Instant Messaging Risks - Georgia`s CyberSafety Site
Download
Report
Transcript Instant Messaging Risks - Georgia`s CyberSafety Site
Technologies
Information and Communication
Browsing
When a computer has a connection to the
Internet, the user can view what is on the
Internet through a software program called
a browser
Microsoft's Internet Explorer
Netscape's Navigator
Mozzila's Firefox
Opera
Browsing
WebSite
Directory (Folder) of files usually on one
computer called a web server
Web server gives other computers on the
Internet permission to access that folder of
files
Browsing
Browser assembles the various files that
are used to create one Web page and
displays that page to the user
Links on pages
go to other pages
in this site
or
on other sites
Browsing
Following the links from one Web page to
another is called browsing or surfing
Browsing
Risks:
Inappropriate information
Forms to be completed…should not give
information
Typo squatting (www.microsofy.com) or
domain name confusion
(www.whitehouse.com) can lead to wrong sites
Cell Phones
Mobile phone
Many features that go far beyond the ability
to make a phone call
text messaging, voice mail, games, email
access, scheduling, and image generation
(camera phone)
Cell Phones
Risks
Risks of accessing the Internet on the phone
are the same as accessing the Internet on a
computer
parental (and school) supervision significantly
more difficult
Predators
Cyberbullies
Use of a cell phone while driving
Cell Phones
Risks with camera phones
Inappropriate images taken with camera
phones
Cheating
Online Chat
Is similar to a conference call
typed rather than spoken
Now can be spoken using voice over and can be
viewed with a cam
conducted through a computer which is
connected to the Internet
Online Chat
Individuals are listed on the right side of
the screen
May just be watching and not chatting
The name can be clicked upon as a link to
their profile
Online Chat
Most chat rooms have feature where two
individuals can leave the main chat and
conduct a private chat
Online Chat
Risks
Social cues are absent
Never really know with whom you are chatting
Rich hunting ground for online predators
Unhealthy set of online relationships and
withdrawal into a fantasy world
Vulgar language and sexually explicit images
and discussions
Subject matter that is not healthy or
appropriate
Email
Electronic mail (email)
sending of a text file from one piece of
equipment (PC, laptop, PDA, or cell phone) to
another
Located on your computer
Outlook using Earthlink
Or may be web based
Hotmail or Gmail
Email
Mailbox (i.e. Outlook, Hotmail inbox, etc.)
Write and send email
Goes to a mail server (post office)
The mail server sends it to the recipient’s mail
server
Their mail server keeps
When they check their email, their server
delivers it to them
They may open it and read it, read it later,
or just delete it.
Email
Risks
Emails can be spoofed
Emails are used to obtain information (scams
and hoaxes, phishing)
Computer virus are sent in emails
Predators will use email to contact their
potential victims
Students use email for cyberbullying
Email addresses can be collected from
forwarded emails
Instant Messaging
Known as IM
Is a text-based form of communication
Extremely popular with kids
Instant Messenger
•
•
•
•
Free
Easy to get
Easy to use
Students enjoy this
communication
Instant Messenger Preferences
Instant Messaging
Often vowels are deleted changing 'text'
into 'txt' and 'this' into 'ths'.
Apostrophes or dashes are removed as
well.
Words are replaced with numbers or
symbols, changing 'date' into 'd8' and
'forgive' into '4giv'.
Acronyms are also a short cut.
Instant Messaging
If you restrict your instant messaging to
people that you really know, in person,
there should be no danger (unless you
know a dangerous person)
Instant Messaging
Risks
Speaking to stranger
Disclosing private information
Exposure to vulgar language and sexually
explicit images and discussions
Cyberbullying
Instant messaging programs will alert one user
if another ‘buddy’ is online
Instant Messenger
Web Cam Settings
How Someone is Found
Search Results
Online Journals
Diaries that are exposed to the entire world
“Blogs”
Online Journals
Risks
Disinhibition
Disclosure of personal information
Predators
Online Journals
The User Name
is a link
to their Journal.
Other
personal data
is on here.
Other
users’ journals:
Friends and
Friend of section.
Online Community
Members
can belong
to groups
like this
one members
from a
certain city.
Online Community
The group
lists its
members
and others
interested
in this
group.
This
community
lists 178
links to
pages
associated
with the
particular
city.
This is a service that is very popular at the high school and middle school level.
Live Journal Latest Posts
Xanga
There are other
sites that offer
web hosting,
journals and
communities.
This is a
popular site
used by teens
in Georgia.
thefacebook.com
[thefacebook] is
popular with
college
students, but is
beginning to be
seen at the high
school level.
Peer to Peer
P2P
Program that allows that computer to
communicate directly with other computers
that have the same program installed
Allows direct real-time exchange of files
chat, audio, video, images, software, and
games
Peer to Peer
Aimster
KaZaa
Audio Galaxy
Limewire
Bearshare
Mactella
Gnutella
Napster
Gnucleus
Morpheus
Grokster
SwapNut
iMesh
WinMX
Peer to Peer
Risks
Viruses
Illegal copies
music, movies, software, and child pornography
and possibly distribution charges of the same
Copyright violations are being pursued by
various industries
legal notification – see Talking to Your Children
About Downloading Music - A Parents Guide
http://www.wiredsafety.org/law/copyrights/riaa/do
wnloadingmusic_parryguide.html