SlideShare una empresa de Scribd logo
1 de 10
Leah Lack
Debbie Austin
Amber Frasco
What is Digital Crime/Security?
Here are some Examples:
 Internet safety procedures for
the classroom and home
 AUP (Acceptable Use Policy) in
the classroom
 Computer Hacking
 Use of Security Software for
protection
While at school or home a child may wonder on to sites that are
not appropriate for their age which ultimately can lead to their
safety being put in jeopardy. Without being aware a child can
enter a site that contains inappropriate material or sexual
predators.
In one survey research claims that
“58% of students admit to using the
Internet unsafely, inappropriately, or
illegally.” (Feldman, 2007)
Fortunately there are several tools available for schools and
parents that can prevent a child from wondering to such sites.
 Educate- No matter how much protection is provided on a
computer there is no way to block all unsuitable information.
 Apply the “Don’t talk to strangers” motto while the online.
 Time limits on the computer
 Enforce punishments for when computer rules are broken
All information provided by Feldman, 2007.
• Monitoring Software- At any time a
report can be printed out to show
exactly what sites have been visited and
when.
•Personalize programs to require
each student to enter their own
password to ensure individual
responsibility.
•Filters- Stops students from entering
sites that may contain inappropriate
material.
•Keep the computer in an area that
can easily be monitored.
Computers are in use in classrooms across the country
and it has become imperative that schools protect
themselves from user liability.
Enforcing Acceptable User Policies
How schools can enforce the AUP
 If an AUP states that all users’ activities will be monitored,
then the school IT staff needs to be sure that it is doing just
that. Maintain an Internet log. Update regularly and
employ the use of filters to block unacceptable content.
 Use clear and precise language: be sure to carefully list all
circumstances in which a violation may occur and avoid
generalities.
 Explain the AUP to students in an open discussion forum,
how to use the Internet effectively, and involve parents in
their child’s computer usage.
All information is provided by Fitzer, 2002
Computer Hacking
Definition Prevention
 Intentionally accessing a
computer without
authorization or exceeding
authorization in order to
access restricted
information
 The unauthorized use of
computer and network
resources
 Privacy infringement
 Varies from being an
annoyance to being illegal
*All information provided by Coakley, 2010.
 The best way to prevent
hacking is the use of security
software
 Use secure passwords and
keep them private
 Be aware of your digital
environment
 Explain to students and
others the repercussions and
illegal nature of hacking
Resources
 Coakley, M. 2010. Hacking.
http://www.mass.gov/?pageID=cagoterminal&L=4&L0=Home&L1=Community+Safety&L2=Cyber+Cr
ime+%26+Internet+Safety&L3=Computer+%26+Online+Privacy&sid=Cago&b=terminalcontent&f=co
mmunity_hacking&csid=Cago
 Feldman, B. 2007. Surfing the Net with Kids.
http://www.surfnetkids.com/safety/need_to_know_internet_safety_in_the_classroom-16975.htm
 Feldman, B. 2007. Surfing the Net with Kids.
http://www.surfnetkids.com/safety/safeguard_your_students_internet_usage-16974.htm
 Fitzer, K. 2002. Enforcing Acceptable Use Policies. http://www/ed/uiuc.edu/wp/crime-2002/aup.htm
 Writing an Effective Acceptable Use Policy. 2009. http://www.stbernard.com/forms/switch/internet-
policy.asp?oc=19.htm
 Acceptable Use Policy: Ligon Middle School. http://www.ncsu.edu/ligon/au.policy.html
Three Questions about Digital
Crime/Security
1. Because there is no way to monitor and filter everything on the Internet,
_________ your students and children on Internet safety is the best prevention.
2. Give one example of how a school can enforce an AUP (Accepted User Policy).
3. What is the unauthorized use of a computer called?
Answers
 Educating
 Monitor all users’ activities, keep an Internet log, and
explain the AUP to all users.
 Computer Hacking

Más contenido relacionado

La actualidad más candente

Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)
MMHoward
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in i
Hassan Nasir
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
thowell
 

La actualidad más candente (20)

Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
MISD Cyber Safety
MISD Cyber Safety MISD Cyber Safety
MISD Cyber Safety
 
Week 15 ppt eme2040
Week 15 ppt eme2040Week 15 ppt eme2040
Week 15 ppt eme2040
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Parent ed is_mh
Parent ed is_mhParent ed is_mh
Parent ed is_mh
 
Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in i
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
InfraGard Cyber Tips: October, 2015
InfraGard Cyber Tips: October, 2015InfraGard Cyber Tips: October, 2015
InfraGard Cyber Tips: October, 2015
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICT
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
 
Krishna cyber safety
Krishna cyber safetyKrishna cyber safety
Krishna cyber safety
 

Destacado (8)

up to 90% off my Real Estate commission
up to 90% off my Real Estate commissionup to 90% off my Real Estate commission
up to 90% off my Real Estate commission
 
Vwl training slides 1 28
Vwl training slides 1   28Vwl training slides 1   28
Vwl training slides 1 28
 
Prevenire meglio che curare v 1
Prevenire meglio che curare v 1Prevenire meglio che curare v 1
Prevenire meglio che curare v 1
 
Vwl training slides 29 44
Vwl training slides 29   44Vwl training slides 29   44
Vwl training slides 29 44
 
Prevenire meglio che curare
Prevenire meglio che curarePrevenire meglio che curare
Prevenire meglio che curare
 
