M3. ONLINE SAFETY

3.1. Privacy protection (settings, passwords, what to share)
3.2. Media usage habits
3.3. Bullying and inappropriate content
3.4. Self-evaluation test

This module will delve into various facets of online safety, including privacy protection and managing media usage habits effectively. Our material will encompass essential topics such as safeguarding personal information through device settings and robust passwords, discerning appropriate content, and fostering healthy media consumption habits. Furthermore, we’ll address the prevalent issue of cyberbullying and explore strategies for prevention and response. By the end of this training, you will be more knowledgeable about online safety topics and more confident in spreading your knowledge to pupils.

3.1.1. Device settings

Update software regularly. Ensure all devices have installed the latest software updates (you can select automatic updates during your specified time, i.e. night). These updates often include critical security patches that protect against known vulnerabilities.

Give permissions to apps considerately. When installing applications, you are often prompted to grant various permissions, ranging from access to location data to the ability to read contacts or send notifications. While some permissions are necessary for the app’s functionality, others may seem intrusive or unnecessary. For example, a photo editing app may require access to the device’s camera and photo library. Still, it may be questionable if it also requests permission to access contacts or location data. Review all permissions periodically.

Set a password or screen lock. It secures your device against unauthorised use or access to your accounts and apps. Additionally, enabling a screen lock adds an extra layer of security in case your device is lost or stolen.


3.1.2. Passwords and log-in

Create strong passwords. Use complex passwords that combine letters, numbers, and special characters. Avoid easily guessable information such as birthdays or common words. Consider using a reputable password manager to store and generate strong passwords securely. Donโ€™t forget to update them from time to time.

Keep the password to yourself. Avoid sharing personal passwords, even if it seems convenient.

Enable Two-Factor Authentication (2FA). Activate 2FA whenever possible, especially for accounts that contain sensitive information. This adds an extra layer of security by requiring a second form of verification, such as a code sent to a mobile device, in addition to the password.

Common ways how your password can be cracked:

Brute force attacks. In a brute force attack, attackers systematically try every possible combination of characters until they find the correct password. While this method can be time-consuming, it is effective against weak passwords or short character lengths. Advanced brute force attacks may utilise powerful computing resources or specialised software to speed up the process.

Dictionary attacks. A dictionary attack involves trying commonly used passwords, words, or phrases from a predefined list (known as a dictionary) against a target account. This method is more efficient than brute force, focusing on likely passwords based on human behaviour, such as using typical words or keyboard patterns. Attackers may also use variations of dictionary words or common substitutions (e.g., replacing “i” with “1” or “e” with “3”).

Phishing. Phishing attacks trick users into revealing their passwords through fraudulent emails, websites, or messages that impersonate legitimate entities. Attackers often create convincing replicas of login pages or forms and lure victims into entering their credentials. Once entered, the attackers capture the passwords, which can be used to compromise the victim’s accounts.

Keylogging. Keyloggers are malicious programs or hardware devices that record keystrokes entered by users, including passwords and other sensitive information. Attackers deploy keyloggers through malware infections or physical installation on compromised devices. Once installed, keyloggers silently capture passwords as they are typed and transmit them to the attacker’s server for exploitation.


3.1.3. Sharing Information

Identify personal and private information. Personal information includes details like names and hobbies, which may be appropriate to share in specific contexts. Private information, such as addresses, phone numbers, and social security numbers, should never be shared publicly.

Practice discretion on social media. Exercise caution when sharing information on social media platforms. Review privacy settings and limit the audience for posts to trusted connections. Once information is shared online, it can be challenging to control its distribution.


3.1.4. What may happen if privacy protection isnโ€™t handled properly

Data breaches. Without proper device settings, sensitive personal information stored on the device, such as passwords, financial details, and personal communications, may be at risk of unauthorised access by hackers or malicious actors. This can lead to identity theft, financial fraud, or privacy violations.

