internet safety doug walker supervisor of instruction/technology hillsdale public schools
TRANSCRIPT
Internet Safety Internet Safety
Doug WalkerDoug Walker
Supervisor of Supervisor of Instruction/TechnologyInstruction/Technology
Hillsdale Public SchoolsHillsdale Public Schools
The InternetThe Internet
A global connection of networks.A global connection of networks. Nobody owns it.Nobody owns it. Impossible to control it. Impossible to control it.
How do we get there?How do we get there?
20% of children age 10-17 20% of children age 10-17 have been solicited sexually have been solicited sexually
online; that's 1 out of every 5 online; that's 1 out of every 5 kids kids
75% of youth who received an online sexual solicitation did not tell a parent.
One third of kids have been contacted by a stranger and half of these were considered inappropriate
81% of parents of online youth say that kids aren't careful enough when giving out information about themselves online
76% of parents don't 76% of parents don't have rules about what have rules about what their kids can do on the their kids can do on the computercomputer
65% of parents believe that 65% of parents believe that kids do things online that kids do things online that they wouldn't want their they wouldn't want their parents to know aboutparents to know about
StatisticsStatistics
4,000,000 children are posting 4,000,000 children are posting content to the Web everydaycontent to the Web everyday
9 out of 10 parents will never know 9 out of 10 parents will never know that any inappropriate contact has that any inappropriate contact has occurred occurred
14% have actually met face to face 14% have actually met face to face with a person they have met on the with a person they have met on the Internet Internet
StatisticsStatistics
1 out of 17 kids have been harassed, 1 out of 17 kids have been harassed, threatened, or bullied threatened, or bullied
Nearly three-quarters (73%) of online teens Nearly three-quarters (73%) of online teens believe that someone their age is most likely believe that someone their age is most likely to be approached by someone unknown to to be approached by someone unknown to them online as opposed to offline them online as opposed to offline
When asked how they responded the last When asked how they responded the last time they were contacted online by a time they were contacted online by a complete stranger, just 3% of online teens complete stranger, just 3% of online teens said they told and adult or authority figure said they told and adult or authority figure
StatisticsStatistics
Most kids will not report inappropriate Most kids will not report inappropriate Internet contact to their parents because Internet contact to their parents because they are afraid of losing Internet privileges they are afraid of losing Internet privileges
61% of 13-17 yr olds have a personal 61% of 13-17 yr olds have a personal profile on social networking sites profile on social networking sites
44% of online teens with profiles like 44% of online teens with profiles like FacebookFacebook and Myspace have been and Myspace have been contacted by a stranger, compared with contacted by a stranger, compared with 16 percent of those without profiles. 16 percent of those without profiles.
StatisticsStatistics
71% have reported receiving messages 71% have reported receiving messages from someone they do not know from someone they do not know
45% have been asked for personal info 45% have been asked for personal info from people they do not know from people they do not know
48% of 16-17 yr olds report that their 48% of 16-17 yr olds report that their parents know "very little" or "nothing" parents know "very little" or "nothing" about their online activities about their online activities
MySpace deletes 25,000 profiles weekly of MySpace deletes 25,000 profiles weekly of users who don't meet the site's 14-year-users who don't meet the site's 14-year-old minimum age requirement old minimum age requirement
Resources for StatisticsResources for Statistics
http://www.netlingo.com/statistics.cfmhttp://www.netlingo.com/statistics.cfm http://www.pewinternet.org/pipcommehttp://www.pewinternet.org/pipcomme
nts.asp?m=9&y=2007nts.asp?m=9&y=2007 http://www.washingtonpost.comhttp://www.washingtonpost.com http://www.protectkids.org/statistics.hthttp://www.protectkids.org/statistics.ht
mm http://www.ojp.usdoj.gov/ovc/publicatihttp://www.ojp.usdoj.gov/ovc/publicati
ons/bulletins/internet_2_2001/internet_ons/bulletins/internet_2_2001/internet_2_01_6.html2_01_6.html
http://www.sentrypc.com/statistics.hthttp://www.sentrypc.com/statistics.htmm
http://www.enough.org/inside.php?taghttp://www.enough.org/inside.php?tag=statistics=statistics
http://www.netsmartz.org/safety/statishttp://www.netsmartz.org/safety/statistics.htmtics.htm
http://www.mykidsafeinternet.com/porhttp://www.mykidsafeinternet.com/pornography_stats.phpnography_stats.php
http://www.safefamilies.org/sfStats.phhttp://www.safefamilies.org/sfStats.phpp
http://www.cyberpatrol.com/default.ashttp://www.cyberpatrol.com/default.aspx?id=79&mnuid=7.5px?id=79&mnuid=7.5
http://safetspace.comhttp://safetspace.com
http://climbtothestars.orghttp://climbtothestars.org
Signs that your child might be Signs that your child might be at-risk onlineat-risk online
Your child spends large amounts of Your child spends large amounts of time on-line, especially at nighttime on-line, especially at night . .
