SlideShare a Scribd company logo
Cathy Nelson Teacher Librarian / Media Specialist Conway Middle School Horry County Schools R U My Friend? Social Networking Explained
 
[object Object]
[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cookie cutter safety? ,[object Object],[object Object],[object Object]
  Do the possibilities   scare   you? Let’s unplug ‘em! Right?...
Why not just unplug? Interactive Engaging Children are connecting, collaborating, communicating. Find, store, create, critique, and share information Harness, evaluate, and create information effectively 21 st  century literacy and global citizenship skills Tool for learning Daily life of digital natives Network
What are our children doing online? And how do I keep them safe? ,[object Object],[object Object],[object Object],[object Object]
What (and who) is out there? What are our children doing online?
93% of all Americans between 12 and 17 years old use the internet
74% of teens now say the computer they use is in a public place in the home
A large majority of teens (71%) have established online profiles (including those on social networking sites such as MySpace)
[object Object]
[object Object],[object Object]
[object Object]
 
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],13 year old Morgan Pozgar, crowned the National Texting champion
Chat and Instant Messaging Risks Strangers can contact your children It’s hard to monitor Searchable online profiles Cyber-bullying
Chat and Instant Messaging Learn the lingo: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
Social Networking ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],What should I do to keep them safe?
[object Object],[object Object]
School work / Searching Risks Finding inappropriate material Finding inaccurate resources
School Work / Searching  What should I do to keep them safe? ,[object Object],[object Object],[object Object],[object Object],Kid-friendly sites Effective online searching
[object Object],[object Object]
[object Object]
File Sharing  Risks ,[object Object],[object Object],[object Object]
[object Object]
Photo and Video Sharing  Risks ,[object Object],[object Object]
Predators… ,[object Object],[object Object]
Predators… ,[object Object],[object Object],[object Object]
  Predators… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cyberbullying  One in three online teens have experienced online harassment. Girls are more likely to be victims. Most teens say that they are more likely to be bullied  offline  than  online.
Cyberbullying  ,[object Object],[object Object],[object Object],[object Object]
Communication is  key ,[object Object],[object Object],[object Object]
Remember, every child and every family is different. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What should I do to keep them safe?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
Communicate. ,[object Object],[object Object],[object Object]
Age appropriate guidelines Nothing takes  the place of  the parent.
Where do I find resources? Internet Safety Online Resources
Implications for the K12 School: Educate your parents.

More Related Content

What's hot

Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
Barry Caplin
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
MediaSmarts | HabiloMédias
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
KanelandSvihlik
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
KanelandSvihlik
 
Cyberbullying project
Cyberbullying projectCyberbullying project
Cyberbullying project
JoannaNieves
 
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016
Kathryn White
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
sofisalazar00
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying este
giulimazziotti96
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
miliarguelles1
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
miliarguelles
 
Brochure
BrochureBrochure
Brochure
jrj6819
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
Joe Drumgoole
 
Web safety
Web safetyWeb safety
Web safety
Jeff Piontek
 
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundOnline Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Stephanie Barnhart
 
The internet---its not that innocent
The internet---its not that innocentThe internet---its not that innocent
The internet---its not that innocent
Emily Thompson
 
Stop Cyberbullying Parent Presentation
Stop Cyberbullying Parent PresentationStop Cyberbullying Parent Presentation
Stop Cyberbullying Parent Presentation
cynthia.warner
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Larry Magid
 
Cyberbullying. It's here.
Cyberbullying. It's here. Cyberbullying. It's here.
Cyberbullying. It's here.
Your eKavach
 
Online safety
Online safetyOnline safety
Online safety
Dr. Pravin Yadav
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
E Robertson
 

What's hot (20)

Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
Cyberbullying project
Cyberbullying projectCyberbullying project
Cyberbullying project
 
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Mili giuly cyberbullying este
Mili giuly cyberbullying esteMili giuly cyberbullying este
Mili giuly cyberbullying este
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 
Brochure
BrochureBrochure
Brochure
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
 
Web safety
Web safetyWeb safety
Web safety
 
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundOnline Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber Playground
 
The internet---its not that innocent
The internet---its not that innocentThe internet---its not that innocent
The internet---its not that innocent
 
Stop Cyberbullying Parent Presentation
Stop Cyberbullying Parent PresentationStop Cyberbullying Parent Presentation
Stop Cyberbullying Parent Presentation
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
Cyberbullying. It's here.
Cyberbullying. It's here. Cyberbullying. It's here.
Cyberbullying. It's here.
 
Online safety
Online safetyOnline safety
Online safety
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 

Similar to Slisn Pres1

Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
Donna Murray
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
NiravD3
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
Andri Priyatna
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
alexfinvle
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
Toby Treacher
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
Larry Magid
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
NMSU - Family Resource Management
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
tholman77
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
NaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
purush203
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
Al Rowell
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
Amit Pal Singh
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwpt
sooy10
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwpt
sooy10
 
Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 Parents
Iwith.org
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
UNC-Greensboro
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
timryan7
 
Internet Safety St Mary's Wollongong
Internet Safety St Mary's WollongongInternet Safety St Mary's Wollongong
Internet Safety St Mary's Wollongong
Magdalene Catholic High School
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
rehmannb
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
Mark Deming
 

Similar to Slisn Pres1 (20)

Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwpt
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwpt
 
Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 Parents
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
Internet Safety St Mary's Wollongong
Internet Safety St Mary's WollongongInternet Safety St Mary's Wollongong
Internet Safety St Mary's Wollongong
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 

More from Cathy Jo Nelson

UTC 2012 AASL BWTL CNelson
UTC 2012 AASL BWTL CNelsonUTC 2012 AASL BWTL CNelson
UTC 2012 AASL BWTL CNelson
Cathy Jo Nelson
 
