Presentation is loading. Please wait.

Presentation is loading. Please wait.

Parenting the Online Child. Your Child Is on the Internet The Internet is a wonderful research tool. Reliance on the Internet in schools has grown rapidly.

Similar presentations

Presentation on theme: "Parenting the Online Child. Your Child Is on the Internet The Internet is a wonderful research tool. Reliance on the Internet in schools has grown rapidly."— Presentation transcript:

1 Parenting the Online Child

2 Your Child Is on the Internet The Internet is a wonderful research tool. Reliance on the Internet in schools has grown rapidly - so even if you don't have a computer in the home, chances are very good that your child is online at schools (and very likely at friend's houses as well). But the Internet isnt all good There is, however, a downside to the Internet. Dropping your children off on-line is as ill advised as dropping him off in a mall unsupervised. There are predators online who would take advantage of your child's innocence and trust. There is a great deal of easily accessed pornography. There are bullies who would harass your child. There are hate-sites, pro-drug sites, and sites that promote any activity you can think of that you would protect your child from.

3 What Are They Doing Online? Surfing Chatting ing Instant Messaging File Sharing Learning Publishing Networking Shopping Gaming

4 Risk Factors Inappropriate Material Damage to Computer & Files Loss of Privacy Personal Safety of Family Harassment and Bullying Legal and Financial Unethical Behaviour

5 Hate Sites Sites that encourage violence toward specific people or groups

6 Rape, Bombs, Guns, Suicide Some websites promote unhealthy behavior or behavior that is not appropriate for children – suicide, gambling, anorexia clubs etc.

7 Pornography The Crimes Against Children Research Center reports that 25% of online children were exposed nudity or sexual images in the past year.

8 What Parental Control Programs Can Do These programs have a variety of features, depending on which program you choose, that will capture screen shots, record sites visited, even log chat room conversations, and capture every keystroke made by your child. Some have the additional capability to specifically allow or disallow certain activities and sites (filtering and blocking). There is even, in some programs, the capacity to schedule times when each member is allowed access to the Internet and will grant access at a scheduled time and shut them out at the scheduled end of the session. The downside Some parents depend on these utilities, but you need to be aware of their limitations when evaluating a solution that is right for their family. A few things to keep in mind: Users with a minimal amount of Internet experience can search for tools and or instructions to deactivate or circumvent the tools you install. Most filtering programs filter based on context and keywords, but legitimate sites are still sometimes blocked, and objectionable sites do get through. Lack of flexibility- younger children need more protection than older children, but not all programs give you the flexibility to handle both.

9 Damage to Computer & Files

10 What are computer viruses, Trojans and worms? Simply stated, a virus, Trojan or worm is a small program written to cause harm to one or more computers or networks. A Virus, Worm or Trojan can also be designed to retrieve information from your computer to be delivered to an attacker for future use. For example, credit card information, passwords, and security access codes. A virus is a parasitic program designed to enter a person's computer clandestinely. The virus attaches itself to files or boot sectors and is self-replicating. Parasitic means that it lives on YOUR computer, and self-replicating means that it makes copies of itself and sends them to other people (usually using the address book in your program) A Trojan (or Trojan horse) is a malicious program that pretends to be a benign application. It is designed to cause your computer to do something that is unexpected. Since it does not spread (not self-replicating) it is not really a virus. Malicious means that it has bad intentions. Trojans on your computer can mean that it allows people to control your computer from other computers (they can store bad files there or use it to attack other computers or websites) A worm is a parasitic program designed to replicate itself on your computer and then spread to other computers via (through your address book or contact list). Sometimes you get an from a trusted friend with a strange attachment – do not open it! It may be a worm. What types of files are most likely to be infected? Programs of the following types are the most likely to be infected with a virus. New viruses are developed daily, so this list is not, nor can it be all-inclusive. drv sys bin script files exe com vbs Mp3 macros

11 Loss of Privacy Your online activities (such as posting in newsgroups or signing up for services,) allow marketers to capture information about you from the websites you visit, and many of them are handing out your data to strangers. Lost privacy cannot be recovered, and the information we share can be used against us.

