Our Digital World - A look at E-safety issues for teenagers
-
Upload
brian-sharland -
Category
Education
-
view
510 -
download
1
description
Transcript of Our Digital World - A look at E-safety issues for teenagers
OUR DIGITAL WORLD
Brian SharlandJune 26th
BRIAN SHARLAND
Teach ICT and Computing at Rye@sharland@RyeComputinghttp://briansharland.com
ONLINE VERSION OF PRESENTATION IN SCHOOL
This is an online version of a presentation I give in schoolThe slide numbers therefore begin slightly higher in order to synchronise with the presentation I give.
4
OUR DIGITAL WORLD
What is our digital world?
Issues teenagers face
How do we respond to those issues?
Further support available
5
So what is our digital world like?
6
7
Are we living in a surveillance era?
8
The internet isn’t a reflection of a teenager’s
life
It is their real life
9
Families
10
The Internet is a positive system
11
Creation
12
Connection
13
Understanding the world
14
What issues do teenagers face today?
15
There is NO privacy on the internet
16
Your information will at some point be read by a
human or computer and a decision made
17
Personal safety on the internet can be
compromised through careless words or actions
18
Cyber-bullies can leave you feeling un-safe in your
own home
19
Malicious communication through texts, tweets and
now apps can impact youngsters
20
Careless actions can have an impact on financial
security such as theft of devices or access to accounts like iTunes
21
The internet IS real life
22
How do we deal with these issues and in turn educate
our children?
23
Support
24
GOVERNMENT - CEOP
Centre for Exploitation and Online Protection- Government cross agency department of SOCA- Significant resources to combat online child abuse- Many resources for schools and parents
through thinkuknow
LINKS ON PAGE
25
GOVERNMENT - DCMS
Maria Miller’s Internet summit- 1 million pounds was pledged by big Internet
companies- To give more power and resources to the IWF
charity
LINKS ON PAGE
26
CHARITY – INTERNET WATCH FOUNDATION
Internet Watch Foundation- Charity in Cambridge- Remit is to ‘minimise the availabilty of
potentially criminal content’- Essentially supplies information on website
URLs to be used by CleanFeed
LINKS ON PAGE
27
CORPORATE - CLEANFEED
Cleanfeed- Content filtering system used by ISPs such as
BT to prevent access to certain sites outside the UK- Inside the UK sites are shut down
- Government mandated- List content provided by IWF
LINKS ON PAGE
28
SCHOOL - SMOOTHWALL
Smoothwall- A range of powerful and customisable tools to
filter Internet access at school- Removes access to inappropriate content and
control access to sites which could be a distraction
LINKS ON PAGE
29
SCHOOL - ESAFETY
We also encourage pupils to report any issues to their form tutors and also Mrs Neil- Documented and dealt with quickly- ICT and Computing lessons during the year
look at esafety issues- Recently looked at Two-Factor Authentication with year 9s
30
@ home ?
