SlideShare uma empresa Scribd logo
1 de 46
Internet safety/i-Safe Parent Presentation Spring 2011 Kaneland School District #302 Presented by: Ms. Carrie Svihlik Detective Keith Smith
Is This Your Child?
Agenda ,[object Object]
Internet Landscape
Internet Predators
Personal profiles
Internet Chat
Gaming
Cyberbullying
Cell phones
Plagiarism & Intellectual Property
Malicious Codes, Viruses, and Spyware
Parent Tips and resources
Q & A,[object Object]
Internet Landscape The Internet has dramatically changed our world and is a part of our everyday lives ADULTS’ VIEW Communication – email, texting Shopping and services Financial management News Entertainment – videos, music, games
Internet Landscape	 The Internet has dramatically changed our world and is a part of our everyday lives STUDENTS’ VIEW Communication – texting, instant messaging, email Entertainment – games, music, videos Research – homework, colleges
Basic student use of technology
Risky student online behavior 53% like being alone when “surfing” the Internet.* 12% have unsupervised access to the Internet at school.** 10% chat, e-mail or Instant Message (IM) while at school.** 39% have given out personal information (name, e-mail address, age, gender) online (when entering a contest, playing online games or signing up for websites).* 31% have chatted or used IM with someone on the Internet that they have not met “face to face”.* 12% have met a new person from the Internet “face to face.”* 13% are willing to meet “face to face” with someone new they meet on the Internet.* 8% say that, while on the Internet, someone has asked them to keep their friendship a secret.* 53% have seen something on the Internet that shouldn’t be on the Internet.** 64% know of or have heard about other students who have done something on the Internet that shouldn’t be done.* * Combined 2003/2004 and 2004/2005 i-SAFE survey of 55,000 students ** 2004-05 i-SAFE survey of 36,000 students *** 2003-04 i-SAFE survey of 19,000 students
What Do We Do? Educate parents Educate students Get Informed! Teach students to be responsible cyber citizens
Internet Predators Christina Long Story
Statistics: National Center of Missing & Exploited Children Youth internet safety survey, ages 10-17
Personal Profiles and your online presence “Google” yourself – Be sure to search for images, as well as your phone number.  If it finds it, you will notice a map. – Google Earth.
Big Brother is watching you!
Personal Profiles: Social Networking Sites Facebook ,Myspace Age requirements  “No information from children under age 13.” Public vs Private Know who you add: friends vscyberfriends Have access to your child’s site Be conscientious of pictures/videos Protecting reputations online, in plain English (commoncraft.com)  How You Present Yourself (wiredsafety.org)
Personal Profiles Tips  Make sure that your child takes advantage of the privacy settings on social networking sites. Pre-approve the pictures and videos your child posts online. Remind your child never to post e-mail addresses or cell phone numbers. Tell your child that passwords should only be shared with parents and guardians. Teach your child not to respond to any e-mails requesting personal information and to delete e-mails from unknown senders. Discuss how to keep screen names and e-mail addresses gender-neutral, appropriate, and free of any information that could reveal identity. Encourage your child to tell you right away if anything happens online that bothers or frightens him or her. Information from Netsmartz Kids: http://www.netsmartz.org/RevealingTooMuch
Communication Text messaging Chat rooms Instant messaging (‘IMing’) Online gaming – gaming devices Message boards blogs
SMS lingo LOL POS BRB ASL SMS (short message service) aka texting Wikipedia list of internet slang http://en.wiktionary.org/wiki/Appendix:Internet_slang
Gaming	 Online: Webkinz, Neopets, Miniclip,  Gaming systems: PSP, Xbox Live, PS3, Wii Handheld devices: Ipod touch, Ipad, cell phones
Gaming Tips  Know which safety features are available on the gaming equipment that your child uses—a headset may have voice-masking features, for example.  Keep gaming consoles in an easy-to-supervise location and be aware of other places where your child may be accessing games.  Tell your child never to give out personal information while gaming or agree to meet anyone outside of the game.  Teach your child not to respond to anyone who is being rude or bullying while playing the game.  Set rules for how long your child may play, what types of games are appropriate, and who else may participate.  Have your child check with you before using a credit or debit card online.  Check to see if the games your child plays have reporting features or moderators. Information from Netsmartz Kids: http://www.netsmartz.org/Gaming
Cyberbullying Cyberbullying is emerging as one of the more challenging issues facing educators and parents as young people embrace the Internet and other mobile communication technologies. Cyberbullying video
Cyberbullying data 2010
Cyberbullying data 2010
Cyberbullying Flaming – Online “fights” using electronic messages with inappropriate language Harassment – Repeatedly sending offensive, rude, and insulting messages Denigration – Sending or posting gossip or rumors about a person  Impersonation – Posing to be someone else and making them look bad
Cyberbullying Outing and Trickery – Sharing someone’s secrets or embarrassing information or images online Exclusion – Intentionally keeping someone from being able to take part in an online group, such as a “buddy list.” Cyberstalking – Repeatedly sending unwanted messages that may include threats of harm; intimidating
Cyberbullying Tips Tell your child not to respond to rude e-mails, messages, and comments.  Save the evidence, such as e-mail and text messages, and take screenshots of comments and images. Also, take note of the date and time when the harassment occurs.  Contact your Internet service provider (ISP) or cell phone provider. Ask the website administrator or ISP to remove any Web page created to hurt your child.  If harassment is via e-mail, social networking sites, IM, and chat rooms, instruct your child to “block” bullies or delete your child’s current account and open a new one.  Check out phone features that may allow the number to be blocked.  Make a report to www.cybertipline.com, and if you feel something illegal has occurred, inform law enforcement Information from Netsmartz Kids: http://www.netsmartz.org/Cyberbullying
Cell Phones About 75% of teens (12-17) carry cell phones 1 in 3 teens (13-19) use their cell phone to surf the web Results from Teens and Mobile phones, Pew Internet and Americnl Life Project, 2010 A Generation Unplugged, Harris Interactive, 2008
Basic Cell Phone rules: Review cell phone records for any unknown numbers and late night phone calls and texts.  Remind your child that texting is viral—anything sent in a text can be easily forwarded and shared.  Teach your child never to reveal cell phone numbers or passwords online.  Talk to your child about the possible consequences of sending sexually explicit or provocative images or text messages.  When shopping for a cell phone for your child, research the security settings that are available. From NetsmartzKids : http://www.netsmartz.org/CellPhones
Cell phones At+T Phones and internet: http://www.att.net/s/s.dll?ep=1659430&ch=smct/smct_is Verizon https://wbillpay.verizonwireless.com/vzw/nos/uc/uc_overview.jsp Sprint http://www.sprint.com/landings/family/safety.html
Plagiarism & Intellectual Property Music Downloads Napster  Itunes Kazaa WinMX Limewire etorrent Copyright Material Identity Theft Website Validity www.turnitin.com
Malicious Codes, Viruses, and Spyware Computer system Keeping bad stuff (predatory software)out– keeping valuables(personal information) in Malicious codes: viruses, worms, trojan Parasitical malware: spyware, adware

