cybersafety unraveled images from microsoft design gallery presentation co-developed by at&t and...
TRANSCRIPT
![Page 1: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/1.jpg)
CyberSafety Unraveled
Images from Microsoft Design Gallery
Presentation Co-developed by AT&T and CTAP Region IV
![Page 2: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/2.jpg)
CTAP4 Website with ResourcesResources for Educators, Parents, and Students
![Page 3: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/3.jpg)
Goals of Presentation
considering strategies to help ensure that our children have a safe, positive experience with technology.
To unravel the fear and hype surrounding the online lives of our cyber kids
while also
![Page 4: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/4.jpg)
How Do You Use the Internet?
• What Are Your Favorite Sites?
• Why?
![Page 5: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/5.jpg)
How Are Students Using the Internet?
• www.myspace.com• www.xanga.com• www.google.com• www.nbc.com/theoffice• www.ebay.com• www.facebook.com• www.livejournal.com• www.yahoo.com• www.bored.com• www.itunes.com• www.gamefacts.com• community.webshots.com
• www.aim.com• www.smartpunk.com• www.youtube.com• www.amazon.com• www.turnitin.com• www.addictinggames.com• www.funnyjunk.com• www.albinoblacksheep.co
m• www.homestarrunner.com• www.fuse.tv.com• www.demonoid.com• en.wikipedia.com
Student Voice 1
![Page 6: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/6.jpg)
Welcome to Their World
MacArthur Foundation Movie: Are Kids Different Because of Digital Media?”
![Page 7: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/7.jpg)
Six Areas Covered Here and on Poster:
1.
2.
3.
4.
5.
6.
Following the Thread
Closing
![Page 8: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/8.jpg)
Definition: Personal information identifies you,your location or your financial assets.
• Obvious: name, age, sex, picture, phone number, address
• Less obvious: hobbies, interests, school mascot, gaming identities
• Used for phishing scams
Threads“Think Before You Post”
![Page 9: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/9.jpg)
Unraveling the facts…• Identity thieves are clever, posing as friends,
relatives and banks, to get people to reveal personal information. Watch for https and URL posers like paypa1.
• Teens are just as likely as adults to become victims of identity theft -- when applying for a driver's license they may find one already has been issued using their name and SSN.
Student Voice 3
![Page 10: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/10.jpg)
www.ctap4.org/cybersafety/
K-6 Boy Who Loved IM 7-12 Real-life Video
Parent Video
Classroom Resources
![Page 11: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/11.jpg)
• Do not share personal information such as your name, age, sex, picture, location/address, phone number, hobbies, interests, and Social Security/bank account numbers.
• Create nicknames that do not reflect your own name or anything personal.
To-Dos: Remember to share guidelines with your students:
![Page 12: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/12.jpg)
To-Dos (cont’d):
• Never respond to online communication that is inappropriate or makes you feel uncomfortable.
• Never agree to meet in person someone you met online.
• Always talk with your parents or a responsible adult about your online activities.
Threads
![Page 13: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/13.jpg)
Definition: Piracy refers to the ownership
rights of materials, created, written,
designed or expressed by individuals.
• Includes music, games, movies, photos, and writing
Threads
![Page 14: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/14.jpg)
Unraveling the facts… • File-sharing represents 60% of all US Internet
traffic.
• Illegally downloading or sharing intellectual property without the permission of the creator is a crime punishable by law.
![Page 15: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/15.jpg)
Resources found at:
http://www.ctap4.org/cybersafety/ip.htm
K-8 Cyber Bee
9-12 Plagiarism Site
Parents - NetFamilyStudent Voice 2
![Page 16: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/16.jpg)
• Don’t download, copy, or share music, games, movies, photos, or other property without permission of the creator.
• Use only legitimate sites (those that request payment or are copyright free) when downloading online media.
To-Dos: Remember to share guidelines with your students:
Threads
![Page 17: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/17.jpg)
Definition: Cyberbullying is the use of
technology for harassment, impersonation,
denigration, trickery, exclusion and stalking.
• Cyberbullies may use email, chat rooms, discussion forums, instant messaging, text messaging or social networking sites.
NetSmartz Real-life Video
Threads
![Page 18: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/18.jpg)
An Example Close to Home
February 7, 2007
“Danville girl's plight now lawmaker's bill”
![Page 19: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/19.jpg)
Unraveling the facts… • “If I tell someone about bullying, it will just
make it worse.” Research shows that bullying will stop when peers or adults get involved.
• Headline news provides opportunities for discussion and “teachable moments”
Lesson - Online Bully
Student Voice 4 & 6
![Page 20: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/20.jpg)
• Don’t respond to or meet with a cyberbully.
• Save proof of the harassment like e-mail messages, screen shots, IM logs, blogs, etc.
To-Dos: Remember to share guidelines with your students:
![Page 21: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/21.jpg)
To-Dos (cont’d):
• Tell a trusted adult who can:
File a complaint with the Internet Service Provider or send an email to the host of the web site where the abuse was posted.
Contact the cyberbully’s parents.
Contact an attorney or file a small claims action. Threads
![Page 22: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/22.jpg)
Definition: Social network sites (MySpace and
Xanga) are services that use the Internet to
create an interactive network of photos, videos,
web logs (blogs) and groups.
