WALWORTH ACADEMYE-SAFETY FOR STAFFHow to be safe online
StarterI have a FacebookAccount with over 250Friends.Name........................I use Farmville on myFacebook page.Name ....
By the end of this session... Understand the use/misuse of social media Acknowledge that safety online is not just an is...
On a scale of 1- 10 rank yourself as to howconfident you are using social media.1 ----------------------5-----------------...
GROUP EXERCISEWhat does the internet, social mediaand mobile technology give to youngpeople ?Turn to your neighbourWhat is...
See articles athttp://www.guardian.co.uk/education/2009/sep/23/teacher-pupil-sexual-relationship?INTCMP=SRCHhttp://www.bbc...
In the context of an inspection,e-safety may be described as theschool‟s ability:to protect and educate pupils andstaff in...
 Recent TES surveyfound that 9% ofteachers werefriends with pupilson SNS*.Social media challenges for teachers* http://co...
Age restrictions?
THE APPEAL OF FACEBOOKSocial locationAPPLICATIONSHuge range of appsNEWS FEEDS“boast by post”MESSAGESSuperseding E-mailWHO’...
Facebook TimelineRe-checkyour privacysettings using„View As‟functionSearchableby yearsThe importance of privacy settings31...
Social Media – The statistics
Privacy setting on FacebookBUT ... Remember privacy options and controls change frequently!Page 106 dealswith privacysetti...
FB Features – Groupdiscussion Why would it be good to use these features onyour Facebook account?: View As Privacy Sett...
Protecting our YoungPeople
Group Activity Watch the video clip (2 min) by clicking on anyof the images below. As you watch the video make notes of ...
GROUP EXERCISE Turn to your neighbourWhat was the greatest fearfor the girl in the film ?How did it get out of control ?W...
Classifying the risks to children onlineCONTENTCONTACTCONDUCTCommercial Aggressive Sexual ValuesAdvertsSpamSponsorshipPers...
Contactwww.ceop.gov.ukif you have concernsabout inappropriatecommunication from anadult to a minor.CONTENTChild asRecipien...
How the risks „migration‟ from online to offline can affect vulnerableYPCONTENTCONTACTCONDUCTCommercial Aggressive Sexual ...
What goes online stays online footprintSome of these young people in the abovepicture were persecuted because of theirpost...
JOINT ENTERPRISE:Legislation that finds people guilty of a violent crime if they arejudged to have lent encouragement to t...
Being „nudged‟ into gangsALL CHILDREN WILLLEAVE A FOOTPRINTEXCEPT SOME WILLBE IN MUDDIERSAND!Vulnerable young people who a...
Classifying the risks to children onlineCONTENTCONTACTCONDUCTCommercialAggressiveSexual ValuesViolent andhatefulcontentBei...
Group activity Watch VideoWhat would you have done:1. If you were the boy in thevideo?2. If you were his peers
Teacher‟s interview Was the teacher bullied? How does the teacher recognise that something iswrong with Joe? How did th...
Useful contacts1. What if I have been a victim of cyber bullying?a) Speak to Mrs McDowell (Child Protection Officer)/ your...
Important things to remember Always respect others be careful what yousay. Think before you send, what goes onlinestays ...
Ways in which Cyberbullying is different from offline bullying?OFFLINE ONLINEHome was sanctuaryOften physical Usually word...
Why YP may be scared of reporting abuse ?• “It was nobody else‟s business”• “Didn‟t think it was serious or wrong”• “Didn‟...
RESPONDING TO THE VICTIMNeed for reassurance – THIS IS BULLYING !Practical advice:RED Don‟t retaliating,Orange – Save the ...
The young person who you are responsible for (let‟s sayshe‟s a 12 year old girl) tells you that her “friends” in herclass ...
Unmediated ContactChildren who have been fostered can suddenly receive messages from siblings, birthparents, or those who...
