Download presentation
Presentation is loading. Please wait.
1
Keller Police Department Keller ISD Technology
Cyber Home Keller Police Department Keller ISD Technology Good Evening. We are glad that you are joining us this evening. Lisa Ham Detective Tom Barnett of the Keller Police Department
2
Cyber Safety @ Home Topics
Parent-Child Technology Gap Cyber Activities Cyber Risks Warning Signs Parent Tips Cyber Predators What to do if you are a victim These are the topics that we will be talking about tonight.
3
Parent-Child Generation Gap
Parents’ Beliefs 87% say they have established rules for their kids Internet use 54% feel they are limited to monitor and shelter their kids from inappropriate material 69% feel they know a lot about what their kids do on the Internet 31% have disciplined their child because of their Internet use i-SAFE survey of 4,500 Lisa
4
Parent-Child Generation Gap
Students’ Reality 36% say parents/guardians have NOT made rules 41% do NOT share what they do and where they go 29% say their parent/guardian would disapprove of internet activities 36% have NOT discussed how to be safe on the Internet with their parent/guardian 22% say the computer they use most often is in their room 73% say there is a need for kids and teens to learn about Internet safety i-SAFE survey of 55,000 students Lisa
5
Cyber Activities Text Messaging Email
Blogging – MySpace, Xanga, Facebook Instant Messaging Chat Rooms FTP- File Sharing – Limewire Online Game Consoles – Wii, PS3 Lisa Text Messaging – Cell phone Blogging – Web Log – Common weblog pages are MySpace, Xanga, Facebook - Social networking website. Tom will talk about these later. Instant Messaging – IM- MSN, Yahoo, AOL– text messages that are delivered in real time. Chat Rooms - online forum where people can chat online in real time. FTP – File Sharing – security risk for your computer.
6
Know the Language Acronyms – BRB Initialisms – L8R
Emoticons - :) <3 Netlingo – Leetspeak – !337$p34k |-|4/\/\ Lisa Acronyms- many of these are in your program Initialisms – they are initials but they are pronounced Emoticons – use symbols to create pictures Leetspeak - user replaces regular letters with other keyboard characters to form words phonetically. Many times numbers and symbols replace the letters they resemble.
7
Cyber Risks Privacy & Identity - Cookies Email Attachments - Viruses
Sharing of Personal Info - Teresa Identity Theft/Fraud– common scams Copyright Violation Bullying and Harassment Cyber Predators Inappropriate content Tom Privacy - Most common offenses occur when people and organizations get information about you, sometimes without you realizing that it has happened. Cookies - A cookie is a small file of information that web sites send to and from your browser to help the web site know where you’ve been and what you’ve done. Often these cookies are useful to you. They keep track of whether or not you’ve signed into a service on the web, or the stage you are in when making a purchase online. These cookies can also be used to track your movement on the web, and provide information to others that you may not want to share, like what sites you’ve browsed, what you have bought, or to whom you have given your credit card information. - send unwanted pictures and information, viruses and scams – Open unsolicited Sharing of Personal Information – Be careful what types of things that you post about yourself and others. Never post a picture of your self online. Identity Theft- a person gets information about you and poses as you. Internet Fraud – Tom will talk about this later Copyright & Intellectual Property violation – music, copying and pasting text and photos for a report. Cyber Predators
8
Warning Signs Child spends large amount of time online
You find pornography on the computer Your child is receiving phone calls, gifts or mail from people you don’t know Your child turns off the monitor when you come in the room Your child is withdrawn from the family Amy’s Choice Lisa Watch for these signs.
9
Tips for Parents Computer in the family room Observe online behavior
Set guidelines – No personal information Understand services used by your child Investigate blocking services and monitoring software Spend time online with your child Model appropriate netiquette Learn about who your child meets online Know their passwords Lisa Internet experience is not Life experience. Parents need to know what their children are doing online. This will protect the children and your computer. Tips from the Police – know their username and password. Set guidelines amount of time spent online types of sites they can visit giving out personal information posting pictures who they talk to online
10
Why is the Internet so attractive to criminals?
There are many reasons: Access to the internet is relatively unrestricted Online activities are unregulated Criminals can maintain anonymity Large number of targets Difficult to investigate or prosecute Multi-million dollar industry There are many reasons why the internet is so attractive to criminals. Amy’s Choice is a video about a lonely young girl who gets involved in an online relationship. Internet Porn is a $2.84 Billion business There are no laws to prosecute against ebay fraud. yet
11
What to do if you are a victim. . .
Take Action Call the Police Department Keep the evidence Cancelled checks, money order stubs, credit card receipts, telephone bills, mailing envelopes, brochures, faxes, mailing receipts Paper receipts, printouts of electronic receipts, printouts of chat rooms, printouts of When requested to provide evidence, send only copies and retain originals The Internet Fraud Complaint Center Tom
12
Cyber Predators Befriend children Determine their likes and dislikes
Break down their inhibitions Entice the child into having sex Send money/tickets to the child
13
Where does the solicitation take place?
Computer Location 70% at home 22% someone else’s house 4% school 3% library Internet 65% Chat rooms 24% Instant Messaging
14
What to do if you are approached online?
Contact an adult – parent, counselor, school resource officer Do not erase conversations Know address and user name Do not initiate another conversation Tom
15
Keller ISD N2H2 Internet Filtering Professional Development
Presentations to teachers and counselors Student Training Developing Elementary Curriculum Computer Literacy courses Internet Safety Week -May 8-12 Parent Training Brochures available PTA Meetings Lisa
16
Other Resources Internet Safety Resources
The National Center for Missing and Exploited Children Netsmartz I Safe Office of the Attorney General of Texas Lisa There are many online resources available on the topic. These are just a few
17
Who to Call Keller Police Department Keller ISD Detective Tom Barnett
Keller ISD Joe Griffin, Executive Director of Technology Lisa Ham, Director of Instructional Technology Lisa This is our contact information if you have questions or concerns.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.