1 / 60

You, Your Students and Technology

Overview of today's talk:. The Digital Divide: Why Do We Care?What We Are Doing with Technology?Ohio Anti Bullying, Intimidation and Harassment LawInternet Landscape / SafetyTeacher and Parent InvolvementResources You Can Use. Why Do We Care?. On The Flip Side. Social Networking ? Positives.

kioko
Download Presentation

You, Your Students and Technology

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. You, Your Students and Technology Navigating the Digital World! This is not meant to scare. Purpose is to empower them with knowledge. Start with icebreaker questions – raise hand: Who has cell phone? Who uses phone only to make calls? Who also browses internet on phone? Who texts? Who sends pictures? Who uses computers? Who sends email? Who is on internet? Who uses social networking sites – e.g., MySpace, Facebook, Twitter? Who has their own social networking site page? How many of you have kids? How many communicate with your kids by cell phone? By text? By email? How many of you are confident you know how, when, how much, and with whom your students and children are communicating with each other using these things? This is not meant to scare. Purpose is to empower them with knowledge. Start with icebreaker questions – raise hand: Who has cell phone? Who uses phone only to make calls? Who also browses internet on phone? Who texts? Who sends pictures? Who uses computers? Who sends email? Who is on internet? Who uses social networking sites – e.g., MySpace, Facebook, Twitter? Who has their own social networking site page? How many of you have kids? How many communicate with your kids by cell phone? By text? By email? How many of you are confident you know how, when, how much, and with whom your students and children are communicating with each other using these things?

    2. Overview of today’s talk: The Digital Divide: Why Do We Care? What We Are Doing with Technology? Ohio Anti Bullying, Intimidation and Harassment Law Internet Landscape / Safety Teacher and Parent Involvement Resources You Can Use

    3. Why Do We Care? Ask them to give reasons why we care about kids/students technology. Can’t we just let them figure it out on their own? Ask them if they’ve heard of any cases in the news. 1. kids cyberbullied and commit suicide 2. kids sext pics and then commit suicide after pic sent around 3. taped beatings of students by students 4. kids students go to meet internet “friends” and disappear/killed Ask them if they are seeing these issues in their schools and communities.Ask them to give reasons why we care about kids/students technology. Can’t we just let them figure it out on their own? Ask them if they’ve heard of any cases in the news. 1. kids cyberbullied and commit suicide 2. kids sext pics and then commit suicide after pic sent around 3. taped beatings of students by students 4. kids students go to meet internet “friends” and disappear/killed Ask them if they are seeing these issues in their schools and communities.

    4. On The Flip Side Technology is not bad In fact, like many things, technology is neither inherently good nor bad. Rather, it is guided by the user. Tell proverb about young boy and wise old man.Technology is not bad In fact, like many things, technology is neither inherently good nor bad. Rather, it is guided by the user. Tell proverb about young boy and wise old man.

    5. Social Networking – Positives Kids can practice social skills chance to meet people online with “different” backgrounds, views, ideas, experiences because socializing via technology isn't as immediate as face-to-face interactions or telephone conversations, more time to process response opportunity to experiment with greetings, responses, etc

    6. Positives Continued Defined/guided/narrowed social interaction for purposes of scope and safety buddy/friend lists moderated themed chatrooms or message boards for younger children, parents help by typing or reading along. can help children build skills and confidence that will increase their independence as they mature Talk about Disney Princess site Anna wanted to go on. Chatroom choice: Free chat, or Defined questions and answer choicesTalk about Disney Princess site Anna wanted to go on. Chatroom choice: Free chat, or Defined questions and answer choices

    7. Internet Landscape Faster communication Advanced research techniques Up-to-the minute news Entertainment Online shopping and services Financial management. A few fun facts about the Internet: Who knows who invented internet, when and why? US Dept. of Defense, 1969, as a means of internal communication if attacked by Russia. World Wide Web (WWW) created in 1989. A few fun facts about the Internet: Who knows who invented internet, when and why? US Dept. of Defense, 1969, as a means of internal communication if attacked by Russia. World Wide Web (WWW) created in 1989. 

