SlideShare une entreprise Scribd logo
1  sur  55
OUR DIGITAL WORLD
Brian Sharland
June 26th
BRIAN SHARLAND
Teach ICT and Computing at Rye
@sharland
@RyeComputing
http://briansharland.com
ONLINE VERSION OF PRESENTATION
IN SCHOOL
This is an online version of a presentation I give in
school
The slide numbers therefore begin slightly higher in
order to synchronise with the presentation I give.
OUR DIGITAL WORLD
What is our digital
world?
Issues teenagers face
How do we respond to
those issues?
Further support
available
So what is our digital world
like?
Are we living in a surveillance
era?
The internet isn’t a reflection
of a teenager’s life
It is their real life
Families
The Internet is a positive
system
Creation
Connection
Understanding the world
What issues do teenagers
face today?
There is NO
privacy on the internet
Your information will at some
point be read by a human or
computer and a decision
made
Personal safety on the internet
can be compromised through
careless words or actions
Cyber-bullies can leave you
feeling un-safe in your own
home
Malicious communication
through texts, tweets and now
apps can impact youngsters
Careless actions can have an
impact on financial security
such as theft of devices or
access to accounts like iTunes
The internet IS real life
How do we deal with these
issues and in turn educate our
children?
Support
GOVERNMENT - CEOP
Centre for Exploitation and Online Protection
- Government cross agency department of SOCA
- Significant resources to combat online child abuse
- Many resources for schools and parents through
thinkuknow
LINKS ON PAGE
GOVERNMENT - DCMS
Maria Miller’s Internet summit
- 1 million pounds was pledged by big Internet
companies
- To give more power and resources to the IWF charity
LINKS ON PAGE
CHARITY – INTERNET WATCH
FOUNDATION
Internet Watch Foundation
- Charity in Cambridge
- Remit is to ‘minimise the availabilty of potentially
criminal content’
- Essentially supplies information on website URLs to
be used by CleanFeed
LINKS ON PAGE
CORPORATE - CLEANFEED
Cleanfeed
- Content filtering system used by ISPs such as BT to
prevent access to certain sites outside the UK
- Inside the UK sites are shut down
- Government mandated
- List content provided by IWF
LINKS ON PAGE
SCHOOL - SMOOTHWALL
Smoothwall
- A range of powerful and customisable tools to filter
Internet access at school
- Removes access to inappropriate content and control
access to sites which could be a distraction
LINKS ON PAGE
SCHOOL - ESAFETY
We also encourage pupils to report any issues to their
form tutors and also Mrs Neil
- Documented and dealt with quickly
- ICT and Computing lessons during the year look at
esafety issues
- Recently looked at Two-Factor Authentication with year 9s
@ home ?
SECURING YOUR COMPUTER AND
ONLINE LIFE
1. Passwords
2. Security Software
3. Home internet filtering
PASSWORDS
Having to remember Ty!89?ghjK for even one site is
hard enough
Use a few complex passwords
- Which are memorable but contain sufficient variation
- !WldWlk500Miles
Chain a few words together
-antelope50beach85south?
Wiki article on password strength
SECURITY SOFTWARE
Have decent well-reviewed security software installed
- Norton, McAfee and Kaspersky for PC or Sophos for
Mac
AVG free?
- Would you use a free car?
Pay the annual fee
Security software reviews
LINKS ON PAGE
HOME-BASED INTERNET FILTERING
USING OPENDNS
OpenDNS provides family home filtering using DNS
servers
DNS servers are the ‘address books’ of the Internet
At a basic level filter adult sites, proxy servers, phising
sites and some malware
LINKS ON PAGE
TWO-FACTOR AUTHENTICATION
One-factor authentication is the use of a password
(something you know)
2FA is the use of something you know and something
you have (a phone)
When logging in to certain services you are sent a one-
time only unique code to login
LINKS ON PAGE
TWO-FACTOR AUTHENTICATION
Benefit is added security
However don’t lose your phone!
Popular services using 2FA include:
- Google, Facebook, Twitter, Apple, Dropbox, Paypal
and a few more
