integrity computer concepts, internet safety. spring 2014

59
Integrity Computer Concepts Help! I’m the parent of a tech-savvy kid! Tech safety for parents

Upload: scott-burnett

Post on 26-Jun-2015

499 views

Category:

Internet


2 download

DESCRIPTION

Internet safety for parents Spring 2014 Uploaded and shared by Integrity Computer Concepts You may freely distribute and share this presentation with friends, neighbors and family. Scott Burnett 949-689-5078

TRANSCRIPT

Page 1: Integrity Computer Concepts, Internet Safety. Spring 2014

Integrity Computer Concepts

Help! I’m the parent of a tech-savvy kid! Tech safety for parents

Page 2: Integrity Computer Concepts, Internet Safety. Spring 2014

HELP!!

Page 3: Integrity Computer Concepts, Internet Safety. Spring 2014

The Burnetts

Page 4: Integrity Computer Concepts, Internet Safety. Spring 2014

What are we going to learn today?

Part 1 “WHAT”• What kids are doing online• Where technology is going• What to look for

Part 2 “HOW”• Practical filters• Monitoring applications• Common sense rules to put into place at

home

Q & A

Page 5: Integrity Computer Concepts, Internet Safety. Spring 2014

Current Statistics• Teens spend about 5 hours a day online

• 15% have met up in person somebody they met online

• 17% have hacked into a friends social media account or email

• 25% of teens have cheated on a test using a mobile phone

• 32% have accessed pornography online (purposely)

• Only 50% of kids have parental controls on their computers

• 70% of teens hide their online behavior from parents

• Parents MUST stay in the know. We can not give up!

Page 6: Integrity Computer Concepts, Internet Safety. Spring 2014

Part 1What in the world are my kids doing

online?

Page 7: Integrity Computer Concepts, Internet Safety. Spring 2014

Social Networking

Page 8: Integrity Computer Concepts, Internet Safety. Spring 2014

Social Networking

3 Rules for Social Networking

• Know the platform• Follow your child• Know their password

Page 9: Integrity Computer Concepts, Internet Safety. Spring 2014

Social Networking

Instagram

• Turn off public sharing• Turn off GPS tagging• Talk about what they are posting• Follow their Instagram feed

Page 10: Integrity Computer Concepts, Internet Safety. Spring 2014

Social Networking

Facebook and Twitter

Page 11: Integrity Computer Concepts, Internet Safety. Spring 2014

Social Networking

Vine

• 6 seconds of looping video• Owned by Twitter• Easy to post & find porn on Vine

Page 12: Integrity Computer Concepts, Internet Safety. Spring 2014

Social Networking

Social Media Clean up!•Talk to your child

•Google their name•Review all their profiles

•Help them remove unused profiles•Don’t forget the blogs…

Page 13: Integrity Computer Concepts, Internet Safety. Spring 2014

Pornography

• 1 in 9 websites online are pornographic

• Put a filter program on ANY computer that your child will use.

Page 14: Integrity Computer Concepts, Internet Safety. Spring 2014

Pornography

• Family Computer• Laptop• Cell phone• iPad / Tablet• Game console• Friends house

• Put a filter program on ANY device that your child will use, especially when they are young.

Page 15: Integrity Computer Concepts, Internet Safety. Spring 2014

Pornography

• The average child accidentally stumbles onto pornographic website by age 12

• The time for the “new” pornography talk is BEFORE this happens, not after..

Page 16: Integrity Computer Concepts, Internet Safety. Spring 2014

Anonymity

Secret

Whisper

Page 17: Integrity Computer Concepts, Internet Safety. Spring 2014

Yik Yak

• 4 months old (March 2014)• Mostly east coast & Southern CA• 400,000 users• Cross / Twitter and SnapChat• Designed for college students• Completely anonymous• Share with 100 up to 10,000• a VIRTUAL bathroom wall

Page 18: Integrity Computer Concepts, Internet Safety. Spring 2014

Online Predators

Secrecy is the predators greatest weapon

Communication is a parentsgreatest defense.

Page 19: Integrity Computer Concepts, Internet Safety. Spring 2014

Online Predators

2 questions predators always ask

1) Where is your computer?2) Are you alone?

Page 20: Integrity Computer Concepts, Internet Safety. Spring 2014

Online Predators

Catfishingsomeone who pretends to be someone they're not using Facebook or

other social media to create false identities, particularly to pursue deceptive online romances.

SextortionWhen a person uses guilt, power, or knowledge of certain secrecy, to

force another person into having sex or performing sexual favors. 

Page 21: Integrity Computer Concepts, Internet Safety. Spring 2014

Cyber Bullying

Page 22: Integrity Computer Concepts, Internet Safety. Spring 2014

Cyber Bullying

Rebecca Ann Sedwick12 Years old. Died from suicide 8/10/13

Page 23: Integrity Computer Concepts, Internet Safety. Spring 2014

Cyber Bullying

Page 24: Integrity Computer Concepts, Internet Safety. Spring 2014

Danger! Beware!

Completely Anonymous

Page 25: Integrity Computer Concepts, Internet Safety. Spring 2014

Cyber Bullying1) Ask the tough uncomfortable questions!

Ask “What if…” questions.

2) Keep the laptop and cell phone out of the bedroom for as long as possible.

3) Look for the signs of bullying. Depression, excessive sleeping, complains of headaches / stomach aches.

4) Remove apps that are commonly used for bullying.

5) Look at your kids texts. Monitor their apps.

