SlideShare a Scribd company logo
Awareness of Children
Internet Addiction
By- Md.Shaqul Hasan
Aftab IT Ltd.
hasan@aitlbd.com
bdNOG 3
By-Md. Shaqul Hasan
2
Internet Status of Bangladesh
•  Online ISP start its operation in 1996 via VSAT
•  Bangladesh connected with submarine cable
from May, 2006
•  Connected with ITC from Nov, 2012
•  More then 45 million internet users
•  They are using more than 100 Gbps internet
bandwidth
•  Now, We are getting very cheaper bandwidth
bdNOG 3
By-Md. Shaqul Hasan
3
Internet user facts
•  A large number of user are under 18
•  Maximum internet using by mobile phone
•  A large number of user use internet only
for Social media
•  A large number of user use internet as an
entertainment media.
bdNOG 3
By-Md. Shaqul Hasan
4
An Internet Service Provider’s Add
bdNOG 3
By-Md. Shaqul Hasan
5
A Mobile Company’s Add
bdNOG 3
By-Md. Shaqul Hasan
6
Internet using device
•  Smart phone
•  Tab
•  Laptop
•  Desktop
bdNOG 3
By-Md. Shaqul Hasan
7
bdNOG 3
By-Md. Shaqul Hasan
8
Most visited web sites in
Bangladesh
•  1st is facebook.com
•  2nd is google.com
•  3rd is youtube.com
•  Ref: www.alexa.com
bdNOG 3
By-Md. Shaqul Hasan
9
Social Media User
bdNOG 3
By-Md. Shaqul Hasan
10
bdNOG 3
By-Md. Shaqul Hasan
11
What is Addiction ?
•  It is a psychological disorder
•  Addiction is defined as not having control
over any activities to the point where it
could be harmful to us.
bdNOG 3
By-Md. Shaqul Hasan
12
What is internet addiction of
children?
•  It is excessive use of the Internet that
makes the Internet more important than
study, family, friends, and daily or routine
work of children.
•  It is a compulsive behavior that
completely dominates the addict’s life.
bdNOG 3
By-Md. Shaqul Hasan
13
Causes of children Internet
addiction
•  Social Network Site
•  Internet for recreation
•  To relieve from unpleasant feelings
•  Cyber relationship
•  Loneliness
•  Easy accessibility of millions of web sites
with different flavor.
bdNOG 3
By-Md. Shaqul Hasan
14
Symptoms of Child internet
addiction
•  Compulsive use of internet
•  Failed attempts to control behavior
•  Less interaction with family and friends
•  Neglecting sleep to stay online
•  Lower appetite
•  Withdrawing from study
•  They will very angry when internet is disconnected
bdNOG 3
By-Md. Shaqul Hasan
15
Physical problems of Internet
addiction
•  Pain and numbness in hand and wrists.
•  Dry eyes or strained vision
•  Back ache and neck ache
•  Headache
•  Sleep disturbance
•  Weight gain or weight loss
•  Brain damage
bdNOG 3
By-Md. Shaqul Hasan
16
Mental Problems of internet
addiction
•  Failed attempts to control behavior
•  Craving more time on the computer and
internet
•  Isolation from friends and family
•  Feeling restless when not engaged in any
activity
•  Feeling guilty or depressed
•  Changes in sleep patterns
bdNOG 3
By-Md. Shaqul Hasan
17
Prevention
Prevention is better than cure
bdNOG 3
By-Md. Shaqul Hasan
18
Pre-internet training
•  Before connecting them with internet, Train up about
internet.
•  Set your children internet usage boundaries in early on
•  Let them know that what is habit and what is addiction.
•  Aware them about dark site of internet.
•  Encourage them about Internet as knowledge super
highway
bdNOG 3
By-Md. Shaqul Hasan
19
Monitoring
•  Like other activities, we have to monitor
children internet usages.
•  Review what is on your child's internet
device. Is they are busy with making task
or something else...?
•  If any doubt talk openly with your child
about your suspicions.
•  You may install an internet firewall for
home.
bdNOG 3
By-Md. Shaqul Hasan
20
Don’t make internet as
entertainment media
•  Never make internet connectivity to your child
recreational purposes .
•  If so, one day it will be gateway of some thing more…
bdNOG 3
By-Md. Shaqul Hasan
21
Make a Routine
•  Set a routine for internet using for your
children
•  Make an Internet Holiday in every week for
them
•  If not possible, at least a day in every
months.
bdNOG 3
By-Md. Shaqul Hasan
22
Government
•  Can make a regulation about internet for
children.
•  They can block porn web site.
•  Facilitate training to school and college
students about safer internet
•  They can include it to text book syllabus.
bdNOG 3
By-Md. Shaqul Hasan
23
Conclusion
•  Our children are the most vulnerable
members of our family and our society.
•  By Protecting them from addiction, we can
make the bright future of them and a better
Nation of our country.
bdNOG 3
By-Md. Shaqul Hasan
24
Stay Connected
With your Children
bdNOG 3
By-Md. Shaqul Hasan
25
Thank You!

