Successfully reported this slideshow.

Parent internet safety

441 views

Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Parent internet safety

  1. 1. Technology Information Night <ul><li>How to responsibly manage your family’s online identity and make informed choices </li></ul>
  2. 2. Agenda <ul><li>Social Networking </li></ul><ul><li>Classroom Applications/Web 2.0 </li></ul><ul><li>Computer management and security </li></ul><ul><li>Web cams </li></ul><ul><li>Online Gaming </li></ul><ul><li>Help your child learn with technology </li></ul>
  3. 3. <ul><li>Social Networking A brave new world? </li></ul>
  4. 4. Social Networking A parody (?) of Facebook
  5. 5. Social Networking
  6. 6. Social Networking What should I be aware of? <ul><li>minimum ages, multiple sites, privacy settings http://bit.ly/9lLwA6 </li></ul><ul><li>saving MSN chats http://bit.ly/dIrTKA </li></ul><ul><li>just be aware - Who can see it? What are the implications now and in the future? </li></ul><ul><ul><li>the “Markville” or “Grandmother” test </li></ul></ul><ul><li>Facebook privacy settings http://on.mash.to/g8AMiM </li></ul>
  7. 7. Classroom Applications What’s going on in school? <ul><li>Web 2.0 tools [wikis, blogs, Prezi, Glogster]: moving from consuming to creating content </li></ul><ul><li>digital storytelling [MovieMaker, Photostory, iMovie, Bitstrips, Comic Life...] </li></ul><ul><li>Smart Notebook, document cameras </li></ul><ul><li>moving towards cameras, smartphones, iPods, blogging, Twitter - when and as appropriate </li></ul>
  8. 8. Computer Management and Security What are the threats? <ul><li>virus: a program capable of reproducing itself and usually is capable of causing harm to files, programs or your whole computer </li></ul><ul><ul><li>includes email viruses, Trojan horses, worms </li></ul></ul><ul><li>spyware: programs that spy on what you do on your computer, and may report back certain pre-specified information to an outside source </li></ul>
  9. 9. <ul><li>Computer Management and Security What can I do? </li></ul><ul><ul><li>keep yourself protected: have current anti-virus software, firewall and operating system updates - automatically is best </li></ul></ul><ul><ul><li>hints for keeping yourself secure: http://bit.ly/dEzsIy </li></ul></ul>
  10. 10. <ul><li>Computer Management and Security What can I do? </li></ul><ul><li>encryption: WEP and WPA </li></ul><ul><ul><li>WEP is older, breakable by someone who really wants to </li></ul></ul><ul><ul><li>WPA is newer, not perfect; its strength depends on the passcode used </li></ul></ul><ul><li>hiding your network </li></ul><ul><li>registering your MAC addresses </li></ul>
  11. 11. <ul><li>Computer Management and Security What about webcams? </li></ul><ul><li>Trojan Horses and other types of malware can remotely turn on your webcam or microphone without you even knowing http://bit.ly/fzZ42g http://bit.ly/hHIrLx </li></ul>
  12. 12. <ul><li>Computer Management and Security Physical placement and other considerations </li></ul><ul><li>be aware of what your kids are doing: http://bit.ly/gecsV5 and http://bit.ly/dVeKvp </li></ul><ul><li>interact with them </li></ul><ul><li>passwords and privacy </li></ul><ul><li>file-sharing sites [torrent, etc.] </li></ul>
  13. 13. Online Gaming What should I be aware of? <ul><li>not just World of Warcraft and Call of Duty; many kids games too [Webkinz] </li></ul><ul><li>often a chat component </li></ul><ul><li>pressure to be in the game a lot: team expectations </li></ul><ul><li>Same as social networking: be aware </li></ul>
  14. 14. Journeying Together <ul><li>Knowledge vs. wisdom: filter </li></ul><ul><li>It’s an ongoing discussion </li></ul><ul><li>Involves the child, parent, school </li></ul><ul><li>Get involved, learn beside each other </li></ul><ul><li>Ask the right questions </li></ul>
  15. 15. Journeying Together <ul><li>Why should he/she be doing this? </li></ul><ul><li>Is my child ready for this? How about me? </li></ul><ul><li>What parameters have I set up? </li></ul><ul><li>What are the implications? </li></ul><ul><li>How will we move forward? </li></ul><ul><li>What are the pros and cons? </li></ul><ul><li>What is our exit strategy? </li></ul>
  16. 16. Jason Eygenraam Computer Resource Teacher YRDSB Elementary, East 2011

×