CyberSafety Unraveled

Slides:



Advertisements
Similar presentations
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Thank you for your cooperation. We will begin shortly.
Keeping Your Child Safe on the Internet
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Coxheath Primary School E-safety- Term Purpose To outline the use of the internet in school The use of the internet outside school What are the.
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
Forms of Cyberbullying
CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV.
Smart Choices for our 21st Century Cyber Surfers
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
$100 $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $200 $300 $400 $500.
CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety.
How Secure Are You When You Use the Internet?. Overview What is the Internet? And what it is commonly used for? o Parents vs. Teens/Kids Use Ways of accessing.
An Internet Safety Presentation for Middle School Adopted from netsmartz with video from netsmartz.org, center for missing & exploited children, and Saturday.
Company LOGO Internet Safety A Community Approach.
Cyber Bullying Welcome to our Parent Power night. I hope you will find the evening helpful and informative. Mrs. Fleming is very proactive and very much.
Internet Safety Awareness
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Awareness raising session for Parents and Carers.
What is cyberbullying? Contributed by Joanne Thompson All resources in the "Safeguarding Resources" section of our resource bank have been submitted by.
CyberSafety A Lesson in CYBERWORLD Culture, Customs, Culture, Customs, Language, and Safety.
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
The Internet & Using it Safely! Morgan Johnson. Benefits of the Internet Plethora of information delivered quickly The internet can be helpful when creating.
Let’s talk about Internet Safety!
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
A Fleming Parent’s Guide to Child Safety on the Internet Adapted by Kam Purewal June 24,2010 Based on: Responding to Cyberbullying: A Guide for School.
Stay Safe in Cyberspace By: Mrs. Marple Never Give out personal information. Such as: Your home address Your phone number The name and location of your.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
INTERNET SAFETY Tips for becoming a “surfer” dude!
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
YOU Only YOU Can Stop Internet Hazards NETS: 5. Digital Citizenship Students understand human, cultural, and societal issues related to technology and.
Internet Safety: 5 th Grade. The Internet What are some good things with using the Internet? What are some good things with using the Internet? What are.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Internet Safety & Online Citizenship
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Lesson 4: Taking Perspectives on Cyberbullying THE CYBER BULLYING VIRUS
 “Nicknames” are preferred when posting something about a student on a web page. It is never a good idea to use a students’ real name.  Always get written.
Internet Safety KNOW HOW TO STAY SAFE ONLINE. You should never give out certain information over the internet.  Examples include:  Your last name 
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Grades 3-5. Question #1  A) address and phone number  B) names of your friends  C) your school name and town you live in  D) All of the above Personal.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Are you a digital citizen? Zeborah Ware 1. Table of Contents Definition of Digital Citizenship Page 3 Classroom Rules for Cell Phones Page 4 Social Networking.
Digital Elementary School Kids: Safe, Smart, and Responsible.
© Childnet International 2008 Helping to keep your children safe online.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Internet Safety Safely Navigating Uncharted Waters.
T HINK ! Before You Post A lesson on Internet Safety Source:
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
Special Project Cyber bullying Issues By: Abby Heim.
Created By Cece Chukwumah. ONLINE SAFETY viewing unsuitable content e.g. hate material, adult content, sites that endorse unhealthy behavior giving out.
Cybersafety 4 Kids: Smart Moves in an Online World.
E-safety Helping your children stay safe on-line A presentation for Parents.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Cybersafety 4 Kids: Smart Moves in an Online World.
Cybersafety 4 Kids (Part 3): Smart Moves in an Online World.
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Cybersafety 4 Kids: Smart Moves in an Online World.
Teaching Internet Safety
Appropriate Use of Technology
Jeopardy iT Final Jeopardy iT $100 $100 $100 $100 $100 $100 $200 $200
Rules To Help You Navigate the Internet Safely
Internet Social Media. Internet Social Media Benefits: Internet is a useful tool if utilized appropriately. Uses Benefits: Internet is a useful tool.
Personal Safety Online
Presentation transcript:

CyberSafety Unraveled CTAP Region IV 1/20/07 CyberSafety Unraveled Please feel free to modify presentation to fit your needs. Let us know of any successful changes you make so that we may share them: CTAP Region IV www.ctap4.org/cybersafety/ Adrienne DeWolfe <adewolfe@acoe.org> Jim Freese <jfreese@acoe.org> Linda Uhrenholt <lu2829@att.com> Before presentation, you could have MySpace PSA video playing <http://video.google.com/videoplay?docid=-2165070094331446122&pr=goog-sl> Presentation Co-developed by AT&T and CTAP Region IV Presented by Vanitha Chandrasekhar Images from Microsoft Design Gallery

CTAP Region IV 1/20/07 Goals of Presentation To unravel the fear and hype surrounding the online lives of our cyber kids while also considering strategies to help ensure that our children have a safe, positive experience with technology.