More Related Content

What's hot

Negative Effects of Technology on Young Children
Negative Effects of Technology on Young ChildrenNegative Effects of Technology on Young Children
Negative Effects of Technology on Young Children
ascarcello
 
Kids and Screen Time
Kids and Screen TimeKids and Screen Time
Kids and Screen Time
Jenny Bryant
 
Internet addiction
Internet addictionInternet addiction
Internet addiction
SurabhiVasudevan
 
The negative impact of social media
The negative impact of social mediaThe negative impact of social media
The negative impact of social media
Proe24
 
Social Media and Adolescence
Social Media and Adolescence  Social Media and Adolescence
Social Media and Adolescence
Katrina Wallace
 
Use of Social Media among Adolescents
Use of Social Media among AdolescentsUse of Social Media among Adolescents
Use of Social Media among Adolescents
Pokhara University, Pokhara, Nepal
 
Internet Addiction Disorder
Internet Addiction DisorderInternet Addiction Disorder
Internet Addiction Disorder
Zulkarnain Achmad
 
Parenting the Digital Generation
Parenting the Digital GenerationParenting the Digital Generation
Parenting the Digital Generation
MediaSmarts | HabiloMédias
 
The Effects on Social Networking on Education
The Effects on Social Networking on EducationThe Effects on Social Networking on Education
The Effects on Social Networking on Education
Nash Nash
 
Internet Addiction , causes , symptoms and consequences
Internet Addiction , causes , symptoms and consequences Internet Addiction , causes , symptoms and consequences
Internet Addiction , causes , symptoms and consequences
Chetan Pandey
 
Effects of Screen Time on Young Children: Beneficial or Detrimental?
Effects of Screen Time on Young Children: Beneficial or Detrimental?Effects of Screen Time on Young Children: Beneficial or Detrimental?
Effects of Screen Time on Young Children: Beneficial or Detrimental?
kaylacar2
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
Pamela Moeai
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
Courtney Cole
 
Children, Technology and the Future
Children, Technology and the Future Children, Technology and the Future
Children, Technology and the Future
chawla15c
 
Media, violence and influence on youth
Media, violence and influence on youthMedia, violence and influence on youth
Media, violence and influence on youth
lilipusion
 
The affects of_teenage_pregnancy
The affects of_teenage_pregnancyThe affects of_teenage_pregnancy
The affects of_teenage_pregnancy
Robin Nein
 
Social Media: Kids & Teens
Social Media: Kids & TeensSocial Media: Kids & Teens
Social Media: Kids & Teens
Anne Oeldorf-Hirsch
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
Jennifer Holena
 
Social media addiction
Social media addictionSocial media addiction
Social media addiction
Suresh Kumar Murugesan
 
2020 Screen deaddiction
2020 Screen deaddiction2020 Screen deaddiction
2020 Screen deaddiction
Rooban Thavarajah
 

What's hot (20)

Negative Effects of Technology on Young Children
Negative Effects of Technology on Young ChildrenNegative Effects of Technology on Young Children
Negative Effects of Technology on Young Children
 
Kids and Screen Time
Kids and Screen TimeKids and Screen Time
Kids and Screen Time
 
Internet addiction
Internet addictionInternet addiction
Internet addiction
 
The negative impact of social media
The negative impact of social mediaThe negative impact of social media
The negative impact of social media
 
Social Media and Adolescence
Social Media and Adolescence  Social Media and Adolescence
Social Media and Adolescence
 
Use of Social Media among Adolescents
Use of Social Media among AdolescentsUse of Social Media among Adolescents
Use of Social Media among Adolescents
 
Internet Addiction Disorder
Internet Addiction DisorderInternet Addiction Disorder
Internet Addiction Disorder
 
Parenting the Digital Generation
Parenting the Digital GenerationParenting the Digital Generation
Parenting the Digital Generation
 
The Effects on Social Networking on Education
The Effects on Social Networking on EducationThe Effects on Social Networking on Education
The Effects on Social Networking on Education
 
Internet Addiction , causes , symptoms and consequences
Internet Addiction , causes , symptoms and consequences Internet Addiction , causes , symptoms and consequences
Internet Addiction , causes , symptoms and consequences
 
Effects of Screen Time on Young Children: Beneficial or Detrimental?
Effects of Screen Time on Young Children: Beneficial or Detrimental?Effects of Screen Time on Young Children: Beneficial or Detrimental?
Effects of Screen Time on Young Children: Beneficial or Detrimental?
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Children, Technology and the Future
Children, Technology and the Future Children, Technology and the Future
Children, Technology and the Future
 
Media, violence and influence on youth
Media, violence and influence on youthMedia, violence and influence on youth
Media, violence and influence on youth
 
The affects of_teenage_pregnancy
The affects of_teenage_pregnancyThe affects of_teenage_pregnancy
The affects of_teenage_pregnancy
 