HOW TO USE 2FA EFFECTIVELY
Set it up on at least one major service such as Google
Mail
Use your Gmail account to setup other accounts such
as Facebook, Amazon etc
LOGIN NOTIFICATIONS
Sites like Facebook use these
They show you if someone attempts to login to your
account from another location
LINKS ON PAGE
3RD-PARTY APPS AND SOCIAL
NETWORKS
In our connected world services like Facebook, Twitter
etc allow access to 3rd party apps which can use some
of their features
For example my Facebook account allows my tumblr
blog to create a link on Facebook everytime I post to
tumblr.
Certain apps can compromise your account if they post
messages to your followers or worse
MANAGING 3RD-PARTY APPS
Check your app settings on each of your social
networks
For example in Facebook use account settings to
manage which apps you have allowed
Remove ones you are unsure about
METADATA
Metadata is data about data
Eg if I take a photo (data) the data about it would
include
Timestamp
Camera type
Photo settings and depending on the type of device
Co-ordinates derived from GPS
LINKS ON PAGE
GEOTAGGING
Geotagging is the process of attaching a GPS location
to a piece of digital content
- Photo
- Tweet
- Foursquare checkin
It has benefits but also negatives – daughter posting a
picture of herself at home online with photo geotagged?
DEALING WITH GEOTAGGING
Check the settings on your child’s smartphone
- An iPhone for example can turn location settings off
Apps such as Twitter also have flags for turning on/off
geotagging
LINKS ON PAGE
SHORT LINKS ON TWITTER
Due to the length of twitter posts longer email
addresses are often shortened such as
http://community.computingatschool.org.uk/
Is shortened to …
http://bit.ly/Omnauf
Use http://longurl.org to extend the address if you are
unsure as to where it might lead you
LINKS ON PAGE
MANAGING SMARTPHONES AND
TABLETS
For very young children use ‘Guided Access’ for iPads
Use gift vouchers to manage the purchase of apps
Use the restrictions panel on an iPhone or iPad to
manage things like in-app purchases
Manage the iTunes password yourself – this will control
the apps downloaded
LINKS ON PAGE
LOSING AN EXPENSIVE DEVICE
For Apple devices use iCloud and Find my iPhone to
locate missing devices, ping them or lock them down
Similar services can be purchased for Android devices
LINKS ON PAGE
MESSAGING ON SMARTDEVICES
Parents can’t do surveillance like the NSA can!
Skype is reasonably popular
More popular are over-the-top messaging apps such as
Whats-app or iMessage – text message services
Recently popular is Snapchat
DEALING WITH INAPPROPRIATE
COMMUNICATIONS
Gather evidence!
If you are aware of the apps your children are using
familiarise yourself with how to collect evidence
Take that evidence to organisations like CEOP
SUMMARY OF SUGGESTIONS
Secure Passwords and multiple levels of logins
Use one security suite but a range of extra tools
Discuss with your children and show them you are
knowledgeable as well
Know what agencies can help if something does
happen
IN CONCLUSION
Esafety will always be evolving
Keep on top of developments yourself
Increase your trust in your children as they get older
FURTHER LINKS
http://www.childline.org.uk/
https://delicious.com/briansharland/esafety - my
bookmarks on e-safety
http://thinkuknow.co.uk
Google security tools
Thank you
Any questions?
Continue the discussion @sharland
or at
http://ryecomputing.wordpress.com/esafety
Reading requires time and
attention. Reading is a cognitive,
mental, emotional action, and
today it is under pressure from all
this speed of the Internet and the
whole digital world. The biggest
principle of this world is speed,
everything has to do with speed,
that is how it is measured and
that is how it is lived. When you
read a book or a poem or listen to
music, there is a matter of
moderation, of time. This
technology is an assault on time.
Leon Wieseltier
June 2013
Image credits
• Minecraft image – screenshot from in-
game
• Image: 'Oklahoma tornado
reliefhttp://www.flickr.com/photos/3951350
8@N06/8867770414

