Protection of Children in Cyber Space By Dr T.H.Chowdary* & G.V.Gopichandran+ * Director, Center for Telecom Management & Studies * Chairman, Pragna Bharati.

Slides:



Advertisements
Similar presentations
Your Online Footprint. What is Facebook? Facebook is an online social networking site in which young adults can have discussions, connect with friends,
Advertisements

MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
By Andy Scott, Michael Murray and Adam Kanopa
How to protect yourself, your computer, and others on the internet
Internet Safety and Cyber Bullying All info came from
Northside I.S.D. Acceptable Use Policy
Cyber Safety Assessment Review
ACCEPTABLE USE POLICIES.  Use network resources for school work only  Always Log-on/Log-off  AUP/RUP training and signature pages are required  Always.
SO WHAT DOES THE AUP MEAN FOR ME…??? A Presentation for Students in Grades 3-5.
The Internet.
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
Using Technology the CCSD Way by Dr. Kathi Vanderbilt.
INTERNET SAFETY.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
What and what not to do..  These devices must remain turned off during the instructional day, including during all testing, unless they are being used.
CYBER BULLYING…. What Is Cyber Bullying??? 0 "Cyber bullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed.
JCSD-aw Citizenship in an e-World Johnston Community School District.
Boyertown Area School District Acceptable Use Policy.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
 I will not post personal information (includes picture)  I will not agree to meet someone I met online  I will notify teacher of inappropriate messages.
How Secure Are You When You Use the Internet?. Overview What is the Internet? And what it is commonly used for? o Parents vs. Teens/Kids Use Ways of accessing.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
VISD Acceptable Use Policy
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
CyberSafety A Lesson in CYBERWORLD Culture, Customs, Culture, Customs, Language, and Safety.
Cyber Crimes.
What you should know as parents by Charles McKinley Parents’ Technology Night, 2013, sponsored by your PTSO.
Ashley Counce. What is Cyber Bullying?  Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition,
A curriculum waiting to happen. Agenda  Survey Says!  7 Topics of Internet Safety  In School Presentation  Sample Cyberbulling  And other resources.
Welcome to Technology Class
Computer Legislation The need for computer laws Go to Contents.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
Lindsey Cunningham Education and Technology. What is Digital Citizenship? Digital Citizenship is the principle of teaching appropriate and responsible.
Cyberspace Rules for Mrs. Johnson’s Kindergarten Class These are the rules we will use to learn, play, and have fun on the internet.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking.
By: Zach Oltmanns.
Welcome to Week 3 in the Mrs. DeRita’s computer lab!
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
Computers, Cell Phones & the Internet JOSE CANO AND SAMIE GIDDENS.
User Responsibility  1. To transmit or knowingly receive any materials in violation of United States, state, or local laws, or in violation of school.
Lesson 4: Taking Perspectives on Cyberbullying THE CYBER BULLYING VIRUS
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Computer Ethics Being Responsible!.
What vulnerabilities do you face in cyberspace?  Cyberbullying  Cyberstalking  Racial hatred  Exposure to violent, disturbing and/or illegal material.
Technology: Friend or Foe? Thinking about Information Ethics.
Computer crimes.
DIGITAL CITIZENSHIP. Digital Citizenship covers 9 areas according to Mike Ribble, an expert in the field.  Etiquette  Communication  Literacy  Access.
DIGITAL CITIZENSHIP.  Privacy - Protect Personal Information  Respect - Plagiarism, Downloading Music Appropriately.  Self Expression - Create your.
Bullying Project Kalene, Roz, Tanya. INTASC STANDARD Standard #3: Learning Environments The teacher works with others to create environments that support.
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
Issues for Computer Users, Electronic Devices, Computer and Safety.
District Updates  1. Crisis Go App  2. Bullying Refresher  3. Social Media Policy  4. Teacher Web Pages.
CYBERSAFTEY 101 By: Tarrah Marcus INTRODUCTION  Acceptable Use Policies (AUP)  Policies that govern internet use  Cyberbullying  Technology based.
8 THINGS PARENTS CAN DO TO PREVENT CYBER BULLYING Belhaven Middle School, Linwood NJ from the New Jersey Principals and Supervisors Association Cyber Safety.
A Parent’s Guide to Child Safety on the Internet.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
YOU’VE GOT HATE MAIL. Boerne Middle School South.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Freedom Independence Transition
Working to Keep our Children Safe in a World Filled with Technology
The Issues with Technology in education
Issues With Internet in College
Presentation transcript:

