Internet Safety For Parents And Kids
-
Upload
sandra-fathi -
Category
Education
-
view
2.373 -
download
3
description
Transcript of Internet Safety For Parents And Kids
Kids & Social Media:Facing Up to Facebook, Twitter & Beyond –The Pros & Cons of How Students Use Social Media for Study, Friendship & Fun
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Study, Friendship & Fun
Prepared for Epiphany Parent & Student Seminar.April 28, 2009
Sandra FathiPresident, Affect [email protected] 398 9680
Web: www.affectstrategies.comBlog: www.techaffect.comTwitter: @sandrafathiLinkedIn, Facebook: Sandra Fathi
Parents & Educators
Internet & Social Media are the New Reality»Required Skills for Social Development/Acceptance
»Required Skills for Education & Research
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
»Required Skills for Education & Research
»Required Skills for Job & Career Development
Educate & Arm Yourself with Knowledge» Investing in Your Child’s Safety
» Investing in Your Child’s Education
» Investing in Your Child’s Future
»To Connect
»To Be Social
Why do kids need the Internet?
PROPRIETARY & CONFIDENTIAL
»Social Planning/Events
»Staying Plugged In
»To Share
»Self-Expression
4/28/2009Affect Strategies
Social Networking Websites
16 years of age:16 years of age:16 years of age:16 years of age:Friendster Online community connecting friends
14 years of age:14 years of age:14 years of age:14 years of age:
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
14 years of age:14 years of age:14 years of age:14 years of age:MySpaceA Place For Friends
At least 13 years of age & in high school:At least 13 years of age & in high school:At least 13 years of age & in high school:At least 13 years of age & in high school:Facebook Social Utility that connect people with those around them
Social Networking Websites: 13 Year-olds
Hi 5Who’s in?Xanga A weblog communityIMVUChat with friends in 3DThere Online virtual world
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
There Online virtual worldChamber of Chat Harry Potter online role playing gameSecond Life 3D Virtual WorldRunescape Online adventure communityBebo Social network for sharing and entertainmentGaia OnlineVirtual community with games, message boards & economyvSide Virtual music communityWindows Live Spaces Community of friends for sharing and blogging
Social Networking Sites: No Age Minimum
Imbee Social Networking designed for kids 8-12Active Worlds 3D virtual world chatBoom BangChat, make friends and
Club PenguinVirtual world for kidsMarapetsVirtual pet site with games and chat communityShining Stars Chatting, naming stars
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Boom BangChat, make friends and explore a virtual worldDofusMulti-player online role playing gameAwol Chats, games, diary, friends, & cribsSanriotownHello Kitty games, community, blogs and forumsWebkinzVirtual pet community for plush pets
Shining Stars Chatting, naming stars and virtual star worldsNeopets Virtual world for petsEndless OnlineRole playing gamesEternal Lands Role playing gamesFurcadiaRole playing games Graal OnlineRole playing games Guild Wars Role playing games Hero OnlineRole playing games
What are some of the dangers?
»Privacy/Identity Theft
»Cyber-bullying
»Online Predators
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
»Online Predators
»Cybercriminals
»Piracy
»Inappropriate/Sexual Content
»Misleading Content/Propaganda
Quick Stats
93% of parents say they have established rules for their child’s Internet activity
37% of students report being given no rules from their parents on using the Internet
47% of parents feel their ability to monitor and shelter their
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
47% of parents feel their ability to monitor and shelter their children from inappropriate material is limited
95% of parents say they know “some” or “a lot” about where their children go or what their children do on the Internet
41% of students do not share where they go or what they do on the Internet with their parents
26% of students believe their parents would be concerned if they knew what they did on the Internet
I-Safe Statistics (www.isafe.org)
Quick Stats
58% of students admit to using the Internet unsafely, inappropriately, or illegally
12% of students have unsupervised Internet access at school
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
12% of students have unsupervised Internet access at school
55% of students report having given out personal information (e.g. name, age, gender, home address) to someone they have only met online
Online Predators
»71717171% of teens reported receiving messages online from % of teens reported receiving messages online from % of teens reported receiving messages online from % of teens reported receiving messages online from someone they did not someone they did not someone they did not someone they did not knowknowknowknow
»40404040% reported they usually reply and begin chatting with % reported they usually reply and begin chatting with % reported they usually reply and begin chatting with % reported they usually reply and begin chatting with that that that that personpersonpersonperson
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
that that that that personpersonpersonperson
»18181818% reported telling an adult about the % reported telling an adult about the % reported telling an adult about the % reported telling an adult about the encounterencounterencounterencounter
»45454545% have been asked for personal information by someone % have been asked for personal information by someone % have been asked for personal information by someone % have been asked for personal information by someone they did not they did not they did not they did not knowknowknowknow
»30303030% have of teens have considered meetings someone % have of teens have considered meetings someone % have of teens have considered meetings someone % have of teens have considered meetings someone they have only talked to they have only talked to they have only talked to they have only talked to onlineonlineonlineonline
14% HAVE HAD 14% HAVE HAD 14% HAVE HAD 14% HAVE HAD AN AN AN AN ENCOUNTERENCOUNTERENCOUNTERENCOUNTER
» Seeks Seeks Seeks Seeks out provocative user out provocative user out provocative user out provocative user names.names.names.names.
