SlideShare a Scribd company logo
1 of 63
Download to read offline
Kids & Social Media:
Facing Up to Facebook, Twitter & Beyond –
The Pros & Cons of How Students Use Social Media for
Study, Friendship & Fun

Prepared for Epiphany Parent & Student Seminar.
April 28, 2009


 Sandra Fathi                                      Web: www.affectstrategies.com
 President, Affect Strategies                      Blog: www.techaffect.com
 sfathi@affectstrategies.com                       Twitter: @sandrafathi
 212 398 9680                                      LinkedIn, Facebook: Sandra Fathi
     Affect Strategies          PROPRIETARY & CONFIDENTIAL                            4/28/2009
Parents & Educators




Internet & Social Media are the New Reality
» Required Skills for Social Development/Acceptance
» Required Skills for Education & Research
» Required Skills for Job & Career Development



Educate & Arm Yourself with Knowledge
» Investing in Your Child’s Safety
» Investing in Your Child’s Education
» Investing in Your Child’s Future
    Affect Strategies      PROPRIETARY & CONFIDENTIAL   4/28/2009
Why do kids need the
Internet?



        » To Connect

        » To Be Social

        » Social Planning/Events

        » Staying Plugged In

        » To Share

        » Self-Expression

   Affect Strategies        PROPRIETARY & CONFIDENTIAL   4/28/2009
Social Networking
Websites


16 years of age:
Friendster Online community connecting friends

14 years of age:
MySpace A Place For Friends

At least 13 years of age & in high school:
Facebook Social Utility that connect people with those around
them


    Affect Strategies   PROPRIETARY & CONFIDENTIAL          4/28/2009
Social Networking
Websites: 13 Year-olds


Hi 5 Who’s in?
Xanga A weblog community
IMVU Chat with friends in 3D
There Online virtual world
Chamber of Chat Harry Potter online role playing game
Second Life 3D Virtual World
Runescape Online adventure community
Bebo Social network for sharing and entertainment
Gaia Online Virtual community with games, message boards & economy
vSide Virtual music community
Windows Live Spaces Community of friends for sharing and blogging

    Affect Strategies    PROPRIETARY & CONFIDENTIAL           4/28/2009
Social Networking Sites:
  No Age Minimum


Imbee Social Networking designed for               Club Penguin Virtual world for kids
kids 8-12                                          Marapets Virtual pet site with games
Active Worlds 3D virtual world chat                and chat community
Boom Bang Chat, make friends and                   Shining Stars Chatting, naming stars
explore a virtual world                            and virtual star worlds
Dofus Multi-player online role playing             Neopets Virtual world for pets
game                                               Endless Online Role playing games
Awol Chats, games, diary, friends, &               Eternal Lands Role playing games
cribs                                              Furcadia Role playing games
Sanriotown Hello Kitty games,                      Graal Online Role playing games
community, blogs and forums                        Guild Wars Role playing games
Webkinz Virtual pet community for                  Hero Online Role playing games
plush pets
      Affect Strategies        PROPRIETARY & CONFIDENTIAL                         4/28/2009
What are some of the
dangers?


»Privacy/Identity Theft
»Cyber-bullying
»Online Predators
»Cybercriminals
»Piracy
»Inappropriate/Sexual Content
»Misleading Content/Propaganda

   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Quick Stats


93% of parents say they have established rules for their child’s
Internet activity
37% of students report being given no rules from their parents
on using the Internet
47% of parents feel their ability to monitor and shelter their
children from inappropriate material is limited
95% of parents say they know “some” or “a lot” about where
their children go or what their children do on the Internet
41% of students do not share where they go or what they do on
the Internet with their parents
26% of students believe their parents would be concerned if
they knew what they did on the Internet
                                                      I-Safe Statistics (www.isafe.org)
    Affect Strategies    PROPRIETARY & CONFIDENTIAL                             4/28/2009
Quick Stats




58% of students admit to using the Internet unsafely,
inappropriately, or illegally
12% of students have unsupervised Internet access at school
55% of students report having given out personal information
(e.g. name, age, gender, home address) to someone they have
only met online




    Affect Strategies   PROPRIETARY & CONFIDENTIAL        4/28/2009
Online Predators




» 71% of teens reported receiving messages online from
  71%
  someone they did not know
» 40% reported they usually reply and begin chatting with
  40%
  that person
» 18% reported telling an adult about the encounter
  18%
» 45% have been asked for personal information by someone
  45%
  they did not know
» 30% have of teens have considered meetings someone
  30%
  they have only talked to online
                       14% HAVE HAD AN ENCOUNTER
   Affect Strategies          PROPRIETARY & CONFIDENTIAL   4/28/2009
Online Predators Tactics


»   Seeks out provocative user names.
»   Studies your profile.
»   Starts with an innocent IM.
»   Asks personal questions, A/S/L.
»   Wants you to private chat.
»                                               e-
    Asks you for personal info. (Phone number, e -mail address, home address,
                   etc.)
    school name, etc.)
»   Wants to be your best friend, boyfriend or girlfriend.
»   Starts sexual conversations.
»   Is all about keeping secrets.
»   Asks for personal photos.
»   Wants to send you strange gifts.
»                       face-to-
    Wants to set up a face - to -face meeting.
»   Makes threats when you no longer want to chat with him or her.

      Affect Strategies        PROPRIETARY & CONFIDENTIAL                       4/28/2009
Cyber-bullying


» Be strong and stop it early. Don’t stoop to their level and lash back.
» Don’t suffer in silence. Tell an adult. Keep telling people until
  someone takes action.
» Don’t open or read messages from cyber bullies.
» Contact your Internet service provider abuse department.
» If the problem continues, alert the local police department.
» Tell your school if it is school related. If your cyber bully attends
  your school, contact your teacher or principal.
» Don’t erase the messages. Log all dates and time. Put them in a
  folder and hold them as evidence.
» Change your e-mail address or screen name.
» If it’s happening with text messages, change your cell number.
» Take screen shots of your chat room pages.
» Save URLs, e-mail addresses, and profiles of the bully.
» Stay protected—never agree to meet with a bully face to face.
» Block the bully if you are in a chat room or IMing.
    Affect Strategies            PROPRIETARY & CONFIDENTIAL                4/28/2009
Cyber-Bullying:
Consequences & Crime




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Piracy:
Illegal Downloads

       Myth — I cannot be sued for downloading music and movies off
                     P2P sites. They’ll never catch me.

     Fact — True and False. You can’t be sued if you have downloaded
         songs that have been put online with the approval of record
      labels and—you are violating copyright laws and you run the risk
                               of being sued.

          The Recording Industry Association of America (RIAA) filed
         3,000 lawsuits against individuals as of May 2004, and in some
             cases sought financial damages of up to $150,000 per
                               copyrighted song.




   Affect Strategies          PROPRIETARY & CONFIDENTIAL                  4/28/2009
Piracy:
P2P Sites


P2P sites are not illegal, but trading unauthorized music and
 movies is. The argument is that P2P sites are not providing
the illegal files —they are only providing a way to share files
                with others logged onto the site.
      Downloading music and movies without paying on
    unsanctioned sites is illegal and can result in criminal
                             penalties.
There is a good possibility of downloading a virus, creating a
  gateway for a hacker to jack your personal stuff or gain
                access to files on your hard drive.
  Affect Strategies    PROPRIETARY & CONFIDENTIAL           4/28/2009
Piracy:
Consequences & Crime




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Cyberterrorists/
Cybercriminals
  Spam
       » Avoid opening e-mails from businesses you don’t know
       » Get anti-spam (GMail)
  Viruses/Spyware
       » Get viruses from opening attachments not e-mails
       » Can also get a “Trojan horse” by downloading software and e-
         mail attachments
  Cyber-criminals (identity theft)
       » Never give out credit card info to a site that isn’t “trusted” –
         Google tools
       » Use PayPal – doesn’t give credit card info to sellers




  Affect Strategies            PROPRIETARY & CONFIDENTIAL                   4/28/2009
Pornography,
Plagiarism &
Propaganda

 Pornographic content
   » Use parental controls on internet options
   » Moderated safe search on Google
   » YouTube requires a login for over 18 – has strict policy
     against porn
 Plagiarism
   » Make sure you reference your sources for school reports!
 Propaganda
   » Many sites won’t be pornographic but not suited for
     children.
   » Hate sites, false information, lies and rumors

     Affect Strategies     PROPRIETARY & CONFIDENTIAL           4/28/2009
Personal Information


 Obvious:                                  Less Obvious:
 Name                                      School Name
 Address                                   School Mascot
 Age                                       Gaming Identities
 Sex                                       Hobbies
 Picture                                   Interests
 Phone Number                              Landmarks/Hangouts
 Address                                   Team Names
 SSN Number
 Bank Account
 Credit Card
   Affect Strategies   PROPRIETARY & CONFIDENTIAL               4/28/2009
What is Sexting?



     When people take sexually revealing picture of
 themselves and send them as text message attachments,
                  it's called quot;sexting.“

   Peoplequot;sextquot; to show off, to entice someone, to show
     interest in someone, or to prove commitment. The
   problem with that, is that the moment the relationship
 ends (and most of them do) someone is in possession of a
 highly compromising image that can be easily posted on a
   social networking site or sent around via email or text.

    Affect Strategies   PROPRIETARY & CONFIDENTIAL            4/28/2009
Sexting



  Once an image is sent, it can never be retrieved -- youwill
    lose control of it. How would you feel if your teachers,
   parents, or the entire school saw the picture, because it
                      happens all the time.
  Talk about pressures to send revealing photos. No matter
      how big the social pressure is, the potential social
   humiliation and consequences will be hundreds of times
                             worse.
   The buck stops with you. If someone sends you a photo,
       delete it immediately. If you do send it on, you’re
    distributing pornography -- and that’s against the law.