Change agent
Change agentChange agent
Change agent
Cathy Jo Nelson
 
Book sculptors for slideshare
Book sculptors for slideshareBook sculptors for slideshare
Book sculptors for slideshare
Cathy Jo Nelson
 
After the hunger games trilogy slideshare3
After the hunger games trilogy slideshare3After the hunger games trilogy slideshare3
After the hunger games trilogy slideshare3
Cathy Jo Nelson
 
Discus For Science Research
Discus For Science ResearchDiscus For Science Research
Discus For Science Research
Cathy Jo Nelson
 
The e volution of books
The e volution of booksThe e volution of books
The e volution of books
Cathy Jo Nelson
 
Piracy
PiracyPiracy
July10workshopflyer
July10workshopflyerJuly10workshopflyer
July10workshopflyer
Cathy Jo Nelson
 
Web Evaluation
Web EvaluationWeb Evaluation
Web Evaluation
Cathy Jo Nelson
 
Tech Tools 2 0 Can They Transform The School L
Tech Tools 2 0 Can They Transform The School LTech Tools 2 0 Can They Transform The School L
Tech Tools 2 0 Can They Transform The School L
Cathy Jo Nelson
 
Edtech08
Edtech08Edtech08
Edtech08
Cathy Jo Nelson
 
N08s404
N08s404N08s404
N08s404
N08s404N08s404
Designingpages
DesigningpagesDesigningpages
Designingpages
Cathy Jo Nelson
 
Wysiwyg
WysiwygWysiwyg
Scasl Web
Scasl WebScasl Web
Scasl Web
Cathy Jo Nelson
 
Tech Fair
Tech FairTech Fair
Tech Fair
Cathy Jo Nelson
 
Nti07 2
Nti07 2Nti07 2
Columbia LMS Institute Times Change
Columbia LMS Institute Times ChangeColumbia LMS Institute Times Change
Columbia LMS Institute Times ChangeCathy Jo Nelson
 
Times Change June 2008 SC LMS Institute
Times Change June 2008 SC LMS InstituteTimes Change June 2008 SC LMS Institute
Times Change June 2008 SC LMS Institute
Cathy Jo Nelson
 

More from Cathy Jo Nelson (20)

UTC 2012 AASL BWTL CNelson
UTC 2012 AASL BWTL CNelsonUTC 2012 AASL BWTL CNelson
UTC 2012 AASL BWTL CNelson
 
Change agent
Change agentChange agent
Change agent
 
Book sculptors for slideshare
Book sculptors for slideshareBook sculptors for slideshare
Book sculptors for slideshare
 
After the hunger games trilogy slideshare3
After the hunger games trilogy slideshare3After the hunger games trilogy slideshare3
After the hunger games trilogy slideshare3
 
Discus For Science Research
Discus For Science ResearchDiscus For Science Research
Discus For Science Research
 
The e volution of books
The e volution of booksThe e volution of books
The e volution of books
 
Piracy
PiracyPiracy
Piracy
 
July10workshopflyer
July10workshopflyerJuly10workshopflyer
July10workshopflyer
 
Web Evaluation
Web EvaluationWeb Evaluation
Web Evaluation
 
Tech Tools 2 0 Can They Transform The School L
Tech Tools 2 0 Can They Transform The School LTech Tools 2 0 Can They Transform The School L
Tech Tools 2 0 Can They Transform The School L
 
Edtech08
Edtech08Edtech08
Edtech08
 
N08s404
N08s404N08s404
N08s404
 
N08s404
N08s404N08s404
N08s404
 
Designingpages
DesigningpagesDesigningpages
Designingpages
 
Wysiwyg
WysiwygWysiwyg
Wysiwyg
 
Scasl Web
Scasl WebScasl Web
Scasl Web
 
Tech Fair
Tech FairTech Fair
Tech Fair
 
Nti07 2
Nti07 2Nti07 2
Nti07 2
 
Columbia LMS Institute Times Change
Columbia LMS Institute Times ChangeColumbia LMS Institute Times Change
Columbia LMS Institute Times Change
 
Times Change June 2008 SC LMS Institute
Times Change June 2008 SC LMS InstituteTimes Change June 2008 SC LMS Institute
Times Change June 2008 SC LMS Institute
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 

Slisn Pres1

  • 1. Cathy Nelson Teacher Librarian / Media Specialist Conway Middle School Horry County Schools R U My Friend? Social Networking Explained
  • 2.  
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Do the possibilities scare you? Let’s unplug ‘em! Right?...
  • 8. Why not just unplug? Interactive Engaging Children are connecting, collaborating, communicating. Find, store, create, critique, and share information Harness, evaluate, and create information effectively 21 st century literacy and global citizenship skills Tool for learning Daily life of digital natives Network
  • 9.
  • 10. What (and who) is out there? What are our children doing online?
  • 11. 93% of all Americans between 12 and 17 years old use the internet
  • 12. 74% of teens now say the computer they use is in a public place in the home
  • 13. A large majority of teens (71%) have established online profiles (including those on social networking sites such as MySpace)
  • 14.
  • 15.
  • 16.
  • 17.  
  • 18.
  • 19.
  • 20. Chat and Instant Messaging Risks Strangers can contact your children It’s hard to monitor Searchable online profiles Cyber-bullying
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. School work / Searching Risks Finding inappropriate material Finding inaccurate resources
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Cyberbullying One in three online teens have experienced online harassment. Girls are more likely to be victims. Most teens say that they are more likely to be bullied offline than online.
  • 37.
  • 38.
  • 39.
  • 40. What should I do to keep them safe?
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46. Age appropriate guidelines Nothing takes the place of the parent.
  • 47. Where do I find resources? Internet Safety Online Resources
  • 48. Implications for the K12 School: Educate your parents.