SlideShare a Scribd company logo
1 of 61
 Welcome
 Internet Landscape
 Dangers on the
Internet
 Internet Predators
 Cyberbullying
 Personal profiles
 Communication
 Gaming
 Cell phones
 Plagiarism &
Intellectual Property
 Malicious Codes,
Viruses, and
Spyware
 Parent Tips and
resources
 Q & A
“everything that’s already in the world when you’re
born is just normal;
anything that gets invented between then and before
you turn thirty is incredibly exciting and creative and
with any luck you can make a career out of it;
anything that gets invented after you’re thirty is against
the natural order of things and the beginning of the end
of civilization as we know it until it’s been around for
about ten years when it gradually turns out to be alright
really.”
ADULTS’ VIEW
 Communication – email, texting
 Shopping and services
 Financial management
 News and product research
 Entertainment – videos, music, games
STUDENTS’ VIEW
 Communication – texting, instant
messaging, email
 Entertainment – games, music, videos
 Research – homework, study sites
 http://www.adweek.com/news/television/infographic-look-kids-media-consumption-163087
Educate parents
Educate students
1. Inappropriate content--pornography, content
focused on violence, hate propaganda
2. Cyberbullying--bullying peers via instant
messages, social networking sites, online games
3. Predators--social networking sites, chat rooms
4. Data theft--stolen passwords, addresses, Social
Security numbers, credit card numbers, and other
financial information
5. Malicious software (also known as malware)--
adware, spyware, viruses, phishing scams
http://www.cnet.com/4520-13384_1-6721368-1.html
 In 82% of online sex crimes against minors, the
offender used the victim's social networking site
to gain information about the victim's likes and
dislikes, and 65% used the site to gain home and
school information. (Journal of Adolescent Heatlh 47, 2010)
https://www.youtube.com/watch?v=9waE2A-uIxQ
 April 6th, 2015 local Headline:
Fox Lake man gets sex offender probation
for solicitation of girl, 9
› Details: 18 year old man, soliciting a sexual encounter with a 9 year old
girl
› Father of girl discovered inappropriate chat in Facebook Messenger
› Detectives assumed chat, set meet up with man, arrested
› http://www.chicagotribune.com/suburbs/lake-county-news-
sun/crime/ct-lns-bald-plea-st-0407-20150406-story.html
https://www.youtube.com/watch?v=6jMhMVEjEQg&feature=youtu.be
 Cyberbullying : challenging issues facing
educators and parents as young people
embrace the Internet and other mobile
communication technologies.
 Outing and Trickery – Sharing someone’s
secrets or embarrassing information or
images online
 Exclusion – Intentionally keeping someone
from being able to take part in an online
group, such as a “buddy list.”
 Cyberstalking – Repeatedly sending
unwanted messages that may include
threats of harm; intimidating
 Flaming – Online “fights” using electronic
messages with inappropriate language
 Harassment – Repeatedly sending offensive,
rude, and insulting messages
 Denigration – Sending or posting gossip or
rumors about a person
 Impersonation – Posing to be someone else
and making them look bad
http://www.commonsensemedia.org/videos/cyberbullying-prevention-tips-for-kids
 Tell your child not to respond to rude e-mails, messages, and
comments.
 Save the evidence, such as e-mail and text messages, and take
screenshots of comments and images. Also, take note of the date
and time when the harassment occurs.
 Contact your Internet service provider (ISP) or cell phone provider.
Ask the website administrator or ISP to remove any Web page
created to hurt your child.
 If harassment is via e-mail, social networking sites, IM, and chat
rooms, instruct your child to “block” bullies or delete your child’s
current account and open a new one.
 Check out phone features that may allow the number to be
blocked.
 Make a report to www.cybertipline.com, and if you feel something
illegal has occurred, inform law enforcement
 Information from Netsmartz Kids: http://www.netsmartz.org/Cyberbullying
 “Google” yourself (and your family
members!)
› Type in first and last name, email addresses,
screen names, addresses, phone numbers
› search for images as well
 Notice advertisements
http://youtu.be/-4LtYMNl4yw
 Facebook , Twitter, Instagram
› Age requirements
 “No information from children under age 13.”
› Public vs Private
› Know who you add: friends vs cyberfriends
› Have access to your child’s site
› Be conscientious of pictures/videos
 Protecting reputations online, in plain English
(commoncraft.com)
 65% of teen girls feel that selfies and other
flattering social media photos boost their
confidence.
 53% also say that photos of themselves posted by
others can make them feel bad.
› Apps: SkinneePix, Perfect365, and Facetune
 When Selfie Improvement Apps Go Too Far
 http://www.commonsensemedia.org/blog/when-selfie-improvement-apps-go-too-
far?utm_source=042414+Parent+Default&utm_medium=email&utm_campaign=weekly
 Privacy settings
 Parent pre-approve of all pictures/videos
 Remind your child
› Don’t post e-mail addresses or cell phone numbers
› Don’t share passwords
› Do not respond to any e-mails requesting personal
information ,delete e-mails from unknown senders.
 Discuss how to keep screen names and e-mail addresses
gender-neutral, appropriate, and free of any information that