 Social LocationWAYS INWHICH THEINTERNETCAN AMPLIFYVULNERABILITYYoung People who may need to escape from an abusive relat...
Eg Facebook Timeline Exclusion from the „norm‟There are lots of online services which celebrate our „journey‟. How do chi...
Many vulnerable young people can be early adopters of tools and services which arenot yet regulated or in the public consc...
In pairs discussGROUP EXERCISEDo you recognise these 10 offlinevulnerabilities and agree that theycan be amplified online ...
The importance of reaching parents/carers Be aware that your children mayas likely cyberbully as be a targetof cyberbully...
E-Safety Policy/ Evaluation A copy of the draft e-safety policy is availablefor each member of staff Please read through...
Upcoming SlideShare
Loading in …5
×

Walworth academy e-safety (staff)

315 views

Published on

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
315
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • These slides will form the basis of the academy’s programme on delivering e-safety awareness to all students. It must be shown to all students and each student must engage in it (although some content will be more suitable to Year 9 and above)This is Ofsted requirements. Speak to Mr E. Solate for clarity and any of the points herein.
  • Ask students to fill in their names in which ever categories they fall into. Names can be in more than one box.
  • The top row of images shows the TV, Cinema and Facebook. TV and cinema are easy to ‘police’ with certification and watershed. What about FB?. What is the age restriction for signing up to FB?
  • FB uses information from recent activities on the user’s site to advertise. There is a timeline of photos which may include older images students often forget about
  • Very important that all students pay particular attention to this slide.
  • Note:Millennials refers to the group of people born between 1980 and 2000
  • The global reach of FB
  • This is a magazine produced by Vodafone for parents but equally good for students to read. Page 106 deals with privacy settings
  • This requires access to Youtube to view the video. If you haven't got access to Youtube then please contact Mr Solate to provide you with the video file.
  • Allow students the opportunity to discuss this at some length. It might be a good idea for them to write down their responses in their groups and then collectively as a class to see any commonality in their responses.
  • Students must recognise that any comments they make online can affect their chances in life. News article:http://news.sky.com/story/1075847/youth-crime-commissioner-paris-brown-quits. Ask students:What sort of online footprint are they leaving?
  • Simply commenting on a thread could make you an accomplist to a crime. You wouldn’t stand and cheer on a crime in reality so why do so online!
  • Who are your ‘friends’ on social media?
  • Credit:Childnet
  • Walworth academy e-safety (staff)

    1. 1. WALWORTH ACADEMYE-SAFETY FOR STAFFHow to be safe online
    2. 2. StarterI have a FacebookAccount with over 250Friends.Name........................I use Farmville on myFacebook page.Name .............................I don‟t have a Facebookaccount and don‟tparticularly want one.Name.............................I use my SMART phonefor e-mail.Name .............................I use SMART phone justfor Text messages.Name..............................I don‟t have a SMARTphone and don‟t wantone!Name..............................My parents know morethan me about theInternet.Name.............................I keep in contact morewith my friends/ familyon the internet than inrealityName..............................I know more about theinternet than myteachers.Name..............................
    3. 3. By the end of this session... Understand the use/misuse of social media Acknowledge that safety online is not just an issuein school Empowered to make choices for yourself abouthow you use the internet and social media Recognise the online issues for young people(YP). Equipped to help keep yourself and YP safe.
    4. 4. On a scale of 1- 10 rank yourself as to howconfident you are using social media.1 ----------------------5----------------------10“What’s a mouse?”“I taughtMark Zuckerbergall he knows”
    5. 5. GROUP EXERCISEWhat does the internet, social mediaand mobile technology give to youngpeople ?Turn to your neighbourWhat is the single most importantthing to you about being online ?
