Organizers and quest speakers: From left: Dr K. Padayachee, Dr E. Kritzinger, Prof S.H. von Solms, Ms M. Loock, Dr M. Ramorola, Prof M. Setati, Prof E. Smith, Prof T. Pistorius, Colonel J. Hefer, Mr S. Potgieter and Prof R. von Solms. Panel discussion: From left: Prof R. von Solms, Colonel J. Hefer, Ms S. Mocke, Mr S. Potgieter, Dr M. Ramorola and Prof S.H. von Solms. Online available: http://www.unisa.ac.za/Default.asp?Cmd=ViewContent&ContentID=24842 http://www.unisa.ac.za/Default.asp?Cmd=ViewContent&ContentID=24842 Completed initiatives – Seminar: Cyber safety 2010
E-Guidelines for School – DOE (2011) E-Guidelines have been approved. Available on the DOE Thutong website. First step from the DOE to assist in the topic. No other planned initiatives for cyber awareness While before cyber awareness will be integrated into the curriculum. An interim initiative is needed until cyber awareness is incorporated into the curriculum.
Problem Statement Enhancing cyber awareness amongst children, parents & teachers to decrease cyber threats. Aims Develop and distribute relevant cyber awareness material to school children, parents & teachers within South Africa.
Reasons for Cyber awareness Increase in broadband to Africa Increase in mobile phone – with web access Increase in cyber incidences Cyber divide Technological divide
Reasons for Cyber awareness In a survey conducted by Harris Interactive(R) for MacAfee (2008) the following statistics were obtained: (http://www.mcafee.com) (http://www.mcafee.com 63% of teenagers said they know how to hide what they are doing online form their parents, 32% are able to clear the browser history, 16% have created private e-mail and social networking profiles, 52% have given out personal information to somebody they do not know online, 20% have engaged in cyber bulling and 9% have used the Internet to cheat at school.
Initiative for 2011 - Workbook The workbook will: 1.... be in a hard copy format that will assist many schools that have limited computer access (if any). 2.... provide cyber awareness information. 3.... provide teachers/parents with guidance on how to make children aware of cyber threats. 4.... Provide activities for children.
Workbook (1) Plan of action: Design “Cyber Awareness image”. Design, print and distribute workbook. Obtain sponsors. Format: Hard copy The implementation of c-safety within South Africa is unique due to the huge range of diversity amongst culture, language, religions, wealth classes, access to knowledge and technology and no centralised e-learning policies and resource. (Czerniewics, 2010. Available: http://mfeldstein.com/mobile-is-my-soul-cell-phones-in-south-afric/a)
Workbook (1) The workbook can be translated into many different languages and will help teachers, parents and children to understand the content more easily. Workbooks can easily copied in school with no access to computers and printers or limited funds. Used with other initiatives for example internet day. Used for training of teachers.
Workbook (1) -Distribution The Independent Educator is circulated to approx. 37,000 teachers. This magazine also provides an opportunity to advertise on a web banner on their website. The website has an average of 1,500,000 visitors per month. Free 4 all is a magazine that is distributed to school children. Total distribution – 390 000 monthly. This magazine will be used to distribute a copy of the workbook to children.
Partners (2) Centre of Software Engineering - UNISAFilm and Publication Board National Research Foundation Microsoft (?)
CyberethicsCybersafetyCyber security Plagiarism Copyright Hacking Fair use File sharing Eetiquette protocols Posting incorrect information Cyberbullying Pirating Online gambling Gaming Internet addiction Online predators Objectionable content Cyberstalking Harassment Pedophiles Hate groups Pornography Unwanted communications Online threats Hoaxes Viruses Malicious code Junk email Chain letters Get-rich-quick schemes Scams Criminal hackers Hacktivists Malware Trojans Phishing Theft of identity Spoofing Privacy The NCSA advocates for cyber education programmes based on three key pillars: (http://www.staysafeonline.org/in-the-classroom/three-key-pillars).http://www.staysafeonline.org/in-the-classroom/three-key-pillars Workbook (2) - Topics
Workbook (2) - Example of a Topic The teacher magazine, 2010
Workbook (3) - Lesson Plans In most cases teachers also do not understand the topics. Teachers do not have access to internet to download lesson plans. Teachers do not syllabus to work from. Must provide teachers with guidance on how to address these issues.
Workbook (3) – Example of a lesson plans Overview Students explore a scenario in which a friendly relationship turns to a bullying one involving cell phones and computers. Objectives Analyze online behaviors that could be considered cyberbullying. Generate multiple solutions for dealing with a cyberbullying situation. Identify abbreviations and other textual clues to reduce cyberbullying. Introduce Ask: What are all the reasons and ways kids communicate with cell phones? (call friends, call parents for help, text message, take and send photos, go online, receive e-mails and instant messages) Real life problem: Cyberbullying: Not a Pretty Picture Jaleesa and Kim are friends at Jefferson Middle School. Kim tells Jaleesa that she doesn’t want to hang out with her any more. Jaleesa is angry and upset. She uploads a photo of Kim from her cell phone that was taken at a slumber party two weeks earlier. Jaleesa sends the photo to everyone on her buddy list with a message attached: “Kim is such a ****.” Activities: What is the problem? Think about the problem What is the solution Take action. Assess: The following items assess student mastery of the lesson objectives. Ask: What is cyberbullying? (It's when kids are intentionally and repeatedly mean to one another using cell phones or the Internet.) Ask: How can cyberbullying make kids feel? (It can make them feel angry, frustrated, sad, or afraid.) Ask: What kinds of abbreviations can kids use to prevent cyberbullying while text or instant messaging? (Answers will vary.)