SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Children & Internet
Safety
Approximately 93 percent of all
Americans between 12 and 17
years old are internet users.

Join Our Group:
http://bit.ly/websafetygroup
Should technology ever
permit humans to download
our brains' mental images to
a hard drive, every last
teenager in America will
wind up prohibited from
living within 10,000 feet of
themselves.
Join Our Group:
http://bit.ly/websafetygroup
Internet
Artifacts
are an
issue
for
everyone.
Snow White has a
rough night.
Join Our Group:
http://bit.ly/websafetygroup
Principal Sharron Smalls of Jane
Addams High School in the Bronx
has sexy Facebook picture

Join Our Group:
http://bit.ly/websafetygroup
Child Predators Facts:
One in five U.S. teenagers who regularly log
on to the Internet says they have received
an unwanted sexual solicitation via the
Web.
Solicitations were defined as requests to
engage in sexual activities or sexual talk, or
to give out personal sexual information. (only
25% of those told a parent).
Join Our Group:
http://bit.ly/websafetygroup
Child Predators Facts

About 30% of the victims of
Internet sexual
exploitation are boys.
Join Our Group:
http://bit.ly/websafetygroup
Who’s There?

OR

Hi! I’m Sienna. I’m 5’4, 118, long br hair. I <3 my horse Shelby,
Ke$ha & guys that look like Taylor Lautner. TMB!

Join Our Group:
http://bit.ly/websafetygroup
Child Predators Facts
Internet sexual predators tend to fall between
the ages of 18 and 55, although some are
older or younger.
Their targets tend to be between the ages of
11 and 15
Join Our Group:
http://bit.ly/websafetygroup
Child Predators Facts

In 100% of the cases, teens
that are the victims of sexual
predators have gone
willingly to meet with them.
Join Our Group:
http://bit.ly/websafetygroup
Child Predators Facts

Teens are willing to meet with
strangers:
16 percent of teens considered meeting
someone they've only talked to online and
8 percent have actually met someone they
only knew online.
Join Our Group:
http://bit.ly/websafetygroup
Child Predators Facts

75% of children are willing
to share personal
information online about
themselves and their family
in exchange for goods and
services.
Join Our Group:
http://bit.ly/websafetygroup
•72 percent of Americans age 18
to 29 would hand over their
personal information in return for
a discount on movie tickets
•only 56 percent of those age 45 to 59
would do the same.

•Two thirds of the young hipsters
would surrender their data for free
popcorn
•versus 52 percent of the aging crones.
Join Our Group: PwC Survey 2012
http://bit.ly/websafetygroup
Internet Artifacts
When a child says or does something inappropriate on the Internet,
it is nearly impossible to take it back and prevent unanticipated
future consequences.
What are they? Internet artifacts are the conversations, messages, thoughts,
opinions, photographs, and identifying information that children are storing on
Internet sites such as Facebook, Myspace, Gmail, Hotmail, Yahoo, Twitter, etc.
Why are they Dangerous? Internet artifacts may demonstrate a lack of maturity,
lack of judgment, or an opinion regarding a controversial or unpopular topic that
children do not fully understand. Expressing a controversial opinion can result in
unanticipated consequences and potentially may be available on the Internet for
a very long time and retrieved years later, by potential employers and
admissions officers for schools, colleges and universities.
How is this possible? All of the information that is stored on server computers on
the Internet belongs to the service provider -- not the user.

Join Our Group:
http://bit.ly/websafetygroup
Sexting
Not only can sexting ruin reputations, but it can also get
your teenager arrested for distributing child pornography.
The percent of teenagers who have sent or posted nude or semi-nude
pictures or video of themselves:





20% of teenagers overall
22% of teen girls
18% of teen boys
11% of young teen girls ages 13-16

The percent of teenagers sending or posting sexually suggestive
messages:




39% of all teenagers
37% of teen girls
40% of teen boys

Join Our Group:
http://bit.ly/websafetygroup
Sexting Continued


15% of teens sent or posted nude / seminude pics of themselves to someone they only knew
online.



