2. Welcome
Internet Landscape
Dangers on the Internet
Internet Predators
Personal profiles
Internet Chat
Gaming
Cyberbullying
Cell phones
Plagiarism & Intellectual Property
Malicious Codes, Viruses, and Spyware
Parent Tips and resources
Q&A
3. ―everything that‘s already in the world when
you‘re born is just normal;
anything that gets invented between then and
before you turn thirty is incredibly exciting and
creative and with any luck you can make a
career out of it;
anything that gets invented after you‘re thirty is
against the natural order of things and the
beginning of the end of civilization as we know it
until it‘s been around for about ten years when it
gradually turns out to be alright really.‖
4. The Internet has dramatically changed our
world and is a part of our everyday lives
ADULTS’ VIEW
Communication – email, texting
Shopping and services (booking travel)
Financial management
News and product research
Entertainment – videos, music, games
5. The Internet has dramatically changed our
world and is a part of our everyday lives
STUDENTS’ VIEW
Communication – texting, instant
messaging, email
Entertainment – games, music, videos
Research – homework, study sites
6.
7. 1. Predators--social networking sites, chat rooms
2. Data theft--stolen passwords, addresses, Social
Security numbers, credit card numbers, and other
financial information
3. Malicious software (also known as malware)--
adware, spyware, viruses, phishing scams
4. Inappropriate content--pornography, content
focused on violence, hate propaganda
5. Cyberbullying--bullying peers via instant messages,
social networking sites, online games
http://www.cnet.com/4520-13384_1-6721368-1.html
9. Youth internet safety survey, ages 10-17
YISS-1 (2000) YISS-2 (2005) Change
Sexual solicitation 19% 13% -6%
Unwanted exposure 25% 34% +9%
to sexual materials
Harassment 6% 9% +3%
10.
11.
12.
13. ―Google‖ yourself
› Type in first and last name, email addresses,
screen names, addresses, phone numbers
› search for images as well
14. Facebook ,Myspace
› Age requirements
“No information from children under age 13.”
› Public vs Private
› Know who you add: friends vs cyberfriends
› Have access to your child‘s site
› Be conscientious of pictures/videos
Protecting reputations online, in plain English
(commoncraft.com)
15. Make sure that your child takes advantage of the privacy
settings on social networking sites.
Pre-approve the pictures and videos your child posts
online.
Remind your child never to post e-mail addresses or cell
phone numbers.
Tell your child that passwords should only be shared with
parents and guardians.
Teach your child not to respond to any e-mails requesting
personal information and to delete e-mails from unknown
senders.
Discuss how to keep screen names and e-mail addresses
gender-neutral, appropriate, and free of any information
that could reveal identity.
Encourage your child to tell you right away if anything
happens online that bothers or frightens him or her.
Information from Netsmartz Kids: http://www.netsmartz.org/RevealingTooMuch
17. LOL POS
BRB ASL
SMS (short message service) aka texting
Wikipedia and netlingo.com list of
internet slang
› http://en.wiktionary.org/wiki/Appendix:Intern
et_slang
› http://www.netlingo.com/acronyms.php
20. Know which safety features are available on the gaming
equipment that your child uses—a headset may have voice-
masking features, for example.
Keep gaming consoles in an easy-to-supervise location and
be aware of other places where your child may be accessing
games.
Tell your child never to give out personal information while
gaming or agree to meet anyone outside of the game.
Teach your child not to respond to anyone who is being rude
or bullying while playing the game.
Set rules for how long your child may play, what types of
games are appropriate, and who else may participate.
Have your child check with you before using a credit or debit
card online.
Check to see if the games your child plays have reporting
features or moderators.
Information from Netsmartz Kids: http://www.netsmartz.org/Gaming
21. Cyberbullying is emerging as one of the
more challenging issues facing
educators and parents as young people
embrace the Internet and other mobile
communication technologies.
22.
23.
