Presentation is loading. Please wait.

Presentation is loading. Please wait.

Enter Your Child’s Cyber World

Similar presentations


Presentation on theme: "Enter Your Child’s Cyber World"— Presentation transcript:

1 Enter Your Child’s Cyber World
I would like to take this opportunity to welcome each of you and thank you for coming this morning. The technology team here at Trickum feels this is an important and timely topic to discuss. Let’s begin this morning by looking at the Internet Quiz for Adults. I would just like to give you the answers and then move into my presentation. (Go over answers to quiz. Have packets handed out as we finish.) You will find that the answers are discussed in more detail on the first couple of pages in the packet that you were just given. <click>

2 Internet Safety Our thanks to: James Baird, CISSP with GBI
Osborne Middle School Technology Team I would like to begin this morning by giving credit to the two main sources for my information. The information that I will be sharing comes from a presentation that was delivered here at Trickum by Mr. James Baird, an affiliate of the GBI and from a presentation that was created by the Osborne Middle School technology team. Two years ago, Trickum was already trying to learn about Internet Security. We invited Mr. Baird to come and speak with us about safety concerns. Those staff members that attended, found his presentation very eye opening. After Osborne Middle School had a situation with Internet bullying, their technology team did extensive research into the topic. They then shared their findings with those of us around the county to bring our attention to these items. I sincerely thank both of these sources for making my job easier. I plan to share a lot of information with you this morning in a quick fashion. I am not going to read it all to you. You will find a copy of my presentation in your packet. So, let’s enter your child’s cyber world…. <click>

3 Enter Your Child’s Cyber World
LOL LV F2T Have you ever tried to observe what your child was doing on the computer and found them in a chat room or instant messaging a friend? Maybe you have felt as this parent, lost and confused in a world of acronyms. Acronyms have become common place in the business and school worlds. We find these abbreviations a great way to shorten messages. However, in the world of computers it pays to understand what they mean. <click> WAN2 PAW H8 LOV WYGOWM

4 Enter Your Child’s Cyber World
F2T LV LOL WYGOWM LOL = Laughing Out Loud F2T = Free To Talk LV = Leave H8 = Hate WAN2 = Want to? POS = Parent Over Shoulder PAW = Parents Are Watching WTGP = Want To Go Private WYGOWM = Will You Go Out With Me? POS PAW WAN2 WTGP Those shown here are just a few of the many acronyms that are being used on the computer and in cell phone text messaging. You will find in your packet a more extensive list of these shortcuts that those chatting use to save themselves the time to type it out. These also allow someone that is being observed to hide what they might really be saying from the person looking over their shoulder. This is just one part of your child’s cyber world that you may not be knowledgeable about. <click> H8 See Packet

5 Characteristics of Some Youth May Facilitate Victimization
Lack of emotional maturity Strong desire for attention, validation, and affection Naturally curious about sex, “forbidden” topics May be rebellious and enjoy defying authority Easily impressed, manipulated and intimidated Youth lacking adult supervision Research has also shown that some children are easier targets to victimize than others. A lack of maturity, the need for attention, curiosity, being rebellious, those easily impressed and those that lack the proper supervision have a tendency to fall into these situations faster than others. <click>

6 Students’ Basic Online Behavior
80% of students spend at least one hour per week on the Internet 11% of students spend over 8 hours per week on the Internet 12% of students say they spend more time on the Internet than with friends 30% of students say , chat rooms, or Instant Messaging is the main way they stay in contact with their friends 38% of students feel more free to do what they want on the Internet 31% of students say it is easier to talk with people on the Internet than in real life 29% of students use chat rooms, with a peak usage of 45% occurring in grade 7 Based on i-SAFE America surveys of 19,000 students Further statistics show that students’ online behavior can put them at risk for problems. Notice the percentage of students that spend a lot of time on the computer. We have gone from the TV watching problems of our generation to the computer problems of the present. These statistics come from a survey done by i-SAFE America of only 19,000 students. Notice the 30% that stay in contact with their friends through the computer and the 31% that feel it is easier to talk to someone on the computer. <click>

