Group Four: Guienne Dinkins, Eva Johnson Phyllisia Mason-Hollins, Kim McHenry Whose Responsibility...
-
Upload
poppy-thomas -
Category
Documents
-
view
215 -
download
0
Transcript of Group Four: Guienne Dinkins, Eva Johnson Phyllisia Mason-Hollins, Kim McHenry Whose Responsibility...
Group Four: Guienne Dinkins, Eva JohnsonPhyllisia Mason-Hollins, Kim McHenry
Whose Responsibility is it?
You Will Learn:
Responsibility of educators Rights of parents and children Pros and Cons of student internet use Cyber Crimes Strategies for teaching internet safety Protecting yourself online
Internet Statistics
2005 Survey
12,650 students
Grades 5-12
Educators Responsibilities
It is our responsibility to:
Follow National Educational Technology Standards for Teacher in Promoting and Modeling Digital Citizenship and Responsibility
Respect the wishes of parents and get Signed permission about student usage and publishing of student picture online.
Inform our students because We might be the only teacher teaching about internet safety.
Children’s Protection Act
Implemented in 2001 Determines Funding Based on Guidelines Requires use of Blocking and Filtering Manages influx of obscene or harmful images
or content Requires monitoring of use of the Internet
Community Effort
Students
Teachers
Parents
Classroom Internet Usage Adds Educational Resource Videos Games Communicating Gathering Information Power Points Explanations Virtual Field Trips
Current Surveys Web Based: surveyed thousands aged 12-17 Middle School Survey
A Comparison of the Results
Early adolescents’ may be vulnerable to an online stranger or predator.
Threats
Destroyers and Thieves Botnets and Malware Addiction and Involvement Underblocking and
Bypassing Cyberwar and
Cyberterrorism
Cyber Crime
Sexting Cyber bullying Social Networking Spams and Scams Copyright Infringement Plagiarism http://en.wikipedia.org/wiki/Computer_cri
me
Warning Signs of Improper Use
Excessive Use Secretive Behavior Empty History File
Disturbed Relationships Receipt of Packages Subtle Comments
post any identifying information.
post pictures which display a license plate, address, or other identifiable information.
agree to meet in-person an acquaintance you met on the internet.
reply to suspicious email.
share your password with someone else.
download files without having a good up-to-date virus program.
Strategies to Stay Safe Strategies to Stay Safe OnlineOnline
NEVER
Precautions
Installing monitoring software, firewalls, antivirus and antispyware software.
Many monitoring software packages provide reports of incoming and outgoing emails, records of both sides of the conversation in chat rooms, instant messages, and a listing of all web sites visited.
Backing up files.
Obtain a Contract with the Students.
Do not reply to any email or notification requesting personal information.
Always be courteous to others on the internet.
Remember, being alert and informed about the danger’s children face while online can help keep children out of harm’s and reduce the risk of exploitation by others.
Precautions continued…
Password Security If permitted use at least one special character. Example (!@#$%^&*) Don’t save your passwords to your computer unless you are using a
program to encrypt them.• Don’t use any predictable personal information such as birthdays,
children, pet names, etc..• Don’t use the same password for every account• Make sure to change your passwords every few months. The more
often you change your password will increase your safety.• Don’t write your passwords down on note pads and sticky notes and
keep them in plain sight. Use at least 8 characters Use at least one number Use at least one letter Use at least one capital letter
Netiquette
Avoid using intimidating language. Don’t type in all caps. Remember it can be made public
and you can’t take it back. Be brief and careful. Be clear. Be responsive.
Chat Lingo Examples
Code Meaning
A/S/L? PAL LOL PAW RU WTGP TTYL W/E H&K GAL
Age, Sex, Location Parents Are Listening Laugh Out Loud Parents Are Watching Are You? Want to Go Private? Talk to You Later Whatever Hug and Kiss Get a Life
Summary
The Internet is a tool. Tools have the potential to help and
hurt. Their use must be monitored and
revised as needed. Internet use has increased from 20-
80% in the past ten years. This increases the risk for potential
harm.
REPORTING
CALL THE CYBER TIPLINE
1-800-843-5678
References
Federal Bureau of Investigation Federal Communications Commission Info Please Las Angeles Times National Crime Prevention On Guard On Line PBS U.S. Census
For More Information: www.netsmartz.org
www.netsmartzkids.org
www.netsmartz411.org
www.cybertipline.com
www.iSafe.org
www.ikeepsafe.com
http://teacherweb.com/LA/NorthwoodHighSchoolShreveport/Johnson,Eva/table.html
www.safeteens.com www.playitcybersafe.com www.cyberbully.org
For More Information For more information about telecommunications issues visit: FCC’s Consumer & Governmental Affairs Bureau Web site at
www.fcc.gov/cgb contact the FCC’s Consumer Center by e-mailing [email protected] calling 1-888-CALL-FCC (1-888-225-5322) voice or 1-888-TELL-
FCC (1-888-835-5322) TTY faxing 1-866-418-0232 writing to: Federal Communications Commission
Consumer & Governmental Affairs Bureau Consumer Inquiries and Complaints Division 445 12th Street, SW Washington, D.C. 20554
Thank You&
Be safe!