Presentation is loading. Please wait.

Presentation is loading. Please wait.

Welcome! This presentation is all about children and young people using new technology safely We know that many parents and carers feel that there is a.

Similar presentations


Presentation on theme: "Welcome! This presentation is all about children and young people using new technology safely We know that many parents and carers feel that there is a."— Presentation transcript:

1 Welcome! This presentation is all about children and young people using new technology safely We know that many parents and carers feel that there is a gap between their own understanding of the technologies and that of their children. Question - Why do we and our young people use ICT? We all have our own reasons for using ICT and here are some of them – Click presentation for the callouts to appear E-Safety

2 Which of these technologies do you use?
Mobile phones Instant messaging BLOGS Social networking Music Download sites Gaming consoles/ sites Podcasting Wikies Chat Rooms Video broadcasting P2P file-sharing This slide identifies some of the technologies currently being used by our children and young people. What Next ??? New technologies are continuing to evolve and will probably link location to the user which will raise many eSafety issues. We need to ‘watch this space’! The following slides look at some of these technologies in greater detail to help clarify understanding. The following do not have slides but here are the definitions if needed: – many adults used as part of their daily life. Wiki ( Hawaiian word meaning quick) – First Wiki was in It is a simple piece of software that allows users to freely add, remove and edit Web page content using any Web browser. It has an “open editing" concept which means that anyone can edit the content with the changes being tracked. Wikipedia is the most well known – a web based encyclopaedia. It is a really good place to go to find out definitions Whatsapp Snapchat

3 Chat Rooms Instant messaging
Chat Rooms are websites or part of websites that provide an area for communities with common interests to chat in real time. Instant Messaging IM is a way of communicating with another individual in real time across the internet using text-based not voice communication. Chat rooms These are like communal versions of IM and can be a way to discuss a topic of interest or just keep in touch. They allow users to communicate with each other in real time (live), as opposed to the delayed time you get with . They are occasionally policed by “chat moderators” but often the moderation is very limited. A user enters a chat room, types a message into the computer, and sends it. This message is instantly displayed on the screens of the other users in the chat room. You never know who is going to be reading your messages or responding to them. During a Chat Room conversation one member may suggest having an IM. Thus changing to a one to one conversation with the related eSafety concerns Instant Messaging - you may have an IM system in your place of work! IM is a way of communicating with others and typing real-time conversations in text. It is less formal than a letter or and can be a good way for easy collaboration. It is cheaper than long distance phone calls IM tends to be one to one with messages being exchanged in a private "chat room." Young people are very good at managing more than one message at a time and having several one to one conversations. The IM system the alerts you whenever someone on your private list is online. Many online services provide IM services i.e. Yahoo and MSM. You can setup the IM defaults to keep a record of the discussions Young people will often 'swap friends' through IM, and therefore can be chatting to strangers who they feel they trust because a ‘friend’ of a ‘friend’ knows them. IM is a very intimate form of communication - more so than a chat room with its many users, and therefore child abusers will often use this as a means to extract personal information from a young person.

4 Required age for Facebook registration = 13 years
Social networking Based on the idea of networking with friends and friends of friends Required age for Facebook registration = 13 years Watch Video – Things Children Do Online A social network is an online community that can chat, have a notice board and generally communicate with “friends” . These networks are part of many peoples, especially the young, daily lives There are hundreds of social networking sites on the web. Some are aimed at professionals and focus on work related topics. Many other are aimed at young people and have vast populations In the UK Friends Reunited was one of the early social networking sites. It was based on shared history, such as school friends and has been used as a model for most social networks which have now evolved to incorporate a very wide and diverse group of “friends” The etiquette on these sites is to post information about yourself which is totally against ALL eSafety advice. Bebo, MySpace, facebook are not accessible in school together with any other known sites. There are many other similar sites with new ones springing up every day and it is often possible to get round most filtering to access these networks. 60% of children and young people use social networking sites to make new friends (Ofcom, 2008) 63% 8-17years olds that have a profile online use Bebo 37% - MySpace 18% _ Facebook (Ofcom, 2008)

5 Computer games have been around for over twenty years
Computer games have been around for over twenty years. Many adults remember the Sinclair Spectrum ZX and the early games such as Manic Minor or SIM City ( the first version)? Many of our children own gaming consoles such as an X-box or Play Station which all contain multiplayer games. These are video games in which multiple people can play the same game at the same time across the internet. In multiplayer games, players either all compete against each other, or team up to achieve a common goal such as defeating an enemy that can consist of either human players or a computer. There have been a number of reports identifying the positives with gaming: In October 2004 a new report was released that praised the positive impact that games have on children, encouraging their use in education. This supports a Home Office five-year research study published in 2001 which concluded that those who play computer and video games regularly are more likely to be academically successful, are more likely to go to university and subsequently have better employment prospects. (Source: Home Office). There are however often Chat rooms, IM or social networks associated with online games which can have related eSafety concerns. Addiction can sometimes be another concern. Am I missing anything?

