CYBERSAFTEY 101 By: Tarrah Marcus INTRODUCTION  Acceptable Use Policies (AUP)  Policies that govern internet use  Cyberbullying  Technology based.

Slides:



Advertisements
Similar presentations
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Digital Citizenship Corbin Elementary.
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
INTERNET SAFETY.
Harmless Joke or Cyber-Bullying?
Cyber Bullying By B Bryant.
Boyertown Area School District Acceptable Use Policy.
Internet Safety and Kids Ms. Lee’s Classroom Computers are NOT bad Computers can be used to help kids learn and play. They can be used safely, if parents.
Concept: Internet Safety Who You Are ~ Learning About Yourself ~ Unit Essential Questions How can my principles, skills, and interests help me be successful.
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
Jana Dixon Dawson Educational Cooperative
Internet Safety Presented by Kevin Arnold Bancroft Elementary School April 13, 2015.
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Cyberbullying By: Kayla Banks EDF 204 Spring 2015.
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
Internet Safety Keeping Kids and Teens Safe
Cyber bullying is a form of bullying that takes place through technology. Cyber bullying can be used with phones, computers and tablets etc. Cyber bullying.
Internet Safety Part II CyberBullying. Judson Independent School District … strives to provide a safe, positive learning environment for students in our.
Digital Citizenship By: Miranda Scorver.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Welcome to Week 3 in the Mrs. DeRita’s computer lab!
Internet Safety & Online Citizenship
Do pictures always give truthful information? Can publishing it be hurtful??
Chat Room Safety How to keep your child safe!. Welcome Middle School Parents! You are about to begin your journey through Chat Room Safety! Pay close.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Our Acceptable Use Policy An Overview What is an Acceptable Use Policy (AUP)?
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Grades 4-6 Be SAFE Online! Ceres Unified School District.
Are you a digital citizen? Zeborah Ware 1. Table of Contents Definition of Digital Citizenship Page 3 Classroom Rules for Cell Phones Page 4 Social Networking.
Digital CitizenshipDigital Citizenship By Pinsinee Mekpanuwat (pin) Smita Jirayingcharoen (mudmee)
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
The Concerns  Acceptable Use Policies  Cyberbullying  Cyberpredators  Identity Safety  Piracy and Plagiarism.
Acceptable Use Policy By: Ashley Crehan Jessica Harmon Emily Edwards.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Welcome!! CyberBullying SkyCast. CyberBullying Today’s Aims: To create a therapeutic ‘online space’ during the SkyCast! To understand more about cyberbullying:
Cyberbullying: Student Page Title Introduction Task Process Evaluation
Developing an Acceptable Use Policy (AUP) EDTC 5325 Dr.Byrum Florence Yang.
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
Bullying What is it really?really. Bullying Defined Is unwanted, aggressive behavior Involves a real or perceived imbalance of power, Behavior is repeated.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Digital Citizenship.  I can…. What is digital citizenship?  Think.Pair.Share.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Category.
Danielle Hildebrant  Acceptable Use Policies ◦ document stating the use and limits of the network or internet  Cyberbullying ◦ Bullying that takes.
CyberBullying By Larry Ly. Cyber Bullying ● Cyberbullying is bullying that takes place using electronic technology. The following electronic devices used.
Digital Citizenship Grades 4-6
Digital Citizenship.
Cyberbullying BY LORD MUSHANGO.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
GOSSIP and CYBERBULLYING
Cyberbullying: Student Page Title Introduction Task Process Evaluation
Virtual Battles: Cyberbullies
Teaching Internet Safety
Issues In media studies: Cyberbullying
Cyber Bullying Among American Teenagers
Appropriate Use of Technology
Digital Citizenship.
GOSSIP and CYBERBULLYING
Cyber Bullying.
The Issues with Technology in education
Digital Citizenship.
Digital Citizenship.
Internet Safety By jinu.
CYBER BULLYING BY RODRICK HILTZ 2014.
Presentation transcript:

CYBERSAFTEY 101 By: Tarrah Marcus

INTRODUCTION  Acceptable Use Policies (AUP)  Policies that govern internet use  Cyberbullying  Technology based harassment  Cyberpredators  On-line stalkers  Identity Safety  Protecting shared information  Piracy, Plagiarism  Stealing and making it your own

ACCEPTABLE USE POLICIES  Acceptable Use Policies (AUP):  Written policies for schools, businesses, libraries, community centers, etc.  Helps restrict access  Keeps internal information safe  Reduces cyber attacks against students

POLICIES CONTINUED…  The National Education Association suggests an effective AUP contain the following six elements:  A preamble,  A definition section,  A policy statement,  An acceptable uses section, and  A violations/sanctions section.  Taken from Education World: Getting Started on the Internet: Developing an Acceptable Use Policy (AUP).Education World

CYBERBULLYING  According to Stop Bullying (2015) cyberbullying is bullying that takes place using electronic technologyStop Bullying Electronic Technology includes:  Devices and Equipment- Cell phones, computers and tablets  Communication Tools- Social media sites, text messages, chat, and websites  Examples of Cyberbullying:  Sending mean texts or s  Spreading rumors online  Posting embarrassing pictures and videos

CYBERBULLYING - Well Cast website for kids, teens and teachers Well Cast - Printable worksheets - Fun, Animated Videos across many content areas - VIDEO: How to Beat CyberbulliesHow to Beat Cyberbullies - Worksheet Worksheet Cyberbullying is different… - It can happen 24/7 - Anonymous - Rapid Spread of Information - Deleting posts is hard Effects are similar… - Alcohol and drug use - Poor grades - Lower self-esteem - Skip school - In-person bullying

CYBERPREDATORS  Any person can be a cyber predator  Ultimate goal of a face-to-face meeting  Potential purpose:  Molestation  Rape  Murder  Taken from Web Safety4Kids (2015)Web Safety4Kids

CYBER PREDATORS CONTINUED…  Two Categories:  Preferential Predators- actively seek out targets by…  Age, hair color, height, etc.  Jobs  Hijacking  Situational Predators  Not actively seeking out children, but will take advantage of situations  Predator warning signs:  Spends a lot of time online  Porn on the computer  Anonymous phone calls, gifts and mail  Withdraws from normal activity  Switches screen quickly  Uses other accounts for or instant messaging  Retrieved from Family Safe Computers (2011)Computers

IDENTITY SAFETY  Identity Safe Classroom  Acceptance of social identities  Build learning environments  Promote sense of belonging  Classroom to Internet  Encourage sharing  Set realistic expectations  VIDEO  Identity Safe Classrooms Identity Safe Classrooms  Places to belong and learn

IDENTITY SAFETY AND INTERNET Tips for Students:Tips for Teachers: - Don’t share personal information - Never meet with someone online - Use creative passwords  Use complicated passwords  Limit posts with photos  Do not open attachments  Be a role model

PIRACY  Piracy is the unauthorized use of another’s production (Merriam-Webster, 2015)  Common forms of Piracy:  Downloads, file sharing, copying, installing and distributing  Anti-piracy Warnings  Fines  Imprisonment  Both  Tips for Teachers: (Cyber Safety on Weebly)Cyber Safety  Always give credit  Create awarness in classrooms  Create activities

PLAGIARISM  Plagiarism is defined as to steal and pass off as one’s own (Merriam-Webster, 2015)  Student Code of Conduct:  Implications and violations  Tips for Teachers:  Educate students  Use resources and tools  Vaughan Memorial Library Vaughan Memorial Library

CONCLUSION  Strategies for Implementation:  Post Internet RULES and GUIDELINES in classroom  Model safe internet use  Use online resources  Attend workshops or trainings  Ask other educators

RESOURCES  Getting started on the internet: creating an acceptable use policy (2011). Retrieved from  Cyberbullying. Retrieved from  Video: How to beat cyberbullies. Retrieved from  Cyber Predators. Retrieved from  The facts about online predators. Retrieved from  What is identity safety? Retrieved from  Identity safety. Retrieved from  Cyber Safety. Retrieved from  You Quote It, You Note It! Retrieved from  Merriam-Webster Online Dictionary (2015). Retrieved from