Cyber Safety - National Tech Prof

advertisement
Computer-Based Technology in the Classroom
EDX 1201X
National University
October 20,2012






Acceptable Use Policies: A school’s written internet user agreement between teachers,
students, parents.
Cyberbullying: Using technology to bully someone.
Cyberpredators: A person who uses the internet to find and make contact victims the
intent of bodily or emotional harm.
Identity Safety: Steps taken to avert cyberbullying and cyberpredators and protect the
identity of a person using the intenet.
Inappropriate Content: Material found on an unfiltered internet site that contains images
that are pornographic, violent, illegal activities, obscene and harmful to children.
Piracy,Plagiarism: Sharing or copying copyrighted material without the authorization of
the original owner/creator of the product.



An acceptable use policy (AUP)defines the
terms and conditions for internet use in a
school.
The AUP is a written agreement between the
school, teacher, parents, and student.
AUPs provide safety measures to protect
students from internet dangers.

AUPs should be designed to:
◦ Educates parents and students
◦ Encourages proper internet behavior
◦ Discourages dangerous or illegal activities

For more information: i-SAFE Acceptable Use
Policies

Cyberbullying is the use of technology for social
cruelty, which can include harassment,
impersonation, denigration, trickery, exclusion and
stalking. (Walters, 2009c, p.3)

Cyber Bully Workshop

Examples from a student’s perspective.

http://org.kidshelpphone.ca/en/mediacentre/television-psa

A Cyber predator uses the Internet to hunt for victims to take
advantage of in ANYway, including sexually, emotionally,
psychologically or financially. Cyber predators know how to
manipulate kids, creating trust and friendship where none
should exist. (Walters, 2009d, p. 4 ).





Anonymous pedophiles. Hides behind a computer versus a bush.
Interacts with children online by pretending to be a child
themselves.
Infiltrates chat rooms, Facebook, email, instant messages, text
messages via phone.
Grooms children by first giving online attention, gradually
incorporating sexually explicit content or suggestions.
Cyber Predator Reporting


Personal information can be used to identify
you, your location or your financial assets.
Obvious: your name, age, sex, picture, phone
number, address/location. Less obvious:
hobbies, interests, school mascot, online
group memberships.
Too much personal information puts users at
risk, can lead to physical harm or identity
theft . The information can also be used for
scamming, spamming and phishing

Identity Video Clip

Inappropriate content has been defined in the
Children's Internet Protection Act
as visual depictions that are obscene, child
pornography, or material "harmful to minors”
Categories include pornography, hate groups,
violence, illegal activity, extremist groups, online
advertising. ( Walters, 2009d, p. 5).

Filtered images vs. unfiltered images.

How do Kids Unknowingly Find the images?

Children's Internet Protection Act

“Piracy or Intellectual Property refers to the ownership rights of materials,
created, written, designed or expressed by individuals. These materials
include music, games, movies, photos, and writing. Illegally downloading or
sharing intellectual property without the permission of the creator is a crime
punishable by law” ( Walters, 2009d, p. 5).



Intellectual property
Copyright laws versus Fair Use Interpretation
Educators may use limited parts of copyrighted material for teaching
purposes, only, without written permission of the author.

Fair Use is very broad and ultimately up to legal interpretation.

Refer to the U.S. Copyright Office for more information.

Reproduction of Copyrighted Works by Educators and Librarians
 Cybersafety
begins with the school
 Information
and Awareness = prevention
 Prevention
= responsibility
 Responsibility
= safe classrooms
Federal Communications Commission (2012). Children’s Internet Protection Act. Retrieved from
http://www.fcc.gov/guides/childrens-internet-protection-act
Hughes, D.R., (2001). How Children Access Pornography on the Internet. Protecting Kids in Cyberspace. Retrieved from
www.protectkids.com
I Safe (2012). Acceptable Use Policies. Retrieved from
http://www.isafe.org/imgs/pdf/education/AUPs.pdf
Ohio Commission DRCM. (2008). Everyone Knows Your Name – Online Safety Commercial. You Tube Video. Retrieved from
http://www.youtube.com/watch?v=dT1GvPQG904
National Center for Missing and Exploited Children. (2012) . NetSmarz Workshop: Chapter 2 Cyberbullying. Retrieved from
http://www.netsmartz.org/StreamingPresentations/InternetSafetyBasics
National Center for Missing and Exploited Children (2012). Cybertipline. Retrieved from
http://www.missingkids.com/missingkids/servlet/PageServlet?LanguageCountry=en_US&PageId=2446
National Council of Teachers of English (2012). Code of Best Practices in Fair Use for Media Literacy. Urbana, Il. Retrieved from
http://www.ncte.org/positions/statements/fairusemedialiteracy
Walters, E. (2009d). Cyber Safety: inappropriate Content. Retrieved from
http://www.myctap.org/index.php/inappropriate-content
Walters, E. (2009). Cyber Safety: Piracy & Plagerism. Retrieved from
http://www.myctap.org/index.php/piracy-a-olagiarism
U.S. Copyright Office (2009). Copyright Basics. Washington, DC: The Library of Congress.
U.S. Copyright Office (2009). Reproduction of Copyrighted Works by Educators and Librarians. Washington, DC: The
Library of Congress
Download