Internet Safety


Published on

This is a internet saftey presentation that I gave to the faculty and staff of Columbia High School.

Published in: Technology, Health & Medicine
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Internet Safety

  1. 1. Protecting our students on the World Wide Web By: Elissa Malespina CHS Librarian
  2. 2. Agenda <ul><li>Potential Dangers </li></ul><ul><li>Predators </li></ul><ul><li>Cyberbullying </li></ul><ul><li>MySpace </li></ul><ul><li>What to do </li></ul>
  3. 4. Potential Dangers HOW SAFE ARE THEY?
  4. 5. Cell Phone Dangers <ul><li>Text Messaging – difficult to monitor, can not tell who is doing the texting. </li></ul><ul><li>Camera & Video on cell phone – taking inappropriate pictures, invasion of privacy, rapid and easy transfer of picture/video. </li></ul><ul><li>Using cell phones to cheat on tests. </li></ul>
  5. 6. <ul><li>IM Dangers </li></ul><ul><li>No age verification </li></ul><ul><li>Can use webcam /voice/ and transfer files </li></ul><ul><li>No body language cues to help kids see how a person feels/reacts to what is said. </li></ul><ul><li>AOL, AIM, Yahoo Messenger, MSN live - all instant messaging sites. </li></ul>
  6. 7. Chat Room Dangers <ul><li>Chat = conference call </li></ul><ul><li>Many people in a room at once </li></ul><ul><li>Usually thematic </li></ul><ul><li>No age verification </li></ul><ul><li>Predators lurk in chat sites </li></ul>Would you stand in a mall, spin around and say who wants to talk with me?
  7. 9. X Box Live <ul><li>Live chat among Xbox users </li></ul><ul><li>Voice synthesizer feature makes it hard to know who you are talking to </li></ul><ul><li>Predators use it to make contact </li></ul><ul><li>Difficult for law enforcement to trace. </li></ul>
  8. 10. PREDATORS (In their own words)
  9. 11. Behavioral Traits of Predators <ul><li>Generally more intelligent than other criminals: Doctor, Engineers, Lawyers, College Professors. </li></ul><ul><li>Often meek & mild </li></ul><ul><li>Need driven behavior (can’t help themselves) </li></ul><ul><li>Master manipulators </li></ul><ul><li>Passive-Aggressive Personality </li></ul><ul><li>Almost always male </li></ul>
  10. 12. Victims have self-esteem issues
  11. 14. Cyberbullying <ul><li>Definition: </li></ul><ul><li>Sending or posting threatening or harassing text or images using the Internet or other digital communication devices. </li></ul><ul><li>Modes of cyberbullying: </li></ul><ul><li> email, websites, blogs, IM, chat rooms, cell phone. </li></ul>
  12. 15. Cyberbullying – three parts <ul><li>Bullies : Those who harass & demean </li></ul><ul><li>others, especially those they think are </li></ul><ul><li>different inferior. </li></ul><ul><li>Victims: Those who get bullied. </li></ul><ul><li>Bystanders : Those who encourage & </li></ul><ul><li>support the bully, or watch the bullying from </li></ul><ul><li>the sidelines and do nothing to help. </li></ul>
  13. 16. Forms of Cyberbullying <ul><li>Flaming – Online fights using electronic messaging </li></ul><ul><li>Harassment – repeatedly sending messages </li></ul><ul><li>Dissing – sending/posting gossip </li></ul><ul><li>Impersonation – being someone else </li></ul><ul><li>Outing – sharing secrets or embarrassing info/ images </li></ul><ul><li>Exclusion – intentionally & cruelly excluding others </li></ul>
  14. 17. Problems with the laws <ul><li>Right now the laws are set up in such a way that cyberbullying is considered harassment . </li></ul><ul><li>Police can not get a can’t really get involved. </li></ul>
  15. 18. <ul><li>13 year old from Vermont committed suicide </li></ul><ul><li>After being bullied at school he turned to the Internet where he met other suicidal teens </li></ul><ul><li>Parents helped to create new laws on bullying in Vermont </li></ul>
  16. 19. PRIVATE
  17. 21. <ul><ul><li>What </li></ul></ul><ul><ul><li>should a </li></ul></ul><ul><ul><li>parent / teacher do? </li></ul></ul>
  18. 22. Classroom Protocol <ul><li>If something happens on one of the computers in the classroom/lab </li></ul><ul><li>DO NOT TOUCH IT! DO NOT TURN IT OFF, DO NOT LET ANYONE TOUCH IT. </li></ul><ul><li>Call the deans / who may contact police. </li></ul>
  19. 23. Get Informed <ul><li>Google yourself </li></ul><ul><li>Create a Myspace Page (do not put anything on it) </li></ul><ul><li>Talk with your students about internet safety </li></ul>
  20. 24. Helpful Websites <ul><li>FBI – Cyber crimes – submit a crime tip </li></ul><ul><li> </li></ul><ul><li>  </li></ul><ul><li>New Jersey State Police – Cyber Crimes Unit </li></ul><ul><li> </li></ul><ul><li>  </li></ul><ul><li>National Center for Missing & Exploited Children – CyberTipline  (the 911 of the Internet) </li></ul><ul><li> </li></ul><ul><li>  </li></ul><ul><li>NetSmartz411 – Internet Safety Help Desk </li></ul><ul><li> </li></ul>
  21. 25. QUESTIONS