Download presentation
Presentation is loading. Please wait.
Published byAustin Tyler Modified over 8 years ago
1
Internet Safety
2
Online Concerns: Contact Content Conduct
3
Inappropriate Contact
4
Exchanging emails, instant messages, text messages, etc. with strangers.
5
Accepting anyone and everyone as “friends.”
6
Not every one on the Internet is who they say they are.
7
Predators are going through social networking sites and chat rooms like catalogs, looking for information posted by children and teens. Online Predators
8
Safe Communication Communicate only with those known and trusted in real life. Relatives School friends Neighbors Church friends
9
Inappropriate Content
10
Content from Searches Accidental or intentional ? Sexually explicit material, images Promotion of hate, intolerance Dangerous/Illegal activities Pop-up Advertisements
11
Content from Peers Messages Photos Material forwarded from other people, sources
12
None Limited Unrestricted Internet Explorer 1 2 3 4 5 6
13
www.google.com/preferences or
15
Monitoring Software enables you to know what children are doing online. Filtering Software restricts internet access to certain sites that contain nudity, violence, and offensive language.
16
PHOTOS Can go viral. Should get permission from subject(s) before posting. Can have long-lasting impact on reputation.
17
Risky and Inappropriate Conduct
18
Leaving settings on Public instead of changing to Privacy.
19
Posting too much personal information online. Full name Address Telephone number Email address etc.
20
Sharing passwords with friends. Passwords and screen names should be given to parents.
21
Cyberbullying
22
Definition When the Internet, cell phones, or other electronic devices are used to intentionally and repeatedly hurt, embarrass, humiliate, or threaten another person. Cyberbullying is the most common online risk young people face. (Palfrey, Boyd, Sacco, 2009)
23
Roles Involved In Cyberbullying Cyberbully Victim Often seen as different. (social status, race, religion, clothes, disability, weight, etc.) Bystander Upstander
24
Cyberbullying can be: Threats of physical harm Mean, negative, cruel comments Spreading rumors, gossip A fake profile of another person Embarrassing photos spread online Online polls, surveys
25
Issues Related to Cyberbullying False sense of anonymity More bold online Information goes viral Hinduju and Patchin, 2009
26
Tips for Handling Cyberbullying
27
Don’t respond or retaliate. Block the cyberbully. Save evidence such as emails, text messages, pictures, etc. from the cyberbully. Report it! First, try to ignore the messages.
28
Parent Strategies
29
Most Effective Parent Strategy: Parent knowledge and supervision. What sites can they visit? Who can they talk to online? How long will they be online?
30
Communication Start at an early age. Focus on two-way communication. Stress family values are also for online lives. Let them show you what they do online. Let them teach you what you don’t know.
31
Place the computer in a common area of the home, not in bedrooms or secluded areas.
32
Teach children to keep personal information private.
33
“We cannot guarantee that only authorized persons will view your information.” “We cannot ensure that information you share on Facebook will not become publicly available.” From Facebook’s Privacy Policy
34
Know children’s passwords and screen names.
35
Teach children to tell a parent, teacher, guidance counselor or other trusted adult if anything happens on the Internet that makes them feel scared or uncomfortable.
36
Questions, Comments
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.