Sie sind auf Seite 1von 14

Internet Safety

1. Identity Safety - Bryan Giles


2. Cyberbullying - Bree White
3. Cyber Predators - Ria Bustos
4. Piracy and Plagiarism - Liz O'Brien
5. Inappropriate Content - Patrick O'Rourke
6. Social Networks - Rebecca Rutherford

Identity Safety, Week 3 - Bryan Giles


Online Identity Theft: Information is Power

Definitions of Identity Theft Terms

Phishing - This is when you or a family member receives an e-mail that looks exactly like
one from your bank or other Web site you do business with. It may say that someone is
trying to get access to your account or report that the bank needs information about you. It
provides a link to a phony site and asks you to verify your private information.
Pharming - You might accidentally download a bit of malicious code that will direct your
browser to phony Web sites.
Credit Report - A snapshot of your credit history. Obtaining and checking a free credit
report once a year is a good way to detect identity theft.
Driver's License - The legal identification card that gives you the right to drive. Not being
able to get a driver's license is a clear signal that your identity may have been stolen.
Pre-approved credit card - An offer that comes in the mail that is a solicitation from banks.
A warning sign that your identity may have been stolen is if you receive offers when you do
not have a bank account or your first credit card.
DOB - Date of Birth - a piece of information identity thieves want.
Privacy Policy - You can read the online store’s privacy policy to make sure they will handle
your information with care.
Social Security Number (SSN) - The nine digit number issued to U.S. citizens, permanent
residents, and temporary (working) residents that serves as your national identification
number.
Password - A sequence of characters that you must input to gain access to a file, application,
or computer system. The user should keep it secret and change it often to prevent online
identity thieves from obtaining and using it.
Text message scam - The same kind of requests that are used in online phishing.
P2P file sharing - Peer-to-peer file sharing of things like music or movies.
Padlock symbol - Appears at the bottom and/or top of your browser. A locked padlock
shows the information you are submitting is on a secure page.
Questions:

What does it mean to have your identity stolen, and how does it happen online?
In the last year alone, nearly 10 million Americans became victims of identity theft, a crime
that cost them approximately $5 billion total. It is the fastest growing crime in the United
States, and if you're not careful, it could happen to you, or perhaps it already has. On
average, it takes identity theft victims 12 months to realize that they have been victimized. It
can take victims countless hours over a year or more to repair their credit if stolen.
Identity theft happens when someone uses your private identity information and pretends they
are you in order to get money or buy things or services for themselves. Identity thieves steal
money out of bank accounts, purchase goods on credit cards, and may even borrow money
from a bank by pretending to be you.
Online identity thieves have several ways of stealing your identity. For instance, they may
use phishing. Another kind of online scam is pharming. When you use peer-to-peer (P2P)
file sharing software in order to share music or movie files, you also put your identity at risk.

What are three ways that people can avoid online identity theft?
1. When you shop online, type the address of the store into your browser, rather than
following a link from an e-mail or pop-up window to avoid going to phony sites. Before
submitting your name, address, and debit or credit card number online, make sure the page on
which you type your information is secure by looking for the locked padlock symbol at the
bottom and/or top of your browser. You should also be able to read the “https” (the s means
“secure”) in the address bar.
2. Use anti-spyware and anti-virus software.
3. Encrypt your wireless internet connection and erase your hard drive if you ever sell or
give away your computer.

How can you remind family members about online identity theft prevention?
You can remind them to not respond to an e-mail that looks exactly like one from your bank
or other Web site you do business with (phishing). You can remind them to keep their Social
Security Number in a safe place and to never carry it with them or put the number in their cell
phone or computer. Tell them to never give out their SSN —online or in person. You can
also remind them to shred all documents that have personal information on them. As well,
you can tell them to stay away from registering and submitting personal information to sites
that offer free services like online games or IQ tests.

Resource: CyberSmart!: 21st Century Skills For Education, Online Identity Theft:
Information is Power

Why this is important to teach my students:

The new technologies we use can have a significant impact on our personal privacy. When
you know how to use them properly, you can control your private information and make it
more difficult for others to use your information without your permission. Personal
information can be used to identify you, your location, or your financial assets. Too much
personal information puts users at risk and can lead to online identity theft. Repairing your
stolen identity is very costly and time-consuming. If your credit score is adversely affected,
it can prevent you from getting credit you otherwise would have received and from even
getting a job.