7 *Taken from an i-SAFE America survey of students nationwide.
The Parent-Child Gap PARENTS vs. YOUTH 92% stated they had established rules for the child’s Internet use. 35% said that they did not have rules for Internet usage. 54% acknowledged that there was a need for more rules. 54% feel they are limited to monitor and shelter children from inappropriate material on the Internet. 53% stated that they would prefer to be alone when surfing the Internet. 90% feel they have a good idea of what their child does while on the Internet. 14% stated their parents had no idea where they go and 34% said they do not share what they do or where they go on the Internet with parents. 11% said their child’s computer was in the child’s room. 75% said it is in the family area. 21.5% of the students said that the computer they use most often is in their room. This goes up with age, 26% for 8th grade and 31% for 12th grade. 46% feel they have more freedom on the Internet than in the real world. 37% felt they have more freedom and, 18% felt safer on the Internet than in the real world. When asked “why?” 52% cited anonymity & 29% mentioned lack of laws/rules. *Taken from an i-SAFE America survey of students nationwide. There appears to be a gap between what parents and children are thinking when it comes to computer use. Notice in this chart where 92% of the parents feel that they have established rules of Internet while 35% of the children feel they have no rules at all. 90% of the parents think they have a good idea of what their child is doing on the Internet, but 14% of the kids say they have no idea and 34% don’t even share with their parents what they do. Finally, please note the last statistic. 46% of the parents feel they have more freedom on the Internet, while 37% of the children feel this way. Also 18% of the children feel safer because of anonymity and the lack of laws/rules. <click>

8 Teen Promises So, how might your child be feeling on the computer or while they are using the Internet? This video clip might give you an idea of what they’re thinking. (play video) <click>

9 Internet Predator Profile
Typically married adult with children Normal neighbor Usually has a successful career in an upper-management position College graduate, possibly post-graduate degree Upper, middle-class lifestyle Usually 35 or older Usually white Will offend again Mr. Baird of the GBI shared these characteristics of what an Internet predator might be like. I find it very disturbing to realize that most people that fit this profile would be just your average looking, successful, educated individuals. So, it is important that all of us stay aware of what students are doing on the computer. <click>

10 Students’ Risky Online Behavior
55% of students admit giving their personal information (name, sex, age, etc.) over the Internet 52% of students prefer to be alone while on the Internet 40% of students have visited inappropriate places on the Internet 10% of students feel it is okay to post their picture on the Internet 10% of students have met someone face-to-face that they previously met on the Internet 25% of students believe there is nothing wrong with chatting to strangers online 21% of students say after getting to know someone better on the Internet, they would believe them when they tell their age Student’s risky behavior can put them in harms way as well. Please take a look at these statistics. Notice that 52% of students prefer to be on the Internet alone, 25% feel chatting with strangers online is alright as well as 21% would believe what someone tells them after chatting for a short time online. <click>

11 There are many resources available to parents that talk about Internet safety. One of the sites that we highly recommend is NetSmartz. This site is a great source of information for you, but it is also a fun place for children to learn more about Internet safety. Several of the items in this presentation are taken from this site. <click>

12 "Tracking Teresa" Even though Teresa has tried not to reveal personal information online, she’s left enough clues that she could find herself in danger. So, what if your child tries very hard to be safe on the Internet? Can they still find themselves in trouble? Watch this clip about a girl named Teresa. Let’s see what a predator on the Internet could find out about her. (play clip) Amazing what someone can find out in just 45 minutes if they know what to look for and where to go. <click>

13 Chat Rooms – Virtual Parks
No longer the guy with the trench coat waiting to kidnap the child Can sit anywhere and talk to several children at one time at different locations Used to gain child’s trust and set up sexual meetings Used to send pornographic images They will send the child porn, getting more explicit each time They will try to convince the child that everybody is doing this and that it is normal Chat rooms are the parks and malls of our time. When we were growing up, our parents worried about us going to the park or mall and talking to strangers. They were scared that we would be picked up or influenced by the wrong individuals. Today children have chat rooms on their computer where they can go in under a made up name and talk to anyone. Those predators also go into a chat rooms where they can talk to more than one child at a time. They will often try to convince children that are easily influenced that everyone is doing it. <click>

