Presentation on theme: "I-SAFE America Professional Development Program. Mission: To educate & empower youth to safely and responsibly take control of their Internet experience."— Presentation transcript:
Mission: To educate & empower youth to safely and responsibly take control of their Internet experience i-SAFE America
Introduction 1 in 5 children under 17 years has received unwanted sexual solicitation 1 in 33 children has received an aggressive solicitation to meet somewhere 1 in 4 children ages 10 - 17 has been exposed to pornography Consider This: - National Center for Missing and Exploited Children
Education Partner with School Districts and Law Enforcement Agencies Deliver Professional Development Program Provide K-12 curriculum mapped to standards and approved by DOJ Assist with Implementation and Expansion Planning Community Outreach Promote Youth Empowerment Activities Facilitate Parent Nights Host Community Leaders Meetings Assist communities in developing Internet safety events Introduction
Critical thinking activities provide a focused, in depth analysis of specific Internet safety topics. Lessons are interactive and student centered, to encourage peer-to-peer discussions. Activities are incorporated that encourage students to share the message of how to travel safely on the Internet.
Curriculum Overview The curriculum meets the needs of: Students at different grade levels Students with different learning styles Teachers with different technology skills or preferences Classrooms with or without computers National Education Technology Standards (NETS) State academic standards in health and safety, language arts, social studies, and technology
Curriculum Topics CONCEPTSK – 45 – 89 – 12 CommunityXXX Cyber SecurityXXX Personal SafetyXXX Cyber PredatorsXX Intellectual PropertyXX K – 4 Curriculum:Includes three 20-minute lessons for each grade 5 – 8 Curriculum:Includes five 45-minute lessons for each grade 9 – 12 Curriculum:Includes five 45-minute webcast lessons, which will be available by spring 2004. Visit the Educators Page at www.isafe.org for current availability.
Curriculum Topics i-SAFE curriculum is designed to be age appropriate for each grade level. Suggested topics/terms to avoid: Rape Pedophile Molest Pornography Incest
Curriculum Topics 9 – 12 Curriculum Sample Access the webcast at www.isafe.org
Inappropriate Material Web Browsing Website Evaluation
Community There are over 3,000 hate sites on the Internet. There are over 100,000 sites that sell child pornography. There are a growing number of sites that provide instructions on how to produce destructive items. Consider This: -Simon Wiesenthal Center, The Red Herring, Loompanics.com
Community The Constitution protects Internet speech that is critical, annoying, offensive, or demeaning, as long as it does not include a direct threat or incite violence.
Community Summary How are young adults exposed to inappropriate online material? Advertisements Key Word Searches Typo Squatting How can youth take control of their online experience? Exit websites that are inappropriate Evaluate websites to determine appropriateness
Cyber Security Rather than just some people, say 30 in a cafeteria, hearing them all yell insults at you, its up there for 6 billion people to see… -David Knight victim of cyber bullying for close to a year.
Cyber Security Currently, 45 states have laws expressly prohibiting harassment conducted through the Internet, e-mail, or other electronic means. Consider This: -www.haltabuse.org
Cyber Security In 2002, what was the fastest growing crime in the United States?
Cyber Security It is estimated that as many as 1.1 million people were victims of identity theft in 2002. - www.consumer.gov Consider This:
Cyber Security Virus A virus is a piece of programming code usually disguised as something else that causes some unexpected and usually undesirable event.
Cyber Security Open a file that contains a virus… and you could unknowingly spread it to others..vbs.exe.scr
Cyber Security Can you spot the warning signals? What can you do?
Cyber Security Hacker Hacker is a general term used by some to mean a clever programmer and by others to mean someone who tries to break into computer systems.
Cyber Security Summary What precautions can you take against spam e-mail? Avoid opening suspicious e-mail. Beware of responding to or acting on spam e-mail. How can you avoid catching or spreading a virus? Dont open attachments from people you do not know. Beware of files with extensions such as.exe.,.vbs,.scr which commonly contain viruses. Install an antivirus software program and keep it updated.
