Internet Safety for D41 Families - PowerPoint PPT Presentation


PPT – Internet Safety for D41 Families PowerPoint presentation | free to view - id: 240512-ZDc1Z


The Adobe Flash plugin is needed to view this content

Get the plugin now

View by Category
About This Presentation

Internet Safety for D41 Families


Review the safety tips: ... Tips from Monitor online activity with AOL Guardian ... – PowerPoint PPT presentation

Number of Views:113
Avg rating:3.0/5.0
Slides: 45
Provided by: davidz6


Write a Comment
User Comments (0)
Transcript and Presenter's Notes

Title: Internet Safety for D41 Families

Internet Safety for D41 Families
  • What do you need to know?

Presented by David Zolnier, Director of
Technology, Glen Ellyn School District 41 Carol
Barsotti, Instructional Technology Specialist,
Glen Ellyn School District 41 Jim Monson,
Detective, Glen Ellyn Police Department
  • Advanced computer skills are
  • required to be Internet safe.

Knowledge Is Power
Sir Francis Bacon, 1597
Access to the Internet
  • FACT Between 2000 and 2002,
  • children increased their access to the
  • regardless of income or age,
  • with the greatest growth happening in the home.

Source i-SAFE Student/Parent Assessments 2003-04
Why the Internet Is So Popular
  • FACT 83 of parents express satisfaction with
    their childs Internet use because of its
    educational value and propensity to encourage
  • The Internet allows users to
  • Gather Up-To-The-Moment News
  • Send Mail Instantly
  • Find Entertainment
  • Purchase Goods Services
  • Research Any Topic
  • Adventure Explore

Keep Your Kids Safe!
  • To keep kids safe, parents need to understand
  • and teach these topics at home
  • Online Security
  • Personal Safety
  • Value of Personal Information  
  • Predator Identification the Grooming Process

Parent Student Perspectives Differ
  • FACT 14 of students polled stated that their
    parents have no idea where they go or what they
    do on the Internet.

Parents vs. Students
  • 92 stated that they had established rules for
    their childs Internet use.
  • 90 feel they have a good idea of what their
    child does while online.
  • 54 feel limited in monitoring sheltering
    their child from inappropriate material on the
  • Only 65 stated that they have established
    rules for their Internet use.
  • Only 66 said they share what they do on the
    Internet with their parents.
  • 53 stated that they would prefer to be alone
    when surfing the Internet.

Source i-SAFE Student/Parent Assessments 2003-04
  • FACT 66 of online sexual solicitation targets
  • FACT On the Internet, boys are as likely as
    girls to be targeted for threats or efforts to
    humiliate them.

Average Ages Targeted For Online Sexual
Source Crimes Against Children Research Center
Online Victimization A Report on the Nations
What We Know About Youth and the Internet
  • FACT Youth are sophisticated users of technology
    often more clever and experienced than adults.
  • FACT Youth can get unrestricted Internet access.
  • FACT Only 25 of youth who received a sexual
    solicitation told a parent or responsible adult.

The Predator Grooming Process
1st Stage Appears Familiar
  • Predator is non-threatening, friendly,
    comforting, and familiar.
  • Predator disguises their true identity and motive
    for the relationship.
  • Predator systematically pretends to have common
    interests with the victim.
  • Predator uses information gathered from profile
    and chat room conversations

Music Cars
Sports Movies
Hobbies Celebrities
2nd Stage Develops Trust
  • Predator always supports childs point-of-view
    regarding conflicts.
  • Predator systematically exploits family, school
    and/or social friction.
  • Predator fosters the illusion that they are the
    only person who understands child.
  • Predator child communication regularly in
    public chat rooms become buddies.

3rd Stage Establishes Secrecy
  • Child places predators e-mail address on their
    e-mail lists.
  • Predator acquires childs personal Internet
    addresses and phone numbers.
  • Child is convinced that their parents wont
    understand their special relationship.
  • Predator and child use secret e-mail accounts to
    communicate stronger messages.

