This document provides information and tips for parents about internet safety. It discusses how children's access to technology has increased dramatically in recent years. It outlines various social media sites and apps children use and potential risks, such as exposure to inappropriate content, cyberbullying, and sexual exploitation. The document emphasizes how much personal information children share online that could put them in danger. It describes the crime of "sextortion" and provides tips for parents on internet safety rules, monitoring children's online activity, and what to do if a problem arises. The overall message is that open communication and education are important to help keep children safe online.
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
A talk for middle school and high school students by ConnectSafely.org's Larry Magid about digital literacy, digital citizenship, cyberbullying, sexting and how to thrive online.
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
A talk for middle school and high school students by ConnectSafely.org's Larry Magid about digital literacy, digital citizenship, cyberbullying, sexting and how to thrive online.
The Internet has evolved into a collaborative environment where anyone can publish information as easily as viewing or downloading it. There are many powerful learning opportunities on the Internet and we want to ensure our students get the most of this valuable tool while being safe. This session includes introductions to the technologies, the benefits, the concerns, and proactive strategies for keeping students safe.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
A great document by On Guard On-Line about the conversation parents need to have with their kids about being online.
http://get.mindmake.com/parentalcontrols/
Technology has progressed so fast that life and technology are now intertwined. Kids are now introduced to technology as early as a year old or maybe even younger. Soon they will come to know about social media websites and it is the duty of their parents to teach them about privacy, security, and what information to show on the internet.
Presentation presented at the Company of Military Historians, Old Northwest Chapter and reprised at the NWTA Research Symposium on the America Revolution
The Internet has evolved into a collaborative environment where anyone can publish information as easily as viewing or downloading it. There are many powerful learning opportunities on the Internet and we want to ensure our students get the most of this valuable tool while being safe. This session includes introductions to the technologies, the benefits, the concerns, and proactive strategies for keeping students safe.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
A great document by On Guard On-Line about the conversation parents need to have with their kids about being online.
http://get.mindmake.com/parentalcontrols/
Technology has progressed so fast that life and technology are now intertwined. Kids are now introduced to technology as early as a year old or maybe even younger. Soon they will come to know about social media websites and it is the duty of their parents to teach them about privacy, security, and what information to show on the internet.
Presentation presented at the Company of Military Historians, Old Northwest Chapter and reprised at the NWTA Research Symposium on the America Revolution
Originally presented to Southern Illinois University student teachers preparing to enter the education job market in several iterations beginning in 2005.
This presentation by Steven Baule supported a discussion with AP World History students on how to develop a research agenda and where to begin to look for ideas and materials to use to start developing a plan of action for a research project or longer-term agenda.
This presentation by Phil Lacey and Steven Baule was presented at the Tech Forum Chicago in May 2014 as an overview of how to move towards a digitally-based curriculum.
This presentation was originally presented to school librarians and Metropolitan Library System staff about how to advocate for school library programs.
This is a summary of how to develop a technology staff development program. Provides some review of the Individual Technology Learning Plan recognized by NBSA as one of the best programs in the nation.
These are the slides to support my State of the School's address to the Muncie Area Chamber of Commerce. The complete audio of the presentation is available at http://www.munciejournal.com/2015/10/mcs-superintendent-dr-steve-baule-gives-state-of-the-schools-report/
Originally presented at the National Staff Development Council (NSDC) conference in 2004. Based upon the experiences in development a nationally-recognized IT staff development plan
This presentation formed the basis of a class period on the basics of computer hardware and networking for educational administrators in a Technology for Educational Administrators at Loyola University Chicago.
Judge Kimberly Dowling presented this information to the MCS parents about what they need to know to keep their children safe from the number two growing crime in America.
This was the basis of a class period on explaining the various aspects of educational technology to the students of the Jewish Educational Leadership Institute at Loyola University Chicago.
