SlideShare a Scribd company logo
1 of 62
Issues Online Predators Online Etiquette & Digital Ethics Sexting Professional Boundaries Cyberbullying Social Networks 	(Facebook, MySpace) Online Privacy & 	Online Reputation Identity Theft 2
Technology Used Computer iPod Webcam Game consoles 3 Cell phone
Risks Inappropriate Contact Inappropriate Content Inappropriate Conduct 4
Inappropriate Contact We have to teach children how to recognize and protect themselves against contact with: 5
Inappropriate Content 6
Inappropriate Conduct 7
Are you ready for a test? Let’s see how well you know chat lingo 	You know, the way teens talk in chat rooms, emails and when they text message 8
Chat Lingo LOL BRB TAW POS LTTIC CICYHW KPC TOB AITR A/S/L WTGP LMIRL Laughing Out Loud Be Right Back Teachers Are Watching Parent Over Shoulder Look The Teacher Is Coming Can I Copy Your Homework? Keeping Parents Clueless Teacher Over Back Adult In The Room Age, Sex, Location? Want To Go Private? Let’s Meet In Real Life 9
Cyberbullying ,[object Object],Cyberbullies are hiding behind their computer screens to torment their targets.
What is Cyberbullying? ,[object Object]
The problem is compounded by the fact that a bully can hide behind an electronic veil, disguising his or her true identity. This makes it difficult to trace the source, and encourages bullies to behave more aggressively than they might face-to-face.,[object Object],[object Object]
Tips for Teachers Discuss online behavior with your students Monitor computer use – look for children minimizing screen when you walk by Have a classroom policy that addresses inappropriate computer and cell phone use (this is in addition to school policy) and post it where they will see it If you have a school policy (Acceptable Use Policy), enforce it! 14
Tips for Teachers Keep anonymous comment box in classroom where children can report incidents of cyberbullying Encourage students to report cyberbullying Teach students to think before they post and to not let their emotions get the best of them, especially when they are angry 15
Tips for Teachers Tell students: Don’t react (this is often the bully’s goal) Don’t retaliate Block the bully Save the evidence Talk to a trusted adult 16
Social Networking  Sites 17
Social Networking  Sites Allow them to exchange information about themselves and communicate with others using blogs, chat rooms, email and instant messaging 18
Social Networking  Sites While these sites have the ability to extend their circle of friends, they also expose them to those who may have bad intentions – from peers to sexual predators Even though many sites have a minimum age for signup (usually 13 or 14), these sites do not have the ability to verify age 19
Social Networking  Sites Most young people apply common-sense principles and rules taught at home and school to avoid harmful situations in the “real world” However, they often don’t apply these same rules to the “cyber world” 20
Tips for Teachers Encourage students to use privacy settings and security features to limit who has access to their information Encourage students to never post full name, address, phone numbers, email address, instant message username, passwords and identity or financial numbers 21
22
Social Networking Sites Teach students to use “throwaway” email addresses when signing up for SNS Remind students that once information is posted online and deleted or modified, the original will never be completely deleted Encourage students to use privacy settings and security features to limit who has access to their information 23
MySpace Privacy “Only My Friends” setting makes profile content available only to people on friends list – this is default for those under 18 If a user is under 18, they can choose to make profile content available only to friends and others under 18 Photo Albums, Videos and Blogs each have per item privacy settings that you can choose when you upload that content and modify any time 24
25 MySpace
Facebook Profile 26
Facebook Profile 27
Facebook Profile 28
Online Privacy & Online Reputation Teach students to ask the following questions: 29 What judgments or conclusions might others form with my information? Are there some details about my life I would like to keep personal? Will this information reflect well on me a year from now?  5 years? Who might view or purchase this information about me? Would I want my best friend to know? Would I want my boss to know? Would I want my mom to know?
Online Privacy & Online Reputation Remind students to post information that is appropriate for the entire public 	Anyone can see individual web pages including parents, teachers, college admission officers, potential employers or police What is posted today may be harmful in the future 30
Bulletin Board 31
Identity Theft Remind students to be cautious about giving out personal information in chat rooms or on sites such as MySpace or Facebook 	Sites such as MySpace and Facebook allow members to make their address or phone numbers public to anyone who views their profile 	Encourage students to make their profiles private but warn them that nothing is ever completely private 32
Identity Theft Discuss email tricks that ID thieves use such as sending official looking emails from companies like Ebay, PayPal and others 	Encourage students to only give out information whey they have gone to the website directly, not by following the link in the email 	Tell students to never open email or download attachments from anyone they’re not expecting to receive email from 33
Identity Theft Teach students to be wary of sites that offer some sort of reward or prize in exchange for their contact information or other personal details Teach students to never fill out forms or requests for information without a parent or guardian’s permission or assistance 34
Identity Theft Tell students not to share passwords with others (except their parents!) 	Discuss using personal information such as such as birth dates or social security numbers in passwords or usernames Educate your students about making purchases online 	Teach them how to make sure that a web page where they provide personal and financial information is secure 35
36
37
