Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cybersafety 4 Kids: Smart Moves in an Online World.

Similar presentations


Presentation on theme: "Cybersafety 4 Kids: Smart Moves in an Online World."— Presentation transcript:

1 Cybersafety 4 Kids: Smart Moves in an Online World

2 Goals of Presentation To unravel the fear and hype surrounding the online lives of our cyber kids while also considering strategies to help ensure that our children have a safe, positive experience with technology

3 Topics for Today SBCUSD’s Cyber Safety Plan Cyberbullying Cyber Predators

4 SBCUSD’s Cyber Safety Plan 2009-2010 District Tech Plan Objective 3g.1: All students will be trained to apply Internet safety rules, including how to protect their online privacy and avoid online predators when they are using the Internet. Year 1 Benchmark: 25% of students Year 2 Benchmark: 75% of students Year 3 Benchmark: 100% of students

5 SBCUSD’s Cyber Safety Plan (cont.) District trains tech liaisons Step 1 Tech liaisons train site teachers Step 2 Teachers train students Step 3 “Trainer of Trainers” Model

6 SBCUSD’s Cyber Safety Plan (cont.) How will you get the word out at your site? Classroom lessons Assemblies Track change days/minimum days SSC/ELAC Meetings The proof’s in the agenda Or sign-in sheet… Or lesson plan… Or flyer Or…? Documentation is critical for audit purposes!

7 Cyber Safety Resources http://www.ctap4.net/projects/cybersafety.html

8 Cyberbullying Definition: Cyberbullying is the use of technology for harassment, impersonation, denigration, trickery, exclusion and stalking. Cyberbullies may use email, chat rooms, discussion forums, instant messaging, text messaging (cell phones), or social networking sites. NetSmartz Real-life Video

9 Cyberbullying (cont.) An Example Close to Home February 7, 2007 “Danville girl's plight now lawmaker's bill”

10 In-Person vs. Cyberbullying “The difference between being bullied at school and being bullied on the Internet is that you cannot get away from cyberbullying as easily. Cyberbullying follows you, even after you get home from school.”

11 Studies estimate between 33% and 43% of teenagers have been victims of cyberbullying Discrepancies are due primarily to varying definitions of cyberbullying and the sometimes-hazy line between harassment and “kids being kids” Despite all of that, cyberbullying is the most common online risk children face Cyberbullying (cont.)

12 Of surveyed teens who said they had been cyberbullied, only about 10% reported it. The MYTH: “If I tell someone about bullying, it will just make it worse.” Research shows that bullying will stop when peers or adults get involved. Headline news provides opportunities for discussion and “teachable moments” Educator’s Guide to Cyberbullying and Cyberthreats Cyberbullying (cont.)

13 Don’t respond to or meet with a cyberbully. Save proof of the harassment like e-mail messages, screen shots, IM logs, blogs, etc. To-Dos for Students Cyberbullying (cont.)

14 To-Dos for Students (cont’d) : Tell a trusted adult who can: Call law enforcement. File a complaint with the ISP or send an email to the host of the web site where the abuse was posted. Contact the cyberbully’s parents. Contact an attorney or file a small claims action. Cyberbullying (cont.)

15 To-Dos for Parents/Teachers: Cyberbullying (cont.) Use web sites that translate online lingo so you can understand words being used in e- mails, chat rooms, IMs, etc. If a child continues to receive harassing e- mails, have him/her delete the current accounts and open a new one. Give the new e-mail address only to a few trusted people.

16 Dealing with Cyberthreats Online threat can be Joke, parody, or game Rumor Someone trying out a fictitious online character Final salvos of a “flame war” Posted by an “impersonator” Violent/suicidal intention posted by depressed or angry person Legitimate imminent threat Can you tell which one???

17 Dealing with Cyberthreats 1 st priority – protect against possible legitimate threat 2 nd priority – determine legitimacy of threat Messages to students: Don’t make threats online Report threats or distressing material

18 Cyber Predators Definition: A Cyber predator uses the Internet to hunt for victims to take advantage of in ANY way, including sexually, emotionally, psychologically or financially Cyber predators know how to manipulate kids, creating trust and friendship where none should exist Netsmartz Video: Amy’s Choice (go to bottom of website)

19 Cyber Predators (cont.) Cyber predators can be sent to prison. What children need to look out for is not a certain stereotype of a dangerous person but certain types of behavior Use teachable moments, even headline news, to make discussion and education relevant. CBS News Article

20 Cyber Predators (cont.) Encourage your schools to add a small cyber tips section to their school newsletters. Remind student to think twice before sharing any information about themselves. To-Dos for students:

21 Cyber Predators (cont.) If you suspect that you are being stalked or the victim of inappropriate communication, report it to a trusted adult or to the CyberTipline. http://cybertipline.com 1-800-843-5678 To-Dos (cont’d) : Cybertipline video

22 Quiz Time http://www.missingkids.com/adcouncil/ Click on Online Lingo tab Internet Safety Quiz for Adults Internet Safety Quiz for Kids

23 Questions or Comments?


Download ppt "Cybersafety 4 Kids: Smart Moves in an Online World."

Similar presentations


Ads by Google