SlideShare a Scribd company logo
1 of 31
A parents guide to
   technology
Klicksafe
Common concerns
• Social networking
• cyberbullying
• protecting my children at home
• managing and monitoring laptop useage
• Questions
Social Networking
•   young people aged 12 to 17 use the internet mainly for social interaction
    —81 per cent of 12 to 17 year olds nominated social networking services
    as their main reason for going online. (ACMA - 2009)




           messenger           ichat
Magdalene Survey - Homework v social media
Saving ichat history




This will save ichats in the
    documents folder
Facebook
Facebook
Facebook




photos
Facebook




photos    news feed
Facebook




photos    news feed   friends
Facebook




photos     news feed        friends

         Digital identity
Facebook




photos           news feed               friends

               Digital identity

 Ask your child to show you their friends list.
Bulletin board
Think before you post
Search for your child




http://www.facebook.com/find-friends/
•   Cyberbullying is experienced by just one per
    cent of 8 to 9 year olds, but 19 percent of 16 to
    17 year olds surveyed. (ACMA 2009)



“technology doesn't cause bullying, it changes the
nature of it”. (click - Donna Cross)
Kitchen
• Can’t escape it - 24/7
• faceless - cannot see damage and hurt
• might not tell for fear of being ‘banned’
  from devices or sites
Some warning signs
• noticeable change in mood after using
  computer
• not wanting to go to school
• becoming withdrawn
• change academic performance
• Talk to your child about cyberbullying
  before it happens so they know they can
  come to you


• STOP - responding and engaging
• BLOCK - offenders access
• TELL - parents, school appropriate people
• keep evidence
Protecting my children
       at home
Protecting my children
       at home
• Filters on home computer
• Use computers and mobile phones in
  ‘public spaces’
• Time limits on access to technology
• Keep devices out of bedrooms at night
• Clear guidelines on appropriate use and
  consequences for misuse
Monitoring laptop
         useage
• Safari - history
• ‘ichats’ - check in documents folder
• ‘spotlight’ search
• .mp4 & .avi search - search for movies
• .jpeg search
• iphoto
• photobooth
Resources for parents




http://www.schools.nsw.edu.au/news/technology/
             cybersafety/index.php
Cybersmart




http://www.cybersmart.gov.au/
•   http://www.flickr.com/photos/73662475@N00/2651957971/ - baby laptop - slide 1


•   http://www.apo.org.au/node/17665 - ACMA report - slide 2 statistics


•   http://www.dbtechno.com/images/Messenger_Mac_7.jpg - messenger image


•   http://kidshealth.org/teen/school_jobs/bullying/headers_68939/T_CyberBullying1.jpg - cyberbullying image


•   http://www.high-output.com/hot/wp-content/uploads/2009/01/ask-300x299.jpg - question mark

More Related Content

What's hot

Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
The TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech SafetyThe TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech SafetyTeenSafe
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for ParentsRodolfo Salazar
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationjpl17
 
E safety training for staff who work with children and young people - Stephe...
E  safety training for staff who work with children and young people - Stephe...E  safety training for staff who work with children and young people - Stephe...
E safety training for staff who work with children and young people - Stephe...Stevecd
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Keeping kids safe in the digital era
Keeping kids safe in the digital eraKeeping kids safe in the digital era
Keeping kids safe in the digital erabns_library
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Rajesh Soundararajan
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kidsChris Burrows
 
Online safety Ofsted 2015
Online safety Ofsted 2015Online safety Ofsted 2015
Online safety Ofsted 2015bellla33
 
Benefitsandhazards
BenefitsandhazardsBenefitsandhazards
Benefitsandhazardsdgieseler1
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Onlinedgieseler1
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for KidsPatrick Laverty
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the HomeScott Burnett
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents Jennifer Holena
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young StudentsShubham Gupta
 

What's hot (20)

Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
The TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech SafetyThe TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech Safety
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
E safety training for staff who work with children and young people - Stephe...
E  safety training for staff who work with children and young people - Stephe...E  safety training for staff who work with children and young people - Stephe...
E safety training for staff who work with children and young people - Stephe...
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Keeping kids safe in the digital era
Keeping kids safe in the digital eraKeeping kids safe in the digital era
Keeping kids safe in the digital era
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
Online safety Ofsted 2015
Online safety Ofsted 2015Online safety Ofsted 2015
Online safety Ofsted 2015
 
Benefitsandhazards
BenefitsandhazardsBenefitsandhazards
Benefitsandhazards
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Online
 
