pd pandora & cyberhood watch internet safety symposium
DESCRIPTION
CyberHood Watch, OSAuthority, educators, law enforcement personnel, child welfare organizations, community leaders and PARENTS everywhere know that Internet safety is at the top of today's list of parenting concerns. And why shouldn't it be? We let our children use a machine that connects them to the entire world - but more importantly, connects the entire world to them and your home. The PD Pandora Internet Safety curriculum is an informative and customizable 90-minute safety seminar that analyzes the common threats children and families face online every day. The symposium covers Internet predators, cyberbullying, peer-to-peer file sharing, social networking and more, as well as solutions that will help any 21st century parent. The complete package consists of a full PowerPoint presentation, read-along script, 6-page parent hand-out for distribution and marketing materials.TRANSCRIPT
www.TheCyberHoodWatchTheCyberHoodWatch.com
PD Pandora Internet Safety1
PD PandoraInternet Safety
Symposium:How to Keep Your Family Safe on the
Internet
CyberHood CyberHood WatchWatch
When ordering use special promo code for discount: “cyberhoodcyberhood”
PD Pandora Internet Safety3
AGENDA
Part I: Internet 101 Intro to the Internet, Web 2.0
Threat Assessment
Part II: Solutions What you can do
Resources
PART I: INTERNET PART I: INTERNET 101101
Intro to the Internet and Web 2.0Threat Assessment
www.TheCyberHoodWatchTheCyberHoodWatch.com
PD Pandora Internet Safety5
THE INTERNET
Evolved over decades “inter” “networks” talking to each
other Went public in the ‘80s Popularity in the mid-‘90s Source of information – A place to
search for answers and information Early communication includes:
email, chat rooms, forums
PD Pandora Internet Safety6
Does not refer to an update to any technical specifications, but rather to changes in the ways software developers and
end-users (you and me) utilize the Web…
Web 2.0 concepts have led to the development and evolution of web communities and hosted services, such as video sharing sites, wikis, blogs, and the most popular of all…
WEB 2.0
o "Network as platform" computing - Allows users to run software-applications entirely through a browser
o Users can own the data on a Web 2.0 site and exercise control over that data
o "Architecture of participation" encourages users to add value to the application as they use it
PD Pandora Internet Safety7
SOCIAL NETWORKINGGet used to it!
Used regularly by millions of people across the globe… Most popular social networking websites:
MySpace Facebook FriendsterBebo Youtube
TwitterDigg LinkedIn Ning
Online communities of Internet users and people who share interests and/or activities, or who are interested in exploring the interests and activities of others
Can be general in nature, or cater to a specific group or common interest, such as hobbies, religion, or politics; many general sites have specialized groups within
Provide a variety of ways for users to interact Free to use
PD Pandora Internet Safety8
SOCIAL NETWORKING (II)
Your profile page is the front page of your own newspaper!
Main purpose = communicate with friends
Tell people about:your personality
personal/professional interestshobbies
basic info about yourself
Why?Profile page = “your” customizable space
You can also:customize the background
choose the musicshare photos
show your list of friendsadd “widgets”
share video
PD Pandora Internet Safety9
SOCIAL NETWORKING (III)
What’s so social about it?
Modes of communication offered by most popular
social networking websites include:
Internal “private mail” or “private message” (called a PM)
Instant messenger (real-time communication) Comments (short messages visible to all) Journal/Blog (thoughts or memos for the day) Bulletins (messages to everyone in your friends list) “Tweeting”
MAKING FRIENDS!COMMUNICATION!