4th Stage Erodes Barriers
  • Predator lures child into having adult-oriented
  • Child begins believing they are prepared for
    adult experiences.
  • Predator exploits childs natural curiosity to
    erode personal ethical barriers.
  • Childs protective inhibitions are desensitized
    by obscene photos and language.

5th Stage Direct Intimidation
  • Child can be blackmailed with forbidden
    materials they received.
  • Predator may resort to threats of violence or of
    public humiliation.
  • Child may feel powerless to ask an adult or
    authority for safety and support.
  • Predator leverages childs increased emotional
    distance from parents to intimidate.

Final Stage Face-To-Face Meeting
  • FACT Not all predators use a grooming process
    to achieve their goal.
  • FACT Juveniles make 48 of aggressive
  • FACT Females make 25 of aggressive

Where Grooming Can Start
FACT 66 of all solicitations happen in Internet
chat rooms. FACT 24 are received through
Instant Messages. FACT 77 of the victims are
14-17 years old.
Typical Internet Chat Room
Source U.S. Department of Justice OJJDP Fact
Sheet, March 2001
I go into a chat room
Source i-SAFE Student/Parent Assessments 2003-04
Registering for a Chat Room
  • Screen name and profile are created during
  • Very often, photos are even included.
  • Personal information (age, interests, etc.) aid
    predators to groom victims.
  • Predators use screen names and profiles to both
    identify and lure victims.

Age 11 Address Chicago, IL Hobbies Playing
Name Judy Age 12 (born in 1994) Address
Name Harold Baxter Age 47 Address Chicago,
IL Works as an insurance salesman
I have met a new person from the Internet
Source i-SAFE Student/Parent Assessments 2003-04
I have posted my photo on the Internet

Source i-SAFE Student/Parent Assessments 2003-04
Instant Messaging
IM allows private, silent communication anytime
  • Instant messages IMs - can be sent and
    received almost anywhere anytime using a computer
    or cell phone.
  • IM addresses are located and used by strangers
    if posted on the Internet.
  • IMs are more difficult to trace and retrieve
    allowing two people to communicate

Examples of Chat Language
Laugh Out Loud Too Much Information Bursting
With Laughter Do I Know You? Cant Talk
Now Parents in Room, watch your
language Parents Are Listening Face To
Face Age, Sex, Location, Picture?
Instant Messaging Tips To Use at Home
  • Have fun being part of your childs online
  • Respect your childs privacy but make certain
    they know personally everyone on their buddy
  • No Strangers Allowed!
  • Keep the computer where everyone sees the
  • No Hidden Screens!
  • Keep personal information private.
  • No Personal Info!
  • Report strangers who solicit meetings with any
  • Teach your child how to recognize avoid
  • Delete unsolicited email attachments.
  • No viruses, worms or trojans!

For Your Kids I promise I will
  • Always tell my parents if something or somebody
    makes me feel uncomfortable, fearful or
  • Never give out personal information such as my
    real name, address, phone number, school name,
    schedule or other identifying information over
    the Internet.
  • Never respond to a message that uses profanity or
    inappropriate language.
  • Never send photos of myself, my friends, or my
    family to anyone I do not personally know.
  • Ask my parents before I do anything online that
    costs money.
  • Gently tell anyone who I see engaging in unsafe
    Internet practices that what they are doing is
  • Help my parents figure out how to do even the
    simplest of computer tasks without laughing at
    them or acting totally superior because my
    parents trust me enough to abide by these rules
    and I appreciate that very much!

Please Be Aware!
  • Some
  • specific
  • examples

  • MSNBC defines it as a social networking site
    sort of a cyber combination of a yearbook,
    personal diary and social club. With more than 
    50 million members,its one of the fastest
    growing Web sites in the country.
  • Shannon Sullivan, teenager Everyone has a
    MySpace and everyone wants a My Space.
  • Free, easy to join, and easy to message its
    members, kids chat about everything from school,
    to sports, to fundraisers for Katrina victims. It
    all seems like innocent fun, and it can be But
    there are hidden dangers.
  • Shannon Sullivan, teenager I honestly thought
    it was just my friends looking at it.

