internet safety presentation 2012
DESCRIPTION
TRANSCRIPT
Internet safety/i-Safe Parent Presentation
Spring 2012Kaneland School District #302
Presented by:Ms. Carrie Svihlik
Detective Keith Smith
Agenda Welcome Internet Landscape Dangers on the Internet
Internet Predators Personal profiles Internet Chat Gaming Cyberbullying
Cell phones Plagiarism & Intellectual Property Malicious Codes, Viruses, and Spyware Parent Tips and resources Q & A
Quote by Douglas Adams, author
“everything that’s already in the world when you’re born is just normal;
anything that gets invented between then and before you turn thirty is incredibly exciting and creative and with any luck you can make a career out of it;
anything that gets invented after you’re thirty is against the natural order of things and the beginning of the end of civilization as we know it until it’s been around for about ten years when it gradually turns out to be alright really.”
Internet LandscapeThe Internet has dramatically changed
our world and is a part of our everyday lives
ADULTS’ VIEW Communication – email, texting Shopping and services (booking travel) Financial management News and product research Entertainment – videos, music, games
Internet LandscapeThe Internet has dramatically changed
our world and is a part of our everyday lives
STUDENTS’ VIEW Communication – texting, instant
messaging, email Entertainment – games, music, videos Research – homework, study sites
Basic student use of technology
Top 5 Internet Dangers for Kids
1. Predators--social networking sites, chat rooms2. Data theft--stolen passwords, addresses, Social
Security numbers, credit card numbers, and other financial information
3. Malicious software (also known as malware)--adware, spyware, viruses, phishing scams
4. Inappropriate content--pornography, content focused on violence, hate propaganda
5. Cyberbullying--bullying peers via instant messages, social networking sites, online games
http://www.cnet.com/4520-13384_1-6721368-1.html
What Do We Do?
Educate parents Educate students
Get Informed!Teach students to be
responsible cyber citizens
Statistics: National Center of Missing & Exploited Children
Youth internet safety survey, ages 10-17
YISS-1 (2000)
YISS-2 (2005)
Change
Sexual solicitation 19% 13% -6%
Unwanted exposure to sexual materials
25% 34% +9%
Harassment 6% 9% +3%
Personal Profiles and your online presence
“Google” yourself › Type in first and last name, email
addresses, screen names, addresses, phone numbers
› search for images as well
Personal Profiles: Social Networking Sites
Facebook ,Myspace › Age requirements
“No information from children under age 13.”
› Public vs Private› Know who you add: friends vs cyberfriends› Have access to your child’s site› Be conscientious of pictures/videos
Protecting reputations online, in plain English (commoncraft.com)
Personal Profiles Tips Make sure that your child takes advantage of the
privacy settings on social networking sites. Pre-approve the pictures and videos your child posts
online. Remind your child never to post e-mail addresses or cell
phone numbers. Tell your child that passwords should only be shared
with parents and guardians. Teach your child not to respond to any e-mails
requesting personal information and to delete e-mails from unknown senders.
Discuss how to keep screen names and e-mail addresses gender-neutral, appropriate, and free of any information that could reveal identity.
Encourage your child to tell you right away if anything happens online that bothers or frightens him or her.
Information from Netsmartz Kids: http://www.netsmartz.org/RevealingTooMuch
Communication
Text messaging Chat rooms Instant messaging (‘IMing’) Online gaming – gaming devices Message boards Blogs and wikis
SMS lingo
SMS (short message service) aka texting
Wikipedia and netlingo.com list of internet slang› http://en.wiktionary.org/wiki/Appendix:Inter
net_slang› http://www.netlingo.com/acronyms.php
LOLBRB
POSASL
Gaming
Online: Webkinz, Neopets, Miniclip, Gaming systems: PSP, Xbox Live, PS3,
Wii Handheld devices: Ipod touch, Ipad,
cell phones
Gaming Tips Know which safety features are available on the gaming
equipment that your child uses—a headset may have voice-masking features, for example.
Keep gaming consoles in an easy-to-supervise location and be aware of other places where your child may be accessing games.
Tell your child never to give out personal information while gaming or agree to meet anyone outside of the game.
Teach your child not to respond to anyone who is being rude or bullying while playing the game.
Set rules for how long your child may play, what types of games are appropriate, and who else may participate.
Have your child check with you before using a credit or debit card online.
Check to see if the games your child plays have reporting features or moderators.
Information from Netsmartz Kids: http://www.netsmartz.org/Gaming
Cyberbullying
Cyberbullying is emerging as one of the more challenging issues facing educators and parents as young people embrace the Internet and other mobile communication technologies.
