Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Parent Technology Coffee Morning - e-safety

Presentation to parents at Kellett School, Hong Kong
by

Clive Dawes

on 27 October 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Parent Technology Coffee Morning - e-safety

Parent Technology
Coffee Morning
e-safety
Clive Dawes
ICT Curriculm Leader
cdawes@kellettschool.com
Aims
Concerns
Actions
Curriculum
Resources
Aims
Concerns
Actions
Curriculum
Resources
Just like in the offline world, no amount of effort to reduce potential risks to children will eliminate those risks completely. We cannot make the internet completely safe. Because of this, we must also build children’s resilience to the material to which they may be exposed so that they have the confidence and skills to navigate these new media waters more safely.

Executive Summary . Byron Review Children and New Technology. UK 2008
© 2010 Kate Ter Haar
Friends
in years 3-7 most online bullying/harrassment is carried out by friends of friend, or friends of friends of friends (level 2/3)
in year 7 onwards most online bullying/harrassment is carried out by friends
online friend development vilified by cultural climate that meeting people online is dangerous (Valentine 2004)
% of teens receiving unwanted sexual solicitations has declined (Wolak et al 2006)
public fear of above has increased (Cassell 2007, Marwick 2008)
Public myths about predators do not reflect reality (Wolak et al 2008)
unfounded fears limit teenagers unnecessarily but they also obscure preventable problematic behavior (Valentine 2004)
Research
Youtube Bullying

http://goo.gl/yVYgl
Further Reading
onlinefamily.norton.com
1. Etiquette
2. Communication
3. Education
4. Access
5. Commerce
6. Responsibility
7. Rights
8. Safety
9. Security (self-protection)
privacy
fake
people
cracking
& hacking
sharing
passwords
age
verification
chain
mails
permanent
record
security
threats
digital
reputation
access to
pornography
access
removal
purchase
pressure
peer
pressure
bullying &
harrassment
inappropriate
texts
addiction
Nine areas of behaviour
of Digital Citizenship

Parent Concerns
Student Concerns
Parent Concerns
Inappropriate
Contact
Inappropriate
Content
Student Concerns
There are three ways to get something done; do it yourself, hire someone to do it for you, or forbid your kids to do it
Mona Crane
Unfortunately, no single measure can protect children from online harm and . . . traditional parenting skills have never been more important.
Communications Minister Helen Coonan (2007)
k9webprotection.com/
Internet Use
web research
e-mail
shopping
news
booking holidays
social networking
friending
chatting
gaming
music
file sharing
mobile
youtube
publishing
Childnet Presentation
http://www.childnet-int.org/seminar-flash/main.swf
http://mitpress.mit.edu/books/full_pdfs/hanging_out.pdf
danah boyd clip
http://goo.gl/WtYfO
Curriculum
KS1
KS2
KS3/4
SMART
cyberbullying
web bias
personal details
chat guidance
netiquette
ethical use
mobile use
copyright
who are you talking to?!
think before you post
bullying
some thoughts...
nicknames should be neutral, not indicative of gender (esp girls)
avatars should be neutral, in no way provocative
don't engage in aggressive manner
don't share passwords
if you publish, turn on comment moderation
tell your friends and ask them to stop if a joke goes too far
What can you do?
talk
set ground rules, time, location
be aware use is different
follow your own rules
if necessary, check history, cookies - look for gaps when you know computer was in use
add simple safety functions e.g. Google Safe Search
La Rezistance
Chat Quiz
1. POS
2. IC
3. STBY
4. Q4U
5. ASL
6. L8R
7. SO
8. ZZZ
9. QT
10. F.*.*.K
1. POS = Parents Over Shoulder
2. IC = I see
3. STBY = sucks to be you
4. Q4U = question for you
5. ASL = age sex location
6. L8R = later
7. SO = significant other
8. ZZZ = boring
9. QT = cutie
10. F.*.*.K = friends you can keep
deciding which resources to use with our students changes from year to year and takes into account the experience, sensitivity and current situation
Developing issues
New sites e.g. chat roulette, formspring, zorpia

Location services e.g. facebook places, gypsii

Augmented reality e.g. layar, face recognition

Special interest groups e.g. eating disorders, self-harming

Sexting
Full transcript