Being Good Digital Citizens with Today’s Technologies.

Slides:



Advertisements
Similar presentations
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Thank you for your cooperation. We will begin shortly.
TECHNICOOL A Technology Safety Program © 2011 PCAV.
Being Good Digital Citizens with Today’s Technologies.
Internet Online Safety How to have FUN and Stay in Control.
KEEPING OUR YOUNG PEOPLE SAFE ONLINE. Nine Young Lives Lost
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
INTERNET SAFETY.
Cyber bullying and internet safety Parents meeting: staying safe online.
Internet Safety and Awareness Cyberbullies and Predators Enfield High School Computer Network.
Harmless Joke or Cyber-Bullying?
What you don’t know CAN hurt you!
Cyber and Internet Safety El Rodeo School September 11, 2013.
How to keep your kids safe online
Internet Safety and Kids Ms. Lee’s Classroom Computers are NOT bad Computers can be used to help kids learn and play. They can be used safely, if parents.
Concept: Internet Safety Who You Are ~ Learning About Yourself ~ Unit Essential Questions How can my principles, skills, and interests help me be successful.
Youth and the Internet Info for Parents. Internet: Strengths and Weaknesses Internet is the free exchange of ideas Little to no regulation on information.
Internet Safety Awareness
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Cyber Bullying By Elizabeth Ward. What is Cyber Bullying? Cyber Bullying is when one minor is targeted by another minor through threats, torments, harassment,
What Every Parent Needs to Know! Internet Safety Information for Parents Purpose: Provide practical information parents can use at home Present safety.
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
Net Cetera Chatting with Kids About Being Online.
Net Cetera Chatting with Kids About Being Online.
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
Welcome to e-safety Training Friday 3 rd Oct 2014.
What is Social Networking? Social networking sites provide teens and young adults with a virtual environment where they share stories, pictures, videos,
Kara LaRose, School Counselor Willow Dale Elementary School
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Ashley Counce. What is Cyber Bullying?  Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition,
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Parenting in the Internet Age Tips for Keeping Kids Safe and you Connected to your Teen.
Internet Safety Mrs. Oliver Technology
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Do pictures always give truthful information? Can publishing it be hurtful??
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Internet Safety Blue Hills School. Internet Safety Use these Tips Don’t share your address, phone number, school name or your parents credit card number.
1 CYBER SAFETY.  Online Actions  Offline Consequences  What you type, say, or do online can have a short and/or long-term effect on your life. 2.
Lesson 4: Taking Perspectives on Cyberbullying THE CYBER BULLYING VIRUS
Be More…Tech Savvy A Workshop for Elementary Students about Internet Safety.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Digital Elementary School Kids: Safe, Smart, and Responsible.
Being Good Digital Citizens with Today’s Technologies.
INTERNET SAFETY Thornell Road Library Let’s Discuss: Information Privacy Social Networking CyberbullyingNetiquette.
Net Cetera Chatting with Kids About Being Online.
© Childnet International 2008 Helping to keep your children safe online.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
T HINK ! Before You Post A lesson on Internet Safety Source:
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
Special Project Cyber bullying Issues By: Abby Heim.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
E-Safety for parents and carers Highfield Community Primary School.
E-safety Helping your children stay safe on-line A presentation for Parents.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Internet Safety Mrs. Lijó. Some Names for the Internet Cyberspace The Web The Net The Information Highway The World Wide Web.
Freshman Seminar. Find kids through social networking, blogs, chatrooms, instant messaging, , discussion boards, and other websites. Try to seduce.
1. Read the following presentation and watch the videos for your grade level. 2. Write your name on your index card and answer the “Bob” questions at the.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Keeping Children Safe Online
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Appropriate Use of Technology
Rules To Help You Navigate the Internet Safely
Presentation transcript:

Being Good Digital Citizens with Today’s Technologies

Today’s Presentation: Utah Statistics Utah Statistics Benefits & Dangers Benefits & Dangers Profile of a Teenager Profile of a Teenager Potential Risks Potential Risks Cell Phones & Photos Cell Phones & Photos Posting a Picture Posting a Picture Cyber-bullying Personal Information Online Friends Talking to an Adult you Trust Five Ways to Stay Safer Online

