1 / 20

CYBERSAFE – PARENTING ONLINE

CYBERSAFE – PARENTING ONLINE. CYBERBULLYING. DEFINITION: intended, deliberate, repeated, virtual hostile behaviour with the usage of ICT FORMS: Denigration distributing false information / pictures of someone via the Internet Outing and trickery

austin
Download Presentation

CYBERSAFE – PARENTING ONLINE

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CYBERSAFE – PARENTING ONLINE

  2. CYBERBULLYING DEFINITION: intended, deliberate, repeated, virtual hostile behaviour with the usage of ICT FORMS: Denigration distributing false information/picturesof someone via the Internet • Outingand trickery • sharing someone’s secrets or embarrassing information • or tricking someone to share their secrets and then • distribute them through the web

  3. CYBERBULLYING • Flaming • online aggressive fights with threats and vulgar language • Trolling • posting provocative comments on Internet forums • Harassment • repeatedly sending someone threatening, vulgar, provocative emails or posts on discussion forums

  4. ONLINE GROOMING An adult establishing contact with a child with intent to commit a sexual offence to the child The relationship starts on websites/communicators, where the adult pretends to be one of the young

  5. CYBER STALKING An assault on a person which takes the form of: • Locating and tracing • Harassment • Isolating from family/friends • Scaring

  6. Compromising the inbox • Stealingpersonalinformation • Impersonation • Committingonlinecrimes • IDENTITY THEFT

  7. EATING DISORDERS SITES http://www.sheeplive.eu/ • PORNOGRAPHY

  8. WHY DO KIDS FALL PREY TO CYBERCRIME? • Anonymity of the Internet • - one can be what/who they want, • - no necessity to present one’s real identity • to enter discussion forums/chats • The situation is favourable for bullies • as well as potential victims

  9. WHY DO KIDS FALL PREY TO CYBERSPACE PERILS? • Fast distribution of any data uploaded on the Internet. • Info onlinecan be copied into an unlimited • number of accounts, which means it cannot be • deleted from the Internet. • Unwanted data deleted from one website immediately • appears on others

  10. WHY DO KIDS FALL PREY TO CYBERSPACE PERILS? • Omnipresence of the Internet • - common accessto information/data • - exposure to cyberbullying at any time • and any place • Children and teenagers themselves tend • to hide certain facts from parents • Instead of trusting the adults (teachers, parents) • children carry their burden to glorify the bully

  11. PARENTAL ROLE • Assist your child online • Share the online experience • Be interested/involved so kids can come to you • if problems occur • Talk to your child about possible dangers • and assure them of your support. • Set the safety rules: • (what to do/what not to do online)

  12. INSTALL ONLINE SECURITY SOFTWARE • Install online security software: • -anti-malware (to prevent a computer hoaxes) • -anti-spyware (to keep privacy) • -anti-phishing soft (to safeguard against identity theft or e-robbery, etc.) • -antivirus soft (prevents, detect, removes viruses, trojans, and worms) • -firewall (protect LAN – local area network/computer from intrusion)

  13. WARNING SIGNS Your child: • becomes moody and sad (especially, after surfing the Internet or receiving a text messageon their mobile) • avoids school and social life • gets lower marks

  14. DOS AND DON’TS • Don’t upload anything that might be used against you • (pictures, news, information) • Don’t flame back. An ignored bully will stop • Do as you would be done by. Respect others • Immediately leave pages containing any improper, • vulgar, aggressive data

  15. DOS AND DON’TS • Don’t share with strangers your email address, • telephone number or any other personal information • Do not meet strangers. Ignore and block people • whoinsist on meeting you in real life

  16. DOS AND DON’TS • Keep evidence • - SMSs, MMSs, phone call history • - discussion forum or chat activity • - print screens of pages containing a form of bullying • Don’t visit web pages which are not proper for your age

  17. HELP • http://www.helpline.org.pl/ • www.kidprotect.pl • www.dyzurnet.pl • http://dyzurnet.pl/zglos_nielegalne_tresci.html • www.klub-sofa.cba.pl

  18. HELP The police The Virtual Global Taskforce • http://www.virtualglobaltaskforce.com/contactus/vgt/ • http://www.cybersmart.gov.au/ • http://www.stopcyberbullying.org • https://www.iwf.org.uk/ • http://www.ispa.org.uk/

  19. RESOURCES • http://familyinternet.about.com • http://www.olweus.org/ • http://www.fkbko.co.uk/ • http://www.sheeplive.eu/ • http://kidprotect.pl/ • http://fdn.pl/ • http://ezg.info.pl/strefaezg/43-ngo/221-klub-sofa

  20. THANK YOU!

More Related