Parent Child Agreement by fbu21507


More Info
Your Child’s
Cyber World
Our thanks to:
 James Baird, CISSP with GBI
 Osborne Middle School Technology Team
Enter Your Child’s Cyber World
Enter Your Child’s Cyber World
  LOL = Laughing Out Loud
  F2T = Free To Talk
  LV = Leave
  H8 = Hate
  WAN2 = Want to?
  POS = Parent Over Shoulder
  PAW = Parents Are Watching
  WTGP = Want To Go Private
  WYGOWM = Will You Go Out With Me?

                                      See Packet
Characteristics of Some Youth
 May Facilitate Victimization
Lack of emotional maturity
Strong desire for attention, validation, and
Naturally curious about sex, ―forbidden‖
May be rebellious and enjoy defying authority
Easily impressed, manipulated and
Youth lacking adult supervision
 Students’ Basic Online Behavior
80% of students spend at least one hour per week on the
11% of students spend over 8 hours per week on the
12% of students say they spend more time on the Internet
than with friends
30% of students say e-mail, chat rooms, or Instant
Messaging is the main way they stay in contact with their
38% of students feel more free to do what they want on the
31% of students say it is easier to talk with people on the
Internet than in real life
29% of students use chat rooms, with a peak usage of 45%
occurring in grade 7
Based on i-SAFE America surveys of 19,000 students
                      The Parent-Child Gap
                   PARENTS                         vs.                     YOUTH
92% stated they had established rules for the      vs.   35% said that they did not have rules for
child’s Internet use.                                    Internet usage.
                                                         54% acknowledged that there was a need
                                                         for more rules.
54% feel they are limited to monitor and           vs.   53% stated that they would prefer to be
shelter children from inappropriate material             alone when surfing the Internet.
on the Internet.
90% feel they have a good idea of what their       vs.   14% stated their parents had no idea where
child does while on the Internet.                        they go and 34% said they do not share
                                                         what they do or where they go on the
                                                         Internet with parents.
11% said their child’s computer was in the         vs.   21.5% of the students said that the
child’s room. 75% said it is in the family area.         computer they use most often is in their
                                                         This goes up with age, 26% for 8th grade
                                                         and 31% for 12th grade.
46% feel they have more freedom on the             vs.   37% felt they have more freedom and, 18%
Internet than in the real world.                         felt safer on the Internet than in the real
                                                         When asked ―why?‖ 52% cited anonymity &
                                                         29% mentioned lack of laws/rules.
                   *Taken from an i-SAFE America survey of students nationwide.
   Internet Predator Profile
Typically married adult with children
Normal neighbor
Usually has a successful career in an
upper-management position
College graduate, possibly post-graduate
Upper, middle-class lifestyle
Usually 35 or older
Usually white
Will offend again
Students’ Risky Online Behavior
55% of students admit giving their personal information
(name, sex, age, etc.) over the Internet
52% of students prefer to be alone while on the Internet
40% of students have visited inappropriate places on
the Internet
10% of students feel it is okay to post their picture on
the Internet
10% of students have met someone face-to-face that
they previously met on the Internet
25% of students believe there is nothing wrong with
chatting to strangers online
21% of students say after getting to know someone
better on the Internet, they would believe them when
they tell their age
          "Tracking Teresa"
 Even though Teresa has tried not to reveal
 personal information online, she’s left
 enough clues that she could find herself in
 Chat Rooms – Virtual Parks
No longer the guy with the trench coat waiting to
kidnap the child
Can sit anywhere and talk to several children at
one time at different locations
Used to gain child’s trust and set up sexual
Used to send pornographic images
They will send the child porn, getting more
explicit each time
They will try to convince the child that everybody
is doing this and that it is normal
           Chat Rooms
Predators often snoop around child
chat rooms for potential victims.
They use various methods to get
close to children but even if a child is
not receptive to the predators
advances, he can still harass and
endanger the child by searching for
information about the child.
Countermeasures for Predators
Use parental controls (if available)
Monitor child’s actions on the internet
Discuss appropriate internet activities
Purchase NetNanny ($40) or similar
Caution children about predators
Limit the time child spends on a computer.
Use software that creates a log of sites visited and every
keystroke that is made on the computer.
Randomly check emails on child’s account
Move the computer into a family area
             The internet is not a babysitter.
    More Countermeasures
Discuss Internet crime and safety issues with
your family
Discuss with other family members expectations
with use of the computer.
Sign an agreement between parents and
children that outlines expectations and the
amount of time allowed on the computer per day
or week.
Include in agreement who can be contacted or
talked with on the computer.
If family member receives an email that offends
you or them, contact your Internet Provider and
complain about the message being received.
  Cyber-bullying is Coming to a
   School Near You if it hasn’t
Concerns include:
 Cyber-bullying can be much more
 damaging psychologically and much more
 It creates a barrier between the bully and
 the victim. This can allow someone who
 normally wouldn't be a bully to become
 one because there is no face to face
It is difficult to catch the cyber-bully. When
identified, the suspect’s defense is often that
it was someone else impersonating them
using their password.
Camera phones are making cyber-bullying
more creative. Taking someone’s picture and
then manipulating it, then posting it on a web
site or in e-mail. Imagine getting an e-mail of a
nude individual with your face attached to it,
and you’re only a teenager.
Many think this behavior is a joke and not as
serious as bullying face to face.
Victims are often targeted because they
are considered different — usually
those considered overweight, small,
with a learning disability or overly
Many face dirty digital tricks that range
from derogatory comments about them
online to embarrassing e-mail
attributed to them intended to insult
friends and crushes.
    Cyber Bullying Statistics
42% of kids have been bullied while
online. 1 in 4 have had it happen more
than once.
35% of kids have been threatened
online. Nearly 1 in 5 have had it
happen more than once.
21% of kids have received mean or
threatening e-mail or other messages.

