Cybersafety Safe and Responsible use of Technology ETC!  February 28, 2009 Bob Gausman, Burt Lo, Matthew Kinzie Photo copi...
Cybersafety Legislation
Cyberbullying Definition “ The use of information and communication technologies to support deliberate, repeated, and host...
Personal Information
Copyright Piracy
Inappropriate Content
Cyber Predators
Cyber Bullying Differences <ul><li>Always On </li></ul><ul><li>Everywhere </li></ul><ul><li>Permanent </li></ul><ul><li>An...
Statistics <ul><li>42% report being bullied online </li></ul><ul><li>35% report begin threatened online </li></ul><ul><li>...
Cyber Bully Tool Box <ul><li>Content Creation  </li></ul>Text Messaging Chat Rooms Discussion Forums Instant Messaging MMS...
Cybersafety Learning Resources
Sources and Attribution <ul><li>Sources </li></ul><ul><ul><li>California Technology Assistance Project, Region 4  http://w...
Upcoming SlideShare
Loading in …5
×

20090228 Cyber Safety

1,307 views

Published on

Presentation on Cyber Safety presented at the ETC! 2009 conference in Modesto, CA to K-12 school district adminstrators and teachers. This slide show is my portion, discussing the definition of cybersafety.

Published in: Education, Technology, Sports
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,307
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
26
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • 20090228 Cyber Safety

    1. 1. Cybersafety Safe and Responsible use of Technology ETC! February 28, 2009 Bob Gausman, Burt Lo, Matthew Kinzie Photo copied from: http://www.flickr.com/photos/itripped/2262538576/
    2. 2. Cybersafety Legislation
    3. 3. Cyberbullying Definition “ The use of information and communication technologies to support deliberate, repeated, and hostile behaviour by an individual or group, that is intended to harm others.&quot; Bill Belsey www.cyberbullying.org
    4. 4. Personal Information
    5. 5. Copyright Piracy
    6. 6. Inappropriate Content
    7. 7. Cyber Predators
    8. 8. Cyber Bullying Differences <ul><li>Always On </li></ul><ul><li>Everywhere </li></ul><ul><li>Permanent </li></ul><ul><li>Anonymity </li></ul><ul><li>No Feedback </li></ul><ul><li>Lack of Parental </li></ul><ul><li>Oversight </li></ul>
    9. 9. Statistics <ul><li>42% report being bullied online </li></ul><ul><li>35% report begin threatened online </li></ul><ul><li>53% admit bullying online </li></ul><ul><li>58% have not told parents/adults about online bullying or threats </li></ul><ul><li>www.isafe.org (2003-2004) </li></ul>
    10. 10. Cyber Bully Tool Box <ul><li>Content Creation </li></ul>Text Messaging Chat Rooms Discussion Forums Instant Messaging MMS Wikis Blogs Video Sharing (YouTube) Photo Sharing (Flickr) E-Mail Online Games(Runescape) Social Networking ( MySpace) Collaboration File Sharing (LimeWire)
    11. 11. Cybersafety Learning Resources
    12. 12. Sources and Attribution <ul><li>Sources </li></ul><ul><ul><li>California Technology Assistance Project, Region 4 http://www.ctap4.net/projects/cybersafety.html </li></ul></ul><ul><ul><li>www.cyberbullying.org (quote on slide 3) </li></ul></ul><ul><ul><li>ISafe: www.isafe.org </li></ul></ul><ul><ul><li>Center for Safe and Responsible Internet Use http://csriu.org/index.html </li></ul></ul><ul><li>Attribution: </li></ul><ul><ul><li>Title Slide Photo: http://www.flickr.com/photos/itripped/2262538576/ </li></ul></ul><ul><ul><li>Photos on slides 3,4,10 copyrighted by Matthew Kinzie. Photos may be re-used without permission or attribution for non-commercial purposes. </li></ul></ul><ul><ul><li>All other photos taken from http://commons.wikimedia.org under the public domain. </li></ul></ul><ul><ul><li>Statistics from slide 10: www.isafe.org </li></ul></ul><ul><ul><li>This slide show created and copyrighted by Matthew Kinzie. Licensed for use under Creative Commons Attribution – Noncommercial license 3.0 </li></ul></ul>

    ×