Cyber Citizenship Managing Your Online Digital Reputation Glen Warren Vice President of Governmental Relations California School Library Association
Cyber Citizenship Managing Your Online Digital Reputation Glen Warren Vice President of Governmental Relations California School Library Association
No Access Yes Education Yes Access Yes Education No Access No Education Yes Access No Education
Shift Happens Shift Happens iKeepSafe – Parents Cybercitizenship.ning.com
Key Resource Points From Enforcing to Educating Holistic Approach Fast Track Curricula Teachers, Parents, and Children
Who Wants your Student’s Attention
What Are They Doing? Social Producing Learning Social Rules Designing Profiles Exploring Identity Writing Blogs Writing Software Codes Sharing and Producing Music Discussion Interests Social and Political Activism Keeping Friends Risk Assessment
What ELSE Are They Doing? Seeking Validation Competing Popularity Venting Showing Off Embarrassing Self Crowded Isolation Damaging Reputation Pulling Pranks Getting Even Threatening Harassing Bullying
Digital Reflect Physical 82% of teens 14-17 use social sites now 55% of students 12 to 13 91% Frequent Friends Connection 82% Rare Friends Connection 72% Make Plans with Friends 49% Make NEW Friends 17% Flirt
Cyber Safety – Obsolete Models Cyber Safety 1.0 – Crime and Adult Content Cyber Safety 2.0 – Peer to Peer Harm Common Elements: One Size Fits All Fear Based Youth as Potential Victims Technology both problem and solution Social Media Highly Suspect Result: Power Down and Disconnect Effect
Power Down Effect
Two Separate Worlds Physical Digital
Connected Worlds Physical Digital
Legislation Catch Up
Citizenship: Holistic Approach Four Perspectives Legislative Community Literacy Technology Enforcing Educating
The Need Holistic Approach “The way to meet the challenges and opportunities the internet presents isn't to deny our children access to this great resource, but to make sure they know how to use it wisely. Just as we make sure our children know not to talk to strangers, not to bully kids on the playground, and not to give out their personal information, we have the same responsibility to teach them to apply these values online.” Sen. Robert Menendez, D-N.J, sponsor of The School and Family Education about the Internet (SAFE Internet) Act ($175 million grant program)
Educate Who? Librarians Teachers Parents Administrators Law Enforcement School Counselors Everybody These activities come with some risks: Inappropriate Conduct: it’s anonymous online, and people – especially kids – can forget that their online actions can have real-world consequences. Inappropriate Contact: there are people online who have bad intentions – including bullies, predators, hackers, and scammers. Inappropriate Content: you may worry about what younger kids may run across – or what older kids might seek out.
Three Biggest Obstacles “Powering Down” kids to come to school – we need to use the media they’re excited about Time and Resources – we are a support resource to make this happen Absence of appropriate elementary digital literacy curriculum (until now) http://www.cde.ca.gov/ci/cr/lb/
Cyber Bullying
Special Needs Acceptance
Office of Privacy Protection Joanne McNabb California Office of Privacy Protection
Digital Citizenship Education 5th Grade and Up Copyright Focus AASL and ISTE Standards BY BYTES Jr. High http://digitalcitizenshiped.com/Default.aspx
Cyber Smart Week Orange County Teacher Driven K to 12th Grade
FBI – SOS Program National Contest Student Data 5th to 8th Grades
Cyber Hero Woogi World Based Student Teacher School Data K to 4th Grade cyberherowoogi password: cyberhero12 http://www.woogiworld.com/teachers/scripts/resetchatmission.php?scriptenabled=1 http://www.woogiworld.com/login.php http://woogiworld.com/teachers/login.php
Safety Security Ethics Health
Free Parent Resource bulkorder.ftc.gov.
Digital Reputations Building a Digital Reputation Both Digital and Physical World Negative Digital Reputations Striking Out Online Positive Digital Reputations Making a Difference These activities come with some risks: Inappropriate Conduct: it’s anonymous online, and people – especially kids – can forget that their online actions can have real-world consequences. Inappropriate Contact: there are people online who have bad intentions – including bullies, predators, hackers, and scammers. Inappropriate Content: you may worry about what younger kids may run across – or what older kids might seek out.
Talk To Your Kids Start Early Open and Honest Environment Initiate Conversations Communicate Values Be Patient So keeping in mind these risks, the Federal Trade Commission wrote a guide for parents called Net Cetera. It’s based on the idea that the first step to protecting kids online is more about talking than technology. When kids want important information, they turn to their parents. This guide can help parents talk with their kids about being safe online.
Child Continuum Young Kids Tweens Teens Modeled Shared Verifed So keeping in mind these risks, the Federal Trade Commission wrote a guide for parents called Net Cetera. It’s based on the idea that the first step to protecting kids online is more about talking than technology. When kids want important information, they turn to their parents. This guide can help parents talk with their kids about being safe online.
