1 / 0

Online Teen Safety 101

Online Teen Safety 101. A Practical Approach Overview to Help Young Adults become “ Street Net Smart ”. Presenter Bio. Mel Holstrom – Founder & President, GBprotect, Inc. Managed Security Services Provider

faraji
Download Presentation

Online Teen Safety 101

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Online Teen Safety 101

    A Practical Approach Overview to Help Young Adults become “StreetNet Smart”
  2. Presenter Bio Mel Holstrom – Founder & President, GBprotect, Inc. Managed Security Services Provider Provide A Full-Service Offering of Information Security Services on a Global Basis Assist Companies Maintain Information Security Compliance Real World Expertise Gained From – 3 “Online Enabled” Daughters 24, 17, & 15 Years Old
  3. Presentation Topics Background of Presentation Identifying the Risks Strategies to Minimize the Risks Ways to Increase Awareness & Stay Current Questions & Answers
  4. Background Information Started working with middle school kids in 2008 Introduced a parent presentation in 2010 Expanding the presentation to communities in 2011 Key objective to gain industry professionals support in a unified approach to distribute knowledge Bringing the children, parents, school district, and communities together
  5. So What Are Kids Doing Online? Social Networking – Virtual Communities Collaborating (Web 2.0) – Friends, Family, Teachers, Coaches Access to Media – Music, Movies, Videos Online Gaming – Xboxes, PlayStations, Interactive Online Shopping – Access to a Virtual Mall Research – Homework, Projects, Studying
  6. What is the“Greatest” Concern to Children Online? “ACCESS DENIED” Broken equipment (Phones, Computer, ISP) Parental controls Time of day restrictions URL Blocking / Filtering Disciplinary actions
  7. Challenges Parents Face The kids are “NET”smarter than most parents are !! It’s a fact…. Kids use the internet much differently than adults do Adults are not always present in digital environments Kids have a false sense of “I can’t hear you – You can’t see me” The intent of what is said and the audience it is said to is not always known and creates a false sense of bravery Unfortunately online messaging, especially those targeted at young people don’t always encourage positive behaviors The challenge is much different than what our parents had to deal with – Street Smarts Net Smarts
  8. Where Does the Internet Exist “VIRTUALLY EVERYWHERE” Mobile Devices (iPhones, Droids, Etc…) Some now provide WAP (Wireless Access Point) functionality for multiple device connectivity Tablets, iPads, Netbooks – Small Format Computers Traditional Laptops and Desktops High Speed – Dedicated Internet Access Anywhere
  9. Today’s Threats Online Access Exists Nearly Anywhere / Anytime Personal Safety Cyber Bullying Sexting Exposure to Inappropriate Content Online Identity Theft / Privacy Controls Violation of Intellectual Property Rights WOW – WHERE DO WE START
  10. Online Predator Threat Fear of online sexual predators exists but not nearly as concerning as once believed Several recent studies have stated that children are no more likely to be preyed upon by strangers online then they would be in public. Studies from the Berkman Center’s Internet Safety Technical Task Force at Harvard University last year found that “cases of adult to child sexual encounters on social networks typically involved youth who were aware that they were meeting an adult male for the purpose of engaging in sexual activity. Even with this being the case, it is still important to teach children that stranger danger concepts need to be applied online just as in the real world.
  11. Cyber Bullying Cyber Bullying is identified in several studies as the number one threat against children on the internet today. Cyber Bullying can include: Flaming – Online fights using electronic messages Harassment – Repeatedly sending nasty, mean, and insulting electronic messages Denigration – “Dissing” someone online, sending or posting gossip or rumors about someone to damage their reputation or friendships Impersonation – Pretending to be someone else and sending or posting materials to get that person in trouble, danger, or to damage that persons reputation Outing – sharing someone else's secrets or embarrassing information online Trickery – talking someone into revealing or sharing embarrassing information then sharing it online Exclusion – intentionally and cruelly excluding someone from an online group Cyberstalking – repeated, intense harassment and denigration that includes threats or creates significant fear
  12. Impact of Cyber Bullying Online communications can be extremely vicious due to the lack of control people demonstrate with electronic communications Victimization can take place 24 hours a day Cyber Bullying communications even if sent privately can be quickly distributed to many others and is often retrievable Cyber Bullies can be virtually anonymous and can solicit the involvement of others Teens may be reluctant to tell adults what is happening because they are emotionally traumatized, think it’s their fault, fear greater retribution, or fear that online capabilities and use will be taken away
  13. Tips to Prevent Cyber Bullying Encourage children to: Not Respond – If the bully doesn't’t get a response from you chances are they will move on Not Retaliate – it reinforces the bullies behavior, could aggravate the situation, and can put you as risk of becoming the bully Talk to a Trusted Adult – they deserve backup, this can be a parent, teacher, counselor, or other trusted adult. Save the Evidence – captured messages in case they are needed to resolve the issue or to engage the proper resources to resolve the issue. Block the Bully – you can use tools and privacy settings in most applications to block the person and prevent further communications. Be Civil – defuse the situation and there is a good chance they will go away. Be a Friend not a Bystander – don’t engage in supporting a bullies behavior by forwarding messages or participating in the bullies actions. If a friend is being bullied that won’t get help, encourage them to get help.
  14. Cyber Threats Cyber Threats are either direct threats or “distressing material” – general statements that make it sound like the writer is emotionally distraught and may be considering harming someone else, harming themselves, or committing suicide As parents and educators we must recognize the source of the initial threat to respond appropriately and timely to the event.
