SlideShare a Scribd company logo
Youth Internet Safety
----------------------------------------
What will they do when you’re NOT
watching?
Pastor Eric Cedo - eric.cedo@gmail.com
Family Christian Church
Communications Seminar
April 4, 2009
Who’s Watching?
What did your parents warn you
about when you were their age?
Today’s Kids
• Cyberbullying
• Online Predators
• Cybercriminals
• Cyberterrorists
• Piracy
• Sexual Content
• Propaganda
Digital Divide
• 93% of parents say they have established rules for their child’s Internet activity
• 37% of students report being given no rules from their parents on using the Internet
• 47% of parents feel their ability to monitor and shelter their children from inappropriate
material is limited
• 95% of parents say they know “some” or “a lot” about where their children go or what
their children do on the Internet
• 41% of students do not share where they go or what they do on the Internet with their
parents
• 26% of students believe their parents would be concerned if they knew what they did
on the Internet
I-Safe Statistics (www.isafe.org)
Train up a child in the way he
should go: and when he is old,
he will not depart from it.
Proverbs 22:6
Summary:
Teach children the way they
should go…so when you’re not
watching they will follow your
teaching
Be sober, be watchful: your
adversary the devil, as a
roaring lion, walketh about,
seeking whom he may devour,
I Peter 5:8 (ASV)
Summary:
Be Alert…the devil, through his
disciples, is lurking online
seeking whom he may prey
upon
Wired Generation
Kids Online
• 87% of teens use e-mail
• 60% have laptops/desktops
• 97% play video games
• 75% have cell phones
• 93% use the internet
• 30% blog (54% read blogs)
• 55% use wikipedia
• 74% have an mp3 player (aka: iPod)
• 70% use social networking sites
Kids Online
• 58% of students admit to using the Internet
unsafely, inappropriately, or illegally
• 12% of students have unsupervised Internet
access at school
• 55% of students report having given out personal
information (e.g. name, age, gender, home
address) to someone they have only met online
Glossary
• Blog (short for weblog)
– A personal or corporate website where
an individual will “post” stories, ideas,
news, etc. in chronological order
– Typically the reader can post comments
about the story…creates a dialogue with
the audience
Glossary
• Social Networking Site (SNS)
– A site that allows users to create
personal profiles to share news,
events, photos, personal
information, etc. with friends (peers)
– Facebook, MySpace, LinkedIn, etc.
Glossary
• Wiki
– Collection of web pages that are built,
populated and monitored by the users
and not a lone individual or company
– Collaborative Website
– Wikipedia
Glossary
• User-generated Content Site
(UGC)
– A site that allows users to post their
own content and share it with other
users
– YouTube, Flickr, iTunes
Glossary
• Peer-to-peer File Sharing Site
– A site that allows users to search
other people’s computers for files to
copy
– Limewire, Bearshare, BitTorrent
DANGERS!!!
Kacie Woody
Thirteen-year-old Kacie Woody liked to play
soccer, sing, and chat online. On December 3,
2002, she vanished from her home in Holland,
Arkansas. Police found her body, along with
that of her abductor, 19 hours later in a storage
facility. She had been murdered by 47-year-old
David Fuller of La Mesa, California, who then
committed suicide. Kacie’s friends told police
that she had an ongoing online relationship
with some boy named David whom she
believed was another teenager. Signs of a
struggle at her home indicated that she was
unaware that he was coming to see her and
unwilling to go anywhere with him.
Online Predators
• 71% of teens reported receiving messages online
from someone they did not know
• 40% reported they usually reply and begin chatting
with that person
• 18% reported telling an adult about the encounter
• 45% have been asked for personal information by
someone they did not know
• 30% have of teens have considered meetings
someone they have only talked to online
14% HAVE HAD SUCH AN ENCOUNTER
Online Predators and Sex
• 1 in 4 Youths (10 – 17) has been
exposed to sexually explicit pictures
online without seeking or expecting
them
• 1 in 5 Youths (10 – 17) has received
unwanted sexual solicitations online
Online Predators Tactics
• Seeks out provocative user names.
• Studies your profile.
• Starts with an innocent IM.
• Asks personal questions, A/S/L.
• Wants you to private chat.
• Asks you for personal info. (Phone number, e-mail address, home
address, school name, etc.)
• Wants to be your best friend, boyfriend or girlfriend.
• Starts sexual conversations.
• Is all about keeping secrets.
• Asks for personal photos.
• Wants to send you strange gifts.
• Wants to set up a face-to-face meeting.
• Makes threats when you no longer want to chat with him or her.
What to do?
Parents
• Allow children access
only in common areas
• Monitor conversations
• Talk to your kids before
and after they are online
about the dangers
• At risk – teens who need
to talk to someone about
problems
• Monitoring software
Children
• Never talk to someone
online that you don’t know
• Never give out personal
information (including
profiles) like school name
• Tell your parents if you’ve
been approached
• Netiquette – same rules
online and off
• Don’t lie!!!
Cyber-bullying
Ryan Halligan, a 13-year-old student of Albert
D. Lawton School in Essex Junction, Vermont,
fell victim to cyber bullying. “Ryan tried to
escape the bullying at school by seeking
refuge on his computer at home, but it
