SlideShare une entreprise Scribd logo
1  sur  28
Internet Safety



                            http://www.jasonseliskar.com
Saturday, December 29, 12
Children

                            James 1:17 - Every good gift and every perfect gift is from
                             above, coming down from the Father of lights with whom
                                 there is no variation or shadow due to change.

                              Proverbs 22:6 - Train up a child in the way he should
                               go; even when he is old he will not depart from it.


Saturday, December 29, 12
Internet Safety

Saturday, December 29, 12
The rate of growth of Internet
                                 use in the United States is
                                    currently two million
                               new Internet users per month.


                            (According to: A Nation Online: How Americans Are Expanding Their Use of the Internet, 2002)

Saturday, December 29, 12
13 million youth use
                                      Instant Messaging..


                            Pew Study reported in Journal of the American Medical Association, a.k.a. JAMA




Saturday, December 29, 12
Ninety percent of children
                               between the ages of 5 and 17
                                     (or 48 million) now
                                      use computers.


                            (According to: A Nation Online: How Americans Are Expanding Their Use of the Internet, 2002)

Saturday, December 29, 12
Access
                            93% of teens (12-17) go online.

                                 [1] Lenhart A. Social Media and Young Adults. Pew Internet and American Life Project, 2010.




Saturday, December 29, 12
Cell Phones
            75% of teens (12-17) have cell phones.

  On average, texting teens (12-17) send and
    receive 1500 text messages a month.
[3] Lenhart A. Teens and Mobile Phones. Pew Internet and American Life Project, 2010.




Saturday, December 29, 12
Cyberbullying
1 in 3 teens (12-17) have experienced online
                 harassment.

             Girls are more likely to be victims of
           cyberbullying (38% girls vs. 26% boys).
Lenhart A. Cyberbullying and Online Teens. Pew Internet and American Life Project, 2007.




Saturday, December 29, 12
Social Networking
                73% of teens (12-17) have profiles on
                      social networking sites.

                   47% of teens (12-17) have uploaded
                    photos; 14 % have posted videos.
   [15] Lenhart A. Social Media and Young Adults. Pew Internet & American Life Project, 2010.
   [16] Lehart A. Teens and Social Media. Pew Internet & American Life Project, 2007.




Saturday, December 29, 12
Children's Online Privacy
                             Protection Act of 1998

                                   (COPPA)

Saturday, December 29, 12
Children's Online Privacy Protection Act of 1998
                                                                                                  (COPPA)


                                     The revised rule expands the list of
                                   "personal information" that cannot be
                                  collected from children under 13 without
                                    parental consent to include location,
                                          photographs and videos.
                            Read more here: http://www.sacbee.com/2012/12/29/5081182/limit-on-kids-data-may-be-a-milestone.html#storylink=misearch#storylink=cpy




Saturday, December 29, 12
Update for Tablets and Smartphone (apps)

                                           Children's Online Privacy Protection Act of 1998
                                                                                                  (COPPA)


                             It forbids child-directed apps and websites
                             to track children's activities on the Internet
                             or to pass their data on to other companies
                                   without their parents' knowledge.
                            Read more here: http://www.sacbee.com/2012/12/29/5081182/limit-on-kids-data-may-be-a-milestone.html#storylink=misearch#storylink=cpy




Saturday, December 29, 12
Saturday, December 29, 12
Update for Tablets and Smartphone (apps)

                                           Children's Online Privacy Protection Act of 1998
                                                                                                  (COPPA)



                            The tech industry, which lobbied against the
                            changes, warns that overregulation of data
                              collection will stifle innovation, increase
                              costs for consumers and put some app
                             developers and websites out of business.
                            Read more here: http://www.sacbee.com/2012/12/29/5081182/limit-on-kids-data-may-be-a-milestone.html#storylink=misearch#storylink=cpy




Saturday, December 29, 12
Update for Tablets and Smartphone (apps)

                                           Children's Online Privacy Protection Act of 1998
                                                                                                  (COPPA)



                               “Almost 60 percent of the apps reviewed by FTC staff
                              transmitted data from a child's device back to the app
                            developer or to an advertising network, analytics company
                             or other third party. Using information from multiple apps,
                            the third parties could develop detailed profiles of children
                              based on their behavior in the apps, the report stated.”
                            Read more here: http://www.sacbee.com/2012/12/29/5081182/limit-on-kids-data-may-be-a-milestone.html#storylink=misearch#storylink=cpy




Saturday, December 29, 12
What do we use the Internet for?

