Welcome  Internet Landscape  Dangers on the Internet  Internet Predators  Cyberbullying  Personal profiles  Communication  Gaming 

Cell phones  Plagiarism & Intellectual Property  Malicious Codes, Viruses, and Spyware  Parent Tips and resources Q&A 

“everything that’s already in the world when you’re born is just normal; anything that gets invented between then and before you turn thirty is incredibly exciting and creative and with any luck you can make a career out of it; anything that gets invented after you’re thirty is against the natural order of things and the beginning of the end of civilization as we know it until it’s been around for about ten years when it gradually turns out to be alright really.”

ADULTS’ VIEW  Communication – email, texting  Shopping and services  Financial management  News and product research  Entertainment – videos, music, games

STUDENTS’ VIEW  Communication – texting, instant messaging, email  Entertainment – games, music, videos  Research – homework, study sites

In May 2009, children aged 2-11 made up nearly 10% of the active online universe (Nielsen, 2010).  18% of 8 – 10 year olds spend time on some kind of social networking site daily (Kaiser, 2010). 

 http://www.commonsensemedia.org/sites/default/files/intern etsafetyelem-tip.pdf

1.

2.

3. 4. 5.

Predators--social networking sites, chat rooms Data theft--stolen passwords, addresses, Social Security numbers, credit card numbers, and other financial information Malicious software (also known as malware)-adware, spyware, viruses, phishing scams Inappropriate content--pornography, content focused on violence, hate propaganda Cyberbullying--bullying peers via instant messages, social networking sites, online games

http://www.cnet.com/4520-13384_1-6721368-1.html

Educate

parents Educate students

Only 18% of youth use chat rooms, however, the majority of Internet-initiated sex crimes against children are initiated in chat rooms. (Journal of Adolescent Health 47, 2010)  In 82% of online sex crimes against minors, the offender used the victim's social networking site to gain information about the victim's likes and dislikes, and 65% used the site to gain home and school information. 

(Journal of Adolescent Heatlh 47, 2010)

https://www.youtube.com/watch?v=9waE2A-uIxQ



Cyberbullying : challenging issues facing educators and parents as young people embrace the Internet and other mobile communication technologies.

Outing and Trickery – Sharing someone’s secrets or embarrassing information or images online  Exclusion – Intentionally keeping someone from being able to take part in an online group, such as a “buddy list.”  Cyberstalking – Repeatedly sending unwanted messages that may include threats of harm; intimidating 

Flaming – Online “fights” using electronic messages with inappropriate language  Harassment – Repeatedly sending offensive, rude, and insulting messages  Denigration – Sending or posting gossip or rumors about a person  Impersonation – Posing to be someone else and making them look bad 

http://www.commonsensemedia.org/videos/cyberbullying-prevention-tips-for-kids

 





 

Tell your child not to respond to rude e-mails, messages, and comments. Save the evidence, such as e-mail and text messages, and take screenshots of comments and images. Also, take note of the date and time when the harassment occurs. Contact your Internet service provider (ISP) or cell phone provider. Ask the website administrator or ISP to remove any Web page created to hurt your child. If harassment is via e-mail, social networking sites, IM, and chat rooms, instruct your child to “block” bullies or delete your child’s current account and open a new one. Check out phone features that may allow the number to be blocked. Make a report to www.cybertipline.com, and if you feel something illegal has occurred, inform law enforcement  Information from Netsmartz Kids: http://www.netsmartz.org/Cyberbullying



“Google” yourself (and your family members!) › Type in first and last name, email addresses,

screen names, addresses, phone numbers › search for images as well 

Notice advertisements



Facebook , Twitter, Instagram › Age requirements  “No information from children under age 13.”

› Public vs Private › Know who you add: friends vs cyberfriends

› Have access to your child’s site › Be conscientious of pictures/videos  Protecting reputations online, in plain English (commoncraft.com)

65% of teen girls feel that selfies and other flattering social media photos boost their confidence.  53% also say that photos of themselves posted by others can make them feel bad. 

› Apps: SkinneePix, Perfect365, and Facetune  When Selfie Improvement Apps Go Too Far  http://www.commonsensemedia.org/blog/when-selfie-improvement-apps-go-toofar?utm_source=042414+Parent+Default&utm_medium=email&utm_campaign=weekly

  





Privacy settings Parent pre-approve of all pictures/videos Remind your child › never to post e-mail addresses or cell phone numbers. › passwords should only be shared with parents and guardians. › Do not respond to any e-mails requesting personal information and to delete e-mails from unknown senders. Discuss how to keep screen names and e-mail addresses gender-neutral, appropriate, and free of any information that could reveal identity. Encourage your child to tell you right away if anything happens online that bothers or frightens him or her.  Information from Netsmartz Kids: http://www.netsmartz.org/RevealingTooMuch