followed him into cyberspace,” said John
Halligan, Ryan’s dad. “After his death by
suicide, I found out that Ryan was harassed
online by his school-day bullies, and he
unfortunately tried to retaliate in unhealthy
ways. As a parent, I know now that I should
have stepped up the monitoring of my son’s
computer activities. I wish I had known the
potential for this to occur and how to prevent
it.”
Cyber-bullying
Myth — I cannot be held accountable for what I say or do
online.
Fact — False. Cyber Bullying can be considered a form of
harassment in most states punishable by law as a
misdemeanor, and in some cases a felony, if there is a
reasonable threat to a person’s personal safety. Most
schools have their own bullying plan in place with penalties
that can range from detention to expulsion. The United
States Data Protection Act also upholds the right to keep
personal information and records private. Depending on
how personal the information is, posting someone’s private
and personal information on the Internet without permission
can result in punishment by federal law.
Cyber-bullying
1 in 14 Youths (10 – 17) has been
threatened or harassed online
Only 50% of those harassed have reported it
52% of Youths have admitted to saying
hurtful things online
Cyber-bullying
• Be strong and stop it early. Don’t stoop to their level and lash back.
• Don’t suffer in silence. Tell an adult. Keep telling people until someone
takes action.
• Don’t open or read messages from cyber bullies.
• Contact your Internet service provider abuse department.
• If the problem continues, alert the local police department.
• Tell your school if it is school related. If your cyber bully attends your
school, contact your teacher or principal.
• Don’t erase the messages. Log all dates and time. Put them in a folder
and hold them as evidence.
• Change your e-mail address or screen name.
• If it’s happening with text messages, change your cell number.
• Take screen shots of your chat room pages.
• Save URLs, e-mail addresses, and profiles of the bully.
• Stay protected—never agree to meet with a bully face to face.
• Block the bully if you are in a chat room or IMing.
Piracy (Illegal Downloads)
September 9, 2003 — Brianna,
a shy seventh grader from
Manhattan, New York, is sued
for illegally downloading more
than 1,000 songs. The
Recording Industry Association
of America filed suit against 60
other suspects in the New York
area on the same day. Each
person was subject to the
possibilities of fines of up to
$150,000 for each song.
— New York Daily News
Piracy (Illegal Downloads)
Myth — I cannot be sued for downloading music and movies
off P2P sites. They’ll never catch me.
Fact — True and False. You can’t be sued if you have
downloaded songs that have been put online with the
approval of record labels and artists—which usually
involves paying for royalties. If you download unapproved
tracks from unsanctioned sites—whether it is one song or a
million—you are violating copyright laws and you run the
risk of being sued. The Recording Industry Association of
America (RIAA) filed 3,000 lawsuits against individuals as
of May 2004, and in some cases sought financial damages
of up to $150,000 per copyrighted song.
Piracy (Illegal Downloads)
• P2P sites are not illegal, but trading unauthorized music and
movies is. The U.S. constitution protects P2P sites from being
shut down. The argument is that P2P sites are not providing the
illegal files —they are only providing a way to share files with
others logged onto the site. Just because there are P2P sites
doesn’t mean you have to use them.
• Downloading music and movies without paying on unsanctioned
sites is illegal and can result in criminal penalties.
• There is a good possibility of downloading a virus when using P2P
sites.
• You are also creating a gateway for a hacker to jack your personal
stuff on P2P sites.
• Other hitchhikers unknown to you could gain access to files on
your hard drive through the file-sharing network.
Piracy (Illegal Downloads)
What to do?
Find a safe site where you can download legally.
Songs and movies that you find on legal
download sites are:
– In the public domain.
– Uploaded by artists who are trying to get exposure.
– Released by record companies trying to build interest in
a CD.
– Paid for by you for the right to download, and the site
pays the artist and/or record company royalties.
Cyberterrorists/
Cybercriminals
• Spam
– Avoid opening e-mails from businesses you don’t know
– Get anti-spam (GMail)
• Viruses/Spyware
– Get viruses from opening attachments not e-mails
– Can also get a “Trojan horse” by downloading software
and e-mail attachments
• Cyber-criminals (identity theft)
– Never give out credit card info to a site that isn’t
“trusted” – Google tools
– Use PayPal – doesn’t give credit card info to sellers
Other issues – 3 “P’s”
• Pornographic content
– Use parental controls on internet options
– Moderated safe search on Google
– YouTube requires a login for over 18 – has strict policy against
porn
• Plagiarism
– Make sure you reference your sources for school reports!
• Propaganda
– Many sites won’t be pornographic but not suited for children.
– Satanic sites, hate sites, just plain worldly sites not suitable for
impressionable children
Conclusion
• Rules offline apply online
• Don’t just pull the plug – train up the child
• Take a firm stand – computer usage is a
monitored activity just like TV viewing
• Use appropriate software and internet
settings
• Keep up – do your research and stay
“plugged in”
COMMUNICATE
Thank you!