English group 2 1
English group 2 1English group 2 1
English group 2 1
 
Wave Petunia Tower
Wave Petunia TowerWave Petunia Tower
Wave Petunia Tower
 
Sep. 2011 IIBA DC Event
Sep. 2011 IIBA DC EventSep. 2011 IIBA DC Event
Sep. 2011 IIBA DC Event
 

Similar a Digital citizenship project[1]

Et 508 week 3 faculty and staff training session
Et 508 week 3 faculty and staff training sessionEt 508 week 3 faculty and staff training session
Et 508 week 3 faculty and staff training session
Michelle Abee
 
Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Online
dgieseler1
 
Internet Publication
Internet PublicationInternet Publication
Internet Publication
Dré Davis
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
sheenau
 
Parent meeting
Parent meetingParent meeting
Parent meeting
lightb
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
ronak56
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Paul Berryman
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
ayerssaa
 

Similar a Digital citizenship project[1] (20)

Et 508 week 3 faculty and staff training session
Et 508 week 3 faculty and staff training sessionEt 508 week 3 faculty and staff training session
Et 508 week 3 faculty and staff training session
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Online
 
E safety training
E safety trainingE safety training
E safety training
 
Internet Publication
Internet PublicationInternet Publication
Internet Publication
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 B
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Parent meeting
Parent meetingParent meeting
Parent meeting
 
KIAParentsPresentation.ppt
KIAParentsPresentation.pptKIAParentsPresentation.ppt
KIAParentsPresentation.ppt
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
McKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullyingMcKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullying
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Safety Net: A Parent's Guide (Infographic)
Safety Net: A Parent's Guide (Infographic)Safety Net: A Parent's Guide (Infographic)
Safety Net: A Parent's Guide (Infographic)
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Digital citizenship project[1]

  • 2. What is Digital Crime/Security? Here are some Examples:  Internet safety procedures for the classroom and home  AUP (Acceptable Use Policy) in the classroom  Computer Hacking  Use of Security Software for protection
  • 3. While at school or home a child may wonder on to sites that are not appropriate for their age which ultimately can lead to their safety being put in jeopardy. Without being aware a child can enter a site that contains inappropriate material or sexual predators. In one survey research claims that “58% of students admit to using the Internet unsafely, inappropriately, or illegally.” (Feldman, 2007)
  • 4. Fortunately there are several tools available for schools and parents that can prevent a child from wondering to such sites.  Educate- No matter how much protection is provided on a computer there is no way to block all unsuitable information.  Apply the “Don’t talk to strangers” motto while the online.  Time limits on the computer  Enforce punishments for when computer rules are broken All information provided by Feldman, 2007. • Monitoring Software- At any time a report can be printed out to show exactly what sites have been visited and when. •Personalize programs to require each student to enter their own password to ensure individual responsibility. •Filters- Stops students from entering sites that may contain inappropriate material. •Keep the computer in an area that can easily be monitored.
  • 5. Computers are in use in classrooms across the country and it has become imperative that schools protect themselves from user liability.
  • 6. Enforcing Acceptable User Policies How schools can enforce the AUP  If an AUP states that all users’ activities will be monitored, then the school IT staff needs to be sure that it is doing just that. Maintain an Internet log. Update regularly and employ the use of filters to block unacceptable content.  Use clear and precise language: be sure to carefully list all circumstances in which a violation may occur and avoid generalities.  Explain the AUP to students in an open discussion forum, how to use the Internet effectively, and involve parents in their child’s computer usage. All information is provided by Fitzer, 2002
  • 7. Computer Hacking Definition Prevention  Intentionally accessing a computer without authorization or exceeding authorization in order to access restricted information  The unauthorized use of computer and network resources  Privacy infringement  Varies from being an annoyance to being illegal *All information provided by Coakley, 2010.  The best way to prevent hacking is the use of security software  Use secure passwords and keep them private  Be aware of your digital environment  Explain to students and others the repercussions and illegal nature of hacking
  • 8. Resources  Coakley, M. 2010. Hacking. http://www.mass.gov/?pageID=cagoterminal&L=4&L0=Home&L1=Community+Safety&L2=Cyber+Cr ime+%26+Internet+Safety&L3=Computer+%26+Online+Privacy&sid=Cago&b=terminalcontent&f=co mmunity_hacking&csid=Cago  Feldman, B. 2007. Surfing the Net with Kids. http://www.surfnetkids.com/safety/need_to_know_internet_safety_in_the_classroom-16975.htm  Feldman, B. 2007. Surfing the Net with Kids. http://www.surfnetkids.com/safety/safeguard_your_students_internet_usage-16974.htm  Fitzer, K. 2002. Enforcing Acceptable Use Policies. http://www/ed/uiuc.edu/wp/crime-2002/aup.htm  Writing an Effective Acceptable Use Policy. 2009. http://www.stbernard.com/forms/switch/internet- policy.asp?oc=19.htm  Acceptable Use Policy: Ligon Middle School. http://www.ncsu.edu/ligon/au.policy.html
  • 9. Three Questions about Digital Crime/Security 1. Because there is no way to monitor and filter everything on the Internet, _________ your students and children on Internet safety is the best prevention. 2. Give one example of how a school can enforce an AUP (Accepted User Policy). 3. What is the unauthorized use of a computer called?
  • 10. Answers  Educating  Monitor all users’ activities, keep an Internet log, and explain the AUP to all users.  Computer Hacking