Enter Your Child’s Cyber World

Download Report

Transcript Enter Your Child’s Cyber World

Enter
Your Child’s
Cyber World
Internet
Safety
Our thanks to:
James Baird, CISSP with GBI
Osborne Middle School Technology Team
Enter Your Child’s Cyber World
Enter Your Child’s Cyber World
LOL = Laughing Out Loud
F2T = Free To Talk
LV = Leave
H8 = Hate
WAN2 = Want to?
POS = Parent Over Shoulder
PAW = Parents Are Watching
WTGP = Want To Go Private
WYGOWM = Will You Go Out With Me?
http://www.acronymfinder.com
See Packet
Characteristics of Some Youth
May Facilitate Victimization
Lack of emotional maturity
Strong desire for attention, validation, and
affection
Naturally curious about sex, “forbidden”
topics
May be rebellious and enjoy defying authority
Easily impressed, manipulated and
intimidated
Youth lacking adult supervision
Students’ Basic Online Behavior
80% of students spend at least one hour per week on the
Internet
11% of students spend over 8 hours per week on the
Internet
12% of students say they spend more time on the Internet
than with friends
30% of students say e-mail, chat rooms, or Instant
Messaging is the main way they stay in contact with their
friends
38% of students feel more free to do what they want on the
Internet
31% of students say it is easier to talk with people on the
Internet than in real life
29% of students use chat rooms, with a peak usage of 45%
occurring in grade 7
Based on i-SAFE America surveys of 19,000 students
The Parent-Child Gap
PARENTS
vs.
YOUTH
92% stated they had established rules for the
child’s Internet use.
vs.
35% said that they did not have rules for
Internet usage.
54% acknowledged that there was a need
for more rules.
54% feel they are limited to monitor and
shelter children from inappropriate material
on the Internet.
vs.
53% stated that they would prefer to be
alone when surfing the Internet.
90% feel they have a good idea of what their
child does while on the Internet.
vs.
14% stated their parents had no idea where
they go and 34% said they do not share
what they do or where they go on the
Internet with parents.
11% said their child’s computer was in the
child’s room. 75% said it is in the family area.
vs.
21.5% of the students said that the
computer they use most often is in their
room.
This goes up with age, 26% for 8th grade
and 31% for 12th grade.
46% feel they have more freedom on the
Internet than in the real world.
vs.
37% felt they have more freedom and, 18%
felt safer on the Internet than in the real
world.
When asked “why?” 52% cited anonymity &
29% mentioned lack of laws/rules.
*Taken from an i-SAFE America survey of students nationwide.
Teen Promises
Internet Predator Profile
Typically married adult with children
Normal neighbor
Usually has a successful career in an
upper-management position
College graduate, possibly post-graduate
degree
Upper, middle-class lifestyle
Usually 35 or older
Usually white
Will offend again
Students’ Risky Online Behavior
55% of students admit giving their personal information
(name, sex, age, etc.) over the Internet
52% of students prefer to be alone while on the Internet
40% of students have visited inappropriate places on
the Internet
10% of students feel it is okay to post their picture on
the Internet
10% of students have met someone face-to-face that
they previously met on the Internet
25% of students believe there is nothing wrong with
chatting to strangers online
21% of students say after getting to know someone
better on the Internet, they would believe them when
they tell their age
http://www.netsmartz.org
"Tracking Teresa"
Even though Teresa has tried not to reveal
personal information online, she’s left
enough clues that she could find herself in
danger.
http://www.netsmartz.org/resources/reallife.htm#realAmy
Chat Rooms – Virtual Parks
No longer the guy with the trench coat waiting to
kidnap the child
Can sit anywhere and talk to several children at
one time at different locations
Used to gain child’s trust and set up sexual
meetings
Used to send pornographic images
They will send the child porn, getting more
explicit each time
They will try to convince the child that everybody
is doing this and that it is normal
Chat Rooms
Predators often snoop around child
chat rooms for potential victims.
They use various methods to get
close to children but even if a child is
not receptive to the predators
advances, he can still harass and
endanger the child by searching for
information about the child.
Countermeasures for Predators
Use parental controls (if available)
Monitor child’s actions on the internet
Discuss appropriate internet activities
Purchase NetNanny ($40) or similar
Caution children about predators
Limit the time child spends on a computer.
Use software that creates a log of sites visited and every
keystroke that is made on the computer.
Randomly check emails on child’s account
Move the computer into a family area
The internet is not a babysitter.
More Countermeasures
Discuss Internet crime and safety issues with
your family
Discuss with other family members expectations
with use of the computer.
Sign an agreement between parents and
children that outlines expectations and the
amount of time allowed on the computer per day
or week.
Include in agreement who can be contacted or
talked with on the computer.
If family member receives an email that offends
you or them, contact your Internet Provider and
complain about the message being received.
Cyber-bullying is Coming to a
School Near You if it hasn’t
already.
Concerns include:
Cyber-bullying can be much more
damaging psychologically and much more
intense.
It creates a barrier between the bully and
the victim. This can allow someone who
normally wouldn't be a bully to become
one because there is no face to face
contact.
