This document provides an overview of internet safety topics for parents and students. It discusses internet predators, cyberbullying, personal profiles, plagiarism, viruses, and parental tips. Specific dangers covered include predators in social media and chat rooms, data and identity theft, malware, and inappropriate content. Advice is offered on setting privacy settings, monitoring online activities, and educating children about safe internet use.
2. Welcome
Internet Landscape
Dangers on the Internet
Internet Predators
Cyberbullying
Personal profiles
Internet Chat
Gaming
Cell phones
Plagiarism & Intellectual
Property
Malicious
Codes, Viruses, and
Spyware
Parent Tips and
resources
Q & A
3. ―everything that‘s already in the world when
you‘re born is just normal;
anything that gets invented between then and
before you turn thirty is incredibly exciting and
creative and with any luck you can make a
career out of it;
anything that gets invented after you‘re thirty is
against the natural order of things and the
beginning of the end of civilization as we know it
until it‘s been around for about ten years when it
gradually turns out to be alright really.‖
4. The Internet has dramatically changed our
world and is a part of our everyday lives
ADULTS’ VIEW
Communication – email, texting
Shopping and services (booking travel)
Financial management
News and product research
Entertainment – videos, music, games
5. The Internet has dramatically changed our
world and is a part of our everyday lives
STUDENTS’ VIEW
Communication – texting, instant
messaging, email
Entertainment – games, music, videos
Research – homework, study sites
6. In May 2009, children aged 2-11 made
up nearly 10% of the active online
universe (Nielsen, 2010).
18% of 8 – 10 year olds spend time on
some kind of social networking site daily
(Kaiser, 2010).
http://www.commonsensemedia.org/sites/default/files/intern
etsafetyelem-tip.pdf
7.
8.
9. 1. Predators--social networking sites, chat rooms
2. Data theft--stolen passwords, addresses, Social
Security numbers, credit card numbers, and other
financial information
3. Malicious software (also known as malware)--
adware, spyware, viruses, phishing scams
4. Inappropriate content--pornography, content
focused on violence, hate propaganda
5. Cyberbullying--bullying peers via instant messages,
social networking sites, online games
http://www.cnet.com/4520-13384_1-6721368-1.html
11. 13% of youth ages 10 to 17 received
unwanted solicitations in 2006; this
decreased from 19% in 2001
Most youth handled unwanted
solicitations easily and effectively by
ignoring, blocking solicitors or leaving the
site
2006 study by the Crimes Against Children Research Center at the University of
New Hampshire
Youth report that solicitation occurs
more frequently by other minors than
adult strangers
Internet Safety Technical Task Force in 2008
12.
13.
14. Cyberbullying is emerging as one of the
more challenging issues facing
educators and parents as young people
embrace the Internet and other mobile
communication technologies.
15.
16.
17. Outing and Trickery – Sharing someone‘s
secrets or embarrassing information or
images online
Exclusion – Intentionally keeping
someone from being able to take part in
an online group, such as a ―buddy list.‖
Cyberstalking – Repeatedly sending
unwanted messages that may include
threats of harm; intimidating
18. Flaming – Online ―fights‖ using electronic
messages with inappropriate language
Harassment – Repeatedly sending
offensive, rude, and insulting messages
Denigration – Sending or posting gossip
or rumors about a person
Impersonation – Posing to be someone
else and making them look bad
19.
20. Tell your child not to respond to rude e-mails, messages, and
comments.
Save the evidence, such as e-mail and text messages, and
take screenshots of comments and images. Also, take note of
the date and time when the harassment occurs.
Contact your Internet service provider (ISP) or cell phone
provider. Ask the website administrator or ISP to remove any
Web page created to hurt your child.
If harassment is via e-mail, social networking sites, IM, and
chat rooms, instruct your child to ―block‖ bullies or delete your
child‘s current account and open a new one.
Check out phone features that may allow the number to be
blocked.
Make a report to www.cybertipline.com, and if you feel
something illegal has occurred, inform law enforcement
Information from Netsmartz Kids: http://www.netsmartz.org/Cyberbullying
21. ―Google‖ yourself
› Type in first and last name, email addresses,
screen names, addresses, phone numbers
› search for images as well
22. Facebook ,Myspace
› Age requirements
“No information from children under age 13.”
› Public vs Private
› Know who you add: friends vs cyberfriends
› Have access to your child‘s site
› Be conscientious of pictures/videos
Protecting reputations online, in plain English
(commoncraft.com)
23. Takes advantage of the privacy settings
Parent pre-approve of all pictures and videos
Remind your child
› never to post e-mail addresses or cell phone
numbers.
