February 26, 2008 Good Evening andWelcome. Just the Facts- Deb Chestnut Checking the History on the...
-
Upload
marion-ryan -
Category
Documents
-
view
217 -
download
3
Transcript of February 26, 2008 Good Evening andWelcome. Just the Facts- Deb Chestnut Checking the History on the...
February 26, 2008
Good EveningGood Evening
andand
WelcomeWelcome
Just the Facts- Deb Chestnut
Checking the History on the Computer- Agnes Kovacs
MySpace and Chatrooms- Matt Schaeffer, Nate Schlegel,
CJ Covell
Question/Answer- All
Parents don’t talk to kids about Internet Safety. Why????
Lack of Knowledge Denial
DiscomfortLet’s change that starting TONIGHT!!!
1. ______ of 12-17 year olds use social networking sites.
2. One in ______ US teenagers (who regularly log into the internet) state that they have received an unwanted sexual solicitation via the web.
3. _____ in _____ youth received an aggressive sexual solicitation. This means a predator asked a young person to meet somewhere, called on the phone or sent mail, money or gifts through the US Postal Service.
4. Nearly 63% of harassment predators are _______________________.
5. _____of teens said they have known a friend to actually meet someone whom they only knew online.
6. Approximately _____ of children who encountered a sexual solicitation or approach told a parent or adult.
7. _____ of the targets for online predators were age _____. Another _____were web users ages _______.
8. _____ of all teenagers who use the internet say they have been targets of a range of annoying and potentially menacing online activities, including threatening messages, having their private e-mails or texts forwarded without their consent, embarrassing photos posted and rumors spread about them online.
9. _____of children are willing to share personal information online about themselves in exchange for goods or services. AND>>>>>>>>
55%
5
1 33
other juveniles
27%
25%
77% 14 22%10-13
32%
75%
http://www.pameganslaw.state.pa.us/
10. ______________
registeredregistered sex offenders have a page on MySpace.
29,000
1. Get rid of the internet in our homes!
2. Attend a workshop
3. Research
4. Check the history
5. COMMUNICATE with our kids in school and at home
Content:
• What is the operating system you use, where do you check the Internet history files?
• Where are the temp files located? What is a cookie?
• What software can do the job for you?
• Websites and software list for help.
What is the different between OS?
• Windows 95- (hopefully not) C:\Windows\temp directory has the
temporary files• Windows XP-general user-everybody has
the same profile, if users are set, everybody logging on with their own user name (and password) profiles are separated …desktop settings, temp files are generated for that user only….you have to have administrator rights to be able to open other users settings
Windows VISTA
Websites:
• http://www.microsoft.com/windows/products/windowsvista/seeit/default.mspx?wt_svl=10191VH_OS_Other2&mg_id=10191VHb2 Vista help: how to set up the computer to be safer
• www.mykidsbrowser.com• www.linkup-parents.com/funsites.htm• www.netsmartz.org• www.ikeepsafe.org 5 min. video about the safety
tools• www.kidmail.net/default.asp for younger children to
establish basic safety knowledge, linked to regular email service, works inside of the filter, also has a list of software for support
• www.braintrustfilms.com/preditors.htm
• www.netsmartz.org
SSIMILARIMILAR IINTERESTS : They tell you that they NTERESTS : They tell you that they like the same things that you likelike the same things that you like.
SSIMILARIMILAR IINTERESTS : They tell you that they NTERESTS : They tell you that they like the same things that you likelike the same things that you like.
TTRUST: They make you think that you can tell RUST: They make you think that you can tell them anything. When you talk about problems them anything. When you talk about problems
they always take your sidethey always take your side.
TTRUST: They make you think that you can tell RUST: They make you think that you can tell them anything. When you talk about problems them anything. When you talk about problems
they always take your sidethey always take your side.
SSECRECY: You can tell them secrets. And, they ECRECY: You can tell them secrets. And, they may tell you to keep your friendship secret may tell you to keep your friendship secret
because no one else will understand.because no one else will understand.
SSECRECY: You can tell them secrets. And, they ECRECY: You can tell them secrets. And, they may tell you to keep your friendship secret may tell you to keep your friendship secret
because no one else will understand.because no one else will understand.
http://www.netsmartz.org/resources/reallife.htm
Cyber Bullying - A Criminal OffenceSchools should educate the school community about the criminal offence of cyber bullying. Students should be informed that if they use technology in an inappropriate fashion then they could be committing a crime. Messages, phone calls, and chat rooms can be traced, even if a false name is used.
The numerous state and commonwealth laws which cover cyber crime include:
•The Commonwealth’s Criminal Code Act 1995, section 4.7.4.17 notes that it is an offence for a person to use ‘a carriage service to menace, harass or cause offence’. •The Commonwealth’s Criminal Code Act 1995, section 4.7.4.15 notes that it is an offence for a person to use ‘a carriage service to make a threat’. •The Commonwealth’s Crimes Act 1914, part VIIB, section 85ZE notes that it is an offence for ‘a person to knowingly or recklessly use a telecommunications service supplied by a carrier in such a way as would be regarded by reasonable persons being, in all the circumstances, offensive’. •The Victorian Crimes Act 1958 was amended in 1995 to include the offence of ‘stalking’. This includes telephoning and sending electronic messages with the intention of causing physical or mental harm. •The sending of images is also covered by various State and Commonwealth laws that prevent the publication of material that is objectionable, unclassified or unsuitable for minors.
www.webwisekids.org/pscpaPassword - PSC
Nintendo DS and its Wireless NetworkWith Nintendo DS Lite, you can connect with a local wireless network of up to 16 players. The wireless range can be an incredible 30 to 100 feet and for some games, multiplayer requires just one Nintendo DS game card.
Note: Nintendo DS Lite wireless communication, including PictoChat, is not private and is not monitored by Nintendo. We recommend that you never reveal any personal information or arrange to meet a stranger.
It is not MySpace lite. It is MySpace enhanced, completely customized for the mobile experience."
Webcams are a predator’s best friend !Webcams are a predator’s best friend !
Berks County District Attorney Mark C. Baldwin said,
“They have found a way to enter your home, enter
your child’s bedroom and gain access to our
most precious resource.”
For more information, please refer to the
Wilson Website www.wilsonsd.org
or e-mail –
Deb Chestnut: [email protected] Kovacs: [email protected] Schaeffer: [email protected]
Myspace Facebook
• As of January ‘08 there are 60 million active members
• 85% of college students use this online networking site
All Facebook Profiles Consist of
• User’s photo• Account info (name, school) • Personal info (birthday,
hometown)• Opinionated info (political views,
favorite music, interests etc.)
Features of Facebook
• Post photos• A “wall” where users may post
messages about each other • Post videos• Event Organizer• “Facebook Applications”
What Facebook looks like
Personal Info Wall
Myspace
•300 million active myspace users •230,000 new registrations each day
• *as of February 3rd, 2008
All Myspace Profiles Contain
• Blurbs (About me, Who Id like to meet)
• Blogs• Multimedia • Comments• Music
Features of Myspace
• Bulletins• User’s Photo’s • Groups• Personal Information• MyspaceIM
what myspace looks like
Dangers of Social Networking • Every is public unless you decide to make
your profile private• Teens love gossip, racial slurs, bullying
and malicious rumors. • Anything posted is for an audience of
millions• People are not who they say they are. All
it takes to set up and account is a valid e-mail address
How can we monitor what our children are doing on the internet
• logmein.com
• Create your own myspace or facebook
• Ask for their passwords
• Enforce parental controls on your home computer
• Don’t give your children administrative accounts
• Talk to your children