Online Predators Keep personal information personal 	Students should be cautious about sharing other information such as the name of their school, sports team, hobbies, where they work or hang out, or any other information that could be used to identify them or locate them Ensure user names do not reveal too much 	personal information It is inappropriate and dangerous for children to use their name or home town as their name 	Most user names made up of personal information are easily deciphered which can lead perpetrators to a student’s identity and/or location 38
Online Predators Students should be aware that posting inappropriate photos can lead to damaged reputations and unwanted attention 	Posting inappropriate photos, especially those that are explicit, can attract individuals who have bad intentions Educate students about the dangers of flirting with strangers 	Students can give the wrong impression when flirting with a real stranger as well as an online stranger 39
40 Everyone Knows Your Name
Online Predators Be careful about adding strangers to IM Buddy or friend lists – people are not always who they say they are 	Students should not add people as “friends” unless they know for sure who they person is 	If individuals cannot provide solid information as to how they know the student, the student should delete the user name or block that user 	Teach students to be skeptical online and question what they see and hear 41
Online Predators Teach students to “trust their gut” 	If a student feels threatened or uncomfortable by someone or something online, they need to tell the teacher or another trusted adult 	Having students speak up can prevent someone else from becoming a victim Online friends should not be met offline Explain to students that strangers in the online world pose a threat to them just as much as strangers in the physical world 42
Online Etiquette & Digital Ethics Teach students to be civil in what they say and show on the internet Talk with students about respecting the reputation and privacy of others when they post anything about them (especially pictures) 43
Online Etiquette & Digital Ethics Model ethical behavior Reinforce ethical behavior Draw parallels between offline behaviors and similar situations online 	Demeaning someone online is just as bad as it is in person 	Plagiarism is still plagiarism whether its copying from a book or a website 44
Online Etiquette & Digital Ethics Teach students to take a moment before responding to a mean or insulting comment, message, email, etc. instead of reacting out of anger 	Teach students to not respond to these type of actions and to speak with a trusted adult about it 45
Online Etiquette & Digital Ethics Talk with students about avoiding using the computer to harm people 	Taking things which aren’t theirs (files, passwords, etc.) 	Spreading rumors 	Setting up a fake website 46
Online Etiquette & Digital Ethics Discuss with students the importance of treating people online the same way they would if they were talking to them F2F 	Considerate and respectful Don’t be rude or mean Don’t use bad language Don’t make threats or try to humiliate others 47
Online Etiquette & Digital Ethics Teach students to not lie about who they are online and not pretend to be someone else 	If someone asks a question that makes you feel uncomfortable or asks you to reveal too much personal information, don’t answer 48
Online Etiquette & Digital Ethics Share the risks and consequences associated with plagiarism, file sharing, downloading and copying software, music, movies and games illegally Bad grade School discipline Crime Fines 49
Sample Acceptable Use Policy 50 Obtained from www.utechtips.com
Sexting 51
52
Sexting Encourage students to think about the consequences of taking, sending or forwarding sexual pictures of underage children 	Students could get kicked off sports team or school club 	Students could receive disciplinary action at school 	Students could get arrested 53
Sexting Tell students not to take pictures of themselves that they don’t want everyone to see 	Students should not take pictures that they don’t want their parents, grandparents, teachers, employers or the police seeing Tell students to think before they send the picture because they don’t where it might end up 	Remind them that if it doesn’t feel right to send it, they probably shouldn’t 54
Sexting Inform students that forwarding sexual pictures is just as bad as being the original sender 	They are just as responsible as the person who took the picture in the first place and sent it Encourage students to tell a trusted adult if they receive a sexual picture 	Tell them not to delete the picture until an adult is involved 55
Sexting Remind students that they are not anonymous when they send sexual pictures 	These pictures can be tracked through the phone or internet 56
Sexting and School Policies Clearly state that possession of sexually explicit images of minors on any device is prohibited, regardless of whether it is illegal or not Indicate that all persons involved, unless they immediately deleted image(s), could be subject to discipline Inform students that parents and police may be contacted to assist in the investigation 57
Sexting and School Policies Put all students on notice that cell phones will be searched if the school has reasonable suspicion that school policy has been violated Consequences should be clearly stated but also use wording that allows administration to use discretion for punishment on a case-by-case basis Prohibit harassment and bullying related to sexting incidents and include enhanced penalties for threats related to the incident 58
Professional Boundaries 59
Professional Boundaries 60 Make sure you’re in compliance with your school policy  	If you don’t if you have one, you better find out! If you’re considering adding a student as a friend to your personal profile, notify parents and receive permission before doing so  	Make sure the student the required age for the social networking site
Professional Boundaries 61 If using Facebook, you could create a Friend List called “Students” and adjust privacy settings to control what they see Create two profiles (personal + professional) or create Group for specific class projects
Professional Boundaries 62 You have to watch what you post and who you share it with! Ask these questions before you post anything: Would it be appropriate for me to say this in the classroom? Would I say this to the student in front of the students’ parents? 	If the answer to either is “No”, then you probably shouldn’t post it
Remember that you are role models and children will do what you do  	Demonstrate proper online behavior at every available opportunity 63