You find pornography on your You find pornography on your child's computerchild's computer
Your child receives phone calls Your child receives phone calls from men you don't know or is from men you don't know or is making calls, sometimes long making calls, sometimes long distance, to numbers you don't distance, to numbers you don't recognize.recognize.
Your child receives mail, gifts, or Your child receives mail, gifts, or packages from someone you don't packages from someone you don't knowknow
Your child turns the computer Your child turns the computer monitor off or quickly changes the monitor off or quickly changes the screen on the monitor when you come screen on the monitor when you come into the room.into the room.
Your child becomes withdrawn from Your child becomes withdrawn from the family.the family.
Your child is using an on-line Your child is using an on-line account belonging to someone account belonging to someone else.else.
Web 2.0Web 2.0
Social NetworksSocial Networks
What are they?What are they?
http://commoncraft.com/video-social-http://commoncraft.com/video-social-networkingnetworking
How do you Social How do you Social Network?Network?
How are they used?How are they used?
Students = Social reasons Students = Social reasons Adults=NetworkingAdults=Networking
The tool is not special to a student. It The tool is not special to a student. It is a means to communicate.is a means to communicate.
Popular Social NetworksPopular Social Networks
MyspaceMyspace Facebook – 93% of college studentsFacebook – 93% of college students NingNing Second LifeSecond Life You tubeYou tube TwitterTwitter LinkedinLinkedin
Safety Concerns?Safety Concerns?
ProfileProfile EmployersEmployers ArchivedArchived http://www.youtube.com/watch?http://www.youtube.com/watch?
v=lZk49J30zFM&feature=relatedv=lZk49J30zFM&feature=related
Oliva’s blogOliva’s blog
www.myspace.comwww.myspace.com
Blog Profiles … Can reveal a Blog Profiles … Can reveal a lot …lot …
Blog Entries … Can reveal Blog Entries … Can reveal even more!even more! This was a crazy This was a crazy
weekend.weekend.
Violetta smoked up in Violetta smoked up in her bathroom I love my her bathroom I love my girl.)girl.)
Crazy albany drivingCrazy albany driving
Spending too much Spending too much money on booksmoney on books
Smoking way too muchSmoking way too much
Seeing people dieSeeing people die
DiareeahDiareeah
Quality time with MY Quality time with MY StephanieStephanie
Falling in love with a Falling in love with a woman (lolz!!!)woman (lolz!!!)
Buying the coolest Buying the coolest cameracamera
Shooting everythingShooting everything
Donuts in KHOLS Donuts in KHOLS parking lotparking lot
Stealing clothingStealing clothing
Thats only what I can Thats only what I can remember.remember.
In other news I am In other news I am getting boobs. Well I getting boobs. Well I already have them. already have them. Theyre just getting Theyre just getting bigger. And I am getting bigger. And I am getting thinner.thinner.
The Ultimate SurveyThe Ultimate Survey
Social Networks can be Social Networks can be compared to NY City. Full of compared to NY City. Full of good and bad. If you look for good and bad. If you look for
one you will find it. one you will find it.
Chatting, Texting, Instant Chatting, Texting, Instant Messaging, BloggingMessaging, Blogging
Where is it done? Where is it done?