Resource: The JCCS Internet Safety Project wiki


http://jccsinternetsafety.wetpaint.com/page/Identity+Safety

Cyber bullying, Week 3 - Bree White

Resource used: http://jccsinternetsafety.wetpaint.com/page/Cyberbullying

Definition: Cyber bullying is the use of technology for social cruelty, which can include
harassment, impersonation, denigration, trickery, exclusion and stalking. Cyber bullies may
use email, chat rooms, discussion forums, instant messaging, cell phone text messaging or
popular teen web sites such as MySpace.com.

Cyber bullying week 3 assignment

This is a case study about a student who moved to a new school and encountered some rude
behavior so he decided to take matters into his own hands.

General Questions:

1: Who is the perpetrator in this case? Who is the target?

A: There are two perpetrators and three targets in this case. The First perpetrator is Colin who
started the whole matter by telling students to remove Scott and Linda from their friends list
on Facebook, which made them the first targets. Then Scott made "Why I hate Colin"
Facebook page Which made Scott the second perpetrator and Colin the second target.

2:What acts of cyber bullying have happened in this case? How serious would you rank each
one as being?

A: The act of cyber bullying from Colin was to tell everyone to remove Scott from their
friends list. The act of cyber bullying from Scott was to create a chat group for people who
hate Colin and to post nasty rumors about him. He also put threats on the website saying
people should throw water balloons and rocks at Colin.

Group Questions

Scott: How can you defend your actions?


A: Scott could defend his actions by saying that Colin had started the fight in the first place
by telling everyone to remove him from their friends list.

Colin: Was what you did cyber bullying as well? If so, how can you accuse Scott? If not, why
not?

A: What Colin was cyber bulling as well. He could defend his actions by saying that he did
not take it to the extreme that Scott took it by making threats.

Colin’s parents: What should school and civil authorities do about this case? Why?

A: I think the school should sit these two boys down and explain to them the dangers of cyber
bullying. They should each have to complete an internet safety course and should also have to
do some kind of community service for the school. I do not think that legal actions should be
taken because the boys did not materialize any of their threats. I think that both boys should
be treated the same because they both reacted in an immature and hateful way.

Other members of Scott’s Facebook group: What can you do, and should you have done, in
this case? Why?

A: Students should have reported that Colin asked them to delete Scott off facebook and that
Scott started a hateful facebook page. They should have never got involved in this matter and
stopped it before it started. This type of thing can affect a student at school, at home and even
later on in life. Students should feel safe when they come to school and internet bullying
should not be tolerated.

Teacher: What can you do, and should you have done, in this case? Why?

A: As teachers it is our job to teach students about the dangers and consequences of internet
bullying. We need to teach them to be safe on the internet before we expect them to use it
properly. The teacher should also be listening and taking what the students say seriously. If
someone reports internet bullying then the teacher needs to talk to the administration so they
can take action.

Police: Should criminal charges be laid in this case? If so, which ones and why? If not,
prepare an explanation for the target’s parents as to why not.
s case.

A: I do not think that criminal charges should be laid out in this case because it was both
parties that were at fault. Scott did not directly threaten anyone by creating this page and no
one got hurt in this case. The parents should know that their son started the internet fight and
that both parties are at fault.

Helping students:
This lesson could help my students to see how important is it to be safe online. Some students
would not even consider something like this bullying because it was retaliation to something
else that happened. Students need to know that any type of threat will be taken seriously by
their school and administration even if they are defending themselves.

Cyber Predators, Week 1 - Ria Bustos

Resource used: http://jccsinternetsafety.wetpaint.com/page/Cyber+Predators

A Cyber predator uses the Internet to hunt for victims to take advantage of in ANY way,
including sexually, emotionally, psychologically or financially. Cyber predators know how to
manipulate kids, creating trust and friendship where none should exist.

