Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Concerns  Acceptable Use Policies  Cyberbullying  Cyberpredators  Identity Safety  Piracy and Plagiarism.

Similar presentations


Presentation on theme: "The Concerns  Acceptable Use Policies  Cyberbullying  Cyberpredators  Identity Safety  Piracy and Plagiarism."— Presentation transcript:

1

2

3 The Concerns  Acceptable Use Policies  Cyberbullying  Cyberpredators  Identity Safety  Piracy and Plagiarism

4 Acceptable Use Policies  School-created policies  Protect student information  Supervise student activity  Filtering Software (Roblyer and Doering, 2013, p. 19)

5 Acceptable Use Policies Click Here!

6

7 Cyberbullying 43% of kids bullied online 1 in 4 bullied more than once Nobullying.com. 2014

8 Click Here to learn how!

9 Cyberpredators

10 Warning Signs  Spends a lot of time online  Receives mail from unknown senders  Uses other email accounts  Socially withdraws Familysafecomputers.org, 2011

11 Help Minimize the Risk Click here

12

13 Identity Safety  Don’t share personal information  Don’t give out passwords  Limit what you share Cybersafetyteameducation.com. 2014

14 How to Protect Yourself Identity Safety Tips

15 Piracy and Plagiarism

16 Plagiarism  Steal and use as one’s own work  Use without crediting  Commit literary theft  Violating Fair Use Laws Plagiarism.org. 2014

17 Piracy  Copyright infringement  Illegal downloading  Illegal copying

18 Piracy and Plagiarism- Unethical See Here

19 Overall Message Protect our students Have parents and students sign AUP Help minimize cyberbullying and cyberpredators Keep students’ identity safe Reinforce plagiarism and piracy laws

20 The End

21 References List Barber, M. (2011, June 8). Why Plagiarism is Unethical [Video file]. Retrieved from https://www.youtube.com/watch?v=AGMeO9fMe1s Cyber Bullying Facts. (2014). Retrieved January 21, 2015, from http://nobullying.com/facts-about-cyber-bullying/ Flickr Images: Creative Commons. Retrieved from https://www.flickr.com/creativecommons Google Images: Creative Commons. Retrieved google.com/images Identity Safety. (2014). Retrieved January 21, 2015, from http://cybersafetyteameducation422.weebly.com/identity-safety.html Online Predators. (2014). Retrieved January 21, 2015, from http://www.familysafecomputers.org/predators.htm Online Predators: Help Minimize the Risk. (2014). Retrieved January 21, 2015, from http://www.microsoft.com/security/family-safety/predators.aspx Prevent Cyberbullying. (n.d.). Retrieved January 22, 2015, from http://www.stopbullying.gov/cyberbullying/prevention/ Roblyer, M.D., & Doering, A.H. (2013). Integrating educational technology into teaching. (6th ed.). Boston, MA: Pearson. Schoen, J. (2014, September 17). Acceptable Use Policy Explained [Video file]. Retrieved from https://www.youtube.com/watch?v=hKK9EYl5hdw What is Identity Safety. (2014). Retrieved January 21, 2015, from https://sites.google.com/site/cybersafetysite422/home/identity-safety What Is Plagiarism?. (2014). Retrieved January 21, 2015, from http://plagiarism.org/citing-sources/whats-a-citation


Download ppt "The Concerns  Acceptable Use Policies  Cyberbullying  Cyberpredators  Identity Safety  Piracy and Plagiarism."

Similar presentations


Ads by Google