• Save
INTERNET SAFETY
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

INTERNET SAFETY

on

  • 781 views

The Internet has evolved into a collaborative environment where anyone can publish information as easily as viewing or downloading it. There are many powerful learning opportunities on the Internet ...

The Internet has evolved into a collaborative environment where anyone can publish information as easily as viewing or downloading it. There are many powerful learning opportunities on the Internet and we want to ensure our students get the most of this valuable tool while being safe. This session includes introductions to the technologies, the benefits, the concerns, and proactive strategies for keeping students safe.

Statistics

Views

Total Views
781
Views on SlideShare
777
Embed Views
4

Actions

Likes
1
Downloads
0
Comments
1

1 Embed 4

http://cre8tiveduservices.com 4

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

CC Attribution-NonCommercial LicenseCC Attribution-NonCommercial License

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • good presentation
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

INTERNET SAFETY Presentation Transcript

  • 1. Learning to Connect and Properly Navigate the Web Cathleen Richardson Apple Distinguished Educator New Media Educational Consultant Atlanta, Georgia
  • 2. The Internet: “The Network of All Networks” Nobody really owns it - It is a global collection of networks, both big and small. These networks connect together in many different ways to form the single entity that we know as the Internet. In fact, the very name comes from this idea of interconnected networks.
  • 3. What does this mean to me?
  • 4. Statistics 87% of teens aged 12 – 17 use the Internet. 51% use the Internet daily. 200 45% of teens have cell phones and 38% are texting. 75% of online teens use instant messaging. 1 81% of online teens play online games.
  • 5. Understand the NET an d possible risks to you... they are REAL!
  • 6. “Instill a sense of caution, not a sense of fear.”
  • 7. Internet Safety
  • 8. Introduction Online Relationships Keep Personal Information Private Protect Your Reputation Cyber Bullying Safety Tips
  • 9. Online Relationships
  • 10. You may not know the truth about someone you first meet online. Time does not equal trust or knowing the person. You can be lied to or betrayed.
  • 11. Warning Signs If someone tries to isolate you from your family or friends. Turn you against your parents. Make you keep secrets. Send inappropriate materials or talks about explicit subjects. Threaten you.
  • 12. Beware when someone says... “Let’s go private.” “Where’s your computer in the house?” “I know someone who can get you a modeling job.” “Who’s your favorite band? Designer? Gear? “You seem sad. Tell me what’s bothering you.” “You are the love of my life.” “What’s your phone number?” “If you don’t…do what I ask, I’ll … tell your parents OR share your photos in a photo blog/Webcam directory/file-sharing network.
  • 13. Never meet someone you first met online
  • 14. Who is looking at you online?
  • 15. DO NOT SAY ANYTHING ONLINE THAT YOU WOULDN’T SAY OFFLINE.
  • 16. Don’t give out personal information Never give out your personal identifying information or your families or friends, such as name, address, telephone number, and school name in any public areas or in email unless you are sure you know the person.
  • 17. Use Privacy Settings Use the privacy settings such as “Friends Only” on any social networking site you are on. Only allow people you know in real life on your friends list.
  • 18. Think before posting pictures Consider if it is a picture you want everyone to see, including your parents, teachers, law enforcement and college admission officers. Remember that any picture you upload to the Web can be downloaded by anyone and be copied or posted online FOREVER.
  • 19. PUBLIC DOMAIN: KNOW YOUR COPYRIGHT LAWS
  • 20. Sexting has real consequences
  • 21. Check with your friends Before posting pictures or information about your friends, check with them first. Always protect your privacy and theirs. Check to see what your friends are posting about you. If anything they have posted about you makes you uncomfortable, ask them to remove it.
  • 22. Do not respond to offensive or embarrassing comments. Delete them and block that person from making additional comments.
  • 23. Virtual Reality
  • 24. Second Life Online 3D virtual world imagined and created by its Residents. http://www.secondlife.com
  • 25. Teen Second Life
  • 26. Social Networking
  • 27. Facebook and MySpace Facebook and MySpace are social utilities that connects you with the people around you. http://www.facebook.com
  • 28. 10,000 offenders only 3% caught when reported
  • 29. http://www.facebook.com
  • 30. • Facebook has serious consequences • Loss of jobs • Expulsion from school • Reputation, credibility, self-worth
  • 31. Surveys
  • 32. You Tube YouTube is a video sharing website where users can upload, view and share video clips. YouTube http://www.youtube.com
  • 33. Twitter Twitter is a free social networking and micro-blogging service that allows users to send "updates" to the Twitter web site, via the Twitter web site, short message service (SMS), instant messaging, or a third-party application such as Twitterrific or Facebook. http://www.twitter.com
  • 34. Chat
  • 35. Skype Skype is a software program that allows users to make telephone calls over the Internet. Budgets Skype…talk to the world are tight. These are ways to take virtual field trips and also speak with experts. http://www.skype.com
