SlideShare una empresa de Scribd logo
1 de 28
Internet Safety



                            http://www.jasonseliskar.com
Saturday, December 29, 12
Children

                            James 1:17 - Every good gift and every perfect gift is from
                             above, coming down from the Father of lights with whom
                                 there is no variation or shadow due to change.

                              Proverbs 22:6 - Train up a child in the way he should
                               go; even when he is old he will not depart from it.


Saturday, December 29, 12
Internet Safety

Saturday, December 29, 12
The rate of growth of Internet
                                 use in the United States is
                                    currently two million
                               new Internet users per month.


                            (According to: A Nation Online: How Americans Are Expanding Their Use of the Internet, 2002)

Saturday, December 29, 12
13 million youth use
                                      Instant Messaging..


                            Pew Study reported in Journal of the American Medical Association, a.k.a. JAMA




Saturday, December 29, 12
Ninety percent of children
                               between the ages of 5 and 17
                                     (or 48 million) now
                                      use computers.


                            (According to: A Nation Online: How Americans Are Expanding Their Use of the Internet, 2002)

Saturday, December 29, 12
Access
                            93% of teens (12-17) go online.

                                 [1] Lenhart A. Social Media and Young Adults. Pew Internet and American Life Project, 2010.




Saturday, December 29, 12
Cell Phones
            75% of teens (12-17) have cell phones.

  On average, texting teens (12-17) send and
    receive 1500 text messages a month.
[3] Lenhart A. Teens and Mobile Phones. Pew Internet and American Life Project, 2010.




Saturday, December 29, 12
Cyberbullying
1 in 3 teens (12-17) have experienced online
                 harassment.

             Girls are more likely to be victims of
           cyberbullying (38% girls vs. 26% boys).
Lenhart A. Cyberbullying and Online Teens. Pew Internet and American Life Project, 2007.




Saturday, December 29, 12
Social Networking
                73% of teens (12-17) have profiles on
                      social networking sites.

                   47% of teens (12-17) have uploaded
                    photos; 14 % have posted videos.
   [15] Lenhart A. Social Media and Young Adults. Pew Internet & American Life Project, 2010.
   [16] Lehart A. Teens and Social Media. Pew Internet & American Life Project, 2007.




Saturday, December 29, 12
Children's Online Privacy
                             Protection Act of 1998

                                   (COPPA)

Saturday, December 29, 12
Children's Online Privacy Protection Act of 1998
                                                                                                  (COPPA)


                                     The revised rule expands the list of
                                   "personal information" that cannot be
                                  collected from children under 13 without
                                    parental consent to include location,
                                          photographs and videos.
                            Read more here: http://www.sacbee.com/2012/12/29/5081182/limit-on-kids-data-may-be-a-milestone.html#storylink=misearch#storylink=cpy




Saturday, December 29, 12
Update for Tablets and Smartphone (apps)

                                           Children's Online Privacy Protection Act of 1998
                                                                                                  (COPPA)


                             It forbids child-directed apps and websites
                             to track children's activities on the Internet
                             or to pass their data on to other companies
                                   without their parents' knowledge.
                            Read more here: http://www.sacbee.com/2012/12/29/5081182/limit-on-kids-data-may-be-a-milestone.html#storylink=misearch#storylink=cpy




Saturday, December 29, 12
Saturday, December 29, 12
Update for Tablets and Smartphone (apps)

                                           Children's Online Privacy Protection Act of 1998
                                                                                                  (COPPA)



                            The tech industry, which lobbied against the
                            changes, warns that overregulation of data
                              collection will stifle innovation, increase
                              costs for consumers and put some app
                             developers and websites out of business.
                            Read more here: http://www.sacbee.com/2012/12/29/5081182/limit-on-kids-data-may-be-a-milestone.html#storylink=misearch#storylink=cpy




Saturday, December 29, 12
Update for Tablets and Smartphone (apps)

                                           Children's Online Privacy Protection Act of 1998
                                                                                                  (COPPA)



                               “Almost 60 percent of the apps reviewed by FTC staff
                              transmitted data from a child's device back to the app
                            developer or to an advertising network, analytics company
                             or other third party. Using information from multiple apps,
                            the third parties could develop detailed profiles of children
                              based on their behavior in the apps, the report stated.”
                            Read more here: http://www.sacbee.com/2012/12/29/5081182/limit-on-kids-data-may-be-a-milestone.html#storylink=misearch#storylink=cpy




Saturday, December 29, 12
What do we use the Internet for?