PD Pandora Internet Safety10
THE GOOD, THE BAD AND THE UGLY (of Social Networks)
Good: Helps people stay in touch
Acceptance Inspire interests and
creativity
Bad:Too much information (“TMI”)
Access to inappropriate material
Loss of privacy/identity theft
Ugly:Bullying
Internet predators“Sexting”
PD Pandora Internet Safety11
OTHER POPULAR WAYS TO COMMUNICATE
Instant Messenger (IM)Real-time text-based communication
Popular IM programs: AOL Instant Messenger MSN Messenger Yahoo Messenger ICQ Trillian
Chat Rooms: Have dozens, even hundreds, of participants
Chat Rooms are often themed by interest “Moderators” police the conversation (not always)
Chat rooms can be joined through your web browser
Many IM programs also allow:•Offline messages
•Group chatting•Voice and video chatting
•Conversation logging and file sharing•Webcams
PD Pandora Internet Safety12
Forums:a.k.a. message boards, newsgroups, online discussion sites
o “The modern bulletin board”o Topic central
o Several discussions at the same timeo Make friends, bond with people that share common interest
o Governed and maintained by administrators and moderators
Blogs:Short for “web log”
o Frequently updated online diaries/journalso Personal or professional; ethical, moral, topical
o Example: Pandora’s Blog, the blog for PC Pandora, tackles Internet safety and shares daily news stories on the issue.
o More popular with adults; kids getting into blogging more and more.
OTHER POPULAR WAYS TO COMMUNICATE (II)
PD Pandora Internet Safety13
They DO exist!Internet Predators
Two types on the Internet
Predators lurk in chat rooms, forums, and social networks to search for targets!!!
THE THREATS
Sexual predators: Search for under-aged boys and girls or vulnerable older girls/young women Lure their target, “grooming” A physical meeting, after a sense of “knowing” and “trust” is established Sexual assault, and sometimes rape, can occur in the real life meetings Child pornographers
Scam artists: Don’t care if they ever meet you; they are after your wallet Take their time to learn real-life facts about you and then use that
information to try and gain access to your credentials, bank accounts, etc. Use sophisticated and professional emails that appear legitimate, but are
nothing more than a ploy to get you to divulge your private information May lead to identity theft
PD Pandora Internet Safety14
THE THREATS (II) They DO exist!
Internet Predator Statistics: 69% of teens regularly receive personal messages online from people they
don't know and most of them don't tell a trusted adult about it. While 16% of teens in 2007 say they've considered meeting face-to-face with
someone they've talked to only online, that marks a significant drop compared to the 30% of teens who were considering such a meeting in 2006.
In 2007, 8% of teens say they actually have met in person with someone from the Internet, down from 14% in 2006.
When they receive online messages from someone they don't know, almost 60% of teens say they usually respond only to ask who the person is. Nearly a third of teens (31%) say they usually reply and chat with people they don't know, and only 21% tell a trusted adult when they receive such messages.
Approximately 1 in 7 (13%) children were solicited in 2005, compared to approximately 1 in 5 (19%) in 2000; aggressive solicitations did not decline.
4% of all youth Internet users in 2005 said online solicitors asked them for nude or sexually explicit photographs of themselves.
Make no mistake, these guys exist!
PD Pandora Internet Safety15
THE THREATS (III) Same bully, different technology
Cyberbullying(a.k.a. electronic bullying, online bullying)
Definition: the intentional and repeated harm of others through the use of computers, cell phones, and other electronic devices.
Worst of all: the effects and ordeal of a cyberbully can follow a victim for years…
o THE most predominant threat your kids will face todayo Bullying 2.0: moved from the playground to the Interneto The Internet makes it possible for bullying to continue at
every hour of every day
Bullying Effects:• Mental anguish• Humiliation• Stress• Anxiety• Depression• Suicidal feelings
PD Pandora Internet Safety16
Same old bully, new technology Cyberbullying is…
Important to remember: though the use of sexual remarks and threats are sometimes present in cyberbullying, it is not the same as sexual harassment and does not necessarily involve sexual predators…
THE THREATS (IV)
As simple as email harassment, but may also include: Threats Sexual remarks and solicitations Compromising photos Hate speech/racist remarks Subject of ridicule in forums Posting false statements gossip as fact
Cyberbullies may: Disclose victims' personal data on websites/forums Pose as victim (ID theft?) Send threatening/harassing emails and IMs Post rumors or gossip Instigate others to gang up on target
PD Pandora Internet Safety17
Same old bully, new technologyCyberbullying exists where?
Important to remember: cyberbullying is bullying between minors! When an adult (over 18 years of age) is involved, it is considered cyber-stalking and cyber-harassment.