71% of teen girls and 67% of teen guys who have sent or posted sexually suggestive content say
they have sent or posted this content to a boyfriend or girlfriend.



21% of teen girls and 39% of teen boys sent such content to someone they wanted to date.



44% of both teen girls and teen boys say it is common for sexually suggestive text messages to get
shared with people other than the intended recipient.



36% of teen girls and 39% of teen boys say it is common for nude or semi-nude photos to get
shared with people other than the intended recipient.



51% of teen girls say pressure from a guy is a reason girls send sexy messages or images.



66% of teen girls and 60% of teen boys say they did so to be “fun or flirtatious.



52% of teenage girls used sexting as a “sexy present” for their boyfriend.



44% of both teen girls and teen boys say they sent sexually suggestive messages or images in
response to similar content.



40% of teen girls sent sexually suggestive messages or images as “a joke;” 34% to “feel sexy,” &
12% felt “pressured.”
Join Our Group:
http://bit.ly/websafetygroup
Snapchat
 Snapchat

users were
sending 350 million
messages per day, up
from 200 million in
June 2013. (from Pew)

Join Our Group:
http://bit.ly/websafetygroup
A recent review on
the iTunes page:
“This app is quick
easy and fun, but
too many
pedophiles asking
me for nude
pictures which
almost forced me
to delete this app.
But it is safe as
long as you don’t
talk to strangers.”
Join Our Group:
http://bit.ly/websafetygroup
Join Our Group:
http://bit.ly/websafetygroup
Cyber Bullying

More than 1 in 3 young
people have experienced
cyberthreats online.

Join Our Group:
http://bit.ly/websafetygroup
Cyber Bullying
What is it? Cyber bullying can take many forms:
 Sending mean messages or threats to a person's email account
or cell phone
 Spreading rumors online or through texts
 Posting hurtful or threatening messages on social networking
sites or web pages
 Stealing a person's account information to break into their
account and send damaging messages
 Pretending to be someone else online to hurt another person
 Taking unflattering pictures of a person and spreading them
through cell phones or the Internet
 Sexting, or circulating sexually suggestive pictures or messages
about a person
Join Our Group:
http://bit.ly/websafetygroup
Join Our Group:
http://bit.ly/websafetygroup
Cyber Bullying Continued
Who Is Involved?
 Over half of adolescents and teens have been bullied online, and about the
same number have engaged in cyber bullying.
 More than 1 in 3 young people have experienced cyberthreats online.
 Over 25 percent of adolescents and teens have been bullied repeatedly through
their cell phones or the Internet.
 Well over half of young people do not tell their parents when cyber bullying
occurs.
 Around half of teens have been the victims of cyber bullying
 Fewer than 1 in 5 cyber bullying incidents are reported to law enforcement
 1 in 10 adolescents or teens have had embarrassing or damaging pictures taken
of themselves without their permission, often using cell phone cameras
 About half of young people have experienced some form of cyber bullying, and
10 to 20 percent experience it regularly
 Girls are at least as likely as boys to be cyber bullies or their victims
 Cyber bullying victims are more likely to have low self esteem and to consider
suicide

Join Our Group:
http://bit.ly/websafetygroup
Cyber Bullying Continued
What Can You Do?













Talks to teens about cyber bullying, explaining that it is wrong and can have serious consequences.
Make a rule that teens may not send mean or damaging messages, even if someone else started it,
or suggestive pictures or messages or they will lose their cell phone and computer privileges for a
time.
Encourage teens to tell an adult if cyber bullying is occurring. Tell them if they are the victims they will
not be punished, and reassure them that being bullied is not their fault.
Teens should keep cyber bullying messages as proof that the cyber bullying is occurring. The teens'
parents may want to talk to the parents of the cyber bully, to the bully's Internet or cell phone
provider, and/or to the police about the messages, especially if they are threatening or sexual in
nature.
Try blocking the person sending the messages. It may be necessary to get a new phone number or
email address and to be more cautious about giving out the new number or address.
Teens should never tell their password to anyone except a parent, and should not write it down in a
place where it could be found by others.
Teens should not share anything through text or instant messaging on their cell phone or the Internet
that they would not want to be made public - remind teens that the person they are talking to in
messages or online may not be who they think they are, and that things posted electronically may not
be secure.
Encourage teens never to share personal information online or to meet someone they only know
online.
Keep the computer in a shared space like the family room, and do not allow teens to have Internet
access in their own rooms.
Join allow their teens
Parents may want to wait until high school toOur Group: to have their own email and cell phone
accounts, and even then parents should still have access to the accounts.
http://bit.ly/websafetygroup
More Stats and Tools
 Kids'

