SlideShare ist ein Scribd-Unternehmen logo
1 von 35
© 2016 SCHOOL FAMILY MEDIA
Keeping Your Child Safe
on the Internet
© 2016 SCHOOL FAMILY MEDIA
Nugroho Gito
Orang Tua Murid Rafif 5B
Nugroho.gito@yahoo.com
Materi diambil dari beberapa sumber dari Internet
© 2016 SCHOOL FAMILY MEDIA
Welcome
We are first-generation Internet parents
• Our children are the first generation to be born
and raised with the Internet as part of their
everyday lives
• Our children know
more about the
Internet than we do!
© 2016 SCHOOL FAMILY MEDIA
Goals for Tonight
• To understand what
our children are doing
online
• To keep our children
safe when they’re online
• To teach our children
to make smart choices
when they’re online
© 2016 SCHOOL FAMILY MEDIA
What Children Do Online
• Visit virtual worlds
• Talk with one another using instant
messaging (IM’ing)
• Post profiles and communicate with
others on social networking sites
• View and post videos
• Play multi-user games
• Do research
© 2016 SCHOOL FAMILY MEDIA
Social Media
How our Kids interact with Internet
Browser
PC, Tablet, Smartphones
© 2016 SCHOOL FAMILY MEDIA
Virtual Worlds
• Popular virtual worlds
>> Webkinz
>> Club Penguin
>> Whyville
• Some are better than others
• Visit and play yourself
© 2016 SCHOOL FAMILY MEDIA
Social Networking Sites
• Popular social networking sites
>> Facebook
>> MySpace
>> Xanga
• Users create “profiles”
• Communicate with friends
© 2016 SCHOOL FAMILY MEDIA
Instant Messaging
• Allows children to “talk”
with friends at any time
on the computer
• IM’ing and cell phone
text messaging has
replaced email as a
preferred method of
communicating
© 2016 SCHOOL FAMILY MEDIA
Video-Sharing Sites
• Popular video-sharing
sites:
>> YouTube
>> Vimeo
• Users view and post
videos
• Post and read comments
about the video content
© 2016 SCHOOL FAMILY MEDIA
Online Games
• Consoles like Xbox Live are increasingly
connected to the Internet, allowing kids to play
against friends and strangers
• Many allow players to talk in real time using
headsets and microphones
• Kids may be exposed to “trash talk” or worse
© 2016 SCHOOL FAMILY MEDIA
Dangers Online
• Disturbing content
• Cyberbullying
• Sexual predators
© 2016 SCHOOL FAMILY MEDIA
Sexual Predators
• Masquerade as other children
or kindly adults
• Trick children into revealing
personal information
• Lure children and teenagers
into meeting them in person
© 2016 SCHOOL FAMILY MEDIA
Keep Personal
Information Private
• Never reveal
>> Name
>> Address
>> Phone number
>> School name
• Don’t post or send photographs of yourself
• Choose a nondescript screen name
© 2016 SCHOOL FAMILY MEDIA
Learn How To Use
Privacy Settings
• Become familiar with the
websites your child visits
• Read privacy policies
• Settings should be “private”
© 2016 SCHOOL FAMILY MEDIA
If a Stranger Contacts
Your Child
• Make sure your child
knows:
>> Don’t respond
>> Contact an adult right away
>> Block the offender
• Notify your internet
service provider, if
warranted
