SlideShare a Scribd company logo
1 of 26
E-safety Training 10 th  June 2009
The Benefits of ICT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The divide of the generations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Digital Immigrants Digital Natives
Internet access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The risks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The debate SWGFL presentation ESafety conference 2008
KS1 and KS2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What is web 2 technology? Web 2.0 concepts have led to the development and evolution of web-based communities,  hosted services , and  applications ; such as  social-networking sites ,  video-sharing sites ,  wikis ,  blogs , and  folksonomies .  Wikipedia May 2009
Filtering SWGFL presentation ESafety conference 2008
Sites often used by children ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object],Provided by LGfL at ESafety conference 2008
Lois’s friend offers to share their Instant Messenger (like MSN) contacts.  Lois is very pleased because she now has 150 ‘friends’.
Lois - R ed A mber G reen ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Lois’s friend offers to share their Instant Messenger (like MSN) contacts.  Lois is very pleased because she now has 150 ‘friends’. Lois’s ‘friends’ have been collected by sharing address books. She only knows about one third of the people in her contact list.  She has used the features in MSN to sort her ‘friends’ into groups – school, home friends, family, holiday mates.  She also has a group for ‘friends of friends’ i.e. internet strangers. She does not give out any personal details to these people. She is happy to chat online with friends of friends, but nothing more. She does not use her web cam when she talks to this group.
James is 7 years old.  He’s in a chat room – a pizza parlour in a ‘virtual’ world. Someone is ‘talking’ to him and asks if he wants to chat ‘outside’ and can they swap email addresses?
James ,[object Object],[object Object],[object Object]
James is 7 years old.  He’s in a chat room – a pizza parlour in a ‘virtual’ world. Someone is ‘talking’ to him and asks if he wants to chat ‘outside’ and can they swap email addresses? James is sitting with his Mum; they are using the internet together. James’ Mum explains he should never give out his private information to anyone, and, if he is not sure, he should talk to a grown up at home or at school.
Jack has been talking to an online ‘friend’ for some time.  The ‘friend’ seems really nice and they have loads in common.  They’ve sent Jack a photo of themselves.  It’s the holiday and they ask to Jack to meet in the park.
Jack ,[object Object],[object Object],[object Object]
Jack has been talking to an online ‘friend’ for some time.  The ‘friend’ seems really nice and they have loads in common.  They’ve sent Jack a photo of themselves.  It’s the holiday and they ask to Jack to meet in the park.  Jack likes his friend and would like to meet him. He tells him  he’ll see him on Saturday and he’ll be bringing his dad. His friend says ‘OK’ and that his dad will be there too. They have a good kick about in the park and the dads find a coffee stall!
For a while Sophie has been chatting online, in secret, with someone older than her.  At first he seemed really nice and appeared to understand her better than her family. She knew it was silly, but she found it easy to tell him lots of personal things, and she was pleased to have an ‘older boyfriend’ online.  But now he is sending her very personal and ’explicit’ messages which make her feel uncomfortable and uneasy about the ‘relationship’.
Sophie ,[object Object],[object Object],[object Object]
For a while Sophie has been chatting online, in secret, with someone older than her.  At first he seemed really nice and appeared to understand her better than her family. She knew it was silly, but she found it easy to tell him lots of personal things, and she was pleased to have an ‘older boyfriend’ online.  But now he is sending her very personal and ’explicit’ messages which make her feel uncomfortable and uneasy about the ‘relationship’.  Sophie doesn’t go online for a few days. She doesn’t talk to anyone: she’s too embarrassed to talk to anyone face to face. She remembers a lesson at school where she learnt about a red button, so she looks in MSN and finds it.  It says ‘report abuse’. She types all the details into the form. She feels better for having told someone. She doesn’t talk to her ‘boyfriend’ again.
What can we do to help? ,[object Object],[object Object],[object Object],[object Object],[object Object]
School E-Safety Policy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ESafety awareness day ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Glossary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017KanelandSvihlik
 
Digital citizenship for Students
Digital citizenship for StudentsDigital citizenship for Students
Digital citizenship for StudentsKelgator
 
Munch, poke, ping presentation
Munch, poke, ping presentationMunch, poke, ping presentation
Munch, poke, ping presentationonlineyouthwork
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpscl
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018KanelandSvihlik
 
Cyberbullying- Assignment 8
Cyberbullying- Assignment 8Cyberbullying- Assignment 8
Cyberbullying- Assignment 8jbpruden1
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016KanelandSvihlik
 
What Is Digital Etiquette
What Is Digital EtiquetteWhat Is Digital Etiquette
What Is Digital Etiquetteguestc38192
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
CyberbullyingspecR Smith
 
