SlideShare a Scribd company logo
1 of 32
Using Technology
     Safely

      Paul O’Briant
    paul@obriant.net
www.21stCenturySheep.com
Do you love me? Tend my
        sheep.
           2
               John 21:16
Inappropriate content,
 contact, conduct
• 5 million Americans
  watch Major League
  Baseball




                        • 40 million Americans
                         regularly access internet
                                    porn
In 2009 over half of male college
  students and nearly a third of
  female students report being
 exposed to pornography before
their teenage years (by age 12),
and 35% of all students say their
  first exposure .was Internet or
         computer-based.
         Porn University, Michael Leahy
www.MartinLutherKing.org
Viruses – Malware- Spyware - Scareware
Inappropriate Contact
GeoTags
Inappropriate Conduct
• 33 percent of youth
Cyberbullying          have been victims
                     • 34 percent of youth
                       who are bullied feel
                       frustrated, 30 percent
                       angry and 22 percent
                       feel sad
                     • 41 percent of victims
                       do not tell anyone in
                       their off-screen lives
                       about their abuse
                     •   Cyberbullying.us




                14
2% of teens say they have sent a nude or
partially nude photo or video

 www.athinline.org




 16% of teens says they have received one
• 1/3 teens ages 16-17 say they have
         texted while driving. Pew
• A driver is 23 times more likely to have
  an accident when 16 texting and driving.
Cyber-Crime




      www.ic3.gov
18
Where do you start?
•   Can’t claim ignorance
•   Talk about the issues
•   Cybersafety rules
•   Model good behavior
•   Limit access

       www.onguardonline.gov
www.CovenantEyes.com

    Resources/eBooks
Technical Strategies

          • Parental Controls
            filtering/monitoring
            software
          • Safe search options
          • Check History
Safe Search
• Use antivirus and
  anti-malware software
• Keep operating
  systems up to date
Filtering is not enough
Parental Controls
•   www.ActionAlert.com (free)
•   www.NetNanny.com
•   http://parentalcontrolbar.com/ (free)
•   http://www1.k9webprotection.com/
    (free)
Using Technology
     Safely

      Paul O’Briant
    paul@obriant.net
www.21stCenturySheep.com

More Related Content

Viewers also liked

Deploying the producer consumer problem using homogeneous modalities
Deploying the producer consumer problem using homogeneous modalitiesDeploying the producer consumer problem using homogeneous modalities
Deploying the producer consumer problem using homogeneous modalitiesFredrick Ishengoma
 
Chapter 4
Chapter 4Chapter 4
Chapter 4detjen
 
Drucker chapter 3
Drucker chapter 3Drucker chapter 3
Drucker chapter 3detjen
 
Arte a medio dibujar
Arte a medio dibujarArte a medio dibujar
Arte a medio dibujarmaugepe
 
Chapter 13
Chapter 13Chapter 13
Chapter 13detjen
 
Cyber safety, technology and the church
Cyber safety, technology and the churchCyber safety, technology and the church
Cyber safety, technology and the churchPaul OBriant
 
Luxembourg Blockchain Meetup 13 July 2016 - Bertolo
Luxembourg Blockchain Meetup 13 July 2016 - BertoloLuxembourg Blockchain Meetup 13 July 2016 - Bertolo
Luxembourg Blockchain Meetup 13 July 2016 - BertoloStefano Bertolo
 
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...Fredrick Ishengoma
 
Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...
Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...
Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...Fredrick Ishengoma
 
Staying safe online
Staying safe onlineStaying safe online
Staying safe onlinePaul OBriant
 
Fredrick Ishengoma - HDFS+- Erasure Coding Based Hadoop Distributed File System
Fredrick Ishengoma -  HDFS+- Erasure Coding Based Hadoop Distributed File SystemFredrick Ishengoma -  HDFS+- Erasure Coding Based Hadoop Distributed File System
Fredrick Ishengoma - HDFS+- Erasure Coding Based Hadoop Distributed File SystemFredrick Ishengoma
 

Viewers also liked (12)

Deploying the producer consumer problem using homogeneous modalities
Deploying the producer consumer problem using homogeneous modalitiesDeploying the producer consumer problem using homogeneous modalities
Deploying the producer consumer problem using homogeneous modalities
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Drucker chapter 3
Drucker chapter 3Drucker chapter 3
Drucker chapter 3
 
Arte a medio dibujar
Arte a medio dibujarArte a medio dibujar
Arte a medio dibujar
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Cyber safety, technology and the church
Cyber safety, technology and the churchCyber safety, technology and the church
Cyber safety, technology and the church
 
Luxembourg Blockchain Meetup 13 July 2016 - Bertolo
Luxembourg Blockchain Meetup 13 July 2016 - BertoloLuxembourg Blockchain Meetup 13 July 2016 - Bertolo
Luxembourg Blockchain Meetup 13 July 2016 - Bertolo
 
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...
 
Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...
Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...
Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...
 
