Instant Messaging Risks - Georgia`s CyberSafety Site

Download Report

Transcript Instant Messaging Risks - Georgia`s CyberSafety Site

Technologies
Information and Communication
Browsing
 When a computer has a connection to the
Internet, the user can view what is on the
Internet through a software program called
a browser




Microsoft's Internet Explorer
Netscape's Navigator
Mozzila's Firefox
Opera
Browsing
 WebSite
 Directory (Folder) of files usually on one
computer called a web server
 Web server gives other computers on the
Internet permission to access that folder of
files
Browsing
 Browser assembles the various files that
are used to create one Web page and
displays that page to the user
Links on pages
go to other pages
in this site
or
on other sites
Browsing
 Following the links from one Web page to
another is called browsing or surfing
Browsing
 Risks:
 Inappropriate information
 Forms to be completed…should not give
information
 Typo squatting (www.microsofy.com) or
domain name confusion
(www.whitehouse.com) can lead to wrong sites
Cell Phones
 Mobile phone
 Many features that go far beyond the ability
to make a phone call
 text messaging, voice mail, games, email
access, scheduling, and image generation
(camera phone)
Cell Phones
 Risks
 Risks of accessing the Internet on the phone
are the same as accessing the Internet on a
computer
 parental (and school) supervision significantly
more difficult
 Predators
 Cyberbullies
 Use of a cell phone while driving
Cell Phones
 Risks with camera phones
 Inappropriate images taken with camera
phones
 Cheating
Online Chat
 Is similar to a conference call
 typed rather than spoken
 Now can be spoken using voice over and can be
viewed with a cam
 conducted through a computer which is
connected to the Internet
Online Chat
 Individuals are listed on the right side of
the screen
 May just be watching and not chatting
 The name can be clicked upon as a link to
their profile
Online Chat
 Most chat rooms have feature where two
individuals can leave the main chat and
conduct a private chat
Online Chat
 Risks
Social cues are absent
Never really know with whom you are chatting
Rich hunting ground for online predators
Unhealthy set of online relationships and
withdrawal into a fantasy world
 Vulgar language and sexually explicit images
and discussions
 Subject matter that is not healthy or
appropriate




Email
 Electronic mail (email)
 sending of a text file from one piece of
equipment (PC, laptop, PDA, or cell phone) to
another
 Located on your computer
 Outlook using Earthlink
 Or may be web based
 Hotmail or Gmail
Email
 Mailbox (i.e. Outlook, Hotmail inbox, etc.)
 Write and send email
 Goes to a mail server (post office)
 The mail server sends it to the recipient’s mail
server
 Their mail server keeps
 When they check their email, their server
delivers it to them
 They may open it and read it, read it later,
or just delete it.
Email
 Risks
 Emails can be spoofed
 Emails are used to obtain information (scams
and hoaxes, phishing)
 Computer virus are sent in emails
 Predators will use email to contact their
potential victims
 Students use email for cyberbullying
 Email addresses can be collected from
forwarded emails
Instant Messaging
 Known as IM
 Is a text-based form of communication
 Extremely popular with kids
Instant Messenger
•
•
•
•
Free
Easy to get
Easy to use
Students enjoy this
communication
Instant Messenger Preferences
Instant Messaging
 Often vowels are deleted changing 'text'
into 'txt' and 'this' into 'ths'.
 Apostrophes or dashes are removed as
well.
 Words are replaced with numbers or
symbols, changing 'date' into 'd8' and
'forgive' into '4giv'.
 Acronyms are also a short cut.
Instant Messaging
 If you restrict your instant messaging to
people that you really know, in person,
there should be no danger (unless you
know a dangerous person)
Instant Messaging
 Risks
 Speaking to stranger
 Disclosing private information
 Exposure to vulgar language and sexually
explicit images and discussions
 Cyberbullying
 Instant messaging programs will alert one user
if another ‘buddy’ is online
Instant Messenger
Web Cam Settings
How Someone is Found
Search Results
Online Journals
 Diaries that are exposed to the entire world
 “Blogs”
Online Journals
 Risks
 Disinhibition
 Disclosure of personal information
 Predators
Online Journals
The User Name
is a link
to their Journal.
Other
personal data
is on here.
Other
users’ journals:
Friends and
Friend of section.
Online Community
Members
can belong
to groups
like this
one members
from a
certain city.
Online Community
The group
lists its
members
and others
interested
in this
group.
This
community
lists 178
links to
pages
associated
with the
particular
city.
This is a service that is very popular at the high school and middle school level.
Live Journal Latest Posts
Xanga
There are other
sites that offer
web hosting,
journals and
communities.
This is a
popular site
used by teens
in Georgia.
thefacebook.com
[thefacebook] is
popular with
college
students, but is
beginning to be
seen at the high
school level.
Peer to Peer
 P2P
 Program that allows that computer to
communicate directly with other computers
that have the same program installed
 Allows direct real-time exchange of files
 chat, audio, video, images, software, and
games
Peer to Peer
 Aimster
 KaZaa
 Audio Galaxy
 Limewire
 Bearshare
 Mactella
 Gnutella
 Napster
 Gnucleus
 Morpheus
 Grokster
 SwapNut
 iMesh
 WinMX
Peer to Peer
 Risks
 Viruses
 Illegal copies
 music, movies, software, and child pornography
and possibly distribution charges of the same
 Copyright violations are being pursued by
various industries
 legal notification – see Talking to Your Children
About Downloading Music - A Parents Guide
http://www.wiredsafety.org/law/copyrights/riaa/do
wnloadingmusic_parryguide.html