           Socialize
                                                       Communicate
                                           Create
                            Playing
                                                     Exploring
                              Learning
Saturday, December 29, 12
The Internet has great uses, EXCEPT....

                     Porn                              Predators
                                        Viruses
                                                             Sexting
                 Game sites
                                                     Scams

                             Hate sites            Others...
Saturday, December 29, 12
Social Media
        Facebook                                  Google +

                                      Instagram
               Twitter                            Texting

                            Skyping
                                            Many others...
Saturday, December 29, 12
Facebook




Saturday, December 29, 12
Online Activity
                   - blogs
                   - wikis
                   - email
                   - social media
                   - gaming
                   - bookmarking
                   - instant messaging
                   - video conferencing

Saturday, December 29, 12
What are the older kids doing...



             At greater risk than younger kids

                 • More independent
                 • More intrigued
                 • Easily lured to inappropriate site/person
                 • Need parent awareness
                 • Need freedom
Saturday, December 29, 12
Keep an eye out for...
        online often/night

         inappropriate files/images

         strange phone calls                has another account

        changes sites/covers monitor        empty browser history

        withdrawn
Saturday, December 29, 12
Tips
      •Child’s computer in open area
      •Communication
      •Regularly review files & browser history
      •Teach responsible use for online resources
      •Talk to your child of online dangers
      •Educate yourself on ins and outs of Internet
      •Safe Search
Saturday, December 29, 12
commonsensemedia.org




Saturday, December 29, 12
Communication

                            Digital Citizenship

                               Awareness

                                  Safety

Saturday, December 29, 12
Filtering Software




Saturday, December 29, 12
Internet Safety

              http://www.jasonseliskar.com/internetsafety




                            http://www.jasonseliskar.com
Saturday, December 29, 12

Más contenido relacionado

La actualidad más candente

Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesMarian Merritt
 
How Piracy Led to Digital Distribution
How Piracy Led to Digital DistributionHow Piracy Led to Digital Distribution
How Piracy Led to Digital DistributionZacharyRaz
 
Transforming the Library through Gamification
Transforming the Library through GamificationTransforming the Library through Gamification
Transforming the Library through GamificationBohyun Kim
 
E-learning: The Dark Side?
E-learning: The Dark Side?E-learning: The Dark Side?
E-learning: The Dark Side?eLearning Papers
 
The Past and Future of Open Computing
The Past and Future of Open ComputingThe Past and Future of Open Computing
The Past and Future of Open ComputingTim O'Reilly
 
Five marketing trends in 2012
Five marketing trends in 2012Five marketing trends in 2012
Five marketing trends in 2012Vinish Joshi
 
Raising Children in a Digital Age (Evening Session)
Raising Children in a Digital Age (Evening Session)Raising Children in a Digital Age (Evening Session)
Raising Children in a Digital Age (Evening Session)Bex Lewis
 
Applying Gamification to Higher Education and Libraries
Applying Gamification to Higher Education and LibrariesApplying Gamification to Higher Education and Libraries
Applying Gamification to Higher Education and LibrariesBohyun Kim
 
Mi-ACE Mc-ICE Keynote - Vision for Innovation in Technology
Mi-ACE Mc-ICE Keynote - Vision for Innovation in TechnologyMi-ACE Mc-ICE Keynote - Vision for Innovation in Technology
Mi-ACE Mc-ICE Keynote - Vision for Innovation in TechnologyBarry Dahl
 
Children parents electronic_devices_russia
Children parents electronic_devices_russiaChildren parents electronic_devices_russia
Children parents electronic_devices_russiadigitalparentingrussia
 
A Marketer's Guide to Millenials
A Marketer's Guide to MillenialsA Marketer's Guide to Millenials
A Marketer's Guide to MillenialsFresh Digital Group
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty PresentationRay Brannon
 
