SlideShare a Scribd company logo
1 of 49
Family Online Safety: Truth and
Consequences

Marian Merritt
Norton Internet Safety Advocate, Symantec Corporation
Is technology changing
us?
Today’s Digital Native (born in 1990’s or later)
•   Our children have never stood to change a TV channel
•   Internet always existed
•   They don’t go “online”; they are always connected
•   Definitions of privacy getting tweaked
•   Expect devices to just turn on, connect and work
•   More collaborative, get help from networks, not just a Google
    search or in a book
•   Kids (8-18) view 53 hours of media per week1
•   By age 21, will have sent an average of 250,000 emails, instant
    messages and texts
•   By age 21, more than 10,000 hours on their cell phone
•   By age 21, more than 14,500 hours online, mostly in social networks

1 Kaiser study 2010
Parents worry about many different online issues


  “I’m worried my
                     By 11               “Will my child be
                                          cyber bullied?”
     child will be    Children have
                         usually           or bully
contacted              encountered
                      adult material
                                           others?
    by     Social                          “My kid
strangers networks                      won’t put the cell
   Online”                              phone down, are
                     “Are they safe?”
                                each yearthey addicted?”

                                                             4
What is real, what is a myth

• Low risk of stranger danger
• Cyber bullying not common
• Sexting is rare for young kids
• Kids are better at privacy settings than adults
• Social networks can be safe, can be dangerous
• Media attention to issues blows them out of proportion




                                                           5
There is good news
• Research shows risk isn’t growing, just awareness
• Less real difference between online and offline worlds
• Parents play big role; partner with schools
• Technology empowers kids
• Shift in focus from panic about internet danger to fostering
  digital citizenship




                                                                 6
Potential problems at any age




                                7
Younger Children’s Online Troubles




        •   Visit the wrong websites (adult material,
            violent material, stuff that might scare them)

        •   Be exposed to advertising online and in apps

        •   Make purchases without permission

        •   Get their first email account and get spam,
            chain letters, adult material




                                                             8
Middle School Children’s Online Troubles




                             •   Social drama and
                                 Cyber Bullying

                             •   Cell phones and misuse
                                 (spam, sexting,
                                 using late at night
                                 instead of sleeping)

                             •   Join social networks
                                 when underage




                                                          9
Older School Children’s Online Troubles




              •   Reputation problems

              •   Privacy failures

              •   Online scams and fraud

              •   Social network issues




                                           10
All ages need to be concerned about
• Malware and cybercrime
• Digital reputation stuff




                                               11
Cybercrime is a massive global problem


Cybercrime costs
                     2/3                 31% of us
                                       have received
  consumers        of online adults   phishing text on
                    have been hit      mobile phone
$110                by cybercrime

                                      $1 million +
billion 1 in 6                         new pieces
    each year      social network      of malware
                             each year are created
                     users have
                    been hacked         every day

                                                         12
Privacy and Reputation




                         13
Facebook safety concerns




                           14
Facebook click jacking attack types




                                      15
OMG! Videos get people to click




                 Bad Guys Want to Get Us to Click to:
                 Infect us with malware

                 Make us take bogus surveys to:
                 Gain information or
                 Sign us up for premium SMS services

                 Send spam to us and our friends




                                                        16
Bad guys know that people want to know who
        viewed their Facebook page




                                             17
Bad guys know that people want a dislike button




                                                  18
Mobile Computing
What’s really going on?
Kids are using technology in ways far beyond
   what parents are prepared to deal with




                                               20
Permissions in mobile apps




                             21
What you think you did
vs what actually happened in the background


                              TIME SPENT
                                PLAYING    IP ADDRESS
            PREVIOUS SCORES

 LOCATION
                                                             GENDER
                                                              & AGE


USER NAME




            SCORE                              FACEBOOK FRIEND LIST




                                                                      22
What are the chances of
getting your lost phone back?




   50%
                                23
What are the chances of your work and
personal information being looked at?




      100%
                                        24
Cyber Bullying

                 25
Relation of Offline and Online Bullying


             Offline



                        Online




                                          26
Vulnerable Populations

•LGBTQ
•Minorities, disabled, gifted, even
socio-economic differences
                       YOU, YOUR FRIENDS AND
•Heavy cell phone users more likely
                 CYBERBULLYING.
to bully; be bullied
Cyberbullying – the things we say; things we do
• “Sticks and stones”
• “It’s just part of growing up”
• “It will make you tougher”
• “Stand up for yourself”




                                                    28
And the response?


Parent         School        Legal




                                     29
And the response?

           •Teach kids not to bully or be a silent
Parent     bystander
           •Don’t respond to attacks online
               •Keep a copy of everything
           •Report it to website, service, school
           •Ask for plan of action
           •Seek advice from experts




                                                     30
And the response?

            •Create anti bullying policy
School      •Review current laws in your state
            •Training for all (even volunteers)
                 •(CyberALLY – great example!)
            •Work on school environment
                 •Social norming