• Social networking sites gather data submitted by members as “profiles”
• Profiles can then be shared among members
ThreadsStaySafeOnline.org
![Page 23: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/23.jpg)
Account Settings: Privacy
![Page 25: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/25.jpg)
But we block it…
Student Voice 5
![Page 26: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/26.jpg)
Unraveling the facts…• Posting a picture on MySpace is like posting it on a
public campus bulletin board, that anyone can access and deface
• Although there has been a lot of negative media around social networks, most users are just “hanging out” and teachers are using them in innovative ways
“Think Before You Post”
![Page 27: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/27.jpg)
![Page 28: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/28.jpg)
![Page 29: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/29.jpg)
• Know that sexual predators disguise themselves as friendly and often hunt for victims through social networking sites.
•Be careful about adding strangers to your “friends” list.
To-Dos: Remember to share guidelines with your students:
“You Never Know”
![Page 30: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/30.jpg)
To-Dos (cont’d):
• Never share your personal information or anything about your friends--especially your cell phone number.
• Don’t be shy; report inappropriate postings/profiles to the social networking provider and to the police.
Threads
![Page 31: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/31.jpg)
Definition: Inappropriate content has been
defined in CIPA* as visual depictions that are
obscene, child pornography, or material
"harmful to minors"
• It can also include images of violence, hate group or extremist material, illegal activities and online advertising
Threads
![Page 32: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/32.jpg)
Unraveling the facts…• A white supremacist group registered the
domain name www.martinlutherking.org in order to masquerade as a legitimate resource
• Federal policies created to protect our children include CIPA, COPPA and DOPA
![Page 33: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/33.jpg)
Unraveling the facts…• Inappropriate content can occur on any
computer by accident
• Only a small fraction of the materials on the Internet could reasonably be classified as inappropriate for children…
– Unfortunately, that small fraction is highly visible and controversial.
Parent Controls Video
Student Voice 7
![Page 34: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/34.jpg)
• Tell a trusted adult, teacher or parent ifyou come across inappropriate content.
• Know how to use the back button or logoff immediately when you find material that makes you feel uncomfortable.
To-Dos: Remember to share guidelines with your students:
![Page 35: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/35.jpg)
To-Dos (cont’d):
• Don’t download files from people you don’t know.
• Use filtered searches and systems; ask your teacher or librarian for help
• Use Ask.com as your search engine or set your preferences in Google for strict filtering
Threads
![Page 36: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/36.jpg)
Definition: A Cyber predator uses the Internet
to hunt for victims to take advantage of in ANY
way, including sexually, emotionally,
psychologically or financially
• Cyber predators know how to manipulate kids, creating trust and friendship where none should exist
ThreadsNetsmartz Video: Amy’s Choice
(go to bottom of website)
![Page 37: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/37.jpg)
Unraveling the facts…• Cyber predators can be sent to prison.
• What children need to look out for is not a certain stereotype of a dangerous person but certain types of behavior…
• Use teachable moments, even headline news, to make discussion and education relevant.
CBS News Article
![Page 38: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/38.jpg)
• Encourage your schools to add a small cyber tips section to their school newsletters.
• Remind student to think twice before sharing any information about themselves.
To-Dos: Remember to share guidelines with your students:
![Page 39: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/39.jpg)
• If you suspect that you are being stalked or the victim of inappropriate
communication, report it to a trusted adult or to the CyberTipline. http://cybertipline.com1-800-843-5678
To-Dos (cont’d):
ThreadsCyber Predator Awareness
![Page 40: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/40.jpg)
When Children We Hope They Learn. . .
• Don’t talk to strangers
Start School,Go Online,
in cyberspace
• Look both ways before
, no cyberbullies allowed• Play nicely with other children
• If something happens that scares you, seek help from an adult you trust
clickingcrossing the street
!!!
![Page 41: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/41.jpg)
More Information
Follow the Thread to:
www.ctap4.org/cybersafety/
• Find carefully selected resources for educators, students and parents.
• Download our free Cyber Safety poster sponsored by AT&T .
• Download this presentation to share or modify.
![Page 42: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/42.jpg)
Student Voices to Print Out
1. “Doing your homework on the Internet is so great because it’s like going to the biggest library in the world right at your desk, but it’s also hard because the building that has the world’s biggest library also has the world’s biggest game room, the world’s biggest porn store, the world’s biggest casino, the world’s biggest mall and the world’s biggest lounge. Sometimes I don’t make it to the library.”2. “The Internet and web sites like YouTube are what kids talk about a lot at school. You have to stay connected to know what’s going on.”
![Page 43: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/43.jpg)
Student Voices to Print Out
3. “Things happen much faster now so you really need to stay connected at all times so you don’t get left out. A girl that you like can break up with her boyfriend, flirt with a bunch of guys, pick one and start a new relationship all during one study hall, so you really can’t afford to be offline for that long if you want to keep up.”4. “You (educators) really need to be working with middle school students. High school students may be mature enough to deal with it (Internet, cyberbullying, etc.), but middle schoolers are really out of control.”
![Page 44: CyberSafety Unraveled Images from Microsoft Design Gallery Presentation Co-developed by AT&T and CTAP Region IV](https://reader035.vdocuments.site/reader035/viewer/2022070411/56649f4f5503460f94c71d54/html5/thumbnails/44.jpg)
Student Voices to Print Out
5. “Teens don’t want to tell adults about problems because the response from adults is usually to block a site and then teens don’t have access to the sites they want to use for positive social communication.” 6. “Stop trying all of these things, like blocking sites, and just start talking to kids about these issues. No one ever said to me stop cyberbullying. Maybe the problem would be a lot less in middle school, if the second week of school would focus on these issues.”7. “So often schools just block sites but that just pushes kids off campus where there may be even less supervision. Don’t block, just help MONITOR student use of the Internet.”