Presentation on theme: "Internet Safety for Schools"— Presentation transcript:
1 Internet Safety for Schools Training of TeachersInternet Safety for Schools
2 Aim of the training To provide safe Internet guidelines to schools; To publicize knowledge and support safe and useful ways to go online;To increase safe online behaviors among children and youth;To provide teachers with a tool to support safe online use; andTo apply Internet and computer use to support learning
3 New web applications that are popular Trends for school executives, teachers, students, and parents to promote safety on the InternetNew web applications that are popularExamples of using the Internet and forms to identify best practices for creating rules and supporting the Internet Safety SystemExamples of learning activities that teachers can use with students
4 Identifying new trends What are the new technologies that children useIdentifying issues that affects children in cyberspace
5 Understanding Children’s Interaction with Internet Ways of interactionLearningEducational sitesInformative sitesResearchingEntertainment and online gamesCommunicationsChatroomsInstant messagingSocial Networking
6 Understanding Popular applications sWorld wide webInstant messagingSocial NetworkingBlogsP2P downloadsChat roomsOnline games / Computer games3D spaces (Virtual space ex there.com, secondlife)
7 Social Networking sites Social networking web sites encourage people to create profiles about themselves and then communicate with others and form online networks of friends. People can participate in a range of activities once members. These can includechatting with each other,sharing photos & videos and posting comments in online forums,blogs or discussion groups. Profiles may contain personal information such as real life photos and descriptive comments about the member.Social networking web sites are like online diaries and are usually free to join. Some websites have millions of members. It helps to form a chain of friends or contacts
9 Why Children love Social Networking Web Sites Making new friends and communicating with existing ones has always been a popular pastime for children. Social networking web sites make it easy for children to do this from the comfort of their own computer.The ability to create an online world which they have full control over is very attractive to children and teenagers. Making their profiles appealing and creating large networks of friends with similar interests is very rewarding.Children can express their creative thoughts without really caring what anybody thinks. They enjoy making their “online diary” as individual and unique as possible.
10 What are the Dangers of Social Networking Web Sites Pedophiles and Child Abuse. Adults seeking children for their own sexual gratification may be lurking in social networking web sites, pretending to be other children. Online relationship may be formed which could lead to real life meetings. Personal Information. Children may be able to post identifiable personal information in profiles, chat rooms or blogs thus putting them at risk. Time Wasting / Internet Addiction. Children and teenagers may spend hours online modifying their profiles and communicating with others. Tasks, such as homework, may suffer as a result. No Age Verification. Many social networking web sites do not have age verification technologies in place, so people of all ages could be members, even if it is against the terms and conditions of joining. Cyber Bullying and Flaming. Many web sites let you rate another member’s profile. This opens the opportunity up for cyber bullying and nasty comments to be made. Negative comments can also appear in discussion groups and blogs
11 What can Children do to Stay Safe in Social Networking Web Sites? Check out the safety tips on the web site. They are usually found in the footer and may give you some good ideas on how to stay safe. Make sure you keep you personal information private. Set up passwords so only your friends can see your details. Keep your password to yourself. Think twice before posting a comment – once something is on the Internet it may be there for ever.Only place general, non identifiable information in your profile. Don’t always believe what you see or what people say to you. Some people may display fake photos or tell you things that aren’t true. Be careful who you communicate with. Be selective and make sure there are good reasons why you would like to have someone else in your network of friends. Be cautious of others you don’t know who invite you to join in their group of friends. Why would they want you to join anyway? Find out what your friends are posting about you and talk to them if you see something you don’t like. Make sure it is OK with them before you post anything about them online. If you see some content on the web site that is upsetting, report it to the Webmasters and tell an adult you can trust.
