SlideShare une entreprise Scribd logo
1  sur  26
Internet Safety Presented by Lawrence Fine www.lawrencefine.com
What does your child do online? www.lawrencefine.com
E-mail www.lawrencefine.com
Research www.lawrencefine.com
Play games
Social Networking www.lawrencefine.com
Social Media? How do kids use www.lawrencefine.com
Share information www.lawrencefine.com
Share photos www.lawrencefine.com
Share videos www.lawrencefine.com
Blogging www.lawrencefine.com
Social Media? What are the risks of  www.lawrencefine.com
Sharing too much information www.lawrencefine.com
Loss of privacy www.lawrencefine.com
Misinformation www.lawrencefine.com
Cyberbullying www.lawrencefine.com
Illegal file sharing www.lawrencefine.com
Inappropriate material www.lawrencefine.com
How to keep safe www.lawrencefine.com
Talk to them www.lawrencefine.com
Stress the importance of privacy www.lawrencefine.com
Keep computer in a common room www.lawrencefine.com
Steer them to child friendly sites www.lawrencefine.com
Use child friendly search engines www.lawrencefine.com
Use Internet monitoring programs www.lawrencefine.com
www.lawrencefine.com Learn more at

Contenu connexe

Tendances

*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
Amber Dee
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
Pamela Moeai
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
TeamBanana
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
Ellie Simons
 

Tendances (20)

Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentation
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprint
 
Internet safety for kids
Internet safety for kidsInternet safety for kids
Internet safety for kids
 

Similaire à Internet Safety Slideshare

Willow pk 2011
Willow pk 2011Willow pk 2011
Willow pk 2011
Bitbuzz
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
ISTE
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
tholman77
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
cpitchford
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
KanelandSvihlik
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012
KanelandSvihlik
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
amulhall
 

Similaire à Internet Safety Slideshare (20)

Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
 
Willow pk 2011
Willow pk 2011Willow pk 2011
Willow pk 2011
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
 
Pres Internet Safety Presentation
Pres Internet Safety PresentationPres Internet Safety Presentation
Pres Internet Safety Presentation
 
Pres Internet Safety Presentation
Pres Internet Safety PresentationPres Internet Safety Presentation
Pres Internet Safety Presentation
 
Pres Internet Safety Presentation
Pres Internet Safety PresentationPres Internet Safety Presentation
Pres Internet Safety Presentation
 
Pres Internet Safety Presentation
Pres Internet Safety PresentationPres Internet Safety Presentation
Pres Internet Safety Presentation
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
 
Untangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe OnlineUntangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe Online
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Internet Safety Slideshare

Notes de l'éditeur

  1. For correspondence, though for the past three years, messages are sent via social networking sites instead of e-mail.
  2. Usually done for school (homework)
  3. 217 million online gamers worldwide in 2007.Approximately 5.8 hours a week is spent on online gaming.Game breakdown: card, puzzle, arcade and word games (44%), family-oriented games (25%) and RPG/MMOGs (19%). Casual, family oriented and gambling games (17%) were generally favored by PC online gamers while console/portable online gamers were more inclined to prefer non-casual game genres such as shooting and racing games
  4. Facebook: 400 million users (February 2010)MySpace: 57 million unique visitors (US only, December 2009)Twitter: 75 million users (January 2010)
  5. Social networking site makes it very easy to share and broadcast information to one’s network of friends and contacts.
  6. Today’s technology makes it so easy to take pictures and share it to the world. Careful what pictures you share.
  7. Just like photos, embarassing (and maybe even incriminating) videos have a way of finding its way to Youtube and other similar sites and viewed by millions of users worldwide.
  8. Having a diary or a journal is an outlet for one’s feelings. It can be a good practice in dealing with emotions and finding people who share the same interests. However, there’s always that risk of revealing too much.
  9. Social media is instant. One click of the mouse and your message is broadcasted to the world. Be careful about what you say because you just might be forgetting who can read what you’re writing.
  10. While today’s technology makes it easy to share your information, it also makes it equally easier to find them.
  11. There are just too much websites, all giving information. You have to be very discerning as to which website can be trusted to be giving the correct information.
  12. Bullies can be found everywhere, not just in the playground
  13. Unlicensed applications, music and video files. Some of these files even come with a free virus or two.
  14. Because information is now easier to find, so are the inappropriate materials for kids
  15. Teach your kids about the importance of keeping safe online. Establish rules on computer and Internet usage.
  16. Advise your kids never to give out any personal information (for example, name, age, gender, or home address), pictures of themselves, or agree to meet someone in person, when using online chats. Make sure they know to tell you immediately if someone asks them for this information.
  17. Keep computer in full view so you know what your kids are doing online