Internet Safety for Parents


Published on

Internet training for parents

Published in: Education, Technology
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • INSTRUCTOR/PRESENTER NOTES (updated 1/5/06) Read the Internet Safety for Kids book online and recommend it to your audience. Anyone can download it for free at I bring the book with me to show to the audience – physical props are key for an adult audience. Don’t forget to print handouts and surveys for your attendees. Both documents can be found online at If you do not want to deal with the expense or hassle of printing out long handouts, perhaps you want to hand out the “Internet Safety for Kids Link List” document. This presentation is designed as a one-hour session. Your delivery time may vary. Consider adding your contact email address to this slide if you want to answer email questions after the presentation.
  • Internet Safety for Parents

    1. 1. Cyber Safety for Kids (a presentation for adults)
    2. 2. Warning <ul><li>Viewer discretion advised </li></ul><ul><ul><li>This presentation was designed for parents and guardians </li></ul></ul>
    3. 3. Objectives <ul><li>Open communication with your child about technology related safety issues </li></ul><ul><li>Make you aware of issues and offer insights into what to do and where to turn for resources </li></ul><ul><li>Not intended to discourage the use of technology </li></ul>
    4. 4. Topics to cover <ul><li>Basic computer/technology (wireless) issues 3 </li></ul><ul><li>Privacy 3 </li></ul><ul><li>Property 3 </li></ul><ul><li>Predators 5 </li></ul><ul><li>Social Networks 5 </li></ul><ul><li>Cyberbullying 5 </li></ul><ul><li>Can’t take it back 3 </li></ul><ul><li>Inappropriate Content 5 </li></ul><ul><li>Music and Video 5 </li></ul><ul><li>Games 3 </li></ul><ul><li>Cybersafety 5 </li></ul>
    5. 5. Basic computer/technology issues <ul><li>Location </li></ul><ul><li>Access </li></ul><ul><li>Filtering </li></ul><ul><li>History </li></ul><ul><li>Some Terminology </li></ul><ul><ul><li>POS (Parent Over Shoulder) </li></ul></ul><ul><ul><li>ASL (Age, Sex, Location) </li></ul></ul><ul><ul><li>LMIRL (Let’s Meet In Real Life) </li></ul></ul><ul><ul><li>Kan U $pEll Kre ate IVLY </li></ul></ul>
    6. 6. Privacy <ul><li>Identification </li></ul><ul><li>Personal information </li></ul><ul><li>https: </li></ul><ul><li>Spam </li></ul><ul><li>Email </li></ul>
    7. 7. Property <ul><li>Personal </li></ul><ul><li>Copyright </li></ul><ul><li>Music </li></ul><ul><li>Video </li></ul>
    8. 8. Predators <ul><li>Anonymity </li></ul><ul><li>Adults </li></ul><ul><li>Peers </li></ul><ul><ul><li>Cyberbullying </li></ul></ul>
    9. 9. Social Networks <ul><li>Myspace, facebook </li></ul><ul><li>Privacy </li></ul><ul><li>Friends </li></ul><ul><li>Gaming </li></ul>
    10. 10. Cyberbullies
    11. 11. You Can’t Take It Back <ul><li>Once something is posted it can be copied or downloaded by anyone </li></ul><ul><li>Dr. Phil </li></ul><ul><li> </li></ul><ul><li>You can be tracked online </li></ul>
    12. 12. Inappropriate Content <ul><li>Easily accessed </li></ul><ul><li>Enough is Enough ( </li></ul><ul><li>Use a filtering software tool </li></ul><ul><li>Turn on parent controls </li></ul><ul><li>Nettrekker </li></ul>
    13. 13. Online Gaming
    14. 14. Cybersafety <ul><li>Resources </li></ul>
    15. 15. Talk to your kids <ul><li>Technology can be EXTREMELY beneficial if used well </li></ul><ul><ul><li>Education </li></ul></ul><ul><ul><li>Communication </li></ul></ul><ul><ul><li>Entertainment </li></ul></ul><ul><ul><li>Publication </li></ul></ul><ul><ul><li>The world at your fingertips </li></ul></ul><ul><ul><li>Technology Savvy, Competency, Skill, Knowledge are needed in 2000 and beyond </li></ul></ul>
    16. 16. Contents <ul><li>Sample Cases </li></ul><ul><li>Cold Hard Facts about Technophilia </li></ul><ul><li>Cyber Child Sex Offender Terminology </li></ul><ul><li>Six Steps to Luring </li></ul><ul><li>Cyber Child Sex Offender Profiles </li></ul><ul><li>Most At-Risk </li></ul><ul><li>Advice for Parents </li></ul><ul><li>Resources </li></ul>
    17. 17. Is Your Child’s Information Online? <ul><li>Data mining training course entitled “Advanced Internet Research and Intelligence” is online </li></ul><ul><li>Visit > Archived Webcasts </li></ul><ul><li>Registration is free </li></ul><ul><ul><li> </li></ul></ul><ul><ul><li> </li></ul></ul>
    18. 18. Six Steps to Luring <ul><li>Based loosely on the MISSING Game available online at . </li></ul><ul><ul><li>Just Like You - Befriending </li></ul></ul><ul><ul><li>Making the offer </li></ul></ul><ul><ul><li>Incriminating evidence </li></ul></ul><ul><ul><li>Contact – the “honeymoon phase” </li></ul></ul><ul><ul><li>Guilt and threats as coercion </li></ul></ul><ul><ul><li>The truth emerges </li></ul></ul>
    19. 19. Groomers <ul><li>Most Internet luring instances begin with the process of ‘grooming’ – forming a trusting bond with the child. There are several types of groomers including: </li></ul><ul><ul><li>Romantic groomers </li></ul></ul><ul><ul><li>Aggressive groomers </li></ul></ul><ul><ul><li>Monetary/status groomers </li></ul></ul>
