Welcome to the Internet Security Seminar
|
|
- Madeline Anderson
- 7 years ago
- Views:
Transcription
1 Welcome to the Internet Security Seminar
2 How to be Safe on Social Networking Sites Teach your child to: Be as anonymous as possible Use privacy settings Think before they post Don t friend people you don t know Avoid in-person meetings Be honest about their age
3 Teach your child to: How to be Safe on Social Networking Sites Remember social networking sites are public spaces Avoid posting anything that could embarrass them later or expose them to danger Remember that people aren t always who they say they are Check comments regularly Avoid inappropriate content and behavior, and, if encountered, report it to the social networking site
4 How to be Safe on Social Networking Sites Parents should search social networking sites their teens visit to see what information they are posting. Make sure you are added to your teen s friend list so you can view their information and verify that their profiles are set to private (as they should be!). If you re uncertain whether your child has a profile, do a simple online search by typing your child s name into a search engine like Google, or into the search option of the site in question.
5 How to be Safe on Social Networking Sites "One of the most important questions to ask that teens really understand is: 'Are you willing to share this information in front of your school assembly? Have a discussion with them about what's appropriate and what's not. Look at their images and see if you think there's something that shouldn't be on the profile and then have them either remove it or let us know you're concerned and then we'll work with you." Hemanshu Nigam Chief Security Officer Fox Interactive Media and MySpace
6 Online Bullying Gone are the days when a child s home is a refuge from playground or neighborhood bullies. The Internet is the new playground, and there are no off-hours. Tech-savvy students are turning to cyberspace to harass their peers using a new method of bullying cyberbullying.
7 Online Bullying The popularity of instant messaging, , web pages, text messaging, and blogging means that kids are potential targets all day, every day. Victimization on the Internet through cyberbullying is increasing in frequency and scope. Electronic bullies can remain virtually anonymous.
8 Online Bullying Temporary accounts and pseudonyms in chat rooms, instant messaging programs, and other Internet venues can make it very difficult for adolescents to determine the identity of aggressors. Individuals now have the ability to hide behind some measure of anonymity when using their personal computer or cellular phone to bully another individual.
9 What is Cyberbullying? Cyberbullying is willful and repeated harm (i.e., harassing, humiliating, or threatening text or images) inflicted through the Internet, interactive technologies, or mobile phones. 43% of teens aged 13 to 17 report that they have experienced some sort of cyberbullying in the past year.
10 Cyberbullying Tactics Gossip: Posting or sending cruel gossip to damage a person s reputation and relationships with friends, family, and acquaintances Exclusion: Deliberately excluding someone from an online group Impersonation: Breaking into someone s or other online account and sending messages that will cause embarrassment or damage to the person s reputation and affect his or her relationship with others Harassment: Repeatedly posting or sending offensive, rude, and insulting messages
11 Cyberbullying Tactics Cyber stalking: Posting or sending unwanted or intimidating messages, which may include threats Flaming: Online fights where scornful and offensive messages are posted on websites, forums, or blogs Outing and Trickery: Tricking someone into revealing secrets or embarrassing information, which is then shared online Cyber threats: Remarks on the Internet threatening or implying violent behavior, displaying suicidal tendencies
12 Get the Discussion Started Information you can glean from your child s online use will help to ensure a safer online environment for your child. See Enough Is Enough s Rules N Tools SM Internet Safety Guidelines at:
13 Get the Discussion Started Ask your child: 1. Are your profiles set to private? 2. Would it be easy for someone to track you down? 3. How many online friends do you have? 4. What kind of information do you consider safe? Unsafe? 5. Have you posted anything that you wouldn t want your school assembly to see?
14 Ask your child: Get the Discussion Started 6. What messages do your pictures and postings portray? 7. Have you been contacted by a stranger? 8. Have your friends ever put themselves at risk? If so, what did you do about it? 9. Have you ever said/posted anything online you wish you could take back? 10. Has anyone ever hurt your feelings by anything they posted about you online?
15 Online Gaming Remember when games were played outside and Pac Man was considered high-tech? Today, it is difficult to distinguish the visuals in an online game from real life. Kids no longer need to go to the arcade to play video games against other kids.
