600 likes | 995 Views
INTERNET SAFETY A Westport Public Schools Workshop for Parents
E N D
INTERNET SAFETY A Westport Public Schools Workshop for Parents Natalie Carrignan, Director of Instructional TechnologyBill Derry,Coordinator of Information & Technology LiteracyBarbara Fischetti,Coordinator of Psychological ServicesJonathan Crosby/Jonathan Gryak,Operations Manager/Senior Network Engineer Staples High School – Computer Lab January 22. 20099:00-10:00 and 12:00-2:00 and 7:00-9:00 January 27, 20099:00-11:00 12:00-2:00 and 7:00-9:00
INTERNET SAFETY What brings you here today?
POWER OF STORIES NetSmartZ “Real-Life Stories”
Internet Safety Issues • Cyber Citizenship • Cyberbullying • Online Personal Safety • Predator Identification • Cyber Security • Intellectual Property
Where to Begin In any community (on or off-line) there are: • Dangerous • Unlawful • Inappropriate things Our goal needs to be to teach children how to avoid these bad things and not the community itself http://www.netsmartzkids.org/uyn/knowtherules.htm
Kids need to know that others want to influence their thinking Some sites prey on teen issues • Suicide • Hate • Eating disorders • (Showed example in workshop) Some take advantage of kids natural mistakes • Pharming • Typo Squatting
And . . . Other sites make themselves easily accessible or invite themselves in via pop-ups • Gambling • Pornography Kids need to know how to escape • Don’t click on the X • Control-W for windows • Command-W for macs
There are four kinds of cyberbullies… • Inadvertent Cyberbullies (didn’t mean to cyberbully anyone, reacted in anger or was misunderstood) • Vengeful Angels (wanting to right wrongs) • Mean Girls(doing it for entertainment, usually in groups. Not always girls.) • Power-Hungry or “Revenge of the Nerds”(traditional schoolyard bullying mentality, doing it for power…the ironic twist is that offline victims often become online bullies) Parry Aftab wired kids.org
A short video clip on Cyberbullying Is it serious or is it“kids’ stuff?” NetSmartZ “Real-Life Stories” Parry Aftab wired kids.org
“Let me count the ways…they cyberbully each other?” • Any interactive technology: cell phones, text messaging devices, IMs, interactive games, Internet, photo phones, iPods and PDAs • Any interactive sites: Websites, blogs, social networking sites, guestbooks, porn posts, wikis, profiles, directories, e-mail, SPAM • Any new technology can be abused • This is limited only by the technology they possess and their limitless imaginations Parry Aftab wired kids.org
Cyberbulling and Cyberthreats • Harassment • Cyberstalking • Denigration • Exclusion • Impersonation • Flaming • Outing (revealing secrets) • Trickery Educators Guide To Cyberbullying Cyberbullying:How to Deal with Hi-Tech Harrrassment - FEB. 2008 Parents Often are Unaware of Cyberbulling NYT. OCT 2008
The Impact • No escape -- 24/7 • Distributed world wide and often irretrievable • Can be anonymous and can solicit involvement of unknown friends • Reluctant to tell due to fear of restrictions
Consider the following: • Better to ERR on the side of caution! • The emotional response of your child • The kind of threat • The frequency of the threats • The source of the threats • The nature of the threats Parry Aftab wired kids.org
ImmediateAction Steps 1. Save the evidence 2. Identify the cyberbully 3. Possible Actions Tell the cyberbully to stop Ignore the cyberbully-help your child File a complaint with Service Provider Contact your school Contact the Cyberbully’s Parents Contact the Police Contact an Attorney
Additional ACTION STEPS • Talk to your child. • Evaluate quality of online community. • Know when to leave. • Have your child do a self-assessment of behavior. • Know how to respond to harmful communications. • Teach your child how to get assistance. From The Center for Safe and Responsible Internet Use
Social Networking Sites Facebook Myspace Many others Chat Rooms Instant Messaging Blogs/Wikis Virtual Worlds Webkinzs Club Penguin/Toontown Teen Second Life Second Life Video Sites Game Stations Shopping On-line Includes
Safe Practices • Choose your screen name carefully • Choose your opening picture carefully • Know what is public and what is private • Test it out • Be honest about your age, there are different protections in place for different ages • Know who you are talking to • Know how to use the sites protective features
Never Reveal • Full Name • Address • School • Phone number • Family and friends names • Age/Birthdate • Social Security number
FaceBook • FaceBook Settings
MySpace activities • MySpace Video for Parents • MySpace Tutorial for Parents
There are many more sites less tame than Facebook and MySpace • (Sites provided in workshop) We need to encourage kids to think before they post http://www.nsteens.org/videos/social-networking/ http://www.nsteens.org/videos/offline-consequences/
MANY INSTANT MESSAGING SERVICES: Universal Messenger with Parental Controls AIM G-CHAT MEEBO MSN Messenger SKYPE YAHOO! Messenger MANY, MANY MORE! ICQ information from wiredkids.org
Sample Chat Room from MySpace There are no alerts when someone is reading your chat!
Personal Information: Sarah’s Story about Cyberbullying: http://www.youtube.com/watch?v=r5NMDXAPUpw
Internet Safety in Virtual Worlds Quest Atlantis
Predator Identification
Types of Predators • Marketing • Hiring teens to infiltrate chat rooms • Devising games or environments that promote their product seamlessly • Pop-up Ads • Phishing • Making you believe you are at risk • Sexual Predators
Striking the Right Balance • Conflicting viewpoints • Reality is most kids know that they are meeting an adult • We need to talk at an early age about the possibilities but be realistic with who falls prey the most • We need to help ALL kids understand the grooming process http://www.webwisekids.org/index.asp?page=Katie_parents
The Grooming Process • Identify Similar Interests • Gains child’s trustby always taking their side • Keeps child’s secretsand asks the child to keep their secrets • May slowly introduce them to inappropriate things and tell them it is OK • Become the child’s new best friend • Isolates the child from any other friends • Presents themselves as the best person in that child’s life
Security Threats • Malware (Malicious Software) • Viruses, worms, Trojans, spyware, root kits, keyloggers, ransomware • Passed through downloads, email attachments, web browsing • Computer Hackers • Spam/Spim • Extra volume can be due to giving information to websites or responding to a message • Delivery mechanism for malware and phishing scams http://www.netsmartzkids.org/uyn/virusrap.htm
Steps to Take to Protect Yourself • Use a firewall • Set your computer settings properly including auto-updates • Use anti-virus and anti-spyware software and update it regularly • Use strong passwords and change them frequently • Beware of FREE download sites • Don’t respond to spam messages • DO NOT forward messages to all of your friends • (10 Common Questions about Internet Safety- created by iKeepSafe and Symantec)
What about Web Filters? • Filtering and Blocking Software • Whitelist/Blacklist • Categories • Reviews • Use the settings in your operating system • Cautions • False Sense of Security • Over Blocking • Embedded Chat Rooms/Forums • Filtering does not follow you from computer to computer
The Schools’ Part • Comply with the Children Internet Protection Act (CIPA) • Have firewall, auto-updates, and anti-virus software in place • Caution: May be viewed as “in school practice” and may not be transferred to the real world or virtual world.