                                                  31
And the response?

          •Almost all 50 states have anti cyberbullying
Legal     laws
          •Content varies dramatically
          •California :
               •AB 9 “Seth’s Law” 2011
               •AB1156 2011
               •AB746 2011


                 Resources: www.stopbullying.gov
                 www.cyberbullying.us
                 www.bornthiswayfoundation.org
                                                          32
What are the
remedies?
House Rules and conversation




Setting House Rules and having
the Talk
Technology
 • Speed limits, fences and coaches
 • Not spies nannies or police




The Role of Technology
                                      35
Turn off
 Jimmy’s
laptop at
  -----
9:00 PM




            36
Norton Family (parental control)




             Screenshot from Norton Family
Why passwords matter: data breaches

            •Payment System – 130 million
            accounts
            •Gaming site 1 – 77 million
            accounts
            •Social site – 30 million accounts
            •Military site - 26 million
            accounts
            •Career site – 6.4 million accounts
            •Dating site – 1.5 million accounts
What are the most popular passwords?
12345        Abc123    Michael
123456      Monkey     Football
1234567     Trustn01   Ashley
12345678     Dragon     Bailey
123123
            Baseball   Shadow
111111
            Iloveyou   Letmein
Password
             Master    Blink182
Passw0rd
Password1   Sunshine   Admin1
Welcome      Qazwsx
Welcome1    Superman
Password Tips
1. Think unique for each account
2. No dictionary words, pet names or school mascots
3. Focus on most important accounts: email and social
   networks
4. Create a pass phrase and turn it into a password
5. Use a password manager and security software
6. Secure mobile devices with a password
7. Never share or show passwords
8. If notified about data breach, take action!
Email Tips
Email safety tipsEmail




                                      44
Cell Phone Tips
• Set a password on the phone to
  lock the keypad and screen when
  not in use



• Tape a recovery phone number to
  phone

                                         If found,
                                        please call
                                        310 555 8925




                                                       45
Cell phone tips
• Set up emergency contacts
• Set up remote locate/lock/wipe
  software
• Install Security Software
• Turn Off Geo-Tagging
• Review School Cell Phone and
  Mobile Device Policy
• Review Your Contract Together
Cell phone tips

      • Review Your Contract
      • Set up nightly charging station
        in kitchen or den
      • Teach Kids Not to Reply To
        Unknown Senders or Callers
      • Set rules for new apps and
        games
      • Discuss Cyber Bullying, Sexting
        and Other Risks if You Don’t
        Guard Your Phone
Change your Behavior
What will you do?
Wrap up
Questions
THANK YOU!
Marian Merritt
marian@norton.com


Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or
implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.




                                                                                                                                                                               TM

More Related Content

What's hot

Fear and awe of the digital native
Fear and awe of the digital nativeFear and awe of the digital native
Fear and awe of the digital nativeOpportunity Links
 
Nielsen How Teens Use Media June 09
Nielsen How Teens Use Media June 09Nielsen How Teens Use Media June 09
Nielsen How Teens Use Media June 09LiveXtension
 
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakRaising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakBex Lewis
 
Vodafone Digital Parenting Guide
Vodafone Digital Parenting GuideVodafone Digital Parenting Guide
Vodafone Digital Parenting GuideKrishna De
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and ChldrenJoe Drumgoole
 
The trending wave
The trending waveThe trending wave
The trending wavektcole
 
Robyn Treyvaud 21CLHK 2012 keynote
Robyn Treyvaud 21CLHK 2012 keynote Robyn Treyvaud 21CLHK 2012 keynote
Robyn Treyvaud 21CLHK 2012 keynote Paul White
 
Playing safe
Playing safePlaying safe
Playing safehutchison
 
Cyberstalking dangers
Cyberstalking dangersCyberstalking dangers
Cyberstalking dangersrangashree
 
Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012Stephen Carrick-Davies
 
Highland Life Online Presentation (5)
Highland Life Online Presentation (5)Highland Life Online Presentation (5)
Highland Life Online Presentation (5)aluxenburg
 
Social networks
Social networksSocial networks
Social networksdrlizmike
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Internet safety 2010
Internet safety  2010Internet safety  2010
Internet safety 2010Chris Bigenho
 

What's hot (18)

Fear and awe of the digital native
Fear and awe of the digital nativeFear and awe of the digital native
Fear and awe of the digital native
 
Nielsen How Teens Use Media June 09
Nielsen How Teens Use Media June 09Nielsen How Teens Use Media June 09
Nielsen How Teens Use Media June 09
 
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair OakRaising Children in a Digital Age, St Thomas's Church, Fair Oak
Raising Children in a Digital Age, St Thomas's Church, Fair Oak
 
Vodafone Digital Parenting Guide
Vodafone Digital Parenting GuideVodafone Digital Parenting Guide
Vodafone Digital Parenting Guide
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
 
Parenting the Digital Generation
Parenting the Digital GenerationParenting the Digital Generation
Parenting the Digital Generation
 
The trending wave
The trending waveThe trending wave
The trending wave
 
Robyn Treyvaud 21CLHK 2012 keynote
Robyn Treyvaud 21CLHK 2012 keynote Robyn Treyvaud 21CLHK 2012 keynote
Robyn Treyvaud 21CLHK 2012 keynote
 