More Related Content

What's hot

Bullying presentation
Bullying presentationBullying presentation
Bullying presentationjpl17
 
Cyberbullying class symposium
Cyberbullying class symposiumCyberbullying class symposium
Cyberbullying class symposium
kschermerhorn
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyPHSD
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
Memorial University
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
sharon7111
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
E Robertson
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
KanelandSvihlik
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
Lockley
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School Librarian
Kate Gukeisen
 
Internet Safety For Kids By Tanmay
Internet Safety For Kids By TanmayInternet Safety For Kids By Tanmay
Internet Safety For Kids By Tanmay
tsdikshit
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
kguerrazzi
 
Myspace Or Yours
Myspace Or YoursMyspace Or Yours
Myspace Or Yours
tbiggs6
 
Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
University of Wisconsin - Superior
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointhmorrell1
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
Suna Gurol
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
Mark Deming
 

What's hot (20)

Bullying presentation
Bullying presentationBullying presentation
Bullying presentation
 
Cyberbullying class symposium
Cyberbullying class symposiumCyberbullying class symposium
Cyberbullying class symposium
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School Librarian
 
Internet Safety For Kids By Tanmay
Internet Safety For Kids By TanmayInternet Safety For Kids By Tanmay
Internet Safety For Kids By Tanmay
 
Internet Safety for Educators
Internet Safety for EducatorsInternet Safety for Educators
Internet Safety for Educators
 
Test
TestTest
Test
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Myspace Or Yours
Myspace Or YoursMyspace Or Yours
Myspace Or Yours
 
Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 

Viewers also liked

About Mineral Salt
About Mineral SaltAbout Mineral Salt
About Mineral SaltJVGAJJAR
 
A Basic Guide To Homeopathy
A Basic Guide To HomeopathyA Basic Guide To Homeopathy
A Basic Guide To Homeopathy
JVGAJJAR
 
Prostate - Know About BPH
Prostate - Know About BPHProstate - Know About BPH
Prostate - Know About BPHJVGAJJAR
 
28 Best Inspirational Quotes
28 Best Inspirational Quotes28 Best Inspirational Quotes
28 Best Inspirational Quotes
JVGAJJAR
 
Shilajit - Presentation
Shilajit - PresentationShilajit - Presentation
Shilajit - PresentationJVGAJJAR
 
Nutrition Healthy Aging
Nutrition Healthy AgingNutrition Healthy Aging
Nutrition Healthy AgingJVGAJJAR
 
Diet Plan - For Kapha Prakriti
Diet Plan - For Kapha PrakritiDiet Plan - For Kapha Prakriti
Diet Plan - For Kapha PrakritiJVGAJJAR
 
Poor Thyroid Function
Poor Thyroid FunctionPoor Thyroid Function
Poor Thyroid FunctionJVGAJJAR
 
30 Inspiring Quotes
30 Inspiring Quotes30 Inspiring Quotes
30 Inspiring Quotes
JVGAJJAR
 
Homeopathic Preventions For Thyroid Gland
Homeopathic Preventions For Thyroid GlandHomeopathic Preventions For Thyroid Gland
Homeopathic Preventions For Thyroid Gland
JVGAJJAR
 
Internet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & TeachersInternet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & Teachers
JVGAJJAR
 
The State Of Password Habits
The State  Of Password HabitsThe State  Of Password Habits
The State Of Password Habits
JVGAJJAR
 
