Notes for Netsafe Presentation

Slide 1

Ask the following questions:

  1. How many of you have access to the Internet at home?
  2. How many of you have a cell phone?
  3. How many of you had a cell phone five years ago, ten years ago?

Technology has changed dramatically just in the last 5-10 years.

Ask, how many of you knew what the term “texting” meant 10 years ago?

Kids and adults are communicating today in ways that they have never communicated ever before.

This presentation will help you learn how to be a good digital citizen with today’s technologies.

We’re going to start off with a video clip of a teen-age boy who has met a girl online and decides that he wants to meet her in real life. Let’s see what happens!

Slide 2

Video 1: Predator video clip by Trevor at American Fork JHS, Alpine SD, for iSafe.org (4 minutes)

Video Clip available from my.uen.org44685, Netsafe Utah, Netsafe presentation & files, Predator (mp4 video file requires quicktime)

Options: Try an internet search and show a story about internet predators from a news site.

Slide 3

These are some of the technologies that are being used today by kids and adults.

Most phones and computers have cameras built-in.

Although most iPods and mp3 players are not connected to the Internet, they are connected indirectly via a cord to iTunes or other music software.

The challenge with online games is that they are 24/7. Someone is always online.

Slide 4

One message that I would like to leave is that there are benefits of the Internet. Too often the Internet has the connotation for only being bad. [Review bulleted items]

Slide 5

It is interesting that the benefits are also the dangers of the Internet. [Review bulleted items]

Slide 6

Here are some of the potential risks that anyone who gets on the Internet is exposed to.

Has anyone ever got a virus on their home computer?

Do you know how you got it?

How?

Has anyone heard of LimeWire, KaZaa, or Bearshare?

These are software apps that enable persons to download “free” music, videos, software, etc.

Often, along with downloading this free software you can easily download viruses, trojan horses, worms, or spyware (malware)

Slide 7

I would like to take a moment to look at the profile of a teenager. This will help us to understand why teens are more vulnerable than adults to the dangers on the Internet. The teen-age years is that timeframe between being a child and becoming an adult. This is that maturation phase where teens are growing up. [Review Profile of a Teenager] It can be a challenging time.

This next video clip is a good example of how teens are vulnerable.

Slide 8

Video 2: Chatroom Exchange (60 seconds)

After the video ask “Does she know what she is doing? Pause for answer. Does he know what he is doing? Pause for answer.

Slide 9

Video 3: Julie’s Journey (about five minutes)

This next video shows how a teen is vulnerable. As you look at this clip think of the “Profile of a Teenager.”

Questions that can be asked afterwards:

-- So how many of you girls would like to run away with a 56 year old man?

-- Julie knew how old he was so why did she run away with Tom?

-- What did Tom provide Julie that she probably did not get at home? (Love, attention)

-- How much time did Julie spend on the Internet each day? (3-6 hours)

-- Is that a lot of time?

-We need to be careful about how much time we spend on the Internet.

-- Did Tom really care about Julie?

-Julie probably felt like running away would solve her problems. Did it?

Slide 10

Next topic is cell phones.

Slide 11

Video 4: Pioneer Library Emedia Netsafe Video--search for cell phone. About 5 minutes.

After the clip I ask, “What should you do if someone sends you an inappropriate picture?”

Answer: Report it. Don’t delete it to save the evidence.

Next question, “So what happens if you don’t delete it?”

Answer: You are in possession of child pornography, which is a crime.

Slide 12

Review as needed. Search for local news story about teen charged

Slide 13

Review if you feel the need. You may skip through this slide.

Slide 14

The better question might be, “where can you not find pornography?” It is pervasive. It can be found in most places on the Internet.

Review the reasons listed above.

There is research that shows pornography more addictive than cocaine. People using it lose relationships, including boyfriend-girlfriend, brother-sister, friends, husband-wife, etc.

The longer someone is into pornography, the longer it takes to get out of it. Often it requires getting professional help.