A fresh look at digital safety, citizenship
A fresh look at digital safety, citizenshipA fresh look at digital safety, citizenship
A fresh look at digital safety, citizenshipAnne Collier
 
Ch12.global culture
Ch12.global cultureCh12.global culture
Ch12.global cultureBill Kovarik
 
Dyer portfolio essay technology and the changing brain rvsd
Dyer portfolio essay technology and the changing brain rvsdDyer portfolio essay technology and the changing brain rvsd
Dyer portfolio essay technology and the changing brain rvsdmdyer15
 
Government 2.0: architecting for collaboration
Government 2.0: architecting for collaborationGovernment 2.0: architecting for collaboration
Government 2.0: architecting for collaborationTara Hunt
 
goviral Cannes 2012, Generation Social
goviral Cannes 2012, Generation Social goviral Cannes 2012, Generation Social
goviral Cannes 2012, Generation Social Mads Holmen
 

La actualidad más candente (19)

Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and Consequences
 
How Piracy Led to Digital Distribution
How Piracy Led to Digital DistributionHow Piracy Led to Digital Distribution
How Piracy Led to Digital Distribution
 
Transforming the Library through Gamification
Transforming the Library through GamificationTransforming the Library through Gamification
Transforming the Library through Gamification
 
The app age
The app ageThe app age
The app age
 
E-learning: The Dark Side?
E-learning: The Dark Side?E-learning: The Dark Side?
E-learning: The Dark Side?
 
The Past and Future of Open Computing
The Past and Future of Open ComputingThe Past and Future of Open Computing
The Past and Future of Open Computing
 
Five marketing trends in 2012
Five marketing trends in 2012Five marketing trends in 2012
Five marketing trends in 2012
 
Raising Children in a Digital Age (Evening Session)
Raising Children in a Digital Age (Evening Session)Raising Children in a Digital Age (Evening Session)
Raising Children in a Digital Age (Evening Session)
 
Applying Gamification to Higher Education and Libraries
Applying Gamification to Higher Education and LibrariesApplying Gamification to Higher Education and Libraries
Applying Gamification to Higher Education and Libraries
 
Mi-ACE Mc-ICE Keynote - Vision for Innovation in Technology
Mi-ACE Mc-ICE Keynote - Vision for Innovation in TechnologyMi-ACE Mc-ICE Keynote - Vision for Innovation in Technology
Mi-ACE Mc-ICE Keynote - Vision for Innovation in Technology
 
Children parents electronic_devices_russia
Children parents electronic_devices_russiaChildren parents electronic_devices_russia
Children parents electronic_devices_russia
 
A Marketer's Guide to Millenials
A Marketer's Guide to MillenialsA Marketer's Guide to Millenials
A Marketer's Guide to Millenials
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty Presentation
 
A fresh look at digital safety, citizenship
A fresh look at digital safety, citizenshipA fresh look at digital safety, citizenship
A fresh look at digital safety, citizenship
 
The Future of Incarceration
The Future of IncarcerationThe Future of Incarceration
The Future of Incarceration
 
Ch12.global culture
Ch12.global cultureCh12.global culture
Ch12.global culture
 
Dyer portfolio essay technology and the changing brain rvsd
Dyer portfolio essay technology and the changing brain rvsdDyer portfolio essay technology and the changing brain rvsd
Dyer portfolio essay technology and the changing brain rvsd
 
Government 2.0: architecting for collaboration
Government 2.0: architecting for collaborationGovernment 2.0: architecting for collaboration
Government 2.0: architecting for collaboration
 
goviral Cannes 2012, Generation Social
goviral Cannes 2012, Generation Social goviral Cannes 2012, Generation Social
goviral Cannes 2012, Generation Social
 

Destacado

Cipa history 2000
Cipa history 2000Cipa history 2000
Cipa history 2000nielson900
 
Protection of children over the internet
Protection of children over the internetProtection of children over the internet
Protection of children over the internetCiaran Moran
 
Cyber safety m harrold
Cyber safety m harroldCyber safety m harrold
Cyber safety m harroldMegan
 
Reliance on Social Media
Reliance on Social MediaReliance on Social Media
Reliance on Social MediaBlake Davies
 