 Text

messaging  Chat rooms  Instant messaging (‘IMing’)  Online gaming – gaming devices  Message boards  Blogs and wikis

Online: Webkinz, Neopets, Miniclip, Club Penguin, Animal Jam…….  Gaming systems: PSP, Xbox Live, PS3, Wii  Handheld devices: iPod touch, iPad, cell phones 



      

Know the safety features on the gaming equipment that your child uses—a headset may have voice-masking features, for example. Keep gaming consoles in an easy-to-supervise location Be aware of other places where your child may be accessing games. Tell your child never to give out personal information while gaming or agree to meet anyone outside of the game. Teach your child not to respond to anyone who is being rude or bullying while playing the game. Set rules for how long your child may play, what types of games are appropriate, and who else may participate. Have your child check with you before using a credit or debit card online. Check to see if the games your child plays have reporting features or moderators.  Information from Netsmartz Kids: http://www.netsmartz.org/Gaming

POS

LOL

BRB

ASL

SMS (short message service) aka texting  Wikipedia and netlingo.com list of internet slang 

› http://en.wiktionary.org/wiki/Appendix:Intern

et_slang › http://www.netlingo.com/acronyms.php

About 75% of teens (12-17) carry cell phones  1 in 3 teens (13-19) use their cell phone to surf the web 

 Results from Teens and Mobile phones, Pew Internet and Amerian Life Project, 2010  A Generation Unplugged, Harris Interactive, 2008

Cost! › In app purchases  Turn it off  Settings, general, restrictions – change ‘allow’ to ‘off’

 Require Password  Keep password a secret  iTunes gift card/allowance

http://www.commonsensemedia.org/blog/4-ways-to-curb-kids-in-apppurchases?utm_source=041714+Parent+Default&utm_medium=email&utm_camp aign=weekly



Dangerous Apps: › Omegle  Chat with strangers, links to Facebook (interests) › Whisper  Post ‘secrets’ but puts location › Down  Hookup app, connects to Facebook

http://www.checkupnewsroom.com/7-dangerous-apps-that-parents-need-to-knowabout/



Dangerous Apps: › Yik Yak  Uses GPS, locates nearest people on it › Snapchat  Pics that disappear in 10 seconds › KiK messenger  Messaging under pseudonyms › Poof  Hides apps (no longer available)

http://www.checkupnewsroom.com/7-dangerous-apps-that-parents-need-to-knowabout/

   



Review cell phone records for any unknown numbers and late night phone calls and texts. Remind your child that texting is viral—anything sent in a text can be easily forwarded and shared. Teach your child never to reveal cell phone numbers or passwords online. Talk to your child about the possible consequences of sending sexually explicit or provocative images or text messages. When shopping for a cell phone for your child, research the security settings that are available.  From Netsmartz Kids : http://www.netsmartz.org/CellPhones



At+T › Phones and internet:

http://www.att.net/s/s.dll?ep=1659430&ch=s mct/smct_is



Verizon › https://wbillpay.verizonwireless.com/vzw/nos

/uc/uc_overview.jsp



Sprint › http://www.sprint.com/landings/family/safet

y.html

 

Music Downloads Copyright Material › Images › Text

  

Identity Theft Website Validity www.turnitin.com



Computer system › Keeping bad stuff (predatory software) out

– keeping valuables(personal information) in

Malicious codes: viruses, worms, Trojan  Parasitical malware: spyware, adware 

Anti spyware and adware programs  www.spybot.com (Spybot S &D)  www.adaware.com (lavasoft product)     

www.cyberpatrol.com www.netnanny.com www.spectorsoft.com www.cybersitter.com www.covenanteyes.com

http://www.commonsensemedia.org/video/advic e



Video from www.commonsense.org › http://www.commonsensemedia.org/advic

e-for-parents/rules-road-parents-digital-age



Guard your identity › Make username generic and anonymous › Little information is needed to get to know

you

Monitor your child’s technology use  Use favorites  Understand the services your child uses  Know usernames, passwords, and e-mail 

Know child’s “online friends”  Don’t overreact to anything your child tells you (fear you will take computer away)  Never meet anyone met online  Keep your computer up-to-date 

› windowsupdate.microsoft.com › Virus protection

› Firewall

 http://www.internetsafety101.org/

Predatorstatistics.htm  www.netsmartz.org  www.isafe.org  http://www.commonsensemedia. org/educators/parent-mediaeducation  http://www.kidsmart.org.uk/

 http://www.thinkuknow.co.uk/default.

