29
Internet Safety Myth or Achievable Goal?

Internet safety: Myth or Achievable Goal?

Embed Size (px)

DESCRIPTION

Protecting kids online is a difficult task. This presentation walks you through some of the dangers of the Internet before turning the corner on how to help shield kids from these types of dangers. This is not a talk on "how to live in a bubble". Rather, it is how to be smart about your kids interactions with the digital world. For access to the Internet Safety Resources document, go here: http://1drv.ms/1sxjOc1

Citation preview

Page 1: Internet safety: Myth or Achievable Goal?

Internet SafetyMyth or Achievable Goal?

Page 2: Internet safety: Myth or Achievable Goal?

2

OverviewThere are two sides to anyone’s qualification to talk about Internetsafety. On one side is the technical experience to know what is outthere and what is coming. On the other end, there is the humanelement. The desires, tendencies and trends that drive the use andabuse of the technology. I have spent the past 15 years growing myskills and understanding in both areas.

Key Qualifications Professional software developer for 17 years Monitored and protected Internet use at a college for 7 years Skilled network engineer Hacker Youth worker Parent

“ There are no secrets to success. It is the result of preparation, hard work, and learning from failure.

— Colin Powell ”

| About MeA GEEK WITH A PASSION FOR THE HEARTS OF STUDENTS

Page 3: Internet safety: Myth or Achievable Goal?

3| RoadmapWHERE WE ARE GOING TODAY

OVERVIEW:

We will take a peek at the

issues surrounding the

Internet and digital

communication. This will

be a high-level overview of

some of the problems and

dangers that everyone

faces, but especially

students.

SPECIFICS:

Next we will dive a bit

deeper into a few key

areas to highlight some of

the deficiencies in our

current protection systems.

We will also identify some

areas where lesser-known

threats can creep in.

SOLUTIONS:

Finally, we turn the corner

into what to do about these

issues. This is where we

identify key activities and

actions that can guide and

protect students from the

dangers of the digital

world.

TOOLS:

Sometimes protection from

danger includes

implementing systems to

aid us in our efforts to

protect our students. Here

we will discuss how

specifically to enable some

of these safeguards.

Page 4: Internet safety: Myth or Achievable Goal?

OVERVIEWBREAKDOWN BY THE NUMBERS

Page 5: Internet safety: Myth or Achievable Goal?

5

Three quarters of these young men use pornography at least once a week

81%

One third of these young ladies use

pornography at least once a week

48%

| Pornography UsageYOUNG ADULT USAGE OF AT LEAST 1-2 TIMES PER MONTH

http://www.covenanteyes.com/pornstats/

Page 6: Internet safety: Myth or Achievable Goal?

6

Mixed Boys Girls Mixed

90% 90% 60% 41%Internet users who

only use free material

Boys who were exposes to

pornography before age 18

Girls who were exposed to

pornography before age 18

Pre-teens who have viewed pornography

at least once

| Exposure to PornographyTHE ACCESSABILITY AND AVAILABILITY OF PORN

http://www.covenanteyes.com/pornstats/

Page 7: Internet safety: Myth or Achievable Goal?

7

Sent Naked Pictures of ThemselvesOne in every five teens have transmitted or posted nude or semi-nude pictures or videos of themselves. The breakdown is 22% of girls and 18% of boys.

39%

50%

20%

Sexually Suggestive Texting39% of teens have sent a sexually suggestive message to another individual. The breakdown here is 37% of girls and 40% of boys. Once they reach their young adult years, this jumps to 59%.

Cyber bullyingNearly half of all teens have bullied someone else via social media or other electronic means. Girls are just as likely as boys to be the target or the perpetrator.

| Teen Interactions ElectronicallyWHAT HAPPENS WHEN NO ONE IS LOOKING

http://thenationalcampaign.org/resource/sex-and-techhttp://www.bullyingstatistics.org/content/cyber-bullying-statistics.html

Page 8: Internet safety: Myth or Achievable Goal?

8| Contact with StrangersWHO ARE STUDENTS INTERACTING WITH ONLINE

Even if a student is only online for a limited amount of time each day, their information is available 24/7. Predators, Internet trolls and other

types of negative individuals are constantly looking at and pursuing students online.

29%Stalked OnlineStalked or contacted

online by someone they did not know.

55%Personal Info

Teens who have willingly given out

personal information to a stranger.

24%Leaked Info

Teens who have had private or

embarrassing information leaked

online.