© 2016 SCHOOL FAMILY MEDIA
Cyberbullying
• Posting or forwarding a private IM
or email to others
• Tricking someone into revealing
embarrassing information and
forwarding it to others
• Spreading malicious
rumors
• Stealing passwords
© 2016 SCHOOL FAMILY MEDIA
Protecting Against
Cyberbullying
• Never respond to unkind remarks
• Don’t participate in cyberbullying
• Block the cyberbully
• Tell a trusted adult
• Save the posts
• Notify law enforcement, if appropriate
© 2016 SCHOOL FAMILY MEDIA
Inappropriate Content
• There are “bad” parts of the Internet,
just as there are “bad” parts of town
• Shield your child with:
>> Parental control software
>> Child-friendly search engines
>> Bookmarks to favorite sites
• Teach your child what to do if he
accidentally views disturbing content
© 2016 SCHOOL FAMILY MEDIA
Basic Ways To Keep
Your Child Safe
• Sign an “Internet Safety Contract”
• Keep the computer in a “public” area of
your home
• Set a time limit for computer use
• Become familiar with the sites your
child visits
• Know your child’s online “friends”
• Know your child’s passwords
• Keep your antivirus software up to date
© 2016 SCHOOL FAMILY MEDIA
Basic Internet Rules
for Children
• Never give out identifying information
• Never write or post anything you wouldn’t be
comfortable with the whole world seeing
• Treat others online as you would treat them
in person
• Never share your password
• Never open an email or click on a link from
someone you don’t know
• Never download or click on anything without
checking with me or another adult first
© 2016 SCHOOL FAMILY MEDIA
Resources
• K9 Web Protection
www.k9webprotection.com
Free Internet filtering software
and parental controls
• NetSmartz
www.netsmartz.org
Online safety tips for parents
and kids
• AllSafeSites
www.allsafesites.com
A child-safe Internet search
engine
© 2016 SCHOOL FAMILY MEDIA
Resources
• Kids Safe Search Engine
http://www.safesearchkids.org/
© 2016 SCHOOL FAMILY MEDIA
Free Parental Control Software
• Microsoft Family Safety
http://familysafety.microsoft.com/
• K9 Web Protection
http://www1.k9webprotection.com/
© 2016 SCHOOL FAMILY MEDIA
K9 Web Demo
Free Parental Control Software
PC – Mobile Devices
© 2016 SCHOOL FAMILY MEDIA
K9 Web Protection
© 2016 SCHOOL FAMILY MEDIA
Web Site Categories
© 2016 SCHOOL FAMILY MEDIA
Time Restrictions
© 2016 SCHOOL FAMILY MEDIA
Web Site Exceptions
© 2016 SCHOOL FAMILY MEDIA
Blocking Effects
© 2016 SCHOOL FAMILY MEDIA
Block URL Keywords
© 2016 SCHOOL FAMILY MEDIA
Safe Search
© 2016 SCHOOL FAMILY MEDIA
iOS: Disable Safari, Use K9 Browser
Click this App
to safe
browsing
http://www1.k9webprotection.com/support/set-idevice-restrictions
© 2016 SCHOOL FAMILY MEDIA
Commercial
Parental Control
Software
© 2016 SCHOOL FAMILY MEDIA
Qu StudioBlock apps and applications on all devices Time limits for each device Facebook Monitoring
Monitor Location on a map Monitor Calls and Text Messaging Reports Usage
© 2016 SCHOOL FAMILY MEDIA
Other Parental Control Software

