Threat landscape, strategies, and resources for cyber safety. Presented at Johanna Perrin Middle School, Fairport, New York as part of the Fairport STAR parents program.
Threat landscape, strategies, and resources for cyber safety. Presented at Johanna Perrin Middle School, Fairport, New York as part of the Fairport STAR parents program.
The internet is a great place for children to learn and communicate but there are some dangers they need to know about. This presentation educates children in the key points of how to stay safe online.
Dizeo provides safe social networking and homework help to children.
A good digital citizen gives accurate and reliable information and is genuine and helpful when online. It is the responsibility of all students to collaborate in a friendly and courteous manner to develop and share online.
Internet do's and don'ts. Kids safety on the Internet Queens Library
Children will learn about Internet dangers and following procedures for carefully navigating the internet. This presentation was used as a teaching tool for my computer class. Ages 7-13. Please like & download my Slides :) Leave comments also .... thanks
Stay Safe Online - Elementary School Level Public ProgramDaniel Hanttula
A presentation to teach elementary school children how to be safe online. For information on how to have this program presented to your Oklahoma elementary school, please use the contact form.
The internet is a great place for children to learn and communicate but there are some dangers they need to know about. This presentation educates children in the key points of how to stay safe online.
Dizeo provides safe social networking and homework help to children.
A good digital citizen gives accurate and reliable information and is genuine and helpful when online. It is the responsibility of all students to collaborate in a friendly and courteous manner to develop and share online.
Internet do's and don'ts. Kids safety on the Internet Queens Library
Children will learn about Internet dangers and following procedures for carefully navigating the internet. This presentation was used as a teaching tool for my computer class. Ages 7-13. Please like & download my Slides :) Leave comments also .... thanks
Stay Safe Online - Elementary School Level Public ProgramDaniel Hanttula
A presentation to teach elementary school children how to be safe online. For information on how to have this program presented to your Oklahoma elementary school, please use the contact form.
Some young people have never known a world without social media. Around 91 percent of 16-24 year olds use the internet for social networking.They use social media now more than ever before. Give away information without thinking or knowing the consequences. Get sucked into a world of online games and dangerous online trends. There have even been cases where suicide games were trending online, that children all encouraged each other to participate in. It can be a dark and unpredictable place.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
6. What do we mean by technology?
Computers
Digital cameras
Mobile phones (including smart phones)
Playstation
Xbox
Wii
Hand held games consoles (DS)
7. We all know that children adapt to
new technology faster then adults
9. It’s more than sex
Suicide
Self harm.
Eating disorders.
Online fraud.
Dangerous trends.
10. There are many forms of social
networking
Networks specifically set up to facilitate
meeting people online.
Networks for online games.
Peer to peer networks.
Virtual worlds
13. Social Networking Sites
Be careful what information you give out on your
profile. Remember that you don’t know who your
friend’s friends are… or your friend’s friends’ friends!
And you don’t know what they’ll do with your picture
or your phone number if you give it out by mistake.
Once your picture is out there, it’s out there forever
and you won’t be able to get it back.
Be aware that information on your profile could
potentially be viewed by anyone. So if you wouldn’t
be comfortable printing it off and handing it out on the
street, maybe it shouldn’t be on your profile.
14. The internet has a long memory and its
24/7 365 days a year.
70% of employers now research social
network when checking suitability for
employment.
15. Camera phones
Whilst having a camera phone is great and
really useful, be careful if you share your
photos with others. Pictures can be changed
or shared around, so think about what the
image is and who you are sending it to,
before you press send. Once it’s out there it’s
out there forever!
16. Cyber Bullying
Someone uses the internet or mobiles to deliberately upset someone
else.
Undertaken through technology such as mobiles or the internet
Bullying can affect someone not just at school, but at home as well.
Because it takes place in the virtual world, it has a 24/7 nature and can
make someone feel upset or threatened in their own home
Can be hard to identify who the cyberbully is because they could block
their number or post things on a website anonymously. The nature of
this type of bullying means it can have a large audience, many of whom
may not even realise that they are being bullies.
A positive thin about this kind of bullying is that it can be evidenced.
