E-safety Training 10 th  June 2009
The Benefits of ICT <ul><li>Shopping </li></ul><ul><li>Booking holidays </li></ul><ul><li>Banking online </li></ul><ul><li...
The divide of the generations <ul><li>Research </li></ul><ul><li>Email </li></ul><ul><li>Shopping </li></ul><ul><li>Intera...
Internet access <ul><li>Home computer </li></ul><ul><li>Laptop </li></ul><ul><li>Mobile phone </li></ul><ul><li>Wii </li><...
The risks <ul><li>Exposure to inappropriate material </li></ul><ul><ul><li>Pornographic, hateful, violent in nature </li><...
The debate SWGFL presentation ESafety conference 2008
KS1 and KS2 <ul><li>Walled Garden approach </li></ul><ul><ul><li>Filtering </li></ul></ul><ul><ul><li>Restricted use of we...
Filtering SWGFL presentation ESafety conference 2008
Sites often used by children <ul><li>Networking sites </li></ul><ul><ul><li>www.myspace.com </li></ul></ul><ul><ul><li>www...
Scenarios <ul><li>How would we react to these scenarios if we were presented by them? </li></ul><ul><li>Would we class the...
Lois’s friend offers to share their Instant Messenger (like MSN) contacts.  Lois is very pleased because she now has 150 ‘...
Lois - R ed A mber G reen <ul><li>There is little or no danger to the young person -   the activity is one they may contin...
Lois’s friend offers to share their Instant Messenger (like MSN) contacts.  Lois is very pleased because she now has 150 ‘...
James is 7 years old.  He’s in a chat room – a pizza parlour in a ‘virtual’ world. Someone is ‘talking’ to him and asks if...
James <ul><li>R, A or G? </li></ul><ul><li>What is the danger? </li></ul><ul><li>What are you worried about? </li></ul>
James is 7 years old.  He’s in a chat room – a pizza parlour in a ‘virtual’ world. Someone is ‘talking’ to him and asks if...
Jack has been talking to an online ‘friend’ for some time.  The ‘friend’ seems really nice and they have loads in common. ...
Jack <ul><li>R, A or G? </li></ul><ul><li>What question do you want to ask? </li></ul><ul><li>What else do you want to fin...
Jack has been talking to an online ‘friend’ for some time.  The ‘friend’ seems really nice and they have loads in common. ...
For a while Sophie has been chatting online, in secret, with someone older than her.  At first he seemed really nice and a...
Sophie <ul><li>R, A or G? </li></ul><ul><li>Who will help Sophie? </li></ul><ul><li>What action would you take? </li></ul>
For a while Sophie has been chatting online, in secret, with someone older than her.  At first he seemed really nice and a...
What can we do to help? <ul><li>Keep up to date with e-safety </li></ul><ul><li>Try out some of the new technologies for o...
School E-Safety Policy <ul><li>School E-Safety Policy </li></ul><ul><ul><li>Use of personal equipment </li></ul></ul><ul><...
ESafety awareness day <ul><li>June 23 rd  2009 </li></ul><ul><ul><li>Internet safety assembly </li></ul></ul><ul><ul><li>C...
Glossary <ul><li>Web 2 technology is a phrase used to describe the applications many people are using the Internet today. ...
Upcoming SlideShare
Loading in …5
×

H:\Esafety\Esafety Staff Training 100609\E Safety Training

606 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
606
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Our objective this afternoon is for us to all begin to think about the issue of E-Safety. I would like to plant E-Safety seeds in all of our minds so that when we leave here they grow into E-Safety trees that are firmly rooted, so that we are always aware of keeping our children safe on the Internet.
  • What do we see as the benefits of ICT today?
  • We are the digital immigrants as ICT for most of us has been introduced since we left school and our uses of it are limited. The children will grow up as digital natives as they will grow up being immersed in the new technologies and use then in a different way to us.
