SlideShare a Scribd company logo
   Welcome
   Internet Landscape
   Dangers on the Internet
     Internet Predators
     Personal profiles
     Internet Chat
     Gaming
     Cyberbullying
   Cell phones
   Plagiarism & Intellectual Property
   Malicious Codes, Viruses, and Spyware
   Parent Tips and resources
   Q&A
―everything that‘s already in the world when
you‘re born is just normal;

anything that gets invented between then and
before you turn thirty is incredibly exciting and
creative and with any luck you can make a
career out of it;

anything that gets invented after you‘re thirty is
against the natural order of things and the
beginning of the end of civilization as we know it
until it‘s been around for about ten years when it
gradually turns out to be alright really.‖
The Internet has dramatically changed our
  world and is a part of our everyday lives

ADULTS’ VIEW
 Communication – email, texting
 Shopping and services (booking travel)
 Financial management
 News and product research
 Entertainment – videos, music, games
The Internet has dramatically changed our
  world and is a part of our everyday lives

STUDENTS’ VIEW
 Communication – texting, instant
  messaging, email
 Entertainment – games, music, videos
 Research – homework, study sites
1. Predators--social networking sites, chat rooms
2. Data theft--stolen passwords, addresses, Social
   Security numbers, credit card numbers, and other
   financial information
3. Malicious software (also known as malware)--
   adware, spyware, viruses, phishing scams
4. Inappropriate content--pornography, content
   focused on violence, hate propaganda
5. Cyberbullying--bullying peers via instant messages,
   social networking sites, online games
http://www.cnet.com/4520-13384_1-6721368-1.html
 Educate parents
 Educate students
   Youth internet safety survey, ages 10-17

                      YISS-1 (2000)   YISS-2 (2005)   Change
Sexual solicitation   19%             13%             -6%
Unwanted exposure     25%             34%             +9%
to sexual materials
Harassment            6%              9%              +3%
   ―Google‖ yourself
    › Type in first and last name, email addresses,
      screen names, addresses, phone numbers
    › search for images as well
   Facebook ,Myspace
    › Age requirements
           “No information from children under age 13.”
    › Public vs Private
    › Know who you add: friends vs cyberfriends
    › Have access to your child‘s site
    › Be conscientious of pictures/videos
       Protecting reputations online, in plain English
        (commoncraft.com)
   Make sure that your child takes advantage of the privacy
    settings on social networking sites.
   Pre-approve the pictures and videos your child posts
    online.
   Remind your child never to post e-mail addresses or cell
    phone numbers.
   Tell your child that passwords should only be shared with
    parents and guardians.
   Teach your child not to respond to any e-mails requesting
    personal information and to delete e-mails from unknown
    senders.
   Discuss how to keep screen names and e-mail addresses
    gender-neutral, appropriate, and free of any information
    that could reveal identity.
   Encourage your child to tell you right away if anything
    happens online that bothers or frightens him or her.
          Information from Netsmartz Kids: http://www.netsmartz.org/RevealingTooMuch
 Text messaging
 Chat rooms
 Instant messaging (‗IMing‘)
 Online gaming – gaming devices
 Message boards
 Blogs and wikis
LOL                      POS
              BRB                    ASL