12 Instant MessagingAn instant messaging program is one that can instantly send messages from one computer to anotherIt allows one to see who is online and start communicationNormally it has to be installed in the computer before using and account is required to start operatingThere are some applications that allows communication online without downloading programs they are called web based IM
14 What are the Potential Dangers in Instant Messaging? Private conversations can be started with anybody (including strangers) with many instant messaging programs.Instant messaging provides the opportunity to release personal information in real time.Once people have created their accounts they can start sending messages from any computer connected to the Internet which also has the instant messaging programs installed. This makes supervision more challenging. Identity theft can occur by fraudsters gaining access to user accounts and profiles.Instant messaging can be very addictive and time consuming and can get in the way of other activities
15 How can to ensure that Children are Safe when using Instant Messaging Programs? Review the profile thes student has set up and ensure that no personal information can be made public.Ensure that the software is kept up to date to help ensure it is not vulnerable to security threats.Encourage students to change their passwords regularly.Know your student’s handle (online computer name) and what instant messaging programs they use.Know the online names of the friends that the student communicates with.Understand the language that is used in instant messaging. This includes emoticons and Internet acronyms.Talk to your student about Netiquette and how to respond to any inappropriate messages that come their way.
16 Chat roomsA chat room is a place on the Internet where people with similar interests can meet and communicate together by typing messages on their computerThe chat rooms can provide a space for learning and sharing information and help in educationMessages that are typed in by a user appear instantly to everybody who is in that chat room. Some chat rooms are ‘moderated’ whereby certain messages are not broadcast because they do not conform to the standards set up by the operator of the service. Reasons for a message being blocked could include: discussion off the topic, bad language or repeat messaging especially of undesirable or obscene text, known as ‘flaming’.The majority of chat rooms however, remain ‘open’ where messages are posted automatically with no human intervention.People can often enter a chat room without any verification of who they are.
17 What are the Potential Dangers of Chat Rooms? Children can often waste time ‘chatting’ thus letting other responsibilities - such as homework or tasks go unattended.Children can also be in danger of under-developing their social skills by relying on Internet chat as their primary source of communication. Addiction can be an outcome that needs monitoring by parents or carers.Participants in chat rooms will sometimes attempt to entice children into talking about sex in one form or another and pedophiles have been found in chat rooms in jurisdictions all over the world.Participants in chat rooms will sometimes attempt to entice children into talking about sex in one form or another and pedophiles have been found in chat rooms in jurisdictions all over the world. Pedophiles will try to make as many online relationships as possible, in order to find a child who will be willing to meet them.They rely on creating a sense of trust by listening to problems and pretending to be interested in what the children are doing.
18 What can Children do to Remain Safe in Chat Rooms? Never reveal your real name, address, phone number, the names of your family members, the name of your school or any other personal information to anyone online when in chat rooms. Once you have given this information to someone online, it is impossible to take it back.Select an appropriate screen name (handle) to use which will not draw unwanted attention to you. Let your parents know what your online name is.If something appears on your screen that disturbs you, tell your parents, teacher or a friend. Remember you will not be in trouble by letting teachers, parents, carers or other responsible adults know what you have stumbled across and ignoring it could lead to trouble.
19 If you hear or see your friends not doing the right thing in a chat room, remind them of the potential dangers and how to do the right thing. If they are ignoring your advice, consider telling a responsible adult.Chat rooms are great ways to talk to people but beware some people in them are not who they say they are. If someone, or something, disturbs you in a chat room, leave and find one where there are people you like. Talk to your parents, carers or teachers about getting what happened.Let your parents know when you have made a new friend online. If you want to meet this new person face-to-face, you must discuss this with your parents, teachers, carer or other responsible adult. You never know whom it is you are meeting, and without supervision you could be placing yourself in great danger.
20 For teachers to guide their students GuidesFor teachers to guide their students
21 Golden rules- sNever give out your address to someone you don’t know.Never open s from people or organizations/businesses you don’t know.can contain all sorts of bad stuff, like hoaxes and chain mail scams that try to get your money.Computer viruses can be carried as attachments to messages.Inappropriate or illegal picture or movie ﬁles can be attached to an message.
