20
Cyber Safety in School By Mr. Derek Lane

The Concerns Acceptable Use Policies Cyberbullying Cyberpredators Identity Safety Piracy and Plagiarism

Embed Size (px)

Citation preview

Cyber Safety in School

Cyber Safety in SchoolBy Mr. Derek Lane

Cyber Safety in School is the topic for todays discussion.1The ConcernsAcceptable Use PoliciesCyberbullyingCyberpredatorsIdentity SafetyPiracy and Plagiarism

The internet is growing and more people are using it every day. It is a great resource for research, entertainment, and communication. However, it can also be dangerous for our students. As teachers, we want to ensure that our students are safe when they are using the internet. These are the areas of concerns.2Acceptable Use PoliciesSchool-created policiesProtect student informationSupervise student activityFiltering Software

(Roblyer and Doering, 2013, p. 19)The first area of concern is Acceptable Use Policies. As students spend more time online, studies show a high incidence of attempts by online predators to contact students, and objectionable material is readily available and easy to access. As teachers, we will have students and parents sign an Acceptable Use Policy that details the appropriate use of technology for students and the consequences for breaking the AUP.

3Acceptable Use PoliciesClick Here!

This is a video explanation on Acceptable Use Policies that goes further into it as well as the dos and donts of internet use in school. This will us increase internet safety for our students.4

Now we are moving onto the next area: Cyberbullying. 5Cyberbullying43% of kids bullied online1 in 4 bullied more than onceNobullying.com. 2014Cyberbullying has been a growing issue in school and outside of school. 43% of kids are bullied online. 1 in 4 of them will happen more than once. Studies have shown that this happens to woman more so than men. Studies have also shown that cyberbullying is causing the rising suicide rate in young adults. It creates a domino effect where a kid gets bullied- they dont tell anyone or no one takes it serious- then it continues to depression and feelings of worthlessness. In result, the child will need a lot of psychological help or it can not be dealt with- which can have a worse result. We need to monitor our students to make sure they are not getting bullied and to make sure one student is not bullying another. We need to encourage all our students to come to us if they are feeling bullied or threated in any way. 6Click Here to learn how!

As teachers, we need to prevent and stop cyberbullying. We then have to pass that knowledge down to our students. This site will teach you how to do that. Beware of what students are doing online and educate them on proper technology use and defense against bullies.7Cyberpredators

Now moving onto Cyberpredators. Sexual predators do exist and are a very real threat to our students. They target both boys and girls of all ages and use the Internet to their advantage since they can be whomever they want.8Warning SignsSpends a lot of time onlineReceives mail from unknown sendersUses other email accountsSocially withdraws

Familysafecomputers.org, 2011They are good at manipulating children. They look for children that are emotionally venerable- relating to personal issues dealing with school or home. They use this to feel close with them and build a pseudo friendship and trust. If a child indicates frustration with parents or teachers at school the predator might suggest the child's parents are way too strict or their teacher is being unfair. This plays right into the adolescent mind as they look for people to verify their feelings and express empathy. The child will exhibit warning signs that teachers and parents need to look out for. If these signs are ignored, then the child will continually get preyed upon and it can be dangerous.9Help Minimize the RiskClick hereWith available chat rooms and the booming of social networking sites, predators can search profiles and find out more information about their victim. They can find out their phone number and can use that to contact them. As teachers we need to talk to our students about this and warn them about predators lurking online. With social networking sites, like Facebook, too much personal information is posted in their profile like their phone number and email address. Or they may tag themselves at home with their address. This will already deal more damage and make it easy for predators to find them and contact them. Click the link.10

This brings us to our next area: Identity theft.11Identity SafetyDont share personal informationDont give out passwordsLimit what you share

