Enter Your Child's Cyber World

Enter Your Child's Cyber World

Enter Your Childs Cyber World Internet Safety Our thanks to: James Baird, CISSP with GBI Osborne Middle School Technology Team Enter Your Childs Cyber World

Enter Your Childs Cyber World LOL = Laughing Out Loud F2T = Free To Talk LV = Leave H8 = Hate WAN2 = Want to? POS = Parent Over Shoulder PAW = Parents Are Watching WTGP = Want To Go Private WYGOWM = Will You Go Out With Me? http://www.acronymfinder.com

See Packet Characteristics of Some Youth May Facilitate Victimization Lack of emotional maturity Strong desire for attention, validation, and affection Naturally curious about sex, forbidden topics May be rebellious and enjoy defying authority Easily impressed, manipulated and intimidated

Youth lacking adult supervision Students Basic Online Behavior 80% of students spend at least one hour per week on the Internet 11% of students spend over 8 hours per week on the Internet 12% of students say they spend more time on the Internet than with friends 30% of students say e-mail, chat rooms, or Instant Messaging is the main way they stay in contact with their friends

38% of students feel more free to do what they want on the Internet 31% of students say it is easier to talk with people on the Internet than in real life 29% of students use chat rooms, with a peak usage of 45% occurring in grade 7 Based on i-SAFE America surveys of 19,000 students The Parent-Child Gap PARENTS vs.

YOUTH 92% stated they had established rules for the childs Internet use. vs. 35% said that they did not have rules for Internet usage. 54% acknowledged that there was a need for more rules.

54% feel they are limited to monitor and shelter children from inappropriate material on the Internet. vs. 53% stated that they would prefer to be alone when surfing the Internet. 90% feel they have a good idea of what their child does while on the Internet.

vs. 14% stated their parents had no idea where they go and 34% said they do not share what they do or where they go on the Internet with parents. 11% said their childs computer was in the childs room. 75% said it is in the family area. vs.

21.5% of the students said that the computer they use most often is in their room. This goes up with age, 26% for 8th grade and 31% for 12th grade. 46% feel they have more freedom on the Internet than in the real world. vs.

37% felt they have more freedom and, 18% felt safer on the Internet than in the real world. When asked why? 52% cited anonymity & 29% mentioned lack of laws/rules. *Taken from an i-SAFE America survey of students nationwide. Promises Internet Predator Profile Typically married adult with children

Normal neighbor Usually has a successful career in an upper-management position College graduate, possibly post-graduate degree Upper, middle-class lifestyle Usually 35 or older Usually white Will offend again Students Risky Online Behavior 55% of students admit giving their personal information

(name, sex, age, etc.) over the Internet 52% of students prefer to be alone while on the Internet 40% of students have visited inappropriate places on the Internet 10% of students feel it is okay to post their picture on the Internet 10% of students have met someone face-to-face that they previously met on the Internet 25% of students believe there is nothing wrong with chatting to strangers online 21% of students say after getting to know someone better on the Internet, they would believe them when they tell

their age http://www.netsmartz.org "Tracking Teresa" Even though Teresa has tried not to reveal personal information online, shes left enough clues that she could find herself in danger. http://www.netsmartz.org/resources/reallife.htm#realAmy Chat Rooms Virtual Parks

No longer the guy with the trench coat waiting to kidnap the child Can sit anywhere and talk to several children at one time at different locations Used to gain childs trust and set up sexual meetings Used to send pornographic images They will send the child porn, getting more explicit each time They will try to convince the child that everybody is doing this and that it is normal

Chat Rooms Predators often snoop around child chat rooms for potential victims. They use various methods to get close to children but even if a child is not receptive to the predators advances, he can still harass and endanger the child by searching for information about the child. Countermeasures for Predators Use parental controls (if available)

Monitor childs actions on the internet Discuss appropriate internet activities Purchase NetNanny ($40) or similar Caution children about predators Limit the time child spends on a computer. Use software that creates a log of sites visited and every keystroke that is made on the computer. Randomly check emails on childs account Move the computer into a family area The internet is not a babysitter. More Countermeasures