    20. 20. Befriending Techniques <ul><li>Chat room discussions </li></ul><ul><ul><li>Portrays same age, same likes, same dislikes </li></ul></ul><ul><ul><li>Portrays age-typical awkwardness </li></ul></ul><ul><ul><li>Begins to share some secrets </li></ul></ul><ul><li>Telephone </li></ul><ul><li>Email </li></ul><ul><li>Webcamming </li></ul><ul><li>Verbal Chat on Internet (Microphone) </li></ul>
    21. 21. Chat Room Tools <ul><li>MSN Messenger </li></ul><ul><li>ICQ (“I seek you”) </li></ul><ul><li>AOL Instant Messenger </li></ul><ul><li>Yahoo! Messenger & Yahoo Chat </li></ul><ul><li>mIRC (many Internet Relay Chat) </li></ul><ul><li>Recommendation: Tracking Teresa from NetSmartz ( ) </li></ul>
    22. 22. “ 13” is our fictitious character online
    23. 25. Advice for Parents <ul><li>- Detective James McLaughlin, Child Sexual Abuse and Exploitation, Keene Police Department </li></ul><ul><li>Know who is most “at risk. </li></ul><ul><li>Set up an agreement with your child about computer use (hours, access to chat lines, revealing personal information/photographs </li></ul><ul><li>Don’t rely solely on software to block/filter content. </li></ul><ul><li>Let your child know that reporting unwanted or suspicious solicitations won’t lead to restrictions on computer use. </li></ul>
    24. 26. Advice for Parents <ul><li>Know that restricting communications to a specific list of friends may not guarantee safe communications. </li></ul><ul><li>Be aware of restrictions at other computer locations – school, library, friends’ homes. </li></ul><ul><li>Look for the warning signs of offender manipulation – secretive behavior, histories being deleted, unexplained telephone charges, hang-up calls, unexpected mail, indications that the home is under surveillance. </li></ul><ul><li>Know how to monitor Internet use in a variety of ways. </li></ul>
    25. 27. Monitoring and Restricting Internet Use <ul><li>Internet Explorer’s Content Advisor </li></ul><ul><li>Content Protect, NetNanny, CYBERsitter, CyberPatrol, Cyber Sentinel, FilterPak, Cyber Snoop, etc. </li></ul><ul><li>Single Password </li></ul><ul><li>Cache and history </li></ul>
    26. 28. Get K9 Web Protection for Free <ul><li>What people are saying about K9 </li></ul><ul><li>Your K9 web protection program works really well. My daughter was giving out phone numbers in chat rooms and now can no longer access them. My son has a thing about pornography, stops him looking at that as well. </li></ul><ul><li> </li></ul>
    27. 29. Parental Resources <ul><li>Often focusing on a particular age group with the following typical grade groupings: </li></ul><ul><ul><ul><li>K-3 Children (age 6-9) </li></ul></ul></ul><ul><ul><ul><li>4-8 Kids (age 10-14) </li></ul></ul></ul><ul><ul><ul><li>9-12 Youth (age 15-18) </li></ul></ul></ul>
    28. 30. <ul><li>Created by the National Center for Missing and Exploited Children (NCMEC) </li></ul><ul><li> </li></ul><ul><ul><li>Age-grouped materials for K-3, 4-8 and 9-12 </li></ul></ul><ul><ul><li>Age-grouped pledge sheets for online use </li></ul></ul><ul><li>(see / ) </li></ul>
    29. 31. <ul><li>Julie's Journey : Julie left home for three weeks with a convicted murderer she had developed a relationship with online. </li></ul><ul><li>Amy's Choice : At 15, Amy left home to meet in person with a man she first met online. You can also read &quot;Amy's Story&quot; as told by her mother. </li></ul><ul><li>Tracking Teresa : Even though Teresa has tried not to reveal personal information online, she’s left enough clues that she could find herself in danger. </li></ul>
    30. 32. <ul><li>National Center for Missing and Exploited Children (NetSmartz was created by the NCMEC) </li></ul><ul><li>Online safety quiz for adults and children </li></ul><ul><li>Online terminology listing </li></ul><ul><li>CyberTipline – </li></ul><ul><li>1-800-843-5678 </li></ul>
    31. 33. (Intl) (US only) <ul><li>The MISSING Game </li></ul><ul><ul><li>Family kit (single CD) </li></ul></ul><ul><ul><li>Workshop kit (multiple-CD set) </li></ul></ul><ul><li>International orders filled by LiveWires Design </li></ul><ul><li>US orders filled at </li></ul><ul><li> </li></ul>
    32. 34. <ul><li>Designated as a non-profit and formed in 1998 to bring internet safety and education to the youth of the US </li></ul><ul><ul><li>Classroom curriculum </li></ul></ul><ul><ul><li>Community outreach </li></ul></ul><ul><ul><li>Youth empowerment program </li></ul></ul><ul><ul><li>Visible in all 50 states </li></ul></ul>
    33. 35. <ul><li>Child Quest has assisted in the safe return of over 2,900 individuals. They are recognized by local and national law enforcement agencies as an important element in the recovery effort. </li></ul><ul><li>Child Quest maintains an Internet Safety document online. For additional information, call CHILD QUEST INTERNATIONAL at (408) 287-4673. Printed booklets, educational materials and learning aids are available. </li></ul><ul><li>We also highly recommend Milk Cartons: The Way Back Home video which addresses predator tactics and child protection methods. </li></ul>
    34. 36. <ul><li>Protocol Analysis Institute Kids Project </li></ul><ul><li>Providing educational resources and presentation materials to parents and leaders for regionalized delivery of Internet Safety for Kids presentations </li></ul>