    6. 6. See articles athttp://www.guardian.co.uk/education/2009/sep/23/teacher-pupil-sexual-relationship?INTCMP=SRCHhttp://www.bbc.co.uk/newsround/14542636http://www.bbc.co.uk/news/uk-scotland-16379494
    7. 7. In the context of an inspection,e-safety may be described as theschool‟s ability:to protect and educate pupils andstaff in their use of technologyto have the appropriatemechanisms to intervene andsupport any incident whereappropriate.SCHOOLS
    8. 8.  Recent TES surveyfound that 9% ofteachers werefriends with pupilson SNS*.Social media challenges for teachers* http://community.tes.co.uk/forums/t/463065.aspx?s_cid=16See http://www.childnet.com/kia/downloads/Social-networking.pdf for Childnet/TDA leaflet• General advice from unions and GTS is:Do not „friend‟ pupils on personal accounts orask to be added to their contact lists.You could makeyourself vulnerable bysharing your personalinformation (and that ofyour friends)You could makeyourself vulnerable bybeing able to accesstheir personalinformationYou could makeyourself open toallegations ofinappropriate contact orbe misunderstood.WHY ?
    9. 9. Age restrictions?
    10. 10. THE APPEAL OF FACEBOOKSocial locationAPPLICATIONSHuge range of appsNEWS FEEDS“boast by post”MESSAGESSuperseding E-mailWHO’S ONLINEKnow who is online now!PHOTOS/TAGSComment and Tagphotos facerecognitionLIVE CHATSuperseding IMFRIENDSFind, link, be inconstant contact+ on your mobileVIDEOlink and embedEvents/GroupsALL FOR FREE …… BUT ….WHAT PRICE IS FREE ?TIME LINE
    11. 11. Facebook TimelineRe-checkyour privacysettings using„View As‟functionSearchableby yearsThe importance of privacy settings31% of 12-15 year olds don’t use privacy settings on theirsocial networking profiles – Ofcom Media literacy Report 2009Checkregularlybecause thesettingschange
    12. 12. Social Media – The statistics
    13. 13. Privacy setting on FacebookBUT ... Remember privacy options and controls change frequently!Page 106 dealswith privacysettings
    14. 14. FB Features – Groupdiscussion Why would it be good to use these features onyour Facebook account?: View As Privacy Settings
    15. 15. Protecting our YoungPeople
    16. 16. Group Activity Watch the video clip (2 min) by clicking on anyof the images below. As you watch the video make notes of whatyou observe.
    17. 17. GROUP EXERCISE Turn to your neighbourWhat was the greatest fearfor the girl in the film ?How did it get out of control ?What if she was one of ourstudents – what will you do?
    18. 18. Classifying the risks to children onlineCONTENTCONTACTCONDUCTCommercial Aggressive Sexual ValuesAdvertsSpamSponsorshipPersonal infoViolent andhatefulcontentPornographicunwelcomesexual contentBiasRacistMisleadinginfo or adviceTrackingHarvestingPersonal infoBeing bulliedharassed orstalkedMeetingstrangersBeinggroomedSelf harmUnwelcomepersuasionsIllegaldownloadingHacking GamblingFinancial scamsTerrorismBullying orharassinganotherCreating anduploadinginappropriatematerialProvidingmisleadinginfo/adviceOriginal 3 Cs Classification by„EU Kids‟ online projectChild as RecipientChild as ParticipantChild as Actor
    19. 19. Contactwww.ceop.gov.ukif you have concernsabout inappropriatecommunication from anadult to a minor.CONTENTChild asRecipientCONTACTChild asParticipantCONDUCTChild as ActorCommercialAggressiveSexual ValuesPornographicunwelcomesexual contentMeetingstrangersBeinggroomedCreating anduploadinginappropriatematerialOnline grooming is acriminal offence“One-third of those whosexually abuse children arejust children themselves.”BBC Newsnight programme March 201021,630 BEBO members had the name “Porn Star”“Sexting” = teens sharing nude photos via mobiles and web. The practice canhave serious legal and psychological consequences“So take a dirtypicture for me,Take a dirtypictureJust take a dirtypicture for meTake a dirtypicture”From Taio CruzsongNo 6 in the UKchartsApril 2010.