CIPA Children's Internet Protection Act
CIPA Children's Internet Protection ActCIPA Children's Internet Protection Act
CIPA Children's Internet Protection Actgibb0
 
CIPA Overview
CIPA OverviewCIPA Overview
CIPA Overviewedtecher
 
Child Protection Policy & Bullying
Child Protection Policy & BullyingChild Protection Policy & Bullying
Child Protection Policy & BullyingRaffy Paller
 
The Protection of Children from Sexual Offences (POCSO) Act, 2012 and Rules
The Protection of Children from Sexual Offences (POCSO) Act, 2012 and RulesThe Protection of Children from Sexual Offences (POCSO) Act, 2012 and Rules
The Protection of Children from Sexual Offences (POCSO) Act, 2012 and RulesBPACofficial
 

Destacado (11)

Cipa history 2000
Cipa history 2000Cipa history 2000
Cipa history 2000
 
DeepNines CIPA Whitepaper
DeepNines CIPA WhitepaperDeepNines CIPA Whitepaper
DeepNines CIPA Whitepaper
 
Protection of children over the internet
Protection of children over the internetProtection of children over the internet
Protection of children over the internet
 
Cyber safety m harrold
Cyber safety m harroldCyber safety m harrold
Cyber safety m harrold
 
Reliance on Social Media
Reliance on Social MediaReliance on Social Media
Reliance on Social Media
 
CIPA Children's Internet Protection Act
CIPA Children's Internet Protection ActCIPA Children's Internet Protection Act
CIPA Children's Internet Protection Act
 
CIPA Overview
CIPA OverviewCIPA Overview
CIPA Overview
 
Safety @ Cyber
Safety @ CyberSafety @ Cyber
Safety @ Cyber
 
Child Protection Policy & Bullying
Child Protection Policy & BullyingChild Protection Policy & Bullying
Child Protection Policy & Bullying
 
The Protection of Children from Sexual Offences (POCSO) Act, 2012 and Rules
The Protection of Children from Sexual Offences (POCSO) Act, 2012 and RulesThe Protection of Children from Sexual Offences (POCSO) Act, 2012 and Rules
The Protection of Children from Sexual Offences (POCSO) Act, 2012 and Rules
 
Child protection policy
Child protection policyChild protection policy
Child protection policy
 

Similar a Internet Safety

Challenging trust in the digital age - SMBW - 03/04/2019
Challenging trust in the digital age - SMBW - 03/04/2019Challenging trust in the digital age - SMBW - 03/04/2019
Challenging trust in the digital age - SMBW - 03/04/2019Denys Malengreau
 
Social media and Missing workshop
Social media and Missing workshopSocial media and Missing workshop
Social media and Missing workshopRay Brannon
 
Chapter 5_IT, Culture and Society.pptx
Chapter 5_IT, Culture and Society.pptxChapter 5_IT, Culture and Society.pptx
Chapter 5_IT, Culture and Society.pptxnorwinadriatico
 
Hum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyHum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyRay Brannon
 
How to protect yourself in e world?
How to protect yourself in e world? How to protect yourself in e world?
How to protect yourself in e world? Dipak Parmar
 
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxA. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxamandaschilling75
 
Children and Online Safety
Children and Online SafetyChildren and Online Safety
Children and Online Safetyalandang
 
Digital identity as a professional asset - ECS Barcelona - 21/02/2019
Digital identity as a professional asset - ECS Barcelona - 21/02/2019Digital identity as a professional asset - ECS Barcelona - 21/02/2019
Digital identity as a professional asset - ECS Barcelona - 21/02/2019Denys Malengreau
 
FILM260 Flipbook On Gen Z And Cyberparenting
FILM260 Flipbook On Gen Z And CyberparentingFILM260 Flipbook On Gen Z And Cyberparenting
FILM260 Flipbook On Gen Z And CyberparentingClaire Gray
 
Parent workshop - Social Networks
Parent workshop - Social NetworksParent workshop - Social Networks
Parent workshop - Social NetworksClint Hamada
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative mediaAnies Syahieda
 
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.Donovan Gopaul
 
Privacy flip book assignment film 260 queensu kc
Privacy flip book assignment  film 260  queensu kcPrivacy flip book assignment  film 260  queensu kc
Privacy flip book assignment film 260 queensu kcCatherine Cowperthwaite
 
