1 / 62

Creating 21st Century Cyber-citizens Staying Safe Online!

Creating 21st Century Cyber-citizens Staying Safe Online!. Deb Ramsay and Brent Howard Educational Service District. Today's topics. Cyber-bullying Social Networking Identity Theft. Resource Site www.esd101.net/cybersafety/janconf09. We know about the great Internet. So, why discuss this?.

Download Presentation

Creating 21st Century Cyber-citizens Staying Safe Online!

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Creating 21st CenturyCyber-citizensStaying Safe Online! Deb Ramsay and Brent Howard Educational Service District

  2. Today's topics • Cyber-bullying • Social Networking • Identity Theft

  3. Resource Sitewww.esd101.net/cybersafety/janconf09

  4. We know about the great Internet

  5. So, why discuss this? To meet requirements established under the Children’s Internet Protection Act (CIPA), 2000 Filtering: CIPA requires the implementation of a “technology protection measure” (filtering) to block access to visual depictions deemed “obscene,” “child pornography,” or “harmful to minors.” Internet Safety Policy: CIPA requires the adoption and enforcement of an “Internet safety policy” [that addresses] “monitoring the online activities of minors.”

  6. So, why discuss this? To meet other requirements... • Cyberbullying Prevention • Upcoming E-Rate requirements

  7. An even bigger reason…our kids! • 1 in 4 have had unwanted exposure to inappropriate pictures when online. • Approximately 1 in 5 received a solicitation or inappropriate approach. • 1 in 17 was threatened, harassed or bullied online. • Only 25% of students who encountered a solicitation or inappropriate approach told a parent or guardian. • Less than 10% of solicitations were reported to law enforcement authorities. David Finkelhor, Kimberly Mitchell and Janis Wolak. Online victimization: A Report on the Nation’s Youth. Alexandria, Virginia: National Center for Missing and Exploited Children, 2000, pg. ix.

  8. …and our community. The Internet Crimes Against Children Task Force, FBI and the US Attorney’s Office of Eastern Washington have investigated and prosecuted a number of Internet predators from our own community. • US vs L. Caulk, sexual predator in Clarkston, WA • US vs T. Johnson, Express site director • US vs C. Jungblum, high school counselor/coach • US vs P. Lyons, superintendent • US vs R. Perkins, deputy prosecutor • US vs B. Rukke, McDonald’s employee Provided by the US Attorneys Office of Eastern Washington

  9. However... • awareness is the best tool for avoiding becoming a victim in the first place. • the best chance of protecting our children is to provide guidelines on how to avoid becoming a victim. • we need to know more in order to inform and guide students.

  10. Talent Show from the Ad Council

  11. Cyber-bullying Definition: Cyber-bullying: sending or posting harmful material or engaging in other forms of social aggression using the Internet or other digital technologies. (Nancy Willard, 2007)

  12. Forms (types) of Cyber-bullying • Flaming • Harassment • Denigration • Impersonation • Outing & trickery • Exclusion • Cyber-stalking • Cyber-threats

  13. Activities • Text/Picture Messaging • E-mail • Instant Messaging • Social Network Sites • Chats • Polls/Rating Sites • Discussion Boards • Online Gaming Hot or Not

  14. Hot or Not? from NetSmartz

  15. Statistics • 33% - 40+% of teens say they have been bullied online • Translation: 6,900,000 to 8,700,000 teens • Overall 13,000,000 kids between 6 - 8 years old have been bullied online • But.... • 58% have NOT told their parents oranother adult!

  16. I Ah-bviously can’t tell you who I am, but I can tell you that I go to CMS – hmmm or maybe CHS….? People tell me things, I find out – I blog it here. Hello Loves, Halloween is tomorrow I wonder what everyone will be wearing… B looked pissed at the end of 7th period – apparently she had to play goalie. Hmm lets all shed a tear for her. (Notice freshly dyed hair) J was caught throwing a fit in the hall today – over what you may ask? Ask her yourself. Apparently the Twins were both whispering to A and the Ice Queen about…me? I told you all I would never tell my name. B flirting with N again, I personally think he doesn’t like her that much – you all know it’s true. K was hugging one of the twins today. I wonder if it was the one who is going out with J- or are they still together? Looks like A got a haircut…the layers don’t really work for her. She would have been better off getting a dye job – or her highlights retouched. “I won’t tell you who I am, but check up on my profile for the latest gossip CMS Students. Cyber-bullying

  17. Known as; B Personality; intelligent, shy, but can teat anyone to pieces. Known for; Her cute looks; (not exactly hot by any means…) Cold hazel eyes that change color from dark brown to the deepest blue. That adorable pigeon-toed gait and her mocking cat-like smile that everyone knows so well. Of course, how could we forget her love of shorts and sports wear? Does she know track season isn’t until spring? Signature; Her jeering smile, and pigeon toed step Love life; Not exactly single, everyone knows she is after N Friends; with everyone – except a few choice people like D and the Ice Queen A soccer ball is usually by her side as she as she is strutting with her shorts and hoodie (is that all she owns?) down the hall beside J. S is always in her space; and is always sucking J’s butt. B’s short gleaming black hair is of course, routinely placed on top of her head in a small pony-tail. Her fringe is in her bitter hazel eyes as she smiles at her friends and pretends to know what is going on; but is really lost in her own thoughts. Known as; The Ice Queen Personality; Cruel, can be sweet if she likes you; which she probably doesn’t Known for; her beautiful misty sea green eyes, stunning physique and disgusting pitilessness that she has had since kindergarten; I guess she is just a people person? Signature; Dreamy green eyes Love life; This girl can get whoever she wants; if you are currently with her – prepare to be out in a matter of days. Friends; everyone who knows not to stand in her way I Ah-bviously can’t tell you who I am, but I can tell you that I go to CMS – hmmm or maybe CHS….? People tell me things, I find out – I blog it here. “I won’t tell you who I am, but check up on my profile for the latest gossip CMS Students. Cyber-bullying

