Presentation is loading. Please wait.

Presentation is loading. Please wait.

Danielle Hildebrant  Acceptable Use Policies ◦ document stating the use and limits of the network or internet  Cyberbullying ◦ Bullying that takes.

Similar presentations


Presentation on theme: "Danielle Hildebrant  Acceptable Use Policies ◦ document stating the use and limits of the network or internet  Cyberbullying ◦ Bullying that takes."— Presentation transcript:

1

2 Danielle Hildebrant

3  Acceptable Use Policies ◦ document stating the use and limits of the network or internet  Cyberbullying ◦ Bullying that takes place on online  Cyberpredators ◦ Sexual predators that use the internet, especially chat rooms to lure children  Identity Safety ◦ Protecting online identity  Inappropriate Content ◦ Content that doesn’t fit a norm or standard for children  Piracy & Plagiarism ◦ Unauthorized use or copying and/or distribution of copyrighted material

4  Effective AUP Effective AUP ◦ A preamble ◦ A definition section ◦ A policy statement ◦ An acceptable uses section ◦ An unacceptable uses section ◦ A volitions/sanctions section  Student and parents sign

5  Developing an acceptable use policy ◦ Not in a vacuum (Educational World) ◦ Based on philosophy  Balance freedom and responsibility  Students must be aware before being allowed to use the computer network or internet

6  Bulling that takes place thru the internet ◦ Instant Messaging ◦ Social Networking sites ◦ Cell phones  Target any time and at any time  Forms (National Center “cyberbullying”) Forms ◦ Flaming & tolling ◦ Happy Slapping ◦ Identity Theft/Impersonation ◦ Photoshopping ◦ Physical Threats ◦ Rumor Spreading

7 ◦ Avoidance of the computer, cell phone ◦ Stressed when receiving and e-mail, instant message or text message ◦ Withdraws from family and friends ◦ Acts reluctant to attend school or social activities ◦ Avoids conversations about computer use ◦ Low self-esteem  Depression  Fear ◦ Poor eating and/or sleeping habits ◦ Declining grades

8  Think before you post anything Think before you post anything  Nothing is private ◦ Sexting ◦ Explicit photos  CyberPredators (FBI) ◦ Any age ◦ Any sex ◦ No general look such as the dirty old man

9  Are your children at Risk? ◦ Large amount of time online  Especially in chat rooms or games that include chat  Most of the time at night ◦ Someone sends pornography pictures ◦ Receiving phone calls from strangers

10  Refers to the practices and precautions observed to ensure safe internet use  FCC leaves it up to each school district  Broadband Data Improvement Act (Gurus of Cyber Safety) ◦ 2008 ◦ Protect students in 21 st century  Sharing information can put you at risk (CyberSafety Team Education)

11  Sharing puts you at risk for:  Identity theft  Scams  Spam  Physical or emotional harm  Checking credit reports frequently  Protecting Children from ID Theft Protecting Children from ID Theft

12  Not all content online is appropriate for every child  Appropriate and inappropriate content – equally accessible  Sexually explicit Material Sexually explicit Material  Other content (National Center “Inappropriate Content”) ◦ Graphic material ◦ Glorify risky and illegal behaviors

13  Video Games ◦ Violent content and/or images ◦ More and more realist  What was once cartoon like or unrealistic is becoming very realistic  Never give children a video game without first going thru it  Never assume because the first one wasn’t violent that the new one wont be

14  Passing work off as your own that isn’t  Hurts the student ◦ Doesn’t learn  Note taking  Evaluating source  Selecting appropriate quotes  Paraphrasing  Citation  6 major consequences 6 major consequences

15  Piracy ◦ Unauthorized copying and/or distribution of copyrighted material  Does include license infringement (BSA)license infringement ◦ Multiple computers – one license ◦ Sharing license information with others  Civil and criminal penalties (BSA)  Malware, ransom ware, spyware & viruses

16  Reporting pirated software Reporting pirated software  Keep the computer in a common room  Teach polite communication online ◦ Rude e-mails, messages or comments  Talk about sexual victimization and potential on-line danger  Parental controls  Protect the computer with antivirus software

17  Baylor School Consequences of plagiarism (n.d) Retrieved October 25, 2014 from http://mail.baylorschool.org/~jstover/plagiarism/consequences.htm http://mail.baylorschool.org/~jstover/plagiarism/consequences.htm  BSA The Software Alliance Compliance & Enforcement (2014). Retrieved October 25, 2014 from http://www.bsa.org/anti-piracyhttp://www.bsa.org/anti-piracy  CyberSafety Team Education Identity Safety (n.d) Retrieved October 25, 2014 from http://cybersafetyteameducation422.weebly.com/identity-safety.html http://cybersafetyteameducation422.weebly.com/identity-safety.html  Edtecher. Think before you post #2. (2009) retrieved October 25, 2014 from http://www.teachertube.com/video/think-before-you-post-2-9439 http://www.teachertube.com/video/think-before-you-post-2-9439  Education World. Getting Started on the Internet: Developing an Acceptable Use Policy (AUP) (1996-2014) Retrieved October 25, 2014 from http://www.educationworld.com/a_curr/curr093.shtml http://www.educationworld.com/a_curr/curr093.shtml  Federal Bureau of Investigation A Parents Guide to Internet Safety (n.d). Retrieved October 25, 2014 from http://www.fbi.gov/stats-services/publications/parent-guide/parent-guidehttp://www.fbi.gov/stats-services/publications/parent-guide/parent-guide  Guru’s of Cyber Safety identity Safety (n.d) Retrieved October 25, 2014 from http://www.gurusofcybersafety.weebly.com/identity-safety.html http://www.gurusofcybersafety.weebly.com/identity-safety.html  iThenticate 6 Consequences of Plagiarism (1998-2014). Retrieved October 25, 2014 from http://www.ithenticate.com/resources/6-consequences-of-plagiarism http://www.ithenticate.com/resources/6-consequences-of-plagiarism  National Center for Missing & Exploited Children Cyberbullying (2001-2014). Retrieved October 25, 2014 from http://www.netsmartz.org/Cyberbullyinghttp://www.netsmartz.org/Cyberbullying  National Center for Missing & Exploited Children Inappropriate Content (2001-2014). Retrieved October 25, 2014 from http://www.netsmartz.org/InappropriateContenthttp://www.netsmartz.org/InappropriateContent  Zoeller, Greg. Protecting Children from ID Theft. (2010). Retrieved October 25, 2014 from http://www.youtube.com/watch?v=KNIesTTBXD0 http://www.youtube.com/watch?v=KNIesTTBXD0


Download ppt "Danielle Hildebrant  Acceptable Use Policies ◦ document stating the use and limits of the network or internet  Cyberbullying ◦ Bullying that takes."

Similar presentations


Ads by Google