E-safety Workshop<br />Carol Rainbow<br />carol.rainbow@oxfordshire.gov.uk<br />
Legal Guidance for ICT Use in Education, Research and External Engagement<br />
 Brainstorm the dangers of a person going out into the city streets at night alone.<br />
What risks are we trying to guard against?<br />Add your thoughts to the whiteboard screen by clicking in a space and typi...
What risks should we be guarding against?<br />Aggressive<br />Sexual<br />Values<br />Commercial<br /><ul><li>Bias
Misleading info or advice
Self Harm
Unwelcome behaviours
Misleading information
Violent / hateful content
Being bullied or harassed
Bullying or harassing others
Pornographic or unwelcome sexual content
Meeting strangers
Creating and uploading  inappropriate materials
Personal info
Harvesting personal info
Upcoming SlideShare
Loading in …5

E safety-course_2010


Published on

Carol Rainbow

created this presentation - shared with JISC RSCs in a second life meeting - April 2010

Published in: Education
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Cyber stalking is very easy though mobile phones, Facebook and other social media programsGPS means that it can be easy to track people down, it is something to keep in mindStalkinghttp://www.youtube.com/watch?v=wCh9bmg0zGg&amp;feature=relatedhttp://www.youtube.com/watch?v=6bqXBiZ5Uww&amp;NR=1Identity theft is a problem – 2006 £535 million lost to fraud with credit cardsHacking social network sites causes upset – one aspect of cyber bullyingImage fromhttp://haroldskids.files.wordpress.com/2009/02/cyberbully.jpg?w=300&amp;h=298
  • Is there a problem with online chat?How many people chat with family and friends?Children?Students?How do you know who you are talking to?
  • Matt thought he knew, thought he was grown up and knew what he was doing.http://www.youtube.com/watch?v=nDBDUX7KPT0Recently a colleague had her blind sister (26) cheated, bank account cleared out and sexually abused by someone she thought was a friend!Identity theft can cause all sorts of problems something like £535,000,000 of goods were purchased 2006 using false credit cardsAlso hacking into social media sites.Image fromhttp://blog.blueskyfactory.com/wp-content/uploads/2010/02/OnlineDating.jpg&amp;imgrefurl=http://blog.blueskyfactory.com/tag/holiday-email-campaigns/&amp;usg=___4h47W4ssuYSgE4y45ZT3uYADXk=&amp;h=292&amp;w=310&amp;sz=43&amp;hl=en&amp;start=780&amp;um=1&amp;itbs=1&amp;tbnid=WFeIkK_Xizf1JM:&amp;tbnh=110&amp;tbnw=117&amp;prev=/images%3Fq%3Dmeeting%2Bfriends%2Bonline%26start%3D774%26um%3D1%26hl%3Den%26sa%3DN%26ndsp%3D18%26tbs%3Disch:1
  • If there is time come back to these two pictures and design a poster to inform people whether they can establish that it is a friend that they are talking to – how can they really know?There are lots of copies of this image on the internet but I can’t find the original!
  • http://www.youtube.com/watch?v=89qvGIuINT4&amp;feature=relatedPoker image from http://morph3us.org/blog/uploads/poker-chips-cards.jpgGambling image from http://www.flickr.com/photos/wapster/2345734496/ with a CC licence
  • http://www.commoncraft.com/protecting-reputations-video
  • E safety-course_2010

