490 likes | 693 Views
Let’s talk about Cyber Safety. Internet Safety Training and Education Project Educational Service District 101 Brent Howard. My Space Class for Adults…. Internet Safety. Cyberbullying Social Networking Online Predators ID Theft Resources. We know about the great Internet.
E N D
Let’s talk aboutCyber Safety Internet Safety Training and Education Project Educational Service District 101 Brent Howard
Internet Safety • Cyberbullying • Social Networking • Online Predators • ID Theft • Resources Cyber-bullying
So, why be concerned? To meet requirements established under the Children’s Internet Protection Act (CIPA), 2000 Filtering: CIPA requires the implementation of a “technology protection measure” (filtering) to block access to visual depictions deemed “obscene,” “child pornography,” or “harmful to minors.” Internet Safety Policy: CIPA requires the adoption and enforcement of an “Internet safety policy” [that addresses] “monitoring the online activities of minors.”
An even bigger reason…our kids! • 1 in 4 have had unwanted exposure to inappropriate pictures when online. • Approximately 1 in 5 received a solicitation or inappropriate approach. • 1 in 17 was threatened, harassed or bullied online. • Only 25% of students who encountered a solicitation or inappropriate approach told a parent or guardian. • Less than 10% of solicitations were reported to law enforcement authorities. David Finkelhor, Kimberly Mitchell and Janis Wolak. Online victimization: A Report on the Nation’s Youth. Alexandria, Virginia: National Center for Missing and Exploited Children, 2000, pg. ix.
…and our community. The Internet Crimes Against Children Task Force, FBI and the US Attorney’s Office of Eastern Washington have investigated and prosecuted a number of Internet predators from our own community. • US vs L. Caulk, sexual predator in Clarkston, WA • US vs T. Johnson, Express site director • US vs C. Jungblum, high school counselor/coach • US vs P. Lyons, superintendent • US vs R. Perkins, deputy prosecutor • US vs B. Rukke, McDonald’s employee Provided by the US Attorneys Office of Eastern Washington
“A day in the life of our students has changed” Cyber-bullying
Pop Quiz! • FYA • F2F • ISO • MMA • P2P • IPN • CTN • P911 • PAL • IRL Cyber-bullying
Kitchen (Ad Council) Cyber-bullying
Cyber-bullying • Cyber-bullying: sending or posting harmful material or engaging in other forms of social aggression using the Internet or other digital technologies. • Cyber-threats: Sending or posting direct threats or distressing material that raises concerns that the person may be considering committing an act of violence against self or others. (Nancy Willard, 2007) Cyber-bullying
Activities • Text/picture Messaging • E-mail • Instant Messaging • Online communities/social network sites • Chat Rooms • Polls/rating sites • Online Gaming Cyber-bullying
Gossip G …give me your password… “…she’s such a cow…” I know how you and your group of friends is….your daughter is just like you…” “I’m not on your top 3 – nice!” “I’m gonna kick you’re a$&!!” I HATE YOU!!! Cyber-bullying
Gossip G “//I won’t tell you who I am, but check up on my profile for the latest gossip CMS Students I Ah-bviously can’t tell you who I am, but I can tell you that I go to CMS – hmmm or maybe CHS….? People tell me things, I find out – I blog it here Did anyone see Wannabe at school today? I think the Ice Queen has permanently pushed her out of the Clique-maybe or maybe not. But I’m sure the Twins would have some say in it. Wannabe certainly wouldn’t want to go out without a bang. Anyway loves – Nothing much else happened today. Can’t wait to see you all tomorrow! Hugs&Kisses, Gossip G Known as; J Personality; as fake as the Chanel make-up you put on your face every morning. As sweet as an Ice princess Known for; Her Her gorgeous looks, and that’s about it… Signature; Bright topaz eyes, and perfect hair Love life; Lonely Boy Friends; B, and S are in her closely knit tight circle Prancing through the halls, stopping to wave at her admirers – while talking at high speed to B, S and whoever else might be following her at the moment. Her shiny brown hair (greasy?) is h4ung over her right shoulder, as her bright coffee eyes scan the area- while picking out the flaws of passerby’s. Cyber-bullying
