SlideShare a Scribd company logo
Parenting 2.0
Raising Responsible Digital Citizens
CONTENTS
The Digital LandscapeI.
CyberbullyingII.
Solutions and StrategiesIII.
THE DIGITAL LANDSCAPE
Digital Natives
• Born after 1990
• Highly connected
• 97% play video games
• 75% have cell phones
• 68% use IM
• 70% use SN sites
• Easily adapt and adopt
• Generate content
THE DIGITAL LANDSCAPE
Brave New World
• Personal relationships
heavily influenced by
“bubble” that the Internet
represents
• Accept web as
dominant medium
for social interaction with
peers
• More comfortable with a
public persona
THE DIGITAL LANDSCAPE
The Time Machine
• Time spent online up to 13
hours per week from 8
hours five years ago
• Social Networking and
games dominate time spent
• Pediatricians recommend
no more than 2 hours/day
for youth
THE DIGITAL LANDSCAPE
Friend or Foe?
• Easy to fake online persona
• Predators adapting to Social
Networks
• Practice of “Sextortion”
includes using digital
content for blackmail 15-year-old girl on Facebook
THE DIGITAL LANDSCAPE
Adults Only?
• Pornography more available
and graphic than ever
before
• Increasing chances of
accidental exposure due to
spam attacks on social
networks
• Average age for first
exposure to pornography is
11
THE DIGITAL LANDSCAPE
CONTENTS
The Digital LandscapeI.
CyberbullyingII.
Solutions and StrategiesIII.
WHAT IS CYBERBULLYING?
• Bullying through
electronic means
• Text, Facebook,
YouTube common
mediums
• Potentially fatal
(Megan Meier,
Phoebe Prince, Alexis
Pilkington)
HOW IS IT DIFFERENT?
• Ubiquitous
Phones, computers
• Public
Visible to anyone
• Constant
School, play, home
• Viral
Social mediums
• Serious
Risk of suicide
HOW TO DETECT?
Communication
• Ask specific
questions about
online activities
• Ask them what they
think about online
bullies
• Tell them to tell you if
they encounter kids
being mean online
HOW TO DETECT?
Vigilance
• Changes in online
activities
• Changes in mood
• Shifts in attitude towards
social activities
CONTENTS
The Digital LandscapeI.
CyberbullyingII.
Solutions and StrategiesIII.
STRATEGY
Be a Parent
• Decide when your
kids are ready
• Stress respect of
others
• Consider maturity of
peers and child
• Set clear rules
• Set clear
consequences
STRATEGY
Cyberbullying
• Take the problem
seriously
• Assure your child you
will make it stop
• Don’t react to the bully
• Record and report
STRATEGY
Be Proactive
• Download and sign
InternetSafety.com
Gameplan
• Get savvy
• Get interactive
• Get the right tools
SOLUTIONS
SOLUTIONS
Music
Monitor music downloaded
through iTunes and limit
access to explicit content.
Websites
Monitor and filter websites
based on categories and auto
enablement of Safe Search.
Videos
Monitor and filter Online TV by
show rating and block
inappropriate YouTube clips.
Instant Messaging
Monitor or block instant
messaging applications and
online chat rooms.
Games
Limit online interactions with
popular games and restrict access
to gaming websites.
Social Networking
Monitor postings on social network
sites for personal information or
block social networking sites.
SOLUTIONS
Instant Alerts
Text Message, Email or
Phone alerts when someone
visits inappropriate content.
Email
Choose to block email, allow it
with only approved contacts, or
allow unrestricted email.
Activity Reports
Smart, informative reports of
online activity with summary
reports sent to your inbox.
Remote Management
Change your settings anytime
from anywhere using only your
web browser.
Time Limits
Choose the times of the day that
the Internet is available or set a
total time that can be spent online.
Multiple Profiles
Setup monitoring and filtering
policies for each user.
Questions?

