Presentation is loading. Please wait.

Presentation is loading. Please wait.

Let’s talk about Cyber Safety Internet Safety Training and Education Project Educational Service District 101 Brent Howard.

Similar presentations


Presentation on theme: "Let’s talk about Cyber Safety Internet Safety Training and Education Project Educational Service District 101 Brent Howard."— Presentation transcript:

1 Let’s talk about Cyber Safety Internet Safety Training and Education Project Educational Service District 101 Brent Howard

2 My Space Class for Adults…

3 Internet Safety Cyberbullying Social Networking Online Predators ID Theft Resources Cyber-bullying

4 We know about the great Internet

5 So, why be concerned? To meet requirements established under the Children’s Internet Protection Act (CIPA), 2000 Filtering: CIPA requires the implementation of a “technology protection measure” (filtering) to block access to visual depictions deemed “obscene,” “child pornography,” or “harmful to minors.” Internet Safety Policy: CIPA requires the adoption and enforcement of an “Internet safety policy” [that addresses] “monitoring the online activities of minors.”

6 An even bigger reason…our kids! 1 in 4 have had unwanted exposure to inappropriate pictures when online. Approximately 1 in 5 received a solicitation or inappropriate approach. 1 in 17 was threatened, harassed or bullied online. Only 25% of students who encountered a solicitation or inappropriate approach told a parent or guardian. Less than 10% of solicitations were reported to law enforcement authorities. David Finkelhor, Kimberly Mitchell and Janis Wolak. Online victimization: A Report on the Nation’s Youth. Alexandria, Virginia: National Center for Missing and Exploited Children, 2000, pg. ix.

7 …and our community. The Internet Crimes Against Children Task Force, FBI and the US Attorney’s Office of Eastern Washington have investigated and prosecuted a number of Internet predators from our own community. US vs L. Caulk, sexual predator in Clarkston, WA US vs T. Johnson, Express site director US vs C. Jungblum, high school counselor/coach US vs P. Lyons, superintendent US vs R. Perkins, deputy prosecutor US vs B. Rukke, McDonald’s employee Provided by the US Attorneys Office of Eastern Washington

8 Cyber-bullying “A day in the life of our students has changed”

9 Pop Quiz! FYA F2F ISO MMA P2P IPN CTN P911 PAL IRL Cyber-bullying

10 Kitchen (Ad Council)

11 Cyber-bullying Cyber-bullying: sending or posting harmful material or engaging in other forms of social aggression using the Internet or other digital technologies. Cyber-threats: Sending or posting direct threats or distressing material that raises concerns that the person may be considering committing an act of violence against self or others. (Nancy Willard, 2007)

12 Cyber-bullying

13 Activities Text/picture Messaging E-mail Instant Messaging Online communities/social network sites Chat Rooms Polls/rating sites Online Gaming

14 Cyber-bullying

15 Gossip G I HATE YOU!!! …give me your password… “I’m not on your top 3 – nice!” “…she’s such a cow…” I know how you and your group of friends is….your daughter is just like you…” “I’m gonna kick you’re a$&!!”

16 Cyber-bullying Did anyone see Wannabe at school today? I think the Ice Queen has permanently pushed her out of the Clique-maybe or maybe not. But I’m sure the Twins would have some say in it. Wannabe certainly wouldn’t want to go out without a bang. Anyway loves – Nothing much else happened today. Can’t wait to see you all tomorrow! Hugs&Kisses, Gossip G “//I won’t tell you who I am, but check up on my profile for the latest gossip CMS Students I Ah-bviously can’t tell you who I am, but I can tell you that I go to CMS – hmmm or maybe CHS….? People tell me things, I find out – I blog it here Known as; J Personality; as fake as the Chanel make-up you put on your face every morning. As sweet as an Ice princess Known for; Her Her gorgeous looks, and that’s about it… Signature; Bright topaz eyes, and perfect hair Love life; Lonely Boy Friends; B, and S are in her closely knit tight circle Prancing through the halls, stopping to wave at her admirers – while talking at high speed to B, S and whoever else might be following her at the moment. Her shiny brown hair (greasy?) is h4ung over her right shoulder, as her bright coffee eyes scan the area- while picking out the flaws of passerby’s.