Playing safe
Playing safePlaying safe
Playing safe
 
Cyberstalking dangers
Cyberstalking dangersCyberstalking dangers
Cyberstalking dangers
 
Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012Digital citizenship ~ presentation oct 2012
Digital citizenship ~ presentation oct 2012
 
Highland Life Online Presentation (5)
Highland Life Online Presentation (5)Highland Life Online Presentation (5)
Highland Life Online Presentation (5)
 
Koreja
KorejaKoreja
Koreja
 
Social networks
Social networksSocial networks
Social networks
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Internet safety 2010
Internet safety  2010Internet safety  2010
Internet safety 2010
 

Viewers also liked

How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network SecurityBrian Honan
 
Digital Marketing PPT(Presentation) - Digital Marketing Strategies
Digital Marketing PPT(Presentation) - Digital Marketing StrategiesDigital Marketing PPT(Presentation) - Digital Marketing Strategies
Digital Marketing PPT(Presentation) - Digital Marketing StrategiesWeb Trainings Academy
 
Digital Marketing Overview
Digital Marketing OverviewDigital Marketing Overview
Digital Marketing OverviewAnton Koekemoer
 

Viewers also liked (6)

Online safety and malwares
Online safety and malwaresOnline safety and malwares
Online safety and malwares
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Digital Marketing PPT
Digital Marketing PPTDigital Marketing PPT
Digital Marketing PPT
 
The digital marketing ppt
The digital marketing pptThe digital marketing ppt
The digital marketing ppt
 
Digital Marketing PPT(Presentation) - Digital Marketing Strategies
Digital Marketing PPT(Presentation) - Digital Marketing StrategiesDigital Marketing PPT(Presentation) - Digital Marketing Strategies
Digital Marketing PPT(Presentation) - Digital Marketing Strategies
 
Digital Marketing Overview
Digital Marketing OverviewDigital Marketing Overview
Digital Marketing Overview
 

Similar to Family Online Safety: Truth and Consequences

Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Parenting in the digital world 2012
Parenting in the digital world 2012Parenting in the digital world 2012
Parenting in the digital world 2012Holly Gerla
 
Character Development, for students, by students!
Character Development, for students, by students!Character Development, for students, by students!
Character Development, for students, by students!mediaplaylab
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspectiveConnectSafely
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshareMarian Merritt
 
Digital Primary School Kids
Digital Primary School KidsDigital Primary School Kids
Digital Primary School KidsMike Boulanger
 
Parenting in the Digital World 2012-Multicare
Parenting in the Digital World 2012-MulticareParenting in the Digital World 2012-Multicare
Parenting in the Digital World 2012-MulticareHolly Gerla
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the HomeScott Burnett
 
Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullyinganwidener
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateMarian Merritt
 
Social Media and the Wired Generation www.mannrentoy.com
Social Media and the Wired Generation www.mannrentoy.comSocial Media and the Wired Generation www.mannrentoy.com
Social Media and the Wired Generation www.mannrentoy.comMann Rentoy
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementaryemilyensign
 
Internet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupInternet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupScott Burnett
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the HomeScott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 

Similar to Family Online Safety: Truth and Consequences (20)

Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Parenting in the digital world 2012
Parenting in the digital world 2012Parenting in the digital world 2012
Parenting in the digital world 2012
 
Character Development, for students, by students!
Character Development, for students, by students!Character Development, for students, by students!
Character Development, for students, by students!
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Digital Primary School Kids
Digital Primary School KidsDigital Primary School Kids
Digital Primary School Kids
 
Parenting in the Digital World 2012-Multicare
Parenting in the Digital World 2012-MulticareParenting in the Digital World 2012-Multicare
Parenting in the Digital World 2012-Multicare
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullying
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
Teens and social media
Teens and social mediaTeens and social media
Teens and social media
 
Social Media and the Wired Generation www.mannrentoy.com
Social Media and the Wired Generation www.mannrentoy.comSocial Media and the Wired Generation www.mannrentoy.com
Social Media and the Wired Generation www.mannrentoy.com
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Safer internet
Safer internetSafer internet
Safer internet
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
 
Internet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupInternet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life group
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 

More from Marian Merritt

Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyMarian Merritt
 
The Norton Report 2013
The Norton Report 2013The Norton Report 2013
The Norton Report 2013Marian Merritt
 
Internet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceInternet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceMarian Merritt
 
2012 norton cybercrime report
2012 norton cybercrime report2012 norton cybercrime report
2012 norton cybercrime reportMarian Merritt
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsMarian Merritt
 
12 tips for cell phone safety for kids
12 tips for cell phone safety for kids12 tips for cell phone safety for kids
12 tips for cell phone safety for kidsMarian Merritt
 

More from Marian Merritt (8)

Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, Messy
 
The Norton Report 2013
The Norton Report 2013The Norton Report 2013
The Norton Report 2013
 
Internet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceInternet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the Workplace
 
