SlideShare une entreprise Scribd logo
1  sur  10
How Safe Are Our ChildrenOn the Internet By Stephen Wright
What Are the Dangers Pornography Predators Cyber Bullying Viruses Social Networking
Pornography 60% of all websites are pornographic 1 in 4 children who use the Internet regularly, will be exposed to unwanted sexual material
Predators Pedophiles represent the most dangerous aspect of the Internet one in five children age 10-17 who regularly use the Internet have received a sexual solicitation Chat rooms and instant messages are two main tools pedophiles use to contact children
Cyber Bullying  Cyber bullying is the use of technology to harass, threaten, embarrass, or target another person. One in three teens have been the victims of cyber bullying Severe cyber bullying can leave victims at greater risk for anxiety, depression, and other stress-related disorders.
Viruses Malicious programs include worms, macros, phishing, spam, and rootkits. These programs are designed to disrupt  your computer, steel information and identities. Viruses can give hackers unwanted assess to you  computer.
Social Networking Parents my feel a false sence of security when they see who their kids are friending on line.  But that Doesn't reveal key details about your child's friends Forces you to wade through hours of teenaged gossip May actually embarrass your child, even if you're well intentioned!
Strategies for Safe Internet Use Many internet providers offer child safe sites that will Find out where your child has online accounts Know who your child is "friends" with online Get notified if your child posts about violence, suicide or drugs See photos posted by or tagged with your child
Strategies for Safe Internet Use Be aware of what your children are doing online Look for changes in moods such as depression Keep firewalls in place and have good anti virus software.   Don’t be afraid to limit access Keep informed on internet issues.
References Clear Traffic http://www.cleartraffic.com/keeping-kids-safe.htm Kid Health http://kidshealth.org/parent/positive/talk/cyberbullying.html#  COMPUTER VIRUSES by Markus Hanhisalohttp://www.tml.tkk.fi/Opinnot/Tik-110.501/1997/viruses.html

Contenu connexe

Tendances

My protection plan
My protection planMy protection plan
My protection planShakena12
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overviewJohn Woodring
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of NetiquetteACLC Antipolo
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Common sense technology policy2
Common sense technology policy2Common sense technology policy2
Common sense technology policy2John Robinson
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention RAUSHAN KUMAR
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersRajesh Soundararajan
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
McKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullyingMcKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullyingmckinleychas
 
Formative Task - Safe Internet Usage
Formative Task - Safe Internet UsageFormative Task - Safe Internet Usage
Formative Task - Safe Internet Usagealigi
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2bigmike18
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018KanelandSvihlik
 
Cyberstalking
CyberstalkingCyberstalking
CyberstalkingTrevschic
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile securityErnest Staats
 

Tendances (20)

My protection plan
My protection planMy protection plan
My protection plan
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Common sense technology policy2
Common sense technology policy2Common sense technology policy2
Common sense technology policy2
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
 
McKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullyingMcKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullying
 
Formative Task - Safe Internet Usage
Formative Task - Safe Internet UsageFormative Task - Safe Internet Usage
Formative Task - Safe Internet Usage
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 

Similaire à How safe are our children

Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentationgrp4.ed451
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentationrenumann
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safetyFred Miller
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaAlexander Berta
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 

Similaire à How safe are our children (20)

Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentation
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 

Plus de stevewrightco

Top twelve wright power point
Top twelve wright power pointTop twelve wright power point
Top twelve wright power pointstevewrightco
 
Wow that’s a billon Frog One
Wow that’s a billon Frog OneWow that’s a billon Frog One
Wow that’s a billon Frog Onestevewrightco
 
Wow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying EagleWow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying Eaglestevewrightco
 
Wow that’s a billion by Sky Eagle One
Wow that’s a billion by Sky Eagle OneWow that’s a billion by Sky Eagle One
Wow that’s a billion by Sky Eagle Onestevewrightco
 
Wow that’s a billon by Frog One
Wow that’s a billon by Frog OneWow that’s a billon by Frog One
Wow that’s a billon by Frog Onestevewrightco
 
Wow that’s a billon by Frog One
Wow that’s a billon by Frog OneWow that’s a billon by Frog One
Wow that’s a billon by Frog Onestevewrightco
 
Wow that’s a billon by Frog One
Wow that’s a billon by Frog OneWow that’s a billon by Frog One
Wow that’s a billon by Frog Onestevewrightco
 
Wow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying EagleWow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying Eaglestevewrightco
 
