Presentation is loading. Please wait.

Presentation is loading. Please wait.

I-SAFE America Professional Development Program. Mission: To educate & empower youth to safely and responsibly take control of their Internet experience.

Similar presentations


Presentation on theme: "I-SAFE America Professional Development Program. Mission: To educate & empower youth to safely and responsibly take control of their Internet experience."— Presentation transcript:

1 i-SAFE America Professional Development Program

2 Mission: To educate & empower youth to safely and responsibly take control of their Internet experience i-SAFE America

3 Introduction 1 in 5 children under 17 years has received unwanted sexual solicitation 1 in 33 children has received an aggressive solicitation to meet somewhere 1 in 4 children ages 10 - 17 has been exposed to pornography Consider This: - National Center for Missing and Exploited Children

4 Education Partner with School Districts and Law Enforcement Agencies Deliver Professional Development Program Provide K-12 curriculum mapped to standards and approved by DOJ Assist with Implementation and Expansion Planning Community Outreach Promote Youth Empowerment Activities Facilitate Parent Nights Host Community Leaders Meetings Assist communities in developing Internet safety events Introduction

5 i-SAFE Curriculum

6 Curriculum Overview

7 Critical thinking activities provide a focused, in depth analysis of specific Internet safety topics. Lessons are interactive and student centered, to encourage peer-to-peer discussions. Activities are incorporated that encourage students to share the message of how to travel safely on the Internet.

8 Curriculum Overview The curriculum meets the needs of: Students at different grade levels Students with different learning styles Teachers with different technology skills or preferences Classrooms with or without computers National Education Technology Standards (NETS) State academic standards in health and safety, language arts, social studies, and technology

9 Curriculum Topics CONCEPTSK – 45 – 89 – 12 CommunityXXX Cyber SecurityXXX Personal SafetyXXX Cyber PredatorsXX Intellectual PropertyXX K – 4 Curriculum:Includes three 20-minute lessons for each grade 5 – 8 Curriculum:Includes five 45-minute lessons for each grade 9 – 12 Curriculum:Includes five 45-minute webcast lessons, which will be available by spring 2004. Visit the Educators Page at www.isafe.org for current availability.

10 Curriculum Topics i-SAFE curriculum is designed to be age appropriate for each grade level. Suggested topics/terms to avoid: Rape Pedophile Molest Pornography Incest

11 Curriculum Topics 9 – 12 Curriculum Sample Access the webcast at www.isafe.org

12 Internet Safety Concepts

13 A Parent Overview of the Internet Safety Concepts Community Cyber Security Personal Safety Cyber Predators Intellectual Property

14 Community

15 Inappropriate Material Web Browsing Website Evaluation

16 Community There are over 3,000 hate sites on the Internet. There are over 100,000 sites that sell child pornography. There are a growing number of sites that provide instructions on how to produce destructive items. Consider This: -Simon Wiesenthal Center, The Red Herring, Loompanics.com

17 Community The Constitution protects Internet speech that is critical, annoying, offensive, or demeaning, as long as it does not include a direct threat or incite violence.

18 Community Summary How are young adults exposed to inappropriate online material? Advertisements Key Word Searches Typo Squatting How can youth take control of their online experience? Exit websites that are inappropriate Evaluate websites to determine appropriateness

19 Cyber Security

20 Spam E-mail Steganography Cyber Harassment Viruses and Hackers

21 Cyber Security E-mail Electronic mail. The exchange of computer stored messages by telecommunication.

22 Cyber Security 80% of youth ages 7-18 receive inappropriate e-mail on a daily basis. -Symantec Consider This:

23 Cyber Security Spam E-mail Unsolicited e-mail sent to a large number of addresses.

24 Cyber Security Steganography Covered writing. Hiding a message within an image, audio or video file. Used as an alternative to encryption because unlike encrypted messages, it is undetectable.

25 Cyber Security Cyber Harassment ! X

26 Cyber Security Popularone32001

27 Cyber Security Rather than just some people, say 30 in a cafeteria, hearing them all yell insults at you, its up there for 6 billion people to see… -David Knight victim of cyber bullying for close to a year.

28 Cyber Security Currently, 45 states have laws expressly prohibiting harassment conducted through the Internet, e-mail, or other electronic means. Consider This: -www.haltabuse.org

29 Cyber Security In 2002, what was the fastest growing crime in the United States?

30 Cyber Security It is estimated that as many as 1.1 million people were victims of identity theft in 2002. - www.consumer.gov Consider This:

31 Cyber Security Virus A virus is a piece of programming code usually disguised as something else that causes some unexpected and usually undesirable event.

32 Cyber Security Open a file that contains a virus… and you could unknowingly spread it to others..vbs.exe.scr

33 Cyber Security Can you spot the warning signals? What can you do?

34 Cyber Security Hacker Hacker is a general term used by some to mean a clever programmer and by others to mean someone who tries to break into computer systems.

35 Cyber Security Summary What precautions can you take against spam e-mail? Avoid opening suspicious e-mail. Beware of responding to or acting on spam e-mail. How can you avoid catching or spreading a virus? Dont open attachments from people you do not know. Beware of files with extensions such as.exe.,.vbs,.scr which commonly contain viruses. Install an antivirus software program and keep it updated.