Discuss Internet crime and safety issues with your family Discuss with other family members expectations with use of the computer. Sign an agreement between parents and children that outlines expectations and the amount of time allowed on the computer per day or week. Include in agreement who can be contacted or talked with on the computer. If family member receives an email that offends you or them, contact your Internet Provider and

complain about the message being received. Cyber-bullying is Coming to a School Near You if it hasnt already. Concerns include: Cyber-bullying can be much more damaging psychologically and much more intense. It creates a barrier between the bully and the victim. This can allow someone who normally wouldn't be a bully to become

one because there is no face to face contact. Cyber-bullying It is difficult to catch the cyber-bully. When identified, the suspects defense is often that it was someone else impersonating them using their password. Camera phones are making cyber-bullying more creative. Taking someones picture and then manipulating it, then posting it on a web site or in e-mail. Imagine getting an e-mail of a

nude individual with your face attached to it, and youre only a teenager. Many think this behavior is a joke and not as serious as bullying face to face. Cyber-bullying Victims are often targeted because they are considered different usually those considered overweight, small, with a learning disability or overly sensitive. Many face dirty digital tricks that range

from derogatory comments about them online to embarrassing e-mail attributed to them intended to insult friends and crushes. Cyber Bullying Statistics 42% of kids have been bullied while online. 1 in 4 have had it happen more than once. 35% of kids have been threatened online. Nearly 1 in 5 have had it happen more than once.

21% of kids have received mean or threatening e-mail or other messages. Based on 2004 i-SAFE survey of 1,500 students grades 4-8 Cyber Bullying Statistics 53% of kids admit having said something mean or hurtful to another person online. More than 1 in 3 have done it more than once. 58% of kids admit someone has said mean or hurtful things to them online. More than 4 out of 10 say it has happened more than

once. 58% have not told their parents or an adult about something mean or hurtful that happened to them online. www.xanga.com Popular Blog Site Blog Sites www.xanga.com

www.xanga.com www.facebook.com Parents Must Be Aware Many kids do not want to report this problem to their parents for fear of how their parents may react. They fear their parents will take away their cell phone, computer, or Internet access. Obviously this solution will stop the

messages, but then the child feels harassed by the bully and punished by the parents when the equipment is removed. Signs That a Child Might Be At Risk On-line Spends large amounts of time on-line, especially at night Find pornography on child's computer Child receives phone calls from unknown men or is making calls, sometimes long distance, to unfamiliar numbers Child receives mail, gifts, or packages from unfamiliar

sources Child turns the computer monitor off or quickly changes the screen on the monitor when you come into the room Child becomes withdrawn from the family Child is using an on-line account belonging to someone else Cyber Bullying Tips Tell a trusted adult about the bullying, and keep telling until the adult takes action. Dont open or read messages by

cyber bullies. Tell your school if it is school related. Schools have a bullying solution in place. Cyber Bullying Tips Dont erase the messagesthey may be needed to take action. Protect yourselfnever agree to meet with the person or with anyone you meet online. If bullied through chat or instant

messaging, the bully can often be blocked. If you are threatened with harm, inform the local police. What Can Parents Do? Establish a bond of trust and open communication with their child. Place / keep computer(s) with Internet access in an open, commonly used space. Learn about the new technologies

Commend your child for reporting cyber issues Parent and Child Internet Agreement What Can Parents Do? Cybersitter relies on an extensive, frequently updated database of sites and word patterns. By default, Cybersitter blocks content related to sex, drugs, hate, and violence, as well as blocking all image searches. But parents can select from 32 content gambling,

file Cybersitter offerscategoriesincluding a good stealth mode,cults, letting parents filter sharing, wrestling, and freewithout e-mail sitesto tailor the filter to and monitor

kids' activities their knowledge. their needs.can These settings applied to Web browsing, eCybersitter record both are sides

of IM sessions, as well as mail, messaging, and newsgroups. you can can log allinstant sites visited and any violations. This Or

information simply all instante-mailed messaging, newsgroups, FTP then beblock automatically to you in a daily activity report. access, and file sharing. .

