Internet Safety


Published on

A presentation on definitions and methods for keeping children safe while using online resources, chats, and social networks.

Published in: Education, Technology
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • You can even keep your own MySpace account and be your child’s friend online - it helps them know you’re interested in what they like and may help them feel more comfortable talking to you about their online activities
  • Students can get around these filters so be careful and include them in the discussion
  • Internet Safety

    1. 1. Safely Traveling Through the Web Anastasia Trekles Milligan, M.S. Clinical Asst. Professor, Purdue University Calumet [email_address]
    2. 2. Today’s Topics <ul><li>Online basics : Terms and tools for understanding </li></ul><ul><li>Social networking: Where and how kids can get in trouble online </li></ul><ul><li>Cyber-bullying : The schoolyard goes digital </li></ul><ul><li>Internet Security: What we can do to protect ourselves and our computers </li></ul><ul><li>Resources : Furthers resources to explore on all of these topics </li></ul>
    3. 4. Internet Basics: Helpful Terms and Tools <ul><li>URL (uniform resource locator): Also known as an Internet address, this is what is typed into a browser program in order to visit a web site </li></ul><ul><li>Many people, especially kids, think that all websites start with “www” and end with “.com”, but this not true </li></ul><ul><li>Some unscrupulous websites use this to their advantage; Famous example: The White House website </li></ul><ul><li>When sending personal info, like credit cards or passwords, check for the S in the http </li></ul>
    4. 5. Simple Tips for Avoiding Inappropriate Sites <ul><li>If stuck in a “pop-up attack”, or a site where the user can’t seem to get away, use the keyboard to quit or close the window </li></ul><ul><ul><li>Control+W (Windows) or Apple+W (Mac) closes a window </li></ul></ul><ul><ul><li>Alt+F4 or Control+Alt+Delete (Windows) or Apple+Q or Apple+Option+Esc (Mac) closes a program </li></ul></ul><ul><li>Avoid going to sites or following links that you’re not sure about </li></ul><ul><li>Use search engines that filter out inappropriate content, like Yahooligans! </li></ul>
    5. 6. More Tips <ul><li>Students should use a website evaluation tool to help them determine whether information online is appropriate and worthwhile </li></ul><ul><li>Useful sites are those that: </li></ul><ul><ul><li>Cite facts and use sources for cross-referencing </li></ul></ul><ul><ul><li>Have an identifiable author and have been kept up to date </li></ul></ul><ul><ul><li>Do not have a large number of advertisements </li></ul></ul><ul><ul><li>Do not try to sell something to the user </li></ul></ul><ul><ul><li>Do not ask for personal information without good reason, or without an https:// connection </li></ul></ul>
    6. 7. Helpful Terms and Tools <ul><li>Instant messaging : Usually a small program that can be used to instantly chat (text, audio, or video) together at the same time using webcams </li></ul><ul><li>Email : Asynchronous messages sent through an email client or service like Hotmail, AOL, etc. Supports text, images, audio, and video </li></ul>
    7. 8. Helpful Terms and Tools <ul><li>Screen name : Someone’s nickname, or “handle” used to identify them online </li></ul><ul><ul><li>It’s very easy to give away personal information in a screen name without realizing it </li></ul></ul><ul><ul><li>Avoid including info like gender, state or town names, ZIP codes, school names, grade in school, or birthdates in screen names </li></ul></ul>
    8. 10. Social Networking <ul><li>Sites that allow users to share personal profiles, favorite pictures and videos, and thoughts between others who are “friends” on their network </li></ul><ul><li>See for a list of available ones </li></ul>
    9. 11. Where Kids Like to Go Online <ul><li>The electronic equivalent of “hanging out;” online forums where people can communicate, share photos and videos, blog (or post personal thoughts), and connect virtually with other members </li></ul><ul><li>Popular places for teens and adults include MySpace, FaceBook, Friendster, Twitter, Xanga, and some others. </li></ul><ul><li>If possible, steer them toward sites especially for kids :,, </li></ul>
    10. 12. Talking to Strangers <ul><li>Of course, one of the big issues with social networking is the anonymity people have </li></ul><ul><li>Kids all are taught that they shouldn’t talk to strangers, but online they may not know they are talking to a stranger, and the danger of it seems less real </li></ul><ul><li>Overall, the vast majority of new friends kids make online are harmless people who are just looking for new people to talk with themselves </li></ul><ul><li>HOWEVER… that’s not always the case </li></ul>
