6. SOLUTIONS
Music
Monitor music downloaded
through iTunes and limit
access to explicit content.
Websites
Monitor and filter websites
based on categories and auto
enablement of Safe Search.
Videos
Monitor and filter Online TV by
show rating and block
inappropriate YouTube clips.
Instant Messaging
Monitor or block instant
messaging applications and
online chat rooms.
Games
Limit online interactions with
popular games and restrict access
to gaming websites.
Social Networking
Monitor postings on social network
sites for personal information or
block social networking sites.
Use of Internet
7. SOLUTIONS
Instant Alerts
Text Message, Email or Phone
alerts when someone visits
inappropriate content.
Email
Choose to block email, allow it
with only approved contacts, or
allow unrestricted email.
Activity Reports
Smart, informative reports of
online activity with summary
reports sent to your inbox.
Remote Management
Change your settings anytime
from anywhere using only your
web browser.
Time Limits
Choose the times of the day that
the Internet is available or set a
total time that can be spent online.
Multiple Profiles
Setup monitoring and filtering
policies for each user.
Use of Internet
9. The Technologies
Category Subscribers
(Thousands)
Remarks
Mobile Internet 31330.766 3.13 Crore
ISP + PSTN 1221.12 12.21 Lac
WiMAX 491.238 4.921 Lac
Total 33043.124 3.13 Crore
Internet Subscribers in Bangladesh
The total number of Internet Subscribers has reached 33043.124 thousand at the end of April 2013.
Asia Bangladesh %
1076681 33043 3.1 %
10. The Technologies - 2013
1. Internet Browser
2. Search Engines
3. E-mail
4. Social Network
12. The Technologies
02. Search Engines of 2013
Most people don't want 290 search engines, especially people who are internet
beginners. Most users want a single search engine that delivers three key features:
01. Relevant results (results you are actually interested in)
02. Uncluttered, easy to read interface
03. Helpful options to broaden or tighten a search
With this criteria, 5 Reader Favorite Search Engines come to mind. These 5 search
sites should meet 98% of the searching needs of a regular everyday user.
13. The Technologies
Search Engines of 2013
Google is the undisputed king of 'spartan searching'.
Google is fast, relevant, and the largest single
catalogue of Web pages available today. Make sure
you try the Google 'images', 'maps' and 'news'
features... they are outstanding services for locating
photos, geographic directions, and news headlines.
14. The Technologies
Search Engines of 2013
Yahoo! is several things: it is a search engine, a news
aggregator, a shopping center, an emailbox, a travel
directory, a horoscope and games center, and more.
This 'web portal' breadth of choice makes this a very
helpful site for Internet beginners. Searching the Web
should also be about discovery and exploration, and
Yahoo! delivers that in wholesale quantities.
15. The Technologies
Web Tools of 2013
Bing is Microsoft's attempt at unseating Google. Bing used to be
MSN search until it was updated in summer of 2009. Touted as a
'decision engine', Bing tries to support your researching by
offering suggestions in the leftmost column, while also giving you
various search options across the top of the screen. Things like
'wiki' suggestions, 'visual search', and 'related searches' might
be very useful to you. Bing is not dethroning Google in the near
future, no. But Bing is definitely worth trying.
Bing
16. The Technologies
Search Engines of 2013
The Ask/AJ/Ask Jeeves search engine is a longtime name in the
World Wide Web. The super-clean interface rivals the other
major search engines, and the search options are as good as
Google or Bing or DuckDuckGo. The results groupings are what
really make Ask.com stand out. The presentation is arguably
cleaner and easier to read than Google or Yahoo! or Bing, and
the results groups seem to be more relevant. Decide for yourself
if you agree... give Ask.com a whirl, and compare it to the other
search engines you like.
Ask (aka 'Ask Jeeves')
24. The Read-Only Web The Read/Write Web
Blogs
Web
The Technologies - 2013
25. The Read-Only Web
• Powerful resource for
educators and students,
but…
• Information moves from
publishers to consumers
• Information cannot be
edited
• One-Way Web (Web 1.0)
• The hyperlinks between
webpages began with the
release of the world wide
web(www) to the public in
1993.
26. Read only Web - Wikipedia
• Online encyclopedia
• Collaboratively
authored and edited
• Over 1 millions
users worldwide
• Over 1 million
articles in English
• Great resource, but..
• Use with caution
www.wikipedia.org
27. The Read/Write Web
• It is now as easy to create
as it is to consume.
• Anyone can publish,
share, and change
information
• Two-Way Web (Web 2.0)
• This is changing our
world!
