A 45 min. adapted version of the District Internet Safety Workshop for Parents
Bill Derry,Coordinator of
Information & Technology Literacy
INTERNET SAFETY
KHS – PTAMarch 31, 2010
CHANGEThe speed of change is increasing in
mysterious ways!
From the Consumer Warning Network website.
CHANGE3 Cs of INTERNET SAFETY
From the Consumer Warning Network website.
- KEEP CURRENT
- KEEP COMMUNICATING
- KEEP CHECKING
POWER OF STORIES
NetSmartZ kidsNetSmartZ “Real-Life Stories” (Older kids)
You wouldn't leave your door open
for any strangers to invite
themselves in. Why would
you do it
on your computer?
• Cyber Citizenship– Using e-mail
– YouTube
– Internet Games/Video Addictionaddicting games, miniclip, runescape, candystand, newgrounds, ebaumsworld, ytv
– Internet Dangers
– Instant messaging
– Virtual Reality – newest reviews
– Social NetworksMySpace-FaceBook
Internet Safety Issues
• Cyber Bullying
• Online Personal Safety- Predators
- Gambling- Commercial Exploitation-Phishing
CyberSecurityLimited coverage in this Presentation
Intellectual PropertyPlagiarism
Limited coverage in this Presentation
Cyber CitizenshipCyber Citizenship
In any community (on or off-line) there are • Dangerous• Unlawful• Inappropriate things
Our goal needs to be to teach children how to avoid these bad things and not the
community itself
http://www.netsmartzkids.org/uyn/knowtherules.htm
Where to Begin
And . . .
Kids need to know there are trusted adults that they can go to for help and who they are.
Kids need to know how to escape from a site themselves.
• Don’t click on the X• Control-W for windows• Command-W for macs
Kids need to know what to do when things happen
When and How to Use E-mail
• AGE??? Depends on many variables.
• Use your account with + (next slide)
• Use your service provider
• Pay for special service.
When and How to Use E-mail• IN RESPONSE TO SETTING UP A CHILD’S gMAIL
ACCOUNT:
According to this article (http://www.cnet.com/8301-13739_1-9902548-46.html), Google stated, "We require users to be able to form a legally binding contract in order to use our services. The actual age required to form a legally binding contract may differ based on jurisdiction."
I recommend signing up for this account under your name, and then giving your child access to the account. This allows you to be the decision-maker on this account, and also gives you the additional safety and security of being able to review the account from time to time.
You may want to also look at tools like ZooBuh ($12 per child per year) (http://www.zoobuh.com/), which are specifically targeted at giving children safe email accounts.
When and How to Use E-mail
• Gmail- accounts for others
• Add +sarah to your e-mail addressEX: [email protected]
• Set up a label for all e-mail with “+sarah” to go into using the Settings and Labels tabs in gMail.
Terms of Service#12 Ability to Accept Terms of Use
You affirm that you are either more than 18 years of age… or possess legal parental or guardian consent…In any case you affirm that you are over the age of 13, as
the YouTube Website is not intended for children under 13. If you are under 13 years of age, then please do not use the YouTube website. Talk to your parents about
what sites are appropriate for you.
ADDICTING GAMES
Look for the bomb icon• What Do Our Warnings Mean? • We want everyone to have a fun experience playing games on
AddictingGames. The majority of our games are appropriate for people of all ages . However, every once in a while there’s a game that may be a little edgy that we want users to stop and think about before playing. If you see a little bomb next to a game title , it means the game has been flagged by our editors for moderate violence or mature themes.
• Our goal is to help everyone find the games they like to play, so use our warning system as a guide to help you find the best games on the site for you!
• Target Audience• If you are a parent supervising younger children on this site,
look for the bomb icon to alert you to content that may require parental guidance. You can also click here for more information about moderating your child’s experience.
Parry Aftab wired kids.org
There are four kinds of cyberbullies…
• Inadvertent Cyberbullies (didn’t mean to cyberbully anyone, reacted in anger or was misunderstood)
• Vengeful Angels (wanting to right wrongs)
• Mean Girls (doing it for entertainment, usually in groups. Not always girls.)
• Power-Hungry or “Revenge of the Nerds” (traditional schoolyard bullying mentality, doing it for power…the ironic twist is that offline victims often become online bullies)
Parry Aftab wired kids.org
Is it serious or is it“kids’ stuff?”
