OUR DIGITAL WORLDBrian SharlandJune 26th
BRIAN SHARLANDTeach ICT and Computing at Rye@sharland@RyeComputinghttp://briansharland.com
ONLINE VERSION OF PRESENTATIONIN SCHOOLThis is an online version of a presentation I give inschoolThe slide numbers theref...
OUR DIGITAL WORLDWhat is our digitalworld?Issues teenagers faceHow do we respond tothose issues?Further supportavailable
So what is our digital worldlike?
Are we living in a surveillanceera?
The internet isn’t a reflectionof a teenager’s lifeIt is their real life
Families
The Internet is a positivesystem
Creation
Connection
Understanding the world
What issues do teenagersface today?
There is NOprivacy on the internet
Your information will at somepoint be read by a human orcomputer and a decisionmade
Personal safety on the internetcan be compromised throughcareless words or actions
Cyber-bullies can leave youfeeling un-safe in your ownhome
Malicious communicationthrough texts, tweets and nowapps can impact youngsters
Careless actions can have animpact on financial securitysuch as theft of devices oraccess to accounts like iTunes
The internet IS real life
How do we deal with theseissues and in turn educate ourchildren?
Support
GOVERNMENT - CEOPCentre for Exploitation and Online Protection- Government cross agency department of SOCA- Significant re...
GOVERNMENT - DCMSMaria Miller’s Internet summit- 1 million pounds was pledged by big Internetcompanies- To give more power...
CHARITY – INTERNET WATCHFOUNDATIONInternet Watch Foundation- Charity in Cambridge- Remit is to ‘minimise the availabilty o...
CORPORATE - CLEANFEEDCleanfeed- Content filtering system used by ISPs such as BT toprevent access to certain sites outside...
SCHOOL - SMOOTHWALLSmoothwall- A range of powerful and customisable tools to filterInternet access at school- Removes acce...
SCHOOL - ESAFETYWe also encourage pupils to report any issues to theirform tutors and also Mrs Neil- Documented and dealt ...
@ home ?
SECURING YOUR COMPUTER ANDONLINE LIFE1. Passwords2. Security Software3. Home internet filtering
PASSWORDSHaving to remember Ty!89?ghjK for even one site ishard enoughUse a few complex passwords- Which are memorable but...
SECURITY SOFTWAREHave decent well-reviewed security software installed- Norton, McAfee and Kaspersky for PC or Sophos forM...
HOME-BASED INTERNET FILTERINGUSING OPENDNSOpenDNS provides family home filtering using DNSserversDNS servers are the ‘addr...
TWO-FACTOR AUTHENTICATIONOne-factor authentication is the use of a password(something you know)2FA is the use of something...
TWO-FACTOR AUTHENTICATIONBenefit is added securityHowever don’t lose your phone!Popular services using 2FA include:- Googl...
HOW TO USE 2FA EFFECTIVELYSet it up on at least one major service such as GoogleMailUse your Gmail account to setup other ...
LOGIN NOTIFICATIONSSites like Facebook use theseThey show you if someone attempts to login to youraccount from another loc...
3RD-PARTY APPS AND SOCIALNETWORKSIn our connected world services like Facebook, Twitteretc allow access to 3rd party apps ...
MANAGING 3RD-PARTY APPSCheck your app settings on each of your socialnetworksFor example in Facebook use account settings ...
METADATAMetadata is data about dataEg if I take a photo (data) the data about it wouldincludeTimestampCamera typePhoto set...
GEOTAGGINGGeotagging is the process of attaching a GPS locationto a piece of digital content- Photo- Tweet- Foursquare che...
DEALING WITH GEOTAGGINGCheck the settings on your child’s smartphone- An iPhone for example can turn location settings off...
SHORT LINKS ON TWITTERDue to the length of twitter posts longer emailaddresses are often shortened such ashttp://community...
MANAGING SMARTPHONES ANDTABLETSFor very young children use ‘Guided Access’ for iPadsUse gift vouchers to manage the purcha...
LOSING AN EXPENSIVE DEVICEFor Apple devices use iCloud and Find my iPhone tolocate missing devices, ping them or lock them...
MESSAGING ON SMARTDEVICESParents can’t do surveillance like the NSA can!Skype is reasonably popularMore popular are over-t...
DEALING WITH INAPPROPRIATECOMMUNICATIONSGather evidence!If you are aware of the apps your children are usingfamiliarise yo...
SUMMARY OF SUGGESTIONSSecure Passwords and multiple levels of loginsUse one security suite but a range of extra toolsDiscu...
IN CONCLUSIONEsafety will always be evolvingKeep on top of developments yourselfIncrease your trust in your children as th...
FURTHER LINKShttp://www.childline.org.uk/https://delicious.com/briansharland/esafety - mybookmarks on e-safetyhttp://think...
Thank youAny questions?Continue the discussion @sharlandor athttp://ryecomputing.wordpress.com/esafety
Reading requires time andattention. Reading is a cognitive,mental, emotional action, andtoday it is under pressure from al...
Image credits• Minecraft image – screenshot from in-game• Image: Oklahoma tornadoreliefhttp://www.flickr.com/photos/395135...
Our Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagers
Upcoming SlideShare
Loading in …5
×

Our Digital World - A look at E-safety issues for teenagers

887 views

Published on

This is a presentation on esafety issues I give to parents at the school I work at. It covers common issues teenagers face as well as solutions and support for parents.

