INTERNET SAFETY - PowerPoint PPT Presentation

internet safety l.
Skip this Video
Loading SlideShow in 5 Seconds..
INTERNET SAFETY PowerPoint Presentation
Download Presentation

play fullscreen
1 / 60
Download Presentation
Download Presentation


- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. INTERNET SAFETY A Westport Public Schools Workshop for Parents Natalie Carrignan, Director of Instructional TechnologyBill Derry,Coordinator of Information & Technology LiteracyBarbara Fischetti,Coordinator of Psychological ServicesJonathan Crosby/Jonathan Gryak,Operations Manager/Senior Network Engineer Staples High School – Computer Lab January 22. 20099:00-10:00 and 12:00-2:00 and 7:00-9:00 January 27, 20099:00-11:00 12:00-2:00 and 7:00-9:00

  2. INTERNET SAFETY What brings you here today?

  3. POWER OF STORIES NetSmartZ “Real-Life Stories”

  4. Internet Safety Issues • Cyber Citizenship • Cyberbullying • Online Personal Safety • Predator Identification • Cyber Security • Intellectual Property

  5. Cyber Citizenship

  6. Where to Begin In any community (on or off-line) there are: • Dangerous • Unlawful • Inappropriate things Our goal needs to be to teach children how to avoid these bad things and not the community itself

  7. Kids need to know that others want to influence their thinking Some sites prey on teen issues • Suicide • Hate • Eating disorders • (Showed example in workshop) Some take advantage of kids natural mistakes • Pharming • Typo Squatting

  8. And . . . Other sites make themselves easily accessible or invite themselves in via pop-ups • Gambling • Pornography Kids need to know how to escape • Don’t click on the X • Control-W for windows • Command-W for macs

  9. There are four kinds of cyberbullies… • Inadvertent Cyberbullies (didn’t mean to cyberbully anyone, reacted in anger or was misunderstood) • Vengeful Angels (wanting to right wrongs) • Mean Girls(doing it for entertainment, usually in groups. Not always girls.) • Power-Hungry or “Revenge of the Nerds”(traditional schoolyard bullying mentality, doing it for power…the ironic twist is that offline victims often become online bullies) Parry Aftab wired

  10. A short video clip on Cyberbullying Is it serious or is it“kids’ stuff?” NetSmartZ “Real-Life Stories” Parry Aftab wired

  11. “Let me count the ways…they cyberbully each other?” • Any interactive technology: cell phones, text messaging devices, IMs, interactive games, Internet, photo phones, iPods and PDAs • Any interactive sites: Websites, blogs, social networking sites, guestbooks, porn posts, wikis, profiles, directories, e-mail, SPAM • Any new technology can be abused • This is limited only by the technology they possess and their limitless imaginations Parry Aftab wired

  12. Cyberbulling and Cyberthreats • Harassment • Cyberstalking • Denigration • Exclusion • Impersonation • Flaming • Outing (revealing secrets) • Trickery Educators Guide To Cyberbullying Cyberbullying:How to Deal with Hi-Tech Harrrassment - FEB. 2008 Parents Often are Unaware of Cyberbulling NYT. OCT 2008

  13. The Impact • No escape -- 24/7 • Distributed world wide and often irretrievable • Can be anonymous and can solicit involvement of unknown friends • Reluctant to tell due to fear of restrictions

  14. Consider the following: • Better to ERR on the side of caution! • The emotional response of your child • The kind of threat • The frequency of the threats • The source of the threats • The nature of the threats Parry Aftab wired

  15. ImmediateAction Steps 1. Save the evidence 2. Identify the cyberbully 3. Possible Actions Tell the cyberbully to stop Ignore the cyberbully-help your child File a complaint with Service Provider Contact your school Contact the Cyberbully’s Parents Contact the Police Contact an Attorney

  16. Stories---

  17. Additional ACTION STEPS • Talk to your child. • Evaluate quality of online community. • Know when to leave. • Have your child do a self-assessment of behavior. • Know how to respond to harmful communications. • Teach your child how to get assistance. From The Center for Safe and Responsible Internet Use

  18. Online Personal Safety

  19. Social Networking Sites Facebook Myspace Many others Chat Rooms Instant Messaging Blogs/Wikis Virtual Worlds Webkinzs Club Penguin/Toontown Teen Second Life Second Life Video Sites Game Stations Shopping On-line Includes

  20. Safe Practices • Choose your screen name carefully • Choose your opening picture carefully • Know what is public and what is private • Test it out • Be honest about your age, there are different protections in place for different ages • Know who you are talking to • Know how to use the sites protective features

  21. Never Reveal • Full Name • Address • School • Phone number • Family and friends names • Age/Birthdate • Social Security number

  22. Facebook and Myspace

  23. FaceBook • FaceBook Settings

  24. MySpace activities • MySpace Video for Parents • MySpace Tutorial for Parents

  25. There are many more sites less tame than Facebook and MySpace • (Sites provided in workshop) We need to encourage kids to think before they post

  26. MANY INSTANT MESSAGING SERVICES: Universal Messenger with Parental Controls AIM G-CHAT MEEBO MSN Messenger SKYPE YAHOO! Messenger MANY, MANY MORE! ICQ information from

  27. Sample Chat Room from MySpace There are no alerts when someone is reading your chat!

  28. Personal Information: Sarah’s Story about Cyberbullying:

  29. Internet Safety in Virtual Worlds Quest Atlantis

  30. Predator Identification

  31. Types of Predators • Marketing • Hiring teens to infiltrate chat rooms • Devising games or environments that promote their product seamlessly • Pop-up Ads • Phishing • Making you believe you are at risk • Sexual Predators

  32. Striking the Right Balance • Conflicting viewpoints • Reality is most kids know that they are meeting an adult • We need to talk at an early age about the possibilities but be realistic with who falls prey the most • We need to help ALL kids understand the grooming process

  33. The Grooming Process • Identify Similar Interests • Gains child’s trustby always taking their side • Keeps child’s secretsand asks the child to keep their secrets • May slowly introduce them to inappropriate things and tell them it is OK • Become the child’s new best friend • Isolates the child from any other friends • Presents themselves as the best person in that child’s life

  34. Cyber Security

  35. Security Threats • Malware (Malicious Software) • Viruses, worms, Trojans, spyware, root kits, keyloggers, ransomware • Passed through downloads, email attachments, web browsing • Computer Hackers • Spam/Spim • Extra volume can be due to giving information to websites or responding to a message • Delivery mechanism for malware and phishing scams

  36. Steps to Take to Protect Yourself • Use a firewall • Set your computer settings properly including auto-updates • Use anti-virus and anti-spyware software and update it regularly • Use strong passwords and change them frequently • Beware of FREE download sites • Don’t respond to spam messages • DO NOT forward messages to all of your friends • (10 Common Questions about Internet Safety- created by iKeepSafe and Symantec)

  37. What about Web Filters? • Filtering and Blocking Software • Whitelist/Blacklist • Categories • Reviews • Use the settings in your operating system • Cautions • False Sense of Security • Over Blocking • Embedded Chat Rooms/Forums • Filtering does not follow you from computer to computer

  38. The Schools’ Part • Comply with the Children Internet Protection Act (CIPA) • Have firewall, auto-updates, and anti-virus software in place • Caution: May be viewed as “in school practice” and may not be transferred to the real world or virtual world.

  39. Intellectual Property

  40. Acceptable Use Policies/Agreements