12 Protecting Your Privacy Nicknames and Profiles Never use personally identifying information when choosing an address or profile name: your name, sex, age or birth year, or your location. Instead, choose a "profile name" based on a hobby or other non-identifiable characteristic. Smart Passwords Change your password frequently. Create passwords as combination of special characters, numerals and letters. Do not use words in dictionary or personal details as part of your password since these are easier to crack. Always Log Out If you are using a public computer and a web-based mail, always be sure to log out of your account. Just directing the browser to a new page doesn't log you out, and leaves your account accessible to anyone else who sits down at that computer. Read the Fine Print Always read the privacy policy of a website before you type information into a form or share it with the company. If they don't have a privacy policy listed, don't share your information! Treat Like Postcards Never personal or financial information, assume that it can be read by third parties. Free isn't always Free Be very cautious when downloading "free" programs online. These programs can include spyware, malware or viruses that jeopardize your personal information. Check for the Lock When submitting personal information online, always check the URL for https and a lock icon in the bottom right corner of your browser. Know Who You Are Dealing With Only do business with creditable companies. Keep Up-to-date Be sure that your anti-virus program is always up-to-date. Download and install patches (updates) for your operating system, firewall, browser, client etc.

13 Cookies Cookies are simple text files that contain information about a user who has visited a Web server. Cookies may keep track of your preferences in shopping, surfing, and even remember information that you enter into forms online. While they are sometimes helpful (it is nice that knows what types of books I like, and recommends interesting choices for me), sometimes they collect too much information. Luckily our browser can help us to decide which information we want to share, and help us delete cookies that store information we dont want to share!

14 Personal Safety

15 About Online Predators The most serious danger for children online is the risk of becoming a victim of a sexual predator. Unsupervised children may find their way into chat rooms or forums, which are proven venues pedophiles use to lure victims. The most important thing you can do Communicate with your child: some children will put a stop to the relationship before it gets too dangerous. If your child has been approached by a predator, and even allowed some behaviors to go on that they knew were wrong, you want him to trust in you enough so that he/she can come to you and say "I made a mistake, and I'm frightened". It is important that we, as parents, make sure that our children understand that our love and care are not limited, and that they can come to us at any time, with any problem - and we will take care of them. No parent wants to hear that their child sent a nude picture of themselves to a stranger, or that they had Cybersex, but if we understand that they were victimized, we can help the child turn the situation around. Our children should not be blackmailed into doing further acts because they were afraid to tell us about what has already happened. If you suspect your child has been approached online by a predator Save any and all computer and/or phone communications, and report it to the National Center for Missing & Exploited Children's CyberTipline at Contact your local police department if you suspect your child is in immediate danger.

16 Cyberbullying

17 What is Cyberbullying? Cyberbullying can consist of spreading lies and rumors about a person, insulting and targeting a student's sexuality, physical appearance, deceiving students into revealing personal information and then publishing it, and/or posting personally identifiable information or photos without the victim's consent. Technology used may include cell phones, Instant Message programs, chat rooms, , websites, polls, blogs etc. What you and your child should do: Tell the person harassing you in straight forward terms, "Leave me alone, stop harassing me. Do not contact me again. Do not reply to anything else the harasser says. No replies to s, taunts or lies said about you. Log all chats and IMs and save a copy as evidence. Save all s and text messages as well as voic s or voice messages. Take screen shots as well. Print all evidence, but keep the files on your hard drive. In the case of harassment you need to contact the harasser's ISP (Internet Service Provider) and make a complaint. If an offending website has been posted about you, contact the web hosting service. If there are posts on a forum or bulletin board, contact the moderators. All phone interactions should be reported to the phone company. If the harassment is coming from other students at the school, contact your school's administration to see what action they would be willing to take. Keep in mind that some types of bullying (threats to your child, or exposing them to danger) may be illegal. Report it to local law enforcement along with copies of the materials that you have collected.

