Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Cybersafety Safe and Responsible use of Technology ETC!  February 28, 2009 Bob Gausman, Burt Lo, Matthew Kinzie Photo copi...
Cybersafety Legislation
Cyberbullying Definition “ The use of information and communication technologies to support deliberate, repeated, and host...
Personal Information
Copyright Piracy
Inappropriate Content
Cyber Predators
Cyber Bullying Differences <ul><li>Always On </li></ul><ul><li>Everywhere </li></ul><ul><li>Permanent </li></ul><ul><li>An...
Statistics <ul><li>42% report being bullied online </li></ul><ul><li>35% report begin threatened online </li></ul><ul><li>...
Cyber Bully Tool Box <ul><li>Content Creation  </li></ul>Text Messaging Chat Rooms Discussion Forums Instant Messaging MMS...
Cybersafety Learning Resources
Sources and Attribution <ul><li>Sources </li></ul><ul><ul><li>California Technology Assistance Project, Region 4  http://w...
Upcoming SlideShare
Loading in …5
×

20090228 Cyber Safety

1,558 views

Published on

Presentation on Cyber Safety presented at the ETC! 2009 conference in Modesto, CA to K-12 school district adminstrators and teachers. This slide show is my portion, discussing the definition of cybersafety.

Published in: Education, Technology, Sports
  • Be the first to comment

  • Be the first to like this

20090228 Cyber Safety

  1. 1. Cybersafety Safe and Responsible use of Technology ETC! February 28, 2009 Bob Gausman, Burt Lo, Matthew Kinzie Photo copied from: http://www.flickr.com/photos/itripped/2262538576/
  2. 2. Cybersafety Legislation
  3. 3. Cyberbullying Definition “ The use of information and communication technologies to support deliberate, repeated, and hostile behaviour by an individual or group, that is intended to harm others.&quot; Bill Belsey www.cyberbullying.org
  4. 4. Personal Information
  5. 5. Copyright Piracy
  6. 6. Inappropriate Content
  7. 7. Cyber Predators
  8. 8. Cyber Bullying Differences <ul><li>Always On </li></ul><ul><li>Everywhere </li></ul><ul><li>Permanent </li></ul><ul><li>Anonymity </li></ul><ul><li>No Feedback </li></ul><ul><li>Lack of Parental </li></ul><ul><li>Oversight </li></ul>
  9. 9. Statistics <ul><li>42% report being bullied online </li></ul><ul><li>35% report begin threatened online </li></ul><ul><li>53% admit bullying online </li></ul><ul><li>58% have not told parents/adults about online bullying or threats </li></ul><ul><li>www.isafe.org (2003-2004) </li></ul>
  10. 10. Cyber Bully Tool Box <ul><li>Content Creation </li></ul>Text Messaging Chat Rooms Discussion Forums Instant Messaging MMS Wikis Blogs Video Sharing (YouTube) Photo Sharing (Flickr) E-Mail Online Games(Runescape) Social Networking ( MySpace) Collaboration File Sharing (LimeWire)
  11. 11. Cybersafety Learning Resources
  12. 12. Sources and Attribution <ul><li>Sources </li></ul><ul><ul><li>California Technology Assistance Project, Region 4 http://www.ctap4.net/projects/cybersafety.html </li></ul></ul><ul><ul><li>www.cyberbullying.org (quote on slide 3) </li></ul></ul><ul><ul><li>ISafe: www.isafe.org </li></ul></ul><ul><ul><li>Center for Safe and Responsible Internet Use http://csriu.org/index.html </li></ul></ul><ul><li>Attribution: </li></ul><ul><ul><li>Title Slide Photo: http://www.flickr.com/photos/itripped/2262538576/ </li></ul></ul><ul><ul><li>Photos on slides 3,4,10 copyrighted by Matthew Kinzie. Photos may be re-used without permission or attribution for non-commercial purposes. </li></ul></ul><ul><ul><li>All other photos taken from http://commons.wikimedia.org under the public domain. </li></ul></ul><ul><ul><li>Statistics from slide 10: www.isafe.org </li></ul></ul><ul><ul><li>This slide show created and copyrighted by Matthew Kinzie. Licensed for use under Creative Commons Attribution – Noncommercial license 3.0 </li></ul></ul>

×