Online Safety

1,502 views
1,441 views

Published on

Online safety concerns

Published in: Education, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,502
On SlideShare
0
From Embeds
0
Number of Embeds
69
Actions
Shares
0
Downloads
50
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Online Safety

  1. 1. Online Safety<br />Janetta Garton<br />Technology Curriculum Director<br />Willard R-II School District<br />http://www.willard.k12.mo.us/co/tech/safety.htm<br />
  2. 2. District Policy<br />Policy that must be signed by students, parents, and staff prior to gaining access to the school’s network and the Internet. <br />Unfortunately, to be legally binding, these policies often are written in a language unfamiliar to students. <br />It is important to discuss this policy with your students in terms they can understand. <br />Image Credit: School Rules by Zac-Attack<br />
  3. 3. Image Credit: Alleke by kellyandapril<br />
  4. 4. Access to Inappropriate Content<br />We do have a district filter. This software is used to strain out inappropriate sites. However, you cannot depend solely on this filter to insure that your students are visiting only appropriate web sites. <br />Inappropriate content could be:<br />hate sites <br />sites that promote delinquency (weapons, drugs, fake ids, explosives)<br />pornography sites<br />gambling sites<br />Gates to Inappropriate Content<br />advertisements: click the blinking banner<br />searching: inappropriate sites appear in the search results<br />typo squatting: a site’s url uses a misspelling of an appropriate sites (funbrain.com & funbrian.com) or slight variation (whitehouse.gov & whitehouse.com) <br />spam messages<br />Image Credit: Kintana by Matt & Helen Hamm<br />
  5. 5. Internet Offenders manipulate young people into criminal sexual relationships by appealing to young people’s desire to be appreciated, understood, take risks, and find out about sex.<br />Predators will:<br />use chat rooms<br />look at profiles targeting kids who are looking for attention, don’t have much attention from parent’s at home, and parents that aren’t too tech savy<br />try to get as much personal information as possible<br />send an invitation to a private chat<br />want to move on to email and phone<br />work toward a face to face meeting<br />establish a common ground by pretending to like the same things (music, movies, hobbies, sports, etc)<br />work to build trust by showing interest in everything discussed in chat, agreeing always with child’s opinions and viewpoints<br />may pose as a sponsor to recruit individuals for a competition, event, club, etc<br />discourage discussing this relationship with anyone<br />start introducing sexual content<br />Signs that may a child be involved with predator:<br />watch for diminished communication about what they are doing online<br />minimizing of screen when you approach <br />unexplained phone calls or absences<br />Image Credit: 2366008863_2edb503a94_o by DarthAbraham<br />
  6. 6. Cyberbullying <br />use of technology to spread rumors and gossip <br />post pictures of someone without their consent <br />steal passwords to assume someone else’s identity <br />disseminate private information <br />and threaten or harass with offensive language <br />Cyberthreats <br />threats or “distressing material” <br />statements that make it sound like the writer is emotionally upset and <br />may be considering harming someone else, or him/herself.<br />Schools <br />place restrictions on student speech that appears to be sponsored by the school, <br />or that is necessary to maintain an appropriate school climate. <br />This applies to student speech through the district Internet system or via cell phones used at school. <br />For online speech posted when off-campus, <br />there must be a substantial and material threat of disruption on campus.<br />Law enforcement officials should be contacted when the situation involves: <br />Making threats of violence to people or their property.<br />Engaging in coercion <br />obscene or harassing calls/messages<br />Harassment or stalking.<br />Hate or bias crimes<br />Creating or sending sexually explicit images <br />Sexual exploitation.<br />Taking a photo of someone in place where privacy is expected (like a locker room)<br />Addressing Cyber Bullying and Threats<br />Safe School Committee Needs Assessment<br />Policy & Practice<br />Professional Development<br />Parent/Community Education<br />Student Education<br />See the 2 flowcharts in the handout: Cyberbullying or Cyberthreat Situation Review Process & School Actions and Options<br />Image Credit: Predator & Alien by Maigh<br />
