SlideShare a Scribd company logo
1 of 58
Cyber Safe Parenting
Rohit Srivastwa
Fonder, ClubHack
rohit@clubhack.com
@rohit11
Sexual
Hateful
Violent in nature
Dangerous
illegal.
Exposure to Inappropriate Material
When a child is tormented,
threatened, harassed,
humiliated, embarrassed or
otherwise targeted by another
child using the Internet,
interactive and digital
technologies or mobile phones.
Cyber Bully
Cyber Stalking
Matter of
concern for
every parent
specially for
girl child.
Morphed nude photos of an airhostess in Delhi, school girls in Mumbai on Orkut/Facebook
Pedophiles
• Gain a child’s confidence online
and then arrange a face-to-face
meeting.
• On meeting child is in great danger
of physical harm and permanent
psychological scarring.
Bullies can give away contact info to
provoke offline attack
Physical Harm
A ‘15 year old girl’ courts a 16 year old boy through a popular Internet chat
website. The boy runs away from home to Mumbai only to find out that the
‘girl’ was in fact a 30 year old man. The man sexually abuses the boy, steals his
money and severely beats him up.
• Hacking
• Hate group
• Defamatory activity
• Do cyber bully
• Do Stalking
Illegal Activity
A class 10 student, who was taunted by his classmates puts
up a pornographic website and displays nude "morphed"
images of his classmates and teachers.
Steal Credit Card to
• Buy Farmville cash
• Buy expensive gift for online bully
Possibilities are endless
Financial Crime
A 14-year-old boy used his father’s
credit card on viewing pornographic
websites costing in 1000s.
“I believe in my child
he or she will do no
wrong!”
Nischint App report (Feb-Apr 2015)
• Out of 33 lakh websites blocked by this app, majority are
hardcore pornographic websites which are meant only for
adults such as
• indiansexstories.net,
• Hardsextube.com,
• Pornhub.com
• Websites which are mostly opened by a kid:
• Facebook.com,
• Google.co.in,
• Flipkart.com,
• Cricinfo.com
Nischint App report (Feb-Apr 2015)
• Some of the most popular apps which kids downloaded:
• Whatsapp,
• Youtube,
• Facebook,
• Snapchat,
• Fifa 15,
• Candy crush,
• Learn to draw Lego Ninjago,
• Average hours spent per kid on social media sites such as
Whatsapp, Facebook, Twitter, Snapchat, Youtube: 3.4 hours
Nischint App report (Feb-Apr 2015)
• Average time spent by a child on the Internet, per hour:
40 seconds to 1 minute
• Number of videos shot by a kid, every day: 1.5
• Number of images taken by a kid, every day: 5
• Peak hours of apps usage: 5 PM to 8 PM
McAfee report
28% of teens chat with people they don’t know in the offline
world
– 24% shared their email address
– 18% shared a personal photo of themselves
– 12% shared their cell phone number
Girls are more likely than boys to chat with people online that
they don’t know in the offline world, (32% vs. 24%)
16 % of Girls are more likely to have given a description of
what they look like, than boys the same age (7%)
55% of teens hide what they do
online from parents
14 % of 13-17 year olds admit to having
engaged in some form of cyberbullying
behavior in 2010
McAfeereport
38% of teens close or minimize the browser
when their parents enter the room
46% of teens admit to downloading
pirated music or videos
16% of 16-17 year old boys have
downloaded x-rated content
24 % of parents thought someone
anonymous had tried to add their
child as a friend on social
networking sites
Indian Context
77% of teens have suffered
negative online experiences
only 50% of Indian parents
are actually aware of this
55% of the children said this
had actually happened
29% of parents thought their
child had downloaded a virus
40% children
reported this.
Symptoms & reason for concern
Un-family relationship
Kids are now too busy with computers that
they don’t have time for family, siblings etc.
Screen switching
Odd Hours of the Night
Sudden Prosperity
Withdrawal Symptoms
Unhappy phone calls
Strange friends
Strange Online Activities
Unwanted apps Installed on PC
(warez, dialer, keygen, crack)
How to keep an eye
• Be a friend on social
networking site
• Check browser history
regularly
• Check installed
software regularly
• Check logs regularly
• Create a
low
privilege
user
account
• Install good
antivirus
antispyware
firewall
• Install
parental
control
software
The Technical Answer
Smart
Antivirus
Nothing wrong
with free, even
Microsoft Security
Essentials is also
good enough
Smart
Anti-
spyware
Not all antivirus
fight against
spyware/adware/
ransomware
Smart
Firewall
Someone who
can protect you
from unwanted
incoming and
outgoing
connections
U p d a t e t h e m R e g u l a r l y
BUT
be aware of fake antivirus
They are cheap and widely
available online to download
Low Privilege User
ParentalControlSoftware
ParentalControlSoftware
ParentalControlAPP
InbuiltParentalControl
InbuiltParentalControl
InbuiltParentalControl
Even you know its not
going to work 
"Don't you trust me Dad?"
The Easy Solution
Shift computer
into a public place
in the home,
immediately!!
 A big NO for computer in bedroom
 Keep it in a place which is visible in normal
circumstances
• Be involved in
your child’s life!
 Create an atmosphere
where your child can
come to you and talk to
you.
 Ask them what they
learn.
 Accompany them.
 Share with them.
 Be a friend in offline
world too
• Learn All You Can
 You need to know what
your kids do
 Do the same stuff
 While you are teaching
them something, learn
from them too
 Else very soon they’ll
outsmart you
 Spend some time
listening to and
speaking with other
concerned parents.
• Limit the computer usage time
 Don’t allow late nights
 Don’t allow over usage
 Create a time table
 Force with parental
software if needed
Mom's 18-Point iPhone Rules for Son
Dec 30, 2012
http://is.gd/momiphone18rule
Teach Your Children
Good Internet
Practices
 Teach them how much
and what type of
information is
appropriate to share
 Talk about social
networking standards
 Teach them about safe
software
 Rules about strangers in
the real world apply on
the internet also
BE A GOOD DIGITAL
ROLE MODEL
 Curb your own bad
digital habits
 Know when to unplug
 Show your kids how to
collaborate and create
online
Instill a Healthy Fear
 Fear and respect for the dangers on the internet is
healthy!
 Put themselves in your shoes as their parent so
they can see how you’d feel if anything ever
happened to them!
Encourage Other Interests
Free your child
Give proper
guidance
Monitor illegal
activities
& then give them
full freedom to
explore
Rohit Srivastwa
Founder, ClubHack
rohit@clubhack.com
Image Credits
All images are taken from different sources online.
Most of them are marked as free for reuse
Some which were not marked are already used 10s of time online
Pardon under fair usage if any image is used without
acknowledgement, this presentation is non-commercial for
parental guidance.
Content Credits
McAfee,
Symantec,
http://timmyjohnboy.com/,
http://www.stopcyberbullying.org/,
http://asianlaws.org/fact/guidelines.htm
http://www.indianchild.com/
http://fosi.org

