Presentation is loading. Please wait.

Presentation is loading. Please wait.

Internet Safety Summit Hill School District 161. Digital Citizenship A digital citizen is “someone who is able to think critically about the ethical opportunities.

Similar presentations


Presentation on theme: "Internet Safety Summit Hill School District 161. Digital Citizenship A digital citizen is “someone who is able to think critically about the ethical opportunities."— Presentation transcript:

1 Internet Safety Summit Hill School District 161

2 Digital Citizenship A digital citizen is “someone who is able to think critically about the ethical opportunities and challenges of the ‘digital world’ and make safe, respectful, and responsible choices” (Common Sense Media, 2010). A digital citizen is “someone who is able to think critically about the ethical opportunities and challenges of the ‘digital world’ and make safe, respectful, and responsible choices” (Common Sense Media, 2010).

3 Attributes of a Good Digital Citizen Respect others (doesn’t respond to or post negative comments) Respect others (doesn’t respond to or post negative comments) Doesn’t steal (if you wouldn’t steal from a store, why steal music, movies, videos) Doesn’t steal (if you wouldn’t steal from a store, why steal music, movies, videos) Accepts personal responsibility (cell phones and Internet) Accepts personal responsibility (cell phones and Internet)

4 “P” Many tips for surfing the Internet safely start with the letter “P.” Students should know that anything posted online is both public and permanent, which is why it is important to think before you post. Many tips for surfing the Internet safely start with the letter “P.” Students should know that anything posted online is both public and permanent, which is why it is important to think before you post.

5 “P” Surfing Tips Public Public Permanent Permanent Personal Personal Private Private Password Protection Password Protection Privacy Settings Privacy Settings Permission Permission

6 Definitions Instant Messaging: Real time communication; one on one. Instant Messaging: Real time communication; one on one. Blogs: Websites kids create to share information about themselves. Popular blog sites are Facebook, My Space, Xanga and TagWorld Blogs: Websites kids create to share information about themselves. Popular blog sites are Facebook, My Space, Xanga and TagWorld Chat Rooms: Real time communication; amongst a group of people in a chat room (Including chat options on websites such as Webkinz and Club Penguin) Chat Rooms: Real time communication; amongst a group of people in a chat room (Including chat options on websites such as Webkinz and Club Penguin)

7 Instant Messaging Who may your kids accept IM’s from? What should they do if a stranger IM’s them? Do they have to ask you before adding someone to their buddy list? Who may your kids include on their buddy list? May they use IM while doing homework?

8 Blogs Make sure your kids know that they should: Make sure your kids know that they should: - Never post any personal information - Never post any personal information - Set their page to private - Set their page to private - Be careful about which photos they post - Be careful about which photos they post Are you OK with this form of communication? Are you OK with this form of communication? Will you read your kid’s blog? Will you read your kid’s blog?

9 Chat Rooms Ask your kids if they visit chat rooms. If so visit with them. Ask your kids if they visit chat rooms. If so visit with them. Are you comfortable with this form of communication? Are you comfortable with this form of communication? Are they allowed to chat with people they’ve met online? Are they allowed to chat with people they’ve met online? What should they do if someone they don’t know suggests a private chat? What should they do if someone they don’t know suggests a private chat? Do they have a personal profile? Do they have a personal profile?

10 Content Students also need to be aware of what information they are posting and how they are representing themselves online. Students also need to be aware of what information they are posting and how they are representing themselves online. Limit the amount of personal information Limit the amount of personal information Profiles, screen names, and addresses Profiles, screen names, and addresses In texts, photos and video In texts, photos and video Appropriate Self-Representation Appropriate Self-Representation

11 Web Acronyms ASLAge, Sex, Location ASLAge, Sex, Location BRBBe Right Back BRBBe Right Back F2FFace to Face F2FFace to Face IRLIn Real Life IRLIn Real Life LOL Laughing out loud LOL Laughing out loud POSParent Over Shoulder POSParent Over Shoulder WTGPWant to go Private? WTGPWant to go Private?