           Socialize
                                                       Communicate
                                           Create
                            Playing
                                                     Exploring
                              Learning
Saturday, December 29, 12
The Internet has great uses, EXCEPT....

                     Porn                              Predators
                                        Viruses
                                                             Sexting
                 Game sites
                                                     Scams

                             Hate sites            Others...
Saturday, December 29, 12
Social Media
        Facebook                                  Google +

                                      Instagram
               Twitter                            Texting

                            Skyping
                                            Many others...
Saturday, December 29, 12
Facebook




Saturday, December 29, 12
Online Activity
                   - blogs
                   - wikis
                   - email
                   - social media
                   - gaming
                   - bookmarking
                   - instant messaging
                   - video conferencing

Saturday, December 29, 12
What are the older kids doing...



             At greater risk than younger kids

                 • More independent
                 • More intrigued
                 • Easily lured to inappropriate site/person
                 • Need parent awareness
                 • Need freedom
Saturday, December 29, 12
Keep an eye out for...
        online often/night

         inappropriate files/images

         strange phone calls                has another account

        changes sites/covers monitor        empty browser history

        withdrawn
Saturday, December 29, 12
Tips
      •Child’s computer in open area
      •Communication
      •Regularly review files & browser history
      •Teach responsible use for online resources
      •Talk to your child of online dangers
      •Educate yourself on ins and outs of Internet
      •Safe Search
Saturday, December 29, 12
commonsensemedia.org




Saturday, December 29, 12
Communication

                            Digital Citizenship

                               Awareness

                                  Safety

Saturday, December 29, 12
Filtering Software




Saturday, December 29, 12
Internet Safety

              http://www.jasonseliskar.com/internetsafety




                            http://www.jasonseliskar.com
Saturday, December 29, 12

Contenu connexe

Tendances

Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesMarian Merritt
 
How Piracy Led to Digital Distribution
How Piracy Led to Digital DistributionHow Piracy Led to Digital Distribution
How Piracy Led to Digital DistributionZacharyRaz
 
Transforming the Library through Gamification
Transforming the Library through GamificationTransforming the Library through Gamification
Transforming the Library through GamificationBohyun Kim
 
E-learning: The Dark Side?
E-learning: The Dark Side?E-learning: The Dark Side?
E-learning: The Dark Side?eLearning Papers
 
The Past and Future of Open Computing
The Past and Future of Open ComputingThe Past and Future of Open Computing
The Past and Future of Open ComputingTim O'Reilly
 
Five marketing trends in 2012
Five marketing trends in 2012Five marketing trends in 2012
Five marketing trends in 2012Vinish Joshi
 
Raising Children in a Digital Age (Evening Session)
Raising Children in a Digital Age (Evening Session)Raising Children in a Digital Age (Evening Session)
Raising Children in a Digital Age (Evening Session)Bex Lewis
 
Applying Gamification to Higher Education and Libraries
Applying Gamification to Higher Education and LibrariesApplying Gamification to Higher Education and Libraries
Applying Gamification to Higher Education and LibrariesBohyun Kim
 
Mi-ACE Mc-ICE Keynote - Vision for Innovation in Technology
Mi-ACE Mc-ICE Keynote - Vision for Innovation in TechnologyMi-ACE Mc-ICE Keynote - Vision for Innovation in Technology
Mi-ACE Mc-ICE Keynote - Vision for Innovation in TechnologyBarry Dahl
 
Children parents electronic_devices_russia
Children parents electronic_devices_russiaChildren parents electronic_devices_russia
Children parents electronic_devices_russiadigitalparentingrussia
 
A Marketer's Guide to Millenials
A Marketer's Guide to MillenialsA Marketer's Guide to Millenials
A Marketer's Guide to MillenialsFresh Digital Group
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty PresentationRay Brannon
 
