Internet safety
Download
1 / 60

Where we Are and How We Got There - PowerPoint PPT Presentation


  • 272 Views
  • Uploaded on

INTERNET SAFETY A Westport Public Schools Workshop for Parents

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Where we Are and How We Got There' - omer


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Internet safety l.jpg
INTERNET SAFETY

A Westport Public Schools Workshop for Parents

Natalie Carrignan, Director of Instructional TechnologyBill Derry,Coordinator of Information & Technology LiteracyBarbara Fischetti,Coordinator of Psychological ServicesJonathan Crosby/Jonathan Gryak,Operations Manager/Senior Network Engineer

Staples High School – Computer Lab

January 22. 20099:00-10:00 and 12:00-2:00 and 7:00-9:00

January 27, 20099:00-11:00 12:00-2:00 and 7:00-9:00


Internet safety2 l.jpg
INTERNET SAFETY

What brings you here today?


Power of stories l.jpg
POWER OF STORIES

NetSmartZ “Real-Life Stories”


Slide4 l.jpg

Internet Safety Issues

  • Cyber Citizenship

  • Cyberbullying

  • Online Personal Safety

  • Predator Identification

  • Cyber Security

  • Intellectual Property



Slide6 l.jpg

Where to Begin

In any community (on or off-line)

there are:

  • Dangerous

  • Unlawful

  • Inappropriate things

    Our goal needs to be to teach children how to avoid these bad things and not the community itself

    http://www.netsmartzkids.org/uyn/knowtherules.htm


Slide7 l.jpg

Kids need to know that others want to influence their thinking

Some sites prey on teen issues

  • Suicide

  • Hate

  • Eating disorders

    • (Showed example in workshop)

      Some take advantage of kids natural mistakes

  • Pharming

  • Typo Squatting


Slide8 l.jpg
And . . . thinking

Other sites make themselves easily accessible

or invite themselves in via pop-ups

  • Gambling

  • Pornography

    Kids need to know how to escape

  • Don’t click on the X

  • Control-W for windows

  • Command-W for macs


There are four kinds of cyberbullies l.jpg
There are four kinds thinking of cyberbullies…

  • Inadvertent Cyberbullies (didn’t mean to cyberbully anyone, reacted in anger or was misunderstood)

  • Vengeful Angels (wanting to right wrongs)

  • Mean Girls(doing it for entertainment, usually in groups. Not always girls.)

  • Power-Hungry or “Revenge of the Nerds”(traditional schoolyard bullying mentality, doing it for power…the ironic twist is that offline victims often become online bullies)

Parry Aftab wired kids.org


Slide12 l.jpg

A short video clip on Cyberbullying thinking

Is it serious or is it“kids’ stuff?”

NetSmartZ “Real-Life Stories”

Parry Aftab wired kids.org


Let me count the ways they cyberbully each other l.jpg
“Let me count the ways… thinkingthey cyberbully each other?”

  • Any interactive technology: cell phones, text messaging devices, IMs, interactive games, Internet, photo phones, iPods and PDAs

  • Any interactive sites: Websites, blogs, social networking sites, guestbooks, porn posts, wikis, profiles, directories, e-mail, SPAM

  • Any new technology can be abused

  • This is limited only by the technology they possess and their limitless imaginations

Parry Aftab wired kids.org


Cyberbulling and cyberthreats l.jpg
Cyberbulling and thinkingCyberthreats

  • Harassment

  • Cyberstalking

  • Denigration

  • Exclusion

  • Impersonation

  • Flaming

  • Outing (revealing secrets)

  • Trickery

Educators Guide To Cyberbullying

Cyberbullying:How to Deal with Hi-Tech Harrrassment - FEB. 2008

Parents Often are Unaware of Cyberbulling NYT. OCT 2008


The impact l.jpg
The Impact thinking

  • No escape -- 24/7

  • Distributed world wide and often irretrievable

  • Can be anonymous and can solicit involvement of unknown friends

  • Reluctant to tell due to fear of restrictions


Slide16 l.jpg

Consider the following: thinking

  • Better to ERR on the side of caution!

  • The emotional response of your child

  • The kind of threat

  • The frequency of the threats

  • The source of the threats

  • The nature of the threats

Parry Aftab wired kids.org


Immediate action steps l.jpg
Immediate thinkingAction Steps

1. Save the evidence

2. Identify the cyberbully

3. Possible Actions

Tell the cyberbully to stop

Ignore the cyberbully-help your child

File a complaint with Service Provider

Contact your school

Contact the Cyberbully’s Parents

Contact the Police

Contact an Attorney


Stories l.jpg
Stories--- thinking


Slide19 l.jpg

Additional thinkingACTION STEPS

• Talk to your child.