Pledge for Online Safety

 Teen

Pledge for Online Safety

 Parents'

Pledge for Online Safety

 https://delicious.com/sagerock/internet-safety
Join Our Group:
http://bit.ly/websafetygroup

Weitere ähnliche Inhalte

Was ist angesagt?

Digital drama
Digital dramaDigital drama
Digital dramaktcole
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateMarian Merritt
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingsus22
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101Chad Richards
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingQazi Anwar
 
Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011daniel_eukids
 
Social networks
Social networksSocial networks
Social networksdrlizmike
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Larry Magid
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Resultsa2columnd12
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationspringvillegi
 
E safety training for lewisham arts and education network (advance) by steph...
E  safety training for lewisham arts and education network (advance) by steph...E  safety training for lewisham arts and education network (advance) by steph...
E safety training for lewisham arts and education network (advance) by steph...Stephen Carrick-Davies
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenJanet Weninger
 
Teens Strangers Amanda Lenhart
Teens Strangers Amanda LenhartTeens Strangers Amanda Lenhart
Teens Strangers Amanda LenhartJorge Borges
 

Was ist angesagt? (20)

Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
Digital drama
Digital dramaDigital drama
Digital drama
 
Be a well aware mom !
Be a well aware mom !Be a well aware mom !
Be a well aware mom !
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
Finalproject
FinalprojectFinalproject
Finalproject
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011
 
Social networks
Social networksSocial networks
Social networks
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Results
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
E safety training for lewisham arts and education network (advance) by steph...
E  safety training for lewisham arts and education network (advance) by steph...E  safety training for lewisham arts and education network (advance) by steph...
E safety training for lewisham arts and education network (advance) by steph...
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-children
 
Teens Strangers Amanda Lenhart
Teens Strangers Amanda LenhartTeens Strangers Amanda Lenhart
Teens Strangers Amanda Lenhart
 

Andere mochten auch

Search Marketing Shakeup - February 2014
Search Marketing Shakeup - February 2014Search Marketing Shakeup - February 2014
Search Marketing Shakeup - February 2014Sage Lewis
 
SageRock Overview Presentation
SageRock Overview PresentationSageRock Overview Presentation
SageRock Overview PresentationSage Lewis
 
YouTube AdWords Video Ads
YouTube AdWords Video AdsYouTube AdWords Video Ads
YouTube AdWords Video AdsSage Lewis
 
NOCA Northeast Ohio Marketing Communications 2012 Industry Impact Study
NOCA Northeast Ohio Marketing Communications 2012 Industry Impact StudyNOCA Northeast Ohio Marketing Communications 2012 Industry Impact Study
NOCA Northeast Ohio Marketing Communications 2012 Industry Impact StudySage Lewis
 
Internet Marketing Sample Report
Internet Marketing Sample ReportInternet Marketing Sample Report
Internet Marketing Sample ReportSage Lewis
 
Mccpta reflections spring training 2013
Mccpta reflections spring training 2013Mccpta reflections spring training 2013
Mccpta reflections spring training 2013Melissa McDonald
 
MarylandSnapshotdayLegislatorShow2011
MarylandSnapshotdayLegislatorShow2011MarylandSnapshotdayLegislatorShow2011
MarylandSnapshotdayLegislatorShow2011Melissa McDonald
 
Vocabulaire Web
Vocabulaire WebVocabulaire Web
Vocabulaire Webjuvali
 
Travail Ana et Helena
Travail Ana et HelenaTravail Ana et Helena
Travail Ana et Helenajuvali
 
