Presentation is loading. Please wait.

Presentation is loading. Please wait.

Internet Safety Your name Agency.

Similar presentations


Presentation on theme: "Internet Safety Your name Agency."— Presentation transcript:

1 Internet Safety Your name Agency

2 Roadmap Changed times Facts and figures What to do What to look for
Chat rooms Instant Messaging Web logs (blogs) What to do Securing myspace:- recommendations What to look for Guidelines

3 The world was changed forever in the early 90’s with only three letters:
AOL Brought internet into homes

4 Internet: The Benefits
Instant Communications Web sites, , Instant Messaging, Chat Opportunities for learning Immediacy – no waiting for book to be printed Anything you want to know is on the ‘net Business On-line shopping, travel bargains, consumer comparisons Entertainment Movies, music, games

5 Internet: The Risks Viruses Unsolicited e-mail (“spam”, “phishing”)
Inappropriate material Pornography, pedophiles, propaganda Loss of privacy Financial risks

6 Young People in a Wired World
Globally, in 1995, 2 million children accessed the Internet. This number climbed to 4 million in 1996. The number exceeded 28 million in 2000; By 2002, 45 million children accessed the internet; By 2005, number surpassed 77 million.

7 Young People in a Wired World
99% of youth have reported using the Internet 79% of children between the ages of 9 and 17 have Internet access at home 15% of all young Internet users have met in person at least 1 individual whom they first met on the Internet - of those only 6% were accompanied by a parent or other adult

8 Young People in a Wired World
38% of young people say that their parents know nothing or very little about their online activities 40% have been asked for personal information by a stranger 1 in 2 youth have an account that their parents don’t know about.

9 Young People in Chat Rooms
58% of year olds go into chat rooms of those 37% visit private and adult-only chat rooms 70% of year olds go into chat rooms of those 66% visit private and adult-only chat rooms

10 Young People in an Explicit World
25% of youth have been sent porn on the Internet by a stranger 1 in 7 children received sexual solicitation within the last year; asked to meet them somewhere; called them on the telephone; or sent them regular mail, money or gifts. The study was conducted by the US Department of Justice; the sample involved surveying 1,501 children – ages

11 Young People in an Explicit World
1 in 3 (34%) were exposed to sexually explicit material; 1 in 11 (9%) was the victim of cyber-bullying or harrassment;

12 Meet Robert Carey NOAA network administrator
Arrested in 2005 after warrant issued for his arrest 30 years worth of child pornography, 500,000 images alone Lived behind the new Bowie Town Center.

13 Get informed! The National Sex Offender Registry

14

15 Screenshot 2

16 Get informed! The National Sex Offender Registry www.familywatchdog.us
CHAT ROOMS

17 What are chat rooms? Chat rooms are virtual rooms
Electronic “conversations” People log into a chat room and see what others are saying Anonymous

18 Does your teenager chat?
“Teenagers are particularly at risk because they are more likely to participate in on-line discussions regarding companionship.” National Center for Missing And Exploited Children

19 Chat Room Concerns “Chat is probably the most dangerous area on the Internet because you don’t know who is in the chat room with you.” National Center for Missing And Exploited Children

20 Instant Messaging IM is a form of Internet communication that combines the live nature of real time chat with the personal contact of . A safer environment than chat rooms since contact lists can be better controlled.

21 Instant Messaging If children aren't careful during the sign-up process, they can reveal more than they should. Some IM programs offer users the option of joining in chat with strangers.

22 Instant Messaging - Dangers
IM can encourage gossiping and bullying. Children can receive pornography.

23 Pornography Pornography which is legally restricted to adults can easily be accessed by children online. A child who can’t browse through a sexually explicit magazine in a store can easily view explicit images and video online. Obscene materials which are illegal even for adults can easily be accessed online. Children accessing pornography online is another concern. The average age a child first views pornography on the Internet is 11 years old. That’s the average – which means children much younger are seeing these graphic images.

24 Chatroom and IM guidelines
Limit time Ask about screen names Consider logging conversations Not saved by default Can block some individuals Pop-up blocking software Spyware detection software

25 Get informed! The National Sex Offender Registry www.familywatchdog.us
CHAT ROOMS Web log sites

26 Blogs A blog is basically a journal (log) that is available on the web. updated daily Requires little or no technical background

27 Blogs Postings on a blog are almost always arranged in chronological order with the most recent additions featured most prominently. Blogs usually include profiles, text, photographs, and links between “friends” and interests - and may include video or audio files.

28 Blogs 10/2005 – MySpace has 52 million users. That makes it the fourth most visited site on the Internet, surpassing eBay, Google and AOL.

29 Blogging Tips for Teens
Never post your personal information, such as cell phone number, address, or the name of your school.

30 Blogging Tips for Teens
Never give out your password to anyone other than your parent or guardian. Only add people as friends to your site if you know them in real life.

31 Blogging Tips for Teens
Never meet in person with anyone you first “met” on a social networking site. Think twice before posting your photos.