More Related Content

What's hot

A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety PresentationMichael Richards
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for childrenAvanzo net
 
Effects of social media on Youth
Effects of social media on YouthEffects of social media on Youth
Effects of social media on YouthSubham Dwivedi
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Cyber crimes among adolescents
Cyber crimes among adolescentsCyber crimes among adolescents
Cyber crimes among adolescentsTreesa Lobo
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safetySarah K Miller
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide sharebr03wood
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 
Cyber safety
Cyber safetyCyber safety
Cyber safetysmartins7
 

What's hot (20)

Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Human trafficking
Human traffickingHuman trafficking
Human trafficking
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
Effects of social media on Youth
Effects of social media on YouthEffects of social media on Youth
Effects of social media on Youth
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
Cyber crimes among adolescents
Cyber crimes among adolescentsCyber crimes among adolescents
Cyber crimes among adolescents
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 

Similar to Cyber Safe Parenting

Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the HomeScott Burnett
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the HomeScott Burnett
 
Internet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupInternet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupScott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the HomeScott Burnett
 
Internet Safety for families
Internet Safety for familiesInternet Safety for families
Internet Safety for familiesScott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Internet safety for parents slide share
Internet safety for parents slide shareInternet safety for parents slide share
Internet safety for parents slide shareScott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital worldDan Bowen
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital CitizensJason Rushing
 

Similar to Cyber Safe Parenting (20)

Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Internet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupInternet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life group
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Internet Safety for families
Internet Safety for familiesInternet Safety for families
Internet Safety for families
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
What Parents Should Know
What Parents Should KnowWhat Parents Should Know
What Parents Should Know
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet safety for parents slide share
Internet safety for parents slide shareInternet safety for parents slide share
Internet safety for parents slide share
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Cyber Safe Parenting