With normal bullying, it can be one person’s word against another’s, but
with cyberbullying you can save texts or print our
emails/IM’s/WebPages. This can be used as proof to catch the bully
and stop them upsetting someone: this could be your or a friend’s child
or young people with whom you are working.
18. GPS technology
The worrying thing about the social networking using
GPS technology, is that your contacts will be on a
map, showing exactly where they are. If you can see
them, your contacts can also see where you are too.
Quite scary if you have contacts on your profile that
you don’t know or don’t trust. If you do want to use
these sort of apps, you need to remember to use
your privacy settings and remove anyone you don’t
know or don’t trust, from your contacts.
20. Uploading pictures
Only upload pictures that you’d be happy for your mum to see –
anything too sexy to be passed round the dinner table should
NOT make it onto the web, as you don’t know who could be
looking at it or what they might be doing with it.
Don’t post your phone number or email address on your
homepage. Think about it – why would anyone actually need
this info when they can message you privately via your social
networking site?
Don’t post pictures of you or your mates wearing school uniform
– if dodgy people see your school badge, they can work out
where you are and find you. The more anonymous you are, the
less vulnerable you are to people with bad intentions.
Tick the “no pic forwarding” option on your settings page – this
will stop people forwarding your pictures to anyone without your
consent.
21. Sexting
Someone taking an indecent image of themselves, and sending
it to their friends or boy/girlfriend via a mobile phone or some
other form of technology is sometimes referred to as ‘sexting’.
Once these images have been taken and sent to others, control
is lost of them and they can end up anywhere. They could be
seen by friends and family, a future employer, or even, in some
cases, end up in the possession an offender!
This also puts that person who originally sent the images in a
vulnerable position, as somebody they may or may not know
now has these images and could use technology to bully,
harass or even try to locate them.
Just think – if you wouldn’t print and pass these images around
your school or show your mum or dad, they are not appropriate
to share via phone or other technologies.
23. Gaming
Online games where you chat and play with people you
don’t know can be great
Can be addictive
Remember that no one will die in real life if you don’t win!
Adults with bad intentions…..
Remember - people are not always who they say they
are.
Don’t get tricked or blackmailed to give out any personal
details
use a nickname as your username/ character name
You don’t need to share personal information to
enjoy the game!
24. PEGI
There is a new rating system in Europe called PEGI which can help you decide if you want
to be involved in a game or not. It’s a bit like film classification and tells you which age
group the game is appropriate for and what kind of content it might contain.
Violence
Game contains depictions of violence
Discrimination
Game contains depictions of, or material which may encourage, discrimination
Sex
Game depicts nudity and/or sexual behaviour or sexual references
Drugs
Game refers to or depicts the use of drugs
Fear
Game may be frightening or scary for young children
Bad Language
Game contains bad language
26. In 2002 there were 71 cases.
•In 2003 there were 90 cases.
•In 2004 there were 117 cases.
•In 2005 there were 157 cases
•In 2006 there were 250 cases
•In 2007 there were 276 cases.
•In 2008 there were 307 cases.
•In 2009 there were 325 cases.
•In 2010 there were 189 cases.!!!!!!!!
86% of these offences in North Wales involve sexual child abuse.
75% of the offenders investigated
North Wales Police Hi-tech Crime Unit were previously unknown to the police.
Figures taken from data from North Wales Police Hi-tech Crime Unit
27. Who in this room do you know is not a
paedophile ?
28. You can be anything
you want to be on the
internet.
Do you really know who
you work with?
29. Grading images.
Level 1 nudity sexual posing.
Level 2 sexual activity between children
none penetrative.
Level 3 sexual activity between adults and
children none penetrative.
Level 4 penetrative sexual activity involving
children.
Level 5 bestiality, sadomasochism, bondage
or unusual acts involving children.
30. Age of criminality
Age of consent
Under 16
Under 13
Making contact
Harassment
Cyberbullying
Sexting
31. Ok, so it’s gone wrong, so what
can we do?
Preserve the evidence.
Don’t be tempted to be an amateur sleuth.
If its off leave it off.
If its on note what's on the screen photograph
if possible then pull the plug from the back of
the computer
32. If it’s a laptop pull the battery.
Mobile phone switch it off.
Bag it in an appropriate bag.