SlideShare uma empresa Scribd logo
1 de 44
 Welcome
 Internet Landscape
 Dangers on the Internet
 Internet Predators
 Cyberbullying
 Personal profiles
 Internet Chat
 Gaming
 Cell phones
 Plagiarism & Intellectual
Property
 Malicious
Codes, Viruses, and
Spyware
 Parent Tips and
resources
 Q & A
―everything that‘s already in the world when
you‘re born is just normal;
anything that gets invented between then and
before you turn thirty is incredibly exciting and
creative and with any luck you can make a
career out of it;
anything that gets invented after you‘re thirty is
against the natural order of things and the
beginning of the end of civilization as we know it
until it‘s been around for about ten years when it
gradually turns out to be alright really.‖
The Internet has dramatically changed our
world and is a part of our everyday lives
ADULTS’ VIEW
 Communication – email, texting
 Shopping and services (booking travel)
 Financial management
 News and product research
 Entertainment – videos, music, games
The Internet has dramatically changed our
world and is a part of our everyday lives
STUDENTS’ VIEW
 Communication – texting, instant
messaging, email
 Entertainment – games, music, videos
 Research – homework, study sites
 In May 2009, children aged 2-11 made
up nearly 10% of the active online
universe (Nielsen, 2010).
 18% of 8 – 10 year olds spend time on
some kind of social networking site daily
(Kaiser, 2010).
 http://www.commonsensemedia.org/sites/default/files/intern
etsafetyelem-tip.pdf
1. Predators--social networking sites, chat rooms
2. Data theft--stolen passwords, addresses, Social
Security numbers, credit card numbers, and other
financial information
3. Malicious software (also known as malware)--
adware, spyware, viruses, phishing scams
4. Inappropriate content--pornography, content
focused on violence, hate propaganda
5. Cyberbullying--bullying peers via instant messages,
social networking sites, online games
http://www.cnet.com/4520-13384_1-6721368-1.html
 Educate parents
 Educate students
 13% of youth ages 10 to 17 received
unwanted solicitations in 2006; this
decreased from 19% in 2001
 Most youth handled unwanted
solicitations easily and effectively by
ignoring, blocking solicitors or leaving the
site
 2006 study by the Crimes Against Children Research Center at the University of
New Hampshire
 Youth report that solicitation occurs
more frequently by other minors than
adult strangers
 Internet Safety Technical Task Force in 2008
 Cyberbullying is emerging as one of the
more challenging issues facing
educators and parents as young people
embrace the Internet and other mobile
communication technologies.
 Outing and Trickery – Sharing someone‘s
secrets or embarrassing information or
images online
 Exclusion – Intentionally keeping
someone from being able to take part in
an online group, such as a ―buddy list.‖
 Cyberstalking – Repeatedly sending
unwanted messages that may include
threats of harm; intimidating
 Flaming – Online ―fights‖ using electronic
messages with inappropriate language
 Harassment – Repeatedly sending
offensive, rude, and insulting messages
 Denigration – Sending or posting gossip
or rumors about a person
 Impersonation – Posing to be someone
else and making them look bad
 Tell your child not to respond to rude e-mails, messages, and
comments.
 Save the evidence, such as e-mail and text messages, and
take screenshots of comments and images. Also, take note of
the date and time when the harassment occurs.
 Contact your Internet service provider (ISP) or cell phone
provider. Ask the website administrator or ISP to remove any
Web page created to hurt your child.
 If harassment is via e-mail, social networking sites, IM, and
chat rooms, instruct your child to ―block‖ bullies or delete your
child‘s current account and open a new one.
 Check out phone features that may allow the number to be
blocked.
 Make a report to www.cybertipline.com, and if you feel
something illegal has occurred, inform law enforcement
 Information from Netsmartz Kids: http://www.netsmartz.org/Cyberbullying
 ―Google‖ yourself
› Type in first and last name, email addresses,
screen names, addresses, phone numbers
› search for images as well
 Facebook ,Myspace
› Age requirements
 “No information from children under age 13.”
› Public vs Private
› Know who you add: friends vs cyberfriends
› Have access to your child‘s site
› Be conscientious of pictures/videos
 Protecting reputations online, in plain English
(commoncraft.com)
 Takes advantage of the privacy settings
 Parent pre-approve of all pictures and videos
 Remind your child
› never to post e-mail addresses or cell phone
