SlideShare uma empresa Scribd logo
1 de 53
 Unlimited Educational Resources
 Learning about other places and cultures
 Stay in touch with family and friends
 Web Pages, Chat Rooms, Email, Video Conferencing &
Sharing, Photo Sharing (Flickr, Picasa, etc.), Blogging
 Make new friends
 Chat Rooms, Video Sharing (YouTube, etc.), Photo Sharing,
Blogs
 Work from home
 More can be accomplished in less time
 Business Transactions
 Researching
 Communication
 Purchasing
 Monitoring Bank Accounts & Stocks
 Text Messaging
(SMS – Short
Messaging Service)
 Web Pages
 E-mail
 Instant Messaging –
AOL IM, Yahoo
Messenger,
Windows
Messenger, ICQ,
etc.
 Blogging –
MySpace,
Friendster,
Facebook, yFly,
Twitter, etc.
 Podcasting –
iTunes, Podcast
Directory.com, etc.
 Video Sharing –
YouTube, Google
Video, Yahoo
Video, etc.
 Wikis – Wikipedia,
PB Wiki, etc.
 Gaming
Communities –
Runescape, etc.
Also known as Short
Message Service (SMS),
a service available on
most digital mobile
phones and other mobile
devices that permits the
sending of short text
messages.
“Ooh look, his first text message.”
www.wikipedia.com
Also known as IM, a
form of real-time
communication
between two or more
people based on typed
text. The text is
conveyed via
computers connected
over a network such as
the Internet.
www.wikipedia.com
 AOL Instant
Messenger
 ICQ
 MSN
Messenger
 Windows
Messenger
 Yahoo IM
 Google Talk
 Skype
You’re a model? Cool! I’m a
Chippendale’s Dancer. I also race
speed boats. What’s your sign?
A user-generated
website where
entries are made
in journal style.
Blogs often
provide
commentary or
news on a
particular subject,
such as food,
politics, or local
news.
www.wikipedia.com
 MySpace
 Xanga
 Friendster
 Facebook
 Tagged
 yFly
 Bebo
 YouTube
(video sharing)
 Flickr (photo
sharing)
A media file that is
distributed over the
Internet using
syndication feeds
(RSS), for
playback on portable
media players
and personal
computers.
www.wikipedia.com
 iTunes Podcasts
 Podcast Net
 The Podcast
Network
 Podcast
Directory
 Podcast Alley
 Podcast Pickle
 iPodder.org
 Yahoo Podcasts
 Podcasting
News
A website that allows the visitors themselves to
easily add, remove, and otherwise edit and change
available content.
http://en.wikipedia.org/wiki/Wiki
 Wikipedia
 PBwiki
 TWiki
 Yu-Gi-Oh!
Wikia
 FlexWiki
 Wikia
 WikiBios
Attempting to fraudulently acquire sensitive
information, such as usernames, passwords
and credit card details, by masquerading as
a trustworthy entity in an electronic
communication.
Typically carried out using email or an
instant message, and often directs users to a
website.
A hacker's attack
aiming to redirect a
website's traffic to
another (bogus)
website.
Pharming has become of
major concern to
businesses hosting
ecommerce and online
banking websites
Spam refers to
junk e-mail or
unsolicited e-mail.
Similar abuses in
other media: instant
messaging spam,
Usenet newsgroup
spam, Web search
engine spam, spam
in blogs, mobile
phone messaging
spam, etc.
Bullying and harassment by use of electronic
devices though means of e-mail, instant
messaging, text messages, blogs, mobile
phones, pagers, and websites.
 Cyberbullying: Feathers in
the Wind
 Peer-to-peer or file-sharing programs allow you to
share you files with others on the Internet – and
vice versa.
 Be wary about downloading files just as you would
an e-mail attachment from a stranger
 File-sharing networks create a risk for computer
viruses or harmful code to be shared
 Movies, songs, video games and other items on the
Web are protected by copyright laws
 If misconfigured, some file-sharing programs may
expose your entire hard drive to all other users of
the file-sharing software.
 LimeWire
 Morpheus
 Kazaa
 Make sure your computer is located in a
high-traffic area in the house. This includes
laptops and other wireless devices
 Communicate with your children about what
pornography is and why it is inappropriate
for them.
 Teach your child “Internal Filtering
Mechanisms” and how to avoid
pornography on the Web.
 Check your home computer for signs that
these types of sites have visited
Your computer has a powerful
search function which
can indicate if someone has
visited pornographic Web sites.
In Windows, click on the Start
button in the lower left hand of
your monitor, and slide up to