    8. Internet Landscape- Student Online Behavior* 90% of youth ages 5-17 use the Internet 38% of 5th – 8th grade feel freer to do what they want on the Internet. 30% of these students say e-mail, chat rooms, or instant messaging is the main way they stay in contact with their friends. 31% of these students say it is easier to talk with people on the Internet than in real life. The Internet even more integral in the lives of kids.   According to a 2003-2004 i-SAFE survey of 20,000 5th-8th grade students (and understand, this survey is five years old – numbers have gone up: 80% of students spend at least one hour per week on the Internet. 11% of students spend over 8 hours per week on the Internet.* 12% of students say they spend more time on the Internet than with friends. *Percentages increase with high school students. Tell story about kids who went to principals office and asked to “work it out” by going in different rooms and textingThe Internet even more integral in the lives of kids.   According to a 2003-2004 i-SAFE survey of 20,000 5th-8th grade students (and understand, this survey is five years old – numbers have gone up: 80% of students spend at least one hour per week on the Internet. 11% of students spend over 8 hours per week on the Internet.* 12% of students say they spend more time on the Internet than with friends. *Percentages increase with high school students. Tell story about kids who went to principals office and asked to “work it out” by going in different rooms and texting

    9. Internet Landscape Risky Student Online Behavior* 55% of students admitted giving their personal information online 25% of students believed there was nothing wrong with chatting with strangers online. 10% of students had met someone face-to-face that they previously met on the Internet. 10% had posted picture online Just because kids and teens feel comfortable with the technology does not mean they understand how to be safe on the Internet.   *Percentages increase with high school students. Through the anonymity of the Internet, students are increasingly tempted to reveal personal information, and are vulnerable to the exposure of inappropriate material, cyber bullying, sexual solicitation, and other forms of exploitation. Will talk more about this later. Just because kids and teens feel comfortable with the technology does not mean they understand how to be safe on the Internet.   *Percentages increase with high school students. Through the anonymity of the Internet, students are increasingly tempted to reveal personal information, and are vulnerable to the exposure of inappropriate material, cyber bullying, sexual solicitation, and other forms of exploitation. Will talk more about this later.

    10. Man jailed in death of woman from N.C. Charged with abuse of corpse Saturday,  July 25, 2009 3:09 AM By Randy Ludlow THE COLUMBUS DISPATCH A Scioto County man was charged yesterday with dumping the body of a North Carolina woman after she died of an apparent drug overdose. Richard E. Howard, 32, of McDermott, was arrested and charged with abuse of a corpse, tampering with evidence and drug trafficking, said Scioto County Sheriff Marty Donini. Nichole Ann Alloway, 20, of Spring Hope, N.C., disappeared June 10 after arriving in Portsmouth about three weeks earlier to meet another man with whom she had developed an Internet romance. Her body was found July 12 in a rocky area along Rt. 73 near Otway in Scioto County. Alloway's body later was identified through dental records. Detectives believe Alloway died in Howard's car as they drove along Rt. 73 after taking methamphetamine. Toxicology tests results are expected to determine her cause of death. A grand jury will review the case once the results are received, and Howard could face additional charges, said Prosecutor Mark Kuhn. Howard is being held in the Scioto County jail in lieu of posting a $25,000 bond. He is scheduled to appear in Portsmouth Municipal Court on Monday. Have to balance risky student behavior with risky adult behavior. Adults do meet people online (e-Harmony), date, fall in love, get married. But can also run into problems.Have to balance risky student behavior with risky adult behavior. Adults do meet people online (e-Harmony), date, fall in love, get married. But can also run into problems.

    11. Ohio Statewide Discipline Data Green line and diamond = Harassment, Intimidation, Bullying = trending upwards since 2005Green line and diamond = Harassment, Intimidation, Bullying = trending upwards since 2005

    12. May 5, 2005– HB 276 (Ohio Anti HIB) Introduced – requires schools, by 12/30/07 to adopt policy prohibiting harassment, intimidation, and bullying (ORC 3313.666 and 3316.667 ) Dec. 30, 2007 – School district/community school policies to be in effect January 2007 – Ohio Anti HIB Initiative is formed - ODE, AGO, & Commission Dispute Resolution *Educated over 25,000 students and adults SB 126 has been introduced in Ohio. Would: Add “electronic” HIB (electronic is in current model policy, but not ORC) Requires school to add policy against HIB for school bus and off school property if it “substantially disrupts the educational environment and discipline of the school.” – must provide for possible suspension School must provide for anonymous reporting Requires policy against deliberate false reports and discipline for students found guilty of such no person who holds administrator license shall fail to report a violation of menacing by stalking or telecommunications harassment. But no penalty for failing to do so. Makes training for staff mandatory and provides deadlines (will apply to continuing education requirements)SB 126 has been introduced in Ohio. Would: Add “electronic” HIB (electronic is in current model policy, but not ORC) Requires school to add policy against HIB for school bus and off school property if it “substantially disrupts the educational environment and discipline of the school.” – must provide for possible suspension School must provide for anonymous reporting Requires policy against deliberate false reports and discipline for students found guilty of such no person who holds administrator license shall fail to report a violation of menacing by stalking or telecommunications harassment. But no penalty for failing to do so. Makes training for staff mandatory and provides deadlines (will apply to continuing education requirements)

