SlideShare a Scribd company logo
1 of 10
The ultimate loop
The anonymity paradox
 It‘s good to be anonymous when you
want to…
protect your privacy
 It‘s bad to be anonymous when you
want to…
commit a crime
locate a criminal
The risks
 What gets misused
Trust
Stupidity
Unawareness
Not enough education / experience
 For what purpose
Information thefts
Real-world crimes
The privacy
 Countermeasure: privacy control
 Aware / unaware giveaway
 One-way rule
 Grandmother rule
 Street concept
Our defense
 Double consideration
 Education
 Experience build-up
 Common sense
My opinion
 Nothing is black
 Nothing is white either
One important thing
„Don‘t let internet harm you“
How to distribute the idea
 Through media
 Through teachers
 Through parents
 Through youngsters
Thank you for your attention.
Thank you for your attention.

More Related Content

What's hot

Online safety 2011
Online safety 2011Online safety 2011
Online safety 2011Tea Teić
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationjpl17
 
Cyberbullying - March 2, 2010
Cyberbullying - March 2, 2010Cyberbullying - March 2, 2010
Cyberbullying - March 2, 2010Samantha Morra
 
6 mm cyberbullying
6 mm cyberbullying6 mm cyberbullying
6 mm cyberbullyinglisamholden
 
6 mm cyberbullying
6 mm cyberbullying6 mm cyberbullying
6 mm cyberbullyinglisamholden
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetinganniebee3509
 
Social justice
Social justiceSocial justice
Social justicekm03john
 
Final cyberbullying
Final cyberbullyingFinal cyberbullying
Final cyberbullyingTexasQT
 
Final cyberbullying1
Final cyberbullying1Final cyberbullying1
Final cyberbullying1TexasQT
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2bigmike18
 
Internet security for parents
Internet security for parentsInternet security for parents
Internet security for parentsShannon Blackerby
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingcidelgad
 
Lesson 1 maintaining internet safety(unit 1)
Lesson 1    maintaining internet safety(unit 1)Lesson 1    maintaining internet safety(unit 1)
Lesson 1 maintaining internet safety(unit 1)FRANCISANGELOBANTAT
 
Netiquette & internet safety
Netiquette & internet safetyNetiquette & internet safety
Netiquette & internet safetyjorditrg
 

What's hot (20)

Online safety 2011
Online safety 2011Online safety 2011
Online safety 2011
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Cyberbullying - March 2, 2010
Cyberbullying - March 2, 2010Cyberbullying - March 2, 2010
Cyberbullying - March 2, 2010
 
6 mm cyberbullying
6 mm cyberbullying6 mm cyberbullying
6 mm cyberbullying
 
6 mm cyberbullying
6 mm cyberbullying6 mm cyberbullying
6 mm cyberbullying
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meeting
 
Internet safety for kids
Internet safety for kidsInternet safety for kids
Internet safety for kids
 
Social justice
Social justiceSocial justice
Social justice
 
Final cyberbullying
Final cyberbullyingFinal cyberbullying
Final cyberbullying
 
Final cyberbullying1
Final cyberbullying1Final cyberbullying1
Final cyberbullying1
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
 
Quiz4
Quiz4Quiz4
Quiz4
 
Internet security for parents
Internet security for parentsInternet security for parents
Internet security for parents
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Lesson 1 maintaining internet safety(unit 1)
Lesson 1    maintaining internet safety(unit 1)Lesson 1    maintaining internet safety(unit 1)
Lesson 1 maintaining internet safety(unit 1)
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Netiquette & internet safety
Netiquette & internet safetyNetiquette & internet safety
Netiquette & internet safety
 
Social Media and The Law
Social Media and The LawSocial Media and The Law
Social Media and The Law
 

Similar to Parents and Online technologies - what the youth panel think about internet

Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 ParentsIwith.org
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online SafetyDonna Murray
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
JSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship DiscussionJSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship DiscussionOCHS Librarian
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentationrenumann
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Larry Magid
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipnhokanson
 
Your Privacy & Security on the Web
Your Privacy & Security on the WebYour Privacy & Security on the Web
Your Privacy & Security on the Webankitgadgil
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010paul
 
Nicki Karet & Alison Preston
Nicki Karet & Alison PrestonNicki Karet & Alison Preston
Nicki Karet & Alison PrestonMRS
 
Confronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and ExploitationConfronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and Exploitationmckenln
 
Changing World, Changing Demands
Changing World, Changing DemandsChanging World, Changing Demands
Changing World, Changing Demandskjellwr4
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 

Similar to Parents and Online technologies - what the youth panel think about internet (20)

Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 Parents
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
Solid foundation Media workshop Social Media and You (june 2012)
Solid foundation Media workshop   Social Media and You (june 2012)Solid foundation Media workshop   Social Media and You (june 2012)
Solid foundation Media workshop Social Media and You (june 2012)
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
JSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship DiscussionJSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship Discussion
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentation
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Your Privacy & Security on the Web
Your Privacy & Security on the WebYour Privacy & Security on the Web
Your Privacy & Security on the Web
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010
 
Nicki Karet & Alison Preston
Nicki Karet & Alison PrestonNicki Karet & Alison Preston
Nicki Karet & Alison Preston
 
Confronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and ExploitationConfronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and Exploitation
 
Changing World, Changing Demands
Changing World, Changing DemandsChanging World, Changing Demands
Changing World, Changing Demands
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 

More from Safer Internet Forum 2010 (European Commission)

More from Safer Internet Forum 2010 (European Commission) (18)

Privacy pictograms (Gabriela Bodea)
Privacy pictograms   (Gabriela Bodea)Privacy pictograms   (Gabriela Bodea)
Privacy pictograms (Gabriela Bodea)
 
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
 
The European Online Grooming Project - Preliminary Findings (Julia Davidson)
The European Online Grooming Project - Preliminary Findings (Julia Davidson)The European Online Grooming Project - Preliminary Findings (Julia Davidson)
The European Online Grooming Project - Preliminary Findings (Julia Davidson)
 
Parents and online technologies: Communicating to youth (Francisco J. Pérez L...
Parents and online technologies: Communicating to youth (Francisco J. Pérez L...Parents and online technologies: Communicating to youth (Francisco J. Pérez L...
Parents and online technologies: Communicating to youth (Francisco J. Pérez L...
 
Parents and online technologies - Raising awareness of Parents - Illiterate P...
Parents and online technologies - Raising awareness of Parents - Illiterate P...Parents and online technologies - Raising awareness of Parents - Illiterate P...
Parents and online technologies - Raising awareness of Parents - Illiterate P...
 
Skyrock (Jérôme JA. Aguesse)
Skyrock (Jérôme JA. Aguesse)Skyrock (Jérôme JA. Aguesse)
Skyrock (Jérôme JA. Aguesse)
 
Parents and online technologies: Empowering Parents in the Digital Age (Anne ...
Parents and online technologies: Empowering Parents in the Digital Age (Anne ...Parents and online technologies: Empowering Parents in the Digital Age (Anne ...
Parents and online technologies: Empowering Parents in the Digital Age (Anne ...
 
Online games: Computer Games and Learning (Daniel Schwarz)
Online games: Computer Games and Learning (Daniel Schwarz)Online games: Computer Games and Learning (Daniel Schwarz)
Online games: Computer Games and Learning (Daniel Schwarz)
 
Gouden @penstaart (Marjolijn Bonthuis)
Gouden @penstaart (Marjolijn Bonthuis)Gouden @penstaart (Marjolijn Bonthuis)
Gouden @penstaart (Marjolijn Bonthuis)
 
How do youngsters choose to sign up to a social networking site? What is behi...
How do youngsters choose to sign up to a social networking site? What is behi...How do youngsters choose to sign up to a social networking site? What is behi...
How do youngsters choose to sign up to a social networking site? What is behi...
 
Access to social networks (Bernhard Jungwirth)
Access to social networks (Bernhard Jungwirth)Access to social networks (Bernhard Jungwirth)
Access to social networks (Bernhard Jungwirth)
 
Habbo Hotel
Habbo HotelHabbo Hotel
Habbo Hotel
 
Going Viral (Pedro de Bruyckere)
Going Viral (Pedro de Bruyckere)Going Viral (Pedro de Bruyckere)
Going Viral (Pedro de Bruyckere)
 
Parents and online technologies: Parental Awareness of Youth Online Behaviors...
Parents and online technologies: Parental Awareness of Youth Online Behaviors...Parents and online technologies: Parental Awareness of Youth Online Behaviors...
Parents and online technologies: Parental Awareness of Youth Online Behaviors...
 
