Internet Safety For Parents And Kids
Upcoming SlideShare
Loading in...5
×
 

Internet Safety For Parents And Kids

on

  • 3,000 views

This presentation was created for students and parents of children from 5th to 8th grade regarding staying safe online on the Internet in general and on social networking sites in particular.

This presentation was created for students and parents of children from 5th to 8th grade regarding staying safe online on the Internet in general and on social networking sites in particular.

Statistics

Views

Total Views
3,000
Views on SlideShare
2,956
Embed Views
44

Actions

Likes
3
Downloads
201
Comments
0

8 Embeds 44

http://www.anbrcama.com 21
http://www.slideshare.net 14
http://www.luxetvitan.com 3
file:// 2
http://protopage.com 1
http://bishpd.wordpress.com 1
https://www.linkedin.com 1
https://twitter.com 1
More...

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Internet Safety For Parents And Kids Internet Safety For Parents And Kids Presentation Transcript

  • Kids & Social Media: Facing Up to Facebook, Twitter & Beyond – The Pros & Cons of How Students Use Social Media for Study, Friendship & Fun Prepared for Epiphany Parent & Student Seminar. April 28, 2009 Sandra Fathi Web: www.affectstrategies.com President, Affect Strategies Blog: www.techaffect.com sfathi@affectstrategies.com Twitter: @sandrafathi 212 398 9680 LinkedIn, Facebook: Sandra Fathi Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Parents & Educators Internet & Social Media are the New Reality » Required Skills for Social Development/Acceptance » Required Skills for Education & Research » Required Skills for Job & Career Development Educate & Arm Yourself with Knowledge » Investing in Your Child’s Safety » Investing in Your Child’s Education » Investing in Your Child’s Future Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Why do kids need the Internet? » To Connect » To Be Social » Social Planning/Events » Staying Plugged In » To Share » Self-Expression Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Social Networking Websites 16 years of age: Friendster Online community connecting friends 14 years of age: MySpace A Place For Friends At least 13 years of age & in high school: Facebook Social Utility that connect people with those around them Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Social Networking Websites: 13 Year-olds Hi 5 Who’s in? Xanga A weblog community IMVU Chat with friends in 3D There Online virtual world Chamber of Chat Harry Potter online role playing game Second Life 3D Virtual World Runescape Online adventure community Bebo Social network for sharing and entertainment Gaia Online Virtual community with games, message boards & economy vSide Virtual music community Windows Live Spaces Community of friends for sharing and blogging Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Social Networking Sites: No Age Minimum Imbee Social Networking designed for Club Penguin Virtual world for kids kids 8-12 Marapets Virtual pet site with games Active Worlds 3D virtual world chat and chat community Boom Bang Chat, make friends and Shining Stars Chatting, naming stars explore a virtual world and virtual star worlds Dofus Multi-player online role playing Neopets Virtual world for pets game Endless Online Role playing games Awol Chats, games, diary, friends, & Eternal Lands Role playing games cribs Furcadia Role playing games Sanriotown Hello Kitty games, Graal Online Role playing games community, blogs and forums Guild Wars Role playing games Webkinz Virtual pet community for Hero Online Role playing games plush pets Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • What are some of the dangers? »Privacy/Identity Theft »Cyber-bullying »Online Predators »Cybercriminals »Piracy »Inappropriate/Sexual Content »Misleading Content/Propaganda Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Quick Stats 93% of parents say they have established rules for their child’s Internet activity 37% of students report being given no rules from their parents on using the Internet 47% of parents feel their ability to monitor and shelter their children from inappropriate material is limited 95% of parents say they know “some” or “a lot” about where their children go or what their children do on the Internet 41% of students do not share where they go or what they do on the Internet with their parents 26% of students believe their parents would be concerned if they knew what they did on the Internet I-Safe Statistics (www.isafe.org) Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Quick Stats 58% of students admit to using the Internet unsafely, inappropriately, or illegally 12% of students have unsupervised Internet access at school 55% of students report having given out personal information (e.g. name, age, gender, home address) to someone they have only met online Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Online Predators » 71% of teens reported receiving messages online from 71% someone they did not know » 40% reported they usually reply and begin chatting with 40% that person » 18% reported telling an adult about the encounter 18% » 45% have been asked for personal information by someone 45% they did not know » 30% have of teens have considered meetings someone 30% they have only talked to online 14% HAVE HAD AN ENCOUNTER Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Online Predators Tactics » Seeks out provocative user names. » Studies your profile. » Starts with an innocent IM. » Asks personal questions, A/S/L. » Wants you to private chat. » e- Asks you for personal info. (Phone number, e -mail address, home address, etc.) school name, etc.) » Wants to be your best friend, boyfriend or girlfriend. » Starts sexual conversations. » Is all about keeping secrets. » Asks for personal photos. » Wants to send you strange gifts. » face-to- Wants to set up a face - to -face meeting. » Makes threats when you no longer want to chat with him or her. Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Cyber-bullying » Be strong and stop it early. Don’t stoop to their level and lash back. » Don’t suffer in silence. Tell an adult. Keep telling people until someone takes action. » Don’t open or read messages from cyber bullies. » Contact your Internet service provider abuse department. » If the problem continues, alert the local police department. » Tell your school if it is school related. If your cyber bully attends your school, contact your teacher or principal. » Don’t erase the messages. Log all dates and time. Put them in a folder and hold them as evidence. » Change your e-mail address or screen name. » If it’s happening with text messages, change your cell number. » Take screen shots of your chat room pages. » Save URLs, e-mail addresses, and profiles of the bully. » Stay protected—never agree to meet with a bully face to face. » Block the bully if you are in a chat room or IMing. Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Cyber-Bullying: Consequences & Crime Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Piracy: Illegal Downloads Myth — I cannot be sued for downloading music and movies off P2P sites. They’ll never catch me. Fact — True and False. You can’t be sued if you have downloaded songs that have been put online with the approval of record labels and—you are violating copyright laws and you run the risk of being sued. The Recording Industry Association of America (RIAA) filed 3,000 lawsuits against individuals as of May 2004, and in some cases sought financial damages of up to $150,000 per copyrighted song. Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Piracy: P2P Sites P2P sites are not illegal, but trading unauthorized music and movies is. The argument is that P2P sites are not providing the illegal files —they are only providing a way to share files with others logged onto the site. Downloading music and movies without paying on unsanctioned sites is illegal and can result in criminal penalties. There is a good possibility of downloading a virus, creating a gateway for a hacker to jack your personal stuff or gain access to files on your hard drive. Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Piracy: Consequences & Crime Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Cyberterrorists/ Cybercriminals Spam » Avoid opening e-mails from businesses you don’t know » Get anti-spam (GMail) Viruses/Spyware » Get viruses from opening attachments not e-mails » Can also get a “Trojan horse” by downloading software and e- mail attachments Cyber-criminals (identity theft) » Never give out credit card info to a site that isn’t “trusted” – Google tools » Use PayPal – doesn’t give credit card info to sellers Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Pornography, Plagiarism & Propaganda Pornographic content » Use parental controls on internet options » Moderated safe search on Google » YouTube requires a login for over 18 – has strict policy against porn Plagiarism » Make sure you reference your sources for school reports! Propaganda » Many sites won’t be pornographic but not suited for children. » Hate sites, false information, lies and rumors Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Personal Information Obvious: Less Obvious: Name School Name Address School Mascot Age Gaming Identities Sex Hobbies Picture Interests Phone Number Landmarks/Hangouts Address Team Names SSN Number Bank Account Credit Card Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • What is Sexting? When people take sexually revealing picture of themselves and send them as text message attachments, it's called quot;sexting.“ Peoplequot;sextquot; to show off, to entice someone, to show interest in someone, or to prove commitment. The problem with that, is that the moment the relationship ends (and most of them do) someone is in possession of a highly compromising image that can be easily posted on a social networking site or sent around via email or text. Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Sexting Once an image is sent, it can never be retrieved -- youwill lose control of it. How would you feel if your teachers, parents, or the entire school saw the picture, because it happens all the time. Talk about pressures to send revealing photos. No matter how big the social pressure is, the potential social humiliation and consequences will be hundreds of times worse. The buck stops with you. If someone sends you a photo, delete it immediately. If you do send it on, you’re distributing pornography -- and that’s against the law. Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Sexting Statistics 22% of teen girls and 20% of teen boys have sent nude or semi-nude photos of themselves 22% of teens admit that technology makes them personally more forward and aggressive 38% say exchanging sexy content makes dating or hooking up with others more likely 29% believe those exchanging sexy content are “expected” to date or hook up Revealing photos can be resent to a vast audience Sending a sexual image of a minor or to a minor is illegal Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Sexting: Consequences & Crime Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Protecting Kids: Tools & Strategies Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Common Sense Media Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • ThatsNotCool.com Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Safe Filtering & Blocking Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Family Gameplan/ Contract Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Safe Search: Google Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Where Have You Been? History Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Social Networking Sites Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Blogs & Blogging » Type of website » Regular entries/updates » Usually allows comments/interaction with visitors » May include text, pictures, video (vlogs), audio (podcasts) etc. » Types: » Personal » Corporate » News » Blog Search Engines: Bloglines, BlogScope, Technorati Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Blog On Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Microblogging » Blogging in short form » Similar to texting » Ability to send and receive messages » Ability to follow and be followed » Archive information » Multiple delivery mechanisms » Conversations and interactivity Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Twitter Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Microblogging: Twitter Image Source: Caroline-Middlebrook.com Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Twitter Profile Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • The Basics Tweet: Message – 140 Characters Twitter Handle: @sandrafathi Retweet (RT): Resending a message from someone else to your followers Message: Direct message (private) from one Twitterer to another Nudge: Prompt someone to Tweet Hashtag: #eventname Easy search for events/topic Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Facebook Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Facebook: Groups & Pages Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Facebook Privacy Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Facebook Privacy Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Facebook Privacy Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • MySpace: Individual Profiles Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • MySpace Safety Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Closed & Open Communities Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Create a Ning Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • You Tube Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • YouTube Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • YouTube Safety Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Compete.com Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Flickr: Photo & File Sharing Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Flickr Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Advice for Kids & Teens Don’t say you are older than you are The Internet is a public space Don’t post embarrassing things or things that could expose you to danger Think before you post – the Internet is forever People aren’t always who they say they are Protect your privacy Report harassment, hate speech and inappropriate content Avoid in-person meetings with people you don’t know in real-life Think before you post Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Advice for Parents Start a conversation Report inappropriate behavior Talk about Social Networking and the Internet Remind kids, and teens, to be cautious Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Best Practices I Kids Need Rules » Set time and limits for Internet usage » Keep computer in public space » Agree on websites » Check compliance (history, filtering, tools) Teach Internet Safety » Offline rules apply online Reinforce Morality & Ethics Online » Educate on criminal activity Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Best Practices II Use Privacy Controls » Don’t provide personal information » Be careful about Pictures/Videos » Set sharing settings » Respecting others’ privacy » Don’t use automatic ‘remember’ settings » Never share passwords » Don’t meet strangers in person Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Best Practices III Communicate Responsibly » Don’t hide behind a screen name » Block offenders » Report incidents » Flag inappropriate content Be a Skeptic » View content critically » Be able to identify reliable sites and verify facts Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Resources/Links Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Internet Safety Organizations Net Family News (http://www.netfamilynews.org/) Safe Kids (http://www.safekids.com/) Wired Safety (http://www.wiredsafety.org/) NetSmartz (http://www.netsmartz411.org/) Wired Kids (http://www.wiredkids.org/) MySpace MyKids (http://www.myspacemykids.com/) Safe Families (http://www.safefamilies.org/) Enough is Enough (http://www.enough.org/) Connect Safely (http://www.connectsafely.org/) iKeepSafe (http://www.ikeepsafe.org/) Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Personal Assistant: Common Craft Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • Contact Information & Resources: Sandra Fathi sfathi@affectstrategies.com twitter: @sandrafathi LinkedIn, Facebook: Sandra Fathi web: www.affectstrategies.com blog: www.techaffect.com Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009