• Web 2.0 include social
networking sites, blogs,
wikis, video sharing sites,
hosted services, web
applications.
28. Blogs
• Web + Log = weblog
or “we blog”
• Easily created
• Easily updated
• If you can email, you
can blog.
• Blogs allow visitors
to comment. Bangla Blogs
Most Popular English Blogs
29. Educational Blogs
• Teacher web sites
• Class web sites
• Learning journals
• Book Clubs
• Connect with
Authors and Experts
• Pen pals
• Professional
Development
• Reflective Practice
www.edublogs.org
30. Podcasts
• Podcasts are blogs
with audio or video.
• Podcasts are like
Internet radio shows
or TV shows.
• Podcasts are
consumed on
demand.
www.podomatic.com
31. Educational Podcasts
• Lectures & lessons
• Just-in-time learning
• School News
• Classroom News
• Final Projects
• Presentations
• Performances
• Foreign Languages
• Music
www.epnweb.org
32. Wikis
• Websites anyone
can edit!
• If you can use a
word processor, you
can use a wiki.
• Visitors can see a
history of changes
and revert to earlier
versions. http://www.wikispaces.com/
33. Educational Wikis
• Collaboratively
authored class texts
• Writing projects
• Group projects
• Sharing resources
• Grade level teams
• Subject area teams
• Professional
Development
http://www.wikispaces.com/
34. Other Services
FURL.net - Annotate,
save, and share
bookmarks online!
Flickr.com - Upload,
tag, and share
images online!
Thinkfree - Create and
share office
documents online!
www.youtube.com
36. MySpace
• Profiles
• Pics, videos, blogs
• Comments and
Messages
• Links to friends
• Search by school
• Teens check often
www.myspace.com
37. Why MySpace?
• New “Town Square”
• Teens gather with
friends online
• Most are not there
to meet strangers
• Most ignore adults
• Most go online to do
good things
38. IM, Chat, and Text
• eMail is for adults
• Instant Messages
(IM)
• Chat Rooms
• Text Messages
(Texting)
• Comments
www.aim.com
39. Educational IM, Chat, & Text
• Allows just-in-time
and on-demand help
• Flexible chat
between classrooms
• Keep in touch with
students and alumni
40. Engagement and Motivation
• Digital Natives
already enjoy these
technologies
• Interactive and
responsive
• Personalized
• Appeal to multiple
learning styles
41. Context
• Students access,
process, and create
• Authentic Purpose
• Authentic Audience
• It’s about content
and communication
- not the technology
44. Reflection
• Students read, think,
and compose
• Writing is learning
• So is creating and
editing other media
• Metacognition
• Reflective Practice
• And Feedback!
46. Inappropriate Content
• Offensive, sexual, or
violent content
• Due Diligence
• Increasingly difficult
to filter
• Appropriate
responses to the
inevitable
47. Inappropriate Sharing
• Students may post:
– Inappropriately
– Unsafely
– Irresponsibly
– Provocatively
– Illicit or illegal
behavior
• Students will post
outside of school!
48. Threats and Cyber-bullying
• Students may post
threats
• Threats that impact
attendance or
academics are a
school concern
• Credible threats
may be a criminal
matter
www.cyberbully.org
49. Free Speech Concerns
• Students do have
1st Amendment
Rights
• Parody is protected
• We cannot control
students, we can
educate them
50. A New Perspective
• Citizen Journalism
• Citizen Police Work
• Threats, suicides,
and risky behavior
are often reported
• Sting operations
catch criminals
• “My space is safer
for teens than
predators.”
51. Lack of Understanding
• Fear of the
Unknown
• Some adults vilify
technologies with
many benefits
• Deleting Online
Predators’ Act 2006
• Potential for
rebellion and
destruction of trust
www.saveyourspace.org
52. Keeping Students Safe
• Responsibility,
Appropriateness,
and Common Sense
• Planning
• Discussions
• Teachable Moments
• A letter home &
permission slips
53. Guidelines for Students
• Do not reveal
personal information
• Do not post
provocative pictures
• Consider the
consequences
• Consider the future
54. Code of Ethics
• Seek Truth and
Express It
• Minimize Harm
• Be Accountable
• Respect Information
and its Infrastructure
55. Controlled Environments
• Class Blogmeister (Free)
www.classblogmeister.com
• November Learning Communities ($)
www.novemberlearning.com
56. Establishing a Defense
• A Chain of
Command
• An Organizational
Policy on Blogs etc.