Social Media: Kids & Teens
Social Media: Kids & TeensSocial Media: Kids & Teens
Social Media: Kids & Teens
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
Social media addiction
Social media addictionSocial media addiction
Social media addiction
 
2020 Screen deaddiction
2020 Screen deaddiction2020 Screen deaddiction
2020 Screen deaddiction
 

Viewers also liked

Internet for Development
Internet for DevelopmentInternet for Development
Internet for Development
Roberto Polillo
 
History and Evolution of Bangladesh Internet
History and Evolution of Bangladesh Internet History and Evolution of Bangladesh Internet
History and Evolution of Bangladesh Internet
Bangladesh Network Operators Group
 
India :Telecommunication Sector Report_August 2013
India :Telecommunication Sector Report_August 2013India :Telecommunication Sector Report_August 2013
India :Telecommunication Sector Report_August 2013
India Brand Equity Foundation
 
Optical Fiber Communication & Bangladesh
Optical Fiber Communication & BangladeshOptical Fiber Communication & Bangladesh
Optical Fiber Communication & Bangladesh
Md. Atiqur Rahman
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
Bangladesh Network Operators Group
 
IP Transit : Simple Math - Simple Calculation
IP Transit : Simple Math - Simple CalculationIP Transit : Simple Math - Simple Calculation
IP Transit : Simple Math - Simple Calculation
Bangladesh Network Operators Group
 
Children of the internet
Children of the internetChildren of the internet
Children of the internet
Team Pramkaew
 
Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh
Bangladesh Network Operators Group
 
Broadband for Digital Bangladesh & recommendation from ISPAB
Broadband for Digital Bangladesh & recommendation from ISPABBroadband for Digital Bangladesh & recommendation from ISPAB
Broadband for Digital Bangladesh & recommendation from ISPAB
Bangladesh Network Operators Group
 
Fast Convergence Techniques
Fast Convergence TechniquesFast Convergence Techniques
Fast Convergence Techniques
Bangladesh Network Operators Group
 
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Fakrul Alam
 
ISP status in Bangladesh 2016
ISP status in Bangladesh 2016ISP status in Bangladesh 2016
ISP status in Bangladesh 2016
Bangladesh Network Operators Group
 
Africa telecom market report, 2010 2011
Africa telecom market report, 2010 2011Africa telecom market report, 2010 2011
Africa telecom market report, 2010 2011
ResearchInChina
 
Design and Development of Internet System for Residential Smart-Grid
Design and Development of Internet System for Residential  Smart-Grid Design and Development of Internet System for Residential  Smart-Grid
Design and Development of Internet System for Residential Smart-Grid
Ateeq Ur Rehman
 
Internet Development Experiences and Lessons
Internet Development Experiences and Lessons Internet Development Experiences and Lessons
Internet Development Experiences and Lessons
Bangladesh Network Operators Group
 
Introduction to Development for the Internet
Introduction to Development for the InternetIntroduction to Development for the Internet
Introduction to Development for the Internet
Mike Crabb
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
bgmartinez1971
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 

Viewers also liked (19)

Internet for Development
Internet for DevelopmentInternet for Development
Internet for Development
 
History and Evolution of Bangladesh Internet
History and Evolution of Bangladesh Internet History and Evolution of Bangladesh Internet
History and Evolution of Bangladesh Internet
 
India :Telecommunication Sector Report_August 2013
India :Telecommunication Sector Report_August 2013India :Telecommunication Sector Report_August 2013
India :Telecommunication Sector Report_August 2013
 
Optical Fiber Communication & Bangladesh
Optical Fiber Communication & BangladeshOptical Fiber Communication & Bangladesh
Optical Fiber Communication & Bangladesh
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
IP Transit : Simple Math - Simple Calculation
IP Transit : Simple Math - Simple CalculationIP Transit : Simple Math - Simple Calculation
IP Transit : Simple Math - Simple Calculation
 
Children of the internet
Children of the internetChildren of the internet
Children of the internet
 
Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh
 
Broadband for Digital Bangladesh & recommendation from ISPAB
Broadband for Digital Bangladesh & recommendation from ISPABBroadband for Digital Bangladesh & recommendation from ISPAB
Broadband for Digital Bangladesh & recommendation from ISPAB
 
Fast Convergence Techniques
Fast Convergence TechniquesFast Convergence Techniques
Fast Convergence Techniques
 
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
 
ISP status in Bangladesh 2016
ISP status in Bangladesh 2016ISP status in Bangladesh 2016
ISP status in Bangladesh 2016
 
Africa telecom market report, 2010 2011
Africa telecom market report, 2010 2011Africa telecom market report, 2010 2011
Africa telecom market report, 2010 2011
 
Design and Development of Internet System for Residential Smart-Grid
Design and Development of Internet System for Residential  Smart-Grid Design and Development of Internet System for Residential  Smart-Grid
Design and Development of Internet System for Residential Smart-Grid
 
