presentation (20)

Public service announcement
Public service announcementPublic service announcement
Public service announcement
 
Presentation1
Presentation1Presentation1
Presentation1
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullying
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullying
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentation
 
Student X 1 Sample Student X Misaghi English .docx
 Student X 1 Sample Student X Misaghi English .docx Student X 1 Sample Student X Misaghi English .docx
Student X 1 Sample Student X Misaghi English .docx
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Media power point 3
Media power point 3Media power point 3
Media power point 3
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012
 
Social Media Powerpoint
Social Media PowerpointSocial Media Powerpoint
Social Media Powerpoint
 
Social Networking & Cyberbullying presentation
Social Networking & Cyberbullying presentationSocial Networking & Cyberbullying presentation
Social Networking & Cyberbullying presentation
 
Social Networiking & Cyber Bullying Presentation
Social Networiking & Cyber Bullying PresentationSocial Networiking & Cyber Bullying Presentation
Social Networiking & Cyber Bullying Presentation
 
Bullying in the digital age
Bullying in the digital ageBullying in the digital age
Bullying in the digital age
 
Your Life On The Internet
Your Life On The InternetYour Life On The Internet
Your Life On The Internet
 
Happy slapping!!!!!!!!
Happy slapping!!!!!!!!Happy slapping!!!!!!!!
Happy slapping!!!!!!!!
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Recently uploaded

ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxruthvilladarez
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 

Recently uploaded (20)

ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 

Net safety presentation

  • 1. Net CeteraNet Cetera Chatting with Teens About Being Online
  • 2. What We Do OnlineWhat We Do Online Socialize Share pictures and videos Build online profiles Create avatars
  • 3. Online RisksOnline Risks Inappropriate Conduct Inappropriate Contact Inappropriate Content
  • 4. What is Cyberbullying?What is Cyberbullying? Cyberbullying is the use of technology to harass, threaten, embarrass or target another person.
  • 9. Guidance at Different AgesGuidance at Different Ages Teens  Independent, with mobile access  Important messages: • Information credibility • Once it’s posted, you can’t take it back • Treat people the way you’d like to be treated
  • 10. You can’t take it backYou can’t take it back
  • 11. You can’t take it backYou can’t take it back What should he have done when asked to rate the website?
  • 12. Think before you post.Think before you post.
  • 13. PredatorPredator Although children are far more likely to come across sexually oriented content online than to encounter an online predator, the tragedy that can result from having a child cross paths with a predator makes it imperative that a parent understand this issue.
  • 15. PredatorPredator In the physical world, a predator or child molester is usually someone a parent or child knows— someone who might even be trusted by the family. Online, however, it can be a different story. Predators can use the Internet to seek out children they don’t know.
  • 17. PredatorPredator Modus Operandi Young teens have a real desire to be free of their parents’ authority and to gain acceptance as grown-ups. But teens are also naïve and inexperienced, especially in dealing with adults who have ulterior motives. Sexual predators take advantage of these qualities. They manipulate kids in an effort to gain trust, which they use to gradually turn seemingly innocent online relationships into real-life sexual interactions.
  • 18. Texas teen killed before she could testify, family friend says
  • 19. Killer used Facebook to lure teen girl, NonaKiller used Facebook to lure teen girl, Nona Belomesoff, to her deathBelomesoff, to her death By Michael Sheridan / DAILYBy Michael Sheridan / DAILY NEWS STAFF WRITERNEWS STAFF WRITER Monday, May 17, 2010, 10:14Monday, May 17, 2010, 10:14 AMAM Read more:Read more: http://www.nydailynews.com/nhttp://www.nydailynews.com/n ews/world/cops-killer-ews/world/cops-killer- facebook-lure-teen-girl-nona-facebook-lure-teen-girl-nona- belomesoff-death-article-belomesoff-death-article- 1.449703#ixzz26jmwFwp21.449703#ixzz26jmwFwp2
  • 20. Read more: http://www.dailymail.co.uk/news/article-1175512/Teenagers-raped-girl-met-Read more: http://www.dailymail.co.uk/news/article-1175512/Teenagers-raped-girl-met- Facebook-jailed-years.html#ixzz26klwBtfPFacebook-jailed-years.html#ixzz26klwBtfP Teenagers who raped girl they met onTeenagers who raped girl they met on Facebook jailed for six yearsFacebook jailed for six years Teenagers who raped a girl they met on Facebook have been locked up for six years. John-Claude Rugero, 19, and Prince Afriyie, 17, were found guilty of raping the a 17-year-old on a roundabout in Colchester, Essex. The girl, who cannot be named, told jurors how she first chatted to the defendants on social networking sites Facebook and Bebo, two years before she was raped on August 12 last year.
  • 22. Brainstorming Activity (CyberbullyingBrainstorming Activity (Cyberbullying Think of a situation that may have placed you or another in a uncomfortable position. (Bullying, Harassment, Stalking, Text messaging, Twitter Too much information, etc.) How did you handle it and what would you have done differently after watching some of the PowerPoint?
  • 23. GroomingGrooming Grooming refers to actions deliberately undertaken with the aim of befriending and establishing an emotional connection with a child or teen, in order to lower their inhibitions in preparation for sexual activity with the child/teen, or exploitation; such as child pornography and/or prostitution.
  • 26. Predator/GroomingPredator/Grooming A predator usually approaches a child target through initially harmless chat room or instant- message dialogue. Over time—perhaps weeks or even months—the stranger, having obtained as much personal information as possible, grooms the child, gaining his or her trust through compliments, positive statements, and other forms of flattery to build an emotional bond.
  • 27. Be careful what you shareBe careful what you share
  • 28. Revealing too much informationRevealing too much information According to MSNBC, police in Connecticut arrested a 21-year-old man, accusing him of raping a 14-year-old girl he found on MySpace. On Long Island, New york investigators say another man found the work address of a 16-year- old girl on one of the Web sites last fall, lured her to a parking lot, and sexually assaulted her after he found her information online.
  • 29. Too much informationToo much information
  • 30. TMITMI Sometimes posting information on the internet, even though it may seem safe, can be risky. You might be giving out a bit more information then you know. Certain statuses may seem casual, but giving out information about where you are, what you’re doing and when you won’t be home could potentially put you into dangerous situations.
  • 31. SextingSexting Sexting is the act of sending sexually explicit messages or photographs, primarily between mobile phones. News reports are increasingly documenting legal repercussions after indecent photo appear online. And attorneys say there are many unanswered questions about whether young people who send their own photos could face prosecution for obscenity or child pornography. This year in Wisconsin, a 17-year-old was charged with possessing child pornography after he posted naked pictures of his 16-year-old ex-girlfriend online.
  • 32. SextingSexting A third of teen boys and 40% of young men say they've seen nude or semi-nude images sent to someone else; about a quarter of teen girls and young adult women have. And 39% of teens and 59% of those ages 20-26 say they've sent suggestive text messages. Most of those surveyed (73%) said they knew sending sexually suggestive content "can have serious negative consequences," yet 22% said it's "no big deal."
  • 33. Catholic High School Football Star Expelled, Loses Scholarship OverCatholic High School Football Star Expelled, Loses Scholarship Over Racist, Sexual TweetsRacist, Sexual Tweets Early last week, the Supreme Court decided not to hear cases pertaining to student punishment regarding their free speech rights on social media sites off campus. A day after this decision, a highly recruited New Jersey high school football star with a scholarship offer from the University of Michigan was expelled from his private school over what officials considered highly offensive tweets. ESPN.com reported that Yuri Wright, a senior from Bosco Prep High School in Ramsey, N.J., who was sought after by all major college football conferences,
  • 34. Catholic High School Football Star Expelled, Loses ScholarshipCatholic High School Football Star Expelled, Loses Scholarship Over Racist, Sexual TweetsOver Racist, Sexual Tweets was expelled and his scholarship offer from U of M withdrawn over sexually explicit and racially charged tweets: “He was expelled from the school for the things he had written on Twitter,” [coach Greg] Toal told ESPNNewYork.com. “It was pretty simple really, what he wrote were some graphic sex things. This is a Catholic school, things like that cannot happen. It was totally inappropriate.” The reason, his coach said, was because of a series of tweets that began last July. Among the schools he is considering are Michigan, Rutgers, Notre Dame and Colorado. A number of outlets reported that Michigan has stopped recruiting him. The cornerback was warned by school officials for months, according to ESPN.com, to stop using the micro-blogging site because he couldn’t curb his language, but failed to comply at the time. His Twitter handle (@YuriWright3) no longer exists now. Here are some of Wright’s “cleaner” tweets:
  • 35. Catholic High School Football Star Expelled, Loses ScholarshipCatholic High School Football Star Expelled, Loses Scholarship Over Racist, Sexual TweetsOver Racist, Sexual Tweets
  • 37. What is CyberstalkingWhat is Cyberstalking Cyberstalking can be defined as threatening behavior or unwanted advances directed at another using the Internet and other forms of online and computer communications.
  • 38. Man Convicted of Cyber StalkingMan Convicted of Cyber Stalking
  • 40. Kirsten PrattKirsten Pratt Answer all questions in paragraph form. What happened to Kristen Pratt? How did her stalker meet her? What happened to the stalker? How has Kristen been affected by this crime? What advice does Kristen Pratt gives to stalking victims? What happened in the lollipop ad? How can one avoid being a victim of a stalker?
  • 41. CyberstalkingCyberstalking Similar to stalking off-line, online stalking can be a terrifying experience for victims, placing them at risk of psychological trauma, and possible physical harm. Many cyberstalking situations do evolve into off-line stalking, and a victim may experience abusive and excessive phone calls, vandalism, threatening or obscene mail, trespassing, and physical assault.
  • 42. Socializing OnlineSocializing Online Socializing is socializing – online or off Reminders:  Online actions have off line, real-world consequences  Careful when posting – you can’t take it back  Trust your gut if you feel they’re suspicious, you might be right  It is imperative to know what info should stay private
  • 43. CyberbullyingCyberbullying If you have a problem with a bully, don’t react to the bully  Encourage your kid to talk with you about what’s up  Save the evidence  Block the bully online  Have any bogus profiles taken down Help stop cyberbullying – by not passing on other messages and telling the bully to stop.
  • 44. ReflectionsReflections Write a 150+ word summary on your reflections on the topics learned this week.
  • 45. Computer Safety Final ExamComputer Safety Final Exam Use this time to study in groups or solo. (25 minutes) You may use the PowerPoint’s to assist you. Complete computer safety poster. Submit completed poster to me (print) and in the student shared drive:>Ms. Rijo>Class>Computer safety poster

