Download presentation
Presentation is loading. Please wait.
Published byElfreda Bates Modified over 8 years ago
2
CYBERSAFTEY 101 By: Tarrah Marcus
3
INTRODUCTION Acceptable Use Policies (AUP) Policies that govern internet use Cyberbullying Technology based harassment Cyberpredators On-line stalkers Identity Safety Protecting shared information Piracy, Plagiarism Stealing and making it your own
4
ACCEPTABLE USE POLICIES Acceptable Use Policies (AUP): Written policies for schools, businesses, libraries, community centers, etc. Helps restrict access Keeps internal information safe Reduces cyber attacks against students
5
POLICIES CONTINUED… The National Education Association suggests an effective AUP contain the following six elements: A preamble, A definition section, A policy statement, An acceptable uses section, and A violations/sanctions section. Taken from Education World: Getting Started on the Internet: Developing an Acceptable Use Policy (AUP).Education World
6
CYBERBULLYING According to Stop Bullying (2015) cyberbullying is bullying that takes place using electronic technologyStop Bullying Electronic Technology includes: Devices and Equipment- Cell phones, computers and tablets Communication Tools- Social media sites, text messages, chat, and websites Examples of Cyberbullying: Sending mean texts or emails Spreading rumors online Posting embarrassing pictures and videos
7
CYBERBULLYING - Well Cast website for kids, teens and teachers Well Cast - Printable worksheets - Fun, Animated Videos across many content areas - VIDEO: How to Beat CyberbulliesHow to Beat Cyberbullies - Worksheet Worksheet Cyberbullying is different… - It can happen 24/7 - Anonymous - Rapid Spread of Information - Deleting posts is hard Effects are similar… - Alcohol and drug use - Poor grades - Lower self-esteem - Skip school - In-person bullying
8
CYBERPREDATORS Any person can be a cyber predator Ultimate goal of a face-to-face meeting Potential purpose: Molestation Rape Murder Taken from Web Safety4Kids (2015)Web Safety4Kids
9
CYBER PREDATORS CONTINUED… Two Categories: Preferential Predators- actively seek out targets by… Age, hair color, height, etc. Jobs Hijacking Situational Predators Not actively seeking out children, but will take advantage of situations Predator warning signs: Spends a lot of time online Porn on the computer Anonymous phone calls, gifts and mail Withdraws from normal activity Switches screen quickly Uses other accounts for e-mail or instant messaging Retrieved from Family Safe Computers (2011)Computers
10
IDENTITY SAFETY Identity Safe Classroom Acceptance of social identities Build learning environments Promote sense of belonging Classroom to Internet Encourage sharing Set realistic expectations VIDEO Identity Safe Classrooms Identity Safe Classrooms Places to belong and learn
11
IDENTITY SAFETY AND INTERNET Tips for Students:Tips for Teachers: - Don’t share personal information - Never meet with someone online - Use creative passwords Use complicated passwords Limit posts with photos Do not open email attachments Be a role model
12
PIRACY Piracy is the unauthorized use of another’s production (Merriam-Webster, 2015) Common forms of Piracy: Downloads, file sharing, copying, installing and distributing Anti-piracy Warnings Fines Imprisonment Both Tips for Teachers: (Cyber Safety on Weebly)Cyber Safety Always give credit Create awarness in classrooms Create activities
13
PLAGIARISM Plagiarism is defined as to steal and pass off as one’s own (Merriam-Webster, 2015) Student Code of Conduct: Implications and violations Tips for Teachers: Educate students Use resources and tools Vaughan Memorial Library Vaughan Memorial Library
14
CONCLUSION Strategies for Implementation: Post Internet RULES and GUIDELINES in classroom Model safe internet use Use online resources Attend workshops or trainings Ask other educators
15
RESOURCES Getting started on the internet: creating an acceptable use policy (2011). Retrieved from https://educationworld.com/a_curr/curr093.shtml https://educationworld.com/a_curr/curr093.shtml Cyberbullying. Retrieved from https://stopbullying.govhttps://stopbullying.gov Video: How to beat cyberbullies. Retrieved from https://watchwellcast.comhttps://watchwellcast.com Cyber Predators. Retrieved from https://websafety4kids.org/cyber-predator.phphttps://websafety4kids.org/cyber-predator.php The facts about online predators. Retrieved from https://familysafecomputers.org/predators.htm https://familysafecomputers.org/predators.htm What is identity safety? Retrieved from https://identitysafeclassroom.orghttps://identitysafeclassroom.org Identity safety. Retrieved from https://sites.google.com/site/cybersafetysite422/home/identity-safety https://sites.google.com/site/cybersafetysite422/home/identity-safety Cyber Safety. Retrieved from https://cybersafetyed.weebly.com/piracy-and-plagiarism.htmlhttps://cybersafetyed.weebly.com/piracy-and-plagiarism.html You Quote It, You Note It! Retrieved from https://library.acadiau.ca/tutorials/plagiarism/https://library.acadiau.ca/tutorials/plagiarism/ Merriam-Webster Online Dictionary (2015). Retrieved from https://merriamwebster.comhttps://merriamwebster.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.