THE THREATS (V)
Electronic bullying takes place: on social networks in chat rooms in forums through Instant Messenger on YouTube
Offline: text messaging on mobile phones
PD Pandora Internet Safety18
THE THREATS (VI) Same bully, different technology
Cyberbullying Statistics: Nearly 75% of kids have been bullied in the past year Only 1 in 10 reported such cyberbullying to parents/adults 41% of teenagers report between 1 and 3 online bullying
incidents over the course of a year 13% reported 4 to 6 incidents 19% reported 7 or more incidents The most common reason for not telling an adult, cited by half the bullied
participants, was that teens believe they "need to learn to deal with it" 31% reported that they do not tell because they are concerned their parents
might restrict their Internet access 51% report the bullying was done by schoolmates; 43% said by someone they
knew only online; 20% said someone they knew, but who was not from school The most prevalent forms of bullying online and in school involved name-
calling or insults Password theft was the next most common cyberbullying tactic. Also includes:
threats, sending embarrassing pictures, sharing private information, spreading rumors
PD Pandora Internet Safety19
THE THREATS (VII)
“Sexting”The new dangerous, illegal and foolish phenomenon
Definition: the act of teenagers sending naked photos of themselves to significant others, friends, and sometimes just mere casual acquaintances, via cell phone text messaging. These messages are sent, received and forwarded on a daily basis across the nation.
Dangerous:Once that digital image is created, though it may have been intended to live on only a cell phone and shared with only one person, it is inevitable that image will make its way to a computer, the internet, and then the world.
Bottom line: it’s illegal, it’s dangerous… and it’s foolish!
Illegal:In the eyes of the law, sexting = a form of child pornographySeveral states have brought child porn charges upon teenagers who are taking and distributing such pictures
Reputations destroyed Cyberbullying results Reason for suicide
PD Pandora Internet Safety20
THE THREATS (VIII)
“Sexting” Statistics:
Statistics from a 2008 survey of 653 teens (age 13-19) commissioned by The National Campaign to Prevent Teen and Unplanned Pregnancy:
20% of teens (1 in 5) have electronically sent/posted nude or seminude pictures or videos of themselves; breakdown: 22-percent of teen girls, 18-percent of teen boys and 11-percent of ‘young teen girls’ (age 13-16).
39% of teens have sent sexually suggestive messages (text, email, IM) to another (37% of teen girls, 40% of teen boys); 48-percent of teens report having received such messages
71% of teen girls and 67% of teen guys who have sent or posted sexually suggestive content have sent/posted this content to a boyfriend/girlfriend; 21% of teen girls and 39% of teen boys say they have sent such content to someone they wanted to date or “hook up” with.
15% of teens who have sent or posted nude/seminude images of themselves say they have done so to someone they only knew online.
75% of teens and 71% of young adults say sending sexually suggestive content “can have serious negative consequences.” Yet, 39% of teens and 59% of young adults have sent or posted sexually suggestive emails or text messages–and 20% of teens and 33% of young adults have sent/posted nude or semi-nude images of themselves.
38% of teen girls and 39% of teen boys have had sexually suggestive text messages or emails– originally meant for someone else–shared with them; 25% of teen girls and 33% of teen boys say they have had nude or semi-nude images–originally meant for someone else–shared with them.
PD Pandora Internet Safety21
THE THREATS (IX)
P2P - a.k.a. peer-to-peer file sharing:Utilizes a dedicated program that shares files between personal computers over the Internet. This is accomplished through permitted access to each individual computer, usually limited to specified folders. Examples:
BitTorrent Limewire BearShare
Other Internet Activities and Their Associated Threats To Know About
While P2P can be fun, there are many dangers and risks associated:
Viruses, keyloggers and other threats that compromise your PCCopyright infringement for music and movies Files laced with pornography, child pornographyHackers can retrieve personal information
PD Pandora Internet Safety22
THE THREATS (X)
Online Gaming: Huge with teen boys
Portal for bullying and predators Addiction to video games
Gambling: Very easy for a minor to get involved
Serious addiction Occasional cyber-predator
Parental exposure through credit card usage on non-secure, un-trusted sites can lead to ID theft!!!