Utah Statistics Utah ranks #1 in the nation for home computer use. Utah ranks #1 in the nation for home computer use. 1.8 million or 74% of Utahns have computers in their homes. 1.8 million or 74% of Utahns have computers in their homes. Utah ranks #5 in the nation for home Internet use. Utah ranks #5 in the nation for home Internet use. (Huntsman, 2005)

NetSafe Utah Introduction

What do we learn from this video? Teens get on the Internet to connect to others through… Teens get on the Internet to connect to others through… Social networks, instant/text messaging, games. Social networks, instant/text messaging, games. The Internet is like the pizza parlors and malls. The Internet is like the pizza parlors and malls. Have conversations regularly and openly. Have conversations regularly and openly. Know what your kids are doing online like you do offline. Know what your kids are doing online like you do offline. What else can you do? What else can you do? Have time limits. Have time limits. Install filtering and monitoring software. Install filtering and monitoring software.

What is the best Internet filter in the world? It is free. It is free. It is simple to use. It is simple to use. You take it with you wherever you go. You take it with you wherever you go.

The best Internet filter is… You

Benefits of the Internet Accessible from… Accessible from… Home, school, public libraries… Home, school, public libraries… Communicate with… Communicate with… Family, friends, & other students. Family, friends, & other students. Information for… Information for… Homework, news, entertainment… Homework, news, entertainment…

Dangers of the Internet Accessible from… Accessible from… Virtually everywhere. Virtually everywhere. Communicate with… Communicate with… Family, friends, predators… Family, friends, predators… Information including… Information including… Pornography, violence, drugs… Pornography, violence, drugs…

Why teenagers can be vulnerable? Profile of a teenager Be own person Be own person Make own decisions Make own decisions Be independent from parents Be independent from parents Be understood Be understood Wants attention Wants attention Wants love Wants love

Chatroom Exchange

Julie’s Journey

Potential Risks Porn- ography Computer Virus Copyright Infringement Cyber- Bullying Online Predator Hate Crimes Instant Messaging Chat Rooms Online Gaming Media Violence P2P File Sharing Popup Ads Internet Fraud Sexual Exploitation Social Net- working sites Spam SpywareVideo Sharing Web Blogs Web Cam

How to Reduce Your Risk on the Internet Have Anti-Virus / Spyware Software Have Anti-Virus / Spyware Software Keep Software Updated: Keep Software Updated: Anti-Virus / Spyware software Anti-Virus / Spyware software Operating System - PC and Mac Operating System - PC and Mac Browsers - Firefox, Internet Explorer, Safari, & others Browsers - Firefox, Internet Explorer, Safari, & others Safe Behaviors like avoiding: Safe Behaviors like avoiding: “Free” offers “Free” offers Suspicious s Suspicious s Yucky web sites Yucky web sites

Cell Phones

Teens and Mobile Phones How many teens have a cell phone (12-17 yrs old)? How many teens have a cell phone (12-17 yrs old)? 75% 75% What are they doing with it? What are they doing with it? Most texting friends daily Most texting friends daily One in three teens sends more than 100 texts messages a day, or 3000 texts a month. One in three teens sends more than 100 texts messages a day, or 3000 texts a month. What else? What else? Take and share pictures Take and share pictures Play music and games Play music and games Access social network sites and Access social network sites and Pew Internet & American Life Project, Amanda Lenhart, Teens and Mobile Phones, April 20,2010

The % of teens who contact their friends daily by different methods, by age

Having a cell phone is a privilege, not a right.

Cell Phones and Photos

Victim and perpetrator Victim and perpetrator Often the same person Often the same person Can lead to cyber-bullying Can lead to cyber-bullying Think before you post Think before you post

Think before you post

Posting a Picture What types of pictures should we post online?

Is Maggie making a good choice here?

What can be some consequences for posting a picture?

What kinds of pictures should you post?

What are some other things that could happen?

How might these pictures effect Maggie’s future?