» Studies Studies Studies Studies your profile. your profile. your profile. your profile.
» Starts Starts Starts Starts with an innocent with an innocent with an innocent with an innocent IM.IM.IM.IM.
» Asks Asks Asks Asks personal questions, personal questions, personal questions, personal questions, A/S/L.A/S/L.A/S/L.A/S/L.
» Wants Wants Wants Wants you to private you to private you to private you to private chat.chat.chat.chat.
» Asks Asks Asks Asks you for personal info. (Phone number, eyou for personal info. (Phone number, eyou for personal info. (Phone number, eyou for personal info. (Phone number, e----mail address, home address, mail address, home address, mail address, home address, mail address, home address,
Online Predators Tactics
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
» Asks Asks Asks Asks you for personal info. (Phone number, eyou for personal info. (Phone number, eyou for personal info. (Phone number, eyou for personal info. (Phone number, e----mail address, home address, mail address, home address, mail address, home address, mail address, home address, school name, etcschool name, etcschool name, etcschool name, etc.).).).)
» Wants Wants Wants Wants to be your best friend, boyfriend or to be your best friend, boyfriend or to be your best friend, boyfriend or to be your best friend, boyfriend or girlfriend.girlfriend.girlfriend.girlfriend.
» Starts Starts Starts Starts sexual sexual sexual sexual conversations.conversations.conversations.conversations.
» Is Is Is Is all about keeping all about keeping all about keeping all about keeping secrets.secrets.secrets.secrets.
» Asks Asks Asks Asks for personal for personal for personal for personal photos.photos.photos.photos.
» Wants Wants Wants Wants to send you strange to send you strange to send you strange to send you strange gifts.gifts.gifts.gifts.
» Wants Wants Wants Wants to set up a faceto set up a faceto set up a faceto set up a face----totototo----face face face face meeting.meeting.meeting.meeting.
» Makes Makes Makes Makes threats when you no longer want to chat with him or her.threats when you no longer want to chat with him or her.threats when you no longer want to chat with him or her.threats when you no longer want to chat with him or her.
Cyber-bullying
» Be strong and stop it early. Don’t stoop to their level and lash back.
» Don’t suffer in silence. Tell an adult. Keep telling people until someone takes action.
» Don’t open or read messages from cyber bullies.
» Contact your Internet service provider abuse department.
» If the problem continues, alert the local police department.
» Tell your school if it is school related. If your cyber bully attends
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
» Tell your school if it is school related. If your cyber bully attends your school, contact your teacher or principal.
» Don’t erase the messages. Log all dates and time. Put them in a folder and hold them as evidence.
» Change your e-mail address or screen name.
» If it’s happening with text messages, change your cell number.
» Take screen shots of your chat room pages.
» Save URLs, e-mail addresses, and profiles of the bully.
» Stay protected—never agree to meet with a bully face to face.
» Block the bully if you are in a chat room or IMing.
Cyber-Bullying: Consequences & Crime
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Piracy: Illegal Downloads
Myth — I cannot be sued for downloading music and movies off P2P sites. They’ll never catch me.
