Download presentation
Presentation is loading. Please wait.
Published byShannon James Modified over 7 years ago
1
Cyber Citizenship Managing Your Online Digital Reputation Glen Warren
Vice President of Governmental Relations California School Library Association
4
Cyber Citizenship Managing Your Online Digital Reputation Glen Warren
Vice President of Governmental Relations California School Library Association
5
No Access Yes Education Yes Access Yes Education
No Access No Education Yes Access No Education
8
Shift Happens Shift Happens iKeepSafe – Parents
Cybercitizenship.ning.com
9
Key Resource Points From Enforcing to Educating Holistic Approach
Fast Track Curricula Teachers, Parents, and Children
10
Who Wants your Student’s Attention
11
What Are They Doing? Social Producing Learning Social Rules
Designing Profiles Exploring Identity Writing Blogs Writing Software Codes Sharing and Producing Music Discussion Interests Social and Political Activism Keeping Friends Risk Assessment
12
What ELSE Are They Doing?
Seeking Validation Competing Popularity Venting Showing Off Embarrassing Self Crowded Isolation Damaging Reputation Pulling Pranks Getting Even Threatening Harassing Bullying
13
Digital Reflect Physical
82% of teens use social sites now 55% of students 12 to 13 91% Frequent Friends Connection 82% Rare Friends Connection 72% Make Plans with Friends 49% Make NEW Friends 17% Flirt
14
Cyber Safety – Obsolete Models
Cyber Safety 1.0 – Crime and Adult Content Cyber Safety 2.0 – Peer to Peer Harm Common Elements: One Size Fits All Fear Based Youth as Potential Victims Technology both problem and solution Social Media Highly Suspect Result: Power Down and Disconnect Effect
15
Power Down Effect
16
Two Separate Worlds Physical Digital
17
Connected Worlds Physical Digital
18
Legislation Catch Up
19
Citizenship: Holistic Approach
Four Perspectives Legislative Community Literacy Technology Enforcing Educating
20
The Need Holistic Approach
“The way to meet the challenges and opportunities the internet presents isn't to deny our children access to this great resource, but to make sure they know how to use it wisely. Just as we make sure our children know not to talk to strangers, not to bully kids on the playground, and not to give out their personal information, we have the same responsibility to teach them to apply these values online.” Sen. Robert Menendez, D-N.J, sponsor of The School and Family Education about the Internet (SAFE Internet) Act ($175 million grant program)
21
Educate Who? Librarians Teachers Parents Administrators
Law Enforcement School Counselors Everybody These activities come with some risks: Inappropriate Conduct: it’s anonymous online, and people – especially kids – can forget that their online actions can have real-world consequences. Inappropriate Contact: there are people online who have bad intentions – including bullies, predators, hackers, and scammers. Inappropriate Content: you may worry about what younger kids may run across – or what older kids might seek out.
22
Three Biggest Obstacles
“Powering Down” kids to come to school – we need to use the media they’re excited about Time and Resources – we are a support resource to make this happen Absence of appropriate elementary digital literacy curriculum (until now)
23
Cyber Bullying
24
Special Needs Acceptance
25
Office of Privacy Protection
Joanne McNabb California Office of Privacy Protection
26
Digital Citizenship Education
5th Grade and Up Copyright Focus AASL and ISTE Standards BY BYTES Jr. High
27
Cyber Smart Week Orange County Teacher Driven K to 12th Grade
28
FBI – SOS Program National Contest Student Data 5th to 8th Grades
29
Cyber Hero Woogi World Based Student Teacher School Data
K to 4th Grade cyberherowoogi password: cyberhero12
30
Safety Security Ethics Health
32
Free Parent Resource bulkorder.ftc.gov.
33
Digital Reputations Building a Digital Reputation
Both Digital and Physical World Negative Digital Reputations Striking Out Online Positive Digital Reputations Making a Difference These activities come with some risks: Inappropriate Conduct: it’s anonymous online, and people – especially kids – can forget that their online actions can have real-world consequences. Inappropriate Contact: there are people online who have bad intentions – including bullies, predators, hackers, and scammers. Inappropriate Content: you may worry about what younger kids may run across – or what older kids might seek out.
34
Talk To Your Kids Start Early Open and Honest Environment
Initiate Conversations Communicate Values Be Patient So keeping in mind these risks, the Federal Trade Commission wrote a guide for parents called Net Cetera. It’s based on the idea that the first step to protecting kids online is more about talking than technology. When kids want important information, they turn to their parents. This guide can help parents talk with their kids about being safe online.
35
Child Continuum Young Kids Tweens Teens Modeled Shared Verifed
So keeping in mind these risks, the Federal Trade Commission wrote a guide for parents called Net Cetera. It’s based on the idea that the first step to protecting kids online is more about talking than technology. When kids want important information, they turn to their parents. This guide can help parents talk with their kids about being safe online.