The assignment I chose was from Cyber Predators, Week 1. This assignment asks students
to watch “Amy’s Choice,” a true story about a teenager who runs away from home with a
man she meets online. Its objective is to increase communication between teenagers and
adults about staying safe online.

The students were asked the questions below. This was cut and pasted directly from the
article. The answers were already provided.

1. Why did Amy start talking to the man online?


(She felt like she didn't have anyone to talk to.)

2. Where did Amy first “meet” the man?


(In an online private chat room.)

3. How long did Amy talk to the man online before meeting him in person?
(About a month.)

4. Amy knew how old the man was. Why did she keep talking to him?
(He was someone to talk to, and he said reassuring things to her. He paid attention
to her.)

5. Had the man ever talked other girls into meeting with him in person?
(Yes, but he'd never been caught.)

6. Why is Amy still worried?


(The man still knows where she lives and could call or try to visit her after getting
out of jail.)

7. Why does Amy encourage other teens to talk to their parents about what's
going on even though they might get in trouble?
(You never know what a person you are talking to online may be capable of
doing. It is always good to get help from a trusted adult.)

QUESTIONS:

1. Why aren't many teens concerned about giving out personal information online?

I believe teens think they are invincible and that nothing bad will ever happen to them. They
are also very trusting and do not realize how potentially dangers their so-called cyber
“friends” can be.

2. At what point do you think Amy regretted sharing her personal information?

If I have to choose a moment in the clip it would be when she runs away with the guy for the
second time. It seems a part of her wanted out of her situation but was afraid to tell her
parents for fear of punishment.

3. What were the consequences of sharing her personal information online?

This man knows where she lives and how to reach her. Even if she no longer wishes to
communicate with him, he can always show up at her door. He can follow her and learn
about her life.

4. If your friend confides in you that he or she is thinking about meeting in person with
anyone he or she first “met” online, what would you tell him or her?

I would encourage her to stop all forms of communication with this person. I would
encourage her to speak to her parents about this. If she is afraid to talk to her parents, I would
suggest she speak to a school counselor.

WHY THIS IS IMPORTANT TO TEACH MY STUDENTS:

Teaching one’s students about online safety should be every teachers’ priority. Many
teenagers naively believe they know everything, including who they can or cannot trust.
What they do not realize is that there are people who prey on that naivety, specifically cyber
predators. Cyber predators are able to enter teenagers’ lives through chat rooms. Because
they meet and interact in cyberspace, cyber predators can misrepresent their sex, age and
intentions. Teenagers believe this interaction is harmless and soon they are confiding
personal information to a stranger. Cyber predators groom their prey and the determined
ones will encourage a face-to-face meeting. Unfortunately, there are too many cases where
these meetings end tragically for the teenager. As educators it is our job to educate our
students to use the Internet in an appropriate and safe manner.
Piracy & Plagiarism, Week 1 - Liz O'Brien

Definition: Piracy or Intellectual Property refers to the ownership rights of materials,


created, written, designed or expressed by individuals. These materials include music,
games, movies, photos, and writing. Illegally downloading or sharing intellectual property
without the permission of the creator is a crime punishable by law (JCCS Internet Safety
Project, Piracy and Plagiarism).
Plagiarism, as defined in the 1995 Random House Compact Unabridged Dictionary, is the
"use or close imitation of the language and thoughts of another author and the representation
of them as one's own original work."

1. Answer the following questions to the best of your ability...

• If you want to see a movie, what do you do?


Buy a movie ticket or rent a DVD. You can also down load movies from iTunes for a fee.

• How does a movie earn money for the movie studio that owns it?
A movie earns money by ticket sales and revenue from DVD sales.

• Who gets the profits from a movie?


The actors, producers, directors and others involved with making the movie typically get a
piece of the profit.

• What happens when a movie makes no profits?


When a movie makes no profits the company or person that financed the film usually loses
money.

1) What crime did the Missouri teenager commit and why was the FBI involved in the
arrest?
The Missouri teenage violated the "Family Entertainment and Copyright Act of 2005". This
is a federal law, enforced by the FBI, that makes it illegal to copy the work of any artist.