    13. Any intentional written, verbal, graphic, or physical act that a student or group of students exhibited toward another particular student more than once and the behavior both: *Causes mental or physical harm to the other student; and *Is sufficiently severe, persistent or pervasive that it creates an intimidating, threatening or abusive educational environment for the other student. Electronically transmitted acts (i.e., through the Internet, a cell phone, personal digital assistance (PDA) or wireless hand-held device) also covered

    14. Thought to Ponder “Safety on the social Web is not about technology; it's about behavior, human relationships - civility, consideration, and common sense. These are things parents and kids have been talking about since long before the telephone even, long before anything we think of as technology” *My Space Chief Safety Officer

    15. Internet Safety We will discuss . . . Personal Safety Internet Predators Cyber Bullying Cyber Security Kids who have not discussed Internet safety with their parents and/or who have not received Internet safety instruction at school are often unknowingly putting themselves in harm’s way as they utilize the Internet. As we will see through this next section, kids and teens face a number of issues online and they must be prepared to think critically about their actions and interactions while on the Internet. Kids who have not discussed Internet safety with their parents and/or who have not received Internet safety instruction at school are often unknowingly putting themselves in harm’s way as they utilize the Internet. As we will see through this next section, kids and teens face a number of issues online and they must be prepared to think critically about their actions and interactions while on the Internet.

    16. Personal Safety As students establish e-mail accounts, enter chat rooms, and/or instant message, they create screen names and profiles.   A screen name is a nickname used when communicating online, similar to “handles” used by truckers over CB radios. A profile is an online description of the user. Once created, they are searchable and can be viewed by anyone.   This is an example of a typical student profile for their social networking site. (Please note, all identifying information has been modified to protect her identity.) The profile reveals the girl’s picture, real name, age, school name, and location for the summer. How hard would it be to track her down and meet her face to face?   Students need to understand that for their own safety they should never reveal identifying information such as their name, address, phone number, school name, or a photo in their screen name or profile. They should be non-specific and purposely vague.   Students should also remember to set their privacy settings in their profiles. This restricts access to their page to family, friends, or persons whom they invite in – catch is that they have to be selective in invite – if invite everyone, setting uselessAs students establish e-mail accounts, enter chat rooms, and/or instant message, they create screen names and profiles.   A screen name is a nickname used when communicating online, similar to “handles” used by truckers over CB radios. A profile is an online description of the user. Once created, they are searchable and can be viewed by anyone.   This is an example of a typical student profile for their social networking site. (Please note, all identifying information has been modified to protect her identity.) The profile reveals the girl’s picture, real name, age, school name, and location for the summer. How hard would it be to track her down and meet her face to face?   Students need to understand that for their own safety they should never reveal identifying information such as their name, address, phone number, school name, or a photo in their screen name or profile. They should be non-specific and purposely vague.   Students should also remember to set their privacy settings in their profiles. This restricts access to their page to family, friends, or persons whom they invite in – catch is that they have to be selective in invite – if invite everyone, setting useless

