Workbook

advertisement
Dr E Kritzinger – UNISA
SACSAW 2011
The Cyber Security Awareness Workbook
Introduction
Government
Home Users
Cyber
Awareness
Education
Industry
Policy
Schools
Implementation
Completed initiatives –
Seminar: Cyber safety 2010
Organizers and quest speakers:
From left: Dr K. Padayachee, Dr E. Kritzinger, Prof S.H. von Solms, Ms M. Loock, Dr M. Ramorola,
Prof M. Setati, Prof E. Smith, Prof T. Pistorius, Colonel J. Hefer, Mr S. Potgieter and Prof R. von Solms.
Panel discussion:
From left: Prof R. von Solms, Colonel J. Hefer, Ms S. Mocke, Mr S. Potgieter, Dr M. Ramorola and Prof S.H. von Solms.
Online available: http://www.unisa.ac.za/Default.asp?Cmd=ViewContent&ContentID=24842
E-Guidelines for School – DOE (2011)
•
•
•
•
•
E-Guidelines have been approved.
Available on the DOE Thutong website .
First step from the DOE to assist in the topic.
No other planned initiatives for cyber awareness
While before cyber awareness will be integrated into
the curriculum.
• An interim initiative is needed until cyber awareness
is incorporated into the curriculum.
Problem Statement
Enhancing cyber awareness amongst children, parents &
teachers to decrease cyber threats.
Aims
Develop and distribute relevant cyber awareness material
to school children, parents & teachers within South Africa.
Reasons for Cyber awareness
•
•
•
•
•
Increase in broadband to Africa
Increase in mobile phone – with web access
Increase in cyber incidences
Cyber divide
Technological divide
Reasons for Cyber awareness
In a survey conducted by Harris Interactive(R) for MacAfee
(2008) the following statistics were obtained: (http://www.mcafee.com)
• 63% of teenagers said they know how to hide what they
are doing online form their parents,
• 32% are able to clear the browser history,
• 16% have created private e-mail and social networking
profiles,
• 52% have given out personal information to somebody
they do not know online,
• 20% have engaged in cyber bulling and
• 9% have used the Internet to cheat at school.
Initiative for 2011 - Workbook
The workbook will:
1. ... be in a hard copy format that will assist many
schools that have limited computer access (if any).
2. ... provide cyber awareness information.
3. ... provide teachers/parents with guidance on how
to make children aware of cyber threats.
4. ... Provide activities for children.
Workbook
(1)
Plan of action: Design “Cyber Awareness image”.
Design, print and distribute workbook.
Obtain sponsors.
Format: Hard copy
The implementation of c-safety within South Africa is unique due
to the huge range of diversity amongst culture, language,
religions, wealth classes, access to knowledge and technology
and no centralised e-learning policies and resource .
(Czerniewics, 2010. Available: http://mfeldstein.com/mobile-is-my-soul-cell-phones-in-south-afric/a)
Workbook
(1)
• The workbook can be translated into many different
languages and will help teachers, parents and children to
understand the content more easily.
• Workbooks can easily copied in school with no access to
computers and printers or limited funds.
• Used with other initiatives for example internet day.
• Used for training of teachers.
Workbook -Distribution
(1)
• The Independent Educator is circulated to approx.
37,000 teachers. This magazine also provides an
opportunity to advertise on a web banner on their
website. The website has an average of 1,500,000
visitors per month.
• Free 4 all is a magazine that is distributed to school
children. Total distribution – 390 000 monthly. This
magazine will be used to distribute a copy of the
workbook to children.
Partners
Film and Publication Board
National Research Foundation
(2)
Centre of Software Engineering - UNISA
Microsoft (?)
Workbook - Topics
(2)
The NCSA advocates for cyber education programmes based on
three key pillars: (http://www.staysafeonline.org/in-the-classroom/three-key-pillars).
Cyberethics
•
•
•
•
•
•
•
•
•
•
•
•
Plagiarism
Copyright
Hacking
Fair use
File sharing
Eetiquette protocols
Posting incorrect
information
Cyberbullying
Pirating
Online gambling
Gaming
Internet addiction
Cybersafety
•
•
•
•
•
•
•
•
•
Online predators
Objectionable content
Cyberstalking
Harassment
Pedophiles
Hate groups
Pornography
Unwanted communications
Online threats
Cyber security
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Hoaxes
Viruses
Malicious code
Junk email
Chain letters
Get-rich-quick schemes
Scams
Criminal hackers
Hacktivists
Malware
Trojans
Phishing
Theft of identity
Spoofing
Privacy
Workbook (2) - Example of a Topic
The teacher magazine, 2010
Workbook - Lesson Plans
(3)
• In most cases teachers also do not understand the
topics.
• Teachers do not have access to internet to download
lesson plans.
• Teachers do not syllabus to work from.
• Must provide teachers with guidance on how to
address these issues.
Workbook (3) – Example of a lesson plans
Overview
Students explore a scenario in which a friendly relationship turns to a bullying one involving cell phones and computers.
Objectives
Analyze online behaviors that could be considered cyberbullying.
Generate multiple solutions for dealing with a cyberbullying situation.
Identify abbreviations and other textual clues to reduce cyberbullying.
Introduce
Ask: What are all the reasons and ways kids communicate with cell phones? (call friends, call parents for help, text message, take and
send photos, go online, receive e-mails and instant messages)
Real life problem: Cyberbullying: Not a Pretty Picture
Jaleesa and Kim are friends at Jefferson Middle School. Kim tells Jaleesa that she doesn’t want to hang out with her any more. Jaleesa is
angry and upset. She uploads a photo of Kim from her cell phone that was taken at a slumber party two weeks earlier. Jaleesa sends the
photo to everyone on her buddy list with a message attached: “Kim is such a ****.”
Activities:
• What is the problem?
• Think about the problem
• What is the solution
• Take action.
Assess:
The following items assess student mastery of the lesson objectives.
Ask: What is cyberbullying? (It's when kids are intentionally and repeatedly mean to one another using cell phones or the Internet.)
Ask: How can cyberbullying make kids feel? (It can make them feel angry, frustrated, sad, or afraid.)
Ask: What kinds of abbreviations can kids use to prevent cyberbullying while text or instant messaging? (Answers will vary.)
Workbook (4) -Activities
Ages:
• Educators & Parents (caregivers)
• Children: Aged 4 - 8 (Preschool – Grade 2)
Aged 8 - 11 (Grade 2 – Grade 5)
Aged 11-14 (Grade 5 – Grade 7)
Aged 14-18 (High school)
Activities:
• Role play, discussions, real life scenarios, hands
on activity sheets.
Workbook (4) - Examples
The Teacher Magazine - 2010
Possible connected initiatives
Publications
Training
Cyber days
Workbook
Education
Syllabus
?
kritze@unisa.ac.za
Download