Your SlideShare is downloading. ×
Becybersmart
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Becybersmart

893
views

Published on

A parent's guide to Teen Online Safety

A parent's guide to Teen Online Safety

Published in: Education

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
893
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Short for Malicious + Software
  • Teens-
  • Transcript

    • 1. Be Cyber-Smart! Surf Safely! Velma Davis, Instructional Support Specialist [email_address]
    • 2. Know your internet areas
      • Email
      • Chat rooms
      • Game rooms
      • Blogs (Blogger)
      • Microblogs (Twitter, Plurk)
      • Bulletin Boards (Myspace, Facebook)
      • Instant Messaging
    • 3. Protocols? What protocols?! Radios: gained popularity in 20’s and 30’s Television: Late 1940’s Internet Explosion: 1990’s
    • 4. Your mother warned you: connectyourhome.com
    • 5. Teens Online
      • 82% of profile creators included their first name in their profiles.
      • 79% have included photos of themselves.
      • 66% have included photos of their friends.
      • 61% have included the name of their city.
      • 49% have included the name of their school.
      • 40% have included their instant message screen name.
      • 40% have streamed audio to their profile.
      • 39% have linked to their blog.
      • 29% have included their email address.
      • 29% have included their last name.
      • 29% have included videos.
      • 2% have included their cell phone numbers.
      http://www.marketingcharts.com/interactive/teens-and-social-networks-managing-personal-information-274 / PEW Report, 2008
    • 6. Who am I REALLY?!
      • Is that really a picture of me?
      Am I really 10 years old? Am I a boy? Do I really go to school?
    • 7. Risks? Highest risk to Teenagers!
      • “ Teenagers are particularly at risk because... they are more likely... to participate in online discussions regarding companionship..."
              • LOL
              • LMAO
              • TY
              • BRB
              • AWFK
              • YW
              • RU
              • Y
              • ASL
              • POS
              • LMIRL
              • WTF
              • OMG
      Laugh out loud Laughing my A$$ off Thank You Be Right Back Away from keyboard/computer You’re Welcome Are you? Why? Age, sex and location Parent Over Shoulder Lets Meet In Real Life What the F$%# Oh my God http:// en.wikipedia.org/wiki/Internet_slang
    • 8. Leet Speak Remember …“Hip”, “Groovy”, “Peace out”? “ Leet” refers to “Elite”. Substitutes regular letters for symbols or numbers Further information for Leet Speak: http://en.wikipedia.org/wiki/Leet http://www.brenz.net/services/l337Maker.asp cartoonstock.com
    • 9.
      • 0 - O 1- I or L 2- A, Z or R 3- E 4- A 5- S
      6- B or G 7- T or L 8- B 9- G or P £- L or E
    • 10. Think Before You Click!
      • Domains- The extensions on a website can indicate their purpose:
        • .com- commercial
        • .biz- business
        • .org- organization
        • .gov- government
        • .edu- education
        • .net- network
        • .xxx- pornography
      blog.andyswebtools.com
    • 11. Virus
      • A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user.
      hugepedia.com
    • 12. Worm
      • A computer worm is a selfreplicating computer program. It uses a network to send copies of itself to other nodes computer terminals on the network).
      • Worms almost always cause harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
    • 13. Trojan Horse
      • A Trojan horse, or simply trojan, is a piece of
      • Software which appears to perform a certain action but in fact performs another such as transmitting a computer virus.
      • May or may not be malicious
      • a Trojan horse is not a computer virus.
    • 14. Spyware
      • Collects small pieces of information about users without their knowledge
      • Installs on your computer
      • Secretly monitors the user's computing: can collect various types of personal information, such as Internet surfing habits and sites that have been visited
      • Can install additional software and redirect Web browser activity.
      • Changes computer settings:
        • Slow connection speeds,
        • Changes your home pages,
        • Loss of Internet connection
        • Loss of functionality of other programs.
      http://en.wikipedia.org/wiki/Spyware
    • 15. Malware
        • Rogue or malicious programs can attack and do various things to your computer while surfing the internet.
        • Hostile, intrusive, or annoying software or program code
    • 16. Phishing
      • Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
      thenextweb.com
    • 17. Suggestions? joystickdivision.com
    • 18. AntiVir PE
      • http://www.avira.com/en/avira-free-antivirus
      Avira AntiVir Personal - Free Antivirus Protects your computer against dangerous viruses.
    • 19. AVG
      • A great Anti-virus and Anti-Malware program.
      Free Download: http://free.avg.com/ww-en/download-avg-anti-virus-free
    • 20. Firewall
      • A firewall is a device or set of devices configured to permit, deny, encrypt, or monitor internet connections between online traffic and your computer .
      Windows 07 comes with a built-in Firewall.
    • 21. Blocking or Filtering http://internet-filter-review.toptenreviews.com/ Compare software:
    • 22. What Can I do as a Parent?
      • Don’t hesitate to say “No!”
      • Put your computer in the busiest room in the house!
      • Spend time with your child on the computer.
      • Have your child sign and discuss an internet usage agreement and go over it periodically.
      • Check the history on the computer.
      http://computinged.com
    • 23.
      • The most important factors in keeping your child safe on-line are the utilization of appropriate blocking software and/or parental controls, along with open, honest discussions with your child, monitoring his/her on-line activity!
      A Parent's Guide to Internet Safety , U.S. Department of Justice , Federal Bureau of Investigation - Publications
    • 24. Digital Footprint
      • Talk to your child about his/her digital footprint!
      http://dsc.discovery.com/convergence/koppel/interactive/interactive.html Have them take this quiz with you!
    • 25. My Rules for Internet Safety!
      • I will not give out personal information such as my address, telephone number, parents’ work address/telephone number, or the name and location of my school without my parents’ permission
      cartoonstock.com
    • 26.
      • I will tell my parents right away if I come across any information that makes me feel uncomfortable
      Boy, am I uncomfortable!
    • 27.
      • I will never agree to get together with someone I "meet" online!
      celebrityradar.info
    • 28.
      • I will never send a person my picture or anything else without first checking with my parents
    • 29.
      • I will not respond to any messages that are mean or in any way make me feel uncomfortable. It is not my fault if I get a message like that. If I do I will tell my parents right away.
    • 30.
      • I will not download pictures from an unknown source, as there is a good chance there could be sexually explicit images.
    • 31.
      • time of day that I can be online,
      • the length of time I can be online,
      • appropriate areas for me to visit.
      • I will not access other areas or break these rules without their permission.
      I will talk with my parents so that we can set up rules for going online. cartoonstock.com
    • 32. Helpful Sites
      • http://www.onlinenetiquette.com/netiquette_quiz.html
      • www.netzsmartz.org
      • www.safeteens.com
      • www.blogsafety.com  
      • www.netfamilynews.org
      • http://www.slideshare.net/jtubbs/internet-safety-program-for-parents
      • http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec14.shtm
    • 33. Bibliography
      • www.netzsmartz.org
      • www.safeteens.com  
      • www.safekids.com  Lawrence J. Magid
      • www.blogsafety.com  
      • www.netfamilynews.org
      • http://dsc.discovery.com/convergence/koppel/interactive/interactive.html
      • http://pewresearch.org/