Mais conteúdo relacionado

Mais procurados

Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017KanelandSvihlik
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016KanelandSvihlik
 
Digital dangers pp1
Digital dangers pp1Digital dangers pp1
Digital dangers pp1YanelysRuiz1
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018KanelandSvihlik
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And KidsSandra Fathi
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for childrenKumar Manish
 
Digital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital WorldDigital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital WorldDebra Hargrove
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011DHE2008
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 

Mais procurados (20)

Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
Digital dangers pp1
Digital dangers pp1Digital dangers pp1
Digital dangers pp1
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Digital wellness and your family internet upload
Digital wellness and your family   internet uploadDigital wellness and your family   internet upload
Digital wellness and your family internet upload
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
Digital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital WorldDigital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital World
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 

Destaque

Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
Multimedia technology
Multimedia technologyMultimedia technology
Multimedia technologyVishnu Ram
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
multimedia technologies Introduction
multimedia technologies Introductionmultimedia technologies Introduction
multimedia technologies IntroductionMohammed Fareed
 
Multimedia presentation
  Multimedia presentation   Multimedia presentation
Multimedia presentation kamalesh2015
 
basics of computer system ppt
basics of computer system pptbasics of computer system ppt
basics of computer system pptSuaj
 
multimedia element
multimedia elementmultimedia element
multimedia elementAZMAN KADIR
 

Destaque (8)

Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Multimedia technology
Multimedia technologyMultimedia technology
Multimedia technology
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
multimedia technologies Introduction
multimedia technologies Introductionmultimedia technologies Introduction
multimedia technologies Introduction
 
Multimedia presentation
  Multimedia presentation   Multimedia presentation
Multimedia presentation
 
basics of computer system ppt
basics of computer system pptbasics of computer system ppt
basics of computer system ppt
 
multimedia element
multimedia elementmultimedia element
multimedia element
 
Multimedia
MultimediaMultimedia
Multimedia
 

Semelhante a Internet safety presentation 2011

Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
My protection plan
My protection planMy protection plan
My protection planShakena12
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parentswstagnaro
 
