Your SlideShare is downloading. ×
0
Digital citizenship project[1]
Digital citizenship project[1]
Digital citizenship project[1]
Digital citizenship project[1]
Digital citizenship project[1]
Digital citizenship project[1]
Digital citizenship project[1]
Digital citizenship project[1]
Digital citizenship project[1]
Digital citizenship project[1]
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Digital citizenship project[1]

293

Published on

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
293
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Leah Lack Debbie Austin Amber Frasco
  • 2. What is Digital Crime/Security? Here are some Examples:  Internet safety procedures for the classroom and home  AUP (Acceptable Use Policy) in the classroom  Computer Hacking  Use of Security Software for protection
  • 3. While at school or home a child may wonder on to sites that are not appropriate for their age which ultimately can lead to their safety being put in jeopardy. Without being aware a child can enter a site that contains inappropriate material or sexual predators. In one survey research claims that “58% of students admit to using the Internet unsafely, inappropriately, or illegally.” (Feldman, 2007)
  • 4. Fortunately there are several tools available for schools and parents that can prevent a child from wondering to such sites.  Educate- No matter how much protection is provided on a computer there is no way to block all unsuitable information.  Apply the “Don’t talk to strangers” motto while the online.  Time limits on the computer  Enforce punishments for when computer rules are broken All information provided by Feldman, 2007. • Monitoring Software- At any time a report can be printed out to show exactly what sites have been visited and when. •Personalize programs to require each student to enter their own password to ensure individual responsibility. •Filters- Stops students from entering sites that may contain inappropriate material. •Keep the computer in an area that can easily be monitored.
  • 5. Computers are in use in classrooms across the country and it has become imperative that schools protect themselves from user liability.
  • 6. Enforcing Acceptable User Policies How schools can enforce the AUP  If an AUP states that all users’ activities will be monitored, then the school IT staff needs to be sure that it is doing just that. Maintain an Internet log. Update regularly and employ the use of filters to block unacceptable content.  Use clear and precise language: be sure to carefully list all circumstances in which a violation may occur and avoid generalities.  Explain the AUP to students in an open discussion forum, how to use the Internet effectively, and involve parents in their child’s computer usage. All information is provided by Fitzer, 2002
  • 7. Computer Hacking Definition Prevention  Intentionally accessing a computer without authorization or exceeding authorization in order to access restricted information  The unauthorized use of computer and network resources  Privacy infringement  Varies from being an annoyance to being illegal *All information provided by Coakley, 2010.  The best way to prevent hacking is the use of security software  Use secure passwords and keep them private  Be aware of your digital environment  Explain to students and others the repercussions and illegal nature of hacking
  • 8. Resources  Coakley, M. 2010. Hacking. http://www.mass.gov/?pageID=cagoterminal&L=4&L0=Home&L1=Community+Safety&L2=Cyber+Cr ime+%26+Internet+Safety&L3=Computer+%26+Online+Privacy&sid=Cago&b=terminalcontent&f=co mmunity_hacking&csid=Cago  Feldman, B. 2007. Surfing the Net with Kids. http://www.surfnetkids.com/safety/need_to_know_internet_safety_in_the_classroom-16975.htm  Feldman, B. 2007. Surfing the Net with Kids. http://www.surfnetkids.com/safety/safeguard_your_students_internet_usage-16974.htm  Fitzer, K. 2002. Enforcing Acceptable Use Policies. http://www/ed/uiuc.edu/wp/crime-2002/aup.htm  Writing an Effective Acceptable Use Policy. 2009. http://www.stbernard.com/forms/switch/internet- policy.asp?oc=19.htm  Acceptable Use Policy: Ligon Middle School. http://www.ncsu.edu/ligon/au.policy.html
  • 9. Three Questions about Digital Crime/Security 1. Because there is no way to monitor and filter everything on the Internet, _________ your students and children on Internet safety is the best prevention. 2. Give one example of how a school can enforce an AUP (Accepted User Policy). 3. What is the unauthorized use of a computer called?
  • 10. Answers  Educating  Monitor all users’ activities, keep an Internet log, and explain the AUP to all users.  Computer Hacking

×