Enter your child s cyber world
This presentation is the property of its rightful owner.
Sponsored Links
1 / 42

Enter Your Child’s Cyber World PowerPoint PPT Presentation


  • 89 Views
  • Uploaded on
  • Presentation posted in: General

Enter Your Child’s Cyber World. Internet Safety. Our thanks to: James Baird, CISSP with GBI Osborne Middle School Technology Team. Enter Your Child’s Cyber World. LOL. LV. F2T. WAN2. PAW. WYGOWM. H8. LOV. Enter Your Child’s Cyber World. F2T. LV. LOL. WYGOWM.

Download Presentation

Enter Your Child’s Cyber World

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Enter your child s cyber world

Enter Your Child’s Cyber World


Internet safety

InternetSafety

Our thanks to:

  • James Baird, CISSP with GBI

  • Osborne Middle School Technology Team


Enter your child s cyber world1

Enter Your Child’s Cyber World

LOL

LV

F2T

WAN2

PAW

WYGOWM

H8

LOV


Enter your child s cyber world2

Enter Your Child’s Cyber World

F2T

LV

LOL

WYGOWM

  • LOL = Laughing Out Loud

  • F2T = Free To Talk

  • LV = Leave

  • H8 = Hate

  • WAN2 = Want to?

  • POS = Parent Over Shoulder

  • PAW = Parents Are Watching

  • WTGP = Want To Go Private

  • WYGOWM = Will You Go Out With Me?

  • http://www.acronymfinder.com

POS

PAW

WAN2

WTGP

H8

SeePacket


Characteristics of some youth may facilitate victimization

Characteristics of Some Youth May Facilitate Victimization

  • Lack of emotional maturity

  • Strong desire for attention, validation, and affection

  • Naturally curious about sex, “forbidden” topics

  • May be rebellious and enjoy defying authority

  • Easily impressed, manipulated and intimidated

  • Youth lacking adult supervision


Students basic online behavior

Students’ Basic Online Behavior

  • 80% of students spend at least one hour per week on the Internet

  • 11% of students spend over 8 hours per week on the Internet

  • 12% of students say they spend more time on the Internet than with friends

  • 30% of students say e-mail, chat rooms, or Instant Messaging is the main way they stay in contact with their friends

  • 38% of students feel more free to do what they want on the Internet

  • 31% of students say it is easier to talk with people on the Internet than in real life

  • 29% of students use chat rooms, with a peak usage of 45% occurring in grade 7Based on i-SAFE America surveys of 19,000 students


The parent child gap

The Parent-Child Gap


Promises

Promises


Internet predator profile

Internet Predator Profile

  • Typically married adult with children

  • Normal neighbor

  • Usually has a successful career in an upper-management position

  • College graduate, possibly post-graduate degree

  • Upper, middle-class lifestyle

  • Usually 35 or older

  • Usually white

  • Will offend again


Students risky online behavior

Students’ Risky Online Behavior

  • 55% of students admit giving their personal information (name, sex, age, etc.) over the Internet

  • 52% of students prefer to be alone while on the Internet

  • 40% of students have visited inappropriate places on the Internet

  • 10% of students feel it is okay to post their picture on the Internet

  • 10% of students have met someone face-to-face that they previously met on the Internet

  • 25% of students believe there is nothing wrong with chatting to strangers online

  • 21% of students say after getting to know someone better on the Internet, they would believe them when they tell their age


Http www netsmartz org

http://www.netsmartz.org


Tracking teresa

"Tracking Teresa"

  • Even though Teresa has tried not to reveal personal information online, she’s left enough clues that she could find herself in danger.

    http://www.netsmartz.org/resources/reallife.htm#realAmy


Chat rooms virtual parks

Chat Rooms – Virtual Parks

  • No longer the guy with the trench coat waiting to kidnap the child

  • Can sit anywhere and talk to several children at one time at different locations

  • Used to gain child’s trust and set up sexual meetings

  • Used to send pornographic images

  • They will send the child porn, getting more explicit each time

  • They will try to convince the child that everybody is doing this and that it is normal


Chat rooms

Chat Rooms

  • Predators often snoop around child chat rooms for potential victims.

  • They use various methods to get close to children but even if a child is not receptive to the predators advances, he can still harass and endanger the child by searching for information about the child.


Countermeasures for predators

Countermeasures for Predators

  • Use parental controls (if available)

  • Monitor child’s actions on the internet

  • Discuss appropriate internet activities

  • Purchase NetNanny ($40) or similar

  • Caution children about predators

  • Limit the time child spends on a computer.

  • Use software that creates a log of sites visited and every keystroke that is made on the computer.

  • Randomly check emails on child’s account

  • Move the computer into a family area

    The internet is not a babysitter.


More countermeasures

More Countermeasures

  • Discuss Internet crime and safety issues with your family

  • Discuss with other family members expectations with use of the computer.

  • Sign an agreement between parents and children that outlines expectations and the amount of time allowed on the computer per day or week.

  • Include in agreement who can be contacted or talked with on the computer.

  • If family member receives an email that offends you or them, contact your Internet Provider and complain about the message being received.


Cyber bullying is coming to a school near you if it hasn t already

Cyber-bullying is Coming to a School Near You if it hasn’t already.

Concerns include:

  • Cyber-bullying can be much more damaging psychologically and much more intense.

  • It creates a barrier between the bully and the victim. This can allow someone who normally wouldn't be a bully to become one because there is no face to face contact.


Cyber bullying

Cyber-bullying

  • It is difficult to catch the cyber-bully. When identified, the suspect’s defense is often that it was someone else impersonating them using their password.