Internet Development Experiences and Lessons
Internet Development Experiences and Lessons Internet Development Experiences and Lessons
Internet Development Experiences and Lessons
 
Introduction to Development for the Internet
Introduction to Development for the InternetIntroduction to Development for the Internet
Introduction to Development for the Internet
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar to Awareness of Children Internet Addiction

Technology Influence
Technology Influence Technology Influence
Technology Influence
Ilaxi Patel
 
E safety-parent-workshop
E safety-parent-workshop E safety-parent-workshop
E safety-parent-workshop
wwihead
 
Joint nigerian preso email
Joint nigerian preso emailJoint nigerian preso email
Joint nigerian preso email
Rachel Silver
 
Georgi Apostolov – Child’s privacy on the Internet
Georgi Apostolov – Child’s privacy on the Internet Georgi Apostolov – Child’s privacy on the Internet
Georgi Apostolov – Child’s privacy on the Internet
Metamorphosis
 
Internet safety
Internet safetyInternet safety
Internet safety
MsPasek
 
Digital Citizenship Presentation.pptx
Digital Citizenship Presentation.pptxDigital Citizenship Presentation.pptx
Digital Citizenship Presentation.pptx
Waqar Ahmed
 
Internet_Addiction.pptx
Internet_Addiction.pptxInternet_Addiction.pptx
Internet_Addiction.pptx
ssuserd66a40
 
Social Media: Risks and Benefits
Social Media: Risks and BenefitsSocial Media: Risks and Benefits
Social Media: Risks and Benefits
Steve Young
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigations
CreepSquash
 
“Never go through our chats and phones without our consent!” The emerging i...
“Never go through our chats and phones without our consent!”   The emerging i...“Never go through our chats and phones without our consent!”   The emerging i...
“Never go through our chats and phones without our consent!” The emerging i...
University of Sydney
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
CreepSquash
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
- Mark - Fullbright
 
Tweets, texts, and twerks: A Framework for Understanding Problematic Internet...
Tweets, texts, and twerks: A Framework for Understanding Problematic Internet...Tweets, texts, and twerks: A Framework for Understanding Problematic Internet...
Tweets, texts, and twerks: A Framework for Understanding Problematic Internet...
TristanLG
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
Candice Wimbles
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
Candice Wimbles
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
Diana Benner
 
First Nations ICT Summit Vancouver 2009
First Nations ICT Summit Vancouver 2009First Nations ICT Summit Vancouver 2009
First Nations ICT Summit Vancouver 2009
Barbara Craig
 
Safety Net: A Parent's Guide (Infographic)
Safety Net: A Parent's Guide (Infographic)Safety Net: A Parent's Guide (Infographic)
Safety Net: A Parent's Guide (Infographic)
uKnow.com
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
Emmanuel Arthur
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
Emmanuel Arthur
 

Similar to Awareness of Children Internet Addiction (20)

Technology Influence
Technology Influence Technology Influence
Technology Influence
 
E safety-parent-workshop
E safety-parent-workshop E safety-parent-workshop
E safety-parent-workshop
 
Joint nigerian preso email
Joint nigerian preso emailJoint nigerian preso email
Joint nigerian preso email
 
Georgi Apostolov – Child’s privacy on the Internet
Georgi Apostolov – Child’s privacy on the Internet Georgi Apostolov – Child’s privacy on the Internet
Georgi Apostolov – Child’s privacy on the Internet
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Digital Citizenship Presentation.pptx
Digital Citizenship Presentation.pptxDigital Citizenship Presentation.pptx
Digital Citizenship Presentation.pptx
 
Internet_Addiction.pptx
Internet_Addiction.pptxInternet_Addiction.pptx
Internet_Addiction.pptx
 
Social Media: Risks and Benefits
Social Media: Risks and BenefitsSocial Media: Risks and Benefits
Social Media: Risks and Benefits
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigations
 
“Never go through our chats and phones without our consent!” The emerging i...
“Never go through our chats and phones without our consent!”   The emerging i...“Never go through our chats and phones without our consent!”   The emerging i...
“Never go through our chats and phones without our consent!” The emerging i...
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 
Tweets, texts, and twerks: A Framework for Understanding Problematic Internet...
Tweets, texts, and twerks: A Framework for Understanding Problematic Internet...Tweets, texts, and twerks: A Framework for Understanding Problematic Internet...
Tweets, texts, and twerks: A Framework for Understanding Problematic Internet...
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
 
First Nations ICT Summit Vancouver 2009
First Nations ICT Summit Vancouver 2009First Nations ICT Summit Vancouver 2009
First Nations ICT Summit Vancouver 2009
 
Safety Net: A Parent's Guide (Infographic)
Safety Net: A Parent's Guide (Infographic)Safety Net: A Parent's Guide (Infographic)
Safety Net: A Parent's Guide (Infographic)
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 