31
SECURING YOUR COMPUTER AND ONLINE LIFE
1. Passwords2. Security Software3. Home internet filtering
32
PASSWORDS
Having to remember Ty!89?ghjK for even one site is hard enoughUse a few complex passwords- Which are memorable but contain sufficient
variation- !WldWlk500MilesChain a few words together-antelope50beach85south?Wiki article on password strength
33
SECURITY SOFTWARE
Have decent well-reviewed security software installed- Norton, McAfee and Kaspersky for PC or
Sophos for MacAVG free?- Would you use a free car?Pay the annual feeSecurity software reviews
LINKS ON PAGE
34
HOME-BASED INTERNET FILTERING USING OPENDNS
OpenDNS provides family home filtering using DNS serversDNS servers are the ‘address books’ of the InternetAt a basic level filter adult sites, proxy servers, phising sites and some malware
LINKS ON PAGE
35
TWO-FACTOR AUTHENTICATION
One-factor authentication is the use of a password (something you know)2FA is the use of something you know and something you have (a phone)When logging in to certain services you are sent a one-time only unique code to login
LINKS ON PAGE
36
TWO-FACTOR AUTHENTICATION
Benefit is added securityHowever don’t lose your phone!Popular services using 2FA include:- Google, Facebook, Twitter, Apple, Dropbox,
Paypal and a few more
37
1st
factor
2nd
factor
38
HOW TO USE 2FA EFFECTIVELY
Set it up on at least one major service such as Google MailUse your Gmail account to setup other accounts such as Facebook, Amazon etc
39
LOGIN NOTIFICATIONS
Sites like Facebook use theseThey show you if someone attempts to login to your account from another location
LINKS ON PAGE
40
3RD-PARTY APPS AND SOCIAL NETWORKS
In our connected world services like Facebook, Twitter etc allow access to 3rd party apps which can use some of their featuresFor example my Facebook account allows my tumblr blog to create a link on Facebook everytime I post to tumblr.Certain apps can compromise your account if they post messages to your followers or worse
41
MANAGING 3RD-PARTY APPS
Check your app settings on each of your social networksFor example in Facebook use account settings to manage which apps you have allowedRemove ones you are unsure about
42
METADATA
Metadata is data about dataEg if I take a photo (data) the data about it would includeTimestampCamera typePhoto settings and depending on the type of deviceCo-ordinates derived from GPS
LINKS ON PAGE
43
GEOTAGGING
Geotagging is the process of attaching a GPS location to a piece of digital content- Photo- Tweet- Foursquare checkinIt has benefits but also negatives – daughter posting a picture of herself at home online with photo geotagged?
44
DEALING WITH GEOTAGGING
Check the settings on your child’s smartphone- An iPhone for example can turn location
settings offApps such as Twitter also have flags for turning on/off geotagging
LINKS ON PAGE
45
SHORT LINKS ON TWITTER
Due to the length of twitter posts longer email addresses are often shortened such ashttp://community.computingatschool.org.uk/ Is shortened to …http://bit.ly/Omnauf Use http://longurl.org to extend the address if you are unsure as to where it might lead you
LINKS ON PAGE
46
MANAGING SMARTPHONES AND TABLETS
For very young children use ‘Guided Access’ for iPadsUse gift vouchers to manage the purchase of appsUse the restrictions panel on an iPhone or iPad to manage things like in-app purchasesManage the iTunes password yourself – this will control the apps downloaded
LINKS ON PAGE
47
LOSING AN EXPENSIVE DEVICE
For Apple devices use iCloud and Find my iPhone to locate missing devices, ping them or lock them down
Similar services can be purchased for Android devices
LINKS ON PAGE
48
MESSAGING ON SMARTDEVICES
Parents can’t do surveillance like the NSA can!Skype is reasonably popularMore popular are over-the-top messaging apps such as Whats-app or iMessage – text message servicesRecently popular is Snapchat
49
DEALING WITH INAPPROPRIATE COMMUNICATIONS
Gather evidence!If you are aware of the apps your children are using familiarise yourself with how to collect evidenceTake that evidence to organisations like CEOP
50
SUMMARY OF SUGGESTIONS
Secure Passwords and multiple levels of loginsUse one security suite but a range of extra toolsDiscuss with your children and show them you are knowledgeable as wellKnow what agencies can help if something does happen
51
IN CONCLUSION
Esafety will always be evolvingKeep on top of developments yourselfIncrease your trust in your children as they get older
52
FURTHER LINKS
http://www.childline.org.uk/ https://delicious.com/briansharland/esafety - my bookmarks on e-safetyhttp://thinkuknow.co.uk Google security tools
53
Thank youAny questions?
Continue the discussion @sharland or at
http://ryecomputing.wordpress.com/esafety
Reading requires time and attention. Reading is a cognitive, mental, emotional action, and today it is under pressure from all this speed of the Internet and the whole digital world. The biggest principle of this world is speed, everything has to do with speed, that is how it is measured and that is how it is lived. When you read a book or a poem or listen to music, there is a matter of moderation, of time. This technology is an assault on time.
Leon Wieseltier June 2013
55
Image credits
• Minecraft image – screenshot from in-game
• Image: 'Oklahoma tornado reliefhttp://www.flickr.com/photos/39513508@N06/8867770414