Learning to Connect and Properly Navigate the Web



                                          Cathleen Richardson
       ...
The Internet: “The Network of All Networks”
Nobody really owns it - It is a
global collection of networks,
both big and sm...
What does this
 mean to me?
Statistics

 87% of teens aged 12 – 17 use the Internet.


 51% use the Internet daily.

                                 ...
Understand the NET
an d possible risks to
you... they are REAL!
“Instill a sense of caution, not a sense of fear.”
Internet
 Safety
Introduction

    Online Relationships

    Keep Personal Information Private

    Protect Your Reputation

    Cyber Bull...
Online
Relationships
You may not know the truth about someone
you first meet online.
Time does not equal trust or knowing the
person.
You can b...
Warning Signs

 If someone tries to isolate you from your family or friends.

 Turn you against your parents.

 Make you k...
Beware when someone says...
 “Let’s go private.”

 “Where’s your computer in the house?”

 “I know someone who can get you...
Never meet someone you first met online
Who is looking at you online?
DO NOT SAY ANYTHING ONLINE
THAT YOU WOULDN’T SAY OFFLINE.
Don’t give out personal information

  Never give out your personal identifying
  information or your families or friends,...
Use Privacy Settings
 Use the privacy settings
 such as “Friends Only”
 on any social
 networking site you are
 on.

 Only...
Think before posting pictures


Consider if it is a picture you want
everyone to see, including your
parents, teachers, la...
PUBLIC DOMAIN: KNOW YOUR COPYRIGHT LAWS
Sexting has real consequences
Check with your friends

Before posting pictures or information
about your friends, check with them first.
Always protect ...
Do not respond to offensive or embarrassing
  comments. Delete them and block that
 person from making additional comments.
Virtual Reality
Second Life
   Online 3D virtual world imagined and created by its Residents.




                                        ...
Teen Second Life
Social Networking
Facebook and MySpace
  Facebook and MySpace are social utilities that connects you with the people around you.




       ...
10,000 offenders
  only 3% caught when reported
http://www.facebook.com
• Facebook has serious consequences

 • Loss of jobs

 • Expulsion from school

 • Reputation, credibility, self-worth
Surveys
You Tube
   YouTube is a video sharing website where users can upload, view and share video clips.




                   ...
Twitter
   Twitter is a free social networking and micro-blogging service that allows users to send "updates" to
   the Tw...
Chat
Skype
  Skype is a software program that allows users to make telephone calls over the Internet. Budgets
                 ...
iChat A/V with built-in web cams
   iChat AV is an AOL Instant Messenger (AIM), .Mac, ICQ and XMPP client by Apple Inc. fo...
Person on the other side can record you...take
what you say out of context.

Saved in the chat log
If a person unknown to you was speaking to
 you in your front yard, what would you do?

If you were communicating with the...
Blogs and Wikis
Blogger
                                   Blogging
   A blog (an abridgment of the term weblog) is a website, usually mai...
Free Websites for Creating Blogs
                      •   Monitored or live...
Free websites for creating Blogs...monitor...
Google analytics: saved in cache and permanently
                Libel and Slander
Archive.org
Cyberbullying
• There are several ways that children threaten and/or
  harass others online. They may:
  •Send e-mails or instant messag...
Dealing with Cyberbullying

  Preserve evidence – this is crucial for identifying the bully and making a case.


  Attempt...
Parents
1.   Learn everything you can about computers, the Internet and related
     technology


     •   Develop and maintain pr...
4. Ensure that they do not divulge detailed personal
   information when completing “profiles” and minimize
   disseminati...
Consider Use of Computer/Internet Management Software:

  •   Age-based access levels – Allows for various levels of acces...
Parental Controls
Age Appropriate

  Under 8 - Children shouldn’t be using IM, chat rooms or
  blogs - period. Email should be restricted to...
13-15 - Respect their privacy even more. Give them more leeway
regarding IM, e-mail, chat and blogs. But check and account...
Warning Signs
Significantly increases on-line time.

Receives phone calls, email, mail or packages from someone you don't ...
Safety Tips
   Talk to a trusted adult if anything makes you
   feel scared, uncomfortable or confused.

   Do not respond...
Safety Tips

   Do not post personal information.

   Respect copyright laws and check your sources.

   Do not forward em...
Safety Tips

  Never download from anyone you don’t know.

  Beware of phishing scams: If you receive an
  email or bullet...
Keep in Mind...the Good Outweighs the Bad
Remember the 4 R’s

  Recognize techniques used by online predators to deceive
  their victims.