17 Cyber-bullying Hello Loves, Halloween is tomorrow I wonder what everyone will be wearing… B looked pissed at the end of 7 th period – apparently she had to play goalie. Hmm lets all shed a tear for her. (Notice freshly dyed hair) J was caught throwing a fit in the hall today – over what you may ask? Ask her yourself. Apparently the Twins were both whispering to A and the Ice Queen about…me? I told you all I would never tell my name. B flirting with N again, I personally think he doesn’t like her that much – you all know it’s true. K was hugging one of the twins today. I wonder if it was the one who is going out with J- or are they still together? Looks like A got a haircut…the layers don’t really work for her. She would have been better off getting a dye job – or her highlights retouched. “//I won’t tell you who I am, but check up on my profile for the latest gossip CMS Students I Ah-bviously can’t tell you who I am, but I can tell you that I go to CMS – hmmm or maybe CHS….? People tell me things, I find out – I blog it here

18 Cyber-bullying

19 Hot or Not? (Polling Sites) Cyber-bullying

20 Impact of Cyberbullying More severe that face-to-face –Anonymous –24/7 –You can’t see me….I can’t see you… Affects school climate –Poor academic performance –Attendance issues –Student conflict Cyber-bullying

21 PBS: Growing Up Online Cyber-bullying

22 Cyberbullying Resources http://adcouncil.org http://www.netsmartz.org/education http://www.wiredsafety.org/ Cyber-bullying

23

24 Social Networking Bebo MySpace hi5 Facebook Livejournal YouTube Ustream Del.icio.us

25 Think before you post...

26 Social Networking 61% of 13-17 year olds have a personal profile on a social network site –50% of those included a picture –95% listed a personal email address –84% had a screen name used for IM Cyber-bullying

27 Who’s in your network?

28 `

29

30

31 www.azsexoffender.org: the State of Arizona, government - operated sex offender registration site.www.azsexoffender.org: the State of Arizona, government - operated sex offender registration site.www.azsexoffender.org Let’s look at another website that Danny uses

32

33 MySpace in the News KOMO News Story

34 Resource: KOMO MySpace News Video [2:30]

35 Social Networking Resources http://delicious.com/digitalsafety http://delicious.com/istep101 http://www.netsmartz411.org/ http://www.onguardonline.gov/ Cyber-bullying

36 Ad Council: Exchange Cyber-bullying

37 Cyber Predators 53% of students prefer to be alone online. 31% admit to chatting with someone they’ve never met in person. 14% had a face-face interaction with someone they met online –9% were 13-15 years old Only 4% of adult online predators pretend to be kids! Cyber-bullying

38 Amy’s Choice Cyber-bullying

39 What about the 4%? Cyber-bullying

40 Tracking Teresa Cyber-bullying

41 Signs to look for… Is your child spending an unusual amount of time on the internet alone? Has your child received any unexplained gifts in the mail? Does our child received phone calls from people you don’t know? Has your child withdrawn from their friends and family? Has your child had any unexplained absences from home or school? Does your child close the window they are viewing when you walk in the room? Is the internet history saved on your computer cleared more often than normal?

42 Internet Safety Resources http://netsmartz.org http://www.ikeepsafe.org/ http://www.atg.wa.gov/InternetSafety.aspx http://cybersmartcurriculum.org/ http://www.staysafeonline.org/ Cyber-bullying

43 Identity Theft Identity theft is the act of deliberately taking another person’s identity, generally for the purpose of performing a fraudulent act such as gaining access to that person’s finances, or to commit an offence or a crime anonymously or under the disguise of another identity.

44 Federal Trade Commission ID Theft Statistics 1 in 6 Americans will be a victim of identity theft this year In the last twelve months 9.9 million people have had identity theft crime committed against them. Victims spend on average $1,200 out of pocket and an average of 175 hours resolving problems caused by ID theft.

45 Who wants to steal your identity?

46 CitiBank ID Theft Solutions

47 ID Theft Criminals Targeting Kids? Peer-to Peer File Sharing Sites Pose a BIG RISK! "If teenagers are file-sharing music or movies (over P2P networks), who knows how many criminals might be sharing the family's personal information, credit cards, bank passwords and social security numbers with scheme operators who buy them." Safwat Fahmy, chairman and chief executive of SafeMedia Online Gaming Cheats Malicious Code (Viruses and Spyware have been developed that can run a invisible program on you computer – sealing any and all personal information on that machine.

48 How to Protect Yourself and Others from Identity Theft Protect your Social Security number Use caution when giving out your personal information Beware of wolves in sheep's clothing On-Line Job Hunting Protect your computer Use caution on the Web Ask questions Wireless Access Points

49 QUESTIONS?


Download ppt "Let’s talk about Cyber Safety Internet Safety Training and Education Project Educational Service District 101 Brent Howard."

Similar presentations


Ads by Google