  • Camera phones are making cyber-bullying more creative. Taking someone’s picture and then manipulating it, then posting it on a web site or in e-mail. Imagine getting an e-mail of a nude individual with your face attached to it, and you’re only a teenager.

  • Many think this behavior is a joke and not as serious as bullying face to face.


Cyber bullying1

Cyber-bullying

  • Victims are often targeted because they are considered different — usually those considered overweight, small, with a learning disability or overly sensitive.

  • Many face dirty digital tricks that range from derogatory comments about them online to embarrassing e-mail attributed to them intended to insult friends and crushes.


Cyber bullying statistics

Cyber Bullying Statistics

  • 42% of kids have been bullied while online. 1 in 4 have had it happen more than once.

  • 35% of kids have been threatened online. Nearly 1 in 5 have had it happen more than once.

  • 21% of kids have received mean or threatening e-mail or other messages.

    Based on 2004 i-SAFE survey of 1,500 students grades 4-8


Cyber bullying statistics1

Cyber Bullying Statistics

  • 53% of kids admit having said something mean or hurtful to another person online. More than 1 in 3 have done it more than once.

  • 58% of kids admit someone has said mean or hurtful things to them online. More than 4 out of 10 say it has happened more than once.

  • 58% have not told their parents or an adult about somethingmean or hurtful that happened to them online.


Www xanga com

www.xanga.com

Popular Blog Site


Blog sites

Blog Sites


Www xanga com1

www.xanga.com


Www xanga com2

www.xanga.com


Www facebook com

www.facebook.com


Parents must be aware

Parents Must Be Aware

  • Many kids do not want to report this problem to their parents for fear of how their parents may react.

  • They fear their parents will take away their cell phone, computer, or Internet access.

  • Obviously this solution will stop the messages, but then the child feels harassed by the bully and punished by the parents when the equipment is removed.


Signs that a child might be at risk on line

Signs That a Child Might Be At Risk On-line

  • Spends large amounts of time on-line, especially at night

  • Find pornography on child's computer

  • Child receives phone calls from unknown men or is making calls, sometimes long distance, to unfamiliar numbers

  • Child receives mail, gifts, or packages from unfamiliar sources

  • Child turns the computer monitor off or quickly changes the screen on the monitor when you come into the room

  • Child becomes withdrawn from the family

  • Child is using an on-line account belonging to someone else


Cyber bullying tips

Cyber Bullying Tips

  • Tell a trusted adult about the bullying, and keep telling until the adult takes action.

  • Don’t open or read messages by cyber bullies.

  • Tell your school if it is school related. Schools have a bullying solution in place.


Cyber bullying tips1

Cyber Bullying Tips

  • Don’t erase the messages—they may be needed to take action.

  • Protect yourself—never agree to meet with the person or with anyone you meet online.

  • If bullied through chat or instant messaging, the “bully” can often be blocked.

  • If you are threatened with harm, inform the local police.


What can parents do

What Can Parents Do?

  • Establish a bond of trust and open communication with their child.

  • Place / keep computer(s) with Internet access in an open, commonly used space.

  • Learn about the new technologies

  • Commend your child for reporting cyber issues

  • Parent and Child Internet Agreement


What can parents do1

What Can Parents Do?

Cybersitter relies on an extensive, frequently updated database of sites and word patterns. By default, Cybersitter blocks content related to sex, drugs, hate, and violence, as well as blocking all image searches. But parents can select from 32 content categories—including cults, gambling, file sharing, wrestling, and free e-mail sites—to tailor the filter to their needs. These settings are applied to Web browsing, e-mail, instant messaging, and newsgroups. Or you can simply block all instant messaging, newsgroups, FTP access, and file sharing. .

Cybersitter offers a good stealth mode, letting parents filter and monitor kids' activities without their knowledge. Cybersitter can record both sides of IM sessions, as well as log all sites visited and any violations. This information can then be automatically e-mailed to you in a daily activity report.


Have you googled yourself

Have you googled yourself?

  • http://www.google.com

  • Search your name, email address, telephone number, home address

  • Search children’s, spouse, relatives

  • It may be possible to remove unwanted information from some sites


Gcps policies and procedures

GCPS POLICIES AND PROCEDURES


What can schools do gcps chattahoochee elementary school

What Can Schools Do?GCPS/Chattahoochee Elementary School

  • GCPS Firewall

  • Blocked Sites and Procedures

  • Acceptable Use Policies

    • Both Students and Staff

  • Supervision of Computer Labs

    • Teachers, Parent Volunteers, Tech Staff

  • Technology Orientation

    • Both Students and Staff

  • Counselor Programs


Enter your child s cyber world

Be CyberSmart,

Stay CyberSafe!


Enter your child s cyber world3

Enter Your Child’s Cyber World

  • Tracy Parrish – Enter Your Child’s Cyber World

    • Internet Safety Quiz for Adults

    • Presentation: Enter Your Child’s Cyber World

      • Information complied by Osborne Middle School

  • Additional Tools

    • Handouts

    • Web Resources

    • Parent/Student Contracts

  • Question & Answer


Sites of interest

Sites of Interest

  • CyberSmart:www.cybersmart.org

  • Netsmartz:http://www.netsmartz.org

  • Georgia State Computer Crimes Task Force Educators Sub-Committee:http://sci-one.kennesaw.edu/EduSec

  • NetNanny Internet Filter:http://www.netnanny.com/index.html

  • SpyBot privacy cleaner: http://security.kolla.de/

  • Ad-Aware privacy cleaner: http://www.lavasoftusa.com/

  • GATech InfoSec Law Library:http://www.security.gatech.edu/policy/law_library/

  • Free Antivirus:http://www.grisoft.com/


  • Login