16 Online Gaming The web allows children to play video games with friends around the block or strangers around the world. Kids and adults from all over the globe can now convene in cyberspace to compete in online martial arts matches or band together for a fantasy quest. But, as games become more realistic and playing partners can be anonymous strangers, several concerns have emerged of which parents should be aware.
17 Online Gaming What is online gaming? Children see the online gaming world as a virtual playground. Gaming consoles operate much in the same way as a computer children can log online, put on a headset, turn on a webcam, and talk to and play with any of the millions of gamers around the world. Many online games have associated online communities, making online games a form of social activity beyond single-player games.
18 Online Gaming "Online gaming devices are just like a computer and a lot of parents don't realize that. There are messaging, chat and IM features. Using an Xbox, you can receive messages from any of the major platforms. Even if you're in the game, somebody who has your game ID or screen name can send a text message to you and it will pop up on the screen and you can chat just like you do on a computer." Chad Gallagher, Child Exploitation Squad, FBI
19 How to Stay Safe on Gaming Sites Setting ground rules at home is essential, but remember, your kids can play games from a friend s computer as well as at an Internet café. To help protect your children at home, talk to them about the dangers of online gaming, be ready to listen if they seem upset about something that happened while they were on the computer, and encourage them to use wisdom when deciding what types of online games to play.
20 How to Stay Safe on Gaming Sites You can help keep your child s gaming experiences safe, age-appropriate, friendly, fun, and even educational by educating yourself about the gaming community, game ratings, and how to use the privacy and safety tools built into the games. Check out the safety features and parental controls offered by all the major gaming consoles including Xbox, Wii, and PlayStation.
21 How to Stay Safe on Gaming Sites Teach your child to: Use voice chat wisely Be aware of voice masking technology Use suitable screen names (gamertags) Be aware of cyberbullies (griefers)
22 As a parent: How to Stay Safe on Gaming Sites Use parental controls on all gaming devices Review games and ratings before buying Disallow webcam use while gaming Set time limits Know who your child is playing with Talk to your child about coming to you if anyone bullies them, asks them for inappropriate pictures or makes them feel uncomfortable
23 Protecting Kids on Mobile Devices The first step is realizing that all of the Internet's dangers are accessible in most mobile devices children use today. Enough Is Enough recommends that parents apply Rules 'N Tools across all Internet-enabled devices children use and talking with your mobile provider to select a set of mobile parental controls for your family. Set clear rules with your children regarding when they are allowed to talk, text and surf the Internet via their mobile device. Your child should only communicate with parent-approved contacts. Talk to your children about respecting others online. Your child should never text something to someone else that they would not say to them in real life. Communication should always be truthful, encouraging and helpful. If your child receives a threatening, mean or sexual message from someone they should come to you immediately. Advise your child never to share personal information through their mobile device including date of birth, address, full name etc.
24 Protecting Kids on Mobile Devices Talk to your children about never using vulgar or sexually explicit language through their mobile device. If anyone begins using vulgar or sexually explicit language that should talk to you and also block further communication. Talk to your children about privacy. Discuss with them how there is no such thing as privacy through their mobile device--and there are no "take-backs" with what they post, text, upload or send. Content your kids send through the Internet or their mobile device can be distributed across the world, without their permission or knowledge. Decide whether your children are allowed to post content to their social networking sites and other websites through their mobile device. Content posted should be parent-approved. If your child receives a text message from an unknown source, they should not reply. Your child should never let someone they don't know use their phone. Don't text while walking or driving.
25 Questions to ask your provider include: Choosing a Mobile Device Does this device connect with the Internet, and if so, how can Internet access be turned off or blocked? Can I limit my child from visiting certain sites through this mobile device? Do you provide filtering and monitoring solutions? If so, how can they be installed? How will I received reports regarding what my child has accessed? Does this device send and receive texts, s, photos, and video messages? If so, how can these features be turned off and/or monitored? Does this device include time limiting software to limit the length of calls and times of day calls are made and received? Can I limit the phone's address/contact list to a parent-approved list? Can this phone block individuals from sending content and texts to my child?