   Affect Strategies    PROPRIETARY & CONFIDENTIAL          4/28/2009
Sexting Statistics




22% of teen girls and 20% of teen boys have sent nude or
 semi-nude photos of themselves
22% of teens admit that technology makes them personally
 more forward and aggressive
38% say exchanging sexy content makes dating or hooking up
 with others more likely
29% believe those exchanging sexy content are “expected” to
 date or hook up
Revealing photos can be resent to a vast audience
Sending a sexual image of a minor or to a minor is illegal
    Affect Strategies   PROPRIETARY & CONFIDENTIAL      4/28/2009
Sexting:
Consequences & Crime




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Protecting Kids:
Tools & Strategies


 Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Common Sense Media




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
ThatsNotCool.com




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Safe Filtering &
Blocking




    Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Family Gameplan/
Contract




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Safe Search: Google




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Where Have You
Been? History




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Social Networking Sites




 Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Blogs & Blogging




» Type of website
» Regular entries/updates
» Usually allows comments/interaction with visitors
» May include text, pictures, video (vlogs), audio (podcasts) etc.
» Types:
    » Personal
    » Corporate
    » News
» Blog Search Engines: Bloglines, BlogScope, Technorati
   Affect Strategies    PROPRIETARY & CONFIDENTIAL           4/28/2009
Blog On




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Microblogging



 » Blogging in short form

 » Similar to texting

 » Ability to send and receive messages

 » Ability to follow and be followed

 » Archive information

 » Multiple delivery mechanisms

 » Conversations and interactivity
    Affect Strategies    PROPRIETARY & CONFIDENTIAL   4/28/2009
Twitter




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Microblogging: Twitter




 Image Source: Caroline-Middlebrook.com



       Affect Strategies                  PROPRIETARY & CONFIDENTIAL   4/28/2009
Twitter Profile




    Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
The Basics



   Tweet: Message – 140 Characters
   Twitter Handle: @sandrafathi
   Retweet (RT): Resending a message from
    someone else to your followers
   Message: Direct message (private) from one
    Twitterer to another
   Nudge: Prompt someone to Tweet
   Hashtag: #eventname Easy search for
    events/topic
   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Facebook




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Facebook: Groups &
Pages




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Facebook Privacy




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Facebook Privacy




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Facebook Privacy




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
MySpace: Individual
Profiles




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
MySpace Safety




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Closed & Open
Communities




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Create a Ning




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
You Tube




  Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
YouTube




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
YouTube Safety




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Compete.com




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Flickr: Photo & File
Sharing




    Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Flickr




    Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Advice for Kids &
Teens


Don’t say you are older than you are
The Internet is a public space
Don’t post embarrassing things or things that could expose you
 to danger
Think before you post – the Internet is forever
People aren’t always who they say they are
Protect your privacy
Report harassment, hate speech and inappropriate content
Avoid in-person meetings with people you don’t know in real-life
Think before you post
     Affect Strategies   PROPRIETARY & CONFIDENTIAL         4/28/2009
Advice for Parents




Start a conversation
Report inappropriate behavior
Talk about Social Networking and the Internet
Remind kids, and teens, to be cautious




    Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Best Practices I



Kids Need Rules
 » Set time and limits for Internet usage
 » Keep computer in public space
 » Agree on websites
 » Check compliance (history, filtering, tools)
Teach Internet Safety
 » Offline rules apply online
Reinforce Morality & Ethics Online
 » Educate on criminal activity
    Affect Strategies     PROPRIETARY & CONFIDENTIAL   4/28/2009
Best Practices II




Use Privacy Controls
 » Don’t provide personal information
 » Be careful about Pictures/Videos
 » Set sharing settings
 » Respecting others’ privacy
 » Don’t use automatic ‘remember’ settings
 » Never share passwords
 » Don’t meet strangers in person


    Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Best Practices III




Communicate Responsibly
 » Don’t hide behind a screen name
 » Block offenders
 » Report incidents
 » Flag inappropriate content
Be a Skeptic
 » View content critically
 » Be able to identify reliable sites and verify facts

    Affect Strategies     PROPRIETARY & CONFIDENTIAL     4/28/2009
Resources/Links




 Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Internet Safety
Organizations



Net Family News (http://www.netfamilynews.org/)
Safe Kids (http://www.safekids.com/)
Wired Safety (http://www.wiredsafety.org/)
NetSmartz (http://www.netsmartz411.org/)
Wired Kids (http://www.wiredkids.org/)
MySpace MyKids (http://www.myspacemykids.com/)
Safe Families (http://www.safefamilies.org/)
Enough is Enough (http://www.enough.org/)
Connect Safely (http://www.connectsafely.org/)
iKeepSafe (http://www.ikeepsafe.org/)
   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Personal Assistant:
Common Craft




   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009
Contact Information & Resources:

Sandra Fathi
sfathi@affectstrategies.com
twitter: @sandrafathi
LinkedIn, Facebook: Sandra Fathi

web: www.affectstrategies.com
blog: www.techaffect.com
   Affect Strategies   PROPRIETARY & CONFIDENTIAL   4/28/2009

More Related Content

What's hot

Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for childrenAvanzo net
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power pointmb29thom
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kidsChris Burrows
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Queens Library
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingzackkay
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
Digital law
Digital lawDigital law
Digital lawzrh48
 

What's hot (20)

Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power point
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Internet safety
Internet safety Internet safety
Internet safety
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Digital law
Digital lawDigital law
Digital law
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Viewers also liked

Risk management on facebook
Risk management on facebookRisk management on facebook
Risk management on facebookJP Rains, MBA
 
How to make a cheesecake
How to make a cheesecakeHow to make a cheesecake
How to make a cheesecakeEchini
 
