Students I Safety


Published on

  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Students I Safety

    1. 1. Personal Safety Be Safe Online You can be anyone you want to be…on the Internet <ul><li>Software Piracy </li></ul><ul><li>Cyberbullying </li></ul><ul><li>The Dangers of Pornography </li></ul><ul><li>Cyber Predators </li></ul>
    2. 2. First: Sobering Stats… Six out of 10 kids online have gotten an e-mail or instant message from a perfect stranger ... and more than half have written back. One in 33 kids has been aggressively solicited to meet their &quot;cyber friend&quot; in person. One in four kids, ages 10-17, has been exposed to unwanted sexual material online. (Federal Bureau of Investigations)
    3. 3. The Internet is Their World <ul><li>78% of teens report that they have been using the Internet for three years or more </li></ul><ul><li>Over 50% say they have been on the Internet for five or more years. </li></ul><ul><li>80% say they used the Internet “yesterday” and 27 percent used the Internet for more than an hour “yesterday.” </li></ul>According to the National Council on Crime Prevention: 2007 Report
    4. 4. The Internet is at Their Fingertips <ul><ul><ul><li>96% of teens have an email account </li></ul></ul></ul><ul><ul><ul><li>On average, teens have 2.2 email addresses </li></ul></ul></ul><ul><ul><ul><li>79% of teens use the Internet at school for school-related research. </li></ul></ul></ul><ul><ul><ul><li>51% percent of teens surf the web at school and 34% send and receive email at school. </li></ul></ul></ul><ul><ul><ul><li>About 42% use the Internet at a friend’s house and another 33% use the Internet in other places. </li></ul></ul></ul><ul><ul><ul><li>Virtually all teens ( 97%) use the Internet at home. </li></ul></ul></ul><ul><ul><ul><li>93% percent send and receive email from home, surf the web, and use the Internet for research for school at home. </li></ul></ul></ul><ul><ul><ul><li>75% send Instant Messages (IMs), 60% read or post messages on blogs or similar websites, and 23% visit online chat rooms. </li></ul></ul></ul>
    5. 5. Social Networks & Internet Safety A 15-year-old has been charged with disorderly conduct via electronic means as the result of a threatening message posted on MySpace, according to Brattleboro Police. If MySpace were a country, it would be the 11th largest in the world
    6. 6. Software Piracy
    7. 7. Software Piracy
    8. 8. Piracy: Why is Software Different Intellectual Property: It is not physical License Agreement: Ownership is controlled through this Unauthorized use of copyright-protected or licensed materials (including, but not limited to, graphic images, movies, music or audio files, and written word) is a violation of federal law . An individual who reproduces and/or distributes digitized copyrighted material without permission and in excess of &quot;fair use&quot; has violated federal digital copyright law, has put him or herself at risk for a lawsuit brought by the copyright owner.
    9. 9. Software Piracy: The Risks You Take Quality - It often lacks key elements and documentation, and comes with no warranty protection or upgrade options Viruses - Untested, counterfeit discs may be infected with viruses that will damage your hard drive or cripple your network, without the benefit of technical support At Work or School - copying or using illegally copied software at work puts the entire company at risk for copyright infringement. Pirated software that is either dysfunctional or that contains viruses wastes company resources and drives up IT costs
    10. 10. Types of Piracy End-User piracy: When users copy software without appropriate licensing for each copy. Pre-installed Software: When a computer manufacturer takes one copy of software and illegally installs it on more than one computer. Internet Piracy: When unauthorized copies are downloaded over the Internet. Counterfeiting : When illegal copies of software are made and distributed in packaging that reproduces the manufacturer's packaging.
    11. 11. How Much Do you Want Your Computer To Cost?
    12. 12. Cyberbullying: What could it hurt? You Stink Embarrassment Malicious FAT I HATE YOU Intentional Threats Stealing Passwords I wish you were dead Hurtful No one likes you You Don't Know Me You Don't even understand
    13. 13. Video Cyberbullying
    14. 14. CYBER BULLYING IS… <ul><li>Being cruel to others by sending or posting harmful </li></ul><ul><li>material using technological means; </li></ul><ul><li>Willful and repeated harm inflicted through electronic mediums </li></ul><ul><li>Also known as: </li></ul><ul><li>‘ Electronic Bullying’ & </li></ul><ul><li>‘ Online Social Cruelty’ </li></ul>
    15. 15. A Cyber Bully’s Tools <ul><li>E-mail </li></ul><ul><li>Cell phones </li></ul><ul><li>Pager text messages </li></ul><ul><li>Instant messaging </li></ul><ul><li>Personal web sites </li></ul><ul><li>Personal polling web sites </li></ul><ul><li>Chat rooms </li></ul><ul><li>Social Networks such as FaceBook & MySpace </li></ul><ul><li>Blogs </li></ul>
    16. 16. Examples of Cyberbullying <ul><li>Sending cruel, vicious, and sometimes threatening, e-mail messages or text messages to others. </li></ul><ul><li>Creating web sites that have stories, cartoons, pictures, jokes, and songs that ridicule others based on hatred or bias. </li></ul><ul><li>Breaking into an e-mail account and sending vicious or embarrassing material to others. </li></ul><ul><li>Engaging someone in IM (instant messaging), tricking that person into revealing sensitive personal information, and forwarding that information to others. </li></ul><ul><li>Taking a picture of a person in the locker room using a digital phone camera and sending that picture to others. </li></ul>
