Social Networking Sites Trends Resources Challenges Dangers Preservation & Collection 2C3CONF07-EC.

Slides:



Advertisements
Similar presentations
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
CyberSafety School of the Incarnation HSA Meeting November 13, 2007.
Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Keeping Your Child Safe on the Internet
Keeping Your Child Safe on the Internet.  To understand what our children are doing online  To keep our children safe when they’re online  To teach.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
I. S. W. M.It Starts With Me Cyber Communication Awareness.
INTERNET SAFETY.
INTERNET SAFETY and Social Networking
$100 $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $200 $300 $400 $500.
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
How to keep your kids safe online
Children online: Risks they might face Awareness raising session – Secondary.
CYBERBULLYING INFORMATION AND PREVENTION August 2009.
 Grades 5-8 – 56 out of 66 – 85%  Grades 9-12 – 79 out of 85 – 93%  Grades 5-12 – 135 out of 151 – 89%  100% of the Juniors and Seniors use a social.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Internet Safety By: Caitlyn Stevenson. Information about Internet Safety  The internet is a huge deal, any child that can press a few letters on a keyboard.
Smart and Safe in Cyberspace Social Networking 101 National Crime Prevention Council 2006.
Being Good Digital Citizens with Today’s Technologies.
ONLINE PREDATORS: HOW SAFE ARE WE? A PHOTO PRESENTATION BY: MICHELLE OCASIO & BRIANNA PEREZ.
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
Awareness raising session for Parents and Carers.
CyberSafety A Lesson in CYBERWORLD Culture, Customs, Culture, Customs, Language, and Safety.
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
1 Internet Safety By: Nicole Sutton, Kenny Messinger, and Emily Whitman.
What is Social Networking? Social networking sites provide teens and young adults with a virtual environment where they share stories, pictures, videos,
Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children.
Kara LaRose, School Counselor Willow Dale Elementary School
Internet Safety How to keep your children safe as they use the web.
A curriculum waiting to happen. Agenda  Survey Says!  7 Topics of Internet Safety  In School Presentation  Sample Cyberbulling  And other resources.
Improving the Visibility and Marketability of Your Web Site Giovanna Genard, marketing.
E.H.M.S. Parent/Guardian Workshop Internet Safety (In conjunction with E.H.M.S. Open House) When: Wednesday, September 19 th 8:00-8:30 pm Where: E.H.M.S.
Fil Santiago Director of Staff Development and Technology West Orange Public Schools.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
INTERNET SAFETY Tips for becoming a “surfer” dude!
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
Internet Safety Social Networking & Cyber Bullying.
 What are the risks?  Technologies your children use  Tips for protection  Advice and help  Questions? Topics.
August 24 th 2011 Digital Citizenship. Cell/Smart phones Slates and Tablets Social Network Sites Video Conferencing Online Gaming.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Lesson 4: Taking Perspectives on Cyberbullying THE CYBER BULLYING VIRUS
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Teens, Social Networks & Safety An Overview Amanda Lenhart Family Online Safety Institute Launch February 13, 2007 Washington, DC.
Internet Safety How To Keep Your Children Safe As They Use The Web.
Online Safety Parent Workshop Helping to keep your children safe online.
INTERNET SAFETY Sergeant Karl Youngblood Barbara Burchard Information adapted from the
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Dangers of Online Media and Social Networking By: Micah Cochrane Maurice Gamble Shenne Howell Elvyn Morales.
Parent Workshop OnlineSafety. Computer Safety Quiz.
T HINK ! Before You Post A lesson on Internet Safety Source:
MySpace & Facebook By Veronica Baca. MySpace Tom Anderson August 2003 Social Networking Website Free service Required Age: 14 & over A virtual community.
ONLINE PREDATORS: HOW SAFE ARE WE? A PHOTO PRESENTATION BY: MICHELLE OCASIO & BRIANNA PEREZ.
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
3 Internet Basics Internet is a collection of local, regional, national and international computer networks that are linked together to exchange data.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
E-safety Helping your children stay safe on-line A presentation for Parents.
Cybersafety 4 Kids: Smart Moves in an Online World.
Quotation about Anger and Violence. “Violence kills so many Americans and sends so many others into the healthcare system that we must consider it a public.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
NO! NO! You can not get the questions until the end of the Power Point!
Are your children safe online?. Welcome You are first-generation Internet parents Our children are the first generation to be born and raised with the.
GOSSIP and CYBERBULLYING
Tips and Information for Parents
Jeopardy iT Final Jeopardy iT $100 $100 $100 $100 $100 $100 $200 $200
SOCIAL MEDIA: ARE YOU PLAYING IT SAFE?.
Intervention and Prevention
GOSSIP and CYBERBULLYING
Presentation transcript:

Social Networking Sites Trends Resources Challenges Dangers Preservation & Collection 2C3CONF07-EC

4 Social Networking Site –Place where people create and share information with each other “Virtual communities” –An “online local hangout” where like minded people meet C3CONF07-EC

5 MySpaceFacebookHi5XangaLivejournalFriendsterYahoo 360 MSN Spaces TaggedPiczoYoutubeFlickrFrapprZogo.comMeebo Club Penguin 5C3CONF07-EC

6 Risk of being judged is diminished Greater opportunity to find “like minded” people Unlimited number of people in your community – Socialize with people throughout the world SNS is a place to be found! C3CONF07-EC

Users can post personal information -name, location, age, school, interests Friends Communication between users Blog or Journal Can create and upload content - photos, videos, music 7C3CONF07-EC