could reveal identity.
 Encourage your child to tell you right away if anything
happens online that bothers or frightens him or her.
 Information from Netsmartz Kids: http://www.netsmartz.org/RevealingTooMuch
 Facebook use declining with youth
 New/hot apps by the minute
› https://www.commonsensemedia.org/blog/15-
sites-and-apps-kids-are-heading-to-after-
facebook?utm_source=030615+Parent+Default&
utm_medium=email&utm_campaign=weekly#
 Instagram: edit and share photos and 15-second videos, publicly or private network
of followers.
› Concern: obsession/depression because of ‘likes, photos are public unless
settings adjusted, private messaging capability
 Tumblr: streaming scrapbook of text, photos, and/or videos and audio clips
› Concern: inappropriate materials easily searchable, privacy available but
process is difficult, posts are copied by others and shared to non followers
“reblogging”
 Twitter: is a microblogging site that allows users to post brief, 140-character
messages
› Updates appear immediately.
 Vine: post and watch looping six-second video clips.
› It's full of inappropriate videos. In three minutes of random searching, we
came across a clip full of full-frontal male nudity, a woman in a fishnet shirt
with her breasts exposed, and people blowing marijuana smoke into each
other's mouths. Privacy concerns, followers, private settings.
 Ask.fm: “Be curious with your friends”. Interact in a Q and A format with friends
and anonymous friends.
› Cyberbullying incidents. Very popular in the UK but catching on in the US.
Linked to at least one student death (13 year old girl in FL).
 Musical.ly: Create music videos of yourself and watch others videos
› Adult/inappropriate language, sexual/provocative content. Very popular
with our kids right now.
 It’s not all bad:
› https://www.commonsensemedia.org/blog/5-reasons-you-dont-need-to-worry-about-kids-and-
social-media?utm_source=042415+Parent+Default&utm_medium=email&utm_campaign=weekly
 5 Reasons You Don't Need to Worry About Kids and Social Media
› Strengthens friendships
 52 percent of all teens who use social media say it's helped their
friendships, whereas only 4 percent say it has mainly hurt their
friendships
› Offers a sense of belonging
› Provides genuine support
› Helps them express themselves
 collaboration
› Lets them do good
 Exposes them to world wide issues
 Text messaging
 Instant messaging/hangouts/IM
 Online gaming chats
 Message boards
 Blogs and wikis
 Chat rooms
 Wikipedia and netlingo.com list of internet
slang
› http://en.wiktionary.org/wiki/Appendix:Internet_sl
ang
› http://www.netlingo.com/acronyms.php
 Sexting acronyms:
› http://m.y102reading.iheart.com/photos/ad-
31514/23-sexting-acronyms-every-parent-
should-411956/
LOL
BRB
POS
NIFOC
 Kik Messenger: text for free, fast with no message limits, character limits, or fees.
Because it's an app, the texts won't show up on your kid's phone's messaging
service.
› Concerns: ads and in-app-purchases. Kik specializes in conversations
between brands and users. Linked with OinkText (communicate with strangers),
Kikcommunity where you can submit photos/screenshots of messages that can
display user’s full name
Better choices
 ooVoo :free video, voice, and messaging app. Group chatting capability
› Concerns: Can be distracting (multitasking/addicting) Chat with only
approved contact lists, which can help ease parents' safety concerns.
 WhatsApp lets users send text/audio messages, videos, and photos to one or many
people with no message limits or fees.
› Concerns: It can be pushy. Automatically connects you to all the people in
your address book, encourages others not using it to sign up
 MeetMe Chat and Meet New People," says it all.
› It's an open network. Users can chat with whoever's online, as well as search
locally, opening the door for potential trouble. Lots of details are required.
 Omegle is a chat site (and app) that puts two strangers together in their choice of a
text chat or video chat room
› Users get paired up with strangers. That's the whole premise of the app. And
there's no registration required. Often links to porn sites.
 Skout is a flirting app that allows users to sign up as teens or adults. Gain ‘points’.
› There's no age verification.
 Tinder is a photo and messaging dating app for browsing pictures of potential
matches within a certain-mile radius of the user's location. It's very popular with 20-
somethings as a way to meet new people for casual or long-term relationships.
› It's location-based. Geolocation means it's possible for teens to meet up with
nearby people, which can be very dangerous.
 YouNow
› 'the best way to broadcast live and get an audience
to watch you.‘
› Apple, Google, computer/phone
› requires no registration, age verification, or
identification of any sort.
› Viewers communicate with the broadcaster through
written comments.
› www.younow.com
 Secret - Speak Freely post what’s on your mind anonymously.
› It tries to prevent users from defaming others. It requires some private
information. Strong language
 Whisper is a social "confessional" app that allows users to post whatever's on their
minds, paired with an image.
› What parents need to know: Whispers are often sexual in nature. The app
encourages users to exchange personal information in the "Meet Up" section.
 Yik Yak is a free social-networking app that lets users post brief, Twitter-like