    17. Internet Predators Often the Predator - Appears familiar Develops trust Establishes secrecy Erodes barriers Direct intimidation Face-to-face meeting Gift giving / praise Remember, 69% of teens regularly receive personal messages online from people they don’t know and most of them don’t tell a trusted adult about it. www.cox.com Picture sent not necessarily the actual person – 52 year old man can send pic of 16 year old boy Direct intimidation - The predator may make threats if the child stops communicating or refuses to meet in person. By this point the child may feel powerless against their online “friend.” (especially if they sent them a revealing photograph – blackmail) They may have no one to turn to out of fear of the predator’s threats and their parents’ anger about the situation. Very good game for young children about who are your “friends” on the internet from Netsmartz. http://www.netsmartzkids.org/activities/whofriend.htm. Play game. Here is a true life example of what could happen: In Bowling Green, OH, a 14-year-old girl prompted a 20-year-old to hitchhike from Washington state to Ohio after she "met" him on MySpace.com and chatted for a couple weeks. Fortunately, for her, her mother found out what was going on and called police to report that the stranger had traveled to Ohio. According to police reports, he hitched a ride to a truck stop, and then got a ride to a Kroger store where he called the girl to meet him. Picture sent not necessarily the actual person – 52 year old man can send pic of 16 year old boy Direct intimidation - The predator may make threats if the child stops communicating or refuses to meet in person. By this point the child may feel powerless against their online “friend.” (especially if they sent them a revealing photograph – blackmail) They may have no one to turn to out of fear of the predator’s threats and their parents’ anger about the situation. Very good game for young children about who are your “friends” on the internet from Netsmartz. http://www.netsmartzkids.org/activities/whofriend.htm. Play game. Here is a true life example of what could happen: In Bowling Green, OH, a 14-year-old girl prompted a 20-year-old to hitchhike from Washington state to Ohio after she "met" him on MySpace.com and chatted for a couple weeks. Fortunately, for her, her mother found out what was going on and called police to report that the stranger had traveled to Ohio. According to police reports, he hitched a ride to a truck stop, and then got a ride to a Kroger store where he called the girl to meet him.

    19. Cyber Bullying According to a 2004 i-SAFE survey of 1,500 middle school students, it was reported that while online: Cyber bullying is on the rise.   Watch cyberbullying ad from AD council: http://www.adcouncil.org/default.aspx?id=42 Cyber bullying is on the rise.   Watch cyberbullying ad from AD council: http://www.adcouncil.org/default.aspx?id=42

    20. Cyber Bullying Methods Instant Messages E-mail Webpages Weblogs Cell Phones Students bully online through a variety of methods: Instant messages and e-mail. Students may instant message or e-mail using unidentifiable screen names to “anonymously” bully and harass their peers. T They can also spoof screen names, making minor changes to pretend they are someone else. Or, they access someone’s account with that person’s password, but without their permission, and then bully or harass while pretending to be the other person. Webpages and weblogs. On personal webpages and weblogs, students post comments, pictures, and videos to make fun of, bully, and threaten others. There are also a growing number of public websites that allow students to post comments, rumors, threats, and gossip about classmates. Show Peoplesdirt.com (also, HotorNot) Cell Phones. Cell phones can be used to send text messages or unknowingly take photos that find their way to the Internet. As you may have noticed in your own health club locker rooms, cell phone usage is increasingly being banned in school locker rooms due to camera phones. The Fort Worth Star-Telegram reported that a girl in an Arlington, Texas, school brought a camera phone into a locker room—at the request of a male classmate—to take pictures of girls undressing. Both were disciplined. Cell phone cameras are different from other cameras in that they are often equipped with a zoom feature that can be used covertly. Someone can pretend to be chatting or dialing when they're actually taking candid camera shots. Students bully online through a variety of methods: Instant messages and e-mail. Students may instant message or e-mail using unidentifiable screen names to “anonymously” bully and harass their peers. T They can also spoof screen names, making minor changes to pretend they are someone else. Or, they access someone’s account with that person’s password, but without their permission, and then bully or harass while pretending to be the other person. Webpages and weblogs. On personal webpages and weblogs, students post comments, pictures, and videos to make fun of, bully, and threaten others. There are also a growing number of public websites that allow students to post comments, rumors, threats, and gossip about classmates. Show Peoplesdirt.com (also, HotorNot) Cell Phones. Cell phones can be used to send text messages or unknowingly take photos that find their way to the Internet. As you may have noticed in your own health club locker rooms, cell phone usage is increasingly being banned in school locker rooms due to camera phones. The Fort Worth Star-Telegram reported that a girl in an Arlington, Texas, school brought a camera phone into a locker room—at the request of a male classmate—to take pictures of girls undressing. Both were disciplined. Cell phone cameras are different from other cameras in that they are often equipped with a zoom feature that can be used covertly. Someone can pretend to be chatting or dialing when they're actually taking candid camera shots.

