Sie sind auf Seite 1von 14

Cyber Safety

Learning how to access the


Internet Safely

Kayla Franklin
Smith Middle School

Canoga Park, CA
+
Piracy,
Plagiarism-
Definition and
avoidance
techniques Cyber-bullying-
How to prevent
and recognize
Acceptable
Use Policies-

Cyber
How to
safely
navigate the
cyber world

Safet
y Cyber-predators-
How to control
contact through
Identity Safety- safety measures
How much
information
should you make
available?
Acceptable Use
Policies to prevent abuse and even danger

The school has to have policy in place to protect


Agreement
students

Teachers and school districts have the


Monitoring responsibility to monitor and limit access to the
Internet

Parents need to be responsible for teaching their


Parents
child acceptable actions online

Talk to youth about cyber safety and be available


Communit
y for questions
Sample of Acceptable Use Policies
Acceptable Use
Items For Educators

Schools responsibility:
Enforcement to ensure the operation of the filtering
technology during any use of such computers by minors.
Deny access by minors to inappropriate matter on the
Internet.
Prevent unauthorized disclosure, use and dissemination of
personal identification information regarding minors.
)2015 BASCOM Global Internet Services, Inc. http://www.bascom.com/legislation/internet-acceptable-use-policy)

Examples:
Webmaster
Classroom Organization
Cyber-Bullying
Prevention and Awareness

Honor
and
Lead by respect
example whats
Classroo
m shared
Awarenes
s and
Monitorin
g
Statistics on Cyber- Bullying
Prevention and Awareness can help decrease
these numbers

28% of students ages 12 to 18 years old reported


being BULLIED AT SCHOOL Robers et al. (2013)

24% of students ages 12 to 18 years old reported


being CYBERBULLIED DURING THEIR LIFETIMES Robers
et al. (2013)

SOCIAL MEDIA AND CRUELTY: Of social media-using


teens ages 1217, 15% have been the target of online
meanness; 88% have seen someone be mean or cruel
on social network sites. (Lenhart et.al, 2011)

Cyber-Bullying PSA Video Bullying Prevention and Intervention Tips


+
Cyber-Predators-A Real DANGER
Internet Safety

Tips to keep students safe What Fuels Internet Predators?

Pay attention to what your


Easy and anonymous access to
children
students are doing online, and ask
your student non-threatening Risky online behavior of youth
questions.
Virtual validation
Avoid over-reacting if your
students have been talking to Law enforcement challenges
people they dont know online or if
they admit that theyve come East access to a la carte child
across a dangerous or tricky pornography
situation online.

Be aware of what sites have been


visited and what information is
shared on sites you have your
students visit.
+
Statistics on Cyber- Predators

In 82% of online sex crimes against How to help parents and educators
minors, the offender used the look for warning signs with
victim's social networking site to children:
gain information about the victim's
likes and dislikes. (Journal of 1. Becomes secretive about online activities
Adolescent Health 47, 2010) 2. Becomes obsessive about being online

Only 18% of youth use chat rooms, 3. Gets angry when he or she cant get
online
however, the majority of Internet-
initiated sex crimes against children 4. Receives phone calls from people you do
are initiated in chat rooms. (Journal not know or makes calls to numbers that
you do not recognize
of Adolescent Health 47, 2010)
5. Receives gifts, mail, or packages from
someone you do not know
65% of online sex offenders used the
victim's social networking site to 6. Withdraws from family and friends
gain home and school information
7. Changes screens or turns off computer
about the victim(Journal of when an adult enters a room
Adolescent Health 47, 2010)
8. Begins downloading pornography online
+
Identity Privacy
How you can help your students stay safe

Students may disclose Student accounts should be


personal information about established using a unique
themselves in electronic student identifier that will
messages or on Web sites. disguise students' real
Students should receive names to the outside world
instruction in the protection
of personal privacy.

No Anonymity Students need to be


educated regarding cookies
and other types of malware
that may put their identity
at risk.
+
Keep it PRIVATE

Examples of what students How you can assist your


SHOULDNT DO: students:
Teach them what is ok to share
Reveal personal information online

Provide any address or Provide them with solutions if they


school information are in a situation

Be available for them to talk to


Agree to meet someone
Monitor the information they share
Provide phone numbers

Lie to their family for a


person they only know
online
+ Protect our Arts

Plagiaris
m and
Piracy Teach Proper
citing
techniques

How many of you have


downloaded a movie or
Now how many of a song?
you have not PAID
for that material?
+
Consequences of plagiarism or
piracy
Piracy Plagiarism
Jail Time- up to five Destroyed student
years is a real possibility reputation
for media downloading.
Fine- A judge may Legal Repercussions
impose a fine in excess
of $1000

There are many sources online as well that


students should be made aware of. These
sites let teachers check for plagiarism in
assignments. Information on Plag
iarism
They need to know of the consequences in
school as well.
+
Conclusion

As educators we can promise to help our students stay


CyberSafe by:

Always trying to be available and aware

Informing of students of the dangers and ensuring they


know what is appropriate.

Helping them understand what plagiarism is and


enforcing the rules consistently.

Having parents be involved and ensure they are aware


of dangers.
Resources
Robers, S., Kemp J., and Truman, J. 2013. Indicators of School Crime and
Safety: 2012. DC: National Center for Education Statistics, U.S.
Department of Education

Lenhart, A., Madden, M., et al. 2011. Teens, Kindness and Cruelty on Social
Network Sites. DC: Pew Research Centers Internet & American Life
Project.

Warning Signs. (2013, May 16). Retrieved February 23, 2015,


http://www.internetsafety101.org/predatorwarningsigns.

Online Safety Guide. (2014, March 17). Retrieved February 23, 2015, from
http://kids.getnetwise.org/safetyguide/

Willard, N. (2002, January 1). Ensuring Student Privacy on the


Internet. Retrieved February 23, 2015, from
http://www.educationworld.com/a_tech/tech120.shtml

There is no anonymity on the Internet. (2014, January 1).


Retrieved February 23, 2015, from
http://teachingprivacy.icsi.berkeley.edu/theres-no-anonymity/

Das könnte Ihnen auch gefallen