comments to the 500 geographically nearest Yik Yak users.
› What parents need to know: It reveals your location. By default, your exact
location is shown unless you toggle location-sharing off. Each time you open
the app, GPS updates your location.
 Snapchat post pictures/videos with time limit,
disappears afterwards
› What parents need to know It's a myth that
Snapchats go away forever. Example: screenshot
 Poof
› Texting app that makes texts ‘go away forever’.
 Google Play
 Make a folder in a folder
 Jailbreak
 Online: Webkinz, Neopets, Miniclip, Club
Penguin, Animal Jam…….
 Gaming systems: PSP, Xbox Live, PS3, Wii
 Handheld devices: iPod touch, iPad, cell
phones
 Smartphones/tables
› apps
 Know the safety features on the gaming equipment that your child
uses—a headset may have voice-masking features, for example.
 Keep gaming consoles in an easy-to-supervise location
 Be aware of other places where your child may be accessing
games.
 Tell your child never to give out personal information while
gaming or agree to meet anyone outside of the game.
 Teach your child not to respond to anyone who is being rude or
bullying while playing the game.
 Set rules for how long your child may play, what types of games
are appropriate, and who else may participate.
 Have your child check with you before using a credit or debit card
online.
 Check to see if the games your child plays have reporting features
or moderators.
 Information from Netsmartz Kids: http://www.netsmartz.org/Gaming
 About 75% of teens (12-17) carry cell
phones
 1 in 3 teens (13-19) use their cell phone to
surf the web
 Results from Teens and Mobile phones, Pew Internet and Amerian Life
Project, 2010
 A Generation Unplugged, Harris Interactive, 2008
Cost!
› In app purchases
 Turn it off
 Settings, general, restrictions – change ‘allow’ to ‘off’
 Require Password
 Keep password a secret
 iTunes gift card/allowance
http://www.commonsensemedia.org/blog/4-ways-to-curb-kids-in-app-
purchases?utm_source=041714+Parent+Default&utm_medium=email&utm_camp
aign=weekly
 Review cell phone records for any unknown numbers
and late night phone calls and texts.
 Remind your child that texting is viral—anything sent
in a text can be easily forwarded and shared.
 Teach your child never to reveal cell phone numbers or
passwords online.
 Talk to your child about the possible consequences of
sending sexually explicit or provocative images or text
messages.
 When shopping for a cell phone for your child, research
the security settings that are available.
 From Netsmartz Kids : http://www.netsmartz.org/CellPhones
 At+T
› Phones and internet:
http://www.att.net/parentalcontrols
 Verizon
› https://wbillpay.verizonwireless.com/vzw/nos/safe
guards/safeguardLandingPage.action
 Sprint
› http://support.sprint.com/support/service/categor
y/Parental_controls-Parental_controls
 iPhone/iPad/iPod settings
› https://support.apple.com/en-us/HT201304
 Music/movie Downloads
 Copyright Material
› Images
› Text
 Identity Theft
 Website Validity
 www.turnitin.com
 Computer system
› Keeping bad stuff (predatory software) out –
keeping valuables(personal information) in
 Malicious codes: viruses, worms, Trojan
 Parasitical malware: spyware, adware
 www.cyberpatrol.com
 www.netnanny.com
 www.spectorsoft.com
 www.cybersitter.com
 www.covenanteyes.com
Anti spyware and adware programs
 www.spybot.com (Spybot S &D)
 www.adaware.com (lavasoft product)
 https://netsanity.net/
 Guard your identity
› Make username generic and anonymous
› Little information is needed to get to know you
 Monitor your child’s technology use
 Use favorites
 Understand the services your child uses
 Know usernames, passwords, and e-mail
 Know child’s “online friends”
 Don’t overreact to anything your child tells
you (fear you will take computer away)
 Never meet anyone met online
 Keep your computer up-to-date
› windowsupdate.microsoft.com
› Virus protection
› Firewall
 www.commonsense.org
 http://www.internetsafety101.org/Pre
datorstatistics.htm
 www.netsmartz.org
 www.isafe.org
 http://www.commonsensemedia.org/
educators/parent-media-education
 http://www.kidsmart.org.uk/
 http://www.thinkuknow.co.uk/default.aspx
 www.illinoisicac.org
 www.internet-safety.org
 www.safekids.com
 Twitter information:
http://theinnovativeeducator.blogspot.com
/2013/06/does-twitter-have-minimum-
age.html
 http://www.bbc.co.uk/cbbc/help/safesurfin
g/
 www.wiredkids.org/index.html
 www.wiredsafety.org
 www.fbi.gov/publications/pguide/pguidee.
htm
 www.staysafe.org
 http://www.cyberbullying.us/research.php
 Bullying, Beyond the Schoolyard, by Hinduja and
Patchin
 http://www.cnet.com/4520-13384_1-6721368-1.html Top
5 Dangers article
 http://www.cnet.com/4520-13384_1-6721401-
1.html?tag=lwt;lcol Think Before You Click Worksheet
 What’s Hot apps 2015:
https://www.commonsensemedia.org/blog/15-sites-and-
apps-kids-are-heading-to-after-
facebook?utm_source=030615+Parent+Default&utm_m
edium=email&utm_campaign=weekly#
 YouNow article: http://www.huffingtonpost.com/eli-
lebowitz/the-unregulated-world-of-
younow_b_5602908.html
 Current Apps Parents Should Know About:
› http://fun.familyeducation.com/mobile-apps/social-
networking/74548.html?page=16
Thank you for your attendance at
today’s presentation!
Make sure you signed in before you leave
Powerpoint link:
http://www.slideshare.net/Kaneland
Svihlik/internet-safety-presentation-
2016