Learningpowerplantbasics
LearningpowerplantbasicsLearningpowerplantbasics
Learningpowerplantbasicslovelyshree
 
Sosiale medier og digitale forretningsmodeller
Sosiale medier og digitale forretningsmodellerSosiale medier og digitale forretningsmodeller
Sosiale medier og digitale forretningsmodellerEngage // Innovate
 
Data recovery for mac
Data recovery for macData recovery for mac
Data recovery for macsnowabcd
 

Andere mochten auch (16)

Search Marketing Shakeup - February 2014
Search Marketing Shakeup - February 2014Search Marketing Shakeup - February 2014
Search Marketing Shakeup - February 2014
 
SageRock Overview Presentation
SageRock Overview PresentationSageRock Overview Presentation
SageRock Overview Presentation
 
YouTube AdWords Video Ads
YouTube AdWords Video AdsYouTube AdWords Video Ads
YouTube AdWords Video Ads
 
NOCA Northeast Ohio Marketing Communications 2012 Industry Impact Study
NOCA Northeast Ohio Marketing Communications 2012 Industry Impact StudyNOCA Northeast Ohio Marketing Communications 2012 Industry Impact Study
NOCA Northeast Ohio Marketing Communications 2012 Industry Impact Study
 
Internet Marketing Sample Report
Internet Marketing Sample ReportInternet Marketing Sample Report
Internet Marketing Sample Report
 
Mccpta reflections spring training 2013
Mccpta reflections spring training 2013Mccpta reflections spring training 2013
Mccpta reflections spring training 2013
 
MarylandSnapshotdayLegislatorShow2011
MarylandSnapshotdayLegislatorShow2011MarylandSnapshotdayLegislatorShow2011
MarylandSnapshotdayLegislatorShow2011
 
Mccpta fall training 2012
Mccpta fall training 2012Mccpta fall training 2012
Mccpta fall training 2012
 
How to Take Good Notes
How to Take Good NotesHow to Take Good Notes
How to Take Good Notes
 
Vocabulaire Web
Vocabulaire WebVocabulaire Web
Vocabulaire Web
 
Qui
QuiQui
Qui
 
Travail Ana et Helena
Travail Ana et HelenaTravail Ana et Helena
Travail Ana et Helena
 
Learningpowerplantbasics
LearningpowerplantbasicsLearningpowerplantbasics
Learningpowerplantbasics
 
Sosiale medier og digitale forretningsmodeller
Sosiale medier og digitale forretningsmodellerSosiale medier og digitale forretningsmodeller
Sosiale medier og digitale forretningsmodeller
 
Data recovery for mac
Data recovery for macData recovery for mac
Data recovery for mac
 
Psalm 2
Psalm 2Psalm 2
Psalm 2
 

Ähnlich wie Family Internet Safety

Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eveSimonBalle
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 
2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying2012 06 Sexting and Cyberbullying
2012 06 Sexting and CyberbullyingRaleigh ISSA
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyinglheikkila
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The InternetDebra Boardman
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingsmeech
 
Huff591 interactivepresentationinternetclass
Huff591 interactivepresentationinternetclassHuff591 interactivepresentationinternetclass
Huff591 interactivepresentationinternetclasschuff10
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaAlexander Berta
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2bigmike18
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyDi Doersch
 

Ähnlich wie Family Internet Safety (20)

Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Huff591 interactivepresentationinternetclass
Huff591 interactivepresentationinternetclassHuff591 interactivepresentationinternetclass
Huff591 interactivepresentationinternetclass
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and Technology
 
Life in the_digital_world
Life in the_digital_worldLife in the_digital_world
Life in the_digital_world
 