  • 1. Cyber Safe Parenting Rohit Srivastwa Fonder, ClubHack rohit@clubhack.com @rohit11
  • 2.
  • 4. When a child is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child using the Internet, interactive and digital technologies or mobile phones. Cyber Bully
  • 5. Cyber Stalking Matter of concern for every parent specially for girl child. Morphed nude photos of an airhostess in Delhi, school girls in Mumbai on Orkut/Facebook
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Pedophiles • Gain a child’s confidence online and then arrange a face-to-face meeting. • On meeting child is in great danger of physical harm and permanent psychological scarring. Bullies can give away contact info to provoke offline attack Physical Harm A ‘15 year old girl’ courts a 16 year old boy through a popular Internet chat website. The boy runs away from home to Mumbai only to find out that the ‘girl’ was in fact a 30 year old man. The man sexually abuses the boy, steals his money and severely beats him up.
  • 11. • Hacking • Hate group • Defamatory activity • Do cyber bully • Do Stalking Illegal Activity A class 10 student, who was taunted by his classmates puts up a pornographic website and displays nude "morphed" images of his classmates and teachers.
  • 12. Steal Credit Card to • Buy Farmville cash • Buy expensive gift for online bully Possibilities are endless Financial Crime A 14-year-old boy used his father’s credit card on viewing pornographic websites costing in 1000s.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. “I believe in my child he or she will do no wrong!”
  • 19. Nischint App report (Feb-Apr 2015) • Out of 33 lakh websites blocked by this app, majority are hardcore pornographic websites which are meant only for adults such as • indiansexstories.net, • Hardsextube.com, • Pornhub.com • Websites which are mostly opened by a kid: • Facebook.com, • Google.co.in, • Flipkart.com, • Cricinfo.com
  • 20. Nischint App report (Feb-Apr 2015) • Some of the most popular apps which kids downloaded: • Whatsapp, • Youtube, • Facebook, • Snapchat, • Fifa 15, • Candy crush, • Learn to draw Lego Ninjago, • Average hours spent per kid on social media sites such as Whatsapp, Facebook, Twitter, Snapchat, Youtube: 3.4 hours
  • 21. Nischint App report (Feb-Apr 2015) • Average time spent by a child on the Internet, per hour: 40 seconds to 1 minute • Number of videos shot by a kid, every day: 1.5 • Number of images taken by a kid, every day: 5 • Peak hours of apps usage: 5 PM to 8 PM
  • 22. McAfee report 28% of teens chat with people they don’t know in the offline world – 24% shared their email address – 18% shared a personal photo of themselves – 12% shared their cell phone number Girls are more likely than boys to chat with people online that they don’t know in the offline world, (32% vs. 24%) 16 % of Girls are more likely to have given a description of what they look like, than boys the same age (7%)
  • 23. 55% of teens hide what they do online from parents 14 % of 13-17 year olds admit to having engaged in some form of cyberbullying behavior in 2010 McAfeereport 38% of teens close or minimize the browser when their parents enter the room 46% of teens admit to downloading pirated music or videos 16% of 16-17 year old boys have downloaded x-rated content
  • 24. 24 % of parents thought someone anonymous had tried to add their child as a friend on social networking sites Indian Context 77% of teens have suffered negative online experiences only 50% of Indian parents are actually aware of this 55% of the children said this had actually happened 29% of parents thought their child had downloaded a virus 40% children reported this.
  • 25. Symptoms & reason for concern
  • 26. Un-family relationship Kids are now too busy with computers that they don’t have time for family, siblings etc.
  • 27. Screen switching Odd Hours of the Night Sudden Prosperity Withdrawal Symptoms
  • 28. Unhappy phone calls Strange friends Strange Online Activities Unwanted apps Installed on PC (warez, dialer, keygen, crack)
  • 29.
  • 30.
  • 31. How to keep an eye • Be a friend on social networking site • Check browser history regularly • Check installed software regularly • Check logs regularly
  • 32.
  • 33. • Create a low privilege user account • Install good antivirus antispyware firewall • Install parental control software The Technical Answer
  • 34. Smart Antivirus Nothing wrong with free, even Microsoft Security Essentials is also good enough Smart Anti- spyware Not all antivirus fight against spyware/adware/ ransomware Smart Firewall Someone who can protect you from unwanted incoming and outgoing connections U p d a t e t h e m R e g u l a r l y
  • 35. BUT be aware of fake antivirus They are cheap and widely available online to download
  • 43. Even you know its not going to work 
  • 44.
  • 45. "Don't you trust me Dad?"
  • 47. Shift computer into a public place in the home, immediately!!  A big NO for computer in bedroom  Keep it in a place which is visible in normal circumstances
  • 48. • Be involved in your child’s life!  Create an atmosphere where your child can come to you and talk to you.  Ask them what they learn.  Accompany them.  Share with them.  Be a friend in offline world too
  • 49. • Learn All You Can  You need to know what your kids do  Do the same stuff  While you are teaching them something, learn from them too  Else very soon they’ll outsmart you  Spend some time listening to and speaking with other concerned parents.
  • 50. • Limit the computer usage time  Don’t allow late nights  Don’t allow over usage  Create a time table  Force with parental software if needed
  • 51. Mom's 18-Point iPhone Rules for Son Dec 30, 2012 http://is.gd/momiphone18rule
  • 52. Teach Your Children Good Internet Practices  Teach them how much and what type of information is appropriate to share  Talk about social networking standards  Teach them about safe software  Rules about strangers in the real world apply on the internet also
  • 53. BE A GOOD DIGITAL ROLE MODEL  Curb your own bad digital habits  Know when to unplug  Show your kids how to collaborate and create online
  • 54. Instill a Healthy Fear  Fear and respect for the dangers on the internet is healthy!  Put themselves in your shoes as their parent so they can see how you’d feel if anything ever happened to them!
  • 56.
  • 57. Free your child Give proper guidance Monitor illegal activities & then give them full freedom to explore Rohit Srivastwa Founder, ClubHack rohit@clubhack.com
  • 58. Image Credits All images are taken from different sources online. Most of them are marked as free for reuse Some which were not marked are already used 10s of time online Pardon under fair usage if any image is used without acknowledgement, this presentation is non-commercial for parental guidance. Content Credits McAfee, Symantec, http://timmyjohnboy.com/, http://www.stopcyberbullying.org/, http://asianlaws.org/fact/guidelines.htm http://www.indianchild.com/ http://fosi.org