Cybersafety Presentation for Connecting Waters Charter School
Cybersafety Presentation for Connecting Waters Charter SchoolCybersafety Presentation for Connecting Waters Charter School
Cybersafety Presentation for Connecting Waters Charter School
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for Kids
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
 

Similar to A Parent's Guide to Managing Children's Technology Use

Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in EducationMonica Martinez
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Larry Magid
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsCreepSquash
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigationsCreepSquash
 
Keep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserKeep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserIT-oLogy
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementaryemilyensign
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safetyFred Miller
 
Digital competencies for digital citizenship of pre-teen children
Digital competencies for digital citizenship of pre-teen childrenDigital competencies for digital citizenship of pre-teen children
Digital competencies for digital citizenship of pre-teen childrenKonstantina Martzoukou
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
ES2 Kids - How Technology is changing childhood - AISA Security Conference 2018
ES2 Kids - How Technology is changing childhood - AISA Security Conference 2018ES2 Kids - How Technology is changing childhood - AISA Security Conference 2018
ES2 Kids - How Technology is changing childhood - AISA Security Conference 2018Andy Battle
 
Technology Influence
Technology Influence Technology Influence
Technology Influence Ilaxi Patel
 
Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary Scott Burnett
 
5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.Your eKavach
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Laura Dunkley
 

Similar to A Parent's Guide to Managing Children's Technology Use (20)

Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in Education
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigations
 
Keep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserKeep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael Kaiser
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
 
Digital competencies for digital citizenship of pre-teen children - Martzoukou
Digital competencies for digital citizenship of pre-teen children - MartzoukouDigital competencies for digital citizenship of pre-teen children - Martzoukou
Digital competencies for digital citizenship of pre-teen children - Martzoukou
 
Digital competencies for digital citizenship of pre-teen children
Digital competencies for digital citizenship of pre-teen childrenDigital competencies for digital citizenship of pre-teen children
Digital competencies for digital citizenship of pre-teen children
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
ES2 Kids - How Technology is changing childhood - AISA Security Conference 2018
ES2 Kids - How Technology is changing childhood - AISA Security Conference 2018ES2 Kids - How Technology is changing childhood - AISA Security Conference 2018
ES2 Kids - How Technology is changing childhood - AISA Security Conference 2018
 
Technology Influence
Technology Influence Technology Influence
Technology Influence
 
Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary
 
5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security
 

More from Brad McAllister (20)

Pollination ppt
Pollination pptPollination ppt
Pollination ppt
 
Fair tests
Fair testsFair tests
Fair tests
 
The circle of life seeds and germination
The circle of life  seeds and germinationThe circle of life  seeds and germination
The circle of life seeds and germination
 
Flower
FlowerFlower
Flower
 
Revision for ESSA - Ms Linkenbagh
Revision for ESSA - Ms LinkenbaghRevision for ESSA - Ms Linkenbagh
Revision for ESSA - Ms Linkenbagh
 
HSC CAFS Acronyms quiz
HSC CAFS Acronyms quizHSC CAFS Acronyms quiz
HSC CAFS Acronyms quiz
 
Study skills website yr 11
Study skills website yr 11Study skills website yr 11
Study skills website yr 11
 
Assessment for learning
Assessment for learningAssessment for learning
Assessment for learning
 
Assessment for learning
Assessment for learningAssessment for learning
Assessment for learning
 
Influence of jesus
Influence of jesusInfluence of jesus
Influence of jesus
 
Influence of jesus
Influence of jesusInfluence of jesus
Influence of jesus
 
Homeless
HomelessHomeless
Homeless
 
Families in crisis
Families in crisisFamilies in crisis
Families in crisis
 
1 homeless
1 homeless1 homeless
1 homeless
 
Disabled pp
Disabled ppDisabled pp
Disabled pp
 
Gay & lesbian
Gay & lesbianGay & lesbian
Gay & lesbian
 
Youth
YouthYouth
Youth
 
Pdhpeta conference 2011
Pdhpeta conference 2011Pdhpeta conference 2011
Pdhpeta conference 2011
 
