1 / 35

Internet Safety

Internet Safety. Summit Hill School District 161. Digital Citizenship. A digital citizen is “someone who is able to think critically about the ethical opportunities and challenges of the ‘digital world’ and make safe, respectful, and responsible choices” (Common Sense Media, 2010).

rachel
Download Presentation

Internet Safety

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet Safety Summit Hill School District 161

  2. DigitalCitizenship • A digital citizen is “someone who is able to think critically about the ethical opportunities and challenges of the ‘digital world’ and make safe, respectful, and responsible choices” (Common Sense Media, 2010).

  3. Attributes of a Good Digital Citizen • Respect others (doesn’t respond to or post negative comments) • Doesn’t steal (if you wouldn’t steal from a store, why steal music, movies, videos) • Accepts personal responsibility (cell phones and Internet)

  4. “P” • Many tips for surfing the Internet safely start with the letter “P.” Students should know that anything posted online is both public and permanent, which is why it is important to think before you post.

  5. “P” Surfing Tips • Public • Permanent • Personal • Private • Password Protection • Privacy Settings • Permission

  6. Definitions • Instant Messaging: Real time communication; one on one. • Blogs: Websites kids create to share information about themselves. Popular blog sites are Facebook, My Space, Xanga and TagWorld • Chat Rooms: Real time communication; amongst a group of people in a chat room (Including chat options on websites such as Webkinz and Club Penguin)

  7. Instant Messaging • Who may your kids accept IM’s from? • What should they do if a stranger IM’s them? • Do they have to ask you before adding someone to their buddy list? • Who may your kids include on their buddy list? • May they use IM while doing homework?

  8. Blogs • Make sure your kids know that they should: - Never post any personal information - Set their page to private - Be careful about which photos they post • Are you OK with this form of communication? • Will you read your kid’s blog?

  9. Chat Rooms • Ask your kids if they visit chat rooms. If so visit with them. • Are you comfortable with this form of communication? • Are they allowed to chat with people they’ve met online? • What should they do if someone they don’t know suggests a private chat? • Do they have a personal profile?

  10. Content • Students also need to be aware of what information they are posting and how they are representing themselves online. • Limit the amount of personal information • Profiles, screen names, and email addresses • In texts, photos and video • Appropriate Self-Representation

  11. Web Acronyms • ASL Age, Sex, Location • BRB Be Right Back • F2F Face to Face • IRL In Real Life • LOL Laughing out loud • POS Parent Over Shoulder • WTGP Want to go Private?

  12. Dangerous websites: • 1. Entice you to make an unwise purchase • 2. Attempt to steal your personal information • a. Credit card numbers • b. Social security numbers • c. Bank account numbers • 3. Contain illegal or immoral content • 4. Try to get your email address to send unwanted email later

  13. SPYWARE One of the most commonly used devices cybercriminals use to steal information is software known as “spyware.” Secretly residing in your computer, some versions of spyware copy your keystrokes and then send this information to the cybercriminal. So when you type in passwords, usernames, bank account numbers and so on, the information is passed on to a person who can then access your various Internet accounts using the data they’ve stolen. Many people have had their identities pilfered by criminals who use spyware.

  14. Identity Theft Identity theft is a major problem. In a recent year, 15 million people were victims of this crime and losses in the United States alone were estimated at more than 56 billion dollars. Identity theft victims may spend many months trying to straighten out the mess left by criminals who may clean out their bank accounts, run up massive charges on their credit cards and wreak other kinds of havoc with their ill-gotten information. The best way to foil cybercriminals who use spyware is to install an anti-spyware program on your computer. There are many such programs commercially available. Some Internet providers offer spyware for free.

  15. Social Networking Sites Social network sites are popular, used by millions daily 1. Keep track of friends 2. Make plans 3. Share thoughts 4. Make new friends

  16. What is Cyberbullying? • When a child, preteen or teen is tormented, harassed, humiliated, embarrassed or otherwise targeted by any other person using the Internet or other digital communication technology

  17. Bullying School Direct (F2F) Limited Audience Cyberbullying Anywhere/Anytime Anonymous Larger Audience More Kids Involved Spreads Quickly Victim NOT Participant Permanent Record What’s the Difference?

  18. The Reality • 20.8% of kids have been bullied while online • 14.3% have received mean or hurtful comments • 13.3% have had rumors spread about them online • 8.4% have been threatened over text • 6.7% have had stolen passwords/someone impersonate them • 5.0% had a mean or hurtful picture posted • Blog (Bash Boarding) • Create Web sites • Send Pictures • Send spyware and/or hack programs Cyberbullying Victimization, Random sample of 10-18 year-olds from large school districts in Southern U.S.,Cyberbullying Research Center, 2010, Hinduja, S. and Patching, J.W.

