E-Safety Safe use of the Internet & technologies.

40
e-Safety Safe use of the Internet & technologies

Transcript of E-Safety Safe use of the Internet & technologies.

Page 1: E-Safety Safe use of the Internet & technologies.

e-SafetySafe use of the Internet & technologies

Page 2: E-Safety Safe use of the Internet & technologies.

Objectives of this presentationRaise awareness about:

a) The nature of the risks

b) How you can help children remain safe

Page 3: E-Safety Safe use of the Internet & technologies.
Page 4: E-Safety Safe use of the Internet & technologies.
Page 5: E-Safety Safe use of the Internet & technologies.
Page 6: E-Safety Safe use of the Internet & technologies.
Page 7: E-Safety Safe use of the Internet & technologies.
Page 8: E-Safety Safe use of the Internet & technologies.

• Spot the risk!

• Make a safe choice!

What can you do ?

Page 9: E-Safety Safe use of the Internet & technologies.

• Help your child identify the risks and adopt safer behaviours.

• In the same way as you do with: water, electricity, roads, railways, etc

What can you do ?

Page 10: E-Safety Safe use of the Internet & technologies.

Nature of the risks

Do you know what your children are doing online ?

DoYouKnow?

Page 11: E-Safety Safe use of the Internet & technologies.

Developed by the EUKids Online project: Hasenbrink, Livingstone, Haddon, Kirwil and Ponte, 2007

Nature of the risks

Page 12: E-Safety Safe use of the Internet & technologies.

• Would you let your children watch TV late at night?

• Would you let your children watch films rated 18?

Why not?

Content of Games

Page 13: E-Safety Safe use of the Internet & technologies.

Taking Drugs

Sexism

Guns

Violence

Killing

War Theft

Murder

Torture

Prostitution

Zombies

MonstersSwearing Racis

m

Content of Games

Knifing

BAD STUFF

Rape

Page 14: E-Safety Safe use of the Internet & technologies.

Content of GamesPEGI labels appear on front & back of the packaging.

They provide a reliable indication of the suitability of the game contents.

Page 15: E-Safety Safe use of the Internet & technologies.

PEGI 18The adult classification is applied when the level of violence reaches a stage where it becomes a depiction of gross violence and/or includes elements of specific types of violence. Gross violence is the most difficult to define since it can be very subjective in many cases, but in general terms it can be classed as the depictions of violence that would make the viewer feel a sense of revulsion.

PEGI 16This rating is applied once the depiction of violence and / or sexual activity reaches a stage that looks the same as would be expected in real life. More extreme bad language, the concept of the use of tobacco and drugs and the depiction of criminal activities can be content of games that are rated 16.

Content of Games

Page 16: E-Safety Safe use of the Internet & technologies.

Developed by the EUKids Online project: Hasenbrink, Livingstone, Haddon, Kirwil and Ponte, 2007

Nature of the risks

BAD STUFF

Page 17: E-Safety Safe use of the Internet & technologies.

Suffered in silence

Page 18: E-Safety Safe use of the Internet & technologies.

Suffered in silence

Page 19: E-Safety Safe use of the Internet & technologies.

• Do not suffer in silence• Don’t reply / respond• BLOCK• KEEP the evidence• TELL someone• REPORT it• GET HELP!!

What should victims do?

Page 20: E-Safety Safe use of the Internet & technologies.

Developed by the EUKids Online project: Hasenbrink, Livingstone, Haddon, Kirwil and Ponte, 2007

Nature of the risks

Page 21: E-Safety Safe use of the Internet & technologies.

Social Networking

Page 22: E-Safety Safe use of the Internet & technologies.
Page 23: E-Safety Safe use of the Internet & technologies.

• Adopt identity of a young person / Build trust• Conversations of sexual nature / flirting• View / Share sexual images / video• Gathering information: hobbies, locations /

movements, email, phone, • Suggest to meet / go to a place• Threats to extort more extreme material (or worse)

Online predators start as friends and then gain influence & control. :

Online Grooming Behaviour

BAD STUFF

Page 24: E-Safety Safe use of the Internet & technologies.

• Pretended he was a young person.

• Chatted to young children over long periods of time (sometimes years!)

• Gained their trust and arranged to meet children as young as 11.

Page 25: E-Safety Safe use of the Internet & technologies.
Page 26: E-Safety Safe use of the Internet & technologies.
Page 27: E-Safety Safe use of the Internet & technologies.

• Real name• Home Address • Email address• Phone numbers• Location• Photos / Video / Webcam• Places frequented: School (photo of uniform)

• Friends’ details

What’s the problem?

Becky / Consequences? (TIME?)

Page 28: E-Safety Safe use of the Internet & technologies.
Page 29: E-Safety Safe use of the Internet & technologies.

Risks of Location Services

Page 30: E-Safety Safe use of the Internet & technologies.
Page 31: E-Safety Safe use of the Internet & technologies.

What’s wrong with putting this photo online?

Page 32: E-Safety Safe use of the Internet & technologies.

• Target for street robbery• Share location unwittingly• Take & share photos / videos of self

What’s the risk?

Page 33: E-Safety Safe use of the Internet & technologies.

• Take images / video on a Smartphone

• Sent to friend• Shared on Internet• Stolen from social network

sites

No control over images

ALL images / video can be captured (Webcam / Skype)

Page 34: E-Safety Safe use of the Internet & technologies.

• Risk cannot be totally eradicated• “As safe as possible, for as many as possible,

for as much of the time as possible”• We don’t want to stop children from using

the internet; we want them to know the risks and make safe choices.

The nature of online risks?

Page 35: E-Safety Safe use of the Internet & technologies.

Guidance for Parents

ChildNet ~ “Know it All”

Page 36: E-Safety Safe use of the Internet & technologies.

Thinkuknow.co.uk

Page 37: E-Safety Safe use of the Internet & technologies.
Page 38: E-Safety Safe use of the Internet & technologies.
Page 39: E-Safety Safe use of the Internet & technologies.

G = Ground rules What is OK / not OKWhat information should kept private

O = Online Safety Keep Antivirus & Spyware software up to dateOther security protection

L = LocationKeep computer in a busy areaNot in the bedroom

D = Dialogue Talk with your children Learn from each other

GOLDEN RULES

GOLD

Page 40: E-Safety Safe use of the Internet & technologies.

?

Good LuckAny Questions