aspx  www.illinoisicac.org  www.internet-safety.org  www.safekids.com  Twitter information: http://theinnovativeeducator.blogspo t.com/2013/06/does-twitter-haveminimum-age.html

 http://www.bbc.co.uk/cbbc/help/saf

esurfing/  www.wiredkids.org/index.html  www.wiredsafety.org  www.fbi.gov/publications/pguide/pg uidee.htm  www.staysafe.org

http://www.cyberbullying.us/research.php  Bullying, Beyond the Schoolyard, by Hinduja and Patchin 

 http://www.cnet.com/4520-13384_1-

6721368-1.html Top 5 Dangers article



http://www.cnet.com/4520-13384_16721401-1.html?tag=lwt;lcol Think Before You Click Worksheet

Thank you for your attendance at today’s presentation! Make sure you have signed in before you leave

Powerpoint link:

Internet Safety Presentation.pdf

Page 2 of 50. Welcome. Internet Landscape. Dangers on the. Internet. Internet Predators. Cyberbullying. Personal profiles. Communication.

3MB Sizes 5 Downloads 155 Views

Recommend Documents

Internet-Safety-Policy.pdf
meanings given such terms in section 2246 of title 18, United States Code. Page 2 of 2. Internet-Safety-Policy.pdf. Internet-Safety-Policy.pdf. Open. Extract.

Internet Health and Safety Education.pdf
Internet Health and Safety Education.pdf. Internet Health and Safety Education.pdf. Open. Extract. Open with. Sign In. Main menu.

2nd Grade Internet Safety Parent Letter.pdf
other players. Page 3 of 3. 2nd Grade Internet Safety Parent Letter.pdf. 2nd Grade Internet Safety Parent Letter.pdf. Open. Extract. Open with. Sign In. Main menu.

Internet Acceptable Use and Safety Policy.pdf
numbers, school addresses, work addresses, identification numbers, account. numbers ... network identification other than those assigned to the user. ... appropriate school authorities. Page 3 of 9. Internet Acceptable Use and Safety Policy.pdf.

Safety Bulletin - Chemical Safety Board
Program the defrost control sequence to automatically depressurize or bleed the coil upon ... In cases where ammonia may be released in an aerosolized form with lubricating oil from the refrigeration system, the flammable .... components (e.g., sucti

Internet Internet
any other place with an internet connection and permission from UWM) to ... example, adding reactor startup demonstrations in its tours. VIRTUAL CONSOLE ...

Engineering Safety Requirements, Safety Constraints ...
Thus, safety (like security and survivability) is a kind of defensibility ... cost-effectiveness, we are developing more and more safety-critical systems that are ..... How can we best perform management and engineering trade-offs between them.

CIPA Internet Safety Policy revised May 12 2009.pdf
Page 2 of 3. CIPA Internet Safety Policy – Adopted June 9, 2009 2. Access to Inappropriate Material. To the extent practical, Technology Protection Measures (or ...

524 - Internet Acceptable Use and Safety Policy (1).pdf
... account numbers, access codes. or passwords, labeled photographs or other information that would. make the individual's identity easily traceable, and will ...

High Burnup Nuclear Fuel Pushing the Safety ... - San Onofre Safety
Jan 9, 2014 - to stretch the bolt lids and leave an opening to the cask interior. But cited references do not include the 1-ton impact limiters at each end, which would increase the bending. For HBF, 140 g forces, a 60 mph side impact, would easily s

High Burnup Nuclear Fuel Pushing the Safety ... - San Onofre Safety
Jan 9, 2014 - 2. After 3 to 4 years, extremely radioactive and thermally hot fuel assemblies are removed from the reactor and stored underwater in a fuel pool.

Google Safety Center
10. Family safety basics. For busy parents, here are some quick suggestions for how to help ... Use antivirus software and update it regularly, unless you have a ...

Safety Alert - BC Ferries
Jun 23, 2008 - For those of you who like to grill it up during the summer, here's a safety announcement you should be aware of. For those of you who ...

safety drills
Apr 12, 2016 - Emergency Medical Aid Act. Freedom of Information and Protection of Privacy Act · Fire Code Regulation. Occupational Health and Safety Act.

Safety HW.pdf
... more about the potential hazards of a chemical. IV. EMERGENCY SCENARIOS. Emergency Do this immediately How to prevent. Sleeve catches. on fire. Chemical gets in. your eye. Major fire in the. lab. Page 2 of 2. Safety HW.pdf. Safety HW.pdf. Open. E

Material Safety Data Sheet
Mar 8, 2010 - CAS Number Content (weight%) ... Hold eyelids open to facilitate rinsing. ... Avoid all sources of ignition: heat, sparks, or open flame. STORAGE.

Material Safety Data Sheet
Mar 8, 2010 - Safety data sheet ... Substance/preparation and company identification. 24 Hour .... Consult local fire marshal for storage requirements.