It can affect anyone regardless of ethnicity, gender (however, generally males more than females), religion; socioeconomics (how much money one makes), occupation, etc. People have been fired from their jobs because of it.

Slide 15

Declan McCullagh, “Police blotter: Teens prosecuted for racy photos”, CNET News. February 9, 2007, viewed October 27, 2009,

[Beforehand find out what the cell phone policy is at this school]

Ask the question, “So what’s the cell phone policy at this school?”

Audience participation. Call on someone to answer.

Slide 16

A teenager can take a picture in the privacy of his or her own home and it can be criminal.

In essence, this person is both the perpetrator (person taking the picture) and the victim.

These types of pictures can also be used to cyber-bully others.

And, you don’t want to post these types of pictures.

This next video clip focuses on the message, think before you post.

Slide 17

Review points.

If someone sends you a nasty e-mail and you respond in like manner, now you have also become a cyber-bully.

If it escalates to the point where someone is feeling threatened for his/her life, then it can become criminal.

Slide 18

Video 5: Bulletin Board: 60 seconds

Slide 19

Video 6: Never safe from a Bully. 45 seconds. Sometimes I skip this depending on time.

Slide 20

Main message of this video clip are these three points. Re-emphasize.

Slide 21

So what else can you do?

Take 5

Stand up for others.

Slide 22

Most schools already have a bullying policy which is basically that persons should not threaten or harass others.

Slide 23

Video 7: Broken Friendship. This is a three minute video about giving personal password to others. This may be skipped depending on time.

Slide 24

These points come from an expert, Linda Criddle, on bullying.

Slide 25

Video 8: Cyber Bully 30 seconds Pioneer Library Emedia Netsafe Video--search for bully.

Slide 26

•Be careful what you text or email.

•Words hurt.

Slide 27

Video 9: Words Hurt 30 seconds.

Slide 28

Remind audience how these reasons are closely tied to the “Profile of a Teenager”

Slide 29

See for notes on these rules.

Use Caution—read before you click, verify the identity of the cite, is it to good to be true.

Slide 30

Anyone on the Internet can easily print photos or text or save images and videos to a computer.

Slide 31

•Provided by Sgt. Frank Kardasz

MySpace Profile: “Danny”

Slide 32

This is Danny’s myspace web page. Focus on Danny’s age and what is in the box. Who would like to go watch a movie with Danny?

Slide 33

Quickly review page. Read text in box.

Slide 34

Quickly review page. Read text in box.

Slide 35

So where else can we find Danny? Looks like Danny forgot to put this information on his myspace page.

Slide 36

Danny’s real age is 32. Anyone can put whatever age or whatever else on a web page.

Slide 37

Does anyone know what the term “phishing” spelled with a “ph” means?

What does it mean? (Audience participation)

Elaborate as needed.

The picture shown here in the lower right-hand corner of the screen is a good image of what phishing is all about. It is someone on the Internet trying to get you to bite on some bait. Of course, fish like worms. What do teenagers like?

Audience participation. Call on persons to share.

Some examples include money, electronics such as free iPods and laptops, food, etc.

Has anyone ever see a web page that says “You are the 1 millionth person to visit this web page. Click on the button and claim your prize. What does it ask for? Your personal information.

Slide 38

Here’s an example of a phishing attempt via e-mail. “SunTrust” could represent any bank. The bottom line is that it is asking for your personal information (e.g., name, address, e-mail, phone, ssn, etc.)

What’s interesting is that banks won’t ever ask you in an e-mail to submit your bank account, pin, or similar type of information. If you have a concern, then you initiate the contact, but don’t click on the link provided in the e-mail.

Slide 39

Here’s another example of a phishing expedition with ebay. Again, these companies won’t ask you for sensitive information.

Slide 40

Another example about getting a refund from the IRS. If you look closely at the URL, it even looks suspicious. Would you want to click on this link?

Slide 41

Here’s a phishing example of someone telling you that you can earn $50.00 if you just answer five questions. Does it sound like it is too good to be true? It probably is.

Slide 42

Conclude with these points.

Slide 43

Comments and Questions