I-SAFE America Professional Development Program. Mission: To educate & empower youth to safely...

Preview:

Citation preview

i-SAFE AmericaProfessional Development Program

Mission:

To educate & empower youth to safely and responsibly

take control of their Internet experience

i-SAFE America

Introduction

1 in 5 children under 17 years has received unwanted sexual solicitation

1 in 33 children has received an aggressive solicitation to meet somewhere

1 in 4 children ages 10 - 17 has been exposed to pornography

Consider This:

- National Center for Missing and Exploited Children

Education• Partner with School

Districts and Law Enforcement Agencies

• Deliver Professional Development Program

• Provide K-12 curriculum mapped to standards and approved by DOJ

• Assist with Implementation and Expansion Planning

Community Outreach• Promote Youth

Empowerment Activities

• Facilitate Parent Nights

• Host Community Leaders Meetings

• Assist communities in developing Internet safety events

Introduction

i-SAFE Curriculum

Curriculum Overview

Curriculum Overview

• Critical thinking activities provide a focused, in depth analysis of specific Internet safety topics.

• Lessons are interactive and student centered, to encourage peer-to-peer discussions.

• Activities are incorporated that encourage students to share the message of how to travel safely on the Internet.

Curriculum Overview

The curriculum meets the needs of:

• Students at different grade levels• Students with different learning styles• Teachers with different technology skills or

preferences• Classrooms with or without computers• National Education Technology Standards (NETS)• State academic standards in health and safety,

language arts, social studies, and technology

Curriculum Topics

CONCEPTS K – 4 5 – 8 9 – 12

Community X X X

Cyber Security X X X

Personal Safety X X X

Cyber Predators X X

Intellectual Property X X

K – 4 Curriculum: Includes three 20-minute lessons for each grade

5 – 8 Curriculum: Includes five 45-minute lessons for each grade

9 – 12 Curriculum: Includes five 45-minute webcast lessons, which will be available by spring 2004. Visit the Educator’s Page at www.isafe.org for current availability.

Curriculum Topics

i-SAFE curriculum is designed to be age appropriate for each grade level.

Suggested topics/terms to avoid:• Rape• Pedophile• Molest• Pornography• Incest

Curriculum Topics

9 – 12 Curriculum Sample

Access the webcast at www.isafe.org

Internet Safety Concepts

A Parent Overview of the Internet Safety Concepts

Community Cyber Security Personal Safety Cyber Predators Intellectual Property

Community

Community

Inappropriate Material Web Browsing Website Evaluation

Community

There are over 3,000 hate sites on the Internet.

There are over 100,000 sites that sell child pornography.

There are a growing number of sites that provide instructions on how to produce destructive items.

Consider This:

-Simon Wiesenthal Center, The Red Herring, Loompanics.com

Community

The Constitution protects Internet speech that is critical, annoying, offensive, or demeaning, as long

as it does not include a direct threat or incite violence.

Community Summary

How are young adults exposed to inappropriate online material?

• Advertisements• Key Word Searches• Typo Squatting

How can youth take control of their online experience?

• Exit websites that are inappropriate• Evaluate websites to determine appropriateness

Cyber Security

Cyber Security

Spam E-mail Steganography Cyber Harassment Viruses and Hackers

Cyber Security

E-mail

Electronic mail. The exchange of computer stored messages by telecommunication.

Cyber Security

80% of youth ages 7-18 receive inappropriate e-mail on a daily basis.

-Symantec

Consider This:

Cyber Security

Spam E-mail

Unsolicited e-mail sent to a

large number of addresses.

Cyber Security

Steganography

Covered writing. Hiding a message within an image, audio or video file. Used as an alternative to encryption because

unlike encrypted messages, it is undetectable.

Cyber Security

Cyber Harassment

!X

Cyber Security

Popularone32001

Popularone32001

Popularone32001

Popularone32001

Popularone32001

Popularone32001

Popularone32001

Cyber Security

“Rather than just some people, say 30 in a cafeteria, hearing them all yell insults at you, it’s up there for 6 billion people to see…”

-David Knight victim of cyber bullying for close to a year.

Cyber Security

Currently, 45 states have laws expressly prohibiting harassment conducted through the Internet, e-mail, or other electronic means.

Consider This:

-www.haltabuse.org

Cyber Security

In 2002, what was the fastest growing crime in the United States?

Cyber Security

It is estimated that as many as 1.1 million people were victims of identity theft in 2002.

- www.consumer.gov

Consider This:

Cyber Security

Virus

A virus is a piece of programming code

usually disguised as something else that

causes some unexpected and

usually undesirable event.

Cyber Security

Open a file that contains a virus…

and you could unknowingly spread it to others.

.vbs

.exe.scr

Cyber Security

Can you spot the warning signals?

What can you do?

Cyber Security

Hacker

Hacker is a general term used by some to mean

“a clever programmer” and by others to mean

“someone who tries to break into computer systems”.

Cyber Security Summary

What precautions can you take against spam e-mail?• Avoid opening suspicious e-mail. • Beware of responding to or acting on spam e-mail.

How can you avoid catching or spreading a virus?• Don’t open attachments from people you do not

know.• Beware of files with extensions such as .exe.,

.vbs, .scr which commonly contain viruses. • Install an antivirus software program and keep it

updated.