How Do You Use the Internet? CTAP Region IV 1/20/07 How Do You Use the Internet? What Are Your Favorite Sites? Why? Let’s talk a minute about your online life -- how do you use the Internet? What are you favorite web sites ? And Why?

How Are Students Using the Internet? CTAP Region IV 1/20/07 How Are Students Using the Internet? www.myspace.com www.xanga.com www.google.com www.nbc.com/theoffice www.ebay.com www.facebook.com www.livejournal.com www.yahoo.com www.bored.com www.itunes.com www.gamefacts.com community.webshots.com www.aim.com www.smartpunk.com www.youtube.com www.amazon.com www.turnitin.com www.addictinggames.com www.funnyjunk.com www.albinoblacksheep.com www.homestarrunner.com www.fuse.tv.com www.demonoid.com en.wikipedia.com These are sites from our informal survey of kids in Walnut Creek, Ohio, etc. Why the kids like those site tends to be very different then our information driven adult purpose -- they say they are interactive and fun. There is a disconnect between adult users and kid users and digital natives and immigrants. Some of the fear and hype arises in part because adults are used to using the web to “consume” information and the digital natives are now “producers” of information rather than simply consumers. According to the 2005 Pew Internet Study: Teen Content Creators and Consumers, 57% of all teens who go online create content for the internet: create a blog; create a personal webpage; create a webpage for school, a friend, or an organization; share original content they created themselves online; or remix content found online into a new creation.<http://www.pewinternet.org/pdfs/PIP_Teens_Content_Creation.pdf> This new producer-driven Web 2.0 is sometimes referred to as the Read/Write/Web because increasingly it’s about empowering users to create content and upload it for the world to view or at least share their opinion of content. Whether it’s sharing a blog, your bookmarks, your review of an online article, or your latest video, it’s all about the power of Internet users to influence each other. We tend to react as if we could simply lock the gates on the school yard, we try to lock out or block out the online spaces and places they run into trouble. This doesn’t work. We all have some work to do to understand the online and digital lives of youth. And we must represent youth voice when talking about this issue.

CTAP Region IV 1/20/07 Welcome to Their World You may want to share the MacArthur Digital Media and Learning Initiative video here to set the stage for the positives around students and their online lives. (2:34) This video was embedded with phone permission of Ben Stokes <bstokes@macfound.org> of the MacAruthur Foundation on October 3, 2007. The MacArthur Foundation launched its five-year, $50 million digital media and learning initiative in October 2006 to help determine how digital technologies are changing the way young people learn, play, socialize, and participate in civic life. Find the video under Library/News and Announcements, called, “Video: Are Kids Different Because of Digital Media?” Released October 19, 2006 Have participants define the closing title at the end of the move in the last slide dlife:1001 cul8tr Have them get out chat lingo bingo and play. MacArthur Foundation Movie: Are Kids Different Because of Digital Media?”

“Think Before You Post” CTAP Region IV 1/20/07 Definition: Personal information identifies you, your location or your financial assets. Obvious: name, age, sex, picture, phone number, address Less obvious: hobbies, interests, school mascot, gaming identities Used for phishing scams Small details about yourself can provide clues toward divulging personal information. Remember by posting your picture it can be altered or broadcast in ways you might not be happy about! Definitions for spamming and phishing from NetSmartz <http://www.netsmartz.org/safety/definitions.htm>: Spam - Unwanted e-mail from someone you don't know. It is usually trying to sell you something. Phishing - An online scam that uses e-mail to "fish" for users' private information by imitating legitimate companies. People are lured into sharing user names, passwords, account information or credit-card numbers. The phishing e-mail usually contains a link to an illegitimate site. Scammers copy the look of a web site to set up a nearly identical page, one that appears to be part of that company's site. “Think Before You Post”

CTAP Region IV 1/20/07 Unraveling the facts… Identity thieves are clever, posing as friends, relatives and banks, to get people to reveal personal information. Watch for https and URL posers like paypa1. Teens are just as likely as adults to become victims of identity theft -- when applying for a driver's license they may find one already has been issued using their name and SSN. http://www.consumer.gov/idtheft/ According to the Federal Trade Commission one should not give out personal information on the phone, through the mail, or on the Internet unless you've initiated the contact or are sure you know who you're dealing with. Identity thieves are clever, and have posed as representatives of banks, Internet service providers (ISPs), and even government agencies to get people to reveal their Social Security number, mother's maiden name, account numbers, and other identifying information. Before you share any personal information, confirm that you are dealing with a legitimate organization.