  7. 7. Intellectual property <br />refers to creations of the mind such as: musical, literary, and artistic work; inventions; and symbols, names, images, and designs. <br />The holder of this property has certain exclusive rights, copyright, which is automatic upon creation. <br />Just because something is online doesn’t mean it’s legal to copy, download, or use. <br />Piracy <br />Piracy is the unauthorized use of material which is covered by copyright law<br />Piracy causes economic harm to the copyright holders. <br />Plagiarism <br />Copying and pasting text from on-line<br />Transcribing text <br />Using photographs, video or audio without permission or acknowledgment <br />Using another person&apos;s work and claiming it as your own, even with permission  <br />Acquiring work from commercial sources<br />Translation from one language to another <br />Using an essay that you wrote for another class/another purpose without getting permission from the teacher/professor of both the current class and the class for which the original work was used<br />Peer to Peer Network<br />uses connectivity and the cumulative bandwidth of participants in a network, as opposed to servers providing the service. <br />Some illegally distribute copyrighted materials. <br />Virus, spyware, and pornography are also available <br />Often these files are labeled so as to attract students to download them. <br />Users of the site can be held accountable for copyright infringement. <br />Image Credit: Shhh, It Be the Little Lass&apos; Treasure I Be Steal&apos;n by Cayusa<br />
  8. 8. Malicious code <br />software created to cause damage, steal information, or use up resources on a computer or a network.<br />Viruses<br />programs that alter the way a computer operates without the permission or knowledge of the user. <br />can impair and seriously damage your computer (or network server) by executing random text, audio and video messages; draining memory; deleting files; corrupting programs; erasing the contents of your hard disk. <br />Worms<br />replicate themselves without the use a host file. <br />can overload networks and shut down communication<br />Trojan Horses<br />imposter files that claim to be something desirable<br />to spread, you must open email attachment or a downloaded file<br />Spyware <br />hide on your computer to steal information such as credit card numbers, email addresses, home addresses, and surfing habits<br />majority of it is adware, designed to capture “anonymous” data for targeted advertising. <br />usually just an annoyance<br />often bundled in other software that you install, but can also be acquired by simply accessing a webpage. <br />Signs of Spyware<br />You receive more pop-ups than usual.<br />Your computer runs slowly.<br />Icons appear on your desktop or task bar.<br />Your default browser is changed. Spyware <br />hide on your computer to steal information such as credit card numbers, email addresses, home addresses, and surfing habits<br />majority of it is adware, designed to capture “anonymous” data for targeted advertising. <br />usually just an annoyance<br />often bundled in other software that you install, but can also be acquired by simply accessing a webpage. <br />Signs of Spyware<br />You receive more pop-ups than usual.<br />Your computer runs slowly.<br />Icons appear on your desktop or task bar.<br />Your default browser is changed.<br />You hear your hard drive running even when you are not using the computer.<br />Firewalls, anti-virus, and anti-spyware software address these issues. <br />Keeping your operating system and other software up-to-date, and <br />setting your browser’s security settings to medium or higher is important. <br />You hear your hard drive running even when you are not using the computer.<br />Firewalls, anti-virus, and anti-spyware software address these issues. <br />Keeping your operating system and other software up-to-date, and <br />setting your browser’s security settings to medium or higher is important. <br />Image Credit: Credit Card Theft by d70focus<br />
  9. 9. Identity Theft <br />theft of personal identifying information (name, address, credit card number, social security number) <br />and use of that data to open new charge accounts, order merchandise, or borrow money.<br />Phishing<br />seemingly credible e-mail/text message/popup that I<br />nstructs the user to visit a Web site where they are prompted to enter or update their personal information <br />May say your account has come under review, may be in danger of being suspended and/or cancelled, and some piece of information needs to be verified or updated. <br />often contain spelling or grammar errors.<br />Contact your merchant right away to ask for clarification<br />Spoofing<br />appears to have been sent from one source when it actually was sent from another <br />Any replies go legitimate e-mail account, not the real sender. <br />Legitimate user can find their Inbox bombarded with viruses, bounced e-mail, and in some cases can have their account suspended for violating its anti-spam policy. <br />Send a copy of the spoofed e-mail to the spoofed e-mail sender&apos;s ISP. <br />Spamming<br />unsolicited or undesired bulk messages <br />district has a spam filter <br />ePALs there is a spam control setting that teachers can calibrate <br />Willard Tiger Webmail has a Spam filter that you can activiate<br />Shopping Online<br />time saving convenience<br />Helpful consumer reviews <br />can put you at risk <br />Image Credit: Identity Thief as Paris by CarbonNYC<br />

×