search, and slide over to "files
and folders."
Select “All files and folders”
from the window that appears.
You can inspect the folder where
cookies are to look for any
lewdly-named or suspicious
cookies. Type in the word cookie
in the search field and hit "search
now." Make sure the "Look in"
setting is set to look in your
primary hard drive, usually "C,"
although you may want to repeat
the search in any additional hard
drives.
Most Web images are in a format
that ends with either .jpg or .gif,
such as "bicycle.jpg" or "vase.gif".
When you view a Web site, these
images are stored in various places
on your hard drive. To find all such
images in your hard drive, put an
asterisk followed by a period in
front of the name of the image
format in the search window.
Open your web
browser (Internet
Explorer) and select
“Tools” and “Internet
Options”
Select “Settings” from
the “Browsing
history” section.
Select “View files” and a list
of cookies and picture files
will appear and show the
web sites where the files
originated.
*Note: if there are very few
of them, someone is most
likely deleting them from
the Temporary Internet Files
folder.
 Explain that there is explicit material on the
Internet, but it is not appropriate for the child
to view or seek it out
 Search engine results, even for innocent
topics, may occasionally include links to
inappropriate Web sites
 Teach your child to recognize lewd wording
and other clues to avoid actually viewing the
sites
 Teach them to recognize and avoid opening
sexually-explicit spam email
 Bookmark child-safe Web sites –
Yahooligans, Ask Kids, Kids Click, etc.
 Teach children to never open e-mail from
someone they don't know.
 If you or your child receives a message that is
harassing, of a sexual nature, or threatening,
forward a copy of the message to your ISP,
and ask for assistance.
 Develop household rules for use of the computer:
 How much time is allowed on the Web
 Acceptable vs. unacceptable activities
 What information should not be given out
 What the child should do if something makes him
or her uncomfortable
 Be a good role model; technology savvy children
may be able to tell if a parent has visited sexually-
explicit sites
 Create an environment where the child can
confide in you without fear of being punished
 Your Web browser software (Internet Explorer,
Firefox, Opera, etc.) contains very little or NO
history.
 There are several Web browsers installed on your
computer.
 Temporary files are deleted from the temporary
folder
 Web Browser search bar history is deleted
Software filters work by
blocking access to Web
sites with unacceptable
content or language. They
are imperfect and depend to
some extent on the Web
sites' honesty in classifying
themselves as x-rated.
Examples:
•Net Nanny
•Cyber Patrol
•Surf Patrol
“The Government’s Launched a
free Online filter to protect
children from Internet
Nasties…Um…Could you show
me how to download it…?”
Keystroke tracking programs
are spy software that monitor
every word typed, every
program launched and every
Web site visited. They do not
censor the content, but rather
send a report to the parent or
person who installed the spy
program.
Examples:
•Investigator
•Spector Pro
•Key Ghost
“I just can’t
communicate
with my child
anymore.
It’s like she
speaks
another
language.”
 Learn the Lingo – Learn
text Messaging (SMS)
 Take Interest & Be
Approachable
 Be Willing to Try New
Things
 Create Your Own Blog
or Web site
 Post to Groups & Wikis
 Subscribe to Podcasts
 Ask Your Children to
Teach You
 Keep Communication
Lines Open
 “Amy’s
Choice”
 “Julie’s
Journey”
 “Friends 24 Hours a Day”
 “Addicted to Facebook”
MySpace Parent Site
http://www.myspace.com/Modules/Common/
Pages/SafetyTips.aspx#
Facebook Parent Site
http://www.facebook.com/help.php?tab=safety
 Go to www.
myspace.
com
 Scroll to the
bottom of
the page.
 Select
“Safety
Tips”
 There are two
tabs located on
the page that
appears.
 One of the tabs is
labeled “Safety
Tips.” There are
several links to
other websites
that will help.
 The other tab is
labeled “Tips for
Parents.” Select
this tab.
 Read through
the tips for
parents and
the several
links to
websites for
parents.
 There is also a
link to remove
your child’s
profile from
this site.
http://markwhite85.googlepages.com/internetsafety

