SlideShare ist ein Scribd-Unternehmen logo
1 von 55
Internet Safety: A Guide for Parents & Teachers By: Mark White
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Some Positives  About the Internet
Communicating the  Generation Y Way
Communicating the Generation Y Way
Communicating the Generation Y Way
Communicating the Generation Y Way
Can You Hear Me Now?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Communication Generation
[object Object],[object Object],[object Object],[object Object],The Communication Generation
Text Messaging (SMS)
Also known as Short Message Service (SMS), a service available on most digital  mobile phones  and other mobile devices that permits the sending of short text messages. “ Ooh look, his first text message.” www.wikipedia.com Text Messaging (SMS)
Instant  Messaging Also known as  IM , a form of  real-time  communication between two or more people based on typed text. The text is conveyed via computers connected over a network such as the  Internet .   www.wikipedia.com
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Instant  Messaging Software You’re a model? Cool! I’m a  Chippendale’s Dancer. I also race  speed boats. What’s your sign?
Blog A  user-generated  website where entries are made in  journal  style. Blogs often provide commentary or news on a particular subject, such as food, politics, or local news. www.wikipedia.com
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Some Blog Sites
Podcast A media file that is  distributed over the  Internet  using  syndication   feeds  (RSS), for  playback on  portable media players   and  personal computers . www.wikipedia.com
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Some Podcast Sites
Wiki A  website  that allows the visitors themselves to easily add, remove, and otherwise  edit  and change available content. http://en.wikipedia.org/wiki/Wiki
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Some Wiki Sites
Surfing the Web...
Are your children getting in over their heads surfing the Web? Are Your Children Aware  of the Dangers That Lurk?
Identity Theft
How is an Identity Stolen? Attempting to  fraudulently  acquire sensitive information, such as usernames,  passwords  and  credit card  details, by masquerading as a trustworthy entity in an electronic communication. Phishing Typically carried out using  email  or an  instant message , and often directs users to a website.
A  hacker 's attack aiming to redirect a  website 's traffic to another (bogus)  website .  Pharming Pharming has become of major concern to businesses hosting  ecommerce  and  online banking  websites  How is an Identity Stolen?
Spam Spam refers to junk e-mail or unsolicited e-mail. Similar abuses in other media:  instant messaging spam ,  Usenet newsgroup spam ,  Web search engine spam ,  spam in  blogs ,  mobile phone messaging spam , etc.
Cyberbullying Bullying  and  harassment  by use of electronic devices though means of  e-mail ,  instant messaging ,  text messages ,  blogs ,  mobile phones ,  pagers , and websites .
[object Object],Cyberbullying Video Clip
[object Object],[object Object],[object Object],[object Object],[object Object],File-Sharing
[object Object],[object Object],[object Object],File-Sharing Software
Pornography and  Your Children
[object Object],[object Object],[object Object],[object Object],Basic Things that Parents Can Do
Checking Your Computer for  Sexually-Explicit Material Your computer has a powerful search function which  can indicate if someone has visited pornographic Web sites. In Windows, click on the Start button in the lower left hand of your monitor, and slide up to search, and slide over to "files and folders."  Search Your Computer
Checking Your Computer for  Sexually-Explicit Material Select “All files and folders” from the window that appears. Search Your Computer Continued...
Search for Cookies You can inspect the folder where cookies are to look for any lewdly-named or suspicious cookies. Type in the word cookie in the search field and hit "search now." Make sure the "Look in" setting is set to look in your primary hard drive, usually "C," although you may want to repeat the search in any additional hard drives.  Checking Your Computer for  Sexually-Explicit Material
Most Web images are in a format that ends with either .jpg or .gif, such as "bicycle.jpg" or "vase.gif". When you view a Web site, these images are stored in various places on your hard drive. To find all such images in your hard drive, put an asterisk followed by a period in front of the name of the image format in the search window.  Search for Images Checking Your Computer for  Sexually-Explicit Material
Open your web browser (Internet Explorer) and select “Tools” and “Internet Options” Search Your  Browser Another Way to Check Your Computer for  Sexually-Explicit Material
Select “Settings” from the “Browsing history” section. Search Your  Browser Continued... Another Way to Check Your Computer for  Sexually-Explicit Material
Select “View files” and a list of cookies and picture files will appear and show the web sites where the files originated. *Note: if there are very few of them, someone is most likely deleting them from the Temporary Internet Files folder. Another Way to Check Your Computer for  Sexually-Explicit Material Search Your  Browser Continued...
[object Object],[object Object],[object Object],[object Object],Techniques for Teaching  Your Child How to Use the Web Responsibly
[object Object],[object Object],[object Object],Techniques for Teaching  Your Child How to Use the Web Responsibly
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Techniques for Teaching  Your Child How to Use the Web Responsibly
[object Object],[object Object],[object Object],[object Object],Less Obvious Signs that Internet No, No's are Taking Place
Software Filters Software filters work by blocking access to Web sites with unacceptable content or language. They are imperfect and depend to some extent on the Web sites' honesty in classifying themselves as x-rated.  ,[object Object],[object Object],[object Object],[object Object],“ The Government’s Launched a free Online filter to protect children from Internet Nasties…Um…Could you show me how to download it…?”
Keystroke Tracking Keystroke tracking programs are spy software that monitor every word typed, every program launched and every Web site visited. They do not censor the content, but rather send a report to the parent or person who installed the spy program.  ,[object Object],[object Object],[object Object],[object Object]
“ I just can’t communicate  with my child anymore.  It’s like she speaks  another language.” What Else Can  Parents & Teachers Do?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],More Tips that May Help
[object Object],[object Object],True Stories About  Online Predators
[object Object],[object Object],About MySpace & Facebook
What Can Parents Do About Their Child's Blogs MySpace  Parent Site http://www.myspace.com/Modules/Common/ Pages/SafetyTips.aspx# Facebook  Parent Site http://www.facebook.com/help.php?tab=safety
[object Object],[object Object],[object Object],MySpace Tips for Parents
[object Object],[object Object],[object Object],MySpace Tips for Parents
[object Object],[object Object],MySpace Tips for Parents
For More Information Visit My Internet Safety Website http://markwhite85.googlepages.com/internetsafety
Credits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Credits Continued ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019KanelandSvihlik
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Rajesh Soundararajan
 