26 Mobile Statistics 20% of 16 year olds and 30% of 17 year olds have received a sext (a sexually implicit text) Pew Internet & American Life Project. "Teens and sexting: How and Why Minor Teens are Sending Sexually Suggestive Nude images Via Text Messaging." A pew Internet Guide to Teens, Mobile Phones and Social Media. M Communications Studies, Lehnart Amanda, December 2009 By 2015, Mobile adult content revenues are expected to reach $2.8 billion and mobile adult subscriptions will reach $1 billion. Juniper Research. "Videochat and Subscription services to drive mobile adult revenues to $2.8bn by 2015" October, % of teens use the internet Pew Internet & American Life Project, 2013 The Average Age for a Person's first Cell Phone is now 13 Pew Internet & American Life Project, in 10 teens text more than 100 times a day Pew Internet & American Life Project, % of teens believe sending and receiving sexts is very common at their age MTV-Associated Press, 2011
27 Mobile Statistics 65% of young adults (20-25) believed sending and receiving texts is very common at their age MTV-Associated Press, % of teen sexters sent texts to someone who the just met The National Campaign to Prevent Teen and Unplanned Pregnancy, % of teens have sent or posted nude or seminude photographs or videos of themselves. Gwenn Schurgin O'Keeffe, Kathleen Clarke-Pearson and COUNCIL ON COMMUNICATIONS AND MEDIA, March % of teenage cell phone owners use them for social media; 54% for text; and 24% for instant messaging. Gwenn Schurgin O'Keeffe, Kathleen Clarke-Pearson and COUNCIL ON COMMUNICATIONS AND MEDIA, March % of teens say it is common for sexually suggestive text messages to get shared with people other than the intended recipient. The National Campaign to Prevent Teen and Unplanned Pregnancy, 2008
28 Mobile Statistics 48% of teens say they have received a sexually suggestive message a (via text, or IM). The National Campaign to Prevent Teen and Unplanned Pregnancy, % of teens have sent or posted sexually suggestive s or text messages. The National Campaign to Prevent Teen and Unplanned Pregnancy, % of teens (12-17) own their own cell phone. Pew Internet & American Life Project. "How Do They Even Do That?" A Pew Internet Guide to Teens, Mobile phones and Social Media. M Communications Studies, Lenhart, Amanda. June 2010 Of teen device owners 27% go online via their cell phone and 19% go online via their portable gaming device. Ibid
29 Mobile Statistics Percentage of teen cell phone owners who use the following functions on their device: 88% text 83% take pictures 64% exchange pictures 60% play music 54% record videos 46% play games 32% exchange video 31% instant message 27% general Internet use 23% social networking sites 21% 11% purchase products through their mobile phone. Ibid
30 Sexting What it is? Cell phone users, often teens and "tweens", create and exchange provocative and nude, sexual images of themselves using their cell phone's built-in digital camera. When teens and tweens engage in this illicit activity, it can lead to serious repercussions. Police are currently investigating teens throughout the country for sending nude images of themselves, with consequences ranging from suspension to felony charges for the creation and distribution of child pornography. As a parent during the digital age, it can be difficult to enforce boundaries and stay on top of everything your kids are doing, but if you're footing the bill, it is well within your right to ask your children what they are doing and play your part to help protect them.
31 Mobile Statistics Percentage of teen cell phone owners who have experienced negative aspects: 54% received spam/unwanted texts 52% talking while driving 34% texting while driving 26% bullied or harassed 15% received a sext message 4% sent a sext. Ibid
32 Mobile Statistics People who send a sext, sent it to: 60% boyfriend/girlfriend 21% someone they had a crush on 19% ex-boyfriend or ex-girlfriend 14% best friend 18% friends other than best friend 11% someone they don t know 4% classmates 14% someone else Teen Online & Wireless Safety Survey: Cyberbullying, Sexting and Parental Controls. Cox Communications Teen Online and Wireless Safety Survey in Partnership with the National Center for Missing and Exploited Children, 2009.
