Download presentation
Presentation is loading. Please wait.
Published byJonah Melton Modified over 9 years ago
3
The Concerns Acceptable Use Policies Cyberbullying Cyberpredators Identity Safety Piracy and Plagiarism
4
Acceptable Use Policies School-created policies Protect student information Supervise student activity Filtering Software (Roblyer and Doering, 2013, p. 19)
5
Acceptable Use Policies Click Here!
7
Cyberbullying 43% of kids bullied online 1 in 4 bullied more than once Nobullying.com. 2014
8
Click Here to learn how!
9
Cyberpredators
10
Warning Signs Spends a lot of time online Receives mail from unknown senders Uses other email accounts Socially withdraws Familysafecomputers.org, 2011
11
Help Minimize the Risk Click here
13
Identity Safety Don’t share personal information Don’t give out passwords Limit what you share Cybersafetyteameducation.com. 2014
14
How to Protect Yourself Identity Safety Tips
15
Piracy and Plagiarism
16
Plagiarism Steal and use as one’s own work Use without crediting Commit literary theft Violating Fair Use Laws Plagiarism.org. 2014
17
Piracy Copyright infringement Illegal downloading Illegal copying
18
Piracy and Plagiarism- Unethical See Here
19
Overall Message Protect our students Have parents and students sign AUP Help minimize cyberbullying and cyberpredators Keep students’ identity safe Reinforce plagiarism and piracy laws
20
The End
21
References List Barber, M. (2011, June 8). Why Plagiarism is Unethical [Video file]. Retrieved from https://www.youtube.com/watch?v=AGMeO9fMe1s Cyber Bullying Facts. (2014). Retrieved January 21, 2015, from http://nobullying.com/facts-about-cyber-bullying/ Flickr Images: Creative Commons. Retrieved from https://www.flickr.com/creativecommons Google Images: Creative Commons. Retrieved google.com/images Identity Safety. (2014). Retrieved January 21, 2015, from http://cybersafetyteameducation422.weebly.com/identity-safety.html Online Predators. (2014). Retrieved January 21, 2015, from http://www.familysafecomputers.org/predators.htm Online Predators: Help Minimize the Risk. (2014). Retrieved January 21, 2015, from http://www.microsoft.com/security/family-safety/predators.aspx Prevent Cyberbullying. (n.d.). Retrieved January 22, 2015, from http://www.stopbullying.gov/cyberbullying/prevention/ Roblyer, M.D., & Doering, A.H. (2013). Integrating educational technology into teaching. (6th ed.). Boston, MA: Pearson. Schoen, J. (2014, September 17). Acceptable Use Policy Explained [Video file]. Retrieved from https://www.youtube.com/watch?v=hKK9EYl5hdw What is Identity Safety. (2014). Retrieved January 21, 2015, from https://sites.google.com/site/cybersafetysite422/home/identity-safety What Is Plagiarism?. (2014). Retrieved January 21, 2015, from http://plagiarism.org/citing-sources/whats-a-citation
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.