Published on

A parent's guide to Teen Online Safety

Published in: Education
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Short for Malicious + Software
  • Teens-
  • Becybersmart

    1. 1. Be Cyber-Smart! Surf Safely! Velma Davis, Instructional Support Specialist [email_address]
    2. 2. Know your internet areas <ul><li>Email </li></ul><ul><li>Chat rooms </li></ul><ul><li>Game rooms </li></ul><ul><li>Blogs (Blogger) </li></ul><ul><li>Microblogs (Twitter, Plurk) </li></ul><ul><li>Bulletin Boards (Myspace, Facebook) </li></ul><ul><li>Instant Messaging </li></ul>
    3. 3. Protocols? What protocols?! Radios: gained popularity in 20’s and 30’s Television: Late 1940’s Internet Explosion: 1990’s
    4. 4. Your mother warned you:
    5. 5. Teens Online <ul><li>82% of profile creators included their first name in their profiles. </li></ul><ul><li>79% have included photos of themselves. </li></ul><ul><li>66% have included photos of their friends. </li></ul><ul><li>61% have included the name of their city. </li></ul><ul><li>49% have included the name of their school. </li></ul><ul><li>40% have included their instant message screen name. </li></ul><ul><li>40% have streamed audio to their profile. </li></ul><ul><li>39% have linked to their blog. </li></ul><ul><li>29% have included their email address. </li></ul><ul><li>29% have included their last name. </li></ul><ul><li>29% have included videos. </li></ul><ul><li>2% have included their cell phone numbers. </li></ul> / PEW Report, 2008
    6. 6. Who am I REALLY?! <ul><li>Is that really a picture of me? </li></ul>Am I really 10 years old? Am I a boy? Do I really go to school?
    7. 7. Risks? Highest risk to Teenagers! <ul><li>“ Teenagers are particularly at risk because... they are more likely... to participate in online discussions regarding companionship...&quot; </li></ul><ul><ul><ul><ul><ul><li>LOL </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>LMAO </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>TY </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>BRB </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>AWFK </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>YW </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>RU </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Y </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>ASL </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>POS </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>LMIRL </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>WTF </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>OMG </li></ul></ul></ul></ul></ul>Laugh out loud Laughing my A$$ off Thank You Be Right Back Away from keyboard/computer You’re Welcome Are you? Why? Age, sex and location Parent Over Shoulder Lets Meet In Real Life What the F$%# Oh my God http://
    8. 8. Leet Speak Remember …“Hip”, “Groovy”, “Peace out”? “ Leet” refers to “Elite”. Substitutes regular letters for symbols or numbers Further information for Leet Speak:
    9. 9. <ul><li>0 - O 1- I or L 2- A, Z or R 3- E 4- A 5- S </li></ul>6- B or G 7- T or L 8- B 9- G or P £- L or E
    10. 10. Think Before You Click! <ul><li>Domains- The extensions on a website can indicate their purpose: </li></ul><ul><ul><li>.com- commercial </li></ul></ul><ul><ul><li>.biz- business </li></ul></ul><ul><ul><li>.org- organization </li></ul></ul><ul><ul><li>.gov- government </li></ul></ul><ul><ul><li>.edu- education </li></ul></ul><ul><ul><li>.net- network </li></ul></ul><ul><ul><li>.xxx- pornography </li></ul></ul>
    11. 11. Virus <ul><li>A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. </li></ul>
    12. 12. Worm <ul><li>A computer worm is a selfreplicating computer program. It uses a network to send copies of itself to other nodes computer terminals on the network). </li></ul><ul><li>Worms almost always cause harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. </li></ul>
    13. 13. Trojan Horse <ul><li>A Trojan horse, or simply trojan, is a piece of </li></ul><ul><li>Software which appears to perform a certain action but in fact performs another such as transmitting a computer virus. </li></ul><ul><li>May or may not be malicious </li></ul><ul><li>a Trojan horse is not a computer virus. </li></ul>
    14. 14. Spyware <ul><li>Collects small pieces of information about users without their knowledge </li></ul><ul><li>Installs on your computer </li></ul><ul><li>Secretly monitors the user's computing: can collect various types of personal information, such as Internet surfing habits and sites that have been visited </li></ul><ul><li>Can install additional software and redirect Web browser activity. </li></ul><ul><li>Changes computer settings: </li></ul><ul><ul><li>Slow connection speeds, </li></ul></ul><ul><ul><li>Changes your home pages, </li></ul></ul><ul><ul><li>Loss of Internet connection </li></ul></ul><ul><ul><li>Loss of functionality of other programs. </li></ul></ul>
    15. 15. Malware <ul><ul><li>Rogue or malicious programs can attack and do various things to your computer while surfing the internet. </li></ul></ul><ul><ul><li>Hostile, intrusive, or annoying software or program code </li></ul></ul>
    16. 16. Phishing <ul><li>Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. </li></ul>
    17. 17. Suggestions?
    18. 18. AntiVir PE <ul><li> </li></ul>Avira AntiVir Personal - Free Antivirus Protects your computer against dangerous viruses.
    19. 19. AVG <ul><li>A great Anti-virus and Anti-Malware program. </li></ul>Free Download:
    20. 20. Firewall <ul><li>A firewall is a device or set of devices configured to permit, deny, encrypt, or monitor internet connections between online traffic and your computer . </li></ul>Windows 07 comes with a built-in Firewall.
    21. 21. Blocking or Filtering Compare software:
    22. 22. What Can I do as a Parent? <ul><li>Don’t hesitate to say “No!” </li></ul><ul><li>Put your computer in the busiest room in the house! </li></ul><ul><li>Spend time with your child on the computer. </li></ul><ul><li>Have your child sign and discuss an internet usage agreement and go over it periodically. </li></ul><ul><li>Check the history on the computer. </li></ul>
    23. 23. <ul><li>The most important factors in keeping your child safe on-line are the utilization of appropriate blocking software and/or parental controls, along with open, honest discussions with your child, monitoring his/her on-line activity! </li></ul>A Parent's Guide to Internet Safety , U.S. Department of Justice , Federal Bureau of Investigation - Publications
    24. 24. Digital Footprint <ul><li>Talk to your child about his/her digital footprint! </li></ul> Have them take this quiz with you!
    25. 25. My Rules for Internet Safety! <ul><li>I will not give out personal information such as my address, telephone number, parents’ work address/telephone number, or the name and location of my school without my parents’ permission </li></ul>
    26. 26. <ul><li>I will tell my parents right away if I come across any information that makes me feel uncomfortable </li></ul>Boy, am I uncomfortable!
    27. 27. <ul><li>I will never agree to get together with someone I &quot;meet&quot; online! </li></ul>
    28. 28. <ul><li>I will never send a person my picture or anything else without first checking with my parents </li></ul>
    29. 29. <ul><li>I will not respond to any messages that are mean or in any way make me feel uncomfortable. It is not my fault if I get a message like that. If I do I will tell my parents right away. </li></ul>
    30. 30. <ul><li>I will not download pictures from an unknown source, as there is a good chance there could be sexually explicit images. </li></ul>
    31. 31. <ul><li>time of day that I can be online, </li></ul><ul><li>the length of time I can be online, </li></ul><ul><li>appropriate areas for me to visit. </li></ul><ul><li>I will not access other areas or break these rules without their permission. </li></ul>I will talk with my parents so that we can set up rules for going online.
    32. 32. Helpful Sites <ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li>   </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul>
    33. 33. Bibliography <ul><li> </li></ul><ul><li>   </li></ul><ul><li>  Lawrence J. Magid </li></ul><ul><li>   </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul>