This presentation was created for students and parents of children from 5th to 8th grade regarding staying safe online on the Internet in general and on social networking sites in particular.
Technology has progressed so fast that life and technology are now intertwined. Kids are now introduced to technology as early as a year old or maybe even younger. Soon they will come to know about social media websites and it is the duty of their parents to teach them about privacy, security, and what information to show on the internet.
The presentation I created for students to make them aware and how to be more precautious to deal with day to day cyberattacks under Teach for India Volunteers.
Technology has progressed so fast that life and technology are now intertwined. Kids are now introduced to technology as early as a year old or maybe even younger. Soon they will come to know about social media websites and it is the duty of their parents to teach them about privacy, security, and what information to show on the internet.
The presentation I created for students to make them aware and how to be more precautious to deal with day to day cyberattacks under Teach for India Volunteers.
Presentation given at Pantego Christian Academy by the PCA Technology Department to middle and high school students during their enrichment series. Principles covered include: Digital Golden Rule, Digital Consciousness, and Personal Security in the Global Village
Do you know every year around 750 Australian teens between the ages of 13 and 17 commit suicide because of cyber bullying? It’s a statistic sure to concern any parent. The best way to address cyberbullying is to stop it before it starts. This presentation provides valuable legal tips on how to stop cyberbullying.
At Owen Hodge Lawyers we understand that experiences relating to cyberbullying are extremely traumatic. The personal information shared and the hateful content and rumours spread often leaves people in untter despair and hopelessness. We are here to help! If you have any questions in relation to cyberbullying, please feel free to contact our team at Owen Hodge Lawyers on 1800 770 780.
In this slide I present you an awareness about cyber security and crimes for students. Targeted audience are students aged 14-17 years of age. I also present common mistakes we all do in our lives that lead to cyber insecurities
Basic tips for staying safe and protecting personal privacy on popular social media sites, including Facebook, Twitter, and Instagram. Designed for casual users of social media.
Presentation given at Pantego Christian Academy by the PCA Technology Department to middle and high school students during their enrichment series. Principles covered include: Digital Golden Rule, Digital Consciousness, and Personal Security in the Global Village
Do you know every year around 750 Australian teens between the ages of 13 and 17 commit suicide because of cyber bullying? It’s a statistic sure to concern any parent. The best way to address cyberbullying is to stop it before it starts. This presentation provides valuable legal tips on how to stop cyberbullying.
At Owen Hodge Lawyers we understand that experiences relating to cyberbullying are extremely traumatic. The personal information shared and the hateful content and rumours spread often leaves people in untter despair and hopelessness. We are here to help! If you have any questions in relation to cyberbullying, please feel free to contact our team at Owen Hodge Lawyers on 1800 770 780.
In this slide I present you an awareness about cyber security and crimes for students. Targeted audience are students aged 14-17 years of age. I also present common mistakes we all do in our lives that lead to cyber insecurities
Basic tips for staying safe and protecting personal privacy on popular social media sites, including Facebook, Twitter, and Instagram. Designed for casual users of social media.
Los beneficios para la salud de tomar al menos una taza de café al día son cada vez más numerosos. Hoy repasamos las ventajas de esta bebida que lleva consumiéndose en la población desde hace varios siglos.
Brook Anderson interviewed Ayman Itani, Think Media's CEO, about Facebook's recent announcement that they are considering to allow kids under 13 years old to join Facebook while providing parental supe...
[Exposicion] Computer and Internet CrimeGerman Teran
Society is turning digital and so its crimes. Internet is not only a great tool for research, it is also a perfect place for criminal... how to apply law in those cases?
Create another jurisdiction?
Benefits of beer. You probably have beer to spurring some of your greatest stories or bringing out your worst dance moves. But it turns out there are tons of other awesome, scientifically proven reasons to love a good brew. Beer could safeguard your heart, boost your immunity, protect your bones, and more.
Safer Children in a Digital World: a summary for children and young peopleEduserv Foundation
An unofficial re-purposing of the Safer Children in a Digital World: a summary for children and young people as a set of presentation slides.
This re-purposing has been done by Andy Powell (andy.powell@eduserv.org.uk).
For the original report see: http://www.dfes.gov.uk/byronreview/
Internet Safety for Families and ChildrenBarry Caplin
The Internet is a useful and important part of our daily lives. Many can't
remember how we handled even the most mundane tasks without online
assistance. How did we even survive when we were kids? :-) However, along
with the good, there is bad. Children and teens (but not their parents!) are
very well versed in using the Internet, including web pages, blogs,
uploading and downloading information, music and photos, etc. They are also
trusting. This presentation will give an overview of the Internet and the
inherent dangers. Learn the realities and dangers of ``virtual communities''
websites your kids frequent like Xanga.com, MySpace.com and FaceBook.com.