Gossip G “//I won’t tell you who I am, but check up on my profile for the latest gossip CMS Students I Ah-bviously can’t tell you who I am, but I can tell you that I go to CMS – hmmm or maybe CHS….? People tell me things, I find out – I blog it here Hello Loves, Halloween is tomorrow I wonder what everyone will be wearing… B looked pissed at the end of 7th period – apparently she had to play goalie. Hmm lets all shed a tear for her. (Notice freshly dyed hair) J was caught throwing a fit in the hall today – over what you may ask? Ask her yourself. Apparently the Twins were both whispering to A and the Ice Queen about…me? I told you all I would never tell my name. B flirting with N again, I personally think he doesn’t like her that much – you all know it’s true. K was hugging one of the twins today. I wonder if it was the one who is going out with J- or are they still together? Looks like A got a haircut…the layers don’t really work for her. She would have been better off getting a dye job – or her highlights retouched. Cyber-bullying
Hot or Not? (Polling Sites) Cyber-bullying
Impact of Cyberbullying • More severe that face-to-face • Anonymous • 24/7 • You can’t see me….I can’t see you… • Affects school climate • Poor academic performance • Attendance issues • Student conflict Gossip G Cyber-bullying
PBS: Growing Up Online Cyber-bullying
Cyberbullying Resources • http://adcouncil.org • http://www.netsmartz.org/education • http://www.wiredsafety.org/ Cyber-bullying
Bebo MySpace hi5 Facebook Livejournal YouTube Ustream Del.icio.us Social Networking Cyber-bullying
Social Networking • 61% of 13-17 year olds have a personal profile on a social network site • 50% of those included a picture • 95% listed a personal email address • 84% had a screen name used for IM Cyber-bullying
Let’s look at another website that Danny uses • www.azsexoffender.org: the State of Arizona, government - operated sex offender registration site.
MySpace in the News KOMO News Story
Social Networking Resources • http://delicious.com/digitalsafety • http://delicious.com/istep101 • http://www.netsmartz411.org/ • http://www.onguardonline.gov/ Cyber-bullying
Ad Council: Exchange Cyber-bullying
Cyber Predators • 53% of students prefer to be alone online. • 31% admit to chatting with someone they’ve never met in person. • 14% had a face-face interaction with someone they met online • 9% were 13-15 years old • Only 4% of adult online predators pretend to be kids! Cyber-bullying
Amy’s Choice Cyber-bullying
What about the 4%? Cyber-bullying
Tracking Teresa Cyber-bullying
Signs to look for… • Is your child spending an unusual amount of time on the internet alone? • Has your child received any unexplained gifts in the mail? • Does our child received phone calls from people you don’t know? • Has your child withdrawn from their friends and family? • Has your child had any unexplained absences from home or school? • Does your child close the window they are viewing when you walk in the room? • Is the internet history saved on your computer cleared more often than normal?
Internet Safety Resources • http://netsmartz.org • http://www.ikeepsafe.org/ • http://www.atg.wa.gov/InternetSafety.aspx • http://cybersmartcurriculum.org/ • http://www.staysafeonline.org/ Cyber-bullying
Identity Theft Identity theft is the act of deliberately taking another person’s identity, generally for the purpose of performing a fraudulent act such as gaining access to that person’s finances, or to commit an offence or a crime anonymously or under the disguise of another identity.
Federal Trade Commission ID Theft Statistics • 1 in 6 Americans will be a victim of identity theft this year • In the last twelve months 9.9 million people have had identity theft crime committed against them. • Victims spend on average $1,200 out of pocket and an average of 175 hours resolving problems caused by ID theft.
ID Theft Criminals Targeting Kids? Peer-to Peer File Sharing Sites Pose a BIG RISK! "If teenagers are file-sharing music or movies (over P2P networks), who knows how many criminals might be sharing the family's personal information, credit cards, bank passwords and social security numbers with scheme operators who buy them." Safwat Fahmy, chairman and chief executive of SafeMedia Online Gaming Cheats Malicious Code (Viruses and Spyware have been developed that can run a invisible program on you computer – sealing any and all personal information on that machine.
How to Protect Yourself and Others from Identity Theft • Protect your Social Security number • Use caution when giving out your personal information • Beware of wolves in sheep's clothing • On-Line Job Hunting • Protect your computer • Use caution on the Web • Ask questions • Wireless Access Points