SlideShare a Scribd company logo
1 of 56
Encyclomedia 2007 Facebook,  YouTube, and eBay:  Teaching Responsibility and Internet Safety for the 21st Century Quyen Arana and Perri Applegate
Internet Safety and Responsibility
[object Object],How to Behave in a Responsible Manner in the Online Community
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],How to Behave in a Responsible Manner in the Online Community
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Social Networking Sites
Creating and Connecting//Research and Guidelines on Online Social and Educational Networking,  National School Boards Association, 2007 Almost all 9-17 y/o’s have used social networking sites
Think! So, What Do We Tell Kids?
Forever Is a Long, Long Time By Brad Stone Newsweek Aug. 21-28, 2006 issue
No One Is Really Anonymous
No One Is Really Anonymous
Criminal Prosecution or School Sanctions
[object Object],[object Object],[object Object],Copyright Violations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Cyberbullying
[object Object],[object Object],[object Object],Cyberstalking
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object]
Trends from 2000 to 2005 ,[object Object],[object Object],[object Object]
1 in 3 children report having friends that they have never met in person.  The majority of children share personal information online including their real name, phone number, and address.  Dimitri A. Christakis, MD, MPH,  ARCH PEDIATR ADOLESC MED / VOL 161, FEB 2007
Risk factors for victimization offline include talking about sex with strangers and being rude or nasty oneself. Dimitri A. Christakis, MD, MPH,  ARCH PEDIATR ADOLESC MED / VOL 161, FEB 2007 “ Online victimization appears to be about as prevalent as in-person bullying, suggesting that  it is not a new or added harassment but rather uses a different format .” “ The ways children put themselves at risk in the virtual world appears to mirror the ways they do in the real one.”
“ The increase in exposure to unwanted sexual material occurred  despite increased use of filtering, blocking, and monitoring software  in households of youth Internet users.“ Online Victimization of Youth Five Years Later , 2006, National Center for Missing & Exploited Children. “ Some youth who  did not disclose exposure incidents  to parents or guardians said these incidents happened all the time.”
Other findings: Youth are still not telling adults about negative online experiences. “ Some youth who did not disclose exposure incidents to parents or guardians said these incidents happened all the time.”
Power of social networking
“ Safety policies remain important, as does teaching students about online safety and responsible online expression  -- but students may learn these lessons better while they’re actually using social networking tools.”
 
Creating and Connecting//Research and Guidelines on Online Social and Educational Networking,  National School Boards Association, 2007 Most students use social networking sites
What are they doing?
MySpace Facebook Ning Virb Webkinz Online Social Networks Twitter
 
 
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Recommendations for school board members
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Recommendations for school board members educators
Do this ,[object Object],[object Object],[object Object],[object Object]
 
 
MySpace
MySpace
 
 
And do this ,[object Object],[object Object],[object Object],[object Object]
http://slideshare.net
http://teachertube.com
http://voicethread.com
http://www.wikispaces.com
“ Safety policies remain important, as does teaching students about online safety and responsible online expression  -- but students may learn these lessons better while they’re actually using social networking tools.”
Thank you! ,[object Object],[object Object],[object Object],[object Object]
Resources
Text Text http://www.csriu.org /
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Resources for Educators and Parents
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Resources for Educators and Parents
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Resources for Educators and Parents
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Resources for Educators and Parents
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Resources for Educators and Parents
[object Object],[object Object],[object Object],[object Object],[object Object],Resources for Educators and Parents

More Related Content

What's hot

Lifespan Communication In Cmc
Lifespan Communication In CmcLifespan Communication In Cmc
Lifespan Communication In CmcDaywalk3r
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspectiveConnectSafely
 
Wolverhampton - Recent developments in the UK and overseas
Wolverhampton - Recent developments in the UK and overseasWolverhampton - Recent developments in the UK and overseas
Wolverhampton - Recent developments in the UK and overseasdaveyp
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentConnectSafely
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Larry Magid
 
Social Media Training March 2010
Social Media Training March 2010Social Media Training March 2010
Social Media Training March 2010amira13
 
Children and Online Safety
Children and Online SafetyChildren and Online Safety
Children and Online Safetyalandang
 