  • These are the ways that children can gain access to the Internet. Many people think that because they do not have an Internet connection their children do not use the Internet. Of all these ways to access the Internet the home computer connection is the only one we can control or filter.
  • These are some of the risks associated with Internet use
  • E-safety is growing and evolving all of the time to keep up with technology and the best way to safeguard the children. There is a debate going on about how best to protect children.
  • For KS1 and KS2 a ‘Walled garden approach’ is recommended. This means that filtering is used on school sites to protect the children from some aspects of the Internet and a restricted use of web2 technology is encouraged. Web 2 technology is a phrase used to describe the applications many people are using the Internet today. Hosted Services – services such as our web site where the site is hosted over the Internet rather than on our server Social Networking – facebook, bebo, twitter are online communities of people with similar interests Video-sharing sites – such as utube, schoolstube, teacher tube are a way to upload and watch video Wiki - A wiki is a collection of Web pages designed to enable anyone with access to contribute or modify content Blog - A blog (a contraction of the term weblog ) is a type of website , usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video. Folksonomy - Folksonomy (also known as collaborative tagging , social classification , social indexing , and social tagging ) is the practice and method of collaboratively creating and managing tags to annotate and categorize content . Sites such as www.delicious.com
  • Other sites can be added to the list of filtered sites and it is up to us to decide if we think a site should not be available such as google or ebay
  • It is possible to relax the filtering of these sites for a specified time if anyone feels that they would benefit from time to look at them.
  • These are some scenarios presented at the 2008 e-safety conference to introduce us to some possible situations we might find ourselves in
  • Is this something we would be worried sbout? What would we say to Lois?
  • What would your reaction be?
  • This is the full picture
  • What would we do in this situation?
  • Ask what they would think? Red – Danger Amber – Cause for concern Green – Nothing to worry about
  • This is the full picture
  • Ask what they would think? Red – Danger Amber – Cause for concern Green – Nothing to worry about
  • What should we be doing?
  • Show policies for children
  • Explain what will happen on this day Samples of information that the children will take home This will be an annual event to coincide with National ESafety day which is normally in February. We envisage that ESafety would be taught in the classroom also to coincide with this time of year
  • H:\Esafety\Esafety Staff Training 100609\E Safety Training

    1. 1. E-safety Training 10 th June 2009
    2. 2. The Benefits of ICT <ul><li>Shopping </li></ul><ul><li>Booking holidays </li></ul><ul><li>Banking online </li></ul><ul><li>Use of mobile phones </li></ul><ul><li>Email and communication </li></ul><ul><li>Information at our fingertips </li></ul>
    3. 3. The divide of the generations <ul><li>Research </li></ul><ul><li>Email </li></ul><ul><li>Shopping </li></ul><ul><li>Interactive chat </li></ul><ul><li>Instant messaging </li></ul><ul><li>games </li></ul>Digital Immigrants Digital Natives
    4. 4. Internet access <ul><li>Home computer </li></ul><ul><li>Laptop </li></ul><ul><li>Mobile phone </li></ul><ul><li>Wii </li></ul><ul><li>Nintendo DS </li></ul><ul><li>Other gaming device </li></ul><ul><li>Friends house </li></ul>