Weitere ähnliche Inhalte

Was ist angesagt?

Scope and applications of electronics and communication engineering
Scope and applications of electronics and communication engineeringScope and applications of electronics and communication engineering
Scope and applications of electronics and communication engineeringRajesh Kumar
 
Digital footprint powerpoint
Digital footprint powerpointDigital footprint powerpoint
Digital footprint powerpointducklvr9
 
Your Cell Phone is my Drug
Your Cell Phone is my DrugYour Cell Phone is my Drug
Your Cell Phone is my Drugnicolejfournier
 
Effect of using mobile phone
Effect of using mobile phoneEffect of using mobile phone
Effect of using mobile phonePiyali Goswami
 
Smart phones and their effects
Smart phones and their effectsSmart phones and their effects
Smart phones and their effectstdub4
 
Evolution - Mobile phones
Evolution - Mobile phonesEvolution - Mobile phones
Evolution - Mobile phonesAshish Malhotra
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents Jennifer Holena
 
IoT Based Intelligent Bin For Smart Cities
IoT Based Intelligent Bin For Smart CitiesIoT Based Intelligent Bin For Smart Cities
IoT Based Intelligent Bin For Smart CitiesAbhisek Sahoo
 
How IoT & Smart Home Automation Will Change the Way We Live
How IoT & Smart Home Automation Will Change the Way We LiveHow IoT & Smart Home Automation Will Change the Way We Live
How IoT & Smart Home Automation Will Change the Way We LiveTriState Technology
 
Alexa Basic Introduction
Alexa Basic IntroductionAlexa Basic Introduction
Alexa Basic IntroductionPardeep jain
 
MOBILE ADDICTION.pptx
MOBILE ADDICTION.pptxMOBILE ADDICTION.pptx
MOBILE ADDICTION.pptxBibhuDash12
 
Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)SPEC INDIA
 
Presentation on wireless technology
Presentation on wireless technologyPresentation on wireless technology
Presentation on wireless technologyDipjyoti Deka
 
Lecture 6 geolocation
Lecture 6 geolocationLecture 6 geolocation
Lecture 6 geolocationmoduledesign
 

Was ist angesagt? (20)

Scope and applications of electronics and communication engineering
Scope and applications of electronics and communication engineeringScope and applications of electronics and communication engineering
Scope and applications of electronics and communication engineering
 
Digital footprint powerpoint
Digital footprint powerpointDigital footprint powerpoint
Digital footprint powerpoint
 
Amazon Alexa
Amazon AlexaAmazon Alexa
Amazon Alexa
 
Your Cell Phone is my Drug
Your Cell Phone is my DrugYour Cell Phone is my Drug
Your Cell Phone is my Drug
 
LI-FI Presentation
LI-FI  Presentation LI-FI  Presentation
LI-FI Presentation
 
Environment and mobile radiation
Environment and mobile radiationEnvironment and mobile radiation
Environment and mobile radiation
 
Effect of using mobile phone
Effect of using mobile phoneEffect of using mobile phone
Effect of using mobile phone
 
Smart phones and their effects
Smart phones and their effectsSmart phones and their effects
Smart phones and their effects
 
Evolution - Mobile phones
Evolution - Mobile phonesEvolution - Mobile phones
Evolution - Mobile phones
 
Ai in education
Ai in educationAi in education
Ai in education
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
IoT Based Intelligent Bin For Smart Cities
IoT Based Intelligent Bin For Smart CitiesIoT Based Intelligent Bin For Smart Cities
IoT Based Intelligent Bin For Smart Cities
 
How IoT & Smart Home Automation Will Change the Way We Live
How IoT & Smart Home Automation Will Change the Way We LiveHow IoT & Smart Home Automation Will Change the Way We Live
How IoT & Smart Home Automation Will Change the Way We Live
 
Alexa Basic Introduction
Alexa Basic IntroductionAlexa Basic Introduction
Alexa Basic Introduction
 
Smart devices
Smart devicesSmart devices
Smart devices
 
wi-fi ppt
wi-fi pptwi-fi ppt
wi-fi ppt
 
MOBILE ADDICTION.pptx
MOBILE ADDICTION.pptxMOBILE ADDICTION.pptx
MOBILE ADDICTION.pptx
 
Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)
 
Presentation on wireless technology
Presentation on wireless technologyPresentation on wireless technology
Presentation on wireless technology
 
Lecture 6 geolocation
Lecture 6 geolocationLecture 6 geolocation
Lecture 6 geolocation
 

Andere mochten auch

Parental Control Apps/Software for Android & iPhone
Parental Control Apps/Software for Android & iPhoneParental Control Apps/Software for Android & iPhone
Parental Control Apps/Software for Android & iPhoneNischint
 
Parental controls
Parental controlsParental controls
Parental controlsadyar99
 
Direct parental contraol
Direct parental contraolDirect parental contraol
Direct parental contraolNyi Maw
 
Parental Control Presentation
Parental Control PresentationParental Control Presentation
Parental Control PresentationTS Bray
 
Powerpoint on Parental Control Styles
Powerpoint on Parental Control StylesPowerpoint on Parental Control Styles
Powerpoint on Parental Control StylesAmandaBain
 