More Related Content

What's hot

Teens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From CyberbullyingTeens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From Cyberbullying
TeenSafe
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Scott Burnett
 
Teen safe2017appblacklist slideshare
Teen safe2017appblacklist   slideshareTeen safe2017appblacklist   slideshare
Teen safe2017appblacklist slideshare
TeenSafe
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
Ian Krieger
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
MaimoonahKhan
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
Mohamed ElGabry
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Scott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Scott Burnett
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for Kids
Patrick Laverty
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Scott Burnett
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
jaenjenny
 
Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents
lisluandaprimary
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Scott Burnett
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
Scott Burnett
 
Pink Pecha kucha
Pink Pecha kuchaPink Pecha kucha
Pink Pecha kucha
mrparslow
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
Donna Murray
 
Stranger danger in social media
Stranger danger in social mediaStranger danger in social media
Stranger danger in social media
Umasree Raghunath
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
Emmanuel Arthur
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
jordan-and-haden
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
Shubham Gupta
 

What's hot (20)

Teens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From CyberbullyingTeens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From Cyberbullying
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Teen safe2017appblacklist slideshare
Teen safe2017appblacklist   slideshareTeen safe2017appblacklist   slideshare
Teen safe2017appblacklist slideshare
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for Kids
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Pink Pecha kucha
Pink Pecha kuchaPink Pecha kucha
Pink Pecha kucha
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
Stranger danger in social media
Stranger danger in social mediaStranger danger in social media
Stranger danger in social media
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
 

Viewers also liked

Elementary curriculum overview 2012 2013
Elementary curriculum overview 2012 2013Elementary curriculum overview 2012 2013
Elementary curriculum overview 2012 2013
danriles
 
Human behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorHuman behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptor
أحلام انصارى
 
Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in haptic
أحلام انصارى
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer InteractionMultimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
أحلام انصارى
 
Noise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech RecognitionNoise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech Recognition
أحلام انصارى
 
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
أحلام انصارى
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
أحلام انصارى
 
Network ssecurity toolkit
Network ssecurity toolkitNetwork ssecurity toolkit
Network ssecurity toolkit
أحلام انصارى
 
Website attack n defacement n its control measures
Website attack n defacement n its control measures Website attack n defacement n its control measures
Website attack n defacement n its control measures
أحلام انصارى
 
Secure cloud mining By ahlam
Secure cloud mining  By ahlamSecure cloud mining  By ahlam
Secure cloud mining By ahlam
أحلام انصارى
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
أحلام انصارى
 
Cryptography
Cryptography Cryptography
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
أحلام انصارى
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
أحلام انصارى
 
Image forgery and security
Image forgery and securityImage forgery and security
Image forgery and security
أحلام انصارى
 
Analysis of Algorithm
Analysis of AlgorithmAnalysis of Algorithm
Analysis of Algorithm
أحلام انصارى
 

Viewers also liked (16)

Elementary curriculum overview 2012 2013
Elementary curriculum overview 2012 2013Elementary curriculum overview 2012 2013
Elementary curriculum overview 2012 2013
 
Human behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorHuman behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptor
 
Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in haptic
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer InteractionMultimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
 
Noise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech RecognitionNoise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech Recognition
 
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Network ssecurity toolkit
Network ssecurity toolkitNetwork ssecurity toolkit
Network ssecurity toolkit
 
Website attack n defacement n its control measures
Website attack n defacement n its control measures Website attack n defacement n its control measures
Website attack n defacement n its control measures
 
Secure cloud mining By ahlam
Secure cloud mining  By ahlamSecure cloud mining  By ahlam
Secure cloud mining By ahlam
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
Cryptography
Cryptography Cryptography
Cryptography
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
Image forgery and security
Image forgery and securityImage forgery and security
Image forgery and security
 
Analysis of Algorithm
Analysis of AlgorithmAnalysis of Algorithm
Analysis of Algorithm
 

Similar to Internetsafety

Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
Marian Merritt
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
Emmanuel Arthur
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Scott Burnett
 