Cyber-bullying
It is difficult to catch the cyber-bully. When
identified, the suspect’s defense is often that
it was someone else impersonating them
using their password.
Camera phones are making cyber-bullying
more creative. Taking someone’s picture and
then manipulating it, then posting it on a web
site or in e-mail. Imagine getting an e-mail of a
nude individual with your face attached to it,
and you’re only a teenager.
Many think this behavior is a joke and not as
serious as bullying face to face.
Cyber-bullying
Victims are often targeted because they
are considered different — usually
those considered overweight, small,
with a learning disability or overly
sensitive.
Many face dirty digital tricks that range
from derogatory comments about them
online to embarrassing e-mail
attributed to them intended to insult
friends and crushes.
Cyber Bullying Statistics
42% of kids have been bullied while
online. 1 in 4 have had it happen more
than once.
35% of kids have been threatened
online. Nearly 1 in 5 have had it
happen more than once.
21% of kids have received mean or
threatening e-mail or other messages.
Based on 2004 i-SAFE survey of 1,500 students grades 4-8
Cyber Bullying Statistics
53% of kids admit having said something
mean or hurtful to another person online.
More than 1 in 3 have done it more than
once.
58% of kids admit someone has said
mean or hurtful things to them online.
More than 4 out of 10 say it has
happened more than once.
58% have not told their parents or an
adult about something mean or hurtful
that happened to them online.
www.xanga.com
Popular Blog Site
www.xanga.com
www.xanga.com
www.xanga.com
www.facebook.com
Parents Must Be Aware
Many kids do not want to report this
problem to their parents for fear of how
their parents may react.
They fear their parents will take away
their cell phone, computer, or Internet
access.
Obviously this solution will stop the
messages, but then the child feels
harassed by the bully and punished by
the parents when the equipment is
removed.
Signs That a Child Might Be At
Risk On-line
Spends large amounts of time on-line, especially at night
Find pornography on child's computer
Child receives phone calls from unknown men or is
making calls, sometimes long distance, to unfamiliar
numbers
Child receives mail, gifts, or packages from unfamiliar
sources
Child turns the computer monitor off or quickly changes
the screen on the monitor when you come into the room
Child becomes withdrawn from the family
Child is using an on-line account belonging to someone
else
Cyber Bullying Tips
Tell a trusted adult about the
bullying, and keep telling until the
adult takes action.
Don’t open or read messages by
cyber bullies.
Tell your school if it is school
related. Schools have a bullying
solution in place.
Cyber Bullying Tips
Don’t erase the messages—they may
be needed to take action.
Protect yourself—never agree to meet
with the person or with anyone you
meet online.
If bullied through chat or instant
messaging, the “bully” can often be
blocked.
If you are threatened with harm,
inform the local police.
What Can Parents Do?
Establish a bond of trust and open
communication with their child.
Place / keep computer(s) with Internet
access in an open, commonly used
space.
Learn about the new technologies
Commend your child for reporting
cyber issues
Parent and Child Internet Agreement
What Can Parents Do?
Cybersitter relies on an extensive, frequently updated
database of sites and word patterns. By default, Cybersitter
blocks content related to sex, drugs, hate, and violence, as
well as blocking all image searches. But parents can select
from
32 content
file
Cybersitter
offerscategories—including
a good stealth mode,cults,
lettinggambling,
parents filter
sharing,
wrestling,
and freewithout
e-mail sites—to
tailor the filter to
and monitor
kids' activities
their knowledge.
their
needs.can
These
settings
applied
to Web browsing,
eCybersitter
record
both are
sides
of IM sessions,
as well as
mail,
messaging,
and
newsgroups.
you can can
log allinstant
sites visited
and any
violations.
This Or
information
simply
all instante-mailed
messaging,
newsgroups,
FTP
then beblock
automatically
to you
in a daily activity
report.
access, and file sharing. .
Have you googled yourself?
http://www.google.com
Search your name, email address,
telephone number, home address
Search children’s, spouse, relatives
It may be possible to remove
unwanted information from some sites
GCPS POLICIES AND
PROCEDURES
What Can Schools Do?
GCPS/Trickum Middle School
GCPS Firewall
Blocked Sites and Procedures
Acceptable Use Policies
– Both Students and Staff
Supervision of Computer Labs
– Teachers, Parent Volunteers, Tech Staff
Technology Orientation
– Both Students and Staff
Counselor Programs
What Can Schools Do?
Trickum Middle School
Enter Your Child’s Cyber World
1.
2.
Lynne Davis – Starting the Discussion / Why important
Jim Fincher – Enter Your Child’s Cyber World
– Internet Safety Quiz for Adults
– Presentation: Enter Your Child’s Cyber World
Information complied by Osborne Middle School
3.
4.
5.
Trish Biemiller – Safe Searching Practices
Carla Greene – Tracking Internet History / Computer cookies
Additional Tools



6.
7.
Handouts
Web Resources
Parent/Student Contracts
Question & Answer
Need for more sessions? Topics?
Sites of Interest
CyberSmart:
www.cybersmart.org
Netsmartz:
http://www.netsmartz.org
Georgia State Computer Crimes Task Force Educators SubCommittee:
http://sci-one.kennesaw.edu/EduSec
NetNanny Internet Filter:
http://www.netnanny.com/index.html
SpyBot privacy cleaner:
http://security.kolla.de/
Ad-Aware privacy cleaner:
http://www.lavasoftusa.com/
GATech InfoSec Law Library:
http://www.security.gatech.edu/policy/law_library/
Free Antivirus:
http://www.grisoft.com/