14 Chat Rooms Predators often snoop around child chat rooms for potential victims. They use various methods to get close to children but even if a child is not receptive to the predators advances, he can still harass and endanger the child by searching for information about the child. Often, these individuals will look around chat rooms for victims. They will try various methods to get close to a child and even if that doesn’t work they may still harass the child. Not to mention as in Teresa’s case, the predator can often find out more information about the child. <click>

15 Countermeasures for Predators
Use parental controls (if available) Monitor child’s actions on the internet Discuss appropriate internet activities Purchase NetNanny ($40) or similar Caution children about predators Limit the time child spends on a computer. Use software that creates a log of sites visited and every keystroke that is made on the computer. Randomly check s on child’s account Move the computer into a family area The internet is not a babysitter. Here are some of the countermeasures that can be taken to prevent a predator from getting to your child. Using parental controls Monitoring what your child does on the computer Discussing appropriate activities and use of the computer Purchasing firewall software or software that tracks computer use Checking your child’s account Moving that computer to a family area Remember the Internet is not a babysitter. <click>

16 More Countermeasures Discuss Internet crime and safety issues with your family Discuss with other family members expectations with use of the computer. Sign an agreement between parents and children that outlines expectations and the amount of time allowed on the computer per day or week. Include in agreement who can be contacted or talked with on the computer. If family member receives an that offends you or them, contact your Internet Provider and complain about the message being received. Others might include: Discussing Internet crime and safety as a family Setting expectations You might sign a computer agreement with your child And you should explain what they should do if an inappropriate is received <click>

17 Cyber-bullying is Coming to a School Near You if it hasn’t already.
Concerns include: Cyber-bullying can be much more damaging psychologically and much more intense. It creates a barrier between the bully and the victim. This can allow someone who normally wouldn't be a bully to become one because there is no face to face contact. Besides Internet predators, students also find themselves faced with a new type of bully on the block. Cyber-bullying has become a growing problem as more households have gotten Internet access. This type of bullying can be more damaging psychologically and more intense. With the computer becoming a barrier between the bully and the victim, some children that would normally not act in this way even find themselves trying it. <click>

18 Notice the increase in receiving mean or threatening messages that takes place during the middle school years. <click>

19 Cyber-bullying It is difficult to catch the cyber-bully. When identified, the suspect’s defense is often that it was someone else impersonating them using their password. Camera phones are making cyber-bullying more creative. Taking someone’s picture and then manipulating it, then posting it on a web site or in . Imagine getting an of a nude individual with your face attached to it, and you’re only a teenager. Many think this behavior is a joke and not as serious as bullying face to face. This type of bullying is often difficult to catch. Also, cell phones with cameras have taken this to a new level. Students taking and sharing inappropriate pictures, posting them on the Internet or ing them to friends has become a serious problem. A lot of time students will say that it is just a joke. However, as Mrs. Davis will tell you, a joke is when both people feel happy after it is over. In these cases, someone always ends up feeling hurt. <click>

20 Cyber-bullying Victims are often targeted because they are considered different — usually those considered overweight, small, with a learning disability or overly sensitive. Many face dirty digital tricks that range from derogatory comments about them online to embarrassing attributed to them intended to insult friends and crushes. Some students are targeted because of looks or learning disabilities. These bullies will pull all kinds of dirty tricks from derogatory comments online to sending embarrassing s that make it look like the victim is insulting their own friends. <click>

21 Cyber Bullying Statistics
42% of kids have been bullied while online. 1 in 4 have had it happen more than once. 35% of kids have been threatened online. Nearly 1 in 5 have had it happen more than once. 21% of kids have received mean or threatening or other messages. Based on 2004 i-SAFE survey of 1,500 students grades 4-8 Please take note of some bullying statistics: 42% say they have been bullied 35% have felt threatened with 1 in 5 having it happen more than once 21% have gotten threatening s <click>

22 Cyber Bullying Statistics
53% of kids admit having said something mean or hurtful to another person online. More than 1 in 3 have done it more than once. 58% of kids admit someone has said mean or hurtful things to them online. More than 4 out of 10 say it has happened more than once. 58% have not told their parents or an adult about something mean or hurtful that happened to them online. Now they are not all completely innocent. Notice 53% admit to saying something mean about another person while 58% feel someone has said something mean about them. My biggest concern is that 58% have not even mentioned this to their parents. <click>

