Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber Citizenship Managing Your Online Digital Reputation Glen Warren

Similar presentations


Presentation on theme: "Cyber Citizenship Managing Your Online Digital Reputation Glen Warren"— Presentation transcript:

1 Cyber Citizenship Managing Your Online Digital Reputation Glen Warren
Vice President of Governmental Relations California School Library Association

2

3

4 Cyber Citizenship Managing Your Online Digital Reputation Glen Warren
Vice President of Governmental Relations California School Library Association

5 No Access Yes Education Yes Access Yes Education
No Access No Education Yes Access No Education

6

7

8 Shift Happens Shift Happens iKeepSafe – Parents
Cybercitizenship.ning.com

9 Key Resource Points From Enforcing to Educating Holistic Approach
Fast Track Curricula Teachers, Parents, and Children

10 Who Wants your Student’s Attention

11 What Are They Doing? Social Producing Learning Social Rules
Designing Profiles Exploring Identity Writing Blogs Writing Software Codes Sharing and Producing Music Discussion Interests Social and Political Activism Keeping Friends Risk Assessment

12 What ELSE Are They Doing?
Seeking Validation Competing Popularity Venting Showing Off Embarrassing Self Crowded Isolation Damaging Reputation Pulling Pranks Getting Even Threatening Harassing Bullying

13 Digital Reflect Physical
82% of teens use social sites now 55% of students 12 to 13 91% Frequent Friends Connection 82% Rare Friends Connection 72% Make Plans with Friends 49% Make NEW Friends 17% Flirt

14 Cyber Safety – Obsolete Models
Cyber Safety 1.0 – Crime and Adult Content Cyber Safety 2.0 – Peer to Peer Harm Common Elements: One Size Fits All Fear Based Youth as Potential Victims Technology both problem and solution Social Media Highly Suspect Result: Power Down and Disconnect Effect

15 Power Down Effect

16 Two Separate Worlds Physical Digital

17 Connected Worlds Physical Digital

18 Legislation Catch Up

19 Citizenship: Holistic Approach
Four Perspectives Legislative Community Literacy Technology Enforcing Educating

20 The Need Holistic Approach
“The way to meet the challenges and opportunities the internet presents isn't to deny our children access to this great resource, but to make sure they know how to use it wisely. Just as we make sure our children know not to talk to strangers, not to bully kids on the playground, and not to give out their personal information, we have the same responsibility to teach them to apply these values online.” Sen. Robert Menendez, D-N.J, sponsor of The School and Family Education about the Internet (SAFE Internet) Act ($175 million grant program)

21 Educate Who? Librarians Teachers Parents Administrators
Law Enforcement School Counselors Everybody These activities come with some risks: Inappropriate Conduct: it’s anonymous online, and people – especially kids – can forget that their online actions can have real-world consequences. Inappropriate Contact: there are people online who have bad intentions – including bullies, predators, hackers, and scammers. Inappropriate Content: you may worry about what younger kids may run across – or what older kids might seek out.

22 Three Biggest Obstacles
“Powering Down” kids to come to school – we need to use the media they’re excited about Time and Resources – we are a support resource to make this happen Absence of appropriate elementary digital literacy curriculum (until now)

23 Cyber Bullying

24 Special Needs Acceptance

25 Office of Privacy Protection
Joanne McNabb California Office of Privacy Protection

26 Digital Citizenship Education
5th Grade and Up Copyright Focus AASL and ISTE Standards BY BYTES Jr. High

27 Cyber Smart Week Orange County Teacher Driven K to 12th Grade

28 FBI – SOS Program National Contest Student Data 5th to 8th Grades

29 Cyber Hero Woogi World Based Student Teacher School Data
K to 4th Grade cyberherowoogi password: cyberhero12

30 Safety Security Ethics Health

31

32 Free Parent Resource bulkorder.ftc.gov.

33 Digital Reputations Building a Digital Reputation
Both Digital and Physical World Negative Digital Reputations Striking Out Online Positive Digital Reputations Making a Difference These activities come with some risks: Inappropriate Conduct: it’s anonymous online, and people – especially kids – can forget that their online actions can have real-world consequences. Inappropriate Contact: there are people online who have bad intentions – including bullies, predators, hackers, and scammers. Inappropriate Content: you may worry about what younger kids may run across – or what older kids might seek out.

34 Talk To Your Kids Start Early Open and Honest Environment
Initiate Conversations Communicate Values Be Patient So keeping in mind these risks, the Federal Trade Commission wrote a guide for parents called Net Cetera. It’s based on the idea that the first step to protecting kids online is more about talking than technology. When kids want important information, they turn to their parents. This guide can help parents talk with their kids about being safe online.

35 Child Continuum Young Kids Tweens Teens Modeled Shared Verifed
So keeping in mind these risks, the Federal Trade Commission wrote a guide for parents called Net Cetera. It’s based on the idea that the first step to protecting kids online is more about talking than technology. When kids want important information, they turn to their parents. This guide can help parents talk with their kids about being safe online.