Cybersafetyteameducation.com. 2014Identity theft happens all around the world. Unfortunately we cannot stop identity theft from happening but we can limit the information we share about ourselves to make it harder for it to happen. Follow these identity safety tips and teach them to your students. Our students are younger and more nave when it comes to identity concerns, so we need to let them know of this danger. As previously stated, revealing too much information will only help cyberpredators and cyberbullies.12How to Protect YourselfIdentity Safety Tips

This will link you to more safety tips to protect your identity. Just like the pictures says yes, it could happen to you. This information will benefits teachers as much as it will benefit students. With technology these days, not much information is needed from someone to steal their identity or find out where they live.13

Piracy and PlagiarismNow we will discuss piracy and plagiarism. Even though Cartman from South Park was added for comic relief, these are serious topics. 14PlagiarismSteal and use as ones own workUse without creditingCommit literary theftViolating Fair Use Laws

Plagiarism.org. 2014In this digital age, plagiarism lines are blurred for students. So much information is found through searching online and some students are tempted to steal that information to help them with their assignment and pass it off as their own. With so many new digital sources, students are not citing properly or at all. This is serious because it can lead to failing grades and expulsion. Plagiarizing outside of school can lead to lawsuits. Its important that students understand the severity of the issue with plagiarism and how to not do it- the importance of giving credit to the author. 15PiracyCopyright infringement Illegal downloadingIllegal copying

This ties in with piracy. Not following copyright laws is illegal which brings us to illegal downloading. Downloading software, games, movies, and music that you did not pay for and not given permission from the owners is illegal and you can face huge fines and jail time. When kids hear a song they like, it is easy to download it off of illegal sites within minutes. Not just downloading, but copying movies, software, music, and games outside of license agreements and selling them is considered piracy. Students need to know that this is a very serious offense and they need to learn the consequences of piracy. 16Piracy and Plagiarism- UnethicalSee HereThis is a video on plagiarism and piracy and showing the severity of it. 17Overall MessageProtect our studentsHave parents and students sign AUPHelp minimize cyberbullying and cyberpredatorsKeep students identity safeReinforce plagiarism and piracy laws

This is the conclusion of this presentation. The overall message is to protect our students. We need to have parents and students sign the schools acceptable use policy to increase their internet safety. We need to make the steps necessary to minimize cyberbullying and cyperpredators along with keeping the students identity safe. Teach students all about plagiarism and piracy and not to do them. Doing the right thing is important on the internet and it is the right path to internet safety. 18The EndThis is the end of the presentation. Thank you for your time. (Take any questions).19References ListBarber, M. (2011, June 8). Why Plagiarism is Unethical [Video file]. Retrieved from https://www.youtube.com/watch?v=AGMeO9fMe1sCyber Bullying Facts. (2014). Retrieved January 21, 2015, from http://nobullying.com/facts-about-cyber-bullying/Flickr Images: Creative Commons. Retrieved from https://www.flickr.com/creativecommonsGoogle Images: Creative Commons. Retrieved google.com/imagesIdentity Safety. (2014). Retrieved January 21, 2015, from http://cybersafetyteameducation422.weebly.com/identity-safety.htmlOnline Predators. (2014). Retrieved January 21, 2015, from http://www.familysafecomputers.org/predators.htmOnline Predators: Help Minimize the Risk. (2014). Retrieved January 21, 2015, from http://www.microsoft.com/security/family-safety/predators.aspxPrevent Cyberbullying. (n.d.). Retrieved January 22, 2015, from http://www.stopbullying.gov/cyberbullying/prevention/Roblyer, M.D., & Doering, A.H. (2013). Integrating educational technology into teaching. (6th ed.). Boston, MA: Pearson.Schoen, J. (2014, September 17). Acceptable Use Policy Explained [Video file]. Retrieved from https://www.youtube.com/watch?v=hKK9EYl5hdwWhat is Identity Safety. (2014). Retrieved January 21, 2015, from https://sites.google.com/site/cybersafetysite422/home/identity-safetyWhat Is Plagiarism?. (2014). Retrieved January 21, 2015, from http://plagiarism.org/citing-sources/whats-a-citation