More Related Content

What's hot

Keeping kids safe in the digital era
Keeping kids safe in the digital eraKeeping kids safe in the digital era
Keeping kids safe in the digital era
bns_library
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
jpl17
 

What's hot (20)

Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Dangers on the Internet
Dangers on the InternetDangers on the Internet
Dangers on the Internet
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
Internet safety
Internet safety Internet safety
Internet safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Keeping kids safe in the digital era
Keeping kids safe in the digital eraKeeping kids safe in the digital era
Keeping kids safe in the digital era
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital World
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
 

Similar to Internet safety presentation 2016

Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
KanelandSvihlik
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
egregory
 
Internet safety-presentation(1)
Internet safety-presentation(1)Internet safety-presentation(1)
Internet safety-presentation(1)
andreburtont
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
KanelandSvihlik
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
cpitchford
 
Protecting Your Children's Online Experience
Protecting Your Children's Online Experience  Protecting Your Children's Online Experience
Protecting Your Children's Online Experience
Lisa McKenzie ★
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012
KanelandSvihlik
 
Walworth academy e-safety (staff)
Walworth academy   e-safety (staff)Walworth academy   e-safety (staff)
Walworth academy e-safety (staff)
esolate
 

Similar to Internet safety presentation 2016 (20)

Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
102009
102009102009
102009
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
102010a
102010a102010a
102010a
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety-presentation(1)
Internet safety-presentation(1)Internet safety-presentation(1)
Internet safety-presentation(1)
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
 
022010
022010022010
022010
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Social networking leaflet
Social networking leafletSocial networking leaflet
Social networking leaflet
 
Protecting Your Children's Online Experience
Protecting Your Children's Online Experience  Protecting Your Children's Online Experience
Protecting Your Children's Online Experience
 
What Parents need to know about social media in 2014
What Parents need to know about social media in 2014What Parents need to know about social media in 2014
What Parents need to know about social media in 2014
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012
 
Walworth academy e-safety (staff)
Walworth academy   e-safety (staff)Walworth academy   e-safety (staff)
Walworth academy e-safety (staff)
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

