SlideShare a Scribd company logo
Internet safety or online safety is the security of
people and their information when using the
Internet. Internet safety means protecting your
personal information while online. Details such as
your address, full name, telephone number, birth
date and/or social security number can potentially
be used by on-line criminals.
• Internet Predators
• Coffee-Shop-Data-Collectors
• “Script-Kiddies”
(what you might think of as “hackers”)
• Viruses /Trojans / Ad-Ware
• Those who take advantage of children &
teens
– Use “Social Engineering” to manipulate victim
– Sexual Intentions
– Murderous Intentions
– Other Malicious Intent
• Phishing Attempts
(Masquerading as a trustworthy entity while attempting to
acquire sensitive information)
• Scam Artists
– Email scams are meant to take your money
– Scams on Craigslist that are using you to commit
fraudulent activities
• Most public wireless connections are NOT secure
• It’s easy to capture your data
• Don’t log into websites that reveal your sensitive
credentials (email, bank account, etc.)
• Use onboard firewall software
• Lock your screen before leaving your seat
• Don’t store sensitive information on your computer
• Use an encryptedVPN (Virtual Private Network)
Typical unsecured wireless connection.
This is what you think that you are logging into…
Protect your traffic by encrypting it.
• It is clear, then, that the definition of “youth
online safety” has broadened and become more
complex in the past 10 years, as have the role of
the online user and the inter-connected devices
today’s user takes advantage of when
consuming, socializing, producing, and
connecting. In addition to cyberbullying,
inappropriate content, and predation, other risks
have emerged, including the risks related to
geolocation technology in online applications
and on mobile phones.
• Physical Safety – freedom from physical harm
• Psychological Safety – freedom from cruelty,
harassment, and exposure to potentially
disturbing material
• Reputational and Legal Safety – freedom from
unwanted social, academic, professional, and
legal consequences that could affect users for a
lifetime
• Identity, Property, and Community Safety –
freedom from theft of identity & property
• 75% of children and teens report sharing
personal information about them and their
families to complete strangers in chat rooms1
• 93% of teens (ages 12-to-17) use the Internet2
• 73% of teens use social network sites2
• 75% of teens own cell phones2
• 4% of teens have sent sexually suggestive
images or videos of themselves via cell phone,
and 15% have received such images from
someone they know2
• 43% of teens have been victims of cyberbullying3
 Avenues for online child
communication: blogs,
chat rooms, irc, IM,
Facebook, Facebook chat,
MySpace, Orkut, email,
Skype,Twitter, Identica,
Craigslist, forums, text
messages, etc….
 Educate your child about the dangers that
exist on the Internet
 Studies show that:
 Fear-based scare-tactics are not effective
 Use the "norms" approach - suggest that [insert
behavior here] is not a “norm” among youth's
peers and that people who engage in such activity
are abnormal and may need help
 Educate you child about safe Internet practices
 Use strong passwords (including numbers, special
characters, and combination of upper/lower case)
 Never give password to anyone
 Don't communicate online with people you don't know
 Enable & elevate privacy settings in Facebook
 Disable FacebookChat
 Do not allow Skype calls from anyone who is not on your
contact list
 Teach kids about responsible communication
 Do not share specific information about yourself, such as family info,
where you live, photos of yourself or your home, etc.
 Use an alias forWeb communications, not your real name / also use
avatar that is different from your actual photo
 Don't say anything online to someone that you would not be willing to
say directly to their face in person
 Don't open email attachments unless you know for certain what it is
 Be aware that actions have consequences - ex: nude photos, bad
language, inappropriate conduct, etc. - could have legal impacts,
embarrassment, or affect future job opportunities
 Inform you (the parent or another authority figure) if the child has
experienced anything online that makes him/her feel creepy or
uncomfortable
• Use Internet Content Filters
– Software that filters out unwanted websites, such as
pornography
– IP Addresses can be filtered using your router or yourWeb
browser
• Place computer in living room or other "common"
area within your home
• Regulate length of time child spends on Internet as
well as determine a window of time for usage
• Request list of email and social networking sites being
used and username/password for each account
• Perform random checks on your teenager's cell phone
to view text messages sent/received
 Strong Passwords:
 Phrases, mixed case, special characters, and long:
- 5db10mw! (Slow Down Buddy I’m On MyWay!)
- w@yD0wny0nd3r#% (Way DownYonder #%)
 Password Card:
 http://www.passwordcard.org/en
 Free Software for Content Filtering
 OpenDNS - FamilyShield: http://www.opendns.com/familyshield
 Parental Filter: http://www.softpedia.com/get/Security/Lockdown/Parental-Filter.shtml
 K9Web Protection: http://www1.k9webprotection.com
 ProCon Latte: http://procon.mozdev.org (read interesting related article)
 Content Filtering for Firefox
 KidZui - a safe browser and online playground for kids 3-12
 FoxFilterAdd-on for Firefox
 Interesting article on using manual proxy configurations
 FilteringContent with IE'sContentAdvisor
 Cyber Bullying occurs when people send or post
mean or threatening text or pictures on the
Internet. Examples:
 A kid could post stories about another kid online.
They could show the website to all of their friends.
When the victim goes back to school, he/she gets
teased about something they don’t know about.
 If a friend had your password, and you got into a
fight, they could send mean emails to everyone in
your address book. When your friends or family
open the email, they would think that it came from
you!They could feel very hurt and upset.
 Complaining that other children or a group of
children do not like them.
 Preoccupation with friendship concerns.
 Poor self-esteem. Feeling they are not as good
as others.
 Not wanting to go to school or other activities.
 Spending a great deal of time on the computer.
 Being secretive about online activities.
• Preserve evidence – this is crucial for identifying the
bully and making a case.
• Attempt to enlist assistance from the service
provider.
• If able to identify the bully, contact him or her
and/or parents.
• Use available blocking technology (i.e., block the
user on IM, email and chat.)
• In serious cases, seek assistance from the police
(i.e., threats of physical harm, unrelenting or unable
to stop.)
• Internet Explorer uses Active-X
controls for easy software
installation – not safe
• UseWeb Browser Alternatives:
Firefox, Opera, Safari
• UseVirus Software: Symantec,
McAffee, ClamWin, etc
• RegularWindows Updates (weekly)
• Don’t open email attachments
unless you know for certain what
they are
2.InternetSafety.ppt

