Internet Safety Your name Agency
Roadmap Changed times Facts and figures What to do What to look for Chat rooms Instant Messaging Web logs (blogs) What to do Securing myspace:- recommendations What to look for Guidelines
The world was changed forever in the early 90’s with only three letters: AOL Brought internet into homes
Internet: The Benefits Instant Communications Web sites, E-mail, Instant Messaging, Chat Opportunities for learning Immediacy – no waiting for book to be printed Anything you want to know is on the ‘net Business On-line shopping, travel bargains, consumer comparisons Entertainment Movies, music, games
Internet: The Risks Viruses Unsolicited e-mail (“spam”, “phishing”) Inappropriate material Pornography, pedophiles, propaganda Loss of privacy Financial risks
Young People in a Wired World Globally, in 1995, 2 million children accessed the Internet. This number climbed to 4 million in 1996. The number exceeded 28 million in 2000; By 2002, 45 million children accessed the internet; By 2005, number surpassed 77 million.
Young People in a Wired World 99% of youth have reported using the Internet 79% of children between the ages of 9 and 17 have Internet access at home 15% of all young Internet users have met in person at least 1 individual whom they first met on the Internet - of those only 6% were accompanied by a parent or other adult
Young People in a Wired World 38% of young people say that their parents know nothing or very little about their online activities 40% have been asked for personal information by a stranger 1 in 2 youth have an email account that their parents don’t know about.
Young People in Chat Rooms 58% of 11-12 year olds go into chat rooms of those 37% visit private and adult-only chat rooms 70% of 13-14 year olds go into chat rooms of those 66% visit private and adult-only chat rooms
Young People in an Explicit World 25% of youth have been sent porn on the Internet by a stranger 1 in 7 children received sexual solicitation within the last year; asked to meet them somewhere; called them on the telephone; or sent them regular mail, money or gifts. The study was conducted by the US Department of Justice; the sample involved surveying 1,501 children – ages 10-17.
Young People in an Explicit World 1 in 3 (34%) were exposed to sexually explicit material; 1 in 11 (9%) was the victim of cyber-bullying or harrassment;
Meet Robert Carey NOAA network administrator Arrested in 2005 after warrant issued for his arrest 30 years worth of child pornography, 500,000 images alone Lived behind the new Bowie Town Center.
Get informed! The National Sex Offender Registry www.familywatchdog.us
Screenshot 2
Get informed! The National Sex Offender Registry www.familywatchdog.us CHAT ROOMS
What are chat rooms? Chat rooms are virtual rooms Electronic “conversations” People log into a chat room and see what others are saying Anonymous
Does your teenager chat? “Teenagers are particularly at risk because they are more likely to participate in on-line discussions regarding companionship.” National Center for Missing And Exploited Children
Chat Room Concerns “Chat is probably the most dangerous area on the Internet because you don’t know who is in the chat room with you.” National Center for Missing And Exploited Children
Instant Messaging IM is a form of Internet communication that combines the live nature of real time chat with the personal contact of email. A safer environment than chat rooms since contact lists can be better controlled.
Instant Messaging If children aren't careful during the sign-up process, they can reveal more than they should. Some IM programs offer users the option of joining in chat with strangers.
Instant Messaging - Dangers IM can encourage gossiping and bullying. Children can receive pornography.
Pornography Pornography which is legally restricted to adults can easily be accessed by children online. A child who can’t browse through a sexually explicit magazine in a store can easily view explicit images and video online. Obscene materials which are illegal even for adults can easily be accessed online. Children accessing pornography online is another concern. The average age a child first views pornography on the Internet is 11 years old. That’s the average – which means children much younger are seeing these graphic images.
Chatroom and IM guidelines Limit time Ask about screen names Consider logging conversations Not saved by default Can block some individuals Pop-up blocking software Spyware detection software
Get informed! The National Sex Offender Registry www.familywatchdog.us CHAT ROOMS Web log sites
Blogs A blog is basically a journal (log) that is available on the web. updated daily Requires little or no technical background
Blogs Postings on a blog are almost always arranged in chronological order with the most recent additions featured most prominently. Blogs usually include profiles, text, photographs, and links between “friends” and interests - and may include video or audio files.
Blogs 10/2005 – MySpace has 52 million users. That makes it the fourth most visited site on the Internet, surpassing eBay, Google and AOL.
Blogging Tips for Teens Never post your personal information, such as cell phone number, address, or the name of your school.
Blogging Tips for Teens Never give out your password to anyone other than your parent or guardian. Only add people as friends to your site if you know them in real life.
Blogging Tips for Teens Never meet in person with anyone you first “met” on a social networking site. Think twice before posting your photos.
Blogging Tips for Teens Never respond to harassing or rude comments posted on your profile. Check the blog privacy settings: Set it so that people can only be added as your friend if you approve it. Set it so that people can only view your profile if you have approved them as a friend.