2012 norton cybercrime report
2012 norton cybercrime report2012 norton cybercrime report
2012 norton cybercrime report
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwords
 
12 tips for cell phone safety for kids
12 tips for cell phone safety for kids12 tips for cell phone safety for kids
12 tips for cell phone safety for kids
 
School presentation
School presentationSchool presentation
School presentation
 

Recently uploaded

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Family Online Safety: Truth and Consequences

  • 1. Family Online Safety: Truth and Consequences Marian Merritt Norton Internet Safety Advocate, Symantec Corporation
  • 3. Today’s Digital Native (born in 1990’s or later) • Our children have never stood to change a TV channel • Internet always existed • They don’t go “online”; they are always connected • Definitions of privacy getting tweaked • Expect devices to just turn on, connect and work • More collaborative, get help from networks, not just a Google search or in a book • Kids (8-18) view 53 hours of media per week1 • By age 21, will have sent an average of 250,000 emails, instant messages and texts • By age 21, more than 10,000 hours on their cell phone • By age 21, more than 14,500 hours online, mostly in social networks 1 Kaiser study 2010
  • 4. Parents worry about many different online issues “I’m worried my By 11 “Will my child be cyber bullied?” child will be Children have usually or bully contacted encountered adult material others? by Social “My kid strangers networks won’t put the cell Online” phone down, are “Are they safe?” each yearthey addicted?” 4
  • 5. What is real, what is a myth • Low risk of stranger danger • Cyber bullying not common • Sexting is rare for young kids • Kids are better at privacy settings than adults • Social networks can be safe, can be dangerous • Media attention to issues blows them out of proportion 5
  • 6. There is good news • Research shows risk isn’t growing, just awareness • Less real difference between online and offline worlds • Parents play big role; partner with schools • Technology empowers kids • Shift in focus from panic about internet danger to fostering digital citizenship 6
  • 8. Younger Children’s Online Troubles • Visit the wrong websites (adult material, violent material, stuff that might scare them) • Be exposed to advertising online and in apps • Make purchases without permission • Get their first email account and get spam, chain letters, adult material 8
  • 9. Middle School Children’s Online Troubles • Social drama and Cyber Bullying • Cell phones and misuse (spam, sexting, using late at night instead of sleeping) • Join social networks when underage 9
  • 10. Older School Children’s Online Troubles • Reputation problems • Privacy failures • Online scams and fraud • Social network issues 10
  • 11. All ages need to be concerned about • Malware and cybercrime • Digital reputation stuff 11
  • 12. Cybercrime is a massive global problem Cybercrime costs 2/3 31% of us have received consumers of online adults phishing text on have been hit mobile phone $110 by cybercrime $1 million + billion 1 in 6 new pieces each year social network of malware each year are created users have been hacked every day 12
  • 15. Facebook click jacking attack types 15
  • 16. OMG! Videos get people to click Bad Guys Want to Get Us to Click to: Infect us with malware Make us take bogus surveys to: Gain information or Sign us up for premium SMS services Send spam to us and our friends 16
  • 17. Bad guys know that people want to know who viewed their Facebook page 17
  • 18. Bad guys know that people want a dislike button 18
  • 20. What’s really going on? Kids are using technology in ways far beyond what parents are prepared to deal with 20
  • 22. What you think you did vs what actually happened in the background TIME SPENT PLAYING IP ADDRESS PREVIOUS SCORES LOCATION GENDER & AGE USER NAME SCORE FACEBOOK FRIEND LIST 22
  • 23. What are the chances of getting your lost phone back? 50% 23
  • 24. What are the chances of your work and personal information being looked at? 100% 24
  • 26. Relation of Offline and Online Bullying Offline Online 26
  • 27. Vulnerable Populations •LGBTQ •Minorities, disabled, gifted, even socio-economic differences YOU, YOUR FRIENDS AND •Heavy cell phone users more likely CYBERBULLYING. to bully; be bullied
  • 28. Cyberbullying – the things we say; things we do • “Sticks and stones” • “It’s just part of growing up” • “It will make you tougher” • “Stand up for yourself” 28
  • 29. And the response? Parent School Legal 29
  • 30. And the response? •Teach kids not to bully or be a silent Parent bystander •Don’t respond to attacks online •Keep a copy of everything •Report it to website, service, school •Ask for plan of action •Seek advice from experts 30
  • 31. And the response? •Create anti bullying policy School •Review current laws in your state •Training for all (even volunteers) •(CyberALLY – great example!) •Work on school environment •Social norming 31
  • 32. And the response? •Almost all 50 states have anti cyberbullying Legal laws •Content varies dramatically •California : •AB 9 “Seth’s Law” 2011 •AB1156 2011 •AB746 2011 Resources: www.stopbullying.gov www.cyberbullying.us www.bornthiswayfoundation.org 32
  • 34. House Rules and conversation Setting House Rules and having the Talk
  • 35. Technology • Speed limits, fences and coaches • Not spies nannies or police The Role of Technology 35
  • 36. Turn off Jimmy’s laptop at ----- 9:00 PM 36
  • 37. Norton Family (parental control) Screenshot from Norton Family
  • 38. Why passwords matter: data breaches •Payment System – 130 million accounts •Gaming site 1 – 77 million accounts •Social site – 30 million accounts •Military site - 26 million accounts •Career site – 6.4 million accounts •Dating site – 1.5 million accounts
  • 39. What are the most popular passwords? 12345 Abc123 Michael 123456 Monkey Football 1234567 Trustn01 Ashley 12345678 Dragon Bailey 123123 Baseball Shadow 111111 Iloveyou Letmein Password Master Blink182 Passw0rd Password1 Sunshine Admin1 Welcome Qazwsx Welcome1 Superman
  • 40. Password Tips 1. Think unique for each account 2. No dictionary words, pet names or school mascots 3. Focus on most important accounts: email and social networks 4. Create a pass phrase and turn it into a password 5. Use a password manager and security software 6. Secure mobile devices with a password 7. Never share or show passwords 8. If notified about data breach, take action!
  • 41. Email Tips Email safety tipsEmail 44
  • 42. Cell Phone Tips • Set a password on the phone to lock the keypad and screen when not in use • Tape a recovery phone number to phone If found, please call 310 555 8925 45
  • 43. Cell phone tips • Set up emergency contacts • Set up remote locate/lock/wipe software • Install Security Software • Turn Off Geo-Tagging • Review School Cell Phone and Mobile Device Policy • Review Your Contract Together
  • 44. Cell phone tips • Review Your Contract • Set up nightly charging station in kitchen or den • Teach Kids Not to Reply To Unknown Senders or Callers • Set rules for new apps and games • Discuss Cyber Bullying, Sexting and Other Risks if You Don’t Guard Your Phone
  • 49. THANK YOU! Marian Merritt marian@norton.com Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. TM