Bronfenbrener
BronfenbrenerBronfenbrener
Bronfenbrener
 
Piaget
PiagetPiaget
Piaget
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 

Recently uploaded (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 

A Parent's Guide to Managing Children's Technology Use

  • 1. A parents guide to technology
  • 3. Common concerns • Social networking • cyberbullying • protecting my children at home • managing and monitoring laptop useage • Questions
  • 4. Social Networking • young people aged 12 to 17 use the internet mainly for social interaction —81 per cent of 12 to 17 year olds nominated social networking services as their main reason for going online. (ACMA - 2009) messenger ichat
  • 5. Magdalene Survey - Homework v social media
  • 6.
  • 7. Saving ichat history This will save ichats in the documents folder
  • 8.
  • 12. Facebook photos news feed
  • 13. Facebook photos news feed friends
  • 14. Facebook photos news feed friends Digital identity
  • 15. Facebook photos news feed friends Digital identity Ask your child to show you their friends list.
  • 18.
  • 19. Search for your child http://www.facebook.com/find-friends/
  • 20. Cyberbullying is experienced by just one per cent of 8 to 9 year olds, but 19 percent of 16 to 17 year olds surveyed. (ACMA 2009) “technology doesn't cause bullying, it changes the nature of it”. (click - Donna Cross)
  • 22. • Can’t escape it - 24/7 • faceless - cannot see damage and hurt • might not tell for fear of being ‘banned’ from devices or sites
  • 23. Some warning signs • noticeable change in mood after using computer • not wanting to go to school • becoming withdrawn • change academic performance
  • 24. • Talk to your child about cyberbullying before it happens so they know they can come to you • STOP - responding and engaging • BLOCK - offenders access • TELL - parents, school appropriate people • keep evidence
  • 26. Protecting my children at home • Filters on home computer • Use computers and mobile phones in ‘public spaces’ • Time limits on access to technology • Keep devices out of bedrooms at night • Clear guidelines on appropriate use and consequences for misuse
  • 27. Monitoring laptop useage • Safari - history • ‘ichats’ - check in documents folder • ‘spotlight’ search • .mp4 & .avi search - search for movies • .jpeg search • iphoto • photobooth
  • 30.
  • 31. http://www.flickr.com/photos/73662475@N00/2651957971/ - baby laptop - slide 1 • http://www.apo.org.au/node/17665 - ACMA report - slide 2 statistics • http://www.dbtechno.com/images/Messenger_Mac_7.jpg - messenger image • http://kidshealth.org/teen/school_jobs/bullying/headers_68939/T_CyberBullying1.jpg - cyberbullying image • http://www.high-output.com/hot/wp-content/uploads/2009/01/ask-300x299.jpg - question mark

Editor's Notes

  1. Children are growing up in a world very different to the world we grew up in. Challenges for parents to manage in relation to technology and how it impacts on our kids We have great students at our school who by and large use their laptops appropriately but we always need to be vigilant and prepare students for challenges they may face.
  2. Part of the challenge of protecting our children is knowing what they are doing online and being open about this.
  3. Connecting with friends through social media has become an important part of developing relationships for a lot of young people. Feeling disconnected from friends if not apart of these networks as lots of things happen here and they do not want to miss out.
  4. Our students are accessing social media inline with usage in wider community. Likely to be doing a combination of both activities in regards to times mentioned above.
  5. Ichat on laptops - school uses ichat as a way to transfer files in class. Safer social networking option to some other sites. Harder to find people out of your friendship circle. Not allowed at school without teacher permission. Parents can request it be removed
  6. key areas of concern for young people - posting and accessing inappropriate photos, posting and seeing inappropriate comments, ‘making friends’ - requesting friends - must accept a friend request.
  7. key areas of concern for young people - posting and accessing inappropriate photos, posting and seeing inappropriate comments, ‘making friends’ - requesting friends - must accept a friend request.
  8. key areas of concern for young people - posting and accessing inappropriate photos, posting and seeing inappropriate comments, ‘making friends’ - requesting friends - must accept a friend request.
  9. key areas of concern for young people - posting and accessing inappropriate photos, posting and seeing inappropriate comments, ‘making friends’ - requesting friends - must accept a friend request.
  10. key areas of concern for young people - posting and accessing inappropriate photos, posting and seeing inappropriate comments, ‘making friends’ - requesting friends - must accept a friend request.
  11. key areas of concern for young people - posting and accessing inappropriate photos, posting and seeing inappropriate comments, ‘making friends’ - requesting friends - must accept a friend request.
  12. key areas of concern for young people - posting and accessing inappropriate photos, posting and seeing inappropriate comments, ‘making friends’ - requesting friends - must accept a friend request.
  13. Have your child show you their privacy setting in facebook and explain them to you.
  14. A new dimension to bullying that can have far reaching consequences. A new form of bullying.
  15. Filters - can be bypassed but a good precaution and safety net.