SlideShare a Scribd company logo
1 of 53
 Internet Landscape
 Internet Dangers
 Internet Predators
 Cyberbullying
 Online Threats
 Personal profiles
 Apps and
communication
 Gaming
 Smart Phones
 Parental Control and
information resources
ADULTS’ VIEW
 Communication – email, texting, social media
 Shopping and services
 Financial management
 News and product research
 Entertainment – videos, music, games
STUDENTS’ VIEW
 Communication – texting, instant
messaging, email
 Entertainment – games, music, videos
 Research – homework, study sites
https://www.commonsensemedia.org/research/social-media-social-life-2018
1. Inappropriate content--pornography, content
focused on violence, hate propaganda
2. Cyberbullying--bullying peers via instant
messages, social networking sites, online games
3. Predators--social networking sites, chat rooms
4. Data theft--stolen passwords, addresses, Social
Security numbers, credit card numbers, and other
financial information
5. Malicious software (also known as malware)--
adware, spyware, viruses, phishing scams
http://www.cnet.com/4520-13384_1-6721368-1.html
 In 82% of online sex crimes against minors, the
offender used the victim's social networking site
to gain information about the victim's likes and
dislikes, and 65% used the site to gain home and
school information. (Journal of Adolescent Heatlh 47, 2010)
https://www.youtube.com/watch?v=9waE2A-uIxQ
 March 21st, 2018 - Oklahoma:
Man arrested after arranging Uber take ’14-year-
old girl’ to his grandparents’ house for sex
› Details: 21 year old man, soliciting a sexual encounter with a 14 year
old girl using social media. Sent multiple nude photos.
› Arranged an Uber to pick up and bring the 14 year old girl to his
grandparents house for a sexual encounter
› 14 year old was an undercover officer
› http://wgntv.com/2018/03/21/man-arrested-after-arranging-uber-take-
14-year-old-girl-to-his-grandparents-house-for-sex/
 Cyberbullying : challenging issues facing
educators and parents as young people
embrace the Internet and other mobile
communication technologies.
 Outing and Trickery
 Exclusion
 Cyberstalking
 Flaming
 Harassment
 Denigration
 Impersonation
http://www.commonsensemedia.org/videos/cyberbullying-prevention-tips-for-kids
 Remind your child to be a good cyber citizen
 Do not respond: Tell your child not to respond to rude e-mails,
messages, and comments.
 Save the evidence, such as e-mail and text messages, and take
screenshots of comments and images. Also, take note of the date
and time when the harassment occurs.
 Contact your Internet service provider (ISP) or cell phone provider.
Ask the website administrator or ISP to remove any Web page
created to hurt your child.
 If harassment is via e-mail, social networking sites, IM, and chat
rooms, instruct your child to “block” bullies or delete your child’s
current account and open a new one.
 Check out phone features that may allow the number to be
blocked.
 Make a report to www.cybertipline.com, and if you feel something
illegal has occurred, inform law enforcement
 Information from Netsmartz Kids: http://www.netsmartz.org/Cyberbullying
 Terrorism or threats of violent acts
› Suspensions, arrests
 Police, Schools Warn of Increased Online
Threats
› https://www.nbcdfw.com/news/local/Police-Schools-Warn-of-Increased-
Online-Threats-477243823.html
 'Just a joke': Students' social media
threats are disrupting schools
› https://www.pnj.com/story/news/crime/2017/10/15/how-students-social-
media-threats-disrupting-schools-involving-police/753349001/
https://www.commonsensemedia.org/research/social-media-social-life-2018
 It’s not all bad:
› https://www.commonsensemedia.org/blog/5-reasons-you-dont-need-to-worry-about-kids-and-
social-media?utm_source=042415+Parent+Default&utm_medium=email&utm_campaign=weekly
 5 Reasons You Don't Need to Worry About Kids and Social Media
› Strengthens friendships
 52 percent of all teens who use social media say it's helped their
friendships, whereas only 4 percent say it has mainly hurt their
friendships
› Offers a sense of belonging
› Provides genuine support
› Helps them express themselves
 collaboration
› Lets them do good
 Exposes them to world wide issues