Feb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber worldFeb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber world
Scott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Lori Lee Mickelson
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Lori Lee Mickelson
 
Digital drama
Digital dramaDigital drama
Digital drama
ktcole
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigations
CreepSquash
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
CreepSquash
 
Social Media Teen Safety Seminar Training #SocialSavvyFamily
Social Media Teen Safety Seminar Training #SocialSavvyFamily Social Media Teen Safety Seminar Training #SocialSavvyFamily
Social Media Teen Safety Seminar Training #SocialSavvyFamily
Pam Moore
 
Technology Influence
Technology Influence Technology Influence
Technology Influence
Ilaxi Patel
 
Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015
Scott Burnett
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
Jason Rushing
 
Social Media Safety for Parents
Social Media Safety for ParentsSocial Media Safety for Parents
Social Media Safety for Parents
bermandry
 
Cyber Safe Parenting
Cyber Safe ParentingCyber Safe Parenting
Cyber Safe Parenting
Rohit Srivastwa
 
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016
Kathryn White
 
Internet safety for parents slide share
Internet safety for parents slide shareInternet safety for parents slide share
Internet safety for parents slide share
Scott Burnett
 
Ims slide show
Ims slide showIms slide show
Ims slide show
kidsprivacy
 
Character Development, for students, by students!
Character Development, for students, by students!Character Development, for students, by students!
Character Development, for students, by students!
mediaplaylab
 
What Parents need to know about social media in 2014
What Parents need to know about social media in 2014What Parents need to know about social media in 2014
What Parents need to know about social media in 2014
Pepper It Marketing ~ Time on Task Virtual Assistant Services
 

Similar to Internetsafety (20)

Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Feb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber worldFeb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber world
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Digital drama
Digital dramaDigital drama
Digital drama
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigations
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
 
Social Media Teen Safety Seminar Training #SocialSavvyFamily
Social Media Teen Safety Seminar Training #SocialSavvyFamily Social Media Teen Safety Seminar Training #SocialSavvyFamily
Social Media Teen Safety Seminar Training #SocialSavvyFamily
 
Technology Influence
Technology Influence Technology Influence
Technology Influence
 
Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
 
Social Media Safety for Parents
Social Media Safety for ParentsSocial Media Safety for Parents
Social Media Safety for Parents
 
Cyber Safe Parenting
Cyber Safe ParentingCyber Safe Parenting
Cyber Safe Parenting
 
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016
 
Internet safety for parents slide share
Internet safety for parents slide shareInternet safety for parents slide share
Internet safety for parents slide share
 
Ims slide show
Ims slide showIms slide show
Ims slide show
 
Character Development, for students, by students!
Character Development, for students, by students!Character Development, for students, by students!
Character Development, for students, by students!
 
What Parents need to know about social media in 2014
What Parents need to know about social media in 2014What Parents need to know about social media in 2014
What Parents need to know about social media in 2014
 

Recently uploaded

How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 

Recently uploaded (20)