Fact — True and False. You can’t be sued if you have downloaded songs that have been put online with the approval of record
labels and—you are violating copyright laws and you run the risk
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
songs that have been put online with the approval of record labels and—you are violating copyright laws and you run the risk
of being sued.
The Recording Industry Association of America (RIAA) filed 3,000 lawsuits against individuals as of May 2004, and in some
cases sought financial damages of up to $150,000 per copyrighted song.
Piracy:P2P Sites
P2P sites are not illegal, but trading unauthorized music and movies is. The argument is that P2P sites are not providing the illegal files —they are only providing a way to share files
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
the illegal files —they are only providing a way to share files with others logged onto the site.
Downloading music and movies without paying on unsanctioned sites is illegal and can result in criminal
penalties.
There is a good possibility of downloading a virus, creating a gateway for a hacker to jack your personal stuff or gain
access to files on your hard drive.
Piracy: Consequences & Crime
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Cyberterrorists/Cybercriminals
Spam» Avoid opening e-mails from businesses you don’t know» Get anti-spam (GMail)
Viruses/Spyware» Get viruses from opening attachments not e-mails
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
» Get viruses from opening attachments not e-mails» Can also get a “Trojan horse” by downloading software and e-mail attachments
Cyber-criminals (identity theft)» Never give out credit card info to a site that isn’t “trusted” –Google tools
» Use PayPal – doesn’t give credit card info to sellers
Pornography, Plagiarism & Propaganda
Pornographic content»Use parental controls on internet options»Moderated safe search on Google»YouTube requires a login for over 18 – has strict policy
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
»Moderated safe search on Google»YouTube requires a login for over 18 – has strict policy against porn
Plagiarism»Make sure you reference your sources for school reports!
Propaganda»Many sites won’t be pornographic but not suited for children.
» Hate sites, false information, lies and rumors
Personal Information
Obvious:
Name
Address
Age
Sex
Less Obvious:
School Name
School Mascot
Gaming Identities
Hobbies
PROPRIETARY & CONFIDENTIAL
Sex
Picture
Phone Number
Address
SSN Number
Bank Account
Credit Card
4/28/2009Affect Strategies
Hobbies
Interests
Landmarks/Hangouts
Team Names
What is Sexting?
When people take sexually revealing picture of themselves and send them as text message attachments,
it's called "sexting.“
PROPRIETARY & CONFIDENTIAL
People"sext" to show off, to entice someone, to show interest in someone, or to prove commitment. The
problem with that, is that the moment the relationship ends (and most of them do) someone is in possession of a highly compromising image that can be easily posted on a social networking site or sent around via email or text.
4/28/2009Affect Strategies
Sexting
Once an image is sent, it can never be retrieved -- youwilllose control of it. How would you feel if your teachers, parents, or the entire school saw the picture, because it
happens all the time.
Talk about pressures to send revealing photos. No matter
PROPRIETARY & CONFIDENTIAL
Talk about pressures to send revealing photos. No matter how big the social pressure is, the potential social
humiliation and consequences will be hundreds of times worse.
The buck stops with you. If someone sends you a photo, delete it immediately. If you do send it on, you’re
distributing pornography -- and that’s against the law.
4/28/2009Affect Strategies
Sexting Statistics
22% of teen girls and 20% of teen boys have sent nude or semi-nude photos of themselves
22% of teens admit that technology makes them personally more forward and aggressive
PROPRIETARY & CONFIDENTIAL
more forward and aggressive
38% say exchanging sexy content makes dating or hooking up with others more likely
29% believe those exchanging sexy content are “expected” to date or hook up
Revealing photos can be resent to a vast audience
Sending a sexual image of a minor or to a minor is illegal
4/28/2009Affect Strategies
Sexting:Consequences & Crime
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Protecting Kids: Tools & Strategies
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Tools & Strategies
Common Sense Media
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
ThatsNotCool.com
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Safe Filtering & Blocking
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Family Gameplan/ Contract
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Safe Search: Google
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Where Have You Been? History
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Social Networking Sites
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Blogs & Blogging
»Type of website
»Regular entries/updates
»Usually allows comments/interaction with visitors
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
»Usually allows comments/interaction with visitors
»May include text, pictures, video (vlogs), audio (podcasts) etc.
