Docstoc

Cyber-bullying(1)

Document Sample
Cyber-bullying(1) Powered By Docstoc
					Let’s talk about Cyber Safety
Internet Safety Training and Education Project

Educational Service District 101 Brent Howard

My Space Class for Adults…

Internet Safety
• • • • • Cyberbullying Social Networking Online Predators ID Theft Resources

Cyber-bullying

We know about the great Internet

So, why be concerned?
To meet requirements established under the Children’s Internet Protection Act (CIPA), 2000
Filtering: CIPA requires the implementation of a “technology protection measure” (filtering) to block access to visual depictions deemed “obscene,” “child pornography,” or “harmful to minors.” Internet Safety Policy: CIPA requires the adoption and enforcement of an “Internet safety policy” [that addresses] “monitoring the online activities of minors.”

An even bigger reason…our kids!
• 1 in 4 have had unwanted exposure to inappropriate pictures when online. • Approximately 1 in 5 received a solicitation or inappropriate approach. • 1 in 17 was threatened, harassed or bullied online. • Only 25% of students who encountered a solicitation or inappropriate approach told a parent or guardian. • Less than 10% of solicitations were reported to law enforcement authorities.
David Finkelhor, Kimberly Mitchell and Janis Wolak. Online victimization: A Report on the Nation’s Youth. Alexandria, Virginia: National Center for Missing and Exploited Children, 2000, pg. ix.

…and our community.
The Internet Crimes Against Children Task Force, FBI and the US Attorney’s Office of Eastern Washington have investigated and prosecuted a number of Internet predators from our own community. • US vs L. Caulk, sexual predator in Clarkston, WA • US vs T. Johnson, Express site director • US vs C. Jungblum, high school counselor/coach • US vs P. Lyons, superintendent • US vs R. Perkins, deputy prosecutor • US vs B. Rukke, McDonald’s employee

Provided by the US Attorneys Office of Eastern Washington

“A day in the life of our students has changed”

Cyber-bullying

Pop Quiz!
• • • • • FYA F2F ISO MMA P2P • • • • • IPN CTN P911 PAL IRL

Cyber-bullying

Kitchen (Ad Council)

Cyber-bullying

Cyber-bullying
• Cyber-bullying: sending or posting harmful material or engaging in other forms of social aggression using the Internet or other digital technologies. • Cyber-threats: Sending or posting direct threats or distressing material that raises concerns that the person may be considering committing an act of violence against self or others. (Nancy Willard, 2007)
Cyber-bullying

Cyber-bullying

Activities
• • • • Text/picture Messaging E-mail Instant Messaging Online communities/social network sites • Chat Rooms • Polls/rating sites • Online Gaming
Cyber-bullying

Cyber-bullying

Cyber-bullying

“//I won’t tell you who I am, but check up on my profile for the latest gossip CMS Students
Did anyone see Wannabe at school today? I think the Ice Queen has permanently pushed her out of the Clique-maybe or maybe not. But I’m sure the Twins would have some say in it. Wannabe certainly wouldn’t want to go out without a bang. Anyway loves – Nothing much else happened today. Can’t wait to see you all tomorrow! Hugs&Kisses, Gossip G
Known as; J Personality; as fake as the Chanel make-up you put on your face every morning. As sweet as an Ice princess Known for; Her Her gorgeous looks, and that’s about it… Signature; Bright topaz eyes, and perfect hair Love life; Lonely Boy Friends; B, and S are in her closely knit tight circle Prancing through the halls, stopping to wave at her admirers – while talking at high speed to B, S and whoever else might be following her at the moment. Her shiny brown hair (greasy?) is h4ung over her right shoulder, as her bright coffee eyes scan the area- while picking out the flaws of passerby’s.

I Ah-bviously can’t tell you who I am, but I can tell you that I go to CMS – hmmm or maybe CHS….? People tell me things, I find out – I blog it here

Cyber-bullying

“//I won’t tell you who I am, but check up on my profile for the latest gossip CMS Students
Hello Loves, Halloween is tomorrow

I Ah-bviously can’t tell you who I am, but I can tell you that I go to CMS – hmmm or maybe CHS….? People tell me things, I find out – I blog it here

I wonder what everyone will be wearing… B looked pissed at the end of 7th period – apparently she had to play goalie. Hmm lets all shed a tear for her. (Notice freshly dyed hair) J was caught throwing a fit in the hall today – over what you may ask? Ask her yourself. Apparently the Twins were both whispering to A and the Ice Queen about…me? I told you all I would never tell my name. B flirting with N again, I personally think he doesn’t like her that much – you all know it’s true. K was hugging one of the twins today. I wonder if it was the one who is going out with Jor are they still together?