Internet Safety Program for Parents
Internet Safety Program for ParentsInternet Safety Program for Parents
Internet Safety Program for ParentsJamie Tubbs
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointHannahMorrell
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
CyberbullyingspecR Smith
 

What's hot (20)

Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 
Digital citizenship for Students
Digital citizenship for StudentsDigital citizenship for Students
Digital citizenship for Students
 
Munch, poke, ping presentation
Munch, poke, ping presentationMunch, poke, ping presentation
Munch, poke, ping presentation
 
Digital wellness and your family internet upload
Digital wellness and your family   internet uploadDigital wellness and your family   internet upload
Digital wellness and your family internet upload
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
102010a
102010a102010a
102010a
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Cyberbullying- Assignment 8
Cyberbullying- Assignment 8Cyberbullying- Assignment 8
Cyberbullying- Assignment 8
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
Kealie int safe
Kealie int safeKealie int safe
Kealie int safe
 
What Is Digital Etiquette
What Is Digital EtiquetteWhat Is Digital Etiquette
What Is Digital Etiquette
 
Digital citizenship lessonplan_en
Digital citizenship lessonplan_enDigital citizenship lessonplan_en
Digital citizenship lessonplan_en
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Internet Safety Program for Parents
Internet Safety Program for ParentsInternet Safety Program for Parents
Internet Safety Program for Parents
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 

Viewers also liked

Gestión y preservación de la información
Gestión y preservación de la informaciónGestión y preservación de la información
Gestión y preservación de la informaciónSEDIC
 
Presentatie Concept Minor
Presentatie Concept MinorPresentatie Concept Minor
Presentatie Concept MinorScholtes
 
7th Agenda For 3 8 10
7th Agenda For 3 8 107th Agenda For 3 8 10
7th Agenda For 3 8 10guest70534bf
 
Telling Your Story
Telling  Your  StoryTelling  Your  Story
Telling Your StoryLeah
 
Class3 Edi Ppt
Class3 Edi PptClass3 Edi Ppt
Class3 Edi PptRMS
 
Gala ilusion arabe
Gala ilusion arabeGala ilusion arabe
Gala ilusion arabePaula Velozo
 
Intranets2012: Aligning your intranet to your business
Intranets2012: Aligning your intranet to your businessIntranets2012: Aligning your intranet to your business
Intranets2012: Aligning your intranet to your businessDeloitte Australia
 
Class4 Security
Class4 SecurityClass4 Security
Class4 SecurityRMS
 
Ken Rock Community Center Presentation 2010
Ken Rock Community Center Presentation 2010Ken Rock Community Center Presentation 2010
Ken Rock Community Center Presentation 2010guest79f264
 
Adoptame Plis
Adoptame PlisAdoptame Plis
Adoptame Plismelysiu3m
 
Vsto 3 Excel Add-in SNUG
Vsto 3 Excel Add-in SNUGVsto 3 Excel Add-in SNUG
Vsto 3 Excel Add-in SNUGMiguel Santos
 
Leadership Network 03.11.2010
Leadership Network 03.11.2010Leadership Network 03.11.2010
Leadership Network 03.11.2010Jim Sheppard
 

Viewers also liked (20)

Gestión y preservación de la información
Gestión y preservación de la informaciónGestión y preservación de la información
Gestión y preservación de la información
 
2136
21362136
2136
 
Presentatie Concept Minor
Presentatie Concept MinorPresentatie Concept Minor
Presentatie Concept Minor
 
AT Heritage SlideShow
AT Heritage SlideShowAT Heritage SlideShow
AT Heritage SlideShow
 
Sergata
SergataSergata
Sergata
 
7th Agenda For 3 8 10
7th Agenda For 3 8 107th Agenda For 3 8 10
7th Agenda For 3 8 10
 
Telling Your Story
Telling  Your  StoryTelling  Your  Story
Telling Your Story
 
Class3 Edi Ppt
Class3 Edi PptClass3 Edi Ppt
Class3 Edi Ppt
 
Gala ilusion arabe
Gala ilusion arabeGala ilusion arabe
Gala ilusion arabe
 
Hpm2010seminar1
Hpm2010seminar1Hpm2010seminar1
Hpm2010seminar1
 
Intranets2012: Aligning your intranet to your business
Intranets2012: Aligning your intranet to your businessIntranets2012: Aligning your intranet to your business
Intranets2012: Aligning your intranet to your business
 