Other Internet Activities and Their Associated Threats To Know About
PD Pandora Internet Safety23
THE THREATS (XI)
Trust & Misinformation:“You can’t trust everything you read online”
Misinformation can appear in many ways and pose threats on many levels:
Personal opinion can be presented as fact Scam websites sell bogus products Commercial websites use every trick in the
book to get you to buy their product Spoof sites can mislead consumers Hate sites spread malicious information Email hoaxes Phishing scams
Other Internet Activities and Their Associated Threats To Know About
While many of these may not be a threat to your personal safety, intellectual safety and the development of a young mind can be harmed if too much misinformation makes its way through…
PD Pandora Internet Safety24
THE THREATS (XII)
Masquerading as: Social Networking websites (YouTube, Facebook, MySpace)
Auction sites (eBay) Banks (Bank of America, Chase)
Online payment processors (PayPal) IT Administrators (Yahoo, ISPs, corporate)
More on Phishing: Carried out via email and Instant Messenger
Hard to detect Effects range from denial of access to email to substantial financial loss
Usually leads to forms of ID theft ranging from being locked out of your own accounts to fake accounts and ruined credit.
Other Internet Activities and Their Associated Threats To Know About
Phishing & Identity TheftThe criminally fraudulent process of attempting to acquire sensitive information by
masquerading as a trustworthy entity in an electronic communication
PD Pandora Internet Safety25
THE THREATS (XIII)
Plagiarism:Using someone’s work and passing it off as your own
Only takes a few simple clicks Consequences of suspension and expulsion BIG difference between “doing research” and “cutting &
pasting” Teachers and schools need to be more vigilant
in catching and punishing “Paper mills” – Papers written by students
being sold to other students Software available to help detect plagiarism “Google” is a teacher’s best weapon
Other Internet Activities and Their Associated Threats To Know About
PART II: SOLUTIONSPART II: SOLUTIONSWHAT CAN YOU DO?
Educate. Discuss. Protect.
PD Pandora Internet Safety27
EDUCATE
143: _____AISI: _____ASL: _____BF: _____BRB: _____BTW: _____F2F: _____GF: _____IDK: _____IMO: _____INDB: _____IRL: _____ISS: _____JK: _____
K: _____KIT: _____LDR: _____LMIRL: _____LOL: _____M/F: _____N/P: _____NTK: _____OMFG: _____OMG: _____OTP: _____P911: parent alert!PAL: _____PAW: _____
PDA: _____PIR: _____POS: parent over shoulderPPL: _____S2R: _____STFU: _____ROFL: _____THX: _____TTYL: _____TY: _____WT? _____WTG: _____WTGP: _____
Learn about the web and web culture…
95% of parents do not recognize common chat room lingo!
Common Net Language:
PD Pandora Internet Safety28
EDUCATE
143: I love youAISI: as I see itASL: age/sex/locationBF: boyfriendBRB: be right backBTW: by the wayF2F: face to faceGF: girlfriendIDK: I don’t knowIMO: in my opinionINDB: it's no big dealIRL: in real lifeISS: I said soJK: just kidding
K: okayKIT: keep in touchLDR: long distance relationshipLMIRL: let’s meet in real lifeLOL: laughing out loudM/F: male or femaleN/P: no problemNTK: nice to knowOMFG: oh my f***** godOMG: oh my godOTP: on the phoneP911: parent alertPAL: parents are listeningPAW: parents are watching
PDA: public display of affectionPIR: parent(s) in roomPOS: parent(s) over shoulderPPL: peopleS2R: send to receiveSTFU: shut the f*** upROFL: rolling on floor laughingTHX: thanks TTYL: talk to you laterTY: thank youWT? what timeWTG: way to goWTGP: want to go private?
Learn about the web and web culture…
95% of parents do not recognize common chat room lingo!
Common Net Language:
PD Pandora Internet Safety29
EDUCATE (II)
Visit websites and join communities!
Good websites to visit: http://www.cyberbullying.us
http://www.BulliesBeGone.com http://www.StopInternetPredators.org http://www.ProtectChildrenOnline.org http://www.TheCyberHoodWatch.com http://ResponsibleCyberCitizen.com http://www.PluggedInParents.com http://theAlertParent.blogspot.com
http://TeenCheckup.com http://www.WebSafeKid.com
http://www.NetSmartz.org http://www.InternetSafeChildren.com
Learn about the web and web culture…
PD Pandora Internet Safety30
EDUCATE (III)
Learn the LAW!