More Related Content

What's hot

Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sitesner1eje
 
10 Social Media Do's and Don'ts for High School Students
10 Social Media Do's and Don'ts for High School Students10 Social Media Do's and Don'ts for High School Students
10 Social Media Do's and Don'ts for High School StudentsYour College Concierge
 
Dwe m4 cyber bullying and conflict resolution
Dwe m4   cyber bullying and conflict resolutionDwe m4   cyber bullying and conflict resolution
Dwe m4 cyber bullying and conflict resolutionData-Set
 
W200 Powerpoint, Katie Fallis
W200 Powerpoint, Katie FallisW200 Powerpoint, Katie Fallis
W200 Powerpoint, Katie Fallisguest9c7c134
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015Staci Trekles
 
The 411 on Facebook: An FYI for Teachers
The 411 on Facebook: An FYI for TeachersThe 411 on Facebook: An FYI for Teachers
The 411 on Facebook: An FYI for TeachersAPatterson79
 
Hurd, lindse slide share presentation
Hurd, lindse slide share presentationHurd, lindse slide share presentation
Hurd, lindse slide share presentationlhurd01
 
Compare contrast essay final
Compare contrast essay finalCompare contrast essay final
Compare contrast essay finalDonna Layne
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for childrenKumar Manish
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointhmorrell1
 
[R]evolution - Parenting Workshop Slides
[R]evolution - Parenting Workshop Slides[R]evolution - Parenting Workshop Slides
[R]evolution - Parenting Workshop SlidesNathanielCarlson2
 
LAWWORKS 2012 Social Media For Success And Safety In Schools
LAWWORKS 2012 Social Media For Success And Safety In SchoolsLAWWORKS 2012 Social Media For Success And Safety In Schools
LAWWORKS 2012 Social Media For Success And Safety In SchoolsScott Mills
 

What's hot (20)

Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sites
 
10 Social Media Do's and Don'ts for High School Students
10 Social Media Do's and Don'ts for High School Students10 Social Media Do's and Don'ts for High School Students
10 Social Media Do's and Don'ts for High School Students
 
Dwe m4 cyber bullying and conflict resolution
Dwe m4   cyber bullying and conflict resolutionDwe m4   cyber bullying and conflict resolution
Dwe m4 cyber bullying and conflict resolution
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
W200 Powerpoint, Katie Fallis
W200 Powerpoint, Katie FallisW200 Powerpoint, Katie Fallis
W200 Powerpoint, Katie Fallis
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
 