8 Although Blogs are [essentially] thoughts or comments added to a user’s page, it offers a lot more: Updated regularly (Time & Date Stamped) –How valid is this information Friends tend to share more information about you than you had intended on others knowing Great tool for acquiring information about a person –(by friend or foe) Provides for an endless link to other possible victims. C3CONF07-EC

Social Networking Sites (SNS) Distribution of Child Pornography – Self created images Defamatory Websites Use of Anonymizers Craigslist – Teenage Prostitution 10C3CONF07-EC

Pew Internet Survey, % of online teens keep a blog 38% of teens read the blogs of others Older girls lead the blogging activity Teen bloggers are tech-savvy & heavy internet users 11 C3CONF07-EC

12 1 As of Sept C3CONF07-EC

13 – In 2006, one (1) in seven (7) children received unwanted online requests: – Engage in sexual activities – Provide intimate sexual information. – “No decrease” in aggressive sexual solicitations (where the solicitor asked to meet the child in person, called the child on the phone, or sent the child mail, money, or other gifts offline-compared to a 2000 study) – In more than half of the cases, the child did not tell anyone. Online Victimization: Five Years Later, 2006 C3CONF07-EC

14C3CONF07-EC

15 1.Abuser data based upon victim information submitted to NCMEC by law enforcement, as of March 31, “Unknown to Child” includes un-established relationships, i.e. photographers, child sex tourism, runaways, etc. 3.“Online Enticement” includes either (1) victims who met a perpetrator online and transmitted self-produced images or (2) victims and offenders who met online and then met offline, producing images. 4.“Self-produced” includes those victims who have produced and distributed images of themselves C3CONF07-EC

16 Online Victimization: Five Years Later, 2006 Victim Age C3CONF07-EC

How does anonymous surfing work? A proxy server facilitates communication between a computer and a web site. Your computer communicates with an anonymous proxy server, and the anonymous proxy server speaks to the web site. Locally, it appears that your computer only communicated with the proxy server. 18 C3CONF07-EC

Proxy Servers Proxy server is a server that retrieves Web pages for you, providing only its own identity to the sites it visits. Requesting data comes first to the proxy, and through the requested proxy, the data is transmitted to you. 19C3CONF07-EC

Block incoming traffic from the site you wish to block. 20C3CONF07-EC

PrivacyExposure Graphic Images PredatorsProstitutionI.D. TheftCyberbullying Internet 22C3CONF07-EC

Electronic Bathroom Wall Fourteen year old girl reports the existence of a slanderous SNS In addition to graphic pornography, the child’s real name, cell phone number and location are prominently displayed 23C3CONF07-EC

24C3CONF07-EC

Exposure to Inappropriate Material Gangs Teen Violence 25C3CONF07-EC

Cyberbullying Craigslist – Prostitution Online gaming – XBOX/360 – PSP/3 – Wii – WOW (World of Warcraft) – Everquest Virtual Lives – Second life Mobile Technology – Mobile Messaging – Disposable Phones 26C3CONF07-EC

28 – Public information: Any information which is available for all to see Blog entries, images, user comments, friend lists, and public profile –Make an electronic copy of publicly available content Preserve/Save questionable material to a file C3CONF07-EC

Preservation & Collection –Screen Capture Cut, Copy, Paste Software –Preservation Letter Letter directed to company which you want to preserve info. –Web Site Archive Capture an entire website –Web Browser Use of other browsers reveal more information 29C3CONF07-EC

Internet Explorer Firefox 30 Firefox C3CONF07-EC

Print Screen – Located on keyboard – Captures image of what is currently displayed on screen – Placed in clipboard – When pressed, nothing seems to happen, but “ctl-V” will paste image 31C3CONF07-EC

Time of Retention vary between the ISPs 33 IP AddressPrivate MessagesDeletedUser Title MySpace90 DaysInbox=User Sent= 14 Days Trash=30 Days Profile= 10 Days IP Logs= up to 90 Days PM= unavailable Friend ID Xanga FaceBook30 DaysUser/Group ID CraigslistIf detected by staff or reported by users= Indefinitely beginning 2000 Must have “Post ID” and/or address Post ID Comcast180 DaysN/A IP Address C3CONF07-EC

Technology Familiarity Lack of understanding by those required to protect children Investigative Techniques & Strategies Same strategies employed: L.E. School Admin Vigilantes Predators Children Antiquated Laws Laws do not accurately fit the crime when dealing with computer/internet related offenses. 35C3CONF07-EC

36 Diminished expectation of privacy People tend to share more information online than in person Gain insight into motives Identify additional persons involved Viewing their “friends” and/or “buddy list” People who use the internet tend to use the same screen name Use of a similar screen name is common Check through various i.e. Xanga, FaceBook, Tagged,Yahoo, Gmail, etc. C3CONF07-EC

38 National Center for Missing and Exploited Children – 2 SMRT 4U™ – Don't Believe the Type – HDOP: Help Delete Online Predators – NetSmartz – NetSmartz 411 C3CONF07-EC

39 National Center for Missing and Exploited Children – 24 Hour hotline THE-LOST – CyberTipLine: Federal Law Enforcement Federal Bureau of Investigation Postal Inspectors Office Immigrations and Customs Enforcement Secret Service **Internet Crimes Against Children Task Force (ICAC)** C3CONF07-EC

40C3CONF07-EC

41C3CONF07-EC