More Related Content

Similar to 2.InternetSafety.ppt

How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
stevewrightco
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
Shreedeep Rayamajhi
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
Shreedeep Rayamajhi
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
PantegoChristian
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy1
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
Staci Trekles
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
SimonBalle
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
TeacherNicaPrintable
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012KanelandSvihlik
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
My protection plan
My protection planMy protection plan
My protection plan
Shakena12
 
Untitled Presentation.pdf
Untitled Presentation.pdfUntitled Presentation.pdf
Untitled Presentation.pdf
jhonmarraguindin179
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
LuciusonSecurity
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Staci Trekles
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
adblue2017
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
Amit Pal Singh
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
KanelandSvihlik
 

Similar to 2.InternetSafety.ppt (20)

How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Power Point Presentation by Auwalu Adamu
Power Point Presentation by Auwalu Adamu Power Point Presentation by Auwalu Adamu
Power Point Presentation by Auwalu Adamu
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
My protection plan
My protection planMy protection plan
My protection plan
 
Untitled Presentation.pdf
Untitled Presentation.pdfUntitled Presentation.pdf
Untitled Presentation.pdf
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 

Recently uploaded

The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 

2.InternetSafety.ppt

  • 1.
  • 2. Internet safety or online safety is the security of people and their information when using the Internet. Internet safety means protecting your personal information while online. Details such as your address, full name, telephone number, birth date and/or social security number can potentially be used by on-line criminals.
  • 3. • Internet Predators • Coffee-Shop-Data-Collectors • “Script-Kiddies” (what you might think of as “hackers”) • Viruses /Trojans / Ad-Ware • Those who take advantage of children & teens – Use “Social Engineering” to manipulate victim – Sexual Intentions – Murderous Intentions – Other Malicious Intent • Phishing Attempts (Masquerading as a trustworthy entity while attempting to acquire sensitive information) • Scam Artists – Email scams are meant to take your money – Scams on Craigslist that are using you to commit fraudulent activities
  • 4. • Most public wireless connections are NOT secure • It’s easy to capture your data • Don’t log into websites that reveal your sensitive credentials (email, bank account, etc.) • Use onboard firewall software • Lock your screen before leaving your seat • Don’t store sensitive information on your computer • Use an encryptedVPN (Virtual Private Network)
  • 5. Typical unsecured wireless connection. This is what you think that you are logging into…
  • 6.
  • 7. Protect your traffic by encrypting it.
  • 8. • It is clear, then, that the definition of “youth online safety” has broadened and become more complex in the past 10 years, as have the role of the online user and the inter-connected devices today’s user takes advantage of when consuming, socializing, producing, and connecting. In addition to cyberbullying, inappropriate content, and predation, other risks have emerged, including the risks related to geolocation technology in online applications and on mobile phones.
  • 9. • Physical Safety – freedom from physical harm • Psychological Safety – freedom from cruelty, harassment, and exposure to potentially disturbing material • Reputational and Legal Safety – freedom from unwanted social, academic, professional, and legal consequences that could affect users for a lifetime • Identity, Property, and Community Safety – freedom from theft of identity & property
  • 10. • 75% of children and teens report sharing personal information about them and their families to complete strangers in chat rooms1 • 93% of teens (ages 12-to-17) use the Internet2 • 73% of teens use social network sites2 • 75% of teens own cell phones2 • 4% of teens have sent sexually suggestive images or videos of themselves via cell phone, and 15% have received such images from someone they know2 • 43% of teens have been victims of cyberbullying3