Malware infections. Devices with inadequate security settings are more susceptible to malware infections, including viruses, ransomware, and spyware. Malware can compromise the device’s functionality, steal sensitive information, or render the device unusable, leading to data loss or financial damages.

Privacy violations. Poor device settings may inadvertently expose your personal data to third parties, such as advertisers or data brokers, without your consent. This can result in targeted advertising, profiling, or other privacy violations, eroding user trust and autonomy.

Unauthorised access. Devices lacking proper security settings are prone to unauthorised access by individuals with malicious intent. This can result in unauthorised use of the device, manipulation of settings or data, or even remote control by hackers, potentially leading to further security breaches or exploitation.

Geolocation tracking. Improper device settings may allow apps or services to track your location without your knowledge or consent. This can compromise your privacy, safety, and security, as well as expose you to potential risks such as stalking, harassment, or physical harm.

3.2.1. Negative impact on physical health

Physically, prolonged screen time can lead to an inactive lifestyle, which in turn increases the risk of obesity and related health issues such as diabetes and cardiovascular disease. When children spend too much time in front of screens, they may be less likely to engage in physical activity, play outdoors, or participate in sports and other activities. This lack of physical activity can have long-term consequences for their health and development.

Moreover, excessive screen time can also negatively impact sleep patterns. Exposure to the blue light emitted by screens, particularly in the hours leading up to bedtime, can disrupt the body’s natural sleep-wake cycle and make it more difficult to fall asleep and stay asleep. Poor sleep quality and insufficient sleep can impair cognitive function, mood regulation, and overall well-being, affecting children’s academic performance and emotional resilience.


3.2.2. Negative impact on mental well-being

In terms of mental well-being, excessive media usage has been linked to various negative effects, including increased levels of stress, anxiety, and depression, particularly among children and adolescents. Exposure to violent or disturbing content, cyberbullying, and social comparison on social media can contribute to feelings of inadequacy, isolation, and low self-esteem. Moreover, the constant connectivity and pressure to maintain an online presence can lead to a fear of missing out (FOMO) and a heightened sense of social scrutiny, exacerbating feelings of stress and anxiety.

Furthermore, excessive media consumption can interfere with critical developmental processes, such as forming interpersonal relationships and developing social skills. Children who spend too much time in front of screens may have fewer opportunities for face-to-face interaction with peers and adults, which can hinder their ability to communicate effectively, empathise with others, and navigate social situations.


3.2.3. What teachers can do

Promote balanced screen time. Educate students about the importance of balancing screen time with other activities such as physical exercise, outdoor play, hobbies, and face-to-face interactions. Encourage breaks from screens at regular intervals and model healthy media habits yourself.

Set clear guidelines and boundaries. Establish clear guidelines and boundaries for screen time in the classroom and at home. Communicate expectations with students and parents regarding when, where, and how devices should be used. Encourage families to create screen-free zones and times during meals and before bedtime.

Encourage active screen time. Encourage students to engage in interactive and educational activities while using screens rather than passive consumption. Encourage them to create content, collaborate with peers on projects, and participate in meaningful online discussions. Provide access to high-quality educational apps, games, and websites that promote learning and creativity.

Support social and emotional well-being. Foster a supportive and inclusive classroom environment where students feel valued, respected, and emotionally safe. Be vigilant for signs of stress, anxiety, or social isolation among students and provide opportunities for them to discuss their feelings and experiences openly. Encourage face-to-face interactions and help students develop healthy coping strategies for managing screen-related stressors.

3.3.1. What are bullying and cyberbullying

Bullying is a form of aggressive behaviour characterised by the repeated use of power, aggression, or coercion to intimidate, harm, or control others. It typically involves a power imbalance, with the perpetrator exerting control over the victim, and can take various forms, including physical, verbal, social, and relational aggression. Bullying behaviour is often intentional and aimed at causing distress or harm to the target. It can have severe and long-lasting consequences for the victim’s mental, emotional, and physical well-being.