Social networks, facebook, twitter etc
Social networks, facebook, twitter etcSocial networks, facebook, twitter etc
Social networks, facebook, twitter etcKen Akamatsu
 
Beneficios del cafe para la salud.
Beneficios del cafe para la salud.Beneficios del cafe para la salud.
Beneficios del cafe para la salud.Philippe Platteau
 
Parents, educators welcome Facebook for kids
Parents, educators welcome Facebook for kidsParents, educators welcome Facebook for kids
Parents, educators welcome Facebook for kidsThink Media Labs
 
How to make a homemade cheesecake english
How to make a homemade cheesecake  englishHow to make a homemade cheesecake  english
How to make a homemade cheesecake englishShayraEnid
 
Malware & Safe Browsing
Malware & Safe BrowsingMalware & Safe Browsing
Malware & Safe Browsingjgswift
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet CrimeGerman Teran
 
Beauty Benefits of Beer
Beauty Benefits of BeerBeauty Benefits of Beer
Beauty Benefits of BeerMedisys Kart
 
Safer Children in a Digital World: a summary for children and young people
Safer Children in a Digital World: a summary for children and young peopleSafer Children in a Digital World: a summary for children and young people
Safer Children in a Digital World: a summary for children and young peopleEduserv Foundation
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethicsaleeya91
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 

Viewers also liked (20)

Risk management on facebook
Risk management on facebookRisk management on facebook
Risk management on facebook
 
How to make a cheesecake
How to make a cheesecakeHow to make a cheesecake
How to make a cheesecake
 
Social networks, facebook, twitter etc
Social networks, facebook, twitter etcSocial networks, facebook, twitter etc
Social networks, facebook, twitter etc
 
Beneficios del cafe para la salud.
Beneficios del cafe para la salud.Beneficios del cafe para la salud.
Beneficios del cafe para la salud.
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Parents, educators welcome Facebook for kids
Parents, educators welcome Facebook for kidsParents, educators welcome Facebook for kids
Parents, educators welcome Facebook for kids
 
How to make a homemade cheesecake english
How to make a homemade cheesecake  englishHow to make a homemade cheesecake  english
How to make a homemade cheesecake english
 
Internet literacy and safety
Internet literacy and safetyInternet literacy and safety
Internet literacy and safety
 
Malware & Safe Browsing
Malware & Safe BrowsingMalware & Safe Browsing
Malware & Safe Browsing
 
How To Keep Kids Safe
How To Keep Kids SafeHow To Keep Kids Safe
How To Keep Kids Safe
 
PresentacióN Gravida
PresentacióN GravidaPresentacióN Gravida
PresentacióN Gravida
 
Cheesecake
CheesecakeCheesecake
Cheesecake
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Beer Presentation
Beer PresentationBeer Presentation
Beer Presentation
 
Beauty Benefits of Beer
Beauty Benefits of BeerBeauty Benefits of Beer
Beauty Benefits of Beer
 
Health benefit of beer
Health benefit of beerHealth benefit of beer
Health benefit of beer
 
Safer Children in a Digital World: a summary for children and young people
Safer Children in a Digital World: a summary for children and young peopleSafer Children in a Digital World: a summary for children and young people
Safer Children in a Digital World: a summary for children and young people
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 

Similar to Internet Safety For Parents And Kids

Parenting And The Internet Ppt
Parenting And The Internet PptParenting And The Internet Ppt
Parenting And The Internet PptMary Danko
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet SafetyJVGAJJAR
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017KanelandSvihlik
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016KanelandSvihlik
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
Internet safetypresentation
Internet safetypresentationInternet safetypresentation
Internet safetypresentationfkompar
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyDi Doersch
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineLuciusonSecurity
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011DHE2008
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 

Similar to Internet Safety For Parents And Kids (20)

Parenting And The Internet Ppt
Parenting And The Internet PptParenting And The Internet Ppt
Parenting And The Internet Ppt
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet Safety
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
102009
102009102009
102009
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Test
TestTest
Test
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Internet safetypresentation
Internet safetypresentationInternet safetypresentation
Internet safetypresentation
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and Technology
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 

More from Sandra Fathi

News Making Machine - How Story Hijacking & Trend Intervention Can Transform ...
News Making Machine - How Story Hijacking & Trend Intervention Can Transform ...News Making Machine - How Story Hijacking & Trend Intervention Can Transform ...
News Making Machine - How Story Hijacking & Trend Intervention Can Transform ...Sandra Fathi
 
Cyber Crime: Preparing Your Organization for the New Normal
Cyber Crime: Preparing Your Organization for the New NormalCyber Crime: Preparing Your Organization for the New Normal
Cyber Crime: Preparing Your Organization for the New NormalSandra Fathi
 
Women's Leadership Conference: Changing Perceptions to Change Reality
Women's Leadership Conference: Changing Perceptions to Change RealityWomen's Leadership Conference: Changing Perceptions to Change Reality
Women's Leadership Conference: Changing Perceptions to Change RealitySandra Fathi
 
Managing a Hack: Orchestrating Incident Response to Preserve Brand Reputation
Managing a Hack: Orchestrating Incident Response to Preserve Brand ReputationManaging a Hack: Orchestrating Incident Response to Preserve Brand Reputation
Managing a Hack: Orchestrating Incident Response to Preserve Brand ReputationSandra Fathi
 