Learn about the persistence of information on the net and Google hacking.
Learn the differences between a wiki, blog, Instant Messaging, text
messaging, and chat. Learn the Internet slang, key warning signs, and tips
for Parents and Kids. This talk is for anyone who has a child, who knows a
child, or who ever was a child!
this is a presentation from a communications seminar at Family Christian Church in Ecorse, MI. given on April 4th, 2009. It covers stats from isafe.org on internet use by teens and youth. The presentation gives advice to parents on how to protect their children from internet predators, cyber-bullies, cybercriminals, and online piracy.
Cyber Crime: Preparing Your Organization for the New NormalSandra Fathi
Cyber crime is rampant and every organization must prepare itself for the when, not if, they will have a data breach. This presentation was given at Pworld's Crisis Communications Boot Camp in Ottawa, CA June 13, 2019
This presentation was given at the FPRA Capital Chapter's meeting in Tallahasse on May 25, 2017. It covers what communicators need to know in the event of a data breach or cyber security incident.
Fear Factor Metrics: PR Metrics Communicators Fear MostSandra Fathi
Presentation given at PR News Measurement Conference in Chicago on November 18, 2015. Covers key measurement concepts including Share of Voice (SOV), Competitive Benchmarking & Correlations
Trade Secrets Your Agency Isn't SharingSandra Fathi
If you have never worked in a PR agency, their doings can seem mysterious. How does the agency get all of that coverage for their clients? Is it because of exclusive relationships with publications? Is it because they meet reporters for drinks or play golf together? What is the black magic that commands such high retainers? If you haven't been inside an agency, and your company expects you to hire and manage one, it can be intimidating. Agencies prefer to adopt a mystique about how they work because they think that keeping you in the dark will give them the upper hand in negotiations. However, the more you know about agency operations, the better results you achieve for your company and the more value you extract from your agency. In this session, we'll review models of agency operations and discuss the factors you need to know when engaging an agency.
We'll discuss:
Comparing apples to apples: how to compare agencies during the dreaded RFP process
How to see through the bull@#*%: Relationships don't mean a thing if they don't know how to tell your story
How to avoid the bait and switch: meet your team—not just the sales team—during the hiring process
How to negotiate guaranteed results into your agency agreement
How to save time and money—dictate how your hours should and shouldn't be spent in a retainer relationship
How to set yourself up for success: what you need to do to educate your new partner
This presentation was given at Ragan's 7th Annual Employee Communications, PR & Social Media Summit at Microsoft on October 28th, 2015
Bloggers Speak Out: New paid and pitching techniques to score more placement Sandra Fathi
This PPT was presented as part of a webinar for PR Daily entitled "Bloggers Speak Out: New paid and pitching techniques to score more placement." The webinar had three presenters and this portion was given by Sandra Fathi. It covers what's new in blogger relations, influencer marketing strategies, research and tools, promotions and sponsorships and product and service reviews.
This presentation was given at eMetrics, Chicago, on June 9th, 2015. It focuses on three primary tactics of measurement for public relations: share of voice, competitive benchmarking and correlations.
Data-Driven PR Metrics: Share of Voice, Competitive Benchmarking, CorrelationsSandra Fathi
Presentation given at eMetrics Summit in San Francisco on April 1, 2015. Covers PR measurement through three specific tactics - share of voice, competitive benchmarking and correlations.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Internet Safety For Parents And Kids
1. Kids & Social Media:
Facing Up to Facebook, Twitter & Beyond –
The Pros & Cons of How Students Use Social Media for
Study, Friendship & Fun
Prepared for Epiphany Parent & Student Seminar.
April 28, 2009
Sandra Fathi Web: www.affectstrategies.com
President, Affect Strategies Blog: www.techaffect.com
sfathi@affectstrategies.com Twitter: @sandrafathi
212 398 9680 LinkedIn, Facebook: Sandra Fathi
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
2. Parents & Educators
Internet & Social Media are the New Reality
» Required Skills for Social Development/Acceptance
» Required Skills for Education & Research
» Required Skills for Job & Career Development
Educate & Arm Yourself with Knowledge
» Investing in Your Child’s Safety
» Investing in Your Child’s Education
» Investing in Your Child’s Future
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
3. Why do kids need the
Internet?
» To Connect
» To Be Social
» Social Planning/Events
» Staying Plugged In
» To Share
» Self-Expression
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
4. Social Networking
Websites
16 years of age:
Friendster Online community connecting friends
14 years of age:
MySpace A Place For Friends
At least 13 years of age & in high school:
Facebook Social Utility that connect people with those around
them
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
5. Social Networking
Websites: 13 Year-olds
Hi 5 Who’s in?