Is technology helping children's development
Is technology helping children's developmentIs technology helping children's development
Is technology helping children's developmentCallum O'Hanlon
 

Similar a Internet Safety (20)

10 Overriding Themes from SXSW (March 2014)
10 Overriding Themes from SXSW (March 2014)10 Overriding Themes from SXSW (March 2014)
10 Overriding Themes from SXSW (March 2014)
 
Challenging trust in the digital age - SMBW - 03/04/2019
Challenging trust in the digital age - SMBW - 03/04/2019Challenging trust in the digital age - SMBW - 03/04/2019
Challenging trust in the digital age - SMBW - 03/04/2019
 
Social media and Missing workshop
Social media and Missing workshopSocial media and Missing workshop
Social media and Missing workshop
 
Chapter 5_IT, Culture and Society.pptx
Chapter 5_IT, Culture and Society.pptxChapter 5_IT, Culture and Society.pptx
Chapter 5_IT, Culture and Society.pptx
 
Flipbook (3) (1)
Flipbook (3) (1)Flipbook (3) (1)
Flipbook (3) (1)
 
Flipbook
FlipbookFlipbook
Flipbook
 
Hum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyHum 140: Social Media: Privacy
Hum 140: Social Media: Privacy
 
How to protect yourself in e world?
How to protect yourself in e world? How to protect yourself in e world?
How to protect yourself in e world?
 
Flipbook
FlipbookFlipbook
Flipbook
 
Big Data Paper
Big Data PaperBig Data Paper
Big Data Paper
 
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxA. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
 
Children and Online Safety
Children and Online SafetyChildren and Online Safety
Children and Online Safety
 
Digital identity as a professional asset - ECS Barcelona - 21/02/2019
Digital identity as a professional asset - ECS Barcelona - 21/02/2019Digital identity as a professional asset - ECS Barcelona - 21/02/2019
Digital identity as a professional asset - ECS Barcelona - 21/02/2019
 
Digital tattoo - what's yours?
Digital tattoo - what's yours?Digital tattoo - what's yours?
Digital tattoo - what's yours?
 
FILM260 Flipbook On Gen Z And Cyberparenting
FILM260 Flipbook On Gen Z And CyberparentingFILM260 Flipbook On Gen Z And Cyberparenting
FILM260 Flipbook On Gen Z And Cyberparenting
 
Parent workshop - Social Networks
Parent workshop - Social NetworksParent workshop - Social Networks
Parent workshop - Social Networks
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative media
 
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
 
Privacy flip book assignment film 260 queensu kc
Privacy flip book assignment  film 260  queensu kcPrivacy flip book assignment  film 260  queensu kc
Privacy flip book assignment film 260 queensu kc
 
Is technology helping children's development
Is technology helping children's developmentIs technology helping children's development
Is technology helping children's development
 

Más de Jason Seliskar

Chromebook Collaboration
Chromebook Collaboration Chromebook Collaboration
Chromebook Collaboration Jason Seliskar
 
AppleTV in the Classrooom
AppleTV in the ClassrooomAppleTV in the Classrooom
AppleTV in the ClassrooomJason Seliskar
 
Intro to Flipped Classroom - TeachMeetNJ12
Intro to Flipped Classroom - TeachMeetNJ12Intro to Flipped Classroom - TeachMeetNJ12
Intro to Flipped Classroom - TeachMeetNJ12Jason Seliskar
 
Going Wild with Weebly
Going Wild with WeeblyGoing Wild with Weebly
Going Wild with WeeblyJason Seliskar
 
Going Green with iMovie
Going Green with iMovieGoing Green with iMovie
Going Green with iMovieJason Seliskar
 
Examining Internet Use Among Low-Income Students
Examining Internet Use Among Low-Income StudentsExamining Internet Use Among Low-Income Students
Examining Internet Use Among Low-Income StudentsJason Seliskar
 
Google Apps Security Whitepaper
Google Apps Security WhitepaperGoogle Apps Security Whitepaper
Google Apps Security WhitepaperJason Seliskar
 
