SlideShare une entreprise Scribd logo
1  sur  10
How Safe Are Our Children
    On the Internet
           By
     Stephen Wright
What Are the Dangers
• Pornography
• Predators
• Cyber Bullying
• Viruses
• Social Networking
Pornography


• 60% of all websites are pornographic
• 1 in 4 children who use the Internet
  regularly, will be exposed to
  unwanted sexual material
Predators
• Pedophiles represent the most dangerous
  aspect of the Internet
• one in five children age 10-17 who regularly
  use the Internet have received a sexual
  solicitation
• Chat rooms and instant messages are two
  main tools pedophiles use to contact children
Cyber Bullying
• Cyber bullying is the use of technology to
  harass, threaten, embarrass, or target another
  person.
• One in three teens have been the victims of
  cyber bullying
• Severe cyber bullying can leave victims at
  greater risk for anxiety, depression, and other
  stress-related disorders.
Viruses
• Malicious programs include worms,
  macros, phishing, spam, and rootkits.
• These programs are designed to
  disrupt your computer, steel
  information and identities.
• Viruses can give hackers unwanted
  assess to you computer.
Social Networking
• Parents my feel a false sence of security when
  they see who their kids are friending on line.
• But that
  – Doesn't reveal key details about your child's
    friends
  – Forces you to wade through hours of teenaged
    gossip
  – May actually embarrass your child, even if you're
    well intentioned!
Strategies for Safe Internet Use
• Many internet providers offer child safe sites
  that will
  – Find out where your child has online accounts
  – Know who your child is "friends" with online
  – Get notified if your child posts about violence,
    suicide or drugs
  – See photos posted by or tagged with your child
Strategies for Safe Internet Use
• Be aware of what your children are doing
  online
• Look for changes in moods such as depression
• Keep firewalls in place and have good anti
  virus software.
• Don’t be afraid to limit access
• Keep informed on internet issues.
References
• Clear Traffic
  http://www.cleartraffic.com/keeping-kids-
  safe.htm
• Kid Health
  http://kidshealth.org/parent/positive/talk/cyb
  erbullying.html#
• COMPUTER VIRUSES by Markus Hanhisalo
  http://www.tml.tkk.fi/Opinnot/Tik-
  110.501/1997/viruses.html

Contenu connexe

Tendances

Internet Safety
Internet SafetyInternet Safety
Internet Safety
ccapozzoli
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rowenick
 
Cyber Wellness Lesson Plan Presentation
Cyber Wellness Lesson Plan PresentationCyber Wellness Lesson Plan Presentation
Cyber Wellness Lesson Plan Presentation
Kai Sheng
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
Lawrence Fine
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
Ernest Staats
 

Tendances (19)

Lotrecchiano grace
Lotrecchiano graceLotrecchiano grace
Lotrecchiano grace
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber Safe Parenting
Cyber Safe ParentingCyber Safe Parenting
Cyber Safe Parenting
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
 
Cyber Wellness Lesson Plan Presentation
Cyber Wellness Lesson Plan PresentationCyber Wellness Lesson Plan Presentation
Cyber Wellness Lesson Plan Presentation
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention
 

En vedette (6)

Wow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying EagleWow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying Eagle
 
Top twelve wright power point
Top twelve wright power pointTop twelve wright power point
Top twelve wright power point
 
Wow that’s a billion by Sky Eagle One
Wow that’s a billion by Sky Eagle OneWow that’s a billion by Sky Eagle One
Wow that’s a billion by Sky Eagle One
 
Wow that’s a billon by Frog One
Wow that’s a billon by Frog OneWow that’s a billon by Frog One
Wow that’s a billon by Frog One
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Dustin.r billion
Dustin.r billionDustin.r billion
Dustin.r billion
 

Similaire à How safe are our children

Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
Joe Drumgoole
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
QEwebAdmin
 

Similaire à How safe are our children (20)

2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Online safety
Online safetyOnline safety
Online safety
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet Safety
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big Problem
 
Bully
BullyBully
Bully
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 

Plus de stevewrightco (9)

36 things
36 things36 things
36 things
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Wow that’s a billon Frog One
Wow that’s a billon Frog OneWow that’s a billon Frog One
Wow that’s a billon Frog One
 
Wow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying EagleWow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying Eagle
 
Wow that’s a billon by Frog One
Wow that’s a billon by Frog OneWow that’s a billon by Frog One
Wow that’s a billon by Frog One
 
Wow that’s a billon by Frog One
Wow that’s a billon by Frog OneWow that’s a billon by Frog One
Wow that’s a billon by Frog One
 
Wow that’s a billion georgie and anna
Wow that’s a billion georgie and annaWow that’s a billion georgie and anna
Wow that’s a billion georgie and anna
 
Wow That's a BilloinSpeed Racer
Wow That's a BilloinSpeed RacerWow That's a BilloinSpeed Racer
Wow That's a BilloinSpeed Racer
 
Wow that’s a billion by Sky Eagle 1
Wow that’s a billion by Sky Eagle 1Wow that’s a billion by Sky Eagle 1
Wow that’s a billion by Sky Eagle 1
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

How safe are our children

  • 1. How Safe Are Our Children On the Internet By Stephen Wright
  • 2. What Are the Dangers • Pornography • Predators • Cyber Bullying • Viruses • Social Networking
  • 3. Pornography • 60% of all websites are pornographic • 1 in 4 children who use the Internet regularly, will be exposed to unwanted sexual material
  • 4. Predators • Pedophiles represent the most dangerous aspect of the Internet • one in five children age 10-17 who regularly use the Internet have received a sexual solicitation • Chat rooms and instant messages are two main tools pedophiles use to contact children
  • 5. Cyber Bullying • Cyber bullying is the use of technology to harass, threaten, embarrass, or target another person. • One in three teens have been the victims of cyber bullying • Severe cyber bullying can leave victims at greater risk for anxiety, depression, and other stress-related disorders.
  • 6. Viruses • Malicious programs include worms, macros, phishing, spam, and rootkits. • These programs are designed to disrupt your computer, steel information and identities. • Viruses can give hackers unwanted assess to you computer.
  • 7. Social Networking • Parents my feel a false sence of security when they see who their kids are friending on line. • But that – Doesn't reveal key details about your child's friends – Forces you to wade through hours of teenaged gossip – May actually embarrass your child, even if you're well intentioned!
  • 8. Strategies for Safe Internet Use • Many internet providers offer child safe sites that will – Find out where your child has online accounts – Know who your child is "friends" with online – Get notified if your child posts about violence, suicide or drugs – See photos posted by or tagged with your child
  • 9. Strategies for Safe Internet Use • Be aware of what your children are doing online • Look for changes in moods such as depression • Keep firewalls in place and have good anti virus software. • Don’t be afraid to limit access • Keep informed on internet issues.
  • 10. References • Clear Traffic http://www.cleartraffic.com/keeping-kids- safe.htm • Kid Health http://kidshealth.org/parent/positive/talk/cyb erbullying.html# • COMPUTER VIRUSES by Markus Hanhisalo http://www.tml.tkk.fi/Opinnot/Tik- 110.501/1997/viruses.html