Looks like A got a haircut…the layers don’t really work for her. She would have been better off getting a dye job – or her highlights retouched.

Cyber-bullying

Cyber-bullying

Hot or Not? (Polling Sites)

Cyber-bullying

Impact of Cyberbullying
• More severe that face-to-face
– Anonymous – 24/7 – You can’t see me….I can’t see you…

• Affects school climate
– Poor academic performance – Attendance issues – Student conflict
Cyber-bullying

PBS: Growing Up Online

Cyber-bullying

Cyberbullying Resources
• http://adcouncil.org • http://www.netsmartz.org/education • http://www.wiredsafety.org/

Cyber-bullying

Cyber-bullying

Social Networking
• • • • • • • • Bebo MySpace hi5 Facebook Livejournal YouTube Ustream Del.icio.us
Cyber-bullying

Think before you post...

Social Networking
• 61% of 13-17 year olds have a personal profile on a social network site
– 50% of those included a picture – 95% listed a personal email address – 84% had a screen name used for IM

Cyber-bullying

Who’s in your network?

`

Let’s look at another website that Danny uses

•www.azsexoffender.org: the State of Arizona, government - operated sex offender registration site.

MySpace in the News
KOMO News Story

Resource: KOMO MySpace News Video [2:30]

Social Networking Resources
• http://delicious.com/digitalsafety • http://delicious.com/istep101 • http://www.netsmartz411.org/ • http://www.onguardonline.gov/
Cyber-bullying

Ad Council: Exchange

Cyber-bullying

Cyber Predators
• 53% of students prefer to be alone online. • 31% admit to chatting with someone they’ve never met in person. • 14% had a face-face interaction with someone they met online
– 9% were 13-15 years old

• Only 4% of adult online predators pretend to be kids!
Cyber-bullying

Amy’s Choice

Cyber-bullying

What about the 4%?

Cyber-bullying

Tracking Teresa

Cyber-bullying

Signs to look for…
• Is your child spending an unusual amount of time on the internet alone? Has your child received any unexplained gifts in the mail? Does our child received phone calls from people you don’t know? • •

•
• •

Has your child withdrawn from their friends and family?
Has your child had any unexplained absences from home or school? Does your child close the window they are viewing when you walk in the room? Is the internet history saved on your computer cleared more often than normal?

•

Internet Safety Resources
• http://netsmartz.org • http://www.ikeepsafe.org/ • http://www.atg.wa.gov/InternetSafety.aspx • http://cybersmartcurriculum.org/

• http://www.staysafeonline.org/
Cyber-bullying

Identity Theft
Identity theft is the act of deliberately taking another person’s identity, generally for the purpose of performing a fraudulent act such as gaining access to that person’s finances, or to commit an offence or a crime anonymously or under the disguise of another identity.

Federal Trade Commission ID Theft Statistics

• 1 in 6 Americans will be a victim of identity theft this year • In the last twelve months 9.9 million people have had identity theft crime committed against them. • Victims spend on average $1,200 out of pocket and an average of 175 hours resolving problems caused by ID theft.

Who wants to steal your identity?

CitiBank ID Theft Solutions

ID Theft Criminals Targeting Kids?
Peer-to Peer File Sharing Sites Pose a BIG RISK!

"If teenagers are file-sharing music or movies (over P2P networks), who knows how many criminals might be sharing the family's personal information, credit cards, bank passwords and social security numbers with scheme operators who buy them."
Safwat Fahmy, chairman and chief executive of SafeMedia

Online Gaming Cheats
Malicious Code (Viruses and Spyware have been developed that can run a invisible program on you computer – sealing any and all personal information on that machine.

How to Protect Yourself and Others from Identity Theft
• Protect your Social Security number • Use caution when giving out your personal information • Beware of wolves in sheep's clothing • • • • •

On-Line Job Hunting Protect your computer Use caution on the Web Ask questions Wireless Access Points

QUESTIONS?


				
DOCUMENT INFO
Lingjuan Ma Lingjuan Ma MS
About work for China Compulsory Certification. Some of the documents come from Internet, if you hold the copyright please contact me by huangcaijin@sohu.com