enter your child s cyber world n.
Skip this Video
Download Presentation
Enter Your Child’s Cyber World

Loading in 2 Seconds...

play fullscreen
1 / 42

Enter Your Child’s Cyber World - PowerPoint PPT Presentation

  • Uploaded on

Enter Your Child’s Cyber World. Internet Safety. Our thanks to: James Baird, CISSP with GBI Osborne Middle School Technology Team. Enter Your Child’s Cyber World. LOL. LV. F2T. WAN2. PAW. WYGOWM. H8. LOV. Enter Your Child’s Cyber World. F2T. LV. LOL. WYGOWM.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'Enter Your Child’s Cyber World' - duante

Download Now An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
internet safety

Our thanks to:

  • James Baird, CISSP with GBI
  • Osborne Middle School Technology Team
enter your child s cyber world1
Enter Your Child’s Cyber World









enter your child s cyber world2
Enter Your Child’s Cyber World





  • LOL = Laughing Out Loud
  • F2T = Free To Talk
  • LV = Leave
  • H8 = Hate
  • WAN2 = Want to?
  • POS = Parent Over Shoulder
  • PAW = Parents Are Watching
  • WTGP = Want To Go Private
  • WYGOWM = Will You Go Out With Me?
  • http://www.acronymfinder.com







characteristics of some youth may facilitate victimization
Characteristics of Some Youth May Facilitate Victimization
  • Lack of emotional maturity
  • Strong desire for attention, validation, and affection
  • Naturally curious about sex, “forbidden” topics
  • May be rebellious and enjoy defying authority
  • Easily impressed, manipulated and intimidated
  • Youth lacking adult supervision
students basic online behavior
Students’ Basic Online Behavior
  • 80% of students spend at least one hour per week on the Internet
  • 11% of students spend over 8 hours per week on the Internet
  • 12% of students say they spend more time on the Internet than with friends
  • 30% of students say e-mail, chat rooms, or Instant Messaging is the main way they stay in contact with their friends
  • 38% of students feel more free to do what they want on the Internet
  • 31% of students say it is easier to talk with people on the Internet than in real life
  • 29% of students use chat rooms, with a peak usage of 45% occurring in grade 7Based on i-SAFE America surveys of 19,000 students
internet predator profile
Internet Predator Profile
  • Typically married adult with children
  • Normal neighbor
  • Usually has a successful career in an upper-management position
  • College graduate, possibly post-graduate degree
  • Upper, middle-class lifestyle
  • Usually 35 or older
  • Usually white
  • Will offend again
students risky online behavior
Students’ Risky Online Behavior
  • 55% of students admit giving their personal information (name, sex, age, etc.) over the Internet
  • 52% of students prefer to be alone while on the Internet
  • 40% of students have visited inappropriate places on the Internet
  • 10% of students feel it is okay to post their picture on the Internet
  • 10% of students have met someone face-to-face that they previously met on the Internet
  • 25% of students believe there is nothing wrong with chatting to strangers online
  • 21% of students say after getting to know someone better on the Internet, they would believe them when they tell their age
tracking teresa
"Tracking Teresa"
  • Even though Teresa has tried not to reveal personal information online, she’s left enough clues that she could find herself in danger.


chat rooms virtual parks
Chat Rooms – Virtual Parks
  • No longer the guy with the trench coat waiting to kidnap the child
  • Can sit anywhere and talk to several children at one time at different locations
  • Used to gain child’s trust and set up sexual meetings
  • Used to send pornographic images
  • They will send the child porn, getting more explicit each time
  • They will try to convince the child that everybody is doing this and that it is normal
chat rooms
Chat Rooms
  • Predators often snoop around child chat rooms for potential victims.
  • They use various methods to get close to children but even if a child is not receptive to the predators advances, he can still harass and endanger the child by searching for information about the child.
countermeasures for predators
Countermeasures for Predators
  • Use parental controls (if available)
  • Monitor child’s actions on the internet
  • Discuss appropriate internet activities
  • Purchase NetNanny ($40) or similar
  • Caution children about predators
  • Limit the time child spends on a computer.
  • Use software that creates a log of sites visited and every keystroke that is made on the computer.
  • Randomly check emails on child’s account
  • Move the computer into a family area

The internet is not a babysitter.

more countermeasures
More Countermeasures
  • Discuss Internet crime and safety issues with your family
  • Discuss with other family members expectations with use of the computer.
  • Sign an agreement between parents and children that outlines expectations and the amount of time allowed on the computer per day or week.
  • Include in agreement who can be contacted or talked with on the computer.
  • If family member receives an email that offends you or them, contact your Internet Provider and complain about the message being received.
cyber bullying is coming to a school near you if it hasn t already
Cyber-bullying is Coming to a School Near You if it hasn’t already.

