SlideShare ist ein Scribd-Unternehmen logo
1 von 10
An Administrator’s
                      Introduction
                            to
                    Social Networking



California Technology Assistance Project Region 6

April 2, 2009
“The role of school leaders is
         to prepare students for the
          world in which they will
           graduate. Technology is,
            without question, an
        important part of that world.”
National Association of Secondary School Principals

Http://www.principals.org/s_nassp/sec.asp?CID=33&DID=55883
“The publicity about online
        ‘predators’ who prey on naive
          children using trickery and
        violence is largely inaccurate.”


American Psychologist - February/March 2008

Http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/ISTTF_Final_Report.pdf
“54% of grade 7 students were
        victims of traditional bullying
       and less than half that number
             (25%) were victims of
                cyberbullying.”

Computers in Human Behavior - 2007

Http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/ISTTF_Final_Report.pdf
“...most research to date
           focuses on the role of the
          Internet, but mobile phones
         are increasingly playing a role
              in sexual solicitation,
           harassment, and access to
             problematic content.”
Final Report of the Internet Safety Technical Task Force - 2008

Http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/ISTTF_Final_Report.pdf
“How mobile devices are used
            in the United States for
         harassment and solicitations
         requires further examination
         over the next several years as
        these devices are adopted and
          come into mainstream use.”
Final Report of the Internet Safety Technical Task Force - 2008

Http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/ISTTF_Final_Report.pdf
“Research continues to show
       that teens are taking advantage
       of the tools and education that
        have been provided to protect
                    them.”

MySpace Safety, Security, Privacy Statement - 2008

Http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/ISTTF_Final_Report.pdf
“...by means of an electronic
          device, including, but not
      limited to a telephone, wireless
        telephone, or other wireless
            communication device
             computer, or pager.”

California Education Code Section 32261- 2009

Http://leginfo.ca.gov/cgi-bin/waisgate?WAISdocID=547177121+0+0+0&WAISaction=retrieve
Staying Safe at MySpace

    Minimum age for account = 13 years
✤

    ✤ <18 accounts include specific privacy settings


    Uploaded and Linked Images and Videos are reviewed
✤


    Parent concerns to parentcare@myspace.com
✤


    Education concerns to schoolcare@myspace.com
✤

    ✤ 888-309-1312
Resources For Exploration

    CTAP 4 Cybersafety Project
✤

    ✤ www.ctap4.net/projects/cybersafety.html


    Enhancing Child Safety and Online Technologies
✤


    ✤ http://cyber.law.harvard.edu/pubrelease/isttf/


    MySpace Safety Resources
✤

    ✤ www.myspace.com/safety


    YouTube Safety Resources
✤

    ✤ http://help.youtube.com

Weitere ähnliche Inhalte

Was ist angesagt?

Behavior Change Using Social Influences
Behavior Change Using Social InfluencesBehavior Change Using Social Influences
Behavior Change Using Social InfluencesCori Faklaris
 
Internet Safety Technical Task Force Final Report
Internet Safety Technical Task Force Final ReportInternet Safety Technical Task Force Final Report
Internet Safety Technical Task Force Final ReportChris White
 
Gathered information second news story (yikyak)
Gathered information second news story (yikyak)Gathered information second news story (yikyak)
Gathered information second news story (yikyak)shaunaeleacy
 
Wireless Communication and State DOTs
Wireless Communication and State DOTsWireless Communication and State DOTs
Wireless Communication and State DOTsLloyd Brown
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterMark Moran
 
Managing insider threat
Managing insider threatManaging insider threat
Managing insider threatmilliemill
 
Student privacy presentation for class
Student privacy presentation for classStudent privacy presentation for class
Student privacy presentation for classgreti79
 
The Mobile Landscape, Mobile Literacy, and Libraries 2014
The Mobile Landscape, Mobile Literacy, and Libraries 2014The Mobile Landscape, Mobile Literacy, and Libraries 2014
The Mobile Landscape, Mobile Literacy, and Libraries 2014Robin M. Ashford, MSLIS
 
Managing Today's Digital Divide
Managing Today's Digital DivideManaging Today's Digital Divide
Managing Today's Digital DivideStaci Trekles
 
Smartphones
SmartphonesSmartphones
Smartphoneslrmoh1
 
The Future of IT
The Future of ITThe Future of IT
The Future of ITrogowskicr
 
Can social media save kids' lives?
Can social media save kids' lives?Can social media save kids' lives?
Can social media save kids' lives?Securly
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in IndiaDinesh O Bareja
 
ETOM 2011 - State of the (Mobile) Union
ETOM 2011 - State of the (Mobile) UnionETOM 2011 - State of the (Mobile) Union
ETOM 2011 - State of the (Mobile) Unionekunnen
 
