• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
E safety-course_2010
 

E safety-course_2010

on

  • 1,127 views

Carol Rainbow

Carol Rainbow
carol.rainbow@oxfordshire.gov.uk

created this presentation - shared with JISC RSCs in a second life meeting - April 2010

Statistics

Views

Total Views
1,127
Views on SlideShare
992
Embed Views
135

Actions

Likes
1
Downloads
0
Comments
0

6 Embeds 135

http://kev-brace.blogspot.com 69
http://kev-brace.blogspot.co.uk 61
http://kev-brace.blogspot.jp 2
http://static.slidesharecdn.com 1
http://www.slideshare.net 1
http://kev-brace.blogspot.it 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Cyber stalking is very easy though mobile phones, Facebook and other social media programsGPS means that it can be easy to track people down, it is something to keep in mindStalkinghttp://www.youtube.com/watch?v=wCh9bmg0zGg&feature=relatedhttp://www.youtube.com/watch?v=6bqXBiZ5Uww&NR=1Identity theft is a problem – 2006 £535 million lost to fraud with credit cardsHacking social network sites causes upset – one aspect of cyber bullyingImage fromhttp://haroldskids.files.wordpress.com/2009/02/cyberbully.jpg?w=300&h=298
  • Is there a problem with online chat?How many people chat with family and friends?Children?Students?How do you know who you are talking to?
  • Matt thought he knew, thought he was grown up and knew what he was doing.http://www.youtube.com/watch?v=nDBDUX7KPT0Recently a colleague had her blind sister (26) cheated, bank account cleared out and sexually abused by someone she thought was a friend!Identity theft can cause all sorts of problems something like £535,000,000 of goods were purchased 2006 using false credit cardsAlso hacking into social media sites.Image fromhttp://blog.blueskyfactory.com/wp-content/uploads/2010/02/OnlineDating.jpg&imgrefurl=http://blog.blueskyfactory.com/tag/holiday-email-campaigns/&usg=___4h47W4ssuYSgE4y45ZT3uYADXk=&h=292&w=310&sz=43&hl=en&start=780&um=1&itbs=1&tbnid=WFeIkK_Xizf1JM:&tbnh=110&tbnw=117&prev=/images%3Fq%3Dmeeting%2Bfriends%2Bonline%26start%3D774%26um%3D1%26hl%3Den%26sa%3DN%26ndsp%3D18%26tbs%3Disch:1
  • If there is time come back to these two pictures and design a poster to inform people whether they can establish that it is a friend that they are talking to – how can they really know?There are lots of copies of this image on the internet but I can’t find the original!
  • http://www.youtube.com/watch?v=89qvGIuINT4&feature=relatedPoker image from http://morph3us.org/blog/uploads/poker-chips-cards.jpgGambling image from http://www.flickr.com/photos/wapster/2345734496/ with a CC licence
  • http://www.commoncraft.com/protecting-reputations-video

E safety-course_2010 E safety-course_2010 Presentation Transcript

  • E-safety Workshop
    Carol Rainbow
    carol.rainbow@oxfordshire.gov.uk
  • Legal Guidance for ICT Use in Education, Research and External Engagement
  • Brainstorm the dangers of a person going out into the city streets at night alone.
  • What risks are we trying to guard against?
    Add your thoughts to the whiteboard screen by clicking in a space and typing
  • What risks should we be guarding against?
    Aggressive
    Sexual
    Values
    Commercial
    • Bias
    • Racist
    • Misleading info or advice
    • Self Harm
    • Unwelcome behaviours
    • Misleading information
    • Violent / hateful content
    • Being bullied or harassed
    • Bullying or harassing others
    • Pornographic or unwelcome sexual content
    • Meeting strangers
    • Creating and uploading inappropriate materials
    • Adverts
    • Spam
    • Sponsorship
    • Personal info
    • Tracking
    • Harvesting personal info
    • Illegal downloading
    • Gambling
    • Financial Scams
    Table developed by the EUKids Online project
    and referenced in paragraph 1.3 of the Byron Review.
  • Benefits of the internet
    • Educational games and programmes
    • Research information
    • The opportunity to communicate with people from all around the world
    • The opportunity to share resources and ideas with people that have the same interests
    • Shopping around the world without leaving your computer
    • Keeping in touch with family when not close to them
  • Staying up to date with the latest technologies
    More people than ever are sharing their personal experiences and details with strangers due to:
    • Instant Messaging
    • Social networking
    • Mobile phones
    • Online gaming
    • Virtual Worlds
  • Trends
    Most significant trends we have seen recently is the convergence of:
    • Technology
    • Behaviour
    The technologies are not dangerous, it is the user behaviours that lead to dangers.
  • Online Chat / Instant Messaging
  • Social Networking
    Matt thought he knew
    One Last Click
  • How can we know who we are talking to?
    Hi cutie. Where do you come from and what do you do after school?
  • Do you know who you are talking to?
    I am 15 and love sports. I play football and go to the gym most days!
  • Posting on-line information and photographs
    Sarah – Everyone knows your name
    Consequences - a useful starting point for discussion work.
    How would you use with young people?
  • Mobile Phones
    • Blue tooth technology
    • Accessing the web /music
    • Camera - often video
    • Social networking
    • IM
    SextingSexting CasePhotosChoose
    Possible consequences may include opportunities for cyberbullying, sexting, illegal content / downloads
  • Cyberbullying Bullying – through ICT
    “the use of Information and Communication Technology (ICT), particularly mobile phones and the internet, to deliberately upset someone else.”DCSF 2008
  • Cyberbullying
    • Location – the 24/7 and anyplace nature of cyberbullying
    • Anonymity – the person being bullied will not always know who is attacking them
    • Motivation – some people may not be aware that what they are doing is bullying
    • Evidence – unlike other forms of bullying, the target will have evidence of its occurrence
  • Downloading Music
  • Online Gaming
    • A growing industry
    • An expanding area of business worth millions
    • Addictive nature of games can cause health issues & truancy
    Addiction videoWOW Addiction
    Sites include:
    –World of War Craft
    –Runescape
    –Everquest
    –Swordsman Online
    –Mini Clip
    and there are loads more!
  • Online Gambling
    On-line gambling addiction
  • Your Reputation and your Job Prospects
    My Space. Facebook profiles
    http://www.youtube.com/watch?v=ddZWkhItPuI&feature=related
    Protecting your on-line Reputation
    http://www.commoncraft.com/protecting-reputations-video
  • Is your place of worke-safe
    Do you have
    have a nominated e-safety co-ordinator?
    audit its e-safety measures?
    have a robust AUP?
    keep an incident log and monitor your measures?
    handle cyberbullying issues well?
    raise awareness of the issues, e.g. through discussions?
    understand e-safety issues and risks?
    receive regular training and updates?
    know how to escalate an issue of concern?
    know how to keep data safe and secure?
    know how to protect themselves online?
  • Conclusion - Issues to consider
    • Who is or needs to be responsible or teaching e-safety?
    • Who needs to be involved?
    • What support is there in the event of a ‘disclosure’?
    • Advent of 3G and ‘mobile internet’
    • Data security – PASSWORDS!
    • External issues being brought inside
    •             e.g. cyberbullying
    • Protection for staff – AUP’s
    JISC Legal - http://www.jisclegal.ac.uk/