Class4 Security
Class4 SecurityClass4 Security
Class4 Security
 
Ken Rock Community Center Presentation 2010
Ken Rock Community Center Presentation 2010Ken Rock Community Center Presentation 2010
Ken Rock Community Center Presentation 2010
 
Huron Bond Issue
Huron Bond IssueHuron Bond Issue
Huron Bond Issue
 
Adoptame Plis
Adoptame PlisAdoptame Plis
Adoptame Plis
 
Vsto 3 Excel Add-in SNUG
Vsto 3 Excel Add-in SNUGVsto 3 Excel Add-in SNUG
Vsto 3 Excel Add-in SNUG
 
Stephanie
StephanieStephanie
Stephanie
 
Leadership Network 03.11.2010
Leadership Network 03.11.2010Leadership Network 03.11.2010
Leadership Network 03.11.2010
 
Hotel Quickly - Momo #8
Hotel Quickly - Momo #8Hotel Quickly - Momo #8
Hotel Quickly - Momo #8
 
Да бъдеш жена
Да бъдеш женаДа бъдеш жена
Да бъдеш жена
 

Similar to E-safety training benefits risks online

Cyberwellness 2011 hws
Cyberwellness 2011 hwsCyberwellness 2011 hws
Cyberwellness 2011 hwsAbel Kok
 
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonSurfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonEva Buyuksimkesyan
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentationjanemiller48
 
Digital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital WorldDigital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital WorldDebra Hargrove
 
Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence Gennia Holder
 
Gay Marriage Persuasive Essay Outline
Gay Marriage Persuasive Essay OutlineGay Marriage Persuasive Essay Outline
Gay Marriage Persuasive Essay OutlineMissy Davis
 
EDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT Delhi
EDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT DelhiEDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT Delhi
EDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT DelhiEduexcellence
 
Current Issues Powerpt
Current Issues PowerptCurrent Issues Powerpt
Current Issues Powerptdulud2lm
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesFrances Harris
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parentssirchriss
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentationSally Garza
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
Internet safety-presentation(1)
Internet safety-presentation(1)Internet safety-presentation(1)
Internet safety-presentation(1)andreburtont
 

Similar to E-safety training benefits risks online (20)

Cyberwellness 2011 hws
Cyberwellness 2011 hwsCyberwellness 2011 hws
Cyberwellness 2011 hws
 
Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
 
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonSurfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
102009
102009102009
102009
 
022010
022010022010
022010
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Digital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital WorldDigital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital World
 
Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence
 
Gay Marriage Persuasive Essay Outline
Gay Marriage Persuasive Essay OutlineGay Marriage Persuasive Essay Outline
Gay Marriage Persuasive Essay Outline
 
EDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT Delhi
EDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT DelhiEDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT Delhi
EDUCARNIVAL 2014 - Cyber safety by kapil dahiya at IIT Delhi
 
Current Issues Powerpt
Current Issues PowerptCurrent Issues Powerpt
Current Issues Powerpt
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected Consequences
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
Keeping our kids e safe parents
Keeping our kids e safe parentsKeeping our kids e safe parents
Keeping our kids e safe parents
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentation
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
Internet safety-presentation(1)
Internet safety-presentation(1)Internet safety-presentation(1)
Internet safety-presentation(1)
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

