Presentation is loading. Please wait.

Presentation is loading. Please wait.

Enter Your Child’s Cyber World. Internet Safety Our thanks to: James Baird, CISSP with GBI Osborne Middle School Technology Team.

Similar presentations

Presentation on theme: "Enter Your Child’s Cyber World. Internet Safety Our thanks to: James Baird, CISSP with GBI Osborne Middle School Technology Team."— Presentation transcript:

1 Enter Your Child’s Cyber World

2 Internet Safety Our thanks to: James Baird, CISSP with GBI Osborne Middle School Technology Team

3 Enter Your Child’s Cyber World

4 LOL = Laughing Out Loud F2T = Free To Talk LV = Leave H8 = Hate WAN2 = Want to? POS = Parent Over Shoulder PAW = Parents Are Watching WTGP = Want To Go Private WYGOWM = Will You Go Out With Me? See Packet

5 Characteristics of Some Youth May Facilitate Victimization Lack of emotional maturity Strong desire for attention, validation, and affection Naturally curious about sex, “forbidden” topics May be rebellious and enjoy defying authority Easily impressed, manipulated and intimidated Youth lacking adult supervision

6 Students’ Basic Online Behavior 80% of students spend at least one hour per week on the Internet 11% of students spend over 8 hours per week on the Internet 12% of students say they spend more time on the Internet than with friends 30% of students say e-mail, chat rooms, or Instant Messaging is the main way they stay in contact with their friends 38% of students feel more free to do what they want on the Internet 31% of students say it is easier to talk with people on the Internet than in real life 29% of students use chat rooms, with a peak usage of 45% occurring in grade 7 Based on i-SAFE America surveys of 19,000 students

7 The Parent-Child Gap PARENTSvs.YOUTH 92% stated they had established rules for the child’s Internet use. vs.35% said that they did not have rules for Internet usage. 54% acknowledged that there was a need for more rules. 54% feel they are limited to monitor and shelter children from inappropriate material on the Internet. vs.53% stated that they would prefer to be alone when surfing the Internet. 90% feel they have a good idea of what their child does while on the Internet. vs.14% stated their parents had no idea where they go and 34% said they do not share what they do or where they go on the Internet with parents. 11% said their child’s computer was in the child’s room. 75% said it is in the family area. vs.21.5% of the students said that the computer they use most often is in their room. This goes up with age, 26% for 8th grade and 31% for 12th grade. 46% feel they have more freedom on the Internet than in the real world. vs.37% felt they have more freedom and, 18% felt safer on the Internet than in the real world. When asked “why?” 52% cited anonymity & 29% mentioned lack of laws/rules. *Taken from an i-SAFE America survey of students nationwide.

8 Teen Promises

9 Internet Predator Profile Typically married adult with children Normal neighbor Usually has a successful career in an upper-management position College graduate, possibly post-graduate degree Upper, middle-class lifestyle Usually 35 or older Usually white Will offend again

10 Students’ Risky Online Behavior 55% of students admit giving their personal information (name, sex, age, etc.) over the Internet 52% of students prefer to be alone while on the Internet 40% of students have visited inappropriate places on the Internet 10% of students feel it is okay to post their picture on the Internet 10% of students have met someone face-to-face that they previously met on the Internet 25% of students believe there is nothing wrong with chatting to strangers online 21% of students say after getting to know someone better on the Internet, they would believe them when they tell their age


12 "Tracking Teresa" Even though Teresa has tried not to reveal personal information online, she’s left enough clues that she could find herself in danger.

13 Chat Rooms – Virtual Parks No longer the guy with the trench coat waiting to kidnap the child Can sit anywhere and talk to several children at one time at different locations Used to gain child’s trust and set up sexual meetings Used to send pornographic images They will send the child porn, getting more explicit each time They will try to convince the child that everybody is doing this and that it is normal

14 Chat Rooms Predators often snoop around child chat rooms for potential victims. They use various methods to get close to children but even if a child is not receptive to the predators advances, he can still harass and endanger the child by searching for information about the child.

15 Countermeasures for Predators Use parental controls (if available) Monitor child’s actions on the internet Discuss appropriate internet activities Purchase NetNanny ($40) or similar Caution children about predators Limit the time child spends on a computer. Use software that creates a log of sites visited and every keystroke that is made on the computer. Randomly check emails on child’s account Move the computer into a family area The internet is not a babysitter.

16 More Countermeasures Discuss Internet crime and safety issues with your family Discuss with other family members expectations with use of the computer. Sign an agreement between parents and children that outlines expectations and the amount of time allowed on the computer per day or week. Include in agreement who can be contacted or talked with on the computer. If family member receives an email that offends you or them, contact your Internet Provider and complain about the message being received.

17 Cyber-bullying is Coming to a School Near You if it hasn’t already. Concerns include: Cyber-bullying can be much more damaging psychologically and much more intense. It creates a barrier between the bully and the victim. This can allow someone who normally wouldn't be a bully to become one because there is no face to face contact.


