310 likes | 450 Views
Barry Puryear. Internet Safety and Dealing with Cyberbullies. Internet Safety and Dealing with Cyberbullies. Motivations Boy Scout Handbook First Class requirement: “Describe the three things you should avoid doing related to use of the Internet.”
E N D
Barry Puryear Internet Safety and Dealing with Cyberbullies
Internet Safety and Dealing with Cyberbullies • Motivations • Boy Scout Handbook First Class requirement: • “Describe the three things you should avoid doing related to use of the Internet.” • “Describe a cyberbully and how you should respond to one.” • The Internet has real risks, especially for youth.
The Internet – What's it Good For? • A whole world of information: • Research for homework • Information about hobbies • Entertainment • Communication: • E-mail • Instant messaging • Twitter • Social networking sites (MySpace, Facebook)
The Internet – Are There Risks? • Information found on the Internet may not always be correct. • Homework based on just a site or two may be wrong! • Incorrect hobby information might lead you to do something dangerous. • Entertainment content may not be legal to download. • Downloading songs and movies may land you in court!
The Internet – Are There Risks? • There are lots of not-so-nice people online: • Thieves (online fraud, “phishing”) • Online attackers • Break-ins • Denial-of-service • Online predators • Most dangerous of all • They don't just want to harm your computer, they want to harm people.
The Internet – What are the Risks? • Communication: • Spam: Not just lunch meat any more! • E-mail and instant messaging virus and “Trojan horse” attachments. • Threatening or obscene e-mails and instant messages. • Twitter and the social networking sites have similar risks.
The Internet – How do I Stay Safe? • Technology can help • Anti-virus software • Norton, McAffe, many, many others. • Internet firewall (hardware or software) • Firewall/router hardware • Windows Firewall • Spam filtering software • Many Internet Service Providers (ISP) offer this. • Instant messaging filtering software
The Internet – How do I Stay Safe? • Technology can help • Web filtering software • Parental control software • CyberPatrol, Safe Eyes, OpenDNS, Windows Vista Parental Controls. • Your ISP may offer parental controls. • The best parental control is still parental involvement. • Technology is not a magic bullet. • You must use your judgment, as well.
The Internet – How can Youths Stay Safe? • Ultimately, it's up to each of us to stay safe. • Three guidelines for Internet safety: • Don't respond to inappropriate messages or Web sites. • If you see something you don't understand, it's OK to ask a parent. • Don't share personal information: • Address, phone number • School name • Never send photos without parent's permission!
The Internet – How can Youths Stay Safe? • Three guidelines for Internet safety (continued): • Never agree to actually meet anyone you only know only from online contact unless a parent goes with you!
Example – Is This Safe? • “Do your parents both work?” • Seems innocent, but may allow a stranger to figure out if you are home alone in the afternoons. • Not a safe question!
Exercise • Is this a safe question? • It's not that late. When do you need to be at school, tomorrow?
Exercise • Is this a safe question? • It's not that late. When do you need to be at school, tomorrow? • NO! The answer gives away your weekday morning schedule to a stranger.
Exercise • Is this a safe question? • Did you see that Miley Cyrus special on TV last night? Wasn't that great?
Exercise • Is this a safe question? • Did you see that Miley Cyrus special on TV last night? Wasn't that great? • Not sure. It may be completely innocent, but the person on the other end may be an adult pretending to be a teenager. • Unless you are absolutely sure who is on the other end, caution is advised.
Exercise • Is this a safe question? • Ru l33t? I can haz ur warez?
Exercise • Is this a safe question? • Ru l33t? I can haz ur warez? • Strangely enough, no. • Loosely translated, it really says is: “Are you an elite hacker? Can I have your software?” • This is an invitation to share illicit software, possibly as a prelude to illegal activity.
Cyberbullying • A cyberbully uses electronic communications to: • Harass others • Threaten others • Harm others
Cyberbully Tactics • “Dissing” – Spreading damaging gossip. • Harassment – Repeatedly sending hateful messages. • Impersonation – Pretending to be someone else and posting damaging information to harm another person's reputation.
What to do About a Cyberbully • Do not try to retaliate! • Ask the cyberbully to stop. • Do not be aggressive or emotional. • Tell the cyberbully that you will take further steps if he does not stop. • If the cyberbully still does not stop, tell a parent or guardian.
What to do About a Cyberbully • Cyberbullies think that they are anonymous, but they are often easily traced by computer professionals; your Internet service provider (ISP) may be able to help.
What to do About a Cyberbully? • Cyberbully may be in violation of his or her ISP acceptable use policy. • Cyberbully's ISP may be able to take action. • State and Federal laws may also apply, depending on the nature of the bullying. • Lawsuits may be possible depending on the nature of the bullying. • Specific anti-cyberbullying legislation is pending in some states and in the U.S. Congress.
Effects of Cyberbullying • Some effects of cyberbullying on the victim: • Lowered self-esteem • Anxiety • Poor performance in school or work • Depression
How to Avoid Cyberbullies • Be a good Internet citizen: • Don't post information that could be used against you or others. • Stay away from sites that tolerate and encourage cyberbullying. • The Scout Oath and Scout Law apply equally well online as they do in the “real world”.
Recognizing Cyberbullying • What kind of cyberbullying is this? • A youth receives a large number of taunting and threatening e-mails at home. The e-mails seem to be anonymous.
Recognizing Cyberbullying • What kind of cyberbullying is this? • A youth receives a large number of taunting and threatening e-mails at home. The e-mails seem to be anonymous. • This is harassment. If the threats include threats of violence, law enforcement should be contacted. • Keep examples of the e-mails, trying to keep the “full header” information, which allows for tracing the sender. Your ISP may be able to help.
Recognizing Cyberbullying • What kind of cyberbullying is this? • A youth discovers that someone has built a MySpace page in his name, complete with lots of false, unflattering details. Also, the victim starts hearing complaints about the vicious e-mails he has been sending to his friends, even though he did not send any e-mails.
Recognizing Cyberbullying • What kind of cyberbullying is this? • A youth discovers that someone has built a MySpace page in his name, complete with lots of false, unflattering details. Also, the victim starts hearing complaints about the vicious e-mails he has been sending to his friends, even though he did not send any e-mails. • This is impersonation. The victim should contact MySpace to get the page taken down. The victim should try to get examples of the fake e-mails, once again with full header information.
Your Turn • Tabletop exercise • Form into groups. • In your group, take a few minutes to write down 3 to 5 scenarios of possible Internet risks. Try to include at least one example of cyberbullying. • Exchange your list with another group. • Tell your partner group whether you think each scenario is an unsafe situation, and if so, why.
Resources • FBI Parents' Guide to Internet Safety: • www.fbi.gov/publications/pguide/pguidee.htm • NetSmartz • www.netsmartz.org • Microsoft Online Safety • www.microsoft.com/protect • Boy Scout Handbook, 2010 Edition