Internet safety presentation 2016

  • 1.
  • 2.  Welcome  Internet Landscape  Dangers on the Internet  Internet Predators  Cyberbullying  Personal profiles  Communication  Gaming  Cell phones  Plagiarism & Intellectual Property  Malicious Codes, Viruses, and Spyware  Parent Tips and resources  Q & A
  • 3. “everything that’s already in the world when you’re born is just normal; anything that gets invented between then and before you turn thirty is incredibly exciting and creative and with any luck you can make a career out of it; anything that gets invented after you’re thirty is against the natural order of things and the beginning of the end of civilization as we know it until it’s been around for about ten years when it gradually turns out to be alright really.”
  • 4. ADULTS’ VIEW  Communication – email, texting  Shopping and services  Financial management  News and product research  Entertainment – videos, music, games
  • 5. STUDENTS’ VIEW  Communication – texting, instant messaging, email  Entertainment – games, music, videos  Research – homework, study sites
  • 7.
  • 8.
  • 10. 1. Inappropriate content--pornography, content focused on violence, hate propaganda 2. Cyberbullying--bullying peers via instant messages, social networking sites, online games 3. Predators--social networking sites, chat rooms 4. Data theft--stolen passwords, addresses, Social Security numbers, credit card numbers, and other financial information 5. Malicious software (also known as malware)-- adware, spyware, viruses, phishing scams http://www.cnet.com/4520-13384_1-6721368-1.html
  • 11.  In 82% of online sex crimes against minors, the offender used the victim's social networking site to gain information about the victim's likes and dislikes, and 65% used the site to gain home and school information. (Journal of Adolescent Heatlh 47, 2010)
  • 13.  April 6th, 2015 local Headline: Fox Lake man gets sex offender probation for solicitation of girl, 9 › Details: 18 year old man, soliciting a sexual encounter with a 9 year old girl › Father of girl discovered inappropriate chat in Facebook Messenger › Detectives assumed chat, set meet up with man, arrested › http://www.chicagotribune.com/suburbs/lake-county-news- sun/crime/ct-lns-bald-plea-st-0407-20150406-story.html
  • 15.
  • 16.
  • 17.  Cyberbullying : challenging issues facing educators and parents as young people embrace the Internet and other mobile communication technologies.
  • 18.
  • 19.
  • 20.  Outing and Trickery – Sharing someone’s secrets or embarrassing information or images online  Exclusion – Intentionally keeping someone from being able to take part in an online group, such as a “buddy list.”  Cyberstalking – Repeatedly sending unwanted messages that may include threats of harm; intimidating
  • 21.  Flaming – Online “fights” using electronic messages with inappropriate language  Harassment – Repeatedly sending offensive, rude, and insulting messages  Denigration – Sending or posting gossip or rumors about a person  Impersonation – Posing to be someone else and making them look bad
  • 22.
  • 24.  Tell your child not to respond to rude e-mails, messages, and comments.  Save the evidence, such as e-mail and text messages, and take screenshots of comments and images. Also, take note of the date and time when the harassment occurs.  Contact your Internet service provider (ISP) or cell phone provider. Ask the website administrator or ISP to remove any Web page created to hurt your child.  If harassment is via e-mail, social networking sites, IM, and chat rooms, instruct your child to “block” bullies or delete your child’s current account and open a new one.  Check out phone features that may allow the number to be blocked.  Make a report to www.cybertipline.com, and if you feel something illegal has occurred, inform law enforcement  Information from Netsmartz Kids: http://www.netsmartz.org/Cyberbullying
  • 25.  “Google” yourself (and your family members!) › Type in first and last name, email addresses, screen names, addresses, phone numbers › search for images as well  Notice advertisements
  • 27.  Facebook , Twitter, Instagram › Age requirements  “No information from children under age 13.” › Public vs Private › Know who you add: friends vs cyberfriends › Have access to your child’s site › Be conscientious of pictures/videos  Protecting reputations online, in plain English (commoncraft.com)