23 This graph shows an increase of this behavior throughout the middle school years.
<click>

24 www.xanga.com Popular Blog Site
Where do children find places to do this type of chatting? Xanga.com is just one example of a blog where students can instantly chat and post messages or information. This is the number one teen site, but it is not limited to this site alone. AOL instant messaging and other sites provide students with plenty of opportunities for this type of behavior. <click>

25 Where do children find places to do this type of chatting? Xanga.com is just one example of a blog where students can instantly chat and post messages or information. This is the number one teen site, but it is not limited to this site alone. AOL instant messaging and other sites provide students with plenty of opportunities for this type of behavior. <click>

26 Where do children find places to do this type of chatting? Xanga.com is just one example of a blog where students can instantly chat and post messages or information. This is the number one teen site, but it is not limited to this site alone. AOL instant messaging and other sites provide students with plenty of opportunities for this type of behavior. <click>

27 Where do children find places to do this type of chatting? Xanga.com is just one example of a blog where students can instantly chat and post messages or information. This is the number one teen site, but it is not limited to this site alone. AOL instant messaging and other sites provide students with plenty of opportunities for this type of behavior. <click>

28 Where do children find places to do this type of chatting? Xanga.com is just one example of a blog where students can instantly chat and post messages or information. This is the number one teen site, but it is not limited to this site alone. AOL instant messaging and other sites provide students with plenty of opportunities for this type of behavior. <click>

29 Parents Must Be Aware Many kids do not want to report this problem to their parents for fear of how their parents may react. They fear their parents will take away their cell phone, computer, or Internet access. Obviously this solution will stop the messages, but then the child feels harassed by the bully and punished by the parents when the equipment is removed. Parents must be aware that children do not feel comfortable in reporting these problems. From being scared of losing that cell phone or computer to getting punished for something that they may have said, student find this a difficult thing to report to their parents. It is for this reason that many students will let it get out of hand before their parents even learn what is going on. <click>

30 Signs That a Child Might Be At Risk On-line
Spends large amounts of time on-line, especially at night Find pornography on child's computer Child receives phone calls from unknown men or is making calls, sometimes long distance, to unfamiliar numbers Child receives mail, gifts, or packages from unfamiliar sources Child turns the computer monitor off or quickly changes the screen on the monitor when you come into the room Child becomes withdrawn from the family Child is using an on-line account belonging to someone else Is your child a risk? Take a look at some of the signs that point to a child being at risk. Also, you might want to check your home computer for other signs. Parents must stay aware of what their child is doing to protect them against these problems. <click>

31 Cyber Bullying Tips Tell a trusted adult about the bullying, and keep telling until the adult takes action. Don’t open or read messages by cyber bullies. Tell your school if it is school related. Schools have a bullying solution in place. Share the following tips with your child to help prevent them from becoming bullied online: Remind them to tell an adult if it is happening to them. Tell them to not read the s or messages if they think they are coming from a bully. If they suspect that the bullying is school related, report it to the school. <click>

32 Cyber Bullying Tips Don’t erase the messages—they may be needed to take action. Protect yourself—never agree to meet with the person or with anyone you meet online. If bullied through chat or instant messaging, the “bully” can often be blocked. If you are threatened with harm, inform the local police. Tell them not to erase the messages. Sometimes these messages will be needed to take action against the bully. Remind them to never agree to meet anyone that they meet online. Remember you can sometimes block bullies that are ing or instant messaging. Finally, if your child feels threatened, you should inform the police. <click>

33 The biggest action with the most difference that families can make is to move the computer out of the student’s room and place it in a family area. This will allow you to monitor use and let your children know that you are watching. <click>

34 Don’t forget to make sure that your children are aware of your rules
Don’t forget to make sure that your children are aware of your rules. It is obvious that the students surveyed here were not clear about the rules that their parents thought were established. <click>