    11. 13. <ul><li>Introductory video from iSafe on Internet predators </li></ul>
    12. 14. Talking to Strangers <ul><li>There are plenty of people who will use the trusting, naïve nature of children to their advantage </li></ul><ul><li>“ Stranger-danger” warnings , however, are not enough to persuade most children </li></ul><ul><li>Fear-mongering generally only encourages more online participation, or discourages legitimate concerns because children think parents will overreact or cut off access </li></ul>
    13. 15. Talking to Strangers <ul><li>Instead, teach your children some “ stranger literacy ” they can use to improve the quality and safety of their online time: </li></ul><ul><li>Never post or disclose personal information or concerns on an open forum </li></ul><ul><li>Keep MySpace, Facebook, and other social network site accounts private, so that only those with an invitation can visit </li></ul>
    14. 16. Talking to Strangers <ul><li>Pay attention to the details of other people’s messages, and watch for inconsistencies or other clues that might indicate that they are not who they say they are </li></ul><ul><li>Ask others for their opinion about people you have concerns about </li></ul><ul><li>Watch out for overtly friendly or complimentary messages, or anyone who sends unsolicited gifts </li></ul>
    15. 17. Talking to Strangers <ul><li>Never agree to meet someone in person without parental approval and without a parent or another trusted friend present </li></ul><ul><li>If you want to meet someone from online who you feel has “passed” all the tests, always meet them in a public place and never leave that place with the stranger </li></ul>
    16. 18. Profiles and Postings <ul><li>Students should avoid including specific information about themselves, their community, their school, or other things they’re involved with in their online profiles, regardless of how much is asked for by the site </li></ul><ul><li>When posting video and pictures, never include anything personally identifiable </li></ul>
    17. 19. Profiles and Postings <ul><li>Remember that everyone can potentially see your videos, pictures, and posts once they are online </li></ul><ul><li>NEVER post anything inappropriate or incriminating in any way, even if someone else pressures you to do so </li></ul><ul><li>You cannot control what happens to the things you post after they are online, and future employers, college recruiters, etc. may be able to see these things </li></ul>
    18. 21. The Cyber Community <ul><li>Students should understand the tenets of “cyber citizenship” </li></ul><ul><ul><li>Make informed choices about how they present themselves and how they communicate with others </li></ul></ul><ul><ul><li>Recognize inaccurate and inappropriate materials </li></ul></ul><ul><ul><li>Understand that what they say and post online is NEVER completely private </li></ul></ul><ul><ul><li>Treat others online as you would expect to be treated, using the rules of “ netiquette ” </li></ul></ul>
    19. 22. Basic Netiquette <ul><li>Adhere to the same standards of behavior online that you would follow in real life </li></ul><ul><li>Know where you are in cyberspace - know the sites you visit and where links are taking you </li></ul><ul><li>Respect others’ time and bandwidth by not sending large files or sending out large numbers of “chain letters,” jokes, and other messages that recipients may not want </li></ul>
    20. 23. Basic Netiquette <ul><li>Respect yourself by making sure that you represent yourself positively and discreetly online at all times </li></ul><ul><li>Share your knowledge on subjects where appropriate </li></ul><ul><li>Be forgiving of others’ mistakes and do not insult them or start “flame wars” by sending large numbers of angry messages to someone </li></ul><ul><li>Helpful link on Netiquette: </li></ul>
    21. 24. Cyber-Bullying <ul><li>Refers to any insulting, degrading, or intimidating behavior toward another in an online format </li></ul><ul><li>Bullying has always been around, but in an online format now the bully can remain (somewhat) anonymous </li></ul><ul><li>Hurtful or threatening exchanges by someone you do not know can be all that much more intimidating, and bullies know this </li></ul>
    22. 25. Cyber Bullying <ul><li>Can happen through email, IM, social networks, blogs, online gaming </li></ul><ul><li>Understand that cyber bullying can be very serious and watch for warning signs: </li></ul><ul><ul><li>Behavior change, lower grades </li></ul></ul><ul><ul><li>Spending lots of time online or cell phone messaging </li></ul></ul>