2) What are two ways a stolen movie print can get online?
One way a stolen movie print can get online is by someone bringing a handheld recording
device into the movie theater to copy the movie and then uploads it on the Internet. A second
way is if an insider on the set of the movie or a person associated with the project through a
different avenue, steals a copy of the film before it is released and uploads it online.

3) Approximately what percentage of profits does the movie industry make from DVD
rentals or purchases?
The movie industry makes approximately 50% of their profit from DVD rentals or purchases.

4) What is spoofing? Why is this strategy not always effective in stopping film piracy?
Spoofing is a technique used by movie studios to deter film pirates. It is when someone
working for the studios posts a fake copy of the movie to an Internet site for people to
download. When someone tries to download this fake copy they only get a blank screen
when the open up the file. The reason this is not always effective in stopping film piracy is
that people quickly alert other users that this is not a real copy of the film.

5) What is the short term effect of film piracy?


The short term effect of film piracy is the loss of sometimes billions of dollars for the movie
studios from the illegally downloaded movie that could have been made in movie tickets,
DVD rentals or sales.

6) What is the long term effect of film piracy?


The long term effect of film piracy is the negative impact it will have on the movie industry
as a whole. The more movies that are pirated, the less profits movie studios make, which
means fewer films will be made and those that are will be of lesser quality.

7) If someone came into your home and took a camera or a DVD player without your
knowledge or your permission, would you consider that stealing or sharing? Provide a
reason for your answer. Explain how this situation is or is not different from someone
downloading from the Internet an illegal copy of a movie?
I would consider this situation stealing because no one asked for my permission to use my
camera or DVD player. I paid for both the camera or DVD player which means it belongs to
me and no one can take it unless they ask or that would be considered a crime. This situation
is the same as downloading illegally from the Internet because the material belongs to the
artist. They paid to make the song or the movie and no one should be able to take it unless
they ask for permission from the person who owns it. This is as much a crime as someone
stealing a camera or DVD player from your home.

Discuss why this is important to teach your students.


It is important to teach students about Piracy and Plagiarism so they know can recognize how
NOT to do these things. It is not only important to educate them on what these terms mean
but also the consequences, such as breaking a federal law, that come with doing these things.
Students need to know that when they are breaking a copyright law, they are effecting many
people, such as the movie industry as a whole. The Internet makes everything so accessible
now, but students need to take ownership in having good digital citizenship and doing the
right thing by not illegally downloading copyrighted information.

Inappropriate Content, Week 1 - Patrick O'Rourke

Definition: Inappropriate content has been defined in the Children's Internet Protection Act
as visual depictions that are obscene, child pornography, or material "harmful to minors".
Categories include pornography, hate groups, violence, illegal activity, extremist groups,
online advertising.
Student Assignment

1. Answer the following questions...

• What are some of the ways that the Internet is a useful tool? (e.g.,
communication, education, entertainment, business)

Answer) The Internet is an amazing tool that can be utilized by everyone; students,
teachers, parents, etc. The Internet allows people to research a topic quickly and thoroughly.
It allows people to stay in close contact or work together despite being many miles away. It
can be used to share information, manage finances, or advertise a product or service.

• Do you think that the Internet can be dangerous? Explain your thinking or give
an example.

Answer) The Internet is a wonderful tool that can be used in countless ways. Unfortunately,
it can also be used to conduct illegal activities which can put others in danger. There are
criminals that use the Internet to scam unsuspecting individuals and steal their life savings.
The Internet has also been used by sex offenders that use the web to pray on children.
Caution must always be exercised when using the Internet.

• How have you heard the word "racist" used? How would you define the term
"racist?"

Answer) A person who believes that race is a primary determinant of human traits and
capacities and that racial differences produce an inherent superiority of a particular race.
• Who knows what a chat room is? Explain.

Answer) A chat room is an on-line forum where a group of individuals engage in open
discussions and communications with others in the same chat room. Each individual works
from his or her own computer and is almost always in a different location from the other chat
room participants.