 SMS (short message service) aka texting
 Wikipedia and netlingo.com list of
  internet slang
    › http://en.wiktionary.org/wiki/Appendix:Intern
      et_slang
    › http://www.netlingo.com/acronyms.php
 Online: Webkinz, Neopets, Miniclip,
 Gaming systems: PSP, Xbox Live, PS3, Wii
 Handheld devices: Ipod touch, Ipad, cell
  phones
   Know which safety features are available on the gaming
    equipment that your child uses—a headset may have voice-
    masking features, for example.
   Keep gaming consoles in an easy-to-supervise location and
    be aware of other places where your child may be accessing
    games.
   Tell your child never to give out personal information while
    gaming or agree to meet anyone outside of the game.
   Teach your child not to respond to anyone who is being rude
    or bullying while playing the game.
   Set rules for how long your child may play, what types of
    games are appropriate, and who else may participate.
   Have your child check with you before using a credit or debit
    card online.
   Check to see if the games your child plays have reporting
    features or moderators.
        Information from Netsmartz Kids: http://www.netsmartz.org/Gaming
   Cyberbullying is emerging as one of the
    more challenging issues facing
    educators and parents as young people
    embrace the Internet and other mobile
    communication technologies.
 Outing and Trickery – Sharing someone‘s
  secrets or embarrassing information or
  images online
 Exclusion – Intentionally keeping
  someone from being able to take part in
  an online group, such as a ―buddy list.‖
 Cyberstalking – Repeatedly sending
  unwanted messages that may include
  threats of harm; intimidating
 Flaming – Online ―fights‖ using electronic
  messages with inappropriate language
 Harassment – Repeatedly sending
  offensive, rude, and insulting messages
 Denigration – Sending or posting gossip
  or rumors about a person
 Impersonation – Posing to be someone
  else and making them look bad
   Tell your child not to respond to rude e-mails, messages, and
    comments.
   Save the evidence, such as e-mail and text messages, and
    take screenshots of comments and images. Also, take note of
    the date and time when the harassment occurs.
   Contact your Internet service provider (ISP) or cell phone
    provider. Ask the website administrator or ISP to remove any
    Web page created to hurt your child.
   If harassment is via e-mail, social networking sites, IM, and
    chat rooms, instruct your child to ―block‖ bullies or delete your
    child‘s current account and open a new one.
   Check out phone features that may allow the number to be
    blocked.
   Make a report to www.cybertipline.com, and if you feel
    something illegal has occurred, inform law enforcement
        Information from Netsmartz Kids: http://www.netsmartz.org/Cyberbullying
 About 75% of teens (12-17) carry cell
  phones
 1 in 3 teens (13-19) use their cell phone
  to surf the web
     Results from Teens and Mobile phones, Pew Internet and Americnl Life
      Project, 2010
       A Generation Unplugged, Harris Interactive, 2008
 Review cell phone records for any unknown
  numbers and late night phone calls and texts.
 Remind your child that texting is viral—anything
  sent in a text can be easily forwarded and shared.
 Teach your child never to reveal cell phone
  numbers or passwords online.
 Talk to your child about the possible consequences
  of sending sexually explicit or provocative images
  or text messages.
 When shopping for a cell phone for your child,
  research the security settings that are available.
      From Netsmartz Kids : http://www.netsmartz.org/CellPhones
   At+T
    › Phones and internet:
      http://www.att.net/s/s.dll?ep=1659430&ch=s
      mct/smct_is
   Verizon
    › https://wbillpay.verizonwireless.com/vzw/nos
      /uc/uc_overview.jsp
   Sprint
    › http://www.sprint.com/landings/family/safet
      y.html
   Music Downloads
    ›   Napster
    ›   Itunes
    ›   Kazaa
    ›   WinMX
    ›   Limewire
    ›   etorrent
 Copyright Material
 Identity Theft
 Website Validity
 www.turnitin.com
   Computer system
    › Keeping bad stuff (predatory software) out
       – keeping valuables(personal information) in


 Malicious codes: viruses, worms, trojan
 Parasitical malware: spyware, adware


   Forbes.com article: FBI: Disinfect Your Computer Or Risk
    Losing Internet Access Come July (DNS Changer – 2007)
    › bit.ly/J4tKQ3
Anti spyware and adware programs
 www.spybot.com (Spybot S &D)
 www.adaware.com (lavasoft product)