18 Legal and Financial

19 Identity Theft Identity theft, or identity fraud, refers to all types of crimes in which someone wrongfully obtains and uses the personal information of another in such a way that involves fraud or deception, usually for financial gain. Identity Theft is one of the fastest growing crimes in America and other countries around the world. Your personal data such as your social security number, your bank account or credit card number, telephone calling card number, and other valuable identifying data, including your date of birth, can be used by the wrong persons to personally profit at your expense. Using such information, unauthorized persons can not only wreak havoc with an individual's personal finances but can even take over their identity altogether amassing enormous debts and even committing criminal acts in the name of their victims. The effect on victim's lives can be devastating both financially and emotionally and can take years to recover.

20 Identity Theft

21 Phishing

22 Financial Repercussions

23 © 2009 Copyright Infringement Plagiarism Careless Forwarding

24 Lack of Netiquette Flaming

25 Netiquette People often behave rather outrageously online - in ways they would never dare in the real offline world. An ordinarily mild mannered person can go online and suddenly begin flaming everyone they come into contact with or behaving in a threatening way because they perceive themselves to be anonymous when online. It is important to understand that you are neither untraceable, nor unaccountable for your actions online. Keep it Short Few people enjoy reading lengthy communications on a screen. Keep your messages short and to the point. Don't Use All Caps Avoid using all capital letters in , chat or IM. It conveys shouting and is difficult to read. Blind Copy Use the BC function of your client when sending to more than one person Respect Other's Time and Storage Capacity Do not send large attachments without asking permission. Exercise restraint when choosing signature files. Subject Lines In , make sure the subject lines corresponds with your message. Learn the Lingo If you are using IM or chat programs, it helps to know the language. Learn about acronyms and emoticons. Double-Check Before Forwarding Because most people online receive a great deal of information, it is important to check the validity of information before forwarding it to others. Urban myths, false alarms, and bogus prizes annoy readers. Verify information at before sharing with all of your

26 Minimizing Risk In Your Home Protect Your Computer Select filtering and blocking software Teach children basic Internet skills Post Internet Safety Rules & Agreement Learn to monitor use of the Internet Talk with your child

27 Protect Your Computer 1. Firewall2. Anti-virus 3. Updates 4. Anti-Spyware See handouts for specifics!

28 Firewalls What is a Firewall? A firewall is a system designed to prevent unauthorized access to your computer or network (a network is a connection of two or more computers). Do I need a firewall? Take this short quiz to help you decide what is right for you: Will your computer ever be connected to the Internet or any other computer? If the answer is yes, you need a firewall. What Will a Firewall Do for Me? If your firewall is properly configured and updated, it will stop "most" hackers from gaining access to your computer. A hacker breaks into your computer to get personal information like credit card numbers, social security numbers, bank account numbers or to use your computer under their remote control to do things like that to other computers. Keep in Mind A firewall is not 100% effective. New hacker programs and methods are being developed every day. That is why firewall applications need to be regularly updated. Updates for firewall applications are a must to keep up with these new methods, just like updates to your anti-virus software are necessary to protect you from the latest virus.

29 Choosing a Firewall The first step toward securing your home computer is to install firewalls. What kinds of firewalls are there? Hardware-based firewalls are usually integrated into a router, which sits between your PC and a cable or DSL modem. Hardware firewalls are valuable especially for protecting your computer from outside attacks, and they can protect a network of PCs that share a broadband connection. The application or software firewall is probably the most common type. It is a software program running on your computer that allows the data to pass through it, if you have programmed the software to allow it. You simply select which of your applications, like web browsers, client, mIRC, etc. you want the "firewall" to allow to access the Internet. These firewalls are mainly designed to protect the single computer that is running the software. Ideally, you will use both a hardware and a software firewall. What next? Once a firewall is installed, you should visit the "Shield's Up" section of the website to check your ports to make sure your computer is secure.