How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 

Internetsafety

  • 3. THE DIGITAL LANDSCAPE Digital Natives • Born after 1990 • Highly connected • 97% play video games • 75% have cell phones • 68% use IM • 70% use SN sites • Easily adapt and adopt • Generate content
  • 4. THE DIGITAL LANDSCAPE Brave New World • Personal relationships heavily influenced by “bubble” that the Internet represents • Accept web as dominant medium for social interaction with peers • More comfortable with a public persona
  • 5. THE DIGITAL LANDSCAPE The Time Machine • Time spent online up to 13 hours per week from 8 hours five years ago • Social Networking and games dominate time spent • Pediatricians recommend no more than 2 hours/day for youth
  • 6. THE DIGITAL LANDSCAPE Friend or Foe? • Easy to fake online persona • Predators adapting to Social Networks • Practice of “Sextortion” includes using digital content for blackmail 15-year-old girl on Facebook
  • 7. THE DIGITAL LANDSCAPE Adults Only? • Pornography more available and graphic than ever before • Increasing chances of accidental exposure due to spam attacks on social networks • Average age for first exposure to pornography is 11
  • 10. WHAT IS CYBERBULLYING? • Bullying through electronic means • Text, Facebook, YouTube common mediums • Potentially fatal (Megan Meier, Phoebe Prince, Alexis Pilkington)
  • 11. HOW IS IT DIFFERENT? • Ubiquitous Phones, computers • Public Visible to anyone • Constant School, play, home • Viral Social mediums • Serious Risk of suicide
  • 12. HOW TO DETECT? Communication • Ask specific questions about online activities • Ask them what they think about online bullies • Tell them to tell you if they encounter kids being mean online
  • 13. HOW TO DETECT? Vigilance • Changes in online activities • Changes in mood • Shifts in attitude towards social activities
  • 15. STRATEGY Be a Parent • Decide when your kids are ready • Stress respect of others • Consider maturity of peers and child • Set clear rules • Set clear consequences
  • 16. STRATEGY Cyberbullying • Take the problem seriously • Assure your child you will make it stop • Don’t react to the bully • Record and report
  • 17. STRATEGY Be Proactive • Download and sign InternetSafety.com Gameplan • Get savvy • Get interactive • Get the right tools
  • 19. SOLUTIONS Music Monitor music downloaded through iTunes and limit access to explicit content. Websites Monitor and filter websites based on categories and auto enablement of Safe Search. Videos Monitor and filter Online TV by show rating and block inappropriate YouTube clips. Instant Messaging Monitor or block instant messaging applications and online chat rooms. Games Limit online interactions with popular games and restrict access to gaming websites. Social Networking Monitor postings on social network sites for personal information or block social networking sites.
  • 20. SOLUTIONS Instant Alerts Text Message, Email or Phone alerts when someone visits inappropriate content. Email Choose to block email, allow it with only approved contacts, or allow unrestricted email. Activity Reports Smart, informative reports of online activity with summary reports sent to your inbox. Remote Management Change your settings anytime from anywhere using only your web browser. Time Limits Choose the times of the day that the Internet is available or set a total time that can be spent online. Multiple Profiles Setup monitoring and filtering policies for each user.

Editor's Notes

  1. Point here is to emphasize difference in upbringing between child and parent and show the disconnect that exists. Use the phrase “digital divide” when referring to this disconnect.
  2. “Bubble” is the distance and anonymity web provides, leading to exaggerated versions of our personalities. Normal filters we have for face-to-face interaction are disabled. Web is the social spot for kids. Not gas station parking lot or dead end. Because kids have grown up with web, they are more comfortable with less personal privacy
  3. American Academy of Pediatrics says no more than 2 hours total screen time per day for kids 16 and under.
  4. Recent examples: Man in UK created 8 different fake Facebook profiles to groom “up to 1,000 kids”; NAMBLA pages found on Facebook; in sextortion cases kids are tricked into revealing themselves in some way, and then the person uses the digital content to blackmail them into other things; in other cases the kids are tricked into doing things for other reasons, such as believing someone hacked into their Facebook profile or can get them into trouble somehow.
  5. Main thing to emphasize is just pornographic content on web growing and getting worse every day. Stress that kids are getting their sex-ed this way.
  6. Web is essentially like a market in Bangkok: anything you are looking for can be found, and none of it is very safe. Wouldn’t want to drop a kid off here.
  7. Just note that Cyberbullying is leading cause of concern in online safety today. Two recent suicides linked to Cyberbullying.
  8. Define it
  9. Point here is to stress that Cyberbullying can be worse than physical bullying because kids can’t escape it, it’s very public, and it’s permanent
  10. Photo is of a parent responding to cyberbullies, which only worsened the problem. Parents should first comfort the child, tell them they did the right thing by coming to them, record the activity for proof, and then go through the proper channels to report the problem, starting with bully’s parents.
  11. Stress dealing with problems before they are problems, getting ahead of the game.
  12. Our home software solution which provides filtering, monitoring, and reporting
  13. First feature set
  14. Second feature set