Cyberbullying data 2010
Cyberbullying data 2010
Cyberbullying
Outing and Trickery – Sharing someone’s secrets or embarrassing information or images online
Exclusion – Intentionally keeping someone from being able to take part in an online group, such as a “buddy list.”
Cyberstalking – Repeatedly sending unwanted messages that may include threats of harm; intimidating
Cyberbullying
Flaming – Online “fights” using electronic messages with inappropriate language
Harassment – Repeatedly sending offensive, rude, and insulting messages
Denigration – Sending or posting gossip or rumors about a person
Impersonation – Posing to be someone else and making them look bad
Cyberbullying Tips Tell your child not to respond to rude e-mails, messages,
and comments. Save the evidence, such as e-mail and text messages, and
take screenshots of comments and images. Also, take note of the date and time when the harassment occurs.
Contact your Internet service provider (ISP) or cell phone provider. Ask the website administrator or ISP to remove any Web page created to hurt your child.
If harassment is via e-mail, social networking sites, IM, and chat rooms, instruct your child to “block” bullies or delete your child’s current account and open a new one.
Check out phone features that may allow the number to be blocked.
Make a report to www.cybertipline.com, and if you feel something illegal has occurred, inform law enforcement
Information from Netsmartz Kids: http://www.netsmartz.org/Cyberbullying
Cell Phones
About 75% of teens (12-17) carry cell phones
1 in 3 teens (13-19) use their cell phone to surf the web
Results from Teens and Mobile phones, Pew Internet and Americnl Life Project, 2010 A Generation Unplugged, Harris Interactive, 2008
Basic Cell Phone rules: Review cell phone records for any unknown
numbers and late night phone calls and texts. Remind your child that texting is viral—anything
sent in a text can be easily forwarded and shared.
Teach your child never to reveal cell phone numbers or passwords online.
Talk to your child about the possible consequences of sending sexually explicit or provocative images or text messages.
When shopping for a cell phone for your child, research the security settings that are available.
From Netsmartz Kids : http://www.netsmartz.org/CellPhones
Cell phones
At+T › Phones and internet:
http://www.att.net/s/s.dll?ep=1659430&ch=smct/smct_is
Verizon› https://wbillpay.verizonwireless.com/vzw/n
os/uc/uc_overview.jsp
Sprint› http://www.sprint.com/landings/family/safe
ty.html
Plagiarism & Intellectual Property
Music Downloads› Napster › Itunes › Kazaa › WinMX › Limewire › etorrent
Copyright Material Identity Theft Website Validity www.turnitin.com
Malicious Codes, Viruses, and Spyware
Computer system› Keeping bad stuff (predatory software) out
– keeping valuables(personal information) in
Malicious codes: viruses, worms, trojan Parasitical malware: spyware, adware
Forbes.com article: FBI: Disinfect Your Computer Or Risk Losing Internet Access Come July (DNS Changer – 2007)
› bit.ly/J4tKQ3
Software Resources
www.cyberpatrol.com www.netnanny.com www.spectorsoft.com www.cybersitter.com www.covenanteyes.com
Anti spyware and adware programs www.spybot.com (Spybot S &D) www.adaware.com (lavasoft product)
Parent Tips
Guard your identity› Make username generic and anonymous› Little information is needed to get to know
you Monitor your child’s computer use Use favorites Understand the services your child
uses Know usernames, passwords, and e-
Parent Tips
Know child’s “online friends” Don’t overreact to anything your child
tells you (fear you will take computer away)
Never meet anyone met online Keep your computer up-to-date
› windowsupdate.microsoft.com› Virus protection› Firewall
Resources www.netsmartz.org www.isafe.org http://www.kidsmart.org.uk/ http://www.bbc.co.uk/cbbc/help/s
afesurfing/ www.wiredkids.org/index.html www.wiredsafety.org
Resources http://www.thinkuknow.co.uk/def
ault.aspx www.illinoisicac.org www.internet-safety.org www.safekids.com www.fbi.gov/publications/pguide/
pguidee.htm www.staysafe.org
Resources
http://www.cyberbullying.us/research.php
Bullying, Beyond the Schoolyard, by Hinduja and Patchin
http://www.cnet.com/4520-13384_1-6721368-1.html Top 5 Dangers article
http://www.cnet.com/4520-13384_1-6721401-1.html?tag=lwt;lcol Think Before You Click Worksheet
Q & AThank you for your attendance at
today’s presentation! Make sure you have signed in before
you leave
We hope you found it useful.