    1. 1. E-safety Workshop<br />Carol Rainbow<br />carol.rainbow@oxfordshire.gov.uk<br />
    2. 2. Legal Guidance for ICT Use in Education, Research and External Engagement<br />
    3. 3. Brainstorm the dangers of a person going out into the city streets at night alone.<br />
    4. 4. What risks are we trying to guard against?<br />Add your thoughts to the whiteboard screen by clicking in a space and typing<br />
    5. 5. What risks should we be guarding against?<br />Aggressive<br />Sexual<br />Values<br />Commercial<br /><ul><li>Bias
    6. 6. Racist
    7. 7. Misleading info or advice
    8. 8. Self Harm
    9. 9. Unwelcome behaviours
    10. 10. Misleading information
    11. 11. Violent / hateful content
    12. 12. Being bullied or harassed
    13. 13. Bullying or harassing others
    14. 14. Pornographic or unwelcome sexual content
    15. 15. Meeting strangers
    16. 16. Creating and uploading inappropriate materials
    17. 17. Adverts
    18. 18. Spam
    19. 19. Sponsorship
    20. 20. Personal info
    21. 21. Tracking
    22. 22. Harvesting personal info
    23. 23. Illegal downloading
    24. 24. Gambling
    25. 25. Financial Scams </li></ul>Table developed by the EUKids Online project <br />and referenced in paragraph 1.3 of the Byron Review.<br />
    26. 26. Benefits of the internet<br /><ul><li>Educational games and programmes
    27. 27. Research information
    28. 28. The opportunity to communicate with people from all around the world
    29. 29. The opportunity to share resources and ideas with people that have the same interests
    30. 30. Shopping around the world without leaving your computer
    31. 31. Keeping in touch with family when not close to them</li></li></ul><li>Staying up to date with the latest technologies<br />More people than ever are sharing their personal experiences and details with strangers due to:<br /><ul><li>Instant Messaging
    32. 32. Social networking
    33. 33. Mobile phones
    34. 34. Online gaming
    35. 35. Virtual Worlds </li></li></ul><li>Trends<br />Most significant trends we have seen recently is the convergence of:<br /><ul><li>Technology
    36. 36. Behaviour</li></ul>The technologies are not dangerous, it is the user behaviours that lead to dangers.<br />
    37. 37. Online Chat / Instant Messaging<br />
    38. 38. Social Networking<br />Matt thought he knew<br />One Last Click<br />
    39. 39. How can we know who we are talking to?<br />Hi cutie. Where do you come from and what do you do after school?<br />
    40. 40. Do you know who you are talking to?<br />I am 15 and love sports. I play football and go to the gym most days!<br />
    41. 41. Posting on-line information and photographs<br />Sarah – Everyone knows your name<br />Consequences - a useful starting point for discussion work.<br />How would you use with young people?<br />
    42. 42. Mobile Phones<br /><ul><li>Blue tooth technology
    43. 43. Accessing the web /music
    44. 44. Camera - often video
    45. 45. Social networking
    46. 46. IM</li></ul>SextingSexting CasePhotosChoose<br />Possible consequences may include opportunities for cyberbullying, sexting, illegal content / downloads<br />
    47. 47. Cyberbullying Bullying – through ICT<br />“the use of Information and Communication Technology (ICT), particularly mobile phones and the internet, to deliberately upset someone else.”DCSF 2008<br />
    48. 48. Cyberbullying<br /><ul><li>Location – the 24/7 and anyplace nature of cyberbullying
    49. 49. Anonymity – the person being bullied will not always know who is attacking them
    50. 50. Motivation – some people may not be aware that what they are doing is bullying
    51. 51. Evidence – unlike other forms of bullying, the target will have evidence of its occurrence</li></li></ul><li>Downloading Music<br />
    52. 52. Online Gaming<br /><ul><li>A growing industry
    53. 53. An expanding area of business worth millions
    54. 54. Addictive nature of games can cause health issues & truancy</li></ul>Addiction videoWOW Addiction<br />Sites include:<br />–World of War Craft<br />–Runescape <br />–Everquest <br />–Swordsman Online<br />–Mini Clip <br />and there are loads more!<br />
    55. 55. Online Gambling<br />On-line gambling addiction<br />
    56. 56. Your Reputation and your Job Prospects<br />My Space. Facebook profiles<br />http://www.youtube.com/watch?v=ddZWkhItPuI&feature=related<br />Protecting your on-line Reputation<br />http://www.commoncraft.com/protecting-reputations-video <br />
    57. 57. Is your place of worke-safe<br />Do you have<br />have a nominated e-safety co-ordinator?<br />audit its e-safety measures?<br />have a robust AUP? <br />keep an incident log and monitor your measures?<br />handle cyberbullying issues well? <br />raise awareness of the issues, e.g. through discussions?<br />understand e-safety issues and risks?<br />receive regular training and updates? <br />know how to escalate an issue of concern?<br />know how to keep data safe and secure? <br />know how to protect themselves online? <br />
    58. 58. Conclusion - Issues to consider<br /><ul><li>Who is or needs to be responsible or teaching e-safety?
    59. 59. Who needs to be involved?
    60. 60. What support is there in the event of a ‘disclosure’?
    61. 61. Advent of 3G and ‘mobile internet’
    62. 62. Data security – PASSWORDS!
    63. 63. External issues being brought inside
    64. 64.             e.g. cyberbullying
    65. 65. Protection for staff – AUP’s</li></ul>JISC Legal - http://www.jisclegal.ac.uk/<br />