Welcome! This presentation is all about children and young people using new technology safely We know that many parents and carers feel that there is a.

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
E-Safety for Parents and Carers Helping to keep your children safe online Acknowledgements
Internet Online Safety How to have FUN and Stay in Control.
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
e-safety and cyber bullying
1 Cyber Safety Constable Maire Froud. 2 Overview Cyberspace Contract Setting Rules Using Social networking sites Cyber bullying.
Ysgol Gynradd Llanrhaeadr ym Mochnant
ICT E-SAFETY ARCHIBALD FIRST SCHOOL. ICT Mark Only the 2 nd school in Newcastle LA to achieve the award: October 2009 Only the 2 nd school in Newcastle.
Awareness raising session for Parents and Carers.
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
E-SAFETY PRESENTATION Wednesday 14 th May 2014 Mrs Sarah Smith – Head teacher Mr Steve Gordon – Director at Blue Planet, ICT.
Hutton All Saints’ Online Risks and Dangers Workshop WEDNESDAY 19 TH NOVEMBER 2014.
© Childnet International 2008 Helping to keep your children safe online Presented by Mr Trofimczuk Director of ICT.
Helping to keep your children safe online. This presentation Why is internet safety important? What are the risks? Why is the internet so great? Know.
Welcome! Accessed anywhere anytime Easy to communicat e with friends and family Wide and flexible range of information Motivational and fun A key skill.
Welcome… Parent Awareness Session. Media Story 21 year old media student from Surrey who…… –Arranged to meet a 14-year-old at a railway station –Had.
E-safety for Parents Why? Schools have a major role to play in developing pupils’ understanding of how to use new technologies safely. However, pupils.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
 What are the risks?  Technologies your children use  Tips for protection  Advice and help  Questions? Topics.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Thursday 19 th November What is Fronter? How do we use it at West Pennard? Every child from Y2-6 has their own web space in Fronter. They can customise.
© Childnet International 2008 What are the risks?.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Internet Safety Why is internet safety important? What about mobiles? What are the risks? Why is the internet so great?
© Childnet International 2008 Helping to keep your children safe online.
E-safety a whole community approach © Childnet International 2007 E-Safety – A Whole Community Approach Internet safety in secondary school MaryLouise.
The internet is an amazing resource. We can connect, communicate and be creative in a number of different ways, on a range of devices. However, the internet.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
E-Safety for parents and carers Highfield Community Primary School.
E-Safety By Ian Hopper. Session Aims Apoyo Training & Consultancy -Develop a shared understanding of E-safety -Understand good practice in this area -Understand.
E-safety Parent Workshop Helping to keep your children safe online.
E-safety Helping your children stay safe on-line A presentation for Parents.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Kender Primary School E-Safety for Parents and Carers *Look at how children use the internet *Raise awareness of eSafety issues *Offer guidance on how.
Basically; teaching your children how to stay safe when using the internet.
Keeping Safe Online A Guide for Parents. Quality & Improvement Service nyASSIST Data for children in the Craven area % of Year 6 pupils have their.
Safety.
What Do You Use the Internet For?
Gosbecks E-Safety Guide
Keeping your children safe with technology
E-Safety for Parents and Carers
E-Safety for Parents and Carers
E-Safety Parents Evening
E safety workshop for parents
Welcome to our E – Safety Open Evening.
Tips to help keep children safe on the internet and social networks
Keeping Children Safe Online
E-Safety for Parents and Carers
E-Safety Briefing
E-Safety for Parents and Carers
Keeping safe and private on the internet
Awareness raising session for Digital Citizenship/E-Safety
Topic 5: Online Communities Press F5 to view!
E-Safety for parents What you need to know…..
Teaching Internet Safety
Tips to help keep children safe on the internet and social networks
Appropriate Use of Technology
How many of these apps do you really know?
Beatrix Potter Primary School February 2018
CYBER- BULLYING.
Aim The aims of today's session is to think about what bullying is and how to help yourself or others who are being bullied. To understand what Anti-Bullying.
E-safety and Social Media
Helping your children to stay safe online
Welcome to the E Safety Workshop
E-safety Parent Workshop
Internet Safety.
E-safety Presentation
Presentation transcript:

Welcome! This presentation is all about children and young people using new technology safely We know that many parents and carers feel that there is a gap between their own understanding of the technologies and that of their children. Question - Why do we and our young people use ICT? We all have our own reasons for using ICT and here are some of them – Click presentation for the callouts to appear E-Safety