The 411 on Facebook: An FYI for Teachers
The 411 on Facebook: An FYI for TeachersThe 411 on Facebook: An FYI for Teachers
The 411 on Facebook: An FYI for Teachers
 
Hurd, lindse slide share presentation
Hurd, lindse slide share presentationHurd, lindse slide share presentation
Hurd, lindse slide share presentation
 
Compare contrast essay final
Compare contrast essay finalCompare contrast essay final
Compare contrast essay final
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
[R]evolution - Parenting Workshop Slides
[R]evolution - Parenting Workshop Slides[R]evolution - Parenting Workshop Slides
[R]evolution - Parenting Workshop Slides
 
LAWWORKS 2012 Social Media For Success And Safety In Schools
LAWWORKS 2012 Social Media For Success And Safety In SchoolsLAWWORKS 2012 Social Media For Success And Safety In Schools
LAWWORKS 2012 Social Media For Success And Safety In Schools
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 

Similar to Internet Safety for Educators

Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking SafetyJEM JEM
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshareLoreto Normanurst
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
Growing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsGrowing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsWebbed Marketing
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safelysam31
 
MySpace, Facebook and Other Social Network Sites
MySpace, Facebook and Other Social Network SitesMySpace, Facebook and Other Social Network Sites
MySpace, Facebook and Other Social Network SitesTechnoArmor Consulting
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Draft summary of lessons
Draft summary of lessonsDraft summary of lessons
Draft summary of lessonsJon Synnott
 
Selfie Safety Tip Sheet
Selfie Safety Tip SheetSelfie Safety Tip Sheet
Selfie Safety Tip SheetuKnow.com
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parentsagoldberghvs
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 

Similar to Internet Safety for Educators (20)

Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking Safety
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshare
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Growing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsGrowing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in Schools
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
MySpace, Facebook and Other Social Network Sites
MySpace, Facebook and Other Social Network SitesMySpace, Facebook and Other Social Network Sites
MySpace, Facebook and Other Social Network Sites
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Draft summary of lessons
Draft summary of lessonsDraft summary of lessons
Draft summary of lessons
 
Selfie Safety Tip Sheet
Selfie Safety Tip SheetSelfie Safety Tip Sheet
Selfie Safety Tip Sheet
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Digitize Me
Digitize MeDigitize Me
Digitize Me
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
cyber safety
cyber safetycyber safety
cyber safety
 
Social Media Smarts for Teens
Social Media Smarts for TeensSocial Media Smarts for Teens
Social Media Smarts for Teens
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parents
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 

Recently uploaded

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Internet Safety for Educators