36 Personal Safety

37 Instant Messaging Chat Rooms Screen Names Profiles Online Conversations

38 Personal Safety Instant Messaging: The ability to exchange text messages with other Internet users.

39 IM and Chat Rooms Buddy list Personal Safety

40 LOL BRB BWL DIKU DOM IPN PM CTN P911 PAL S^ Laugh out loud Be right back Bursting with laughter Do I know you? Dirty old man Im posting naked Private message Cant Talk Now Parent In the Room Watch Your Language Parents are Listening Sup/Whats up

41 Personal Safety 60% of online teens have received e-mail or instant messages from a perfect stranger. 63% of those have responded. - Pew Internet Project Consider This:

42 Personal Safety Screen Name A name used when communicating with others online. Online description of the user. Profile

43 Personal Safety Chat Room A website or service that provides a venue for communities of users with a common interest to communicate in real time.

44 IM and Chat Rooms

45

46 x@x.com

47 Personal Safety Consider This: 87% of Americans can be identified by their birth date, gender, and zip code. - Latanya Sweeny, Ph.D., Carnegie Mellon Data Privacy Lab

48 Personal Safety A/S/L? Age/Sex/Location

49 Personal Safety FBI Cyber Safety Tips for Kids and Teens Never reveal identifying information to people you do not know. Tell your parents if you come across information that makes you feel uncomfortable. Never arrange a face-to-face meeting without telling your parent or guardian. Remember people may not be who they say they are.

50 Personal Safety Summary How can personal information be revealed during online communication? Screen Names Profiles Conversations What personal information should not be revealed during online communication? Name Address Phone Number School Name

51 Cyber Predators

52 Characteristics Predator Tools Grooming Process

53 Cyber Predators 540,000,000 Internet Users 250,000 – 500,000 known pedophiles in the U.S. - U.S. Department of Justice Consider This:

54 Cyber Predators Common Characteristics Male Middle-aged College graduates Employed Previously or currently married

55 Cyber Predators Communication Development Chat Room Private Chat Instant Messaging E-mail Phone

56 Cyber Predators Similar Interests Trust Secrecy Break Down Barriers Threats Face-to-Face Meeting

57 Cyber Predators Similar Interests Trust Secrecy Break Down Barriers Threats Face-to-Face Meeting X X X X X X X X X X X X X X X X

58 Cyber Predators Summary What forms of communication do online predators utilize? Chat Rooms Instant Messaging E-mail Phone What are the steps in the grooming process? Similar Interests Trust Secrecy Break Down Barriers Threats Face-to-Face Meeting

59 Intellectual Property

60 Public Domain Copyright Plagiarism Online Piracy

61 Intellectual Property Public Domain Any work that can be freely used or reproduced without authorization or credit.

62 Intellectual Property Copyright The exclusive right to a publication, production, or sale of the rights to a literary, dramatic, musical, or artistic work.

63 Intellectual Property RightsCopyright OwnerCopy Holders Read, listen to, or otherwise enjoy the work Reproduce the work Distribute copies of the work In the case of music, digitally transmit the work Give away a personal copy of the work Sell a personal copy of the work Publicly perform the work Publicly display the work X X X X X X X XX X X Copyright Laws

64 Intellectual Property The Internet and Intellectual Property Plagiarism Online Piracy

65 Intellectual Property Plagiarism The act of stealing or passing off the ideas or words of another as ones own.

66 Intellectual Property 54% of students admitted to plagiarizing from the Internet. 74% of students admitted that at least once during the past school year they had engaged in serious cheating. 47% of students believe their teachers sometimes choose to ignore students who are cheating. -Plagiarism.org Consider This:

67 Intellectual Property Online Piracy The traffic of online counterfeit copyrighted material. It is fast, cheap, and often anonymous.

68 Intellectual Property Yearly International Financial Loses: $12 billion lost annually by the computer software industry $3 billion lost annually by the movie industry $4.2 billion lost annually by the music industry worldwide. -SIAA, MPAA, RIAA

69 Intellectual Property Summary What is public domain? Any work that can be freely used or reproduced without authorization or credit. What can educators do to help prevent plagiarism? Teach appropriate techniques for citing works and text. Hold students accountable. What are the consequences for downloading music and software? Criminal penalties. Download a virus or inappropriate material.

70 Youth Empowerment Campaign

71

72 Student Mentors and Ambassadors Students spread the message of Internet safety with their peers, parents, and community.

73 How can YOU get students involved? Encourage the students to sign-up and get involved

74 i-SAFE works with local Parent Teacher Organizations to inform parents about the need for Internet safety. i-SAFE provides parents with materials and tips to educate their families about Internet safety. Community Outreach Campaign Parents

75 i-SAFE America, Inc. (760) 603-7911 education@isafe.org outreach@isafe.org www.isafe.org


Download ppt "I-SAFE America Professional Development Program. Mission: To educate & empower youth to safely and responsibly take control of their Internet experience."

Similar presentations


Ads by Google