LOL BRB BWL DIKU DOM IPN PM CTN P911 PAL S^ Laugh out loud Be right back Bursting with laughter Do I know you? Dirty old man Im posting naked Private message Cant Talk Now Parent In the Room Watch Your Language Parents are Listening Sup/Whats up
Personal Safety 60% of online teens have received e-mail or instant messages from a perfect stranger. 63% of those have responded. - Pew Internet Project Consider This:
Personal Safety Screen Name A name used when communicating with others online. Online description of the user. Profile
Personal Safety Chat Room A website or service that provides a venue for communities of users with a common interest to communicate in real time.
Personal Safety FBI Cyber Safety Tips for Kids and Teens Never reveal identifying information to people you do not know. Tell your parents if you come across information that makes you feel uncomfortable. Never arrange a face-to-face meeting without telling your parent or guardian. Remember people may not be who they say they are.
Personal Safety Summary How can personal information be revealed during online communication? Screen Names Profiles Conversations What personal information should not be revealed during online communication? Name Address Phone Number School Name
Characteristics Predator Tools Grooming Process
Cyber Predators 540,000,000 Internet Users 250,000 – 500,000 known pedophiles in the U.S. - U.S. Department of Justice Consider This:
Cyber Predators Common Characteristics Male Middle-aged College graduates Employed Previously or currently married
Cyber Predators Communication Development Chat Room Private Chat Instant Messaging E-mail Phone
Cyber Predators Similar Interests Trust Secrecy Break Down Barriers Threats Face-to-Face Meeting
Cyber Predators Similar Interests Trust Secrecy Break Down Barriers Threats Face-to-Face Meeting X X X X X X X X X X X X X X X X
Cyber Predators Summary What forms of communication do online predators utilize? Chat Rooms Instant Messaging E-mail Phone What are the steps in the grooming process? Similar Interests Trust Secrecy Break Down Barriers Threats Face-to-Face Meeting
Public Domain Copyright Plagiarism Online Piracy
Intellectual Property Public Domain Any work that can be freely used or reproduced without authorization or credit.
Intellectual Property Copyright The exclusive right to a publication, production, or sale of the rights to a literary, dramatic, musical, or artistic work.
Intellectual Property RightsCopyright OwnerCopy Holders Read, listen to, or otherwise enjoy the work Reproduce the work Distribute copies of the work In the case of music, digitally transmit the work Give away a personal copy of the work Sell a personal copy of the work Publicly perform the work Publicly display the work X X X X X X X XX X X Copyright Laws
Intellectual Property The Internet and Intellectual Property Plagiarism Online Piracy
Intellectual Property Plagiarism The act of stealing or passing off the ideas or words of another as ones own.
Intellectual Property 54% of students admitted to plagiarizing from the Internet. 74% of students admitted that at least once during the past school year they had engaged in serious cheating. 47% of students believe their teachers sometimes choose to ignore students who are cheating. -Plagiarism.org Consider This:
Intellectual Property Online Piracy The traffic of online counterfeit copyrighted material. It is fast, cheap, and often anonymous.
Intellectual Property Yearly International Financial Loses: $12 billion lost annually by the computer software industry $3 billion lost annually by the movie industry $4.2 billion lost annually by the music industry worldwide. -SIAA, MPAA, RIAA
Intellectual Property Summary What is public domain? Any work that can be freely used or reproduced without authorization or credit. What can educators do to help prevent plagiarism? Teach appropriate techniques for citing works and text. Hold students accountable. What are the consequences for downloading music and software? Criminal penalties. Download a virus or inappropriate material.
Student Mentors and Ambassadors Students spread the message of Internet safety with their peers, parents, and community.
How can YOU get students involved? Encourage the students to sign-up and get involved
i-SAFE works with local Parent Teacher Organizations to inform parents about the need for Internet safety. i-SAFE provides parents with materials and tips to educate their families about Internet safety. Community Outreach Campaign Parents
i-SAFE America, Inc. (760) 603-7911 email@example.com firstname.lastname@example.org www.isafe.org
Your consent to our cookies if you continue to use this website.