Socializing Online Young Kids Tweens Teens Woogi World FBI-SOS Proactive Expression So keeping in mind these risks, the Federal Trade Commission wrote a guide for parents called Net Cetera. It’s based on the idea that the first step to protecting kids online is more about talking than technology. When kids want important information, they turn to their parents. This guide can help parents talk with their kids about being safe online.
Parent Influence Consequences Everyone Sees Permanence Privacy Review Friends List Not An Adult Observations Uncomfortable Identity Theft Identity Protection Intellectual Theft Privacy Issues So keeping in mind these risks, the Federal Trade Commission wrote a guide for parents called Net Cetera. It’s based on the idea that the first step to protecting kids online is more about talking than technology. When kids want important information, they turn to their parents. This guide can help parents talk with their kids about being safe online.
Issues Sexting Cyber Bullying Phishing File Sharing Legal Issues Consequences Response Plan Cyber Bullying Legal Issues Bystander Ethics Response Plan Phishing “You are a winner!” Protect Information Permission File Sharing “It’s FREE!” Legal Issues Consequences So keeping in mind these risks, the Federal Trade Commission wrote a guide for parents called Net Cetera. It’s based on the idea that the first step to protecting kids online is more about talking than technology. When kids want important information, they turn to their parents. This guide can help parents talk with their kids about being safe online.
Cyber Bullying Roles and Culture Victim Bully Harmful Bystander Positive Bystander By the time kids are teenagers, many are ready for more independence from their parents. They’re starting to form their own values and reflecting those of their friends. But that doesn’t mean there’s no point in talking with them. Teens have access to the internet through their mobile devices, phones, their computers and their friends computers, so it’s really hard to watch what they do. It doesn’t hurt to reinforce ‘good citizenship’ messages with teens, along with three important messages that many need to hear: Not all information is credible: just because it’s posted, doesn’t mean it’s so. Once they post something, there’s no taking it back. It’s out there in the world. No matter how impersonal it seems, screen names, profiles and avatars belong to people with real feelings. Treat them the way you’d like to be treated.
Cyber bullying If your kid has a problem with a bully, don’t react to the bully Talk with a trusted adult Save the evidence Block the bully online Encourage each other to help stop cyberbullying – by not passing on other messages and telling the bully to stop. If your child has a problem with a bully, tell him or her not to react. Bullies are looking for a response, so don’t give them one. Encourage your kid to talk with you about what’s going on, and to help you save the evidence. If the bullying keeps up, share the record with the school or the police. If you ever fear for your child’s safety, immediately contact the police. Block the bully online: remove him or her from “friend” or “buddy” lists, and block the email address. If your child’s social networking profile has been changed or created without his permission, get in touch with the company that runs the site to have it taken down. Tell your kid that she can help stop cyberbullying by telling the bully to stop, and by not passing on mean messages.
Glossary Avatar Blog Blocking Software Buddy List Cat Room COPPA Cyberbullying Firewall GPS Hacking IM and IP Password File Sharing Phishing Privacy Settings Profile Sexting Spyware So keeping in mind these risks, the Federal Trade Commission wrote a guide for parents called Net Cetera. It’s based on the idea that the first step to protecting kids online is more about talking than technology. When kids want important information, they turn to their parents. This guide can help parents talk with their kids about being safe online.
Resources – Survey GetNetWise.org CyberBully411.org CommonSenseMedia.org iKeepSafe.org NetSmarts.org WiredSafety.org StaySafeOnline.org The phone itself, as well as the mobile carrier, should give you some options about privacy settings and child safety controls. You often can turn off things like web access, downloading, or texting. Other phones let you set the number of minutes used, limit internet access, and provide number privacy. Ask your carrier what tools are available on your plan and your phone, and find out what they cost. (There may be extra charges for these features.) Do you know about social mapping? It’s GPS technology that’s in many cell phones now, and kids can use it to pinpoint where their friends are – or be pinpointed by their friends. Tell your kids to use this feature only with friends they know in person and trust – and not to broadcast their location to the world. You might want to check: some carriers have GPS services that let parents map their kid’s location.
Online Parent Seminar! Glen Warren California School Library Association Vice President – Governmental Relations http://www.cybersafety.ca.gov/parents.htm http://cybercitizenship.ning.com k12edge@gmail.com Phone: 949-229-1411 The phone itself, as well as the mobile carrier, should give you some options about privacy settings and child safety controls. You often can turn off things like web access, downloading, or texting. Other phones let you set the number of minutes used, limit internet access, and provide number privacy. Ask your carrier what tools are available on your plan and your phone, and find out what they cost. (There may be extra charges for these features.) Do you know about social mapping? It’s GPS technology that’s in many cell phones now, and kids can use it to pinpoint where their friends are – or be pinpointed by their friends. Tell your kids to use this feature only with friends they know in person and trust – and not to broadcast their location to the world. You might want to check: some carriers have GPS services that let parents map their kid’s location.
Cyber Citizenship Managing Your Online Digital Reputation Glen Warren Vice President of Governmental Relations California School Library Association