Upload
emmeline-mccarthy
View
212
Download
1
Embed Size (px)
Citation preview
Digital Safety Evening
2015 - 2016
Wellfield High SchoolInspire – Challenge – Achieve - Nurture
Anything that is in the world when you're born is normal and ordinary and is just a natural part of the way the world works. Anything that's invented between when you're fifteen and thirty-five is new and exciting and revolutionary and you can probably get a career in it. Anything invented after you're thirty-five is against the natural order of things!
Douglas Adams
Douglas Noel Adams was an English writer. Adams is best known as the author of The Hitchhiker's Guide.
• Living in a connected world • The school curriculum • Child Sexual Exploitation – online grooming• Snapchat• The growth of cyber crime • Family Online Safety Practices• Working together/ Support
The Focus of this session:
Living in a connected world
How we can be found and how we are connected
Big data
Living in a connected world
Time of day Where you are What device
you’re using Your previous
visits Weather Events
30% of London banks request online
profiles for graduate roles
Imagine your child applied, what would their profile look like in a few years time?
Checking applicants
• Profiles on candidates• Negative comments about employers and brands.( in pupil
terms – what they currently write about their friends and school.)
• Bullying or harassment.• Appropriate use of language.• The nature of imagery posted. ( what kind of images do
our young people currently post?)• Consistency of factual information across multiple sites.
Your conduct past and present
Global audience
Digital profile
Key issues-The rise of big data-The rise of data analysis-Digital records of our actions globally communicated
Key actions-Actively manage profiles-Protect accounts-Understand that the internet has an audience of 3,000,000,000+ people-Understand that it may be impossible to change something once it is online-Understand data loses its context online
School Curriculum
In BICT and Computing all of Key Stage 3 cover Digital Safety, covering topics to help your child stay safe online. Here are just a list of some of the topics;PasswordsPrivacyDigital footprintsSextingGroomingMalwareOnline GamingCryptography/EncryptionCyberbullying
Topics are looked at in assemblies and in discussion with form tutors .
In designated PSHE sessions digital safety is covered. There are many digital safety information posters around the school and a copy of these is in every child’s planner.
We hold special “event” days which also cover digital safety aspects.
Child Sexual ExploitationBeing groomed online is just a small part of this topic
Grooming is when someone builds an emotional connection with a child to gain their trust for the purposes of sexual abuse or exploitation.
Children and young people can be groomed online or in the real world, by a stranger or by someone they know - for example a family member, friend or professional.
Groomers may be male or female. They could be any age.
Many children and young people don't understand that they have been groomed, or that what has happened is abuse
Grooming happens both online and in person.
Groomers will hide their true intentions and may spend a long time gaining a child's trust. They may also try to gain the trust of the whole family so they can be alone with the child.Groomers do this by:pretending to be someone they are not, for example saying they are the same age onlineoffering advice or understandingbuying giftsgiving the child attentionusing their professional position or reputationtaking them on trips, outings or holidays.
Child sexual abuse online
Online groomingGroomers can use social media sites, instant messaging apps including teen dating apps, or online gaming platforms to connect with a young person or child.They can spend time learning about a young person’s interests from their online profiles and then use this knowledge to help them build up a relationship.It’s easy for groomers to hide their identity online - they may pretend to be a child and then chat and become ‘friends’ with children they are targeting.Groomers may look for:usernames or comments that are flirtatious or have a sexual meaningpublic comments that suggest a child has low self-esteem or is vulnerable.Groomers don’t always target a particular child. Sometimes they will send messages to hundreds of young people and wait to see who responds.Groomers no longer need to meet children in real life to abuse them. Increasingly, groomers are sexually exploiting their victims by persuading them to take part in online sexual activity.
Child sexual abuse online
When sexual exploitation happens online, young people may be persuaded, or forced, to:
send or post sexually explicit images of themselvestake part in sexual activities via a webcam or smartphonehave sexual conversations by text or online
Abusers may threaten to send images, video or copies of conversations to the young person's friends and family unless they take part in other sexual activity.
Images or videos may continue to be shared long after the sexual abuse has stopped.
Child sexual abuse online
How common is grooming?We don't know how common grooming is because often children don't tell anyone what is happening to them.Children may not speak out because they are:ashamedfeeling guiltyunaware that they're being abusedbelieve they are in a relationship with a ‘boyfriend’ or ‘girlfriend’.