11 Powerful & Motivational Quotes
11 Powerful & Motivational Quotes11 Powerful & Motivational Quotes
11 Powerful & Motivational Quotes
JVGAJJAR
 
Vitamin D - Natural Sources
Vitamin D - Natural SourcesVitamin D - Natural Sources
Vitamin D - Natural SourcesJVGAJJAR
 
GIFT City - Model Smart City in India
GIFT City - Model Smart City in IndiaGIFT City - Model Smart City in India
GIFT City - Model Smart City in IndiaJVGAJJAR
 

Viewers also liked (16)

About Mineral Salt
About Mineral SaltAbout Mineral Salt
About Mineral Salt
 
A Basic Guide To Homeopathy
A Basic Guide To HomeopathyA Basic Guide To Homeopathy
A Basic Guide To Homeopathy
 
Prostate - Know About BPH
Prostate - Know About BPHProstate - Know About BPH
Prostate - Know About BPH
 
28 Best Inspirational Quotes
28 Best Inspirational Quotes28 Best Inspirational Quotes
28 Best Inspirational Quotes
 
Shilajit - Presentation
Shilajit - PresentationShilajit - Presentation
Shilajit - Presentation
 
Nutrition Healthy Aging
Nutrition Healthy AgingNutrition Healthy Aging
Nutrition Healthy Aging
 
Diet Plan - For Kapha Prakriti
Diet Plan - For Kapha PrakritiDiet Plan - For Kapha Prakriti
Diet Plan - For Kapha Prakriti
 
Poor Thyroid Function
Poor Thyroid FunctionPoor Thyroid Function
Poor Thyroid Function
 
30 Inspiring Quotes
30 Inspiring Quotes30 Inspiring Quotes
30 Inspiring Quotes
 
Homeopathic Preventions For Thyroid Gland
Homeopathic Preventions For Thyroid GlandHomeopathic Preventions For Thyroid Gland
Homeopathic Preventions For Thyroid Gland
 
Internet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & TeachersInternet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & Teachers
 
The State Of Password Habits
The State  Of Password HabitsThe State  Of Password Habits
The State Of Password Habits
 
11 Powerful & Motivational Quotes
11 Powerful & Motivational Quotes11 Powerful & Motivational Quotes
11 Powerful & Motivational Quotes
 
Cholesterol
CholesterolCholesterol
Cholesterol
 
Vitamin D - Natural Sources
Vitamin D - Natural SourcesVitamin D - Natural Sources
Vitamin D - Natural Sources
 
GIFT City - Model Smart City in India
GIFT City - Model Smart City in IndiaGIFT City - Model Smart City in India
GIFT City - Model Smart City in India
 

Similar to Your Internet Safety

Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
Eric Cedo
 
Online safety
Online safetyOnline safety
Online safety
Veronica Alejandro
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
Inderjeet Singh
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
timryan7
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
SimonBalle
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
Sanil Shrivastava
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
springvillegi
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
stevewrightco
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
Jason Rushing
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
alyssacarricato
 
102009
102009102009
Cyber Safe Parenting
Cyber Safe ParentingCyber Safe Parenting
Cyber Safe Parenting
Rohit Srivastwa
 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public Program
Daniel Hanttula
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsCreepSquash
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigations
CreepSquash
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
NiravD3
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
kguerrazzi
 

Similar to Your Internet Safety (20)

Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Online safety
Online safetyOnline safety
Online safety
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
102009
102009102009
102009
 
Cyber Safe Parenting
Cyber Safe ParentingCyber Safe Parenting
Cyber Safe Parenting
 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public Program
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigations
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 

Recently uploaded

PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 

Recently uploaded (20)

PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 

Your Internet Safety

  • 1. Youth Internet Safety ---------------------------------------- What will they do when you’re NOT watching? Pastor Eric Cedo - eric.cedo@gmail.com Family Christian Church Communications Seminar April 4, 2009
  • 3. What did your parents warn you about when you were their age?
  • 4. Today’s Kids • Cyberbullying • Online Predators • Cybercriminals • Cyberterrorists • Piracy • Sexual Content • Propaganda
  • 5. Digital Divide • 93% of parents say they have established rules for their child’s Internet activity • 37% of students report being given no rules from their parents on using the Internet • 47% of parents feel their ability to monitor and shelter their children from inappropriate material is limited • 95% of parents say they know “some” or “a lot” about where their children go or what their children do on the Internet • 41% of students do not share where they go or what they do on the Internet with their parents • 26% of students believe their parents would be concerned if they knew what they did on the Internet I-Safe Statistics (www.isafe.org)
  • 6. Train up a child in the way he should go: and when he is old, he will not depart from it. Proverbs 22:6
  • 7. Summary: Teach children the way they should go…so when you’re not watching they will follow your teaching
  • 8. Be sober, be watchful: your adversary the devil, as a roaring lion, walketh about, seeking whom he may devour, I Peter 5:8 (ASV)
  • 9. Summary: Be Alert…the devil, through his disciples, is lurking online seeking whom he may prey upon
  • 11. Kids Online • 87% of teens use e-mail • 60% have laptops/desktops • 97% play video games • 75% have cell phones • 93% use the internet • 30% blog (54% read blogs) • 55% use wikipedia • 74% have an mp3 player (aka: iPod) • 70% use social networking sites
  • 12. Kids Online • 58% of students admit to using the Internet unsafely, inappropriately, or illegally • 12% of students have unsupervised Internet access at school • 55% of students report having given out personal information (e.g. name, age, gender, home address) to someone they have only met online
  • 13. Glossary • Blog (short for weblog) – A personal or corporate website where an individual will “post” stories, ideas, news, etc. in chronological order – Typically the reader can post comments about the story…creates a dialogue with the audience
  • 14.
  • 15. Glossary • Social Networking Site (SNS) – A site that allows users to create personal profiles to share news, events, photos, personal information, etc. with friends (peers) – Facebook, MySpace, LinkedIn, etc.
  • 16.
  • 17. Glossary • Wiki – Collection of web pages that are built, populated and monitored by the users and not a lone individual or company – Collaborative Website – Wikipedia
  • 18.
  • 19. Glossary • User-generated Content Site (UGC) – A site that allows users to post their own content and share it with other users – YouTube, Flickr, iTunes
  • 20.
  • 21. Glossary • Peer-to-peer File Sharing Site – A site that allows users to search other people’s computers for files to copy – Limewire, Bearshare, BitTorrent
  • 23. Kacie Woody Thirteen-year-old Kacie Woody liked to play soccer, sing, and chat online. On December 3, 2002, she vanished from her home in Holland, Arkansas. Police found her body, along with that of her abductor, 19 hours later in a storage facility. She had been murdered by 47-year-old David Fuller of La Mesa, California, who then committed suicide. Kacie’s friends told police that she had an ongoing online relationship with some boy named David whom she believed was another teenager. Signs of a struggle at her home indicated that she was unaware that he was coming to see her and unwilling to go anywhere with him.
  • 24. Online Predators • 71% of teens reported receiving messages online from someone they did not know • 40% reported they usually reply and begin chatting with that person • 18% reported telling an adult about the encounter • 45% have been asked for personal information by someone they did not know • 30% have of teens have considered meetings someone they have only talked to online 14% HAVE HAD SUCH AN ENCOUNTER
  • 25. Online Predators and Sex • 1 in 4 Youths (10 – 17) has been exposed to sexually explicit pictures online without seeking or expecting them • 1 in 5 Youths (10 – 17) has received unwanted sexual solicitations online
  • 26. Online Predators Tactics • Seeks out provocative user names. • Studies your profile. • Starts with an innocent IM. • Asks personal questions, A/S/L. • Wants you to private chat. • Asks you for personal info. (Phone number, e-mail address, home address, school name, etc.) • Wants to be your best friend, boyfriend or girlfriend. • Starts sexual conversations. • Is all about keeping secrets. • Asks for personal photos. • Wants to send you strange gifts. • Wants to set up a face-to-face meeting. • Makes threats when you no longer want to chat with him or her.
  • 27. What to do? Parents • Allow children access only in common areas • Monitor conversations • Talk to your kids before and after they are online about the dangers • At risk – teens who need to talk to someone about problems • Monitoring software Children • Never talk to someone online that you don’t know • Never give out personal information (including profiles) like school name • Tell your parents if you’ve been approached • Netiquette – same rules online and off • Don’t lie!!!