    5. 5. The risks <ul><li>Exposure to inappropriate material </li></ul><ul><ul><li>Pornographic, hateful, violent in nature </li></ul></ul><ul><li>Inappropriate or illegal behaviour </li></ul><ul><ul><li>Gangs can form online </li></ul></ul><ul><ul><li>Cyber bullying </li></ul></ul><ul><ul><li>Criminal activity </li></ul></ul><ul><li>Physical and sexual abuse </li></ul><ul><ul><li>Sexual grooming </li></ul></ul><ul><li>Obsessive use of the Internet </li></ul><ul><li>Copyright Infringement </li></ul><ul><ul><li>Music, homework! </li></ul></ul>
    6. 6. The debate SWGFL presentation ESafety conference 2008
    7. 7. KS1 and KS2 <ul><li>Walled Garden approach </li></ul><ul><ul><li>Filtering </li></ul></ul><ul><ul><li>Restricted use of web 2 technology </li></ul></ul><ul><ul><ul><li>Merlin </li></ul></ul></ul><ul><ul><ul><li>Class blogs </li></ul></ul></ul><ul><ul><ul><li>School tube </li></ul></ul></ul>What is web 2 technology? Web 2.0 concepts have led to the development and evolution of web-based communities, hosted services , and applications ; such as social-networking sites , video-sharing sites , wikis , blogs , and folksonomies . Wikipedia May 2009
    8. 8. Filtering SWGFL presentation ESafety conference 2008
    9. 9. Sites often used by children <ul><li>Networking sites </li></ul><ul><ul><li>www.myspace.com </li></ul></ul><ul><ul><li>www.piczo.com </li></ul></ul><ul><ul><li>www.bebo.com </li></ul></ul><ul><li>Instant messaging sites </li></ul><ul><ul><li>www.msn.com </li></ul></ul><ul><ul><li>www.hi5.com </li></ul></ul><ul><li>Chat rooms </li></ul><ul><ul><li>www.habbohotel.co.uk </li></ul></ul><ul><ul><li>www.penguinchat.com </li></ul></ul>
    10. 10. Scenarios <ul><li>How would we react to these scenarios if we were presented by them? </li></ul><ul><li>Would we class them as: </li></ul><ul><li>Red – Danger </li></ul><ul><li>Amber – Cause for concern </li></ul><ul><li>Green – Nothing to worry about </li></ul>Provided by LGfL at ESafety conference 2008
    11. 11. Lois’s friend offers to share their Instant Messenger (like MSN) contacts. Lois is very pleased because she now has 150 ‘friends’.
    12. 12. Lois - R ed A mber G reen <ul><li>There is little or no danger to the young person - the activity is one they may continue with. </li></ul><ul><li>Encourage safe behaviour - the young person should be supported in their e-safety activity. They should stop the activity, or take no further action. </li></ul><ul><li>Escalate </li></ul><ul><li>- to the service provider! </li></ul><ul><li>- report abuse! </li></ul><ul><li>- involve LA support services. </li></ul>
    13. 13. Lois’s friend offers to share their Instant Messenger (like MSN) contacts. Lois is very pleased because she now has 150 ‘friends’. Lois’s ‘friends’ have been collected by sharing address books. She only knows about one third of the people in her contact list. She has used the features in MSN to sort her ‘friends’ into groups – school, home friends, family, holiday mates. She also has a group for ‘friends of friends’ i.e. internet strangers. She does not give out any personal details to these people. She is happy to chat online with friends of friends, but nothing more. She does not use her web cam when she talks to this group.
    14. 14. James is 7 years old. He’s in a chat room – a pizza parlour in a ‘virtual’ world. Someone is ‘talking’ to him and asks if he wants to chat ‘outside’ and can they swap email addresses?
    15. 15. James <ul><li>R, A or G? </li></ul><ul><li>What is the danger? </li></ul><ul><li>What are you worried about? </li></ul>
    16. 16. James is 7 years old. He’s in a chat room – a pizza parlour in a ‘virtual’ world. Someone is ‘talking’ to him and asks if he wants to chat ‘outside’ and can they swap email addresses? James is sitting with his Mum; they are using the internet together. James’ Mum explains he should never give out his private information to anyone, and, if he is not sure, he should talk to a grown up at home or at school.
    17. 17. Jack has been talking to an online ‘friend’ for some time. The ‘friend’ seems really nice and they have loads in common. They’ve sent Jack a photo of themselves. It’s the holiday and they ask to Jack to meet in the park.
