Safe Internet Use


Published on

Published in: Technology, Health & Medicine
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Safe Internet Use

  1. 1. The real impact of technology will be the issues that are raised rather than the tools it gives us- Derek Bok
  2. 2. Sites for exploring <ul><li>Chapin curriculum pages </li></ul><ul><li>PBS Kids and PBS parents </li></ul><ul><li>Starfall </li></ul><ul><li>Yahooligans Cool Sites </li></ul><ul><li>Exploratorium Cool Sites </li></ul><ul><li>Reference Desk </li></ul>
  3. 3. Girls and Computers <ul><li>The importance of techno-ease </li></ul><ul><li>Computer as tool </li></ul><ul><li>The Gaming generation </li></ul><ul><li>Empowerment </li></ul><ul><li>Plan B </li></ul>
  4. 4. Today Show Moral <ul><li>When asked if they had been approached online in an inappropriate way, all raised their hands “yes.” </li></ul><ul><li>When asked if they had informed their parents, no one raised a hand. </li></ul>
  5. 5. Surfing the Web- Be Proactive <ul><li>Take time to see what your children are doing online- what are their primary destinations (see www. miniclip .com ) </li></ul><ul><li>Keep up with technology. Let them teach you about the internet </li></ul><ul><li>Surf sites with them to discuss appropriate uses and sites </li></ul><ul><li>Keep it public </li></ul><ul><li>Help them assess the value and accuracy of sites </li></ul><ul><ul><li>See www. martinlutherking .org </li></ul></ul>
  6. 6. Safety Concerns <ul><li>Go over Kids’ Rules </li></ul><ul><li>Post Safety Rules by the computer </li></ul><ul><li>Work with them to develop critical skills: Internal Filtering and Blocking </li></ul><ul><li>Learn how to examine your Web browser’s “History” files, or cache. Even if you don’t do it, make sure your children know it’s possible for you to know where they’ve been. </li></ul><ul><li>Look around your desktop, start menu or applications folder for suspicious programs. </li></ul>
  7. 7. Don’t Fence Me In <ul><li>Children need to be fenced in </li></ul><ul><li>Create a safe list of favorites </li></ul><ul><li>Investigate kid-safe index pages and search engines </li></ul><ul><ul><li>Kid Safe Search Sites </li></ul></ul>
  8. 8. Discuss Responsible Behavior <ul><li>Offline vs. Online Behavior </li></ul><ul><ul><li>Talking to strangers </li></ul></ul><ul><ul><li>Giving out personal information </li></ul></ul><ul><ul><li>Instigating fights </li></ul></ul><ul><ul><li>Rudeness </li></ul></ul><ul><ul><li>Being unkind to peers, to teachers, to family </li></ul></ul><ul><ul><li>Bullying </li></ul></ul>
  9. 9. Trouble Zones Blogs <ul><li>Majority of bloggers are teens and young adults. 90% of those with blogs are between 13 and 29 years old; 51% are between 13 and 19 </li></ul><ul><li>4.12 million blogs -June 2004 </li></ul><ul><li>A public journal, linked to others </li></ul><ul><li>Some reveal too much information, turning an event into a public posting </li></ul><ul><li>An Actual blog </li></ul><ul><li>teens tended to reveal more personal details on blogs than in chatrooms and forums </li></ul><ul><li>“ a kind of invisible high school that floats above the daily life of teenagers” --New York Times </li></ul>
  10. 10. Blogs to consider <ul><li>Blurty </li></ul><ul><li>Xanga </li></ul><ul><li>Livejournal </li></ul><ul><li>DeadJournal </li></ul>
  11. 11. Trouble Zones Chat Rooms <ul><li>Create an alias with your child. Many spammers use names they can easily collect from a chat room. </li></ul><ul><li>Enter a chat room with your child. </li></ul><ul><li>Remind children that chatrooms are “public places;” Reinforce basic rules. </li></ul><ul><li>Do not let your child chat in unmoderated chat rooms. </li></ul><ul><li>Get to know your children’s cyberfriends. </li></ul><ul><li>www. chatdanger .com </li></ul>
  12. 12. Trouble Zones E-Mail <ul><li>Be aware of all your child’s e-mail accounts; free Web e-mail may allow your child to have other of e-mail accounts you don’t know about. </li></ul><ul><li>Tell them to keep passwords private </li></ul><ul><li>Stress Kindness </li></ul><ul><li>The Read it Aloud Rule </li></ul>
  13. 13. Trouble Zones Cyberbullying <ul><li>Cyberbullies can and do use e-mail to send harassing and threatening messages </li></ul><ul><ul><li>Steal passwords to protect themselves </li></ul></ul><ul><li>Bash Boards, Instant Messages, Blogs </li></ul><ul><li>Cyberbullies can create Web sites that mock, torment, and harass others </li></ul><ul><li>Text messages on cell phones or picture phones - so even less parental control </li></ul>
  14. 14. Trouble Zones Cyberbullying <ul><li>An interactive world away from adult supervision </li></ul><ul><li>Home is no longer a refuge from cruelty or peer pressure </li></ul><ul><li>Anonymity means freedom from responsibility or empathy </li></ul>
  15. 15. Trouble Zones Cyberbullying Response <ul><li>Keep a record of all e-mails or Internet Messages </li></ul><ul><li>Tell someone </li></ul><ul><li>Don’t reply and don’t reply in anger </li></ul><ul><li>Change e-mail address if possible or Block the sender </li></ul>
  16. 16. Trouble Zones Social Networking Sites <ul><li>Personal Profile </li></ul><ul><li>Students list personal information including school, friends, interests, etc. </li></ul><ul><li>Some go beyond: inappropriate photos, frank sexual discussion, leaving messages on other pages </li></ul>
  17. 17. Other Issues <ul><li>Plagiarism </li></ul><ul><li>Time Wasters </li></ul><ul><li>Gender Matters- What do websites teach </li></ul>
  18. 18. Another Harvard President: “Girls might be inherently less able in Math and Science than boys” ---Let’s use technology to prove him wrong