INTERNET SAFETY - Salem County Bridge

advertisement
INTERNET SAFETY
BROUGHT TO YOU BY:
SALEM COUNTY 2000
PARTNERS
LEARNING OBJECTIVES
• THE DANGERS OF THE INTERNET
• WAYS TO PROTECT FAMILY MEMBERS
FROM THOSE DANGERS
• IDENTIFY WARNING SIGNS OF ANY
POTENTIAL DANGERS ON THE INTERNET
• WAYS TO CHECK INTERNET USAGE
INAPPROPRIATE MATERIAL
IT CAN BE FOUND
ANYWHERE• INTERNET SITES
• POPUPS
• SPAM EMAIL
• CELL PHONES
• MySpace.com
DRUGS
PLEASE WATCH THIS VERY IMPORTANT MOVIE
Who’s Really on the Internet
“Danny”
Let’s look at someone’s myspace profile –
(the actual screen name is blacked out below)
He calls himself, “Danny”
http://www.myspace.com/AZDanny
Avatar
Danny’s Information and his
Interests
“About
Me”
More Information
Personal
Identifiers
“Top
Friends”
Who’s Really on the Internet
Danny aka Keith
•Let’s look at another web site…
•www.azsexoffender.org: the State of Arizona,
government - operated sex offender
registration site.
Do you really know who you are
talking to on the internet?
“Danny” from Myspace is actually Keith D. Wilkins
who is a registered sex offender in the state of
Arizona. He was charged and convicted for Luring a
Minor for Sexual Exploitation. “Danny” also lied
about his age on his Myspace page.
What is Megan’s Law?
Enacted in 1996, Megan's Law is named after seven-year-old
Megan Kanka of New Jersey who was raped and murdered by
a known child molester living just across the street from her
family. Megan's Law authorizes local law enforcement to
notify the public about high-risk and serious sex offenders who
may live, work or frequent a particular area of a
community. The law has two components - sex offender
registration and community notification. The law is intended to
give the community access to information and take necessary
precautions; it is not intended to punish, harass or commit
crimes against convicted sex offenders.
The Following May Be Used Against You…
Everybody Knows Your Name
Instant Messaging & Chat Rooms:
AIM
ICQ
MSN
Yahoo!
JUST HOW SAFE
ARE THEY?
Protecting Your Student
• Set Limits
• Review Profile
• Monitor Cell Use
• Know students’ screen name and password
• Know students’ online friends.
• Warn your students to be wary of anyone he or she
meets in a chat room
INSTANT MESSENGER
Understanding Shorthand
•
•
•
•
•
•
•
•
LOL
F2T
H8
LV
PAW
WAN2
WYGOWM
26Y4U
Understanding Shorthand
•
•
•
•
•
•
•
•
LOL
F2T
H8
LV
PAW
WAN2
WYGOWM
26Y4U
Laugh Out Loud
Free To Talk
Hate
Love
Parents Are Watching
Want To
Will You Go Out With Me
Too Sexy For You
H
o
c
k
e
y
C
h
a
t
T
o
m
m
y
:
"
H
i
,
a
n
y
N
J
D
e
v
i
l
s
f
a
n
s
o
u
t
t
h
e
r
e
?
"
C
u
r
t
:
"
D
e
v
i
l
s
s
u
c
k
,
R
a
n
g
e
r
s
R
u
l
e
?
"
J
B
:
"
D
e
v
i
l
s
1
9
9
5
S
t
a
n
l
e
y
C
u
p
C
h
a
m
p
i
o
n
s
!
"
T
Z
i
n
V
a
:
"
G
o
D
e
v
i
l
s
B
r
o
d
e
u
r
f
o
r
P
r
e
s
i
d
e
n
t
.
"
J
B
:
"
T
o
m
m
y
,
y
o
u
g
o
t
o
t
h
e
g
a
m
e
s
?
"
T
o
m
m
y
:
"
I
w
i
s
h
;
I
l
i
v
e
t
o
o
f
a
r
a
w
a
y
.
"
J
B
:
"
W
h
e
r
e
?
"
T
o
m
m
y
:
"
T
o
m
s
R
i
v
e
r
"
T
Z
i
n
V
A
:
"
T
h
a
t
'
s
o
n
l
y
1
.
5
h
o
u
r
s
,
w
h
y
d
o
n
'
t
y
o
u
d
r
i
v
e
t
h
e
r
e
?
"
J
B
:
"
C
o
o
l
,
t
h
a
t
'
s
n
e
a
r
S
e
a
s
i
d
e
"
T
o
m
m
y
:
"
I
'
m
o
n
l
y
1
1
,
I
d
o
n
'
t
d
r
i
v
e
a
n
d
m
y
D
a
d
h
a
t
e
s
h
o
c
k
e
y
.
"
The Luring Process
•
•
•
•
•
Courting Process
Fantasy Chat
Exchange of Pictures
Gifts
Travel to Meet
Cyber Bullying:
• Using electronic communications to
harass, threaten, antagonize, or intimidate
another person.
• Posing as someone else for purposes of
harassing them or others.
• Using a persons picture or a digitally
enhanced image without their permission.
Modes of Cyber Bullying:
•
•
•
•
•
•
•
E-mail
Websites
Web Logs or “Blogs” (Myspace)
Instant Message (IM)
Chat Rooms
Digital Cameras/Cell Phones (texting)
Video Games (Xbox Live, etc.)