18%Private Profile

Teens who have created a private email address

or social networking profile.

http://facebook-parental-controls-review.toptenreviews.com/30-statistics-about-teens-and-social-networking.html

Page 9: Internet safety: Myth or Achievable Goal?

SPECIFICSWHERE STANDARD PROTECTION FAILS

Page 10: Internet safety: Myth or Achievable Goal?

10

Students can communicate with their friends or even completestrangers without you knowing. Apps such as Snapchat make thistask not just easy but rather the default means of communication.This has led to a significant rise in students taking and transmittingnaked or semi-naked pictures of themselves to others.

Other apps like WhatsApp allow for long-term communication withothers without the ability to retrieve conversations once they havebeen removed from the system.

| Private CommunicationsCOMMUNICATIONS ARE NOT TRACEABLE

Page 11: Internet safety: Myth or Achievable Goal?

11

The Internet is a place where anonymity allows users the freedom toexperience the benefits of wrong actions without any of theassociated consequences. Steal a CD at the mall and there is a goodchance you will get caught. Steal an entire library of CDs online andno one will ever know.

This anonymity wears on an individual until it gets to the point wherethey no longer consider the action wrong. Examples of these types ofactivities include: Music/Movie “sharing” Buying/Downloading homework answers Hate Speech

Justification for the actions becomes a core belief of the user, to thepoint where they will argue their moral right to participate in theactivity.

| Freedom From ConsequenceERODING VALUES ONE BIT AT A TIME

Page 12: Internet safety: Myth or Achievable Goal?

12

It used to be that Internet access used to be limited to your desktopcomputer at home. Now almost every electronic device that uses ascreen has Internet access. Phones, tablets, laptops, game systemsand more can access the Internet. What’s more, this access is notlimited to your home network. Most phones have data plans nowand wifi is practically everywhere.

Unfortunately, that isn’t the only thing that is now readily accessible.Other things include: Drugs and drug tutorials Deviant materials including child pornography and bestiality Ideology and a community of supporters

It used to be a lack of information or a lack of access restricted thetrouble an individual could get in. The barrier to entry into theseharmful behaviors has been lowered significantly, to the point whereaccess into almost any activity is available to anyone.

| AccessibilityIF YOU WANT IT, YOU CAN GET IT

Page 13: Internet safety: Myth or Achievable Goal?

13

Your student is constantly at risk from child predators. No longer arethey tied to physical locations. They can now target children online,track their victims and even victimize them without getting physicallynear them.

Some of the common information leaks come from: Open Facebook profiles GPS data from images and posts Location or image tweets Check-in apps like FourSquare

Once a child has been victimized, shame and fear can keep themfrom reporting the incident. Threats of exposure can allow anattacker to push for more access to a victim.

| Child PredatorsTHEY CAN ATTACK FROM ANYWHERE

Page 14: Internet safety: Myth or Achievable Goal?

14| Cute BreakSOMETIMES YOU NEED TO TAKE A STEP BACK AND SMILE

https://twitter.com/ThatsCute/status/515897156327469057 https://twitter.com/ThatsCute/status/510057484208574465

Page 15: Internet safety: Myth or Achievable Goal?

15

Every website, app and social media account has an agenda.Sometimes they are obvious. The agenda of Walmart.com is to sellproducts. Other times the agenda is not quite as clear or it ismisrepresented intentionally.

Here, a Twitter account is used to push sexy topics in order to drivetraffic, and thus ad revenue. Unfortunately, it also tends toencourage viewers to pursue more and more explicit material.

Other sites (and apps especially) will encourage addictive behaviorssuch as gambling in order to drive sales. Unfortunately, thisencouragement is often subtle. Users don’t know they are beingsucked in until it is too late.

Spyware, adware and click-bait are also used to target not only theuser’s current web activity but also the activity of the user wheneverthey are on the computer.

| EnticementLEADING USERS DOWN THE WRONG PATH

Page 16: Internet safety: Myth or Achievable Goal?

16

The more people move their interactions online, the less theyinteract in the real world in a meaningful way. Friendships andreinforcement of beliefs occur much easier online. Unfortunately, aswe have already seen, who people are online is a construct.

In this digital world, positive emotions are cheapened and negativeemotions are heightened. Emotives like LOL (laughing out loud) andLike are used much more freely online, to the point where they nolonger carry the weight that they do in the real world.