    17. 17. CYBER BULLYING TYPES <ul><li>“ Flaming’: Online fights using electronic messages with angry and vulgar language </li></ul><ul><li>“ Harassment”: Repeatedly sending offensive, rude, and insulting messages </li></ul><ul><li>“ Cyber stalking”: Repeatedly sending messages that include threats of harm or are highly intimidating. Engaging in other on-line activities that make a person afraid for his or her own safety </li></ul><ul><li>“ Denigration”: ‘Dissing’ someone online. Sending or posting cruel gossip or rumors about a person to damage his or her reputation or friendships </li></ul>
    18. 18. CYBER BULLYING TYPES <ul><li>“ Impersonation ”: Pretending to be someone else and sending or posting material online that makes that person look bad, gets that person in trouble or danger, or damages that person’s reputation or friendships </li></ul><ul><li>“Outing and Trickery”: Sharing someone’s secret or embarrassing information online. Tricking someone into revealing secrets or embarrassing information which is then shared online </li></ul><ul><li>“ Exclusion”: Intentionally excluding someone from an on-line group, like a ‘buddy list’ </li></ul><ul><li>{Nancy Willard, M.S., J.D., Director of the Center for Safe and Responsible Internet Use} </li></ul>
    19. 20. Why are Kids Cyberbullying <ul><li>Because I can </li></ul><ul><li>Anonymity - I feel brave </li></ul><ul><li>It starts as a prank –inadvertent </li></ul><ul><li>Lack of empathy because bully is removed from the victim </li></ul><ul><li>Revenge </li></ul><ul><li>Victim is often too embarrassed by information to tell </li></ul>
    20. 21. Why are Kids Cyberbullying <ul><li>81% Think cyberbullying is funny </li></ul><ul><li>64% Cyberbullied because they Didn’t like the victim </li></ul><ul><li>45% Cyberbullied because they view the victim as a loser </li></ul><ul><li>58% View Cyberbullying as no big deal </li></ul><ul><li>47% Believe there are no tangible consequences </li></ul><ul><li>45% Believe they will never get caught </li></ul>
    21. 22. Why should you be concerned? <ul><li>Teens are twice as likely to talk to a friend about a cyberbullying incident as to talk with a parent or trusted adult. </li></ul><ul><li>As teens get older, they believe that their parents should be more concerned with what they see and hear on line. </li></ul><ul><li>Parents are allowing personal information to be posted. </li></ul>
    22. 23. How to respond to cyber bullying 3 Identify the Bully and talk to them 6 5 4 2 <ul><li>Stop or remove the material by contacting the Service Provider: </li></ul><ul><li>Cell Phone Operator </li></ul><ul><li>Internet service Provider </li></ul><ul><li>Chatroom provider </li></ul>1 For parents and teachers: Preserve evidence , this is crucial for making a case and identifying the bully. In extreme cases contact the Police: • Death threats or threats of other form of violence to a person or property • Any evidence of sexual exploitation Use technology available to block Use Blocking or filtering technology if available, e.g blocking user on IM For schools: Contact the parents of the student and request their assistance in resolving the matter. Many, perhaps most, parents are not fully aware of the actions of their children on the Internet.
    23. 24. How to Respond to Cyberbullying 3 Think before you send pictures of someone via email, or mobile phone, they can spread far beyond your circle of friends. 6 5 4 2 Keep a record of events/messages or pictures, you will need them for the police or the ISP, or mobile phone company to trace the bully. 1 Don’t reply to abusive messages, that may only encourage the bully. You have a right not to be harrased and bullied online, make sure you tell someone. If you receive a rude image or text about someone else do not forward it, you could be assisting a bully or breaking the law. Treat your password like your toothbrush Don’t let anyone else use it.
    24. 25. Pornography
    25. 26. PORNOGRAPHY: Consider this… 40% have visited an inappropriate place on the Internet; almost 18% more than once . Porn Video Pornography addicts experience similar patterns of symptoms to those involved in substances such as drugs or alcohol. For example, euphoria while taking the drugs, and physical and/or psychological problems when they attempt to quit Desensitization to the addictive substance, and the need to increase their dosage in order to maintain their euphoria.
    26. 27. Cyber Predators
    27. 28. Cyber Predators
    28. 29. How easy is it for someone to find you online?
    29. 30. How we reveal too much… <ul><li>Screen Name Too revealing </li></ul><ul><li>Online Profile Way too much information </li></ul><ul><li>Chat Room Learns the lingo </li></ul><ul><li>Iming Makes it intimate </li></ul><ul><li>Blogging Online diaries </li></ul><ul><li>Gaming Profiles & Chat </li></ul><ul><li>Social Networks Friend of a friend of a friend </li></ul>
    30. 31. Cyber Predator Profile <ul><li>25 - 65 years old Doctors </li></ul><ul><li>Well educated Religious Leaders </li></ul><ul><li>Married with children Parents </li></ul><ul><li>No socio-economic tag Counselors </li></ul><ul><li>Steady employment Congressman </li></ul><ul><li>Varied computer expertise Teachers </li></ul><ul><li>Male Coaches </li></ul>
    31. 32. The Grooming Process <ul><li>Shared Interests </li></ul><ul><li>Build Trust </li></ul><ul><li>Secrecy </li></ul><ul><li>Break Down Barriers - Diminish inhibitions </li></ul><ul><li>Threaten with exposure or harm </li></ul><ul><li>ALWAYS working towards a face-to-face meeting </li></ul>The grooming process is similar to adult courting and can take a short time or a very long time. A cyber predator is patient. Take it from an expert
    32. 33. Online Safety - What can we do? <ul><li>Internet Safety Handouts </li></ul><ul><li>Cyberbullying Handouts </li></ul><ul><li>NetSmartz Curriculum </li></ul><ul><li>CyberSmart Curriculum </li></ul><ul><li>iSafe Curriculum </li></ul>