SlideShare une entreprise Scribd logo
1  sur  20
Using Computer Technology to Protect Individuals and Families Jack W. Sunderlage  President and CEO  ContentWatch, Inc.
Pornography Industry Statistics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pornography Industry Statistics  (cont) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Children’s Trends, Statistics & Activity on the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Children’s Trends, Statistics & Activity on the Internet  (cont) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Children’s Trends, Statistics & Activity on the Internet  (cont) ,[object Object],[object Object],[object Object]
Social Networking  Tips for Teens ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Social Networking  Tips for Parents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Advice for Kids Dealing with Cyberbullies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tricks Pornographers Play ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What To Look For in a Tool… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What To Look for in a Tool… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Detailed Reports (Chat/IM, Internet Activity)
Graphical Reports WHICH WEBSITES? HOW OFTEN VISITED? HOW LONG ON SITE?
Web Time Management ,[object Object],[object Object]
“ Stop, Off and Go!” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Top Ten Safety Tips ,[object Object],[object Object],[object Object],[object Object],[object Object]
Top Ten Safety Tips  (cont)… ,[object Object],[object Object],[object Object],[object Object],[object Object]
Some Helpful Websites ,[object Object],[object Object],[object Object],[object Object],[object Object]
Using Computer Technology to Protect Individuals and Families Even with worries that parents and teens express about what they might find online, parents still believe Internet access is beneficial for their children.

Contenu connexe

Tendances

Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Onlinedgieseler1
 
Benefitsandhazards
BenefitsandhazardsBenefitsandhazards
Benefitsandhazardsdgieseler1
 
Social networks
Social networksSocial networks
Social networksdrlizmike
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safetyFred Miller
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Parents guide to technology
Parents guide to technologyParents guide to technology
Parents guide to technologyBrad McAllister
 
Internet Use for Third & Fourth Graders
Internet Use for Third & Fourth GradersInternet Use for Third & Fourth Graders
Internet Use for Third & Fourth GradersBarb Jansen
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parentsAl Rowell
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for childrenKumar Manish
 
Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for ParentsKristi Richburg
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Laura Dunkley
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentationgrp4.ed451
 
Internet safety
Internet safetyInternet safety
Internet safetyshoconnor
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and ChldrenJoe Drumgoole
 

Tendances (20)

Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Online
 
Benefitsandhazards
BenefitsandhazardsBenefitsandhazards
Benefitsandhazards
 
Social networks
Social networksSocial networks
Social networks
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Teaching digital citizenship in a not so-digital setting
Teaching digital citizenship in a not so-digital settingTeaching digital citizenship in a not so-digital setting
Teaching digital citizenship in a not so-digital setting
 
Parents guide to technology
Parents guide to technologyParents guide to technology
Parents guide to technology
 
Internet Use for Third & Fourth Graders
Internet Use for Third & Fourth GradersInternet Use for Third & Fourth Graders
Internet Use for Third & Fourth Graders
 
ISC Presentation
ISC PresentationISC Presentation
ISC Presentation
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parents
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for Parents
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentation
 
Finalproject
FinalprojectFinalproject
Finalproject
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
 

Similaire à Using Computer Technology to Protect Individuals and Families

reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
 
Parenting And The Internet Ppt
Parenting And The Internet PptParenting And The Internet Ppt
Parenting And The Internet PptMary Danko
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010paul
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Presentation
PresentationPresentation
PresentationLHSICT
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementaryemilyensign
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kidskwazy
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online SafetyDonna Murray
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Teen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesTeen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesMs. D
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 SoundLarry Magid
 
London Borough of Ealing Online Safety for parents
London Borough of Ealing Online Safety for parentsLondon Borough of Ealing Online Safety for parents
London Borough of Ealing Online Safety for parentsDai Barnes
 

Similaire à Using Computer Technology to Protect Individuals and Families (20)

Legalissues
LegalissuesLegalissues
Legalissues
 
Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Parenting And The Internet Ppt
Parenting And The Internet PptParenting And The Internet Ppt
Parenting And The Internet Ppt
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Presentation
PresentationPresentation
Presentation
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kids
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Teen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesTeen Cybersafety & Database Resources
Teen Cybersafety & Database Resources
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 
London Borough of Ealing Online Safety for parents
London Borough of Ealing Online Safety for parentsLondon Borough of Ealing Online Safety for parents
London Borough of Ealing Online Safety for parents
 

Dernier

Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 

Dernier (20)

Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 

Using Computer Technology to Protect Individuals and Families

  • 1. Using Computer Technology to Protect Individuals and Families Jack W. Sunderlage President and CEO ContentWatch, Inc.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Detailed Reports (Chat/IM, Internet Activity)
  • 14. Graphical Reports WHICH WEBSITES? HOW OFTEN VISITED? HOW LONG ON SITE?
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. Using Computer Technology to Protect Individuals and Families Even with worries that parents and teens express about what they might find online, parents still believe Internet access is beneficial for their children.