Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
 Welcome Internet Landscape Dangers on the Internet Internet Predators Cyberbullying Personal profiles Internet Cha...
―everything that‘s already in the world whenyou‘re born is just normal;anything that gets invented between then andbefore ...
The Internet has dramatically changed ourworld and is a part of our everyday livesADULTS’ VIEW Communication – email, tex...
The Internet has dramatically changed ourworld and is a part of our everyday livesSTUDENTS’ VIEW Communication – texting,...
 In May 2009, children aged 2-11 madeup nearly 10% of the active onlineuniverse (Nielsen, 2010). 18% of 8 – 10 year olds...
1. Predators--social networking sites, chat rooms2. Data theft--stolen passwords, addresses, SocialSecurity numbers, credi...
 Educate parents Educate students
 13% of youth ages 10 to 17 receivedunwanted solicitations in 2006; thisdecreased from 19% in 2001 Most youth handled un...
 Cyberbullying is emerging as one of themore challenging issues facingeducators and parents as young peopleembrace the In...
 Outing and Trickery – Sharing someone‘ssecrets or embarrassing information orimages online Exclusion – Intentionally ke...
 Flaming – Online ―fights‖ using electronicmessages with inappropriate language Harassment – Repeatedly sendingoffensive...
 Tell your child not to respond to rude e-mails, messages, andcomments. Save the evidence, such as e-mail and text messa...
 ―Google‖ yourself› Type in first and last name, email addresses,screen names, addresses, phone numbers› search for image...
 Facebook ,Myspace› Age requirements “No information from children under age 13.”› Public vs Private› Know who you add: ...
 Takes advantage of the privacy settings Parent pre-approve of all pictures and videos Remind your child› never to post...
 Text messaging Chat rooms Instant messaging (‗IMing‘) Online gaming – gaming devices Message boards Blogs and wikis
 SMS (short message service) aka texting Wikipedia and netlingo.com list ofinternet slang› http://en.wiktionary.org/wiki...
 Online: Webkinz, Neopets, Miniclip, Gaming systems: PSP, Xbox Live, PS3, Wii Handheld devices: Ipod touch, Ipad, cellp...
 Know the safety features on the gaming equipment that yourchild uses—a headset may have voice-masking features, forexamp...
 About 75% of teens (12-17) carry cellphones 1 in 3 teens (13-19) use their cell phoneto surf the web Results from Teen...
 Review cell phone records for any unknownnumbers and late night phone calls and texts. Remind your child that texting i...
 At+T› Phones and internet:http://www.att.net/s/s.dll?ep=1659430&ch=smct/smct_is Verizon› https://wbillpay.verizonwirele...
 Music Downloads› Napster› Itunes› Kazaa› WinMX› Limewire› etorrent Copyright Material Identity Theft Website Validity...
 Computer system› Keeping bad stuff (predatory software) out– keeping valuables(personal information) in Malicious codes...
 www.cyberpatrol.com www.netnanny.com www.spectorsoft.com www.cybersitter.com www.covenanteyes.comAnti spyware and ad...
 Video from www.commonsense.org› http://www.commonsensemedia.org/advice-for-parents/rules-road-parents-digital-age
 Guard your identity› Make username generic and anonymous› Little information is needed to get to knowyou Monitor your c...
 Know child‘s ―online friends‖ Don‘t overreact to anything your childtells you (fear you will take computeraway) Never ...
 www.netsmartz.org www.isafe.org http://www.commonsensemedia.org/educators/parent-media-education http://www.kidsmart....
 http://www.thinkuknow.co.uk/default.aspx www.illinoisicac.org www.internet-safety.org www.safekids.com
 http://www.bbc.co.uk/cbbc/help/safesurfing/ www.wiredkids.org/index.html www.wiredsafety.org www.fbi.gov/publications...
 http://www.cyberbullying.us/research.php Bullying, Beyond the Schoolyard, byHinduja and Patchin http://www.cnet.com/45...
Thank you for your attendance attoday‘s presentation!Make sure you have signed in before youleavePowerpoint link:
Internet safety presentation 2013
Internet safety presentation 2013
Internet safety presentation 2013
Internet safety presentation 2013
Internet safety presentation 2013
Internet safety presentation 2013
Internet safety presentation 2013
Internet safety presentation 2013
Internet safety presentation 2013
Internet safety presentation 2013
Internet safety presentation 2013
Upcoming SlideShare
Loading in …5
×

