CYBERSAFTEY 101 By: Tarrah Marcus
INTRODUCTION Acceptable Use Policies (AUP) Policies that govern internet use Cyberbullying Technology based harassment Cyberpredators On-line stalkers Identity Safety Protecting shared information Piracy, Plagiarism Stealing and making it your own
ACCEPTABLE USE POLICIES Acceptable Use Policies (AUP): Written policies for schools, businesses, libraries, community centers, etc. Helps restrict access Keeps internal information safe Reduces cyber attacks against students
POLICIES CONTINUED… The National Education Association suggests an effective AUP contain the following six elements: A preamble, A definition section, A policy statement, An acceptable uses section, and A violations/sanctions section. Taken from Education World: Getting Started on the Internet: Developing an Acceptable Use Policy (AUP).Education World
CYBERBULLYING According to Stop Bullying (2015) cyberbullying is bullying that takes place using electronic technologyStop Bullying Electronic Technology includes: Devices and Equipment- Cell phones, computers and tablets Communication Tools- Social media sites, text messages, chat, and websites Examples of Cyberbullying: Sending mean texts or s Spreading rumors online Posting embarrassing pictures and videos
CYBERBULLYING - Well Cast website for kids, teens and teachers Well Cast - Printable worksheets - Fun, Animated Videos across many content areas - VIDEO: How to Beat CyberbulliesHow to Beat Cyberbullies - Worksheet Worksheet Cyberbullying is different… - It can happen 24/7 - Anonymous - Rapid Spread of Information - Deleting posts is hard Effects are similar… - Alcohol and drug use - Poor grades - Lower self-esteem - Skip school - In-person bullying
CYBERPREDATORS Any person can be a cyber predator Ultimate goal of a face-to-face meeting Potential purpose: Molestation Rape Murder Taken from Web Safety4Kids (2015)Web Safety4Kids
CYBER PREDATORS CONTINUED… Two Categories: Preferential Predators- actively seek out targets by… Age, hair color, height, etc. Jobs Hijacking Situational Predators Not actively seeking out children, but will take advantage of situations Predator warning signs: Spends a lot of time online Porn on the computer Anonymous phone calls, gifts and mail Withdraws from normal activity Switches screen quickly Uses other accounts for or instant messaging Retrieved from Family Safe Computers (2011)Computers
IDENTITY SAFETY Identity Safe Classroom Acceptance of social identities Build learning environments Promote sense of belonging Classroom to Internet Encourage sharing Set realistic expectations VIDEO Identity Safe Classrooms Identity Safe Classrooms Places to belong and learn
IDENTITY SAFETY AND INTERNET Tips for Students:Tips for Teachers: - Don’t share personal information - Never meet with someone online - Use creative passwords Use complicated passwords Limit posts with photos Do not open attachments Be a role model
PIRACY Piracy is the unauthorized use of another’s production (Merriam-Webster, 2015) Common forms of Piracy: Downloads, file sharing, copying, installing and distributing Anti-piracy Warnings Fines Imprisonment Both Tips for Teachers: (Cyber Safety on Weebly)Cyber Safety Always give credit Create awarness in classrooms Create activities
PLAGIARISM Plagiarism is defined as to steal and pass off as one’s own (Merriam-Webster, 2015) Student Code of Conduct: Implications and violations Tips for Teachers: Educate students Use resources and tools Vaughan Memorial Library Vaughan Memorial Library
CONCLUSION Strategies for Implementation: Post Internet RULES and GUIDELINES in classroom Model safe internet use Use online resources Attend workshops or trainings Ask other educators
RESOURCES Getting started on the internet: creating an acceptable use policy (2011). Retrieved from Cyberbullying. Retrieved from Video: How to beat cyberbullies. Retrieved from Cyber Predators. Retrieved from The facts about online predators. Retrieved from What is identity safety? Retrieved from Identity safety. Retrieved from Cyber Safety. Retrieved from You Quote It, You Note It! Retrieved from Merriam-Webster Online Dictionary (2015). Retrieved from