41
CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety PowerPoint http://www.ctap4.org/cybersafety/

CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

Embed Size (px)

Citation preview

Page 1: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

CyberSafety Unraveled

Clipart from 2008 Jupitermedia All rights reserved

Maryellen BroganCecil County Public Schools

Adapted from CTAP IV CyberSafety PowerPointhttp://www.ctap4.org/cybersafety/

Page 2: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

CTAP4 Website with ResourcesResources for Educators, Parents, and Students

Page 3: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

Goals of Presentation

considering strategies to help ensure that our children have a safe, positive experience with technology.

To unravel the fear and hype surrounding the online lives of our cyber kids

while also

Page 4: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

How Do You Use the Internet?

• What Are Your Favorite Sites?

• Why?

Page 5: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

How Are Kids Using the Internet?

•www.myspace.com•www.xanga.com•www.google.com•www.nbc.com•www.ebay.com•www.facebook.com•www.livejournal.com•www.yahoo.com•www.clubpenguin.com•www.itunes.com•www.gamefacts.com•community.webshots.com

•www.aim.com•www.smartpunk.com•www.youtube.com•www.amazon.com•www.turnitin.com•www.addictinggames.com•www.funnyjunk.com•www.albinoblacksheep.com•www.homestarrunner.com•www.fuse.tv.com•www.webkinz.com•en.wikipedia.com

Page 6: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

Six Areas Covered Here and on Poster:

1.

2.

3.

4.

5.

6.

Following the Thread

Closing

Page 7: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

Definition: Personal information identifies you,your location or your financial assets.

• Obvious: name, age, sex, picture, phone number, address

• Less obvious: hobbies, interests, school mascot, gaming identities

• Used for phishing scams

Threads“Think Before You Post”

Page 8: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

Unraveling the facts…• Identity thieves are clever, posing as friends,

relatives and banks, to get people to reveal personal information. Watch for https and URL posers like paypa1. (Phishing)

• Teens are just as likely as adults to become victims of identity theft -- when applying for a driver's license they may find one already has been issued using their name and SSN.

Page 9: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

www.ctap4.org/cybersafety/

K-6 Boy Who Loved IM 7-12 Real-life Video

Parent Video

Classroom Resources

Page 10: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

• Do not share personal information such as your name, age, sex, picture, location/address, phone number, hobbies, interests, and Social Security/bank account numbers.

• Create nicknames that do not reflect your own name or anything personal.

To-Dos: Remember to share guidelines with your children:

Page 11: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

To-Dos (cont’d):

• Never respond to online communication that is inappropriate or makes you feel uncomfortable.

• Never agree to meet in person someone you met online.

• Always talk with your parents or a responsible adult about your online activities.

Threads

Page 12: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

Definition: Piracy refers to the ownership

rights of materials, created, written,

designed or expressed by individuals.

• Includes music, games, movies, photos, and writing

Threads

Page 13: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

Unraveling the facts…

• File-sharing represents 60% of all US Internet traffic.

• Illegally downloading or sharing intellectual property without the permission of the creator is a crime punishable by law.

Page 14: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

Resources found at:

http://www.ctap4.org/cybersafety/ip.htm

K-8 Cyber Bee

9-12 Plagiarism Site

Page 15: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

• Don’t download, copy, or share music, games, movies, photos, or other property without permission of the creator.

• Use only legitimate sites (those that request payment or are copyright free) when downloading online media.

To-Dos: Remember to share guidelines with your children:

Threads

Page 16: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

Definition: Cyberbullying is the use of

technology for harassment, impersonation,

denigration, trickery, exclusion and stalking.

• Cyberbullies may use email, chat rooms, discussion forums, instant messaging, text messaging or social networking sites.

NetSmartz Real-life Video

Threads

Page 17: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

Unraveling the facts… • “If I tell someone about bullying, it will just

make it worse.” Research shows that bullying will stop when peers or adults get involved.

• Headline news provides opportunities for discussion and “teachable moments”

Lesson - Online Bully

Page 18: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

• Don’t respond to or meet with a cyberbully.

• Save proof of the harassment like e-mail messages, screen shots, IM logs, blogs, etc.

To-Dos: Remember to share guidelines with your children:

Page 19: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

To-Dos (cont’d):

• Tell a trusted adult who can:

File a complaint with the Internet Service Provider or send an email to the host of the web site where the abuse was posted.

Contact the cyberbully’s parents.