PR in the Era of Fake News
PR in the Era of Fake NewsPR in the Era of Fake News
PR in the Era of Fake NewsSandra Fathi
 
FPRA Capital Chapter: Managing a Hack
FPRA Capital Chapter: Managing a HackFPRA Capital Chapter: Managing a Hack
FPRA Capital Chapter: Managing a HackSandra Fathi
 
Social Shakeup Atlanta: When the Sh*t Hits the Fan - Managing Crises on Socia...
Social Shakeup Atlanta: When the Sh*t Hits the Fan - Managing Crises on Socia...Social Shakeup Atlanta: When the Sh*t Hits the Fan - Managing Crises on Socia...
Social Shakeup Atlanta: When the Sh*t Hits the Fan - Managing Crises on Socia...Sandra Fathi
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowSandra Fathi
 
Show Me the Money: PR Metrics that Impress the C-Suite
Show Me the Money: PR Metrics that Impress the C-SuiteShow Me the Money: PR Metrics that Impress the C-Suite
Show Me the Money: PR Metrics that Impress the C-SuiteSandra Fathi
 
Managing a Hack: A Communicator's Guide to a Data Breach
Managing a Hack: A Communicator's Guide to a Data BreachManaging a Hack: A Communicator's Guide to a Data Breach
Managing a Hack: A Communicator's Guide to a Data BreachSandra Fathi
 
Flash Fires: Crisis Communications in the Age of NOW
Flash Fires: Crisis Communications in the Age of NOWFlash Fires: Crisis Communications in the Age of NOW
Flash Fires: Crisis Communications in the Age of NOWSandra Fathi
 
Break From the Pack with Data Visualization & Infographics
Break From the Pack with Data Visualization & InfographicsBreak From the Pack with Data Visualization & Infographics
Break From the Pack with Data Visualization & InfographicsSandra Fathi
 
Fear Factor Metrics: PR Metrics Communicators Fear Most
Fear Factor Metrics: PR Metrics Communicators Fear MostFear Factor Metrics: PR Metrics Communicators Fear Most
Fear Factor Metrics: PR Metrics Communicators Fear MostSandra Fathi
 
Trade Secrets Your Agency Isn't Sharing
Trade Secrets Your Agency Isn't SharingTrade Secrets Your Agency Isn't Sharing
Trade Secrets Your Agency Isn't SharingSandra Fathi
 
Bloggers Speak Out: New paid and pitching techniques to score more placement
Bloggers Speak Out: New paid and pitching techniques to score more placement Bloggers Speak Out: New paid and pitching techniques to score more placement
Bloggers Speak Out: New paid and pitching techniques to score more placement Sandra Fathi
 
Data-Driven PR Measurement (eMetrics Chicago)
Data-Driven PR Measurement (eMetrics Chicago)Data-Driven PR Measurement (eMetrics Chicago)
Data-Driven PR Measurement (eMetrics Chicago)Sandra Fathi
 
Data-Driven PR Metrics: Share of Voice, Competitive Benchmarking, Correlations
Data-Driven PR Metrics: Share of Voice, Competitive Benchmarking, CorrelationsData-Driven PR Metrics: Share of Voice, Competitive Benchmarking, Correlations
Data-Driven PR Metrics: Share of Voice, Competitive Benchmarking, CorrelationsSandra Fathi
 
How to Develop a Content Strategy
How to Develop a Content StrategyHow to Develop a Content Strategy
How to Develop a Content StrategySandra Fathi
 
Payback: The ROI of SM & PR Measurement
Payback: The ROI of SM & PR MeasurementPayback: The ROI of SM & PR Measurement
Payback: The ROI of SM & PR MeasurementSandra Fathi
 
Before Disaster Strikes: Creating an Effective Crisis Communications Plan
Before Disaster Strikes: Creating an Effective Crisis Communications PlanBefore Disaster Strikes: Creating an Effective Crisis Communications Plan
Before Disaster Strikes: Creating an Effective Crisis Communications PlanSandra Fathi
 

More from Sandra Fathi (20)

News Making Machine - How Story Hijacking & Trend Intervention Can Transform ...
News Making Machine - How Story Hijacking & Trend Intervention Can Transform ...News Making Machine - How Story Hijacking & Trend Intervention Can Transform ...
News Making Machine - How Story Hijacking & Trend Intervention Can Transform ...
 