Mais conteúdo relacionado

Mais procurados

Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullyingkschermerhorn
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parentswstagnaro
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
Internet safety 2010
Internet safety 2010Internet safety 2010
Internet safety 2010Nancy Gross
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016KanelandSvihlik
 
Internet Use for Third & Fourth Graders
Internet Use for Third & Fourth GradersInternet Use for Third & Fourth Graders
Internet Use for Third & Fourth GradersBarb Jansen
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Using the Internet Safely
Using the Internet SafelyUsing the Internet Safely
Using the Internet SafelyJoanne Hewitt
 
Teaching The Net Generation
Teaching The  Net  GenerationTeaching The  Net  Generation
Teaching The Net GenerationGary Toews
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012KanelandSvihlik
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Going beyond google 2 philadelphia loss conference
Going beyond google 2 philadelphia loss conferenceGoing beyond google 2 philadelphia loss conference
Going beyond google 2 philadelphia loss conferencemikep007
 

Mais procurados (20)

Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullying
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Internet safety 2010
Internet safety 2010Internet safety 2010
Internet safety 2010
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
Internet Use for Third & Fourth Graders
Internet Use for Third & Fourth GradersInternet Use for Third & Fourth Graders
Internet Use for Third & Fourth Graders
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Using the Internet Safely
Using the Internet SafelyUsing the Internet Safely
Using the Internet Safely
 
Teaching The Net Generation
Teaching The  Net  GenerationTeaching The  Net  Generation
Teaching The Net Generation
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Dangers on the Internet
Dangers on the InternetDangers on the Internet
Dangers on the Internet
 
Going beyond google 2 philadelphia loss conference
Going beyond google 2 philadelphia loss conferenceGoing beyond google 2 philadelphia loss conference
Going beyond google 2 philadelphia loss conference
 

Semelhante a Internet Safety Guide For Parents & Teachers

Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Becybersmart
BecybersmartBecybersmart
BecybersmartVelma
 
Secure social networking
Secure social networkingSecure social networking
Secure social networkingOsaid To'meh
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundOnline Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundStephanie Barnhart
 
Untangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe OnlineUntangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe OnlineTodd Stanfield
 
Safe Surfing for your Kids
Safe Surfing for your KidsSafe Surfing for your Kids
Safe Surfing for your Kidspeterhitch
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Safe Internet Use
Safe Internet UseSafe Internet Use
Safe Internet Useschalman
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Techniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools SaferTechniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools Safernerakmac
 

Semelhante a Internet Safety Guide For Parents & Teachers (20)

Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 
Myspace
MyspaceMyspace
Myspace
 
Secure social networking
Secure social networkingSecure social networking
Secure social networking
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundOnline Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber Playground
 
Untangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe OnlineUntangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe Online
 
Safe Surfing for your Kids
Safe Surfing for your KidsSafe Surfing for your Kids
Safe Surfing for your Kids
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Safe Internet Use
Safe Internet UseSafe Internet Use
Safe Internet Use
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Techniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools SaferTechniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools Safer
 

Último

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 

Último (20)