Children and the internet
Children and the internetChildren and the internet
Children and the internetMeghan
 
Family Internet Safety - Cyber Bullying
Family Internet Safety - Cyber BullyingFamily Internet Safety - Cyber Bullying
Family Internet Safety - Cyber BullyingDamon Taylor
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
The Reasons why people who said [Video Games are bad] are either ignorance or...
The Reasons why people who said[Video Games are bad]are either ignorance or...The Reasons why people who said[Video Games are bad]are either ignorance or...
The Reasons why people who said [Video Games are bad] are either ignorance or...Matumit Sombunjaroen
 
Children of the internet
Children of the internetChildren of the internet
Children of the internetTeam Pramkaew
 
Are Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internetAre Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internetMd Jahirul Islam Sojib
 
Are Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internetAre Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internetMd Jahirul Islam Sojib
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Dnc Times - March - 2015
Dnc Times - March - 2015Dnc Times - March - 2015
Dnc Times - March - 2015Dnc Times
 
Building Resilient Children Bullying, Harassment& Cyber Safety
Building Resilient Children Bullying, Harassment& Cyber Safety Building Resilient Children Bullying, Harassment& Cyber Safety
Building Resilient Children Bullying, Harassment& Cyber Safety Mark Woolley
 
Child Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspectionChild Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspectionOfsted
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Kontes Unjuk Karya Klip Kreatif
Kontes Unjuk Karya Klip KreatifKontes Unjuk Karya Klip Kreatif
Kontes Unjuk Karya Klip KreatifIndonesia Kreatif
 

Andere mochten auch (20)

Parental Control Apps/Software for Android & iPhone
Parental Control Apps/Software for Android & iPhoneParental Control Apps/Software for Android & iPhone
Parental Control Apps/Software for Android & iPhone
 
Parental controls
Parental controlsParental controls
Parental controls
 
Direct parental contraol
Direct parental contraolDirect parental contraol
Direct parental contraol
 
Parental Control Presentation
Parental Control PresentationParental Control Presentation
Parental Control Presentation
 
Powerpoint on Parental Control Styles
Powerpoint on Parental Control StylesPowerpoint on Parental Control Styles
Powerpoint on Parental Control Styles
 
Children and the internet
Children and the internetChildren and the internet
Children and the internet
 
Family Internet Safety - Cyber Bullying
Family Internet Safety - Cyber BullyingFamily Internet Safety - Cyber Bullying
Family Internet Safety - Cyber Bullying
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
The Reasons why people who said [Video Games are bad] are either ignorance or...
The Reasons why people who said[Video Games are bad]are either ignorance or...The Reasons why people who said[Video Games are bad]are either ignorance or...
The Reasons why people who said [Video Games are bad] are either ignorance or...
 
Children of the internet
Children of the internetChildren of the internet
Children of the internet
 
Are Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internetAre Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internet
 
Children and future internet
Children and future internetChildren and future internet
Children and future internet
 
Are Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internetAre Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internet
 
About Yogyakarta
About YogyakartaAbout Yogyakarta
About Yogyakarta
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Dnc Times - March - 2015
Dnc Times - March - 2015Dnc Times - March - 2015
Dnc Times - March - 2015
 
Building Resilient Children Bullying, Harassment& Cyber Safety
Building Resilient Children Bullying, Harassment& Cyber Safety Building Resilient Children Bullying, Harassment& Cyber Safety
Building Resilient Children Bullying, Harassment& Cyber Safety
 
Child Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspectionChild Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspection
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Kontes Unjuk Karya Klip Kreatif
Kontes Unjuk Karya Klip KreatifKontes Unjuk Karya Klip Kreatif
Kontes Unjuk Karya Klip Kreatif
 

Ähnlich wie Parental Control, Internet Safety, Safe Internet for Children

Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminarsEmmanuel Arthur
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminarsEmmanuel Arthur
 
Internet safety power_point
Internet safety power_pointInternet safety power_point
Internet safety power_pointAmit Pal Singh
 
internet and safety.pdf
internet and safety.pdfinternet and safety.pdf
internet and safety.pdfSiddharthD8
 