   www.cyberpatrol.com
   www.netnanny.com
   www.spectorsoft.com
   www.cybersitter.com
   www.covenanteyes.com
   Guard your identity
    › Make username generic and anonymous
    › Little information is needed to get to know
      you
 Monitor your child‘s computer use
 Use favorites
 Understand the services your child uses
 Know usernames, passwords, and e-mail
 Know child‘s ―online friends‖
 Don‘t overreact to anything your child
  tells you (fear you will take computer
  away)
 Never meet anyone met online
 Keep your computer up-to-date
    › windowsupdate.microsoft.com
    › Virus protection
    › Firewall
 www.netsmartz.org
 www.isafe.org
 http://www.kidsmart.org.uk/
 http://www.bbc.co.uk/cbbc/help
  /safesurfing/
 www.wiredkids.org/index.html
 www.wiredsafety.org
 http://www.thinkuknow.co.uk/def
  ault.aspx
 www.illinoisicac.org
 www.internet-safety.org
 www.safekids.com
 www.fbi.gov/publications/pguide
  /pguidee.htm
 www.staysafe.org
 http://www.cyberbullying.us/research.php
 Bullying, Beyond the Schoolyard, by
  Hinduja and Patchin
 http://www.cnet.com/4520-13384_1-
    6721368-1.html Top 5 Dangers article
   http://www.cnet.com/4520-13384_1-
    6721401-1.html?tag=lwt;lcol Think Before
    You Click Worksheet
Thank you for your attendance at
          today‘s presentation!
Make sure you have signed in before you
                  leave

      We hope you found it useful.

More Related Content

What's hot

Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
KanelandSvihlik
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
Sandra Fathi
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
OCTF Industry Engagement
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
Candice Wimbles
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
Toby Treacher
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
Kumar Manish
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
Barry Caplin
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
Candice Wimbles
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
Digital wellness and your family internet upload
Digital wellness and your family   internet uploadDigital wellness and your family   internet upload
Digital wellness and your family internet upload
Pella Christian Grade School
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
Nurizcka
 
internet safety 2013
internet safety 2013internet safety 2013
internet safety 2013Brian Downey
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
wstagnaro
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
Larry Magid
 
Internet safety 2010
Internet safety 2010Internet safety 2010
Internet safety 2010
Nancy Gross
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
malissa_1041
 

What's hot (20)

Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Digital wellness and your family internet upload
Digital wellness and your family   internet uploadDigital wellness and your family   internet upload
Digital wellness and your family internet upload
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
internet safety 2013
internet safety 2013internet safety 2013
internet safety 2013
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Internet safety 2010
Internet safety 2010Internet safety 2010
Internet safety 2010
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 

Similar to Internet safety presentation 2012

Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
KanelandSvihlik
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
KanelandSvihlik
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Naheelah Irving
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kids
kwazy
 
My protection plan
My protection planMy protection plan
My protection plan
Shakena12
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
Sanil Shrivastava
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
mkinzie
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
Dan Bowen
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
harriscountypubliclibrary
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
Andy Smith
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
Can R. PAHALI
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
alexfinvle
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
stevewrightco
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
LightedCandle
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
NMSU - Family Resource Management
 

Similar to Internet safety presentation 2012 (20)

Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kids
 
My protection plan
My protection planMy protection plan
My protection plan
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Internet safety presentation 2012