    20. 20. How the risks „migration‟ from online to offline can affect vulnerableYPCONTENTCONTACTCONDUCTCommercial Aggressive Sexual ValuesChild as RecipientChild as ParticipantChild as ActorCRIMINALBEING IN THE WRONG PLACE AT THE WRONG TIME & “BAD LUCK”OF THE 1,984 PEOPLECHARGED AFTER RIOTS: 53% were under 20 yearsold 42% received free schoolmeals(16% nat. average) 66% of them had somespecial education needs(21% of all pupils)Figures from the Ministry ofJustice carried out by the HowardLeague for Penal Reform(published in Guardian 26.11.11)Original 3 Cs Classificationby „EU Kids‟ online project
    21. 21. What goes online stays online footprintSome of these young people in the abovepicture were persecuted because of theirpostings on BBM and Facebook in the LondonRiots of 2011.Who is this young lady and howhas her online postings affectedher.
    22. 22. JOINT ENTERPRISE:Legislation that finds people guilty of a violent crime if they arejudged to have lent encouragement to the main perpetrator.ASSOCIATIONWITHSOMEONECOMPLICIT INA JOINTENTERPRISE“You played nopart butpresence thereencouragedothers ”FAIL TOINTERVENEFAILURE TOWALK AWAY !INCLUDES ONLINE EVIDENCE OFASSOCIATION & ENCOURAGEMENT“They planned the attack on social media the night before, the courtwas told, sending messages to each other on Facebook and viaBlackBerry Messenger.”
    23. 23. Being „nudged‟ into gangsALL CHILDREN WILLLEAVE A FOOTPRINTEXCEPT SOME WILLBE IN MUDDIERSAND!Vulnerable young people who are risk takers,impulsive or under the influence of alcohol and/ordrugs and less supervised, can be more easilydrawn into illegal activity including being „nudged‟through technology.
    24. 24. Classifying the risks to children onlineCONTENTCONTACTCONDUCTCommercialAggressiveSexual ValuesViolent andhatefulcontentBeing bulliedharassed orstalkedBullying orharassinganotherClassification by „EU Kids‟ online project and referenced in the Byron ReportChild as RecipientChild as ParticipantChild as Actor22% of yp aged 11-18 report havingbeen cyber bullied.It ruins lives.YP may not disclosethat it is happening
    25. 25. Group activity Watch VideoWhat would you have done:1. If you were the boy in thevideo?2. If you were his peers
    26. 26. Teacher‟s interview Was the teacher bullied? How does the teacher recognise that something iswrong with Joe? How did the teacher deal with the situation? How do you think she felt being a target of thebullying? What happened to the website? What did she do to get it taken down? What can schools do to help people involved incyberbullying? What does the teacher recommend other people do tohelp stop bullying?
    27. 27. Useful contacts1. What if I have been a victim of cyber bullying?a) Speak to Mrs McDowell (Child Protection Officer)/ yourteachers/ parents.b) Report at: www.ceop.gov.uk (UK lawEnforcement agency )1. Where else can I get more information about cyberbullying away from school?a) http://www.virtualglobaltaskforce.com/ (preventingonline sexual exploitation)b) www.dcsf.gov.uk/ukccis/ (UK Council for Child InternetSafety)c) www.childnet.com/
    28. 28. Important things to remember Always respect others be careful what yousay. Think before you send, what goes onlinestays online ! Treat your password like your toothbrush !(change every 3 months) Learn how to block the bully and save theevidence Make sure you tell someone Support others – how would you feel if no-one stood up for you !