Contact an attorney or file a small claims action. Threads

Page 20: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

Definition: Social network sites (MySpace and

Xanga) are services that use the Internet to

create an interactive network of photos, videos,

web logs (blogs) and groups.

• Social networking sites gather data submitted by members as “profiles”

• Profiles can then be shared among members

ThreadsStaySafeOnline.org

Page 22: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

Privacy Settings for MySpace

Page 23: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

http://en.wikipedia.org/wiki/List_of_social_networking_websites

Page 25: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

Unraveling the facts…• Posting a picture on MySpace is like posting it on a

public campus bulletin board, that anyone can access and deface

• Although there has been a lot of negative media around social networks, most users are just “hanging out” and teachers are using them in innovative ways

“Think Before You Post”

Page 26: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety
Page 27: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety
Page 28: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

• Know that sexual predators disguise themselves as friendly and often hunt for victims through social networking sites.

•Be careful about adding strangers to your “friends” list.

To-Dos: Remember to share guidelines with your children:

“You Never Know”

Page 29: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

To-Dos (cont’d):

• Never share your personal information or anything about your friends--especially your cell phone number.

• Don’t be shy; report inappropriate postings/profiles to the social networking provider and to the police.

Threads

Page 30: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

Definition: Inappropriate content has been

defined in CIPA* as visual depictions that are

obscene, child pornography, or material

"harmful to minors"

• It can also include images of violence, hate group or extremist material, illegal activities and online advertising

Threads

Page 31: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

Unraveling the facts…• A white supremacist group registered the

domain name www.martinlutherking.org in order to masquerade as a legitimate resource

• Federal policies created or proposed to protect our children include– CIPA- Children’s Internet Protection Act– COPPA- Children’s Online Privacy Protection Act– DOPA- Deleting Online Predators Act of 2006

Page 32: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

Unraveling the facts…• Inappropriate content can occur on any

computer by accident

• Only a small fraction of the materials on the Internet could reasonably be classified as inappropriate for children… Issues Online

– Unfortunately, that small fraction is highly visible and controversial.

Parent Controls Video

Page 33: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

• Tell a trusted adult, teacher or parent ifyou come across inappropriate content.

• Know how to use the back button or logoff immediately when you find material that makes you feel uncomfortable.

To-Dos: Remember to share guidelines with your children:

Page 34: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

To-Dos (cont’d):

• Don’t download files from people you don’t know.

• Utilize the MDk12 Digital Library for research. Passwords for home use.

• Set your preferences in Google for strict filtering. Ask your teacher, librarian, or parents for help. Use Advanced Search Settings. Threads

Page 35: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

Internet Filters for Home Computers

http://internet-filter-review.toptenreviews.com/

Page 36: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

Definition: A Cyber predator uses the Internet

to hunt for victims to take advantage of in ANY

way, including sexually, emotionally,

psychologically or financially

• Cyber predators know how to manipulate kids, creating trust and friendship where none should exist

ThreadsNetsmartz Video: Amy’s Choice

(go to bottom of website)

Page 37: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

Unraveling the facts…• Cyber predators can be sent to prison.

• What children need to look out for is not a certain stereotype of a dangerous person but certain types of behavior…

• Use teachable moments, even headline news, to make discussion and education relevant.

CBS News Article

Page 38: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

• Encourage your schools to add a small cyber tips section to their school newsletters.

• Remind student to think twice before sharing any information about themselves.

To-Dos: Remember to share guidelines with your children:

Page 39: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

• If you suspect that you are being stalked or the victim of inappropriate communication, report it to a trusted adult or to the CyberTipline.

http://cybertipline.com1-800-843-5678

To-Dos (cont’d):

ThreadsCyber Predator Awareness

Page 40: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

When Children We Hope They Learn. . .

• Don’t talk to strangers

Start School,Go Online,

in cyberspace

• Look both ways before

  , no cyberbullies allowed• Play nicely with other children

• If something happens that scares you, seek help from an adult you trust

clickingcrossing the street

!!!

Page 41: CyberSafety Unraveled Clipart from 2008 Jupitermedia All rights reserved Maryellen Brogan Cecil County Public Schools Adapted from CTAP IV CyberSafety

More Information

Follow the Thread to:

www.ctap4.org/cybersafety/

• Find carefully selected resources for educators, students and parents.

• Download our free Cyber Safety poster sponsored by AT&T .

• Download this presentation to share or modify.