Freedom online: do you have voice in your college?

409 views

Published on

A workshop delivered by Becta at the NUS Further Education Zone Conference, Manchester, 2009

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
409
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Title slide of presentation.
  • – assuming the identity of others using an email address or spoofing obtain sensitive info from spam recipients Flaming: The act of sending or posting electronic messages that are deliberately hostile and insulting,
  • MySpace, Bebo, Facebook, Twitter
  • Freedom online: do you have voice in your college?

    1. 1. Sue Pickering – e-Safety Consultant Marianne Green – Head of Workforce & Leadership (Colleges) Freedom online Do you have a voice in your College?
    2. 2. Dilemma Exercise <ul><li>Using the internet is mainly a very positive experience. However, consider the following dilemma and discuss with your table colleagues </li></ul><ul><li>Agree which of the following is most appropriate with regard to assessing the risk level: </li></ul><ul><ul><li>Red </li></ul></ul><ul><ul><li>Amber </li></ul></ul><ul><ul><li>Green </li></ul></ul>
    3. 3. Dilemma <ul><li>Lois’s friend offers to share their Instant Messenger (like MSN) contacts. Lois is very pleased because she now has 150 ‘friends’. </li></ul>
    4. 4. <ul><li>Lois’s ‘friends’ have been collected by sharing address books. </li></ul><ul><li>She only knows about one third of the people in her contact list. </li></ul><ul><li>She has used the features in MSN to sort her ‘friends’ into groups – school, home friends, family, holiday mates. </li></ul><ul><li>She also has a group for ‘friends of friends’ i.e. internet strangers. </li></ul><ul><li>She does not give out any personal details to these people. </li></ul><ul><li>She is happy to chat online with friends of friends, but nothing more. </li></ul><ul><li>She does not use her web cam when she talks to this group. </li></ul>
    5. 5. <ul><li>Restrict? </li></ul><ul><li>or </li></ul><ul><li>Educate? </li></ul>E-Safety Protect? or Exclude?
    6. 6. E-Safety covers, but is not limited to….. <ul><li>Cyber bullying/stalking/threatening (4 in every 10 learners have been victims) </li></ul><ul><li>Grooming </li></ul><ul><li>Flaming </li></ul><ul><li>Happy Slapping </li></ul><ul><li>Shopping </li></ul><ul><li>Attack by Viruses or other malware </li></ul><ul><li>Intentional abuse/attack (Phishing, Spoofing, Violence and Terrorism) </li></ul><ul><li>Intentional misuse of facilities or equipment </li></ul><ul><li>Wireless and hardwired networks </li></ul><ul><li>Data Transfer </li></ul><ul><li>Use of memory sticks </li></ul><ul><li>Downloads </li></ul><ul><li>Pornography </li></ul><ul><li>Etc, etc </li></ul>
    7. 7. Acceptable User Policy <ul><li>Are you aware of an Acceptable User Policy in your College? </li></ul><ul><li>Were you involved in its development? </li></ul><ul><li>Are any of these included in the AUP? </li></ul><ul><ul><li>Using your own technology in the College </li></ul></ul><ul><ul><li>Protecting your personal information online </li></ul></ul><ul><ul><li>Downloading music, videos, media - Are you aware of the penalties? </li></ul></ul><ul><ul><li>Accessing social networking or Second Life sites - Are there restrictions? </li></ul></ul><ul><ul><li>Using Twitter, Skype, MSN, Blogs or Wikies to communicate with tutors? </li></ul></ul><ul><ul><li>Information about someone you can go to if you receive information which contains unacceptable content or contains information you find offensive? </li></ul></ul>
    8. 8. What can you do? <ul><li>Contribute to the development of AUPs / e-Safety Policy </li></ul><ul><li>Read the Policies and adhere to them </li></ul><ul><li>Take responsibility for keeping safe online </li></ul><ul><ul><li>Regularly change passwords – don’t share them! Use mix of upper/lower case letters/numbers/symbols </li></ul></ul><ul><ul><li>Set social networking space to private: don’t include name, address or DOB </li></ul></ul><ul><ul><li>Home wireless – is it secure? </li></ul></ul><ul><ul><li>Memory sticks – are they encrypted? </li></ul></ul><ul><li>Censor yourself online: </li></ul><ul><ul><li>consider what a future employer might think of your postings – [email_address] </li></ul></ul><ul><ul><li>Chat rooms – info for criminals ie address or on holiday </li></ul></ul><ul><li>Respect the feeling, rights, values and intellectual property rights of others </li></ul><ul><li>Support others who may be experiencing e-Safety issues </li></ul>

    ×