SlideShare a Scribd company logo
Safe Internet usage for children (Ages 5-12) By Luke Harrison (Formative task as part of Assignment 3 submission)
Safe internet usage? Since the internet has been available to the public there have always been concerns with its safe usage for all users specifically young children and the elderly There are several methods in place to allow this, however I will cover the top ten otherwise this presentation could be 100+ slides. I will specifically look at safe internet usage for children but some can apply to all internet users
Rule 1 Make sure your firewall is switched  ON To navigate to your firewall go to  START >> CONTROL PANEL >> WINDOWS FIREWALL And ensure on is selected (See below)
Rule 2 Ensure you have anti-virus software installed There are hundreds out there the easiest to use, install and is free is AVG Don’t forget to perform daily updates and weekly scans for viruses
Rule 3 Ensure you have internet security installed There are hundreds out there some come just as the interne security but most come in a packages with antivirus software e.g. AVG mentioned on the previous slide.
Rule 4 Ensure you have parental controls set up In Internet Explorer simply select  Tools >> Internet options >> Content >> Enable Then simply set up your options, the window is shown below.
Rule 5 Ensure you have parental control software installed and set up Just like antivirus software there are hundreds out there and most are free For example there is Freeshield shown below
Rule 6 Nothings better than physically observing the child If they know the parent is there and watching them 99% of the time they will not attempt to go to any websites they shouldn’t plus if the parent is there then they can also help them if problems arise.
Rule 7 Set rules and limits to the children’s internet use This can be limits to internet use, time frames when they are allowed to use it. Ideally when the parent is available
Rule 8 Pop-ups These are unwanted advertisements which may distract the young user to another website with seedy marketing gimmicks, they may even contain explicit content. To prevent against these ensure internet explorer has pop-up blocker turned on, it should look like the image below.
Rule 9 Ask what websites your child is going to go on With software like “Spector Pro” you can log to see if they have been truthful and are going onto suitable websites and typing suitable text
Rule 10 Find out what children their age should be going on Then simply influence (not force) your child to go on those websites. The child will feel better for going on websites the have been allowed and asked to go on Although children cannot be completely trusted because of their immature curiosity and so software at rule 9 can help monitor this.

More Related Content

PPTX
Webinar Worst-Case Scenario Survival Training
PPTX
5 Simple Hacks to Boost Your e-safety Score
PDF
Awesome Tips for Data Security
PDF
Problem Exists Between Photoshop and Chair
PPT
Ass3 Formativ
PDF
Free followers on twitter
PPT
The use of safe assign for marking students' projects
PPTX
Lean startup part iii
Webinar Worst-Case Scenario Survival Training
5 Simple Hacks to Boost Your e-safety Score
Awesome Tips for Data Security
Problem Exists Between Photoshop and Chair
Ass3 Formativ
Free followers on twitter
The use of safe assign for marking students' projects
Lean startup part iii

What's hot (14)

PDF
Eliminate Dregol.com
PPTX
Top 10 Tactics for Leveraging Behavioral Science to Enhance Member Engagement
PPTX
Picking Nits - Making Sure Your Content Is Great
PPTX
Building Success from Failure: The story of failing often and fast
PDF
Quick & Dirty Tips for : Better PowerPoint Presentations Faster
PPT
Marc Recommendations For Parents
PDF
Five Apps You Should Download Today
DOCX
Instagram Private Profile Viewer: PrivateInsta.
PPT
Some Pm Proverbs
PPT
Online safety
KEY
Simulating Real World Attack
PDF
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
PPTX
4 Step guide to bypassing the school’s internet and unblocking Instagram
DOCX
Risk assessment
Eliminate Dregol.com
Top 10 Tactics for Leveraging Behavioral Science to Enhance Member Engagement
Picking Nits - Making Sure Your Content Is Great
Building Success from Failure: The story of failing often and fast
Quick & Dirty Tips for : Better PowerPoint Presentations Faster
Marc Recommendations For Parents
Five Apps You Should Download Today
Instagram Private Profile Viewer: PrivateInsta.
Some Pm Proverbs
Online safety
Simulating Real World Attack
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
4 Step guide to bypassing the school’s internet and unblocking Instagram
Risk assessment
Ad

Similar to Communications Technology For Social Spaces Assignment 3 Formative (20)

