Upload
david-mcguire
View
215
Download
2
Tags:
Embed Size (px)
Citation preview
i-SAFE AmericaProfessional Development Program
Mission:
To educate & empower youth to safely and responsibly
take control of their Internet experience
i-SAFE America
Introduction
1 in 5 children under 17 years has received unwanted sexual solicitation
1 in 33 children has received an aggressive solicitation to meet somewhere
1 in 4 children ages 10 - 17 has been exposed to pornography
Consider This:
- National Center for Missing and Exploited Children
Education• Partner with School
Districts and Law Enforcement Agencies
• Deliver Professional Development Program
• Provide K-12 curriculum mapped to standards and approved by DOJ
• Assist with Implementation and Expansion Planning
Community Outreach• Promote Youth
Empowerment Activities
• Facilitate Parent Nights
• Host Community Leaders Meetings
• Assist communities in developing Internet safety events
Introduction
i-SAFE Curriculum
Curriculum Overview
Curriculum Overview
• Critical thinking activities provide a focused, in depth analysis of specific Internet safety topics.
• Lessons are interactive and student centered, to encourage peer-to-peer discussions.
• Activities are incorporated that encourage students to share the message of how to travel safely on the Internet.
Curriculum Overview
The curriculum meets the needs of:
• Students at different grade levels• Students with different learning styles• Teachers with different technology skills or
preferences• Classrooms with or without computers• National Education Technology Standards (NETS)• State academic standards in health and safety,
language arts, social studies, and technology
Curriculum Topics
CONCEPTS K – 4 5 – 8 9 – 12
Community X X X
Cyber Security X X X
Personal Safety X X X
Cyber Predators X X
Intellectual Property X X
K – 4 Curriculum: Includes three 20-minute lessons for each grade
5 – 8 Curriculum: Includes five 45-minute lessons for each grade
9 – 12 Curriculum: Includes five 45-minute webcast lessons, which will be available by spring 2004. Visit the Educator’s Page at www.isafe.org for current availability.
Curriculum Topics
i-SAFE curriculum is designed to be age appropriate for each grade level.
Suggested topics/terms to avoid:• Rape• Pedophile• Molest• Pornography• Incest
Curriculum Topics
9 – 12 Curriculum Sample
Access the webcast at www.isafe.org
Internet Safety Concepts
A Parent Overview of the Internet Safety Concepts
Community Cyber Security Personal Safety Cyber Predators Intellectual Property
Community
Community
Inappropriate Material Web Browsing Website Evaluation
Community
There are over 3,000 hate sites on the Internet.
There are over 100,000 sites that sell child pornography.
There are a growing number of sites that provide instructions on how to produce destructive items.
Consider This:
-Simon Wiesenthal Center, The Red Herring, Loompanics.com
Community
The Constitution protects Internet speech that is critical, annoying, offensive, or demeaning, as long
as it does not include a direct threat or incite violence.
Community Summary
How are young adults exposed to inappropriate online material?
• Advertisements• Key Word Searches• Typo Squatting
How can youth take control of their online experience?
• Exit websites that are inappropriate• Evaluate websites to determine appropriateness
Cyber Security
Cyber Security
Spam E-mail Steganography Cyber Harassment Viruses and Hackers
Cyber Security
Electronic mail. The exchange of computer stored messages by telecommunication.
Cyber Security
80% of youth ages 7-18 receive inappropriate e-mail on a daily basis.
-Symantec
Consider This:
Cyber Security
Spam E-mail
Unsolicited e-mail sent to a
large number of addresses.
Cyber Security
Steganography
Covered writing. Hiding a message within an image, audio or video file. Used as an alternative to encryption because
unlike encrypted messages, it is undetectable.
Cyber Security
Cyber Harassment
!X
Cyber Security
Popularone32001
Popularone32001
Popularone32001
Popularone32001
Popularone32001
Popularone32001
Popularone32001
Cyber Security
“Rather than just some people, say 30 in a cafeteria, hearing them all yell insults at you, it’s up there for 6 billion people to see…”
-David Knight victim of cyber bullying for close to a year.
Cyber Security
Currently, 45 states have laws expressly prohibiting harassment conducted through the Internet, e-mail, or other electronic means.
Consider This:
-www.haltabuse.org
Cyber Security
In 2002, what was the fastest growing crime in the United States?
Cyber Security
It is estimated that as many as 1.1 million people were victims of identity theft in 2002.
- www.consumer.gov
Consider This:
Cyber Security
Virus
A virus is a piece of programming code
usually disguised as something else that
causes some unexpected and
usually undesirable event.
Cyber Security
Open a file that contains a virus…
and you could unknowingly spread it to others.
.vbs
.exe.scr
Cyber Security
Can you spot the warning signals?
What can you do?
Cyber Security
Hacker
Hacker is a general term used by some to mean
“a clever programmer” and by others to mean
“someone who tries to break into computer systems”.
Cyber Security Summary
What precautions can you take against spam e-mail?• Avoid opening suspicious e-mail. • Beware of responding to or acting on spam e-mail.
How can you avoid catching or spreading a virus?• Don’t open attachments from people you do not
know.• Beware of files with extensions such as .exe.,
.vbs, .scr which commonly contain viruses. • Install an antivirus software program and keep it
updated.