22 Golden rules-When inappropriate content appears on the screen Close the window.Doesn’t work? Close the browser!Doesn’t work? Shut down the computer or ask a parent or supervisor.Remember you will not get into trouble by letting people know what you have stumbled across.
23 The Golden Rules- Chatting You can never be sure that someone is who he or she says they are.Never give anyone your real name – use a handle or nicknameDon’t give any other details about where you live, your phone number (including mobile phone number), where you go to school or who your family is.Make sure you understand the rules of any chat room you may be in.Remember, you may think you can stay anonymous on the Internet, but often people can trace who posted information online, so always be nice to others.
24 The Golden Rules Chat Rooms And Online Communication Never meet with someone you met online In Real Life.If you feel pressured by someone online seek advice from a responsible adult.Only give your address to known friends – never to strangers.Seek advice from a responsible adult – never be tempted or pressured to meetsomeone in real life that you have met online.If someone or something disturbs you in a chat room, leave and . nd one that yourparents have agreed you can use.
25 The Golden Rules -Viruses, Attachments And Online Hoaxes Be careful about s from someone you don’t know.If something seems too good to be true, it probably is.Be very careful about s that say ‘forward this on to everyone’. They may contain hoaxes and scams and should not be forwarded on!Don’t log into any banking site that claims you need to update or confirm your password.Always keep your passwords secret from others.Be careful downloading free games from the Internet or via – they could contain a virus or send you to an inappropriate site.Sometimes people can trick you into clicking on a link that sends you to somewhere not nice on the Internet.
26 The Golden Rules –Online Publishing (Blogging) Make sure you only put ‘safe’ pics online.Password protect the site with photos.Always get permission from your parents, guardian or teacher to create your own site, and get them to review it.Personal information should never be entered, even into blogs or discussion groups.You need to be very careful with what you put on the Internet, because when it is published, the whole world will be able to see and possibly misuse the information.
28 Identifying risks and harms Exposure to illegal content including pornographyGroomingReal time exploitation by coercionCyber bullyingDisclosure of private informationFinancial SecurityDefamation
29 Exposure to illegal and harmful content Pornography including child pornography - is widespread on the Internet and can be viewed through websites, shared in P2P networks, or sent as spam via s.Hate Groups - racial hatred, anti gay and anti Semitic groups may have websites that reflect their views.Violence - includes instructional websites (such as bomb or weapon making), vigilante or violent groups' websites, and websites displaying explicit violent behaviour (such as domestic bashings or rape).Illegal Activity - content promoting illegal activity (e.g. copyright infringement on music), security breaches (e.g. unauthorized access to computers) or fraudulent online schemes.Extremist Groups and Cults – extremist organizations and cults can offer information about their mission or activities. These groups can use the Internet to recruit new members.