• Evaluate quality of online community.

• Know when to leave.

• Have your child do a self-assessment of behavior.

• Know how to respond to harmful communications.

• Teach your child how to get assistance.

From The Center for Safe and Responsible Internet Use


Slide20 l.jpg

Online Personal thinkingSafety


Slide21 l.jpg

Social Networking Sites thinking

Facebook

Myspace

Many others

Chat Rooms

Instant Messaging

Blogs/Wikis

Virtual Worlds

Webkinzs

Club Penguin/Toontown

Teen Second Life

Second Life

Video Sites

Game Stations

Shopping

On-line Includes


Safe practices l.jpg
Safe Practices thinking

  • Choose your screen name carefully

  • Choose your opening picture carefully

  • Know what is public and what is private

  • Test it out

  • Be honest about your age, there are different protections in place for different ages

  • Know who you are talking to

  • Know how to use the sites protective features


Slide23 l.jpg

Never Reveal thinking

  • Full Name

  • Address

  • School

  • Phone number

  • Family and friends names

  • Age/Birthdate

  • Social Security number



Facebook l.jpg
FaceBook thinking

  • FaceBook Settings


Myspace activities l.jpg
MySpace activities thinking

  • MySpace Video for Parents

  • MySpace Tutorial for Parents


There are many more sites less tame than facebook and myspace l.jpg
There are many more sites less tame than Facebook and MySpace

  • (Sites provided in workshop)

    We need to encourage kids to think before they post

    http://www.nsteens.org/videos/social-networking/

    http://www.nsteens.org/videos/offline-consequences/


Slide35 l.jpg

MANY INSTANT MESSAGING SERVICES: MySpace

Universal Messenger with Parental Controls

AIM

G-CHAT

MEEBO

MSN Messenger

SKYPE

YAHOO! Messenger

MANY, MANY MORE!

ICQ information from wiredkids.org


Slide37 l.jpg

Sample Chat Room MySpacefrom MySpace

There are no alerts when someone is reading your chat!


Slide38 l.jpg

Personal Information: MySpace

Sarah’s Story about Cyberbullying: http://www.youtube.com/watch?v=r5NMDXAPUpw


Internet safety in virtual worlds l.jpg
Internet Safety in Virtual Worlds MySpace

Quest Atlantis


Slide40 l.jpg

Predator MySpace

Identification


Slide41 l.jpg

Types of Predators MySpace

  • Marketing

    • Hiring teens to infiltrate chat rooms

    • Devising games or environments that promote their product seamlessly

    • Pop-up Ads

  • Phishing

    • Making you believe you are at risk

  • Sexual Predators


Slide42 l.jpg

Striking the Right Balance MySpace

  • Conflicting viewpoints

  • Reality is most kids know that they are meeting an adult

  • We need to talk at an early age about the possibilities but be realistic with who falls prey the most

  • We need to help ALL kids understand the grooming process

http://www.webwisekids.org/index.asp?page=Katie_parents


Slide43 l.jpg

The Grooming Process MySpace

  • Identify Similar Interests

  • Gains child’s trustby always taking their side

  • Keeps child’s secretsand asks the child to keep their secrets

  • May slowly introduce them to inappropriate things and tell them it is OK

  • Become the child’s new best friend

  • Isolates the child from any other friends

  • Presents themselves as the best person in that child’s life



Slide45 l.jpg

Security Threats MySpace

  • Malware (Malicious Software)

    • Viruses, worms, Trojans, spyware, root kits, keyloggers, ransomware

    • Passed through downloads, email attachments, web browsing

  • Computer Hackers

  • Spam/Spim

    • Extra volume can be due to giving information to websites or responding to a message

    • Delivery mechanism for malware and phishing scams

http://www.netsmartzkids.org/uyn/virusrap.htm


Slide46 l.jpg

Steps to Take to Protect Yourself MySpace

  • Use a firewall

  • Set your computer settings properly including auto-updates

  • Use anti-virus and anti-spyware software and update it regularly

  • Use strong passwords and change them frequently

  • Beware of FREE download sites

  • Don’t respond to spam messages

  • DO NOT forward messages to all of your friends

  • (10 Common Questions about Internet Safety- created by iKeepSafe and Symantec)


What about web filters l.jpg
What about Web Filters? MySpace

  • Filtering and Blocking Software

    • Whitelist/Blacklist

    • Categories

    • Reviews

    • Use the settings in your operating system

  • Cautions

    • False Sense of Security

    • Over Blocking

    • Embedded Chat Rooms/Forums

    • Filtering does not follow you from computer to computer


The schools part l.jpg
The MySpaceSchools’ Part

  • Comply with the Children Internet Protection Act (CIPA)

  • Have firewall, auto-updates, and anti-virus software in place

  • Caution: May be viewed as “in school practice” and may not be transferred to the real world or virtual world.