Editor's Notes

  1. [ Introduction: who you are, where you’re from .] Today I’d like to talk about some things we can do to help keep kids safer online. I’m highlighting suggestions from this publication, Net Cetera, which we have available for you today. Let’s start with a few questions: How many of you have school-aged kids? Or know a kid? What ages? Do they spend time online or on a cell phone? [NOTE TO PRESENTER : This is intended to be a 10-minute presentation if you use just the basic slides. You can lengthen it by adding discussion of any of the specific topics included under ADDITIONAL SLIDES.]
  2. Most of us – and probably most kids – do all kinds of things online. We may socialize via email, IM, phone over web, or social networks Many of us post and share pictures and videos We may have profiles on social networks, sharing information with friends and Sometimes we create avatars to represent us in online spaces.
  3. These activities come with some risks: Inappropriate Conduct : it’s anonymous online, and people – especially kids – can forget that their online actions can have real-world consequences. Inappropriate Contact : there are people online who have bad intentions – including bullies, predators, hackers, and scammers. Inappropriate Content : you may worry about what younger kids may run across – or what older kids might seek out.
  4. By the time kids are teenagers, many are ready for more independence from their parents. They’re starting to form their own values and reflecting those of their friends. But that doesn’t mean there’s no point in talking with them. Teens have access to the internet through their mobile devices, phones, their computers and their friends computers, so it’s really hard to watch what they do. It doesn’t hurt to reinforce ‘good citizenship’ messages with teens, along with three important messages that many need to hear: Not all information is credible: just because it’s posted, doesn’t mean it’s so. Once they post something, there’s no taking it back. It’s out there in the world. No matter how impersonal it seems, screen names, profiles and avatars belong to people with real feelings. Treat them the way you’d like to be treated.
  5. Adults often see socializing online and offline as separate activities, each with its own rules. Kids see it all as socializing, whether it’s online or off – and it’s good to talk with them about how they act online. Even the most tech-savvy kids can use some reminders about their online behavior: What they do online can have real-world consequences – the words they use and what they post can have a big impact on others, and on themselves. Remind kids that, once they post something, they can’t take it back. It’s a message that’s worth repeating, especially since the colleges and jobs kids may eventually want to get into will be checking their social networking profiles. While most kids are good at just deleting things they think are annoying or creepy, tell kids to trust their gut if they’re suspicious about anything – and to tell you about it. You can help them report it to the police and the social networking site. It’s a good idea to remind kids to keep personal information private. Kids should avoid posting things like where they go to school, their address or phone number.
  6. If your child has a problem with a bully, tell him or her not to react. Bullies are looking for a response, so don’t give them one. Encourage your kid to talk with you about what’s going on, and to help you save the evidence. If the bullying keeps up, share the record with the school or the police. If you ever fear for your child’s safety, immediately contact the police. Block the bully online: remove him or her from “friend” or “buddy” lists, and block the email address. If your child’s social networking profile has been changed or created without his permission, get in touch with the company that runs the site to have it taken down. Tell your kid that she can help stop cyberbullying by telling the bully to stop, and by not passing on mean messages.
  7. [NOTE TO PRESENTER : The first section is a basic presentation lasting about 10-15 minutes. If you’d like to add any of these topics, simply copy these slides before Slide #9. We suggest you still finish with Slides # 10-11.]