  18. Online Communities Bebo MySpace hi5 Facebook Livejournal YouTube Cyber-bullying

  19. Sep 7, 2008 9:38 AM Virgin lisssst. This is the VIRGIN LIST! What you do is repost this list with your name and tell if you think that the person b4 you is a virgin or not...AND IF YOU OPEN THIS AND DONT REPOST IT YOU WILL BE CURSED FOR 7 YEARS OF BAD LUCK! REPOST @S THE"VIRGIN LIST" Amanda—f*** im first :(Amber (yaya)—f*** no this girl aint no virginNikk--Not a chance.Savannah- No way.Jimmy-- Ain't no way unless she is the Virgan Marry!!! lol****-- Umm, Im going to have to say...no, prolly notWendy Cutlip- naw i doubt itChuck - hook me up with this girl above wendy lol.. and nopeAlexandria-ahhh probably not must guys aint virgins anymore SLUTShahasamantha-i think shes notJosh- ummm doubt itashley-yep all virgnal Cyber-bullying

  20. Impact of Cyberbullying • More severe that face-to-face • Anonymous • 24/7 • You can’t see me….I can’t see you… • Affects school climate • Poor academic performance • Attendance issues • Student conflict Cyber-bullying

  21. Megan Meyer Story from CNN on YouTube

  22. What are your stories and examples? • With those around you discuss: • Your stories and examples. • How it effected you or others you know. • How was it handled? • Was this the best way to handle the problem? Why? • Be prepared to share your thoughts and examples with the group!

  23. Cyberbullying Law • State legislation required schooldistricts to adopt policies that prohibit harassment, intimidationand bullying by August 1, 2003 • State legislation added electronic means, effective August 1, 2008 • WSSDA sample policy – on school grounds and during school day

  24. The Question Where does home and school begin and end?

  25. What kids can do… • If they become a victim of cyber-bullying… • Don’t retaliate! • Stop communicating with the bully. • Block the bully’s address. • Tell parents and a trusted adult at school. • Save all written communication for proof. • If necessary, contact law enforcement.

  26. Cyber-bullying Resources • Ad Council - http://adcouncil.org/ • NetSmartz - http://www.netsmartz.org/ • Wired Safety - http://www.wiredsafety.org/ • Bookmarks - http://delicious.com/istep101

  27. Social Networking Everyone

  28. Social Networking Social networking refers to a broad class of web sites and services that allow you to connect with friends, family, and colleagues online… as well as meet people with similar interests or hobbies. Many, such as the popular Facebook and MySpace, let you create a profile where you can post photos, information about yourself like location, hobbies and relationship status, and send and receive correspondence with online contacts.

  29. What should kids know… • One in five employers search social networking sites before hiring • One-third of those said they found information that caused them to toss out potential candidates • Universities and colleges are also searching sites when reviewing applications • Many teachers, administrators, and coaches are also reviewing these sites

  30. What Else Should You Know? By posting User Content to any part of the Site, you automatically grant, and you represent and warrant that you have the right to grant, to the Company an irrevocable, perpetual, non-exclusive, transferable, fully paid, worldwide license (with the right to sublicense) to use, copy, publicly perform, publicly display, reformat, translate, excerpt (in whole or in part) and distribute such User Content for any purpose on or in connection with the Siteor the promotion thereof, to prepare derivative works of, or incorporate into other works, such User Content, and to grant and authorize sublicenses of the foregoing. You may remove your User Content from the Site at any time. If you choose to remove your User Content, the license granted above will automatically expire, however you acknowledge that the Company may retain archived copies of your User Content.

  31. Sex + Texting = Sexting!

  32. Think Before You Post! from the Ad Council

  33. Bulletin Board from the Ad Council

  34. Who’s in your network?

  35. `

  36. Let’s look at another websitethat Danny uses… • www.azsexoffender.org • The State of Arizona’sgovernment - operated sex offender registration site

  37. MySpace Report from KOMO TV

  38. Social Networking Tips • Use "privacy" setting on your profile • Don't assume that your profile is totally private! • Only add friends that you know in person • Only post information you are comfortable with the rest of the world seeing • Create strong passwords • Don't believe everything you read online!

  39. Fraud, Scams and ID Theft…oh my!

  40. “Phishing” from OnGuard Online

  41. Identity theft is a crime… • The U.S. Department of Justice defines identity theft this way: • “Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain.”

  42. A short quiz… • What should you do if you receive an email of this type? • Immediately click on the link and follow instructions to make sure your information is not affected. • Log into your account, check your information and change your password. • Don’t respond or enter any personal information, then forward the email to spoof@paypal.com.

  43. Know who you are dealing with • Free Software and File Sharing. Online file-sharing can give people access to a wealth of information. • Spyware comes with many free downloads. This is software that is installed without your knowledge that adversely affects your computer, and may access your personal information.

  44. Are you at risk for identity theft? Test Your "Identity Quotient” at http://www.privacyrights.org/ITquiz-interactive.htm [the link is on the presentation Web site]

  45. Here is a short funny identity theft education video that was a winning entry in the Security Awareness Video Contest sponsored by the EDUCAUSE/Internet2 Computer and Network Security Task Force, the National Cyber Security Alliance, and ResearchChannel. http://www.researchchannel.org/securityvideo2007/displayevent.aspx?rid=11088

  46. Use strong passwords • Which of the following would you consider to be the strongest password for Jane Doe: • JaneDoe1972 • J@n3D03 • J@n3D031972 • Ihave2blackdogs!

More Related