»Types:
»Personal
»Corporate
»News
»Blog Search Engines: Bloglines, BlogScope, Technorati
Blog On
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Microblogging
»Blogging in short form
»Similar to texting
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
»Ability to send and receive messages
»Ability to follow and be followed
»Archive information
»Multiple delivery mechanisms
»Conversations and interactivity
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Microblogging: Twitter
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Image Source: Caroline-Middlebrook.com
Twitter Profile
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
The Basics
Tweet: Message – 140 Characters
Twitter Handle: @sandrafathi
Retweet (RT): Resending a message from
PROPRIETARY & CONFIDENTIAL
Retweet (RT): Resending a message from someone else to your followers
Message: Direct message (private) from one Twitterer to another
Nudge: Prompt someone to Tweet
Hashtag: #eventname Easy search for events/topic
4/28/2009Affect Strategies
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Facebook: Groups & Pages
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Facebook Privacy
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Facebook Privacy
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Facebook Privacy
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
MySpace: Individual Profiles
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
MySpace Safety
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Closed & Open Communities
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Create a Ning
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
You Tube
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
YouTube
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
YouTube Safety
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Compete.com
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Flickr: Photo & File Sharing
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Flickr
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Advice for Kids & Teens
Don’t say you are older than you are
The Internet is a public space
Don’t post embarrassing things or things that could expose you to danger
PROPRIETARY & CONFIDENTIAL
to danger
Think before you post – the Internet is forever
People aren’t always who they say they are
Protect your privacy
Report harassment, hate speech and inappropriate content
Avoid in-person meetings with people you don’t know in real-life
Think before you post4/28/2009Affect Strategies
Advice for Parents
Start a conversation
Report inappropriate behavior
Talk about Social Networking and the Internet
PROPRIETARY & CONFIDENTIAL
Talk about Social Networking and the Internet
Remind kids, and teens, to be cautious
4/28/2009Affect Strategies
Best Practices I
Kids Need Rules»Set time and limits for Internet usage
»Keep computer in public space
PROPRIETARY & CONFIDENTIAL
»Agree on websites
»Check compliance (history, filtering, tools)
Teach Internet Safety»Offline rules apply online
Reinforce Morality & Ethics Online
»Educate on criminal activity
4/28/2009Affect Strategies
Best Practices II
Use Privacy Controls»Don’t provide personal information
»Be careful about Pictures/Videos
PROPRIETARY & CONFIDENTIAL
»Be careful about Pictures/Videos
»Set sharing settings
»Respecting others’ privacy
»Don’t use automatic ‘remember’ settings
»Never share passwords
»Don’t meet strangers in person
4/28/2009Affect Strategies
Best Practices III
Communicate Responsibly»Don’t hide behind a screen name
»Block offenders
PROPRIETARY & CONFIDENTIAL
»Block offenders
»Report incidents
»Flag inappropriate content
Be a Skeptic»View content critically
»Be able to identify reliable sites and verify facts
4/28/2009Affect Strategies
Resources/Links
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Internet Safety Organizations
Net Family News (http://www.netfamilynews.org/)
Safe Kids (http://www.safekids.com/)
Wired Safety (http://www.wiredsafety.org/)
PROPRIETARY & CONFIDENTIAL
Wired Safety (http://www.wiredsafety.org/)
NetSmartz (http://www.netsmartz411.org/)
Wired Kids (http://www.wiredkids.org/)
MySpace MyKids (http://www.myspacemykids.com/)
Safe Families (http://www.safefamilies.org/)
Enough is Enough (http://www.enough.org/)
Connect Safely (http://www.connectsafely.org/)
iKeepSafe (http://www.ikeepsafe.org/) 4/28/2009Affect Strategies
Personal Assistant:Common Craft
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Contact Information & Resources:
PROPRIETARY & CONFIDENTIAL 4/28/2009Affect Strategies
Sandra [email protected]: @sandrafathiLinkedIn, Facebook: Sandra Fathi
web: www.affectstrategies.comblog: www.techaffect.com