numbers.
› passwords should only be shared with parents and
guardians.
› Do not respond to any e-mails requesting personal
information and to delete e-mails from unknown
senders.
 Discuss how to keep screen names and e-mail
addresses gender-neutral, appropriate, and free of any
information that could reveal identity.
 Encourage your child to tell you right away if anything
happens online that bothers or frightens him or her.
 Information from Netsmartz Kids: http://www.netsmartz.org/RevealingTooMuch
 Text messaging
 Chat rooms
 Instant messaging (‗IMing‘)
 Online gaming – gaming devices
 Message boards
 Blogs and wikis
 SMS (short message service) aka texting
 Wikipedia and netlingo.com list of
internet slang
› http://en.wiktionary.org/wiki/Appendix:Intern
et_slang
› http://www.netlingo.com/acronyms.php
LOL
BRB
POS
ASL
 Online: Webkinz, Neopets, Miniclip,
 Gaming systems: PSP, Xbox Live, PS3, Wii
 Handheld devices: Ipod touch, Ipad, cell
phones
 Know the safety features on the gaming equipment that your
child uses—a headset may have voice-masking features, for
example.
 Keep gaming consoles in an easy-to-supervise location
 Be aware of other places where your child may be accessing
games.
 Tell your child never to give out personal information while
gaming or agree to meet anyone outside of the game.
 Teach your child not to respond to anyone who is being rude
or bullying while playing the game.
 Set rules for how long your child may play, what types of
games are appropriate, and who else may participate.
 Have your child check with you before using a credit or debit
card online.
 Check to see if the games your child plays have reporting
features or moderators.
 Information from Netsmartz Kids: http://www.netsmartz.org/Gaming
 About 75% of teens (12-17) carry cell
phones
 1 in 3 teens (13-19) use their cell phone
to surf the web
 Results from Teens and Mobile phones, Pew Internet and Amerian Life
Project, 2010
 A Generation Unplugged, Harris Interactive, 2008
 Review cell phone records for any unknown
numbers and late night phone calls and texts.
 Remind your child that texting is viral—anything
sent in a text can be easily forwarded and shared.
 Teach your child never to reveal cell phone
numbers or passwords online.
 Talk to your child about the possible consequences
of sending sexually explicit or provocative images
or text messages.
 When shopping for a cell phone for your child,
research the security settings that are available.
 From Netsmartz Kids : http://www.netsmartz.org/CellPhones
 At+T
› Phones and internet:
http://www.att.net/s/s.dll?ep=1659430&ch=s
mct/smct_is
 Verizon
› https://wbillpay.verizonwireless.com/vzw/nos
/uc/uc_overview.jsp
 Sprint
› http://www.sprint.com/landings/family/safet
y.html
 Music Downloads
› Napster
› Itunes
› Kazaa
› WinMX
› Limewire
› etorrent
 Copyright Material
 Identity Theft
 Website Validity
 www.turnitin.com
 Computer system
› Keeping bad stuff (predatory software) out
– keeping valuables(personal information) in
 Malicious codes: viruses, worms, Trojan
 Parasitical malware: spyware, adware
 www.cyberpatrol.com
 www.netnanny.com
 www.spectorsoft.com
 www.cybersitter.com
 www.covenanteyes.com
Anti spyware and adware programs
 www.spybot.com (Spybot S &D)
 www.adaware.com (lavasoft product)
 Video from www.commonsense.org
› http://www.commonsensemedia.org/advic
e-for-parents/rules-road-parents-digital-age
 Guard your identity
› Make username generic and anonymous
› Little information is needed to get to know
you
 Monitor your child‘s computer use
 Use favorites
 Understand the services your child uses
 Know usernames, passwords, and e-mail
 Know child‘s ―online friends‖
 Don‘t overreact to anything your child
tells you (fear you will take computer
away)
 Never meet anyone met online
 Keep your computer up-to-date
› windowsupdate.microsoft.com
› Virus protection
› Firewall
 www.netsmartz.org
 www.isafe.org
 http://www.commonsensemedia.
org/educators/parent-media-
education
 http://www.kidsmart.org.uk/
 http://www.thinkuknow.co.uk/def
ault.aspx
 www.illinoisicac.org
 www.internet-safety.org
 www.safekids.com
 http://www.bbc.co.uk/cbbc/help/saf
esurfing/
 www.wiredkids.org/index.html
 www.wiredsafety.org
 www.fbi.gov/publications/pguide/pg
uidee.htm
 www.staysafe.org
 http://www.cyberbullying.us/research.php
 Bullying, Beyond the Schoolyard, by
Hinduja and Patchin
 http://www.cnet.com/4520-13384_1-
6721368-1.html Top 5 Dangers article
 http://www.cnet.com/4520-13384_1-
6721401-1.html?tag=lwt;lcol Think Before
You Click Worksheet
Thank you for your attendance at
today‘s presentation!
Make sure you have signed in before you
leave
Powerpoint link:

