Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cyber Safety How Children Can Protect Themselves From Online Threats


Published on

Presentation given to teachers and adminstrators about how to teach children cybersafety.

Published in: Education, Technology
  • Be the first to comment

Cyber Safety How Children Can Protect Themselves From Online Threats

  1. 1. CyberSafety How Children Can Protect Themselves From Online Threats Images from Microsoft Design Gallery Matthew Kinzie Director, Information Technology Stanislaus County Office of Education ETC! 2008 Presentation Co-developed by AT&T and CTAP Region IV Modified by Matthew Kinzie for the ETC! 2008 Conference
  2. 2. Goals of Presentation considering strategies to help ensure that our children have a safe, positive experience with technology. To unravel the fear and hype surrounding the online lives of our cyber kids while also
  3. 3. How Do You Use the Internet? <ul><li>What Are Your Favorite Sites? </li></ul><ul><li>Why? </li></ul>
  4. 4. How Are Students Using the Internet? <ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul>
  5. 5. Following the Thread <ul><li>Six Areas Covered Here and on Poster: </li></ul><ul><li>1. </li></ul><ul><li>2. </li></ul><ul><li>3. </li></ul><ul><li>4. </li></ul><ul><li>5. </li></ul><ul><li>6. </li></ul>
  6. 6. <ul><li>Definition: Personal information identifies you, </li></ul><ul><li>your location or your financial assets. </li></ul><ul><li>Obvious : name, age, sex, picture, phone number, address, ID numbers such as SSN, Bank Account Numbers, Credit Card Numbers </li></ul><ul><li>Less obvious : hobbies, interests, school mascot, gaming identities </li></ul><ul><li>Used for phishing scams/pretexting </li></ul>“ Think Before You Post”
  7. 7. <ul><li>Unraveling the facts… </li></ul><ul><li>Identity thieves are clever, posing as friends, relatives and banks, to get people to reveal personal information. Watch for https and URL posers like paypa1. </li></ul><ul><li>Teens are just as likely as adults to become victims of identity theft -- when applying for a driver's license they may find one already has been issued using their name and SSN. </li></ul>
  8. 8. Safe Transactions - IE Version 7 Always answer “No” to prompts that ask if you want to display Non-Secure Items.
  9. 9. <ul><li>Do not share personal information such as your name, age, sex, picture, location/address, phone number, hobbies, interests, and Social Security/bank account numbers. </li></ul><ul><li>Create nicknames that do not reflect your own name or anything personal. </li></ul>To - Dos : Remember to share guidelines with your students:
  10. 10. <ul><li>To - Dos (cont’d) : </li></ul><ul><li>Never respond to online </li></ul><ul><li>communication that is inappropriate or makes you feel uncomfortable. </li></ul><ul><li>Never agree to meet in person someone you met online. </li></ul><ul><li>Always talk with your parents or a responsible adult about your online activities. </li></ul>
  11. 11. <ul><li>To - Dos (cont’d): </li></ul><ul><li>Never share passwords </li></ul><ul><li>Use strong passwords that are easy to remember, hard to guess, and not personal. </li></ul><ul><ul><li>Is “ipattF50ousA” easy to remember? </li></ul></ul><ul><li>Never open e-mails from people you do not know </li></ul><ul><li>Never click on links you don’t know about </li></ul>
  12. 12. <ul><li>Definition: Piracy refers to the ownership </li></ul><ul><li>rights of materials, created, written, </li></ul><ul><li>designed or expressed by individuals. </li></ul><ul><li>Includes music, games, movies, photos, and writing </li></ul>Threads
  13. 13. <ul><li>Unraveling the facts… </li></ul><ul><li>File-sharing represents 60% of all US Internet traffic. </li></ul><ul><li>Illegally downloading or sharing intellectual property without the permission of the creator is a crime punishable by law. </li></ul>
  14. 14. <ul><li>Don’t download, copy, or share music, games, movies, photos, or other property without permission of the creator. </li></ul><ul><li>Use only legitimate sites (those that request payment or are copyright free) when downloading online media. </li></ul>To - Dos : Remember to share guidelines with your students: Threads
  15. 15. <ul><li>Definition: Cyberbullying is the use of </li></ul><ul><li>technology for harassment, impersonation, </li></ul><ul><li>denigration, trickery, exclusion and stalking. </li></ul><ul><li>Cyberbullies may use email, chat rooms, discussion forums, instant messaging, text messaging or social networking sites. </li></ul>
  16. 16. <ul><li>Unraveling the facts… </li></ul><ul><li>“ If I tell someone about bullying, it will just make it worse.” Research shows that bullying will stop when peers or adults get involved. </li></ul><ul><li>Headline news provides opportunities for discussion and “ teachable moments ” </li></ul>
  17. 17. <ul><li>Don’t respond to or meet with a cyberbully. </li></ul><ul><li>Save proof of the harassment like e-mail messages, screen shots, IM logs, blogs, etc. </li></ul>To - Dos : Remember to share guidelines with your students:
  18. 18. <ul><li>To - Dos (cont’d) : </li></ul><ul><li>Tell a trusted adult who can: </li></ul><ul><ul><li>File a complaint with the Internet Service Provider or send an email to the host of the web site where the abuse was posted. </li></ul></ul><ul><ul><li>Contact the cyberbully’s parents. </li></ul></ul><ul><ul><li>Contact an attorney or file a small claims action. </li></ul></ul>Threads
