Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cartoon by Peter Steiner. The New Yorker, July 5, 1993 issue (Vol.69 (LXIX) no. 20) page 61The New Yorker.

Similar presentations


Presentation on theme: "Cartoon by Peter Steiner. The New Yorker, July 5, 1993 issue (Vol.69 (LXIX) no. 20) page 61The New Yorker."— Presentation transcript:

1 Cartoon by Peter Steiner. The New Yorker, July 5, 1993 issue (Vol.69 (LXIX) no. 20) page 61The New Yorker

2 Internet Safety, Ethics & Etiquette  What is Web 2.0?  Are there guidelines for evaluating websites?  What is “fair use”?  What is social networking?  What is “cyberspeak”?  How can I keep my child safe while online?  What do the statistics show?  What is cyberbullying?  What resources are available?

3 The Read-Only Web (Web 1.0)  Powerful resource for parents, educators and students  Information moves one way only- from publishers to consumers  Information cannot be edited

4 The Read-Write Web (Web 2.0)  It is now as easy to create as it is to consume  Anyone can publish, share, and change information  Web 2.0 changes everything – including teaching and learning! Image from Time Magazine, Dec 25, 2006/Jan 1, 2007 issue

5 Blogs  Web + Log = weblog or “we blog”  Easy to create  Easy to update  Allow visitors to comment  If you can fill out a form, you can blog!

6 Wikis  Websites anyone can edit  If you can use a word processor, you can use a wiki  Visitors can see a history of changes and revert to earlier versions http://wikipedia.org/

7 Copyright 101 DISCLAIMER! The information provided in this workshop is NOT legal advice and should not, under any circumstances, be considered as such.

8 Some Copyright Facts  Anything that you produce is copyrighted as soon as you produce it  Categories include literary, musical, or artistic work  You own the rights to its reproduction, display, distribution, and adaptation to derivative works  Works before 1989 carry a copyright notice; works after 1989 do not

9 More Copyright Facts  File sharing peer-to-peer systems make it possible for people to exchange music, videos, photos, documents, software, and movies  P2P users directly connect to and download from another user’s computer and may unknowingly download harmful viruses and illegal material  Remember, you can be held criminally responsible for illegal file sharing  Cyberbee – Used by Library of Congress Cyberbee Copied with permission from NetSmartz

10 IM and Text Messaging Chat LOL DIKU PAL POS TMI CTN PM BWL BRB P911 PAW TTYL A/S/L

11 Social Networking - What’s the Appeal? Students can…  connect  Send messages to each other  Make friends outside their school and neighborhood communities  post pictures of themselves – and others  They can create online journals – blogs Let’s take a tour!

12 Social Networking – What Are the Benefits? Social Networking can…  Enhance communication skills  Improve writing skills  Spark creativity  Help people keep in touch with friends and extended family

13 Safer Social Networking  Create your own profile and add your children as friends  Have children set their profiles to private  Learn the site’s safety features  Examine their list of friends and browse their friends’ pages

14 What to Watch for? Grooming!  “Let’s go private!”  Where’s your computer in the house?  Who’s your favorite band? Designer?  I know someone who can get you a modeling job.  You seem sad. Tell me what’s bothering you.  I know a way you can earn money fast  If you don’t do what I ask, I’ll tell your parents/share your photos, etc. Sarah’s StorySarah’s Story (iSafe.org) *Grooming references from SafeTeen.com – How to Recognize Grooming

15 Safety Concerns  Way too much information – age, address, phone number, gender, family names, school, passwords  Inappropriate content  Inappropriate sharing  Trevor’s Story Trevor’s Story Adapted from http://www.staysafe.org/teens/videos/predator.html

16 Child Abuse Stats – Pete Riley Data from : Source:http://www.districtadministration.com/pulse/commentpost.aspx?news=no&postid=18080http://www.districtadministration.com/pulse/commentpost.aspx?news=no&postid=18080

17 Cyberbullying Concerns  Creating websites that have stories, cartoons, pictures, and jokes ridiculing others  Posting pictures of classmates online with intent to embarrass them  Engaging someone in IM (instant messaging), tricking that person into revealing sensitive personal information, and forwarding that information to others  Taking an embarrassing picture of a person using a digital phone camera and sending that picture to others  Broken Friendship Broken Friendship Adapted from http://www.netsmartz.org/resources/reallife.htm#realfriendshiphttp://www.netsmartz.org/resources/reallife.htm#realfriendship

18 Why Kids Cyberbully?  Often motivated by anger, revenge, or frustration  Sometimes done for entertainment  Out of boredom + too much time +too many tech toys  To torment others for self ego  To bolster social standing  Some even think they are righting a wrong http://new.csriu.org/cyberbully/docs/cbctparents.pdf

19 Cyberbullying Statistics  19% of teens report being harassed or bullied online  The incidence is higher among kids 16 and 17- year-olds at 23%  85% of incidents occur when youth are at home  In 44% of cases, children are harassed by their peers *Stats from NetSmartz.org

20 Safety Tips for Parents  Create an open dialog about online safety concerns  Set boundaries and time limits for online activities  Move computers into shared spaces & make monitors visible  Watch for Alt+F4 (Alt+Tab)  Check history (is it suspiciously blank?)  Beware of a reluctance to be candid

21 How and why do I check the web browser history? The web browser history lists the websites your child has visited recently It’s a useful resource for checking Internet activity Web browser histories are easy to change and delete, so they are not foolproof

22 Online Resources for Parents Three of our favorites:  iKeepSafe - Everything you need to keep your family safe online. Includes video and tips for protecting children online iKeepSafe  NetSmartz – Sponsored by Nat’l Center for Missing & Exploited Children NetSmartz  iSafe – Sponsored by US Dept of Justice iSafe Click for iSafe OverviewiSafe

23 Growing Bank of Resources

24 Q & A  Contact Information:  Gail Desler – Technology Integration Specialist gdesler@egusd.net gdesler@egusd.net  Kathleen Watt – EGUSD Web Specialist kwatt@egusd.net kwatt@egusd.net


Download ppt "Cartoon by Peter Steiner. The New Yorker, July 5, 1993 issue (Vol.69 (LXIX) no. 20) page 61The New Yorker."

Similar presentations


Ads by Google