  • 1.
  • 2. Welcome  Internet Landscape  Dangers on the Internet  Internet Predators  Personal profiles  Internet Chat  Gaming  Cyberbullying  Cell phones  Plagiarism & Intellectual Property  Malicious Codes, Viruses, and Spyware  Parent Tips and resources  Q&A
  • 3. ―everything that‘s already in the world when you‘re born is just normal; anything that gets invented between then and before you turn thirty is incredibly exciting and creative and with any luck you can make a career out of it; anything that gets invented after you‘re thirty is against the natural order of things and the beginning of the end of civilization as we know it until it‘s been around for about ten years when it gradually turns out to be alright really.‖
  • 4. The Internet has dramatically changed our world and is a part of our everyday lives ADULTS’ VIEW  Communication – email, texting  Shopping and services (booking travel)  Financial management  News and product research  Entertainment – videos, music, games
  • 5. The Internet has dramatically changed our world and is a part of our everyday lives STUDENTS’ VIEW  Communication – texting, instant messaging, email  Entertainment – games, music, videos  Research – homework, study sites
  • 6.
  • 7. 1. Predators--social networking sites, chat rooms 2. Data theft--stolen passwords, addresses, Social Security numbers, credit card numbers, and other financial information 3. Malicious software (also known as malware)-- adware, spyware, viruses, phishing scams 4. Inappropriate content--pornography, content focused on violence, hate propaganda 5. Cyberbullying--bullying peers via instant messages, social networking sites, online games http://www.cnet.com/4520-13384_1-6721368-1.html
  • 8.  Educate parents  Educate students
  • 9. Youth internet safety survey, ages 10-17 YISS-1 (2000) YISS-2 (2005) Change Sexual solicitation 19% 13% -6% Unwanted exposure 25% 34% +9% to sexual materials Harassment 6% 9% +3%
  • 10.
  • 11.
  • 12.
  • 13. ―Google‖ yourself › Type in first and last name, email addresses, screen names, addresses, phone numbers › search for images as well
  • 14. Facebook ,Myspace › Age requirements  “No information from children under age 13.” › Public vs Private › Know who you add: friends vs cyberfriends › Have access to your child‘s site › Be conscientious of pictures/videos  Protecting reputations online, in plain English (commoncraft.com)
  • 15. Make sure that your child takes advantage of the privacy settings on social networking sites.  Pre-approve the pictures and videos your child posts online.  Remind your child never to post e-mail addresses or cell phone numbers.  Tell your child that passwords should only be shared with parents and guardians.  Teach your child not to respond to any e-mails requesting personal information and to delete e-mails from unknown senders.  Discuss how to keep screen names and e-mail addresses gender-neutral, appropriate, and free of any information that could reveal identity.  Encourage your child to tell you right away if anything happens online that bothers or frightens him or her.  Information from Netsmartz Kids: http://www.netsmartz.org/RevealingTooMuch
  • 16.  Text messaging  Chat rooms  Instant messaging (‗IMing‘)  Online gaming – gaming devices  Message boards  Blogs and wikis
  • 17. LOL POS BRB ASL  SMS (short message service) aka texting  Wikipedia and netlingo.com list of internet slang › http://en.wiktionary.org/wiki/Appendix:Intern et_slang › http://www.netlingo.com/acronyms.php
  • 18.
  • 19.  Online: Webkinz, Neopets, Miniclip,  Gaming systems: PSP, Xbox Live, PS3, Wii  Handheld devices: Ipod touch, Ipad, cell phones
  • 20. Know which safety features are available on the gaming equipment that your child uses—a headset may have voice- masking features, for example.  Keep gaming consoles in an easy-to-supervise location and be aware of other places where your child may be accessing games.  Tell your child never to give out personal information while gaming or agree to meet anyone outside of the game.  Teach your child not to respond to anyone who is being rude or bullying while playing the game.  Set rules for how long your child may play, what types of games are appropriate, and who else may participate.  Have your child check with you before using a credit or debit card online.  Check to see if the games your child plays have reporting features or moderators.  Information from Netsmartz Kids: http://www.netsmartz.org/Gaming
  • 21. Cyberbullying is emerging as one of the more challenging issues facing educators and parents as young people embrace the Internet and other mobile communication technologies.
  • 22.
  • 23.
  • 24.  Outing and Trickery – Sharing someone‘s secrets or embarrassing information or images online  Exclusion – Intentionally keeping someone from being able to take part in an online group, such as a ―buddy list.‖  Cyberstalking – Repeatedly sending unwanted messages that may include threats of harm; intimidating