  • 28.  65% of teen girls feel that selfies and other flattering social media photos boost their confidence.  53% also say that photos of themselves posted by others can make them feel bad. › Apps: SkinneePix, Perfect365, and Facetune  When Selfie Improvement Apps Go Too Far  http://www.commonsensemedia.org/blog/when-selfie-improvement-apps-go-too- far?utm_source=042414+Parent+Default&utm_medium=email&utm_campaign=weekly
  • 29.  Privacy settings  Parent pre-approve of all pictures/videos  Remind your child › Don’t post e-mail addresses or cell phone numbers › Don’t share passwords › Do not respond to any e-mails requesting personal information ,delete e-mails from unknown senders.  Discuss how to keep screen names and e-mail addresses gender-neutral, appropriate, and free of any information that could reveal identity.  Encourage your child to tell you right away if anything happens online that bothers or frightens him or her.  Information from Netsmartz Kids: http://www.netsmartz.org/RevealingTooMuch
  • 30.  Facebook use declining with youth  New/hot apps by the minute › https://www.commonsensemedia.org/blog/15- sites-and-apps-kids-are-heading-to-after- facebook?utm_source=030615+Parent+Default& utm_medium=email&utm_campaign=weekly#
  • 31.  Instagram: edit and share photos and 15-second videos, publicly or private network of followers. › Concern: obsession/depression because of ‘likes, photos are public unless settings adjusted, private messaging capability  Tumblr: streaming scrapbook of text, photos, and/or videos and audio clips › Concern: inappropriate materials easily searchable, privacy available but process is difficult, posts are copied by others and shared to non followers “reblogging”  Twitter: is a microblogging site that allows users to post brief, 140-character messages › Updates appear immediately.
  • 32.  Vine: post and watch looping six-second video clips. › It's full of inappropriate videos. In three minutes of random searching, we came across a clip full of full-frontal male nudity, a woman in a fishnet shirt with her breasts exposed, and people blowing marijuana smoke into each other's mouths. Privacy concerns, followers, private settings.  Ask.fm: “Be curious with your friends”. Interact in a Q and A format with friends and anonymous friends. › Cyberbullying incidents. Very popular in the UK but catching on in the US. Linked to at least one student death (13 year old girl in FL).  Musical.ly: Create music videos of yourself and watch others videos › Adult/inappropriate language, sexual/provocative content. Very popular with our kids right now.
  • 33.  It’s not all bad: › https://www.commonsensemedia.org/blog/5-reasons-you-dont-need-to-worry-about-kids-and- social-media?utm_source=042415+Parent+Default&utm_medium=email&utm_campaign=weekly  5 Reasons You Don't Need to Worry About Kids and Social Media › Strengthens friendships  52 percent of all teens who use social media say it's helped their friendships, whereas only 4 percent say it has mainly hurt their friendships › Offers a sense of belonging › Provides genuine support › Helps them express themselves  collaboration › Lets them do good  Exposes them to world wide issues
  • 34.  Text messaging  Instant messaging/hangouts/IM  Online gaming chats  Message boards  Blogs and wikis  Chat rooms
  • 35.  Wikipedia and netlingo.com list of internet slang › http://en.wiktionary.org/wiki/Appendix:Internet_sl ang › http://www.netlingo.com/acronyms.php  Sexting acronyms: › http://m.y102reading.iheart.com/photos/ad- 31514/23-sexting-acronyms-every-parent- should-411956/ LOL BRB POS NIFOC
  • 36.
  • 37.  Kik Messenger: text for free, fast with no message limits, character limits, or fees. Because it's an app, the texts won't show up on your kid's phone's messaging service. › Concerns: ads and in-app-purchases. Kik specializes in conversations between brands and users. Linked with OinkText (communicate with strangers), Kikcommunity where you can submit photos/screenshots of messages that can display user’s full name Better choices  ooVoo :free video, voice, and messaging app. Group chatting capability › Concerns: Can be distracting (multitasking/addicting) Chat with only approved contact lists, which can help ease parents' safety concerns.  WhatsApp lets users send text/audio messages, videos, and photos to one or many people with no message limits or fees. › Concerns: It can be pushy. Automatically connects you to all the people in your address book, encourages others not using it to sign up