Securing a Blog Account MySpace Xanga Facebook Etc etc etc……..
Securing a Blog Account MySpace: More prominent Recently greatly improved security controls Goal is a safe secure environment for kids to communicate Here’s how you do it!
Securing a Blog Account Step 1: Log into the MySpace account.
Securing a Blog Account Step 2: Click on Account Settings
Consider changing timezone Step 3: Check both boxes Do not send Notification emails Do not send newsletters Consider changing timezone Why tell folks you’re in EST?
Securing a Blog Account
Securing a Blog Account
Securing a Blog Account Step 4: Configure IM Privacy Settings
Securing a Blog Account Step 5: Select Profile settings Uncheck the first box, check the remaining three. Reduce the chances of running malicious code
Securing a Blog Account Step 6: Clean up the profile
Securing a Blog Account Get creative Fictitious names and information No references to schools, activities, or OTHER FRIENDS!!
Securing a Blog Account Save all settings DONE!!
Securing a Blog Account All too easy for kids to innocently give away too much information about themselves or their surroundings
Web browsing Unintentional Even “innocent” website addresses can lead directly to pornography. www.teens.com
Web browsing “Keyword Searches” Children using search engines to locate legitimate information can receive links to pornographic sites. “Disneycartoons” There are 26 children’s characters, including Pokeman and Action Man, which are linked to thousands of pornographic websites.
Cyber-bullying There are several ways that children threaten and/or harass others online: Send e-mails or instant messages containing insults or threats directly to a person. Steal passwords and send out threatening e-mails or instant messages using an assumed identity.
Cyber-bullying Spread hurtful comments about a person to others through e-mail, instant messaging or postings on web sites and blogs.
Cyber-bullying Build web sites, often with password protection, to target people - students or even teachers. Bullied by text messages sent through their cell phones. Built-in digital cameras in cell phones have added a new dimension to the problem. There have been instances of children taking pictures of classmates in the locker room shower and distributing the photo throughout the school.
Cyber-bullying Dave Knight Web site making fun of him with terrible accusations up for months Had to leave school, finish at home 8th grade.
No one is “immune,” including teachers! Some of the comments on RateMyTeacher.com can be complimentary, but some can be brutal. This site has an area for parents to make comments as well as students.
Dealing with Cyberbullying Preserve evidence Emails Chats Connection logs Notify your service provider. Contacting the bully or parent is a judgment call.
Dealing with Cyberbullying If able to identify the bully, contact him or her and/or parents. Use available blocking technology (i.e., block the user on IM, email and chat.) In serious cases, seek assistance from the police (i.e., threats of physical harm, unrelenting or unable to stop.)
Safety in the Home “The best way to assure that your children are having positive on-line experiences is to stay in touch with what they are doing.” National Center for Missing And Exploited Children
Advice for Parents Learn! Centralize computer Monitor usage Install filtering software Establish ground rules Protect their identity
Ground Rules Never give out personal information about themselves Inform you immediately if anyone asks them for personal information Never meet with someone from chat rooms, Im or blogging that you don’t know
Ground Rules Keep ALL accounts in your name. Know your child’s password(s) and screen name(s).
Take Action Contact your legislators and request stronger laws against Internet crime. Report all inappropriate non-criminal behavior to the site through their reporting procedures. Report criminal behavior to the appropriate law-enforcement agency.
Blogs, IM, Chatrooms, Email: What is reasonable? Under 8 - Supervised email to only approved senders. 8-10 – Can add supervised IM or chat to pre-approved senders. No blogs! 10-12 - Give them more privacy. Block all but pre-approved senders. Still no blogs!
Blogs, IM, Chatrooms, Email: What is reasonable? 13-15 - Begin to show trust where appropriate. Check and account for everyone, in real life, on their buddy lists. No friends of friends! 16 and over - Parental involvement becomes difficult at best.
Finally: Warning signs Significantly increases on-line time. Receives unusual phone calls, email, mail or packages from someone you don't know. Quickly exits IM, chat, email, websites and other activities when you are near.
Finally: Warning signs Increases use of new slang words, inappropriate sexual knowledge Begins using new screen names, an online account belonging to someone else, etc. Child or teen withdraws from normal activities Is reluctant to discuss activities or your concerns.
What about my privacy? 2 laws concerning privacy in communications ECPA PPA Provision made for SYS ADMIN to view activity as part of his duties. WHO IS YOURS? “Expect no privacy!”
The “Good” Really Does Outweigh The “Bad!” Even though we have talked about a lot of negative aspects of the Internet, it is important to remember that there are many good websites. The Internet is a great educational and communication tool. It is up to us as parents, teachers, and law enforcement to show children how to find the good things and avoid the bad.
Thanks very much!