32 Blogging Tips for Teens
Never respond to harassing or rude comments posted on your profile. Check the blog privacy settings: Set it so that people can only be added as your friend if you approve it. Set it so that people can only view your profile if you have approved them as a friend.

33 Securing a Blog Account
MySpace Xanga Facebook Etc etc etc……..

34 Securing a Blog Account
MySpace: More prominent Recently greatly improved security controls Goal is a safe secure environment for kids to communicate Here’s how you do it!

35 Securing a Blog Account
Step 1: Log into the MySpace account.

36

37

38 Securing a Blog Account
Step 2: Click on Account Settings

39

40 Consider changing timezone
Step 3: Check both boxes Do not send Notification s Do not send newsletters Consider changing timezone Why tell folks you’re in EST?

41 Securing a Blog Account

42 Securing a Blog Account

43 Securing a Blog Account
Step 4: Configure IM Privacy Settings

44 Securing a Blog Account
Step 5: Select Profile settings Uncheck the first box, check the remaining three. Reduce the chances of running malicious code

45 Securing a Blog Account
Step 6: Clean up the profile

46 Securing a Blog Account
Get creative Fictitious names and information No references to schools, activities, or OTHER FRIENDS!!

47 Securing a Blog Account
Save all settings DONE!!

48 Securing a Blog Account
All too easy for kids to innocently give away too much information about themselves or their surroundings

49 Web browsing Unintentional
Even “innocent” website addresses can lead directly to pornography.

50

51 Web browsing “Keyword Searches”
Children using search engines to locate legitimate information can receive links to pornographic sites. “Disneycartoons” There are 26 children’s characters, including Pokeman and Action Man, which are linked to thousands of pornographic websites.

52

53 Cyber-bullying There are several ways that children threaten and/or harass others online: Send s or instant messages containing insults or threats directly to a person. Steal passwords and send out threatening s or instant messages using an assumed identity.

54 Cyber-bullying Spread hurtful comments about a person to others through , instant messaging or postings on web sites and blogs.

55 Cyber-bullying Build web sites, often with password protection, to target people - students or even teachers. Bullied by text messages sent through their cell phones. Built-in digital cameras in cell phones have added a new dimension to the problem. There have been instances of children taking pictures of classmates in the locker room shower and distributing the photo throughout the school.

56 Cyber-bullying Dave Knight
Web site making fun of him with terrible accusations up for months Had to leave school, finish at home 8th grade.

57 No one is “immune,” including teachers!
Some of the comments on RateMyTeacher.com can be complimentary, but some can be brutal. This site has an area for parents to make comments as well as students.

58 Dealing with Cyberbullying
Preserve evidence s Chats Connection logs Notify your service provider. Contacting the bully or parent is a judgment call.

59 Dealing with Cyberbullying
If able to identify the bully, contact him or her and/or parents. Use available blocking technology (i.e., block the user on IM, and chat.) In serious cases, seek assistance from the police (i.e., threats of physical harm, unrelenting or unable to stop.)

60 Safety in the Home “The best way to assure that your children are having positive on-line experiences is to stay in touch with what they are doing.” National Center for Missing And Exploited Children

61 Advice for Parents Learn! Centralize computer Monitor usage
Install filtering software Establish ground rules Protect their identity

62 Ground Rules Never give out personal information about themselves
Inform you immediately if anyone asks them for personal information Never meet with someone from chat rooms, Im or blogging that you don’t know

63 Ground Rules Keep ALL accounts in your name.
Know your child’s password(s) and screen name(s).

64 Take Action Contact your legislators and request stronger laws against Internet crime. Report all inappropriate non-criminal behavior to the site through their reporting procedures. Report criminal behavior to the appropriate law-enforcement agency.

65 Blogs, IM, Chatrooms, Email: What is reasonable?
Under 8 - Supervised to only approved senders. 8-10 – Can add supervised IM or chat to pre-approved senders. No blogs! Give them more privacy. Block all but pre-approved senders. Still no blogs!

66 Blogs, IM, Chatrooms, Email: What is reasonable?
Begin to show trust where appropriate. Check and account for everyone, in real life, on their buddy lists. No friends of friends! 16 and over - Parental involvement becomes difficult at best.

67 Finally: Warning signs
Significantly increases on-line time. Receives unusual phone calls, , mail or packages from someone you don't know. Quickly exits IM, chat, , websites and other activities when you are near.

68 Finally: Warning signs
Increases use of new slang words, inappropriate sexual knowledge Begins using new screen names, an online account belonging to someone else, etc. Child or teen withdraws from normal activities Is reluctant to discuss activities or your concerns.

69 What about my privacy? 2 laws concerning privacy in communications
ECPA PPA Provision made for SYS ADMIN to view activity as part of his duties. WHO IS YOURS? “Expect no privacy!”

70 The “Good” Really Does Outweigh The “Bad!”
Even though we have talked about a lot of negative aspects of the Internet, it is important to remember that there are many good websites. The Internet is a great educational and communication tool. It is up to us as parents, teachers, and law enforcement to show children how to find the good things and avoid the bad.

71 Thanks very much!


Download ppt "Internet Safety Your name Agency."

Similar presentations


Ads by Google