33 Mobile Statistics People who received sexts, received them from: 75% received from boyfriend/girlfriend 49% someone they had a crush on 20% ex-boyfriend/ex-girlfriend 20% best friend 23% friends other than best friend 18% someone they don t know 13% someone else Teen Online & Wireless Safety Survey: Cyberbullying, Sexting and Parental Controls. Cox Communications Teen Online and Wireless Safety Survey in Partnership with the National Center for Missing and Exploited Children, 2009.
34 Mobile Statistics Why sext senders sent sext messages: 43% were asked 40% to have fun 21% to impress someone 18% to feel good about themselves 8% to try to date someone 4% as a joke 3% to make someone jealous 1% as a dare 29% some other reason Teen Online & Wireless Safety Survey: Cyberbullying, Sexting and Parental Controls. Cox Communications Teen Online and Wireless Safety Survey in Partnership with the National Center for Missing and Exploited Children, 2009.
35 Mobile Statistics Friends of sext senders report that: 30% say the photo was forwarded to someone they didn t want to see it 13% were made fun of by the person that they sent the photo to 12% accidentally sent the picture to the wrong person 10% say that the person their friend sent it to threatened to send it to somebody else 9% say that the photo was posted online where many people could see it 6% report that photo was forwarded to an authority figure and their got in trouble Teen Online & Wireless Safety Survey: Cyberbullying, Sexting and Parental Controls. Cox Communications Teen Online and Wireless Safety Survey in Partnership with the National Center for Missing and Exploited Children, 2009.
36 Mobile Statistics 86% of sexters are not caught. Of those caught, 9% were caught by a parent, 1% were caught by a teacher, 3% were caught by an authority figure, and 3% were caught by someone else. 23% of teens think sexting is fine as long as the people sending and receiving the sext think it s ok (3% don t think there is any problem with sexting.) 52% of teens agree with the statement: people my age are old enough to decide for themselves whether it is all right for them to send nude or sexually suggestive photos of themselves to other people 48% of teens agree that adults are overreacting when teens send sexually suggestive text messages and s to each other. Teen Online & Wireless Safety Survey: Cyberbullying, Sexting and Parental Controls. Cox Communications Teen Online and Wireless Safety Survey in Partnership with the National Center for Missing and Exploited Children, 2009.
37 Key Report Findings: *5 Tips to Help Parents Protect Kids from Sexting: Talk to your kids about what they are doing online and outline the risks. Talk to your kids about sex and relationships in the offline and online world. Make sure your kids understand that messages or pictures they send over the Internet or on their cell phones are not truly private or anonymous. Also make sure they know anyone can-- and often will--forward their pictures of messages to others. (Ask your daughter what her boyfriend will do with those pictures once they break up). And check up on what your kids are posting online. Know who your kids are communicating with online and via cell phones: Do your best to learn who your kids are spending time with online and on the phone by checking their IM buddy lists, social networking friends and mobile device address/contact list.
38 Key Report Findings: *5 Tips to Help Parents Protect Kids from Sexting: Consider placing limits on electronic communication. Check out the parental controls offered by your mobile provider. Many mobile carriers offer family plans that allow you to limit the amount and type of text messages your kids can send. Also disable attachments on text messages. Set expectations: Make sure you are clear with your teen about what you consider appropriate behavior online and through text. *Adapted from 'Tech Talk: Sexting', ConsumerReports.org, February 24, 2009 & "Sex & Tech", Five Tips to Help Parents Talk to Their Kids About Sex and Technology, National Campaign to Prevent Teen and Unplanned Pregnancy.
39 Resources I-Safe: Illinois Attorney General s Office: Enough is Enough:
40 Internet Safety Videos Enough is Enough:
Online Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
More informationCyberbullyNOT Student Guide to Cyberbullying
CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationDallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
More informationE-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
More informationAffirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
More informationTeen Online & Wireless Safety Survey
Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications kimberly.thomas@cox.com 404-269-8057 Cox Communications
More informationSarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
More informationReview VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:
#300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital
More informationSocial Networking Sites like Facebook, MSN
Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and
More informationEADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
More informationwww.xxxchurch.com Online Predators & Strangers
www.xxxchurch.com Online Predators & Strangers When children go online, they have direct access to their friends and family members, but they also may come into contact with complete strangers. Through
More informationthink before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities
More informationFireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]
1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.
More informationHEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
More informationGuideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
More informationInternet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
More informationChapter 3. Online Bullying
Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.
More informationInternet Safety. A guide to staying smart & safe online
Internet Safety A guide to staying smart & safe online What you will learn Privacy how to keep your information safe & secure Safety how to protect yourself & your family online It s not just about computers
More informationDigital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
More informationFIRBANK GRAMMAR SCHOOL
FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...
More informationCyberbullying: What Parents Can Do to Protect Their Children
Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,
More informationSCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?
SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers
More informationPredators will use information obtained from children to gain trust and friendship
1 We will be discussing several topics during this presentation, including online relationships, the importance of keeping personal information private, protecting your reputation, cyber bullying, and
More informationYouth Online Behavior
Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology
More informationInternet Safety Fact Sheet Facts about Social Networking:
Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting
More informationCyber Safety For Parents
Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting
More informationAppropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
More informationParent/Teen Cell Phone Survey 2009 Final Revised Topline 10/1/09 Data for June 26 September 24, 2009
Parent/Teen Cell Phone Survey 2009 Final Revised Topline 10/1/09 Data for June 26 September 24, 2009 Princeton Survey Research Associates International for the Pew Internet & American Life Project Sample:
More informationStaying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
More informationOffice of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices
Office of the Attorney General of Virginia Sexting Protecting Yourself on the Internet and Mobile Devices Websites Often Used for Social Networking Monthly Visitors to Social Networking Sites 1. 750,000,000
More informationCurrent Internet Facts
Current Internet Facts Facts about Online Predators and Strangers online: Twenty-eight percent of tweens (ages 8 to 12) have been contacted over the Internet by someone they don t know (COX Tween Internet
More informationBack Cover. Copyright 2006 and 2009 National Center for Missing & Exploited Children. All rights reserved.
1 2 3 4 5 7 8 9 10 12 Back Cover Where Do Kids Connect? Browsing the Internet Using E-mail Instant Messaging Social Networking Cellular Telephones/ Wireless Devices and Texting Posting Videos and Photographs
More informationE-Safety Awareness. Parents and Carers
E-Safety Awareness Parents and Carers Bullying online by people in my school year has left me with significant mental health issues for which I am now on medication and in therapy for. So it s really damaged
More informationWisconsin Anti-Bullying Center
Patrick Evans, M.S. CESA 7 - Project Management Consultant Green Bay, Wisconsin Certified Trainer Wisconsin Emergency Management Multi-Hazard Emergency Planning for Schools Writer, Editor, Contributor,
More informationWebsite. cybersafekids.com.au WELCOME TO CYBERIA. Queensland University of Technology. 2007. really doing online?
WELCOME TO CYBERIA ONLINE WORLD OF DIGITAL NATIVE Website Robyn Treyvaud robynt@cse.edu.au cybersafekids.com.au CURRENT BOOKMARKS http://del.icio.us/rtreyvaud Queensland University of Technology. 2007
More informationBullying 101: Guide for Middle and High School Students
Bullying 101: Guide for Middle and High School Students A guide to the basics of bullying, what it is and isn t, the role of students, and tips on what you can do. 952.838.9000 PACERTeensAgainstBullying.org
More informationSOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
More informationCyber safety Parent Easy Guide 63
Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed
More informationToday s teens use technology more than ever. Most have
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
More informationPARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com
PARENTING IN THE DIGITAL AGE Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com Teens and Technology Use 78% have a cell phone 95% use the Internet 91% have an email address 74% access the
More informationBack Cover. Copyright 2006, 2009, and 2011 National Center for Missing & Exploited Children. All rights reserved.
1 2 3 5 6 7 8 9 10 12 Back Cover Where Do Kids Connect? Browsing the Internet Social Networking Using E-Mail Instant Messaging Cell Phones/ Wireless Devices and Texting Posting Videos and Photos Online
More informationCyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction
Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual
More informationNational Cybersecurity Awareness Campaign Families Presentation
National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security
More informationOnly talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
More informationSocial Media Guidelines Resource
Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding
More informationA Time to Tell Troop Meeting Guide
A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as
More informationCyberbullying. How common is cyberbullying?