 Social networking sites/apps
› Age requirements
 “No information from children under age 13.”
› Public vs Private
› Know who you add: friends vs cyberfriends
› Have access to your child’s site
› Be conscientious of pictures/videos
 Protecting reputations online, in plain English
(commoncraft.com)
 Formerly Muscial.ly
› Migrated all users to TikTok Aug. 2018
› “a community where everyone can be a creator”
 Concerns:
› Check privacy settings!
› Challenges: ‘eye challenge’4/21/19
 https://www.newsweek.com/eye-challenge-tiktok-
controversy-bleach-app-1402382
 About the app:
› https://www.commonsensemedia.org/blog/parents-
ultimate-guide-to-musically
 Snapchat post pictures/videos with time limit,
disappears afterwards
What parents need to know:
› It's a myth that Snapchats go away forever.
Screenshots!
› Location feature
› Memories and ‘My Eyes Only’ Folder
 Ask.fm: “Be curious with your friends”. Interact in a Q and A
format with friends and anonymous friends.
› Cyberbullying incidents. Very popular in the UK but
catching on in the US. Linked to at least one student death
(13 year old girl in FL).
 Line: all-in-one mobile hub for chatting, sharing photos and
videos, and free texting and video calls. Users decide how long
their messages will be visible (two seconds or a week).
 Houseparty: group video chatting
 Tumblr: streaming scrapbook of text, photos, and/or
videos and audio clips
› Concern: inappropriate materials easily searchable,
privacy available but process is difficult, posts are
copied by others and shared to non followers
“reblogging”
 Twitter: is a microblogging site that allows users to post
brief, 140-character messages
› Concern: public posts can be mature, private
messages
 WhatsApp lets users send text/audio messages, videos, and
photos to one or many people with no message limits or fees.
(owned by Facebook)
› Concerns: It can be pushy. Automatically connects you to all
the people in your address book. Can post your location.
 WeChat WeChat encourages users to chat with strangers nearby
or around the world, at random. In the top 50 apps being used.
 MeetMe Chat and Meet New People," says it all.
› It's an open network. Users can chat with whoever's online, as well as search
locally, opening the door for potential trouble. Lots of details are required.
 Skout is a flirting app that allows users to sign up as teens or adults. Gain ‘points’.
› There's no age verification.
 Tinder is a photo and messaging dating app for browsing pictures of potential
matches within a certain-mile radius of the user's location. It's very popular with 20-
somethings as a way to meet new people for casual or long-term relationships.
(beware of Yellow – Yubo: the Tinder for Teens)
› It's location-based. Geolocation means it's possible for teens to meet up with
nearby people, which can be very dangerous.
 Calucator%
› Looks like a calculator app, really a photo vault to
hid photos
 HIP (Hide it Pro)
› Hides photos, videos and apps
› Looks like a ‘music manager’
 Make a folder in a folder
 Jailbreak
 Delete app/reload app
https://appsolutelyapril.com/2
018/03/21/10-apps-teens-
are-using-that-parents-need-
to-know/
 https://smartsocial.com/app-guide-parents-
teachers/
 YouNow
› 'the best way to broadcast live and get an audience
to watch you.‘
› Apple, Google, computer/phone
› requires no registration, age verification, or
identification of any sort.
› Viewers communicate with the broadcaster through
written comments.
› www.younow.com
 Facebook Live
 Live stream
 Twitch
 gaming.youtube.com
 ustream
 https://adcoock.com/sites/top-7-best-free-live-video-
streaming-websites.html
 Privacy settings
 Parent pre-approve of all pictures/videos
 Remind your child
› Don’t post e-mail addresses or cell phone numbers
› Don’t share passwords
› Do not respond to any e-mails requesting personal
information ,delete e-mails from unknown senders.
 Discuss how to keep screen names and e-mail addresses
gender-neutral, appropriate, and free of any information that
could reveal identity.
 Encourage your child to tell you right away if anything
happens online that bothers or frightens him or her.
 Information from Netsmartz Kids: http://www.netsmartz.org/RevealingTooMuch