Editor's Notes

  1. Is techology changing us? Introduce self. My role is to help people like you understand issues like cybercrime, reputation and privacy concerns, strategies for keeping technology safe and productive. I’m not in law enforcement, scope is broader than online crime. As a parent of three children myself, I’m also in the trenches trying to manage wireless networks, smart phones, social networking and still try to give my kids enough freedom to develop normally. Even if you’ve been around computers since childhood like me, none of us grew up in a fully connected, wired home. We didn’t grow up with all of this, so what is it like for the so called “digital native”?
  2. When I speak to parent groups like you, often we do a survey before so I get an idea of the specific concerns of that community. There’s a lot of overlap and it doesn’t matter if it’s an inner city school or affluent suburban one. Stranger danger, adult material, cyber bullying, online addictions, trying to limit or block what your kids are doing, trying to keep track of them. To worry is normal. But too often our sense of what is really happening is skewed, is a bit messed up because of what we see on the news or read in the paper
  3. You can worry about your child being abducted in the real world or online by a predator who might contact them, groom them. Law enforcement is very good at going after these creeps. Sadly, there’s more risk to your child in the normal real world because most inappropriate contact comes from family or community members. Only a tiny fraction of a percentage, so low the FBI doesn’t have good data, comes from the total stranger who contacts your child. And there are known risk factors that make a child vulnerable, same ones in the real world as oneline. Cyber bullying happens to one in four kids. I’m talking the really bad stuff, with repetitive and attacking cruelty, not one off teasing among friends. One in four is terrible but it’s still less than in person school yard bullying. They go hand in hand. Most kids don’t cyber bully and aren’t cyber bullied. Still, we’ll talk more about this issue because it’s so heart wrenching and we need strategies to teach our kids. Sexting – a few years ago we’d never heard of it. Still very unusual to see kids sending nude photos or images unless they are older teens and young adults and in a relationship. We’ve just had a tragic case where a girl friended a stranger (abnormal in itself) agreed to lift her shirt on camera, he captured the image, sent it around and sent her into a spiraling hell of bullying from classmates. She continued to act out and ultimately took her life. Was it the sexting that sent her over the edge? The in person bullying? The depression? Privacy settings – often knowing how to limit who sees what you are doing online is a great first strategy for successful use of technology. Kids are better at this than adults. If you are using a social network and want only friends to see what you post or prevent your boss from seeing things, ask a 14 year old how. Social networks, facebook gets a very bad rap, yet there are a billion people using it worldwide. So we’d better figure out how to do it well. Yes, there is malware, mean kids, online scams even dating fraud. You need to be alert and on guard, even in a social network. Check yourself when you think you’ve heard about a new online problem. Did you see it on the news? Was it a story about a freak incident or one off? Were there tips on how to avoid the problem? Try not to overreact to news about online or tech problems, but learn about them. Dteremine your risk level and stay on top of managing it.
  4. Lots of good things to celebrate. Online risks to our kids, like cyber bullying, aren’t going up. We’re getting better data about what it is like to grow up in this tech world. As an example, a study about online predators done a few years ago found that one in five kids would be approached online in a sexual way at some point. Later data found it to be one in seven (so it went down) and further, that the contacts were mostly from peers (hey baby, I want to get with you) and not upsetting to the kids. So by adding some questions to better understand, we went from a stranger danger panic to an understanding that the same teasing, sexy banter common to adolescence is common to online as well. Risks in the real world, risks in the online world. Kids who take risks offline do so online. Kids who are good kids, who tend to keep to the rules, will stick to your tech rules if you are teaching them what those are. Parents are big influencers. Kids might not come to you if something goes wrong online, they go to a peer for help before you. But the peer might go to you. Kids watch how you use tech. if you are texting instead of looking at your kids to talk to them, don’t wonder why they do the same. Tech can empower kids. Look at the kids creating blogs, tumblr accounts, videos to entertain each other. My son records some of his xbox gaming and uploads it to a YouTube channel. I don’t totally get it but I like that he can get acclaim from other gamers who do. So even though we’re about to go through some of the dark stuff associated with tech and the internet, I really want to emphasize that thereis a lot of good news, and a shift in internet safety education from internet danger to digital citizen ship. This is a concept about helping kids gravitate towards online good works, learning about the world, promote kindness, tolerance.
  5. Ok, there are, as you know, potential troubles for every age of kids. Too often when I talk to parents, they focus on older kids, like 6th grade and up and they are missing the potential for problem for kids as young as kindergarten.