Parry Aftab wired kids.org
A short video clip on Cyberbullying
NetSmartZ “Real-Life Stories”
“Let me count the ways…they cyberbully each other?”
• Any interactive technology: cell phones, text messaging devices, IMs, interactive games, Internet, photo phones, iPods and PDAs
• Any interactive sites: Websites, blogs, social networking sites, guestbooks, porn posts, wikis, profiles, directories, e-mail, public-IM, SPAM
• Any new technology can be abused• This is limited only by the technology they
possess and their limitless imaginations
Parry Aftab wired kids.org
Cyberbulling and Cyberthreats
• Harassment• Cyberstalking• Denigration• Exclusion• Impersonation• Flaming• Outing (revealing secrets)• Trickery
Educators Guide To Cyberbullying
Cyberbullying: Cry of the Dolphin – JAN 2010
Parents Often are Unaware of Cyberbulling NYT. OCT 2008YOU TUBE – Safety Center Bullying
The Impact
• No escape -- 24/7
• Distributed world wide and often irretrievable
• Can be anonymous and can solicit involvement of unknown friends
• Reluctant to tell due to fear of restrictions
• Better to ERR on the side of caution!• The emotional response of your child• The kind of threat• The frequency of the threats• The source of the threats• The nature of the threats
Parry Aftab wired kids.org
Consider the following:
Immediate Action Steps
1. Save the evidence2. Identify the cyberbully3. Possible Actions
Tell the cyberbully to stop Ignore the cyberbully-help your child File a complaint with Service Provider Contact your school Contact the Cyberbully’s Parents Contact the Police Contact an Attorney
Additional ACTION STEPS
• Talk to your child.
• Evaluate quality of online community.
• Know when to leave.
• Have your child do a self-assessment of behavior.
• Know how to respond to harmful communications.
• Teach your child how to get assistance.
From The Center for Safe and Responsible Internet Use
Online Personal Online Personal SafetySafety
• Social Networking Sites/Virtual Worlds– Webkinz– Club
Penguin/Toontown– Whyville
• Chat Rooms• Instant Messaging• Blogs/Wikis
• Video Sites• Game Stations
– MMORPG
• Shopping
On-line Includes
• Choose your screen name carefully• Choose your opening picture carefully• Know what is public and what is private• Test it out• Be honest about your age, there are
different protections in place for different ages
• Know who you are talking to• Know how to use the sites protective
features
Safe Practices
• Full Name• Address• School• Phone number• Family and friends names• Age/Birthdate• Social Security number
*Some exceptions may apply
Never Reveal
FACEBOOK TERMS OF AGREEMENT
Predator Predator IdentificationIdentification
• Marketing– Hiring teens to infiltrate chat rooms– Devising games or environments that promote
their product seamlessly– Pop-up Ads
• Phishing– Making you believe you are at risk
• Sexual Predators
Types of Predators
• Conflicting viewpoints• Reality is most kids know that they are
meeting an adult• We need to talk at an early age about the
possibilities but be realistic with who falls prey the most
• We need to help ALL kids understand the grooming process
Striking the Right Balance in Discussing Predators
• Identify Similar Interests• Gains child’s trust by always taking their
side• Keeps child’s secrets and asks the child to
keep their secrets• May slowly introduce them to inappropriate
things and tell them it is OK• Become the child’s new best friend• Isolates the child from any other friends• Presents themselves as the best person in
that child’s life
The Grooming Process
Cyber SecurityCyber Security
• Malware (Malicious Software)– Viruses, worms, Trojans, spyware, root kits,
keyloggers, ransomware– Passed through downloads, email
attachments, web browsing
• Computer Hackers• Spam/Spim
– Extra volume can be due to giving information to websites or responding to a message
– Delivery mechanism for malware and phishing scams
Security Threats
http://www.netsmartzkids.org/uyn/virusrap.htm
• Use a firewall• Set your computer settings properly including
auto-updates • Use anti-virus and anti-spyware software
and update it regularly• Use strong passwords and change them frequ
ently • Beware of FREE download sites• Don’t respond to spam messages• DO NOT forward messages to all of your
friends
Steps to Take to Protect Yourself
(10 Common Questions about Internet Safety- created by iKeepSafe and Symantec)
What about Web Filters?