Based on 2004 i-SAFE survey of 1,500 students grades 4-8
  Cyber Bullying Statistics
53% of kids admit having said something
mean or hurtful to another person online.
More than 1 in 3 have done it more than
58% of kids admit someone has said
mean or hurtful things to them online.
More than 4 out of 10 say it has
happened more than once.
58% have not told their parents or an
adult about something mean or hurtful
that happened to them online.
          Popular Blog Site
Blog Sites
   Parents Must Be Aware
Many kids do not want to report this
problem to their parents for fear of how
their parents may react.
They fear their parents will take away
their cell phone, computer, or Internet
Obviously this solution will stop the
messages, but then the child feels
harassed by the bully and punished by
the parents when the equipment is
Signs That a Child Might Be At
        Risk On-line
Spends large amounts of time on-line, especially at night
Find pornography on child's computer
Child receives phone calls from unknown men or is
making calls, sometimes long distance, to unfamiliar
Child receives mail, gifts, or packages from unfamiliar
Child turns the computer monitor off or quickly changes
the screen on the monitor when you come into the room
Child becomes withdrawn from the family
Child is using an on-line account belonging to someone
     Cyber Bullying Tips
Tell a trusted adult about the
bullying, and keep telling until the
adult takes action.
Don’t open or read messages by
cyber bullies.
Tell your school if it is school
related. Schools have a bullying
solution in place.
     Cyber Bullying Tips
Don’t erase the messages—they may
be needed to take action.
Protect yourself—never agree to meet
with the person or with anyone you
meet online.
If bullied through chat or instant
messaging, the ―bully‖ can often be
If you are threatened with harm,
inform the local police.
   What Can Parents Do?
Establish a bond of trust and open
communication with their child.
Place / keep computer(s) with Internet
access in an open, commonly used
Learn about the new technologies
Commend your child for reporting
cyber issues
Parent and Child Internet Agreement
        What Can Parents Do?

Cybersitter relies on an extensive, frequently updated
database of sites and word patterns. By default, Cybersitter
blocks content related to sex, drugs, hate, and violence, as
well as blocking all image searches. But parents can select
from 32 content categories—including cults, gambling, filter
Cybersitter offers a good stealth mode, letting parents file
and monitor kids' activities e-mail their knowledge.
sharing, wrestling, and freewithout sites—to tailor the filter to
their needs.can record both are applied sessions, as well as
Cybersitter These settings sides of IM to Web browsing, e-
mail, instant messaging, and newsgroups. information
log all sites visited and any violations. This Or you can can
simply block all instant messaging, newsgroups, FTP
then be automatically e-mailed to you in a daily activity
report. and file sharing. .
Have you googled yourself?
Search your name, email address,
telephone number, home address
Search children’s, spouse, relatives
It may be possible to remove
unwanted information from some sites
    What Can Schools Do?
GCPS/Chattahoochee Elementary School
GCPS Firewall
Blocked Sites and Procedures
Acceptable Use Policies
– Both Students and Staff
Supervision of Computer Labs
– Teachers, Parent Volunteers, Tech Staff
Technology Orientation
– Both Students and Staff
Counselor Programs
     Enter Your Child’s Cyber World
1.    Tracy Parrish – Enter Your Child’s Cyber
     – Internet Safety Quiz for Adults
     – Presentation: Enter Your Child’s Cyber
          Information complied by Osborne Middle School
2.    Additional Tools
      Handouts
      Web Resources
      Parent/Student Contracts
3.    Question & Answer
              Sites of Interest
Georgia State Computer Crimes Task Force Educators Sub-
NetNanny Internet Filter:
SpyBot privacy cleaner:
Ad-Aware privacy cleaner:
GATech InfoSec Law Library:
Free Antivirus:

To top