Cyberbullying is a specific form of bullying that occurs through digital devices and online platforms, such as social media, messaging apps, email, or online gaming platforms. Unlike traditional forms of bullying, cyberbullying can occur 24/7 and reach a much wider audience, making it particularly insidious and difficult to escape. Cyberbullying can take many forms, including sending threatening or harassing messages, spreading rumours or gossip, sharing embarrassing or compromising photos or videos, and impersonating others online. It often involves anonymity or the use of fake identities, making it challenging to identify the perpetrator and hold them accountable for their actions.

Both bullying and cyberbullying have severe consequences for victims, including increased risk of anxiety, depression, low self-esteem, academic difficulties, and even suicidal ideation or attempts. Educators, parents, and communities need to take proactive measures to prevent bullying and cyberbullying, promote empathy and respect among students, and provide support and resources for those who have been affected by these harmful behaviours.

Most often, anti-bullying activities are implemented at the whole school level. Thus, it would be best to check with the school administration and follow the school policy. Yet, some things are important no matter what anti-bullying measures or programs the school implements.


3.3.2. How to deal with bullying

Creating a safe environment. Foster a supportive and inclusive classroom culture where bullying is not tolerated. Establish clear rules against bullying and ensure students feel comfortable reporting incidents to teachers or school authorities.

Respectful communication. Teach students about the importance of respectful and empathetic communication online. Encourage them to think before they post, considering how their words and actions may affect others.

Cyberbullying awareness. Educate students about the various forms of cyberbullying, including harassment, impersonation, exclusion, and spreading rumours or gossip online. Help them understand the impact cyberbullying can have on mental health and well-being.

Empathy and understanding. Teach students about empathy and understanding towards others targeted by bullying. Encourage bystander intervention and empower students to speak up against bullying when they witness it.

Conflict resolution skills. Provide students with strategies for resolving conflicts peacefully and assertively. Teach them effective communication skills and encourage open dialogue to address issues before they escalate into bullying.

Building resilience. Help students develop resilience and coping skills to deal with bullying behaviour. Teach them strategies for managing stress and building self-confidence, emphasising the importance of seeking support from trusted adults.


3.3.3. What is inappropriate content

Inappropriate content online refers to any material unsuitable for certain audiences, often due to its explicit, offensive, or harmful nature. This can encompass a wide range of content across various forms of media, including text, images, videos, and audio. What constitutes inappropriate content can vary depending on age, cultural norms, and personal values, but some common examples include:

Explicit or graphic material. This includes content that contains nudity, sexual activity, violence, or graphic imagery that may be disturbing or offensive to viewers. Examples may include pornographic websites, violent video clips, or graphic images of injuries or accidents.

Hate speech or discriminatory content. Content that promotes hatred, discrimination, or violence against individuals or groups based on characteristics such as race, ethnicity, religion, gender, sexual orientation, or disability. This can include derogatory language, slurs, or threats targeting specific individuals or communities.

Scams and fraudulent content. Content that seeks to deceive or defraud individuals for financial gain. This may include phishing emails, fraudulent websites, or deceptive advertisements that attempt to trick users into providing personal or financial information.


3.3.4. How to deal with inappropriate content

Understanding inappropriate content. Educate students about what constitutes inappropriate content online, including explicit images or videos, violent or graphic material, hate speech, and cyberbullying.

A supportive and trusting relationship with students is essential. Encourage them to come forward if they encounter anything online that makes them uncomfortable or uneasy. Assure they won’t be punished for seeking help and provide guidance on reporting inappropriate content to a trusted adult or authority figure.

Reporting mechanisms. Provide students with clear guidelines on reporting inappropriate content or bullying incidents to teachers, parents, or online platforms. Ensure they feel empowered to take action when they encounter harmful material online.

Potential risks of interacting with strangers online. Teach them to be cautious when communicating with individuals they don’t know in real life and to never share personal information or agree to meet someone in person without parental permission and supervision. Encourage them to immediately report suspicious or inappropriate behaviour to a trusted adult.


