Youth Leadership Forum 2010 Technology Component.

Post on 19-Jan-2018

216 views 0 download

description

What’s Ahead… Teens and adults working together on technology Facebook Introduction Privacy Issues Boundaries: – Copyright issues – Army rules – Character Issues Create garrison level YS organizational presence on FB Tools to take back to the garrison

Transcript of Youth Leadership Forum 2010 Technology Component.

Youth Leadership Forum 2010

Technology Component

Session 1

Technology Component

What’s Ahead…

• Teens and adults working together on technology• Facebook Introduction• Privacy Issues• Boundaries:

– Copyright issues – Army rules– Character Issues

• Create garrison level YS organizational presence on FB• Tools to take back to the garrison

Teens and Adults Working Together on Tech

(YAP - Teens_Adults Working Together.doc)

- Activity -

Brainstorming Rules

• No judging of ideas until after brainstorming ends.

• WiLd ideas are welcome. • A huge number of ideas are welcome. (The

more the better!)• Participants are welcome to build on or

modify any idea that's been offered.

Brainstorming 1

What is the most difficult part of working with teens (adults)

on a technology project?

Brainstorming 2

What is the best part of working with teens (adults)

on a technology project?

Brainstorming 3

What are some things we can all do together to get the best results

on a technology-related project?

Session 2

Technology Component

What is Social Networking?

• “A social network service focuses on building online communities of people who share interests and/or activities, or who are interested in exploring the interests and activities of others.”

Wikipedia.org– Ability to create a profile– Ability to create a personal network

• Thousands of social network sites– General: MySpace, Facebook, YouTube, LinkedIn, etc.– Specific: radicalcrossstitch.com

• Social Network for cross stitchers – New ones created daily

Who Networks Online?

12 to 17 18 to 24 25 to 34 35 to 44 45 to 54 55 to 64 65 and over0%

10%

20%

30%

40%

50%

60%

70%

80%

Have

Cre

ated

a P

rofil

e

Age

The Millennials:An Internet Generation

• 93% of teens use the Internet• 96% visit social networking sites such as Facebook or

MySpace• Only 4% of youth surveyed reported participating in

an online conversation that made them uncomfortable

• Only 3% reported that someone they met online tried to get them to meet in person

• Only .08% of youth surveyed reported meeting someone offline without parental permission.

Pew Internet & American Life Project, December 2007National School Boards Association, January, 2008

An Internet Generation

• Girls more likely to visit social networking sites, blog and post photos

• Boys more likely to use videosharing sites like YouTube

• 72% of teens own a desktop computer• 63% have a cell phone • 51% have iPods/MP3 Players• 25% own a laptop

Why Facebook?

• Facebook is the #1 social networking site on the Internet today

• More than 500 million active users worldwide

• 50% of Facebook users logon at least once per day

• Among the Social Networking sites authorized on the Army network

Great potential marketing tool!!!

Google Yourself!(Privacy Issues on FB)

(YAP - Google Yourself - Privacy Issues on FB.doc)

- Activity -

Personal Identifiable Information (PII)

• Full name (if not common)• National identification number• IP address (in some cases)• Vehicle registration plate number• Driver's license number• Face, fingerprints, or handwriting• Credit card numbers• Digital identity• Birthday• Birthplace• Genetic information

Reasons for Caution on FB

• Predator access potential• Identity theft• Your stuff is out there FOREVER!• College and Grad School admission• Prospective employers• Fellow student revenge• Legal issues:• Courtroom consequences• Child Porn charges

• Consider restricting access with privacy settings. • Keep your private information private. • Choose a screen name that is different from your real name. • Think twice before posting your photo. • Don’t post information that makes you vulnerable to a physical attack. • Use your common sense. • Trust your instincts. • Be suspicious.