Presentation given at Pantego Christian Academy by the PCA Technology Department to middle and high school students during their enrichment series. Principles covered include: Digital Golden Rule, Digital Consciousness, and Personal Security in the Global Village
Internet Safety for Families and ChildrenBarry Caplin
The Internet is a useful and important part of our daily lives. Many can't
remember how we handled even the most mundane tasks without online
assistance. How did we even survive when we were kids? :-) However, along
with the good, there is bad. Children and teens (but not their parents!) are
very well versed in using the Internet, including web pages, blogs,
uploading and downloading information, music and photos, etc. They are also
trusting. This presentation will give an overview of the Internet and the
inherent dangers. Learn the realities and dangers of ``virtual communities''
websites your kids frequent like Xanga.com, MySpace.com and FaceBook.com.
Learn about the persistence of information on the net and Google hacking.
Learn the differences between a wiki, blog, Instant Messaging, text
messaging, and chat. Learn the Internet slang, key warning signs, and tips
for Parents and Kids. This talk is for anyone who has a child, who knows a
child, or who ever was a child!
this is a presentation from a communications seminar at Family Christian Church in Ecorse, MI. given on April 4th, 2009. It covers stats from isafe.org on internet use by teens and youth. The presentation gives advice to parents on how to protect their children from internet predators, cyber-bullies, cybercriminals, and online piracy.
ONLINE SAFETY conference for Parents in Escuela Americana - What every parent should know about impact of new technologies on their children - www.ideaworks.la - @rokensa
Videos on
www.sharonnagyjohnson.com
“Governors safety initiative” Internet safety “train-the-trainer” training to give effective internet safety presentations to students and parents, as well as community groups. The Keynote created was using material provided by the NJ State Police and Ad Council’s public service advertisements, all of which is free to use
The following were developed in support of my panel discussion on how to support and develop strategic partnerships between public and school libraries at the Library Journal Stronger Together Conference in Omaha in May 2018
The following presentation was shared with the Muncie-Delaware County Chamber of Commerce's Business Education Partnership Committee on June 2, 2017. Dr. Steve Baule presented the information to about a dozen committee members.
The following materials were provided to Indiana legislative leaders and the IN state superintendent when we me with them to discuss the significant issues Muncie Community Schools are facing.
An update to the Muncie Noon Rotary about the strategic planning goals of the Muncie Community Schools for the 2016-2017 School Year; presented by Steven Baule, superintendent
An overview of the ZBTHS credit recovery research conducted between traditional, programmed and online instruction in 2004 & 2005. Originally presented at the Illinois Computing Educators Conference in February 2005.
This is the complete presentation that was discussed at the April 23, 2016 League of Women Voters Forum on Standardized Testing from the MCS Superintendent
A demographic overview of the officers and men of the 18th Foot from 1767 through 1776. Presented at the Company of Military Historians General Meeting in Dulles, VA, April 2016
Dr. Robyn (Kikki) Eubank presented this information to MCS parents about dealing with the commercial sexual exploration on children focusing on psychological needs.
My notes from a panel discussion I participated in at the IBE Education Conference. My primary points were create truly engaging instruction and focus on positive behavior such as the PBIS program supports.
A summary of what directions and trends educational administration or educational leadership programs should consider over the next few years by Steven Baule.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
2. My the times they are a
changing…
Just think 15-20 years ago, we were not
saying these words on a regular basis
I need to update my status on Facebook
Sending a tweet on Twitter
Now it seems everyone uses the internet
Just recently received a Facebook request from my 87 year old
great uncle and MY MOM!!!
3. Access has increased
In a 2004 survey by Pew Research Center, 18% of teens
age 12 owned a cell phone
In 2009 survey, 58% of 12 year olds own a cell phone
Most recently – 28% of K-2nd graders have cell phones
12% have mobile internet
43% of 3rd – 5th graders have cell phones
15% with mobile internet
4. Access increases with age
83% of middle school students have cell
phones
Now, 98% of high school students own a
cell phone
5. How kids receive messages
Do you call your kids?
Do they answer the phone??