    18. 18. Jack <ul><li>R, A or G? </li></ul><ul><li>What question do you want to ask? </li></ul><ul><li>What else do you want to find out? </li></ul>
    19. 19. Jack has been talking to an online ‘friend’ for some time. The ‘friend’ seems really nice and they have loads in common. They’ve sent Jack a photo of themselves. It’s the holiday and they ask to Jack to meet in the park. Jack likes his friend and would like to meet him. He tells him he’ll see him on Saturday and he’ll be bringing his dad. His friend says ‘OK’ and that his dad will be there too. They have a good kick about in the park and the dads find a coffee stall!
    20. 20. For a while Sophie has been chatting online, in secret, with someone older than her. At first he seemed really nice and appeared to understand her better than her family. She knew it was silly, but she found it easy to tell him lots of personal things, and she was pleased to have an ‘older boyfriend’ online. But now he is sending her very personal and ’explicit’ messages which make her feel uncomfortable and uneasy about the ‘relationship’.
    21. 21. Sophie <ul><li>R, A or G? </li></ul><ul><li>Who will help Sophie? </li></ul><ul><li>What action would you take? </li></ul>
    22. 22. For a while Sophie has been chatting online, in secret, with someone older than her. At first he seemed really nice and appeared to understand her better than her family. She knew it was silly, but she found it easy to tell him lots of personal things, and she was pleased to have an ‘older boyfriend’ online. But now he is sending her very personal and ’explicit’ messages which make her feel uncomfortable and uneasy about the ‘relationship’. Sophie doesn’t go online for a few days. She doesn’t talk to anyone: she’s too embarrassed to talk to anyone face to face. She remembers a lesson at school where she learnt about a red button, so she looks in MSN and finds it. It says ‘report abuse’. She types all the details into the form. She feels better for having told someone. She doesn’t talk to her ‘boyfriend’ again.
    23. 23. What can we do to help? <ul><li>Keep up to date with e-safety </li></ul><ul><li>Try out some of the new technologies for ourselves </li></ul><ul><li>Keep telling children how to be safe online </li></ul><ul><li>Talk to them about any concerns they may have </li></ul><ul><li>Talk to the E-Safety Coordinator if a real issue occurs </li></ul>
    24. 24. School E-Safety Policy <ul><li>School E-Safety Policy </li></ul><ul><ul><li>Use of personal equipment </li></ul></ul><ul><li>Staff and Volunteer Acceptable user policy </li></ul><ul><ul><li>To be signed by all staff </li></ul></ul><ul><li>Pupil acceptable user policy </li></ul><ul><ul><li>To be signed at school </li></ul></ul>
    25. 25. ESafety awareness day <ul><li>June 23 rd 2009 </li></ul><ul><ul><li>Internet safety assembly </li></ul></ul><ul><ul><li>Classroom discussion </li></ul></ul><ul><ul><li>Signing of e-safety agreement </li></ul></ul><ul><ul><li>Information to take home </li></ul></ul><ul><ul><li>Time in the morning and afternoon for parents to come in and learn about ESafety </li></ul></ul>
    26. 26. Glossary <ul><li>Web 2 technology is a phrase used to describe the applications many people are using the Internet today. </li></ul><ul><li>Hosted Services – services such as our web site where the site is hosted over the Internet rather than on our server </li></ul><ul><li>Social Networking – facebook, bebo, twitter are online communities of people with similar interests </li></ul><ul><li>Video-sharing sites – such as utube, schoolstube, teacher tube are a way to upload and watch video </li></ul><ul><li>Wiki - A wiki is a collection of web pages designed to enable anyone with access to contribute or modify content </li></ul><ul><li>Blog - A blog (a contraction of the term weblog ) is a type of website, usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video. </li></ul><ul><li>Folksonomy - Folksonomy (also known as collaborative tagging, social classification, social indexing, and social tagging) is the practice and method of collaboratively creating bookmarks and tags to annotate and catagorise content. A bit like a website of favourites. Sites such as www.delicious.com </li></ul>

    ×