  Refuse requests for per...
QUESTIONS?
INTERNET SAFETY
INTERNET SAFETY
INTERNET SAFETY
INTERNET SAFETY
INTERNET SAFETY
INTERNET SAFETY
INTERNET SAFETY
INTERNET SAFETY
INTERNET SAFETY
INTERNET SAFETY
Upcoming SlideShare
Loading in...5
×

INTERNET SAFETY

629

Published on

The Internet has evolved into a collaborative environment where anyone can publish information as easily as viewing or downloading it. There are many powerful learning opportunities on the Internet and we want to ensure our students get the most of this valuable tool while being safe. This session includes introductions to the technologies, the benefits, the concerns, and proactive strategies for keeping students safe.

Published in: Education
1 Comment
1 Like
Statistics
Notes
No Downloads
Views
Total Views
629
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
1
Likes
1
Embeds 0
No embeds

No notes for slide

INTERNET SAFETY

  1. 1. Learning to Connect and Properly Navigate the Web Cathleen Richardson Apple Distinguished Educator New Media Educational Consultant Atlanta, Georgia
  2. 2. The Internet: “The Network of All Networks” Nobody really owns it - It is a global collection of networks, both big and small. These networks connect together in many different ways to form the single entity that we know as the Internet. In fact, the very name comes from this idea of interconnected networks.
  3. 3. What does this mean to me?
  4. 4. Statistics 87% of teens aged 12 – 17 use the Internet. 51% use the Internet daily. 200 45% of teens have cell phones and 38% are texting. 75% of online teens use instant messaging. 1 81% of online teens play online games.
  5. 5. Understand the NET an d possible risks to you... they are REAL!
  6. 6. “Instill a sense of caution, not a sense of fear.”
  7. 7. Internet Safety
  8. 8. Introduction Online Relationships Keep Personal Information Private Protect Your Reputation Cyber Bullying Safety Tips
  9. 9. Online Relationships
  10. 10. You may not know the truth about someone you first meet online. Time does not equal trust or knowing the person. You can be lied to or betrayed.
  11. 11. Warning Signs If someone tries to isolate you from your family or friends. Turn you against your parents. Make you keep secrets. Send inappropriate materials or talks about explicit subjects. Threaten you.
  12. 12. Beware when someone says... “Let’s go private.” “Where’s your computer in the house?” “I know someone who can get you a modeling job.” “Who’s your favorite band? Designer? Gear? “You seem sad. Tell me what’s bothering you.” “You are the love of my life.” “What’s your phone number?” “If you don’t…do what I ask, I’ll … tell your parents OR share your photos in a photo blog/Webcam directory/file-sharing network.
  13. 13. Never meet someone you first met online
  14. 14. Who is looking at you online?
  15. 15. DO NOT SAY ANYTHING ONLINE THAT YOU WOULDN’T SAY OFFLINE.
  16. 16. Don’t give out personal information Never give out your personal identifying information or your families or friends, such as name, address, telephone number, and school name in any public areas or in email unless you are sure you know the person.
  17. 17. Use Privacy Settings Use the privacy settings such as “Friends Only” on any social networking site you are on. Only allow people you know in real life on your friends list.
  18. 18. Think before posting pictures Consider if it is a picture you want everyone to see, including your parents, teachers, law enforcement and college admission officers. Remember that any picture you upload to the Web can be downloaded by anyone and be copied or posted online FOREVER.
  19. 19. PUBLIC DOMAIN: KNOW YOUR COPYRIGHT LAWS
  20. 20. Sexting has real consequences
  21. 21. Check with your friends Before posting pictures or information about your friends, check with them first. Always protect your privacy and theirs. Check to see what your friends are posting about you. If anything they have posted about you makes you uncomfortable, ask them to remove it.
  22. 22. Do not respond to offensive or embarrassing comments. Delete them and block that person from making additional comments.
  23. 23. Virtual Reality
  24. 24. Second Life Online 3D virtual world imagined and created by its Residents. http://www.secondlife.com
  25. 25. Teen Second Life
  26. 26. Social Networking
  27. 27. Facebook and MySpace Facebook and MySpace are social utilities that connects you with the people around you. http://www.facebook.com
  28. 28. 10,000 offenders only 3% caught when reported
  29. 29. http://www.facebook.com
  30. 30. • Facebook has serious consequences • Loss of jobs • Expulsion from school • Reputation, credibility, self-worth
  31. 31. Surveys
  32. 32. You Tube YouTube is a video sharing website where users can upload, view and share video clips. YouTube http://www.youtube.com
  33. 33. Twitter Twitter is a free social networking and micro-blogging service that allows users to send "updates" to the Twitter web site, via the Twitter web site, short message service (SMS), instant messaging, or a third-party application such as Twitterrific or Facebook. http://www.twitter.com
  34. 34. Chat
  35. 35. Skype Skype is a software program that allows users to make telephone calls over the Internet. Budgets Skype…talk to the world are tight. These are ways to take virtual field trips and also speak with experts. http://www.skype.com