6 School Outside of school
Supervised Monitored Filtered Curriculum ? Show video The Hertfordshire Grid for Learning provides a filtered access. School monitors pupils and have acceptable use policy/ pupils rules. The curriculum supports eSafety. What happens in the home?? Supervision at home important but can be difficult because our young people protect their privacy. Ideally we all should work together to provide the same message. . Schools often provide internet usage in an ‘enclosed’ environment – heavily restricted, but once children and young people are outside of school there is often limited supervision (with even less restriction when children use mobile phones)

7 1/3 of young people have received unwanted sexual or nasty comments
Potential risks Commerce Content Contact Privacy Advertising & information Invasive software Inaccurate and harmful Adult content Illegal content Inappropriate contact Cyberbullying Sex offenders 1/3 of young people have received unwanted sexual or nasty comments Only 7% of parents think their child has received such comments. This slide highlights some of the potential online risks for children (and adults!). Users face 3 types of risks online: Commercial risks are often overlooked and viewed as simply being part of being online. Young people and adults regularly sign up for things online. Signing up often requires entering personal details. Ask your audience if anyone has read a privacy policy. Many people don’t read them as they are long and very dry documents. A privacy policy will often highlight if your information will be passed onto a third party and used for marketing purposes. If you sign up for something online and then get targeted by lots of SPAM/junk mail, generally this is as a result of your information being passed on. The Mousebreaker example here shows how adult advertising is prominent on a website frequented by young people. On the internet users face content risks – there is a lot of inaccurate information on the internet. Medical advice is given out for free but how can the writer be verified as having proper training? Minority groups gather on the internet and share biased views, children need to be taught how to be discerning readers in order to distinguish between fact and opinion. Adult content such as gambling and pornography sites are also available and entice users through aggressive advertising on other websites. Children can end up on these sites by accident, having unknowingly clicked on a advertisement. More and more young people are also at risk as a result of content that they create. Too much personal information and inappropriate images can attract unwanted attention from peers or others. It is important to be aware of the contact risks associated with the internet. Sex offenders do use the internet as a way of contacting young people. In addition, some people are choosing to abuse others using the internet and mobile technologies –this is commonly known as cyberbullying. 7

8 Cyberbullying Threats and intimidation Harassment or stalking .
Ostracising / peer rejection / exclusion . Identity theft, unauthorised access and impersonation Publicly posting, sending or forwarding information or images Manipulation What are the differences? Cyberbullying can occur in different ways. A good reference to support this slide is available on the digizen website: 8

9 Differences between bullying and cyber bullying.
24/7 contact Impact Massive potential audience reached rapidly. Potentially stay online forever Perception of anonymity Profile of target/bully Some cases are unintentional Bystander effect Evidence Inherent reporting proof We are seeing a number of differences between cyberbullying and other types of bullying as highlighted in this slide. On an encouraging note, targets are able to collect evidence if they are being cyberbullied. This may be making a log of the times of anonymous calls, saving Instant Messenger conversations, printing malicious comments that have been left on websites… 9

10 ZIP IT, BLOCK IT, FLAG IT Advice for parents
Be careful about denying access to the technology Discuss cyberbullying with your children - always respect others - treat your passwords with care - block/delete contacts & save conversations - don’t reply/retaliate - make sure you tell Report the cyberbullying - school - service provider - police ZIP IT, BLOCK IT, FLAG IT If you do think that a child in your care is the target of cyberbullying you can take action. Be careful that you are not punishing the target of cyberbullying. Children may feel reluctant to tell adults they are the victim of cyberbullying if they think that their mobile phone or access to online services may be taken away from them. In this way they may feel they are being punished for something that is not their fault. Try to get involved and understand the services or applications children are using. This will help you to better support them if things go wrong. It may also provide an opportunity for your children to show you what they know about the services and how they keep themselves safe whilst using them. Discussion about cyberbullying is extremely important. These 6 points below are the key strategies and advice for young people and should be discussed with children to ensure they are aware of what to do in order to prevent cyberbullying from occurring or responding to it if it does occur. Finally, know that you can report this behaviour to a number of places. Each school has an anti-bullying policy that is designed to deal with all sorts of bullying and they should provide you with information and support in this situation. The providers of technology have responsibilities to ensure that users are safe and do have policies in place for user’s protection. And if the bullying is serious or you need help in identifying the bully then the police may be called upon to help resolve the situation. It is sometimes helpful for young people to know that the criminal age of responsibility is 10 – therefore if they are harassing or threatening anyone (as seen in the film) they are legally responsible for their own actions. 10

11 Electrical devices outside of school (mobiles and more)
Know how your child’s device works (e.g. Bluetooth, Internet access) Agree the type of content that you would be happy for them to download, knowingly receive or send on to others Encourage balanced use – switching off at mealtimes, bedtime. SEE E-SAFETY RESOURCES Mobile phones should be treated in the same way as computers as they have many of the same compatibilities, however some other considerations should be made for these specific communication devices. 11


Download ppt "Welcome! This presentation is all about children and young people using new technology safely We know that many parents and carers feel that there is a."

Similar presentations


Ads by Google