• Transparency
• Exploit the New
Medium
57. Staying Safe OnlineI.
Social NetworkingII.
CyberbullyingIII.
Solutions and StrategiesIII.
Raising Responsible Digital Citizens
Internet Safety
58. STAYING SAFE ONLINE
Guard Your Information
• Address
• Phone number
• School
• City
• Sports teams
• Parent’s workplace
• Passwords
59. STAYING SAFE ONLINE
Limit Time Online
• Unplug and play
• Take time for family
• Face-to-face time with
friends
• No substitute for real
exercise and sports
60. STAYING SAFE ONLINE
Friend or Foe?
• Seeing is not believing
• Never schedule offline
meeting with “online only”
friends
• Tell your parents if anyone
tries to meet with you offline 15-year-old girl on
Facebook
61. STAYING SAFE ONLINE
Communicate
• Don’t bottle it up
• Ok to ask questions
• Stay away from “adults
only” sections of the Internet
• Tell your parents about
anything that makes you
feel uncomfortable
62. STAYING SAFE ONLINE
Webcam Safety
• Never do random chat
• Only chat with family and
friends
• Never do anything on a
webcam you wouldn’t want
up on this screen
• Think before uploading
video responses
63. STAYING SAFE ONLINE
Time and a Place
• Carefully consider whether
to use geolocation on social
networks/games
• Never check in at school,
church, or any place you
visit regularly
• Check privacy settings
• Ask parents for permission
before using any
geolocation
64. STAYING SAFE ONLINE
Be “Scam Smart”
• Don’t open strange emails
• Beware “free” downloads
• Don’t use P2P
• Don’t be a pirate
65. STAYING SAFE ONLINE
Keep It in the Family
• Don’t share family photos
without permission
• Ask before uploading
66. STAYING SAFE ONLINE
Privacy? On the Web?
• All media is permanent
• All information is available
• If you don’t want people to
know about it, don’t do it,
and especially don’t do it
online
67. STAYING SAFE ONLINE
Sign the Gameplan
• Work as a team
• Talk with your parents
• Be a tech-teacher
• Accept help (from
parents, teachers, and
law enforcement)
69. SOCIAL NETWORKING
Choose Your Friends
• Only friend people you
know well
• Don’t get into contest for
who has the most friends
• Keep your group of friends
small and get more out of
Facebook
70. SOCIAL NETWORKING
Protect Your Info
• Don’t post phone #
• Don’t post address
• Avoid status updates with
time and place references
• Don’t use Places
• Set all privacy settings to
“Friends Only”
71. SOCIAL NETWORKING
A picture is worth…
• Ask permission to post
photos of friends
• You can untag yourself
• Avoid photos that reveal
locations like home and
school
• Report harmful photos
72. SOCIAL NETWORKING
What’s Wrong With This Update?
Bethany is such a loser. She asked in class
whether Hitler was around before or after the Last
Supper…lol
73. SOCIAL NETWORKING
What’s Wrong With This Update?
Woohoo! Going to Orlando for a whole week! Be
back next Sunday! C-ya!!!
79. CYBERBULLYING
Response
• Don’t react: responding
to the bully only makes
it worse
• Report the bullying to
parents, teachers, and
site admin
• Don’t participate
• Encourage others to
stand up
81. STRATEGY
Be a Parent
• Decide when your
kids are ready
• Stress respect of
others
• Consider maturity of
peers and child
• Set clear rules
• Set clear
consequences
82. STRATEGY
Cyberbullying
• Take the problem
seriously
• Assure your child you
will make it stop
• Don’t react to the bully
• Record and report
83. SOLUTIONS
Use of Internet
01. The Three Security Basics of Home Computing
a. Install and maintain anti-virus software.
b. Do not open unknown or suspicious email.
c. Keep your computer patched against known vulnerabilities.
02. Securing Windows
a. Password Protect The Guest Account
b. Enable The Internet Connection Firewall (ICF)
c. Use Private Folders To Protect Data
d. Use Limited Accounts For Everyday Use
e. Upgrade to Windows
84. SOLUTIONS
Use of Internet
03. Creating Secure Passwords
a. Do not use personal information.
b. Do not use real word.
c. Mix different character types.
d. Use a passphrase.
e. Use a password management tools
04. Internet Setting
a. Internet Security Suites Software
b. Internet Filter Software
c. Privacy Setting
- Through browser Internet Explorer or Fire Fox
85. Q & A
Syed Mohammed Tariqul Islam
Joint Secretary General, ISPAB