Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Decoding the Digital Underground

No description
by

Anne Mattingly

on 14 September 2016

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Decoding the Digital Underground

Teens and Technology
What every parent should know.
Digital Footprint
Digital Footprint - data left behind by technology users.
Including (but not limited to):
Social Network Posts/Pictures
- can also be images in which person is "tagged" by someone else.
Comments
left on other sites.
Videos
such as Youtube and Vimeo.
To a limited extent,
cell phone towers
.
How a Digital Footprint can Help
LinkedIN
- Use professional social networks to build a professional presence.
Twitter
- Connect with professional and other individuals with similar interests.
Showcase talents
and make a name for oneself.
Example - Justin Bieber
Other examples: Comedians, Athletes, etc.
A Digital Footprint can also be Harmful
Harmful posts on
social networks
.
Pictures
- whether uploaded by you or someone else.
Emails
- they can be leaked.
Students should think of their digital footprint as their personal "brand."
What is Cyberbullying?
Using electronic communication to bully a person.
Sending messages to frighten or threaten someone.
Spreading rumors and hearsay with the purpose of damaging the victim's reputation.
Impersonating someone by creating a fake profile or website in order to torment a person or damage his/her reputation.
Text messaging to torment the victim.
Posting embarrassing photos or videos of victim.
Unlike face-to-face bullying, cyberbullying makes the victim feel like there is no safe place.
Consequences of Cyberbullying
Victims are at greater risk for:
Depression
Anxiety
Stress
Suicide
Cyberbullies can be subject to:
School discipline
Civil lawsuits
Criminal charges
Cyberbullies do not actually see the emotional consequences of their actions like face-to-face bullies do.
Source: Cyberbullying.us
A parent's role in protecting children against cyberbullying:
Students usually hesitate to tell parents because they fear they will make things worse.
Contact school so faculty can keep an eye out.
Parents' actions should escalate as the threat and hurt to the child does.
http://stopcyberbullying.org/prevention/parents_role.html
Kik, Poof
- A free texting service in which the message history is not logged in the phone.
Whisper, Secret
- teens can post secrets anonymously and chat with users in their geographic area.
Snapchat
- Users send pictures to other users that supposedly are only available for a specific period of time, but this limitation can be circumvented.
YikYak
- A completely anonymous messaging services designed to allow users to chat with strangers in their geographic area.
ChatRoulette, Omegle
- Similar to YikYak, but these apps allow users to video chat with strangers.
Tinder, Down, Skout, Pure, Blender
- Users post pictures and scroll through other users' images. They can "flag" the image of users they find attractive. Primarily used for hooking up.
Hide App
- Does just what it says. Hides other apps you have installed on your phone. Other apps do this as well.
Phone apps to watch out for:
Featured App: Omegle
Advertised Purpose: Chat with strangers. Free!
My own experimenting with Omegle:
Featured App: Whisper
Purpose: Anonymously post your secrets to people in your geographic area.
Navigating Whisper
By clicking the menu in the upper right and selecting "Me" you can see all the user's whispers.
Featured App: Snapchat
Purpose: Send photos that will disappear after a programmed time allotment.
Circumventing Snapchat
Screenshot the image so you can keep it.

WAIT! There's more...
Featured App: Skout
Skout
The Deep Web
Only an onion browser can access the deep web.
While surfing the Deep web, beware of the following:
Silk Road - the black market of the Deep Web.
What is the best way to see which apps are installed on a device?
If a phone is rooted, a user can hide certain apps that have been installed.
BUT...
Google Play Store: Checking what has been installed
Notice the two separate accounts.
Itunes App Store: Checking which apps have been installed:
Other tools provided by mobile carriers:
Verizon Family Base

Sprint Control

AT&T Smart Limits

T Mobile Allowance
Each of these services allows parents total control over the device including:
Hours of day the data plan is turned on (texting) and which numbers can be reached with it.
Hours of the day device can make/receive calls and to which numbers.
How many apps do you recognize?
Harassment:
(a) A person commits an offense if, with intent to harass , annoy, alarm, abuse, torment, or embarrass another, the person:
(1) initiates communication and in the course of the communication makes a comment, request, suggestion, or proposal that is obscene;
(2) threatens, in a manner reasonably likely to alarm the person receiving the threat, to inflict bodily injury on the person or to commit a felony against the person, a member of the person's family or household, or the person's property;
(7) sends repeated electronic communications in a manner reasonably likely to harass , annoy, alarm, abuse, torment, embarrass, or offend another.
(b) In this section:
(1) "Electronic communication" means a transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic, or photo-optical system. The term includes:
(A) a communication initiated by electronic mail, instant message, network call, or facsimile machine; and
(B) a communication made to a pager.
Online Impersonation:
Sec. 33.07. ONLINE IMPERSONATION . (a) A person commits an offense if the person, without obtaining the other person's consent and with the intent to harm, defraud, intimidate, or threaten any person, uses the name or persona of another person to:
1) create a web page on a commercial social networking site or other Internet website; or
(2) post or send one or more messages on or through a commercial social networking site or other Internet website, other than on or through an electronic mail program or message board program.
(b) A person commits an offense if the person sends an electronic mail, instant message, text message, or similar communication that references a name, domain address, phone number, or other item of identifying information belonging to any person:

(1) without obtaining the other person's consent;
(2) with the intent to cause a recipient of the communication to reasonably believe that the other person authorized or transmitted the communication; and
(3) with the intent to harm or defraud any person.
More about the Deep Web:
http://insights.mcafeeinstitute.com/investigation-tips/the-ultimate-guide-to-the-deep-web-for-law-enforcement-professionals/
http://securityaffairs.co/wordpress/8719/cyber-crime/the-good-and-the-bad-of-the-deep-web.html
Anne Mattingly
Instructional Technology Specialist
Stony Point High School
anne_mattingly@roundrockisd.org
512-428-7106
Examples of digital footprint being harmful:
Featured App: YouNow
Teens broadcast themselves in real time
while other users can chat about the broadcast.
Full transcript