Signs of Bullying
•
•
•
•
•
•
•
•
Loss of appetite
Poor sleep
Avoid doing things they usually enjoy
Moodiness and withdrawal
Avoid certain situations, like taking the bus
Decrease in grades
Loss of friends
Need for extra money or supplies
www.ryanpatrickhalligan.com
• 13 year old from Vermont
committed suicide
• After being bullied at school
he turned to the Internet
where he met other suicidal
teens
• Parents helped to create new
laws on bullying in Vermont
If a Child Is Being
Cyber Bullied
•
•
•
•
•
•
•
Listen
Believe
Be supportive
Be patient
Provide information for getting help
Focus on offering comfort and support
Praise the child for being brave enough to talk
about it
• Take it seriously
• Call your local police department
IDENTIFY THEFT AND
INTERNET FRAUD
• CREDIT CARDS - USE
ONE CREDIT CARD
FOR INTERNET
PURCHASES
• WIRELESS SECURITY
• EBAY SCAMS
• http://www.njsp.org/tech/
identity.html
• IC3.GOV
• CHECK
OVERPAYMENT
UNSUPERVISED SURFERS CAN
QUICKLY LEARN HOW TO
• Steal identifying information on other people
• Chat with members of hate groups or satanic cults and
be lulled into their illegal activities.
• Join groups that steal or pirate copyrighted software.
• Create bogus accounts to sell non-existent
merchandise.
• Hack into corporate/government servers to steal or
destroy information.
Sexting
The act of sending sexually explicit
messages or photos electronically,
primarily between cell phones.
Consequences – becomes public
information
Jesse Logan
• 18-year-old Jesse Logan sent nude
pictures of herself to a boyfriend.
• When they broke up, he sent them
to other high school girls.
• The girls were harassing her,
calling her terrible names.
• She was miserable and depressed,
afraid even to go to school!
• Jesse went on TV to tell her story.
Her purpose was simple: “I just
want to make sure no one else will
have to go through this again.”
• The interview was in May 2008.
Two months later, Jesse Logan
committed suicide. She was 18.
WARNING SIGNS
•
•
•
•
Unwanted e-mail
Always in a room with a computer
On computer at late hours
Spending the night over a friend’s house where
computer and internet usage is unmonitored
• Children’s friend using your computer with their
account
WARNING SIGNS
• Quickly turns off the computer or changes software
applications when someone enters the room
• Receives unusual phone calls/gifts/letters
• Very secretive about on-line activities
• You find credit card numbers on the computer that
are not yours
• Visits web sites dealing with death, destruction, or
other morbid topics
EDUCATION/
PREVENTION
• Learn and share the dangers
• Talk the language
• Be the administrator of their home or classroom computers
• Do not give out personal information
LOCATION OF THE COMPUTER
• PLACE THE
COMPUTER IN A
VISIBLE AREA
• AVOID ISOLATED
AREAS
• PARENTAL
INVOLVEMENT IS
NECESSARY
Protect Yourself
S ystem updates
Anti-virus software
F irewall
E valuate
Take Control of Your Computer
• Become the Administrator
• Reveal Hidden Files
• Know Your Cookies
• Know Your Documents
• Browsing History
Become the Administrator
1. Click on the Start menu button and select Control Panel.
2. When the Control Panel screen appears, open User Accounts.
3. This will take you to the following screen:
4. Click the name of the account you want to change.
5. Click Change the account type.
Become the Administrator
6. The following screen will appear:
7. Select Computer administrator or Limited, depending on the
type of account you want, and then click Change Account Type.
8. Most children should have a Limited account only.
Reveal Hidden Files
1. Click on the Start menu button, then click the list item called
Control Panel.
2. When the Control Panel screen opens, choose the file called
Appearance and Themes.
3. When that window opens, choose the file called Folder
Options.
4. You will get a dialog box like the one below:
Reveal Hidden Files
Reveal Hidden Files
5. Choose the tab marked View and then select the folder called
Hidden files and folders.
6. Click on the radio button Show hidden files and folders.
7. Next, click on the button Apply.
Please Note: The folder and button may not be immediately
visible. You may need to use the scroll bar on the side of the
dialogue box to move the list down to the right folder and button.
Know Your Cookies
1. Click on the Start menu button; then select the list item called
Search.
2. When the search box opens, click on All files and folders at
the left of the screen.
3. Type in the phrase cookies, and click search.
Know Your Cookies
4. This will take you to this screen:
Each folder shown on the right records the cookies of the Websites
visited by each user of the computer. Looking at the names of the
cookies can tell you where a child is going on the Internet.
Periodically, clear your history or cookies after checking to see
what has been stored.
Know Your Documents
Click on the Start menu button and then go to the list item called
My Recent Documents. When you highlight the list, a drop down
menu of recent items appears (see below). Highlight an item, and it
will open.
Know Your Documents
If My Recent Documents does not show up in the Start menu,
you can easily add it by following these steps:
1. With your mouse, right click on the bottom task bar and select
Properties.
2. Select the Start Menu tab.
3. Click on Customize.
4. Select the Advanced tab.
5. Check the box that says List my most recently opened
documents.
6. Click OK.
Know Your Browsing History
• Go to Internet Explorer
• Click on Favorites
• Open History Tab
Educate and
Talk with Your
Students
Resources…
INTERNET SAFETY
HOTLINE (856) 935-8119
THANK YOU
SALEM COUNTY 2000
INTERNET SAFETY INITIATIVE
Download