Xanga A weblog community
IMVU Chat with friends in 3D
There Online virtual world
Chamber of Chat Harry Potter online role playing game
Second Life 3D Virtual World
Runescape Online adventure community
Bebo Social network for sharing and entertainment
Gaia Online Virtual community with games, message boards & economy
vSide Virtual music community
Windows Live Spaces Community of friends for sharing and blogging
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
6. Social Networking Sites:
No Age Minimum
Imbee Social Networking designed for Club Penguin Virtual world for kids
kids 8-12 Marapets Virtual pet site with games
Active Worlds 3D virtual world chat and chat community
Boom Bang Chat, make friends and Shining Stars Chatting, naming stars
explore a virtual world and virtual star worlds
Dofus Multi-player online role playing Neopets Virtual world for pets
game Endless Online Role playing games
Awol Chats, games, diary, friends, & Eternal Lands Role playing games
cribs Furcadia Role playing games
Sanriotown Hello Kitty games, Graal Online Role playing games
community, blogs and forums Guild Wars Role playing games
Webkinz Virtual pet community for Hero Online Role playing games
plush pets
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
7. What are some of the
dangers?
»Privacy/Identity Theft
»Cyber-bullying
»Online Predators
»Cybercriminals
»Piracy
»Inappropriate/Sexual Content
»Misleading Content/Propaganda
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
8. Quick Stats
93% of parents say they have established rules for their child’s
Internet activity
37% of students report being given no rules from their parents
on using the Internet
47% of parents feel their ability to monitor and shelter their
children from inappropriate material is limited
95% of parents say they know “some” or “a lot” about where
their children go or what their children do on the Internet
41% of students do not share where they go or what they do on
the Internet with their parents
26% of students believe their parents would be concerned if
they knew what they did on the Internet
I-Safe Statistics (www.isafe.org)
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
9. Quick Stats
58% of students admit to using the Internet unsafely,
inappropriately, or illegally
12% of students have unsupervised Internet access at school
55% of students report having given out personal information
(e.g. name, age, gender, home address) to someone they have
only met online
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
10. Online Predators
» 71% of teens reported receiving messages online from
71%
someone they did not know
» 40% reported they usually reply and begin chatting with
40%
that person
» 18% reported telling an adult about the encounter
18%
» 45% have been asked for personal information by someone
45%
they did not know
» 30% have of teens have considered meetings someone
30%
they have only talked to online
14% HAVE HAD AN ENCOUNTER
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
11. Online Predators Tactics
» Seeks out provocative user names.
» Studies your profile.
» Starts with an innocent IM.
» Asks personal questions, A/S/L.
» Wants you to private chat.
» e-
Asks you for personal info. (Phone number, e -mail address, home address,
etc.)
school name, etc.)
» Wants to be your best friend, boyfriend or girlfriend.
» Starts sexual conversations.
» Is all about keeping secrets.
» Asks for personal photos.
» Wants to send you strange gifts.
» face-to-
Wants to set up a face - to -face meeting.
» Makes threats when you no longer want to chat with him or her.
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
12. Cyber-bullying
» Be strong and stop it early. Don’t stoop to their level and lash back.
» Don’t suffer in silence. Tell an adult. Keep telling people until
someone takes action.
» Don’t open or read messages from cyber bullies.
» Contact your Internet service provider abuse department.
» If the problem continues, alert the local police department.
» Tell your school if it is school related. If your cyber bully attends
your school, contact your teacher or principal.
» Don’t erase the messages. Log all dates and time. Put them in a
folder and hold them as evidence.
» Change your e-mail address or screen name.
» If it’s happening with text messages, change your cell number.
» Take screen shots of your chat room pages.
» Save URLs, e-mail addresses, and profiles of the bully.
» Stay protected—never agree to meet with a bully face to face.
» Block the bully if you are in a chat room or IMing.
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
14. Piracy:
Illegal Downloads
Myth — I cannot be sued for downloading music and movies off
P2P sites. They’ll never catch me.
Fact — True and False. You can’t be sued if you have downloaded
songs that have been put online with the approval of record
labels and—you are violating copyright laws and you run the risk
of being sued.
The Recording Industry Association of America (RIAA) filed
3,000 lawsuits against individuals as of May 2004, and in some
cases sought financial damages of up to $150,000 per
copyrighted song.
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
15. Piracy:
P2P Sites
P2P sites are not illegal, but trading unauthorized music and
movies is. The argument is that P2P sites are not providing
the illegal files —they are only providing a way to share files
with others logged onto the site.
Downloading music and movies without paying on
unsanctioned sites is illegal and can result in criminal
penalties.
