1 / 43

Enter Your Child’s Cyber World

Enter Your Child’s Cyber World. Internet Safety. Our thanks to: James Baird, CISSP with GBI Osborne Middle School Technology Team. Enter Your Child’s Cyber World. LOL. LV. F2T. WAN2. PAW. WYGOWM. H8. LOV. Enter Your Child’s Cyber World. F2T. LV. LOL. WYGOWM.

oleg
Download Presentation

Enter Your Child’s Cyber World

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Enter Your Child’s Cyber World

  2. InternetSafety Our thanks to: • James Baird, CISSP with GBI • Osborne Middle School Technology Team

  3. Enter Your Child’s Cyber World LOL LV F2T WAN2 PAW WYGOWM H8 LOV

  4. Enter Your Child’s Cyber World F2T LV LOL WYGOWM • LOL = Laughing Out Loud • F2T = Free To Talk • LV = Leave • H8 = Hate • WAN2 = Want to? • POS = Parent Over Shoulder • PAW = Parents Are Watching • WTGP = Want To Go Private • WYGOWM = Will You Go Out With Me? • http://www.acronymfinder.com POS PAW WAN2 WTGP H8 SeePacket

  5. Characteristics of Some Youth May Facilitate Victimization • Lack of emotional maturity • Strong desire for attention, validation, and affection • Naturally curious about sex, “forbidden” topics • May be rebellious and enjoy defying authority • Easily impressed, manipulated and intimidated • Youth lacking adult supervision

  6. Students’ Basic Online Behavior • 80% of students spend at least one hour per week on the Internet • 11% of students spend over 8 hours per week on the Internet • 12% of students say they spend more time on the Internet than with friends • 30% of students say e-mail, chat rooms, or Instant Messaging is the main way they stay in contact with their friends • 38% of students feel more free to do what they want on the Internet • 31% of students say it is easier to talk with people on the Internet than in real life • 29% of students use chat rooms, with a peak usage of 45% occurring in grade 7Based on i-SAFE America surveys of 19,000 students

  7. The Parent-Child Gap

  8. Teen Promises

  9. Internet Predator Profile • Typically married adult with children • Normal neighbor • Usually has a successful career in an upper-management position • College graduate, possibly post-graduate degree • Upper, middle-class lifestyle • Usually 35 or older • Usually white • Will offend again

  10. Students’ Risky Online Behavior • 55% of students admit giving their personal information (name, sex, age, etc.) over the Internet • 52% of students prefer to be alone while on the Internet • 40% of students have visited inappropriate places on the Internet • 10% of students feel it is okay to post their picture on the Internet • 10% of students have met someone face-to-face that they previously met on the Internet • 25% of students believe there is nothing wrong with chatting to strangers online • 21% of students say after getting to know someone better on the Internet, they would believe them when they tell their age

  11. http://www.netsmartz.org

  12. "Tracking Teresa" • Even though Teresa has tried not to reveal personal information online, she’s left enough clues that she could find herself in danger. http://www.netsmartz.org/resources/reallife.htm#realAmy

  13. Chat Rooms – Virtual Parks • No longer the guy with the trench coat waiting to kidnap the child • Can sit anywhere and talk to several children at one time at different locations • Used to gain child’s trust and set up sexual meetings • Used to send pornographic images • They will send the child porn, getting more explicit each time • They will try to convince the child that everybody is doing this and that it is normal

  14. Chat Rooms • Predators often snoop around child chat rooms for potential victims. • They use various methods to get close to children but even if a child is not receptive to the predators advances, he can still harass and endanger the child by searching for information about the child.

  15. Countermeasures for Predators • Use parental controls (if available) • Monitor child’s actions on the internet • Discuss appropriate internet activities • Purchase NetNanny ($40) or similar • Caution children about predators • Limit the time child spends on a computer. • Use software that creates a log of sites visited and every keystroke that is made on the computer. • Randomly check emails on child’s account • Move the computer into a family area The internet is not a babysitter.

  16. More Countermeasures • Discuss Internet crime and safety issues with your family • Discuss with other family members expectations with use of the computer. • Sign an agreement between parents and children that outlines expectations and the amount of time allowed on the computer per day or week. • Include in agreement who can be contacted or talked with on the computer. • If family member receives an email that offends you or them, contact your Internet Provider and complain about the message being received.

  17. Cyber-bullying is Coming to a School Near You if it hasn’t already. Concerns include: • Cyber-bullying can be much more damaging psychologically and much more intense. • It creates a barrier between the bully and the victim. This can allow someone who normally wouldn't be a bully to become one because there is no face to face contact.

  18. Cyber-bullying • It is difficult to catch the cyber-bully. When identified, the suspect’s defense is often that it was someone else impersonating them using their password. • Camera phones are making cyber-bullying more creative. Taking someone’s picture and then manipulating it, then posting it on a web site or in e-mail. Imagine getting an e-mail of a nude individual with your face attached to it, and you’re only a teenager. • Many think this behavior is a joke and not as serious as bullying face to face.