Safer Internet Day PowerPoint
Safer Internet Day PowerPointSafer Internet Day PowerPoint
Safer Internet Day PowerPointWebwise
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyMariam Sb
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Digital literacy
Digital literacyDigital literacy
Digital literacyAmanda lee
 
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonSurfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonEva Buyuksimkesyan
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And KidsSandra Fathi
 

Was ist angesagt? (20)

Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents
 
Safer Internet Day PowerPoint
Safer Internet Day PowerPointSafer Internet Day PowerPoint
Safer Internet Day PowerPoint
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety
Internet safety Internet safety
Internet safety
 
Digital+safety+powerpoint
Digital+safety+powerpointDigital+safety+powerpoint
Digital+safety+powerpoint
 
Dangers on the Internet
Dangers on the InternetDangers on the Internet
Dangers on the Internet
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonSurfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 

Andere mochten auch

Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Myspace or Yours: Possibilities and Pitfalls
Myspace or Yours: Possibilities and PitfallsMyspace or Yours: Possibilities and Pitfalls
Myspace or Yours: Possibilities and PitfallsJudy O'Connell
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and ChldrenJoe Drumgoole
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notesLinda Barron
 
The Evolution of Cybercrime
The Evolution of CybercrimeThe Evolution of Cybercrime
The Evolution of CybercrimeStephen Cobb
 
Internet Safety Aisa
Internet Safety AisaInternet Safety Aisa
Internet Safety AisaElsa Freire
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saulSaul Vidal Swales
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internetdpd
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
Negative impacts of social media
Negative impacts of social mediaNegative impacts of social media
Negative impacts of social mediasimardeepvath
 
Strategies for Teaching Internet Safety and Responsible Use
Strategies for Teaching Internet Safety and Responsible Use Strategies for Teaching Internet Safety and Responsible Use
Strategies for Teaching Internet Safety and Responsible Use Ollie Bray
 
SLF 2008 - Internet Safety snd Responsible Use
SLF 2008 - Internet Safety snd Responsible UseSLF 2008 - Internet Safety snd Responsible Use
SLF 2008 - Internet Safety snd Responsible UseOllie Bray
 

Andere mochten auch (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Myspace or Yours: Possibilities and Pitfalls
Myspace or Yours: Possibilities and PitfallsMyspace or Yours: Possibilities and Pitfalls
Myspace or Yours: Possibilities and Pitfalls
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
 
Musica
MusicaMusica
Musica
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
The Evolution of Cybercrime
The Evolution of CybercrimeThe Evolution of Cybercrime
The Evolution of Cybercrime
 
Internet Safety Aisa
Internet Safety AisaInternet Safety Aisa
Internet Safety Aisa
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Negative impacts of social media
Negative impacts of social mediaNegative impacts of social media
Negative impacts of social media
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Internet Safety!!
Internet Safety!!Internet Safety!!
Internet Safety!!
 
Strategies for Teaching Internet Safety and Responsible Use
Strategies for Teaching Internet Safety and Responsible Use Strategies for Teaching Internet Safety and Responsible Use
Strategies for Teaching Internet Safety and Responsible Use
 
SLF 2008 - Internet Safety snd Responsible Use
SLF 2008 - Internet Safety snd Responsible UseSLF 2008 - Internet Safety snd Responsible Use
SLF 2008 - Internet Safety snd Responsible Use
 

Ähnlich wie Internet Safety; A Guide for Parents & Teachers

Internet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & TeachersInternet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & TeachersJVGAJJAR
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Becybersmart
BecybersmartBecybersmart
BecybersmartVelma
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Untangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe OnlineUntangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe OnlineTodd Stanfield
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Understanding Kids in the Digital World
Understanding Kids in the Digital WorldUnderstanding Kids in the Digital World
Understanding Kids in the Digital Worldkschermerhorn
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWBilly Warero
 