Personal Safety

Personal Safety

Instant Messaging Chat Rooms Screen Names Profiles Online Conversations

Personal Safety

Instant Messaging:

The ability to exchange text messages with

other Internet users.

IM and Chat Rooms

Buddy list

Personal Safety

Personal Safety

LOLBRBBWLDIKUDOMIPNPMCTNP911PALS^

Laugh out loudBe right backBursting with laughterDo I know you?Dirty old manI’m posting nakedPrivate messageCan’t Talk NowParent In the Room Watch Your LanguageParents are ListeningS’up/What’s up

Personal Safety

60% of online teens have received e-mail or instant messages from a perfect stranger.

63% of those have responded.

- Pew Internet Project

Consider This:

Personal Safety

Screen Name

A name used when communicating

with others online.

Online description of the user.

Profile

Personal Safety

Chat Room

A website or service that provides a venue for communities of users with a common interest to communicate in real time.

IM and Chat Rooms

x@x.com

Personal Safety

Consider This:

87% of Americans can be identified by their birth date, gender, and zip code.

- Latanya Sweeny, Ph.D., Carnegie Mellon Data Privacy Lab

Personal Safety

A/S/L?Age/Sex/Location

Personal Safety

FBI Cyber Safety Tips for Kids and Teens

• Never reveal identifying information to people you do not know.

• Tell your parents if you come across information that makes you feel uncomfortable.

• Never arrange a face-to-face meeting without telling your parent or guardian.

• Remember people may not be who they say they are.

Personal Safety Summary

How can personal information be revealed during online communication?

• Screen Names• Profiles• Conversations

What personal information should not be revealed during online communication?

• Name• Address• Phone Number• School Name

Cyber Predators

Cyber Predators

Characteristics Predator Tools Grooming Process

Cyber Predators

540,000,000 Internet Users

250,000 – 500,000 known pedophiles

in the U.S.

- U.S. Department of Justice

Consider This:

Cyber Predators

Common Characteristics

• Male• Middle-aged• College graduates• Employed• Previously or currently married

Cyber Predators

Communication Development

• Chat Room• Private Chat• Instant Messaging• E-mail• Phone

Cyber Predators

Similar Interests

Trust

Secrecy

Break Down Barriers

Threats

Face-to-Face Meeting

Cyber Predators

Similar Interests

Trust

Secrecy

Break Down Barriers

Threats

Face-to-Face Meeting

X

X

X XX X XX

X

X

X

X XXX

X

Cyber Predators Summary

What forms of communication do online predators utilize?• Chat Rooms• Instant Messaging• E-mail• Phone

What are the steps in the grooming process?• Similar Interests• Trust• Secrecy• Break Down Barriers• Threats• Face-to-Face Meeting

Intellectual Property

Intellectual Property

Public Domain Copyright Plagiarism Online Piracy

Intellectual Property

Public Domain

Any work that can be freely used or reproduced without authorization or credit.

Intellectual Property

Copyright

The exclusive right to a publication, production,

or sale of the rights to a literary, dramatic,

musical, or artistic work.

Intellectual Property

Rights Copyright Owner Copy Holders

Read, listen to, or otherwise enjoy the work

Reproduce the work

Distribute copies of the work

In the case of music, digitally transmit the work

Give away a personal copy of the work

Sell a personal copy of the work

Publicly perform the work

Publicly display the work

X

X

X

X

X

X

X

X X

X

X

Copyright Laws

Intellectual Property

The Internet and Intellectual Property

Plagiarism

Online Piracy

Intellectual Property

Plagiarism

The act of stealing or passing off the

ideas or words of another as one’s own.

Intellectual Property

54% of students admitted to plagiarizing from the Internet.

74% of students admitted that at least once during the past school year they had engaged in “serious” cheating.

47% of students believe their teachers sometimes choose to ignore students who are cheating.

-Plagiarism.org

Consider This:

Intellectual Property

Online Piracy

The traffic of online counterfeit copyrighted material. It is fast, cheap, and often anonymous.

Intellectual Property

Yearly International Financial Loses:

• $12 billion lost annually by the computer software industry

• $3 billion lost annually by the movie industry• $4.2 billion lost annually by the music industry

worldwide.

-SIAA, MPAA, RIAA

Intellectual Property Summary

What is public domain?• Any work that can be freely used or reproduced

without authorization or credit.

What can educators do to help prevent plagiarism?• Teach appropriate techniques for citing works

and text. • Hold students accountable.

What are the consequences for downloading music and software?

• Criminal penalties.• Download a virus or inappropriate material.

Youth Empowerment

Campaign

Youth Empowerment Campaign

Youth Empowerment Campaign

Student Mentors and Ambassadors

Students spread the message of Internet safety with their peers, parents, and community.

How can YOU get students

involved?

Encourage the students to sign-up and get involved

• i-SAFE works with local Parent Teacher Organizations to inform parents about the need for Internet safety.

• i-SAFE provides parents with materials and tips to educate their families about Internet safety.

Community Outreach Campaign

Parents

i-SAFE America, Inc.(760) 603-7911

education@isafe.org outreach@isafe.org www.isafe.org

Recommended