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 

Internet Safety Guide For Parents & Teachers

  • 1.
  • 2.  Unlimited Educational Resources  Learning about other places and cultures  Stay in touch with family and friends  Web Pages, Chat Rooms, Email, Video Conferencing & Sharing, Photo Sharing (Flickr, Picasa, etc.), Blogging  Make new friends  Chat Rooms, Video Sharing (YouTube, etc.), Photo Sharing, Blogs  Work from home  More can be accomplished in less time  Business Transactions  Researching  Communication  Purchasing  Monitoring Bank Accounts & Stocks
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.  Text Messaging (SMS – Short Messaging Service)  Web Pages  E-mail  Instant Messaging – AOL IM, Yahoo Messenger, Windows Messenger, ICQ, etc.  Blogging – MySpace, Friendster, Facebook, yFly, Twitter, etc.
  • 9.  Podcasting – iTunes, Podcast Directory.com, etc.  Video Sharing – YouTube, Google Video, Yahoo Video, etc.  Wikis – Wikipedia, PB Wiki, etc.  Gaming Communities – Runescape, etc.
  • 10.
  • 11. Also known as Short Message Service (SMS), a service available on most digital mobile phones and other mobile devices that permits the sending of short text messages. “Ooh look, his first text message.” www.wikipedia.com
  • 12. Also known as IM, a form of real-time communication between two or more people based on typed text. The text is conveyed via computers connected over a network such as the Internet. www.wikipedia.com
  • 13.  AOL Instant Messenger  ICQ  MSN Messenger  Windows Messenger  Yahoo IM  Google Talk  Skype You’re a model? Cool! I’m a Chippendale’s Dancer. I also race speed boats. What’s your sign?
  • 14. A user-generated website where entries are made in journal style. Blogs often provide commentary or news on a particular subject, such as food, politics, or local news. www.wikipedia.com
  • 15.  MySpace  Xanga  Friendster  Facebook  Tagged  yFly  Bebo  YouTube (video sharing)  Flickr (photo sharing)
  • 16. A media file that is distributed over the Internet using syndication feeds (RSS), for playback on portable media players and personal computers. www.wikipedia.com
  • 17.  iTunes Podcasts  Podcast Net  The Podcast Network  Podcast Directory  Podcast Alley  Podcast Pickle  iPodder.org  Yahoo Podcasts  Podcasting News
  • 18. A website that allows the visitors themselves to easily add, remove, and otherwise edit and change available content. http://en.wikipedia.org/wiki/Wiki
  • 19.  Wikipedia  PBwiki  TWiki  Yu-Gi-Oh! Wikia  FlexWiki  Wikia  WikiBios
  • 20.
  • 21.
  • 22.
  • 23. Attempting to fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Typically carried out using email or an instant message, and often directs users to a website.
  • 24. A hacker's attack aiming to redirect a website's traffic to another (bogus) website. Pharming has become of major concern to businesses hosting ecommerce and online banking websites
  • 25. Spam refers to junk e-mail or unsolicited e-mail. Similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, mobile phone messaging spam, etc.
  • 26. Bullying and harassment by use of electronic devices though means of e-mail, instant messaging, text messages, blogs, mobile phones, pagers, and websites.
  • 28.  Peer-to-peer or file-sharing programs allow you to share you files with others on the Internet – and vice versa.  Be wary about downloading files just as you would an e-mail attachment from a stranger  File-sharing networks create a risk for computer viruses or harmful code to be shared  Movies, songs, video games and other items on the Web are protected by copyright laws  If misconfigured, some file-sharing programs may expose your entire hard drive to all other users of the file-sharing software.
  • 30.
  • 31.  Make sure your computer is located in a high-traffic area in the house. This includes laptops and other wireless devices  Communicate with your children about what pornography is and why it is inappropriate for them.  Teach your child “Internal Filtering Mechanisms” and how to avoid pornography on the Web.  Check your home computer for signs that these types of sites have visited
  • 32. Your computer has a powerful search function which can indicate if someone has visited pornographic Web sites. In Windows, click on the Start button in the lower left hand of your monitor, and slide up to search, and slide over to "files and folders."