 Online: Animal Jam, Roblox, Minecraft
 Gaming systems: PSP, Xbox Live, PS3, Wii
 Handheld devices: iPod touch, iPad, cell
phones
 Smartphones/tables
› apps
 Know the safety features on the gaming equipment that your child
uses—a headset may have voice-masking features, for example.
 Keep gaming consoles in an easy-to-supervise location
 Be aware of other places where your child may be accessing
games.
 Tell your child never to give out personal information while
gaming or agree to meet anyone outside of the game.
 Teach your child not to respond to anyone who is being rude or
bullying while playing the game.
 Set rules for how long your child may play, what types of games
are appropriate, and who else may participate.
 Have your child check with you before using a credit or debit card
online.
 Check to see if the games your child plays have reporting features
or moderators.
 Information from Netsmartz Kids: http://www.netsmartz.org/Gaming
 Videos, photos, texts
› Sexting
› Child pornography
› Distribution of Child Pornography
 Gallery Guardian
https://www.galleryguardian.co.uk/
› The app that gives you peace of mind by helping
protect your child against inappropriate images
on their mobile devices.
 Review cell phone records for any unknown numbers
and late night phone calls and texts.
 Remind your child that texting is viral—anything sent
in a text can be easily forwarded and shared.
 Teach your child never to reveal cell phone numbers or
passwords online.
 Talk to your child about the possible consequences of
sending sexually explicit or provocative images or text
messages.
 When shopping for a cell phone for your child, research
the security settings that are available.
 From Netsmartz Kids : http://www.netsmartz.org/CellPhones
 At+T
› Phones and internet:
https://www.att.com/esupport/main.html#!/wireles
s/topic_featuressettings-topic_parentalcontrols21
 Verizon
› https://wbillpay.verizonwireless.com/vzw/nos/safe
guards/safeguardLandingPage.action?intcmp=IN
T-MVZ-VNT-SAFEGUARDS
 Sprint
› https://support.sprint.com/support/service/catego
ry/Parental_controls-Parental_controls
 Apple Classroom
› Pros:
 Lock devices
 View screen on device
 Restrict downloads
 Restrict apps
 Free
› Cons:
 proximity
 Go Guardian
› https://www.goguardian.com/
 Our Pact
› https://ourpact.com/
 Family Time
› https://familytime.io/
 Life 360
› https://www.life360.com/
 Circle (Disney)
› https://meetcircle.com/
 https://netsanity.net/
 Family Link
› With the Family Link app from Google, you can stay in the loop as your kid
explores on their Android* device. Family Link lets you create a Google Account
for your kid that’s like your account, while also helping you set certain digital
ground rules that work for your family — like managing the apps your kid can
use, keeping an eye on screen time, and setting a bedtime on your kid’s device.
› https://families.google.com/familylink/
 http://www.mercurynews.com/2017/03/15/go
ogle-now-letting-parents-set-up-accounts-
for-kids-under-13/
 www.kidgy.com
 www.mspy.com
 Kid Zone app: for Google Play/Android only.
Blocks installing apps and unwanted text
messages
 TeenSafe: GPS and view devices messages
(even deleted)
 www.commonsense.org
 http://www.internetsafety101.org/Pre
datorstatistics.htm
 www.netsmartz.org
 www.isafe.org
 http://www.commonsensemedia.org/
educators/parent-media-education
 http://www.kidsmart.org.uk/
 http://www.thinkuknow.co.uk/default.aspx
 www.illinoisicac.org
 www.internet-safety.org
 www.safekids.com
 https://www.workingmother.com/5-best-
parental-control-app-to-protect-your-
children
 http://www.bbc.co.uk/cbbc/help/safesurfin
g/
 www.wiredkids.org/index.html
 www.wiredsafety.org
 www.fbi.gov/publications/pguide/pguidee.
htm
 www.staysafe.org
 http://www.cyberbullying.us/research.php
 Bullying, Beyond the Schoolyard, by Hinduja and
Patchin
 http://www.cnet.com/4520-13384_1-6721368-1.html Top
5 Dangers article
 http://www.cnet.com/4520-13384_1-6721401-
1.html?tag=lwt;lcol Think Before You Click Worksheet
 https://www.learningliftoff.com/10-apps-kids-use-that-
parents-should-know-about/
Thank you for your attendance for this presentation!
Presentation link:

More Related Content

What's hot

Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
Ellie Simons
 
Digital footprint powerpoint
Digital footprint powerpointDigital footprint powerpoint
Digital footprint powerpoint
ducklvr9
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
br03wood
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
Sally Garza
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
Pamela Moeai
 

What's hot (20)

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
Digital footprint powerpoint
Digital footprint powerpointDigital footprint powerpoint
Digital footprint powerpoint
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentation
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
Social media dangers
Social media dangersSocial media dangers
Social media dangers
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 

Similar to Internet safety presentation 2019

Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
KanelandSvihlik
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
KanelandSvihlik
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012
KanelandSvihlik
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
cpitchford
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
Eanes isd
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
Ollie Bray
 

Similar to Internet safety presentation 2019 (20)

Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
What Parents Should Know
What Parents Should KnowWhat Parents Should Know
What Parents Should Know
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
My protection plan
My protection planMy protection plan
My protection plan
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
 

Recently uploaded

75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
Asmae Rabhi
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 

Recently uploaded (20)

75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 

Internet safety presentation 2019

  • 1.
  • 2.  Internet Landscape  Internet Dangers  Internet Predators  Cyberbullying  Online Threats  Personal profiles  Apps and communication  Gaming  Smart Phones  Parental Control and information resources
  • 3. ADULTS’ VIEW  Communication – email, texting, social media  Shopping and services  Financial management  News and product research  Entertainment – videos, music, games
  • 4. STUDENTS’ VIEW  Communication – texting, instant messaging, email  Entertainment – games, music, videos  Research – homework, study sites
  • 5.
  • 6.
  • 8.
  • 9. 1. Inappropriate content--pornography, content focused on violence, hate propaganda 2. Cyberbullying--bullying peers via instant messages, social networking sites, online games 3. Predators--social networking sites, chat rooms 4. Data theft--stolen passwords, addresses, Social Security numbers, credit card numbers, and other financial information 5. Malicious software (also known as malware)-- adware, spyware, viruses, phishing scams http://www.cnet.com/4520-13384_1-6721368-1.html
  • 10.  In 82% of online sex crimes against minors, the offender used the victim's social networking site to gain information about the victim's likes and dislikes, and 65% used the site to gain home and school information. (Journal of Adolescent Heatlh 47, 2010)
  • 12.  March 21st, 2018 - Oklahoma: Man arrested after arranging Uber take ’14-year- old girl’ to his grandparents’ house for sex › Details: 21 year old man, soliciting a sexual encounter with a 14 year old girl using social media. Sent multiple nude photos. › Arranged an Uber to pick up and bring the 14 year old girl to his grandparents house for a sexual encounter › 14 year old was an undercover officer › http://wgntv.com/2018/03/21/man-arrested-after-arranging-uber-take- 14-year-old-girl-to-his-grandparents-house-for-sex/
  • 13.
  • 14.  Cyberbullying : challenging issues facing educators and parents as young people embrace the Internet and other mobile communication technologies.
  • 15.  Outing and Trickery  Exclusion  Cyberstalking  Flaming  Harassment  Denigration  Impersonation
  • 17.  Remind your child to be a good cyber citizen  Do not respond: Tell your child not to respond to rude e-mails, messages, and comments.  Save the evidence, such as e-mail and text messages, and take screenshots of comments and images. Also, take note of the date and time when the harassment occurs.  Contact your Internet service provider (ISP) or cell phone provider. Ask the website administrator or ISP to remove any Web page created to hurt your child.  If harassment is via e-mail, social networking sites, IM, and chat rooms, instruct your child to “block” bullies or delete your child’s current account and open a new one.  Check out phone features that may allow the number to be blocked.  Make a report to www.cybertipline.com, and if you feel something illegal has occurred, inform law enforcement  Information from Netsmartz Kids: http://www.netsmartz.org/Cyberbullying