• Do you think that chat rooms can be a dangerous medium? Do any of you have
any specific experiences with chat rooms that you'd like to share? (an example
might address personal safety in chat rooms)

Answer) Often people in chat rooms do not know the other individuals they are chatting
with. This can often lead to dangerous situations. People often misrepresent themselves on
line for various reasons. It is easy to be chatting with someone who seems very nice and
sincere and comes across as an honest and safe individual. In reality, that person could be a
criminal looking for victims or a very unstable individual with many persona problems.
Giving out personal information to strangers on the Internet can have devastating
consequences.
• Do you think that chat rooms target a specific audience? Explain your thinking
or give an example. (an example of a target audience might be children or young
adults)

Answer) There are many different kids of chat rooms and people often gravitate to one based
on their interests or intentions. Some chat rooms are intended for people of a certain age, sex,
geographical location or orientation. Some people looking to exploit others will hang out in
chat rooms where they can find unsuspecting victims. There are many chat rooms geared for
younger kids. Older adults looking to pray on kids can and do hang out in these chat rooms
and misrepresent their age, sex or other information in an attempt to lure victims in.

• Have you ever been part of a chat room discussion in which either you or
someone else gave out false information? Why do you believe people use chat
rooms to create false identities?

Answer) I have been in chat rooms in the past where people have lied about their age,
location, sex and intentions. I have gotten messages from individuals claiming to be ladies
stuck in far aways countries. They try and win over your confidence and then ask for
money. These scams are happening all the time and it is wise to be sceptical when in a chat
room.

2. Read "Daniel's Story"...

Daniel, a twelve-year-old boy, entered a chat room one day from home. Another boy who
was in the room greeted Daniel and they proceeded to "chat." They discovered that they
were both White Sox fans, so the boy typed, "Perhaps we can meet one day and go to a
baseball game. What's your real name (not online name) and home phone number?" Daniel
was excited to go to a game and he entered his information. As they continued writing, they
discussed their families' origins. Daniel wrote that his grandparents were Holocaust survivors
from Europe who were liberated after being in concentration camps for two years. The other
boy didn't respond and logged offline. Within five minutes, Daniel received numerous e-
mails saying: "Die Jew!" He received repeated phone calls repeating the same message. His
parents finally were forced to disconnect the phone. When they asked what happened, Daniel
told them the story. They asked him who the other boy was, but Daniel didn't know his real
identity. When his parents asked to see the hate-filled e-mail messages, Daniel told them he
deleted them as soon as he got them because they were so disturbing. Fortunately, Daniel did
not give out his home address.

3. Respond to the following questions...

• Describe, in your own words, what happened to Daniel.

Answer) Daniel met some one on line and made the mistake of giving out his real name and
telephone number. Who that individual really was or what there intentions were will never
be know. It is safe to say they were anti-Semitic and potentially dangerous.
• How was he feeling before the hate message? After the hate message?

Answer) Initially Daniel was excited to have met a friend his age who shared an interest with
him. Whether that person was Daniel's age or really liked baseball is any one's guess. Once
Daniel started getting hat messages is feeling of excitement turned to fear and disgust.

• What could he have done to avoid this experience?

Answer) It is never wise to give out any personal information to strangers on the Internet.
Someone Daniels age should not have access to a chat room unless his parents are in the
room at the same time to supervise Daniel.

• What would you have done if you had been in the chat room when these hateful
messages popped up?

Answer) There is very little you can do in a chat room to prevent hate speech from taking
place. Getting into a discussion with a person like that is futile. You can report that person to
the chat room administrator but that will take some time to remove them and block them from
coming back. It is best not to give out any personal information on line and if a person seems
unstable it is best to leave the chat room.

• What are some of possible ways that people can protect themselves from this
kind of hate on the Internet?

Answer) There is only so much that can be done to protect yourself from this kind of
experience. You can always block people from sending you messages. Avoiding char rooms
will also help to separate yourself from some of the crazy people who hang out in chat
rooms. Not accepting emails or instant messages from people you don't know is a great idea.
You can also use blockers and filters to keep strangers from invading your privacy.

• Do you think it is ever safe to reveal personal information over the Internet? If
yes, when? If no, why not?

Answer) If you have ever made a purchase over the Internet then you exchanged personal
information. It is OK to do so when you know the web site is secure, the company or person
you are dealing with is legitimate and you confirmation that the company or person is who
they say they are.

• What other kinds of hate that could exist on the Internet?


