A Practical Approach Overview Help Young Adults become

Slides:



Advertisements
Similar presentations
Your Online Footprint. What is Facebook? Facebook is an online social networking site in which young adults can have discussions, connect with friends,
Advertisements

Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
How to protect yourself, your computer, and others on the internet
Developed by Technology Services 1:1 Laptop Initiative
Keeping Your Child Safe on the Internet
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Keeping Your Child Safe on the Internet.  To understand what our children are doing online  To keep our children safe when they’re online  To teach.
The Dangers of Cyberbullying By: Rosanne Haberman Coordinator of Guidance and Counseling.
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
Cyber Bullying The newest form of bullying.. What is cyber bullying?  Being cruel to others by sending or posting harmful material using technological.
Forms of Cyberbullying
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
INTERNET SAFETY FOR STUDENTS
Cyberbullying Donna Kozica, LCSW Social Work Department Chairperson.
CYBERSAFETY Acting Sergeant Kate Brown Christchurch Police Youth Education.
CYBER BULLYING…. What Is Cyber Bullying??? 0 "Cyber bullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed.
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
How Secure Are You When You Use the Internet?. Overview What is the Internet? And what it is commonly used for? o Parents vs. Teens/Kids Use Ways of accessing.
Where does bullying occur? OFSTED Report % at school 55% at school 24% at home 24% at home 18% around where children live 18% around where children.
Internet Safety and Kids Ms. Lee’s Classroom Computers are NOT bad Computers can be used to help kids learn and play. They can be used safely, if parents.
Youth and the Internet Info for Parents. Internet: Strengths and Weaknesses Internet is the free exchange of ideas Little to no regulation on information.
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
Cyber Bullying Welcome to our Parent Power night. I hope you will find the evening helpful and informative. Mrs. Fleming is very proactive and very much.
INTERNET SAFETY FOR STUDENTS
GUIDANCE LESSON INTERNET SAFETY/NETIQUETTE IF YOU DO NOT WANT IT TO BE TOMORROW’S FRONT PAGE NEWS, DO NOT SEND IT THROUGH TECHNOLOGY!!!
What Every Parent Needs to Know! Internet Safety Information for Parents Purpose: Provide practical information parents can use at home Present safety.
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
Bullying and Cyberbullying Presented By Principal: Dr. Brook Reynolds Counselor: Phuong An TOSA: Danae Popovich.
Ashley Counce. What is Cyber Bullying?  Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition,
Internet Safety How to keep your children safe as they use the web.
Digital Citizenship and Media Literacy
Fil Santiago Director of Staff Development and Technology West Orange Public Schools.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
Cyberbulling and Sexting Are you part of this?. What is Cyber Bullying  When one torments, threatens, harasses, humiliates, embarrasses, or targets another.
1. ONLINE. Bullying behaviour is no longer restricted to the school yard. It is often online, out of sight and earshot of teachers and parents.... ONLINE.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Cyberbullying The Digital World’s Ugly Reality Understanding the psychology behind it, the forms of it, and it’s prevention – a parent’s guide.
Be More…Tech Savvy A Workshop for Elementary Students about Internet Safety.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Internet Safety How To Keep Your Children Safe As They Use The Web.
Internet Services Web browsing Chat/Messaging Newsgroups Social networking Shopping Information –Text –Pictures –Movies –Music And more! 3.
Online Safety Parent Workshop Helping to keep your children safe online.
THINK CYBER SMART, BE CYBER SMART! CYBER SAFETY AND DIGITAL CITIZENSHIP IN A CLASSROOM.
Internet Information for Parents. Objectives The Realities Benefits Learn the language Identify concerns and risks Learn strategies to increase safety.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
What’s Cyberbullying?. Today’s Objective: To be able to empathize with the targets of cyberbullying, recognize some of the key similarities and differences.
 The use of new media to harass, threaten, humiliate, embarrass, or target another person.  It only occurs among young people (adults involved: cyber-harassment.
T HINK ! Before You Post A lesson on Internet Safety Source:
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Safe Social Networking: Parent Workshop Helping to keep your children safe online.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Patti Fowler Internet Safety Education Coordinator SC ICAC Task Force Office of the Attorney General Internet Safety.
8 THINGS PARENTS CAN DO TO PREVENT CYBER BULLYING Belhaven Middle School, Linwood NJ from the New Jersey Principals and Supervisors Association Cyber Safety.
Your kids online – challenges and solutions. Fact or fiction? 1. How many hours a week do children aged between spend online on average? a)18 hours.
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Are you a bully?. 2  Cyberbullying is the use of technology for social cruelty, which can include harassment, impersonation, denigration, trickery,
Delete CyberBullying Boston Public Schools Cyber Safety Campaign.
Are your children safe online?. Welcome You are first-generation Internet parents Our children are the first generation to be born and raised with the.
E-Safety Parents Evening
Cyberbullying Life Class Lessons – Week of May 9th -May 13th.
Working to Keep our Children Safe in a World Filled with Technology
Digital Citizenship and Social Media
Cyberbullying: How Can I Protect My Child?
Presentation transcript:

A Practical Approach Overview Help Young Adults become Online Teen Safety 101 A Practical Approach Overview to Help Young Adults become “Street Net Smart”

Presenter Bio Mel Holstrom – Real World Expertise Gained From – Founder & President, GBprotect, Inc. Managed Security Services Provider Provide A Full-Service Offering of Information Security Services on a Global Basis Assist Companies Maintain Information Security Compliance Real World Expertise Gained From – 3 “Online Enabled” Daughters 24, 17, & 15 Years Old

Presentation Topics Background of Presentation Identifying the Risks Strategies to Minimize the Risks Ways to Increase Awareness & Stay Current Questions & Answers

Background Information Started working with middle school kids in 2008 Introduced a parent presentation in 2010 Expanding the presentation to communities in 2011 Key objective to gain industry professionals support in a unified approach to distribute knowledge Bringing the children, parents, school district, and communities together

So What Are Kids Doing Online? Social Networking – Virtual Communities Collaborating (Web 2.0) – Friends, Family, Teachers, Coaches Access to Media – Music, Movies, Videos Online Gaming – Xboxes, PlayStations, Interactive Online Shopping – Access to a Virtual Mall Research – Homework, Projects, Studying

What is the“Greatest” Concern to Children Online? “ACCESS DENIED” Broken equipment (Phones, Computer, ISP) Parental controls Time of day restrictions URL Blocking / Filtering Disciplinary actions

Challenges Parents Face The kids are “NET”smarter than most parents are !! It’s a fact…. Kids use the internet much differently than adults do Adults are not always present in digital environments Kids have a false sense of “I can’t hear you – You can’t see me” The intent of what is said and the audience it is said to is not always known and creates a false sense of bravery Unfortunately online messaging, especially those targeted at young people don’t always encourage positive behaviors The challenge is much different than what our parents had to deal with – Street Smarts Net Smarts

Where Does the Internet Exist “VIRTUALLY EVERYWHERE” Mobile Devices (iPhones, Droids, Etc…) Some now provide WAP (Wireless Access Point) functionality for multiple device connectivity Tablets, iPads, Netbooks – Small Format Computers Traditional Laptops and Desktops High Speed – Dedicated Internet Access Anywhere

Today’s Threats Online Access Exists Nearly Anywhere / Anytime Personal Safety Cyber Bullying Sexting Exposure to Inappropriate Content Online Identity Theft / Privacy Controls Violation of Intellectual Property Rights WOW – WHERE DO WE START

Online Predator Threat Fear of online sexual predators exists but not nearly as concerning as once believed Several recent studies have stated that children are no more likely to be preyed upon by strangers online then they would be in public. Studies from the Berkman Center’s Internet Safety Technical Task Force at Harvard University last year found that “cases of adult to child sexual encounters on social networks typically involved youth who were aware that they were meeting an adult male for the purpose of engaging in sexual activity. Even with this being the case, it is still important to teach children that stranger danger concepts need to be applied online just as in the real world.

Cyber Bullying Cyber Bullying is identified in several studies as the number one threat against children on the internet today. Cyber Bullying can include: Flaming – Online fights using electronic messages Harassment – Repeatedly sending nasty, mean, and insulting electronic messages Denigration – “Dissing” someone online, sending or posting gossip or rumors about someone to damage their reputation or friendships Impersonation – Pretending to be someone else and sending or posting materials to get that person in trouble, danger, or to damage that persons reputation Outing – sharing someone else's secrets or embarrassing information online Trickery – talking someone into revealing or sharing embarrassing information then sharing it online Exclusion – intentionally and cruelly excluding someone from an online group Cyberstalking – repeated, intense harassment and denigration that includes threats or creates significant fear

Impact of Cyber Bullying Online communications can be extremely vicious due to the lack of control people demonstrate with electronic communications Victimization can take place 24 hours a day Cyber Bullying communications even if sent privately can be quickly distributed to many others and is often retrievable Cyber Bullies can be virtually anonymous and can solicit the involvement of others Teens may be reluctant to tell adults what is happening because they are emotionally traumatized, think it’s their fault, fear greater retribution, or fear that online capabilities and use will be taken away

Tips to Prevent Cyber Bullying Encourage children to: Not Respond – If the bully doesn't’t get a response from you chances are they will move on Not Retaliate – it reinforces the bullies behavior, could aggravate the situation, and can put you as risk of becoming the bully Talk to a Trusted Adult – they deserve backup, this can be a parent, teacher, counselor, or other trusted adult. Save the Evidence – captured messages in case they are needed to resolve the issue or to engage the proper resources to resolve the issue. Block the Bully – you can use tools and privacy settings in most applications to block the person and prevent further communications. Be Civil – defuse the situation and there is a good chance they will go away. Be a Friend not a Bystander – don’t engage in supporting a bullies behavior by forwarding messages or participating in the bullies actions. If a friend is being bullied that won’t get help, encourage them to get help.

Cyber Threats Cyber Threats are either direct threats or “distressing material” – general statements that make it sound like the writer is emotionally distraught and may be considering harming someone else, harming themselves, or committing suicide As parents and educators we must recognize the source of the initial threat to respond appropriately and timely to the event.