Protection of Children in Cyber Space By Dr T.H.Chowdary* & G.V.Gopichandran+ * Director, Center for Telecom Management & Studies * Chairman, Pragna Bharati (Intellect India), AP * Former Information Technology Adviser, Government of A.P CMD, Videsh Sanchar Nigam Ltd., Bombay T: +91 (40) / (O); F: +91 (40) (O) + Former General Manager, Dept of Telecoms 405 Sreyas appts., Sindhi Colony Prenderghast Rd, Secunderabad – T:(40) ® FAPCCI, Hyderabad : 17 th May '09

THC_CTMSS411_May'092 Cyber Space The borderless, global borderless network of millions of computers and websites over the telecommunications infrastructure of electronic- photonic highways. Cyberspace is under no one government's control It is like eh Trisanku Swarga created by Viswamita; not on earth, not in the Heaven ( of Indra) It is like the all-pervading air and can be connected to, over air by PCs, lap-tops, cell-phones

THC_CTMSS411_May'093 Why Cyber space is becoming a menace It is accessible by cell phones ( not only by PCs) There are 4 billion cell phones sets in the world; >400 mln in India In cuber-space are stored information(s) of all sorts in text, picture & voice.

THC_CTMSS411_May'094 Crimes in Cyber Space Hacking, Physhing, frauds, terrorist networking are by and for adults. Children, youth & women connecting to cyber space are increasing; immature, innocent; indiscrete; so vulnerable to deception and victimisation. Anonymity and spatial distribution aid the ill- intentioned

THC_CTMSS411_May'095 Crimes in Cyber Space Laws and law enforcement vary across countries; so are definitions of crimes and scales of punishment Greatest difficulty in brining criminals to justice when the victims and criminals are indifferent countries

THC_CTMSS411_May'096 Cyber Crimes against children and teens On the increase Most in the USA & EU Girls spend more time in cyber space more risk of victims of crime

THC_CTMSS411_May'097 Types of Crimes against children & teens Cyber Stalking Cyber Harassment Cyber Bullying Pictures and personal details Manipulated for pornography Extortion blackmailing and flesh trade

THC_CTMSS411_May'098 Laws and Enforcement Numerous; determination & deterrence in the USA Congress Civil Society, IT companies are in coalition Part of Homeland Security Deportment In China-30,000 Cyber Police China's effort to wean children an d teens away from net-use China has de-addiction (Internet) clinics and counsellors

THC_CTMSS411_May'099 Cyber conduct for Students, Parents & Teachers (1/5) Respect and protect the privacy of others. Use only assigned accounts. Not view, use, or copy passwords, data, or networks to which they are not authorized. Not distribute private information about others or themselves.

THC_CTMSS411_May'0910 Cyber conduct for Students, Parents & Teachers (2/5) Respect and protect the integrity, availability, and security of all electronic resources. Observe all network security practices, as posted. Report security risks or violations to a teacher or network administrator. Not destroy or damage data, networks, or other resources that do not belong to them, without clear permission of the owner. Conserve, protect, and share these resources with other students and Internet users.

THC_CTMSS411_May'0911 Cyber conduct for Students, Parents & Teachers (3/5) Respect and protect the intellectual property of others. Not infringe copyrights (no making illegal copies of music, games, or movies!). Not plagiarize.

THC_CTMSS411_May'0912 Cyber conduct for Students, Parents & Teachers (4/5) Respect and practice the principles of community. Communicate only in ways that are kind and respectful. Report threatening or discomforting materials to a teacher. Not intentionally access, transmit, copy, or create material that violates the school's code of conduct (such as messages that are pornographic, threatening, rude, discriminatory, or meant to harass). Not intentionally access, transmit, copy, or create material that is illegal (such as obscenity, stolen materials, or illegal copies of copyrighted works).

THC_CTMSS411_May'0913 Cyber conduct for Students, Parents & Teachers (5/5) Not use the resources to further other acts that are criminal or violate the school's code of conduct. Not send spam, chain letters, or other mass unsolicited mailings. Not buy, sell, advertise, or otherwise conduct business, unless approved as a school project.

THC_CTMSS411_May'0914 Mould the Child As a cultured person who voluntarily obeys unenforceable laws and rules Who never inflicts pain on others Who adds to the sum total of happiness in the world Vodi ( Mother's laps); Badi ( school), Gudi( temple, church, mosque, Gurudwara...)

THC_CTMSS411_May'0915 US Experience Children & teens driven to withdrawal from schools & to suicide Lured into illicit liasons marriages & divorces Lured, taken captive and ransomed Drawn into pornography and flesh trade

THC_CTMSS411_May'0916 Form, create the moral person To know more go to And read the article: Safety Tips for Teens and Tweens Going to social Networking Sites in the journal, ICTs & Society of the CTMS: May 2009 Issue

THC_CTMSS411_May'0917 Dhanyawad: Thank You