In [YOUR STATE]:[In this area, please highlight local and state laws and statues for cyberbullying and Internet predator convictions. Keep the information here short and bulleted. You can expand on the information in the script and in your dialogue. We are available to help you with the research if given at least 2 weeks notice from presentation date.]
Cyber Tipline: 1-800-843-5678 (THE LOST) OR www.cybertipline.com
Learn about the web and web culture…
PD Pandora Internet Safety31
EDUCATE (IV)
“I never saw it coming…”
Warning Signs
Your child may be a victim of cyberbullying if he or she… Unexpectedly stops using the computer all together Appears nervous or jumpy when an instant message, text message,
or email appears Appears uneasy about going to school or outside in general Appears to be angry, depressed, or frustrated after using the
computer Avoids discussions about the computer Becomes abnormally withdrawn Exhibits symptoms of depression, insomnia, and lack of appetite Develops unexplained headaches, stomach aches Starts giving excuses to not go to school/increase in absenteeism Has an unexplained drop in grades/sudden lack of interest in school Shows increased avoidance of social events/isolation from peers
Learn about the web and web culture…
PD Pandora Internet Safety32
EDUCATE (V) Learn about the web and web culture…
“I never saw it coming…” (part II)
Warning Signs
What you may notice if your child is in contact with
or a victim of an Internet predator… Spending a large amount of time on-line, especially
late at night, in a secretive manner Pornography on your child's computer Phone calls to/from people (particularly men) you don't
know Mail, gifts, or packages from someone you don't know Turns computer monitor off/ quickly changes screen Frequent deletion of computer “histories” Many new, different “buddies”
PD Pandora Internet Safety33
EDUCATE (VI)
If your child is on MySpace and/or Facebook…
YOU SHOULD BE ON MYSPACE and/or FACEBOOK!!
o 93% of all Americans between 12 and 17 use the Internet o As of 2007, 71% of teenagers had established online
profiles; this number is probably closer to 85%-90% today
Be on the lookout for multiple profiles!
Learn about the web and web culture…
PD Pandora Internet Safety34
Stranger Danger
The Golden Rule: DON’T TALK TO STRANGERS (online)!
Every day is Halloween Never meet online friends in person Ignore harassing or rude comments on
social network profiles; delete any unwanted messages or friends who leave inappropriate comments
Go to mom and dad if uncomfortable or harassment continues
Anonymity
DISCUSS Talk to your kids!!
PD Pandora Internet Safety35
DISCUSS (II)
DON’T REVEAL PERSONAL INFORMATION TO ANYONE
From the mind of a Teenager: A majority of teens (58%) don't think posting photos or
other personal info on social networking sites is unsafe. About half (49%) are not concerned that posting
personal info online might negatively affect their future. Teens readily post personal info online. 64% post photos
or videos of themselves, while more than half (58%) post info about where they live.
Females are far more likely than male teens to post personal photos or videos of themselves (70% vs. 58%).
Talk to your kids!!
PD Pandora Internet Safety36
DISCUSS (III)
Safe Posting TipsThe golden rule: Never post personal information!
Smart and unidentifiable online profilescreen nameGood: firefleye; Bad: LadyBobcat34
Never share passwords with anyone! Only add real-life friends to “friends”
and “buddies” lists Think before posting photos “Good Friend” posting Not your bulletin board Remember: for all the world to see!
Essential Step: Set social network profiles to private!Check the privacy settings of the social networking sites that your children use1. Set the profile so that people can only be added as a friend if you approve
it.2. Set it so that people can only view your child’s profile if you have
approved them as a friend.
Talk to your kids!!
PD Pandora Internet Safety37
DISCUSS (IV)
NO BULLIES!
“play nice on the web” Treat thy neighbor/“friend”/”buddy” as
thyself Explain consequences of bullying
Anonymity = cowardly
Empower your children to stop bullying!www.BeenBulliedOnlineBeenBulliedOnline.com
Talk to your kids!!
PD Pandora Internet Safety38
DISCUSS (V)
Parental Help
Remind your kids: It’s okay to talk to you Reassurance of help and protection, not
punishment Offer comfort and warmth Keep your cool/be the cool-but-firm parent
Talk to your kids!!
