SlideShare ist ein Scribd-Unternehmen logo
1 von 10
How Safe Are Our ChildrenOn the Internet By Stephen Wright
What Are the Dangers Pornography Predators Cyber Bullying Viruses Social Networking
Pornography 60% of all websites are pornographic 1 in 4 children who use the Internet regularly, will be exposed to unwanted sexual material
Predators Pedophiles represent the most dangerous aspect of the Internet one in five children age 10-17 who regularly use the Internet have received a sexual solicitation Chat rooms and instant messages are two main tools pedophiles use to contact children
Cyber Bullying  Cyber bullying is the use of technology to harass, threaten, embarrass, or target another person. One in three teens have been the victims of cyber bullying Severe cyber bullying can leave victims at greater risk for anxiety, depression, and other stress-related disorders.
Viruses Malicious programs include worms, macros, phishing, spam, and rootkits. These programs are designed to disrupt  your computer, steel information and identities. Viruses can give hackers unwanted assess to you  computer.
Social Networking Parents my feel a false sence of security when they see who their kids are friending on line.  But that Doesn't reveal key details about your child's friends Forces you to wade through hours of teenaged gossip May actually embarrass your child, even if you're well intentioned!
Strategies for Safe Internet Use Many internet providers offer child safe sites that will Find out where your child has online accounts Know who your child is "friends" with online Get notified if your child posts about violence, suicide or drugs See photos posted by or tagged with your child
Strategies for Safe Internet Use Be aware of what your children are doing online Look for changes in moods such as depression Keep firewalls in place and have good anti virus software.   Don’t be afraid to limit access Keep informed on internet issues.
References Clear Traffic http://www.cleartraffic.com/keeping-kids-safe.htm Kid Health http://kidshealth.org/parent/positive/talk/cyberbullying.html#  COMPUTER VIRUSES by Markus Hanhisalohttp://www.tml.tkk.fi/Opinnot/Tik-110.501/1997/viruses.html

Weitere ähnliche Inhalte

Was ist angesagt?

My protection plan
My protection planMy protection plan
My protection planShakena12
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overviewJohn Woodring
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of NetiquetteACLC Antipolo
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Common sense technology policy2
Common sense technology policy2Common sense technology policy2
Common sense technology policy2John Robinson
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention RAUSHAN KUMAR
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersRajesh Soundararajan
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
McKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullyingMcKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullyingmckinleychas
 
Formative Task - Safe Internet Usage
Formative Task - Safe Internet UsageFormative Task - Safe Internet Usage
Formative Task - Safe Internet Usagealigi
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2bigmike18
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018KanelandSvihlik
 
Cyberstalking
CyberstalkingCyberstalking
CyberstalkingTrevschic
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile securityErnest Staats
 

Was ist angesagt? (20)

My protection plan
My protection planMy protection plan
My protection plan
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Common sense technology policy2
Common sense technology policy2Common sense technology policy2
Common sense technology policy2
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
 
McKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullyingMcKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullying
 
Formative Task - Safe Internet Usage
Formative Task - Safe Internet UsageFormative Task - Safe Internet Usage
Formative Task - Safe Internet Usage
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 

Ähnlich wie How safe are our children

Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentationgrp4.ed451
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentationrenumann
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safetyFred Miller
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaAlexander Berta
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 

Ähnlich wie How safe are our children (20)

Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentation
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 

Mehr von stevewrightco

Top twelve wright power point
Top twelve wright power pointTop twelve wright power point
Top twelve wright power pointstevewrightco
 
Wow that’s a billon Frog One
Wow that’s a billon Frog OneWow that’s a billon Frog One
Wow that’s a billon Frog Onestevewrightco
 
Wow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying EagleWow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying Eaglestevewrightco
 
Wow that’s a billion by Sky Eagle One
Wow that’s a billion by Sky Eagle OneWow that’s a billion by Sky Eagle One
Wow that’s a billion by Sky Eagle Onestevewrightco
 
Wow that’s a billon by Frog One
Wow that’s a billon by Frog OneWow that’s a billon by Frog One
Wow that’s a billon by Frog Onestevewrightco
 
Wow that’s a billon by Frog One
Wow that’s a billon by Frog OneWow that’s a billon by Frog One
Wow that’s a billon by Frog Onestevewrightco
 
Wow that’s a billon by Frog One
Wow that’s a billon by Frog OneWow that’s a billon by Frog One
Wow that’s a billon by Frog Onestevewrightco
 