Group B Presentation
Group B PresentationGroup B Presentation
Group B Presentationjspartz
 
Encyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety PresentationEncyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety Presentationqgecko
 

Was ist angesagt? (19)

Behavior Change Using Social Influences
Behavior Change Using Social InfluencesBehavior Change Using Social Influences
Behavior Change Using Social Influences
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Internet Safety Technical Task Force Final Report
Internet Safety Technical Task Force Final ReportInternet Safety Technical Task Force Final Report
Internet Safety Technical Task Force Final Report
 
Gathered information second news story (yikyak)
Gathered information second news story (yikyak)Gathered information second news story (yikyak)
Gathered information second news story (yikyak)
 
Keynote EFODL congres
Keynote EFODL congresKeynote EFODL congres
Keynote EFODL congres
 
Wireless Communication and State DOTs
Wireless Communication and State DOTsWireless Communication and State DOTs
Wireless Communication and State DOTs
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the Filter
 
Managing insider threat
Managing insider threatManaging insider threat
Managing insider threat
 
Student privacy presentation for class
Student privacy presentation for classStudent privacy presentation for class
Student privacy presentation for class
 
The Mobile Landscape, Mobile Literacy, and Libraries 2014
The Mobile Landscape, Mobile Literacy, and Libraries 2014The Mobile Landscape, Mobile Literacy, and Libraries 2014
The Mobile Landscape, Mobile Literacy, and Libraries 2014
 
Managing Today's Digital Divide
Managing Today's Digital DivideManaging Today's Digital Divide
Managing Today's Digital Divide
 
Smartphones
SmartphonesSmartphones
Smartphones
 
Cloud computing advances in 2020
Cloud computing advances in 2020Cloud computing advances in 2020
Cloud computing advances in 2020
 
The Future of IT
The Future of ITThe Future of IT
The Future of IT
 
Can social media save kids' lives?
Can social media save kids' lives?Can social media save kids' lives?
Can social media save kids' lives?
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in India
 
ETOM 2011 - State of the (Mobile) Union
ETOM 2011 - State of the (Mobile) UnionETOM 2011 - State of the (Mobile) Union
ETOM 2011 - State of the (Mobile) Union
 
Group B Presentation
Group B PresentationGroup B Presentation
Group B Presentation
 
Encyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety PresentationEncyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety Presentation
 

Andere mochten auch

Andere mochten auch (6)

Broadcasting Learning from Your Classroom with GarageBand
Broadcasting Learning from Your Classroom with GarageBandBroadcasting Learning from Your Classroom with GarageBand
Broadcasting Learning from Your Classroom with GarageBand
 
Prueba
PruebaPrueba
Prueba
 
About us section
About us sectionAbout us section
About us section
 
Power Point2i Pod
Power Point2i PodPower Point2i Pod
Power Point2i Pod
 
Fotos Gregory Colbert
Fotos Gregory ColbertFotos Gregory Colbert
Fotos Gregory Colbert
 
Venise Carnaval2008 Jd
Venise Carnaval2008 JdVenise Carnaval2008 Jd
Venise Carnaval2008 Jd
 

Ähnlich wie Presenting an Administrator's Introduction to Social Networking

Student privacy presentation
Student privacy presentationStudent privacy presentation
Student privacy presentationgreti79
 
Student privacy presentation
Student privacy presentationStudent privacy presentation
Student privacy presentationgreti79
 
Student privacy presentation
Student privacy presentationStudent privacy presentation
Student privacy presentationgreti79
 
Appleton Opening
Appleton OpeningAppleton Opening
Appleton Openingelizkeren
 
Madison Opening
Madison OpeningMadison Opening
Madison Openingelizkeren
 
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...IRJET Journal
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdfmeetsolanki44
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymegbg
 
Madison Opening
Madison OpeningMadison Opening
Madison Openingelizkeren
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
 
Student Privacy June 1, 2010
Student Privacy June 1, 2010Student Privacy June 1, 2010
Student Privacy June 1, 2010greti79
 
MISD Cyber Safety
MISD Cyber Safety MISD Cyber Safety
MISD Cyber Safety edtecher
 
The Hidden Dangers of Social Networks: You can log-on but you cannot hide
The Hidden Dangers of Social Networks: You can log-on but you cannot hideThe Hidden Dangers of Social Networks: You can log-on but you cannot hide
The Hidden Dangers of Social Networks: You can log-on but you cannot hidelisbk
 
IRJET- Review on Cyber Security Situational Awareness among Parents
IRJET- Review on Cyber Security Situational Awareness among ParentsIRJET- Review on Cyber Security Situational Awareness among Parents
IRJET- Review on Cyber Security Situational Awareness among ParentsIRJET Journal
 
Data Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALData Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALJoseph White MPA CPM
 