    23. 26. Kids: Don’t let yourself become a bully! <ul><li>Follow the rules of netiquette and do not join in on conversations that insult others </li></ul><ul><li>Remember that the person on the other end is a real human being, with real feelings, and abusive actions still hurt them even if you can’t seem them </li></ul><ul><li>Don’t reply to any spam messages, even to remove yourself from their “list” </li></ul><ul><li>Report abusive behavior against others to parents, police, and/or website moderators immediately </li></ul>
    24. 27. If You are Being Bullied <ul><li>Don’t make your personal contact info public! </li></ul><ul><li>Use blocking tools in email, phones, and websites where available </li></ul><ul><li>Make sure that the right person receives what you send by making sure screen names and addresses are spelled correctly </li></ul><ul><li>Don’t reply to harassing messages - save them instead, and tell an adult </li></ul><ul><li>You can also forward harassing messages to your Internet Service Provider </li></ul><ul><li>Tell the police immediately if you receive a physical threat </li></ul>
    25. 28. Cyber Bullying Resources <ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul>
    26. 30. Online Frauds and Scams <ul><li>Phishing : an attempt to masquerade as a legitimate website in an attempt to gain personal information about someone and use it against them (often used for financial identity theft) </li></ul><ul><li>Spam : an unsolicited email, instant message, or online post attempting to lure people into trying or buying some service or product (often used by pornography sites) </li></ul>
    27. 31. Avoiding the Scams <ul><li>Never click on ad banners on sites you visit </li></ul><ul><li>Never click on any attachment or link in an email if it came from someone you do not know </li></ul><ul><li>Check the message header of a suspicious email to see where it really came from: </li></ul><ul><li>Check carefully for spelling errors and misleading Internet addresses (I.e., instead of </li></ul>
    28. 32. Internet Security <ul><li>Keep yourself safe from harmful software, like spyware and viruses, with good, up-to-date software </li></ul><ul><li>Recommended products : </li></ul><ul><ul><li>Blink Personal Edition, free for 1 year, $25 yearly thereafter: </li></ul></ul><ul><ul><li>Astaro Security Gateway, free for home use: </li></ul></ul>
    29. 33. Internet Security <ul><li>Web filtering software helps keep your computer from downloading inappropriate content </li></ul><ul><li>A comparison of commonly available filters and cost: </li></ul><ul><li>Use this site to help guide your security journey, also: </li></ul><ul><li>Highly recommended: Net Nanny ( ) </li></ul>
    30. 34. Downloading Music and Files <ul><li>Download only from trusted, legal sources, like iTunes or </li></ul><ul><li>Never post material that others have created online without their permission </li></ul><ul><li>Never present another’s work as your own </li></ul><ul><li>Plagiarism is a serious offense that can get you in trouble with school and with the law </li></ul>
    31. 35. Safe-Surfing Contract <ul><li>A parent-child contract that teaches responsibility and reinforces smart Internet behavior </li></ul><ul><li> </li></ul><ul><li>Print it off and go over it with your child, make sure she understands everything that is expected of her, then both of you sign it </li></ul>
    32. 36. Internet Safety Education <ul><li>Highly recommended site with materials and training for parents, kids, and law enforcement about Internet safety </li></ul><ul><li>Teachers, parents, kids, and law enforcement can become certified iSafe instructors and mentors through this site for free </li></ul><ul><li>Go to to sign up and access videos and other materials </li></ul>
    33. 37. Internet Safety Resources <ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul>
    34. 38. Copyright and Plagiarism Resources <ul><li>For Kids </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li>For Parents, Teachers, and Law Enforcement </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul>
    35. 39. Thank You!! <ul><li>I hope that you have enjoyed this presentation and that you have learned useful information </li></ul><ul><li>Several articles and handouts are included with your slides </li></ul><ul><li>Please read through them and share with others </li></ul><ul><li>Don’t forget to sign the safe-surfing agreement with your children and I hope everyone enjoys only happy and safe Internet experiences in the future! </li></ul>