More from Bangladesh Network Operators Group

Maximizing Network Efficiency with Large Language Models (LLM)
Maximizing Network Efficiency with Large Language Models (LLM)Maximizing Network Efficiency with Large Language Models (LLM)
Maximizing Network Efficiency with Large Language Models (LLM)
Bangladesh Network Operators Group
 
Geolocation and Geofeed Implementation bdNOG18
Geolocation and Geofeed Implementation bdNOG18Geolocation and Geofeed Implementation bdNOG18
Geolocation and Geofeed Implementation bdNOG18
Bangladesh Network Operators Group
 
Data Centre Design Consideration for Bangladesh
Data Centre Design Consideration for BangladeshData Centre Design Consideration for Bangladesh
Data Centre Design Consideration for Bangladesh
Bangladesh Network Operators Group
 
DNS Troubleshooting - Assumptions and Problem Breakdown
DNS Troubleshooting - Assumptions and Problem BreakdownDNS Troubleshooting - Assumptions and Problem Breakdown
DNS Troubleshooting - Assumptions and Problem Breakdown
Bangladesh Network Operators Group
 
Team Cymru Community Services,Overview of all public services
Team Cymru Community Services,Overview of all public servicesTeam Cymru Community Services,Overview of all public services
Team Cymru Community Services,Overview of all public services
Bangladesh Network Operators Group
 
Open Source TCP or Netflow Log Server Using Graylog
Open Source TCP or Netflow Log Server Using GraylogOpen Source TCP or Netflow Log Server Using Graylog
Open Source TCP or Netflow Log Server Using Graylog
Bangladesh Network Operators Group
 
Enhancing seamless access using TIGERfed
Enhancing seamless access using TIGERfedEnhancing seamless access using TIGERfed
Enhancing seamless access using TIGERfed
Bangladesh Network Operators Group
 
Software Defined Networking, Concepts and Practical Implementations
Software Defined Networking, Concepts and Practical ImplementationsSoftware Defined Networking, Concepts and Practical Implementations
Software Defined Networking, Concepts and Practical Implementations
Bangladesh Network Operators Group
 
IPv6 Deployment Planning and Security Considerations
IPv6 Deployment Planning and Security ConsiderationsIPv6 Deployment Planning and Security Considerations
IPv6 Deployment Planning and Security Considerations
Bangladesh Network Operators Group
 
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and CephAccelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Bangladesh Network Operators Group
 
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJRecent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
Bangladesh Network Operators Group
 
Fact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in BangladeshFact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in Bangladesh
Bangladesh Network Operators Group
 
AI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the PyramidAI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the Pyramid
Bangladesh Network Operators Group
 
IPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCTIPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCT
Bangladesh Network Operators Group
 
Network eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life ProductNetwork eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life Product
Bangladesh Network Operators Group
 
A plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s DeploymentA plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s Deployment
Bangladesh Network Operators Group
 
IPv6 Deployment in South Asia 2022
IPv6 Deployment in South Asia  2022IPv6 Deployment in South Asia  2022
IPv6 Deployment in South Asia 2022
Bangladesh Network Operators Group
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
Bangladesh Network Operators Group
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
Bangladesh Network Operators Group
 
An Overview about open UDP Services
An Overview about open UDP ServicesAn Overview about open UDP Services
An Overview about open UDP Services
Bangladesh Network Operators Group
 

More from Bangladesh Network Operators Group (20)

Maximizing Network Efficiency with Large Language Models (LLM)
Maximizing Network Efficiency with Large Language Models (LLM)Maximizing Network Efficiency with Large Language Models (LLM)
Maximizing Network Efficiency with Large Language Models (LLM)
 
Geolocation and Geofeed Implementation bdNOG18
Geolocation and Geofeed Implementation bdNOG18Geolocation and Geofeed Implementation bdNOG18
Geolocation and Geofeed Implementation bdNOG18
 
Data Centre Design Consideration for Bangladesh
Data Centre Design Consideration for BangladeshData Centre Design Consideration for Bangladesh
Data Centre Design Consideration for Bangladesh
 
DNS Troubleshooting - Assumptions and Problem Breakdown
DNS Troubleshooting - Assumptions and Problem BreakdownDNS Troubleshooting - Assumptions and Problem Breakdown
DNS Troubleshooting - Assumptions and Problem Breakdown
 
Team Cymru Community Services,Overview of all public services
Team Cymru Community Services,Overview of all public servicesTeam Cymru Community Services,Overview of all public services
Team Cymru Community Services,Overview of all public services
 
Open Source TCP or Netflow Log Server Using Graylog
Open Source TCP or Netflow Log Server Using GraylogOpen Source TCP or Netflow Log Server Using Graylog
Open Source TCP or Netflow Log Server Using Graylog
 
Enhancing seamless access using TIGERfed
Enhancing seamless access using TIGERfedEnhancing seamless access using TIGERfed
Enhancing seamless access using TIGERfed
 
Software Defined Networking, Concepts and Practical Implementations
Software Defined Networking, Concepts and Practical ImplementationsSoftware Defined Networking, Concepts and Practical Implementations
Software Defined Networking, Concepts and Practical Implementations
 