Most respond by text
Even grandparents are texting now
Schools are using text messages to send
information
Snow days
Reminders
Guarantee the kids will read the message
6. Cell phones are not the
only access
Facebook
Instagram
Twitter
Emails
Blogging
Instant
Messaging
iPods and iPads
Online Gaming
How much is your
child exposed to
daily?
7. Scary Social Networking
Sites
Every Parent Should Know
Instagram
Most popular social media network
Creepy
It allows anyone with access to another
person’s online photos to pull sensitive
geotag data, allowing them to pinpoint
where the photo was taken
8. Scary Sites
Craigslist
Can post ads for items to sell
Can also post to meet people
Backpages.com
Muncie has it own page
Jack’d
Website typically for homosexual
encounters
9. Scary Sites
Ask.fm
Allows users to ask other users questions, with
the option of being anonymous
Example – “why are you a loser?”
Vine
Can be used to post short videos
Can also be used to videotape other w/o their
knowledge – used to harass or mock others
10. Scary Sites – SnapChat
SnapChat
Widely known as the “sexting app”
Allows users to take photos, record videos,
add text and drawings and send them to
a controlled list of followers
Followers can only view photos for short
time after which SnapChat destroys them
Screen shots can be taken to preserve
photos
11. Scary Sites
KiK
An instant messenger service designed for use
on smartphones – use of fake usernames
Main users are aged 11-15
Pheed
Allows teens to livestream what they are doing
at any given moment
12. 8 Scary Sites
Qooh.me
Allows teens to ask other users anonymous
questions
No online moderator to check for content
Oovoo
A startup video chat and instant messaging app
Have to be 13 yrs old but users can lie about age
13. Scary Sites - Tinder
Tinder
A dating app or a “hook-up” site
Locates “singles” near your location
An image of a single person is shown – if you find
them attractive, you swipe right and then you can
message them
Emphasis that you have to be physically attractive
to be desired
Dangers of meeting someone online or in person
14. Scary Sites – Yik Yak
Yik Yak
Free app with no registration – total anonymity
Connects up to 500 nearby users to an
anonymous chat room
Used in cyberbullying
Impossible to trace the writer of the offensive
content
Can be distributed to a wide array of viewers
15. Scary Sites
Chatroulette
Dubbed a “predator’s paradise”
Can randomly chat with individuals as they
appear on the screen thru text, audio or
video
4chan
Anonymous message board
Contains posts described as vulgar, stupid
and occasionally dangerous
16. Scary Sites
Omegle
A chatting site – “you” talking to a “stranger”
Anonymous chat – either text or video
Tumblr
Photo/video sharing app
Users can easily access pornographic, violent
and inappropriate content
17. The list goes on and on…
Voxer
A push to talk/walkie-talkie app for short voice
messages
Poke
Sent photos will “self-destruct” within seconds
Whisper
Allows anonymous accounts to make their
messages or confessions overlap an image
18.
19.
20.
21. Photos are also
being shared
250 million photos are
uploaded per day
About 7.5 million per month
22. Where else can kids be
exposed to predators?
— Various Online Gaming sites
— Xbox Live
— PS3
— Real-Time Chat with web cams
— Blu-Ray Players – internet access
— School issued iPads
23. It all adds up…
Exposure by the age of 21
Playing video games – 5000 hours
Talking on the cell phone – 10,000
hours
Exchange of emails, text messages
and instant message – 250,000
hours
24. With Exposure Comes Risk
What are you and your kids
putting on the internet?
How much personal information is being used
Who can find this
information?
25. Risk on the Internet
Theft of Personal Information
Exposure to Inappropriate Material
Sexual Solicitation – Sextortion
Sex Trafficking
Sexting
Harassment
Cyberbullying
26. What are you saying
about you?
When others read your profile
online, what conclusions can be
drawn about you?
Are you giving away
information that can put you in
jeopardy?
27. What about your child?
What is he/she posting on the
internet?
