Download presentation
Presentation is loading. Please wait.
Published byReese Joslyn Modified over 10 years ago
1
E Safety Dorothy Stringer School
2
E Safety E safety is normal safety the difference is the knowledge gap
3
The Need for this presentation!! Parents Children The Gulf of Internet Knowledge Bridging the gap of knowledge around the internet E Safety
4
Benefits of the internet Educational games and programmes Research information The opportunity to communicate with people from all around the world The opportunity to share resources and ideas with people that have the same interests Shopping around the world without leaving your computer
5
Risks of using the internet Paedophiles use the internet to meet young people People lying to others online Bullying using the internet (Cyberbulling) Seeing inappropriate images and material Viruses and pop ups
6
E Safety Do you know what these are?
7
E Safety Do you know what thesecan do?
9
BEBO 13 & older HABBO 13 & older FACEBOOK 13 & OLDER BUT MUST BE A MEMBER OF COLLEGE OR SCHOOL IF UNDER 18 MYSPACE 14 & older
10
Why is education so important in this area? Sources CEOP Questionnaire Analysis 2007 55% access the internet everyday 47% for an hour or more 21% liked IM/Chat the most 15% used gaming sites 11% used Social Networking sites 33% had access in their bedrooms 25% have met someone offline – one quarter of these did not take anyone with them. of the three quarters who did 83% took a friend not a trusted adult.
11
E Safety Do you know what the problems are?
12
Do you know how to make your child safer? Education of pupils rather than locks Know how to lock down a computer Monitor your childs usage Report buttons
16
Report Abuse This link is on our website Microsoft have made a real commitment Approx £30,000 per month revenue lost from advertising in this space
17
Things to watch out for Here are some common signs of grooming that you should be aware of. It doesnt mean that your child is being groomed, but signs to look out for if youre worried: Excessive use of the computer Aggressive behaviour regarding internet usage Secretive behaviour Change in use of sexual language
18
Advice to Parents Help your children to understand that they should never give out personal details to online friends - personal information includes: –their messenger id –email address –mobile number and any pictures of themselves, If your child receives spam / junk email & texts, remind them never to believe them, reply to them or use them.
19
Advice to Parents Know what your children are doing online Ask them to teach you to use any applications Keep the computer in a family room - this means you can keep more control of what they do (i.e. Webcams)
20
Bullying – Cyber Bullying Same as normal bullying, but totally traceable The use of ICT (particularly mobile phones and the internet) deliberately to upset someone else Digizen.org
21
How does it differ from normal bullying? Invasion of personal space 24/7 Size of the audience and the number of unwitting bullies Less empathy (not face to face)
22
Cyber Bullying - Advice Same as normal bullying, but totally traceable Never rise to nastiness. Block it and report it. Remove people from your friends and if necessary, report them to the people that run the website. Adjust your privacy settings so that only people you choose can see your profile. Make yourself un-findable in searches and set your profile to private if you want. Think about what you post. Only write things online that you would say to someone's face. You don't have to join in on forwarding embarrassing stuff.
23
Tell the company that provides your msn account, internet access or mobile phone about the problems you are having. They have systems in place to take action. What can you do about it?
24
NEVER REPLY OR RESPOND TO THE BULLY What can you do about it?
25
TELL SOMEONE WHAT IS GOING ON What can you do about it?
26
TELL SOMEONE WHAT IS GOING ON What can you do about it?
27
Keep records of the bullying so that it can be investigated Get a new account
28
Know how to make a screen shot Know how to print emails with headers Use block or report buttons
29
MOBILEPHONES
30
Mobile Technology Very easy to conceal – can be used all the time Very traceable! Easily record evidence Easily stolen!
31
*#06# I.M.E.I. NUMBER International Mobile Equipment Identity
32
E Safety Dorothy Stringer School http://www.thinkuknow.co.uk/parents/ http://www.bbc.co.uk/radio1/bullyproof/beclever/ http://www.bbc.co.uk/iplayer
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.