Conversely, the freedom of the online construct allows users to moredirectly express their negative feelings towards another. Hatefulcomments like STFU (Shut the F**k Up) and DIAF (Die in a Fire) aremild compared to some of the interactions people have with eachother online.

| IsolationVULNERABILITY AND DEPRESSION OFTEN FOLLOW

Page 17: Internet safety: Myth or Achievable Goal?

COFFEEBREAKTAKE 15 MINUTES TO RELAX

Page 18: Internet safety: Myth or Achievable Goal?

SOLUTIONSHOW TO PROTECT STUDENTS ONLINE

Page 19: Internet safety: Myth or Achievable Goal?

19

Internet BlackoutTrying to stop all Internet access is not a reasonable goal. Like it or not, the Internet is a part of our culture now. Free wifi is everywhere, thelibrary offers both free Internet access as well as the computers to access it on and even if your students do not have devices capable of gettingon the Internet, their friends do.

Trust a SystemThere are a number of systems and “solutions” out there that will tell you how they can protect your student from the Internet. At best this is apartial solution and at worst it is a way to pass the blame when things don’t go well. Systems will not protect your students. No matter howhard you try, they will get past any defense you put in place.

Freak OutYour students are going to get in trouble online. They are going to be exposed to bad things on the Internet. It is natural to want to protectthem but panic and rash actions will only serve to drive a wedge between you and them. If they do not feel comfortable talking to you aboutbad things that happened to them, they will hide those things from you.

Give UpIt can seem like a losing battle with no hope for victory, and in some ways it is. You aren’t going to be able to prevent harm from coming to yourkids. The thing is, that is true in all of life. Just because it is difficult and just because you aren’t always going to succeed doesn’t mean youshould quit on your students.

| What Not To DoGETTING THIS WRONG WILL CAUSE MORE HARM THAN GOOD

Page 20: Internet safety: Myth or Achievable Goal?

20

A Dozen Talks over a Dozen YearsThis is the way to talk to your kids about a number of serious things, including “The Talk”. Don’t try to tell them everything at once or make itthis awkward conversation. If they relate talking to you about important subjects with being awkward, they won’t come to you when they havea serious problem. Instead, make open conversation a part of normal life.

Communication without FearWhat would you do if your student told you they had been sending naked pictures of themselves to others? That reaction can prevent yourstudent from ever telling you. When you are faced with smaller issues, show your student that you can be trusted. Don’t just hand outpunishment for wrongdoing. Give them consequences that are natural. Show them that you are fighting for them, not against them.

AccountabilityYou want your student to be accountable to you. However, this often becomes a “do as I say, not as I do” situation. Be open about how you areaccountable to someone else. For instance, constantly model to your student that you are accountable to your spouse. Don’t just show thegood times. When you fail, even in a little area, show them. Talk them through the impact of your failure.

Know what is Going OnGet involved in the same things your kids are (but not so you can spy). Ask them to help you figure out Instagram. Find out what their favoritegame is on their phone and then play it yourself. Listen to the music they listen to (again, not to judge). If you show that you are interested inknowing more about what they are interested in because it interests you, your student will be more likely to open up and involve you. This cangive you the opportunity and the right (in their eyes) to gently talk to them about the negative outcomes of some of their activities.

| Relational SolutionsEVERYTHING STARTS WITH A RELATIONSHIP

Page 21: Internet safety: Myth or Achievable Goal?

21

Put Computers in Public PlacesThis used to be easy. You put your desktop in the living room or kitchen and life was good. Now, with laptops, tablets and gaming systems, the“computer” can move around. Set some family boundaries around how you will use these devices. Set normal workstations up to be in publicareas. Also, don’t discourage the use of tablets and phones around others. Rather, encourage use in moderation.

Keep Chargers in the KitchenMobile devices need to charge on a daily basis. The typical location for these chargers is next to the bed (the phone is an alarm clock after all).Unfortunately, this also means that ready access to the Internet is only a few feet from your student at night. Help limit this temptation byputting charging stations in a public location.

Turn off Wifi at NightCertain routers will allow you to schedule Internet availability. Set up certain hours to be “Internet-free” times. This will reduce the temptationsof the Internet during those vulnerable hours when students are awake alone. Don’t forget that this does not limit cellular data or access to theneighbors wifi.

Use Safety Tools and TechniquesWhen searching the Internet, make sure safe search is enabled by default. Use an ad blocker to limit the number of distractions that are madevisible to you. Use an Internet filter to reduce the chances of accidentally going to a bad site. Search for websites, don’t just guess at their URL.Stick to known sites whenever possible. Avoid free “stuff”.

| Situational WisdomSET YOURSELF UP FOR SUCCESS

Page 22: Internet safety: Myth or Achievable Goal?