Social networks online – toward a digital “Contrat social”? (Georgi Apostolov)
Social networks online – toward a digital “Contrat social”? (Georgi Apostolov)Social networks online – toward a digital “Contrat social”? (Georgi Apostolov)
Social networks online – toward a digital “Contrat social”? (Georgi Apostolov)
 
Results from the 1st assessment of the Social Networking Principles for the E...
Results from the 1st assessment of the Social Networking Principles for the E...Results from the 1st assessment of the Social Networking Principles for the E...
Results from the 1st assessment of the Social Networking Principles for the E...
 
EU Kids Online results on SNS (Elisabeth Staksrud)
EU Kids Online results on SNS (Elisabeth Staksrud)EU Kids Online results on SNS (Elisabeth Staksrud)
EU Kids Online results on SNS (Elisabeth Staksrud)
 
Online games: Awareness activities on Virtual Worlds (Protegeles)
Online games: Awareness activities on Virtual Worlds (Protegeles)Online games: Awareness activities on Virtual Worlds (Protegeles)
Online games: Awareness activities on Virtual Worlds (Protegeles)
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Parents and Online technologies - what the youth panel think about internet

Editor's Notes

  1. Internet is a very big place for information and the great thing is that it‘s made from its content so everyone can contribute. But anyone can also destroy it too. The main idea is that the internet is evolving all the time like for example stock exchange market and like stock exchange market it can get into better or worse situation.
  2. If we want to describe and predict the evolution of the internet, we should focus on its users. The majority of the internet users comes through these stages. At first the user learns how to use the internet and discovers all its features. Then the user realizes that it‘s a handy thing and tries to incorporate it somehow into his everyday life. After getting some experience with the internet the user tries to create some content for others mostly about his interests and favorite stuff. And only some of the users realize all the risks, threats and dangers and try to somehow control or restrict them. Maybe you‘re wondering, how can this be a loop. As I‘ve said, the internet is always evolving – even now, so there‘s always something new to discover and use.
  3. Internet has a cool feature – anonymity. Everyone is able to identify himself with a name of his choice. That brings some good things and bad things. No one can be sure of your identity unless he knows you already. And if your identity is concealed, your privacy gets protected. The bad thing about this is that if someone tries to misuse this and impersonate someone else or commits a crime online, no one except the internet service provider can track him down.
  4. When we are online, we can experience some risks somehow related to the things I‘ve already mentioned. Criminals seek most often people, who are new to the cyberspace environment and haven‘t built up any experience yet. The stolen information is mostly used to commit real-world crimes like for example robberies. Such people are more vulnerable to the risks and behave more predictably.
  5. To counter fight these risks, more and more online services are introducing privacy control features. These features should limit the automatic information giveaway only to the level, which is set by the user. But here is the problem: Some users do not know of such feature or do not know, how to properly use it. If the privacy control features worked on 100%, the information giveaway would be reduced only to the aware giveaway. It‘s still true, that we should double consider posting anything online – once we‘ve done it, there‘s no way to stop its spreading among people. And many people found handy the grandmother rule: „Post online anything, you‘d say to your grandmother“ And the last thing is to adjust our privacy to match the street concept. When you are walking along the street, other people can see your face, maybe guess your gender or age, but that‘s about it. You wouldn‘t tell them your address or what you are doing or feeling at the moment.
  6. So these are the basics of internet security. Education, building up some experience and considering everything twice before actually doing it. Maybe I‘ve convinced you that internet is only full of the risks. Let me say the truth: It‘s not – you just have to be cautious and use the common sense to prevent the bad guys in cheating you.
  7. I think that we shouldn‘t get paranoid about our security but we shouldn‘t be ignorant too. We should balance somewhere between. I‘ve spoken here about people harming other people using the internet. What I haven‘t mentioned is that the internet can harm you by itself – for example in form of addiction.
  8. Now I think the point has been made. The only question is: how to get the information to the people, who need it? I think that the most perspective way of delivery is through the youngsters. Make them aware and let them make their friends aware and friends of those friends and so on.
  9. OK, thank you for your attention… Are there any questions?