Social Networks – Facebook, My Space, Social Networks – Facebook, My Space, NingNing
Aol Instant MessengerAol Instant Messenger SkypeSkype TwitterTwitter BlogsBlogs WikiWiki Video GamesVideo Games
Chat Acronyms and Text Chat Acronyms and Text ShorthandShorthand
143143 - it means I love you - it means I love you
182182 - it means I hate you - it means I hate you
459459 - it also means I love you - it also means I love you
420420 - it refers to marijuana - it refers to marijuana
SamplesSamples
GNOCGNOC - Get Naked On Cam (webcam) - Get Naked On Cam (webcam) GYPOGYPO - Get Your Pants Off - Get Your Pants Off KPCKPC - Keeping Parents Clueless - Keeping Parents Clueless LMIRLLMIRL - Let's Meet In Real Life - Let's Meet In Real Life MorFMorF - Male or Female - Male or Female MOSMOS - Mom Over Shoulder - Mom Over Shoulder
SamplesSamples
P911P911 - Parent Alert - Parent Alert
PALPAL - Parents Are Listening - Parents Are Listening
PAWPAW - Parents Are Watching - Parents Are Watching
PIRPIR - Parent In Room - Parent In Room
POSPOS - Parent Over Shoulder - Parent Over Shoulder
Chat Acronyms and Text Chat Acronyms and Text Shorthand Shorthand
http://www.netlingo.com/emailsh.cfmhttp://www.netlingo.com/emailsh.cfm http://www.netlingo.com/top50parenthttp://www.netlingo.com/top50parent
s.cfms.cfm http://www.netlingo.com/lists.cfmhttp://www.netlingo.com/lists.cfm
Chat RoomsChat Rooms
All over the internetAll over the internet Video games.Video games. It is easy for children to reveal more It is easy for children to reveal more
then they should.then they should. They are cruising grounds for They are cruising grounds for
predators.predators.
If a person unknown to you If a person unknown to you was speaking to your child in was speaking to your child in
the front yard, what would the front yard, what would you do?you do?
If your child was If your child was communicating with a communicating with a
stranger online, what would stranger online, what would you do?you do?
IM software allows users to create a IM software allows users to create a detailed personal profile including: detailed personal profile including: name, email address, age, home name, email address, age, home address, phone number, school and address, phone number, school and hobbies.hobbies.
Instant MessagingInstant Messaging
Finding The EvidenceFinding The Evidence
Finding The EvidenceFinding The Evidence
Searching for files on the computerSearching for files on the computer Finding a History of Websites VisitedFinding a History of Websites Visited Finding Temporary Internet FilesFinding Temporary Internet Files
Searching for FilesSearching for Files
Click STARTClick START Click Find/SearchClick Find/Search Click Pictures, Music or VideoClick Pictures, Music or Video You can search by name or leave it You can search by name or leave it
blank. Leaving it blank will search for blank. Leaving it blank will search for all. all.
Search By File ExtentionSearch By File Extention
Graphic/Video FilesGraphic/Video Files
.bmp.bmp .eps.eps .gif.gif .jpg.jpg
.pct.pct .pcx.pcx .tif.tif .wmf.wmf
.asf.asf .avi.avi .mov.mov .mpg.mpg
Using WildcardsUsing Wildcards
An asterick denotes a “wildcard” An asterick denotes a “wildcard” which allows you to search a computer which allows you to search a computer for all files with that extension.for all files with that extension.
*.(file extension)*.(file extension)
ExampleExample
*.jpg*.jpg
Finding Temporary Internet Finding Temporary Internet Files and HistoryFiles and History
Open up Internet Open up Internet ExplorerExplorer
Click ToolsClick Tools Click Internet Click Internet
OptionsOptions Find Browsing Find Browsing
HistoryHistory Click On SettingsClick On Settings Click on View FilesClick on View Files
Set Parental ControlsSet Parental Controls
Protecting Your Home Protecting Your Home ComputerComputer
Open DNSOpen DNS www.opendns.comwww.opendns.com
K9 Web ProtectionK9 Web Protection http://www1.k9webprotection.com/http://www1.k9webprotection.com/ A listing of many other free and A listing of many other free and
commercial filtering options.commercial filtering options. http://digitaldialog.wikispaces.com/filteringhttp://digitaldialog.wikispaces.com/filtering Net Nanny - http://www.netnanny.com/Net Nanny - http://www.netnanny.com/
SpywareSpyware
Generally speaking, spyware is software that hides on your computer, tracks what you’re doing online,
and then sends that information over the Internet. • Some types of spyware, called “keystroke
loggers” actually record and send everything you type on
your computer. • Spyware software can sneak onto your computer
when you download unsafe software and files—or even visit a hostile Web page.
SpywareSpyware
Avoid clicking on banner ads, links, or offers that appear too good to be true.
• Be cautious with file-sharing software and other potentially unwanted software.
VirusVirus
VirusVirus
Viruses are software programs that hide on your computer and cause mischief or damage.
Viruses are also called worms, Trojan Horse programs, or other names, depending on how they behave. –Malware
Around 80% of malware today is designed to find and steal confidential information stored on your computer.
Malware can invade your machine through infected email attachments, “bots” that crawl the Internet looking for unprotected computers, and visits to “hostile” Web sites.
VirusVirus
Install and update an antivirus Install and update an antivirus softwaresoftware
Scan regularlyScan regularly Do not open email attachments that Do not open email attachments that
are suspicious.are suspicious.