› passwords should only be shared with parents and
guardians.
› Do not respond to any e-mails requesting personal
information and to delete e-mails from unknown
senders.
Discuss how to keep screen names and e-mail
addresses gender-neutral, appropriate, and free of any
information that could reveal identity.
Encourage your child to tell you right away if anything
happens online that bothers or frightens him or her.
Information from Netsmartz Kids: http://www.netsmartz.org/RevealingTooMuch
25. SMS (short message service) aka texting
Wikipedia and netlingo.com list of
internet slang
› http://en.wiktionary.org/wiki/Appendix:Intern
et_slang
› http://www.netlingo.com/acronyms.php
LOL
BRB
POS
ASL
28. Know the safety features on the gaming equipment that your
child uses—a headset may have voice-masking features, for
example.
Keep gaming consoles in an easy-to-supervise location
Be aware of other places where your child may be accessing
games.
Tell your child never to give out personal information while
gaming or agree to meet anyone outside of the game.
Teach your child not to respond to anyone who is being rude
or bullying while playing the game.
Set rules for how long your child may play, what types of
games are appropriate, and who else may participate.
Have your child check with you before using a credit or debit
card online.
Check to see if the games your child plays have reporting
features or moderators.
Information from Netsmartz Kids: http://www.netsmartz.org/Gaming
29. About 75% of teens (12-17) carry cell
phones
1 in 3 teens (13-19) use their cell phone
to surf the web
Results from Teens and Mobile phones, Pew Internet and Amerian Life
Project, 2010
A Generation Unplugged, Harris Interactive, 2008
30. Review cell phone records for any unknown
numbers and late night phone calls and texts.
Remind your child that texting is viral—anything
sent in a text can be easily forwarded and shared.
Teach your child never to reveal cell phone
numbers or passwords online.
Talk to your child about the possible consequences
of sending sexually explicit or provocative images
or text messages.
When shopping for a cell phone for your child,
research the security settings that are available.
From Netsmartz Kids : http://www.netsmartz.org/CellPhones
33. Computer system
› Keeping bad stuff (predatory software) out
– keeping valuables(personal information) in
Malicious codes: viruses, worms, Trojan
Parasitical malware: spyware, adware
34.
35. www.cyberpatrol.com
www.netnanny.com
www.spectorsoft.com
www.cybersitter.com
www.covenanteyes.com
Anti spyware and adware programs
www.spybot.com (Spybot S &D)
www.adaware.com (lavasoft product)
36.
37. Video from www.commonsense.org
› http://www.commonsensemedia.org/advic
e-for-parents/rules-road-parents-digital-age
38. Guard your identity
› Make username generic and anonymous
› Little information is needed to get to know
you
Monitor your child‘s computer use
Use favorites
Understand the services your child uses
Know usernames, passwords, and e-mail
39. Know child‘s ―online friends‖
Don‘t overreact to anything your child
tells you (fear you will take computer
away)
Never meet anyone met online
Keep your computer up-to-date
› windowsupdate.microsoft.com
› Virus protection
› Firewall
43. http://www.cyberbullying.us/research.php
Bullying, Beyond the Schoolyard, by
Hinduja and Patchin
http://www.cnet.com/4520-13384_1-
6721368-1.html Top 5 Dangers article
http://www.cnet.com/4520-13384_1-
6721401-1.html?tag=lwt;lcol Think Before
You Click Worksheet
44. Thank you for your attendance at
today‘s presentation!
Make sure you have signed in before you
leave
Powerpoint link:
Notas do Editor
Read slide
to understand this complex issue, it is important to start with perspective. Brief uses by adults
Brief uses by students
Points: cell phone is highest, and many have data plans the uses lists are almost all related to communication/social this survey was done before the release of tablets (ipad, kindle, nook…)
Points: cell phone is highest, and many have data plans the uses lists are almost all related to communication/social this survey was done before the release of tablets (ipad, kindle, nook…)
An article on Cnet stated it very concisely, the tope 5 dangers for kids….
Unfortunately the exposure to sexual and pornographic materials have become more of a problem as internet access becomes easierHarassment via digital devices has also increased
A video I saw was about a HS boy adding a ‘female’ ‘friend’ to his fb…. This person scowered his account to find out all he could about him, convinced him to do a video chat, took images, and then tried to blackmail the boy when the ‘female friend’ who was actually an older man, was threatened to be exposed because he was reported.