Using tech safely
Using tech safelyUsing tech safely
Using tech safely
 
Staying safe online
Staying safe onlineStaying safe online
Staying safe online
 
Fredrick Ishengoma - HDFS+- Erasure Coding Based Hadoop Distributed File System
Fredrick Ishengoma -  HDFS+- Erasure Coding Based Hadoop Distributed File SystemFredrick Ishengoma -  HDFS+- Erasure Coding Based Hadoop Distributed File System
Fredrick Ishengoma - HDFS+- Erasure Coding Based Hadoop Distributed File System
 

Similar to Dakotas Parent Meeting Presentation

How to stay safe online p2
How to stay safe online p2How to stay safe online p2
How to stay safe online p2Typho8000
 
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...Teens, Online Stranger Contact & Cyberbullying - What the research is telling...
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...soissues
 
Teens Strangers Amanda Lenhart
Teens Strangers Amanda LenhartTeens Strangers Amanda Lenhart
Teens Strangers Amanda LenhartJorge Borges
 
Facebook and your child
Facebook and your childFacebook and your child
Facebook and your childlissecondary
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationspringvillegi
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationjpl17
 
Cranleigh School Technology & Teenage Mental Health Conference: Laura Bates
Cranleigh School Technology & Teenage Mental Health Conference: Laura BatesCranleigh School Technology & Teenage Mental Health Conference: Laura Bates
Cranleigh School Technology & Teenage Mental Health Conference: Laura BatesCranleigh School
 
Mc afee digital deception study 2013
Mc afee digital deception study 2013Mc afee digital deception study 2013
Mc afee digital deception study 2013PNMI
 
Social media and its effects on youth -sb
Social media and its effects on youth -sbSocial media and its effects on youth -sb
Social media and its effects on youth -sbSachin Dahiya
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet SafetyJVGAJJAR
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet SafetySage Lewis
 
Internet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupInternet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupScott Burnett
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
APA IPS 2011 - Workshop 07
APA IPS 2011 - Workshop 07APA IPS 2011 - Workshop 07
APA IPS 2011 - Workshop 07TristanLG
 

Similar to Dakotas Parent Meeting Presentation (20)

How to stay safe online p2
How to stay safe online p2How to stay safe online p2
How to stay safe online p2
 
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...Teens, Online Stranger Contact & Cyberbullying - What the research is telling...
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...
 
Facebook and Your Child
Facebook and Your ChildFacebook and Your Child
Facebook and Your Child
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
Youth, Sex & the Internet: What practitioners need to know
Youth, Sex & the Internet:  What practitioners need to knowYouth, Sex & the Internet:  What practitioners need to know
Youth, Sex & the Internet: What practitioners need to know
 
Teens Strangers Amanda Lenhart
Teens Strangers Amanda LenhartTeens Strangers Amanda Lenhart
Teens Strangers Amanda Lenhart
 
Facebook and your child
Facebook and your childFacebook and your child
Facebook and your child
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Cranleigh School Technology & Teenage Mental Health Conference: Laura Bates
Cranleigh School Technology & Teenage Mental Health Conference: Laura BatesCranleigh School Technology & Teenage Mental Health Conference: Laura Bates
Cranleigh School Technology & Teenage Mental Health Conference: Laura Bates
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Mc afee digital deception study 2013
Mc afee digital deception study 2013Mc afee digital deception study 2013
Mc afee digital deception study 2013
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Social media and its effects on youth -sb
Social media and its effects on youth -sbSocial media and its effects on youth -sb
Social media and its effects on youth -sb
 
Web safety
Web safetyWeb safety
Web safety
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet Safety
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet Safety
 
Internet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupInternet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life group
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
APA IPS 2011 - Workshop 07
APA IPS 2011 - Workshop 07APA IPS 2011 - Workshop 07
APA IPS 2011 - Workshop 07
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Dakotas Parent Meeting Presentation

  • 1. Using Technology Safely Paul O’Briant paul@obriant.net www.21stCenturySheep.com
  • 2. Do you love me? Tend my sheep. 2 John 21:16
  • 3.
  • 5. • 5 million Americans watch Major League Baseball • 40 million Americans regularly access internet porn
  • 6.
  • 7. In 2009 over half of male college students and nearly a third of female students report being exposed to pornography before their teenage years (by age 12), and 35% of all students say their first exposure .was Internet or computer-based. Porn University, Michael Leahy
  • 9. Viruses – Malware- Spyware - Scareware
  • 11.
  • 14. • 33 percent of youth Cyberbullying have been victims • 34 percent of youth who are bullied feel frustrated, 30 percent angry and 22 percent feel sad • 41 percent of victims do not tell anyone in their off-screen lives about their abuse • Cyberbullying.us 14
  • 15. 2% of teens say they have sent a nude or partially nude photo or video www.athinline.org 16% of teens says they have received one
  • 16. • 1/3 teens ages 16-17 say they have texted while driving. Pew • A driver is 23 times more likely to have an accident when 16 texting and driving.
  • 17. Cyber-Crime www.ic3.gov
  • 18. 18
  • 19. Where do you start? • Can’t claim ignorance • Talk about the issues • Cybersafety rules • Model good behavior • Limit access www.onguardonline.gov
  • 20.
  • 21.
  • 22. www.CovenantEyes.com Resources/eBooks
  • 23.
  • 24.
  • 25. Technical Strategies • Parental Controls filtering/monitoring software • Safe search options • Check History
  • 26.
  • 27.
  • 29. • Use antivirus and anti-malware software • Keep operating systems up to date
  • 31. Parental Controls • www.ActionAlert.com (free) • www.NetNanny.com • http://parentalcontrolbar.com/ (free) • http://www1.k9webprotection.com/ (free)
  • 32. Using Technology Safely Paul O’Briant paul@obriant.net www.21stCenturySheep.com