3.3.5. Involve parents

The school alone canโ€™t ensure the online safety of the students. Thus, involving parents and providing them with guidance is a very effective strategy. The two specific topics to discuss with them are content filtering and parental control.

Content filtering.

Content filtering involves using software or tools to block access to inappropriate or harmful content on devices and internet browsers. Here’s how you can set up content filtering:

Device settings. Many devices, including computers, smartphones, and tablets, have built-in parental control features that allow you to restrict access to certain types of content. Go to the device’s settings menu and look for options related to parental controls or content filtering.

Internet browser settings. Most internet browsers offer options for content filtering and safe browsing. Open the settings or preferences menu of the browser and look for options related to privacy and security. You may find settings to block pop-ups, turn off cookies, and enable safe browsing modes.

Third-party software. Many third-party content filtering software and apps offer more advanced features for controlling and monitoring online activity. Research and choose a reputable content filtering tool that meets your needs and preferences.

Customise settings. Once you’ve accessed the parental control or content filtering settings, customise them according to your preferences. You may have options to block specific websites or categories of content, set time limits for internet usage, and restrict access to certain apps or features.

Test and monitor. After configuring the content filtering settings, test them to ensure they work as intended. Visit websites or search for content you want to block to verify that access is restricted. Regularly monitor internet usage and adjust the settings based on your observations.

Parental control.

Parental control tools offer additional features for monitoring and managing online activity, including setting time limits, tracking browsing history, and receiving notifications about suspicious or inappropriate content. Here’s how to use parental control tools effectively:

Choose the right tool. Research and choose a parental control tool compatible with your family members’ devices and operating systems. Look for tools that offer a range of features to meet your specific needs, such as content filtering, app blocking, and screen time management.

Install and set up. Download and install the parental control app or software on the devices you want to monitor and manage. Follow the instructions provided by the tool to set up user accounts and customise settings for each family member.

Set time limits. Use parental control tools to set time limits for internet and device usage. You can specify how much time each family member is allowed to spend online daily or per week and schedule times when internet access is restricted, such as during bedtime or homework hours.

Monitor activity. Take advantage of features that allow you to monitor and track online activity, including browsing history, search queries, and app usage. Regularly review activity reports to identify any red flags or signs of inappropriate behaviour.

Communicate and educate. Have open and honest conversations with your children about the purpose of parental controls and the importance of responsible internet use. Explain why certain restrictions exist and encourage them to come to you with any questions or concerns.

Adjust settings as needed. Regularly review and adjust the parental control settings based on your family’s evolving needs and circumstances. As children grow older and gain more independence, you may need to loosen or tighten restrictions accordingly.

1. What should users consider when granting permissions to apps?

a) Grant all permissions to maximise app functionality
b) Grant permissions based on app popularity
c) Review permissions periodically and grant them considerately
d) Ignore permission requests to save time

2. What is the purpose of setting a password or screen lock on a device?

a) To personalise the device interface
b) To prevent device damage
c) To secure the device against unauthorised use or access
d) To improve device performance

3. What is a recommended practice for creating strong passwords?

a) Use easily guessable information such as birthdays or common words
b) Avoid using special characters
c) Include a combination of letters, numbers, and special characters
d) Use the same password for all accounts

4. How can users protect themselves against phishing attacks?

a) Ignore suspicious emails or messages
b) Always click on links in emails to verify account information
c) Share passwords with trusted friends
d) Review privacy settings on social media

5. What is the purpose of enabling Two-Factor Authentication (2FA) for accounts?

a) To simplify the login process
b) To add an extra layer of security by requiring a second form of verification
c) To increase device storage capacity
d) To personalise the account interface

6. What is a common way attackers can crack passwords?

a) Deleting cookies
b) Sending phishing emails
c) Brute force attacks
d) Uninstalling apps

7. What are some potential negative impacts of prolonged screen time on physical health?

a) Increased risk of obesity and related health issues
b) Improved cognitive function and mood regulation
c) Enhanced sleep quality and emotional resilience
d) Decreased risk of cardiovascular disease