Cyberbullying Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as:
More informationONLINE SAFETY TEACHER S GUIDE:
TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.
More informationeffects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor
Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences
More informationHOW TO STAY SAFE. Smartphones
HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these
More informationBy Augusta Epuli Anjoh April 2013 Cyber security forum 2013
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary
More informationWho's chatting to your kids?
N A U S T R ALIA Contact details and further information Who's chatting to your kids? A m u s t r e a d f o r p a r e n t s w i t h i n t e r n e t a c c e s s Life threatening emergencies telephone 000
More informationNortheast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY
Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have
More informationUNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really
More informationSocial Networking Sites A Predator s Playground?
Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every
More informationInternet Safety Guidelines
Internet Safety Guidelines Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or search for an Internet safety pledge you like. The pledge can
More informationTAVISTOCK COLLEGE POLICIES & PROCEDURES
TAVISTOCK COLLEGE POLICIES & PROCEDURES TITLE: ANTI CYBER BULYING POLICY MODEL POLICY STATEMENT This is not a Local Authority model policy Local changes have / have not been made to the model policy by
More informationTen Tips for Parents. To Help Their Children Avoid Teen Pregnancy
Ten Tips for Parents To Help Their Children Avoid Teen Pregnancy Ten Tips for Parents To Help Their Children Avoid Teen Pregnancy The National Campaign to Prevent Teen Pregnancy has reviewed research
More informationCYBERBULLYING TEACHER S GUIDE:
TEACHER S GUIDE: CYBERBULLYING LEARNING OBJECTIVES Students will understand the meaning of cyberbully. Students will learn to recognize different forms of cyberbullying. Students will learn different strategies
More informationCyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )
Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.
More informationDigital Citizenship: Etiquette. My Online code & Breaking Down Hate Speech Grades 9-12
Digital Citizenship: Etiquette My Online code & Breaking Down Hate Speech Grades 9-12 Essential Question: What does it mean to do the right thing online? How can you create a community culture in which
More informationOverexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12
Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Essential Question: What are the risks and responsibilities when you share online in a relationship? How can you respect
More informationInternet Safety Kit. A wake-up call for safer surfing online for the young people in your life.
Internet Safety Kit A wake-up call for safer surfing online for the young people in your life. From the Polly Klaas Foundation Includes free download of Wired With Wisdom, an Internet safety program for
More informationEmpowering young people to be safe on the Internet. Information for parents, teachers and community members
Empowering young people to be safe on the Internet Information for parents, teachers and community members Empowering parents, teachers, & community members!! IBM is providing the following information
More informationFAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
More informationNational Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
More informationRELATIONSHIP REDUX: Tips and Scripts for Talking to Your Kids About Relationships. By Bill Albert and Jessica Sheets
RELATIONSHIP REDUX: Tips and Scripts for Talking to Your Kids About Relationships By Bill Albert and Jessica Sheets BEFORE WE GET STARTED The teen years are a time of exploration, discovery, learning,
More informationParents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.
Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications
More informationGuidelines for Preventing and Dealing with Bullying Issues
Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.