Child sexual abuse online
NSPCC Website - www.nspcc.org.uk
What is big data?
The IoT is helping todrive big data.
What is big data and why do young people need to know about it?
So what is Snapchat?
What’s Special about Snapchat?
You can only look at a photo you’ve received for up to ten seconds
Snapchat statisticsLaunched in September 2011Over 100 million people use Snapchat every month16.5 million people use it daily400 million ‘snaps’ are sent every day 71% of Snapchatters are under 25 years old
Be aware about Snapchat
Cybercrime
• Doubled in 2014• Victim ages from 13 to 87
£388,000,000,000 a year3x NHS budget
1,000,000 people a dayIdentity stolen every 3 secondsOnly 5% solved
“Every two minutes someone in Britain loses money to cyber crime”
3 x cyber crime > crime
Most at risk
Young people (75% have or will be a victim)
What is cybercrime?
Scams
PhishingMalware
Identity theft
Bullying
Breaking copyright
Who is a cyber criminal?
• Runs attacks on computers• Steals and then sells your information
• Tries your details on other accounts• Uses your account to try to trick friends &
family into downloading malware• Steals money from your accounts• Sets up more accounts in your name
Your accounts
Social network
Credit card
Of all your passwords
and accounts,
which is the most
valuable to a hacker?
Hacked value
1. E-mail2. Social
network3. Credit card
• Tries your details on other accounts• Uses your account to try to trick friends &family into downloading malware• Steals money from your accounts• Sets up more accounts in your name
Getting access
You’ve set a good password, no one else knows it.
How safe is your account?
Getting access
- Compromise security of the site- Research about you- Use a stolen phone, tablet or
computer- Virus- Trick details from a user
link
Removing malware
• Very difficult• Research using an uninfected machine• Use a reputable company e.g. Norton• Be wary of scareware• Keep a backup of important files
– USB drive– External hard drive– DVD
What should you do?
Take care of your digital securityKeep accounts secureKeep software up to dateTalk about issues and report problemsThink carefully about what you keep onlineTreat unexpected messages with suspicionBe very wary of linksLook out for unusual activity
Report It
Practical steps
• Talk about issues and provide guidance• Ensure when phones are setup that access controls are
enabled• Research apps and their use• Talk about the danger of ‘free’ options• Have computers, consoles & other devices in a visible
location• Set boundaries
– Amount of use– Hours of use– Type of use
• Know which devices are internet enabled
Good resources
CEOPhttp://ceop.police.uk/safety-centre/ https://www.thinkuknow.co.uk/
Safety centres–Google–Facebook
Safe searchhttp://www.safesearchkids.com/
Key messages
• Dangers cannot be totally avoided
• Up to date education and communication are key
• Technology will continue to change
• We can help grow healthy attitudes & good habits
Stay informed
Girl, 12, raped by man she met on Facebook who pretended to be 13-year-old, disabled in Disney accident.
Girl, 15, missing after going to hotel with man she met online.
Daniel Perry: 'Suicide Over Web Blackmail’'
A teenager has been sentenced to life in prison for the murder of a 14-year-old boy he met through online gaming.
Frightening Facts
Cyber Bullying• Don’t be associated in group chats, remove yourself from it,
don’t like it!• - Don't reply to any nasty messages you receive.
- Keep the messages that you have been sent so you can show someone. - Don't answer any calls from a withheld number, or from a number you don't know. - If it gets really bad, you could change your number.- If you change your number, only give out your new number to close friends.- If the problem is serious, tell the police or call ChildLine for free on 0800 1111 .- Don’t keep it to yourself or try to deal with it alone. - Tell an adult you can trust.
Who do I tell?
What should I do?
Where do I go?
Is it right?
Can I be asked that?If I tell anyone will it be kept confidential?
Working Together
• As parents we all have a duty to protect our children and keep them safe.
• Put in parental controls. On the APP store type in “parental controls” and there will be many to choose from.
• You can limit the hours used, track history, prevent children fromaccessing particular material incl, age
inappropriate material.
Support
• There are many websites that offer support – police, childline, phone companies.
• There are helpline numbers in your child’s planner.
• Talk to school.
• Work with technology – you need to keep your child safe.