36 Socializing Online Young Kids Tweens Teens Woogi World FBI-SOS
Proactive Expression So keeping in mind these risks, the Federal Trade Commission wrote a guide for parents called Net Cetera. It’s based on the idea that the first step to protecting kids online is more about talking than technology. When kids want important information, they turn to their parents. This guide can help parents talk with their kids about being safe online.

37 Parent Influence Consequences Everyone Sees Permanence Privacy
Review Friends List Not An Adult Observations Uncomfortable Identity Theft Identity Protection Intellectual Theft Privacy Issues So keeping in mind these risks, the Federal Trade Commission wrote a guide for parents called Net Cetera. It’s based on the idea that the first step to protecting kids online is more about talking than technology. When kids want important information, they turn to their parents. This guide can help parents talk with their kids about being safe online.

38 Issues Sexting Cyber Bullying Phishing File Sharing Legal Issues
Consequences Response Plan Cyber Bullying Legal Issues Bystander Ethics Response Plan Phishing “You are a winner!” Protect Information Permission File Sharing “It’s FREE!” Legal Issues Consequences So keeping in mind these risks, the Federal Trade Commission wrote a guide for parents called Net Cetera. It’s based on the idea that the first step to protecting kids online is more about talking than technology. When kids want important information, they turn to their parents. This guide can help parents talk with their kids about being safe online.

39 Cyber Bullying Roles and Culture Victim Bully Harmful Bystander
Positive Bystander By the time kids are teenagers, many are ready for more independence from their parents. They’re starting to form their own values and reflecting those of their friends. But that doesn’t mean there’s no point in talking with them. Teens have access to the internet through their mobile devices, phones, their computers and their friends computers, so it’s really hard to watch what they do. It doesn’t hurt to reinforce ‘good citizenship’ messages with teens, along with three important messages that many need to hear: Not all information is credible: just because it’s posted, doesn’t mean it’s so. Once they post something, there’s no taking it back. It’s out there in the world. No matter how impersonal it seems, screen names, profiles and avatars belong to people with real feelings. Treat them the way you’d like to be treated.

40 Cyber bullying If your kid has a problem with a bully, don’t react to the bully Talk with a trusted adult Save the evidence Block the bully online Encourage each other to help stop cyberbullying – by not passing on other messages and telling the bully to stop. If your child has a problem with a bully, tell him or her not to react. Bullies are looking for a response, so don’t give them one. Encourage your kid to talk with you about what’s going on, and to help you save the evidence. If the bullying keeps up, share the record with the school or the police. If you ever fear for your child’s safety, immediately contact the police. Block the bully online: remove him or her from “friend” or “buddy” lists, and block the address. If your child’s social networking profile has been changed or created without his permission, get in touch with the company that runs the site to have it taken down. Tell your kid that she can help stop cyberbullying by telling the bully to stop, and by not passing on mean messages.

41 Glossary Avatar Blog Blocking Software Buddy List Cat Room COPPA
Cyberbullying Firewall GPS Hacking IM and IP Password File Sharing Phishing Privacy Settings Profile Sexting Spyware So keeping in mind these risks, the Federal Trade Commission wrote a guide for parents called Net Cetera. It’s based on the idea that the first step to protecting kids online is more about talking than technology. When kids want important information, they turn to their parents. This guide can help parents talk with their kids about being safe online.

42 Resources – Survey GetNetWise.org CyberBully411.org
CommonSenseMedia.org iKeepSafe.org NetSmarts.org WiredSafety.org StaySafeOnline.org The phone itself, as well as the mobile carrier, should give you some options about privacy settings and child safety controls. You often can turn off things like web access, downloading, or texting. Other phones let you set the number of minutes used, limit internet access, and provide number privacy. Ask your carrier what tools are available on your plan and your phone, and find out what they cost. (There may be extra charges for these features.) Do you know about social mapping? It’s GPS technology that’s in many cell phones now, and kids can use it to pinpoint where their friends are – or be pinpointed by their friends. Tell your kids to use this feature only with friends they know in person and trust – and not to broadcast their location to the world. You might want to check: some carriers have GPS services that let parents map their kid’s location.

43 Online Parent Seminar! Glen Warren
California School Library Association Vice President – Governmental Relations Phone: The phone itself, as well as the mobile carrier, should give you some options about privacy settings and child safety controls. You often can turn off things like web access, downloading, or texting. Other phones let you set the number of minutes used, limit internet access, and provide number privacy. Ask your carrier what tools are available on your plan and your phone, and find out what they cost. (There may be extra charges for these features.) Do you know about social mapping? It’s GPS technology that’s in many cell phones now, and kids can use it to pinpoint where their friends are – or be pinpointed by their friends. Tell your kids to use this feature only with friends they know in person and trust – and not to broadcast their location to the world. You might want to check: some carriers have GPS services that let parents map their kid’s location.

44 Cyber Citizenship Managing Your Online Digital Reputation Glen Warren
Vice President of Governmental Relations California School Library Association


Download ppt "Cyber Citizenship Managing Your Online Digital Reputation Glen Warren"

Similar presentations


Ads by Google