12 Dangerous websites: 1. Entice you to make an unwise purchase 2. Attempt to steal your personal information a. Credit card numbers b. Social security numbers c. Bank account numbers 3. Contain illegal or immoral content 4. Try to get your address to send unwanted later

13 SPYWARE One of the most commonly used devices cybercriminals use to steal information is software known as “spyware.” Secretly residing in your computer, some versions of spyware copy your keystrokes and then send this information to the cybercriminal. So when you type in passwords, usernames, bank account numbers and so on, the information is passed on to a person who can then access your various Internet accounts using the data they’ve stolen. Many people have had their identities pilfered by criminals who use spyware.

14 Identity Theft Identity theft is a major problem. In a recent year, 15 million people were victims of this crime and losses in the United States alone were estimated at more than 56 billion dollars. Identity theft victims may spend many months trying to straighten out the mess left by criminals who may clean out their bank accounts, run up massive charges on their credit cards and wreak other kinds of havoc with their ill-gotten information. The best way to foil cybercriminals who use spyware is to install an anti-spyware program on your computer. There are many such programs commercially available. Some Internet providers offer spyware for free.

15 Social Networking Sites Social network sites are popular, used by millions daily 1. Keep track of friends 2. Make plans 3. Share thoughts 4. Make new friends

16 What is Cyberbullying? When a child, preteen or teen is tormented, harassed, humiliated, embarrassed or otherwise targeted by any other person using the Internet or other digital communication technology When a child, preteen or teen is tormented, harassed, humiliated, embarrassed or otherwise targeted by any other person using the Internet or other digital communication technology

17 What’s the Difference?   Bullying 1) 1) School 2) 2) Direct (F2F) 3) 3) Limited Audience   Cyberbullying 1) Anywhere/Anytime 2) Anonymous 3) Larger Audience 4) More Kids Involved 5) Spreads Quickly 6) Victim NOT Participant 7) Permanent Record

18 The Reality   20.8% of kids have been bullied while online   14.3% have received mean or hurtful comments   13.3% have had rumors spread about them online   8.4% have been threatened over text   6.7% have had stolen passwords/someone impersonate them   5.0% had a mean or hurtful picture posted   Blog (Bash Boarding)   Create Web sites   Send Pictures   Send spyware and/or hack programs Cyberbullying Victimization, Random sample of year-olds from large school districts in Southern U.S., Cyberbullying Research Center, 2010, Hinduja, S. and Patching, J.W.

19 Cyberbullies: Definition of cyberbully: a person who harasses or creates hurtful communication in one or more ways: 1. On blogs 2. On website guest books 3. On I-M postings 4. In s 5. On cell phone messages

20 Cyberbully messages can have unintended consequences: 1. Suicide 2. Serious assault 3. Murder 4. School expulsion

21 Exploitation Who are kids and teens talking to online? Predators: Strangers One in seven U.S. teenagers who regularly log on to the Internet say they have received an unwanted sexual solicitation via the Web. Cyber Stalking/Cyberbullying: “Frenemies” 21% of students surveyed felt uncomfortable with an online conversation or text. Cyber Safety Survey: The Results, Office of the Illinois Attorney General, 2009

22 Safe Posting Tips: What to Post Use nickname only Use nickname only Change the zip code Change the zip code Use cartoons, drawings or avatars Use cartoons, drawings or avatars Make profile private Make profile private Ask permission to add a friend Ask permission to add a friend

23 Safe Posting Tips: What to Block First and last names First and last names Home telephone number Home telephone number Cell phone number Cell phone number Street address Street address Hometown/city of residence Hometown/city of residence Name of school Name of school Name of favorite playground or park Name of favorite playground or park Date of birth Date of birth Credit card numbers Credit card numbers Images that identify you, your school or your hometown Images that identify you, your school or your hometown

24 Cell Phone Usage 75% of all teens (12-17) have a cell phone 75% of all teens (12-17) have a cell phone 58% of 12-year-olds have a cell phone 58% of 12-year-olds have a cell phone 66% text message 66% text message 1/2 teens (50+ texts daily/1,500 monthly) 1/2 teens (50+ texts daily/1,500 monthly) 1/3 teens (100+ texts daily/3,000 monthly) 1/3 teens (100+ texts daily/3,000 monthly) Girls (100+ daily… MOST) Girls (100+ daily… MOST) Teens and Sexting, Pew Internet & American Life Project, 2009, Amanda Lenhart