  • 33. Select “All files and folders” from the window that appears.
  • 34. You can inspect the folder where cookies are to look for any lewdly-named or suspicious cookies. Type in the word cookie in the search field and hit "search now." Make sure the "Look in" setting is set to look in your primary hard drive, usually "C," although you may want to repeat the search in any additional hard drives.
  • 35. Most Web images are in a format that ends with either .jpg or .gif, such as "bicycle.jpg" or "vase.gif". When you view a Web site, these images are stored in various places on your hard drive. To find all such images in your hard drive, put an asterisk followed by a period in front of the name of the image format in the search window.
  • 36. Open your web browser (Internet Explorer) and select “Tools” and “Internet Options”
  • 37. Select “Settings” from the “Browsing history” section.
  • 38. Select “View files” and a list of cookies and picture files will appear and show the web sites where the files originated. *Note: if there are very few of them, someone is most likely deleting them from the Temporary Internet Files folder.
  • 39.  Explain that there is explicit material on the Internet, but it is not appropriate for the child to view or seek it out  Search engine results, even for innocent topics, may occasionally include links to inappropriate Web sites  Teach your child to recognize lewd wording and other clues to avoid actually viewing the sites  Teach them to recognize and avoid opening sexually-explicit spam email
  • 40.  Bookmark child-safe Web sites – Yahooligans, Ask Kids, Kids Click, etc.  Teach children to never open e-mail from someone they don't know.  If you or your child receives a message that is harassing, of a sexual nature, or threatening, forward a copy of the message to your ISP, and ask for assistance.
  • 41.  Develop household rules for use of the computer:  How much time is allowed on the Web  Acceptable vs. unacceptable activities  What information should not be given out  What the child should do if something makes him or her uncomfortable  Be a good role model; technology savvy children may be able to tell if a parent has visited sexually- explicit sites  Create an environment where the child can confide in you without fear of being punished
  • 42.  Your Web browser software (Internet Explorer, Firefox, Opera, etc.) contains very little or NO history.  There are several Web browsers installed on your computer.  Temporary files are deleted from the temporary folder  Web Browser search bar history is deleted
  • 43. Software filters work by blocking access to Web sites with unacceptable content or language. They are imperfect and depend to some extent on the Web sites' honesty in classifying themselves as x-rated. Examples: •Net Nanny •Cyber Patrol •Surf Patrol “The Government’s Launched a free Online filter to protect children from Internet Nasties…Um…Could you show me how to download it…?”
  • 44. Keystroke tracking programs are spy software that monitor every word typed, every program launched and every Web site visited. They do not censor the content, but rather send a report to the parent or person who installed the spy program. Examples: •Investigator •Spector Pro •Key Ghost
  • 45. “I just can’t communicate with my child anymore. It’s like she speaks another language.”
  • 46.  Learn the Lingo – Learn text Messaging (SMS)  Take Interest & Be Approachable  Be Willing to Try New Things  Create Your Own Blog or Web site  Post to Groups & Wikis  Subscribe to Podcasts  Ask Your Children to Teach You  Keep Communication Lines Open
  • 48.  “Friends 24 Hours a Day”  “Addicted to Facebook”
  • 50.  Go to www. myspace. com  Scroll to the bottom of the page.  Select “Safety Tips”
  • 51.  There are two tabs located on the page that appears.  One of the tabs is labeled “Safety Tips.” There are several links to other websites that will help.  The other tab is labeled “Tips for Parents.” Select this tab.
  • 52.  Read through the tips for parents and the several links to websites for parents.  There is also a link to remove your child’s profile from this site.

Notas do Editor

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35
  36. 36
  37. 37
  38. 38
  39. 39
  40. 40
  41. 41
  42. 42
  43. 43
  44. 44
  45. 45
  46. 46
  47. 47
  48. 48
  49. 49
  50. 50
  51. 51
  52. 52
  53. 53
  54. 54
  55. 55