Which of these technologies do you use? Mobile phones Instant messaging BLOGS Social networking Music Download sites E-mail Gaming consoles/ sites Podcasting Wikies Chat Rooms Video broadcasting P2P file-sharing This slide identifies some of the technologies currently being used by our children and young people. What Next ??? New technologies are continuing to evolve and will probably link location to the user which will raise many eSafety issues. We need to ‘watch this space’! The following slides look at some of these technologies in greater detail to help clarify understanding. The following do not have slides but here are the definitions if needed: eMail – many adults used email as part of their daily life. Wiki ( Hawaiian word meaning quick) – First Wiki was in 1995. It is a simple piece of software that allows users to freely add, remove and edit Web page content using any Web browser. It has an “open editing" concept which means that anyone can edit the content with the changes being tracked. Wikipedia is the most well known – a web based encyclopaedia. It is a really good place to go to find out definitions Whatsapp Snapchat

Chat Rooms Instant messaging Chat Rooms are websites or part of websites that provide an area for communities with common interests to chat in real time. Instant Messaging IM is a way of communicating with another individual in real time across the internet using text-based not voice communication. Chat rooms These are like communal versions of IM and can be a way to discuss a topic of interest or just keep in touch. They allow users to communicate with each other in real time (live), as opposed to the delayed time you get with e-mail. They are occasionally policed by “chat moderators” but often the moderation is very limited. A user enters a chat room, types a message into the computer, and sends it. This message is instantly displayed on the screens of the other users in the chat room. You never know who is going to be reading your messages or responding to them. During a Chat Room conversation one member may suggest having an IM. Thus changing to a one to one conversation with the related eSafety concerns Instant Messaging - you may have an IM system in your place of work! IM is a way of communicating with others and typing real-time conversations in text. It is less formal than a letter or email and can be a good way for easy collaboration. It is cheaper than long distance phone calls IM tends to be one to one with messages being exchanged in a private "chat room." Young people are very good at managing more than one message at a time and having several one to one conversations. The IM system the alerts you whenever someone on your private list is online. Many online services provide IM services i.e. Yahoo and MSM. You can setup the IM defaults to keep a record of the discussions Young people will often 'swap friends' through IM, and therefore can be chatting to strangers who they feel they trust because a ‘friend’ of a ‘friend’ knows them. IM is a very intimate form of communication - more so than a chat room with its many users, and therefore child abusers will often use this as a means to extract personal information from a young person.

Required age for Facebook registration = 13 years Social networking Based on the idea of networking with friends and friends of friends Required age for Facebook registration = 13 years Watch Video – Things Children Do Online A social network is an online community that can chat, have a notice board and generally communicate with “friends” . These networks are part of many peoples, especially the young, daily lives There are hundreds of social networking sites on the web. Some are aimed at professionals and focus on work related topics. Many other are aimed at young people and have vast populations In the UK Friends Reunited was one of the early social networking sites. It was based on shared history, such as school friends and has been used as a model for most social networks which have now evolved to incorporate a very wide and diverse group of “friends” The etiquette on these sites is to post information about yourself which is totally against ALL eSafety advice. Bebo, MySpace, facebook are not accessible in school together with any other known sites. There are many other similar sites with new ones springing up every day and it is often possible to get round most filtering to access these networks. 60% of children and young people use social networking sites to make new friends (Ofcom, 2008) 63% 8-17years olds that have a profile online use Bebo 37% - MySpace 18% _ Facebook (Ofcom, 2008)

Computer games have been around for over twenty years Computer games have been around for over twenty years. Many adults remember the Sinclair Spectrum ZX and the early games such as Manic Minor or SIM City ( the first version)? Many of our children own gaming consoles such as an X-box or Play Station which all contain multiplayer games. These are video games in which multiple people can play the same game at the same time across the internet. In multiplayer games, players either all compete against each other, or team up to achieve a common goal such as defeating an enemy that can consist of either human players or a computer. There have been a number of reports identifying the positives with gaming: In October 2004 a new report was released that praised the positive impact that games have on children, encouraging their use in education. This supports a Home Office five-year research study published in 2001 which concluded that those who play computer and video games regularly are more likely to be academically successful, are more likely to go to university and subsequently have better employment prospects. (Source: Home Office). There are however often Chat rooms, IM or social networks associated with online games which can have related eSafety concerns. Addiction can sometimes be another concern. Am I missing anything?