IPv6 Deployment Planning and Security Considerations
IPv6 Deployment Planning and Security ConsiderationsIPv6 Deployment Planning and Security Considerations
IPv6 Deployment Planning and Security Considerations
 
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and CephAccelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
 
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJRecent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
 
Fact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in BangladeshFact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in Bangladesh
 
AI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the PyramidAI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the Pyramid
 
IPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCTIPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCT
 
Network eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life ProductNetwork eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life Product
 
A plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s DeploymentA plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s Deployment
 
IPv6 Deployment in South Asia 2022
IPv6 Deployment in South Asia  2022IPv6 Deployment in South Asia  2022
IPv6 Deployment in South Asia 2022
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
 
An Overview about open UDP Services
An Overview about open UDP ServicesAn Overview about open UDP Services
An Overview about open UDP Services
 

Recently uploaded

Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in CityGirls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in City
dilbaagsingh0898
 
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
mahigarg2024#G05
 
Use of Ontologies in Chemical Kinetic Database CHEMCONNECT
Use of Ontologies in Chemical Kinetic Database CHEMCONNECTUse of Ontologies in Chemical Kinetic Database CHEMCONNECT
Use of Ontologies in Chemical Kinetic Database CHEMCONNECT
Edward Blurock
 
Understanding Threat Intelligence | What is Threat Intelligence
Understanding Threat Intelligence | What is Threat IntelligenceUnderstanding Threat Intelligence | What is Threat Intelligence
Understanding Threat Intelligence | What is Threat Intelligence
Lumiverse Solutions Pvt Ltd
 
2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage
Zsolt Nemeth
 
Bitcoin vs Ethereum Which Crypto Performed Better in Q2, 2024.docx
Bitcoin vs Ethereum Which Crypto Performed Better in Q2, 2024.docxBitcoin vs Ethereum Which Crypto Performed Better in Q2, 2024.docx
Bitcoin vs Ethereum Which Crypto Performed Better in Q2, 2024.docx
SFC Today
 
Why Your Business Needs a Professional Web Design Company UAE
Why Your Business Needs a Professional Web Design Company UAEWhy Your Business Needs a Professional Web Design Company UAE
Why Your Business Needs a Professional Web Design Company UAE
adelewhite125
 
Draya Michele’s Son – Kniko Howard’s Rise to Fame.pptx
Draya Michele’s Son – Kniko Howard’s Rise to Fame.pptxDraya Michele’s Son – Kniko Howard’s Rise to Fame.pptx
Draya Michele’s Son – Kniko Howard’s Rise to Fame.pptx
ashishkumarrana9
 
Career Development Advice for Network Engineers across the Pacific, presented...
Career Development Advice for Network Engineers across the Pacific, presented...Career Development Advice for Network Engineers across the Pacific, presented...
Career Development Advice for Network Engineers across the Pacific, presented...
APNIC
 
Trump Assassination Shirt Trump Assassination Shirt
Trump Assassination Shirt Trump Assassination ShirtTrump Assassination Shirt Trump Assassination Shirt
Trump Assassination Shirt Trump Assassination Shirt
exgf28
 
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai AvailableChennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
shamrisumri
 
Network Layer and its protocols mod .pptx
Network Layer and its protocols mod .pptxNetwork Layer and its protocols mod .pptx
Network Layer and its protocols mod .pptx
cossykin19
 
Top 50 Data Science Jobs on LinkedIn.docx
Top 50 Data Science Jobs on LinkedIn.docxTop 50 Data Science Jobs on LinkedIn.docx
Top 50 Data Science Jobs on LinkedIn.docx
analyticsinsightmaga
 
Female Service Girls Call Delhi 9873940964 Provide Best And Top Girl Service ...
Female Service Girls Call Delhi 9873940964 Provide Best And Top Girl Service ...Female Service Girls Call Delhi 9873940964 Provide Best And Top Girl Service ...
Female Service Girls Call Delhi 9873940964 Provide Best And Top Girl Service ...
elbertablack
 
Week 1 - Pendidikan Pancasila - Gr 1.docx
Week 1 - Pendidikan Pancasila - Gr 1.docxWeek 1 - Pendidikan Pancasila - Gr 1.docx
Week 1 - Pendidikan Pancasila - Gr 1.docx
JunaManroe1
 
My President is bulletproof t shirts hoodie
My President is bulletproof t shirts hoodieMy President is bulletproof t shirts hoodie
My President is bulletproof t shirts hoodie
exgf28
 
Digital ethnography of the Polish darknet drug trade community
Digital ethnography of the Polish darknet drug trade communityDigital ethnography of the Polish darknet drug trade community
Digital ethnography of the Polish darknet drug trade community
Piotr Siuda
 
