e-safety safe use of the internet & technologies
TRANSCRIPT
![Page 1: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/1.jpg)
e-SafetySafe use of the Internet & technologies
![Page 2: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/2.jpg)
Objectives of this presentationRaise awareness about:
a) The nature of the risks
b) How you can help children remain safe
![Page 3: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/3.jpg)
![Page 4: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/4.jpg)
![Page 5: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/5.jpg)
![Page 6: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/6.jpg)
![Page 7: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/7.jpg)
![Page 8: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/8.jpg)
• Spot the risk!
• Make a safe choice!
What can you do ?
![Page 9: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/9.jpg)
• Help your child identify the risks and adopt safer behaviours.
• In the same way as you do with: water, electricity, roads, railways, etc
What can you do ?
![Page 10: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/10.jpg)
Nature of the risks
Do you know what your children are doing online ?
DoYouKnow?
![Page 11: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/11.jpg)
Developed by the EUKids Online project: Hasenbrink, Livingstone, Haddon, Kirwil and Ponte, 2007
Nature of the risks
![Page 12: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/12.jpg)
• Would you let your children watch TV late at night?
• Would you let your children watch films rated 18?
Why not?
Content of Games
![Page 13: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/13.jpg)
Taking Drugs
Sexism
Guns
Violence
Killing
War Theft
Murder
Torture
Prostitution
Zombies
MonstersSwearing Racis
m
Content of Games
Knifing
BAD STUFF
Rape
![Page 14: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/14.jpg)
Content of GamesPEGI labels appear on front & back of the packaging.
They provide a reliable indication of the suitability of the game contents.
![Page 15: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/15.jpg)
PEGI 18The adult classification is applied when the level of violence reaches a stage where it becomes a depiction of gross violence and/or includes elements of specific types of violence. Gross violence is the most difficult to define since it can be very subjective in many cases, but in general terms it can be classed as the depictions of violence that would make the viewer feel a sense of revulsion.
PEGI 16This rating is applied once the depiction of violence and / or sexual activity reaches a stage that looks the same as would be expected in real life. More extreme bad language, the concept of the use of tobacco and drugs and the depiction of criminal activities can be content of games that are rated 16.
Content of Games
![Page 16: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/16.jpg)
Developed by the EUKids Online project: Hasenbrink, Livingstone, Haddon, Kirwil and Ponte, 2007
Nature of the risks
BAD STUFF
![Page 17: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/17.jpg)
Suffered in silence
![Page 18: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/18.jpg)
Suffered in silence
![Page 19: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/19.jpg)
• Do not suffer in silence• Don’t reply / respond• BLOCK• KEEP the evidence• TELL someone• REPORT it• GET HELP!!
What should victims do?
![Page 20: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/20.jpg)
Developed by the EUKids Online project: Hasenbrink, Livingstone, Haddon, Kirwil and Ponte, 2007
Nature of the risks
![Page 21: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/21.jpg)
Social Networking
![Page 22: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/22.jpg)
![Page 23: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/23.jpg)
• Adopt identity of a young person / Build trust• Conversations of sexual nature / flirting• View / Share sexual images / video• Gathering information: hobbies, locations /
movements, email, phone, • Suggest to meet / go to a place• Threats to extort more extreme material (or worse)
Online predators start as friends and then gain influence & control. :
Online Grooming Behaviour
BAD STUFF
![Page 24: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/24.jpg)
• Pretended he was a young person.
• Chatted to young children over long periods of time (sometimes years!)
• Gained their trust and arranged to meet children as young as 11.
![Page 25: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/25.jpg)
![Page 26: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/26.jpg)
![Page 27: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/27.jpg)
• Real name• Home Address • Email address• Phone numbers• Location• Photos / Video / Webcam• Places frequented: School (photo of uniform)
• Friends’ details
What’s the problem?
Becky / Consequences? (TIME?)
![Page 28: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/28.jpg)
![Page 29: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/29.jpg)
Risks of Location Services
![Page 30: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/30.jpg)
![Page 31: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/31.jpg)
What’s wrong with putting this photo online?
![Page 32: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/32.jpg)
• Target for street robbery• Share location unwittingly• Take & share photos / videos of self
What’s the risk?
![Page 33: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/33.jpg)
• Take images / video on a Smartphone
• Sent to friend• Shared on Internet• Stolen from social network
sites
No control over images
ALL images / video can be captured (Webcam / Skype)
![Page 34: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/34.jpg)
• Risk cannot be totally eradicated• “As safe as possible, for as many as possible,
for as much of the time as possible”• We don’t want to stop children from using
the internet; we want them to know the risks and make safe choices.
The nature of online risks?
![Page 35: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/35.jpg)
Guidance for Parents
ChildNet ~ “Know it All”
![Page 36: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/36.jpg)
Thinkuknow.co.uk
![Page 37: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/37.jpg)
![Page 38: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/38.jpg)
![Page 39: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/39.jpg)
G = Ground rules What is OK / not OKWhat information should kept private
O = Online Safety Keep Antivirus & Spyware software up to dateOther security protection
L = LocationKeep computer in a busy areaNot in the bedroom
D = Dialogue Talk with your children Learn from each other
GOLDEN RULES
GOLD
![Page 40: E-Safety Safe use of the Internet & technologies](https://reader033.vdocuments.mx/reader033/viewer/2022052701/56649f115503460f94c237f6/html5/thumbnails/40.jpg)
?
Good LuckAny Questions