+ All Categories
Home > Education > Becybersmart

Becybersmart

Date post: 29-Oct-2014
Category:
Upload: velma
View: 6 times
Download: 0 times
Share this document with a friend
Description:
A parent's guide to Teen Online Safety
33
Be Cyber-Smart! Surf Safely! Velma Davis, Instructional Support Specialist [email protected]
Transcript

Be Cyber-Smart!

Surf Safely!Velma Davis, Instructional Support Specialist

[email protected]

Know your internet areas

• Email• Chat rooms• Game rooms• Blogs (Blogger)• Microblogs (Twitter,

Plurk)• Bulletin Boards

(Myspace, Facebook)• Instant Messaging

Protocols? What protocols?!

Radios: gained popularity in 20’s

and 30’s

Television: Late 1940’s

Internet Explosion: 1990’s

Your mother warned you:co

nn

ect

you

rho

me

.co

m

Teens Online • 82% of profile creators included their first name in their profiles.

• 79% have included photos of themselves.• 66% have included photos of their friends.• 61% have included the name of their city.• 49% have included the name of their

school.• 40% have included their instant message

screen name.• 40% have streamed audio to their profile.• 39% have linked to their blog. • 29% have included their email address.• 29% have included their last name. • 29% have included videos.• 2% have included their cell phone

numbers.

http

://w

ww

.mar

ketin

gcha

rts.

com

/inte

ract

ive/

teen

s-an

d-so

cial

-net

wor

ks-m

anag

ing-

pers

onal

-info

rmat

ion-

274/

PEW Report, 2008

Am I really 10 years Am I really 10 years old?old?

Who am I REALLY?!

Is that really a picture of me?

Am I Am I a a boy?boy?

Do I Do I really go really go to to school?school?

Risks? Highest risk to Teenagers! “Teenagers are particularly at risk because... they are more

likely... to participate in online discussions regarding companionship..."

LOLLMAOTYBRBAWFKYWRUYASLPOSLMIRLWTFOMG

Laugh out loudLaughing my A$$ offThank YouBe Right BackAway from keyboard/computerYou’re WelcomeAre you?Why?Age, sex and locationParent Over ShoulderLets Meet In Real LifeWhat the F$%#Oh my God

http

://e

n.w

ikip

ed

ia.o

rg/w

iki/I

nte

rne

t_sl

an

g

Leet SpeakRemember …“Hip”, “Groovy”, “Peace out”?

“Leet” refers to “Elite”. Substitutes regular letters for symbols or numbers

Further information for Leet Speak:http://en.wikipedia.org/wiki/Leet http://www.brenz.net/services/l337Maker.asp

cart

oons

tock

.com

0 - O1- I or L2- A, Z or R3- E4- A5- S

6- B or G7- T or L8- B9- G or P£- L or E

Think Before You Click!

• Domains- The extensions on a website can indicate their purpose:.com- commercial

.biz- business

.org- organization

.gov- government

.edu- education

.net- network

.xxx- pornography

blo

g.a

nd

ysw

eb

too

ls.c

om

Virus

A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user.

hu

ge

pe

dia

.co

m

Worm• A computer worm is a

selfreplicating computer program. It uses a network to send copies of itself to other nodes computer terminals on the network).

• Worms almost always cause harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Trojan Horse• A Trojan horse, or simply

trojan, is a piece of

• Software which appears to perform a certain action but in fact performs another such as transmitting a computer virus.

• May or may not be malicious• a Trojan horse is not a computer virus.

Spyware

• Collects small pieces of information about users without their knowledge

• Installs on your computer • Secretly monitors the user's computing:

can collect various types of personal information, such as Internet surfing habits and sites that have been visited

• Can install additional software and redirect Web browser activity.

• Changes computer settings:– Slow connection speeds, – Changes your home pages, – Loss of Internet connection – Loss of functionality of other programs.

http://en.wikipedia.org/wiki/Spyware

Malware

– Rogue or malicious programs can attack and do various things to your computer while surfing the internet.

– Hostile, intrusive, or annoying software or program code

Phishing

Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

then

extw

eb.c

om

Suggestions?

joys

tickd

ivis

ion.

com

AntiVir PE

• http://www.avira.com/en/avira-free-antivirus

Avira AntiVir Personal - Free AntivirusProtects your computer against dangerous viruses.

AVG• A great Anti-virus and Anti-Malware

program.

Free Download:http://free.avg.com/ww-en/download-avg-anti-virus-free

Firewall• A firewall is a device or

set of devices configured to permit, deny, encrypt, or monitor internet connections between online traffic and your computer.

Windows 07 comes with a built-in Firewall.

Blocking or Filtering

http://internet-filter-review.toptenreviews.com/

Compare software:

What Can I do as a Parent?• Don’t hesitate to say “No!”• Put your computer in the busiest

room in the house!• Spend time with your child on the

computer. • Have your child sign and discuss

an internet usage agreement and go over it periodically.

• Check the history on the computer.

http://computinged.com

• The most important factors in keeping your child safe on-line are the utilization of appropriate blocking software and/or parental controls, along with open, honest discussions with your child, monitoring his/her on-line activity!

A Parent's Guide to Internet Safety , U.S. Department of Justice , Federal Bureau of Investigation - Publications

Digital Footprint• Talk to your child about his/her digital

footprint!

http://dsc.discovery.com/convergence/koppel/interactive/interactive.html

Have them take this quiz with you!

My Rules for Internet Safety!I will not give out

personal information such as my address, telephone number, parents’ work address/telephone number, or the name and location of my school without my parents’ permission

cartoonstock.com

I will tell my parents right away if I come across any information that

makes me feel uncomfortable

Boy, am I uncomfortable!

I will never agree to get together with someone I "meet" online!

cele

brit

yra

da

r.in

fo

I will never send a person my picture or

anything else without first

checking with my parents

I will not respond to any messages that are mean or in any way make me feel uncomfortable. It is

not my fault if I get a message like that. If I do I will tell my parents right

away.

• I will not download pictures from an unknown source, as there is a good chance there could be sexually explicit images.

• time of day that I can be online,

• the length of time I can be online,

• appropriate areas for me to visit.

I will not access other areas or break these rules without their permission.

I will talk with my parents so that we can set up rules for going online.

cart

oons

tock

.com

Helpful Sites• http://www.onlinenetiquette.com/netiquette_qu

iz.html

• www.netzsmartz.org

• www.safeteens.com

• www.blogsafety.com  

• www.netfamilynews.org

• http://www.slideshare.net/jtubbs/internet-safety-program-for-parents

• http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec14.shtm

Bibliography

• www.netzsmartz.org• www.safeteens.com  • www.safekids.com  Lawrence J. Magid• www.blogsafety.com  • www.netfamilynews.org • http://dsc.discovery.com/convergence/koppel/

interactive/interactive.html • http://pewresearch.org/


Recommended