Slide49 l.jpg

Intellectual MySpaceProperty



Slide51 l.jpg
AUP - MySpace

  • I will not violate copyright laws, damage or tamper with hardware or software, vandalize or destroy data, intrude upon, alter or destroy the files of another user, introduce or use computer “viruses,” attempt to gain access to restricted information or networks, or block, intercept or interfere with any email or electronic communications by teachers and administrators to parents, or others.


U s copyright l.jpg
U.S. Copyright MySpace

©

©

©


Fair use l.jpg
Fair Use MySpace



Cite sources l.jpg
Cite Sources MySpace


Best practices l.jpg
Best Practices MySpace

  • Have a family Internet plan

  • Use district resources

    • Pre-selected teacher websites

    • Subscription databases and online encyclopedias

    • iConn – State Digital Library

    • Westport Public Library resources

  • Maintain open communications


Parents l.jpg
Parents MySpace

  • Filter… but do not assume its all you need to do.

  • Time

  • Talk

    • Storytelling

  • Awareness

  • Guidelines / Handouts


For more information l.jpg
For more MySpaceinformation…

  • ABOUT: Family InternetTalking with your Kids and a sample Family Internet Safety Agreement

  • AD COUNCILPublic Safety PSAs- Under Television, go to YOUTH TARGETED Bulletin Board

  • Bullying PowerPointPowerpoint presentation from the Windsor Police Dept.

  • Center for Safe and Responsible Internet UseEffective strategies to protect young people on the Internet

  • Common Craft Videos – In Plain EnglishWatch a short simple video to get the basic concepts of a specific internet term.

  • Cyberbulling.usPages of important information and strategies to deal with cyberbulling

  • Enough is EnoughEffective strategies to protect young people on the Internet

  • Federal Trade Commission Consumer SafetyTips for Social Networking for Teens and Tweens

  • How Stuff Works (Firewalls, Viruses, Worms, etc.)This site opens with a description of firewalls and how they work.

  • I Keep Safe-A national Internet Safety website, individualized for Connecticut

  • Social Networking Articles

    • What does MySpace do to protect users?

    • MySpace Moves to Give Parents More Information

    • Protecting your privacy on MySpace, FaceBook and L

    • POWER.COM (Brazilian “cross-social networks” webware)

  • Netbullies.com“Protecting kids from each other online with cyberlawyer Perry Aftab”

  • Netlingo.comLearn about the acronyms and language of the Internet.


For more information59 l.jpg
For more MySpaceinformation…

  • Online Victimization of YouthA 2006 report from the THE CRIMES AGAINST CHILDREN RESEARCH CENTER UNIVERSITY OF NEW HAMPSHIRE ,FUNDED BY THE U.S. CONGRESS THROUGH A GRANT TO THE NATIONAL CENTER FOR MISSING & EXPLOITED CHILDREN

  • PBS – FrontlineAired on 1/22/08 --

  • Pew Research StatisticsPew Internet and American Life project

  • Safe TeensMagid, Larry. Teen Safety on the Information Highway. A publication of the national Organization for Missing or Exploited Children. 2004

  • Spectorsoft.comAutomatically record everything done on the internet

  • Stop Bullying NowStrategies to get kids to think about the ramifications of bullying. 12 animated files to support main concepts.

  • Teen Angels13-18 year old volunteers who provide help on Internet safety issues

  • Totally Wired-What Teens & Tweens are Really Doing OnlineBook by Anastasia Goodstein discussed at workshop.

  • Web Awareness ResourcesInternet saftey tips with resources for various age groups (2-3, 5-7, 8-10, 11-13, 14-17)

  • WebopediaThe only online dictionary and search engine you need for computer and Internet technology definitions.


Internet safety60 l.jpg
INTERNET MySpaceSAFETY

A Westport Public Schools Workshop for Parents

Natalie Carrignan, Director of Instructional TechnologyBill Derry,Coordinator of Information & Technology LiteracyBarbara Fischetti,Coordinator of Psychological ServicesJonathan Crosby/Jonathan Gryak,Operations Manager/Senior Network Engineer

Staples High School – Computer Lab

January 22. 20099:00-10:00 and 12:00-2:00 and 7:00-9:00

January 27, 20099:00-11:00 12:00-2:00 and 7:00-9:00


ad