Mais conteúdo relacionado

Mais procurados

Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kidskwazy
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And KidsSandra Fathi
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internetmalissa_1041
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for childrenKumar Manish
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital worldDan Bowen
 
internet safety 2013
internet safety 2013internet safety 2013
internet safety 2013Brian Downey
 
Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...Rajeev Ranjan
 

Mais procurados (20)

Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kids
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Myspace
MyspaceMyspace
Myspace
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
Digital wellness and your family internet upload
Digital wellness and your family   internet uploadDigital wellness and your family   internet upload
Digital wellness and your family internet upload
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
What Parents Should Know
What Parents Should KnowWhat Parents Should Know
What Parents Should Know
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
 
internet safety 2013
internet safety 2013internet safety 2013
internet safety 2013
 
Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Semelhante a Internet safety presentation 2013

Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019KanelandSvihlik
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
My protection plan
My protection planMy protection plan
My protection planShakena12
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011DHE2008
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parentswstagnaro
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parentssirchriss
 
Internet safety 2010
Internet safety 2010Internet safety 2010
Internet safety 2010Nancy Gross
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 

Semelhante a Internet safety presentation 2013 (20)

Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
My protection plan
My protection planMy protection plan
My protection plan
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Internet Safety St Mary's Wollongong
Internet Safety St Mary's WollongongInternet Safety St Mary's Wollongong
Internet Safety St Mary's Wollongong
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
Internet safety 2010
Internet safety 2010Internet safety 2010
Internet safety 2010
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 

Último

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 

Último (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Internet safety presentation 2013

