• Like
  • Save
Presentation to parents
Upcoming SlideShare
Loading in...5
×
 

Presentation to parents

on

  • 4,190 views

How access to internet should be managed

How access to internet should be managed

Statistics

Views

Total Views
4,190
Views on SlideShare
4,181
Embed Views
9

Actions

Likes
3
Downloads
0
Comments
0

3 Embeds 9

http://www.slideshare.net 4
http://www.child-central.com 3
http://aboutsn.wikispaces.com 2

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Presentation to parents Presentation to parents Presentation Transcript

  • Tough being a parent at any time
  • Every parent generation had it’s own issues
    • Don’t walk on the track, the horse and carts will run over you
    • Don’t watch too much TV you’ll get square eyes
    • Don’t talk to strangers
    • Don’t get in a stranger’s car
    • Don’t do drugs
  • Now we have... Screenagers
    • Millennial Generation
    • Next Gen
    • Net Generation
    • Generation Y
    • Nexters
    • Nintendo Generation
    • Digital Generation
    • Digital Natives
    • Echo Boomers
    • Never just plain “School Kids”
    12-18 year old: Preference for communicating and community building / networking electronically via screens (computers, mobile phones)
  •  
  • Web 2.0 as Community
    • W
    • E
    • B
    • 2.0
    • C
    • O
    • M
    • M
    • U
    • N
    • I
    • T
    • Y
  • How to be sensible on-line
  • What is Cyber Crime
    • Cyber crime is the use of computers and other electronic communication systems, such as mobile phones, to commit traditional crimes.
    • Stalking generally involves following a person about, making harassing contact and leaving written messages.
    • Cyber stalking involves following a person's movements across the internet, visiting the same chat rooms, leaving messages on message boards and sometimes encouraging third party harassment of the victim.
  • What is intimidation?
    • Intimidation is conduct amounting to harassment, including repeatedly troubling or disturbing someone.
    • Cyber harassment includes:
    • sending viruses or high volumes of electronic junk mail (spam)
    • making annoying phone calls
    • sending obscene or threatening mail or text messages
  • Intimidation (Continued)
    • sending defamatory information to the victim's acquaintances
    • placing messages on message boards or in chat rooms, which contain defamatory, embarrassing or personal information about the victim
    • setting up, or hacking into, websites to post information or photos without the victim's permission. Sometimes with the intent to cause hatred.
    • It is a crime to give out false and misleading information about a person.
  • Cyber Stalking/Harassment
    • How does someone harass another person using the Internet, email or phone?
    • By:
    • sending unwanted messages to torment, upset, threaten or incite hatred
    • posting a picture or information that is offensive, defamatory or embarrassing
    • hacking into websites
    • Setting up a website that’s not your own – making it with someone else’s name
  • Cyber Stalking (continued)
    • spreading rumours
    • logging onto an online forum as someone else and causing mischief
    • following someone from chat room to chat room
    • excluding them from chatting
    • twisting what the person writes in chat rooms
    • sending text messages
  • Cyber Laws
    • Parts of the Commonwealth Crimes Act 1914 have been updated to include crimes that use modern technologies. It is now a criminal offence to cyber bully. The relevant sections are quoted below.
    • Section 474.14: Using a telecommunications network with intent to commit a serious offence. It is an offence to connect to a network with the intent or to actually use the equipment with the intent to commit a serious offence.
    • Section 474.17: Using a carriage service to menace, harass or cause offence. It is an offence to use a carriage service in a way that a reasonable person would regard as being menacing, harassing or offensive. For example a person who continually rings and hangs up would be covered in this section.
  • Review
    • Cyber crimes are real crimes with real consequences.
    • We all have the right to be safe on the internet but we need to take precautions such as not giving out information about ourselves.
    • Harassing a person does not solve the issue you have with them.
    • If someone harasses you or approaches you on the internet to meet them, tell an adult that you trust .
  • If offender is under 18
    • Young Offenders Act
    • Charged at court Youth Justice Conference
    • Caution
    • Warning
    Police Record Criminal Record