  19. Cyber-bullying • Victims are often targeted because they are considered different — usually those considered overweight, small, with a learning disability or overly sensitive. • Many face dirty digital tricks that range from derogatory comments about them online to embarrassing e-mail attributed to them intended to insult friends and crushes.

  20. Cyber Bullying Statistics • 42% of kids have been bullied while online. 1 in 4 have had it happen more than once. • 35% of kids have been threatened online. Nearly 1 in 5 have had it happen more than once. • 21% of kids have received mean or threatening e-mail or other messages. Based on 2004 i-SAFE survey of 1,500 students grades 4-8

  21. Cyber Bullying Statistics • 53% of kids admit having said something mean or hurtful to another person online. More than 1 in 3 have done it more than once. • 58% of kids admit someone has said mean or hurtful things to them online. More than 4 out of 10 say it has happened more than once. • 58% have not told their parents or an adult about somethingmean or hurtful that happened to them online.

  22. www.xanga.com Popular Blog Site

  23. www.xanga.com

  24. www.xanga.com

  25. www.xanga.com

  26. www.facebook.com

  27. Parents Must Be Aware • Many kids do not want to report this problem to their parents for fear of how their parents may react. • They fear their parents will take away their cell phone, computer, or Internet access. • Obviously this solution will stop the messages, but then the child feels harassed by the bully and punished by the parents when the equipment is removed.

  28. Signs That a Child Might Be At Risk On-line • Spends large amounts of time on-line, especially at night • Find pornography on child's computer • Child receives phone calls from unknown men or is making calls, sometimes long distance, to unfamiliar numbers • Child receives mail, gifts, or packages from unfamiliar sources • Child turns the computer monitor off or quickly changes the screen on the monitor when you come into the room • Child becomes withdrawn from the family • Child is using an on-line account belonging to someone else

  29. Cyber Bullying Tips • Tell a trusted adult about the bullying, and keep telling until the adult takes action. • Don’t open or read messages by cyber bullies. • Tell your school if it is school related. Schools have a bullying solution in place.

  30. Cyber Bullying Tips • Don’t erase the messages—they may be needed to take action. • Protect yourself—never agree to meet with the person or with anyone you meet online. • If bullied through chat or instant messaging, the “bully” can often be blocked. • If you are threatened with harm, inform the local police.

  31. What Can Parents Do? • Establish a bond of trust and open communication with their child. • Place / keep computer(s) with Internet access in an open, commonly used space. • Learn about the new technologies • Commend your child for reporting cyber issues • Parent and Child Internet Agreement

  32. What Can Parents Do? Cybersitter relies on an extensive, frequently updated database of sites and word patterns. By default, Cybersitter blocks content related to sex, drugs, hate, and violence, as well as blocking all image searches. But parents can select from 32 content categories—including cults, gambling, file sharing, wrestling, and free e-mail sites—to tailor the filter to their needs. These settings are applied to Web browsing, e-mail, instant messaging, and newsgroups. Or you can simply block all instant messaging, newsgroups, FTP access, and file sharing. . Cybersitter offers a good stealth mode, letting parents filter and monitor kids' activities without their knowledge. Cybersitter can record both sides of IM sessions, as well as log all sites visited and any violations. This information can then be automatically e-mailed to you in a daily activity report.

  33. Have you googled yourself? • http://www.google.com • Search your name, email address, telephone number, home address • Search children’s, spouse, relatives • It may be possible to remove unwanted information from some sites

  34. GCPS POLICIES AND PROCEDURES

  35. What Can Schools Do?GCPS/Trickum Middle School • GCPS Firewall • Blocked Sites and Procedures • Acceptable Use Policies • Both Students and Staff • Supervision of Computer Labs • Teachers, Parent Volunteers, Tech Staff • Technology Orientation • Both Students and Staff • Counselor Programs

  36. What Can Schools Do?Trickum Middle School

  37. Be CyberSmart, Stay CyberSafe!

  38. Enter Your Child’s Cyber World • Lynne Davis – Starting the Discussion / Why important • Jim Fincher – Enter Your Child’s Cyber World • Internet Safety Quiz for Adults • Presentation: Enter Your Child’s Cyber World • Information complied by Osborne Middle School • Trish Biemiller – Safe Searching Practices • Carla Greene – Tracking Internet History / Computer cookies • Additional Tools • Handouts • Web Resources • Parent/Student Contracts • Question & Answer • Need for more sessions? Topics?

  39. Sites of Interest • CyberSmart:www.cybersmart.org • Netsmartz:http://www.netsmartz.org • Georgia State Computer Crimes Task Force Educators Sub-Committee:http://sci-one.kennesaw.edu/EduSec • NetNanny Internet Filter:http://www.netnanny.com/index.html • SpyBot privacy cleaner: http://security.kolla.de/ • Ad-Aware privacy cleaner: http://www.lavasoftusa.com/ • GATech InfoSec Law Library:http://www.security.gatech.edu/policy/law_library/ • Free Antivirus:http://www.grisoft.com/

More Related