A fresh look at digital safety, citizenship
A fresh look at digital safety, citizenshipA fresh look at digital safety, citizenship
A fresh look at digital safety, citizenshipAnne Collier
 
Ch12.global culture
Ch12.global cultureCh12.global culture
Ch12.global cultureBill Kovarik
 
Dyer portfolio essay technology and the changing brain rvsd
Dyer portfolio essay technology and the changing brain rvsdDyer portfolio essay technology and the changing brain rvsd
Dyer portfolio essay technology and the changing brain rvsdmdyer15
 
Government 2.0: architecting for collaboration
Government 2.0: architecting for collaborationGovernment 2.0: architecting for collaboration
Government 2.0: architecting for collaborationTara Hunt
 
goviral Cannes 2012, Generation Social
goviral Cannes 2012, Generation Social goviral Cannes 2012, Generation Social
goviral Cannes 2012, Generation Social Mads Holmen
 

Tendances (19)

Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and Consequences
 
How Piracy Led to Digital Distribution
How Piracy Led to Digital DistributionHow Piracy Led to Digital Distribution
How Piracy Led to Digital Distribution
 
Transforming the Library through Gamification
Transforming the Library through GamificationTransforming the Library through Gamification
Transforming the Library through Gamification
 
The app age
The app ageThe app age
The app age
 
E-learning: The Dark Side?
E-learning: The Dark Side?E-learning: The Dark Side?
E-learning: The Dark Side?
 
The Past and Future of Open Computing
The Past and Future of Open ComputingThe Past and Future of Open Computing
The Past and Future of Open Computing
 
Five marketing trends in 2012
Five marketing trends in 2012Five marketing trends in 2012
Five marketing trends in 2012
 
Raising Children in a Digital Age (Evening Session)
Raising Children in a Digital Age (Evening Session)Raising Children in a Digital Age (Evening Session)
Raising Children in a Digital Age (Evening Session)
 
Applying Gamification to Higher Education and Libraries
Applying Gamification to Higher Education and LibrariesApplying Gamification to Higher Education and Libraries
Applying Gamification to Higher Education and Libraries
 
Mi-ACE Mc-ICE Keynote - Vision for Innovation in Technology
Mi-ACE Mc-ICE Keynote - Vision for Innovation in TechnologyMi-ACE Mc-ICE Keynote - Vision for Innovation in Technology
Mi-ACE Mc-ICE Keynote - Vision for Innovation in Technology
 
Children parents electronic_devices_russia
Children parents electronic_devices_russiaChildren parents electronic_devices_russia
Children parents electronic_devices_russia
 
A Marketer's Guide to Millenials
A Marketer's Guide to MillenialsA Marketer's Guide to Millenials
A Marketer's Guide to Millenials
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty Presentation
 
A fresh look at digital safety, citizenship
A fresh look at digital safety, citizenshipA fresh look at digital safety, citizenship
A fresh look at digital safety, citizenship
 
The Future of Incarceration
The Future of IncarcerationThe Future of Incarceration
The Future of Incarceration
 
Ch12.global culture
Ch12.global cultureCh12.global culture
Ch12.global culture
 
Dyer portfolio essay technology and the changing brain rvsd
Dyer portfolio essay technology and the changing brain rvsdDyer portfolio essay technology and the changing brain rvsd
Dyer portfolio essay technology and the changing brain rvsd
 
Government 2.0: architecting for collaboration
Government 2.0: architecting for collaborationGovernment 2.0: architecting for collaboration
Government 2.0: architecting for collaboration
 
goviral Cannes 2012, Generation Social
goviral Cannes 2012, Generation Social goviral Cannes 2012, Generation Social
goviral Cannes 2012, Generation Social
 

En vedette

Cipa history 2000
Cipa history 2000Cipa history 2000
Cipa history 2000nielson900
 
Protection of children over the internet
Protection of children over the internetProtection of children over the internet
Protection of children over the internetCiaran Moran
 
Cyber safety m harrold
Cyber safety m harroldCyber safety m harrold
Cyber safety m harroldMegan
 
Reliance on Social Media
Reliance on Social MediaReliance on Social Media
Reliance on Social MediaBlake Davies
 