K-5-internet_safety.ppt
K-5-internet_safety.pptK-5-internet_safety.ppt
K-5-internet_safety.pptrobert83603
 
K 5-internet safety
K 5-internet safetyK 5-internet safety
K 5-internet safetyahad55
 
E safety-parent-workshop
E safety-parent-workshop E safety-parent-workshop
E safety-parent-workshop wwihead
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015Staci Trekles
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital CitizensJason Rushing
 
Media & Technology; The Christian Parents’s View
Media & Technology; The Christian Parents’s ViewMedia & Technology; The Christian Parents’s View
Media & Technology; The Christian Parents’s ViewHans Rasmussen
 
Internet safetypresentation
Internet safetypresentationInternet safetypresentation
Internet safetypresentationfkompar
 
Technology Influence
Technology Influence Technology Influence
Technology Influence Ilaxi Patel
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetydanriles
 

Ähnlich wie Parental Control, Internet Safety, Safe Internet for Children (20)

Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Internet safety power_point
Internet safety power_pointInternet safety power_point
Internet safety power_point
 
iiiii.ppt
iiiii.pptiiiii.ppt
iiiii.ppt
 
intrnet sfty.ppt
intrnet sfty.pptintrnet sfty.ppt
intrnet sfty.ppt
 
K-5-internet_safety.ppt
K-5-internet_safety.pptK-5-internet_safety.ppt
K-5-internet_safety.ppt
 
internet and safety.pdf
internet and safety.pdfinternet and safety.pdf
internet and safety.pdf
 
K-5-internet_safety.ppt
K-5-internet_safety.pptK-5-internet_safety.ppt
K-5-internet_safety.ppt
 
K 5-internet safety
K 5-internet safetyK 5-internet safety
K 5-internet safety
 
Dont delete.pptx
Dont delete.pptxDont delete.pptx
Dont delete.pptx
 
E safety-parent-workshop
E safety-parent-workshop E safety-parent-workshop
E safety-parent-workshop
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
 
Media & Technology; The Christian Parents’s View
Media & Technology; The Christian Parents’s ViewMedia & Technology; The Christian Parents’s View
Media & Technology; The Christian Parents’s View
 
Internet safetypresentation
Internet safetypresentationInternet safetypresentation
Internet safetypresentation
 
Online safety
Online safetyOnline safety
Online safety
 
Technology Influence
Technology Influence Technology Influence
Technology Influence
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Cyber saftey for parents
Cyber saftey for parentsCyber saftey for parents
Cyber saftey for parents
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 

Mehr von Nugroho Gito

RHCSA EX200 - Summary
RHCSA EX200 - SummaryRHCSA EX200 - Summary
RHCSA EX200 - SummaryNugroho Gito
 
Card payment evolution v1.0
Card payment evolution v1.0Card payment evolution v1.0
Card payment evolution v1.0Nugroho Gito
 
IT Architect Profession
IT Architect ProfessionIT Architect Profession
IT Architect ProfessionNugroho Gito
 
Ethereum Mining How To
Ethereum Mining How ToEthereum Mining How To
Ethereum Mining How ToNugroho Gito
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application PlatformNugroho Gito
 
Ssh to Bluemix runtime container
Ssh to Bluemix runtime containerSsh to Bluemix runtime container
Ssh to Bluemix runtime containerNugroho Gito
 
Linux Survival Kit for Proof of Concept & Proof of Technology
Linux Survival Kit for Proof of Concept & Proof of TechnologyLinux Survival Kit for Proof of Concept & Proof of Technology
Linux Survival Kit for Proof of Concept & Proof of TechnologyNugroho Gito
 
IBM Watson & Cognitive Computing - Tech In Asia 2016
IBM Watson & Cognitive Computing - Tech In Asia 2016IBM Watson & Cognitive Computing - Tech In Asia 2016
IBM Watson & Cognitive Computing - Tech In Asia 2016Nugroho Gito
 