• Filtering and Blocking Software – Categories/Reviews– Whitelist/Blacklist– Use the settings in your operating system– Texting and cell phones filters now exist
• Cautions– False Sense of Security- IM and Chat can be
embedded – Over Blocking– Filtering does not follow you from computer
to computer
Intellectual Intellectual PropertyProperty
Acceptable Use Policies/Agreements
AUP -
• I will not violate copyright laws, damage or tamper with hardware or software, vandalize or destroy data, intrude upon, alter or destroy the files of another user, introduce or use computer “viruses,” attempt to gain access to restricted information or networks, or block, intercept or interfere with any email or electronic communications by teachers and administrators to parents, or others.
U.S. Copyright
©© ©
Fair Use
Creative Commons
Cite Sources
The Schools’ Part
• Comply with the Children Internet Protection Act (CIPA)
• Have firewall, auto-updates, and anti-virus software in place
• Caution: May be viewed as “in school practice” and may not be transferred to the real world or virtual world.
Best Practices
• Keep computers in common areas.• Have a family Internet plan• Use district resources
– Pre-selected teacher websites– Subscription databases and online
encyclopedias– iConn – State Digital Library– Westport Public Library resources
• Maintain open communications
Parents
• Filter… but do not assume its all you need to do.
• Time• Talk
– Storytelling
• Awareness• Guidelines / Handouts
For more information…• ABOUT: Family InternetTalking with your Kids and a sample Family Internet Safety Agreement
• AD COUNCILPublic Safety PSAs- Under Television, go to YOUTH TARGETED Bulletin Board
• Bullying PowerPointPowerpoint presentation from the Windsor Police Dept.
• Center for Safe and Responsible Internet UseEffective strategies to protect young people on the Internet
• Common Craft Videos – In Plain EnglishWatch a short simple video to get the basic concepts of a specific internet term.
• Cyberbulling.usPages of important information and strategies to deal with cyberbulling
• Cyberbulling BlogIdentifying the causes and consequences of online harrassment.
• Enough is EnoughEffective strategies to protect young people on the Internet
• Federal Trade Commission Consumer Safety Tips for Social Networking for Teens and Tweens
• How Stuff Works (Firewalls, Viruses, Worms, etc.) This site opens with a description of firewalls and how they work.
• I Keep Safe-A national Internet Safety website, individualized for Connecticut
• Social Networking Articles
– What does MySpace do to protect users?– MySpace Moves to Give Parents More Information– Protecting your privacy on MySpace, FaceBook and Linkedin– POWER.COM (Brazilian “cross-social networks” webware)
• Netbullies.com“Protecting kids from each other online with cyberlawyer Perry Aftab”
• Netlingo.comLearn about the acronyms and language of the Internet.
For more information…
• Online Victimization of YouthA 2006 report from the THE CRIMES AGAINST CHILDREN RESEARCH CENTER UNIVERSITY OF NEW HAMPSHIRE ,FUNDED BY THE U.S. CONGRESS THROUGH A GRANT TO THE NATIONAL CENTER FOR MISSING & EXPLOITED CHILDREN
• PBS – FrontlineAired on 1/22/08 --
• Pew Research StatisticsPew Internet and American Life project
• Safe TeensMagid, Larry. Teen Safety on the Information Highway. A publication of the national Organization for Missing or Exploited Children. 2004
• Spectorsoft.comAutomatically record everything done on the internet
• Stop Bullying NowStrategies to get kids to think about the ramifications of bullying. 12 animated files to support main concepts.
• Teen Angels13-18 year old volunteers who provide help on Internet safety issues
• Totally Wired-What Teens & Tweens are Really Doing OnlineBook by Anastasia Goodstein discussed at workshop.
• Web Awareness Resources (Canada)Internet safety tips with resources for various age groups (2-3, 5-7, 8-10, 11-13, 14-17)
• WebopediaThe only online dictionary and search engine you need for computer and Internet technology definitions.
A 45 min. adapted version of the District Internet Safety Workshop for Parents
Bill Derry,Coordinator of
Information & Technology Literacy
INTERNET SAFETY
KHS – PTAMarch 31, 2010