CIPA Children's Internet Protection Act
CIPA Children's Internet Protection ActCIPA Children's Internet Protection Act
CIPA Children's Internet Protection Actgibb0
 
CIPA Overview
CIPA OverviewCIPA Overview
CIPA Overviewedtecher
 
Child Protection Policy & Bullying
Child Protection Policy & BullyingChild Protection Policy & Bullying
Child Protection Policy & BullyingRaffy Paller
 
The Protection of Children from Sexual Offences (POCSO) Act, 2012 and Rules
The Protection of Children from Sexual Offences (POCSO) Act, 2012 and RulesThe Protection of Children from Sexual Offences (POCSO) Act, 2012 and Rules
The Protection of Children from Sexual Offences (POCSO) Act, 2012 and RulesBPACofficial
 

En vedette (11)

Cipa history 2000
Cipa history 2000Cipa history 2000
Cipa history 2000
 
DeepNines CIPA Whitepaper
DeepNines CIPA WhitepaperDeepNines CIPA Whitepaper
DeepNines CIPA Whitepaper
 
Protection of children over the internet
Protection of children over the internetProtection of children over the internet
Protection of children over the internet
 
Cyber safety m harrold
Cyber safety m harroldCyber safety m harrold
Cyber safety m harrold
 
Reliance on Social Media
Reliance on Social MediaReliance on Social Media
Reliance on Social Media
 
CIPA Children's Internet Protection Act
CIPA Children's Internet Protection ActCIPA Children's Internet Protection Act
CIPA Children's Internet Protection Act
 
CIPA Overview
CIPA OverviewCIPA Overview
CIPA Overview
 
Safety @ Cyber
Safety @ CyberSafety @ Cyber
Safety @ Cyber
 
Child Protection Policy & Bullying
Child Protection Policy & BullyingChild Protection Policy & Bullying
Child Protection Policy & Bullying
 
The Protection of Children from Sexual Offences (POCSO) Act, 2012 and Rules
The Protection of Children from Sexual Offences (POCSO) Act, 2012 and RulesThe Protection of Children from Sexual Offences (POCSO) Act, 2012 and Rules
The Protection of Children from Sexual Offences (POCSO) Act, 2012 and Rules
 
Child protection policy
Child protection policyChild protection policy
Child protection policy
 

Similaire à Internet Safety

Challenging trust in the digital age - SMBW - 03/04/2019
Challenging trust in the digital age - SMBW - 03/04/2019Challenging trust in the digital age - SMBW - 03/04/2019
Challenging trust in the digital age - SMBW - 03/04/2019Denys Malengreau
 
Social media and Missing workshop
Social media and Missing workshopSocial media and Missing workshop
Social media and Missing workshopRay Brannon
 
Chapter 5_IT, Culture and Society.pptx
Chapter 5_IT, Culture and Society.pptxChapter 5_IT, Culture and Society.pptx
Chapter 5_IT, Culture and Society.pptxnorwinadriatico
 
Hum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyHum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyRay Brannon
 
How to protect yourself in e world?
How to protect yourself in e world? How to protect yourself in e world?
How to protect yourself in e world? Dipak Parmar
 
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxA. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxamandaschilling75
 
Children and Online Safety
Children and Online SafetyChildren and Online Safety
Children and Online Safetyalandang
 
Digital identity as a professional asset - ECS Barcelona - 21/02/2019
Digital identity as a professional asset - ECS Barcelona - 21/02/2019Digital identity as a professional asset - ECS Barcelona - 21/02/2019
Digital identity as a professional asset - ECS Barcelona - 21/02/2019Denys Malengreau
 
FILM260 Flipbook On Gen Z And Cyberparenting
FILM260 Flipbook On Gen Z And CyberparentingFILM260 Flipbook On Gen Z And Cyberparenting
FILM260 Flipbook On Gen Z And CyberparentingClaire Gray
 
Parent workshop - Social Networks
Parent workshop - Social NetworksParent workshop - Social Networks
Parent workshop - Social NetworksClint Hamada
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative mediaAnies Syahieda
 
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.Donovan Gopaul
 
Privacy flip book assignment film 260 queensu kc
Privacy flip book assignment  film 260  queensu kcPrivacy flip book assignment  film 260  queensu kc
Privacy flip book assignment film 260 queensu kcCatherine Cowperthwaite
 