Mehr von Nugroho Gito (8)

RHCSA EX200 - Summary
RHCSA EX200 - SummaryRHCSA EX200 - Summary
RHCSA EX200 - Summary
 
Card payment evolution v1.0
Card payment evolution v1.0Card payment evolution v1.0
Card payment evolution v1.0
 
IT Architect Profession
IT Architect ProfessionIT Architect Profession
IT Architect Profession
 
Ethereum Mining How To
Ethereum Mining How ToEthereum Mining How To
Ethereum Mining How To
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 
Ssh to Bluemix runtime container
Ssh to Bluemix runtime containerSsh to Bluemix runtime container
Ssh to Bluemix runtime container
 
Linux Survival Kit for Proof of Concept & Proof of Technology
Linux Survival Kit for Proof of Concept & Proof of TechnologyLinux Survival Kit for Proof of Concept & Proof of Technology
Linux Survival Kit for Proof of Concept & Proof of Technology
 
IBM Watson & Cognitive Computing - Tech In Asia 2016
IBM Watson & Cognitive Computing - Tech In Asia 2016IBM Watson & Cognitive Computing - Tech In Asia 2016
IBM Watson & Cognitive Computing - Tech In Asia 2016
 

Kürzlich hochgeladen

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Kürzlich hochgeladen (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