30 Parental Controls Some parental control software programs can filter outgoing information, and actually prevent certain words or phrases from being typed. This type of blocking can keep your last name, your street, school or phone number from being sent out online.

31 Choosing Parental Control Software Choosing a filter for monitoring and blocking harmful content on your computer can be an overwhelming task. There is no one software program that will guarantee your child complete and total security. It is vital to remember that parents must do their part by monitoring their child's Internet activities and by selecting a filter that suits the needs of their family appropriately. When deciding what type of filter to install, it is necessary to determine the type and amount of protection needed. For instance, a family with five and seven-year-old children may want to purchase a program that allows them the opportunity to filter out harmful keywords, phrases, materials or content (i.e.: Typing "The Wild West" and finding oneself at a pornographic adult web site). Filtering software should offer options which include limiting access to key phrases or words; websites, images or chat rooms that contain sexually explicit material; graphic or extreme violence; messages of hate or intolerance, as well as illegal activities, such as pro-marijuana usage or club drug recipes. In the case of the older, more sophisticated minor user, a filter would be necessary not only to filter materials but also to track and monitor the user's whereabouts. Parental control options are limitless, allowing the parent to control features such as incoming and outgoing , chat room access, instant message access, file sharing, log URLs and browser activity, enforce curfew, etc. There are several programs that will even notify parents with an about any violations that occur. What types of filters are there? defines the two software options as follows: Client-based filter - A software program that a user installs on his or her own computer to monitor Internet use, block access to specific types of material, prevent kids from accessing the Internet at certain times, or prevent kids from revealing personal information online. This refers to actual software that is purchased or installed on your PC. Server-based filter - Software which is installed on a host server, such as a web server, to filter out Web pages which include content which meets specific criteria. Users who connect to a server which uses a filter will only be able to access those pages which get through the server's filter. This refers to web servers such as AOL or Prodigy.

32 PARENTS PROMISE 1.I will set reasonable rules and guidelines for my child to follow. (Parental controls) We will discuss them. I will explain the reason for these rules and guidelines. I will explain the dangers about sexual victimization and potential online dangers. I will post the rules and guidelines near the computer to remind my child. 2.I promise to keep the computer in a common area and utilize software to help me monitor what my child does on line and the time spent online. 3.I promise to always maintain access to my childs online account and randomly check his/her . 4.I promise to learn the web sites and services that my child uses. If I do not know how to reach these sites and service, I will get my child to teach me how to reach these sites and services. 5.I promise to spend time with my child while he/she is on line. I will get to know my childs online friends. 6.I promise not to overreact if my child tells me about a problem he/she is having on the Internet. 7.I promise that my child and I will work together to solve any problems and to prevent them from happening again. 8.I promise to teach my child the responsibilities and resources for online activity. (Child sites, chat rooms, gambling sites, porn sites, etc.) 9.I promise not to use the computer or the Internet as a babysitter. 10.I promise to make the computer and the Internet a family activity. I will ask my child to help me conduct a plan for family events using the internet. 11.I promise to find out what computer safeguards are utilized by my childs school, public library and my childs friends computer. 12.I promise to explain to my child the dangers of meeting someone face to face.

33 Examples of Prohibited Behaviors Flaming (harassment) Circumventing controls Sharing personal information Inappropriate language Plagiarism Attempting to access inappropriate materials Sharing passwords

34 When to Worry Screen Switching Odd Phone Calls Odd hours of the night Sudden influx of cash Unusually upset at an Internet interruption Withdrawal from family or friends

35 Final Tips for Parents Do not rely on software to do your job Be proactive Participate with your child online Plan ahead Encourage their other interests Think "mall A time and place for everything Explore the Internet

36 Go Online Full-size printable pdf of this presentation More information about finding and choosing firewalls, anti-virus programs and parental control software Links to the best family-friendly websites online

Download ppt "Parenting the Online Child. Your Child Is on the Internet The Internet is a wonderful research tool. Reliance on the Internet in schools has grown rapidly."

Similar presentations

Ads by Google