To-Dos: Remember to share guidelines with your students: CTAP Region IV 1/20/07 To-Dos: Remember to share guidelines with your students: Do not share personal information such as your name, age, sex, picture, location/address, phone number, hobbies, interests, and Social Security/bank account numbers. Create nicknames that do not reflect your own name or anything personal. From the CTAPIV AT&T poster located at <http://www.ctap4.org/cybersafety/> Print To-Dos out and have students or faculty read them aloud at the appropriate times.

To-Dos (cont’d): Never respond to online CTAP Region IV 1/20/07 To-Dos (cont’d): Never respond to online communication that is inappropriate or makes you feel uncomfortable. Never agree to meet in person someone you met online. Always talk with your parents or a responsible adult about your online activities. Threads

Definition: Cyberbullying is the use of CTAP Region IV 1/20/07 Definition: Cyberbullying is the use of technology for harassment, impersonation, denigration, trickery, exclusion and stalking. Cyberbullies may use email, chat rooms, discussion forums, instant messaging, text messaging or social networking sites. Resource descriptions: http://www.ctap4.org/cybersafety/cb.htm Under our student resources, Netsmartz offers EXCELLENT Real-Life Stories as video vignettes about cyberbullying. In, “You Can't Take It Back" (Part 2 of 3, 1 1/2 minute video), a teen regrets his participation on a web site created to rate others at his school. http://www.netsmartz.org/resources/reallife.htm In "Cyberbullying: Broken Friendship" (Part 3 of 3, 1 minute, 40 second video), a friendship is broken when a teen gives her best friend's password to some other girls at school. Under Educator Resources is Nancy Willard, M.S., J.D., Executive Director
of the Center for Safe and Responsible Internet Use. Her website has incredible resources on cyberbullying and other cybersafety issues <http://www.csriu.org/>

CTAP Region IV 1/20/07 Unraveling the facts… “If I tell someone about bullying, it will just make it worse.” Research shows that bullying will stop when peers or adults get involved. Headline news provides opportunities for discussion and “teachable moments” Cyber Bullying is considered a form of harassment in most states (including CA) and can be punishable by law as a misdemeanor - and in some cases a felony - if there is a reasonable threat to a person’s personal safety. For more information on the law and establishing school “nexus,” see The Educator’s Guide to Cyberbullying (.pdf download) from
The Center for Safe and Responsible Internet Use under our teacher resources. Research is sited from Bullying Myth and Facts on <www.bullying.org> The research says: -Bullying stops in less than 10 seconds, 57% of the time when peers intervene on behalf of the victim. -(Pepler et al., 1997) Under educators,
in Dealing with Online Bullies, a lesson plan from CyberSmartCurriculum.org, students reflect on the rewards of cyberspace and then consider bullying scenarios in which they examine their personal comfort levels. They learn to recognize such feelings and responsibly handle the unacceptable behavior of others. <http://www.cybersmartcurriculum.org/lesson_plans/68_04.asp>

To-Dos: Remember to share guidelines with your students: CTAP Region IV 1/20/07 To-Dos: Remember to share guidelines with your students: Don’t respond to or meet with a cyberbully. Save proof of the harassment like e-mail messages, screen shots, IM logs, blogs, etc. From the CTAPIV AT&T poster located at <http://www.ctap4.org/cybersafety/>

CTAP Region IV 1/20/07 To-Dos (cont’d): Tell a trusted adult who can: File a complaint with the Internet Service Provider or send an email to the host of the web site where the abuse was posted. Contact the cyberbully’s parents. Contact an attorney or file a small claims action. Threads

CTAP Region IV 1/20/07 To-Dos (cont’d): If it involves another LBUSD student, contact the school administrator In all other cases, contact the local police department Threads