Internet safety presentation 2013

1,309 views

Published on

Published in: Education, Technology
  • Be the first to comment

Internet safety presentation 2013

  1. 1.  Welcome Internet Landscape Dangers on the Internet Internet Predators Cyberbullying Personal profiles Internet Chat Gaming Cell phones Plagiarism & IntellectualProperty MaliciousCodes, Viruses, andSpyware Parent Tips andresources Q & A
  2. 2. ―everything that‘s already in the world whenyou‘re born is just normal;anything that gets invented between then andbefore you turn thirty is incredibly exciting andcreative and with any luck you can make acareer out of it;anything that gets invented after you‘re thirty isagainst the natural order of things and thebeginning of the end of civilization as we know ituntil it‘s been around for about ten years when itgradually turns out to be alright really.‖
  3. 3. The Internet has dramatically changed ourworld and is a part of our everyday livesADULTS’ VIEW Communication – email, texting Shopping and services (booking travel) Financial management News and product research Entertainment – videos, music, games
  4. 4. The Internet has dramatically changed ourworld and is a part of our everyday livesSTUDENTS’ VIEW Communication – texting, instantmessaging, email Entertainment – games, music, videos Research – homework, study sites
  5. 5.  In May 2009, children aged 2-11 madeup nearly 10% of the active onlineuniverse (Nielsen, 2010). 18% of 8 – 10 year olds spend time onsome kind of social networking site daily(Kaiser, 2010). http://www.commonsensemedia.org/sites/default/files/internetsafetyelem-tip.pdf
  6. 6. 1. Predators--social networking sites, chat rooms2. Data theft--stolen passwords, addresses, SocialSecurity numbers, credit card numbers, and otherfinancial information3. Malicious software (also known as malware)--adware, spyware, viruses, phishing scams4. Inappropriate content--pornography, contentfocused on violence, hate propaganda5. Cyberbullying--bullying peers via instant messages,social networking sites, online gameshttp://www.cnet.com/4520-13384_1-6721368-1.html
  7. 7.  Educate parents Educate students
  8. 8.  13% of youth ages 10 to 17 receivedunwanted solicitations in 2006; thisdecreased from 19% in 2001 Most youth handled unwantedsolicitations easily and effectively byignoring, blocking solicitors or leaving thesite 2006 study by the Crimes Against Children Research Center at the University ofNew Hampshire Youth report that solicitation occursmore frequently by other minors thanadult strangers Internet Safety Technical Task Force in 2008
  9. 9.  Cyberbullying is emerging as one of themore challenging issues facingeducators and parents as young peopleembrace the Internet and other mobilecommunication technologies.
  10. 10.  Outing and Trickery – Sharing someone‘ssecrets or embarrassing information orimages online Exclusion – Intentionally keepingsomeone from being able to take part inan online group, such as a ―buddy list.‖ Cyberstalking – Repeatedly sendingunwanted messages that may includethreats of harm; intimidating
  11. 11.  Flaming – Online ―fights‖ using electronicmessages with inappropriate language Harassment – Repeatedly sendingoffensive, rude, and insulting messages Denigration – Sending or posting gossipor rumors about a person Impersonation – Posing to be someoneelse and making them look bad
  12. 12.  Tell your child not to respond to rude e-mails, messages, andcomments. Save the evidence, such as e-mail and text messages, andtake screenshots of comments and images. Also, take note ofthe date and time when the harassment occurs. Contact your Internet service provider (ISP) or cell phoneprovider. Ask the website administrator or ISP to remove anyWeb page created to hurt your child. If harassment is via e-mail, social networking sites, IM, andchat rooms, instruct your child to ―block‖ bullies or delete yourchild‘s current account and open a new one. Check out phone features that may allow the number to beblocked. Make a report to www.cybertipline.com, and if you feelsomething illegal has occurred, inform law enforcement Information from Netsmartz Kids: http://www.netsmartz.org/Cyberbullying
  13. 13.  ―Google‖ yourself› Type in first and last name, email addresses,screen names, addresses, phone numbers› search for images as well
  14. 14.  Facebook ,Myspace› Age requirements “No information from children under age 13.”› Public vs Private› Know who you add: friends vs cyberfriends› Have access to your child‘s site› Be conscientious of pictures/videos Protecting reputations online, in plain English(commoncraft.com)
