Detecting and Responding to Safety Issues in Online Educational Virtual Worlds Diego Fernando Gutierrez Aponte -- Student ID: 42577713 Deborah Richards.

Slides:



Advertisements
Similar presentations
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Haygrove School – E Safety Induction E Safety Update #protecting your professional identity.
The Dangers of Cyberbullying By: Rosanne Haberman Coordinator of Guidance and Counseling.
CYBER BULLYING An Overview CYBER BULLYING IS… The use of electronic communication technologies to intentionally engage in repeated or widely disseminated.
Cyber Bullying The newest form of bullying.. What is cyber bullying?  Being cruel to others by sending or posting harmful material using technological.
Forms of Cyberbullying
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
Cyberbullying Simple Guidelines for Parents, Teachers, and Students January 17, 2007.
Cyberbullying Donna Kozica, LCSW Social Work Department Chairperson.
Presentation Secondary School Wexford Anti-Bullying Campaign BULLYING IS DELIBERATE, REPEATED HURTFUL BEHAVIOUR If you see it don’t support it! RECOGNISE.
Co-funded by the European Union The challenge of cyber-bullying Current situation and counter-measures by the Safer Internet Centre Germany VI. International.
Stop Cyberbullying By Hayden Jordan and Arman. Table of contents  Anonymity  Pseudonym  Flaming  Cyber stalking  Exclusion  Harassment  Masquerading.
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
The ultimate guide to cyber- bullying.. Cyber-bullying is the use of electronic information and communication to bully or otherwise harass an individual.
CYBERSAFE – PARENTING ONLINE. CYBERBULLYING DEFINITION: intended, deliberate, repeated, virtual hostile behaviour with the usage of ICT FORMS: Denigration.
Harsher Punishments for Cyberbullies By: Janeca Latore Section 001.
Cyberbullying Just because they can’t hear you, doesn’t make it any different March 2009.
Cyber Bullying Welcome to our Parent Power night. I hope you will find the evening helpful and informative. Mrs. Fleming is very proactive and very much.
CyberSafety A Lesson in CYBERWORLD Culture, Customs, Culture, Customs, Language, and Safety.
What you should know as parents by Charles McKinley Parents’ Technology Night, 2013, sponsored by your PTSO.
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
Cyberbullying Issues Social Media What is Cyberbullying? Definition Excerpts  An emerging phenomenon prevalent among adolescents  Harassment and bullying.
Module 1: Bullying Awareness Training. Learning outcomes of Module 1  Learning about workplace bullying  Learning about cyber-bullying  Get to know.
Fil Santiago Director of Staff Development and Technology West Orange Public Schools.
ON LINE SAFTEY AND CYBER BULLYING DO U NO WHO R U TLKG 2?
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
 ❂ Cyber bullying is a mean or threatening  ❂ Cyber bullying is forwarding a private IM communication to others  ❂ Cyber bullying is a humiliating.
Rage Reaction: What do you know about cyber-bullying?
CYBERBULLYING. What is it? Cyber bullying is bullying or harassment that happens online. It can happen in an , a text message, an online game, or.
Cyber Bullying By Kevin Nolde
Cyberbullying. Bullying vs. Cyber bullying Bullying is repeated aggressive behavior that is intentional and involves an imbalance of power or strength.
1. ONLINE. Bullying behaviour is no longer restricted to the school yard. It is often online, out of sight and earshot of teachers and parents.... ONLINE.
Cyberbullying Online Social Aggression Guidelines for Educators.
August 24 th 2011 Digital Citizenship. Cell/Smart phones Slates and Tablets Social Network Sites Video Conferencing Online Gaming.
Cyber Bullying By Sarah Chaouk and Astede Woldegebriel.
1 CYBER SAFETY.  Online Actions  Offline Consequences  What you type, say, or do online can have a short and/or long-term effect on your life. 2.
World of Technology Pam Bennett, Marcia Robie, Andrea Schakle.
By Tyanna Paling and Manpreet Gill
Berkeley Unified School District Cyber Savvy social networking and netiquette.
By: Desmond Seaton. Anonymity is when someone makes mean and threating comments to you, but is able to keep anonymous. Anonymity can include the use of.
CYBER BULLYING!. WHAT IS CYBER BULLYING? Cyber bullying affects many adolescents and teens on a daily basis. Cyber bullying involves using technology,
“REAL WORLD CRUSADES AGAINST CYBER BULLING” “This Ain’t No Bull”
Socializing Online b Can help kids connect with friends and family b But you might share too much information b Or you might hurt someone’s feelings b.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Outing is when someone forwards a message to the public that was sent to them by another person. Many bullies often tend to print out online conversations.
 The use of new media to harass, threaten, humiliate, embarrass, or target another person.  It only occurs among young people (adults involved: cyber-harassment.
 It is the use of technology such as a computer or cell phone to harm someone.  It occurs when someone is threatening, making fun of, or humiliating.
Stop Cyberbully By josh.h. anonymity Definition:  the state and quality of being anonymous  example of anonymity bullying when someone text something.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
By: Delaney Syme and Megan Eglin.. When there is a very intense argument going on in a chat room or over texts it is called flaming. The bullies that.
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
Special Project Cyber bullying Issues By: Abby Heim.
CYBERBULLYING Bullying that takes place using electronic technology Bullying that takes place using electronic technology. Is an issue that need to be.
Protecting Children from Bullying and Cyberbullying: Awareness Raising and Public Policies: Some examples from Ireland Brian O’Neill Dublin Institute of.
Cyberbullying Internet Safety. What is Cyber-bullying? Cyber-bullying is repeatedly hurting someone else through the use of technology. So, instead of.
Internet Safety. Online Concerns: Contact Content Conduct.
Cybersafety 4 Kids: Smart Moves in an Online World.
Cyberbullying project
What Is Bullying? Bullying is defined as the repetitive, intentional hurting of one person or group by another person or group where the relationship.
E-safety Staying safe online 2017/18.
Pics, Flicks, and Sexting
Cyber Bullying 1. ONLINE.
Teaching Internet Safety
Conyers Middle School Advisement Lesson October 20, 2014
Cyber Bullying.
Issues With Internet in College
Brian O’Neill Dublin Institute of Technology 9/10 May Florence
Bullying, Cyber-Bullying, Internet Safety
What it is, how to spot it, and how to respond to it
Presentation transcript:

