INTERNET SAFETY What is your child really doing online?
Did you know? <ul><li>1 in 3 teenagers plan to meet someone they have contacted on the Internet. </li></ul><ul><li>Half of...
Allen County School Kentucky Education Technology Policies  <ul><li>Acceptable Use Policy </li></ul><ul><li>A written agre...
Online Social Networks <ul><li>IM </li></ul><ul><li>Cell Phones & Computers </li></ul><ul><li>MySpace </li></ul><ul><li>Xa...
 
BLOGGING <ul><li>Blogs:  Journals posted on the Internet </li></ul><ul><li>Weblogs:  Another name for Blog </li></ul><ul><...
Chat Rooms…Free e-mail accounts… …YOUTUBE…  What else? <ul><li>A Web site, part of a Web site, or part of an online servic...
Language of Social Network <ul><li>POS </li></ul><ul><li>Parent Over Shoulder </li></ul><ul><li>WTGP </li></ul><ul><li>Wan...
CYBER BULLYING <ul><li>Cyber Bullying is verbal harassment that occurs during online activities and cell phone texting. </...
 
Peer to Peer Networking <ul><li>Napster is now legal; others are not like Kazaa, Blubster, and Limewire.  These are media ...
 
Tips for Parents & Information from our Counselor---- <ul><li>Have the family computer in an open area…never bedrooms. </l...
Internet Resources <ul><li>Kentucky Center for School Safety  </li></ul><ul><li>http://www.kysafeschools.org </li></ul><ul...
More sites… <ul><li>A Byte-Size Online Safety Guide for kids from Nickelodeon TV </li></ul><ul><li>http://www.nick.com/bla...
Safety Nets for your computers… Windows XP allows separate accounts to be set up on one computer.  Administrator with unli...
Slide show created by: Fran Catlett, LMS/STC Kerri Hammons, Counselor  Harmony Elementary Oldham County  March 20, 2007 Ed...
Upcoming SlideShare
Loading in …5
×

Internet Safety for Your Child

2,562 views

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,562
On SlideShare
0
From Embeds
0
Number of Embeds
45
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Internet Safety for Your Child

