Presentation is loading. Please wait.

Presentation is loading. Please wait.

EDAD 660 Technological Issues: Presented by: Larissa Damm April 28, 2003.

Similar presentations


Presentation on theme: "EDAD 660 Technological Issues: Presented by: Larissa Damm April 28, 2003."— Presentation transcript:

1

2 EDAD 660 Technological Issues: Presented by: Larissa Damm April 28, 2003

3 Danger…What Danger? There are over 100,000 child pornography web sites. There are over 100,000 child pornography web sites. “Sex” is the most searched term on the Internet. “Sex” is the most searched term on the Internet. Over 60% of all web sites have sexual content. Over 60% of all web sites have sexual content. About 30% of unsolicited email is sexual in nature. About 30% of unsolicited email is sexual in nature. One in two parents do not use Internet blocking devices. One in two parents do not use Internet blocking devices. One in five children have been approached by pedophiles in Internet chat rooms. One in five children have been approached by pedophiles in Internet chat rooms. Thirteen million children use instant messaging. Thirteen million children use instant messaging.

4 Danger…What Danger? Pornographers disguise their sites using common names such as… “Disney, Barbie, ESPN…” For example: www.whitehouse.com versus www.whitehouse.org Pornographers disguise their sites using common names such as… “Disney, Barbie, ESPN…” For example: www.whitehouse.com versus www.whitehouse.org www.whitehouse.comwww.whitehouse.org www.whitehouse.comwww.whitehouse.org Majority of time spent on the computer is after school; the time when parents are still at work. Majority of time spent on the computer is after school; the time when parents are still at work. It is estimated that only 25% of youth have told adults when they have viewed a sexual web site. It is estimated that only 25% of youth have told adults when they have viewed a sexual web site.ProtectKids.com

5 Warning Signs for parents and educators… Disks are disappearing or are being hidden. Disks are disappearing or are being hidden. The child is spending many hours on the Internet, especially at night. The child is spending many hours on the Internet, especially at night. Files are being used that end in.gif or.jpg. (often pornography pictures) Files are being used that end in.gif or.jpg. (often pornography pictures) Unknown charges on your credit card or phone bill. Unknown charges on your credit card or phone bill. When entering the room or passing by the computer, the child quickly closes sites or windows. When entering the room or passing by the computer, the child quickly closes sites or windows.

6 Children's Online Privacy Protection Act of 1998 This act protects children and all their personal information from being exploited on the computer. This act protects children and all their personal information from being exploited on the computer. All computer related activities needs a written letter of consent from the parent or guardian. For example: All computer related activities needs a written letter of consent from the parent or guardian. For example: Class or personal pictures on a websiteClass or personal pictures on a website Pen palsPen pals Chat RoomsChat Rooms Message BoardMessage Board School email serviceSchool email service Any personal information (addresses, names, phone numbers)Any personal information (addresses, names, phone numbers)

7 How to protect students Filtering Software – doesn’t allow searches for certain words. Filtering Software – doesn’t allow searches for certain words. Blocking Software – doesn’t allow access for certain websites. Blocking Software – doesn’t allow access for certain websites. Schools can hold an Internet Safety Class in the beginning of school. Offer this after school so parents can attend! Schools can hold an Internet Safety Class in the beginning of school. Offer this after school so parents can attend! Have your students sign contracts to use the computer, explaining the rules in depth, with the consequences. Have your students sign contracts to use the computer, explaining the rules in depth, with the consequences. Supervise! When using computers, educators, parents, etc. should have a direct view of the computer. Supervise! When using computers, educators, parents, etc. should have a direct view of the computer. Ask questions. If you see a student acting suspiciously, ask questions and get involved. Ask questions. If you see a student acting suspiciously, ask questions and get involved.

8 Create a Contract! I will not give out personal information such as my address, telephone number, parents’ work address/telephone number, or the name and location of my school without my parents’ permission. I will not give out personal information such as my address, telephone number, parents’ work address/telephone number, or the name and location of my school without my parents’ permission. I will tell my parents right away if I come across any information that makes me feel uncomfortable. I will tell my parents right away if I come across any information that makes me feel uncomfortable. I will never agree to get together with someone I "meet" online without first checking with my parents. If my parents agree to the meeting, I will be sure that it is in a public place and bring my mother or father along. I will never agree to get together with someone I "meet" online without first checking with my parents. If my parents agree to the meeting, I will be sure that it is in a public place and bring my mother or father along. I will never send a person my picture or anything else without first checking with my parents. I will never send a person my picture or anything else without first checking with my parents. I will not respond to any messages that are mean or in any way make me feel uncomfortable. It is not my fault if I get a message like that. If I do I will tell my parents right away so that they can contact the online service. I will not respond to any messages that are mean or in any way make me feel uncomfortable. It is not my fault if I get a message like that. If I do I will tell my parents right away so that they can contact the online service. I will talk with my parents so that we can set up rules for going online. We will decide upon the time of day that I can be online, the length of time I can be online, and appropriate areas for me to visit. I will not access other areas or break these rules without their permission. I will talk with my parents so that we can set up rules for going online. We will decide upon the time of day that I can be online, the length of time I can be online, and appropriate areas for me to visit. I will not access other areas or break these rules without their permission. 1998 National Center for Missing and Exploited Children 1998 National Center for Missing and Exploited Children

9 Helpful Websites http://www.ou.edu/oupd/kidtool.htm#par ents http://www.ou.edu/oupd/kidtool.htm#par ents http://www.ou.edu/oupd/kidtool.htm#par ents http://www.ou.edu/oupd/kidtool.htm#par ents http://www.safekids.com/contract_kid.ht m http://www.safekids.com/contract_kid.ht m http://www.safekids.com/contract_kid.ht m http://www.safekids.com/contract_kid.ht m http://www.protectkids.org/solutions.htm http://www.protectkids.org/solutions.htm http://www.protectkids.org/solutions.htm http://www.microweb.com/pepsite/Softwa re/filters.html http://www.microweb.com/pepsite/Softwa re/filters.html http://www.microweb.com/pepsite/Softwa re/filters.html http://www.microweb.com/pepsite/Softwa re/filters.html http://www.getnetwise.org/tools/ http://www.getnetwise.org/tools/ http://www.getnetwise.org/tools/

10 Protect Yourselves and your students/children!


Download ppt "EDAD 660 Technological Issues: Presented by: Larissa Damm April 28, 2003."

Similar presentations


Ads by Google