Personal Safety
Personal Safety
Instant Messaging Chat Rooms Screen Names Profiles Online Conversations
Personal Safety
Instant Messaging:
The ability to exchange text messages with
other Internet users.
IM and Chat Rooms
Buddy list
Personal Safety
Personal Safety
LOLBRBBWLDIKUDOMIPNPMCTNP911PALS^
Laugh out loudBe right backBursting with laughterDo I know you?Dirty old manI’m posting nakedPrivate messageCan’t Talk NowParent In the Room Watch Your LanguageParents are ListeningS’up/What’s up
Personal Safety
60% of online teens have received e-mail or instant messages from a perfect stranger.
63% of those have responded.
- Pew Internet Project
Consider This:
Personal Safety
Screen Name
A name used when communicating
with others online.
Online description of the user.
Profile
Personal Safety
Chat Room
A website or service that provides a venue for communities of users with a common interest to communicate in real time.
IM and Chat Rooms
Personal Safety
Consider This:
87% of Americans can be identified by their birth date, gender, and zip code.
- Latanya Sweeny, Ph.D., Carnegie Mellon Data Privacy Lab
Personal Safety
A/S/L?Age/Sex/Location
Personal Safety
FBI Cyber Safety Tips for Kids and Teens
• Never reveal identifying information to people you do not know.
• Tell your parents if you come across information that makes you feel uncomfortable.
• Never arrange a face-to-face meeting without telling your parent or guardian.
• Remember people may not be who they say they are.
Personal Safety Summary
How can personal information be revealed during online communication?
• Screen Names• Profiles• Conversations
What personal information should not be revealed during online communication?
• Name• Address• Phone Number• School Name
Cyber Predators
Cyber Predators
Characteristics Predator Tools Grooming Process
Cyber Predators
540,000,000 Internet Users
250,000 – 500,000 known pedophiles
in the U.S.
- U.S. Department of Justice
Consider This:
Cyber Predators
Common Characteristics
• Male• Middle-aged• College graduates• Employed• Previously or currently married
Cyber Predators
Communication Development
• Chat Room• Private Chat• Instant Messaging• E-mail• Phone
Cyber Predators
Similar Interests
Trust
Secrecy
Break Down Barriers
Threats
Face-to-Face Meeting
Cyber Predators
Similar Interests
Trust
Secrecy
Break Down Barriers
Threats
Face-to-Face Meeting
X
X
X XX X XX
X
X
X
X XXX
X
Cyber Predators Summary
What forms of communication do online predators utilize?• Chat Rooms• Instant Messaging• E-mail• Phone
What are the steps in the grooming process?• Similar Interests• Trust• Secrecy• Break Down Barriers• Threats• Face-to-Face Meeting
Intellectual Property
Intellectual Property
Public Domain Copyright Plagiarism Online Piracy
Intellectual Property
Public Domain
Any work that can be freely used or reproduced without authorization or credit.
Intellectual Property
Copyright
The exclusive right to a publication, production,
or sale of the rights to a literary, dramatic,
musical, or artistic work.
Intellectual Property
Rights Copyright Owner Copy Holders
Read, listen to, or otherwise enjoy the work
Reproduce the work
Distribute copies of the work
In the case of music, digitally transmit the work
Give away a personal copy of the work
Sell a personal copy of the work
Publicly perform the work
Publicly display the work
X
X
X
X
X
X
X
X X
X
X
Copyright Laws
Intellectual Property
The Internet and Intellectual Property
Plagiarism
Online Piracy
Intellectual Property
Plagiarism
The act of stealing or passing off the
ideas or words of another as one’s own.
Intellectual Property
54% of students admitted to plagiarizing from the Internet.
74% of students admitted that at least once during the past school year they had engaged in “serious” cheating.
47% of students believe their teachers sometimes choose to ignore students who are cheating.
-Plagiarism.org
Consider This:
Intellectual Property
Online Piracy
The traffic of online counterfeit copyrighted material. It is fast, cheap, and often anonymous.
Intellectual Property
Yearly International Financial Loses:
• $12 billion lost annually by the computer software industry
• $3 billion lost annually by the movie industry• $4.2 billion lost annually by the music industry
worldwide.
-SIAA, MPAA, RIAA
Intellectual Property Summary
What is public domain?• Any work that can be freely used or reproduced
without authorization or credit.
What can educators do to help prevent plagiarism?• Teach appropriate techniques for citing works
and text. • Hold students accountable.
What are the consequences for downloading music and software?
• Criminal penalties.• Download a virus or inappropriate material.
Youth Empowerment
Campaign
Youth Empowerment Campaign
Youth Empowerment Campaign
Student Mentors and Ambassadors
Students spread the message of Internet safety with their peers, parents, and community.
How can YOU get students
involved?
Encourage the students to sign-up and get involved
• i-SAFE works with local Parent Teacher Organizations to inform parents about the need for Internet safety.
• i-SAFE provides parents with materials and tips to educate their families about Internet safety.
Community Outreach Campaign
Parents
i-SAFE America, Inc.(760) 603-7911
[email protected] [email protected] www.isafe.org