What Technology Preparation is Needed?
What Technology Preparation is Needed?What Technology Preparation is Needed?
What Technology Preparation is Needed?Jason Seliskar
 
Google+for+Teachers+II
Google+for+Teachers+IIGoogle+for+Teachers+II
Google+for+Teachers+IIJason Seliskar
 
Advocating for Educational Technologies
Advocating for Educational TechnologiesAdvocating for Educational Technologies
Advocating for Educational TechnologiesJason Seliskar
 
Marven of the Great NorthWoods
Marven of the Great NorthWoodsMarven of the Great NorthWoods
Marven of the Great NorthWoodsJason Seliskar
 
Chapter One Vocabulary
Chapter One VocabularyChapter One Vocabulary
Chapter One VocabularyJason Seliskar
 
Back to School Presentation
Back to School PresentationBack to School Presentation
Back to School PresentationJason Seliskar
 

Más de Jason Seliskar (16)

Chromebook Collaboration
Chromebook Collaboration Chromebook Collaboration
Chromebook Collaboration
 
AppleTV in the Classrooom
AppleTV in the ClassrooomAppleTV in the Classrooom
AppleTV in the Classrooom
 
Common Core 101
Common Core 101Common Core 101
Common Core 101
 
Intro to Flipped Classroom - TeachMeetNJ12
Intro to Flipped Classroom - TeachMeetNJ12Intro to Flipped Classroom - TeachMeetNJ12
Intro to Flipped Classroom - TeachMeetNJ12
 
Going Wild with Weebly
Going Wild with WeeblyGoing Wild with Weebly
Going Wild with Weebly
 
Going Green with iMovie
Going Green with iMovieGoing Green with iMovie
Going Green with iMovie
 
Star writing review
Star writing reviewStar writing review
Star writing review
 
K12 Overview Pamphlet
K12 Overview PamphletK12 Overview Pamphlet
K12 Overview Pamphlet
 
Examining Internet Use Among Low-Income Students
Examining Internet Use Among Low-Income StudentsExamining Internet Use Among Low-Income Students
Examining Internet Use Among Low-Income Students
 
Google Apps Security Whitepaper
Google Apps Security WhitepaperGoogle Apps Security Whitepaper
Google Apps Security Whitepaper
 
What Technology Preparation is Needed?
What Technology Preparation is Needed?What Technology Preparation is Needed?
What Technology Preparation is Needed?
 
Google+for+Teachers+II
Google+for+Teachers+IIGoogle+for+Teachers+II
Google+for+Teachers+II
 
Advocating for Educational Technologies
Advocating for Educational TechnologiesAdvocating for Educational Technologies
Advocating for Educational Technologies
 
Marven of the Great NorthWoods
Marven of the Great NorthWoodsMarven of the Great NorthWoods
Marven of the Great NorthWoods
 
Chapter One Vocabulary
Chapter One VocabularyChapter One Vocabulary
Chapter One Vocabulary
 
Back to School Presentation
Back to School PresentationBack to School Presentation
Back to School Presentation
 

Último

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Último (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Internet Safety

