1 / 16

Computing and E-Safety Awareness Meeting

Computing and E-Safety Awareness Meeting. How we can keep children safe online as well as ensuring they get the most out of the technology they use. . Repton Primary School Computer and E-Safety Meeting Objectives . Forms of Communication and how they are used, Social Media, Cyber bullying,

neola
Download Presentation

Computing and E-Safety Awareness Meeting

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computing and E-Safety Awareness Meeting How we can keep children safe online as well as ensuring they get the most out of the technology they use.

  2. Repton Primary School Computer and E-Safety MeetingObjectives • Forms of Communication and how they are used, • Social Media, • Cyber bullying, • E-Safety, • Gaming, • Computing Curriculum 2014.

  3. Questions to consider… As a parent have you: • Researched the site and games your child is about to use? • Understood the potential consequences of allowing your child to access cyberspace unsupervised? • Explained what your child should do if they are subjected to anything offensive at home. Will you report it to the online service (CEOP) or the police? • Discussed stranger danger, so would you allow a stranger to walk into your house and talk to your child? So why allow them the opportunity to speak to a stranger online? • If you want further information after this evening please refer to: thinkuknow.co.uk for E-Safety.

  4. Forms of Communication • Ipads/Tablets, • Mobile Phones with Internet Access, • Xbox Live and Play Station Bluetooth headsets, • Facebook, • SnapChat, • Twitter, • Face Time, • Skype,

  5. Social Media • Facebook is an online website that is for children of 13 or over. • By having Twitter and Facebook accounts that are not private children are allowing themselves to become open to bullying or contact from older people. • Many children can also now access the internet on their mobile phones as well as other devices that they have. • Snap Chat is also an app that many of the Year 6’s said they had seen or had on their own devices. • Newsround Video • Newsround created a short episode detailing how children can get swept away in the online world and can put themselves in danger.

  6. Cyber - Bullying • Using apps like Snap Chat and Facebook as well as Face Time can allow children to become the victim of cyber bullying. • Online communication can mean people mistake the tone that a message is being typed in. • Take 5… Put down the phone or step away from the computer!

  7. E-Safety • CEOP safe search engines: • http://kids.yahoo.com/ • http://www.askkids.com/ • http://www.kidsclick.org/ • Report anything that they feel uncomfortable about on the web to CEOP, • Children only talk to people that they know online, • Never give out personal details to someone you do not know, • Face Time is only used with people that they know in person, • They are encouraged to share who they have spoken to online and if anyone who they do not know has tried to speak to them, • Any elder siblings or parents phones/tablets etc. are controlled when used by children.

  8. Gaming • Popular games from a survey carried out at Repton Primary School and their content (all for over 18): • Ryse: Son of Rome – a gladiator style game in which the limbs of barbarians are cut of with graphic detail by the player, • Mortal Kombat – opponents compete in different ways to kill each other, ranging from gouging and strategic amputation, • Grand Theft Auto 5 - Players are invited to choose instruments of torture in one particular scene to use on their chosen victims, • This game also involves players randomly killing people on the street to get more money in the game and kidnapping women.

  9. The effects of Gaming • Middlesex University carried out research involving children who played these violent games and children who did not. • Children aged between 12 and 14 became more markedly aggressive the longer they played more violent games. • Those up to the age of 5 were found to be most affected by the images they saw on the games, closely followed by those in the 6-11 age bracket. • More than a third of ten year olds in England play computer games for more than 3 hours a day. Child Development Psychologist DrAricSigman pointed out that studies have shown a link between high use of computer games and more erratic behaviour.

  10. In May, a Glasgow court heard how a 13 year old boy slashed the throat of a Gears of War 3 gaming rival in a way, reminiscent to the game where they competed against each other.

  11. Computing 2014 • A brand new ICT curriculum which will now be called Computing. • Focusing much more on children understanding computers, how programs are created rather than how to use them as well as understanding the concepts of computer science. • Also focusing on how children can stay safe online and behave responsibly.

  12. Key Stage 1 • Understand what algorithms are and how they are implemented, • Create algorithms for different purposes, • Recognise common uses of information technology beyond school, • Use technology safely and respectfully, keeping personal information private, understand and identify where to go for help and support.

  13. Key Stage 2 • Design, write and debug programs that accomplish specific goals, • Understand computer networks, including the internet, and how it provides multiple services, • Use search engines effectively and appreciate how results are selected and ranked, • Use technology safely, respectfully and responsibly; recognise acceptable and unacceptable behaviour; identify a range of ways to report concerns about content and contact.

  14. Questions to consider… As a parent have you: • Researched the site and games your child is about to use? • Understood the potential consequences of allowing your child to access cyberspace unsupervised? • Explained what your child should do if they are subjected to anything offensive at home. Will you report it to the online service (CEOP) or the police? • Discussed stranger danger, so would you allow a stranger to walk into your house and talk to your child? So why allow them the opportunity to speak to a stranger online?

  15. Thinkuknow.co.uk • Thank you for listening. • If you would like further information about anything to do with E-Safety please refer to the thinkuknow website.

More Related