Cyberbullying and Internet Safety - PowerPoint PPT Presentation

1 / 32
About This Presentation
Title:

Cyberbullying and Internet Safety

Description:

Profile can contain personal/private information, pictures (from mobile phones) ... Online gaming: Xbox Live and runescape.com. Cyberbullying ' ... – PowerPoint PPT presentation

Number of Views:321
Avg rating:3.0/5.0
Slides: 33
Provided by: georgef
Category:

less

Transcript and Presenter's Notes

Title: Cyberbullying and Internet Safety


1
Cyberbullying and Internet Safety
  • By George Frazier
  • Director of Technology
  • Phoenixville Area School District

2
Outline
  • Introduction to Technologies
  • Cyberbullying and Internet Predators
  • Safety and Monitoring Tips

3
(No Transcript)
4
Technology
  • Social-Networking Websites
  • Web log or Blog Websites
  • Email
  • Text Messaging
  • Instant Messaging
  • Chat Rooms

5
Technology
  • Social-Networking and Web Log (Blog) Sites
    Myspace, Xanga, Facebook, Friendster, Blogger,
    LiveJournal
  • Simple website creation
  • Personal Journal or Diary
  • Profile can contain personal/private information,
    pictures (from mobile phones), graphics, and
    music
  • to find and communicate with old and new
    friends.

6
Social-Networking Site Profile
7
Social-Networking Profile Search
8
(No Transcript)
9
(No Transcript)
10
(No Transcript)
11
Technology
  • Email
  • Text Messaging-Mobile Phones
  • Instant Messaging
  • AOL Instant Messenger, Yahoo! Messenger, ICQ, and
    MSN Messenger.
  • Chat Rooms
  • Online gaming Xbox Live and runescape.com

12
(No Transcript)
13
Cyberbullying
  • Cyberbullying involves the use of information
    and communication technologies to support
    deliberate, repeated, and hostile behavior by an
    individual or group, that is intended to harm
    others.
  • --Bill Belsey, President, Bullying.org

14
Cyberbullying
  • Bullies are Anonymous
  • Little or no fear of punishment
  • Communicate quickly and widely
  • Beyond reach of school punishment
  • Reach into home of victim
  • Victims afraid to report for fear of punishment

15
Cyberbullying
  • Post inappropriate content about each other text
    and pictures
  • Steal passwords and take over accounts
  • Gang up on single individual
  • Share private information
  • Pretend to be another person and create
    social-network sites or blogs

16
Cyberbullying
  • Stop, Block and Tell!!!
  • ThinkB4UClick
  • R-E-S-P-E-C-T
  • Keep Personal Information Private
  • Google Yourself!
  • Take 5!
  • (http//www.wiredsafety.org/)

17
Guidelines for Good Netiquette
  • Apply the golden rule Treat others the way you
    would like to be treated
  • Remember there is a person on the other end of
    your message
  • Know where you are and use appropriate good
    behavior
  • Be forgiving of other people's mistakes,
    especially newcomers
  • Always remain calm, especially if someone insults
    you (or you think they have)
  • Avoid using ALL CAPS to emphasizemany perceive
    this as "yelling" or find it annoying

18
Guidelines for Good Netiquette
  • Refrain from using inappropriate or offensive
    language
  • Use your online name or nickname consistently and
    sign all messages with it (but protect your real
    identity by never using your full name)
  • Don't send or forward junk e-mail (commonly
    referred to as spam)
  • Stay out of ongoing, emotional arguments or
    flame wars
  • Check your spelling, be concise, and keep
    messages short
  • When participating in chat rooms, avoid
    interrupting others and stay on topic
  • Follow the same rules of good behavior that you
    would in real life.