Dangerous File Extensions
File ExtensionDescription File Extension Description
ADE Microsoft Access Project Extension MDB Microsoft Access Application
ADP Microsoft Access Project MDE Microsoft Access MDE Database
BAS Visual Basic® Class Module MSC Microsoft Common Console Document
BAT Batch File MSI Windows Installer Package
CHM Compiled HTML Help File MSP Windows Installer Patch
CMD Windows NT® Command Script MST Visual Test Source File
COM MS-DOS® Application PCD Photo CD Image
CPL Control Panel Extension PIF Shortcut to MS-DOS Program
CRT Security Certificate REG Registration Entries
EXE Application SCR Screen Saver
HLP Windows® Help File SCT Windows Script Component
HTA HTML Applications SHS Shell Scrap Object
INF Setup Information File URL Internet Shortcut (Uniform Resource Locator)
INS Internet Communication Settings VB VBScript File
ISP Internet Communication Settings VBE VBScript Encoded Script File
JS JScript® File VBS VBScript Script File
JSE JScript Encoded Script File WSC Windows Script Component
LNK Shortcut WSF Windows Script File
WSH Windows Scripting Host Settings File
Internet SearchingInternet Searching
Safe Internet SearchingSafe Internet Searching
Google Safe Search Google Safe Search www.google.comwww.google.com www.nettrekker.comwww.nettrekker.com www.yahooligans.cowww.yahooligans.co
mm
NettrekkerNettrekker
Over 180,000 Educator Selected Over 180,000 Educator Selected Online ResourcesOnline Resources
http://school.nettrekker.comhttp://school.nettrekker.com Search for Images, Multimedia, Search for Images, Multimedia,
Timelines, etc.. Timelines, etc.. GgwstudentGgwstudent MbschoolMbschool AbsstudentAbsstudent
So… What Should Parents Do?So… What Should Parents Do?
1.1. Learn everything you can about computers, Learn everything you can about computers, the Internet and related technologythe Internet and related technology - -
• Develop and maintain proficiency through use. Develop and maintain proficiency through use. • Ask children to demonstrate.Ask children to demonstrate.
2.2. Communicate with your children. Communicate with your children. • Take time to discuss concerns; agree on ground Take time to discuss concerns; agree on ground
rules.rules.• Understand their needs.Understand their needs.• Set reasonable expectations.Set reasonable expectations.
3.3. Place the computer in a “well-trafficked” Place the computer in a “well-trafficked” area, area, notnot a child’s bedroom or a secluded a child’s bedroom or a secluded area.area.
4.4. Ensure that they do not divulge Ensure that they do not divulge detailed personal information when detailed personal information when completing “profiles” and minimize completing “profiles” and minimize dissemination.dissemination.
5.5. Keep ALL accounts in your name.Keep ALL accounts in your name.
6.6. Know your child’s password(s) Know your child’s password(s) and screen name(s). and screen name(s).
• Ensure that screen names do not Ensure that screen names do not provide information about his provide information about his or her identity (e.g., or her identity (e.g., Sarahsweet16.)Sarahsweet16.)
7.7. Consider Use of Computer/Internet Consider Use of Computer/Internet Management Software:Management Software:• Age-based access levels – Allows for various Age-based access levels – Allows for various
levels of access for different family members.levels of access for different family members.• Filtering and Blocking (incoming and Filtering and Blocking (incoming and
outgoing.) outgoing.) • Time Restrictions.Time Restrictions.• Activity Logs - Parents can view logs that list Activity Logs - Parents can view logs that list
web sites visited, web sites blocked, chat web sites visited, web sites blocked, chat sessions… Software can even capture sessions… Software can even capture screen shots and email messages to you if a screen shots and email messages to you if a rule is violated!rule is violated!
Should we block social Should we block social networks, blogs, wikis, etc?networks, blogs, wikis, etc?
Or Or
Do we need to educate our Do we need to educate our children/students on the children/students on the
dangers and advantages of dangers and advantages of these tools? these tools?
Always Keep In Mind …Always Keep In Mind … The “Good” Really Does Outweigh The “Good” Really Does Outweigh
The “Bad!”The “Bad!”
2121stst Century Skills Century SkillsCreativity and Innovation Skills Creativity and Innovation Skills Critical Thinking and Problem Critical Thinking and Problem Solving Skills Solving Skills Communication and Communication and Collaboration Collaboration SkillsSkills Information Literacy Information Literacy Media Literacy Media Literacy ICT Literacy ICT Literacy