  • Remember Harold (SkateDude13)?
  • Review your childs profile with
  • Minimum age requirement is 14!
  • Review the safety tips http//colle (Link is
    at the bottom of the main page)

Blogging Websites
  • A blog is a journal that is available on the web.
  • It is short for weblog.
  • The activity of updating a blog is "blogging" and
    someone who keeps a blog is a "blogger."
  • Blogs are typically updated daily using software
    that allows people with little or no technical
    background to update and maintain the blog.

Blogging Tips
  • Be as anonymous as possible. Avoid postings that
    could enable a stranger to locate you. That
    includes your last name, the name of your school,
    sports teams, the towns you live in, and where
    you hang out.
  • Protect your info. Check to see if your service
    has a "friends" list that allows you to control
    who can visit your profile or blog. If so, allow
    only people you know and trust.
  • Avoid in-person meetings. Don't get together
    with someone you "meet" through a blog unless you
    are certain of their actual identity. Although
    it's still not risk-free, if you do meet the
    person, arrange the meeting in a public place and
    bring some friends along.
  • Photos Think before posting. What's uploaded to
    the Net can be downloaded by anyone and passed
    around or posted online pretty much forever.
    Avoid posting photos that allow people to
    identify you. 
  • Check comments regularly. If you allow them on
    your profile or blog, check them often. Don't
    respond to mean or embarrassing comments.  Delete
    them and, if possible, block offensive people
    from commenting further.    
  • Be honest about your age.Membership rules are
    there to protect people. If you are too young to
    sign up, do not attempt to lie about your age.
    Talk with your parents about alternative sites
    that may be appropriate for you.

AOL Users
  • Use the AOL Parental Controls
  • Tips from
  • Monitor online activity with AOL Guardian
  • Opt for AOL Guardian "report cards" that show
    your kids' Web surfing, e-mail and IM activity.
  • Monitor how long your kids are online. Set
    controls by day, time of day or session length.
  • Help your kids' communicate with friends by
    creating a list of approved e-mail addresses.
  • Manage Parental Controls remotely via
    You don't have to be there to monitor your kids'
    activity and Internet safety.
  • Limit access to other software, too

  • Are you noticing a pattern?

Protect Your Information!
Final Tips for Parents
  • Install Antivirus Software.
  • Virus a software program capable of reproducing
    itself and usually capable of causing great harm
    to files or other programs on the same computer
Final Tips for Parents
  • Use a Firewall on your Computer.
  • Firewall A firewall is a software program or
    piece of hardware that protects the resources
    of one network from users from other
    networks or
    the outside world.
  • To enable the Windows XP firewall
  • Click Start
  • ?Control Panel
  • ?Security Center
  • ?Firewall

Final Tips for Parents
  • Beware of phishing tactics.
  • Phishing the act of tricking someone into giving
    up confidential information or tricking them
    into doing something that they normally wouldnt
    do or shouldnt do.
  • For example sending an e-mail to a user falsely
    claiming to be an established legitimate
    enterprise in an attempt to scam the user into
    surrendering private information that will be
    used for identity theft.

Final Tips for Parents
  • Beware of phishing tactics.
  • click on a link inside an email asking you
  • to login or provide any personal information!
  • Legitimate companies dont ask
  • for this information via email.

Final Tips for Parents
Final Tips for Parents
  • Beware of phishing tactics.
  • Targets include
  • ebay
  • Paypal
  • Chase
  • Citibank
  • Bank of America

Final Tips for Parents
  • Watch what you download!
  • Only download files from trusted sources.
  • Beware of files with extensions such as
  • .bat .js
  • .chm .msi
  • .com .reg
  • .exe .scr
  • .inf .vbs

Final Tips for Parents
  • Keep credit card information offline
  • Many web sites that you make purchases with
    online will ask you to save your credit card
    information with them to expedite future

Final Tips for Parents
  • Consider installing an Internet Filter

Final Tips for Parents
  • Do your research!

Final Tips for Parents
  • Enjoy the opportunity to learn and
  • explore online with your children!

Special Thanks! 5963 La Place Ct, Suite
309 Carlsbad, CA 92008