  • 38.  MeetMe Chat and Meet New People," says it all. › It's an open network. Users can chat with whoever's online, as well as search locally, opening the door for potential trouble. Lots of details are required.  Omegle is a chat site (and app) that puts two strangers together in their choice of a text chat or video chat room › Users get paired up with strangers. That's the whole premise of the app. And there's no registration required. Often links to porn sites.  Skout is a flirting app that allows users to sign up as teens or adults. Gain ‘points’. › There's no age verification.  Tinder is a photo and messaging dating app for browsing pictures of potential matches within a certain-mile radius of the user's location. It's very popular with 20- somethings as a way to meet new people for casual or long-term relationships. › It's location-based. Geolocation means it's possible for teens to meet up with nearby people, which can be very dangerous.
  • 39.  YouNow › 'the best way to broadcast live and get an audience to watch you.‘ › Apple, Google, computer/phone › requires no registration, age verification, or identification of any sort. › Viewers communicate with the broadcaster through written comments. › www.younow.com
  • 40.  Secret - Speak Freely post what’s on your mind anonymously. › It tries to prevent users from defaming others. It requires some private information. Strong language  Whisper is a social "confessional" app that allows users to post whatever's on their minds, paired with an image. › What parents need to know: Whispers are often sexual in nature. The app encourages users to exchange personal information in the "Meet Up" section.  Yik Yak is a free social-networking app that lets users post brief, Twitter-like comments to the 500 geographically nearest Yik Yak users. › What parents need to know: It reveals your location. By default, your exact location is shown unless you toggle location-sharing off. Each time you open the app, GPS updates your location.
  • 41.  Snapchat post pictures/videos with time limit, disappears afterwards › What parents need to know It's a myth that Snapchats go away forever. Example: screenshot  Poof › Texting app that makes texts ‘go away forever’.  Google Play  Make a folder in a folder  Jailbreak
  • 42.  Online: Webkinz, Neopets, Miniclip, Club Penguin, Animal Jam…….  Gaming systems: PSP, Xbox Live, PS3, Wii  Handheld devices: iPod touch, iPad, cell phones  Smartphones/tables › apps
  • 43.  Know the safety features on the gaming equipment that your child uses—a headset may have voice-masking features, for example.  Keep gaming consoles in an easy-to-supervise location  Be aware of other places where your child may be accessing games.  Tell your child never to give out personal information while gaming or agree to meet anyone outside of the game.  Teach your child not to respond to anyone who is being rude or bullying while playing the game.  Set rules for how long your child may play, what types of games are appropriate, and who else may participate.  Have your child check with you before using a credit or debit card online.  Check to see if the games your child plays have reporting features or moderators.  Information from Netsmartz Kids: http://www.netsmartz.org/Gaming
  • 44.  About 75% of teens (12-17) carry cell phones  1 in 3 teens (13-19) use their cell phone to surf the web  Results from Teens and Mobile phones, Pew Internet and Amerian Life Project, 2010  A Generation Unplugged, Harris Interactive, 2008
  • 45. Cost! › In app purchases  Turn it off  Settings, general, restrictions – change ‘allow’ to ‘off’  Require Password  Keep password a secret  iTunes gift card/allowance http://www.commonsensemedia.org/blog/4-ways-to-curb-kids-in-app- purchases?utm_source=041714+Parent+Default&utm_medium=email&utm_camp aign=weekly
  • 46.  Review cell phone records for any unknown numbers and late night phone calls and texts.  Remind your child that texting is viral—anything sent in a text can be easily forwarded and shared.  Teach your child never to reveal cell phone numbers or passwords online.  Talk to your child about the possible consequences of sending sexually explicit or provocative images or text messages.  When shopping for a cell phone for your child, research the security settings that are available.  From Netsmartz Kids : http://www.netsmartz.org/CellPhones