  15. 15.  Takes advantage of the privacy settings Parent pre-approve of all pictures and videos Remind your child› never to post e-mail addresses or cell phonenumbers.› passwords should only be shared with parents andguardians.› Do not respond to any e-mails requesting personalinformation and to delete e-mails from unknownsenders. Discuss how to keep screen names and e-mailaddresses gender-neutral, appropriate, and free of anyinformation that could reveal identity. Encourage your child to tell you right away if anythinghappens online that bothers or frightens him or her. Information from Netsmartz Kids: http://www.netsmartz.org/RevealingTooMuch
  16. 16.  Text messaging Chat rooms Instant messaging (‗IMing‘) Online gaming – gaming devices Message boards Blogs and wikis
  17. 17.  SMS (short message service) aka texting Wikipedia and netlingo.com list ofinternet slang› http://en.wiktionary.org/wiki/Appendix:Internet_slang› http://www.netlingo.com/acronyms.phpLOLBRBPOSASL
  18. 18.  Online: Webkinz, Neopets, Miniclip, Gaming systems: PSP, Xbox Live, PS3, Wii Handheld devices: Ipod touch, Ipad, cellphones
  19. 19.  Know the safety features on the gaming equipment that yourchild uses—a headset may have voice-masking features, forexample. Keep gaming consoles in an easy-to-supervise location Be aware of other places where your child may be accessinggames. Tell your child never to give out personal information whilegaming or agree to meet anyone outside of the game. Teach your child not to respond to anyone who is being rudeor bullying while playing the game. Set rules for how long your child may play, what types ofgames are appropriate, and who else may participate. Have your child check with you before using a credit or debitcard online. Check to see if the games your child plays have reportingfeatures or moderators. Information from Netsmartz Kids: http://www.netsmartz.org/Gaming
  20. 20.  About 75% of teens (12-17) carry cellphones 1 in 3 teens (13-19) use their cell phoneto surf the web Results from Teens and Mobile phones, Pew Internet and Amerian LifeProject, 2010 A Generation Unplugged, Harris Interactive, 2008
  21. 21.  Review cell phone records for any unknownnumbers and late night phone calls and texts. Remind your child that texting is viral—anythingsent in a text can be easily forwarded and shared. Teach your child never to reveal cell phonenumbers or passwords online. Talk to your child about the possible consequencesof sending sexually explicit or provocative imagesor text messages. When shopping for a cell phone for your child,research the security settings that are available. From Netsmartz Kids : http://www.netsmartz.org/CellPhones
  22. 22.  At+T› Phones and internet:http://www.att.net/s/s.dll?ep=1659430&ch=smct/smct_is Verizon› https://wbillpay.verizonwireless.com/vzw/nos/uc/uc_overview.jsp Sprint› http://www.sprint.com/landings/family/safety.html
  23. 23.  Music Downloads› Napster› Itunes› Kazaa› WinMX› Limewire› etorrent Copyright Material Identity Theft Website Validity www.turnitin.com
  24. 24.  Computer system› Keeping bad stuff (predatory software) out– keeping valuables(personal information) in Malicious codes: viruses, worms, Trojan Parasitical malware: spyware, adware
  25. 25.  www.cyberpatrol.com www.netnanny.com www.spectorsoft.com www.cybersitter.com www.covenanteyes.comAnti spyware and adware programs www.spybot.com (Spybot S &D) www.adaware.com (lavasoft product)
  26. 26.  Video from www.commonsense.org› http://www.commonsensemedia.org/advice-for-parents/rules-road-parents-digital-age
  27. 27.  Guard your identity› Make username generic and anonymous› Little information is needed to get to knowyou Monitor your child‘s computer use Use favorites Understand the services your child uses Know usernames, passwords, and e-mail
  28. 28.  Know child‘s ―online friends‖ Don‘t overreact to anything your childtells you (fear you will take computeraway) Never meet anyone met online Keep your computer up-to-date› windowsupdate.microsoft.com› Virus protection› Firewall
  29. 29.  www.netsmartz.org www.isafe.org http://www.commonsensemedia.org/educators/parent-media-education http://www.kidsmart.org.uk/
  30. 30.  http://www.thinkuknow.co.uk/default.aspx www.illinoisicac.org www.internet-safety.org www.safekids.com
  31. 31.  http://www.bbc.co.uk/cbbc/help/safesurfing/ www.wiredkids.org/index.html www.wiredsafety.org www.fbi.gov/publications/pguide/pguidee.htm www.staysafe.org
  32. 32.  http://www.cyberbullying.us/research.php Bullying, Beyond the Schoolyard, byHinduja and Patchin http://www.cnet.com/4520-13384_1-6721368-1.html Top 5 Dangers article http://www.cnet.com/4520-13384_1-6721401-1.html?tag=lwt;lcol Think BeforeYou Click Worksheet
  33. 33. Thank you for your attendance attoday‘s presentation!Make sure you have signed in before youleavePowerpoint link:

×