Answers) There is no shortage of hate in this country or on the Internet. You can find
individuals that hate people of different religions, races, sexual orientations, nationalities,
political persuasions, etc.

• Have you ever experienced such kinds of hate?

I have never experienced that kind of hate.

• What could you do if you encountered hate on the Internet

Answer) The best thing to do when encountering hate on the Internet is to leave the site.
There are so many options on the Internet, so finding one that doesn't promote hate should be
easy.

Helping students: This an extremely important lesson that needs to be taught to all students.
While the Internet is a wonderful tool with countless uses, it is also a place where predators,
thieves, intolerant and unstable people hang out. It is impossible to shield yourself form
encountering these people on the Internet. But by learning some safe practices students can
reduce their risk considerably. I would use this topic and lesson as a starting point for
introducing the Internet to my students.

Social Networks, Week 4 - Rebecca Rutherford

A social network is a service that uses the Internet for online communication
through an interactive network of photos, web logs, user profiles, e-mail,
web forums, and groups, as well as other media. * Social networking sites gather data
submitted by members as "profiles"
* Profiles can then be shared among members
* Membership can be free or fee-based

Student Assignment
1. Review the material on paraphrasing from the University of Purdue's OWL online
writing lab

2. Paraphrase the following excerpts...

• The twenties were the years when drinking was against the law, and the law was
a bad joke because everyone knew of a local bar where liquor could be had.
They were the years when organized crime ruled the cities, and the police
seemed powerless to do anything against it. Classical music was forgotten while
jazz spread throughout the land, and men like Bix Beiderbecke, Louis
Armstrong, and Count Basie became the heroes of the young. The flapper was
born in the twenties, and with her bobbed hair and short skirts, she symbolized,
perhaps more than anyone or anything else, America's break with the past.
From Kathleen Yancey, English 102 Supplemental Guide (1989): 2
• Prohibition, Speak easies and gangsters ruled the 1920's. The world met a lot of
new famous people that accomplished great things. The people were changing
the world one step at a time.
3. Read the web article, "12 tips for safe social networking" ...
4. Paraphrase each of the 12 tips...

TIP 1 – Beware of TMI: the five things you should never share: Anything that
is significant to you as a person should not be shared over the Internet.
Birthdays, Social security numbers, bank pin numbers, anything like this is
personal and can be used in harmful ways

TIP 2 – Customize privacy options: Websites let you set your own options for
who can view your page, so use them.

TIP 3 – Limit work history details on LinkedIn: When you are putting
information on sites like LinkedIn you should limit the amount of information
that is free for everyone to see. The information can be available and then
hidden once a job is obtained.

TIP 4 - Don't trust, just verify: Don't assume a person that you are getting in
touch with on the Internet is who they say they are. You should always try and
verify who you are talking to.

TIP 5 – Control comments: Make sure that only people you want to comment
on your blogs are commenting. People will post comments on those they don't
know just to frustrate them.

TIP 6 – Avoid accidentally sharing personal details: Don't post where you will
be or what is happening in your life because people can use that against you.
People have been known for getting robbed after posting when they will be
gone.

TIP 7 – Search yourself: Look up your own name on the Internet and see what
comes up. That way you can make sure no one is doing anything against you or
stealing your identity.

TIP 8 – Don't violate your company's social networking policies: Be aware of


the companies policy as far as using social networking at work. Also be aware
of who at work sees your posts so you don't post something wrong.

TIP 9 – Learn how sites can use your information: Before entering personal
information into a site make sure and read the privacy policies so that the
information is not used against you.

TIP 10 – Forget the popularity contest : A lot of friends or lots of comments is


not necessarily a good thing if you are letting people on the site that you don't
know.

TIP 11 – Create a smaller social network: Facebook and Myspace are good sites,
but there are other ways to make smaller networks that are more personal and
access is limited to the outside public. Smaller can help protect you from
outsiders and truly give you what you were looking for.

TIP 12 – Setup an OpenID account: Setting up an OpenID helps better manage


all the your accounts. This is a good thing because it helps to identity the users,
so if you are talking to someone that has one you know they are who they say
they are.

Das könnte Ihnen auch gefallen