  • 1. Internet Safety http://www.jasonseliskar.com Saturday, December 29, 12
  • 2. Children James 1:17 - Every good gift and every perfect gift is from above, coming down from the Father of lights with whom there is no variation or shadow due to change. Proverbs 22:6 - Train up a child in the way he should go; even when he is old he will not depart from it. Saturday, December 29, 12
  • 4. The rate of growth of Internet use in the United States is currently two million new Internet users per month. (According to: A Nation Online: How Americans Are Expanding Their Use of the Internet, 2002) Saturday, December 29, 12
  • 5. 13 million youth use Instant Messaging.. Pew Study reported in Journal of the American Medical Association, a.k.a. JAMA Saturday, December 29, 12
  • 6. Ninety percent of children between the ages of 5 and 17 (or 48 million) now use computers. (According to: A Nation Online: How Americans Are Expanding Their Use of the Internet, 2002) Saturday, December 29, 12
  • 7. Access 93% of teens (12-17) go online. [1] Lenhart A. Social Media and Young Adults. Pew Internet and American Life Project, 2010. Saturday, December 29, 12
  • 8. Cell Phones 75% of teens (12-17) have cell phones. On average, texting teens (12-17) send and receive 1500 text messages a month. [3] Lenhart A. Teens and Mobile Phones. Pew Internet and American Life Project, 2010. Saturday, December 29, 12
  • 9. Cyberbullying 1 in 3 teens (12-17) have experienced online harassment. Girls are more likely to be victims of cyberbullying (38% girls vs. 26% boys). Lenhart A. Cyberbullying and Online Teens. Pew Internet and American Life Project, 2007. Saturday, December 29, 12
  • 10. Social Networking 73% of teens (12-17) have profiles on social networking sites. 47% of teens (12-17) have uploaded photos; 14 % have posted videos. [15] Lenhart A. Social Media and Young Adults. Pew Internet & American Life Project, 2010. [16] Lehart A. Teens and Social Media. Pew Internet & American Life Project, 2007. Saturday, December 29, 12
  • 11. Children's Online Privacy Protection Act of 1998 (COPPA) Saturday, December 29, 12
  • 12. Children's Online Privacy Protection Act of 1998 (COPPA) The revised rule expands the list of "personal information" that cannot be collected from children under 13 without parental consent to include location, photographs and videos. Read more here: http://www.sacbee.com/2012/12/29/5081182/limit-on-kids-data-may-be-a-milestone.html#storylink=misearch#storylink=cpy Saturday, December 29, 12
  • 13. Update for Tablets and Smartphone (apps) Children's Online Privacy Protection Act of 1998 (COPPA) It forbids child-directed apps and websites to track children's activities on the Internet or to pass their data on to other companies without their parents' knowledge. Read more here: http://www.sacbee.com/2012/12/29/5081182/limit-on-kids-data-may-be-a-milestone.html#storylink=misearch#storylink=cpy Saturday, December 29, 12
  • 15. Update for Tablets and Smartphone (apps) Children's Online Privacy Protection Act of 1998 (COPPA) The tech industry, which lobbied against the changes, warns that overregulation of data collection will stifle innovation, increase costs for consumers and put some app developers and websites out of business. Read more here: http://www.sacbee.com/2012/12/29/5081182/limit-on-kids-data-may-be-a-milestone.html#storylink=misearch#storylink=cpy Saturday, December 29, 12
  • 16. Update for Tablets and Smartphone (apps) Children's Online Privacy Protection Act of 1998 (COPPA) “Almost 60 percent of the apps reviewed by FTC staff transmitted data from a child's device back to the app developer or to an advertising network, analytics company or other third party. Using information from multiple apps, the third parties could develop detailed profiles of children based on their behavior in the apps, the report stated.” Read more here: http://www.sacbee.com/2012/12/29/5081182/limit-on-kids-data-may-be-a-milestone.html#storylink=misearch#storylink=cpy Saturday, December 29, 12
  • 17. What do we use the Internet for? Socialize Communicate Create Playing Exploring Learning Saturday, December 29, 12
  • 18. The Internet has great uses, EXCEPT.... Porn Predators Viruses Sexting Game sites Scams Hate sites Others... Saturday, December 29, 12
  • 19. Social Media Facebook Google + Instagram Twitter Texting Skyping Many others... Saturday, December 29, 12
  • 21. Online Activity - blogs - wikis - email - social media - gaming - bookmarking - instant messaging - video conferencing Saturday, December 29, 12
  • 22. What are the older kids doing... At greater risk than younger kids • More independent • More intrigued • Easily lured to inappropriate site/person • Need parent awareness • Need freedom Saturday, December 29, 12
  • 23. Keep an eye out for... online often/night inappropriate files/images strange phone calls has another account changes sites/covers monitor empty browser history withdrawn Saturday, December 29, 12
  • 24. Tips •Child’s computer in open area •Communication •Regularly review files & browser history •Teach responsible use for online resources •Talk to your child of online dangers •Educate yourself on ins and outs of Internet •Safe Search Saturday, December 29, 12
  • 26. Communication Digital Citizenship Awareness Safety Saturday, December 29, 12
  • 28. Internet Safety http://www.jasonseliskar.com/internetsafety http://www.jasonseliskar.com Saturday, December 29, 12