Bigger Than Myspace 2 1 08
Bigger Than  Myspace 2 1 08Bigger Than  Myspace 2 1 08
Bigger Than Myspace 2 1 08bneligan
 
The Effects on Social Networking on Education
The Effects on Social Networking on EducationThe Effects on Social Networking on Education
The Effects on Social Networking on EducationNash Nash
 
Turning the Corner: From Cybersafety to Digital Citizenship
Turning the Corner: From Cybersafety to Digital Citizenship Turning the Corner: From Cybersafety to Digital Citizenship
Turning the Corner: From Cybersafety to Digital Citizenship Catherine Hainstock
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)amalgarn
 

What's hot (20)

ASS3SUM2
ASS3SUM2ASS3SUM2
ASS3SUM2
 
Lifespan Communication In Cmc
Lifespan Communication In CmcLifespan Communication In Cmc
Lifespan Communication In Cmc
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
Wolverhampton - Recent developments in the UK and overseas
Wolverhampton - Recent developments in the UK and overseasWolverhampton - Recent developments in the UK and overseas
Wolverhampton - Recent developments in the UK and overseas
 
Ana Trpovska En
Ana Trpovska EnAna Trpovska En
Ana Trpovska En
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...
 
Teens and Social Media: An Overview
Teens and Social Media: An OverviewTeens and Social Media: An Overview
Teens and Social Media: An Overview
 
Social Media Training March 2010
Social Media Training March 2010Social Media Training March 2010
Social Media Training March 2010
 
Flipbook
FlipbookFlipbook
Flipbook
 
Teens and social media
Teens and social mediaTeens and social media
Teens and social media
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Children and Online Safety
Children and Online SafetyChildren and Online Safety
Children and Online Safety
 
Bigger Than Myspace 2 1 08
Bigger Than  Myspace 2 1 08Bigger Than  Myspace 2 1 08
Bigger Than Myspace 2 1 08
 
Flipbook
FlipbookFlipbook
Flipbook
 
The Effects on Social Networking on Education
The Effects on Social Networking on EducationThe Effects on Social Networking on Education
The Effects on Social Networking on Education
 
Turning the Corner: From Cybersafety to Digital Citizenship
Turning the Corner: From Cybersafety to Digital Citizenship Turning the Corner: From Cybersafety to Digital Citizenship
Turning the Corner: From Cybersafety to Digital Citizenship
 
13 Things to Know About Teens and Technology
13 Things to Know About Teens and Technology13 Things to Know About Teens and Technology
13 Things to Know About Teens and Technology
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)
 
Flipbook (3) (1)
Flipbook (3) (1)Flipbook (3) (1)
Flipbook (3) (1)
 

Viewers also liked

KAEFER KIPS Safety Presentation
KAEFER KIPS Safety PresentationKAEFER KIPS Safety Presentation
KAEFER KIPS Safety PresentationMitchell Harris
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentationISTE
 
Safety presentation isolation and tagging
Safety presentation isolation and taggingSafety presentation isolation and tagging
Safety presentation isolation and taggingWarwick Bursey
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 

Viewers also liked (8)

safe children film
safe children filmsafe children film
safe children film
 
KAEFER KIPS Safety Presentation
KAEFER KIPS Safety PresentationKAEFER KIPS Safety Presentation
KAEFER KIPS Safety Presentation
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Safety presentation isolation and tagging
Safety presentation isolation and taggingSafety presentation isolation and tagging
Safety presentation isolation and tagging
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
McCarthyism
McCarthyismMcCarthyism
McCarthyism
 
Acid Rain....
Acid Rain....Acid Rain....
Acid Rain....
 