Is technology helping children's development
Is technology helping children's developmentIs technology helping children's development
Is technology helping children's developmentCallum O'Hanlon
 

Similaire à Internet Safety (20)

10 Overriding Themes from SXSW (March 2014)
10 Overriding Themes from SXSW (March 2014)10 Overriding Themes from SXSW (March 2014)
10 Overriding Themes from SXSW (March 2014)
 
Challenging trust in the digital age - SMBW - 03/04/2019
Challenging trust in the digital age - SMBW - 03/04/2019Challenging trust in the digital age - SMBW - 03/04/2019
Challenging trust in the digital age - SMBW - 03/04/2019
 
Social media and Missing workshop
Social media and Missing workshopSocial media and Missing workshop
Social media and Missing workshop
 
Chapter 5_IT, Culture and Society.pptx
Chapter 5_IT, Culture and Society.pptxChapter 5_IT, Culture and Society.pptx
Chapter 5_IT, Culture and Society.pptx
 
Flipbook (3) (1)
Flipbook (3) (1)Flipbook (3) (1)
Flipbook (3) (1)
 
Flipbook
FlipbookFlipbook
Flipbook
 
Hum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyHum 140: Social Media: Privacy
Hum 140: Social Media: Privacy
 
How to protect yourself in e world?
How to protect yourself in e world? How to protect yourself in e world?
How to protect yourself in e world?
 
Flipbook
FlipbookFlipbook
Flipbook
 
Big Data Paper
Big Data PaperBig Data Paper
Big Data Paper
 
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxA. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
 
Children and Online Safety
Children and Online SafetyChildren and Online Safety
Children and Online Safety
 
Digital identity as a professional asset - ECS Barcelona - 21/02/2019
Digital identity as a professional asset - ECS Barcelona - 21/02/2019Digital identity as a professional asset - ECS Barcelona - 21/02/2019
Digital identity as a professional asset - ECS Barcelona - 21/02/2019
 
Digital tattoo - what's yours?
Digital tattoo - what's yours?Digital tattoo - what's yours?
Digital tattoo - what's yours?
 
FILM260 Flipbook On Gen Z And Cyberparenting
FILM260 Flipbook On Gen Z And CyberparentingFILM260 Flipbook On Gen Z And Cyberparenting
FILM260 Flipbook On Gen Z And Cyberparenting
 
Parent workshop - Social Networks
Parent workshop - Social NetworksParent workshop - Social Networks
Parent workshop - Social Networks
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative media
 
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
 
Privacy flip book assignment film 260 queensu kc
Privacy flip book assignment  film 260  queensu kcPrivacy flip book assignment  film 260  queensu kc
Privacy flip book assignment film 260 queensu kc
 
Is technology helping children's development
Is technology helping children's developmentIs technology helping children's development
Is technology helping children's development
 

Plus de Jason Seliskar

Chromebook Collaboration
Chromebook Collaboration Chromebook Collaboration
Chromebook Collaboration Jason Seliskar
 
AppleTV in the Classrooom
AppleTV in the ClassrooomAppleTV in the Classrooom
AppleTV in the ClassrooomJason Seliskar
 
Intro to Flipped Classroom - TeachMeetNJ12
Intro to Flipped Classroom - TeachMeetNJ12Intro to Flipped Classroom - TeachMeetNJ12
Intro to Flipped Classroom - TeachMeetNJ12Jason Seliskar
 
Going Wild with Weebly
Going Wild with WeeblyGoing Wild with Weebly
Going Wild with WeeblyJason Seliskar
 
Going Green with iMovie
Going Green with iMovieGoing Green with iMovie
Going Green with iMovieJason Seliskar
 
Examining Internet Use Among Low-Income Students
Examining Internet Use Among Low-Income StudentsExamining Internet Use Among Low-Income Students
Examining Internet Use Among Low-Income StudentsJason Seliskar
 
Google Apps Security Whitepaper
Google Apps Security WhitepaperGoogle Apps Security Whitepaper
Google Apps Security WhitepaperJason Seliskar
 