8. Which of the following is NOT a potential negative impact of excessive media usage on mental well-being?

a) Increased levels of stress, anxiety, and depression
b) Exposure to violent or disturbing content
c) Improved social skills and communication abilities
d) Heightened sense of social scrutiny and fear of missing out (FOMO)

9. What can teachers do to promote balanced screen time among students?

a) Encourage breaks from screens at irregular intervals
b) Model unhealthy media habits
c) Discourage physical exercise and outdoor play
d) Educate students about the importance of balancing screen time with other activities

10. What is one strategy for mitigating the negative effects of prolonged screen time for students?

a) Promoting excessive media consumption
b) Encouraging passive consumption of online content
c) Providing access to high-quality educational apps, games, and websites
d) Setting unclear guidelines and boundaries for screen time

11. What is cyberbullying?

a) Physical aggression towards others through digital devices
b) A form of bullying that occurs through digital devices and online platforms
c) Verbal communication targeted at individuals in person
d) Aggressive behaviour towards others in social settings

12. What is one strategy for dealing with inappropriate content online?

a) Encouraging students to engage with explicit or graphic material for educational purposes
b) Providing access to websites promoting hate speech or discriminatory content
c) Educating students about what constitutes inappropriate content and how to report it
d) Ignoring instances of cyberbullying and inappropriate content

13. How can parents implement content filtering?

a) By encouraging unrestricted access to the internet for their children
b) By setting clear rules against using parental control tools
c) By customising settings on devices and internet browsers to block access to inappropriate content
d) By avoiding discussions about online safety with their children

14. What is a feature of parental control tools?

a) Encouraging unlimited screen time for children
b) Monitoring and tracking online activity, including browsing history and app usage
c) Encouraging children to engage with harmful content
d) Allowing children to set their own rules for internet usage

15. Which of the following statements about cyberbullying is FALSE?

a) Cyberbullying can occur through social media, messaging apps, email, or online gaming platforms
b) Cyberbullying typically involves a power imbalance between the perpetrator and the victim
c) Cyberbullying can only occur during specific hours of the day
d) Cyberbullying can have serious consequences for the victim’s mental health and well-being

16. Which strategies are NOT recommended for dealing with cyberbullying?

a) Encouraging bystander intervention and empowering students to speak up against bullying
b) Ignoring instances of cyberbullying and hoping they will resolve themselves
c) Providing support and resources for students affected by cyberbullying
d) Educating students about cyberbullying and how to report it to trusted adults or authorities


RELATED TOOLS:

MEDIA DIARY (EN ๐Ÿ‡ช๐Ÿ‡บ, FI ๐Ÿ‡ซ๐Ÿ‡ฎ, GR ๐Ÿ‡ฌ๐Ÿ‡ท, LT ๐Ÿ‡ฑ๐Ÿ‡น) with theoretical background

PASSWORDERIA (EN ๐Ÿ‡ช๐Ÿ‡บ, FI ๐Ÿ‡ซ๐Ÿ‡ฎ, GR ๐Ÿ‡ฌ๐Ÿ‡ท, LT ๐Ÿ‡ฑ๐Ÿ‡น)

S2S (Safe to Share) (EN ๐Ÿ‡ช๐Ÿ‡บ, FI ๐Ÿ‡ซ๐Ÿ‡ฎ, GR ๐Ÿ‡ฌ๐Ÿ‡ท, LT ๐Ÿ‡ฑ๐Ÿ‡น), annex 2 (EN ๐Ÿ‡ช๐Ÿ‡บ, FI ๐Ÿ‡ซ๐Ÿ‡ฎ, GR ๐Ÿ‡ฌ๐Ÿ‡ท, LT ๐Ÿ‡ฑ๐Ÿ‡น)

The project has been funded with support from the European Commission. This web reflects the views only of the consortium, and the Commission cannot be held responsible for any use which may be made of the information contained therein.

ย Email: info@zef.lt

All pictures used on the website are under an Unsplash license, unless otherwise specified.