Parental Control, Internet Safety, Safe Internet for Children

  • 1. © 2016 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2016 SCHOOL FAMILY MEDIA Nugroho Gito Orang Tua Murid Rafif 5B Nugroho.gito@yahoo.com Materi diambil dari beberapa sumber dari Internet
  • 2. © 2016 SCHOOL FAMILY MEDIA Welcome We are first-generation Internet parents • Our children are the first generation to be born and raised with the Internet as part of their everyday lives • Our children know more about the Internet than we do!
  • 3. © 2016 SCHOOL FAMILY MEDIA Goals for Tonight • To understand what our children are doing online • To keep our children safe when they’re online • To teach our children to make smart choices when they’re online
  • 4. © 2016 SCHOOL FAMILY MEDIA What Children Do Online • Visit virtual worlds • Talk with one another using instant messaging (IM’ing) • Post profiles and communicate with others on social networking sites • View and post videos • Play multi-user games • Do research
  • 5. © 2016 SCHOOL FAMILY MEDIA Social Media How our Kids interact with Internet Browser PC, Tablet, Smartphones
  • 6. © 2016 SCHOOL FAMILY MEDIA Virtual Worlds • Popular virtual worlds >> Webkinz >> Club Penguin >> Whyville • Some are better than others • Visit and play yourself
  • 7. © 2016 SCHOOL FAMILY MEDIA Social Networking Sites • Popular social networking sites >> Facebook >> MySpace >> Xanga • Users create “profiles” • Communicate with friends
  • 8. © 2016 SCHOOL FAMILY MEDIA Instant Messaging • Allows children to “talk” with friends at any time on the computer • IM’ing and cell phone text messaging has replaced email as a preferred method of communicating
  • 9. © 2016 SCHOOL FAMILY MEDIA Video-Sharing Sites • Popular video-sharing sites: >> YouTube >> Vimeo • Users view and post videos • Post and read comments about the video content
  • 10. © 2016 SCHOOL FAMILY MEDIA Online Games • Consoles like Xbox Live are increasingly connected to the Internet, allowing kids to play against friends and strangers • Many allow players to talk in real time using headsets and microphones • Kids may be exposed to “trash talk” or worse
  • 11. © 2016 SCHOOL FAMILY MEDIA Dangers Online • Disturbing content • Cyberbullying • Sexual predators
  • 12. © 2016 SCHOOL FAMILY MEDIA Sexual Predators • Masquerade as other children or kindly adults • Trick children into revealing personal information • Lure children and teenagers into meeting them in person
  • 13. © 2016 SCHOOL FAMILY MEDIA Keep Personal Information Private • Never reveal >> Name >> Address >> Phone number >> School name • Don’t post or send photographs of yourself • Choose a nondescript screen name
  • 14. © 2016 SCHOOL FAMILY MEDIA Learn How To Use Privacy Settings • Become familiar with the websites your child visits • Read privacy policies • Settings should be “private”
  • 15. © 2016 SCHOOL FAMILY MEDIA If a Stranger Contacts Your Child • Make sure your child knows: >> Don’t respond >> Contact an adult right away >> Block the offender • Notify your internet service provider, if warranted
  • 16. © 2016 SCHOOL FAMILY MEDIA Cyberbullying • Posting or forwarding a private IM or email to others • Tricking someone into revealing embarrassing information and forwarding it to others • Spreading malicious rumors • Stealing passwords
  • 17. © 2016 SCHOOL FAMILY MEDIA Protecting Against Cyberbullying • Never respond to unkind remarks • Don’t participate in cyberbullying • Block the cyberbully • Tell a trusted adult • Save the posts • Notify law enforcement, if appropriate
  • 18. © 2016 SCHOOL FAMILY MEDIA Inappropriate Content • There are “bad” parts of the Internet, just as there are “bad” parts of town • Shield your child with: >> Parental control software >> Child-friendly search engines >> Bookmarks to favorite sites • Teach your child what to do if he accidentally views disturbing content
  • 19. © 2016 SCHOOL FAMILY MEDIA Basic Ways To Keep Your Child Safe • Sign an “Internet Safety Contract” • Keep the computer in a “public” area of your home • Set a time limit for computer use • Become familiar with the sites your child visits • Know your child’s online “friends” • Know your child’s passwords • Keep your antivirus software up to date
  • 20. © 2016 SCHOOL FAMILY MEDIA Basic Internet Rules for Children • Never give out identifying information • Never write or post anything you wouldn’t be comfortable with the whole world seeing • Treat others online as you would treat them in person • Never share your password • Never open an email or click on a link from someone you don’t know • Never download or click on anything without checking with me or another adult first
  • 21. © 2016 SCHOOL FAMILY MEDIA Resources • K9 Web Protection www.k9webprotection.com Free Internet filtering software and parental controls • NetSmartz www.netsmartz.org Online safety tips for parents and kids • AllSafeSites www.allsafesites.com A child-safe Internet search engine
  • 22. © 2016 SCHOOL FAMILY MEDIA Resources • Kids Safe Search Engine http://www.safesearchkids.org/
  • 23. © 2016 SCHOOL FAMILY MEDIA Free Parental Control Software • Microsoft Family Safety http://familysafety.microsoft.com/ • K9 Web Protection http://www1.k9webprotection.com/
  • 24. © 2016 SCHOOL FAMILY MEDIA K9 Web Demo Free Parental Control Software PC – Mobile Devices
  • 25. © 2016 SCHOOL FAMILY MEDIA K9 Web Protection
  • 26. © 2016 SCHOOL FAMILY MEDIA Web Site Categories
  • 27. © 2016 SCHOOL FAMILY MEDIA Time Restrictions
  • 28. © 2016 SCHOOL FAMILY MEDIA Web Site Exceptions
  • 29. © 2016 SCHOOL FAMILY MEDIA Blocking Effects
  • 30. © 2016 SCHOOL FAMILY MEDIA Block URL Keywords
  • 31. © 2016 SCHOOL FAMILY MEDIA Safe Search
  • 32. © 2016 SCHOOL FAMILY MEDIA iOS: Disable Safari, Use K9 Browser Click this App to safe browsing http://www1.k9webprotection.com/support/set-idevice-restrictions
  • 33. © 2016 SCHOOL FAMILY MEDIA Commercial Parental Control Software
  • 34. © 2016 SCHOOL FAMILY MEDIA Qu StudioBlock apps and applications on all devices Time limits for each device Facebook Monitoring Monitor Location on a map Monitor Calls and Text Messaging Reports Usage
  • 35. © 2016 SCHOOL FAMILY MEDIA Other Parental Control Software