Wow that’s a billion georgie and anna
Wow that’s a billion georgie and annaWow that’s a billion georgie and anna
Wow that’s a billion georgie and annastevewrightco
 
Wow That's a BilloinSpeed Racer
Wow That's a BilloinSpeed RacerWow That's a BilloinSpeed Racer
Wow That's a BilloinSpeed Racerstevewrightco
 
Wow that’s a billion by Sky Eagle 1
Wow that’s a billion by Sky Eagle 1Wow that’s a billion by Sky Eagle 1
Wow that’s a billion by Sky Eagle 1stevewrightco
 

Plus de stevewrightco (13)

36 things
36 things36 things
36 things
 
Top twelve wright power point
Top twelve wright power pointTop twelve wright power point
Top twelve wright power point
 
Wow that’s a billon Frog One
Wow that’s a billon Frog OneWow that’s a billon Frog One
Wow that’s a billon Frog One
 
Wow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying EagleWow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying Eagle
 
Wow that’s a billion by Sky Eagle One
Wow that’s a billion by Sky Eagle OneWow that’s a billion by Sky Eagle One
Wow that’s a billion by Sky Eagle One
 
Dustin.r billion
Dustin.r billionDustin.r billion
Dustin.r billion
 
Wow that’s a billon by Frog One
Wow that’s a billon by Frog OneWow that’s a billon by Frog One
Wow that’s a billon by Frog One
 
Wow that’s a billon by Frog One
Wow that’s a billon by Frog OneWow that’s a billon by Frog One
Wow that’s a billon by Frog One
 
Wow that’s a billon by Frog One
Wow that’s a billon by Frog OneWow that’s a billon by Frog One
Wow that’s a billon by Frog One
 
Wow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying EagleWow that’s a billion by Sky Fox and Flying Eagle
Wow that’s a billion by Sky Fox and Flying Eagle
 
Wow that’s a billion georgie and anna
Wow that’s a billion georgie and annaWow that’s a billion georgie and anna
Wow that’s a billion georgie and anna
 
Wow That's a BilloinSpeed Racer
Wow That's a BilloinSpeed RacerWow That's a BilloinSpeed Racer
Wow That's a BilloinSpeed Racer
 
Wow that’s a billion by Sky Eagle 1
Wow that’s a billion by Sky Eagle 1Wow that’s a billion by Sky Eagle 1
Wow that’s a billion by Sky Eagle 1
 

Dernier

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Dernier (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

How safe are our children

  • 1. How Safe Are Our ChildrenOn the Internet By Stephen Wright
  • 2. What Are the Dangers Pornography Predators Cyber Bullying Viruses Social Networking
  • 3. Pornography 60% of all websites are pornographic 1 in 4 children who use the Internet regularly, will be exposed to unwanted sexual material
  • 4. Predators Pedophiles represent the most dangerous aspect of the Internet one in five children age 10-17 who regularly use the Internet have received a sexual solicitation Chat rooms and instant messages are two main tools pedophiles use to contact children
  • 5. Cyber Bullying Cyber bullying is the use of technology to harass, threaten, embarrass, or target another person. One in three teens have been the victims of cyber bullying Severe cyber bullying can leave victims at greater risk for anxiety, depression, and other stress-related disorders.
  • 6. Viruses Malicious programs include worms, macros, phishing, spam, and rootkits. These programs are designed to disrupt your computer, steel information and identities. Viruses can give hackers unwanted assess to you computer.
  • 7. Social Networking Parents my feel a false sence of security when they see who their kids are friending on line. But that Doesn't reveal key details about your child's friends Forces you to wade through hours of teenaged gossip May actually embarrass your child, even if you're well intentioned!
  • 8. Strategies for Safe Internet Use Many internet providers offer child safe sites that will Find out where your child has online accounts Know who your child is "friends" with online Get notified if your child posts about violence, suicide or drugs See photos posted by or tagged with your child
  • 9. Strategies for Safe Internet Use Be aware of what your children are doing online Look for changes in moods such as depression Keep firewalls in place and have good anti virus software. Don’t be afraid to limit access Keep informed on internet issues.
  • 10. References Clear Traffic http://www.cleartraffic.com/keeping-kids-safe.htm Kid Health http://kidshealth.org/parent/positive/talk/cyberbullying.html#  COMPUTER VIRUSES by Markus Hanhisalohttp://www.tml.tkk.fi/Opinnot/Tik-110.501/1997/viruses.html