Internet safety 2010
Internet safety 2010Internet safety 2010
Internet safety 2010Nancy Gross
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safetyFred Miller
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Ollie Bray
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010paul
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019KanelandSvihlik
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Brochure
BrochureBrochure
Brochurejrj6819
 

Semelhante a Internet safety presentation 2011 (20)

Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
My protection plan
My protection planMy protection plan
My protection plan
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety St Mary's Wollongong
Internet Safety St Mary's WollongongInternet Safety St Mary's Wollongong
Internet Safety St Mary's Wollongong
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet safety 2010
Internet safety 2010Internet safety 2010
Internet safety 2010
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Brochure
BrochureBrochure
Brochure
 
Legalissues
LegalissuesLegalissues
Legalissues
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Último (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Internet safety presentation 2011

  • 1. Internet safety/i-Safe Parent Presentation Spring 2011 Kaneland School District #302 Presented by: Ms. Carrie Svihlik Detective Keith Smith
  • 2. Is This Your Child?
  • 3.
  • 13. Parent Tips and resources
  • 14.
  • 15. Internet Landscape The Internet has dramatically changed our world and is a part of our everyday lives ADULTS’ VIEW Communication – email, texting Shopping and services Financial management News Entertainment – videos, music, games
  • 16. Internet Landscape The Internet has dramatically changed our world and is a part of our everyday lives STUDENTS’ VIEW Communication – texting, instant messaging, email Entertainment – games, music, videos Research – homework, colleges
  • 17. Basic student use of technology
  • 18. Risky student online behavior 53% like being alone when “surfing” the Internet.* 12% have unsupervised access to the Internet at school.** 10% chat, e-mail or Instant Message (IM) while at school.** 39% have given out personal information (name, e-mail address, age, gender) online (when entering a contest, playing online games or signing up for websites).* 31% have chatted or used IM with someone on the Internet that they have not met “face to face”.* 12% have met a new person from the Internet “face to face.”* 13% are willing to meet “face to face” with someone new they meet on the Internet.* 8% say that, while on the Internet, someone has asked them to keep their friendship a secret.* 53% have seen something on the Internet that shouldn’t be on the Internet.** 64% know of or have heard about other students who have done something on the Internet that shouldn’t be done.* * Combined 2003/2004 and 2004/2005 i-SAFE survey of 55,000 students ** 2004-05 i-SAFE survey of 36,000 students *** 2003-04 i-SAFE survey of 19,000 students
  • 19. What Do We Do? Educate parents Educate students Get Informed! Teach students to be responsible cyber citizens
  • 21.
  • 22.
  • 23. Statistics: National Center of Missing & Exploited Children Youth internet safety survey, ages 10-17
  • 24.
  • 25.
  • 26. Personal Profiles and your online presence “Google” yourself – Be sure to search for images, as well as your phone number. If it finds it, you will notice a map. – Google Earth.
  • 27. Big Brother is watching you!
  • 28. Personal Profiles: Social Networking Sites Facebook ,Myspace Age requirements “No information from children under age 13.” Public vs Private Know who you add: friends vscyberfriends Have access to your child’s site Be conscientious of pictures/videos Protecting reputations online, in plain English (commoncraft.com) How You Present Yourself (wiredsafety.org)
  • 29. Personal Profiles Tips Make sure that your child takes advantage of the privacy settings on social networking sites. Pre-approve the pictures and videos your child posts online. Remind your child never to post e-mail addresses or cell phone numbers. Tell your child that passwords should only be shared with parents and guardians. Teach your child not to respond to any e-mails requesting personal information and to delete e-mails from unknown senders. Discuss how to keep screen names and e-mail addresses gender-neutral, appropriate, and free of any information that could reveal identity. Encourage your child to tell you right away if anything happens online that bothers or frightens him or her. Information from Netsmartz Kids: http://www.netsmartz.org/RevealingTooMuch
  • 30. Communication Text messaging Chat rooms Instant messaging (‘IMing’) Online gaming – gaming devices Message boards blogs
  • 31. SMS lingo LOL POS BRB ASL SMS (short message service) aka texting Wikipedia list of internet slang http://en.wiktionary.org/wiki/Appendix:Internet_slang
  • 32.
  • 33. Gaming Online: Webkinz, Neopets, Miniclip, Gaming systems: PSP, Xbox Live, PS3, Wii Handheld devices: Ipod touch, Ipad, cell phones