  • 11.  Avenues for online child communication: blogs, chat rooms, irc, IM, Facebook, Facebook chat, MySpace, Orkut, email, Skype,Twitter, Identica, Craigslist, forums, text messages, etc….
  • 12.  Educate your child about the dangers that exist on the Internet  Studies show that:  Fear-based scare-tactics are not effective  Use the "norms" approach - suggest that [insert behavior here] is not a “norm” among youth's peers and that people who engage in such activity are abnormal and may need help
  • 13.  Educate you child about safe Internet practices  Use strong passwords (including numbers, special characters, and combination of upper/lower case)  Never give password to anyone  Don't communicate online with people you don't know  Enable & elevate privacy settings in Facebook  Disable FacebookChat  Do not allow Skype calls from anyone who is not on your contact list  Teach kids about responsible communication
  • 14.  Do not share specific information about yourself, such as family info, where you live, photos of yourself or your home, etc.  Use an alias forWeb communications, not your real name / also use avatar that is different from your actual photo  Don't say anything online to someone that you would not be willing to say directly to their face in person  Don't open email attachments unless you know for certain what it is  Be aware that actions have consequences - ex: nude photos, bad language, inappropriate conduct, etc. - could have legal impacts, embarrassment, or affect future job opportunities  Inform you (the parent or another authority figure) if the child has experienced anything online that makes him/her feel creepy or uncomfortable
  • 15. • Use Internet Content Filters – Software that filters out unwanted websites, such as pornography – IP Addresses can be filtered using your router or yourWeb browser • Place computer in living room or other "common" area within your home • Regulate length of time child spends on Internet as well as determine a window of time for usage • Request list of email and social networking sites being used and username/password for each account • Perform random checks on your teenager's cell phone to view text messages sent/received
  • 16.  Strong Passwords:  Phrases, mixed case, special characters, and long: - 5db10mw! (Slow Down Buddy I’m On MyWay!) - w@yD0wny0nd3r#% (Way DownYonder #%)
  • 17.  Password Card:  http://www.passwordcard.org/en
  • 18.
  • 19.  Free Software for Content Filtering  OpenDNS - FamilyShield: http://www.opendns.com/familyshield  Parental Filter: http://www.softpedia.com/get/Security/Lockdown/Parental-Filter.shtml  K9Web Protection: http://www1.k9webprotection.com  ProCon Latte: http://procon.mozdev.org (read interesting related article)  Content Filtering for Firefox  KidZui - a safe browser and online playground for kids 3-12  FoxFilterAdd-on for Firefox  Interesting article on using manual proxy configurations  FilteringContent with IE'sContentAdvisor
  • 20.  Cyber Bullying occurs when people send or post mean or threatening text or pictures on the Internet. Examples:  A kid could post stories about another kid online. They could show the website to all of their friends. When the victim goes back to school, he/she gets teased about something they don’t know about.  If a friend had your password, and you got into a fight, they could send mean emails to everyone in your address book. When your friends or family open the email, they would think that it came from you!They could feel very hurt and upset.
  • 21.  Complaining that other children or a group of children do not like them.  Preoccupation with friendship concerns.  Poor self-esteem. Feeling they are not as good as others.  Not wanting to go to school or other activities.  Spending a great deal of time on the computer.  Being secretive about online activities.
  • 22. • Preserve evidence – this is crucial for identifying the bully and making a case. • Attempt to enlist assistance from the service provider. • If able to identify the bully, contact him or her and/or parents. • Use available blocking technology (i.e., block the user on IM, email and chat.) • In serious cases, seek assistance from the police (i.e., threats of physical harm, unrelenting or unable to stop.)
  • 23. • Internet Explorer uses Active-X controls for easy software installation – not safe • UseWeb Browser Alternatives: Firefox, Opera, Safari • UseVirus Software: Symantec, McAffee, ClamWin, etc • RegularWindows Updates (weekly) • Don’t open email attachments unless you know for certain what they are