35 What Can Parents Do? Establish a bond of trust and open communication with their child. Place / keep computer(s) with Internet access in an open, commonly used space. Learn about the new technologies Commend your child for reporting cyber issues Parent and Child Internet Agreement Other actions that you as a parent can take include: building good lines of communication with your child staying up to date on the latest technologies so that you know what they can do commend you child for good computer usage and create an Internet agreement with your child <click>

36 What Can Parents Do? Cybersitter relies on an extensive, frequently updated database of sites and word patterns. By default, Cybersitter blocks content related to sex, drugs, hate, and violence, as well as blocking all image searches. But parents can select from 32 content categories—including cults, gambling, file sharing, wrestling, and free sites—to tailor the filter to their needs. These settings are applied to Web browsing, , instant messaging, and newsgroups. Or you can simply block all instant messaging, newsgroups, FTP access, and file sharing. . Cybersitter offers a good stealth mode, letting parents filter and monitor kids' activities without their knowledge. Cybersitter can record both sides of IM sessions, as well as log all sites visited and any violations. This information can then be automatically ed to you in a daily activity report. Some parents also purchase software to help them manage computer use. One such program that can be purchased is Cybersitter. You can actually purchase and download this program from Cypersitter.com. <click> It allows parents via a stealth mode to: Filter content Monitor activity Record both sides of IM’s Send a report to you each day with information By default it: Blocks content and images about certain topics Allows parents to select from other categories as well

37 Have you googled yourself?
Search your name, address, telephone number, home address Search children’s, spouse, relatives It may be possible to remove unwanted information from some sites You might also want to be proactive and check the Internet for yourself. One of the suggestions made by Mr. Baird of the GBI is that you Google yourself and your children on a regular basis. This will let you see where your name or your child’s name are being used on the Internet. You may be surprised! If you find it on a site that you wish to have it taken off, you can try to contact the site for removal. <click>

38 GCPS POLICIES AND PROCEDURES
Gwinnett County does have policies and procedures governing students use of computers while at school. It is a requirement that every child have an acceptable use policy signed and on file. <click>

39 What Can Schools Do? GCPS/Trickum Middle School
GCPS Firewall Blocked Sites and Procedures Acceptable Use Policies Both Students and Staff Supervision of Computer Labs Teachers, Parent Volunteers, Tech Staff Technology Orientation Counselor Programs So what else can the school do? The county does have a firewall that blocks sites out so that students can not access them like Xanga.com. If we have a specific site that we need blocked, Mrs. Greene can request that as well. We also require supervision at all times when students are using the computers. That supervision is provided by teachers, parent volunteers and the technology staff. If you have any questions about what measures we take here to insure your child’s safety on the Internet, please feel free to ask. <click>

40 What Can Schools Do? Trickum Middle School
So what else can the school do? The county does have a firewall that blocks sites out so that students can not access them like Xanga.com. If we have a specific site that we need blocked, Mrs. Greene can request that as well. We also require supervision at all times when students are using the computers. That supervision is provided by teachers, parent volunteers and the technology staff. If you have any questions about what measures we take here to insure your child’s safety on the Internet, please feel free to ask. <click>

41 Be CyberSmart, Stay CyberSafe!
We hope that you have found this presentation informative and useful. It is our goal to keep you as parents informed about any issues that may arise with the use of technology in our school. Thank you!

42 Enter Your Child’s Cyber World
Lynne Davis – Starting the Discussion / Why important Jim Fincher – Enter Your Child’s Cyber World Internet Safety Quiz for Adults Presentation: Enter Your Child’s Cyber World Information complied by Osborne Middle School Trish Biemiller – Safe Searching Practices Carla Greene – Tracking Internet History / Computer cookies Additional Tools Handouts Web Resources Parent/Student Contracts Question & Answer Need for more sessions? Topics?

43 Sites of Interest CyberSmart: www.cybersmart.org
Netsmartz: Georgia State Computer Crimes Task Force Educators Sub-Committee: NetNanny Internet Filter: SpyBot privacy cleaner: Ad-Aware privacy cleaner: GATech InfoSec Law Library: Free Antivirus:


Download ppt "Enter Your Child’s Cyber World"

Similar presentations


Ads by Google