  36. 36. iChat A/V with built-in web cams iChat AV is an AOL Instant Messenger (AIM), .Mac, ICQ and XMPP client by Apple Inc. for their Mac OS X operating system.
  37. 37. Person on the other side can record you...take what you say out of context. Saved in the chat log
  38. 38. If a person unknown to you was speaking to you in your front yard, what would you do? If you were communicating with the same stranger on-line, what would you do?
  39. 39. Blogs and Wikis
  40. 40. Blogger Blogging A blog (an abridgment of the term weblog) is a website, usually maintained by an individual, with regular entries of commentary, descriptions of events, or other material such as graphics or video. http://blogger.com
  41. 41. Free Websites for Creating Blogs • Monitored or live... Free websites for creating Blogs...monitored or live...private or public • Private or public Free Websites for Creating Blogs Search Engines read Blogs
  42. 42. Google analytics: saved in cache and permanently Libel and Slander
  43. 43. Archive.org
  44. 44. Cyberbullying
  45. 45. • There are several ways that children threaten and/or harass others online. They may: •Send e-mails or instant messages containing insults or threats directly to a person. •Spread hurtful comments about a person to others through e-mail, instant messaging or postings on web sites and blogs. •Steal passwords and send out threatening e-mails or instant messages using an assumed identity.
  46. 46. Dealing with Cyberbullying Preserve evidence – this is crucial for identifying the bully and making a case. Attempt to enlist assistance from the service provider. If able to identify the bully, contact him or her and/or parents. Use available blocking technology (i.e., block the user on IM, email and chat.) In serious cases, seek assistance from the police (i.e., threats of physical harm, unrelenting or unable to stop.)
  47. 47. Parents
  48. 48. 1. Learn everything you can about computers, the Internet and related technology • Develop and maintain proficiency through use. • Ask children to demonstrate. 2. Communicate with your children. • Take time to discuss concerns; agree on ground rules. • Understand their needs. • Set reasonable expectations. 3. Place the computer in a “well-trafficked” area, not a child’s bedroom or a secluded area.
  49. 49. 4. Ensure that they do not divulge detailed personal information when completing “profiles” and minimize dissemination. 5. Keep ALL accounts in your name. 6. Know your child’s password(s) and screen name(s). • Ensure that screen names do not provide information about his or her identity (e.g., Sarahsweet16.)
  50. 50. Consider Use of Computer/Internet Management Software: • Age-based access levels – Allows for various levels of access for different family members. • Filtering and Blocking (incoming and outgoing.) • Time Restrictions. • Activity Logs - Parents can view logs that list web sites visited, web sites blocked, chat sessions… Software can even capture screen shots and email messages to you if a rule is violated!
  51. 51. Parental Controls
  52. 52. Age Appropriate Under 8 - Children shouldn’t be using IM, chat rooms or blogs - period. Email should be restricted to only approved senders. 8-10 - If you add IM or chat, make sure only pre-approved senders can send to your child. No blogs! 10-12 - Give them more privacy, as long as it is with people you trust. Block all but pre-approved senders. Still no blogs!
  53. 53. 13-15 - Respect their privacy even more. Give them more leeway regarding IM, e-mail, chat and blogs. But check and account for everyone, in real life, on their buddy lists. No friends of friends! 16 and over - Parental involvement becomes difficult at best – if good judgment and communication have not been firmly established by now … all bets are off. If they have earned your trust, give it to them. If not, unplug the computer and take away their cell phones and interactive gaming devices.
  54. 54. Warning Signs Significantly increases on-line time. Receives phone calls, email, mail or packages from someone you don't know. Quickly exits IM, chat, email, websites and other activities when you are near. Increases use of new slang words, inappropriate sexual knowledge, withdraws from family and friends. Begins using new screen names, an online account belonging to someone else, etc. Is reluctant to discuss activities or your concerns.
  55. 55. Safety Tips Talk to a trusted adult if anything makes you feel scared, uncomfortable or confused. Do not respond to messages that are rude or offensive. Save messages that could be used by law enforcement as evidence.
  56. 56. Safety Tips Do not post personal information. Respect copyright laws and check your sources. Do not forward emails to “everyone” in your address book. Secure your password – do not share it, even with your best friend.
  57. 57. Safety Tips Never download from anyone you don’t know. Beware of phishing scams: If you receive an email or bulletin that requests your username and password or directs you to a website that asks personal information, DO NOT respond.
  58. 58. Keep in Mind...the Good Outweighs the Bad
  59. 59. Remember the 4 R’s Recognize techniques used by online predators to deceive their victims. Refuse requests for personal information. Respond assertively if you are ever in an uncomfortable situation while online. Exit the program, log off or turn off the computer… Report, to a parent or other trusted adult, any suspicious or dangerous contact that makes you uncomfortable.
  60. 60. QUESTIONS?

×