PPT
Formative Task - Safe Internet Usage
PPT
Formative
PPT
Safe Internet Usage
PPT
Internet Safety
PPT
Ctss Safe Internet For Kids
PPT
Internet Safety
PPT
Internet Safety
PPT
Safe Surfing for your Kids
PPT
E safety-parent-workshop
PPTX
Internet safety for kids
PPT
Assignment 3 Formative Task
PPT
Presentation1 updates 2
PPT
Presentation1 updates 2
PPT
Internetsafety
DOCX
Internet Use for Third & Fourth Graders
PPT
10 Rules To Keep Your Child Safe
PPT
10 Rules To Keep Your Child Safe
PPTX
Safety in cyberspace
KEY
Internet Safety For Parents
PPT
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
Formative Task - Safe Internet Usage
Formative
Safe Internet Usage
Internet Safety
Ctss Safe Internet For Kids
Internet Safety
Internet Safety
Safe Surfing for your Kids
E safety-parent-workshop
Internet safety for kids
Assignment 3 Formative Task
Presentation1 updates 2
Presentation1 updates 2
Internetsafety
Internet Use for Third & Fourth Graders
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe
Safety in cyberspace
Internet Safety For Parents
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
Ad

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPT
Teaching material agriculture food technology
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Approach and Philosophy of On baking technology
PPTX
sap open course for s4hana steps from ECC to s4
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Spectroscopy.pptx food analysis technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
Unlocking AI with Model Context Protocol (MCP)
Understanding_Digital_Forensics_Presentation.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Teaching material agriculture food technology
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Per capita expenditure prediction using model stacking based on satellite ima...
Digital-Transformation-Roadmap-for-Companies.pptx
Spectral efficient network and resource selection model in 5G networks
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Approach and Philosophy of On baking technology
sap open course for s4hana steps from ECC to s4
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Programs and apps: productivity, graphics, security and other tools
Spectroscopy.pptx food analysis technology
Advanced methodologies resolving dimensionality complications for autism neur...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
The AUB Centre for AI in Media Proposal.docx
MIND Revenue Release Quarter 2 2025 Press Release

Communications Technology For Social Spaces Assignment 3 Formative

  • 1. Safe Internet usage for children (Ages 5-12) By Luke Harrison (Formative task as part of Assignment 3 submission)
  • 2. Safe internet usage? Since the internet has been available to the public there have always been concerns with its safe usage for all users specifically young children and the elderly There are several methods in place to allow this, however I will cover the top ten otherwise this presentation could be 100+ slides. I will specifically look at safe internet usage for children but some can apply to all internet users
  • 3. Rule 1 Make sure your firewall is switched ON To navigate to your firewall go to START >> CONTROL PANEL >> WINDOWS FIREWALL And ensure on is selected (See below)
  • 4. Rule 2 Ensure you have anti-virus software installed There are hundreds out there the easiest to use, install and is free is AVG Don’t forget to perform daily updates and weekly scans for viruses
  • 5. Rule 3 Ensure you have internet security installed There are hundreds out there some come just as the interne security but most come in a packages with antivirus software e.g. AVG mentioned on the previous slide.
  • 6. Rule 4 Ensure you have parental controls set up In Internet Explorer simply select Tools >> Internet options >> Content >> Enable Then simply set up your options, the window is shown below.
  • 7. Rule 5 Ensure you have parental control software installed and set up Just like antivirus software there are hundreds out there and most are free For example there is Freeshield shown below
  • 8. Rule 6 Nothings better than physically observing the child If they know the parent is there and watching them 99% of the time they will not attempt to go to any websites they shouldn’t plus if the parent is there then they can also help them if problems arise.
  • 9. Rule 7 Set rules and limits to the children’s internet use This can be limits to internet use, time frames when they are allowed to use it. Ideally when the parent is available
  • 10. Rule 8 Pop-ups These are unwanted advertisements which may distract the young user to another website with seedy marketing gimmicks, they may even contain explicit content. To prevent against these ensure internet explorer has pop-up blocker turned on, it should look like the image below.
  • 11. Rule 9 Ask what websites your child is going to go on With software like “Spector Pro” you can log to see if they have been truthful and are going onto suitable websites and typing suitable text
  • 12. Rule 10 Find out what children their age should be going on Then simply influence (not force) your child to go on those websites. The child will feel better for going on websites the have been allowed and asked to go on Although children cannot be completely trusted because of their immature curiosity and so software at rule 9 can help monitor this.