Published in: Education, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
887
On SlideShare
0
From Embeds
0
Number of Embeds
215
Actions
Shares
0
Downloads
14
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Our Digital World - A look at E-safety issues for teenagers

  1. 1. OUR DIGITAL WORLDBrian SharlandJune 26th
  2. 2. BRIAN SHARLANDTeach ICT and Computing at Rye@sharland@RyeComputinghttp://briansharland.com
  3. 3. ONLINE VERSION OF PRESENTATIONIN SCHOOLThis is an online version of a presentation I give inschoolThe slide numbers therefore begin slightly higher inorder to synchronise with the presentation I give.
  4. 4. OUR DIGITAL WORLDWhat is our digitalworld?Issues teenagers faceHow do we respond tothose issues?Further supportavailable
  5. 5. So what is our digital worldlike?
  6. 6. Are we living in a surveillanceera?
  7. 7. The internet isn’t a reflectionof a teenager’s lifeIt is their real life
  8. 8. Families
  9. 9. The Internet is a positivesystem
  10. 10. Creation
  11. 11. Connection
  12. 12. Understanding the world
  13. 13. What issues do teenagersface today?
  14. 14. There is NOprivacy on the internet
  15. 15. Your information will at somepoint be read by a human orcomputer and a decisionmade
  16. 16. Personal safety on the internetcan be compromised throughcareless words or actions
  17. 17. Cyber-bullies can leave youfeeling un-safe in your ownhome
  18. 18. Malicious communicationthrough texts, tweets and nowapps can impact youngsters
  19. 19. Careless actions can have animpact on financial securitysuch as theft of devices oraccess to accounts like iTunes
  20. 20. The internet IS real life
  21. 21. How do we deal with theseissues and in turn educate ourchildren?
  22. 22. Support
  23. 23. GOVERNMENT - CEOPCentre for Exploitation and Online Protection- Government cross agency department of SOCA- Significant resources to combat online child abuse- Many resources for schools and parents throughthinkuknowLINKS ON PAGE
  24. 24. GOVERNMENT - DCMSMaria Miller’s Internet summit- 1 million pounds was pledged by big Internetcompanies- To give more power and resources to the IWF charityLINKS ON PAGE
  25. 25. CHARITY – INTERNET WATCHFOUNDATIONInternet Watch Foundation- Charity in Cambridge- Remit is to ‘minimise the availabilty of potentiallycriminal content’- Essentially supplies information on website URLs tobe used by CleanFeedLINKS ON PAGE
  26. 26. CORPORATE - CLEANFEEDCleanfeed- Content filtering system used by ISPs such as BT toprevent access to certain sites outside the UK- Inside the UK sites are shut down- Government mandated- List content provided by IWFLINKS ON PAGE
  27. 27. SCHOOL - SMOOTHWALLSmoothwall- A range of powerful and customisable tools to filterInternet access at school- Removes access to inappropriate content and controlaccess to sites which could be a distractionLINKS ON PAGE
  28. 28. SCHOOL - ESAFETYWe also encourage pupils to report any issues to theirform tutors and also Mrs Neil- Documented and dealt with quickly- ICT and Computing lessons during the year look atesafety issues- Recently looked at Two-Factor Authentication with year 9s
  29. 29. @ home ?
  30. 30. SECURING YOUR COMPUTER ANDONLINE LIFE1. Passwords2. Security Software3. Home internet filtering
  31. 31. PASSWORDSHaving to remember Ty!89?ghjK for even one site ishard enoughUse a few complex passwords- Which are memorable but contain sufficient variation- !WldWlk500MilesChain a few words together-antelope50beach85south?Wiki article on password strength
  32. 32. SECURITY SOFTWAREHave decent well-reviewed security software installed- Norton, McAfee and Kaspersky for PC or Sophos forMacAVG free?- Would you use a free car?Pay the annual feeSecurity software reviewsLINKS ON PAGE
  33. 33. HOME-BASED INTERNET FILTERINGUSING OPENDNSOpenDNS provides family home filtering using DNSserversDNS servers are the ‘address books’ of the InternetAt a basic level filter adult sites, proxy servers, phisingsites and some malwareLINKS ON PAGE
  34. 34. TWO-FACTOR AUTHENTICATIONOne-factor authentication is the use of a password(something you know)2FA is the use of something you know and somethingyou have (a phone)When logging in to certain services you are sent a one-time only unique code to loginLINKS ON PAGE