  • 18.  Terrorism or threats of violent acts › Suspensions, arrests  Police, Schools Warn of Increased Online Threats › https://www.nbcdfw.com/news/local/Police-Schools-Warn-of-Increased- Online-Threats-477243823.html  'Just a joke': Students' social media threats are disrupting schools › https://www.pnj.com/story/news/crime/2017/10/15/how-students-social- media-threats-disrupting-schools-involving-police/753349001/
  • 19.
  • 21.  It’s not all bad: › https://www.commonsensemedia.org/blog/5-reasons-you-dont-need-to-worry-about-kids-and- social-media?utm_source=042415+Parent+Default&utm_medium=email&utm_campaign=weekly  5 Reasons You Don't Need to Worry About Kids and Social Media › Strengthens friendships  52 percent of all teens who use social media say it's helped their friendships, whereas only 4 percent say it has mainly hurt their friendships › Offers a sense of belonging › Provides genuine support › Helps them express themselves  collaboration › Lets them do good  Exposes them to world wide issues
  • 22.  Social networking sites/apps › Age requirements  “No information from children under age 13.” › Public vs Private › Know who you add: friends vs cyberfriends › Have access to your child’s site › Be conscientious of pictures/videos  Protecting reputations online, in plain English (commoncraft.com)
  • 23.  Formerly Muscial.ly › Migrated all users to TikTok Aug. 2018 › “a community where everyone can be a creator”
  • 24.  Concerns: › Check privacy settings! › Challenges: ‘eye challenge’4/21/19  https://www.newsweek.com/eye-challenge-tiktok- controversy-bleach-app-1402382  About the app: › https://www.commonsensemedia.org/blog/parents- ultimate-guide-to-musically
  • 25.  Snapchat post pictures/videos with time limit, disappears afterwards What parents need to know: › It's a myth that Snapchats go away forever. Screenshots! › Location feature › Memories and ‘My Eyes Only’ Folder
  • 26.  Ask.fm: “Be curious with your friends”. Interact in a Q and A format with friends and anonymous friends. › Cyberbullying incidents. Very popular in the UK but catching on in the US. Linked to at least one student death (13 year old girl in FL).  Line: all-in-one mobile hub for chatting, sharing photos and videos, and free texting and video calls. Users decide how long their messages will be visible (two seconds or a week).  Houseparty: group video chatting
  • 27.  Tumblr: streaming scrapbook of text, photos, and/or videos and audio clips › Concern: inappropriate materials easily searchable, privacy available but process is difficult, posts are copied by others and shared to non followers “reblogging”  Twitter: is a microblogging site that allows users to post brief, 140-character messages › Concern: public posts can be mature, private messages
  • 28.  WhatsApp lets users send text/audio messages, videos, and photos to one or many people with no message limits or fees. (owned by Facebook) › Concerns: It can be pushy. Automatically connects you to all the people in your address book. Can post your location.  WeChat WeChat encourages users to chat with strangers nearby or around the world, at random. In the top 50 apps being used.
  • 29.  MeetMe Chat and Meet New People," says it all. › It's an open network. Users can chat with whoever's online, as well as search locally, opening the door for potential trouble. Lots of details are required.  Skout is a flirting app that allows users to sign up as teens or adults. Gain ‘points’. › There's no age verification.  Tinder is a photo and messaging dating app for browsing pictures of potential matches within a certain-mile radius of the user's location. It's very popular with 20- somethings as a way to meet new people for casual or long-term relationships. (beware of Yellow – Yubo: the Tinder for Teens) › It's location-based. Geolocation means it's possible for teens to meet up with nearby people, which can be very dangerous.
  • 30.  Calucator% › Looks like a calculator app, really a photo vault to hid photos  HIP (Hide it Pro) › Hides photos, videos and apps › Looks like a ‘music manager’  Make a folder in a folder  Jailbreak  Delete app/reload app
  • 33.  YouNow › 'the best way to broadcast live and get an audience to watch you.‘ › Apple, Google, computer/phone › requires no registration, age verification, or identification of any sort. › Viewers communicate with the broadcaster through written comments. › www.younow.com
  • 34.  Facebook Live  Live stream  Twitch  gaming.youtube.com  ustream  https://adcoock.com/sites/top-7-best-free-live-video- streaming-websites.html
  • 35.  Privacy settings  Parent pre-approve of all pictures/videos  Remind your child › Don’t post e-mail addresses or cell phone numbers › Don’t share passwords › Do not respond to any e-mails requesting personal information ,delete e-mails from unknown senders.  Discuss how to keep screen names and e-mail addresses gender-neutral, appropriate, and free of any information that could reveal identity.  Encourage your child to tell you right away if anything happens online that bothers or frightens him or her.  Information from Netsmartz Kids: http://www.netsmartz.org/RevealingTooMuch