Definition: Piracy refers to the ownership CTAP Region IV 1/20/07 Definition: Piracy refers to the ownership rights of materials, created, written, designed or expressed by individuals. Includes music, games, movies, photos, and writing Threads

File-sharing represents 60% of all US Internet traffic. CTAP Region IV 1/20/07 Unraveling the facts… File-sharing represents 60% of all US Internet traffic. Illegally downloading or sharing intellectual property without the permission of the creator is a crime punishable by law. The report from the Federal Trade Commission: "Peer-to-Peer File- Sharing Technology: Consumer Protection and Competition Issues" can be downloaded at <http://www.ftc.gov/reports/p2p05/050623p2prpt.pdf> You can also read a summary of the report at <http://www.netfamilynews.org/nl050701.html#1>

To-Dos: Remember to share guidelines with your students: CTAP Region IV 1/20/07 To-Dos: Remember to share guidelines with your students: Don’t download, copy, or share music, games, movies, photos, or other property without permission of the creator. Use only legitimate sites (those that request payment or are copyright free) when downloading online media. From the CTAPIV AT&T poster located at <http://www.ctap4.org/cybersafety/> Threads

Definition: Inappropriate content has been CTAP Region IV 1/20/07 Definition: Inappropriate content has been defined in CIPA* as visual depictions that are obscene, child pornography, or material "harmful to minors" It can also include images of violence, hate group or extremist material, illegal activities and online advertising CIPA: The Children’s Internet Protection Act affects schools and libraries that receive E-rate discounts for Internet access. CIPA requires that districts develop an Internet Safety Plan addressing: 1.Access to inappropriate content. 2.Safety and security when using electronic communications. 3.Unauthorized online access, "hacking” etc. 4.Unauthorized disclosure and use of personal information. Threads

CTAP Region IV 1/20/07 Unraveling the facts… A white supremacist group registered the domain name www.martinlutherking.org in order to masquerade as a legitimate resource Federal policies created to protect our children include CIPA, COPPA and DOPA CIPA Affects schools and libraries that receive E-rate discounts for Internet access or internal connections and also applies to recipients of certain federal education technology funding. The Children's Internet Protection Act requires that districts develop an Internet Safety Plan that addresses the following elements:1.Access by minors to inappropriate matter on the Internet and World Wide Web.2.Safety and security of minors when using electronic mail, chat rooms, and other forms of direct electronic communications.3.Unauthorized online access by minors, including "hacking" and other unlawful activities.4.Unauthorized disclosure, use, and dissemination of personal information regarding minors.5.Measures designed to restrict minors' access to materials harmful to minors. (Willard <http://csriu.org/onlinedocs/documents/checklist.html>) COPPA The Children's Online Privacy Protection Act, enforced by the Federal Trade Commission, requires commercial website operators to get parental consent before collecting any personal information from kids under 13. COPPA allows teachers to act on behalf of a parent during school activities online, but does not require them to do so. That is, the law does not require teachers to make decisions about the collection of their students' personal information. <http://www.ftc.gov/bcp/conline/pubs/online/teachers.htm> DOPA MySpace and other social-networking sites like LiveJournal.com and Facebook are the potential targets for a proposed federal law, Deleting Online Predators Act, that would effectively require most schools and libraries to render those Web sites inaccessible to minors. The concern by many over DOPA is that it would block a broad category of commercial Web sites that let users create public "Web pages or profiles" and also offer a discussion board, chat room, or e-mail service. This category covers far more than social-networking sites. It would also sweep in a wide range of interactive Web sites and services, including Blogger.com, AOL and Yahoo's instant-messaging features that are effectively being used for learning applications in many educational settings. <http://news.com.com/2100-1028_3-6071040.html>

Inappropriate content can occur on any computer by accident CTAP Region IV 1/20/07 Unraveling the facts… Inappropriate content can occur on any computer by accident Only a small fraction of the materials on the Internet could reasonably be classified as inappropriate for children… Unfortunately, that small fraction is highly visible and controversial. Facts from: http://www.issues.org/20.2/thornburgh.html Under parent resources is a parent video from Wired Safety on Parental Controls for Preventing Exposure to Pornography Online <http://www.wiredsafety.org/wiredlearning/videos/index.html> Parent Controls Video

To-Dos: Remember to share guidelines with your students: CTAP Region IV 1/20/07 To-Dos: Remember to share guidelines with your students: Tell a trusted adult, teacher or parent if you come across inappropriate content. Know how to use the back button or log off immediately when you find material that makes you feel uncomfortable. Children can also be educated to understand what is appropriate and what is not, in an age-appropriate way. Make sure your kids know what is suitable for children and what is not. If your child comes to you with a question about an inappropriate web site, be sure to thank them for asking you.