School Outside of school Supervised Monitored Filtered Curriculum ? Show video The Hertfordshire Grid for Learning provides a filtered access. School monitors pupils and have acceptable use policy/ pupils rules. The curriculum supports eSafety. What happens in the home?? Supervision at home important but can be difficult because our young people protect their privacy. Ideally we all should work together to provide the same message. . Schools often provide internet usage in an ‘enclosed’ environment – heavily restricted, but once children and young people are outside of school there is often limited supervision (with even less restriction when children use mobile phones)

1/3 of young people have received unwanted sexual or nasty comments Potential risks Commerce Content Contact Privacy Advertising & information Invasive software Inaccurate and harmful Adult content Illegal content Inappropriate contact Cyberbullying Sex offenders 1/3 of young people have received unwanted sexual or nasty comments Only 7% of parents think their child has received such comments. This slide highlights some of the potential online risks for children (and adults!). Users face 3 types of risks online: Commercial risks are often overlooked and viewed as simply being part of being online. Young people and adults regularly sign up for things online. Signing up often requires entering personal details. Ask your audience if anyone has read a privacy policy. Many people don’t read them as they are long and very dry documents. A privacy policy will often highlight if your information will be passed onto a third party and used for marketing purposes. If you sign up for something online and then get targeted by lots of SPAM/junk mail, generally this is as a result of your information being passed on. The Mousebreaker example here shows how adult advertising is prominent on a website frequented by young people. On the internet users face content risks – there is a lot of inaccurate information on the internet. Medical advice is given out for free but how can the writer be verified as having proper training? Minority groups gather on the internet and share biased views, children need to be taught how to be discerning readers in order to distinguish between fact and opinion. Adult content such as gambling and pornography sites are also available and entice users through aggressive advertising on other websites. Children can end up on these sites by accident, having unknowingly clicked on a advertisement. More and more young people are also at risk as a result of content that they create. Too much personal information and inappropriate images can attract unwanted attention from peers or others. It is important to be aware of the contact risks associated with the internet. Sex offenders do use the internet as a way of contacting young people. In addition, some people are choosing to abuse others using the internet and mobile technologies –this is commonly known as cyberbullying. 7

Cyberbullying Threats and intimidation Harassment or stalking . Ostracising / peer rejection / exclusion . Identity theft, unauthorised access and impersonation Publicly posting, sending or forwarding information or images Manipulation What are the differences? Cyberbullying can occur in different ways. A good reference to support this slide is available on the digizen website: http://www.digizen.org/cyberbullying/fullguidance/ 8

Differences between bullying and cyber bullying. 24/7 contact Impact Massive potential audience reached rapidly. Potentially stay online forever Perception of anonymity Profile of target/bully Some cases are unintentional Bystander effect Evidence Inherent reporting proof We are seeing a number of differences between cyberbullying and other types of bullying as highlighted in this slide. On an encouraging note, targets are able to collect evidence if they are being cyberbullied. This may be making a log of the times of anonymous calls, saving Instant Messenger conversations, printing malicious comments that have been left on websites… 9

ZIP IT, BLOCK IT, FLAG IT Advice for parents Be careful about denying access to the technology Discuss cyberbullying with your children - always respect others - treat your passwords with care - block/delete contacts & save conversations - don’t reply/retaliate - make sure you tell Report the cyberbullying - school - service provider - police ZIP IT, BLOCK IT, FLAG IT If you do think that a child in your care is the target of cyberbullying you can take action. Be careful that you are not punishing the target of cyberbullying. Children may feel reluctant to tell adults they are the victim of cyberbullying if they think that their mobile phone or access to online services may be taken away from them. In this way they may feel they are being punished for something that is not their fault. Try to get involved and understand the services or applications children are using. This will help you to better support them if things go wrong. It may also provide an opportunity for your children to show you what they know about the services and how they keep themselves safe whilst using them. Discussion about cyberbullying is extremely important. These 6 points below are the key strategies and advice for young people and should be discussed with children to ensure they are aware of what to do in order to prevent cyberbullying from occurring or responding to it if it does occur. Finally, know that you can report this behaviour to a number of places. Each school has an anti-bullying policy that is designed to deal with all sorts of bullying and they should provide you with information and support in this situation. The providers of technology have responsibilities to ensure that users are safe and do have policies in place for user’s protection. And if the bullying is serious or you need help in identifying the bully then the police may be called upon to help resolve the situation. It is sometimes helpful for young people to know that the criminal age of responsibility is 10 – therefore if they are harassing or threatening anyone (as seen in the film) they are legally responsible for their own actions. 10

Electrical devices outside of school (mobiles and more) Know how your child’s device works (e.g. Bluetooth, Internet access) Agree the type of content that you would be happy for them to download, knowingly receive or send on to others Encourage balanced use – switching off at mealtimes, bedtime. SEE E-SAFETY RESOURCES Mobile phones should be treated in the same way as computers as they have many of the same compatibilities, however some other considerations should be made for these specific communication devices. 11