  • 36.  Online: Animal Jam, Roblox, Minecraft  Gaming systems: PSP, Xbox Live, PS3, Wii  Handheld devices: iPod touch, iPad, cell phones  Smartphones/tables › apps
  • 37.  Know the safety features on the gaming equipment that your child uses—a headset may have voice-masking features, for example.  Keep gaming consoles in an easy-to-supervise location  Be aware of other places where your child may be accessing games.  Tell your child never to give out personal information while gaming or agree to meet anyone outside of the game.  Teach your child not to respond to anyone who is being rude or bullying while playing the game.  Set rules for how long your child may play, what types of games are appropriate, and who else may participate.  Have your child check with you before using a credit or debit card online.  Check to see if the games your child plays have reporting features or moderators.  Information from Netsmartz Kids: http://www.netsmartz.org/Gaming
  • 38.  Videos, photos, texts › Sexting › Child pornography › Distribution of Child Pornography  Gallery Guardian https://www.galleryguardian.co.uk/ › The app that gives you peace of mind by helping protect your child against inappropriate images on their mobile devices.
  • 39.  Review cell phone records for any unknown numbers and late night phone calls and texts.  Remind your child that texting is viral—anything sent in a text can be easily forwarded and shared.  Teach your child never to reveal cell phone numbers or passwords online.  Talk to your child about the possible consequences of sending sexually explicit or provocative images or text messages.  When shopping for a cell phone for your child, research the security settings that are available.  From Netsmartz Kids : http://www.netsmartz.org/CellPhones
  • 40.  At+T › Phones and internet: https://www.att.com/esupport/main.html#!/wireles s/topic_featuressettings-topic_parentalcontrols21  Verizon › https://wbillpay.verizonwireless.com/vzw/nos/safe guards/safeguardLandingPage.action?intcmp=IN T-MVZ-VNT-SAFEGUARDS  Sprint › https://support.sprint.com/support/service/catego ry/Parental_controls-Parental_controls
  • 41.  Apple Classroom › Pros:  Lock devices  View screen on device  Restrict downloads  Restrict apps  Free › Cons:  proximity
  • 42.  Go Guardian › https://www.goguardian.com/  Our Pact › https://ourpact.com/  Family Time › https://familytime.io/  Life 360 › https://www.life360.com/  Circle (Disney) › https://meetcircle.com/
  • 44.  Family Link › With the Family Link app from Google, you can stay in the loop as your kid explores on their Android* device. Family Link lets you create a Google Account for your kid that’s like your account, while also helping you set certain digital ground rules that work for your family — like managing the apps your kid can use, keeping an eye on screen time, and setting a bedtime on your kid’s device. › https://families.google.com/familylink/  http://www.mercurynews.com/2017/03/15/go ogle-now-letting-parents-set-up-accounts- for-kids-under-13/
  • 47.  Kid Zone app: for Google Play/Android only. Blocks installing apps and unwanted text messages  TeenSafe: GPS and view devices messages (even deleted)
  • 49.  http://www.internetsafety101.org/Pre datorstatistics.htm  www.netsmartz.org  www.isafe.org  http://www.commonsensemedia.org/ educators/parent-media-education  http://www.kidsmart.org.uk/
  • 50.  http://www.thinkuknow.co.uk/default.aspx  www.illinoisicac.org  www.internet-safety.org  www.safekids.com  https://www.workingmother.com/5-best- parental-control-app-to-protect-your- children
  • 51.  http://www.bbc.co.uk/cbbc/help/safesurfin g/  www.wiredkids.org/index.html  www.wiredsafety.org  www.fbi.gov/publications/pguide/pguidee. htm  www.staysafe.org
  • 52.  http://www.cyberbullying.us/research.php  Bullying, Beyond the Schoolyard, by Hinduja and Patchin  http://www.cnet.com/4520-13384_1-6721368-1.html Top 5 Dangers article  http://www.cnet.com/4520-13384_1-6721401- 1.html?tag=lwt;lcol Think Before You Click Worksheet  https://www.learningliftoff.com/10-apps-kids-use-that- parents-should-know-about/
  • 53. Thank you for your attendance for this presentation! Presentation link:

Editor's Notes

  1. 9th year presenting on this topic
  2. to understand this complex issue, it is important to start with perspective. Brief uses by adults
  3. Brief uses by students
  4. Points: cell phone is highest. 96% of kids 12 -17
  5. Points: cell phone is highest. 96% of kids 12 -17
  6. Points: cell phone is highest. 96% of kids 12 -17
  7. An article on Cnet stated it very concisely, the tope 5 dangers for kids….
  8. Unfortunately the exposure to sexual and pornographic materials have become more of a problem as internet access becomes easier Harassment via digital devices has also increased
  9. Unfortunately the exposure to sexual and pornographic materials have become more of a problem as internet access becomes easier Harassment via digital devices has also increased
  10. What do we tell our kids to do?
  11. Points: cell phone is highest. 96% of kids 12 -17