5. Teens Online • 82% of profile creators included their first
name in their profiles.
• 79% have included photos of themselves.
• 66% have included photos of their friends.
• 61% have included the name of their city.
• 49% have included the name of their
school.
• 40% have included their instant message
screen name.
• 40% have streamed audio to their profile.
• 39% have linked to their blog.
• 29% have included their email address.
• 29% have included their last name.
• 29% have included videos.
• 2% have included their cell phone
numbers.
http://www.marketingcharts.com/interactive/teens-and-social-networks-managing-personal-information-274/
PEW Report, 2008
6. Am I really 10 years old?Am I really 10 years old?
Who am I REALLY?!
Is that really a picture of
me?
Am I aAm I a
boy?boy?
Do I really goDo I really go
to school?to school?
7. Risks? Highest risk to Teenagers!
“Teenagers are particularly at risk because... they are
more likely... to participate in online discussions
regarding companionship..."LOL
LMAO
TY
BRB
AWFK
YW
RU
Y
ASL
POS
LMIRL
WTF
OMG
Laugh out loud
Laughing my A$$ off
Thank You
Be Right Back
Away from
keyboard/computer
You’re Welcome
Are you?
Why?
Age, sex and location
Parent Over Shoulder
Lets Meet In Real Life
What the F$%#
Oh my God
http://en.wikipedia.org/wiki/Internet_slang
8. Leet Speak
Remember …“Hip”,
“Groovy”, “Peace out”?
“Leet” refers to “Elite”.
Substitutes regular letters
for symbols or numbers
Further information for Leet Speak:
http://en.wikipedia.org/wiki/Leet
http://www.brenz.net/services/l337Maker.asp
cartoonstock.com
9. 0 - O
1- I or L
2- A, Z or R
3- E
4- A
5- S
6- B or G
7- T or L
8- B
9- G or P
£- L or E
10. Think Before You Click!
• Domains- The extensions on a website
can indicate their purpose:
.com- commercial
.biz- business
.org- organization
.gov- government
.edu- education
.net- network
.xxx- pornography
blog.andyswebtools.com
11. Virus
A computer virus is a computer program that
can copy itself and infect a computer without
permission or knowledge of the user.
hugepedia.com
12. Worm
• A computer worm is a
selfreplicating computer
program. It uses a network
to send copies of itself to
other nodes computer
terminals on the network).
• Worms almost always
cause harm to the network,
if only by consuming
bandwidth, whereas
viruses almost always
corrupt or modify files on a
targeted computer.
13. Spyware
• Collects small pieces of information
about users without their knowledge
• Installs on your computer
• Secretly monitors the user's computing:
can collect various types of
personal information, such as Internet
surfing habits and sites that have been
visited
• Can install additional software and
redirect Web browser activity.
• Changes computer settings:
– Slow connection speeds,
– Changes your home pages,
– Loss of Internet connection
– Loss of functionality of other programs.
http://en.wikipedia.org/wiki/Spyware
14. Malware
– Rogue or malicious programs can attack and
do various things to your computer while
surfing the internet.
– Hostile, intrusive, or annoying software or
program code
15. Phishing
Phishing is a way of attempting to acquire
sensitive information such as usernames,
passwords and credit card details by
masquerading as a trustworthy entity in an
electronic communication.
thenextweb.com
18. AVG
• A great Anti-virus
and Anti-Malware
program.
Free Download:
http://free.avg.com/ww-en/download-avg-anti-virus-free
19. Firewall
• A firewall is a
device or set of
devices
configured to
permit, deny,
encrypt, or
monitor internet
connections
between online
traffic and your
computer.
Windows 07 comes with a built-in Firewall.
21. Digital Footprint
• What does your digital footprint look like?
• Keeping your
personal details
private. Not
sharing
• Thinking before you
post
• Not posting things
that you don't want
others to know
about or that you
wouldn’t say to their
face.
•
22. My Rules for Internet Safety!
I will not give out
personal information
such as my address,
telephone number,
parents’ work
address/telephone
number, or the name
and location of my
school without my
parents’ permission
cartoonstock.com
23. I will tell my parents right away if I
come across any information that
makes me feel uncomfortable
Boy, am I uncomfortable!
24. I will never agree to get together
with someone I "meet" online!
celebrityradar.info
25. I will never send a
person my
picture or
anything else
without first
checking with my
parents
26. I will not respond
to any
messages that
are mean or in
any way make
me feel
uncomfortable.
It is not my fault
if I get a
message like
that. If I do I will
tell my parents
right away.
27. • I will not download
pictures from an
unknown source,
as there is a good
chance there could
be sexually explicit
images.
28. • time of day that I can be
online,
• the length of time I can
be online,
• appropriate areas for
me to visit.
I will not access other
areas or break these
rules without their
permission.
I will talk with my parents so that we can
set up rules for going online.
cartoonstock.com
30. Bibliography
• www.netzsmartz.org
• www.safeteens.com
• www.safekids.com Lawrence J. Magid
• www.blogsafety.com
• www.netfamilynews.org
• http://dsc.discovery.com/convergence/koppel/int
eractive/interactive.html
• http://pewresearch.org/
Editor's Notes
Short for Malicious + Software
Keeping your personal details private. Use a nickname instead of your real name and always ask your parents before giving out your name, address or phone number online.
Not sharing your username or password with anyone.
Thinking before you post. Once posted, it can be difficult to remove.
Not posting things that you don't want others to know about or that you wouldn’t say to their face.
Being respectful of other people’s content that you post or share. For example, a photo that your friend took is their property, not yours. You should post it online only if you have their permission.
- See more at: http://www.cybersmart.gov.au/Kids/Get%20the%20facts/Digital%20footprint.aspx#sthash.5veOogAL.dpuf