February 26, 2008 Good Evening andWelcome. Just the Facts- Deb Chestnut Checking the History on the...

Post on 18-Dec-2015

217 views 3 download

Tags:

Transcript of February 26, 2008 Good Evening andWelcome. Just the Facts- Deb Chestnut Checking the History on the...

February 26, 2008

Good EveningGood Evening

andand

WelcomeWelcome

Just the Facts- Deb Chestnut

Checking the History on the Computer- Agnes Kovacs

MySpace and Chatrooms- Matt Schaeffer, Nate Schlegel,

CJ Covell

Question/Answer- All

Parents don’t talk to kids about Internet Safety. Why????

Lack of Knowledge Denial

DiscomfortLet’s change that starting TONIGHT!!!

1. ______ of 12-17 year olds use social networking sites.

2. One in ______ US teenagers (who regularly log into the internet) state that they have received an unwanted sexual solicitation via the web.

3. _____ in _____ youth received an aggressive sexual solicitation. This means a predator asked a young person to meet somewhere, called on the phone or sent mail, money or gifts through the US Postal Service.

4. Nearly 63% of harassment predators are _______________________.

5. _____of teens said they have known a friend to actually meet someone whom they only knew online.

6. Approximately _____ of children who encountered a sexual solicitation or approach told a parent or adult.

7. _____ of the targets for online predators were age _____. Another _____were web users ages _______.

8. _____ of all teenagers who use the internet say they have been targets of a range of annoying and potentially menacing online activities, including threatening messages, having their private e-mails or texts forwarded without their consent, embarrassing photos posted and rumors spread about them online.

9. _____of children are willing to share personal information online about themselves in exchange for goods or services. AND>>>>>>>>

55%

5

1 33

other juveniles

27%

25%

77% 14 22%10-13

32%

75%

http://www.pameganslaw.state.pa.us/

10. ______________

registeredregistered sex offenders have a page on MySpace.

29,000

1. Get rid of the internet in our homes!

2. Attend a workshop

3. Research

4. Check the history

5. COMMUNICATE with our kids in school and at home

Content:

• What is the operating system you use, where do you check the Internet history files?

• Where are the temp files located? What is a cookie?

• What software can do the job for you?

• Websites and software list for help.

What is the different between OS?

• Windows 95- (hopefully not) C:\Windows\temp directory has the

temporary files• Windows XP-general user-everybody has

the same profile, if users are set, everybody logging on with their own user name (and password) profiles are separated …desktop settings, temp files are generated for that user only….you have to have administrator rights to be able to open other users settings

Windows VISTA

Websites:

• http://www.microsoft.com/windows/products/windowsvista/seeit/default.mspx?wt_svl=10191VH_OS_Other2&mg_id=10191VHb2 Vista help: how to set up the computer to be safer

• www.mykidsbrowser.com• www.linkup-parents.com/funsites.htm• www.netsmartz.org• www.ikeepsafe.org 5 min. video about the safety

tools• www.kidmail.net/default.asp for younger children to

establish basic safety knowledge, linked to regular email service, works inside of the filter, also has a list of software for support

• www.braintrustfilms.com/preditors.htm

• www.netsmartz.org

SSIMILARIMILAR IINTERESTS : They tell you that they NTERESTS : They tell you that they like the same things that you likelike the same things that you like.

SSIMILARIMILAR IINTERESTS : They tell you that they NTERESTS : They tell you that they like the same things that you likelike the same things that you like.

TTRUST: They make you think that you can tell RUST: They make you think that you can tell them anything. When you talk about problems them anything. When you talk about problems

they always take your sidethey always take your side.

TTRUST: They make you think that you can tell RUST: They make you think that you can tell them anything. When you talk about problems them anything. When you talk about problems

they always take your sidethey always take your side.

SSECRECY: You can tell them secrets. And, they ECRECY: You can tell them secrets. And, they may tell you to keep your friendship secret may tell you to keep your friendship secret

because no one else will understand.because no one else will understand.