25  NYS Division of Criminal Justice Services – Missing & Exploited Children Clearinghouse 25 Possible warning signs of children being bullied or bullying others. Complaining that other children or a group of children do not like them. Preoccupation with friendship concerns. Poor self-esteem. Feeling they are not as good as others. Not wanting to go to school or other activities. Spending a great deal of time on the computer. Being secretive about online activities.

26  NYS Division of Criminal Justice Services – Missing & Exploited Children Clearinghouse 26 Lacking interest and involvement with other kids. Acting like their group (clique) is superior. Bragging that they use the Internet to play practical jokes or steal other kids’ passwords as a joke. Continuing to make fun of other kids. Getting in trouble at school or in the community for inappropriate computer use. Adapted from Powertolearn.com

27  NYS Division of Criminal Justice Services – Missing & Exploited Children Clearinghouse 27 Dealing with Cyberbullying Preserve evidence – this is crucial for identifying the bully and making a case. Attempt to enlist assistance from the service provider. If able to identify the bully, contact him or her and/or parents. Use available blocking technology (i.e., block the user on IM, and chat.) In serious cases, seek assistance from the police (i.e., threats of physical harm, unrelenting or unable to stop.)

28  NYS Division of Criminal Justice Services – Missing & Exploited Children Clearinghouse 28 So… What Should Parents Do?

29  NYS Division of Criminal Justice Services – Missing & Exploited Children Clearinghouse Learn everything you can about computers, the Internet and related technology- Develop and maintain proficiency through use. Ask children to demonstrate Communicate with your children. Take time to discuss concerns; agree on ground rules. Understand their needs. Set reasonable expectations Place the computer in a “well-trafficked” area, not a child’s bedroom or a secluded area.

30  NYS Division of Criminal Justice Services – Missing & Exploited Children Clearinghouse Ensure that they do not divulge detailed personal information when completing “profiles” and minimize dissemination. 5. Keep ALL accounts in your name. 6. Know your child’s password(s) and screen name(s). Ensure that screen names do not provide information about his or her identity (e.g., Sarahsweet16.) Ensure that screen names do not provide information about his or her identity (e.g., Sarahsweet16.)

31  NYS Division of Criminal Justice Services – Missing & Exploited Children Clearinghouse Consider Use of Computer/Internet Management Software: Age-based access levels – Allows for various levels of access for different family members. Filtering and Blocking (incoming and outgoing.) Time Restrictions. Activity Logs - Parents can view logs that list web sites visited, web sites blocked, chat sessions… Software can even capture screen shots and messages to you if a rule is violated!

32  NYS Division of Criminal Justice Services – Missing & Exploited Children Clearinghouse Periodically review Internet bookmarks, history files, temporary Internet files and keyword searches. Also … what can it mean if history, keyword or temporary Internet files are cleared?

33  NYS Division of Criminal Justice Services – Missing & Exploited Children Clearinghouse33 Set Parental Controls

34  NYS Division of Criminal Justice Services – Missing & Exploited Children Clearinghouse 34 Warning signs. Elevate concern if your child: – Significantly increases on-line time. –Receives phone calls, , mail or packages from someone you don't know. – Quickly exits IM, chat, , websites and other activities when you are near. –Increases use of new slang words, inappropriate sexual knowledge, withdraws from family and friends. – Begins using new screen names, an online account belonging to someone else, etc. –Is reluctant to discuss activities or your concerns.

35 Resources Office of the Illinois Attorney General: Cyberbullying Web Site Office of the Illinois Attorney General: Cyberbullying Web Site “58% of kids admit someone has said mean or hurtful things to them…. Online– more than 40% say it happened more than once.


Download ppt "Internet Safety Summit Hill School District 161. Digital Citizenship A digital citizen is “someone who is able to think critically about the ethical opportunities."

Similar presentations


Ads by Google