• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Our Digital World - A look at E-safety issues for teenagers

Our Digital World - A look at E-safety issues for teenagers



This is a presentation on esafety issues I give to parents at the school I work at. It covers common issues teenagers face as well as solutions and support for parents.

This is a presentation on esafety issues I give to parents at the school I work at. It covers common issues teenagers face as well as solutions and support for parents.



Total Views
Views on SlideShare
Embed Views



3 Embeds 185

http://ryecomputing.wordpress.com 109
http://www.scoop.it 72
https://twitter.com 4



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    Our Digital World - A look at E-safety issues for teenagers Our Digital World - A look at E-safety issues for teenagers Presentation Transcript

    • OUR DIGITAL WORLDBrian SharlandJune 26th
    • BRIAN SHARLANDTeach ICT and Computing at Rye@sharland@RyeComputinghttp://briansharland.com
    • ONLINE VERSION OF PRESENTATIONIN SCHOOLThis is an online version of a presentation I give inschoolThe slide numbers therefore begin slightly higher inorder to synchronise with the presentation I give.
    • OUR DIGITAL WORLDWhat is our digitalworld?Issues teenagers faceHow do we respond tothose issues?Further supportavailable
    • So what is our digital worldlike?
    • Are we living in a surveillanceera?
    • The internet isn’t a reflectionof a teenager’s lifeIt is their real life
    • Families
    • The Internet is a positivesystem
    • Creation
    • Connection
    • Understanding the world
    • What issues do teenagersface today?
    • There is NOprivacy on the internet
    • Your information will at somepoint be read by a human orcomputer and a decisionmade
    • Personal safety on the internetcan be compromised throughcareless words or actions
    • Cyber-bullies can leave youfeeling un-safe in your ownhome
    • Malicious communicationthrough texts, tweets and nowapps can impact youngsters
    • Careless actions can have animpact on financial securitysuch as theft of devices oraccess to accounts like iTunes
    • The internet IS real life
    • How do we deal with theseissues and in turn educate ourchildren?
    • Support
    • GOVERNMENT - CEOPCentre for Exploitation and Online Protection- Government cross agency department of SOCA- Significant resources to combat online child abuse- Many resources for schools and parents throughthinkuknowLINKS ON PAGE
    • GOVERNMENT - DCMSMaria Miller’s Internet summit- 1 million pounds was pledged by big Internetcompanies- To give more power and resources to the IWF charityLINKS ON PAGE
    • CHARITY – INTERNET WATCHFOUNDATIONInternet Watch Foundation- Charity in Cambridge- Remit is to ‘minimise the availabilty of potentiallycriminal content’- Essentially supplies information on website URLs tobe used by CleanFeedLINKS ON PAGE
    • CORPORATE - CLEANFEEDCleanfeed- Content filtering system used by ISPs such as BT toprevent access to certain sites outside the UK- Inside the UK sites are shut down- Government mandated- List content provided by IWFLINKS ON PAGE
    • SCHOOL - SMOOTHWALLSmoothwall- A range of powerful and customisable tools to filterInternet access at school- Removes access to inappropriate content and controlaccess to sites which could be a distractionLINKS ON PAGE
    • SCHOOL - ESAFETYWe also encourage pupils to report any issues to theirform tutors and also Mrs Neil- Documented and dealt with quickly- ICT and Computing lessons during the year look atesafety issues- Recently looked at Two-Factor Authentication with year 9s
    • @ home ?
    • SECURING YOUR COMPUTER ANDONLINE LIFE1. Passwords2. Security Software3. Home internet filtering
    • PASSWORDSHaving to remember Ty!89?ghjK for even one site ishard enoughUse a few complex passwords- Which are memorable but contain sufficient variation- !WldWlk500MilesChain a few words together-antelope50beach85south?Wiki article on password strength
    • SECURITY SOFTWAREHave decent well-reviewed security software installed- Norton, McAfee and Kaspersky for PC or Sophos forMacAVG free?- Would you use a free car?Pay the annual feeSecurity software reviewsLINKS ON PAGE
    • HOME-BASED INTERNET FILTERINGUSING OPENDNSOpenDNS provides family home filtering using DNSserversDNS servers are the ‘address books’ of the InternetAt a basic level filter adult sites, proxy servers, phisingsites and some malwareLINKS ON PAGE