  35. 35. TWO-FACTOR AUTHENTICATIONBenefit is added securityHowever don’t lose your phone!Popular services using 2FA include:- Google, Facebook, Twitter, Apple, Dropbox, Paypaland a few more
  36. 36. HOW TO USE 2FA EFFECTIVELYSet it up on at least one major service such as GoogleMailUse your Gmail account to setup other accounts suchas Facebook, Amazon etc
  37. 37. LOGIN NOTIFICATIONSSites like Facebook use theseThey show you if someone attempts to login to youraccount from another locationLINKS ON PAGE
  38. 38. 3RD-PARTY APPS AND SOCIALNETWORKSIn our connected world services like Facebook, Twitteretc allow access to 3rd party apps which can use someof their featuresFor example my Facebook account allows my tumblrblog to create a link on Facebook everytime I post totumblr.Certain apps can compromise your account if they postmessages to your followers or worse
  39. 39. MANAGING 3RD-PARTY APPSCheck your app settings on each of your socialnetworksFor example in Facebook use account settings tomanage which apps you have allowedRemove ones you are unsure about
  40. 40. METADATAMetadata is data about dataEg if I take a photo (data) the data about it wouldincludeTimestampCamera typePhoto settings and depending on the type of deviceCo-ordinates derived from GPSLINKS ON PAGE
  41. 41. GEOTAGGINGGeotagging is the process of attaching a GPS locationto a piece of digital content- Photo- Tweet- Foursquare checkinIt has benefits but also negatives – daughter posting apicture of herself at home online with photo geotagged?
  42. 42. DEALING WITH GEOTAGGINGCheck the settings on your child’s smartphone- An iPhone for example can turn location settings offApps such as Twitter also have flags for turning on/offgeotaggingLINKS ON PAGE
  43. 43. SHORT LINKS ON TWITTERDue to the length of twitter posts longer emailaddresses are often shortened such ashttp://community.computingatschool.org.uk/Is shortened to …http://bit.ly/OmnaufUse http://longurl.org to extend the address if you areunsure as to where it might lead youLINKS ON PAGE
  44. 44. MANAGING SMARTPHONES ANDTABLETSFor very young children use ‘Guided Access’ for iPadsUse gift vouchers to manage the purchase of appsUse the restrictions panel on an iPhone or iPad tomanage things like in-app purchasesManage the iTunes password yourself – this will controlthe apps downloadedLINKS ON PAGE
  45. 45. LOSING AN EXPENSIVE DEVICEFor Apple devices use iCloud and Find my iPhone tolocate missing devices, ping them or lock them downSimilar services can be purchased for Android devicesLINKS ON PAGE
  46. 46. MESSAGING ON SMARTDEVICESParents can’t do surveillance like the NSA can!Skype is reasonably popularMore popular are over-the-top messaging apps such asWhats-app or iMessage – text message servicesRecently popular is Snapchat
  47. 47. DEALING WITH INAPPROPRIATECOMMUNICATIONSGather evidence!If you are aware of the apps your children are usingfamiliarise yourself with how to collect evidenceTake that evidence to organisations like CEOP
  48. 48. SUMMARY OF SUGGESTIONSSecure Passwords and multiple levels of loginsUse one security suite but a range of extra toolsDiscuss with your children and show them you areknowledgeable as wellKnow what agencies can help if something doeshappen
  49. 49. IN CONCLUSIONEsafety will always be evolvingKeep on top of developments yourselfIncrease your trust in your children as they get older
  50. 50. FURTHER LINKShttp://www.childline.org.uk/https://delicious.com/briansharland/esafety - mybookmarks on e-safetyhttp://thinkuknow.co.ukGoogle security tools
  51. 51. Thank youAny questions?Continue the discussion @sharlandor athttp://ryecomputing.wordpress.com/esafety
  52. 52. Reading requires time andattention. Reading is a cognitive,mental, emotional action, andtoday it is under pressure from allthis speed of the Internet and thewhole digital world. The biggestprinciple of this world is speed,everything has to do with speed,that is how it is measured andthat is how it is lived. When youread a book or a poem or listen tomusic, there is a matter ofmoderation, of time. Thistechnology is an assault on time.Leon WieseltierJune 2013
  53. 53. Image credits• Minecraft image – screenshot from in-game• Image: Oklahoma tornadoreliefhttp://www.flickr.com/photos/39513508@N06/8867770414

×