  • 1.
  • 2. Issues Online Predators Online Etiquette & Digital Ethics Sexting Professional Boundaries Cyberbullying Social Networks (Facebook, MySpace) Online Privacy & Online Reputation Identity Theft 2
  • 3. Technology Used Computer iPod Webcam Game consoles 3 Cell phone
  • 4. Risks Inappropriate Contact Inappropriate Content Inappropriate Conduct 4
  • 5. Inappropriate Contact We have to teach children how to recognize and protect themselves against contact with: 5
  • 8. Are you ready for a test? Let’s see how well you know chat lingo You know, the way teens talk in chat rooms, emails and when they text message 8
  • 9. Chat Lingo LOL BRB TAW POS LTTIC CICYHW KPC TOB AITR A/S/L WTGP LMIRL Laughing Out Loud Be Right Back Teachers Are Watching Parent Over Shoulder Look The Teacher Is Coming Can I Copy Your Homework? Keeping Parents Clueless Teacher Over Back Adult In The Room Age, Sex, Location? Want To Go Private? Let’s Meet In Real Life 9
  • 10.
  • 11.
  • 12.
  • 13. Tips for Teachers Discuss online behavior with your students Monitor computer use – look for children minimizing screen when you walk by Have a classroom policy that addresses inappropriate computer and cell phone use (this is in addition to school policy) and post it where they will see it If you have a school policy (Acceptable Use Policy), enforce it! 14
  • 14. Tips for Teachers Keep anonymous comment box in classroom where children can report incidents of cyberbullying Encourage students to report cyberbullying Teach students to think before they post and to not let their emotions get the best of them, especially when they are angry 15
  • 15. Tips for Teachers Tell students: Don’t react (this is often the bully’s goal) Don’t retaliate Block the bully Save the evidence Talk to a trusted adult 16
  • 16. Social Networking Sites 17
  • 17. Social Networking Sites Allow them to exchange information about themselves and communicate with others using blogs, chat rooms, email and instant messaging 18
  • 18. Social Networking Sites While these sites have the ability to extend their circle of friends, they also expose them to those who may have bad intentions – from peers to sexual predators Even though many sites have a minimum age for signup (usually 13 or 14), these sites do not have the ability to verify age 19
  • 19. Social Networking Sites Most young people apply common-sense principles and rules taught at home and school to avoid harmful situations in the “real world” However, they often don’t apply these same rules to the “cyber world” 20
  • 20. Tips for Teachers Encourage students to use privacy settings and security features to limit who has access to their information Encourage students to never post full name, address, phone numbers, email address, instant message username, passwords and identity or financial numbers 21
  • 21. 22
  • 22. Social Networking Sites Teach students to use “throwaway” email addresses when signing up for SNS Remind students that once information is posted online and deleted or modified, the original will never be completely deleted Encourage students to use privacy settings and security features to limit who has access to their information 23
  • 23. MySpace Privacy “Only My Friends” setting makes profile content available only to people on friends list – this is default for those under 18 If a user is under 18, they can choose to make profile content available only to friends and others under 18 Photo Albums, Videos and Blogs each have per item privacy settings that you can choose when you upload that content and modify any time 24
  • 28. Online Privacy & Online Reputation Teach students to ask the following questions: 29 What judgments or conclusions might others form with my information? Are there some details about my life I would like to keep personal? Will this information reflect well on me a year from now? 5 years? Who might view or purchase this information about me? Would I want my best friend to know? Would I want my boss to know? Would I want my mom to know?
  • 29. Online Privacy & Online Reputation Remind students to post information that is appropriate for the entire public Anyone can see individual web pages including parents, teachers, college admission officers, potential employers or police What is posted today may be harmful in the future 30
  • 31. Identity Theft Remind students to be cautious about giving out personal information in chat rooms or on sites such as MySpace or Facebook Sites such as MySpace and Facebook allow members to make their address or phone numbers public to anyone who views their profile Encourage students to make their profiles private but warn them that nothing is ever completely private 32
  • 32. Identity Theft Discuss email tricks that ID thieves use such as sending official looking emails from companies like Ebay, PayPal and others Encourage students to only give out information whey they have gone to the website directly, not by following the link in the email Tell students to never open email or download attachments from anyone they’re not expecting to receive email from 33
  • 33. Identity Theft Teach students to be wary of sites that offer some sort of reward or prize in exchange for their contact information or other personal details Teach students to never fill out forms or requests for information without a parent or guardian’s permission or assistance 34
  • 34. Identity Theft Tell students not to share passwords with others (except their parents!) Discuss using personal information such as such as birth dates or social security numbers in passwords or usernames Educate your students about making purchases online Teach them how to make sure that a web page where they provide personal and financial information is secure 35
  • 35. 36
  • 36. 37
  • 37. Online Predators Keep personal information personal Students should be cautious about sharing other information such as the name of their school, sports team, hobbies, where they work or hang out, or any other information that could be used to identify them or locate them Ensure user names do not reveal too much personal information It is inappropriate and dangerous for children to use their name or home town as their name Most user names made up of personal information are easily deciphered which can lead perpetrators to a student’s identity and/or location 38