19 Cyber-bullying It is difficult to catch the cyber-bully. When identified, the suspect’s defense is often that it was someone else impersonating them using their password. Camera phones are making cyber-bullying more creative. Taking someone’s picture and then manipulating it, then posting it on a web site or in e-mail. Imagine getting an e-mail of a nude individual with your face attached to it, and you’re only a teenager. Many think this behavior is a joke and not as serious as bullying face to face.

20 Cyber-bullying Victims are often targeted because they are considered different — usually those considered overweight, small, with a learning disability or overly sensitive. Many face dirty digital tricks that range from derogatory comments about them online to embarrassing e-mail attributed to them intended to insult friends and crushes.

21 Cyber Bullying Statistics 42% of kids have been bullied while online. 1 in 4 have had it happen more than once. 35% of kids have been threatened online. Nearly 1 in 5 have had it happen more than once. 21% of kids have received mean or threatening e-mail or other messages. Based on 2004 i-SAFE survey of 1,500 students grades 4-8

22 Cyber Bullying Statistics 53% of kids admit having said something mean or hurtful to another person online. More than 1 in 3 have done it more than once. 58% of kids admit someone has said mean or hurtful things to them online. More than 4 out of 10 say it has happened more than once. 58% have not told their parents or an adult about something mean or hurtful that happened to them online.


24 Popular Blog Site





29 Parents Must Be Aware Many kids do not want to report this problem to their parents for fear of how their parents may react. They fear their parents will take away their cell phone, computer, or Internet access. Obviously this solution will stop the messages, but then the child feels harassed by the bully and punished by the parents when the equipment is removed.

30 Signs That a Child Might Be At Risk On-line Spends large amounts of time on-line, especially at night Find pornography on child's computer Child receives phone calls from unknown men or is making calls, sometimes long distance, to unfamiliar numbers Child receives mail, gifts, or packages from unfamiliar sources Child turns the computer monitor off or quickly changes the screen on the monitor when you come into the room Child becomes withdrawn from the family Child is using an on-line account belonging to someone else

31 Cyber Bullying Tips Tell a trusted adult about the bullying, and keep telling until the adult takes action. Don’t open or read messages by cyber bullies. Tell your school if it is school related. Schools have a bullying solution in place.

32 Cyber Bullying Tips Don’t erase the messages—they may be needed to take action. Protect yourself—never agree to meet with the person or with anyone you meet online. If bullied through chat or instant messaging, the “bully” can often be blocked. If you are threatened with harm, inform the local police.



35 What Can Parents Do? Establish a bond of trust and open communication with their child. Place / keep computer(s) with Internet access in an open, commonly used space. Learn about the new technologies Commend your child for reporting cyber issues Parent and Child Internet Agreement

36 What Can Parents Do? Cybersitter offers a good stealth mode, letting parents filter and monitor kids' activities without their knowledge. Cybersitter can record both sides of IM sessions, as well as log all sites visited and any violations. This information can then be automatically e-mailed to you in a daily activity report. Cybersitter relies on an extensive, frequently updated database of sites and word patterns. By default, Cybersitter blocks content related to sex, drugs, hate, and violence, as well as blocking all image searches. But parents can select from 32 content categories—including cults, gambling, file sharing, wrestling, and free e-mail sites—to tailor the filter to their needs. These settings are applied to Web browsing, e- mail, instant messaging, and newsgroups. Or you can simply block all instant messaging, newsgroups, FTP access, and file sharing..

37 Have you googled yourself? Search your name, email address, telephone number, home address Search children’s, spouse, relatives It may be possible to remove unwanted information from some sites


39 What Can Schools Do? GCPS/Trickum Middle School GCPS Firewall Blocked Sites and Procedures Acceptable Use Policies –Both Students and Staff Supervision of Computer Labs –Teachers, Parent Volunteers, Tech Staff Technology Orientation –Both Students and Staff Counselor Programs

40 What Can Schools Do? Trickum Middle School


42 Enter Your Child’s Cyber World 1. Lynne Davis – Starting the Discussion / Why important 2. Jim Fincher – Enter Your Child’s Cyber World –Internet Safety Quiz for Adults –Presentation: Enter Your Child’s Cyber World Information complied by Osborne Middle School 3. Trish Biemiller – Safe Searching Practices 4. Carla Greene – Tracking Internet History / Computer cookies 5. Additional Tools  Handouts  Web Resources  Parent/Student Contracts 6. Question & Answer 7. Need for more sessions? Topics?

43 Sites of Interest CyberSmart: Netsmartz: Georgia State Computer Crimes Task Force Educators Sub- Committee: NetNanny Internet Filter: SpyBot privacy cleaner: Ad-Aware privacy cleaner: GATech InfoSec Law Library: Free Antivirus:

Download ppt "Enter Your Child’s Cyber World. Internet Safety Our thanks to: James Baird, CISSP with GBI Osborne Middle School Technology Team."

Similar presentations

Ads by Google