Contenu connexe

Tendances

Digital Understanding 101
Digital Understanding 101Digital Understanding 101
Digital Understanding 101mcpheecdlegs
 
Empowerment
EmpowermentEmpowerment
Empowermentrairuta
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Module 2 lesson 2
Module 2 lesson 2Module 2 lesson 2
Module 2 lesson 2Ira Sagu
 
Digital Footprints - NDP
Digital Footprints - NDPDigital Footprints - NDP
Digital Footprints - NDPmiawalsh
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Parent workshop - Social Networks
Parent workshop - Social NetworksParent workshop - Social Networks
Parent workshop - Social NetworksClint Hamada
 
Privacy Online
Privacy OnlinePrivacy Online
Privacy OnlineJohn Curry
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyDi Doersch
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018KanelandSvihlik
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And KidsSandra Fathi
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017KanelandSvihlik
 
Using social media responsibly
Using social media responsibly Using social media responsibly
Using social media responsibly Donal O' Mahony
 
Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014Resourceful Nonprofit
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
Using the Internet Safely
Using the Internet SafelyUsing the Internet Safely
Using the Internet SafelyJoanne Hewitt
 
Ielc adv b_internet_career_winter2010
Ielc adv b_internet_career_winter2010Ielc adv b_internet_career_winter2010
Ielc adv b_internet_career_winter2010megan.fitzgibbons
 

Tendances (20)

Digital Understanding 101
Digital Understanding 101Digital Understanding 101
Digital Understanding 101
 
Empowerment
EmpowermentEmpowerment
Empowerment
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Module 2 lesson 2
Module 2 lesson 2Module 2 lesson 2
Module 2 lesson 2
 
Digital Footprints - NDP
Digital Footprints - NDPDigital Footprints - NDP
Digital Footprints - NDP
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Parent workshop - Social Networks
Parent workshop - Social NetworksParent workshop - Social Networks
Parent workshop - Social Networks
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Privacy Online
Privacy OnlinePrivacy Online
Privacy Online
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and Technology
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 
Using social media responsibly
Using social media responsibly Using social media responsibly
Using social media responsibly
 
Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Using the Internet Safely
Using the Internet SafelyUsing the Internet Safely
Using the Internet Safely
 
Ielc adv b_internet_career_winter2010
Ielc adv b_internet_career_winter2010Ielc adv b_internet_career_winter2010
Ielc adv b_internet_career_winter2010
 

Similaire à Our Digital World - A look at E-safety issues for teenagers

Its Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet JayIts Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet Jayjstaker
 
Its Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet JayIts Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet Jayjstaker
 
Online safety
Online safetyOnline safety
Online safetyelioar8
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalistsantoniokisembo
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Cyber safety & social media deck
Cyber safety & social media deckCyber safety & social media deck
Cyber safety & social media decksagedayschool
 
Remote Working in a 2.0 World
Remote Working in a 2.0 WorldRemote Working in a 2.0 World
Remote Working in a 2.0 WorldMarieke Guy
 
Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Onlinedgieseler1
 
Tech lab prev conf
Tech lab prev confTech lab prev conf
Tech lab prev confHeidi Dusek
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Staying connected to connected teens
Staying connected to connected teensStaying connected to connected teens
Staying connected to connected teensHeidi Dusek
 
The good the bad and the ugly sw gf_l_7.7.11_delegate version
The good the bad and the ugly sw gf_l_7.7.11_delegate versionThe good the bad and the ugly sw gf_l_7.7.11_delegate version
The good the bad and the ugly sw gf_l_7.7.11_delegate versionBSCS_Consultant_School
 
Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyCTIC Technology Centre
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprintCybermaterial
 
Swedish Parents Presentation Sep 2012
Swedish Parents Presentation Sep 2012Swedish Parents Presentation Sep 2012
Swedish Parents Presentation Sep 2012colingally
 

Similaire à Our Digital World - A look at E-safety issues for teenagers (20)

Its Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet JayIts Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet Jay
 
Its Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet JayIts Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet Jay
 
Online safety
Online safetyOnline safety
Online safety
 
Kinderguarded Intro
Kinderguarded IntroKinderguarded Intro
Kinderguarded Intro
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalists
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
Ouch 201705 en
Ouch 201705 enOuch 201705 en
Ouch 201705 en
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Cyber safety & social media deck
Cyber safety & social media deckCyber safety & social media deck
Cyber safety & social media deck
 
Remote Working in a 2.0 World
Remote Working in a 2.0 WorldRemote Working in a 2.0 World
Remote Working in a 2.0 World
 
Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Online
 
Internet Safety - Parents
Internet Safety - ParentsInternet Safety - Parents
Internet Safety - Parents
 
Tech lab prev conf
Tech lab prev confTech lab prev conf
Tech lab prev conf
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Staying connected to connected teens
Staying connected to connected teensStaying connected to connected teens
Staying connected to connected teens
 