19
Guidelines for Good Netiquette
  • Use emoticons to help communicate humor and
    sarcasm. The following are some examples of
    commonly used emoticons
  • -)   Happy or joking-)   Winking-(   Unhappy
    -   Ambivalent-o   Surprised or
    concerned-x   Not saying anything-p   Sticking
    out your tongue (usually in fun)
  • (http//www.microsoft.com/athome/security/online/n
    etiquette.mspx)

20
Internet Predators
  • One in four students participates in real-time
    chats
  • One in five children who use chat rooms has been
    approached by pedophiles
  • Children aged 7 to 17 29 would freely give
    their home address
  • 250,000 to 500,000 pedophiles in the US one
    pedophile to every 100-200 Internet users
  • Two million new Internet users per month

21
Internet Predators
  • Target teen online hot-spots
  • Seduce with kindness, attention and sympathy
  • Versed in teen culture, music and trends
  • Often use fictitious name, age, location, gender
  • Ask child to enter private chat rooms
  • Build trust leading up to in person meeting

22
Internet Predators
  • Remember the 4 Rs
  • RECOGNIZE techniques used by online predators to
    deceive their victims.
  • REFUSE requests for personal information.
  • RESPOND assertively if you are ever in an
    uncomfortable situation while online. Exit the
    program, log off or turn off the computer, and
    notify your ISP or local law enforcement.
  • REPORT, to law enforcement authorities, any
    suspicious or dangerous contact that makes you
    uncomfortable.
  • (www.isafe.org)

23
Child Internet Safety Tips
  • Never give personal information full name,
    address, age, school, phone number.
  • Never post photographs.
  • Never meet someone you have met online.
  • Review Buddy or Friends Lists--Allow only people
    you know and trust.
  • Never enter a Private Chat Room. Use moderated
    chats.
  • Beware of people asking too many personal
    questions and trying to become friends too
    quickly.
  • Dont believe everything that you see or read.
  • If something makes you uncomfortable, take a
    standsay no and log off.

24
Parent Internet Safety and Monitoring Tips
  • Educate yourself about Cyberbullying and Internet
    Safety.
  • Educate yourself about Internet Technologies
    Social-networking, Blogs, IM, email, etc.
  • Place the computer in an open, common area.
  • Install Parental Control Software.
  • Learn the Code of Conduct for various web sites.
  • Learn Chat Lingo.

25
Leetspeak and Chat Acronyms
  • Shorthand and leetspeak
  • Elite speak
  • "leetspeak" as "!337p34k"
  • "phonetic" as "f0\371(
  • LOL-Laughing Out Loud
  • POS-Parent Over Shoulder
  • BBS-Be Back Soon

26
Social-networking and Web log (blog) Websites
  • www.facebook.com
  • www.friendster.com
  • www.livejournal.com
  • www.myspace.com
  • www.xanga.com
  • www.blogger.com
  • 360.yahoo.com
  • www.linkedin.com
  • www.wordpress.com
  • www.sixapart.com
  • spaces.msn.com

27
Cyberbullying Prevention and Internet Safety
Websites
  • www.delcoicac.com - local Internet Crimes
    Against Children Task Force
  • www.wiredsafety.org
  • www.cyberbullying.ca
  • www.isafe.org
  • www.cyberfully.org
  • www.internetsuperheros.org
  • www.microsoft.com/athome/security/children/default
    .mspx
  • www.cybertipline.com

28
Cyberbullying and Internet Safety
  • By George Frazier
  • Director of Technology
  • Phoenixville Area School District

29
Local System
  • List locations parents can look on local system,
    e.g. My Recent Documents, cookies and Internet
    Temp.
  • Demonstrate how to view hidden files and file
    extensions.

30
Peer 2 Peer Sites
  • List Peer 2 Peer Sites that parents should
    block/monitor.
  • How to search for .gif and .jpg. (Check on
    .png graphic files).

31
Harressing Email
  • How to view email header in various email
    programs.

32
Safety Software
  • http//monitoring-software-review.toptenreviews.co
    m/monitoring-software-review-resources.html
Write a Comment
User Comments (0)
About PowerShow.com