  6. Kids who are on devices with out parental controls or safe search are seeing adult material, violent material and images that can frighten them. Advertising is all over our mobile apps. So a free game to make cookies might be sponsored by a manufacturer who shows ads. Or a free game may include 10 ad channels all competing to display ads, some of which might not be child appropriate. When I speak to little kids, I ask if they’ve ever had a password stolen by a friend or changed by a sibling. It’s usually about 1/4th. So you can’t talk about privacy and safety early enough. Ever see a parent hand a fancy smartphone to a toddler in a restaurant? It can be great at quieting a restless kid but kids can add apps or make purchases on purpose or by mistake.
  7. Middle school brings many changes. You are no doubt familiar with the whole “mean girls” phase? It’s so ugly and happens to coincide with a time when kids are increasingly online. There’s a pecking order in school and it’s easy for kids to misstep online. Most middle school kids have cell phones, email, a social network so there are opportunities for a lot of ugly behavior to occur in places parents can see it. of course you should friend your child in their social network. Ideally you should monitor their email, especially when they are younger. You’ve got to get the tech charging in the kitchen or at least ouf of the bedroom. Those late night texts are bad for your kids’ sleep, their grades and especially their emotional well being. A lot of hateful messages get sent at midnight.
  8. Now, with high school, most of the kids are getting serious about school work but they still slip up. Cyber bullying still goes on, sometimes it escalates into all out war. Kids are refining their reputations, their cliques, their status. By this age, many kids have figured out strategies to avoid parental gaze. They limit their posts on facebook so only a few friends see them. They use instagram or tumblr as their primary social network thinking you aren’t checking. They are removing embarassing photos. Still, they fall for online scams. The survey to get your iq score. To win a free ipad. Auction scams like to buy a used car.
  9. Malware is a much bigger issue than most of you realize. And the issues of our digital activity leading to real world problems isn’t untrue. Here is an example of one teen posting travel information which could lead to someone breaking in or having a “swarm party” which is promoted on facebook.Story of west la teen and hawaii trip.
  10. Cybercrime is a massive global problem. (cite: 2012 Norton Cybercrime Report stats)
  11. What we all need to know is that everything we post or send online is permanent. Even if you remove it, someone else might have kept it. Even an instant message can be stored in a history or cut and paste into a document. Here’s Alison Chang from the midwest. She went to a BBQ at her church, her photo was taken and posted to Flickr. There, because it wasn’t protected by the right copyright, it was reused in an Australian bus bench ad without her permission. She definitely didn’t get paid to be their model. And all they had to do is display in that white box in the lower left part of the ad was a credit to the Flickr photographer. This second image is of the Smith family (their real name). This was their Christmas card photo. The photographer was proud and put on her website tagged as “one happy family”. She didn’t put a copyright on it, or protect it behind a password or even put a watermark over the image to prevent someone using it. So then it was used by a Czech grocery store whose owner did a websearch for an image of a “happy family”. Without their permission and they definitely weren’t paid.
  12. There’s a lot we can do to take control over this. There are security settings in Facebook where you can add layers to prevent someone hacking your account. Or accessing it on a device you don’t recognize like a laptop in Estonia. And you can adjust privacy settings as well. You can prevent someone tagging you without your permission. You can edit permissions for games you play. Just make sure you are working together in your family to use security and privacy settings on all your online accounts. There are numerous online scams, let’s take a look at just one problem, called click jacking.
  13. Example 1 (tell a story): Facebook click jacking attack (personal) – show what happens behind the scenes, what information a cybercriminal gets in such an innocuous event. (can include drive-by download description here as well.)
  14. Example 1 (tell a story): Facebook click jacking attack (personal) – show what happens behind the scenes, what information a cybercriminal gets in such an innocuous event. (can include drive-by download description here as well.)
  15. Example 1 (tell a story): Facebook click jacking attack (personal) – show what happens behind the scenes, what information a cybercriminal gets in such an innocuous event. (can include drive-by download description here as well.)
  16. Example 1 (tell a story): Facebook click jacking attack (personal) – show what happens behind the scenes, what information a cybercriminal gets in such an innocuous event. (can include drive-by download description here as well.)
  17. Mobile computing. We do more and more online with mobile devices than every. Smart phones aren’t gaming devices. If you have email on there, and I hack or steal your phone, I can see who you bank with, shop with, talk to. If you connect to work on a tablet, I can access corporate data just by hacking or stealing the tablet. The BYOD movement is solid, taking corporate america by storm but it’s complex to get right. Just one issue is how much data game and utility apps are sending back and forth whether you are using them or not.
  18. Who here checked Facebook today? Played Angry Birds or Temple Run on a mobile device? How about while you’ve been sitting here?