What do we learn from Maggie’s posting of pictures? Online pictures can be forwarded and posted elsewhere. Online pictures can be forwarded and posted elsewhere. Once a picture is posted, you can’t get it back. Once a picture is posted, you can’t get it back. Nude pictures are illegal (< 18 = child pornography). Nude pictures are illegal (< 18 = child pornography). Only post “G-rated” pictures. Only post “G-rated” pictures. Use privacy settings. Use privacy settings. Don’t reveal personal information in pictures. Don’t reveal personal information in pictures. A picture you post online can effect your future. A picture you post online can effect your future.

What is Cyber-bullying? Use of technology to harass, threaten, or embarrass someone. Use of technology to harass, threaten, or embarrass someone. Courtesy of wentongg’s photostream

Cyber-bullying – Example

Cyber-bullying vs Bullying It can happen 24/7. It can happen 24/7. It can be done from a physically distant location – easier to say hurtful things in a text message rather than face-to-face It can be done from a physically distant location – easier to say hurtful things in a text message rather than face-to-face Victims often do not know who the bully is, or why they are being targeted. Victims often do not know who the bully is, or why they are being targeted. It can become viral - a large number of people can become involved. It can become viral - a large number of people can become involved. Loss of non-verbal cues (face) and voice inflexion (joking). Loss of non-verbal cues (face) and voice inflexion (joking). Victim may become bully. Victim may become bully.

What does Lamer Bill do to threaten and harass Joe?

Wanting to skip school is a symptom of cyber-bullying.

Where can cyber-bullying happen?

What does Joe do with the threatening texts & s?

What did Joe do with the “evidence”?

How can we stop cyber-bullying? 1. Do Not Respond. 2. Save the Evidence. 3. Report It.

Rule of Thumb If you won’t say it face to face, then don’t send it.

What about Personal Information? What can happen if… What can happen if… Someone gets your name and ssn? Someone gets your name and ssn? You post your address on facebook? You post your address on facebook?

What are some examples of personal information?

What can happen when someone gets Joe and Maggie’s personal information?

What does Joe and Maggie do to keep their personal information safe?

When it is okay to give out personal information?

Why should we keep our personal information safe? When our personal information is safe then we are safe.

What can we learn about keeping our personal information safe? Logging into a web site – a lock icon. Logging into a web site – a lock icon. Don’t use obvious words for passwords. Don’t use obvious words for passwords. Never give out passwords even to a best friend. Never give out passwords even to a best friend. Change passwords often. Change passwords often. Keep security software is updated. Keep security software is updated. Be sure to log out after using a public computer. Be sure to log out after using a public computer. Don’t post pictures that show personal information. Don’t post pictures that show personal information.

Online Friends Who should you have as your online friends?

Should Maggie accept this “friend” request?

How should you decide who to be friends with online?

How does Maggie decide who her friends are?

What did Maggie learn about being safe online? Don’t accept “friends” that you don’t know in real life. Don’t accept “friends” that you don’t know in real life. Use privacy settings. Use privacy settings.

Talking to an Adult You Trust So, who is an adult you know that you trust?

What are the things that Maggie really doesn’t want to see online?

Who does Maggie talk to?

What do Maggie and her Dad do to be safe?

What else can happen online?

So, what can you do if you see something online that makes you feel uncomfortable?

Who are the people that are there for you?

What did Maggie (and her Dad) do to be safer on the Internet? Use of the Google filter. Use of the Google filter. Installed a software filtering system to block unwanted content. Installed a software filtering system to block unwanted content. Agreed on G and PG content. Agreed on G and PG content. Told a person she trusted when something made her feel uncomfortable. Told a person she trusted when something made her feel uncomfortable.

Five Ways to Stay Safe Online 1) Talk about it. 2) Implement Safety Tools. 3) Avoid Isolation. 4) Guard Personal Information. 5) Don’t respond, save the evidence, and report it.

What have we learned about today? Utah Statistics Utah Statistics Benefits & Dangers Benefits & Dangers Profile of a Teenager Profile of a Teenager Potential Risks Potential Risks Cell Phones & Photos Cell Phones & Photos Posting a Picture Posting a Picture Cyber-bullying Personal Information Online Friends Talking to an Adult you Trust Five Ways to Stay Safer Online

To learn more, go to:

Questions?