Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Cyber Safety

No description
by

Ben Storie

on 9 October 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Cyber Safety

Cyber Safety in a Digital World
by Ben Storie, LPC LADAC
Preferred Counseling
(479)709-9880
108 N. 18th Street
Fort Smith, AR 72901
ben@preferredcounseling.net
Ben Storie, LPC
Kik Msgr
Blendr
Grindr
Pornography
Skype
Is there really a need for cyber safety?
The average age of exposure to pornography is less than 11 years old. (Net Nanny)
43% of teens age 13-17 report that they have experienced some sort of cyberbullying in the past year. (Harris Interactive Trends & Tudes, 2007)
One million children were harassed, threatened or subjected to other forms of cyberbullying on Facebook during the past year. (Consumer Reports, 2011)
Only 1/3 of households with Internet access are actively protecting their children with filtering or blocking software. (2006 report from the National Center for Missing and Exploited Children)
In 82% of online sex crimes against minors, the offender used the victim's social networking site to gain information about the victim's likes and dislikes. (Journal of Adolescent Health 47, 2010)
1 in 5 US teenagers who regularly log on to the internet say they have received an unwanted sexual solicitation via the web. (Crimes Against Children Research Center)
In a 2010 national survey, over 25% of 16 - 17-year-olds said they were exposed to nudity online when they did not want to see it.
Video and image searches
Private Browsing modes
User Agreement permits nudity
Adult-themed pinboards
Has built in browser
No user agreement to restrict porn
Large amount of adult material
Content submitted and shared by users
Users submit 6 second videos
Not all content is appropriate for younger users
Amateur porn is posted by users
Restricts "gratuitous" nudity
Porn companies post teaser videos
No guarantee of safe content
Sexting
Sales and rentals of adult DVDs fell 30% in 2005 and 2006; sales of Internet-based porn, while still growing, have started to plateau, according to Adult Video News, an industry trade publication - ABC News Article in 2007
Mainstream porn companies are worried about the rise
of amateur porn... the real change in pornography is the
number of people who are doing it for no payment at all.
- Daily Mail Article 2013
Users remain anonymous
Texting app
Photos, videos exchanged
Skout
Snapchat
Vine
Omegle
Geosocial Networking apps
Uses GPS function in phones, tablets
Connects users in close proximity
Many are used to exchange photos
Users send photos, videos
Illusion of secrecy
Similar to Wickr
Users upload 6-second nude/semi-nude video loops
Random video and/or text chatting w/strangers
Shock-value is often the goal
Video chats can be recorded
Similiar to Chatroulette
Pinterest
Tumblr
Vine
YouTube
Online Predators
Kik Msgr
Twitter
Facebook
Instagram
Minecraft
World of Warcraft
[A] gruesome practice [predators engage in] is using social media to collect potentially embarrassing information about a teen, whether personal information or sexting images, and then using extortion techniques to force the child to share more contact or risk exposure. Across the country, there have been too many cases of teenagers falling victim to these predators and continuing to share more and more sexual communications for fear of their secrets being revealed. - Risa Ferman, Huffington Post 2013
Anonymity disguises predators
Teens/Tweens think they are communicating with a peer
Predators pose as teens in order to 'friend' minors
65% of online sex offenders used victim's social networking site to gain home & school info about the victim
Online multi-player game where players can meet/play with other random players across the globe
If they can't chat live in the game, they can Skype with other users while they play
Predators can create a child's profile and portray themselves as teens/tweens
Cyberbullying
More girls are cyberbullies than boys (59% girls and 41% boys). - Teen Online & Wireless Safety Survey: Cyberbullying, Sexting and Parental Controls, 2009
Ask.fm
Kik Messenger
SnapChat
Twitter
Facebook
Instagram
Harassing, embarrassing photos can be sent
Photos, videos, msgs delete
Similar to Wickr
Allows group messaging
Group members can mock a victim excluded from group
Anonymous feature allows bullies to create fake profile and pretend to befriend victim
#1 cyber-bullying medium is Facebook
Sharing inappropriate pictures of someone, posing as someone else to spread rumors or lies, or sending harassing messages.
Users post questions for others to answer
Answers can be anonymous - allows bullies to post cruel responses
Allows many users to post cruel responses, gang up on victim
How do I protect my child?
Internet Filters
netnanny.com
www1.k9webprotection.com
bsecure.com
Monitoring & Accountability
My Mobile Watchdog
iRecovery Stick
BrickHouse Spy Stick
Mobile Carriers
ALSO NOTE:
Restrict "Private Mode", "InPrivate Browsing", etc.
Stay Involved
Keep computers, tablets, smart phones, etc. out of bedrooms and in main living areas of the home
Deuteronomy 11:18-21
Fix these words of mine in your hearts and minds; tie them as symbols on your hands and bind them on your foreheads. Teach them to your children, talking about them when you sit at home and when you walk along the road, when you lie down and when you get up. Write them on the doorframes of your houses and on your gates, so that your days and the days of your children may be many in the land the Lord swore to give your ancestors, as many as the days that the heavens are above the earth.
Philippians 4:8
Finally, brothers and sisters, whatever is true, whatever is noble, whatever is right, whatever is pure, whatever is lovely, whatever is admirable—if anything is excellent or praiseworthy—think about such things.
83% of boys, 57% of girls have seen group sex on the Internet.
39% of boys and 23% of girls have seen online sex acts involving bondage.
32% of boys and 18% of girls have viewed beastiality online.
15% of boys and 9% of girls have seen child pornography.

Only 3% of boys and 17% of girls will not see Internet pornography before the age of 18.
"The Nature and Dynamics of Internet Pornography Exposure for Youth," by Chiara Sabina, Janis Wolak, and David Finkelhor (from Cyber Psychology & Behavior, 2008)
Twitter
Facebook
Instagram
Social Networking apps can bypass smartphone and tablet filters
Most contain some form of browser
Porn companies and performers have profiles that link to their web sites
Instagram contains pornography
Search Engines
Browsers
Private browsing modes
Search history can be cleared
Cached pages can sometimes bypass filter
Messages
Data can be retrieved even after deleted
Teens can be charged with possession/distribution of child porn
Blogs
Risk of sharing too much info online and being vulnerable
Risk of being harrassed
opendns.com
covenanteyes.com
x3watch.com
Anti-Bullying Protection
Bully Button
GoGoStat Parental Guidance
Yik Yak
Anonymous posts by users
Limited accountability
Students using to bully

Whisper
Whispers are often sexual in nature.
Content can be dark.
Whisper topics include insecurity, depression, substance abuse, and various lies told to employers and teachers.
Although it's anonymous to start, the app encourages users to exchange personal information in the "Meet Up" section.
Naive users can disclose information that makes them vulnerable to bullying

Hide It Pro
Has a hidden design on phone as "Audio Manager"
Can hide texts, photos, videos, files, call logs
Other similar apps include: Vaulty, Personal, App Lock
Talk to your children - they need quality AND quantity time from you
Have ongoing age-appropriate conversations about pornography, sexuality and bullying
Respect the user terms of the sites and apps
Review, use and experience their apps and games with them
Respect your child's privacy in an age-appropriate manner AND AS THEY EARN IT
Maggie
Eva
The Storie House
Full transcript