Call Girls in Dwarka Mor Delhi Contact Us 9654467111
C3 and digital citizenship
1. Cyber Safety, Cyber Ethics and
Cyber Security
Presented by Dr. Julia VanderMolen
2. Today’s World
• Full of …
– wonder
– fun
– scary places
– scary people
• Need to stay safe even when having fun
3. C3
• Cyber Safety
• Cyber Ethics
• Cyber Security
• Created by the National Cyber Security
Alliance in Washington, DC
4. Cyber Safety
• Responsible rules and behaviors designed
to keep individuals safe whenever
connected to the Internet
• Ask student what are some examples of
“safety rules” that parents ask them to
follow while using the Internet
5. Cyber Safety Terms
• Privacy
• Children’s Online Privacy Protection Act (COPPA)
• Cyber Safety Contract
• C3 Strategy
– The three key components all Internet users should
understand and promise to use whenever they go
online so keep themselves, others, and their computer
safe!
• Cyber Security
• Cyber Safety
• Cyber Ethics
6. Cyber Ethics
• Informal code of positive conduct used
whenever someone is using the Internet
• “Doing the right thing even when no one is
looking or watching”
• Ask students of wise and poor Internet
use choices and discuss
• What are some good strategies for being a
good digital citizen who behaves ethically
online.
8. Cyber Security
• The protection of information and computer
systems and networks while connected to the
Internet
• Common strategies that people use to protect
their computer and personal information
– Antivirus
– Firewalls
– Malware protection
– Never give out personal information
– Always use a secure site when doing any
transactions
• List some security tips that people should know
10. “WWW Decision Tool”
• Decision checklist to help reinforce
strategies to behave responsibly and
remain safe and secure during all Internet
activities
– W – Who is asking for this personal
information?
– W – What information is being requested?
– W – Why do they need this personal
information?
11. Terms that to know
• Cyber Ethics
• Cyber Security
• Cyber Safety
12. National Cyber Security Alliance
(NCSA)
• A Washington DC based national non-profit
organization that collaborates with the federal
government, corporate, non-profit and academic
sectors, to create a culture of cyber security and
safety awareness by providing the knowledge
and tools necessary to prevent cyber crime and
attacks to ensure that everyone remains safe
while online.
www.staysafeonline.org
13. Let’s do this ourselves
• Break into groups
• Each group will have a scenario to read and evaluate
• Write down your findings
• Report back to the group
• Open ended discussion
14. Additional Sources
• NCSA
(www.usatodayeducate.com/wordpress/i
ndex.php/technology-syber-security
– Cyber security
– NCSA has teamed up with USA Today
Education Foundation and the Department of
Homeland Security to develop four lesson
plans using recent news stories about cyber
security issues. These lesson plans are
targeted to 8th through 12th grade
15. Additional Resources
• CyberSmart! (www.cybersmart.org)
– Safety and Security Online
– Manners, Bullying and Ethics
– The free CyberSmart! Student Curriculum
empowers students to use the Internet safely,
responsibly, and effectively. The free CyberSmart!
Educator Toolbar puts 21st century skills into
practice every day, with just-in-time 24/7 access
to annotated essential resources to support
student learning.
16. Additional Resources
• Department of Justice
(www.cybercrime.gov/rules/lessonplan
1.htm)
– The Department of Justice has developed a
kids page focused on lesson plans for
elementary and middle school children
17. Additional resources
• IKEEPSAFE (www.ikeepsafe.org)
– Internet Keep Safe Coalition – Faux Paw the Techno Cat
– Internet Safety basics
– How to handle cyber-bullying
– Balancing real life with screen time
– The risks and dangers of downloading
– The Faux Paw® curriculum is based on research from
Harvard’s Center on Media and Child Health and
created in partnership with the iKeepSafe Global
Research Team, Penn State University Department of
Education, and the University of Maryland.
– Most iKeepSafe resources are available for free
download
18. Additional Resources
• i-Safe (www.isafe.org)
– Personal safety
– Predator Identification
– Intellectual Property
– Cyber Citizenship
– Cyber Bullying
– i-Safe offers internet safety curriculum for
grades K-8 and webcasts for grades 9. Lessons
are broken down by grades (K-8) and each
grade’s lesson focuses on a different topic.
19. Additional resources
• James Madison University
(www.jmu.edu/iiia/cybercitz)
– A guide to responsible technology use
– Safety
– Security
– Ethics
20. Additional resources
• NetSmartz Workship (www.netsmartz.org)
– Internet Safety
– Cyber Bullying
– NetSmartz offers free, multimedia Internet
safety presentations for use with children of
all ages and adults. Resources include a Back
to School kit, videos, worksheets and activity
cards on online safety, texting, and
cyberbullying. The NetSmartz Workshop is an
interactive, educational safety resource from
the National Center for Missing and Exploited
Children® (NCMEC) and Boys & Girls Clubs of
America (BGCA).
21. Additional Resources
• Play It CyberSafe
(www.playitcybersafe.com)
– Cyber ethics
– Cyber crime
– The Business Software Alliance has
developed a web site that teaches how to
prevent cyber crime through knowledge of
the law, their rights, and how to avoid
misuse of the Internet.
22. Additional Resources
• WebWise Kids (www.webwisekids.org)
– Online safety
– Cyber security
– Spyware
– Bullying
– Ethics
– Social Networking
– E-mail
– Cell phone dangers
– Emerging technology
– Chat rooms and instant messaging safety
– Personal website Danger Zones
– Web Wise Kids is a unique organization that offers fun, challenging
and interactive simulations based on real-life criminal cases. Each
program has been designed specifically for use with young people
in classrooms and computer labs (special version of the programs
are also available for home use)
Hinweis der Redaktion
PrivacyIn relation to internet use this refers to personal information you are entitled to protect from others accessing online.Social networking sites have special “privacy controls” that all children should set to high so that information they post is only by those they wish to share itChildren’s Online Privacy Protection Act (COPPA)A national law that protects the privacy of children under the age of 13 by requesting parental consent for the collection or use of any personal information of the usersCyber Safety ContractA contract you design with your parents or guardian – AND COMMIT TO FOLLOW – that outlines specific rules and guidelines for computer use in the home, at school, or at another locationC3 StrategyThe three key components all Internet users should understand and promise to use whenever they go online so keep themselves, others, and their computer safe!Cyber SecurityCyber SafetyCyber Ethics
Cyber Smart CitizenA computer user who follows all of the C3 Concepts and commits to always acting safely, ethically, and responsibly while using the InternetCopyright LawsLaws that protect the online material of a creator or composer from a computer user illegally downloading, copying, scanning or otherwise distributing their material without prior approval or consentIllegal DownloadsInformation (most commonly songs or music) downloaded by an individual either for themselves or to share with others that is not authorized by the original creator or composer’s license.NetiquetteThe informal rules of Internet courtesy, enforced exclusively by other internet users.Digital Citizenship
AdwareA type of software that often comes with free downloads. Some adware displays ads on your computer, while some monitors your computer use (including websites visited) and displays targeted ads based on your use.Anti-virus softwareProtects your computer from viruses that can destroy your data, slow your computer’s performance, cause a crash, or even allow spammers to send email through your account.Browser hijackerA common spyware program that changes your web browser’s home page without the user’s knowledge, even if you change it backExposureWhen sensitive information on your computer is released to someone without authorization