  • 1.
  • 2.  Welcome  Internet Landscape  Dangers on the Internet  Internet Predators  Cyberbullying  Personal profiles  Internet Chat  Gaming  Cell phones  Plagiarism & Intellectual Property  Malicious Codes, Viruses, and Spyware  Parent Tips and resources  Q & A
  • 3. ―everything that‘s already in the world when you‘re born is just normal; anything that gets invented between then and before you turn thirty is incredibly exciting and creative and with any luck you can make a career out of it; anything that gets invented after you‘re thirty is against the natural order of things and the beginning of the end of civilization as we know it until it‘s been around for about ten years when it gradually turns out to be alright really.‖
  • 4. The Internet has dramatically changed our world and is a part of our everyday lives ADULTS’ VIEW  Communication – email, texting  Shopping and services (booking travel)  Financial management  News and product research  Entertainment – videos, music, games
  • 5. The Internet has dramatically changed our world and is a part of our everyday lives STUDENTS’ VIEW  Communication – texting, instant messaging, email  Entertainment – games, music, videos  Research – homework, study sites
  • 6.  In May 2009, children aged 2-11 made up nearly 10% of the active online universe (Nielsen, 2010).  18% of 8 – 10 year olds spend time on some kind of social networking site daily (Kaiser, 2010).  http://www.commonsensemedia.org/sites/default/files/intern etsafetyelem-tip.pdf
  • 7.
  • 8.
  • 9. 1. Predators--social networking sites, chat rooms 2. Data theft--stolen passwords, addresses, Social Security numbers, credit card numbers, and other financial information 3. Malicious software (also known as malware)-- adware, spyware, viruses, phishing scams 4. Inappropriate content--pornography, content focused on violence, hate propaganda 5. Cyberbullying--bullying peers via instant messages, social networking sites, online games http://www.cnet.com/4520-13384_1-6721368-1.html
  • 10.  Educate parents  Educate students
  • 11.  13% of youth ages 10 to 17 received unwanted solicitations in 2006; this decreased from 19% in 2001  Most youth handled unwanted solicitations easily and effectively by ignoring, blocking solicitors or leaving the site  2006 study by the Crimes Against Children Research Center at the University of New Hampshire  Youth report that solicitation occurs more frequently by other minors than adult strangers  Internet Safety Technical Task Force in 2008
  • 12.
  • 13.
  • 14.  Cyberbullying is emerging as one of the more challenging issues facing educators and parents as young people embrace the Internet and other mobile communication technologies.
  • 15.
  • 16.
  • 17.  Outing and Trickery – Sharing someone‘s secrets or embarrassing information or images online  Exclusion – Intentionally keeping someone from being able to take part in an online group, such as a ―buddy list.‖  Cyberstalking – Repeatedly sending unwanted messages that may include threats of harm; intimidating
  • 18.  Flaming – Online ―fights‖ using electronic messages with inappropriate language  Harassment – Repeatedly sending offensive, rude, and insulting messages  Denigration – Sending or posting gossip or rumors about a person  Impersonation – Posing to be someone else and making them look bad
  • 19.
  • 20.  Tell your child not to respond to rude e-mails, messages, and comments.  Save the evidence, such as e-mail and text messages, and take screenshots of comments and images. Also, take note of the date and time when the harassment occurs.  Contact your Internet service provider (ISP) or cell phone provider. Ask the website administrator or ISP to remove any Web page created to hurt your child.  If harassment is via e-mail, social networking sites, IM, and chat rooms, instruct your child to ―block‖ bullies or delete your child‘s current account and open a new one.  Check out phone features that may allow the number to be blocked.  Make a report to www.cybertipline.com, and if you feel something illegal has occurred, inform law enforcement  Information from Netsmartz Kids: http://www.netsmartz.org/Cyberbullying
  • 21.  ―Google‖ yourself › Type in first and last name, email addresses, screen names, addresses, phone numbers › search for images as well
  • 22.  Facebook ,Myspace › Age requirements  “No information from children under age 13.” › Public vs Private › Know who you add: friends vs cyberfriends › Have access to your child‘s site › Be conscientious of pictures/videos  Protecting reputations online, in plain English (commoncraft.com)
  • 23.  Takes advantage of the privacy settings  Parent pre-approve of all pictures and videos  Remind your child › never to post e-mail addresses or cell phone numbers. › passwords should only be shared with parents and guardians. › Do not respond to any e-mails requesting personal information and to delete e-mails from unknown senders.  Discuss how to keep screen names and e-mail addresses gender-neutral, appropriate, and free of any information that could reveal identity.  Encourage your child to tell you right away if anything happens online that bothers or frightens him or her.  Information from Netsmartz Kids: http://www.netsmartz.org/RevealingTooMuch
