Download presentation
Presentation is loading. Please wait.
Published byRandolph McLaughlin Modified over 8 years ago
2
Danielle Hildebrant
3
Acceptable Use Policies ◦ document stating the use and limits of the network or internet Cyberbullying ◦ Bullying that takes place on online Cyberpredators ◦ Sexual predators that use the internet, especially chat rooms to lure children Identity Safety ◦ Protecting online identity Inappropriate Content ◦ Content that doesn’t fit a norm or standard for children Piracy & Plagiarism ◦ Unauthorized use or copying and/or distribution of copyrighted material
4
Effective AUP Effective AUP ◦ A preamble ◦ A definition section ◦ A policy statement ◦ An acceptable uses section ◦ An unacceptable uses section ◦ A volitions/sanctions section Student and parents sign
5
Developing an acceptable use policy ◦ Not in a vacuum (Educational World) ◦ Based on philosophy Balance freedom and responsibility Students must be aware before being allowed to use the computer network or internet
6
Bulling that takes place thru the internet ◦ Instant Messaging ◦ Social Networking sites ◦ Cell phones Target any time and at any time Forms (National Center “cyberbullying”) Forms ◦ Flaming & tolling ◦ Happy Slapping ◦ Identity Theft/Impersonation ◦ Photoshopping ◦ Physical Threats ◦ Rumor Spreading
7
◦ Avoidance of the computer, cell phone ◦ Stressed when receiving and e-mail, instant message or text message ◦ Withdraws from family and friends ◦ Acts reluctant to attend school or social activities ◦ Avoids conversations about computer use ◦ Low self-esteem Depression Fear ◦ Poor eating and/or sleeping habits ◦ Declining grades
8
Think before you post anything Think before you post anything Nothing is private ◦ Sexting ◦ Explicit photos CyberPredators (FBI) ◦ Any age ◦ Any sex ◦ No general look such as the dirty old man
9
Are your children at Risk? ◦ Large amount of time online Especially in chat rooms or games that include chat Most of the time at night ◦ Someone sends pornography pictures ◦ Receiving phone calls from strangers
10
Refers to the practices and precautions observed to ensure safe internet use FCC leaves it up to each school district Broadband Data Improvement Act (Gurus of Cyber Safety) ◦ 2008 ◦ Protect students in 21 st century Sharing information can put you at risk (CyberSafety Team Education)
11
Sharing puts you at risk for: Identity theft Scams Spam Physical or emotional harm Checking credit reports frequently Protecting Children from ID Theft Protecting Children from ID Theft
12
Not all content online is appropriate for every child Appropriate and inappropriate content – equally accessible Sexually explicit Material Sexually explicit Material Other content (National Center “Inappropriate Content”) ◦ Graphic material ◦ Glorify risky and illegal behaviors
13
Video Games ◦ Violent content and/or images ◦ More and more realist What was once cartoon like or unrealistic is becoming very realistic Never give children a video game without first going thru it Never assume because the first one wasn’t violent that the new one wont be
14
Passing work off as your own that isn’t Hurts the student ◦ Doesn’t learn Note taking Evaluating source Selecting appropriate quotes Paraphrasing Citation 6 major consequences 6 major consequences
15
Piracy ◦ Unauthorized copying and/or distribution of copyrighted material Does include license infringement (BSA)license infringement ◦ Multiple computers – one license ◦ Sharing license information with others Civil and criminal penalties (BSA) Malware, ransom ware, spyware & viruses
16
Reporting pirated software Reporting pirated software Keep the computer in a common room Teach polite communication online ◦ Rude e-mails, messages or comments Talk about sexual victimization and potential on-line danger Parental controls Protect the computer with antivirus software
17
Baylor School Consequences of plagiarism (n.d) Retrieved October 25, 2014 from http://mail.baylorschool.org/~jstover/plagiarism/consequences.htm http://mail.baylorschool.org/~jstover/plagiarism/consequences.htm BSA The Software Alliance Compliance & Enforcement (2014). Retrieved October 25, 2014 from http://www.bsa.org/anti-piracyhttp://www.bsa.org/anti-piracy CyberSafety Team Education Identity Safety (n.d) Retrieved October 25, 2014 from http://cybersafetyteameducation422.weebly.com/identity-safety.html http://cybersafetyteameducation422.weebly.com/identity-safety.html Edtecher. Think before you post #2. (2009) retrieved October 25, 2014 from http://www.teachertube.com/video/think-before-you-post-2-9439 http://www.teachertube.com/video/think-before-you-post-2-9439 Education World. Getting Started on the Internet: Developing an Acceptable Use Policy (AUP) (1996-2014) Retrieved October 25, 2014 from http://www.educationworld.com/a_curr/curr093.shtml http://www.educationworld.com/a_curr/curr093.shtml Federal Bureau of Investigation A Parents Guide to Internet Safety (n.d). Retrieved October 25, 2014 from http://www.fbi.gov/stats-services/publications/parent-guide/parent-guidehttp://www.fbi.gov/stats-services/publications/parent-guide/parent-guide Guru’s of Cyber Safety identity Safety (n.d) Retrieved October 25, 2014 from http://www.gurusofcybersafety.weebly.com/identity-safety.html http://www.gurusofcybersafety.weebly.com/identity-safety.html iThenticate 6 Consequences of Plagiarism (1998-2014). Retrieved October 25, 2014 from http://www.ithenticate.com/resources/6-consequences-of-plagiarism http://www.ithenticate.com/resources/6-consequences-of-plagiarism National Center for Missing & Exploited Children Cyberbullying (2001-2014). Retrieved October 25, 2014 from http://www.netsmartz.org/Cyberbullyinghttp://www.netsmartz.org/Cyberbullying National Center for Missing & Exploited Children Inappropriate Content (2001-2014). Retrieved October 25, 2014 from http://www.netsmartz.org/InappropriateContenthttp://www.netsmartz.org/InappropriateContent Zoeller, Greg. Protecting Children from ID Theft. (2010). Retrieved October 25, 2014 from http://www.youtube.com/watch?v=KNIesTTBXD0 http://www.youtube.com/watch?v=KNIesTTBXD0
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.