Internet Safety

657 views

Published on

Videos on
www.sharonnagyjohnson.com
“Governors safety initiative” Internet safety “train-the-trainer” training to give effective internet safety presentations to students and parents, as well as community groups. The Keynote created was using material provided by the NJ State Police and Ad Council’s public service advertisements, all of which is free to use

Published in: Education, Health & Medicine
2 Comments
0 Likes
Statistics
Notes
  • Video on www.sharonnagyjohnson.com Internet Safety page
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Video on www.sharonnagyjohnson.com Internet Safety page
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Views
Total views
657
On SlideShare
0
From Embeds
0
Number of Embeds
12
Actions
Shares
0
Downloads
31
Comments
2
Likes
0
Embeds 0
No embeds

No notes for slide
  • Internet Safety

    1. 2. <ul><li>Kids usually use their real name, school, etc. </li></ul><ul><li>Can establish a false identity/fake info </li></ul><ul><li>No credit cards </li></ul><ul><li>No age verification </li></ul><ul><li>2 nd most hit site </li></ul>
    2. 3. PRIVATE
    3. 4. <ul><li>Private accounts can be broken into </li></ul><ul><ul><li>Accounts linked/searches </li></ul></ul><ul><ul><li>Social engineering Pages aren’t censored </li></ul></ul><ul><li>Adult subjects </li></ul><ul><li>Graphics </li></ul><ul><li>Anyone can search and find info </li></ul>
    4. 5. <ul><li>Strangers </li></ul><ul><li>Celebrities </li></ul><ul><li>Cyber Bullies </li></ul><ul><li>Gang activity </li></ul><ul><li>Movies </li></ul><ul><li>Restaurants </li></ul><ul><li>Businesses </li></ul>
    5. 6. <ul><li>Cooperative with law enforcement </li></ul><ul><li>Parents and teachers can contact myspace to take down pages </li></ul><ul><li>Search for kids info </li></ul><ul><li>Now requiring authentic email addresses </li></ul>
    6. 7. <ul><li>Background checks </li></ul><ul><li>Criminal activities </li></ul><ul><li>Employers use to weed out applicants </li></ul><ul><li>Embarrassed when page is shown even among peers </li></ul>A LIFE RESUME
    7. 10. Meeting Online With Goal to Meet In-Person
    8. 11. Human Element <ul><li>Face-to-face </li></ul><ul><ul><li>Words 7% </li></ul></ul><ul><ul><li>Body language 90+% </li></ul></ul><ul><ul><li>Tone/pitch 35+% </li></ul></ul><ul><ul><li>Pitch-Tone-Amplitude-Syllable Duration all greater during deceptive communication </li></ul></ul><ul><li>Online </li></ul><ul><ul><li>7% info available </li></ul></ul><ul><ul><li>Easier to conceal informative for intuition </li></ul></ul><ul><li>Disconnect between virtual and physical </li></ul>
    9. 12. Human Element <ul><li>No vision-no intuition </li></ul><ul><li>No “creep vibe” </li></ul><ul><li>Easier to be sexually explicit </li></ul><ul><li>Less shy online (would kids stand in the middle of the mall and say “Who wants to talk?”) </li></ul>
    10. 13. Predator ID <ul><li>Generally more intelligent </li></ul><ul><ul><li>Drs./Lawyers/College Professors/Engineers, etc. </li></ul></ul><ul><li>High degree of unsuccessful knock & talks </li></ul><ul><li>Past victimization that perpetuates itself </li></ul><ul><li>Need driven behavior (esp. dangerous) </li></ul><ul><li>Passive/aggressive personality </li></ul><ul><li>Master manipulators (using 7%) </li></ul>
    11. 14. Predator ID <ul><li>“Opportunist” </li></ul><ul><li>Likely to re-offend (1-10/will say 4-5) </li></ul><ul><li>Hanging around kids more than adults </li></ul><ul><li>Sex offender databases </li></ul>
    12. 15. Predator Targets <ul><li>Latchkey </li></ul><ul><li>Lonely </li></ul><ul><li>Shy </li></ul><ul><li>Depressed </li></ul><ul><li>Youth groups </li></ul>
    13. 16. Predators In Their Own Words
    14. 17. Higher Risks <ul><li>Communicating with strangers </li></ul><ul><li>To meet friends </li></ul><ul><li>Sexually explicit </li></ul><ul><li>Sexually curious </li></ul><ul><li>Send explicit photos </li></ul><ul><li>Web cam </li></ul><ul><li>Special needs kids especially vulnerable </li></ul><ul><li>Most luring occurs between 3-6 pm </li></ul>