Kürzlich hochgeladen

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 

Kürzlich hochgeladen (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

Family Internet Safety

  • 1. Children & Internet Safety Approximately 93 percent of all Americans between 12 and 17 years old are internet users. Join Our Group: http://bit.ly/websafetygroup
  • 2. Should technology ever permit humans to download our brains' mental images to a hard drive, every last teenager in America will wind up prohibited from living within 10,000 feet of themselves. Join Our Group: http://bit.ly/websafetygroup
  • 3.
  • 5. Snow White has a rough night. Join Our Group: http://bit.ly/websafetygroup
  • 6. Principal Sharron Smalls of Jane Addams High School in the Bronx has sexy Facebook picture Join Our Group: http://bit.ly/websafetygroup
  • 7. Child Predators Facts: One in five U.S. teenagers who regularly log on to the Internet says they have received an unwanted sexual solicitation via the Web. Solicitations were defined as requests to engage in sexual activities or sexual talk, or to give out personal sexual information. (only 25% of those told a parent). Join Our Group: http://bit.ly/websafetygroup
  • 8. Child Predators Facts About 30% of the victims of Internet sexual exploitation are boys. Join Our Group: http://bit.ly/websafetygroup
  • 9. Who’s There? OR Hi! I’m Sienna. I’m 5’4, 118, long br hair. I <3 my horse Shelby, Ke$ha & guys that look like Taylor Lautner. TMB! Join Our Group: http://bit.ly/websafetygroup
  • 10. Child Predators Facts Internet sexual predators tend to fall between the ages of 18 and 55, although some are older or younger. Their targets tend to be between the ages of 11 and 15 Join Our Group: http://bit.ly/websafetygroup
  • 11. Child Predators Facts In 100% of the cases, teens that are the victims of sexual predators have gone willingly to meet with them. Join Our Group: http://bit.ly/websafetygroup
  • 12. Child Predators Facts Teens are willing to meet with strangers: 16 percent of teens considered meeting someone they've only talked to online and 8 percent have actually met someone they only knew online. Join Our Group: http://bit.ly/websafetygroup
  • 13. Child Predators Facts 75% of children are willing to share personal information online about themselves and their family in exchange for goods and services. Join Our Group: http://bit.ly/websafetygroup
  • 14. •72 percent of Americans age 18 to 29 would hand over their personal information in return for a discount on movie tickets •only 56 percent of those age 45 to 59 would do the same. •Two thirds of the young hipsters would surrender their data for free popcorn •versus 52 percent of the aging crones. Join Our Group: PwC Survey 2012 http://bit.ly/websafetygroup
  • 15. Internet Artifacts When a child says or does something inappropriate on the Internet, it is nearly impossible to take it back and prevent unanticipated future consequences. What are they? Internet artifacts are the conversations, messages, thoughts, opinions, photographs, and identifying information that children are storing on Internet sites such as Facebook, Myspace, Gmail, Hotmail, Yahoo, Twitter, etc. Why are they Dangerous? Internet artifacts may demonstrate a lack of maturity, lack of judgment, or an opinion regarding a controversial or unpopular topic that children do not fully understand. Expressing a controversial opinion can result in unanticipated consequences and potentially may be available on the Internet for a very long time and retrieved years later, by potential employers and admissions officers for schools, colleges and universities. How is this possible? All of the information that is stored on server computers on the Internet belongs to the service provider -- not the user. Join Our Group: http://bit.ly/websafetygroup
  • 16. Sexting Not only can sexting ruin reputations, but it can also get your teenager arrested for distributing child pornography. The percent of teenagers who have sent or posted nude or semi-nude pictures or video of themselves:     20% of teenagers overall 22% of teen girls 18% of teen boys 11% of young teen girls ages 13-16 The percent of teenagers sending or posting sexually suggestive messages:    39% of all teenagers 37% of teen girls 40% of teen boys Join Our Group: http://bit.ly/websafetygroup
  • 17. Sexting Continued  15% of teens sent or posted nude / seminude pics of themselves to someone they only knew online.  71% of teen girls and 67% of teen guys who have sent or posted sexually suggestive content say they have sent or posted this content to a boyfriend or girlfriend.  21% of teen girls and 39% of teen boys sent such content to someone they wanted to date.  44% of both teen girls and teen boys say it is common for sexually suggestive text messages to get shared with people other than the intended recipient.  36% of teen girls and 39% of teen boys say it is common for nude or semi-nude photos to get shared with people other than the intended recipient.  51% of teen girls say pressure from a guy is a reason girls send sexy messages or images.  66% of teen girls and 60% of teen boys say they did so to be “fun or flirtatious.  52% of teenage girls used sexting as a “sexy present” for their boyfriend.  44% of both teen girls and teen boys say they sent sexually suggestive messages or images in response to similar content.  40% of teen girls sent sexually suggestive messages or images as “a joke;” 34% to “feel sexy,” & 12% felt “pressured.”