Have you googled yourself? http://www.google.com Search your name, email address, telephone number, home address Search childrens, spouse, relatives It may be possible to remove unwanted information from some sites GCPS POLICIES AND PROCEDURES

What Can Schools Do? GCPS/Chattahoochee Elementary School GCPS Firewall Blocked Sites and Procedures Acceptable Use Policies Both Students and Staff Supervision of Computer Labs Teachers, Parent Volunteers, Tech Staff Technology Orientation Both Students and Staff

Counselor Programs Enter Your Childs Cyber World 1. Tracy Parrish Enter Your Childs Cyber World Internet Safety Quiz for Adults Presentation: Enter Your Childs Cyber World Information complied by Osborne Middle School

Additional Tools 2. 3. Handouts Web Resources

Parent/Student Contracts Question & Answer Sites of Interest CyberSmart: www.cybersmart.org Netsmartz: http://www.netsmartz.org Georgia State Computer Crimes Task Force Educators SubCommittee: http://sci-one.kennesaw.edu/EduSec NetNanny Internet Filter:

http://www.netnanny.com/index.html SpyBot privacy cleaner: http://security.kolla.de/ Ad-Aware privacy cleaner: http://www.lavasoftusa.com/ GATech InfoSec Law Library: http://www.security.gatech.edu/policy/law_library/ Free Antivirus: http://www.grisoft.com/

Recently Viewed Presentations

  • Multicultural Supervision

    Multicultural Supervision

    Emic knowledge (Falicov, 2014, p. 33.) This is an important attribute to assume when you approach a person's membership in different groups and how it impact his or her identity. Remember the distinction of Emic and Etic. "… Emic knowledge
  • Ceramic Capacitors - Wilfrid Laurier University

    Ceramic Capacitors - Wilfrid Laurier University

    Tahoma Times New Roman Wingdings Symbol Monotype Sorts Goudy Old Style MS LineDraw Arial Default Design Microsoft Excel Worksheet Microsoft Word Picture Microsoft Word Document Passive Components: Capacitors & Resistors PowerPoint Presentation Thru-Hole Assembly PowerPoint Presentation PowerPoint Presentation PowerPoint Presentation...
  • Voltage Tester Used for testing voltage on electrical

    Voltage Tester Used for testing voltage on electrical

    Surface Cover. Used with 4" junction boxes to adapt the box to a specific device when the box is mounted on the surface of a wall. In this case a switch and DR, but they come in many configurations.
  • Helmets - BZNR

    Helmets - BZNR

    Prepreka između opasnosti i radnika - štite ali ne sprečavaju opasnosti ZNAČAJ I MESTO * Hazardous Work Activities Incident Investigations Roles Responsibilities Accountabilities Communication and Involvement Risk Assessment Audit and System Improvement Induction and Training VISIBLE MANAGEMENT COMMITMENT Definisanje LZS...
  • Examination under General

    Examination under General

    To measure the diametric distance from nasal limbus to temporal limbus. Evaluating the severity and control of glaucoma in infants and children less than 2 years of age. Normal range of corneal diameter in infants is between 9.5-10 mm increasing...
  • PREVETION OF DENTAL CARIES INTRODUCTION Dental caries is

    PREVETION OF DENTAL CARIES INTRODUCTION Dental caries is

    PREVETION OF DENTAL CARIES INTRODUCTION Dental caries is defined as a progressive irreversible microbial disease affecting the hard parts of tooth exposed to the oral environment, resulting in demineralization of the inorganic constituents and dissolution of the organic constituent, thereby...
  • AKI Definitions - PCRRT

    AKI Definitions - PCRRT

    Standardized AKI definitions demonstrate small rises in creatinine are independently associated with poor outcomes. Standardized AKI severity strata demonstrate worsening AKI severity increases the rate of poor outcomes. Fluid overload may mask creatinine based AKI detection, underestimating AKI rates
  • ADVERSARIAL VS INQUISITORIAL - Weebly

    ADVERSARIAL VS INQUISITORIAL - Weebly

    ADVERSARIAL VS INQUISITORIAL. Commonalities between two systems: -Both systems can have a judge or judges alone with no jury-The judge(s) can ask questions-Both sides seek the truth. ADVERSARIAL-Judges role is limited.-Accused can remain silent-Accused is presumed innocent & burden of...