Logo en.artbmxmagazine.com

Risks associated with the use of the internet in schools

Table of contents:

Anonim

Currently, educational institutions are in the need to incorporate the use of the internet in their establishments as well as its good management, applying prevention and correction campaigns regarding the risks that arise either due to the amount of information which is provided without responsibility., such as the wrong information obtained through social networks, significantly and especially affecting young people. For this reason, it is important to fully understand each of the risks that arise in order to find alternatives for prevention and correction.

associated-risks-internet

RISKS ASSOCIATED WITH THE INTERNET

INAPPROPRIATE MATERIAL

Generally it is about pornographic content and uncensored information

Mitigation strategies

  • Constant training of staff to recognize dangerous use on the internet Installation of blocking devices on suspicious pages Talks to students about the consequences of sending and receiving this type of information

CYBERBULLYING OR CYBERBLLING

It is about harassing or attacking someone with the intention of affecting them psychologically, in addition to ridiculing, criticizing and excluding them from a group, which leads to these victims sometimes making negative decisions that significantly affect their lives and those of their families.

Mitigation strategies

  • Surveillance of the use of networks by students Explain to young people about the legal consequences of doing this practice Design prevention campaigns and support networks for affected students.

GROOMING

Practice of sexual harassment and abuse against children and young people through social networks where groomers (people who seek to harm minors) try to gain the trust of children by providing care, offering benefits in return and showing an image that It is not.

They seek to implement fear of minors by threatening them with exposing “secrets”.

Mitigation strategies

  • Open and frequent dialogue with students Installation of parental control software on the computer Do not trust unknown profiles.

MALWARE

They are computer programs designed by criminals to cause damage, stealing information in general or taking control of the computer. One of its characteristics is to go unnoticed by the user, which does not make it even more dangerous.

LESSONS

Virus: It inserts part of its internal code into legitimate programs.

Worm: Malicious code designed to spread through any medium.

Trojan: Malicious code that does not spread automatically nor does it affect files.

Mitigation strategies

  • Avoid downloading unknown programs.Do not follow links from emails or advertisements.Keep an updated operating system and antivirus.Remove malicious code constantly.

SEXTING

Sending sexual messages through cell phones or computers.

Mitigation strategies

  • Dialogue with students about the future consequences of the disclosure of private photos or videos, whether due to theft or loss of the device or by the will of its owner, clarifying that people's intentions may change according to circumstances. about the content that is sent through the internet, is encrypted in the multimedia even if it is erased, which is not safe. Continuous monitoring without invasion of privacy.

SCAM

It consists of scams or fraud by electronic means.

Deceptive email chains in which a financial contribution is requested or a false product, service or scam is offered posing as the need of a relative.

Mitigation strategies

  • Do not provide personal, family or financial information to strangers. Document completely about the pages and profiles that promote various products.

ACCESS TO INAPPROPRIATE MATERIAL

Students access pornographic sites or content of a criminal or dangerous nature.

Mitigation strategies

  • Training for all the institution's staff in recognizing pages with negative intentions and information Continuous surveillance while students access the network Blocking inappropriate pages Dialogue with parents about the importance of having the computer in a visible area of ​​the house.

INVASION OF PRIVACY

Use of personal information to commit theft or extortion.

Mitigation strategies

  • Explain to students the importance of refraining from giving information especially on social networks or unknown profiles Teach students to distrust and not provide information of any kind to unfamiliar people

INCORRECT USE OF FREE TIME

Students spend a large part of their time using technology, either on their cell phones or computers, leaving aside other relevant activities in their daily lives, getting to suffer some type of addiction, sometimes leading them to have health problems.

Mitigation strategies

  • Surveillance and monitoring by parents and teachers Avoid placing technological devices in the children's room
Download the original file

Risks associated with the use of the internet in schools