TOOLSTECHNOLOGY THAT CAN HELP YOU SUCCEED

Page 23: Internet safety: Myth or Achievable Goal?

23| Parental Controls on the RouterPROTECTING THE DEVICE THAT DISTRIBUTES YOUR INTERNET AT HOME

r

Some routers come with parental controls built into them. This is beneficial because

any device that connects through the router is then covered by the routers parental

controls. Netgear is an example of a company that provides excellent parental

controls on most of their new devices. They offer Internet filtering through OpenDNS

and they offer other features such as timed Internet shutoff, device filtering and

secure guest networks.

Examples:

Netgear Wireless-N Router

http://www.bestbuy.com/site/netgear-wireless-n-router/8998506.p

Netgear N600 with Cable Modem

http://www.bestbuy.com/site/netgear-n600-dual-band-wireless-n-router-with-built-in-cable-modem/3707003.p

Page 24: Internet safety: Myth or Achievable Goal?

24| Parental Controls on the SystemUSING THE BUILT-IN PROTECTION OF EACH SYSTEM

>

Most operating systems on computers, tablets and gaming platforms have some type

of parental control built into them. Each is different in what it allows but this is a free

way to protect most devices.

Examples:

Windows

http://www.technospot.net/blogs/how-parents-can-control-kids-activity-on-windows/

Mac

http://www.macworld.com/article/2030156/configuring-parental-controls.html

Xbox 360

http://support.xbox.com/en-US/xbox-360/security/xbox-live-parental-control

PS3

http://manuals.playstation.net/document/en/ps3/current/basicoperations/parentallock.html

Page 25: Internet safety: Myth or Achievable Goal?

25| Parental Controls from the ProviderCONTENT PROVIDERS OFTEN PROVIDE SOME TYPE OF PROTECTION OPTION

:

Content providers such as ISP (Internet Service Providers) and cable providers

typically offer some type of protection system for parents. This is typically limited to

basic monitoring and controlling but it is one more place where safeguards can be

put in place.

Examples:

Verizon FIOS

http://my.verizon.com/micro/parentalcontrol/Default.aspx

Verizon Wireless

https://wbillpay.verizonwireless.com/vzw/nos/safeguards/safeguardLandingPage.action

Time Warner Cable

http://www.timewarnercable.com/en/internet/features/internet-security.html

AT&T

http://www.att.net/s/s.dll?ep=16594&ch=smct

Page 26: Internet safety: Myth or Achievable Goal?

26| Additional Software SolutionsSOMETIMES YOU MAY NEED TO PAY FOR WHAT YOU NEED

Å

Not all free solutions are going to fit your particular needs. If you find that nothing

provided by the router, system or provider fits what you are looking for, it may be

time to look at purchasing something. Just be careful to pick something trusted and

reliable.

Examples:

Safe Eyes for Windows and Mac

http://www.internetsafety.com/index.php

Funamo for Android devices

http://www.funamo.com/user/registration

OpenDNS for networks (used by Netgear)

http://www.opendns.com/home-internet-security/parental-controls/opendns-home/

Covenant Eyes for computer and devices

http://www.covenanteyes.com/

Page 27: Internet safety: Myth or Achievable Goal?

27| Computer SecurityPROTECT YOUR COMPUTER SO IT CAN PROTECT YOUR FAMILY

7

A computer that is riddled with spyware is a danger to your family. Not only does it

make everything slower, it sends personal information about your family to the

Internet. Adware can also load unwanted and inappropriate ads even when you are

not browsing the Internet. Keep your computer clean and safe. Each tool here has a

free version that works just fine.

Examples:

Avast Anti-Virus for the PC, Mac and Android

http://www.avast.com/

Malwarebytes for Windows

http://www.malwarebytes.org/

CCleaner for Windows

http://www.piriform.com/ccleaner

AdBlock for Chrome or Safari browsers

https://getadblock.com/

Page 28: Internet safety: Myth or Achievable Goal?

28

Questions?

r > : Å 7

Page 29: Internet safety: Myth or Achievable Goal?

29| Keep in touchLET ME KNOW IF YOU HAVE QUESTIONS

CompanyEpicross LLC.

www.Epicross.com

Technical Consulting and Training

Contact InformationPhone: (570) 291-7789

[email protected]

Social MediaFacebook.com/WhySettle

Twitter.com/IAmTimCorey

YouTube.com/IAmTimCorey