SisAi World - Software is AI - Providing AI as Software - Protecting the Inte...
SisAi World - Software is AI - Providing AI as Software - Protecting the Inte...SisAi World - Software is AI - Providing AI as Software - Protecting the Inte...
SisAi World - Software is AI - Providing AI as Software - Protecting the Inte...
QingjieDu1
 
University of California, Riverside diploma
University of California, Riverside diplomaUniversity of California, Riverside diploma
University of California, Riverside diploma
eufdev
 
Top 50 Telephone Conversation Sample Examples For IT Industries.pdf
Top 50 Telephone Conversation Sample Examples For IT Industries.pdfTop 50 Telephone Conversation Sample Examples For IT Industries.pdf
Top 50 Telephone Conversation Sample Examples For IT Industries.pdf
Krishna L
 

Recently uploaded (20)

Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in CityGirls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in City
 
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
 
Use of Ontologies in Chemical Kinetic Database CHEMCONNECT
Use of Ontologies in Chemical Kinetic Database CHEMCONNECTUse of Ontologies in Chemical Kinetic Database CHEMCONNECT
Use of Ontologies in Chemical Kinetic Database CHEMCONNECT
 
Understanding Threat Intelligence | What is Threat Intelligence
Understanding Threat Intelligence | What is Threat IntelligenceUnderstanding Threat Intelligence | What is Threat Intelligence
Understanding Threat Intelligence | What is Threat Intelligence
 
2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage
 
Bitcoin vs Ethereum Which Crypto Performed Better in Q2, 2024.docx
Bitcoin vs Ethereum Which Crypto Performed Better in Q2, 2024.docxBitcoin vs Ethereum Which Crypto Performed Better in Q2, 2024.docx
Bitcoin vs Ethereum Which Crypto Performed Better in Q2, 2024.docx
 
Why Your Business Needs a Professional Web Design Company UAE
Why Your Business Needs a Professional Web Design Company UAEWhy Your Business Needs a Professional Web Design Company UAE
Why Your Business Needs a Professional Web Design Company UAE
 
Draya Michele’s Son – Kniko Howard’s Rise to Fame.pptx
Draya Michele’s Son – Kniko Howard’s Rise to Fame.pptxDraya Michele’s Son – Kniko Howard’s Rise to Fame.pptx
Draya Michele’s Son – Kniko Howard’s Rise to Fame.pptx
 
Career Development Advice for Network Engineers across the Pacific, presented...
Career Development Advice for Network Engineers across the Pacific, presented...Career Development Advice for Network Engineers across the Pacific, presented...
Career Development Advice for Network Engineers across the Pacific, presented...
 
Trump Assassination Shirt Trump Assassination Shirt
Trump Assassination Shirt Trump Assassination ShirtTrump Assassination Shirt Trump Assassination Shirt
Trump Assassination Shirt Trump Assassination Shirt
 
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai AvailableChennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
 
Network Layer and its protocols mod .pptx
Network Layer and its protocols mod .pptxNetwork Layer and its protocols mod .pptx
Network Layer and its protocols mod .pptx
 
Top 50 Data Science Jobs on LinkedIn.docx
Top 50 Data Science Jobs on LinkedIn.docxTop 50 Data Science Jobs on LinkedIn.docx
Top 50 Data Science Jobs on LinkedIn.docx
 
Female Service Girls Call Delhi 9873940964 Provide Best And Top Girl Service ...
Female Service Girls Call Delhi 9873940964 Provide Best And Top Girl Service ...Female Service Girls Call Delhi 9873940964 Provide Best And Top Girl Service ...
Female Service Girls Call Delhi 9873940964 Provide Best And Top Girl Service ...
 
Week 1 - Pendidikan Pancasila - Gr 1.docx
Week 1 - Pendidikan Pancasila - Gr 1.docxWeek 1 - Pendidikan Pancasila - Gr 1.docx
Week 1 - Pendidikan Pancasila - Gr 1.docx
 
My President is bulletproof t shirts hoodie
My President is bulletproof t shirts hoodieMy President is bulletproof t shirts hoodie
My President is bulletproof t shirts hoodie
 
Digital ethnography of the Polish darknet drug trade community
Digital ethnography of the Polish darknet drug trade communityDigital ethnography of the Polish darknet drug trade community
Digital ethnography of the Polish darknet drug trade community
 
SisAi World - Software is AI - Providing AI as Software - Protecting the Inte...
SisAi World - Software is AI - Providing AI as Software - Protecting the Inte...SisAi World - Software is AI - Providing AI as Software - Protecting the Inte...
SisAi World - Software is AI - Providing AI as Software - Protecting the Inte...
 