What Technology Preparation is Needed?
What Technology Preparation is Needed?What Technology Preparation is Needed?
What Technology Preparation is Needed?Jason Seliskar
 
Google+for+Teachers+II
Google+for+Teachers+IIGoogle+for+Teachers+II
Google+for+Teachers+IIJason Seliskar
 
Advocating for Educational Technologies
Advocating for Educational TechnologiesAdvocating for Educational Technologies
Advocating for Educational TechnologiesJason Seliskar
 
Marven of the Great NorthWoods
Marven of the Great NorthWoodsMarven of the Great NorthWoods
Marven of the Great NorthWoodsJason Seliskar
 
Chapter One Vocabulary
Chapter One VocabularyChapter One Vocabulary
Chapter One VocabularyJason Seliskar
 
Back to School Presentation
Back to School PresentationBack to School Presentation
Back to School PresentationJason Seliskar
 

Plus de Jason Seliskar (16)

Chromebook Collaboration
Chromebook Collaboration Chromebook Collaboration
Chromebook Collaboration
 
AppleTV in the Classrooom
AppleTV in the ClassrooomAppleTV in the Classrooom
AppleTV in the Classrooom
 
Common Core 101
Common Core 101Common Core 101
Common Core 101
 
Intro to Flipped Classroom - TeachMeetNJ12
Intro to Flipped Classroom - TeachMeetNJ12Intro to Flipped Classroom - TeachMeetNJ12
Intro to Flipped Classroom - TeachMeetNJ12
 
Going Wild with Weebly
Going Wild with WeeblyGoing Wild with Weebly
Going Wild with Weebly
 
Going Green with iMovie
Going Green with iMovieGoing Green with iMovie
Going Green with iMovie
 
Star writing review
Star writing reviewStar writing review
Star writing review
 
K12 Overview Pamphlet
K12 Overview PamphletK12 Overview Pamphlet
K12 Overview Pamphlet
 
Examining Internet Use Among Low-Income Students
Examining Internet Use Among Low-Income StudentsExamining Internet Use Among Low-Income Students
Examining Internet Use Among Low-Income Students
 
Google Apps Security Whitepaper
Google Apps Security WhitepaperGoogle Apps Security Whitepaper
Google Apps Security Whitepaper
 
What Technology Preparation is Needed?
What Technology Preparation is Needed?What Technology Preparation is Needed?
What Technology Preparation is Needed?
 
Google+for+Teachers+II
Google+for+Teachers+IIGoogle+for+Teachers+II
Google+for+Teachers+II
 
Advocating for Educational Technologies
Advocating for Educational TechnologiesAdvocating for Educational Technologies
Advocating for Educational Technologies
 
Marven of the Great NorthWoods
Marven of the Great NorthWoodsMarven of the Great NorthWoods
Marven of the Great NorthWoods
 
Chapter One Vocabulary
Chapter One VocabularyChapter One Vocabulary
Chapter One Vocabulary
 
Back to School Presentation
Back to School PresentationBack to School Presentation
Back to School Presentation
 

Dernier

Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 

Dernier (20)

Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 

Internet Safety

  • 1. Internet Safety http://www.jasonseliskar.com Saturday, December 29, 12
  • 2. Children James 1:17 - Every good gift and every perfect gift is from above, coming down from the Father of lights with whom there is no variation or shadow due to change. Proverbs 22:6 - Train up a child in the way he should go; even when he is old he will not depart from it. Saturday, December 29, 12
  • 4. The rate of growth of Internet use in the United States is currently two million new Internet users per month. (According to: A Nation Online: How Americans Are Expanding Their Use of the Internet, 2002) Saturday, December 29, 12
  • 5. 13 million youth use Instant Messaging.. Pew Study reported in Journal of the American Medical Association, a.k.a. JAMA Saturday, December 29, 12
  • 6. Ninety percent of children between the ages of 5 and 17 (or 48 million) now use computers. (According to: A Nation Online: How Americans Are Expanding Their Use of the Internet, 2002) Saturday, December 29, 12
  • 7. Access 93% of teens (12-17) go online. [1] Lenhart A. Social Media and Young Adults. Pew Internet and American Life Project, 2010. Saturday, December 29, 12
  • 8. Cell Phones 75% of teens (12-17) have cell phones. On average, texting teens (12-17) send and receive 1500 text messages a month. [3] Lenhart A. Teens and Mobile Phones. Pew Internet and American Life Project, 2010. Saturday, December 29, 12
  • 9. Cyberbullying 1 in 3 teens (12-17) have experienced online harassment. Girls are more likely to be victims of cyberbullying (38% girls vs. 26% boys). Lenhart A. Cyberbullying and Online Teens. Pew Internet and American Life Project, 2007. Saturday, December 29, 12
  • 10. Social Networking 73% of teens (12-17) have profiles on social networking sites. 47% of teens (12-17) have uploaded photos; 14 % have posted videos. [15] Lenhart A. Social Media and Young Adults. Pew Internet & American Life Project, 2010. [16] Lehart A. Teens and Social Media. Pew Internet & American Life Project, 2007. Saturday, December 29, 12
  • 11. Children's Online Privacy Protection Act of 1998 (COPPA) Saturday, December 29, 12
  • 12. Children's Online Privacy Protection Act of 1998 (COPPA) The revised rule expands the list of "personal information" that cannot be collected from children under 13 without parental consent to include location, photographs and videos. Read more here: http://www.sacbee.com/2012/12/29/5081182/limit-on-kids-data-may-be-a-milestone.html#storylink=misearch#storylink=cpy Saturday, December 29, 12
  • 13. Update for Tablets and Smartphone (apps) Children's Online Privacy Protection Act of 1998 (COPPA) It forbids child-directed apps and websites to track children's activities on the Internet or to pass their data on to other companies without their parents' knowledge. Read more here: http://www.sacbee.com/2012/12/29/5081182/limit-on-kids-data-may-be-a-milestone.html#storylink=misearch#storylink=cpy Saturday, December 29, 12
  • 15. Update for Tablets and Smartphone (apps) Children's Online Privacy Protection Act of 1998 (COPPA) The tech industry, which lobbied against the changes, warns that overregulation of data collection will stifle innovation, increase costs for consumers and put some app developers and websites out of business. Read more here: http://www.sacbee.com/2012/12/29/5081182/limit-on-kids-data-may-be-a-milestone.html#storylink=misearch#storylink=cpy Saturday, December 29, 12
  • 16. Update for Tablets and Smartphone (apps) Children's Online Privacy Protection Act of 1998 (COPPA) “Almost 60 percent of the apps reviewed by FTC staff transmitted data from a child's device back to the app developer or to an advertising network, analytics company or other third party. Using information from multiple apps, the third parties could develop detailed profiles of children based on their behavior in the apps, the report stated.” Read more here: http://www.sacbee.com/2012/12/29/5081182/limit-on-kids-data-may-be-a-milestone.html#storylink=misearch#storylink=cpy Saturday, December 29, 12
  • 17. What do we use the Internet for? Socialize Communicate Create Playing Exploring Learning Saturday, December 29, 12
  • 18. The Internet has great uses, EXCEPT.... Porn Predators Viruses Sexting Game sites Scams Hate sites Others... Saturday, December 29, 12
  • 19. Social Media Facebook Google + Instagram Twitter Texting Skyping Many others... Saturday, December 29, 12
  • 21. Online Activity - blogs - wikis - email - social media - gaming - bookmarking - instant messaging - video conferencing Saturday, December 29, 12
  • 22. What are the older kids doing... At greater risk than younger kids • More independent • More intrigued • Easily lured to inappropriate site/person • Need parent awareness • Need freedom Saturday, December 29, 12
  • 23. Keep an eye out for... online often/night inappropriate files/images strange phone calls has another account changes sites/covers monitor empty browser history withdrawn Saturday, December 29, 12
  • 24. Tips •Child’s computer in open area •Communication •Regularly review files & browser history •Teach responsible use for online resources •Talk to your child of online dangers •Educate yourself on ins and outs of Internet •Safe Search Saturday, December 29, 12
  • 26. Communication Digital Citizenship Awareness Safety Saturday, December 29, 12
  • 28. Internet Safety http://www.jasonseliskar.com/internetsafety http://www.jasonseliskar.com Saturday, December 29, 12