Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012 Acceptable Use Policies: A school’s written internet user agreement between teachers, students, parents. Cyberbullying: Using technology to bully someone. Cyberpredators: A person who uses the internet to find and make contact victims the intent of bodily or emotional harm. Identity Safety: Steps taken to avert cyberbullying and cyberpredators and protect the identity of a person using the intenet. Inappropriate Content: Material found on an unfiltered internet site that contains images that are pornographic, violent, illegal activities, obscene and harmful to children. Piracy,Plagiarism: Sharing or copying copyrighted material without the authorization of the original owner/creator of the product. An acceptable use policy (AUP)defines the terms and conditions for internet use in a school. The AUP is a written agreement between the school, teacher, parents, and student. AUPs provide safety measures to protect students from internet dangers. AUPs should be designed to: ◦ Educates parents and students ◦ Encourages proper internet behavior ◦ Discourages dangerous or illegal activities For more information: i-SAFE Acceptable Use Policies Cyberbullying is the use of technology for social cruelty, which can include harassment, impersonation, denigration, trickery, exclusion and stalking. (Walters, 2009c, p.3) Cyber Bully Workshop Examples from a student’s perspective. http://org.kidshelpphone.ca/en/mediacentre/television-psa A Cyber predator uses the Internet to hunt for victims to take advantage of in ANYway, including sexually, emotionally, psychologically or financially. Cyber predators know how to manipulate kids, creating trust and friendship where none should exist. (Walters, 2009d, p. 4 ). Anonymous pedophiles. Hides behind a computer versus a bush. Interacts with children online by pretending to be a child themselves. Infiltrates chat rooms, Facebook, email, instant messages, text messages via phone. Grooms children by first giving online attention, gradually incorporating sexually explicit content or suggestions. Cyber Predator Reporting Personal information can be used to identify you, your location or your financial assets. Obvious: your name, age, sex, picture, phone number, address/location. Less obvious: hobbies, interests, school mascot, online group memberships. Too much personal information puts users at risk, can lead to physical harm or identity theft . The information can also be used for scamming, spamming and phishing Identity Video Clip Inappropriate content has been defined in the Children's Internet Protection Act as visual depictions that are obscene, child pornography, or material "harmful to minors” Categories include pornography, hate groups, violence, illegal activity, extremist groups, online advertising. ( Walters, 2009d, p. 5). Filtered images vs. unfiltered images. How do Kids Unknowingly Find the images? Children's Internet Protection Act “Piracy or Intellectual Property refers to the ownership rights of materials, created, written, designed or expressed by individuals. These materials include music, games, movies, photos, and writing. Illegally downloading or sharing intellectual property without the permission of the creator is a crime punishable by law” ( Walters, 2009d, p. 5). Intellectual property Copyright laws versus Fair Use Interpretation Educators may use limited parts of copyrighted material for teaching purposes, only, without written permission of the author. Fair Use is very broad and ultimately up to legal interpretation. Refer to the U.S. Copyright Office for more information. Reproduction of Copyrighted Works by Educators and Librarians Cybersafety begins with the school Information and Awareness = prevention Prevention = responsibility Responsibility = safe classrooms Federal Communications Commission (2012). Children’s Internet Protection Act. Retrieved from http://www.fcc.gov/guides/childrens-internet-protection-act Hughes, D.R., (2001). How Children Access Pornography on the Internet. Protecting Kids in Cyberspace. Retrieved from www.protectkids.com I Safe (2012). Acceptable Use Policies. Retrieved from http://www.isafe.org/imgs/pdf/education/AUPs.pdf Ohio Commission DRCM. (2008). Everyone Knows Your Name – Online Safety Commercial. You Tube Video. Retrieved from http://www.youtube.com/watch?v=dT1GvPQG904 National Center for Missing and Exploited Children. (2012) . NetSmarz Workshop: Chapter 2 Cyberbullying. Retrieved from http://www.netsmartz.org/StreamingPresentations/InternetSafetyBasics National Center for Missing and Exploited Children (2012). Cybertipline. Retrieved from http://www.missingkids.com/missingkids/servlet/PageServlet?LanguageCountry=en_US&PageId=2446 National Council of Teachers of English (2012). Code of Best Practices in Fair Use for Media Literacy. Urbana, Il. Retrieved from http://www.ncte.org/positions/statements/fairusemedialiteracy Walters, E. (2009d). Cyber Safety: inappropriate Content. Retrieved from http://www.myctap.org/index.php/inappropriate-content Walters, E. (2009). Cyber Safety: Piracy & Plagerism. Retrieved from http://www.myctap.org/index.php/piracy-a-olagiarism U.S. Copyright Office (2009). Copyright Basics. Washington, DC: The Library of Congress. U.S. Copyright Office (2009). Reproduction of Copyrighted Works by Educators and Librarians. Washington, DC: The Library of Congress