The good the bad and the ugly sw gf_l_7.7.11_delegate version
The good the bad and the ugly sw gf_l_7.7.11_delegate versionThe good the bad and the ugly sw gf_l_7.7.11_delegate version
The good the bad and the ugly sw gf_l_7.7.11_delegate version
 
Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and Safety
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprint
 
Swedish Parents Presentation Sep 2012
Swedish Parents Presentation Sep 2012Swedish Parents Presentation Sep 2012
Swedish Parents Presentation Sep 2012
 

Dernier

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 

Dernier (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

Our Digital World - A look at E-safety issues for teenagers

  • 1. OUR DIGITAL WORLD Brian Sharland June 26th
  • 2. BRIAN SHARLAND Teach ICT and Computing at Rye @sharland @RyeComputing http://briansharland.com
  • 3. ONLINE VERSION OF PRESENTATION IN SCHOOL This is an online version of a presentation I give in school The slide numbers therefore begin slightly higher in order to synchronise with the presentation I give.
  • 4. OUR DIGITAL WORLD What is our digital world? Issues teenagers face How do we respond to those issues? Further support available
  • 5. So what is our digital world like?
  • 6.
  • 7. Are we living in a surveillance era?
  • 8. The internet isn’t a reflection of a teenager’s life It is their real life
  • 10. The Internet is a positive system
  • 14. What issues do teenagers face today?
  • 15. There is NO privacy on the internet
  • 16. Your information will at some point be read by a human or computer and a decision made
  • 17. Personal safety on the internet can be compromised through careless words or actions
  • 18. Cyber-bullies can leave you feeling un-safe in your own home
  • 19. Malicious communication through texts, tweets and now apps can impact youngsters
  • 20. Careless actions can have an impact on financial security such as theft of devices or access to accounts like iTunes
  • 21. The internet IS real life
  • 22. How do we deal with these issues and in turn educate our children?
  • 24. GOVERNMENT - CEOP Centre for Exploitation and Online Protection - Government cross agency department of SOCA - Significant resources to combat online child abuse - Many resources for schools and parents through thinkuknow LINKS ON PAGE
  • 25. GOVERNMENT - DCMS Maria Miller’s Internet summit - 1 million pounds was pledged by big Internet companies - To give more power and resources to the IWF charity LINKS ON PAGE
  • 26. CHARITY – INTERNET WATCH FOUNDATION Internet Watch Foundation - Charity in Cambridge - Remit is to ‘minimise the availabilty of potentially criminal content’ - Essentially supplies information on website URLs to be used by CleanFeed LINKS ON PAGE
  • 27. CORPORATE - CLEANFEED Cleanfeed - Content filtering system used by ISPs such as BT to prevent access to certain sites outside the UK - Inside the UK sites are shut down - Government mandated - List content provided by IWF LINKS ON PAGE
  • 28. SCHOOL - SMOOTHWALL Smoothwall - A range of powerful and customisable tools to filter Internet access at school - Removes access to inappropriate content and control access to sites which could be a distraction LINKS ON PAGE
  • 29. SCHOOL - ESAFETY We also encourage pupils to report any issues to their form tutors and also Mrs Neil - Documented and dealt with quickly - ICT and Computing lessons during the year look at esafety issues - Recently looked at Two-Factor Authentication with year 9s
  • 31. SECURING YOUR COMPUTER AND ONLINE LIFE 1. Passwords 2. Security Software 3. Home internet filtering
  • 32. PASSWORDS Having to remember Ty!89?ghjK for even one site is hard enough Use a few complex passwords - Which are memorable but contain sufficient variation - !WldWlk500Miles Chain a few words together -antelope50beach85south? Wiki article on password strength
  • 33. SECURITY SOFTWARE Have decent well-reviewed security software installed - Norton, McAfee and Kaspersky for PC or Sophos for Mac AVG free? - Would you use a free car? Pay the annual fee Security software reviews LINKS ON PAGE
  • 34. HOME-BASED INTERNET FILTERING USING OPENDNS OpenDNS provides family home filtering using DNS servers DNS servers are the ‘address books’ of the Internet At a basic level filter adult sites, proxy servers, phising sites and some malware LINKS ON PAGE