Sexting Sexting can be identified by the sending of sexually explicit messages or images electronically In some cases Sexting can be linked closely to Cyber Bullying if intent is malicious Sexting with images has become a widespread issue due to the availability of cameras in cellphones and the ease of access to them Sexting does not just apply to phones. Sexting can be performed from any media sharing device or technology, including e-mail, social networks and web sites. Causes can be attributed to peer pressure from a Cyber Bully, Boy Friend / Girl Friend, impulsive behaviors, flirting, or even blackmail

Impact of Sexting Can Be Illegal – We need to educate children not to take nude pictures. Even if they are of them or they pass along someone else's – they could be charged with producing or distributing child pornography. Even if they store them in electronic format they could be charged with possession. If they are sent to someone in another state it’s considered a federal felony. Non-Legal Consequences - There is the potential for emotional damages that could come from distribution of the photos that could be posted online and be available potentially for ever.

What Can We Do? Talk to kids about Sexting and discuss the risks in a relaxed setting. Reiterate the potential legal and non-legal consequences that could occur as a result of Sexting. If your child or a child you know has sent any nude pictures of themselves make sure they stop immediately. If they have received a nude photo make sure they have not sent it to someone else. Stay calm and learn as much as you can about the situation. Consider talking with other parents or kids based on what you have learned. Consider whether to report to the local authorities or not based on what you find out from other parents or children involved. If you suspect that malice or criminal intent is involved you may strongly recommend the family consult an attorney. If your child or a child you know is being sent nude photos of other kids it is important that they don’t forward them to anyone else and that they get a parent involved immediately.

Exposure to Inappropriate Content Causes of exposure to inappropriate content can be related to – An incorrect search context or bad website name A result of malware that has been installed on a machine unknowingly An intended action to access the inappropriate content Exposure to the inappropriate content by another individual

Tips to Prevent Exposure Customize search engine settings to provide the desired level of content controls Implement parental control capabilities that will prevent exposure Practice safe browsing practices Implement a good anti-virus and patch management process Apply the think before you click concept to reduce the risk of infecting your computer with malware

Online Identity Theft & Privacy Control Identity theft is the result of an unauthorized person gaining access to and using you identity without your permission. Privacy controls are settings that the end-user can configure to authorize what information may be used by the remote users or systems for there purposes.

Tips to Prevent Online Identity Theft & Fraud Don’t participate in scams that are intended for you to provide personal information Examples of scams include: Phishing of information from sites impersonating your: Bank or Credit Card Company eBay PayPal The you just inherited $80,000,000 e-mail that requires you to respond with a check or credit card I want to buy your merchandise for more than your asking and you can send me back the overage

Protecting Privacy Educate kids to never provide their personal information to anyone outside their circle of friends – Encourage them to monitor and maintain their online friends list Educate kids to never share their passwords with anyone and it is good practice to change them from time to time and use special characters to build complex passwords Educate and understand the use of privacy controls and work with kids to set them to achieve the overall objectives Always read and understand the terms and conditions for use of an online resource before you agree. Teach all online users to always read at least twice before you click once

Reality The use of online resources is incredibility valuable & to an extent nearly impossible to live without today. The chance of success for today’s children without the use of online resources will be limited. The fact of the matter is relying on the ability to control their every online action in impossible – it just can’t be done Parents and mentors need to learn and develop the strategies that allow them to “PARENT” their children online with the same principles we use to raise them as individuals. Our overall objective is to help keep them safe and teach them make wise choices.

A Collaborative Approach Teaching & Applying Online Safety Takes Teamwork It has to start at home with an agreement between the parents and children It has to involve working with the schools to promote education and increase awareness across the student population It needs to spread out into our communities to educate a greater number of people See a Trend Here? We need to apply the same principles of a clearly defined, well- implemented, and monitored “Home Information Security Program” The underlying concepts are the same – personally the stakes are a little higher

Action Plan for Online Parenting Work with parents and children to create a mutually agreed upon “Acceptable Use Policy” governing the use of technology. Implement controls that don’t always result in “ACCESS DENIED” but protect from them from things that they shouldn't be exposed to. Parental control products are available in both hardware and software options. Recommend that parents put in place a schedule that controls the amount of time and the hours your child spends online. Whenever possible recommend parents make sure that online use is done with the computer resource in a visible public location where the chance of someone being able to observe what they are doing exists. Recommend that parents take the approach of not looking over their child's shoulder but rather one of watching their back. Make sure that “Acceptable Use Policy” includes that the parents have the right to audit their online activities at anytime. Recommend that parents make it a requirement that parents have their password to all of their accounts including: E-mail Facebook and other Social Networking websites Cell phone screen locks

Valuable Resources for Parents You can always search for topics including - Internet safety for children Online or internet Safety for parents Sexting, Cyber Bullying Recommended websites for online safety information – www.safekids.com www.connetsafely.org www.netfamilynews.org www.csriu.org www.getnetwise.org www.safeteens.com www.netsmartz.org http://www.microsoft.com/protect/familysafety Recommended software to help implement parental controls – many others are available www.trendmicro.com www.symantec.com www.mcafee.com

Questions & Answers