    21. Cyber Stalking Ohio HB 10 introduced to allow judges to issue protective orders against juveniles how to enforce these in school, when two students are involved? Ohio HB 19 would require that school districts adopt a dating abuse policy and include dating violence education in health education classes. The state Board of Education would be charged with creating a model dating violence policy.Ohio HB 10 introduced to allow judges to issue protective orders against juveniles how to enforce these in school, when two students are involved? Ohio HB 19 would require that school districts adopt a dating abuse policy and include dating violence education in health education classes. The state Board of Education would be charged with creating a model dating violence policy.

    22. Sexting – some suggest calling it “self-created child pornography” – sexting is a media-friendly term that makes it sound les serious Content stays on the web forever Boyfriend or girlfriend of today may be break-up tomorrow. To get back at you they forward the picture. Ohio SB 103 has been introduced to: 1) make crime misdemeanor instead of felony; 2) child won’t be labeled a sex offender.Sexting – some suggest calling it “self-created child pornography” – sexting is a media-friendly term that makes it sound les serious Content stays on the web forever Boyfriend or girlfriend of today may be break-up tomorrow. To get back at you they forward the picture. Ohio SB 103 has been introduced to: 1) make crime misdemeanor instead of felony; 2) child won’t be labeled a sex offender.

    28.

    32. Ever googled self?Ever googled self?

    33.

    34. Report to law enforcement, not just school Local resources form a plan: law enforcement, prosecutors, school, parents, etc. As noted under proposed law, administrators must report cyberbullying. But no penalty for failing to do soReport to law enforcement, not just school Local resources form a plan: law enforcement, prosecutors, school, parents, etc. As noted under proposed law, administrators must report cyberbullying. But no penalty for failing to do so

    35. So What Can We Do?

    36. Solution The Office of the Ohio Attorney General has partnered with i-SAFE and Netsmartz to educate and empower youth and adults to safely and responsibly take control of their Internet and technology experiences. i-SAFE and Netsmartz are leading internet safety groups for kids i-SAFE and Netsmartz are leading internet safety groups for kids

    37. What the Office of the Ohio Attorney General is Doing Provides free programs to school, law enforcement, students and others on internet safety. Ohio Missing Children’s Clearinghouse makes information about missing children and adults available Also, help find kids via social networking sites Also focuses on human trafficking The Bureau of Criminal Investigations operates a cyber crime unit which identifies and investigates cyber crime. Give Haylee Donathan case as exampleGive Haylee Donathan case as example

    38. Bridging the Digital Divide

    39. Parent-Child Communication Gap 54% of parents felt limited in their ability to monitor and shelter their children from inappropriate material on the Internet.* YET 37% of students said their parents would disapprove if they knew what they did, where they went, or with whom they chatted on the Internet.* Increasingly, parents are recognizing that advances in technology do pose threats to their children and that kids are keeping up with advances in technology faster than they can. Kids are IT experts in home – parents often ask kids to set safety features on computer – like asking fox to guard the hen house This lack of technological knowledge is creating a communication gap between kids and parents.   Recent i-SAFE America survey Increasingly, parents are recognizing that advances in technology do pose threats to their children and that kids are keeping up with advances in technology faster than they can. Kids are IT experts in home – parents often ask kids to set safety features on computer – like asking fox to guard the hen house This lack of technological knowledge is creating a communication gap between kids and parents.   Recent i-SAFE America survey

    40. Parent-Child Communication Gap This communication gap may be more serious than people realize. Analysis of i-SAFE surveys indicates a noteworthy variance in parent and student perceptions about Internet safety communication. 92% of parents say they have established rules for their child’s internet activity. 34% of kids say their parents have not established any rules. 40% of kids do not discuss internet safety with their parents. This communication gap may be more serious than people realize. Analysis of i-SAFE surveys indicates a noteworthy variance in parent and student perceptions about Internet safety communication. 92% of parents say they have established rules for their child’s internet activity. 34% of kids say their parents have not established any rules. 40% of kids do not discuss internet safety with their parents.