  19. Permissions are the levels of access you authorize for each app. You did this when you installed the game or app. You might not have realized how much you were allowing or didn’t mind at the time. But with new appreciation for privacy growing in this country, many are questioning thse permissions.
  20. What you think you did – versus what actually happened in the background (updated status to a few friends or provided location information and keywords to Facebook or Google, their advertisers, and your apps; updated Timeline; stored information and comments; updated links and relationships, etc.
  21. Honey stick project
  22. Remedy – we’ll talk in a bit about some simple strategies to secure a phone in case of loss or theft. Now, let’s turn to the tough issue of cyber bullying
  23. Definition from Hinduja and Patching (cyberbullying.us): is when someone repeatedly makes fun of another person online or repeatedly picks on another person through email or text message or when someone posts something online about another person that they don’t like.” 20% of over 4400 randomly selected 11-18 year old students in 2010 have been a victim at some point in their life. In review of 35 papers, average was 24% victim/17% cyberbully (admit to engaging in the activity). School bullying is still more prevalent. Trend is not up or down; more kids are coming forward than before. Only ¼ tell an adult. ½ of cyberbullying victims and bullies experience offline bullying (Ybarra and Mitchell 2004)Offline bullies are more than twice as likely to be both targets and perps of online bullying (Hinduja and Patchin 2008)
  24. Kids who are being cyberbullied are often experiencing offline bullying; Hinduja study 2010 found victims of offline bullying are 2.7 times more likely to be cyberbullying victim. Offline bullies are 2 times (200%) more likely to be BOTH target and perpetrator of online bullying. ¾ of those who admit cyberbullying others also admit to bullying others at school.
  25. Some research shows that the more a child uses a cell phone, the more likely they are to bully and be bullied. It’s likely just lack of impulse control in both area. http://www.zdnet.com/blog/igeneration/cyberbullying-increases-in-line-with-mobile-phone-usage-infographic/14713Lesbian, Gay youth: http://news.cnet.com/8301-27083_3-10466220-247.html 1 in 2 kids report cyberbullying; (Hinduja/Patchin report 73% of LGBTQ kids are targets of bullying at some point; 63% for hetero youth. 36% targets of cyberbullying for LGBTQ kids compared to 20% for hetero). 80% of kids with learning disabilities are targets of school bullying: http://www.cec.sped.org/AM/Template.cfm?Section=Home&CAT=none&TEMPLATE=/CM/ContentDisplay.cfm&CONTENTID=1008567% of gifted kids hit by bullying. (same article as above)Often if you ask your child directly about cyber bullying they will deny, deny ,deny. By the time a child tells their parents, it’s getting very serious. Often the school can’t do much or the child perceives it made things worse. I’ve heard of schools bringing the target and bullies together in a meeting to “resolve their differences”. Since bullying is often about power, that method just can’t work. Neither does a once a year assembly where we chant no bullies. So what do you do?
  26. 25% of adults in the workforce are victims of bullying.  C. Bradshaw did some research specifically with school personnel too, and found 22% of teachers + report getting bullied at the work place. 
  27. Schools that are safe, where teachers demonstrate they care promote healthy behaviors. Students who are cyberbullied often perceive the climate at school as less safe or where teachers don’t care about their success. Inverse relationship between climate and bullying (Hinduja 2012)
  28. Seth’s law requires schools to act on reports of bullying, to haveinvestigative processes and extends protection for bullying/cyberbullying related to sexual orientation (real or perceived)AB1156 requires schools develop training and antibullying policies definitions of cyberbullying and creates provisions to remove the target/victim from the school, if they wantAB746 extends to social networking sites, and extends grounds underwhich you can suspend or expel a student
  29. Lots of issues: cyber crime, passwordtheft, cyber bullies – let’s get to the strategies I want you to consider. And let’s start with something that works, really works. Setting rules.
  30. House rules are simply setting standards for “how we behave in our family and in our house.” if you don’t talk about what you expect from your kids, they won’t have your guidance. If you don’t share how you manage technology, they won’t learn from you, they’ll learn from their peers. And then they will do things you won’t like, such as download illegal material, use peer to peer filesharing, post racist or mysogynistic comments on facebook or think hacking is cool. And I want you to start talking about this. Not all at once and consider it done. This has to be an ongoing developing conversation shared by both parents. I find the car is a great place to bring up these issues. Something about not having to look at each other helps get the honesty flowing. Example, ask your children what are the new websites or apps their friends are using. Note that you are not directly asking about their interests. Kids like talking about their friends online adventures but not about their own. So ease into it. Ask about your child’s favorite site or game. Again, stop jumping to the negative. Show you are empathetic and also love technology. Ask them when you are not driving to show you the game or site. My son often sends me links to “cool” youtube videos and I do the same. Find a game or app you can play together like Scrabble, Words with Friends or Draw Something. I actually know a father and son who chat during Draw Something games using the chat feature. Bring up online problems like cyber bullying though you’ll want to say “drama” or fake facebook pages. You can bring up news stories like about kids who bad mouth teachers online just to raise their awareness of risks. Or sexting and the possiblity just receiving or sending an image could lead to legal trouble. Hit that balance of celebrating tech and demonstrating adult wisdom and experience while allowing your child to share their knowledge and mastery of the forms. Admit you have things to learn, which helps them feel more open about showing you things.
