our cyber bullying presention

advertisement
Cyber Security
NSHA Kickoff 2013
4/9/2015
NSHA Cyber Seecurity
1
Cyber Security Program
• Cyberbullying
• Internet Security
4/9/2015
NSHA Cyber Seecurity
2
Cyberbullying
The repeated use of information technology, including e-mail,
instant message, blogs, chat rooms, pagers, cell phones, and gaming
systems, to deliberately harass, threaten or intimidate others.”
Cyberbullying, unlike physical bullying, does not provide an option
for its victims to walk away
Anonymity
4/9/2015
NSHA Cyber Seecurity
3
Cyberbullying Data
• Over 80 percent of teens use a cell phone regularly, making it the
most popular form of technology and a common medium for cyber
bullying
• About half of young people have experienced some form of cyber
bullying, and 10 to 20 percent experience it regularly
• Mean, hurtful comments and spreading rumors are the most
common type of cyber bullying
• Girls are at least as likely as boys to be cyber bullies or their victims
• Boys are more likely to be threatened by cyber bullies than girls
• Cyber bullying affects all races
• Cyber bullying victims are more likely to have low self esteem and
to consider suicide (18 cases in 2012)
Cyberbullying Research Center
4/9/2015
NSHA Cyber Seecurity
4
Cyberbullying Tactics
The National Crime Prevention Association lists
tactics often used by teen cyberbullies.
1
•
•
•
•
•
1
Pretend they are other people online to trick others
Spread lies and rumors about victims
Trick people into revealing personal information
Send or forward mean text messages
Post pictures of victims without their consent
http://www.ncpc.org/cyberbullying
4/9/2015
NSHA Cyber Seecurity
5
Cyberbullying Methods
•
•
•
•
•
Flaming is a type of online fight. It is an act of sending or posting electronic messages that
are deliberately hostile, insulting, mean, angry, vulgar or insulting, to one person or several,
either privately or publicly to an online group.
Denigration also known as "dissing,” occurs when a person sends or publishes cruel rumors,
gossip or untrue statements about a person to intentionally damage the victim's reputation
or friendships.
Bash boards are online bulletin boards where people post anything they choose. Generally,
the postings are mean, hateful and malicious.
Impersonation can be particularly harmful and occurs when someone pretends to be or
poses as another person. This is usually accomplished by breaking into someone’s account,
by stealing a password and perhaps changing it, or by maliciously using that information
provided by a friend (one reason to never give a password to anyone but a trusted adult).
Once the impersonator has access to the victim's information, considerable damage can
occur. By sending out emails supposedly from the victim or by posting material online, the
victim’s reputation or friendships can be irreparably harmed.
Outing occurs when someone sends or publishes confidential, private, or embarrassing
information, online. Private email messages or images meant for private viewing, is then
forwarded to others.
4/9/2015
NSHA Cyber Seecurity
6
Cyberbullying Methods cont.
• Trickery is when a person purposely tricks another person into
divulging secrets, private information or embarrassing information,
and publishes that information online.
• Exclusion is an indirect method of online bullying, intentionally
excluding someone from an online group or community.
• Harassment is when the electronic bully repeatedly sends insulting,
hurtful, rude, insulting messages.
• Images and videos are a rapidly growing concern. Due to the
prevalence and accessibility of camera cell phones, photographs and
videos of unsuspecting victims, taken in bathrooms, locker rooms or
other compromising situations, are being distributed electronically.
Some images are emailed to other people, while others are published
on video sites such as YouTube.
• Griefing involves chronically causing grief to other members of an
online community, or rather, intentionally disrupting the immersion of
another player in their game play.
http://criminaljustice.state.ny.us/missing/i_safety/cyberbullying.htm
4/9/2015
NSHA Cyber Seecurity
7
Bullying NYS Legislation
• "Harassment" AND "BULLYING" shall mean: the creation of a hostile
environment by conduct or by [verbal] threats, intimidation or
abuse
• interfering with a student's educational performance, opportunities
or benefits, or mental, emotional or physical well-being; or conduct,
verbal threats, intimidation or abuse that]
• Reasonably causes or would reasonably be expected to cause a
student to fear for his or her physical safety
• Reasonably causes or would reason ably be expected to cause
physical injury or emotional harm to a student; or )occurs off school
property and creates or would foresee ably create a risk of
substantial disruption within the school environment, where it is
foreseeable that the conduct, threats, intimidation or abuse might
reach school property
4/9/2015
NSHA Cyber Seecurity
8
Next Steps
•
•
•
•
•
•
Create parent committee
Adopt Cyber security program
Cyber security policy's and procedures
Cyberbulling policy
Code of conduct
Whistle blower policy
4/9/2015
NSHA Cyber Seecurity
9
Teacher information
• Review the school’s Computer and Internet AUP with students and don’t
let students get away with violations.
• Supervise students as closely as possible when they are online, especially
if your school allows instant messaging, blogs and chats.
• Help children understand the consequences of cyber bullying; harassment
and threats can be become the basis for civil litigation and criminal action.
This can include parents being sued if their children violate civil statutes
relating to invasion of privacy, defamation and so on..
• Instruct children on what to do it they encounter cyber bullying.
• Emphasize that those who are being cyber bullied are not responsible for
what is happening, they are victims.
• Encourage students to stand up for others who are being bullied.
• Look for signs that students are being bullied.
• Continually promote positive use of technology.
http://criminaljustice.state.ny.us/missing/i_safety/cyberbullying.htm
4/9/2015
NSHA Cyber Seecurity
10
4/9/2015
NSHA Cyber Seecurity
11
4/9/2015
NSHA Cyber Seecurity
12
Internet Security
Threats
• Criminals
• Child predators
• Cyberbullies
• Inappropriate content
• Fanatical religious groups
4/9/2015
NSHA Cyber Seecurity
13
Types
• Social networking
–
–
–
–
•
•
•
•
Facebook
Twitter
Instagram
Google +
Chat rooms
Message boards
Emails
Texts
4/9/2015
NSHA Cyber Seecurity
14
Would you leave your child alone in a playground ???
4/9/2015
NSHA Cyber Seecurity
15
Risks
•
•
•
•
•
•
•
•
•
Privacy leakage
Age-inappropriate content
Online grooming
Child predators
Identity theft
Home theft
Physical assault
Emotional implications
Financial loss
4/9/2015
NSHA Cyber Seecurity
16
Cyber Statistics
• Law enforcement officials estimate that more than 50,000 sexual
predators are online at any given moment.
• According to the FBI, Chat rooms offer the advantage of immediate
communication around the world and provide the
pedophile/predator with an anonymous means of recruiting children
into sexually illicit relationships.
• Only 1/3 of households with Internet access are protecting their
children with filtering or blocking software.
• 70% of children 7 to 18 years old have accidentally encountered
online pornography, often through a web search while doing
homework.
• There is a fifty percent chance that if your child is in a chat room
designated for under aged children, the stranger he or she is talking
to is a sexual predator logged in under a false identity.
• 86% of girls claimed to be able to conduct online chats without their
parents knowing, 57% could read their parents’ e-mail, and 54%
could conduct a cyber relationship.
4/9/2015
NSHA Cyber Seecurity
17
Next Steps
• Acceptable usage policy
• Content filtering
• Educate parents and students
4/9/2015
NSHA Cyber Seecurity
18
Download