The Cyber World Things to Think about…. Why is this important? We have several mobile lab units in our district where the classroom teacher is in charge.

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

Cyber Time First Grade.
Created by Katie C. Bradley Greenwood District 50.
 Cyberbullying is when a child, preteen, or teen is tormented, harassed, threatened, or otherwise targeted by another child using the Internet, interactive.
Keeping Your Child Safe on the Internet
When you or someone else uses a computer or cell phone to cause harm or distress to other kids, this is called.
Internet Online Safety How to have FUN and Stay in Control.
Definition Is when a child, preteen is tormented, threatened, harassed, humiliated, embarrassed, or otherwise targeted by another child, preteen, or teen.
What is Cyberbullying? Cyberbullying is when one person or a group of people aim to threaten, tease or embarrass someone else by using a mobile phone,
Cyberbullying Bullying with Technology. What is Cyberbullying??? Using , instant messaging, chat rooms, or other forms of information technology.
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
Harmless Joke or Cyber-Bullying?
BULLYING What Is The Definition of Bullying?
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
e-safety and cyber bullying
Cyber bullying Lara Climer and Michele Fesenbek. Interesting Tidbits  Over 87% of teens age use the internet  95% of parents do not understand.
The key aim for the week is: To ensure children are able to recognise and challenge bullying behaviour wherever it happens - whether face to face or in.
Internet Safety and Kids Ms. Lee’s Classroom Computers are NOT bad Computers can be used to help kids learn and play. They can be used safely, if parents.
CYBER BULLYING Cody O’Brien. Goals for Today’s Presentation Introduce Cyber bulling Identify forms of cyber bulling Steps to prevent it What to do if.
Internet Safety Awareness
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
CyberSafety A Lesson in CYBERWORLD Culture, Customs, Culture, Customs, Language, and Safety.
By: Sophia Dermouche & Maheen Khalid
Teenangel Gabriella. AIM is an instant messaging system. You have to be thirteen years old to use AIM. Besides sending messages, AIM is also used to tell.
STOP BULLYING NOW! KayeDee Smith and Kassidy Osbourne.
BULLYING It’s Everyone’s Problem. No Student Should Ever Be Bullied.
Bullying Presentation Created By: Michelle Zapotoski.
Judith Taylor.Technology tools.5AA
SEAL Say no to bullying.
Stay Safe in Cyberspace By: Mrs. Marple Never Give out personal information. Such as: Your home address Your phone number The name and location of your.
E-Safety Challenge College. Learning Objectives Understanding the definition of ‘cyber’ bullying and the affect it can have on the victim.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Intro: U TUBE VIDEO  “What to do when you’re bullied”
Do pictures always give truthful information? Can publishing it be hurtful??
Acceptable Use Policy and Internet Safety Training Mr. Chalmers, Media Specialist Southwest Middle School Used with permission from Kristin Seeger.
Cyber Bullying Texting/Instant Messaging Lesson One Social Development 1 8th Grade.
Internet Safety Blue Hills School. Internet Safety Use these Tips Don’t share your address, phone number, school name or your parents credit card number.
Cyber Bullying By Mrs. Giambri. What is Cyber Bullying? What is Cyber Bullying? ( What is Cyber Bullying? Cyber bullying.
XHS Students Web Tools 2.0 Class. Personal Information Passwords Make it hard for others to figure out Never give it to your friends Don’t use the same.
Be More…Tech Savvy A Workshop for Elementary Students about Internet Safety.
Online Safety 6th grade. Rules to know Protect your privacy Protect your password Protect the privacy of others Beware of contests, clubs, prizes, & gifts.
So what is…... B u l l y i n g ■ Punching, shoving and other acts ■Spreading bad rumors about people ■Keeping certain people out of a “group” ■Teasing.
By: Jithin and Rey.  Cyber bullying is a form of bullying, which is carried out through an internet service such as , chat room, discussion group,
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
Grades 3-5. Question #1  A) address and phone number  B) names of your friends  C) your school name and town you live in  D) All of the above Personal.
CYBER BULLYING!. WHAT IS CYBER BULLYING? Cyber bullying affects many adolescents and teens on a daily basis. Cyber bullying involves using technology,
CYBER BULLYING CODY KLARMAN. TYPES OF CYBER BULLYING Sending mean messages or threats to a person's account or cell phone Spreading rumors online.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Bullying and Harassment Andover YMCA Swim Team. What are... bullyingandharassment?
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
DIGITAL ETIQUETTE Teachers Students Quiz What is Digital Etiquette? What is Digital Etiquette? Social Networking Social Networking Cyber Bullying Cyber.
Bullying What is it really?really. Bullying Defined Is unwanted, aggressive behavior Involves a real or perceived imbalance of power, Behavior is repeated.
Internet Safety Mrs. Coots May th Grade Presentation.
What is it? Spreading rumors and gossip Posting pictures without consent Obtaining a password to assume a person’s identity Harassing or threatening.
Cyberbullying Internet Safety. What is Cyber-bullying? Cyber-bullying is repeatedly hurting someone else through the use of technology. So, instead of.
1. Read the following presentation and watch the videos for your grade level. 2. Write your name on your index card and answer the “Bob” questions at the.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
“Doing the Right thing online” Online Safety. Questions How many of you have like to go off by yourself and get on the internet? What do you like to use.
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Cyber and Internet Safety (Parents’ Night)
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
BULLYING
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Digital Citizenship Tech in TUSD.
Presentation transcript:

The Cyber World Things to Think about…

Why is this important? We have several mobile lab units in our district where the classroom teacher is in charge of what the students are doing. Most of us, have our own children or grandchildren who use the internet under our watch. Sometimes, bullying begins at school and carries over to their cell phones, chats, or s at home. The handbook next year will include a section on internet safety.

A digital native is a person who was born after the general implementation of digital technology and has had digital technologies over their entire lives. A digital immigrant is an individual who was born before the existence of digital technology and adopted it to some extent later.

Elementary Grades htmhttp:// htm “Chat” or type abbreviations tm

Pushing Send…

If you would be embarrassed by “anyone” finding out what you have sent, you should not be sending it!

Message from SD ICAC None of us would leave a child unsupervised in the middle of a large city and yet, frankly, the Internet is just like that city. Not all its streets are risky – the Internet is a great place for kids to learn and entertain themselves – yet we must all recognize that this particular “city” has a dark and dangerous side. Did you know that 1 in 4 kids today have received unwanted exposures to sexual materials while online? Did you know that 1 in 5 kids have received unwanted sexual solicitations, almost entirely from strangers, while online? Probably not, since less than 10 percent of such incidents are ever reported to parents or authorities.

Cyberbullying…

Cyber Bullying Quiz: Phoebe Prince Cassondra Adams Tyler Clementi

Things to watch for… Punching, shoving, and other acts that hurt people physically Spreading bad rumors about people Keeping certain people out of a "group" Teasing people in a mean way Getting certain people to "gang up" on others Bullying also can happen online or electronically. Cyberbullying is when children or teens bully each other using the Internet, mobile phones or other cyber technology. This can include: Sending mean text, , or instant messages Posting nasty pictures or messages about others in blogs or on Web sites Using someone else's user name to spread rumors or lies about someone

Dillon DeJong Campaign Facebook Page: American’s Against Bullying

Capture it! Print Screen 1.Click the print screen key on your keyboard. (This is like copy.) 2.Paste it into a word document.

Print Screen Benefits 1.You can capture what was said and the user name. 2.You can capture the time stamp. 3.Saves a copy of the message to your computer!

Giving out too much info…

mId= Student play online using Avatars…this should be considered their online self at other sites, too.

Too Much Information!!! “We are raising digital natives.” Tell students that they should only fill out information that is absolutely necessary to get the account. FOR EXAMPLE: Facebook users do not have to show real pictures of themselves for the profile pictures on their accounts. addresses can have similar characteristics but not real ones. Neither internet account requires you to fill out anything except a user name and password.

Trusting too much… One piece of information given out when creating accounts or “tech talking”, could take you to the dark and dangerous side of the cyber “city”. Julie: Chatting:

My Cyber Safety Collection ternetSafetyhttp:// ternetSafety berbullyinghttp:// berbullying

The Mark YOU Leave

Optional Activity

Sixth Grade Student Activity PUSHING SEND: Take out ten paper clips and put them on the index card. (send to 10 contacts at a time) Pass the box of paper clips to the next person along with your index card. For 30 seconds, put paper clips on the card. Pass the box of paper clips to the next person along with your index card. For 30 seconds, put paper clips on the index card. Count the paper clips and take the number times ten! Extra Activity