SlideShare una empresa de Scribd logo
1 de 27
INTERNET EDUCATION CLASSES FOR PARENTS Presented by the  St. Martin’s Episcopal School Technology Department HAZARDS and BENEFITS of the INTERNET
AGENDA ,[object Object],[object Object],[object Object],[object Object]
SUPPOSITIONS ,[object Object]
[object Object],SUPPOSITIONS
Any computer-literate child can view adult pornography, such as images that appear in  Playboy  or  Penthouse , as well as pornography that is prosecutable as obscenity, which might include pictures of women having sex with animals; men engaged in sexual acts with children; and the rape, torture, and mutilation of women.
INTERNET DANGERS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Children can access such pornography in two ways: unintentionally  intentionally
[object Object],Unintentional Access Children can inadvertently access pornography in several ways:
[object Object],Unintentional Access Children can inadvertently access pornography in several ways:
[object Object],Unintentional Access Children can inadvertently access pornography in several ways:
[object Object],Unintentional Access Children can inadvertently access pornography in several ways:
[object Object],Unintentional Access Children can inadvertently access pornography in several ways:
[object Object],Unintentional Access Children can inadvertently access pornography in several ways:
[object Object],Unintentional Access Children can inadvertently access pornography in several ways:
[object Object]
[object Object],Intentional Access Even the most diligent parental guidance and supervision sometimes do not deter a child who is determined to view pornography on the Internet.
POSITIVES ,[object Object]
POSITIVES ,[object Object]
POSITIVES ,[object Object]
POSITIVES ,[object Object]
POSITIVES ,[object Object]
POSITIVES ,[object Object]
POSITIVES ,[object Object]
POSITIVES ,[object Object]
How can the Internet become safe for my child, my family, and future generations? ,[object Object]
How can the Internet become safe for my child, my family, and future generations? ,[object Object]
Resources ,[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Online safety
Online safetyOnline safety
Online safety
elioar8
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
amulhall
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
kirshee
 

La actualidad más candente (20)

Online safety Ofsted 2015
Online safety Ofsted 2015Online safety Ofsted 2015
Online safety Ofsted 2015
 
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online HabitsE Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
 
Online safety
Online safetyOnline safety
Online safety
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Safe Surfing for your Kids
Safe Surfing for your KidsSafe Surfing for your Kids
Safe Surfing for your Kids
 
Parent Internet Safety Guide English
Parent Internet Safety Guide EnglishParent Internet Safety Guide English
Parent Internet Safety Guide English
 
Chatting with Kids About Being Online
Chatting with Kids About Being OnlineChatting with Kids About Being Online
Chatting with Kids About Being Online
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Techandkids
TechandkidsTechandkids
Techandkids
 
Net Cetera | Provided by: FTC
Net Cetera | Provided by: FTCNet Cetera | Provided by: FTC
Net Cetera | Provided by: FTC
 
Lotrecchiano grace
Lotrecchiano graceLotrecchiano grace
Lotrecchiano grace
 
The TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech SafetyThe TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech Safety
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 

Similar a Benefitsandhazards

Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
egregory
 
Kid Safety On The Internet
Kid Safety On The InternetKid Safety On The Internet
Kid Safety On The Internet
Jennifer Chilek
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
cpitchford
 
Parenting And The Internet Ppt
Parenting And The Internet PptParenting And The Internet Ppt
Parenting And The Internet Ppt
Mary Danko
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-children
Janet Weninger
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
tholman77
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011
DHE2008
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
Donna Murray
 

Similar a Benefitsandhazards (20)

Finalproject
FinalprojectFinalproject
Finalproject
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Kid Safety On The Internet
Kid Safety On The InternetKid Safety On The Internet
Kid Safety On The Internet
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Parenting And The Internet Ppt
Parenting And The Internet PptParenting And The Internet Ppt
Parenting And The Internet Ppt
 
Social networking leaflet
Social networking leafletSocial networking leaflet
Social networking leaflet
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-children
 
Parenting the MySpace Generation
Parenting the MySpace GenerationParenting the MySpace Generation
Parenting the MySpace Generation
 
Family Internet Safety - Cyber Bullying
Family Internet Safety - Cyber BullyingFamily Internet Safety - Cyber Bullying
Family Internet Safety - Cyber Bullying
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101
 

Último

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Último (20)

Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 

Benefitsandhazards

  • 1. INTERNET EDUCATION CLASSES FOR PARENTS Presented by the St. Martin’s Episcopal School Technology Department HAZARDS and BENEFITS of the INTERNET
  • 2.
  • 3.
  • 4.
  • 5. Any computer-literate child can view adult pornography, such as images that appear in Playboy or Penthouse , as well as pornography that is prosecutable as obscenity, which might include pictures of women having sex with animals; men engaged in sexual acts with children; and the rape, torture, and mutilation of women.
  • 6.
  • 7. Children can access such pornography in two ways: unintentionally intentionally
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.