  • 25.  Flaming – Online ―fights‖ using electronic messages with inappropriate language  Harassment – Repeatedly sending offensive, rude, and insulting messages  Denigration – Sending or posting gossip or rumors about a person  Impersonation – Posing to be someone else and making them look bad
  • 26.
  • 27. Tell your child not to respond to rude e-mails, messages, and comments.  Save the evidence, such as e-mail and text messages, and take screenshots of comments and images. Also, take note of the date and time when the harassment occurs.  Contact your Internet service provider (ISP) or cell phone provider. Ask the website administrator or ISP to remove any Web page created to hurt your child.  If harassment is via e-mail, social networking sites, IM, and chat rooms, instruct your child to ―block‖ bullies or delete your child‘s current account and open a new one.  Check out phone features that may allow the number to be blocked.  Make a report to www.cybertipline.com, and if you feel something illegal has occurred, inform law enforcement  Information from Netsmartz Kids: http://www.netsmartz.org/Cyberbullying
  • 28.  About 75% of teens (12-17) carry cell phones  1 in 3 teens (13-19) use their cell phone to surf the web  Results from Teens and Mobile phones, Pew Internet and Americnl Life Project, 2010  A Generation Unplugged, Harris Interactive, 2008
  • 29.  Review cell phone records for any unknown numbers and late night phone calls and texts.  Remind your child that texting is viral—anything sent in a text can be easily forwarded and shared.  Teach your child never to reveal cell phone numbers or passwords online.  Talk to your child about the possible consequences of sending sexually explicit or provocative images or text messages.  When shopping for a cell phone for your child, research the security settings that are available.  From Netsmartz Kids : http://www.netsmartz.org/CellPhones
  • 30. At+T › Phones and internet: http://www.att.net/s/s.dll?ep=1659430&ch=s mct/smct_is  Verizon › https://wbillpay.verizonwireless.com/vzw/nos /uc/uc_overview.jsp  Sprint › http://www.sprint.com/landings/family/safet y.html
  • 31. Music Downloads › Napster › Itunes › Kazaa › WinMX › Limewire › etorrent  Copyright Material  Identity Theft  Website Validity  www.turnitin.com
  • 32. Computer system › Keeping bad stuff (predatory software) out – keeping valuables(personal information) in  Malicious codes: viruses, worms, trojan  Parasitical malware: spyware, adware  Forbes.com article: FBI: Disinfect Your Computer Or Risk Losing Internet Access Come July (DNS Changer – 2007) › bit.ly/J4tKQ3
  • 33.
  • 34. Anti spyware and adware programs  www.spybot.com (Spybot S &D)  www.adaware.com (lavasoft product)  www.cyberpatrol.com  www.netnanny.com  www.spectorsoft.com  www.cybersitter.com  www.covenanteyes.com
  • 35.
  • 36. Guard your identity › Make username generic and anonymous › Little information is needed to get to know you  Monitor your child‘s computer use  Use favorites  Understand the services your child uses  Know usernames, passwords, and e-mail
  • 37.  Know child‘s ―online friends‖  Don‘t overreact to anything your child tells you (fear you will take computer away)  Never meet anyone met online  Keep your computer up-to-date › windowsupdate.microsoft.com › Virus protection › Firewall
  • 38.  www.netsmartz.org  www.isafe.org  http://www.kidsmart.org.uk/  http://www.bbc.co.uk/cbbc/help /safesurfing/  www.wiredkids.org/index.html  www.wiredsafety.org
  • 39.  http://www.thinkuknow.co.uk/def ault.aspx  www.illinoisicac.org  www.internet-safety.org  www.safekids.com  www.fbi.gov/publications/pguide /pguidee.htm  www.staysafe.org
  • 40.  http://www.cyberbullying.us/research.php  Bullying, Beyond the Schoolyard, by Hinduja and Patchin  http://www.cnet.com/4520-13384_1- 6721368-1.html Top 5 Dangers article  http://www.cnet.com/4520-13384_1- 6721401-1.html?tag=lwt;lcol Think Before You Click Worksheet
  • 41. Thank you for your attendance at today‘s presentation! Make sure you have signed in before you leave We hope you found it useful.

Editor's Notes

  1. Read slide
  2. to understand this complex issue, it is important to start with perspective. Brief uses by adults
  3. Brief uses by students
  4. Points: cell phone is highest, and many have data plans the uses lists are almost all related to communication/social this survey was done before the release of tablets (ipad, kindle, nook…)
  5. An article on Cnet stated it very concisely, the tope 5 dangers for kids….
  6. Unfortunately the exposure to sexual and pornographic materials have become more of a problem as internet access becomes easierHarassment via digital devices has also increased
  7. A video I saw was about a HS boy adding a ‘female’ ‘friend’ to his fb…. This person scowered his account to find out all he could about him, convinced him to do a video chat, took images, and then tried to blackmail the boy when the ‘female friend’ who was actually an older man, was threatened to be exposed because he was reported.
  8. Cyber predators are skilled at getting what they want. The process they use is called grooming. They gain trust, make the child open up, then try and control them by fear.
  9. What do we tell our kids to do?