HAZLETON AREA HIGH SCHOOL Internet Safety 9 th -12 th Grade.

Slides:



Advertisements
Similar presentations
Internet Safety in Schools
Advertisements

Don’t be bullied, or be a bully.
Technology SafeKEY.
Cyberbullying: Crossing the Line
Common Sense Unit 2 – Lesson 3 Category: Internet Safety.
Internet Online Safety How to have FUN and Stay in Control.
Safe Online Talk. Today’s Objective To be able to describe positive aspects of online talking and messaging, and to identify situations in which flirting.
Victoria ISD Common Sense Media Grade 10: Appropriate Online Behavior.
What you don’t know CAN hurt you!
This week is anti-bullying week.
e-safety and cyber bullying
Internet Safety Awareness
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Boston and Kesling Middle School  Bullying means overt, repeated acts or gestures including verbal or written communications transmitted;
+ An Introduction to Safety on the Internet 1 Material and Advice provided by:
Our Story Who am I? What makes me qualified to talk about anti- bullying? My personal story.
Bethel School District Board Policy I will be able to:  Identify bullying  Become aware of how to respond to a bully  Become aware of how to.
Bullying and Harassment
Bullying… What you can do about it. Who is Involved? Who are the three people involved in bullying situations? Definition of Bullying – “Bullying is when.
Hazleton Area High School/ Career Center/ Academy of Sciences.
IntroductionIntroduction Lesson 2: Risky Online Relationships The Internet thrives because people want to share with, learn from, and respond to others.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
YOU Only YOU Can Stop Internet Hazards NETS: 5. Digital Citizenship Students understand human, cultural, and societal issues related to technology and.
Intro: U TUBE VIDEO  “What to do when you’re bullied”
CYBERBULLYING. What is it? Cyber bullying is bullying or harassment that happens online. It can happen in an , a text message, an online game, or.
Have Fun – Stay Safe ‘E Safety’ – ‘Cyber Safe’. What is ‘Cyber Space’? The invisible space that we use to link ourselves to the internet or other people.
DIGITAL CITIZENSHIP/CYBER BULLYING.  Privacy - Protect Personal Information  Respect – Avoiding Cyberbullying, Plagiarism, Downloading Music Appropriately.
Do pictures always give truthful information? Can publishing it be hurtful??
Digital Citizenship Literacy
Cyber Bullying Texting/Instant Messaging Lesson One Social Development 1 8th Grade.
Unit 1: Turn Down the Dial on Cyberbullying and Online Cruelty 1.Intro:Intro: 2.Teach 1: Stacey’s StoryStacey’s Story 3.Teach 2: Dial DownDial Down 4.Wrap-UpWrap-Up.
XHS Students Web Tools 2.0 Class. Personal Information Passwords Make it hard for others to figure out Never give it to your friends Don’t use the same.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
STRANGER AWARENESS. CONCEPT : Think critically about developing relationships with people online EXPECTATIONS: You should be able to...  compare and.
Internet Safety KNOW HOW TO STAY SAFE ONLINE. You should never give out certain information over the internet.  Examples include:  Your last name 
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Cyberbullying 8/14/2013. Learning Target I can learn how to protect myself from cyberbullies. Success Criterion: – I can identify 3 types of cyberbullying.
Berkeley Unified School District Cyber Savvy social networking and netiquette.
CHAT ROOMS What Makes Them Dangerous And How YOU Can Make Them Safe! MARY B. CONYERS PROTECT EVERYCHILD P. O. Box 749, Knightdale, NC
What is it? & What can I do to prevent it?. Cyber bullying is when somebody is teasing, taunting, or harassing someone else over the computer. Whether.
Turn Down the Dial on Cyberbullying and Online Cruelty.
Cyberbullying: Crossing the Line. Today’s Objective:  You are going to analyze online bullying behaviors that “cross the line,” learn about the various.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
What’s Cyberbullying?. Today’s Objective: To be able to empathize with the targets of cyberbullying, recognize some of the key similarities and differences.
Digital Citizenship Cyberbullying & Online Cruelty
Does It Matter Who Has Your Data? 1.Intro 2.Teach 1: Travel Safety Rules 3.Teach 2: How to Protect Your Data 4.Wrap-Up 5.Assessment 6.Extension Activity.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
Freshman Seminar. Find kids through social networking, blogs, chatrooms, instant messaging, , discussion boards, and other websites. Try to seduce.
Screen Out the Mean!! What can you do when someone is mean to you online?
Your good friend enjoys uploading videos to the internet sharing top tips for Minecraft. Yesterday you went to check out his latest post and.
Common Sense Media FACTS Bell work: How does cyberbullying differ from face to face bullying?
PROTECT YOURSELF Cyberbullying. Why do you think people cyberbully? How does your school deal with cyberbullying? Have you ever sent a mean message because.
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
Protecting Your Privacy Online
Risky Online Relationships
Appropriate Use of Technology
Cyberbullying: Crossing the Line
Sometimes people don’t really understand just how much cyberbullying can hurt. Someone who is cyberbullied might: Feel sad and alone, like Lolo in the.
By Farhaan Khan (4 White)
Huntington Middle School Bully Awareness Plan
Risky Online Relationships
Does It Matter Who Has Your Data?
Lesson 4-3 Breaking Down Hate Speech
Online Safety Assembly.
Presentation transcript:

HAZLETON AREA HIGH SCHOOL Internet Safety 9 th -12 th Grade

Differentiate correlations between cyber and physical communities. Identify school policies applicable to cyber and physical bullying (HASD Policy 248 & 249). Identify Patterns between Issues related to cyber bullying and cyber ethics. Investigate how personal information may be collected by websites. Objectives All students will be able to:

Many different types of online interactions occur between people who don’t know each other in an offline setting. These interactions are sometimes positive, and at other times they can make us feel uncomfortable. On-line Interaction with Others What are some examples of positive interactions between strangers online? What are some examples of uncomfortable interactions between strangers online?

There are many different kinds of online encounters with strangers that may make us feel uncomfortable. Some are harmless and easy to laugh off or forget about. Other encounters might affect us, or our friends, more seriously. On-line Interaction with Others Online Predator: Someone who uses the Internet to lure innocent individuals into dangerous situations.

What are some common stereotypes of online predators? Many times, predators pretend to be kids online as they attempt to convince other kids to do things that they do not wish to do. They will attempt to gain kids’ trust and lure them to offline meeting places On-line Interaction with Others

THE TRUTH IS…… Teens are more likely to receive requests to talk about sexual things online, from other teens or from young adults (ages 18 to 25) than they are from older adults. The small percentage of adults that do seek out relationships with teens online are usually up-front about their age (and about their sexual interests). Teens who develop an ongoing, online connection with someone they do not know, or who are willing to talk about sexual things online, are more likely to find themselves in a risky online relationship. Risky online relationships don’t always involve total strangers; sometimes they involve people teens have initially met offline. On-line Interaction with Others

Certain conversations that take place online may seem exciting and/or flattering, but they also have the potential to be upsetting or may, in fact, become mentally abusive. Know that people may in fact say or do things online that they would neither say nor do in person. Know that many may feel used, uncomfortable, or even violated while chatting with people online – whether it’s with someone their own age or with someone who is older. In fact, it is important to know that people closer to your, in terms of age, are more likely to coax you into uncomfortable situations online or ask you to talk about inappropriate things. On-line Interaction with Others

Why might it be tricky for people to recognize when they are being manipulated, especially online? 1.Some people may try to manipulate you by pretending to be your friend, or they may attempt to make you feel understood and valued. 2. Manipulation involves telling you things you want to hear, and gradually winning your trust before trying to control you. On-line Interaction with Others

Change it up. If something feels like it might be getting risky, it probably is. But if you’re not sure, try changing the subject, making a joke, or saying you want to talk about something else. If you still feel pressured by or uncomfortable with the situation, you need to take further action. Log off or quit. You need to remember that at any time you can just stop typing and log off if a conversation gets uncomfortable online. You can also take action to block or report another user, or create a new account – whether for , IM, or a virtual world – to avoid contact with that person again. Know that it’s okay to feel embarrassed or confused. It’s not always easy to make sense of situations that make you uncomfortable online. Nor is it easy to ask for help if you feel embarrassed about what you’ve experienced. These feelings are normal, and it’s okay to talk about them. On-line Interaction with Others

Ricardo’s Story- Making Fun of Others On-line n-down-dial-cyberbullying-and-online-cruelty n-down-dial-cyberbullying-and-online-cruelty-9-10 Cyber-bullying Awareness -Do you think Ricardo is a cyber bully? Why or why not? -What does Ricardo mean when he says that “ information gets around really quick”? Have you ever encountered online cruelty? How do you think someone might feel after being the target of it?