24. Outing and Trickery – Sharing someone‘s
secrets or embarrassing information or
images online
Exclusion – Intentionally keeping
someone from being able to take part in
an online group, such as a ―buddy list.‖
Cyberstalking – Repeatedly sending
unwanted messages that may include
threats of harm; intimidating
25. Flaming – Online ―fights‖ using electronic
messages with inappropriate language
Harassment – Repeatedly sending
offensive, rude, and insulting messages
Denigration – Sending or posting gossip
or rumors about a person
Impersonation – Posing to be someone
else and making them look bad
26.
27. Tell your child not to respond to rude e-mails, messages, and
comments.
Save the evidence, such as e-mail and text messages, and
take screenshots of comments and images. Also, take note of
the date and time when the harassment occurs.
Contact your Internet service provider (ISP) or cell phone
provider. Ask the website administrator or ISP to remove any
Web page created to hurt your child.
If harassment is via e-mail, social networking sites, IM, and
chat rooms, instruct your child to ―block‖ bullies or delete your
child‘s current account and open a new one.
Check out phone features that may allow the number to be
blocked.
Make a report to www.cybertipline.com, and if you feel
something illegal has occurred, inform law enforcement
Information from Netsmartz Kids: http://www.netsmartz.org/Cyberbullying
28. About 75% of teens (12-17) carry cell
phones
1 in 3 teens (13-19) use their cell phone
to surf the web
Results from Teens and Mobile phones, Pew Internet and Americnl Life
Project, 2010
A Generation Unplugged, Harris Interactive, 2008
29. Review cell phone records for any unknown
numbers and late night phone calls and texts.
Remind your child that texting is viral—anything
sent in a text can be easily forwarded and shared.
Teach your child never to reveal cell phone
numbers or passwords online.
Talk to your child about the possible consequences
of sending sexually explicit or provocative images
or text messages.
When shopping for a cell phone for your child,
research the security settings that are available.
From Netsmartz Kids : http://www.netsmartz.org/CellPhones
32. Computer system
› Keeping bad stuff (predatory software) out
– keeping valuables(personal information) in
Malicious codes: viruses, worms, trojan
Parasitical malware: spyware, adware
Forbes.com article: FBI: Disinfect Your Computer Or Risk
Losing Internet Access Come July (DNS Changer – 2007)
› bit.ly/J4tKQ3
33.
34. Anti spyware and adware programs
www.spybot.com (Spybot S &D)
www.adaware.com (lavasoft product)
www.cyberpatrol.com
www.netnanny.com
www.spectorsoft.com
www.cybersitter.com
www.covenanteyes.com
35.
36. Guard your identity
› Make username generic and anonymous
› Little information is needed to get to know
you
Monitor your child‘s computer use
Use favorites
Understand the services your child uses
Know usernames, passwords, and e-mail
37. Know child‘s ―online friends‖
Don‘t overreact to anything your child
tells you (fear you will take computer
away)
Never meet anyone met online
Keep your computer up-to-date
› windowsupdate.microsoft.com
› Virus protection
› Firewall
40. http://www.cyberbullying.us/research.php
Bullying, Beyond the Schoolyard, by
Hinduja and Patchin
http://www.cnet.com/4520-13384_1-
6721368-1.html Top 5 Dangers article
http://www.cnet.com/4520-13384_1-
6721401-1.html?tag=lwt;lcol Think Before
You Click Worksheet
41. Thank you for your attendance at
today‘s presentation!
Make sure you have signed in before you
leave
We hope you found it useful.
Notas del editor
Read slide
to understand this complex issue, it is important to start with perspective. Brief uses by adults
Brief uses by students
Points: cell phone is highest, and many have data plans the uses lists are almost all related to communication/social this survey was done before the release of tablets (ipad, kindle, nook…)
An article on Cnet stated it very concisely, the tope 5 dangers for kids….
Unfortunately the exposure to sexual and pornographic materials have become more of a problem as internet access becomes easierHarassment via digital devices has also increased
A video I saw was about a HS boy adding a ‘female’ ‘friend’ to his fb…. This person scowered his account to find out all he could about him, convinced him to do a video chat, took images, and then tried to blackmail the boy when the ‘female friend’ who was actually an older man, was threatened to be exposed because he was reported.
Cyber predators are skilled at getting what they want. The process they use is called grooming. They gain trust, make the child open up, then try and control them by fear.