How can children take advantages of internet without danger?
How can you be secure your children are doing the best use of the net?
What are iwith.org recipies for parents?
3. Iwith.org
Non profit foundation.
Help to other non-profits with IT problems.
Iwith.org's mission is to promote information
and communication technologies as tools for
solidarity and progress in society.
5. We are NOT!
We are not specialized in:
Internet Child protection.
Child Education, Pedagogy.
Psychology, ...
6. We are
We are in Internet since long time ago.
We have experience on how to use internet.
We are always early adopters and beta-
testers of new technologies.
8. Online Predators, SPAM, SCAM,
Phishing, Pornography, Identity
Theft, Privacy, Pedophilia,
Cyberbulling, Social Networks,
Facebook, Twitter...
Just some of the many issues and dangers
on the Internet.
20. Automation
Ex: Thanks to automation, a “kid”
can steal thousands of credit
cards numbers, and charge a
amount that will not be perceived
by the card holder.
23. Online Predators
An online predator is an adult
Internet user who exploits
vulnerable teens, usually for
sexual purposes.
24. Online Predators
Easy to occur.
Easy to prevent.
Do not talk with “strangers”.
Never Share personal information.
Main risks.
Break Heart, adults language, nude
pictures, in-person meeting ...
25. TALK
Chat.
IM (instant messaging).
E-Mail.
VoIP (Skype).
Phone.
Social Networks.
SMS, MMS.
26. SPAM
Spam is the abuse of electronic
messaging systems (including
most broadcast media, digital
delivery systems) to send
unsolicited bulk messages
indiscriminately.
27. SPAM
Easy to occur.
Difficult to solve.
Easy to prevent (?).
do not share your email address.
Main risk.
Products (Viagra, diploma, ...).
Identity Thief, Credit card, Worms.
28. SCAM
A confidence trick or confidence
game, is an attempt to defraud a
person or group by gaining their
confidence.
29. SCAM
Easy to occur.
Easy to prevent.
do not Trust anybody.
Main risk.
Economical damage, legal problems.
30. Phishing
Phishing is the criminally fraudulent
process of attempting to acquire
sensitive information such as
usernames, passwords and credit
card details by masquerading as a
trustworthy entity in an electronic
communication.
31. Phishing
Easy to occur.
Easy to prevent.
Never click on links in emails.
Main risk.
Economical damage.
Identity Thief.
32. Pornography
But not ONLY... also
How to build a nuclear
bomb!
Suicide how-to.
Conspiracy theories.
Sects, Gangs, ...
35. Pornography
When you get access to
pornographic material ?
Was it difficult ?
What was the main
source for that material ?
37. It’s a lost war!
If for us it was easy to get access to those
materials.
For them (our children) it will be also easy,
no internet parenting tool will block access
to that content.
As source will be their friends, ...
38. Identity Theft
Identity theft is a crime used to
refer to fraud that involves
someone pretending to be
someone else in order to steal
money or get other benefits.
39. Identity Theft
Easy to occur if we don’t take measures.
Easy to prevent.
Strong password, no dictionary, no date of
birth, pet name, or baby name.
A password per service (SORRY for THAT).
Never enter recovery password questions.
Never share it.
40. Identity Theft
What they can do.
Empty my bank account.
Ask for a credit card.
Post a message as me (Social shame).
41. Privacy
Privacy is the ability of an
individual or group to seclude
themselves or information about
themselves and thereby reveal
themselves selectively.
42. Privacy
Control what you are sharing.
recruiters are watching you.
Default settings are enough for you ?
Do you want to share “this picture” with your
friends or with “everybody”.
44. Syndication
Check if your status is sent OUTSIDE,
because then the privacy rules are the ones
of the external website.
45. Pedophilia
As a medical diagnosis, it is
defined as a psychological
disorder in which an adult
experiences a sexual preference
for prepubescent children.
46. Pedophilia
Link: Online Predators.
A man have been arrested for taking
pictures of young children on a beach.
He was “sick”.
Are you posting the pictures of your
children in the beach ?
If so, with which privacy setting ?
47. Cyberbulling
Cyber-bullying involves the use of
information and communication
technologies to support deliberate,
repeated, and hostile behavior by an
individual or group, that is intended
to harm others.
48. Cyberbulling
Do we need to distinguish between bulling
and cyberbulling ?
I don’t think so.
Parents & Educators have to pay attention
to both in order to prevent and damage
control it.
49. Social Networks
A social network service focuses on
building online communities of people
who share interests and/or activities,
or who are interested in exploring the
interests and activities of others.
50. Social Networks
By offering a closed environment they feel
more secure.
They are again a society, and inside we can
find the same problems we can face in
Internet and in real live.
So, we have to take the same measures.
51. Give me a break!
When I was a child
Internet was not around.
53. My mother recipe.
At the park, never left child unattended.
Do not talk with “strangers”.
Never accept candies.
Do not discuss family “secrets” with your
friends.
54. My mother recipe.
Be good with other kids.
Report any wrong doing you see.
Don’t be afraid or too ashamed to tell me
the truth.
ENJOY!
56. My recipe.
At the park, never left child unattended.
Computer is always in a shared space.
Children can be online, if an adult is in the
room.
57. My recipe.
Do not talk with “strangers”.
Never accept “invitations” to connect if you
don’t know who they are.
Privacy options for IM set to only accept
messages from people in my Address Book.
58. My recipe.
Never accept candies.
Nothing is free... never click on banners or
reply to messages claiming free something.
59. My recipe.
Do not discuss family “secrets” with your
friends.
Never give personal data online.
Name, address, phone, car brand, credit
card, bank info...
60. My recipe.
Be good with other kids.
Don’t blame your friends.
Don’t send bulling messages, emails, sms.
Don’t impersonate ...
61. My recipe.
Report any wrong doing you see.
If you see something “strange” tell me.
If you have questions, ask me.
If you want to learn something let me
know.
62. My recipe.
Don’t be afraid or too ashamed to tell me
the truth.
Everybody makes mistakes... I DO.
Bad things happen, but are easy to pass
with support.
64. ASAP
As young as they are...
Easy to get their attention.
I normally will have more knowledge than
them.
Some things that are easier to discuss
with less hormones...
65. When they grow
They will have acquired the basic rules.
They will have experience.
It will be natural to ask, share, discuss the
problems or questions with us.
66. Conclusion
Internet is there, and our children will use
it... better if they are prepared.
Internet is not good or bad, it’s a tool used
by other people and there are good and bad
people out there.
When you are connected, you are not “at
home”, you are in the middle of the street.
67. To learn more
Wild Web Woods: A game by the Council of
Europe based on the Internet Literacy
Handbook. http://www.wildwebwoods.org/
INHOPE: The International Association of
Internet Hotlines. https://www.inhope.org/
Protecting Children Online: An ECPAT Guide.
http://www.ecpat.net/EI/ICT_Publications.asp
68. iwith.org Foundation
11, Rue de la Porcelaine
1260, Nyon
Switzerland
T:+41 22 362 58 69
F:+41 22 362 58 67
Cucurulla, 9, 2n
08002, Barcelona
Spain
T:+34 93 380 49 75
F:+34 93 304 23 53
http://www.iwith.org/
info@iwith.org