There is a good possibility of downloading a virus, creating a
gateway for a hacker to jack your personal stuff or gain
access to files on your hard drive.
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
17. Cyberterrorists/
Cybercriminals
Spam
» Avoid opening e-mails from businesses you don’t know
» Get anti-spam (GMail)
Viruses/Spyware
» Get viruses from opening attachments not e-mails
» Can also get a “Trojan horse” by downloading software and e-
mail attachments
Cyber-criminals (identity theft)
» Never give out credit card info to a site that isn’t “trusted” –
Google tools
» Use PayPal – doesn’t give credit card info to sellers
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
18. Pornography,
Plagiarism &
Propaganda
Pornographic content
» Use parental controls on internet options
» Moderated safe search on Google
» YouTube requires a login for over 18 – has strict policy
against porn
Plagiarism
» Make sure you reference your sources for school reports!
Propaganda
» Many sites won’t be pornographic but not suited for
children.
» Hate sites, false information, lies and rumors
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
19. Personal Information
Obvious: Less Obvious:
Name School Name
Address School Mascot
Age Gaming Identities
Sex Hobbies
Picture Interests
Phone Number Landmarks/Hangouts
Address Team Names
SSN Number
Bank Account
Credit Card
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
20. What is Sexting?
When people take sexually revealing picture of
themselves and send them as text message attachments,
it's called quot;sexting.“
Peoplequot;sextquot; to show off, to entice someone, to show
interest in someone, or to prove commitment. The
problem with that, is that the moment the relationship
ends (and most of them do) someone is in possession of a
highly compromising image that can be easily posted on a
social networking site or sent around via email or text.
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
21. Sexting
Once an image is sent, it can never be retrieved -- youwill
lose control of it. How would you feel if your teachers,
parents, or the entire school saw the picture, because it
happens all the time.
Talk about pressures to send revealing photos. No matter
how big the social pressure is, the potential social
humiliation and consequences will be hundreds of times
worse.
The buck stops with you. If someone sends you a photo,
delete it immediately. If you do send it on, you’re
distributing pornography -- and that’s against the law.
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
22. Sexting Statistics
22% of teen girls and 20% of teen boys have sent nude or
semi-nude photos of themselves
22% of teens admit that technology makes them personally
more forward and aggressive
38% say exchanging sexy content makes dating or hooking up
with others more likely
29% believe those exchanging sexy content are “expected” to
date or hook up
Revealing photos can be resent to a vast audience
Sending a sexual image of a minor or to a minor is illegal
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
33. Blogs & Blogging
» Type of website
» Regular entries/updates
» Usually allows comments/interaction with visitors
» May include text, pictures, video (vlogs), audio (podcasts) etc.
» Types:
» Personal
» Corporate
» News
» Blog Search Engines: Bloglines, BlogScope, Technorati
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
34. Blog On
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
35. Microblogging
» Blogging in short form
» Similar to texting
» Ability to send and receive messages
» Ability to follow and be followed
» Archive information
» Multiple delivery mechanisms
» Conversations and interactivity
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
39. The Basics
Tweet: Message – 140 Characters
Twitter Handle: @sandrafathi
Retweet (RT): Resending a message from
someone else to your followers
Message: Direct message (private) from one
Twitterer to another
Nudge: Prompt someone to Tweet
Hashtag: #eventname Easy search for
events/topic
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
55. Advice for Kids &
Teens
Don’t say you are older than you are
The Internet is a public space
Don’t post embarrassing things or things that could expose you
to danger
Think before you post – the Internet is forever
People aren’t always who they say they are
Protect your privacy
Report harassment, hate speech and inappropriate content
Avoid in-person meetings with people you don’t know in real-life
Think before you post
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
56. Advice for Parents
Start a conversation
Report inappropriate behavior
Talk about Social Networking and the Internet
Remind kids, and teens, to be cautious
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
57. Best Practices I
Kids Need Rules
» Set time and limits for Internet usage
» Keep computer in public space
» Agree on websites
» Check compliance (history, filtering, tools)
Teach Internet Safety
» Offline rules apply online
Reinforce Morality & Ethics Online
» Educate on criminal activity
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
58. Best Practices II
Use Privacy Controls
» Don’t provide personal information
» Be careful about Pictures/Videos
» Set sharing settings
» Respecting others’ privacy
» Don’t use automatic ‘remember’ settings
» Never share passwords
» Don’t meet strangers in person
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
59. Best Practices III
Communicate Responsibly
» Don’t hide behind a screen name
» Block offenders
» Report incidents
» Flag inappropriate content
Be a Skeptic
» View content critically
» Be able to identify reliable sites and verify facts
Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009