  19. Cyberbullies: Definition of cyberbully: a person who harasses or creates hurtful communication in one or more ways: 1. On blogs 2. On website guest books 3. On I-M postings 4. In emails 5. On cell phone messages

  20. Cyberbully messages can have unintended consequences: 1. Suicide 2. Serious assault 3. Murder 4. School expulsion

  21. Exploitation • Who are kids and teens talking to online? • Predators: Strangers • One in seven U.S. teenagers who regularly log on to the Internet say they havereceived an unwanted sexual solicitation via the Web. • Cyber Stalking/Cyberbullying: “Frenemies” • 21% of students surveyed felt uncomfortable with an online conversation or text. Cyber Safety Survey: The Results, Office of the Illinois Attorney General, 2009

  22. Safe Posting Tips:What to Post • Use nickname only • Change the zip code • Use cartoons, drawings or avatars • Make profile private • Ask permission to add a friend

  23. Safe Posting Tips:What to Block • First and last names • Home telephone number • Cell phone number • Street address • Hometown/city of residence • Name of school • Name of favorite playground or park • Date of birth • Credit card numbers • Images that identify you, your school or your hometown

  24. Cell Phone Usage • 75% of all teens (12-17) have a cell phone • 58% of 12-year-olds have a cell phone • 66% text message • 1/2 teens (50+ texts daily/1,500 monthly) • 1/3 teens (100+ texts daily/3,000 monthly) • Girls 14-17 (100+ daily… MOST) Teens and Sexting, Pew Internet & American Life Project, 2009, Amanda Lenhart

  25. Possible warning signs of children being bullied or bullying others. Complaining that other children or a group of children do not like them. Preoccupation with friendship concerns. Poor self-esteem. Feeling they are not as good as others. Not wanting to go to school or other activities. Spending a great deal of time on the computer. Being secretive about online activities.  NYS Division of Criminal Justice Services – Missing & Exploited Children Clearinghouse 25

  26. Lacking interest and involvement with other kids. Acting like their group (clique) is superior. Bragging that they use the Internet to play practical jokes or steal other kids’ passwords as a joke. Continuing to make fun of other kids. Getting in trouble at school or in the community for inappropriate computer use. Adapted from Powertolearn.com  NYS Division of Criminal Justice Services – Missing & Exploited Children Clearinghouse 26

  27. Dealing with Cyberbullying Preserve evidence – this is crucial for identifying the bully and making a case. Attempt to enlist assistance from the service provider. If able to identify the bully, contact him or her and/or parents. Use available blocking technology (i.e., block the user on IM, email and chat.) In serious cases, seek assistance from the police (i.e., threats of physical harm, unrelenting or unable to stop.)  NYS Division of Criminal Justice Services – Missing & Exploited Children Clearinghouse 27

  28. So… What Should Parents Do?  NYS Division of Criminal Justice Services – Missing & Exploited Children Clearinghouse 28

  29. Learn everything you can about computers, the Internet and related technology - Develop and maintain proficiency through use. Ask children to demonstrate. Communicate with your children. Take time to discuss concerns; agree on ground rules. Understand their needs. Set reasonable expectations. Place the computer in a “well-trafficked” area, not a child’s bedroom or a secluded area.  NYS Division of Criminal Justice Services – Missing & Exploited Children Clearinghouse 29

  30. Ensure that they do not divulge detailed personal information when completing “profiles” and minimize dissemination. Keep ALL accounts in your name. Know your child’s password(s) and screen name(s). Ensure that screen names do not provide information about his or her identity (e.g., Sarahsweet16.)  NYS Division of Criminal Justice Services – Missing & Exploited Children Clearinghouse 30

  31. Consider Use of Computer/Internet Management Software: Age-based access levels – Allows for various levels of access for different family members. Filtering and Blocking (incoming and outgoing.) Time Restrictions. Activity Logs - Parents can view logs that list web sites visited, web sites blocked, chat sessions… Software can even capture screen shots and email messages to you if a rule is violated!  NYS Division of Criminal Justice Services – Missing & Exploited Children Clearinghouse 31

  32. Periodically review Internet bookmarks, history files, temporary Internet files and keyword searches. Also … what can it mean if history, keyword or temporary Internet files are cleared?  NYS Division of Criminal Justice Services – Missing & Exploited Children Clearinghouse 32

  33. Set Parental Controls  NYS Division of Criminal Justice Services – Missing & Exploited Children Clearinghouse 33

  34. Warning signs. Elevate concern if your child: • Significantly increases on-line time. • Receives phone calls, email, mail or packages from someone you don't know. • Quickly exits IM, chat, email, websites and other activities when you are near. • Increases use of new slang words, inappropriate sexual knowledge, withdraws from family and friends. • Begins using new screen names, an online account belonging to someone else, etc. • Is reluctant to discuss activities or your concerns.  NYS Division of Criminal Justice Services – Missing & Exploited Children Clearinghouse 34

  35. Resources • Office of the Illinois Attorney General: Cyberbullying Web Site • www.ebully411.com “58% of kids admit someone has said mean or hurtful things to them…. Online– more than 40% say it happened more than once.

More Related