36
Socializing Online Young Kids Tweens Teens Woogi World FBI-SOS
Proactive Expression So keeping in mind these risks, the Federal Trade Commission wrote a guide for parents called Net Cetera. It’s based on the idea that the first step to protecting kids online is more about talking than technology. When kids want important information, they turn to their parents. This guide can help parents talk with their kids about being safe online.
37
Parent Influence Consequences Everyone Sees Permanence Privacy
Review Friends List Not An Adult Observations Uncomfortable Identity Theft Identity Protection Intellectual Theft Privacy Issues So keeping in mind these risks, the Federal Trade Commission wrote a guide for parents called Net Cetera. It’s based on the idea that the first step to protecting kids online is more about talking than technology. When kids want important information, they turn to their parents. This guide can help parents talk with their kids about being safe online.
38
Issues Sexting Cyber Bullying Phishing File Sharing Legal Issues
Consequences Response Plan Cyber Bullying Legal Issues Bystander Ethics Response Plan Phishing “You are a winner!” Protect Information Permission File Sharing “It’s FREE!” Legal Issues Consequences So keeping in mind these risks, the Federal Trade Commission wrote a guide for parents called Net Cetera. It’s based on the idea that the first step to protecting kids online is more about talking than technology. When kids want important information, they turn to their parents. This guide can help parents talk with their kids about being safe online.
39
Cyber Bullying Roles and Culture Victim Bully Harmful Bystander
Positive Bystander By the time kids are teenagers, many are ready for more independence from their parents. They’re starting to form their own values and reflecting those of their friends. But that doesn’t mean there’s no point in talking with them. Teens have access to the internet through their mobile devices, phones, their computers and their friends computers, so it’s really hard to watch what they do. It doesn’t hurt to reinforce ‘good citizenship’ messages with teens, along with three important messages that many need to hear: Not all information is credible: just because it’s posted, doesn’t mean it’s so. Once they post something, there’s no taking it back. It’s out there in the world. No matter how impersonal it seems, screen names, profiles and avatars belong to people with real feelings. Treat them the way you’d like to be treated.
40
Cyber bullying If your kid has a problem with a bully, don’t react to the bully Talk with a trusted adult Save the evidence Block the bully online Encourage each other to help stop cyberbullying – by not passing on other messages and telling the bully to stop. If your child has a problem with a bully, tell him or her not to react. Bullies are looking for a response, so don’t give them one. Encourage your kid to talk with you about what’s going on, and to help you save the evidence. If the bullying keeps up, share the record with the school or the police. If you ever fear for your child’s safety, immediately contact the police. Block the bully online: remove him or her from “friend” or “buddy” lists, and block the address. If your child’s social networking profile has been changed or created without his permission, get in touch with the company that runs the site to have it taken down. Tell your kid that she can help stop cyberbullying by telling the bully to stop, and by not passing on mean messages.
41
Glossary Avatar Blog Blocking Software Buddy List Cat Room COPPA
Cyberbullying Firewall GPS Hacking IM and IP Password File Sharing Phishing Privacy Settings Profile Sexting Spyware So keeping in mind these risks, the Federal Trade Commission wrote a guide for parents called Net Cetera. It’s based on the idea that the first step to protecting kids online is more about talking than technology. When kids want important information, they turn to their parents. This guide can help parents talk with their kids about being safe online.
42
Resources – Survey GetNetWise.org CyberBully411.org
CommonSenseMedia.org iKeepSafe.org NetSmarts.org WiredSafety.org StaySafeOnline.org The phone itself, as well as the mobile carrier, should give you some options about privacy settings and child safety controls. You often can turn off things like web access, downloading, or texting. Other phones let you set the number of minutes used, limit internet access, and provide number privacy. Ask your carrier what tools are available on your plan and your phone, and find out what they cost. (There may be extra charges for these features.) Do you know about social mapping? It’s GPS technology that’s in many cell phones now, and kids can use it to pinpoint where their friends are – or be pinpointed by their friends. Tell your kids to use this feature only with friends they know in person and trust – and not to broadcast their location to the world. You might want to check: some carriers have GPS services that let parents map their kid’s location.
43
Online Parent Seminar! Glen Warren
California School Library Association Vice President – Governmental Relations Phone: The phone itself, as well as the mobile carrier, should give you some options about privacy settings and child safety controls. You often can turn off things like web access, downloading, or texting. Other phones let you set the number of minutes used, limit internet access, and provide number privacy. Ask your carrier what tools are available on your plan and your phone, and find out what they cost. (There may be extra charges for these features.) Do you know about social mapping? It’s GPS technology that’s in many cell phones now, and kids can use it to pinpoint where their friends are – or be pinpointed by their friends. Tell your kids to use this feature only with friends they know in person and trust – and not to broadcast their location to the world. You might want to check: some carriers have GPS services that let parents map their kid’s location.
44
Cyber Citizenship Managing Your Online Digital Reputation Glen Warren
Vice President of Governmental Relations California School Library Association
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.