Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Copy of internet
Transcript of Copy of internet
AS THEY NAVIGATE THE WATERS
OF THE WORLD WIDE WEB
by Eileen Theim DIGITAL
CITIZENSHIP SAFETY GOALS CYBER
BULLYING SECURITY RESOURCES The waters are deep and often hazardous with hidden danger just below the unassuming surface. No one should jump in without awareness, safeguards, and a life vest. http://www.commonsensemedia.org/video/modal/1248956 Safety is defined as measures employed to ensure
protection from harm. Internet safety includes
policies, procedures, and guidelines designed
to protect users of the internet from potential
danger. It is estimated that over one-third of
the world's population uses
the internet. Teens no longer wait in the kitchen for
the house phone to be free in order to make a call. T They have smart phones and
other personal electronic devices
that connect them with friends--and
most frighteningly--to the world. They have smart
phones and personal
connect them with
to the world. This lesson plan is intended for middle school teachers and is designed to foster appropriate internet use while protecting students from potential dangers inherent in the internet. Children as young as toddlers and ranging all
the way to adulthood log on to the internet daily. At home and at school, there are concerns
about safe surfing of the internet. http://blogs.flinders.edu.au/flinders-news/2012/02/13/teaching-teens-safety-in-the-virtual-world/ http://www.commonsensemedia.org/advice-for-parents/internet-safety
http://www.schoolsecurity.org/resources/computer_safety.html We teach children "stranger danger"
but the most strangers they will ever
encounter are on the internet.
Our foremost goal is safety. SWIM
we IF It is better to educate
before they need rescue. At times teachers
feel our hands
are tied and the
students are the
ones in control. In truth, we can use
our traditional tools
AND the internet
itself to teach and protect our students. The internet is part of their social experience. Parents have always kept children safe, especially in public places. Now "public places" are at our children's fingertips. Children need to be educated on
proper and safe use
of the internet--
when and how to respond
when to remain silent,
what "streets" to cross, and
what "neighborhoods" to avoid. Statistics about teens, and internet safety
are alarming: In a 2010 study of 500 teens between the ages of 12 and 17:
23% had befriended a stranger on line
18% had personally met a stranger from Facebook
7% had been bullied by a friend
5% had been bullied by a stranger
9% had received unexpected sexually explicit material Students must understand that they
are creating a digital footprint in
cyberspace that is not erased when
they log off.
An extensive audience of strangers has
access to whatever personal information
they uploaded. Even if deleted, an
inappropriate photo or message remains.
Never share names, schools, ages, addresses, or phone numbers on line
Never open an email from a stranger
Never send pictures to strangers
Keep passwords private (except with parents and teachers)
Tell a trusted adult if uncomfortable with anything on the internet
What is posted on line today may negatively impact a young person's future
On the internet, it is always better to be safe than sorry SAFETY BASICS WHAT TO DO? Parents may subscribe to various sites such as Cybersitter, Net Nanny, and CyberPatrol, to monitor use of the internet by their children.
Schools use filters, blocks, and firewalls to prevent certain sites on the "not" list from being accessed by students.
Administrators should also periodically conduct searches of their school's name on Google and other search engines to identify any hacking. "The Children's Internet Protection Act (CIPA)
requires that K-12 schools and libraries in the
United States use internet filters and implement
other measures to protect children from harmful
online content as a condition for the receipt of
certain federal funding." CIPA ACCEPTABLE USE POLICY Schools also require acceptance of the Technology
and Internet Usage Agreement for their particular jurisdiction. This AUP defines and describes the rules governing technology use and the consequences of violating those rules.
This seeks to prevent students from accessing
material that has little or no educational value
or that may contain objectionable content.
Students are also informed of the laws regarding
copyright and the consequences of plagiarism. http://en.wikipedia.org/wiki/Children'sInternetProtectionAct RULES FOR ON-LINE ETIQUETTE Choose an acceptable and appropriate name
Edit and revise before hitting "send"
Avoid rude comments that will last long after the argument is settled
Grammar still matters! Unless sending a text to a friend, apply the rules of grammar
Do not post anything that may embarrass you or someone else now or in the future
Use manners and etiquette as if in person According to Edutopia, 42% of students
in grades 4-8 have been bullied on line.
They also report that 53% admit to
writing something mean or hurtful.
Of the victims, 58% never told an adult. BULLYING ON LINE CYBER BULLYING Students have a powerful tool at their command, but they are still children.
Their intellects, impulse control, and maturity are still in the developmental stages.
Face-to-face, a teen may hesitate to insult or offend someone, but on line--and sometimes with anonymity--they do not have the same filter and inhibition.
Do not reply or engage in an argument
Tell a trusted adult
Keep copies of bullying material
Rely on parents and teachers to determine if it is serious enough for police notification. TIPS FOR VICTIMS OF CYBER BULLYING CONVERSATION ON LINE Remember that in a personal conversation, as opposed to one on line, each individual can hear the tone of voice, inflection, intended humor.
Each person can see the other's reaction, facial expression, body language.
On line communication and texting do not afford that benefit.
The same words carry very different interpretations. VIDEO Teens share their cyber experiences
and advice: SAFETY 8.1.8.D.1 Technological advancements create societal concerns regarding the practice of safe, legal, and ethical behaviors. Model appropriate online behaviors related to cyber safety, cyber bullying, cyber security, and cyber ethics.
8.1.4.D.3 Explain the purpose of an acceptable use policy and the consequences of inappropriate use of technology.
8.1.2.D.1 Model legal and ethical behaviors when using both print and non-print information by citing resources.
8.1.12.D.1 Evaluate policies on unauthorized electronic access (e.g., hacking) and disclosure and on dissemination of personal information.
8.1.4.D.1 Explain the need for each individual, as a member of the global community, to practice cyber safety, cyber security, and cyber ethics when using existing and emerging technologies. STANDARDS