Secure social networking
Secure social networkingSecure social networking
Secure social networkingOsaid To'meh
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parentswstagnaro
 

Ähnlich wie Internet Safety; A Guide for Parents & Teachers (20)

Internet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & TeachersInternet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & Teachers
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Untangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe OnlineUntangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe Online
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Understanding Kids in the Digital World
Understanding Kids in the Digital WorldUnderstanding Kids in the Digital World
Understanding Kids in the Digital World
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Myspace
MyspaceMyspace
Myspace
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Secure social networking
Secure social networkingSecure social networking
Secure social networking
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
What Is Spam
What Is SpamWhat Is Spam
What Is Spam
 

Kürzlich hochgeladen

GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 

Kürzlich hochgeladen (20)

GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 

Internet Safety; A Guide for Parents & Teachers

  • 1. Internet Safety: A Guide for Parents & Teachers By: Mark White
  • 2.
  • 3. Communicating the Generation Y Way
  • 7. Can You Hear Me Now?
  • 8.
  • 9.
  • 11. Also known as Short Message Service (SMS), a service available on most digital mobile phones and other mobile devices that permits the sending of short text messages. “ Ooh look, his first text message.” www.wikipedia.com Text Messaging (SMS)
  • 12. Instant Messaging Also known as IM , a form of real-time communication between two or more people based on typed text. The text is conveyed via computers connected over a network such as the Internet . www.wikipedia.com
  • 13.
  • 14. Blog A user-generated website where entries are made in journal style. Blogs often provide commentary or news on a particular subject, such as food, politics, or local news. www.wikipedia.com
  • 15.
  • 16. Podcast A media file that is distributed over the Internet using syndication feeds (RSS), for playback on portable media players and personal computers . www.wikipedia.com
  • 17.
  • 18. Wiki A website that allows the visitors themselves to easily add, remove, and otherwise edit and change available content. http://en.wikipedia.org/wiki/Wiki
  • 19.
  • 21. Are your children getting in over their heads surfing the Web? Are Your Children Aware of the Dangers That Lurk?
  • 23. How is an Identity Stolen? Attempting to fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing Typically carried out using email or an instant message , and often directs users to a website.
  • 24. A hacker 's attack aiming to redirect a website 's traffic to another (bogus) website . Pharming Pharming has become of major concern to businesses hosting ecommerce and online banking websites How is an Identity Stolen?
  • 25. Spam Spam refers to junk e-mail or unsolicited e-mail. Similar abuses in other media: instant messaging spam , Usenet newsgroup spam , Web search engine spam , spam in blogs , mobile phone messaging spam , etc.
  • 26. Cyberbullying Bullying and harassment by use of electronic devices though means of e-mail , instant messaging , text messages , blogs , mobile phones , pagers , and websites .
  • 27.
  • 28.
  • 29.
  • 30. Pornography and Your Children
  • 31.
  • 32. Checking Your Computer for Sexually-Explicit Material Your computer has a powerful search function which can indicate if someone has visited pornographic Web sites. In Windows, click on the Start button in the lower left hand of your monitor, and slide up to search, and slide over to "files and folders." Search Your Computer
  • 33. Checking Your Computer for Sexually-Explicit Material Select “All files and folders” from the window that appears. Search Your Computer Continued...
  • 34. Search for Cookies You can inspect the folder where cookies are to look for any lewdly-named or suspicious cookies. Type in the word cookie in the search field and hit "search now." Make sure the "Look in" setting is set to look in your primary hard drive, usually "C," although you may want to repeat the search in any additional hard drives. Checking Your Computer for Sexually-Explicit Material
  • 35. Most Web images are in a format that ends with either .jpg or .gif, such as "bicycle.jpg" or "vase.gif". When you view a Web site, these images are stored in various places on your hard drive. To find all such images in your hard drive, put an asterisk followed by a period in front of the name of the image format in the search window. Search for Images Checking Your Computer for Sexually-Explicit Material
  • 36. Open your web browser (Internet Explorer) and select “Tools” and “Internet Options” Search Your Browser Another Way to Check Your Computer for Sexually-Explicit Material
  • 37. Select “Settings” from the “Browsing history” section. Search Your Browser Continued... Another Way to Check Your Computer for Sexually-Explicit Material
  • 38. Select “View files” and a list of cookies and picture files will appear and show the web sites where the files originated. *Note: if there are very few of them, someone is most likely deleting them from the Temporary Internet Files folder. Another Way to Check Your Computer for Sexually-Explicit Material Search Your Browser Continued...
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45. “ I just can’t communicate with my child anymore. It’s like she speaks another language.” What Else Can Parents & Teachers Do?
  • 46.
  • 47.
  • 48.
  • 49. What Can Parents Do About Their Child's Blogs MySpace Parent Site http://www.myspace.com/Modules/Common/ Pages/SafetyTips.aspx# Facebook Parent Site http://www.facebook.com/help.php?tab=safety
  • 50.
  • 51.
  • 52.
  • 53. For More Information Visit My Internet Safety Website http://markwhite85.googlepages.com/internetsafety
  • 54.
  • 55.