More informationGirls & Cyber- bullying
MARC Research Results First Report March, 2010 Girls & Cyber- bullying Elizabeth K. Englander, Ph.D. Director, Massachusetts Aggression Reduction Center Bridgewater State University Bridgewater, Massachusetts
More informationCyber-bullying. Cyber-bullying: A Digital Epidemic White Paper
Cyber-bullying Cyber-bullying: A Digital Epidemic White Paper What is Cyber-bullying? The past two decades have witnessed a virtual explosion in new technology that has been eagerly embraced by adolescents
More informationLessons for Teens: Risky Internet and Social Networking
Lesson Plan # 4 Online/Electronic Lure Presenter Overview: Most teens regularly and safely interact online with people they don t know via social networking, media and gaming sites. Although news organizations
More informationFinchley Catholic High School. Anti Bullying Policy
Finchley Catholic High School Anti Bullying Policy Bullying can occur through many types of anti-social behaviour: Physical A student can be physically punched, kicked, hit, spat at etc Verbal This can
More informationClass 2: Manage Your Digital Footprint. Student Handbook
Class 2: Manage Your Digital Footprint Student Handbook I Know/I Want to Know/I learned I know I want to know I learned How to keep personal information private online. Give Examples: How to keep personal
More informationEducator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty
Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty Nancy Willard, M.S., J.D., Director Center for Safe and Responsible Internet Use URL: http://cyberbully.org or http://csriu.org
More informationAuthorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using
More informatione-rate toolkit Cyberbullying: Crossing the Line
e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview
More informationE-safety: Protecting your child online. Information for parents
E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools
More informationLt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain
More informationAcceptable Use Policy Holy Spirit Catholic School
Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,
More informationSafety Tips for Social Networking
Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and
More informationParent Guide to Cyber bullying and Cyber threats
School Address: 4450 S Mendenhall Rd Memphis, TN 38141 Tel: (901) 367 7814 Fax: (901) 367 7816 www.sememphis.org MEMPHIS SCHOOL OF EXCELLENCE Parent Guide to Cyber bullying and Cyber threats Young people
More informationThis document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National
More informationInternet Safety Guide for Parents
Internet Safety Guide for Parents How to Talk to Your Kids about Staying Safe Online Presented by Keith Dunn http://www.kdcop.com Page 1 Now I know each and every single one of you is extremely busy. Both
More informationOnline Safety How to Protect Yourself and Your Family
Online Safety How to Protect Yourself and Your Family Introduction Surfing the internet can be a very positive experience, it opens up a world of possibilities for everyone, expanding our horizons by exposing
More informationONLINE PREDATORS & PREDATORS
the myths and realities of ONLINE PREDATORS & PREDATORS Center For Child Advocacy Sixth Annual National Conference Crimes Against Children: The Multiple Faces of Child Victimization Joseph Hanley B.A.
More information2010 Middle School Internet Safety Survey Results
When you are online, people can say whatever they want. ~ 8th Grader A friend pressured me to tell her my password. ~ 5th Grader Plainview Old Bethpage Central School District 21 Middle School Internet
More informationCyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
More informationC-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
More informationProtect Your Privacy Online
Protect Your Privacy Online By Kathiann M. Kowalski Keep personal information private for your own good! High school sophomore Karra H. never expected to see herself on a Web site featuring scantily clad
More informationCYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito
CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites Mahwah Police Department Police Officer Rosario Zito What is IM? Yahoo! Messenger America Online Instant Messenger (AIM)
More informationHelping to keep your children safe online
Helping to keep your children safe online Chat speak how many of these do you know? gr8 BRB DEGT LMIRL POS KPC P911 PAL PAW PIR Adults often have anxieties about new media Everything that s already in
More informationHow Can Parents Keep Teens Safe from Online Sexual Exploitation?
protectchildren.ca How Can Parents Keep Teens Safe from Online Sexual Exploitation? The Internet and new technologies have become central to teens lives. While these technologies offer a variety of benefits
More informationUNSUPERVISED AND ONLINE
UNSUPERVISED AND ONLINE Effective Identification of Negative Online Behavior and Strategies for Creating a Family Prevention Plan Follow us on: Contact us at: notmykid.org info@notmykid.org 602.652.0163
More informationSocial Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA)
Social Network Security Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) How Do We Communicate Today? I can write you a letter by snail mail. I can write you a letter
More informationA guide to cyberbullying GET WITH IT! understanding and identifying cyberbullying to help protect your children. A joint initiative by:
A guide to cyberbullying GET WITH IT! understanding and identifying cyberbullying to help protect your children A joint initiative by: 30-01 11/08 (50,000) Brunswick Press Ltd. (21848) CONTENTS PAGE 1.
More informationFIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY. www.cheezo.org 303-271-6766
FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY www.cheezo.org 303-271-6766 A Message from District Attorney Peter Weir One of the priorities of the District Attorney s Office
More informationA Publication of the GCPS Information Management Division
GCPS A Publication of the GCPS Information Management Division Gwinnett County Public Schools is committed to providing information related to student technology use in a manner that is clear, concise,
More information