E-safety training benefits risks online

  • 1. E-safety Training 10 th June 2009
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. The debate SWGFL presentation ESafety conference 2008
  • 7.
  • 8. Filtering SWGFL presentation ESafety conference 2008
  • 9.
  • 10.
  • 11. Lois’s friend offers to share their Instant Messenger (like MSN) contacts. Lois is very pleased because she now has 150 ‘friends’.
  • 12.
  • 13. Lois’s friend offers to share their Instant Messenger (like MSN) contacts. Lois is very pleased because she now has 150 ‘friends’. Lois’s ‘friends’ have been collected by sharing address books. She only knows about one third of the people in her contact list. She has used the features in MSN to sort her ‘friends’ into groups – school, home friends, family, holiday mates. She also has a group for ‘friends of friends’ i.e. internet strangers. She does not give out any personal details to these people. She is happy to chat online with friends of friends, but nothing more. She does not use her web cam when she talks to this group.
  • 14. James is 7 years old. He’s in a chat room – a pizza parlour in a ‘virtual’ world. Someone is ‘talking’ to him and asks if he wants to chat ‘outside’ and can they swap email addresses?
  • 15.
  • 16. James is 7 years old. He’s in a chat room – a pizza parlour in a ‘virtual’ world. Someone is ‘talking’ to him and asks if he wants to chat ‘outside’ and can they swap email addresses? James is sitting with his Mum; they are using the internet together. James’ Mum explains he should never give out his private information to anyone, and, if he is not sure, he should talk to a grown up at home or at school.
  • 17. Jack has been talking to an online ‘friend’ for some time. The ‘friend’ seems really nice and they have loads in common. They’ve sent Jack a photo of themselves. It’s the holiday and they ask to Jack to meet in the park.
  • 18.
  • 19. Jack has been talking to an online ‘friend’ for some time. The ‘friend’ seems really nice and they have loads in common. They’ve sent Jack a photo of themselves. It’s the holiday and they ask to Jack to meet in the park. Jack likes his friend and would like to meet him. He tells him he’ll see him on Saturday and he’ll be bringing his dad. His friend says ‘OK’ and that his dad will be there too. They have a good kick about in the park and the dads find a coffee stall!
  • 20. For a while Sophie has been chatting online, in secret, with someone older than her. At first he seemed really nice and appeared to understand her better than her family. She knew it was silly, but she found it easy to tell him lots of personal things, and she was pleased to have an ‘older boyfriend’ online. But now he is sending her very personal and ’explicit’ messages which make her feel uncomfortable and uneasy about the ‘relationship’.
  • 21.
  • 22. For a while Sophie has been chatting online, in secret, with someone older than her. At first he seemed really nice and appeared to understand her better than her family. She knew it was silly, but she found it easy to tell him lots of personal things, and she was pleased to have an ‘older boyfriend’ online. But now he is sending her very personal and ’explicit’ messages which make her feel uncomfortable and uneasy about the ‘relationship’. Sophie doesn’t go online for a few days. She doesn’t talk to anyone: she’s too embarrassed to talk to anyone face to face. She remembers a lesson at school where she learnt about a red button, so she looks in MSN and finds it. It says ‘report abuse’. She types all the details into the form. She feels better for having told someone. She doesn’t talk to her ‘boyfriend’ again.
  • 23.
  • 24.
  • 25.
  • 26.

Editor's Notes

  1. Our objective this afternoon is for us to all begin to think about the issue of E-Safety. I would like to plant E-Safety seeds in all of our minds so that when we leave here they grow into E-Safety trees that are firmly rooted, so that we are always aware of keeping our children safe on the Internet.
  2. What do we see as the benefits of ICT today?
  3. We are the digital immigrants as ICT for most of us has been introduced since we left school and our uses of it are limited. The children will grow up as digital natives as they will grow up being immersed in the new technologies and use then in a different way to us.
  4. These are the ways that children can gain access to the Internet. Many people think that because they do not have an Internet connection their children do not use the Internet. Of all these ways to access the Internet the home computer connection is the only one we can control or filter.
  5. These are some of the risks associated with Internet use
  6. E-safety is growing and evolving all of the time to keep up with technology and the best way to safeguard the children. There is a debate going on about how best to protect children.
  7. For KS1 and KS2 a ‘Walled garden approach’ is recommended. This means that filtering is used on school sites to protect the children from some aspects of the Internet and a restricted use of web2 technology is encouraged. Web 2 technology is a phrase used to describe the applications many people are using the Internet today. Hosted Services – services such as our web site where the site is hosted over the Internet rather than on our server Social Networking – facebook, bebo, twitter are online communities of people with similar interests Video-sharing sites – such as utube, schoolstube, teacher tube are a way to upload and watch video Wiki - A wiki is a collection of Web pages designed to enable anyone with access to contribute or modify content Blog - A blog (a contraction of the term weblog ) is a type of website , usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video. Folksonomy - Folksonomy (also known as collaborative tagging , social classification , social indexing , and social tagging ) is the practice and method of collaboratively creating and managing tags to annotate and categorize content . Sites such as www.delicious.com
  8. Other sites can be added to the list of filtered sites and it is up to us to decide if we think a site should not be available such as google or ebay
  9. It is possible to relax the filtering of these sites for a specified time if anyone feels that they would benefit from time to look at them.
  10. These are some scenarios presented at the 2008 e-safety conference to introduce us to some possible situations we might find ourselves in
  11. Is this something we would be worried sbout? What would we say to Lois?
  12. What would your reaction be?
  13. This is the full picture
  14. What would we do in this situation?
  15. Ask what they would think? Red – Danger Amber – Cause for concern Green – Nothing to worry about
  16. This is the full picture
  17. Ask what they would think? Red – Danger Amber – Cause for concern Green – Nothing to worry about
  18. What should we be doing?
  19. Show policies for children
  20. Explain what will happen on this day Samples of information that the children will take home This will be an annual event to coincide with National ESafety day which is normally in February. We envisage that ESafety would be taught in the classroom also to coincide with this time of year