Wow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying EagleWow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying Eaglestevewrightco
 
Wow that’s a billion georgie and anna
Wow that’s a billion georgie and annaWow that’s a billion georgie and anna
Wow that’s a billion georgie and annastevewrightco
 
Wow That's a BilloinSpeed Racer
Wow That's a BilloinSpeed RacerWow That's a BilloinSpeed Racer
Wow That's a BilloinSpeed Racerstevewrightco
 
Wow that’s a billion by Sky Eagle 1
Wow that’s a billion by Sky Eagle 1Wow that’s a billion by Sky Eagle 1
Wow that’s a billion by Sky Eagle 1stevewrightco
 

Mehr von stevewrightco (13)

36 things
36 things36 things
36 things
 
Top twelve wright power point
Top twelve wright power pointTop twelve wright power point
Top twelve wright power point
 
Wow that’s a billon Frog One
Wow that’s a billon Frog OneWow that’s a billon Frog One
Wow that’s a billon Frog One
 
Wow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying EagleWow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying Eagle
 
Wow that’s a billion by Sky Eagle One
Wow that’s a billion by Sky Eagle OneWow that’s a billion by Sky Eagle One
Wow that’s a billion by Sky Eagle One
 
Dustin.r billion
Dustin.r billionDustin.r billion
Dustin.r billion
 
Wow that’s a billon by Frog One
Wow that’s a billon by Frog OneWow that’s a billon by Frog One
Wow that’s a billon by Frog One
 
Wow that’s a billon by Frog One
Wow that’s a billon by Frog OneWow that’s a billon by Frog One
Wow that’s a billon by Frog One
 
Wow that’s a billon by Frog One
Wow that’s a billon by Frog OneWow that’s a billon by Frog One
Wow that’s a billon by Frog One
 
Wow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying EagleWow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying Eagle
 
Wow that’s a billion georgie and anna
Wow that’s a billion georgie and annaWow that’s a billion georgie and anna
Wow that’s a billion georgie and anna
 
Wow That's a BilloinSpeed Racer
Wow That's a BilloinSpeed RacerWow That's a BilloinSpeed Racer
Wow That's a BilloinSpeed Racer
 
Wow that’s a billion by Sky Eagle 1
Wow that’s a billion by Sky Eagle 1Wow that’s a billion by Sky Eagle 1
Wow that’s a billion by Sky Eagle 1
 

Kürzlich hochgeladen

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

How safe are our children

  • 1. How Safe Are Our ChildrenOn the Internet By Stephen Wright
  • 2. What Are the Dangers Pornography Predators Cyber Bullying Viruses Social Networking
  • 3. Pornography 60% of all websites are pornographic 1 in 4 children who use the Internet regularly, will be exposed to unwanted sexual material
  • 4. Predators Pedophiles represent the most dangerous aspect of the Internet one in five children age 10-17 who regularly use the Internet have received a sexual solicitation Chat rooms and instant messages are two main tools pedophiles use to contact children
  • 5. Cyber Bullying Cyber bullying is the use of technology to harass, threaten, embarrass, or target another person. One in three teens have been the victims of cyber bullying Severe cyber bullying can leave victims at greater risk for anxiety, depression, and other stress-related disorders.
  • 6. Viruses Malicious programs include worms, macros, phishing, spam, and rootkits. These programs are designed to disrupt your computer, steel information and identities. Viruses can give hackers unwanted assess to you computer.
  • 7. Social Networking Parents my feel a false sence of security when they see who their kids are friending on line. But that Doesn't reveal key details about your child's friends Forces you to wade through hours of teenaged gossip May actually embarrass your child, even if you're well intentioned!
  • 8. Strategies for Safe Internet Use Many internet providers offer child safe sites that will Find out where your child has online accounts Know who your child is "friends" with online Get notified if your child posts about violence, suicide or drugs See photos posted by or tagged with your child
  • 9. Strategies for Safe Internet Use Be aware of what your children are doing online Look for changes in moods such as depression Keep firewalls in place and have good anti virus software. Don’t be afraid to limit access Keep informed on internet issues.
  • 10. References Clear Traffic http://www.cleartraffic.com/keeping-kids-safe.htm Kid Health http://kidshealth.org/parent/positive/talk/cyberbullying.html#  COMPUTER VIRUSES by Markus Hanhisalohttp://www.tml.tkk.fi/Opinnot/Tik-110.501/1997/viruses.html