    41. Where Are Your Kids?

    46. We use Twitter at AGOWe use Twitter at AGO

    47. USE TWITTER FOR GOOD School Events- Major events can be covered by Twitter and news sent this way travels fast! Some schools in Ohio use this as a tool to communicate with parents….everyone has a cell phone Ask Your Friends- It is easy to put out a requests to your friends and get lots of answers back quickly. It’s a great place to find folks to help with things. Attention-Sharing- Twitter can be used to direct folks to blog posts , news we find needs sharing, or entertaining things we’ve found on the web Direct People to Good Causes- There have plenty of posts of someone doing a walk for hunger or a collection for diabetes. Bonus- As advertised, Twitter answers the question “What are you doing?” It means that you can stay in touch with others without being intrusive. Just follow their twitters.

    49. Schools can use to teachSchools can use to teach

    51. Can help kids be a better writerCan help kids be a better writer

    52. About Blogging – For Parents Establish rules for online use with your kids and be diligent Screen what your kids plan to post before they post it. Seemingly innocuous information, such as a school mascot and town photo, could be put together to reveal where the author goes to school. Ask yourself (and instruct your kids to do the same) if you are you comfortable showing any of the content to a stranger. If in doubt, have them take it out Evaluate the blogging service and find out if it offers private, password-protected blogs. Save the Web address of your child's blog and review it on a regular basis. Check out other blogs to find positive examples for your kids to emulate Taken From: http://www.microsoft.com/protect/family/activities/blogging.mspx

    53. Educators: In addition to talking about safe online communication with your student, you can extend your understanding and awareness of your student's online activity if you: Learn about your student's use of technology, at least to some degree. Don't be afraid of it. You might even find your kids opening up to you if you adopt something such as instant messaging (IM) (Check your school policy on this). Do not diminish the importance of your student's communication via technology. It's a social lifeline. Sometimes it's the only way kids communicate with their friends. Walk your talk. Take steps to protect your own online privacy and safety. Be aware of how you use the Internet. Remember: your students can probably look you up on Google- watch what you are posting in pics and words! See also ODE Handout – What can School Personnel do about Bullying?See also ODE Handout – What can School Personnel do about Bullying?

    54. For Parents: Model the behavior you want your children to have.  Are you on your mobile or tech devices at inappropriate times?  Set ground rules for yourself and follow through.  Be good role model for your children. Mentor your child: Teach the child “here’s what I want you to do, here’s what’s appropriate.” Let your child know that it is a privilege to have technology and that there are certain times it won’t be available. Parents may want to set up an agreement with their child about usage, much the same way they do about setting up driving contracts with teens. Show sample agreements: AGO MicrosoftShow sample agreements: AGO Microsoft

    55. And finally: Mediate If your monitoring shows a real deviation in the behavior that you’d like, you have to mediate to a better solution. Say, “I have noticed that you have not been using your phone according to our agreement.  Here’s what we can do until you show you can use the phone in a more responsible way.”  Show them that the negative behavior is noticed and has consequences.

    56. Tips for Families Have fun being a part of your child’s online experience. Take computer classes at your local library Keep the computer where everyone sees the screen. Don’t post your personal information and beware of requests for your personal information online. Teach your child how to recognize and avoid predators. Report strangers who solicit meetings with any child. Report cyber bullying and threats. Ask to see a copy of your school policy on HIB. Install and operate updated security software.

    57. Some Strategies From Other Parents in Ohio: Make it a rule that cell phones are off at night and not taken into the bedrooms with your child Ask your child to “friend” them on their social networking site ( caution: don’t become a helicopter parent You set up the password for the social networking site and you log your child in Finally, No Computers In Bedrooms! Understand that kids may have more than one site: the one they show you and the one they use Also, not just about computer use at home – what are they doing at their friends (similar to guns in your home – do you ask parents where your kids are going to play if they have guns in home)Understand that kids may have more than one site: the one they show you and the one they use Also, not just about computer use at home – what are they doing at their friends (similar to guns in your home – do you ask parents where your kids are going to play if they have guns in home)

    58. Digital Citizenship: is defined as the norms of behavior with regard to technology use.

    59. Resources www.stopbullyingnow.hrsa http://www.netsmartz.org http://www.isafe.org http://www.netfamilynews.org http://www.childnet-int.org http://www.fosi.org/cms http://www.getnetwise.org http://www.missingkids.com http://www.safeyouth.org http://facebookforparents.org

    60. Thank you for attending! For additional information about Internet Safety / Digital Citizenship please contact: Kathleen Nichols Ohio Attorney General’s Office Kathleen.nichols@ag.state.oh.us

More Related