SSECRECY: You can tell them secrets. And, they ECRECY: You can tell them secrets. And, they may tell you to keep your friendship secret may tell you to keep your friendship secret

because no one else will understand.because no one else will understand.

http://www.netsmartz.org/resources/reallife.htm

Cyber Bullying - A Criminal OffenceSchools should educate the school community about the criminal offence of cyber bullying. Students should be informed that if they use technology in an inappropriate fashion then they could be committing a crime. Messages, phone calls, and chat rooms can be traced, even if a false name is used.

The numerous state and commonwealth laws which cover cyber crime include:

•The Commonwealth’s Criminal Code Act 1995, section 4.7.4.17 notes that it is an offence for a person to use ‘a carriage service to menace, harass or cause offence’. •The Commonwealth’s Criminal Code Act 1995, section 4.7.4.15 notes that it is an offence for a person to use ‘a carriage service to make a threat’. •The Commonwealth’s Crimes Act 1914, part VIIB, section 85ZE notes that it is an offence for ‘a person to knowingly or recklessly use a telecommunications service supplied by a carrier in such a way as would be regarded by reasonable persons being, in all the circumstances, offensive’. •The Victorian Crimes Act 1958 was amended in 1995 to include the offence of ‘stalking’. This includes telephoning and sending electronic messages with the intention of causing physical or mental harm. •The sending of images is also covered by various State and Commonwealth laws that prevent the publication of material that is objectionable, unclassified or unsuitable for minors.

www.webwisekids.org/pscpaPassword - PSC

Nintendo DS and its Wireless NetworkWith Nintendo DS Lite, you can connect with a local wireless network of up to 16 players. The wireless range can be an incredible 30 to 100 feet and for some games, multiplayer requires just one Nintendo DS game card.

Note: Nintendo DS Lite wireless communication, including PictoChat, is not private and is not monitored by Nintendo. We recommend that you never reveal any personal information or arrange to meet a stranger.

It is not MySpace lite. It is MySpace enhanced, completely customized for the mobile experience."

Webcams are a predator’s best friend !Webcams are a predator’s best friend !

Berks County District Attorney Mark C. Baldwin said,

“They have found a way to enter your home, enter

your child’s bedroom and gain access to our

most precious resource.”

For more information, please refer to the

Wilson Website www.wilsonsd.org

or e-mail –

Deb Chestnut: chedeb@wilsonsd.orgAgnes Kovacs: kovagn@wilsonsd.orgMatt Schaeffer: schmat@wilsonsd.org

Myspace Facebook

Facebook

• As of January ‘08 there are 60 million active members

• 85% of college students use this online networking site

All Facebook Profiles Consist of

• User’s photo• Account info (name, school) • Personal info (birthday,

hometown)• Opinionated info (political views,

favorite music, interests etc.)

Features of Facebook

• Post photos• A “wall” where users may post

messages about each other • Post videos• Event Organizer• “Facebook Applications”

What Facebook looks like

Personal Info Wall

Myspace

•300 million active myspace users •230,000 new registrations each day

• *as of February 3rd, 2008

All Myspace Profiles Contain

• Blurbs (About me, Who Id like to meet)

• Blogs• Multimedia • Comments• Music

Features of Myspace

• Bulletins• User’s Photo’s • Groups• Personal Information• MyspaceIM

what myspace looks like

Dangers of Social Networking • Every is public unless you decide to make

your profile private• Teens love gossip, racial slurs, bullying

and malicious rumors. • Anything posted is for an audience of

millions• People are not who they say they are. All

it takes to set up and account is a valid e-mail address

How can we monitor what our children are doing on the internet

• logmein.com

• Create your own myspace or facebook

• Ask for their passwords

• Enforce parental controls on your home computer

• Don’t give your children administrative accounts

• Talk to your children