    15. 18. Grooming Process <ul><li>Shared interests </li></ul><ul><li>“ Fit in” with youth’s life </li></ul><ul><li>Slow methodical process to build trust </li></ul><ul><ul><li>Will work to befriend even up to a year </li></ul></ul><ul><li>Convince family to trust </li></ul><ul><li>Always interested in whatever is said </li></ul><ul><li>Always claiming to understand and agree </li></ul><ul><li>Breaks down barriers-new relationship/new barrier </li></ul><ul><li>Excess attention </li></ul><ul><li>Gifts </li></ul>
    16. 19. Grooming Process <ul><li>Accumulate useful info </li></ul><ul><ul><li>Soft info (I like…my favorite…) </li></ul></ul><ul><ul><li>Achilles heel of victims-emotional info </li></ul></ul><ul><li>Desensitizes kids by sending porn cartoon to break down barriers or disgusting/violent images </li></ul><ul><ul><li>Leaves weird psychological imprints (even detectives need “critical stress debriefings” w/o realizing it when certain images are stamped into the mind) </li></ul></ul><ul><li>Goal is to meet in person </li></ul>
    17. 20. Other Dangers <ul><li>What today’s kids are exposed to is vastly different than what we were at their age </li></ul><ul><li>P2P </li></ul><ul><li>Chat rooms </li></ul><ul><ul><li>Thematic, regionalized, no age verification </li></ul></ul><ul><li>IMing </li></ul><ul><li>Meebo (IM from anywhere across companies-no downloads) </li></ul><ul><li>Cell phones </li></ul>
    18. 21. P2P <ul><li>Can trade movies, pics, music, porn </li></ul><ul><li>Share files with everyone </li></ul>
    19. 22. P2P <ul><li>No servers </li></ul><ul><li>Nodes connected to nodes </li></ul><ul><li>Bandwidth a must </li></ul><ul><li>No company mandates </li></ul><ul><li>Anonymity (Freenet) </li></ul><ul><li>Encryption (Impedes law enforcement efforts) </li></ul><ul><li>Bestiality </li></ul><ul><li>Child porn and other (“will make you cry”) </li></ul><ul><li>Defecation </li></ul>
    20. 24. Music Industry Wins Illegal Downloading Case Associated Press Friday, October 5, 2007; Page D02 DULUTH, Minn., Oct. 4 -- The recording industry won a key fight Thursday against illegal music downloading when a federal jury found that a Minnesota woman shared copyrighted music online and levied $222,000 in damages against her. The jury ordered Jammie Thomas , 30, to pay the six record companies that sued her $9,250 for each of 24 songs they focused on in the case. They had alleged she shared 1,702 songs. Thomas and her attorney, Brian Toder, declined to comment as they left the courthouse. In the first such lawsuit to go to trial, the record companies accused Thomas of downloading the songs without permission and offering them online through Kazaa, a file-sharing program . Thomas denied wrongdoing and testified that she didn't have a Kazaa account.
    21. 25. Cell Phones <ul><li>Leaves house everyday </li></ul><ul><li>Electronic leash/surveillance for kids </li></ul><ul><li>Cameras </li></ul><ul><li>Videos </li></ul><ul><li>Autotexting (sex jokes, dating services, romance tips, etc.) </li></ul><ul><li>RAPID and EASY transfers to MASS </li></ul><ul><li>Thumb drives </li></ul><ul><li>New tech in other countries </li></ul>
    22. 26. Social Networks <ul><li>Behaviors are the danger </li></ul><ul><li>Anytime pics </li></ul><ul><li>Nothing private </li></ul><ul><li>Pics and postings = DRAMA between friends </li></ul><ul><li>Can’t say “don’t do it” </li></ul><ul><li>Focus on kids and reach out when young </li></ul><ul><li>Teach safety part of it </li></ul><ul><li>No shortage of threats, harassment, bullying-must still be dealt with </li></ul>
    23. 27. “Think Before You Post”
    24. 28. Think Before You Post <ul><li>Always assume </li></ul><ul><ul><li>Everyone can read post </li></ul></ul><ul><ul><li>All posts out there forever (diary/pics) </li></ul></ul><ul><ul><li>People reading posts can cause harm </li></ul></ul>