  • 28. Cyber-bullying Ryan Halligan, a 13-year-old student of Albert D. Lawton School in Essex Junction, Vermont, fell victim to cyber bullying. “Ryan tried to escape the bullying at school by seeking refuge on his computer at home, but it followed him into cyberspace,” said John Halligan, Ryan’s dad. “After his death by suicide, I found out that Ryan was harassed online by his school-day bullies, and he unfortunately tried to retaliate in unhealthy ways. As a parent, I know now that I should have stepped up the monitoring of my son’s computer activities. I wish I had known the potential for this to occur and how to prevent it.”
  • 29. Cyber-bullying Myth — I cannot be held accountable for what I say or do online. Fact — False. Cyber Bullying can be considered a form of harassment in most states punishable by law as a misdemeanor, and in some cases a felony, if there is a reasonable threat to a person’s personal safety. Most schools have their own bullying plan in place with penalties that can range from detention to expulsion. The United States Data Protection Act also upholds the right to keep personal information and records private. Depending on how personal the information is, posting someone’s private and personal information on the Internet without permission can result in punishment by federal law.
  • 30. Cyber-bullying 1 in 14 Youths (10 – 17) has been threatened or harassed online Only 50% of those harassed have reported it 52% of Youths have admitted to saying hurtful things online
  • 31. Cyber-bullying • Be strong and stop it early. Don’t stoop to their level and lash back. • Don’t suffer in silence. Tell an adult. Keep telling people until someone takes action. • Don’t open or read messages from cyber bullies. • Contact your Internet service provider abuse department. • If the problem continues, alert the local police department. • Tell your school if it is school related. If your cyber bully attends your school, contact your teacher or principal. • Don’t erase the messages. Log all dates and time. Put them in a folder and hold them as evidence. • Change your e-mail address or screen name. • If it’s happening with text messages, change your cell number. • Take screen shots of your chat room pages. • Save URLs, e-mail addresses, and profiles of the bully. • Stay protected—never agree to meet with a bully face to face. • Block the bully if you are in a chat room or IMing.
  • 32. Piracy (Illegal Downloads) September 9, 2003 — Brianna, a shy seventh grader from Manhattan, New York, is sued for illegally downloading more than 1,000 songs. The Recording Industry Association of America filed suit against 60 other suspects in the New York area on the same day. Each person was subject to the possibilities of fines of up to $150,000 for each song. — New York Daily News
  • 33. Piracy (Illegal Downloads) Myth — I cannot be sued for downloading music and movies off P2P sites. They’ll never catch me. Fact — True and False. You can’t be sued if you have downloaded songs that have been put online with the approval of record labels and artists—which usually involves paying for royalties. If you download unapproved tracks from unsanctioned sites—whether it is one song or a million—you are violating copyright laws and you run the risk of being sued. The Recording Industry Association of America (RIAA) filed 3,000 lawsuits against individuals as of May 2004, and in some cases sought financial damages of up to $150,000 per copyrighted song.
  • 34. Piracy (Illegal Downloads) • P2P sites are not illegal, but trading unauthorized music and movies is. The U.S. constitution protects P2P sites from being shut down. The argument is that P2P sites are not providing the illegal files —they are only providing a way to share files with others logged onto the site. Just because there are P2P sites doesn’t mean you have to use them. • Downloading music and movies without paying on unsanctioned sites is illegal and can result in criminal penalties. • There is a good possibility of downloading a virus when using P2P sites. • You are also creating a gateway for a hacker to jack your personal stuff on P2P sites. • Other hitchhikers unknown to you could gain access to files on your hard drive through the file-sharing network.
  • 35. Piracy (Illegal Downloads) What to do? Find a safe site where you can download legally. Songs and movies that you find on legal download sites are: – In the public domain. – Uploaded by artists who are trying to get exposure. – Released by record companies trying to build interest in a CD. – Paid for by you for the right to download, and the site pays the artist and/or record company royalties.
  • 36. Cyberterrorists/ Cybercriminals • Spam – Avoid opening e-mails from businesses you don’t know – Get anti-spam (GMail) • Viruses/Spyware – Get viruses from opening attachments not e-mails – Can also get a “Trojan horse” by downloading software and e-mail attachments • Cyber-criminals (identity theft) – Never give out credit card info to a site that isn’t “trusted” – Google tools – Use PayPal – doesn’t give credit card info to sellers
  • 37. Other issues – 3 “P’s” • Pornographic content – Use parental controls on internet options – Moderated safe search on Google – YouTube requires a login for over 18 – has strict policy against porn • Plagiarism – Make sure you reference your sources for school reports! • Propaganda – Many sites won’t be pornographic but not suited for children. – Satanic sites, hate sites, just plain worldly sites not suitable for impressionable children
  • 38. Conclusion • Rules offline apply online • Don’t just pull the plug – train up the child • Take a firm stand – computer usage is a monitored activity just like TV viewing • Use appropriate software and internet settings • Keep up – do your research and stay “plugged in”