University of California, Riverside diploma
University of California, Riverside diplomaUniversity of California, Riverside diploma
University of California, Riverside diploma
 
Top 50 Telephone Conversation Sample Examples For IT Industries.pdf
Top 50 Telephone Conversation Sample Examples For IT Industries.pdfTop 50 Telephone Conversation Sample Examples For IT Industries.pdf
Top 50 Telephone Conversation Sample Examples For IT Industries.pdf
 

Awareness of Children Internet Addiction

  • 1. Awareness of Children Internet Addiction By- Md.Shaqul Hasan Aftab IT Ltd. hasan@aitlbd.com
  • 2. bdNOG 3 By-Md. Shaqul Hasan 2 Internet Status of Bangladesh •  Online ISP start its operation in 1996 via VSAT •  Bangladesh connected with submarine cable from May, 2006 •  Connected with ITC from Nov, 2012 •  More then 45 million internet users •  They are using more than 100 Gbps internet bandwidth •  Now, We are getting very cheaper bandwidth
  • 3. bdNOG 3 By-Md. Shaqul Hasan 3 Internet user facts •  A large number of user are under 18 •  Maximum internet using by mobile phone •  A large number of user use internet only for Social media •  A large number of user use internet as an entertainment media.
  • 4. bdNOG 3 By-Md. Shaqul Hasan 4 An Internet Service Provider’s Add
  • 5. bdNOG 3 By-Md. Shaqul Hasan 5 A Mobile Company’s Add
  • 6. bdNOG 3 By-Md. Shaqul Hasan 6 Internet using device •  Smart phone •  Tab •  Laptop •  Desktop
  • 8. bdNOG 3 By-Md. Shaqul Hasan 8 Most visited web sites in Bangladesh •  1st is facebook.com •  2nd is google.com •  3rd is youtube.com •  Ref: www.alexa.com
  • 9. bdNOG 3 By-Md. Shaqul Hasan 9 Social Media User
  • 11. bdNOG 3 By-Md. Shaqul Hasan 11 What is Addiction ? •  It is a psychological disorder •  Addiction is defined as not having control over any activities to the point where it could be harmful to us.
  • 12. bdNOG 3 By-Md. Shaqul Hasan 12 What is internet addiction of children? •  It is excessive use of the Internet that makes the Internet more important than study, family, friends, and daily or routine work of children. •  It is a compulsive behavior that completely dominates the addict’s life.
  • 13. bdNOG 3 By-Md. Shaqul Hasan 13 Causes of children Internet addiction •  Social Network Site •  Internet for recreation •  To relieve from unpleasant feelings •  Cyber relationship •  Loneliness •  Easy accessibility of millions of web sites with different flavor.
  • 14. bdNOG 3 By-Md. Shaqul Hasan 14 Symptoms of Child internet addiction •  Compulsive use of internet •  Failed attempts to control behavior •  Less interaction with family and friends •  Neglecting sleep to stay online •  Lower appetite •  Withdrawing from study •  They will very angry when internet is disconnected
  • 15. bdNOG 3 By-Md. Shaqul Hasan 15 Physical problems of Internet addiction •  Pain and numbness in hand and wrists. •  Dry eyes or strained vision •  Back ache and neck ache •  Headache •  Sleep disturbance •  Weight gain or weight loss •  Brain damage
  • 16. bdNOG 3 By-Md. Shaqul Hasan 16 Mental Problems of internet addiction •  Failed attempts to control behavior •  Craving more time on the computer and internet •  Isolation from friends and family •  Feeling restless when not engaged in any activity •  Feeling guilty or depressed •  Changes in sleep patterns
  • 17. bdNOG 3 By-Md. Shaqul Hasan 17 Prevention Prevention is better than cure
  • 18. bdNOG 3 By-Md. Shaqul Hasan 18 Pre-internet training •  Before connecting them with internet, Train up about internet. •  Set your children internet usage boundaries in early on •  Let them know that what is habit and what is addiction. •  Aware them about dark site of internet. •  Encourage them about Internet as knowledge super highway
  • 19. bdNOG 3 By-Md. Shaqul Hasan 19 Monitoring •  Like other activities, we have to monitor children internet usages. •  Review what is on your child's internet device. Is they are busy with making task or something else...? •  If any doubt talk openly with your child about your suspicions. •  You may install an internet firewall for home.
  • 20. bdNOG 3 By-Md. Shaqul Hasan 20 Don’t make internet as entertainment media •  Never make internet connectivity to your child recreational purposes . •  If so, one day it will be gateway of some thing more…
  • 21. bdNOG 3 By-Md. Shaqul Hasan 21 Make a Routine •  Set a routine for internet using for your children •  Make an Internet Holiday in every week for them •  If not possible, at least a day in every months.
  • 22. bdNOG 3 By-Md. Shaqul Hasan 22 Government •  Can make a regulation about internet for children. •  They can block porn web site. •  Facilitate training to school and college students about safer internet •  They can include it to text book syllabus.
  • 23. bdNOG 3 By-Md. Shaqul Hasan 23 Conclusion •  Our children are the most vulnerable members of our family and our society. •  By Protecting them from addiction, we can make the bright future of them and a better Nation of our country.
  • 24. bdNOG 3 By-Md. Shaqul Hasan 24 Stay Connected With your Children
  • 25. bdNOG 3 By-Md. Shaqul Hasan 25 Thank You!