30 Online solicitation or Grooming After initiating contact online, an adult may encourage the targeted child or young person to move out of a public chat room into a more private location or to use IM instead.Grooming is motivated by the desire to use a child for sexual gratiﬁcation.Exposing a young person to sexually explicit materials is a tactic to reduce resistance or inhibitions about sexYoung people can be coerced by the groomers to pose in various states of undress and send photos by or webcam and lead into sexual discussionsSuccessful grooming allows one to exert power and authority to arrange physical contact without using any force
31 Real time abuseStreaming videos can be used to produce and distribute online abuse of childrenThis happens in real time ,Involves physical and mental harmUsually involves a racket or a network of commercial nature
32 Cyberbullying Harassment of an individual through Emails Online postingText messages (SMS)Instant messagingChat rooms
33 Signs of cyberbullying spending a lot of time on the computerhaving trouble sleeping or having nightmaresfeeling depressed or crying without reasonmood swingsfeeling unwellbecoming anti-social and losing friendsfalling behind in homework
34 The cyberbully does not witness the harms caused to the victim Remoteness allows for extreme harassment without consideration for the traumaDifficult to identify and treatHas caused young people to commit suicide
35 Disclosure of personal information An unguided child can easily reveal information that is personal to the outside worldInformation such as bank details and other financial details of the family can be leakedUnguided and inconsiderate downloading of free software particularly games and music can infect the computer with virus , Trojans and keyloggersThe personal and financial information entered in the computer can be compromised and used by hackers to cause financial harm
36 DefamationIf passwords and username of blogs and social networks are leaked then others can post materials and comments on someone else’s site to cause problemThere is no way to prove that those unwanted materials were not posted by the victimBy saying bad things about others, ones social circle is jeopardized
38 . Modes of Internet Safety in School Management Selecting an Internet Service Provider (ISP)Installing a filtering system and limiting Internet accessUsing in schoolsUsing chatroomsSchool Web SiteIntellectual Property and Copyright
39 Modes of Internet Safety in School Management Contd… Health and Safety in the use of a computer
40 Guidelines for using the Internet Learn about ‘netiquette’;Follow the basic safety rules; andLearn about procedures for practice when involved in a risky online situation.
41 Netiquette Do not use the Internet to harass or bother people; Do not use the network for any illegal or immoral practices;Do not misuse other people’s information, or view and make changes to them;Do not disclose your password to anyone, not even your close friends;Do not use other people’s Internet accounts or any unpermitted networks;Do not borrow or use any programs, images, or information on the Internet without getting permission from the owner;Do not violate any of the ISP rules;Do not hack into your network or that of others. Do not dare anyone to hack into your network.In case of a leak in the system, a tip, or a person suspected of endangering the network, inform the ISP immediately.When closing an Internet system permanently, delete all information and inform the web master. Leaving an Internet account inactive for a long period is not recommended, as it may lead to someone hacking into the system and causing possible damage.
42 Safety rulesDo not disclose your personal information such as address, telephone number, school name, names of friends or parents.Do not arrange to meet people met online without informing parents or teachers first.Do not send photographs or personal information to people met on the Internet.Do not respond to people who use violent or inappropriate language.Do not download any unfamiliar information from the Internet or open any documents attached to unknown s.If you receive violent text or graphics, inform parents or teachers immediately.Respect regulations, policies, or agreements given to parents or teachers regarding use of the Internet.
43 Learning Activities Web Site Evaluation Collecting information CommunicationSuitable Online Activities
44 Searching website safely What is safe search?How does special search engines for kids workHow to protect accessing mature and illegal content by setting the web browsers properly
45 PoliciesSchools should have policies on Internet use in terms of allowing / restrictingWeb browsingsP2P downloadsBloggingUsing social networksDownloading content (Photos , movies , music)
46 ContdInternet usage hoursPassword changeAcceptable use agreement
47 Steps to take when students use the Internet inappropriately or when students are at risk Create a memo on what to do when students open a sexual web site, view pornographic images or are contacted by strangers in a threatening way.Check all computers for records, photographs, and web sites.Meet and discuss with the staff members supervising the students’ Internet use.Teachers can talk to the students involved and evaluate the situations by consulting officials or other related agencies for support and further information.If there is sufficient evidence to take action, notify the parents to meet and discuss further action. For example, if a student is guilty, a punishment, such as deduction on their conduct points, quashing their right on the use of the Internet temporarily or permanently, and suspension or expulsion, will be enforced. Police may be involved in case of a serious violation. If a student is victimized, the school may have to ask for cooperation from other agencies, such as the ISP, for additional information, or for the police to investigate the violator and penalize him/her accordingly.In pursuing procedures after such circumstances, the school should verify whether other students can still use the Internet safely. In case of uncertainty, the system should be shut down and rectified, or the policy should be altered temporarily to prevent further problems.
Your consent to our cookies if you continue to use this website.