PD Pandora Internet Safety39
PROTECT
Two arenas: Physical The PC
www.TheCyberHoodWatchTheCyberHoodWatch
.com
Safeguard your PC and monitor your child’s Internet activity
PD Pandora Internet Safety40
PROTECT (II)
Things you can physically do to safeguard your children:
Get the computer out of the kids’ rooms! Walk/peer in frequently
SET RULES! (Only 23% of parents have computer usage rules!)
Safe computing contract
www.TheCyberHoodWatchTheCyberHoodWatch.com
Safeguard your PC and monitor your child’s Internet activity
PD Pandora Internet Safety41
PROTECT (III)
Titles to consider:
McAfee Trend Micro Kaspersky Webroot BitDefender Spyware Nuker
Key ingredients:• Antivirus• Anti-Spyware• Firewall• Good tech support• Frequent automatic
updates• Email protection• Wireless security• Filtering and parental
controls
Safeguard your PC and monitor your child’s Internet activity
Antivirus and Internet protectionRobust, up-to-date Antivirus and Internet Security
PD Pandora Internet Safety42
PROTECT (IV)
Filters and Parental Controls 53% of parents say they have filtering software on the
computer their child uses at home Windows and Internet Explorer have built in controls
and privacy settings
Set limits on game playing, web browsing, and overall computer use.1. Windows Vista: Control Panel “Parental Controls”
(keep family member accounts separate!)OR
2. Internet Explorer: Tools Menu “Options” Content” tab “Parental Controls”
Remember: Internet Security programs have basic filters and controls
Safeguard your PC and monitor your child’s Internet activity
PD Pandora Internet Safety43
PROTECT (V)
Know where your child goes online and what they do: Only 65% of parents report checking up on their teens after they go online 65% of high school students admit to unsafe, inappropriate, or illegal
activities online 38% of high school students admit to hiding their online activities from their
parents
Reasons to Monitor:In contact with a predator
Victim of a cyberbullyMight be a cyberbully
Addicted to pornography, gamblingIllegal downloading of copyrighted material
Too much time aimlessly browsing, playing gamesSexting
MONITOR YOUR CHILD’S INTERNET ACTIVITY
PD Pandora Internet Safety44
PROTECT (VI)
Consider this: 83% of parents say there is no excuse for
not knowing enough about the Internet to protect your kids or teens.
88% of parents think it's more important to know what their kids are doing online than to respect their kids' privacy.
Yet only 45% of parents have monitoring software that records what users do online.
MONITOR YOUR CHILD’S INTERNET ACTIVITY
You can’t be over their shoulder and with them 100% of the time
“Trust but verify”
PD Pandora Internet Safety45
PROTECT (VII)
Monitoring Software: Gives the extra parental edge Verifies activity No reason for you to not know 21st century parenting Tell your kids you are monitoring Your house, your computer, your rules! BIG difference between “spying” and being a responsible parent Look for threats, not for gossip
PC Pandora monitoring softwarePC Pandora monitoring software can and does: Record snapshots of screen content
Logs: IM chats, emails, files traded, websites visited, programs used, webcam activity, Internet search queries
Feature parental controls (web filters and program blocks) Email updates of activity
MONITOR YOUR CHILD’S INTERNET ACTIVITY
PD Pandora Internet Safety46
A SHORT SUMMARY& REVIEWStep 1: Educate
Know the web Know the hang-outs Understand the
lingo Learn about social
networking Recognize threats Know the law
Step 3: Protect Powerful Internet security and protection
Computer in an open area Frequent check-ups
Activate parental controls and filters Monitoring software (PC PandoraPC Pandora)
Step 2: Discuss “Stranger danger” Don’t share personal info Safe screen names and
secure passwords Be a responsible “cyber
citizen” Problem? See: Mom and
Dad
Closing Remarks & Questions
THANK YOU FOR COMING!
www.TheCyberHoodWatchTheCyberHoodWatch.comSpecial discount code: “cyberhoodcyberhood”
Don’t forget to take home your ParentPacket!
www.TheCyberHoodWatchTheCyberHoodWatch.com
special discount code: “cyberhoodcyberhood”
PD Pandora Internet Safety48