  1. 1. INTERNET SAFETY What is your child really doing online?
  2. 2. Did you know? <ul><li>1 in 3 teenagers plan to meet someone they have contacted on the Internet. </li></ul><ul><li>Half of 16 and 17 year-olds say their parents know very little or nothing about what they are doing online. </li></ul><ul><li>Potential Internet predator threats decrease when parents educate their children about internet safety. </li></ul><ul><li>According to the National Center for Missing and Exploited Children </li></ul>
  3. 3. Allen County School Kentucky Education Technology Policies <ul><li>Acceptable Use Policy </li></ul><ul><li>A written agreement, signed by students, and their parents, and teachers, outlining the terms and conditions of Internet use. Required to be signed and returned to school at first of school year. </li></ul><ul><li>Abide by Copyright and Fair Use Laws. </li></ul><ul><li>Avoid Plagiarism. </li></ul><ul><li>E-Mail accounts provided for students. </li></ul>
  4. 4. Online Social Networks <ul><li>IM </li></ul><ul><li>Cell Phones & Computers </li></ul><ul><li>MySpace </li></ul><ul><li>Xanga </li></ul><ul><li>Facebook </li></ul><ul><li>TagWorld </li></ul><ul><li>Piczo </li></ul><ul><li>Friendster </li></ul><ul><li>Livejournal </li></ul><ul><li>A profile is free. </li></ul><ul><li>Anyone can lie about his/her age. </li></ul><ul><li>Anyone can post a fake picture or picture not approved by person in the picture. </li></ul><ul><li>Friends’ List </li></ul><ul><li>Predators are online on most of these sites. </li></ul>
  5. 6. BLOGGING <ul><li>Blogs: Journals posted on the Internet </li></ul><ul><li>Weblogs: Another name for Blog </li></ul><ul><li>Blogs are maintained in chronological order by date of post. People who read the blog are usually welcome to post replies, their thoughts, etc. This makes most blogs interactive. </li></ul><ul><li>Blogging makes the writer feel like they are writing confidentially because they are behind a screen. However, the reality is that anyone online can read the blog. This can be dangerous. </li></ul>
  6. 7. Chat Rooms…Free e-mail accounts… …YOUTUBE… What else? <ul><li>A Web site, part of a Web site, or part of an online service, that provides a venue for communities of users with a common interest to communicate in real time. </li></ul><ul><li>You can create a bogus personality…you type messages to other participants and they reply. </li></ul><ul><li>You never know who is going to be reading your messages or responding to them…caution!!! </li></ul><ul><li>Anyone can upload to share videos, photographs they produce, copy or find. One may watch, or link to, them, not copy them. </li></ul><ul><li>Sometimes these venues are moderated by limiting who is allowed or by moderation volunteers patrolling. </li></ul><ul><li>Google… to Free e-mail providers, to locate Chat Rooms </li></ul><ul><li>and Video Networking </li></ul>
  7. 8. Language of Social Network <ul><li>POS </li></ul><ul><li>Parent Over Shoulder </li></ul><ul><li>WTGP </li></ul><ul><li>Want To Go Private </li></ul><ul><li>LMIRL </li></ul><ul><li>Let’s Meet In Real Life </li></ul><ul><li>A/S/L </li></ul><ul><li>What is your age, sex, and location? </li></ul>Sites with language of Teens www.netlingo.com www.noslang.com
  8. 9. CYBER BULLYING <ul><li>Cyber Bullying is verbal harassment that occurs during online activities and cell phone texting. </li></ul><ul><li>The Internet is the new playground, and there are no off hours. </li></ul><ul><li>58% of kids have not told their parents or any adult about something mean or hurtful that had happened to them online. </li></ul><ul><li>Forms of Cyber Bullying: </li></ul><ul><ul><li>A threatening e-mail </li></ul></ul><ul><ul><li>Nasty instant messaging </li></ul></ul><ul><ul><li>Repeated notes sent to the cell phone </li></ul></ul><ul><ul><li>A website set up to mock </li></ul></ul><ul><ul><li>“ Borrowing” someone’s screen name & pretending to be them while posting a message. </li></ul></ul><ul><ul><li>Forwarding supposedly private messages, pictures or videos to others. </li></ul></ul>
  9. 11. Peer to Peer Networking <ul><li>Napster is now legal; others are not like Kazaa, Blubster, and Limewire. These are media sharing sites/services. </li></ul><ul><li>P2P applications downloaded to your computer allows your computer to communicate directly with another. </li></ul><ul><li>P2P networks have been the centerpiece of intellectual property lawsuits, especially music-also pirated movies, software. </li></ul><ul><li>DANGER –Virus, Spyware, Trojan, Adware and frequent pop-up browsers and other annoying hassles. </li></ul><ul><li>Illegal, Unethical and Immoral. </li></ul>
  10. 13. Tips for Parents & Information from our Counselor---- <ul><li>Have the family computer in an open area…never bedrooms. </li></ul><ul><li>Keep lines of communication open. </li></ul><ul><li>Become a part of your child’s online experience. </li></ul><ul><li>When using e-mail, beware of opening unsolicited attachments </li></ul><ul><li>User names and profiles can provide a wealth of personal information. </li></ul><ul><li>Know intellectual property and copyright regulations. </li></ul><ul><li>Learn about the internet. </li></ul><ul><li>Online predators are out there! </li></ul><ul><ul><li>They can infect your computer with viruses </li></ul></ul><ul><ul><li>They want to steal your personal information/your identity </li></ul></ul><ul><ul><li>They may be out to harm you or the people who use your computer. </li></ul></ul>
  11. 14. Internet Resources <ul><li>Kentucky Center for School Safety </li></ul><ul><li>http://www.kysafeschools.org </li></ul><ul><li>www.kycss.com </li></ul><ul><li>Federal Bureau of Investigation </li></ul><ul><li>“ A Parent’s Guide To Internet Safety” </li></ul><ul><li>www.fbi.gov/hq/cid/cac/crimes </li></ul><ul><li>main.htm </li></ul><ul><li>NetSmartz – Kids http://www.netsmartzkids.org </li></ul><ul><li>DATELINE on TV www.msnbc.msn.com </li></ul><ul><li>Cyber Angels…Teen Angels </li></ul><ul><li>http://www.cyberangels.org/ </li></ul><ul><li>connected.htm1 </li></ul><ul><li>iSAFE Inc. a non-profit foundation whose mission is to educate and empower youth to safety and responsibly take control of their Internet experience </li></ul><ul><li>www.isafe.org </li></ul><ul><li>iLearn The iLearn Online program for internet safety education. Tutorials. </li></ul><ul><li>http://ilearn.isafe.org </li></ul><ul><li>W I r e d S A F E T Y The world's largest internet safety, help and education organization. </li></ul><ul><li>www.wiredsafety.org </li></ul><ul><li>Child Safety on the Information Highway http://www.safekids.com </li></ul><ul><li>iKeepSafe Internet Safety Coalition </li></ul><ul><li>http://ikeepsafe.org </li></ul>
  12. 15. More sites… <ul><li>A Byte-Size Online Safety Guide for kids from Nickelodeon TV </li></ul><ul><li>http://www.nick.com/blab/safety/index.jhtm </li></ul><ul><li>Computer Security- computer virus, phishing scam, spyware, firewalls,root kit removal, Active X controls </li></ul><ul><li>http://www.schoolcounselor.com/ </li></ul><ul><li>Resources/computer-security.htm </li></ul><ul><li>Cyberbullying. </li></ul><ul><li>http://www.cyberbully.org </li></ul><ul><li>SafetyNetLinks </li></ul><ul><li>www.schoolcounselor.com/ </li></ul><ul><li>safetynetlinks.asp </li></ul><ul><li>Teen Safety on the Information Highway- National Center for Missing and Exploited Children </li></ul><ul><li>www.safeteens.com/safeteens.htm </li></ul><ul><li>Ten Commandments for Kids Online </li></ul><ul><li>http://www.komando.com/ </li></ul><ul><li>kimskidscontract.html </li></ul><ul><li>Internet Super Heroes. </li></ul><ul><li>http:// www.internetsuperheroes.org / </li></ul><ul><li>cyberbullying </li></ul>
  13. 16. Safety Nets for your computers… Windows XP allows separate accounts to be set up on one computer. Administrator with unlimited rights or Single user with limited rights. Internet Explorer allows an Administrator Account to set controls on usage. Handout provides step by step directions with illustrations. iBoss from Phantom Technologies-Users can block access to specific programs and generates reports on Internet Activity which can be viewed automatically E-mailed. SnoopStick from CYBERsitter – Install on three computers can view activity on home computer from your office. OWN YOUR SPACE by Linda McCarthy book written for teenagers and internet usage.
  14. 17. Slide show created by: Fran Catlett, LMS/STC Kerri Hammons, Counselor Harmony Elementary Oldham County March 20, 2007 Edited by Carolyn Pitchford JBMS Allen County

×