Presentation is loading. Please wait.

Presentation is loading. Please wait.

CYBERSAFTEY 101 By: Tarrah Marcus INTRODUCTION  Acceptable Use Policies (AUP)  Policies that govern internet use  Cyberbullying  Technology based.

Similar presentations


Presentation on theme: "CYBERSAFTEY 101 By: Tarrah Marcus INTRODUCTION  Acceptable Use Policies (AUP)  Policies that govern internet use  Cyberbullying  Technology based."— Presentation transcript:

1

2 CYBERSAFTEY 101 By: Tarrah Marcus

3 INTRODUCTION  Acceptable Use Policies (AUP)  Policies that govern internet use  Cyberbullying  Technology based harassment  Cyberpredators  On-line stalkers  Identity Safety  Protecting shared information  Piracy, Plagiarism  Stealing and making it your own

4 ACCEPTABLE USE POLICIES  Acceptable Use Policies (AUP):  Written policies for schools, businesses, libraries, community centers, etc.  Helps restrict access  Keeps internal information safe  Reduces cyber attacks against students

5 POLICIES CONTINUED…  The National Education Association suggests an effective AUP contain the following six elements:  A preamble,  A definition section,  A policy statement,  An acceptable uses section, and  A violations/sanctions section.  Taken from Education World: Getting Started on the Internet: Developing an Acceptable Use Policy (AUP).Education World

6 CYBERBULLYING  According to Stop Bullying (2015) cyberbullying is bullying that takes place using electronic technologyStop Bullying Electronic Technology includes:  Devices and Equipment- Cell phones, computers and tablets  Communication Tools- Social media sites, text messages, chat, and websites  Examples of Cyberbullying:  Sending mean texts or emails  Spreading rumors online  Posting embarrassing pictures and videos

7 CYBERBULLYING - Well Cast website for kids, teens and teachers Well Cast - Printable worksheets - Fun, Animated Videos across many content areas - VIDEO: How to Beat CyberbulliesHow to Beat Cyberbullies - Worksheet Worksheet Cyberbullying is different… - It can happen 24/7 - Anonymous - Rapid Spread of Information - Deleting posts is hard Effects are similar… - Alcohol and drug use - Poor grades - Lower self-esteem - Skip school - In-person bullying

8 CYBERPREDATORS  Any person can be a cyber predator  Ultimate goal of a face-to-face meeting  Potential purpose:  Molestation  Rape  Murder  Taken from Web Safety4Kids (2015)Web Safety4Kids

9 CYBER PREDATORS CONTINUED…  Two Categories:  Preferential Predators- actively seek out targets by…  Age, hair color, height, etc.  Jobs  Hijacking  Situational Predators  Not actively seeking out children, but will take advantage of situations  Predator warning signs:  Spends a lot of time online  Porn on the computer  Anonymous phone calls, gifts and mail  Withdraws from normal activity  Switches screen quickly  Uses other accounts for e-mail or instant messaging  Retrieved from Family Safe Computers (2011)Computers

10 IDENTITY SAFETY  Identity Safe Classroom  Acceptance of social identities  Build learning environments  Promote sense of belonging  Classroom to Internet  Encourage sharing  Set realistic expectations  VIDEO  Identity Safe Classrooms Identity Safe Classrooms  Places to belong and learn

11 IDENTITY SAFETY AND INTERNET Tips for Students:Tips for Teachers: - Don’t share personal information - Never meet with someone online - Use creative passwords  Use complicated passwords  Limit posts with photos  Do not open email attachments  Be a role model

12 PIRACY  Piracy is the unauthorized use of another’s production (Merriam-Webster, 2015)  Common forms of Piracy:  Downloads, file sharing, copying, installing and distributing  Anti-piracy Warnings  Fines  Imprisonment  Both  Tips for Teachers: (Cyber Safety on Weebly)Cyber Safety  Always give credit  Create awarness in classrooms  Create activities

13 PLAGIARISM  Plagiarism is defined as to steal and pass off as one’s own (Merriam-Webster, 2015)  Student Code of Conduct:  Implications and violations  Tips for Teachers:  Educate students  Use resources and tools  Vaughan Memorial Library Vaughan Memorial Library

14 CONCLUSION  Strategies for Implementation:  Post Internet RULES and GUIDELINES in classroom  Model safe internet use  Use online resources  Attend workshops or trainings  Ask other educators

15 RESOURCES  Getting started on the internet: creating an acceptable use policy (2011). Retrieved from https://educationworld.com/a_curr/curr093.shtml https://educationworld.com/a_curr/curr093.shtml  Cyberbullying. Retrieved from https://stopbullying.govhttps://stopbullying.gov  Video: How to beat cyberbullies. Retrieved from https://watchwellcast.comhttps://watchwellcast.com  Cyber Predators. Retrieved from https://websafety4kids.org/cyber-predator.phphttps://websafety4kids.org/cyber-predator.php  The facts about online predators. Retrieved from https://familysafecomputers.org/predators.htm https://familysafecomputers.org/predators.htm  What is identity safety? Retrieved from https://identitysafeclassroom.orghttps://identitysafeclassroom.org  Identity safety. Retrieved from https://sites.google.com/site/cybersafetysite422/home/identity-safety https://sites.google.com/site/cybersafetysite422/home/identity-safety  Cyber Safety. Retrieved from https://cybersafetyed.weebly.com/piracy-and-plagiarism.htmlhttps://cybersafetyed.weebly.com/piracy-and-plagiarism.html  You Quote It, You Note It! Retrieved from https://library.acadiau.ca/tutorials/plagiarism/https://library.acadiau.ca/tutorials/plagiarism/  Merriam-Webster Online Dictionary (2015). Retrieved from https://merriamwebster.comhttps://merriamwebster.com


Download ppt "CYBERSAFTEY 101 By: Tarrah Marcus INTRODUCTION  Acceptable Use Policies (AUP)  Policies that govern internet use  Cyberbullying  Technology based."

Similar presentations


Ads by Google