  • 19. Snapchat  Snapchat users were sending 350 million messages per day, up from 200 million in June 2013. (from Pew) Join Our Group: http://bit.ly/websafetygroup
  • 20. A recent review on the iTunes page: “This app is quick easy and fun, but too many pedophiles asking me for nude pictures which almost forced me to delete this app. But it is safe as long as you don’t talk to strangers.” Join Our Group: http://bit.ly/websafetygroup
  • 21.
  • 23.
  • 24. Cyber Bullying More than 1 in 3 young people have experienced cyberthreats online. Join Our Group: http://bit.ly/websafetygroup
  • 25. Cyber Bullying What is it? Cyber bullying can take many forms:  Sending mean messages or threats to a person's email account or cell phone  Spreading rumors online or through texts  Posting hurtful or threatening messages on social networking sites or web pages  Stealing a person's account information to break into their account and send damaging messages  Pretending to be someone else online to hurt another person  Taking unflattering pictures of a person and spreading them through cell phones or the Internet  Sexting, or circulating sexually suggestive pictures or messages about a person Join Our Group: http://bit.ly/websafetygroup
  • 27. Cyber Bullying Continued Who Is Involved?  Over half of adolescents and teens have been bullied online, and about the same number have engaged in cyber bullying.  More than 1 in 3 young people have experienced cyberthreats online.  Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet.  Well over half of young people do not tell their parents when cyber bullying occurs.  Around half of teens have been the victims of cyber bullying  Fewer than 1 in 5 cyber bullying incidents are reported to law enforcement  1 in 10 adolescents or teens have had embarrassing or damaging pictures taken of themselves without their permission, often using cell phone cameras  About half of young people have experienced some form of cyber bullying, and 10 to 20 percent experience it regularly  Girls are at least as likely as boys to be cyber bullies or their victims  Cyber bullying victims are more likely to have low self esteem and to consider suicide Join Our Group: http://bit.ly/websafetygroup
  • 28. Cyber Bullying Continued What Can You Do?          Talks to teens about cyber bullying, explaining that it is wrong and can have serious consequences. Make a rule that teens may not send mean or damaging messages, even if someone else started it, or suggestive pictures or messages or they will lose their cell phone and computer privileges for a time. Encourage teens to tell an adult if cyber bullying is occurring. Tell them if they are the victims they will not be punished, and reassure them that being bullied is not their fault. Teens should keep cyber bullying messages as proof that the cyber bullying is occurring. The teens' parents may want to talk to the parents of the cyber bully, to the bully's Internet or cell phone provider, and/or to the police about the messages, especially if they are threatening or sexual in nature. Try blocking the person sending the messages. It may be necessary to get a new phone number or email address and to be more cautious about giving out the new number or address. Teens should never tell their password to anyone except a parent, and should not write it down in a place where it could be found by others. Teens should not share anything through text or instant messaging on their cell phone or the Internet that they would not want to be made public - remind teens that the person they are talking to in messages or online may not be who they think they are, and that things posted electronically may not be secure. Encourage teens never to share personal information online or to meet someone they only know online. Keep the computer in a shared space like the family room, and do not allow teens to have Internet access in their own rooms. Join allow their teens Parents may want to wait until high school toOur Group: to have their own email and cell phone accounts, and even then parents should still have access to the accounts. http://bit.ly/websafetygroup
  • 29. More Stats and Tools  Kids' Pledge for Online Safety  Teen Pledge for Online Safety  Parents' Pledge for Online Safety  https://delicious.com/sagerock/internet-safety Join Our Group: http://bit.ly/websafetygroup