  • NEVER
    • Open up emails, files, or web pages that you get from people you don’t really know or trust.
    • Ever give out your password, except to responsible adults in your family.
    • Use a handle or nickname that may attract the wrong attention e.g. ‘sweet_teen’ and ‘sexy_girl’
    • Somebody online says something to you that makes you feel uncomfortable
    • Somebody online sends you something that makes you feel uncomfortable
    • You see something online that makes you feel uncomfortable
    TELL your parents, older brother/sister or trusted adult if...
    • Follow your family’s rules for the internet.
    • They are there to make sure you have fun and stay safe online.
    ALWAYS
  • Look at this girl’s display name. Look at the picture she has on display. This is going to give her unwanted attention. She is only 16 years of age. It looks like she is selling sex. Her profile has been viewed 20699 times.
  • This Profile has displayed the young persons full name, date of birth and suburb where he lives. This site has been viewed 3712 times .
  •  
  •  
  • NEVER
    • Email a picture of yourself to strangers or put a picture of yourself on your chat profile.
    • Activate your webcam to anyone you do not know in person or have just met on the internet.
    • NEVER show yourself undressed on webcam or photos
  • Don’t ever give out the following information
    • Your last name
    • Your phone number (home or mobile)
    • Your private email address
    • Your home address
    • What school you go to
    • Sporting locations you attend
    • Your parent’s work location
  • Fun thing to do with Mum and Dad
    • www.idthecreep.com
  • I think we promised tips…
  • A few observations
    • This is about life, not technology.
    • Problem-solving needs to be as interactive as the problem.
    • Managing instead of controlling.
    • Banning works less than ever .
    We have begun the ongoing education The 4 th R = responsibility
  • Social Networking Tips for Teens
    • Post only information that you are comfortable with others seeing and knowing about you.
    • Be as anonymous as possible
    • Protect your information
    • Avoid in-person meetings
    • Consider not posting your picture. Think before posting
    • Be honest about your age
  • Social Networking Tips for Parents
    • Set reasonable expectations
    • Be open with your teens and encourage them to come to you if they have a problem online
    • Talk with your kids
    • All online activity takes place in a central home location
    • Have your kids share their blogs or online profiles with you
  • Top Safety Tips
    • First educate yourself, then your child.
    • Teach children the obvious identity rules.
    • Know the dangers associated with sites your children frequent.
    • Teach children what to do if they encounter pornography on a home or public computer, such as at a school or a library.
  • Top Safety Tips (cont)…
    • Manage your children’s time on the Internet.
    • Set specific Internet guidelines for your children to live by and consistently enforce consequences.
    • Keep computers out of children’s bedrooms and in open areas.
    • Create a relationship with your children that is conducive to open communication.
    • Understand Internet Privacy Policies as they apply to your child.
  • Questions
    • Q?
  • Text and Instant Messaging Abbreviations
    • PPL
    • JK
    • NP
    • BTW
    • TMW
    • WAM
    • WOMBAT
    • L8R
    • LYLAS
    • ASL
    • GF
    • IDK
    • RME
    • TTYL
    • BC or B/C
    • ATM
  • Text and Instant Messaging Abbreviations
    • PPL – people
    • JK – just kidding
    • NP – no problem
    • BTW – by the way
    • TMW - tomorrow
    • WAM – wait a minute
    • WOMBAT – waste of money, brains & time
    • FYI – for your information
    • LYLAS – love ya like a sister
    • ASL – age/sex/location
    • GF – girl friend
    • IDK – I don’t know
    • RME – rolling my eyes
    • L8R – later
    • BC or B/C – because
    • ATM – at the moment
  • Changing the Language …
    • So, wats up? How ru ? I cant believe he sez dat stuff bout u - wats up w/dat ? Puleez gimme a break. Cmon … ur kewl and all dat . So, I gtg … the rents r callin me. C ya l8r k? Byee
  • J: romeo u there R: yo wassup J: nothin’, u? R: skool sucked 2day J: heard wylander got mad at u R: what a jerk i used purpl ink on the sci test and he got pissed he lookjs like jimminy crickt J: lol R: going to nicks party J: cant i’m grounded R: y J: cardoza called home, sez im failig Spanish btw my rents hate u R: mine hate u 2 J: my dads coming gtg R: k bye J: xoxoxoxo bye see u tmw R: xoxoxoxoxoxoxo gtg J: k