Who is looking at his/her profile?
What conclusions can be drawn
about your child just from
his/her online presence?
28. Even bad guys use the
internet
Offenders read posts and search for
photos all day long and then they draw
conclusions and decide whether or not a
particular victim is a viable target
Offenders think about whether or not you
are “worth the risk” if they get caught
29. We may be our own worst
enemy
We provide the information directly to
the thieves
How much information do you have
on your Facebook Page
Where you live
Date of Birth
Where you work
Kids – names and ages
When you are on vacation (and away from home)
Events you are attending
30. Sextortion
Most likely way for teen to be exploited
Combines Sexting and Cyberbullying
Unfortunately, the information is out there
Who we are, what we like, where we live, our
friends…
84% of teens have at least 1 social networking
profile and 46% of teens have open access to
their profiles online
31. How does Sextortion work?
Offender
gets one of the “Sexting” photos which catches the
teenager in a compromising position
contacts the teen online
demands more photos
threatens to disclose photo to teen’s family & friends
unless teen sends more photos
teen is too scared to tell and sends more photos
32. Is this easy to do?
Think about your child’s online
presence
Facebook, School iPads, iPods, Tablets,
YouTube, webcams, sharing photos
Everything a predator needs
to know to get close to you
child is already on the internet
Where she goes to school, vacation photos,
favorite color, best friend, likes/dislikes….
33. 3 Types of Sextortion
Power & Control
I’ll ruin your reputation
Offender keeps upping the “ante” for
more salacious photos
Can last for hours, days or even months
1st photo may have been innocent but
multiplies with each additional photo
the offender extorts from teen
34. Anonymous
“Drive-By” Sextortion
No account or screen name required
Offender flatters teen to get him/her to
“flash” the webcam
Offender sends image back to teen and
says you have 2 minutes to _________.
Teen gets scared and complies
More photos out there for the next
offender…
35. Wolf in Sheep’s Clothing
Offender befriends the victim thru
common sites
Talks about mutual interest, etc…
Which he learned from the internet
about child
Asks teen to voluntarily produce images
Unfortunately, many teens comply
Threats to send to friends and family may
come later if victim stops sending photos
36. What to do about
Sextortion?
Educate kids not to take that
1st photo
Almost every child porn collector has a collection of
self-produced images of kids that were placed on
internet voluntarily
Talk to your kids
Let them know they can tell you anything even if they
made a mistake by taking the 1st photo
Whether your child will tell you depends on how the
child perceives the parent will react
37. Save Everything
If your child comes to you with this
issue, make sure to save everything
for the police
Unfortunately, teens tends to delete everything so no
one will find out
Problem – our laws of jurisdiction
(where a case can be filed) are
antiquated for online crimes
38. So what do you do???
Have I scared you enough that you will
move to the mountains and cut off all
communication with the outside world??
Probably not, but the first reaction is to
take away your child’s computer, cell
phone
Will that work?
39. No – that will not work…
When you cut your child off from
the Internet or cell phone, where
do they go?
Friend’s House
Relative’s House
School
Library
iPod or School iPad
40. Internet Safety Tips
Prepare yourself beforehand
Talk and be open with your kids and teens
Keep your cool and be cool
Encourage them to confide
in you.
41. Internet Safety Tips
Establish rules for Internet use
Keep rules posted near computer
What sites can your child visit?
How long will they be online?
Where can they use a
computer?
42. Internet Safety Tips
Be Informed
Learn everything you can about the
Internet
Ask your kids to show you places they
go online or learn online gaming
Know what other access your child
may have including text messaging
43. Become Educated
Learn chat-room lingo by going
to WWW.CyberTipline.com for a
list of acronyms like POS = Parent
Over Shoulder
Follow the “cookies” – recent
searches
Try out their online games –
become a part of their world
44. Internet Safety Tips
Consider safeguarding options
Check out blocking, filtering, and
rating applications
Learn about filtering and
monitoring software and WHEN TO
USE THEM