  15. Sexting Sexting can be identified by the sending of sexually explicit messages or images electronically In some cases Sexting can be linked closely to Cyber Bullying if intent is malicious Sexting with images has become a widespread issue due to the availability of cameras in cellphones and the ease of access to them Sexting does not just apply to phones. Sexting can be performed from any media sharing device or technology, including e-mail, social networks and web sites. Causes can be attributed to peer pressure from a Cyber Bully, Boy Friend / Girl Friend, impulsive behaviors, flirting, or even blackmail
  16. Impact of Sexting Can Be Illegal – We need to educate children not to take nude pictures. Even if they are of them or they pass along someone else's – they could be charged with producing or distributing child pornography. Even if they store them in electronic format they could be charged with possession. If they are sent to someone in another state it’s considered a federal felony. Non-Legal Consequences - There is the potential for emotional damages that could come from distribution of the photos that could be posted online and be available potentially for ever.
  17. What Can We Do? Talk to kids about Sexting and discuss the risks in a relaxed setting. Reiterate the potential legal and non-legal consequences that could occur as a result of Sexting. If your child or a child you know has sent any nude pictures of themselves make sure they stop immediately. If they have received a nude photo make sure they have not sent it to someone else. Stay calm and learn as much as you can about the situation. Consider talking with other parents or kids based on what you have learned. Consider whether to report to the local authorities or not based on what you find out from other parents or children involved. If you suspect that malice or criminal intent is involved you may strongly recommend the family consult an attorney. If your child or a child you know is being sent nude photos of other kids it is important that they don’t forward them to anyone else and that they get a parent involved immediately.
  18. Exposure to Inappropriate Content Causes of exposure to inappropriate content can be related to – An incorrect search context or bad website name A result of malware that has been installed on a machine unknowingly An intended action to access the inappropriate content Exposure to the inappropriate content by another individual
  19. Tips to Prevent Exposure Customize search engine settings to provide the desired level of content controls Implement parental control capabilities that will prevent exposure Practice safe browsing practices Implement a good anti-virus and patch management process Apply the think before you click concept to reduce the risk of infecting your computer with malware
  20. Online Identity Theft & Privacy Control Identity theft is the result of an unauthorized person gaining access to and using you identity without your permission. Privacy controls are settings that the end-user can configure to authorize what information may be used by the remote users or systems for there purposes.
  21. Tips to Prevent Online Identity Theft & Fraud Don’t participate in scams that are intended for you to provide personal information Examples of scams include: Phishing of information from sites impersonating your: Bank or Credit Card Company eBay PayPal The you just inherited $80,000,000 e-mail that requires you to respond with a check or credit card I want to buy your merchandise for more than your asking and you can send me back the overage
  22. Protecting Privacy Educate kids to never provide their personal information to anyone outside their circle of friends – Encourage them to monitor and maintain their online friends list Educate kids to never share their passwords with anyone and it is good practice to change them from time to time and use special characters to build complex passwords Educate and understand the use of privacy controls and work with kids to set them to achieve the overall objectives Always read and understand the terms and conditions for use of an online resource before you agree. Teach all online users to always read at least twice before you click once
  23. Reality The use of online resources is incredibility valuable & to an extent nearly impossible to live without today. The chance of success for today’s children without the use of online resources will be limited. The fact of the matter is relying on the ability to control their every online action in impossible – it just can’t be done Parents and mentors need to learn and develop the strategies that allow them to “PARENT” their children online with the same principles we use to raise them as individuals. Our overall objective is to help keep them safe and teach them make wise choices.
  24. A Collaborative Approach Teaching & Applying Online Safety Takes Teamwork It has to start at home with an agreement between the parents and children It has to involve working with the schools to promote education and increase awareness across the student population It needs to spread out into our communities to educate a greater number of people See a Trend Here? We need to apply the same principles of a clearly defined, well-implemented, and monitored “Home Information Security Program” The underlying concepts are the same – personally the stakes are a little higher
  25. Action Plan for Online Parenting Work with parents and children to create a mutually agreed upon “Acceptable Use Policy” governing the use of technology. Implement controls that don’t always result in “ACCESS DENIED” but protect from them from things that they shouldn't be exposed to. Parental control products are available in both hardware and software options. Recommend that parents put in place a schedule that controls the amount of time and the hours your child spends online. Whenever possible recommend parents make sure that online use is done with the computer resource in a visible public location where the chance of someone being able to observe what they are doing exists. Recommend that parents take the approach of not looking over their child's shoulder but rather one of watching their back. Make sure that “Acceptable Use Policy” includes that the parents have the right to audit their online activities at anytime. Recommend that parents make it a requirement that parents have their password to all of their accounts including: E-mail Facebook and other Social Networking websites Cell phone screen locks
  26. Valuable Resources for Parents You can always search for topics including - Internet safety for children Online or internet Safety for parents Sexting, Cyber Bullying Recommended websites for online safety information – www.safekids.com www.connetsafely.org www.netfamilynews.org www.csriu.org www.getnetwise.org www.safeteens.com www.netsmartz.org http://www.microsoft.com/protect/familysafety Recommended software to help implement parental controls – many others are available www.trendmicro.com www.symantec.com www.mcafee.com
  27. Questions & Answers
More Related