  • 36. iChat A/V with built-in web cams iChat AV is an AOL Instant Messenger (AIM), .Mac, ICQ and XMPP client by Apple Inc. for their Mac OS X operating system.
  • 37. Person on the other side can record you...take what you say out of context. Saved in the chat log
  • 38. If a person unknown to you was speaking to you in your front yard, what would you do? If you were communicating with the same stranger on-line, what would you do?
  • 39. Blogs and Wikis
  • 40. Blogger Blogging A blog (an abridgment of the term weblog) is a website, usually maintained by an individual, with regular entries of commentary, descriptions of events, or other material such as graphics or video. http://blogger.com
  • 41. Free Websites for Creating Blogs • Monitored or live... Free websites for creating Blogs...monitored or live...private or public • Private or public Free Websites for Creating Blogs Search Engines read Blogs
  • 42. Google analytics: saved in cache and permanently Libel and Slander
  • 43. Archive.org
  • 44. Cyberbullying
  • 45. • There are several ways that children threaten and/or harass others online. They may: •Send e-mails or instant messages containing insults or threats directly to a person. •Spread hurtful comments about a person to others through e-mail, instant messaging or postings on web sites and blogs. •Steal passwords and send out threatening e-mails or instant messages using an assumed identity.
  • 46. Dealing with Cyberbullying Preserve evidence – this is crucial for identifying the bully and making a case. Attempt to enlist assistance from the service provider. If able to identify the bully, contact him or her and/or parents. Use available blocking technology (i.e., block the user on IM, email and chat.) In serious cases, seek assistance from the police (i.e., threats of physical harm, unrelenting or unable to stop.)
  • 47. Parents
  • 48. 1. Learn everything you can about computers, the Internet and related technology • Develop and maintain proficiency through use. • Ask children to demonstrate. 2. Communicate with your children. • Take time to discuss concerns; agree on ground rules. • Understand their needs. • Set reasonable expectations. 3. Place the computer in a “well-trafficked” area, not a child’s bedroom or a secluded area.
  • 49. 4. Ensure that they do not divulge detailed personal information when completing “profiles” and minimize dissemination. 5. Keep ALL accounts in your name. 6. Know your child’s password(s) and screen name(s). • Ensure that screen names do not provide information about his or her identity (e.g., Sarahsweet16.)
  • 50. Consider Use of Computer/Internet Management Software: • Age-based access levels – Allows for various levels of access for different family members. • Filtering and Blocking (incoming and outgoing.) • Time Restrictions. • Activity Logs - Parents can view logs that list web sites visited, web sites blocked, chat sessions… Software can even capture screen shots and email messages to you if a rule is violated!
  • 51. Parental Controls
  • 52. Age Appropriate Under 8 - Children shouldn’t be using IM, chat rooms or blogs - period. Email should be restricted to only approved senders. 8-10 - If you add IM or chat, make sure only pre-approved senders can send to your child. No blogs! 10-12 - Give them more privacy, as long as it is with people you trust. Block all but pre-approved senders. Still no blogs!
  • 53. 13-15 - Respect their privacy even more. Give them more leeway regarding IM, e-mail, chat and blogs. But check and account for everyone, in real life, on their buddy lists. No friends of friends! 16 and over - Parental involvement becomes difficult at best – if good judgment and communication have not been firmly established by now … all bets are off. If they have earned your trust, give it to them. If not, unplug the computer and take away their cell phones and interactive gaming devices.
  • 54. Warning Signs Significantly increases on-line time. Receives phone calls, email, mail or packages from someone you don't know. Quickly exits IM, chat, email, websites and other activities when you are near. Increases use of new slang words, inappropriate sexual knowledge, withdraws from family and friends. Begins using new screen names, an online account belonging to someone else, etc. Is reluctant to discuss activities or your concerns.
  • 55. Safety Tips Talk to a trusted adult if anything makes you feel scared, uncomfortable or confused. Do not respond to messages that are rude or offensive. Save messages that could be used by law enforcement as evidence.
  • 56. Safety Tips Do not post personal information. Respect copyright laws and check your sources. Do not forward emails to “everyone” in your address book. Secure your password – do not share it, even with your best friend.
  • 57. Safety Tips Never download from anyone you don’t know. Beware of phishing scams: If you receive an email or bulletin that requests your username and password or directs you to a website that asks personal information, DO NOT respond.
  • 58. Keep in Mind...the Good Outweighs the Bad
  • 59. Remember the 4 R’s Recognize techniques used by online predators to deceive their victims. Refuse requests for personal information. Respond assertively if you are ever in an uncomfortable situation while online. Exit the program, log off or turn off the computer… Report, to a parent or other trusted adult, any suspicious or dangerous contact that makes you uncomfortable.
  • 60. QUESTIONS?