Your SlideShare is downloading. ×
0
Cybersafety
Cybersafety
Cybersafety
Cybersafety
Cybersafety
Cybersafety
Cybersafety
Cybersafety
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cybersafety

290

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
290
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide







  • Transcript

    • 1. Cybersafety What is this ? April 2010
    • 2. A Suggested School Checklist Has everyone who has access to your school computers signed a cybersafety agreement? Have all students signed a media release? Has there been professional development on cybersafety? Does the school have policies and procedures in place? Is there an identified cybersafety person? Does the school actively teach about cyber issues? Does the school have guidelines on blogs and wikis? Do you have a net nanny?
    • 3. For the class
    • 4. An Example of a poster for class use
    • 5. What Parents Can Do Cyber bully? • “Bullying in all forms – including cyberbullying – is unacceptable, and it is vital to develop effective strategies both for addressing and preventing it.” • Teachers and parents are only just beginning to understand that phone/ internet is a social lifeline within peer groups. The home ? o Friendships are made and broken over these mediums. o The current generation is desensitized by reality TV. o Keep the computer in a well-travelled part of the home. o “With the widespread use among children of online diaries and social networking sites such as MySpace.com, the attacks are becoming more common.” Facebook / bebo/ myspace are all age restricted. When your child is old enough then if you so wish allow them to have a profile but make sure that you can access it. You should have their passwords and login’s, or join the site yourself and ensure you are listed as 1 of your child’s friends. o If the child engages in unacceptable behaviour online, make certain that there are immediate consequences. • Parents should ensure that they and their child understand how to use technology safely, including the use of moderated chat rooms and parental control software, as well as the risks and consequences of misuse o Importance of not erasing messages/emails. o Despite anonymity, Internet Service Providers can track computers through a unique digital signature. Every computer connected to the internet has a unique string of identifying numbers. • Unacceptable behaviour includes: o Sending email, instant or text messages to others disguising yourself as another person. o Spreading rumors or false information about others. o Sending rude, harassing or threatening messages. o Creating websites that ridicule, humiliate or intimidate others. o Posting on websites or disseminating embarrassing or inappropriate pictures or images of others. o Restriction/confiscation of technology is not the answer. Kids are smart – they will find other options. o Advise the child that cyberbullying may be a criminal offense - electronically communicated threats are crimes. o Tell the child to never reveal his or her password to anyone, including friends. • Warning Signs: o Your child has withdrawn from normal interaction with family and friends to spend an inordinate amount of time engaged in Internet activity. o Your child turns the computer off or quickly changes the screen when you enter the room. o Your child suddenly avoids using the computer or drastically changes internet use habits. o Your child demonstrates a marked change in behaviour, beliefs, self-esteem or attitudes. o Your child’s academic performance or school attendance decreases significantly. “A third of those who experience cyberbullying do not report it. If we are to succeed in preventing bullying, we need to break the climate of silence in which it thrives by empowering children and young people to speak out and seek help.”
    • 6. Examples from Hectors World                                                                                                                                                                                                                                                                                                                        
    • 7. Whats out there ...????
    • 8. Whats out there ...???? http://educationalsoftware.wikispaces.com/ Internet+Safety+Resources http://hectorsworld.netsafe.org.nz/teachers/ http://www.thegrid.org.nz/

    ×