    29. 29. Ways in which Cyberbullying is different from offline bullying?OFFLINE ONLINEHome was sanctuaryOften physical Usually words/picturesBully strong/victim weakPower and roles can shift +change quickly even duringactivity.Can be 24/7Local & intimate Barriers collapse with potentialmass distribution but also widerhelp.See the impactDon‟t see impact (lack of empathy)Bystanders intervene Bystanders take part (usingmobile/SNS)Often silent It can leave a trail ! (keepingevidence)Clear to seeintentionMore complex + fast changing,invisible audience, social rivalry,steganography** Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient,suspects the existence of the message, a form of security through obscurity.Closure is easier Closure harder - permanent,archivable
    30. 30. Why YP may be scared of reporting abuse ?• “It was nobody else‟s business”• “Didn‟t think it was serious or wrong”• “Didn‟t want parents/friends to find out”• “Was frightened”• “Didn‟t think I would be believed”• “Had been threatened by the abuser”Source: Child Maltreatment in the UK Cawson 2000• “My parents don‟t get the internet”• “Maybe it was my fault ! (blur)”• “Scared if computer is confiscated”Abuse on the internet/mobile phone
    31. 31. RESPONDING TO THE VICTIMNeed for reassurance – THIS IS BULLYING !Practical advice:RED Don‟t retaliating,Orange – Save the evidenceGreen – Tell someone (who?)See advice, resources and guidanceat Childnet‟s www.digizen.orgwebsite
    32. 32. The young person who you are responsible for (let‟s sayshe‟s a 12 year old girl) tells you that her “friends” in herclass took video clip of her at a sleep over pyjama party ontheir phones which is now being circulated and she thinks itis now posted on a social networking site. What advice would you give to her ? Who should the girl report this to ? Is this a school issue ? How would you go about trying to remove this content? What if those who posted it up have circulated it morewidely ?GROUP EXERCISE
    33. 33. Unmediated ContactChildren who have been fostered can suddenly receive messages from siblings, birthparents, or those who want to trace them for potentially harmful reasons.WAYS INWHICH THEINTERNETCANAMPLIFYVULNERABILITYGuardian Newspaper article 19 June 2010
    34. 34.  Social LocationWAYS INWHICH THEINTERNETCAN AMPLIFYVULNERABILITYYoung People who may need to escape from an abusive relationships need to thinkcarefully about how they make their „places‟ public.
    35. 35. Eg Facebook Timeline Exclusion from the „norm‟There are lots of online services which celebrate our „journey‟. How do children whodon‟t know their birth parents, may not have an early photo of themselves feel in these„boast by post‟ environments ?WAYS INWHICH THEINTERNETCAN AMPLIFYVULNERABILITY
    36. 36. Many vulnerable young people can be early adopters of tools and services which arenot yet regulated or in the public conscious. For example BBMHow will QR codes be mis-used ? Earlier adopters ?Screen Munch !WAYS INWHICH THEINTERNETCAN AMPLIFYVULNERABILITY“Any A/C holders lookingto make a quick grand getat me. No time wasters.”Message on BBM aboutbank scams (fraud!)
    37. 37. In pairs discussGROUP EXERCISEDo you recognise these 10 offlinevulnerabilities and agree that theycan be amplified online ?Can you think of positive ways inwhich the Internet minimises offlinevulnerabilities?
    38. 38. The importance of reaching parents/carers Be aware that your children mayas likely cyberbully as be a targetof cyberbullying. Talk to your children andunderstand the ways in whichthey are using the internet andmobile phones. Use the tools on the services Remind your children not toretaliate Remind yp to keep the evidence Know where to report (see later)For Parents For Young people• Always respect others be careful whatyou say.• Think before you send, what goesonline stays online !• Treat your password like yourtoothbrush !• Learn how to block the bully and savethe evidence• Make sure you tell someone• Support others – how would you feel ifno-one stood up for you !• Encourage them to produce their ownpeer advice media !
    39. 39. E-Safety Policy/ Evaluation A copy of the draft e-safety policy is availablefor each member of staff Please read through thoroughly especially sectionon Staff and Students An evaluation of the course will be sent to youtomorrow. Please complete promptly

    ×