Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Cyber Safety in the Classroom

No description

deanna yakubovsky

on 23 October 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Cyber Safety in the Classroom

In the Classroom
Cyber-predators will use the internet to prey on victims. Cyber-predators use victims information to abuse them sexually, emotionally, or financially.
This link shares some real life stories:

Watch the Video
With the emergence of online shopping, communications, and bill paying; identity protection should be incorporated into all cyber-safety programs. The following link is a great resource for youth privacy.
Teachers need to be aware of the dangers presented by cyber-predators and how to prevent them.
For more information on inappropriate content, check out this link to evaluate your students risk maturity.
Deanna Yakubovsky
National University
EDX 1201x
Professor Garcia

Acceptable Use Policies should be in place and updated often to help protect students from cyber-bullying, predators, and plagiarism.
Acceptable Use Policies are written agreements between the school, parents, and students, defining the computer/internet usage terms.
Cyber-bullying is a form of harassment which includes social cruelty, stalking, or exclusion.
Cyber-bullying has become an epidemic amongst young people. to learn more
click below:

Identity Safety has become compromised because of personal information used on the internet. Credit card numbers, addresses, social security numbers, and passwords are just some of the items that can be taking and used in phishing scams or for personal gain.
•Acceptable Use Policies (guidelines)
•Cyber-bullying (internet harassment)
•Cyber-predators (internet hunters)
•Identity Safety (Identity fraud)
•Inappropriate Content (unsuitable material)
•Piracy, Plagiarism (stealing of ideas)

Protecting Yourself
Piracy and Plagiarism
Teach them from the beginning
Acadia University. (2008). Retrieved from http://library.acadiau.ca/tutorials/plagiarism/
California Technology Assistance Project. (2010). Retrieved from http://www.myctap.org/index.php/teaching-and-learning/cybersafety-resources
Common Sence Media. (2013). Retrieved from http://www.commonsensemedia.org/educators/curriculum/cyberbullying/lessons/
Roblyer, M., & Doering, A. H. (2013). Integrating educational technology into teaching. Upper Saddle River: Pearson.
Trust wave. (2013) Retrieved from https://www.trustwave.com/?utm_source=referrer&utm_medium=website&utm_content=m86-website&utm_campaign=M86-Rdr

(Roblyer & Doering, 2013, p.66)
For more information click the link below:

Cyber-bullying can be found through email, text messaging, or through social media sites such as Facebook.
Inappropriate content can be defined as pornography, hate groups, violence, illegal activity, extremist groups, or even online advertising.


Plagiarism is the stealing of intellectual property without the permission of the creator. Plagiarism is a big deal and needs to be understood by all students.
This is a great resource that gives a quick 10 minutes overview of plagiarism and piracy. It offers a quick how-to guide.

Cyber Safety is essential in the classroom and the home. It is up to teachers and parents to educate students on cyber safety.
Full transcript