Page 26: Integrity Computer Concepts, Internet Safety. Spring 2014

Cyber Bullying

Page 27: Integrity Computer Concepts, Internet Safety. Spring 2014

Sexting

Definition…

Sending of sexually explicit photos or text through one’s mobile phone to friends or suitors.

Page 28: Integrity Computer Concepts, Internet Safety. Spring 2014

Sexting

Page 29: Integrity Computer Concepts, Internet Safety. Spring 2014

Hook up Apps

Tinder, Blendr, Grindr, Skout, and Swoon

Page 30: Integrity Computer Concepts, Internet Safety. Spring 2014

Hook up Apps

Down

Pure

Page 31: Integrity Computer Concepts, Internet Safety. Spring 2014

We are the first generation of parents that

have had to deal with the new phenomenon!

Colleges and employers are

looking!

Page 32: Integrity Computer Concepts, Internet Safety. Spring 2014

Part 2How do I keep my kids

safe from the ever changing world of

technology!?!

Page 33: Integrity Computer Concepts, Internet Safety. Spring 2014

Virus – Malware - Phishing

Page 34: Integrity Computer Concepts, Internet Safety. Spring 2014

Virus – Malware - Phishing

KidZui

Page 35: Integrity Computer Concepts, Internet Safety. Spring 2014
Page 36: Integrity Computer Concepts, Internet Safety. Spring 2014

Passwords

Page 37: Integrity Computer Concepts, Internet Safety. Spring 2014

The most common problem

Location….Location….Location…

Page 38: Integrity Computer Concepts, Internet Safety. Spring 2014

Cell phones at night…

Page 39: Integrity Computer Concepts, Internet Safety. Spring 2014

Cell phones at night…

Zip Mini

thejoyfactory.comKeyword: integrity

Page 40: Integrity Computer Concepts, Internet Safety. Spring 2014

Cell phones at night…

Scott’s low cost budget version…..

The iBasket

Page 41: Integrity Computer Concepts, Internet Safety. Spring 2014

Contracts!

• Cell phone contract• www.iccguru.com/cellphonecontract.doc

• Computer Contract• www.iccguru.com/computercontract.doc

Page 42: Integrity Computer Concepts, Internet Safety. Spring 2014

Software you can use to keep your

kids safe

Page 43: Integrity Computer Concepts, Internet Safety. Spring 2014

Google and YouTube

• Google’s “Safe Search”

Page 44: Integrity Computer Concepts, Internet Safety. Spring 2014

Google and YouTube

• YouTube’s “Safety Mode”

Page 45: Integrity Computer Concepts, Internet Safety. Spring 2014

Web

Filte

r SA

FE O

NLIN

E

TO KEEP YOUR FAMILY

Page 46: Integrity Computer Concepts, Internet Safety. Spring 2014

Web

Filte

r SA

FE O

NLIN

E

TO KEEP YOUR FAMILY

Virtual Parent SoftwareHelps Supervise child's online activities

Page 47: Integrity Computer Concepts, Internet Safety. Spring 2014

Wh

ole

hou

seW

eb

Filte

r

SA

FE O

NLIN

E

TO KEEP YOUR FAMILY

Page 48: Integrity Computer Concepts, Internet Safety. Spring 2014

Mon

itori

ng

S

oft

ware

SA

FE O

NLIN

E

TO KEEP YOUR FAMILY

Page 49: Integrity Computer Concepts, Internet Safety. Spring 2014

iPad

SA

FE O

NLIN

E

TO KEEP YOUR FAMILY

Page 50: Integrity Computer Concepts, Internet Safety. Spring 2014

Set

up

iO

S

restr

icti

on

s

SA

FE O

NLIN

E

TO KEEP YOUR FAMILY

Page 51: Integrity Computer Concepts, Internet Safety. Spring 2014

Text

Messag

e M

on

itori

ng

SA

FE O

NLIN

E

TO KEEP YOUR FAMILY

Page 52: Integrity Computer Concepts, Internet Safety. Spring 2014

Text

Messag

e M

on

itori

ng

SA

FE O

NLIN

E

TO KEEP YOUR FAMILY

Page 53: Integrity Computer Concepts, Internet Safety. Spring 2014

Cell P

hon

e locati

on

SA

FE O

NLIN

E

TO KEEP YOUR FAMILY

Page 54: Integrity Computer Concepts, Internet Safety. Spring 2014

Cell P

hon

e p

are

nta

l C

on

trol

SA

FE O

NLIN

E

TO KEEP YOUR FAMILY

• Set internet usage rules• Disable ALL internet on phone• See list of currently installed apps• See internet usage per app• Weekly reports, emailed• http://curbi.com/c/iccguru

Page 55: Integrity Computer Concepts, Internet Safety. Spring 2014

An

dro

id C

ell P

hon

es

SA

FE O

NLIN

E

TO KEEP YOUR FAMILY

Page 56: Integrity Computer Concepts, Internet Safety. Spring 2014

SA

FE O

NLIN

E

TO KEEP YOUR FAMILY

Cell P

hon

e

Carr

iers

Page 57: Integrity Computer Concepts, Internet Safety. Spring 2014

Scott’s Final Tips

1)Educate yourselves on social

media whenever possible

2)Know the log-ins of all your

children's accounts

3) Remove technology at bedtime

4)Talk about consequences of social

media

5)Consider some monitoring

software

Page 58: Integrity Computer Concepts, Internet Safety. Spring 2014

Connect with your KIDS

Page 59: Integrity Computer Concepts, Internet Safety. Spring 2014