  • 47.  At+T › Phones and internet: http://www.att.net/parentalcontrols  Verizon › https://wbillpay.verizonwireless.com/vzw/nos/safe guards/safeguardLandingPage.action  Sprint › http://support.sprint.com/support/service/categor y/Parental_controls-Parental_controls
  • 48.  iPhone/iPad/iPod settings › https://support.apple.com/en-us/HT201304
  • 49.  Music/movie Downloads  Copyright Material › Images › Text  Identity Theft  Website Validity  www.turnitin.com
  • 50.  Computer system › Keeping bad stuff (predatory software) out – keeping valuables(personal information) in  Malicious codes: viruses, worms, Trojan  Parasitical malware: spyware, adware
  • 51.  www.cyberpatrol.com  www.netnanny.com  www.spectorsoft.com  www.cybersitter.com  www.covenanteyes.com Anti spyware and adware programs  www.spybot.com (Spybot S &D)  www.adaware.com (lavasoft product)
  • 53.  Guard your identity › Make username generic and anonymous › Little information is needed to get to know you  Monitor your child’s technology use  Use favorites  Understand the services your child uses  Know usernames, passwords, and e-mail
  • 54.  Know child’s “online friends”  Don’t overreact to anything your child tells you (fear you will take computer away)  Never meet anyone met online  Keep your computer up-to-date › windowsupdate.microsoft.com › Virus protection › Firewall
  • 56.  http://www.internetsafety101.org/Pre datorstatistics.htm  www.netsmartz.org  www.isafe.org  http://www.commonsensemedia.org/ educators/parent-media-education  http://www.kidsmart.org.uk/
  • 57.  http://www.thinkuknow.co.uk/default.aspx  www.illinoisicac.org  www.internet-safety.org  www.safekids.com  Twitter information: http://theinnovativeeducator.blogspot.com /2013/06/does-twitter-have-minimum- age.html
  • 58.  http://www.bbc.co.uk/cbbc/help/safesurfin g/  www.wiredkids.org/index.html  www.wiredsafety.org  www.fbi.gov/publications/pguide/pguidee. htm  www.staysafe.org
  • 59.  http://www.cyberbullying.us/research.php  Bullying, Beyond the Schoolyard, by Hinduja and Patchin  http://www.cnet.com/4520-13384_1-6721368-1.html Top 5 Dangers article  http://www.cnet.com/4520-13384_1-6721401- 1.html?tag=lwt;lcol Think Before You Click Worksheet  What’s Hot apps 2015: https://www.commonsensemedia.org/blog/15-sites-and- apps-kids-are-heading-to-after- facebook?utm_source=030615+Parent+Default&utm_m edium=email&utm_campaign=weekly#
  • 60.  YouNow article: http://www.huffingtonpost.com/eli- lebowitz/the-unregulated-world-of- younow_b_5602908.html  Current Apps Parents Should Know About: › http://fun.familyeducation.com/mobile-apps/social- networking/74548.html?page=16
  • 61. Thank you for your attendance at today’s presentation! Make sure you signed in before you leave Powerpoint link: http://www.slideshare.net/Kaneland Svihlik/internet-safety-presentation- 2016

Editor's Notes

  1. Read slide
  2. to understand this complex issue, it is important to start with perspective. Brief uses by adults
  3. Brief uses by students
  4. Points: cell phone is highest, and many have data plans the uses lists are almost all related to communication/social this survey was done before the release of tablets (ipad, kindle, nook…)
  5. Points: cell phone is highest, and many have data plans the uses lists are almost all related to communication/social this survey was done before the release of tablets (ipad, kindle, nook…)
  6. An article on Cnet stated it very concisely, the tope 5 dangers for kids….
  7. Unfortunately the exposure to sexual and pornographic materials have become more of a problem as internet access becomes easier Harassment via digital devices has also increased
  8. Unfortunately the exposure to sexual and pornographic materials have become more of a problem as internet access becomes easier Harassment via digital devices has also increased
  9. A video I saw was about a HS boy adding a ‘female’ ‘friend’ to his fb…. This person scowered his account to find out all he could about him, convinced him to do a video chat, took images, and then tried to blackmail the boy when the ‘female friend’ who was actually an older man, was threatened to be exposed because he was reported.
  10. What do we tell our kids to do?