To-Dos (cont’d): Don’t download files from people you don’t know. CTAP Region IV 1/20/07 To-Dos (cont’d): Don’t download files from people you don’t know. Use filtered searches and systems; ask your teacher or librarian for help Use Ask.com as your search engine or set your preferences in Google for strict filtering Threads

Definition: A Cyber predator uses the Internet CTAP Region IV 1/20/07 Definition: A Cyber predator uses the Internet to hunt for victims to take advantage of in ANY way, including sexually, emotionally, psychologically or financially Cyber predators know how to manipulate kids, creating trust and friendship where none should exist The Netsmartz video: Amy’s Choice tells the true story of a 15-year-old girl who left home to meet in person with a man she first "met" online. The story is told in Amy’s own words and is compelling and might be useful in opening up a dialogue with kids. There are accompanying activity cards. Nancy Willard describes the need to educate kids in stranger literacy, the ability to determine the relative safety and veracity of individuals with whom one is communicating online who are unknown in person. <http://csriu.org/onlinedocs/pdf/srui/sruilisting.html>

Cyber predators can be sent to prison. CTAP Region IV 1/20/07 Unraveling the facts… Cyber predators can be sent to prison. What children need to look out for is not a certain stereotype of a dangerous person but certain types of behavior… Use teachable moments, even headline news, to make discussion and education relevant. This CBS News article from Larry Magid has some great tips for using teachable moments to educate on this topic as he talks abou the Senator Mark Foley scandal that took place October, 2006. “Children should be reminded not to engage in online discussions of a sexual nature with anyone, especially adults or people they don’t know. Kids and parents should know the warning signs of a potential predator including excessive praise, questions about what they’re wearing or what they’re doing or questions designed to determine whether their parents are nearby including where’s the computer in the house?” To read more from Larry Magid’s article, see: <http://www.cbsnews.com/stories/2006/10/08/scitech/pcanswer/main2072464.shtml>

To-Dos: Remember to share guidelines with your students: CTAP Region IV 1/20/07 To-Dos: Remember to share guidelines with your students: Encourage your schools to add a small cyber tips section to their school newsletters. Remind student to think twice before sharing any information about themselves.

Cyber Predator Awareness CTAP Region IV 1/20/07 To-Dos (cont’d): If you suspect that you are being stalked or the victim of inappropriate communication, report it to a trusted adult or to the CyberTipline. http://cybertipline.com 1-800-843-5678 Under the parent resources, Internet Safety and Cyber Predator Awareness is a resource from the State of Ohio's Attorney General's Office to educate you on Cyber Predators. <http://www.ag.state.oh.us/citizen/isafety/index.asp> Cyber Predator Awareness Threads

When Children We Hope They Learn. . . CTAP Region IV 1/20/07 Start School, Go Online, When Children We Hope They Learn. . . Don’t talk to strangers in cyberspace Look both ways before crossing the street clicking   , no  cyberbullies allowed Play nicely with other children Slide modified from COSN presentation, the Consortium for School Networking’s Safeguarding the Wired Schoolhouse project. <http://safewiredschools.cosn.org/toolkit/files.cfm> Ask any child to give you some tips to be safe on the Internet – they know the tips, but that doesn’t necessarily mean they USE them. Youth need the ability to internalize knowledge and set positive behavioral responses in order to…recognize and avoid dangerous, destructive, or unlawful online behavior, and to respond appropriately. We need to utilize teachable moments and consider comprehensive K-12 curriculums. If something happens that scares you, seek help from an adult you trust !!!

CTAP Region IV 1/20/07 Slide modified from COSN presentation, the Consortium for School Networking’s Safeguarding the Wired Schoolhouse project. <http://safewiredschools.cosn.org/toolkit/files.cfm> Ask any child to give you some tips to be safe on the Internet – they know the tips, but that doesn’t necessarily mean they USE them. Youth need the ability to internalize knowledge and set positive behavioral responses in order to…recognize and avoid dangerous, destructive, or unlawful online behavior, and to respond appropriately. We need to utilize teachable moments and consider comprehensive K-12 curriculums.