    25. 29. What to Do <ul><li>Educate </li></ul><ul><li>Don’t talk to strangers </li></ul><ul><li>Don’t give personal info </li></ul><ul><li>No pics unless comfortable with all relatives seeing or on front page of paper </li></ul><ul><li>No web cam! Ever! </li></ul><ul><li>No computer in bedroom </li></ul>
    26. 30. Connect Virtual to Physical
    27. 31. Proactive <ul><li>Too much privacy + too much technology = disaster </li></ul><ul><li>Focus groups with girls </li></ul><ul><li>Can’t get back photos once posted or sent </li></ul><ul><li>Photos printed/forwarded all the time </li></ul><ul><li>“Think Before You Post”-ANYONE can see and PRINT what is posted online </li></ul><ul><li>Connect virtual with physical </li></ul><ul><li>Skits as commercials </li></ul>
    28. 32. www.cybertipline.com
    29. 33. Stories <ul><li>Guy gets girl to do things while chatting-Records it and releases on P2P-Child porn within seconds and she thinks she’s chatting with 15 year old boy </li></ul><ul><li>Principal has fake page created </li></ul><ul><li>Superintendent accidentally forwarded “venting” email to a person she was venting about-then was in the newspapers </li></ul>
    30. 34. <ul><li>13 year old committed suicide </li></ul><ul><li>Bullied at school </li></ul><ul><li>Turned to Internet and met other suicidal teens </li></ul><ul><li>Parents helped to create new laws on bullying in Vermont </li></ul>www.ryanpatrickhalligan.com
    31. 35. Cyber Bullying Examples <ul><li>Postings </li></ul><ul><li>Internet polling (hot or not) </li></ul><ul><li>Texting </li></ul><ul><li>IMs </li></ul><ul><li>Sending/posting pics </li></ul><ul><li>Interactive games </li></ul>
    32. 36. Cyber Bullying Examples <ul><li>Exclusion </li></ul><ul><li>Trickery </li></ul><ul><li>Cyber stalking </li></ul><ul><li>Cyber threats </li></ul><ul><li>Emails </li></ul><ul><li>Stealing/using someone else’s passwords for impersonating others </li></ul><ul><li>Creating websites </li></ul>
    33. 37. Cyber Bullying Examples <ul><li>By proxy </li></ul><ul><li>Someone else gets punished for something they didn’t do </li></ul><ul><li>Warning or notify wars </li></ul><ul><li>Usually reported by a 3 rd party </li></ul><ul><li>Hacking </li></ul><ul><li>Signing people up </li></ul><ul><li>Flaming </li></ul>
    34. 38. Effects <ul><li>Exponential powers of Internet </li></ul><ul><li>Bystanders get involved </li></ul><ul><li>Strangers join in (all with 7%) </li></ul><ul><li>1 out of 10 get reported </li></ul><ul><li>Unaware of power of words </li></ul><ul><li>Victims become cyber bullies </li></ul><ul><li>FIGHTS IN SCHOOL </li></ul>
    35. 39. Cyber Bullying <ul><li>Videotaped beating on YouTube/Ch. 7 </li></ul><ul><li>Suicides </li></ul><ul><li>Damage is done regardless of punishment </li></ul>
    36. 40. Kids’ Justifications <ul><li>Didn’t think would get caught </li></ul><ul><li>Angry/revenge </li></ul><ul><li>Time </li></ul><ul><li>Tech toys </li></ul><ul><li>Just kidding </li></ul><ul><li>To get a reaction </li></ul><ul><li>Everyone does it </li></ul><ul><li>By accident </li></ul><ul><li>Free speech (to protect/not abuse) </li></ul>
    37. 41. What to do <ul><li>Ignore </li></ul><ul><li>Don’t reply </li></ul><ul><li>Print </li></ul><ul><li>Save </li></ul><ul><li>Tell adult </li></ul><ul><li>Report to ISP/local authorities </li></ul>
    38. 42. IT’S 10:00 DO YOU KNOW WHERE YOUR COMPUTER IS? <ul><li>Parents are ultimately responsible </li></ul><ul><li>Have username and password </li></ul><ul><li>Resources </li></ul><ul><ul><li>Spector Pro </li></ul></ul><ul><ul><li>Guardian Monitor </li></ul></ul><ul><ul><li>Web Watcher </li></ul></ul><ul><ul><li>Spy Recon </li></ul></ul><ul><ul><li>I Am Big Brother </li></ul></ul><ul><li>Install video surveillance and let them know </li></ul>
    39. 43. Oh, by the way…

    ×