Parent meeting
Parent meetingParent meeting
Parent meetinglightb
 
Crowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber SpeedCrowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber Speedjcichelli
 

Ähnlich wie Presenting an Administrator's Introduction to Social Networking (20)

Student privacy presentation
Student privacy presentationStudent privacy presentation
Student privacy presentation
 
Student privacy presentation
Student privacy presentationStudent privacy presentation
Student privacy presentation
 
Student privacy presentation
Student privacy presentationStudent privacy presentation
Student privacy presentation
 
Appleton Opening
Appleton OpeningAppleton Opening
Appleton Opening
 
Madison Opening
Madison OpeningMadison Opening
Madison Opening
 
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Madison Opening
Madison OpeningMadison Opening
Madison Opening
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
Secure Web Apps Training at Corporate College
Secure Web Apps Training at Corporate CollegeSecure Web Apps Training at Corporate College
Secure Web Apps Training at Corporate College
 
Security Firm Program - Corporate College
Security Firm Program - Corporate CollegeSecurity Firm Program - Corporate College
Security Firm Program - Corporate College
 
Student Privacy June 1, 2010
Student Privacy June 1, 2010Student Privacy June 1, 2010
Student Privacy June 1, 2010
 
MISD Cyber Safety
MISD Cyber Safety MISD Cyber Safety
MISD Cyber Safety
 
Doc handout
Doc handoutDoc handout
Doc handout
 
The Hidden Dangers of Social Networks: You can log-on but you cannot hide
The Hidden Dangers of Social Networks: You can log-on but you cannot hideThe Hidden Dangers of Social Networks: You can log-on but you cannot hide
The Hidden Dangers of Social Networks: You can log-on but you cannot hide
 
IRJET- Review on Cyber Security Situational Awareness among Parents
IRJET- Review on Cyber Security Situational Awareness among ParentsIRJET- Review on Cyber Security Situational Awareness among Parents
IRJET- Review on Cyber Security Situational Awareness among Parents
 
Data Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALData Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINAL
 
Parent meeting
Parent meetingParent meeting
Parent meeting
 
Crowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber SpeedCrowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber Speed
 

Kürzlich hochgeladen

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 

Kürzlich hochgeladen (20)

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

Presenting an Administrator's Introduction to Social Networking

  • 1. An Administrator’s Introduction to Social Networking California Technology Assistance Project Region 6 April 2, 2009
  • 2. “The role of school leaders is to prepare students for the world in which they will graduate. Technology is, without question, an important part of that world.” National Association of Secondary School Principals Http://www.principals.org/s_nassp/sec.asp?CID=33&DID=55883
  • 3. “The publicity about online ‘predators’ who prey on naive children using trickery and violence is largely inaccurate.” American Psychologist - February/March 2008 Http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/ISTTF_Final_Report.pdf
  • 4. “54% of grade 7 students were victims of traditional bullying and less than half that number (25%) were victims of cyberbullying.” Computers in Human Behavior - 2007 Http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/ISTTF_Final_Report.pdf
  • 5. “...most research to date focuses on the role of the Internet, but mobile phones are increasingly playing a role in sexual solicitation, harassment, and access to problematic content.” Final Report of the Internet Safety Technical Task Force - 2008 Http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/ISTTF_Final_Report.pdf
  • 6. “How mobile devices are used in the United States for harassment and solicitations requires further examination over the next several years as these devices are adopted and come into mainstream use.” Final Report of the Internet Safety Technical Task Force - 2008 Http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/ISTTF_Final_Report.pdf
  • 7. “Research continues to show that teens are taking advantage of the tools and education that have been provided to protect them.” MySpace Safety, Security, Privacy Statement - 2008 Http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/ISTTF_Final_Report.pdf
  • 8. “...by means of an electronic device, including, but not limited to a telephone, wireless telephone, or other wireless communication device computer, or pager.” California Education Code Section 32261- 2009 Http://leginfo.ca.gov/cgi-bin/waisgate?WAISdocID=547177121+0+0+0&WAISaction=retrieve
  • 9. Staying Safe at MySpace Minimum age for account = 13 years ✤ ✤ <18 accounts include specific privacy settings Uploaded and Linked Images and Videos are reviewed ✤ Parent concerns to parentcare@myspace.com ✤ Education concerns to schoolcare@myspace.com ✤ ✤ 888-309-1312
  • 10. Resources For Exploration CTAP 4 Cybersafety Project ✤ ✤ www.ctap4.net/projects/cybersafety.html Enhancing Child Safety and Online Technologies ✤ ✤ http://cyber.law.harvard.edu/pubrelease/isttf/ MySpace Safety Resources ✤ ✤ www.myspace.com/safety YouTube Safety Resources ✤ ✤ http://help.youtube.com

Hinweis der Redaktion