Cyber Crime: Preparing Your Organization for the New Normal
Cyber Crime: Preparing Your Organization for the New NormalCyber Crime: Preparing Your Organization for the New Normal
Cyber Crime: Preparing Your Organization for the New Normal
 
Women's Leadership Conference: Changing Perceptions to Change Reality
Women's Leadership Conference: Changing Perceptions to Change RealityWomen's Leadership Conference: Changing Perceptions to Change Reality
Women's Leadership Conference: Changing Perceptions to Change Reality
 
Managing a Hack: Orchestrating Incident Response to Preserve Brand Reputation
Managing a Hack: Orchestrating Incident Response to Preserve Brand ReputationManaging a Hack: Orchestrating Incident Response to Preserve Brand Reputation
Managing a Hack: Orchestrating Incident Response to Preserve Brand Reputation
 
PR in the Era of Fake News
PR in the Era of Fake NewsPR in the Era of Fake News
PR in the Era of Fake News
 
FPRA Capital Chapter: Managing a Hack
FPRA Capital Chapter: Managing a HackFPRA Capital Chapter: Managing a Hack
FPRA Capital Chapter: Managing a Hack
 
Social Shakeup Atlanta: When the Sh*t Hits the Fan - Managing Crises on Socia...
Social Shakeup Atlanta: When the Sh*t Hits the Fan - Managing Crises on Socia...Social Shakeup Atlanta: When the Sh*t Hits the Fan - Managing Crises on Socia...
Social Shakeup Atlanta: When the Sh*t Hits the Fan - Managing Crises on Socia...
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
 
Show Me the Money: PR Metrics that Impress the C-Suite
Show Me the Money: PR Metrics that Impress the C-SuiteShow Me the Money: PR Metrics that Impress the C-Suite
Show Me the Money: PR Metrics that Impress the C-Suite
 
Managing a Hack: A Communicator's Guide to a Data Breach
Managing a Hack: A Communicator's Guide to a Data BreachManaging a Hack: A Communicator's Guide to a Data Breach
Managing a Hack: A Communicator's Guide to a Data Breach
 
Flash Fires: Crisis Communications in the Age of NOW
Flash Fires: Crisis Communications in the Age of NOWFlash Fires: Crisis Communications in the Age of NOW
Flash Fires: Crisis Communications in the Age of NOW
 
Break From the Pack with Data Visualization & Infographics
Break From the Pack with Data Visualization & InfographicsBreak From the Pack with Data Visualization & Infographics
Break From the Pack with Data Visualization & Infographics
 
Fear Factor Metrics: PR Metrics Communicators Fear Most
Fear Factor Metrics: PR Metrics Communicators Fear MostFear Factor Metrics: PR Metrics Communicators Fear Most
Fear Factor Metrics: PR Metrics Communicators Fear Most
 
Trade Secrets Your Agency Isn't Sharing
Trade Secrets Your Agency Isn't SharingTrade Secrets Your Agency Isn't Sharing
Trade Secrets Your Agency Isn't Sharing
 
Bloggers Speak Out: New paid and pitching techniques to score more placement
Bloggers Speak Out: New paid and pitching techniques to score more placement Bloggers Speak Out: New paid and pitching techniques to score more placement
Bloggers Speak Out: New paid and pitching techniques to score more placement
 
Data-Driven PR Measurement (eMetrics Chicago)
Data-Driven PR Measurement (eMetrics Chicago)Data-Driven PR Measurement (eMetrics Chicago)
Data-Driven PR Measurement (eMetrics Chicago)
 
Data-Driven PR Metrics: Share of Voice, Competitive Benchmarking, Correlations
Data-Driven PR Metrics: Share of Voice, Competitive Benchmarking, CorrelationsData-Driven PR Metrics: Share of Voice, Competitive Benchmarking, Correlations
Data-Driven PR Metrics: Share of Voice, Competitive Benchmarking, Correlations
 
How to Develop a Content Strategy
How to Develop a Content StrategyHow to Develop a Content Strategy
How to Develop a Content Strategy
 
Payback: The ROI of SM & PR Measurement
Payback: The ROI of SM & PR MeasurementPayback: The ROI of SM & PR Measurement
Payback: The ROI of SM & PR Measurement
 
Before Disaster Strikes: Creating an Effective Crisis Communications Plan
Before Disaster Strikes: Creating an Effective Crisis Communications PlanBefore Disaster Strikes: Creating an Effective Crisis Communications Plan
Before Disaster Strikes: Creating an Effective Crisis Communications Plan
 

Recently uploaded

Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 

Recently uploaded (20)

Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 

Internet Safety For Parents And Kids

  • 1. Kids & Social Media: Facing Up to Facebook, Twitter & Beyond – The Pros & Cons of How Students Use Social Media for Study, Friendship & Fun Prepared for Epiphany Parent & Student Seminar. April 28, 2009 Sandra Fathi Web: www.affectstrategies.com President, Affect Strategies Blog: www.techaffect.com sfathi@affectstrategies.com Twitter: @sandrafathi 212 398 9680 LinkedIn, Facebook: Sandra Fathi Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 2. Parents & Educators Internet & Social Media are the New Reality » Required Skills for Social Development/Acceptance » Required Skills for Education & Research » Required Skills for Job & Career Development Educate & Arm Yourself with Knowledge » Investing in Your Child’s Safety » Investing in Your Child’s Education » Investing in Your Child’s Future Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 3. Why do kids need the Internet? » To Connect » To Be Social » Social Planning/Events » Staying Plugged In » To Share » Self-Expression Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 4. Social Networking Websites 16 years of age: Friendster Online community connecting friends 14 years of age: MySpace A Place For Friends At least 13 years of age & in high school: Facebook Social Utility that connect people with those around them Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 5. Social Networking Websites: 13 Year-olds Hi 5 Who’s in? Xanga A weblog community IMVU Chat with friends in 3D There Online virtual world Chamber of Chat Harry Potter online role playing game Second Life 3D Virtual World Runescape Online adventure community Bebo Social network for sharing and entertainment Gaia Online Virtual community with games, message boards & economy vSide Virtual music community Windows Live Spaces Community of friends for sharing and blogging Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 6. Social Networking Sites: No Age Minimum Imbee Social Networking designed for Club Penguin Virtual world for kids kids 8-12 Marapets Virtual pet site with games Active Worlds 3D virtual world chat and chat community Boom Bang Chat, make friends and Shining Stars Chatting, naming stars explore a virtual world and virtual star worlds Dofus Multi-player online role playing Neopets Virtual world for pets game Endless Online Role playing games Awol Chats, games, diary, friends, & Eternal Lands Role playing games cribs Furcadia Role playing games Sanriotown Hello Kitty games, Graal Online Role playing games community, blogs and forums Guild Wars Role playing games Webkinz Virtual pet community for Hero Online Role playing games plush pets Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 7. What are some of the dangers? »Privacy/Identity Theft »Cyber-bullying »Online Predators »Cybercriminals »Piracy »Inappropriate/Sexual Content »Misleading Content/Propaganda Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 8. Quick Stats 93% of parents say they have established rules for their child’s Internet activity 37% of students report being given no rules from their parents on using the Internet 47% of parents feel their ability to monitor and shelter their children from inappropriate material is limited 95% of parents say they know “some” or “a lot” about where their children go or what their children do on the Internet 41% of students do not share where they go or what they do on the Internet with their parents 26% of students believe their parents would be concerned if they knew what they did on the Internet I-Safe Statistics (www.isafe.org) Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 9. Quick Stats 58% of students admit to using the Internet unsafely, inappropriately, or illegally 12% of students have unsupervised Internet access at school 55% of students report having given out personal information (e.g. name, age, gender, home address) to someone they have only met online Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 10. Online Predators » 71% of teens reported receiving messages online from 71% someone they did not know » 40% reported they usually reply and begin chatting with 40% that person » 18% reported telling an adult about the encounter 18% » 45% have been asked for personal information by someone 45% they did not know » 30% have of teens have considered meetings someone 30% they have only talked to online 14% HAVE HAD AN ENCOUNTER Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 11. Online Predators Tactics » Seeks out provocative user names. » Studies your profile. » Starts with an innocent IM. » Asks personal questions, A/S/L. » Wants you to private chat. » e- Asks you for personal info. (Phone number, e -mail address, home address, etc.) school name, etc.) » Wants to be your best friend, boyfriend or girlfriend. » Starts sexual conversations. » Is all about keeping secrets. » Asks for personal photos. » Wants to send you strange gifts. » face-to- Wants to set up a face - to -face meeting. » Makes threats when you no longer want to chat with him or her. Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 12. Cyber-bullying » Be strong and stop it early. Don’t stoop to their level and lash back. » Don’t suffer in silence. Tell an adult. Keep telling people until someone takes action. » Don’t open or read messages from cyber bullies. » Contact your Internet service provider abuse department. » If the problem continues, alert the local police department. » Tell your school if it is school related. If your cyber bully attends your school, contact your teacher or principal. » Don’t erase the messages. Log all dates and time. Put them in a folder and hold them as evidence. » Change your e-mail address or screen name. » If it’s happening with text messages, change your cell number. » Take screen shots of your chat room pages. » Save URLs, e-mail addresses, and profiles of the bully. » Stay protected—never agree to meet with a bully face to face. » Block the bully if you are in a chat room or IMing. Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 13. Cyber-Bullying: Consequences & Crime Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 14. Piracy: Illegal Downloads Myth — I cannot be sued for downloading music and movies off P2P sites. They’ll never catch me. Fact — True and False. You can’t be sued if you have downloaded songs that have been put online with the approval of record labels and—you are violating copyright laws and you run the risk of being sued. The Recording Industry Association of America (RIAA) filed 3,000 lawsuits against individuals as of May 2004, and in some cases sought financial damages of up to $150,000 per copyrighted song. Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 15. Piracy: P2P Sites P2P sites are not illegal, but trading unauthorized music and movies is. The argument is that P2P sites are not providing the illegal files —they are only providing a way to share files with others logged onto the site. Downloading music and movies without paying on unsanctioned sites is illegal and can result in criminal penalties. There is a good possibility of downloading a virus, creating a gateway for a hacker to jack your personal stuff or gain access to files on your hard drive. Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 16. Piracy: Consequences & Crime Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 17. Cyberterrorists/ Cybercriminals Spam » Avoid opening e-mails from businesses you don’t know » Get anti-spam (GMail) Viruses/Spyware » Get viruses from opening attachments not e-mails » Can also get a “Trojan horse” by downloading software and e- mail attachments Cyber-criminals (identity theft) » Never give out credit card info to a site that isn’t “trusted” – Google tools » Use PayPal – doesn’t give credit card info to sellers Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 18. Pornography, Plagiarism & Propaganda Pornographic content » Use parental controls on internet options » Moderated safe search on Google » YouTube requires a login for over 18 – has strict policy against porn Plagiarism » Make sure you reference your sources for school reports! Propaganda » Many sites won’t be pornographic but not suited for children. » Hate sites, false information, lies and rumors Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 19. Personal Information Obvious: Less Obvious: Name School Name Address School Mascot Age Gaming Identities Sex Hobbies Picture Interests Phone Number Landmarks/Hangouts Address Team Names SSN Number Bank Account Credit Card Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 20. What is Sexting? When people take sexually revealing picture of themselves and send them as text message attachments, it's called quot;sexting.“ Peoplequot;sextquot; to show off, to entice someone, to show interest in someone, or to prove commitment. The problem with that, is that the moment the relationship ends (and most of them do) someone is in possession of a highly compromising image that can be easily posted on a social networking site or sent around via email or text. Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 21. Sexting Once an image is sent, it can never be retrieved -- youwill lose control of it. How would you feel if your teachers, parents, or the entire school saw the picture, because it happens all the time. Talk about pressures to send revealing photos. No matter how big the social pressure is, the potential social humiliation and consequences will be hundreds of times worse. The buck stops with you. If someone sends you a photo, delete it immediately. If you do send it on, you’re distributing pornography -- and that’s against the law. Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 22. Sexting Statistics 22% of teen girls and 20% of teen boys have sent nude or semi-nude photos of themselves 22% of teens admit that technology makes them personally more forward and aggressive 38% say exchanging sexy content makes dating or hooking up with others more likely 29% believe those exchanging sexy content are “expected” to date or hook up Revealing photos can be resent to a vast audience Sending a sexual image of a minor or to a minor is illegal Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 23. Sexting: Consequences & Crime Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 24. Protecting Kids: Tools & Strategies Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 25. Common Sense Media Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 26. ThatsNotCool.com Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 27. Safe Filtering & Blocking Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 28. Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 29. Family Gameplan/ Contract Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 30. Safe Search: Google Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 31. Where Have You Been? History Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 32. Social Networking Sites Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 33. Blogs & Blogging » Type of website » Regular entries/updates » Usually allows comments/interaction with visitors » May include text, pictures, video (vlogs), audio (podcasts) etc. » Types: » Personal » Corporate » News » Blog Search Engines: Bloglines, BlogScope, Technorati Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 34. Blog On Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 35. Microblogging » Blogging in short form » Similar to texting » Ability to send and receive messages » Ability to follow and be followed » Archive information » Multiple delivery mechanisms » Conversations and interactivity Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 36. Twitter Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 37. Microblogging: Twitter Image Source: Caroline-Middlebrook.com Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 38. Twitter Profile Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 39. The Basics Tweet: Message – 140 Characters Twitter Handle: @sandrafathi Retweet (RT): Resending a message from someone else to your followers Message: Direct message (private) from one Twitterer to another Nudge: Prompt someone to Tweet Hashtag: #eventname Easy search for events/topic Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 40. Facebook Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 41. Facebook: Groups & Pages Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 42. Facebook Privacy Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 43. Facebook Privacy Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 44. Facebook Privacy Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 45. MySpace: Individual Profiles Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 46. MySpace Safety Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 47. Closed & Open Communities Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 48. Create a Ning Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 49. You Tube Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 50. YouTube Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 51. YouTube Safety Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 52. Compete.com Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 53. Flickr: Photo & File Sharing Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 54. Flickr Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 55. Advice for Kids & Teens Don’t say you are older than you are The Internet is a public space Don’t post embarrassing things or things that could expose you to danger Think before you post – the Internet is forever People aren’t always who they say they are Protect your privacy Report harassment, hate speech and inappropriate content Avoid in-person meetings with people you don’t know in real-life Think before you post Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 56. Advice for Parents Start a conversation Report inappropriate behavior Talk about Social Networking and the Internet Remind kids, and teens, to be cautious Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 57. Best Practices I Kids Need Rules » Set time and limits for Internet usage » Keep computer in public space » Agree on websites » Check compliance (history, filtering, tools) Teach Internet Safety » Offline rules apply online Reinforce Morality & Ethics Online » Educate on criminal activity Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 58. Best Practices II Use Privacy Controls » Don’t provide personal information » Be careful about Pictures/Videos » Set sharing settings » Respecting others’ privacy » Don’t use automatic ‘remember’ settings » Never share passwords » Don’t meet strangers in person Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 59. Best Practices III Communicate Responsibly » Don’t hide behind a screen name » Block offenders » Report incidents » Flag inappropriate content Be a Skeptic » View content critically » Be able to identify reliable sites and verify facts Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 60. Resources/Links Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 61. Internet Safety Organizations Net Family News (http://www.netfamilynews.org/) Safe Kids (http://www.safekids.com/) Wired Safety (http://www.wiredsafety.org/) NetSmartz (http://www.netsmartz411.org/) Wired Kids (http://www.wiredkids.org/) MySpace MyKids (http://www.myspacemykids.com/) Safe Families (http://www.safefamilies.org/) Enough is Enough (http://www.enough.org/) Connect Safely (http://www.connectsafely.org/) iKeepSafe (http://www.ikeepsafe.org/) Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 62. Personal Assistant: Common Craft Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009
  • 63. Contact Information & Resources: Sandra Fathi sfathi@affectstrategies.com twitter: @sandrafathi LinkedIn, Facebook: Sandra Fathi web: www.affectstrategies.com blog: www.techaffect.com Affect Strategies PROPRIETARY & CONFIDENTIAL 4/28/2009