Presentation on theme: "Internet Safety for Kids Presented by Lawrence Fine."— Presentation transcript:
Internet Safety for Kids Presented by Lawrence Fine
What do you do online? ● Read news ● Keep in touch with family and friends ● Online banking and shopping ● Research
What are your kids doing online? ● 81% of teen Internet users admit that they log onto the Internet to play online games. ● 76% of teen Internet users log on to research. ● 43% of teen Internet users are logging on to make purchases. ● 31% of teen Internet users access the Internet to obtain health information.
Who's a girl and who's a boy? The biggest danger of online identities is that you can never really tell if you're talking to a person who's exactly who they claim they are. Even if their username is hotchick15, there's a good chance that hotchick15 is not hot, not a chick nor is she 15.
Who is lonelygirl15? ● She is Bree, a home schooled 15-year old. She lives with her very religious parents who doesn't know that she's making videos inside her room. ● She is actually Jessica Lee Rose, a 19-year old US-born New Zealander. She was a graduate of the New York Film Institute. Together with Ramesh Flinders, Miles Beckett, and Grant Stienfield, they brought Bree to life.
Who is lonelygirl15? Lonelygirl15's creators say “lonelygirl15 is a reflection of everyone.” "She is no more real or fictitious than the portions of our personalities that we choose to show (or hide) when we interact with the people around us."
What's so great about Myspace? The most appealing aspect about MySpace.com is exactly that it's MY space. It's a place where teenagers can hang out in the digital world, creating an environment that reflects their individual personalities and a venue to express thoughts and opinions. It's a place to get together with old friends and make new ones based on their identity, and not their parent's.
Your Myspace stalker “...I've been known to stalk someone before...me and my friend would stalk our bfs...if we knew they were going somewhere we'd nonchalantly pass by the house and one time we got caught! It was freakin' hilarous!”
Sex really sells One of the biggest appeal of Myspace is the ability to post pictures and have your “friends” comment on your picture. This is Eliska, and this photo was posted in the Suicide Girl Myspace page. SuicideGirls is “an altporn website that features softcore pornography and text profiles of goth, punk, emo and indie-styled young women.” Their profile and photos are viewable by anybody who has a Myspace account.
On popping pills and having the whole world read about it “I spoke to you when I got home, you ambien pill popping sloppy typing ambianish late night texting slut...”
A short list of notable social networking websites
Characteristics of an Online Predator ● Close to 100% are male ● 91% are white and non-Hispanic ● 91% hold a full-time job ● 30 to 65 years old ● Has a middle- to upper-middle class lifestyle ● Usually a college graduate ● Commonly married in the past or is currently married ● Often has children of his own that are older than the children he is chatting with
More charasteristics of an online predator ● Afraid of adult intimacy. They search out children, who are easily manipulated ● Usually refuses to take responsibility for his actions ● Generally has a need for controlling others and for power ● May have been abused as a child ● Has low self-esteem
Is your child a victim? ● Most but not all victims are between the age of 12 and 15 years old. ● Most victims have an instant message account (most kids do) but have not set up privacy or security settings to block strangers and, in fact, willingly engage in conversations with strangers ● Most victims tend to live in suburban or rural towns ● Most victims are very sheltered and naïve, although a few are at the opposite extreme and willing to take very serious risks ● Most victims tend to spend more than 90 minutes of non- homework time a day online, and are secretive about their Internet activities. When you walk by, the screen often goes blank or windows are minimized ● Most victims tend to have few activities outside of the Internet
Is your child a victim? Just because your child matches one or more of these characteristics does not mean they are being targeted by predators, nor is your child perfectly safe if they match none of these characteristics. In all circumstances, a parent should be ever vigilant and involved in their children’s on-line activities.
Warning signs your child is being contacted by a predator: ● Phone calls Are strange calls showing up on your phone bills? Don’t assume you can pick out adults calling your children – a 35 year old can sound very much like a 15 year old if they want to. ● Gifts and packages arriving at your house Many predators groom their victims by sending small gifts. Some predators have been known to send disposable cameras or web cameras for children to take pictures of themselves with.
Warning signs your child is being contacted by an online predator ● Secrecy Teens are often secretive, and often it is a symptom of nothing more than their carving out an independent life for themselves. However, if your child is taking secrecy to an extreme, or has suddenly become more secretive than before, it is cause for concern. ● Trust your gut If something doesn’t feel right, it probably isn’t. Predators are masters of manipulation. Unexplained and sudden changes in your child’s mood or behavior may be a sign they are being manipulated in ways they are not comfortable with but are reluctant to talk about.
How to protect your child ● Put the computer in an open space ● Do not allow computers in the child's bedroom ● Explain that the use of the Internet is a privilege ● Outline family rules concerning the use of the Internet ● Ask your child which chat rooms they use, how many screen names they have and how many profiles they have on the Internet ● Stay calm and talk to your child without making accusations. Explain to him/her that if they get a picture, or if someone says something that makes them feel uncomfortable, to tell someone ● Explain that they will not get in trouble for telling a parent
Other ways to protect your child ● Teach your child to not communicate online with people they have not physically met offline. This absolutely means friends of friends. Predators often infiltrate a network of child friends by finding the one weak link and using that person’s trust to gain contact with others. Under no circumstances should a child meet in person someone they only know online - in most cases where a child is exploited, the child is conned or coerced into willingly meeting the predator offline. ● Go through your child’s list of internet buddies and have them tell you the real name of each person on the list.
Another way to protect your child ● Review you child’s home page or online profile. Make sure there is no personally identifiable information there, including photos, school name, or team names. Many predators keep detailed files on their targets and gather information over time from a variety of sources. Even seemingly innocuous information may prove harmful when combined with comments made weeks or months later. “I play catcher on my baseball team”, “I went to a Red Sox game!”, and “Big game against Bedford tomorrow – I hope we crush them!” can tell a predator their target probably lives in the Boston area and is playing baseball somewhere in Bedford the following afternoon. A quick Google search will show the public schools in Bedford and which ones have baseball games scheduled.
More ways to protect your child ● If your child has been approached or harassed online, have them immediately delete their old account, pick a new username and start another. Do not let the harassment continue. ● Absolutely prohibit web-cams. Easy-to-use $20 Webcams instantly transmit high-quality continuous color video across the globe and are used by predators to exploit children.
One more tip ● Most importantly, install keylogger or monitoring software on the computer used by your child. There is no other way to be totally certain of what your child is doing online or who they are communicating with – and there is no other way of keeping 100% accurate records of what was said in the event your child is contacted by a predator. Even though it may feel like “spying” on your child, a parent has a responsibility to know with certainty who is in their child’s life and keylogger software provides that assurance.
Parental Control Programs Visit Download.com to see similar programs. You can filter the results to display programs that requires a fee, free to try and freeware. You can also view user reviews to aid you in chosing a program to download. CyberPatrol http://www.cyberpatrol.com/ Cybersitter http://www.cybersitter.com/ NetNanny http://www.netnanny.com/ Bsafe Online http://bsafehome.com/ Chat Watch http://www.zemericks.com/products/chatwatch/
Last, but definitely not the least The most important way to protect your child is to talk to them, be involved, and care.
The bottom line is... Teenagers are in a quest to know themselves. They may be looking for a place where they can introduce themselves as they are, and not as xxx's son or daugther. With proper guidance, they can be molded to become responsible Internet netizens.
Get in touch Phone: 304-932-4111 E-mail: email@example.com@lawrencefine.com Website: http://lawrencefine.com If you have any questions regarding today's topic, or any other internet issues, please feel free to contact me.