Detecting and Responding to Safety Issues in Online Educational Virtual Worlds Diego Fernando Gutierrez Aponte -- Student ID: Deborah Richards -- Supervisor

Abstract 2 Children and teenagers are increasingly spending more time on virtual worlds (VW) for educational purposes and to have fun and build friendships. Online activities have some threats though and virtual worlds are not the exception. This project studies the literature of issues related to online virtual worlds, especially educational ones, and their consequences to then compare current solutions designed to detect and respond to them. Finally, some recommendations are provided to attempt approaching in a more efficient and effective way those issues and provide therefore safer educational and non-educational virtual worlds. ITEC /06/2012

Outline 3  Main issues in Online Educational and Non-Educational Virtual Worlds.  Consequences  Comparison of current solutions to the issues  Potential technology-based solutions  Conclusions ITEC /06/2012

Issues in Online Educational and Non- Educational Virtual Worlds 4  Cyber bullying Figure 1: Bullying content/uploads/2012/04/bullying.jpg content/uploads/2012/04/bullying.jpg Figure 2: Cyber bullying 2/02/main_cyberbullying.jpg 2/02/main_cyberbullying.jpg

Findings on Cyber bullying 5  Perpetrators think they cannot be caught.  Fake or real stories from the victim go public (e.g. gossips and rumours).  It may happen 24/7.  Photos and videos might be more distressful than comments.  It may affect also children with special needs. ITEC /06/2012

Means and devices used for cyber bullying 6  Instant Messaging IM (computers, tablets and smart phones)  Forums  Chat rooms  Social Networks  Web pages and blogs  Wikis  Text Messages (SMS & MMS via any mobile phones). ITEC /06/2012

Types of Cyber bullying 7  Flaming  Online Harassment or Cyber harassment  Denigration  Impersonation  Masquerading  Outing and Trickery  Exclusion/Ostracism ITEC /06/2012

Cyber threats 8  Figure 3: Cyberthreats ( fear-safeguards-against-cyber-bullying-are-not-enough/) fear-safeguards-against-cyber-bullying-are-not-enough/ ITEC /06/2012

Types of cyber threats 9  Direct Threat: threats that show in a clear and specific way the intention of hurting someone else or themselves and have a current plan to implement or execute it.  Distressing Material: threats where there is not a concrete plan that hints where this potential event may occur ITEC /06/2012

Cyber stalking 10 Cyber stalking is indeed very similar to cyber harassment and cannot be clearly defined by some authors; however, it is suggested that cyber stalking involves much more threats than harassment. To make this clearer, some authors suggest that cyber stalking is linked with problems in relationships. ITEC /06/2012

Consequences 11  Life threatening consequences  Legal consequences  Other consequences ITEC /06/2012

Comparison of Current Solutions and Strategies 12 Non-technology solutions Policy-based solutions Raising Awareness Contacting Parents and school Promote appropriate use of technology Activities to teach students, teachers and parents. Supervision ITEC /06/2012

Comparison of Current Solutions 13 Technology Solutions  Saving the evidence  Ignore block and/or react  Request to the admin of the website or social network to remove offensive material.  Filtering websites  Monitoring and tracking ITEC /06/2012

Comparison of Current Solutions (Technology and Non-technology solutions) 14 Hybrid Solutions  FearNot!  Superclubsplus project (Australia)  Know IT All (KIA) ITEC /06/2012

Know IT All for Parents 15ITEC /06/2012

Potential technology-based solution 16 Potential strategies  The dialog agent system ITEC /06/2012

Possible Solution 17 Recommendation/prototype  Ultimate Recommended Solution against Cyberbullying  Unstructured Information Management Architecture UIMA : texting analytics to detect cyber bullying.  Filtering of websites out of the educational VW unless request.  Online counsellor, such as expert psychologist on cyber bullying and its consequences.  Finally, take actions on the educational VW and further actions if necessary on the real world. ITEC /06/2012

Conclusions 18 Summary and final remarks  Cyber bullying is as much as common than traditional bullying.  Parents are not entirely aware of their children activities on virtual worlds.  Governments around the world are starting to create regulations that cover cyber bullying.  Technology and non-technology based-solutions are complementary to prevent, detect and respond to the issues. ITEC /06/2012

Future Work 19  We acknowledge that there is a need to make more efficient and effective solutions.  Technology based-solutions may need more focus on cyber bullying rather than cover just specific aspects of e- safety.  Researchers may attempt to work on solutions for children and teenagers with special needs who might not have the same capacities to detect and respond to cyber bullying attacks. Furthermore, the solutions may need specialised multimedia material to engaged them into technological solutions advised for expert supervision. ITEC /06/2012