Similar to Encyclomedia 2007 Internet Safety Presentation

Parenting the MySpace Generation
Parenting the MySpace GenerationParenting the MySpace Generation
Parenting the MySpace Generationdlevin
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking SafetyJEM JEM
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingDr. Conrath
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
Safe kids – connected to web 2
Safe kids – connected to web 2Safe kids – connected to web 2
Safe kids – connected to web 2Oliver Mittl
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
 
W200 Powerpoint, Katie Fallis
W200 Powerpoint, Katie FallisW200 Powerpoint, Katie Fallis
W200 Powerpoint, Katie Fallisguest9c7c134
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
Aurora - Social media
Aurora - Social mediaAurora - Social media
Aurora - Social mediaMike North
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Youth and Social Media
Youth and Social MediaYouth and Social Media
Youth and Social MediaAnne Adrian
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingckeeling
 

Similar to Encyclomedia 2007 Internet Safety Presentation (20)

Parenting the MySpace Generation
Parenting the MySpace GenerationParenting the MySpace Generation
Parenting the MySpace Generation
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking Safety
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullying
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Life in the_digital_world
Life in the_digital_worldLife in the_digital_world
Life in the_digital_world
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Safe kids – connected to web 2
Safe kids – connected to web 2Safe kids – connected to web 2
Safe kids – connected to web 2
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
W200 Powerpoint, Katie Fallis
W200 Powerpoint, Katie FallisW200 Powerpoint, Katie Fallis
W200 Powerpoint, Katie Fallis
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Aurora - Social media
Aurora - Social mediaAurora - Social media
Aurora - Social media
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Youth and Social Media
Youth and Social MediaYouth and Social Media
Youth and Social Media
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Encyclomedia 2007 Internet Safety Presentation

  • 1. Encyclomedia 2007 Facebook, YouTube, and eBay: Teaching Responsibility and Internet Safety for the 21st Century Quyen Arana and Perri Applegate
  • 2. Internet Safety and Responsibility
  • 3.
  • 4.  
  • 5.
  • 6.
  • 7. Creating and Connecting//Research and Guidelines on Online Social and Educational Networking, National School Boards Association, 2007 Almost all 9-17 y/o’s have used social networking sites
  • 8. Think! So, What Do We Tell Kids?
  • 9. Forever Is a Long, Long Time By Brad Stone Newsweek Aug. 21-28, 2006 issue
  • 10. No One Is Really Anonymous
  • 11. No One Is Really Anonymous
  • 12. Criminal Prosecution or School Sanctions
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.  
  • 18.
  • 19.
  • 20. 1 in 3 children report having friends that they have never met in person. The majority of children share personal information online including their real name, phone number, and address. Dimitri A. Christakis, MD, MPH, ARCH PEDIATR ADOLESC MED / VOL 161, FEB 2007
  • 21. Risk factors for victimization offline include talking about sex with strangers and being rude or nasty oneself. Dimitri A. Christakis, MD, MPH, ARCH PEDIATR ADOLESC MED / VOL 161, FEB 2007 “ Online victimization appears to be about as prevalent as in-person bullying, suggesting that it is not a new or added harassment but rather uses a different format .” “ The ways children put themselves at risk in the virtual world appears to mirror the ways they do in the real one.”
  • 22. “ The increase in exposure to unwanted sexual material occurred despite increased use of filtering, blocking, and monitoring software in households of youth Internet users.“ Online Victimization of Youth Five Years Later , 2006, National Center for Missing & Exploited Children. “ Some youth who did not disclose exposure incidents to parents or guardians said these incidents happened all the time.”
  • 23. Other findings: Youth are still not telling adults about negative online experiences. “ Some youth who did not disclose exposure incidents to parents or guardians said these incidents happened all the time.”
  • 24. Power of social networking
  • 25. “ Safety policies remain important, as does teaching students about online safety and responsible online expression -- but students may learn these lessons better while they’re actually using social networking tools.”
  • 26.  
  • 27. Creating and Connecting//Research and Guidelines on Online Social and Educational Networking, National School Boards Association, 2007 Most students use social networking sites
  • 28. What are they doing?
  • 29. MySpace Facebook Ning Virb Webkinz Online Social Networks Twitter
  • 30.  
  • 31.  
  • 32.  
  • 33.
  • 34.
  • 35.
  • 36.  
  • 37.  
  • 40.  
  • 41.  
  • 42.
  • 47. “ Safety policies remain important, as does teaching students about online safety and responsible online expression -- but students may learn these lessons better while they’re actually using social networking tools.”
  • 48.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.