  19. 19. <ul><li>Definition: Social network sites (MySpace and </li></ul><ul><li>Xanga) are services that use the Internet to </li></ul><ul><li>create an interactive network of photos, videos, </li></ul><ul><li>web logs (blogs) and groups. </li></ul><ul><li>Social networking sites gather data submitted by members as “profiles” </li></ul><ul><li>Profiles can then be shared among members </li></ul>
  20. 20. Account Settings: Privacy
  21. 21. But we block it…
  22. 22. <ul><li>Unraveling the facts… </li></ul><ul><li>Posting a picture on MySpace is like posting it on a public campus bulletin board, that anyone can access and deface </li></ul><ul><li>Although there has been a lot of negative media around social networks, most users are just “hanging out” and teachers are using them in innovative ways </li></ul>“ Think Before You Post”
  23. 25. <ul><li>Know that sexual predators disguise themselves as friendly and often hunt for victims through social networking sites. </li></ul><ul><li>Be careful about adding strangers to </li></ul><ul><li>your “friends” list. </li></ul>To - Dos : Remember to share guidelines with your students:
  24. 26. <ul><li>To - Dos (cont’d) : </li></ul><ul><li>Never share your personal information or anything about your friends--especially your cell phone number. </li></ul><ul><li>Don’t be shy; report inappropriate postings/profiles to the social networking provider and to the police. </li></ul>Threads
  25. 27. <ul><li>Definition: Inappropriate content has been </li></ul><ul><li>defined in CIPA* as visual depictions that are </li></ul><ul><li>obscene, child pornography, or material </li></ul><ul><li>&quot;harmful to minors&quot; </li></ul><ul><li>It can also include images of violence, hate group or extremist material, illegal activities and online advertising </li></ul><ul><li>Federal policies created to protect our children include CIPA, COPPA and DOPA </li></ul>
  26. 29.
  27. 31. <ul><li>Unraveling the facts… </li></ul><ul><li>Inappropriate content can occur on any computer by accident </li></ul><ul><li>Only a small fraction of the materials on the Internet could reasonably be classified as inappropriate for children… </li></ul><ul><ul><li>Unfortunately, that small fraction is highly visible and controversial. </li></ul></ul>
  28. 32. <ul><li>Tell a trusted adult, teacher or parent if </li></ul><ul><li>you come across inappropriate content. </li></ul><ul><li>Know how to use the back button or log </li></ul><ul><li>off immediately when you find material that makes you feel uncomfortable. </li></ul>To - Dos : Remember to share guidelines with your students:
  29. 33. <ul><li>To - Dos (cont’d) : </li></ul><ul><li>Don’t download files from people you don’t know. </li></ul><ul><li>Use filtered searches and systems; ask your teacher or librarian for help </li></ul><ul><li>Use as your search engine or set your preferences in Google for strict filtering </li></ul>
  30. 34. <ul><li>Definition: A Cyber predator uses the Internet </li></ul><ul><li>to hunt for victims to take advantage of in ANY </li></ul><ul><li>way, including sexually, emotionally, </li></ul><ul><li>psychologically or financially </li></ul><ul><li>Cyber predators know how to manipulate kids, creating trust and friendship where none should exist </li></ul>
  31. 35. <ul><li>Unraveling the facts… </li></ul><ul><li>Cyber predators can be sent to prison. </li></ul><ul><li>What children need to look out for is not a certain stereotype of a dangerous person but certain types of behavior … </li></ul><ul><li>Use teachable moments, even headline news, to make discussion and education relevant. </li></ul>
  32. 36. <ul><li>Encourage your schools to add a small c yber tips s ection to their school newsletters. </li></ul><ul><li>Remind student to think twice before sharing any information about themselves. </li></ul>To - Dos : Remember to share guidelines with your students:
  33. 37. <ul><li>If you suspect that you are being stalked or the victim of inappropriate </li></ul><ul><li>communication, report it to a trusted </li></ul><ul><li>adult or to the CyberTipline. </li></ul><ul><ul><li> </li></ul></ul><ul><ul><li>1-800-843-5678 </li></ul></ul>To - Dos (cont’d) :
  34. 38. Trends in Cyber Safety? <ul><li>MMORPG </li></ul><ul><ul><li>Runescape, Halo, Half-Life, Club Penguin, Millsberry, etc </li></ul></ul><ul><li>According to McAfee, More viruses are being written for financial gain than pranks or personal pride. </li></ul><ul><li>Websites dedicated to Cyberbullying: </li></ul>
  35. 39. When Children We Hope They Learn. . . <ul><li>Don’t talk to strangers </li></ul>Start School, Go Online, in cyberspace <ul><li>Look both ways before </li></ul>  , no cyberbullies allowed <ul><li>Play nicely with other children </li></ul><ul><li>If something happens that scares you, </li></ul><ul><li>seek help from an adult you trust </li></ul>clicking crossing the street !!!
  36. 40. More Information <ul><li>Follow the Thread to: </li></ul><ul><li> </li></ul><ul><li>Find carefully selected resources for educators, students and parents. </li></ul><ul><li>Download our free Cyber Safety poster sponsored by AT&T . </li></ul><ul><li>Download this presentation to share or modify. </li></ul>
  37. 41. Additional Resources <ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li>Center for Safe and Responsible Internet Use </li></ul><ul><ul><li> </li></ul></ul><ul><li> </li></ul><ul><li> </li></ul>