  • 38. Online Predators Students should be aware that posting inappropriate photos can lead to damaged reputations and unwanted attention Posting inappropriate photos, especially those that are explicit, can attract individuals who have bad intentions Educate students about the dangers of flirting with strangers Students can give the wrong impression when flirting with a real stranger as well as an online stranger 39
  • 39. 40 Everyone Knows Your Name
  • 40. Online Predators Be careful about adding strangers to IM Buddy or friend lists – people are not always who they say they are Students should not add people as “friends” unless they know for sure who they person is If individuals cannot provide solid information as to how they know the student, the student should delete the user name or block that user Teach students to be skeptical online and question what they see and hear 41
  • 41. Online Predators Teach students to “trust their gut” If a student feels threatened or uncomfortable by someone or something online, they need to tell the teacher or another trusted adult Having students speak up can prevent someone else from becoming a victim Online friends should not be met offline Explain to students that strangers in the online world pose a threat to them just as much as strangers in the physical world 42
  • 42. Online Etiquette & Digital Ethics Teach students to be civil in what they say and show on the internet Talk with students about respecting the reputation and privacy of others when they post anything about them (especially pictures) 43
  • 43. Online Etiquette & Digital Ethics Model ethical behavior Reinforce ethical behavior Draw parallels between offline behaviors and similar situations online Demeaning someone online is just as bad as it is in person Plagiarism is still plagiarism whether its copying from a book or a website 44
  • 44. Online Etiquette & Digital Ethics Teach students to take a moment before responding to a mean or insulting comment, message, email, etc. instead of reacting out of anger Teach students to not respond to these type of actions and to speak with a trusted adult about it 45
  • 45. Online Etiquette & Digital Ethics Talk with students about avoiding using the computer to harm people Taking things which aren’t theirs (files, passwords, etc.) Spreading rumors Setting up a fake website 46
  • 46. Online Etiquette & Digital Ethics Discuss with students the importance of treating people online the same way they would if they were talking to them F2F Considerate and respectful Don’t be rude or mean Don’t use bad language Don’t make threats or try to humiliate others 47
  • 47. Online Etiquette & Digital Ethics Teach students to not lie about who they are online and not pretend to be someone else If someone asks a question that makes you feel uncomfortable or asks you to reveal too much personal information, don’t answer 48
  • 48. Online Etiquette & Digital Ethics Share the risks and consequences associated with plagiarism, file sharing, downloading and copying software, music, movies and games illegally Bad grade School discipline Crime Fines 49
  • 49. Sample Acceptable Use Policy 50 Obtained from www.utechtips.com
  • 51. 52
  • 52. Sexting Encourage students to think about the consequences of taking, sending or forwarding sexual pictures of underage children Students could get kicked off sports team or school club Students could receive disciplinary action at school Students could get arrested 53
  • 53. Sexting Tell students not to take pictures of themselves that they don’t want everyone to see Students should not take pictures that they don’t want their parents, grandparents, teachers, employers or the police seeing Tell students to think before they send the picture because they don’t where it might end up Remind them that if it doesn’t feel right to send it, they probably shouldn’t 54
  • 54. Sexting Inform students that forwarding sexual pictures is just as bad as being the original sender They are just as responsible as the person who took the picture in the first place and sent it Encourage students to tell a trusted adult if they receive a sexual picture Tell them not to delete the picture until an adult is involved 55
  • 55. Sexting Remind students that they are not anonymous when they send sexual pictures These pictures can be tracked through the phone or internet 56
  • 56. Sexting and School Policies Clearly state that possession of sexually explicit images of minors on any device is prohibited, regardless of whether it is illegal or not Indicate that all persons involved, unless they immediately deleted image(s), could be subject to discipline Inform students that parents and police may be contacted to assist in the investigation 57
  • 57. Sexting and School Policies Put all students on notice that cell phones will be searched if the school has reasonable suspicion that school policy has been violated Consequences should be clearly stated but also use wording that allows administration to use discretion for punishment on a case-by-case basis Prohibit harassment and bullying related to sexting incidents and include enhanced penalties for threats related to the incident 58
  • 59. Professional Boundaries 60 Make sure you’re in compliance with your school policy If you don’t if you have one, you better find out! If you’re considering adding a student as a friend to your personal profile, notify parents and receive permission before doing so Make sure the student the required age for the social networking site
  • 60. Professional Boundaries 61 If using Facebook, you could create a Friend List called “Students” and adjust privacy settings to control what they see Create two profiles (personal + professional) or create Group for specific class projects
  • 61. Professional Boundaries 62 You have to watch what you post and who you share it with! Ask these questions before you post anything: Would it be appropriate for me to say this in the classroom? Would I say this to the student in front of the students’ parents? If the answer to either is “No”, then you probably shouldn’t post it
  • 62. Remember that you are role models and children will do what you do Demonstrate proper online behavior at every available opportunity 63