What to Do…

Facebook Lingo• Everyone – EVERYONE on the internet, including search engines,

including any user not on Facebook• Friends of Friends– All friends of everyone you have confirmed as a

Friend• Only Friends– Only people you have confirmed as a friend

• Custom (Friends Lists)– Include or exclude certain friends

Home > Account Settings > Privacy Settings

Home > Account Settings > Privacy Settings > Personal Information

Home > Account Settings > Privacy Settings > Contact Information

Home > Account Settings > Privacy Settings > Friends, Tags & Connections

Home > Account Settings > Privacy Settings > Search

Home > Account Settings > Privacy Settings > Applications & Websites

Home > Account Settings > Privacy Settings > Applications & Websites

Home > Account Settings > Privacy Settings > Block List

Session 3

Technology Component

Rules and Regs…

• Army Regulations• Copyright issues• Character issues

Army Regulations

• Use of Social Media encouraged by Army• Valid concerns remain:• Network protection from cyber-attacks• Protection of classified information• Protection of Army Soldiers and Families

• Info on External Official Presences (EOP’s) screened through Garrison PAO

Army Regulations Part 2

• Must register the FB page with “Big Army”• No classified or sensitive material• No PII• Page NOT for personal use• Must be linked to .mil address• No political or discriminatory material• Content contributors MUST receive Web Content and

annual OPSEC training

Required Tasks

BEFORE You do the above – • Gain CYSS Coordinator approval• Gain Garrison PAO Approval

• Watch what you display.

-- To you this sticker means you miss your loved one, to a criminal it shows that you are home alone.

A program designed to protect informationIn World War II, the Army would censor mail going to loved ones. They would black out sentences containing information that related to operations in the country. This practice continued in Korea and in Vietnam, however with today’s technology it’s not practical to censor all communications. Email and cellular phones allow frequent communication between soldier and loved ones.

But I’m not a soldier, I’m a spouse, what information do I know?The name of your Soldier’s unit.Type of unit (Engineer, Armor, MP, Infantry)The unit’s location (i.e. Baghdad, Tikrit)

• Be careful where you talk about your Soldier. --Fact: When one of the BDEs was returning, spouses were discussing date, time and location of the unit’s flights at the checkout lines in local business establishments.

• Know who you are talking to. Don’t discuss information with just anyone. --Fact: Several family members have received phone calls from individuals asking: • What do you think of the

war?• What does your Soldier do?• What is name of his/her unit?

What can I do?

When they are coming homeWhat your Soldier is doing (i.e.. patrolling in Najaf, daily convoy’s to Kuwait)

Protect Yourself and Your Soldier Watch what you say, Watch what you do.

Prohibited Information on Facebook!

Copyright Issues

• Copyright is the set of exclusive rights granted to the author or creator of an original work, including the right to copy, distribute and adapt the work. These rights can be licensed, transferred and/or assigned. Copyright lasts for a certain time period after which the work is said to enter the public domain.

Copyright Issues

Copyrighted materials include:• Literary Works• Musical Works (including the words)• Dramatic Works (including accompanying music, pantomines, choreography)• Pictoral works• Graphic and sculptural works• Motion pictures and other audiovisual works• Sound recordings• Architectural works• Computer programs• Web pages

Copyright Issues on FB

- Activity -

(YAP - Copyright Issues on FB.doc)

Copyright Issues

Guidelines:• If you can’t tell whether or not something is

copyrighted, assume it is.• Use of up to 5% of copyrighted materials is allowed• If you want to use copyrighted materials, ask the

creator for permission.• Give the creator credit if you do use his/her materials• Keep a copy of the permission you receive.

Character Issues

• Does it pass the “Grandma Test?”• Are you violating someone’s trust in you?• CYSS Facebook page is NOT for personal use.• Could your comments be considered “cyber-

bullying?”• Others??

Session 4

Technology Component

Create a Garrison CYSSPresence on FB

- Activity -

(YAP - Estab FB presence.doc)

• Complete the Action Plan• Create your FB page

Tasks…

• Page naming standard: (Garrison Name) CYSS Teens.• Page creator needs to be a staff member.• Use the pics you brought.• Be creative!• Have fun!

Guidelines