Editor's Notes

  1. Accidental disclosure of sensitive information online
  2. Kids buying from amazon using grandpa CC and selling in school
  3. Selfie code msgs Hike - secret msgs
  4. When they have to hide something
  5. If you see any such stuff being used too often
  6. Remember, even your child may have multiple accounts online. Raise situational awareness
  7. FRIEND AND FOLLOW BUT DON’T STALK
  8. Dear Gregory Merry Christmas! You are now the proud owner of an iPhone. Hot Damn! You are a good & responsible 13 year old boy and you deserve this gift. But with the acceptance of this present comes rules and regulations. Please read through the following contract. I hope that you understand it is my job to raise you into a well rounded, healthy young man that can function in the world and coexist with technology, not be ruled by it. Failure to comply with the following list will result in termination of your iPhone ownership. I love you madly & look forward to sharing several million text messages with you in the days to come. 1. It is my phone. I bought it. I pay for it. I am loaning it to you. Aren't I the greatest? 2. I will always know the password. 3. If it rings, answer it. It is a phone. Say hello, use your manners. Do not ever ignore a phone call if the screen reads "Mom" or "Dad". Not ever. 4. Hand the phone to one of your parents promptly at 7:30pm every school night & every weekend night at 9:00pm. It will be shut off for the night and turned on again at 7:30am. If you would not make a call to someone's land line, wherein their parents may answer first, then do not call or text. Listen to those instincts and respect other families like we would like to be respected. 5. It does not go to school with you. Have a conversation with the people you text in person. It's a life skill. *Half days, field trips and after school activities will require special consideration. 6. If it falls into the toilet, smashes on the ground, or vanishes into thin air, you are responsible for the replacement costs or repairs. Mow a lawn, babysit, stash some birthday money. It will happen, you should be prepared. 7. Do not use this technology to lie, fool, or deceive another human being. Do not involve yourself in conversations that are hurtful to others. Be a good friend first or stay the hell out of the crossfire. 8. Do not text, email, or say anything through this device you would not say in person. 9. Do not text, email, or say anything to someone that you would not say out loud with their parents in the room. Censor yourself. 10. No porn. Search the web for information you would openly share with me. If you have a question about anything, ask a person ? preferably me or your father. 11. Turn it off, silence it, put it away in public. Especially in a restaurant, at the movies, or while speaking with another human being. You are not a rude person; do not allow the iPhone to change that. 12. Do not send or receive pictures of your private parts or anyone else's private parts. Don't laugh. Someday you will be tempted to do this despite your high intelligence. It is risky and could ruin your teenage/college/adult life. It is always a bad idea. Cyberspace is vast and more powerful than you. And it is hard to make anything of this magnitude disappear -- including a bad reputation. 13. Don't take a zillion pictures and videos. There is no need to document everything. Live your experiences. They will be stored in your memory for eternity. 14. Leave your phone home sometimes and feel safe and secure in that decision. It is not alive or an extension of you. Learn to live without it. Be bigger and more powerful than FOMO -- fear of missing out. 15. Download music that is new or classic or different than the millions of your peers that listen to the same exact stuff. Your generation has access to music like never before in history. Take advantage of that gift. Expand your horizons. 16. Play a game with words or puzzles or brain teasers every now and then. 17. Keep your eyes up. See the world happening around you. Stare out a window. Listen to the birds. Take a walk. Talk to a stranger. Wonder without googling. 18. You will mess up. I will take away your phone. We will sit down and talk about it. We will start over again. You & I, we are always learning. I am on your team. We are in this together. It is my hope that you can agree to these terms. Most of the lessons listed here do not just apply to the iPhone, but to life. You are growing up in a fast and ever changing world. It is exciting and enticing. Keep it simple every chance you get. Trust your powerful mind and giant heart above any machine. I love you. I hope you enjoy your awesome new iPhone. Merry Christmas! xoxoxo Mom
  9. Like cycling
  10. Like cycling
  11. 15 min video Start @ 0:40:00