  • 24.  Text messaging  Chat rooms  Instant messaging (‗IMing‘)  Online gaming – gaming devices  Message boards  Blogs and wikis
  • 25.  SMS (short message service) aka texting  Wikipedia and netlingo.com list of internet slang › http://en.wiktionary.org/wiki/Appendix:Intern et_slang › http://www.netlingo.com/acronyms.php LOL BRB POS ASL
  • 26.
  • 27.  Online: Webkinz, Neopets, Miniclip,  Gaming systems: PSP, Xbox Live, PS3, Wii  Handheld devices: Ipod touch, Ipad, cell phones
  • 28.  Know the safety features on the gaming equipment that your child uses—a headset may have voice-masking features, for example.  Keep gaming consoles in an easy-to-supervise location  Be aware of other places where your child may be accessing games.  Tell your child never to give out personal information while gaming or agree to meet anyone outside of the game.  Teach your child not to respond to anyone who is being rude or bullying while playing the game.  Set rules for how long your child may play, what types of games are appropriate, and who else may participate.  Have your child check with you before using a credit or debit card online.  Check to see if the games your child plays have reporting features or moderators.  Information from Netsmartz Kids: http://www.netsmartz.org/Gaming
  • 29.  About 75% of teens (12-17) carry cell phones  1 in 3 teens (13-19) use their cell phone to surf the web  Results from Teens and Mobile phones, Pew Internet and Amerian Life Project, 2010  A Generation Unplugged, Harris Interactive, 2008
  • 30.  Review cell phone records for any unknown numbers and late night phone calls and texts.  Remind your child that texting is viral—anything sent in a text can be easily forwarded and shared.  Teach your child never to reveal cell phone numbers or passwords online.  Talk to your child about the possible consequences of sending sexually explicit or provocative images or text messages.  When shopping for a cell phone for your child, research the security settings that are available.  From Netsmartz Kids : http://www.netsmartz.org/CellPhones
  • 31.  At+T › Phones and internet: http://www.att.net/s/s.dll?ep=1659430&ch=s mct/smct_is  Verizon › https://wbillpay.verizonwireless.com/vzw/nos /uc/uc_overview.jsp  Sprint › http://www.sprint.com/landings/family/safet y.html
  • 32.  Music Downloads › Napster › Itunes › Kazaa › WinMX › Limewire › etorrent  Copyright Material  Identity Theft  Website Validity  www.turnitin.com
  • 33.  Computer system › Keeping bad stuff (predatory software) out – keeping valuables(personal information) in  Malicious codes: viruses, worms, Trojan  Parasitical malware: spyware, adware
  • 34.
  • 35.  www.cyberpatrol.com  www.netnanny.com  www.spectorsoft.com  www.cybersitter.com  www.covenanteyes.com Anti spyware and adware programs  www.spybot.com (Spybot S &D)  www.adaware.com (lavasoft product)
  • 36.
  • 37.  Video from www.commonsense.org › http://www.commonsensemedia.org/advic e-for-parents/rules-road-parents-digital-age
  • 38.  Guard your identity › Make username generic and anonymous › Little information is needed to get to know you  Monitor your child‘s computer use  Use favorites  Understand the services your child uses  Know usernames, passwords, and e-mail
  • 39.  Know child‘s ―online friends‖  Don‘t overreact to anything your child tells you (fear you will take computer away)  Never meet anyone met online  Keep your computer up-to-date › windowsupdate.microsoft.com › Virus protection › Firewall
  • 40.  www.netsmartz.org  www.isafe.org  http://www.commonsensemedia. org/educators/parent-media- education  http://www.kidsmart.org.uk/
  • 42.  http://www.bbc.co.uk/cbbc/help/saf esurfing/  www.wiredkids.org/index.html  www.wiredsafety.org  www.fbi.gov/publications/pguide/pg uidee.htm  www.staysafe.org
  • 43.  http://www.cyberbullying.us/research.php  Bullying, Beyond the Schoolyard, by Hinduja and Patchin  http://www.cnet.com/4520-13384_1- 6721368-1.html Top 5 Dangers article  http://www.cnet.com/4520-13384_1- 6721401-1.html?tag=lwt;lcol Think Before You Click Worksheet
  • 44. Thank you for your attendance at today‘s presentation! Make sure you have signed in before you leave Powerpoint link:

Notas do Editor

  1. Read slide
  2. to understand this complex issue, it is important to start with perspective. Brief uses by adults
  3. Brief uses by students
  4. Points: cell phone is highest, and many have data plans the uses lists are almost all related to communication/social this survey was done before the release of tablets (ipad, kindle, nook…)
  5. Points: cell phone is highest, and many have data plans the uses lists are almost all related to communication/social this survey was done before the release of tablets (ipad, kindle, nook…)
  6. An article on Cnet stated it very concisely, the tope 5 dangers for kids….
  7. Unfortunately the exposure to sexual and pornographic materials have become more of a problem as internet access becomes easierHarassment via digital devices has also increased
  8. A video I saw was about a HS boy adding a ‘female’ ‘friend’ to his fb…. This person scowered his account to find out all he could about him, convinced him to do a video chat, took images, and then tried to blackmail the boy when the ‘female friend’ who was actually an older man, was threatened to be exposed because he was reported.
  9. What do we tell our kids to do?