SlideShare una empresa de Scribd logo
1 de 10
How Safe Are Our ChildrenOn the Internet By Stephen Wright
What Are the Dangers Pornography Predators Cyber Bullying Viruses Social Networking
Pornography 60% of all websites are pornographic 1 in 4 children who use the Internet regularly, will be exposed to unwanted sexual material
Predators Pedophiles represent the most dangerous aspect of the Internet one in five children age 10-17 who regularly use the Internet have received a sexual solicitation Chat rooms and instant messages are two main tools pedophiles use to contact children
Cyber Bullying  Cyber bullying is the use of technology to harass, threaten, embarrass, or target another person. One in three teens have been the victims of cyber bullying Severe cyber bullying can leave victims at greater risk for anxiety, depression, and other stress-related disorders.
Viruses Malicious programs include worms, macros, phishing, spam, and rootkits. These programs are designed to disrupt  your computer, steel information and identities. Viruses can give hackers unwanted assess to you  computer.
Social Networking Parents my feel a false sence of security when they see who their kids are friending on line.  But that Doesn't reveal key details about your child's friends Forces you to wade through hours of teenaged gossip May actually embarrass your child, even if you're well intentioned!
Strategies for Safe Internet Use Many internet providers offer child safe sites that will Find out where your child has online accounts Know who your child is "friends" with online Get notified if your child posts about violence, suicide or drugs See photos posted by or tagged with your child
Strategies for Safe Internet Use Be aware of what your children are doing online Look for changes in moods such as depression Keep firewalls in place and have good anti virus software.   Don’t be afraid to limit access Keep informed on internet issues.
References Clear Traffic http://www.cleartraffic.com/keeping-kids-safe.htm Kid Health http://kidshealth.org/parent/positive/talk/cyberbullying.html#  COMPUTER VIRUSES by Markus Hanhisalohttp://www.tml.tkk.fi/Opinnot/Tik-110.501/1997/viruses.html

Más contenido relacionado

La actualidad más candente

Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
Lawrence Fine
 
Formative Task - Safe Internet Usage
Formative Task - Safe Internet UsageFormative Task - Safe Internet Usage
Formative Task - Safe Internet Usage
aligi
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
Trevschic
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
Ernest Staats
 

La actualidad más candente (20)

My protection plan
My protection planMy protection plan
My protection plan
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Common sense technology policy2
Common sense technology policy2Common sense technology policy2
Common sense technology policy2
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
 
McKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullyingMcKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullying
 
Formative Task - Safe Internet Usage
Formative Task - Safe Internet UsageFormative Task - Safe Internet Usage
Formative Task - Safe Internet Usage
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
Internet saftey
Internet safteyInternet saftey
Internet saftey
 

Similar a How safe are our children

Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
cpitchford
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
ronak56
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
sheenau
 

Similar a How safe are our children (20)

Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentation
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 

Más de stevewrightco (13)

36 things
36 things36 things
36 things
 
Top twelve wright power point
Top twelve wright power pointTop twelve wright power point
Top twelve wright power point
 
Wow that’s a billon Frog One
Wow that’s a billon Frog OneWow that’s a billon Frog One
Wow that’s a billon Frog One
 
Wow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying EagleWow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying Eagle
 
Wow that’s a billion by Sky Eagle One
Wow that’s a billion by Sky Eagle OneWow that’s a billion by Sky Eagle One
Wow that’s a billion by Sky Eagle One
 
Dustin.r billion
Dustin.r billionDustin.r billion
Dustin.r billion
 
Wow that’s a billon by Frog One
Wow that’s a billon by Frog OneWow that’s a billon by Frog One
Wow that’s a billon by Frog One
 
Wow that’s a billon by Frog One
Wow that’s a billon by Frog OneWow that’s a billon by Frog One
Wow that’s a billon by Frog One
 
Wow that’s a billon by Frog One
Wow that’s a billon by Frog OneWow that’s a billon by Frog One
Wow that’s a billon by Frog One
 
Wow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying EagleWow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying Eagle
 
Wow that’s a billion georgie and anna
Wow that’s a billion georgie and annaWow that’s a billion georgie and anna
Wow that’s a billion georgie and anna
 
Wow That's a BilloinSpeed Racer
Wow That's a BilloinSpeed RacerWow That's a BilloinSpeed Racer
Wow That's a BilloinSpeed Racer
 
Wow that’s a billion by Sky Eagle 1
Wow that’s a billion by Sky Eagle 1Wow that’s a billion by Sky Eagle 1
Wow that’s a billion by Sky Eagle 1
 

Último

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Último (20)

The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 

How safe are our children

  • 1. How Safe Are Our ChildrenOn the Internet By Stephen Wright
  • 2. What Are the Dangers Pornography Predators Cyber Bullying Viruses Social Networking
  • 3. Pornography 60% of all websites are pornographic 1 in 4 children who use the Internet regularly, will be exposed to unwanted sexual material
  • 4. Predators Pedophiles represent the most dangerous aspect of the Internet one in five children age 10-17 who regularly use the Internet have received a sexual solicitation Chat rooms and instant messages are two main tools pedophiles use to contact children
  • 5. Cyber Bullying Cyber bullying is the use of technology to harass, threaten, embarrass, or target another person. One in three teens have been the victims of cyber bullying Severe cyber bullying can leave victims at greater risk for anxiety, depression, and other stress-related disorders.
  • 6. Viruses Malicious programs include worms, macros, phishing, spam, and rootkits. These programs are designed to disrupt your computer, steel information and identities. Viruses can give hackers unwanted assess to you computer.
  • 7. Social Networking Parents my feel a false sence of security when they see who their kids are friending on line. But that Doesn't reveal key details about your child's friends Forces you to wade through hours of teenaged gossip May actually embarrass your child, even if you're well intentioned!
  • 8. Strategies for Safe Internet Use Many internet providers offer child safe sites that will Find out where your child has online accounts Know who your child is "friends" with online Get notified if your child posts about violence, suicide or drugs See photos posted by or tagged with your child
  • 9. Strategies for Safe Internet Use Be aware of what your children are doing online Look for changes in moods such as depression Keep firewalls in place and have good anti virus software. Don’t be afraid to limit access Keep informed on internet issues.
  • 10. References Clear Traffic http://www.cleartraffic.com/keeping-kids-safe.htm Kid Health http://kidshealth.org/parent/positive/talk/cyberbullying.html#  COMPUTER VIRUSES by Markus Hanhisalohttp://www.tml.tkk.fi/Opinnot/Tik-110.501/1997/viruses.html