Concerns include:

  • Cyber-bullying can be much more damaging psychologically and much more intense.
  • It creates a barrier between the bully and the victim. This can allow someone who normally wouldn't be a bully to become one because there is no face to face contact.
cyber bullying
  • It is difficult to catch the cyber-bully. When identified, the suspect’s defense is often that it was someone else impersonating them using their password.
  • Camera phones are making cyber-bullying more creative. Taking someone’s picture and then manipulating it, then posting it on a web site or in e-mail. Imagine getting an e-mail of a nude individual with your face attached to it, and you’re only a teenager.
  • Many think this behavior is a joke and not as serious as bullying face to face.
cyber bullying1
  • Victims are often targeted because they are considered different — usually those considered overweight, small, with a learning disability or overly sensitive.
  • Many face dirty digital tricks that range from derogatory comments about them online to embarrassing e-mail attributed to them intended to insult friends and crushes.
cyber bullying statistics
Cyber Bullying Statistics
  • 42% of kids have been bullied while online. 1 in 4 have had it happen more than once.
  • 35% of kids have been threatened online. Nearly 1 in 5 have had it happen more than once.
  • 21% of kids have received mean or threatening e-mail or other messages.

Based on 2004 i-SAFE survey of 1,500 students grades 4-8

cyber bullying statistics1
Cyber Bullying Statistics
  • 53% of kids admit having said something mean or hurtful to another person online. More than 1 in 3 have done it more than once.
  • 58% of kids admit someone has said mean or hurtful things to them online. More than 4 out of 10 say it has happened more than once.
  • 58% have not told their parents or an adult about somethingmean or hurtful that happened to them online.
www xanga com

Popular Blog Site

parents must be aware
Parents Must Be Aware
  • Many kids do not want to report this problem to their parents for fear of how their parents may react.
  • They fear their parents will take away their cell phone, computer, or Internet access.
  • Obviously this solution will stop the messages, but then the child feels harassed by the bully and punished by the parents when the equipment is removed.
signs that a child might be at risk on line
Signs That a Child Might Be At Risk On-line
  • Spends large amounts of time on-line, especially at night
  • Find pornography on child's computer
  • Child receives phone calls from unknown men or is making calls, sometimes long distance, to unfamiliar numbers
  • Child receives mail, gifts, or packages from unfamiliar sources
  • Child turns the computer monitor off or quickly changes the screen on the monitor when you come into the room
  • Child becomes withdrawn from the family
  • Child is using an on-line account belonging to someone else
cyber bullying tips
Cyber Bullying Tips
  • Tell a trusted adult about the bullying, and keep telling until the adult takes action.
  • Don’t open or read messages by cyber bullies.
  • Tell your school if it is school related. Schools have a bullying solution in place.
cyber bullying tips1
Cyber Bullying Tips
  • Don’t erase the messages—they may be needed to take action.
  • Protect yourself—never agree to meet with the person or with anyone you meet online.
  • If bullied through chat or instant messaging, the “bully” can often be blocked.
  • If you are threatened with harm, inform the local police.
what can parents do
What Can Parents Do?
  • Establish a bond of trust and open communication with their child.
  • Place / keep computer(s) with Internet access in an open, commonly used space.
  • Learn about the new technologies
  • Commend your child for reporting cyber issues
  • Parent and Child Internet Agreement
what can parents do1
What Can Parents Do?

Cybersitter relies on an extensive, frequently updated database of sites and word patterns. By default, Cybersitter blocks content related to sex, drugs, hate, and violence, as well as blocking all image searches. But parents can select from 32 content categories—including cults, gambling, file sharing, wrestling, and free e-mail sites—to tailor the filter to their needs. These settings are applied to Web browsing, e-mail, instant messaging, and newsgroups. Or you can simply block all instant messaging, newsgroups, FTP access, and file sharing. .

Cybersitter offers a good stealth mode, letting parents filter and monitor kids' activities without their knowledge. Cybersitter can record both sides of IM sessions, as well as log all sites visited and any violations. This information can then be automatically e-mailed to you in a daily activity report.

have you googled yourself
Have you googled yourself?
  • http://www.google.com
  • Search your name, email address, telephone number, home address
  • Search children’s, spouse, relatives
  • It may be possible to remove unwanted information from some sites
what can schools do gcps chattahoochee elementary school
What Can Schools Do?GCPS/Chattahoochee Elementary School
  • GCPS Firewall
  • Blocked Sites and Procedures
  • Acceptable Use Policies
    • Both Students and Staff
  • Supervision of Computer Labs
    • Teachers, Parent Volunteers, Tech Staff
  • Technology Orientation
    • Both Students and Staff
  • Counselor Programs

Be CyberSmart,

Stay CyberSafe!

enter your child s cyber world3
Enter Your Child’s Cyber World
  • Tracy Parrish – Enter Your Child’s Cyber World
    • Internet Safety Quiz for Adults
    • Presentation: Enter Your Child’s Cyber World
      • Information complied by Osborne Middle School
  • Additional Tools
    • Handouts
    • Web Resources
    • Parent/Student Contracts
  • Question & Answer
sites of interest
Sites of Interest
  • CyberSmart:www.cybersmart.org
  • Netsmartz:http://www.netsmartz.org
  • Georgia State Computer Crimes Task Force Educators Sub-Committee:http://sci-one.kennesaw.edu/EduSec
  • NetNanny Internet Filter:http://www.netnanny.com/index.html
  • SpyBot privacy cleaner: http://security.kolla.de/
  • Ad-Aware privacy cleaner: http://www.lavasoftusa.com/
  • GATech InfoSec Law Library:http://www.security.gatech.edu/policy/law_library/
  • Free Antivirus:http://www.grisoft.com/