  • 35. TWO-FACTOR AUTHENTICATION One-factor authentication is the use of a password (something you know) 2FA is the use of something you know and something you have (a phone) When logging in to certain services you are sent a one- time only unique code to login LINKS ON PAGE
  • 36. TWO-FACTOR AUTHENTICATION Benefit is added security However don’t lose your phone! Popular services using 2FA include: - Google, Facebook, Twitter, Apple, Dropbox, Paypal and a few more
  • 37.
  • 38. HOW TO USE 2FA EFFECTIVELY Set it up on at least one major service such as Google Mail Use your Gmail account to setup other accounts such as Facebook, Amazon etc
  • 39. LOGIN NOTIFICATIONS Sites like Facebook use these They show you if someone attempts to login to your account from another location LINKS ON PAGE
  • 40. 3RD-PARTY APPS AND SOCIAL NETWORKS In our connected world services like Facebook, Twitter etc allow access to 3rd party apps which can use some of their features For example my Facebook account allows my tumblr blog to create a link on Facebook everytime I post to tumblr. Certain apps can compromise your account if they post messages to your followers or worse
  • 41. MANAGING 3RD-PARTY APPS Check your app settings on each of your social networks For example in Facebook use account settings to manage which apps you have allowed Remove ones you are unsure about
  • 42. METADATA Metadata is data about data Eg if I take a photo (data) the data about it would include Timestamp Camera type Photo settings and depending on the type of device Co-ordinates derived from GPS LINKS ON PAGE
  • 43. GEOTAGGING Geotagging is the process of attaching a GPS location to a piece of digital content - Photo - Tweet - Foursquare checkin It has benefits but also negatives – daughter posting a picture of herself at home online with photo geotagged?
  • 44. DEALING WITH GEOTAGGING Check the settings on your child’s smartphone - An iPhone for example can turn location settings off Apps such as Twitter also have flags for turning on/off geotagging LINKS ON PAGE
  • 45. SHORT LINKS ON TWITTER Due to the length of twitter posts longer email addresses are often shortened such as http://community.computingatschool.org.uk/ Is shortened to … http://bit.ly/Omnauf Use http://longurl.org to extend the address if you are unsure as to where it might lead you LINKS ON PAGE
  • 46. MANAGING SMARTPHONES AND TABLETS For very young children use ‘Guided Access’ for iPads Use gift vouchers to manage the purchase of apps Use the restrictions panel on an iPhone or iPad to manage things like in-app purchases Manage the iTunes password yourself – this will control the apps downloaded LINKS ON PAGE
  • 47. LOSING AN EXPENSIVE DEVICE For Apple devices use iCloud and Find my iPhone to locate missing devices, ping them or lock them down Similar services can be purchased for Android devices LINKS ON PAGE
  • 48. MESSAGING ON SMARTDEVICES Parents can’t do surveillance like the NSA can! Skype is reasonably popular More popular are over-the-top messaging apps such as Whats-app or iMessage – text message services Recently popular is Snapchat
  • 49. DEALING WITH INAPPROPRIATE COMMUNICATIONS Gather evidence! If you are aware of the apps your children are using familiarise yourself with how to collect evidence Take that evidence to organisations like CEOP
  • 50. SUMMARY OF SUGGESTIONS Secure Passwords and multiple levels of logins Use one security suite but a range of extra tools Discuss with your children and show them you are knowledgeable as well Know what agencies can help if something does happen
  • 51. IN CONCLUSION Esafety will always be evolving Keep on top of developments yourself Increase your trust in your children as they get older
  • 52. FURTHER LINKS http://www.childline.org.uk/ https://delicious.com/briansharland/esafety - my bookmarks on e-safety http://thinkuknow.co.uk Google security tools
  • 53. Thank you Any questions? Continue the discussion @sharland or at http://ryecomputing.wordpress.com/esafety
  • 54. Reading requires time and attention. Reading is a cognitive, mental, emotional action, and today it is under pressure from all this speed of the Internet and the whole digital world. The biggest principle of this world is speed, everything has to do with speed, that is how it is measured and that is how it is lived. When you read a book or a poem or listen to music, there is a matter of moderation, of time. This technology is an assault on time. Leon Wieseltier June 2013
  • 55. Image credits • Minecraft image – screenshot from in- game • Image: 'Oklahoma tornado reliefhttp://www.flickr.com/photos/3951350 8@N06/8867770414