    • TWO-FACTOR AUTHENTICATIONOne-factor authentication is the use of a password(something you know)2FA is the use of something you know and somethingyou have (a phone)When logging in to certain services you are sent a one-time only unique code to loginLINKS ON PAGE
    • TWO-FACTOR AUTHENTICATIONBenefit is added securityHowever don’t lose your phone!Popular services using 2FA include:- Google, Facebook, Twitter, Apple, Dropbox, Paypaland a few more
    • HOW TO USE 2FA EFFECTIVELYSet it up on at least one major service such as GoogleMailUse your Gmail account to setup other accounts suchas Facebook, Amazon etc
    • LOGIN NOTIFICATIONSSites like Facebook use theseThey show you if someone attempts to login to youraccount from another locationLINKS ON PAGE
    • 3RD-PARTY APPS AND SOCIALNETWORKSIn our connected world services like Facebook, Twitteretc allow access to 3rd party apps which can use someof their featuresFor example my Facebook account allows my tumblrblog to create a link on Facebook everytime I post totumblr.Certain apps can compromise your account if they postmessages to your followers or worse
    • MANAGING 3RD-PARTY APPSCheck your app settings on each of your socialnetworksFor example in Facebook use account settings tomanage which apps you have allowedRemove ones you are unsure about
    • METADATAMetadata is data about dataEg if I take a photo (data) the data about it wouldincludeTimestampCamera typePhoto settings and depending on the type of deviceCo-ordinates derived from GPSLINKS ON PAGE
    • GEOTAGGINGGeotagging is the process of attaching a GPS locationto a piece of digital content- Photo- Tweet- Foursquare checkinIt has benefits but also negatives – daughter posting apicture of herself at home online with photo geotagged?
    • DEALING WITH GEOTAGGINGCheck the settings on your child’s smartphone- An iPhone for example can turn location settings offApps such as Twitter also have flags for turning on/offgeotaggingLINKS ON PAGE
    • SHORT LINKS ON TWITTERDue to the length of twitter posts longer emailaddresses are often shortened such ashttp://community.computingatschool.org.uk/Is shortened to …http://bit.ly/OmnaufUse http://longurl.org to extend the address if you areunsure as to where it might lead youLINKS ON PAGE
    • MANAGING SMARTPHONES ANDTABLETSFor very young children use ‘Guided Access’ for iPadsUse gift vouchers to manage the purchase of appsUse the restrictions panel on an iPhone or iPad tomanage things like in-app purchasesManage the iTunes password yourself – this will controlthe apps downloadedLINKS ON PAGE
    • LOSING AN EXPENSIVE DEVICEFor Apple devices use iCloud and Find my iPhone tolocate missing devices, ping them or lock them downSimilar services can be purchased for Android devicesLINKS ON PAGE
    • MESSAGING ON SMARTDEVICESParents can’t do surveillance like the NSA can!Skype is reasonably popularMore popular are over-the-top messaging apps such asWhats-app or iMessage – text message servicesRecently popular is Snapchat
    • DEALING WITH INAPPROPRIATECOMMUNICATIONSGather evidence!If you are aware of the apps your children are usingfamiliarise yourself with how to collect evidenceTake that evidence to organisations like CEOP
    • SUMMARY OF SUGGESTIONSSecure Passwords and multiple levels of loginsUse one security suite but a range of extra toolsDiscuss with your children and show them you areknowledgeable as wellKnow what agencies can help if something doeshappen
    • IN CONCLUSIONEsafety will always be evolvingKeep on top of developments yourselfIncrease your trust in your children as they get older
    • FURTHER LINKShttp://www.childline.org.uk/https://delicious.com/briansharland/esafety - mybookmarks on e-safetyhttp://thinkuknow.co.ukGoogle security tools
    • Thank youAny questions?Continue the discussion @sharlandor athttp://ryecomputing.wordpress.com/esafety
    • Reading requires time andattention. Reading is a cognitive,mental, emotional action, andtoday it is under pressure from allthis speed of the Internet and thewhole digital world. The biggestprinciple of this world is speed,everything has to do with speed,that is how it is measured andthat is how it is lived. When youread a book or a poem or listen tomusic, there is a matter ofmoderation, of time. Thistechnology is an assault on time.Leon WieseltierJune 2013
    • Image credits• Minecraft image – screenshot from in-game• Image: Oklahoma tornadoreliefhttp://www.flickr.com/photos/39513508@N06/8867770414