  • 34. Gaming Tips Know which safety features are available on the gaming equipment that your child uses—a headset may have voice-masking features, for example. Keep gaming consoles in an easy-to-supervise location and be aware of other places where your child may be accessing games. Tell your child never to give out personal information while gaming or agree to meet anyone outside of the game. Teach your child not to respond to anyone who is being rude or bullying while playing the game. Set rules for how long your child may play, what types of games are appropriate, and who else may participate. Have your child check with you before using a credit or debit card online. Check to see if the games your child plays have reporting features or moderators. Information from Netsmartz Kids: http://www.netsmartz.org/Gaming
  • 35. Cyberbullying Cyberbullying is emerging as one of the more challenging issues facing educators and parents as young people embrace the Internet and other mobile communication technologies. Cyberbullying video
  • 38. Cyberbullying Flaming – Online “fights” using electronic messages with inappropriate language Harassment – Repeatedly sending offensive, rude, and insulting messages Denigration – Sending or posting gossip or rumors about a person Impersonation – Posing to be someone else and making them look bad
  • 39. Cyberbullying Outing and Trickery – Sharing someone’s secrets or embarrassing information or images online Exclusion – Intentionally keeping someone from being able to take part in an online group, such as a “buddy list.” Cyberstalking – Repeatedly sending unwanted messages that may include threats of harm; intimidating
  • 40.
  • 41. Cyberbullying Tips Tell your child not to respond to rude e-mails, messages, and comments. Save the evidence, such as e-mail and text messages, and take screenshots of comments and images. Also, take note of the date and time when the harassment occurs. Contact your Internet service provider (ISP) or cell phone provider. Ask the website administrator or ISP to remove any Web page created to hurt your child. If harassment is via e-mail, social networking sites, IM, and chat rooms, instruct your child to “block” bullies or delete your child’s current account and open a new one. Check out phone features that may allow the number to be blocked. Make a report to www.cybertipline.com, and if you feel something illegal has occurred, inform law enforcement Information from Netsmartz Kids: http://www.netsmartz.org/Cyberbullying
  • 42. Cell Phones About 75% of teens (12-17) carry cell phones 1 in 3 teens (13-19) use their cell phone to surf the web Results from Teens and Mobile phones, Pew Internet and Americnl Life Project, 2010 A Generation Unplugged, Harris Interactive, 2008
  • 43. Basic Cell Phone rules: Review cell phone records for any unknown numbers and late night phone calls and texts. Remind your child that texting is viral—anything sent in a text can be easily forwarded and shared. Teach your child never to reveal cell phone numbers or passwords online. Talk to your child about the possible consequences of sending sexually explicit or provocative images or text messages. When shopping for a cell phone for your child, research the security settings that are available. From NetsmartzKids : http://www.netsmartz.org/CellPhones
  • 44. Cell phones At+T Phones and internet: http://www.att.net/s/s.dll?ep=1659430&ch=smct/smct_is Verizon https://wbillpay.verizonwireless.com/vzw/nos/uc/uc_overview.jsp Sprint http://www.sprint.com/landings/family/safety.html
  • 45. Plagiarism & Intellectual Property Music Downloads Napster Itunes Kazaa WinMX Limewire etorrent Copyright Material Identity Theft Website Validity www.turnitin.com
  • 46. Malicious Codes, Viruses, and Spyware Computer system Keeping bad stuff (predatory software)out– keeping valuables(personal information) in Malicious codes: viruses, worms, trojan Parasitical malware: spyware, adware
  • 47.
  • 48.
  • 49. www.adaware.com (lavasoft product)www.cyberpatrol.com www.netnanny.com www.spectorsoft.com www.cybersitter.com
  • 50.
  • 51. Parent Tips Guard your identity Make username generic and anonymous Little information is needed to get to know you Monitor your child’s computer use Use favorites Understand the services your child uses Know usernames, passwords, and e-mail
  • 52. Parent Tips Know child’s “online friends” Don’t overreact to anything your child tells you (fear you will take computer away) Never meet anyone met online Keep your computer up-to-date windowsupdate.microsoft.com Virus protection Firewall
  • 53.
  • 54. Resources www.netsmartz.org www.isafe.org http://www.kidsmart.org.uk/ http://www.bbc.co.uk/cbbc/help/safesurfing/ www.wiredkids.org/index.html www.wiredsafety.org
  • 55. Resources http://www.thinkuknow.co.uk/default.aspx www.illinoisicac.org www.internet-safety.org www.safekids.com www.fbi.gov/publications/pguide/pguidee.htm www.staysafe.org
  • 56. Resources http://www.cyberbullying.us/research.php Bullying, Beyond the Schoolyard, by Hinduja and Patchin
  • 57. Q & A Thank you for your attendance at today’s presentation! Make sure you have signed in before you leave We hope you found it useful.