Stacey’s Story- When Rumors Escalate n-down-dial-cyberbullying-and-online-cruelty n-down-dial-cyberbullying-and-online-cruelty-9-10 Cyber-bullying Awareness -Who was involved in the story and what roles did they play? Who was the target? Who were the offenders? Were there bystanders and/or upstanders? -How do you think the online cruelty might be different from offline behavior? -What do you think you might have done if you were Stacey? What could you have done if you wanted to be an upstander in this situation?

When you are the Target of cyber bullying, attempt to do the following: Ignore and/or block the bully. Change your privacy settings. Save the evidence. Tell trusted friends and adults. Cyber-bullying Awareness

What are some roles that different people play in cyber- bullying situations, and how would you describe each one? Target: The object of the online cruelty Offender: The person who tries to hurt or harass the target Bystander: A person who does nothing when they see something happening Upstander: A person who supports and stands up for someone else Cyber-bullying Awareness

Why is it important to be an upstander rather than a bystander? Cyber-bullying Awareness Bystanders are effectively allowing the target to be hurt and degraded by others; upstanders take whatever action they can to stop this unacceptable behavior.

In a few cases, led to teen suicides, attempted suicides, or teens stating that they want to take their lives. ABC News, “Cruel Kids, Tragic Ends” Cyber-bullying Awareness

How can up-standers help those who face online cruelty? How can they help defuse online cruelty before it escalates? Cyber-bullying Awareness Help the target. Tell the target you’re there for them. Point out the offender’s motivation to the target. De-escalate when possible

What should you think about before you post anything about another person online, in an instant message, text, or any other kind of digital message? Someone posts a picture of your friend with some nasty comments, and other kids make fun of him or her. What would a bystander do in this situation? What would an upstander do? What would you do? Aside from a target, who else can be impacted by online cruelty? Who else could be involved, implicitly or explicitly? Cyber-bullying Awareness Online cruelty can affect family, friends, significant others, teachers, as well as the dynamic of groups within and outside of schools, like sports teams, neighborhoods, etc.

Hazleton Area School District’s Bullying Policy / Policy 248- Unlawful Harassment For purposes of this policy, harassment shall consist of verbal, written, graphic or physical conduct relating to an individual's race, color, national origin/ethnicity, sex, age, disability, sexual orientation or religion when such conduct: 1. Is sufficiently severe, persistent or pervasive that it affects an individual's ability to participate in or benefit from an educational program or activity or creates an intimidating, threatening or abusive educational environment. 2. Has the purpose or effect of substantially or unreasonably interfering with an individual's academic performance. 3. Otherwise adversely affects an individual's learning opportunities.

Bullying means an intentional electronic, written, verbal or physical act or series of acts directed at another student or students, which occurs in a school setting, that is severe, persistent or pervasive and has the effect of doing any of the following: 1. Substantial interference with a student’s education. 2. Creation of a threatening environment. 3. Substantial disruption of the orderly operation of the scho ol. Hazleton Area School District’s Bullying Policy / Policy 249:Anti-Bullying

What kinds of information about yourself do you share online? What else do you do online that reflects who you are? Personal Information When you input information onto a website – such as profile information or search terms – you are forfeiting your privacy to that website. Companies and/or organizations running these sites will keep tack of the data you submit. In turn, these companies use the specific information entered to target students with specific content, especially advertising related to their interests.

One of the first companies to track and target users online was Amazon.com. It created technology that could match people’s preferences with other users whose buying habits were like their own, and make recommendations on that basis. Other companies, such as Netflix (which offers movies that you can order by DVD or stream online) and Pandora (which allows you to rate music in real time), have a similar model: Based on your choices, they try to determine your tastes. Then they recommend products that reflect those tastes. Personal Information

Do not provide addresses to mailing lists unless you need to do so. Unsubscribe from servers or websites that you do not regularly use. Limit the number of times you click on ads, no matter what they are for. Avoid “too good to be true” products, deals, and opportunities. Once you have confirmed your address, they are likely to sell your address to other companies. Make sure you have antivirus software, and that it also protects against spyware, programs that secretly collect your data. Personal Information

Disable Internet “cookies,” so that companies cannot put tracking devices on your computer. (Sites will not be able to remember your preferences as well this way, which is something to consider.) Investigate computer applications that block pop-up ads. Examine sites’ privacy policies before you reveal any information on the site; avoid using sites that will share your data with others. Personal Information

Resources