  31. Ok, tech can help with all of this. It’s finding the balance between non tech methods like house rules and frequent conversations but still tech can provide guidance, fences and coaching to keep your kids on the right path. For example,
  32. Look at all the devices in this one house. I’m not sure what Grandma is doing there but everyone else is on their laptops, smart phones, gaming devices all from the same overworked wifi router. It can be very hard to keep kids off tech when you need them to do homework, chores, come to dinner, etc. consider that many routers can help you. Yes you can configure parental controls on each device. But you can also do things like change the password and not give it out until homework is done or homework time. You can restrict particular devices so the children are offline but mom and dad are online. And you can set time limits or browser filters. It’s increasingly worth figuring out though I admit not always so easy to do.
  33. If you want to restrict what your kids are doing on the computer, either your’ going to restrict the entire system or you will need your kids using user accounts with some restrictions.
  34. Here’s one example of an easy to use parental control, a free one, from Norton.
  35. You can also set up parental controls on search engines,, gaming systems, Macs. There are restrictions on ipads and iphones. It just takes some looking around but every device can be safer and help your kids stay on the right path.
  36. A big issue for many parents is youtube and there are a few techniques but the simplist is enforcing their safety mode. You can do it yourself by logging into your Google account and setting it up or your parental control software can reinforce it.
  37. What’s going on? Hackers have discovered a variety of ways to defeat security to access databases of user accounts and passwords. What’s worse, when the data gets out, hackers often post it for other hackers to use. This means, if your account was hacked, your user name (often it’s your email address) and password get posted in a database that is public. If you are someone who uses the same password for all your accounts, it’s just a matter of time until someone takes your email address and favorite password and gains illegal access to another of your accounts. What if it were your bank account or your social network? How might you feel?Often, consumers are notified when their information has been involved in a breach. Consider those terrible times a kind of gift. A gift to remind you to use better passwords, unique passwords, especially for your most important account. Keep reading to find out which account is the most important one.
  38. Recognize some of these as your own? Uh Oh! Time to change those immediately. Others look like a good effort to create a strong password. They replace common letters in a dictionary word with a character or number that resembles it. So you get Passw0rd, instead of Password. But if it’s common, that means hackers have it in their list of passwords to try. Others like “QAZWSX” look clever and tricky. But if you look at your computer keyboard, it’s the left most keys in descending order. And if it’s common? Again, it goes in the hacker’s bag of passwords to try. Your best passwords are not dictionary words, should have eight or more characters that combine upper and lower case letters, numbers and special keyboard characters. I know, “groan”. And worse, it can’t be the same phrase you use over and over which weakens its worth. Your pass code also needs to be customized for each account and somehow, memorable!
  39. If I know you, can I guess your password? If I know the password you used on another account and you use the same password for everything, can I get in to this account? Can I answer your security questions and change your password? Remember what has happened to famous politicians who had their email account hacked this way?
  40. You have big responsibilities at work. Your company does important things (manage money, etc).
  41. STOP
  42. THINK
  43. CONNECT
  44. You are important. You are a gatekeeper to company networks, and company resources. Get hit by cybercrime and you just opened the gate. (Reference examples).
  45. slide for remove/fight it where somehow we're communicating there are actions requiring physical interaction with devices. unplugging, uninstalling, changing passwords, etc.
  46. Change Behavior - i need to talk about being smart with search, with shopping, with friending people, with privacy and security settings, with all forms of online connections. might have to be one or more slides or just good visuals.
  47. Think: Evaluate sender, is this from someone I know? Can I validate the sender, the caller, the texter? Who owns the website? show humorous image of message from me with a clearly bogus link. maybe you guys can come up with something. Goal is to lighten the mood but remind them not to friend a stranger or click a link just because you received it.
  48. wrap it up with summary images from the personal, to the mobile to the workplace to terrorism. repeat the mantra of stop. think. connect.
  49. NEW IMAGE