SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Sexting & Cyberbullying
 SAFETY



EDUC W200 Week 13
SEXTING AND CELL PHONE POLICY



EDUC W200 Week 13
HAVE YOU SEXTED?

• Sexting : sending and receiving sexually
  explicit cell phone photos




 EDUC W200 Week 13
WHAT ARE THE POTENTIAL CONSEQUENCES OF
THIS ACTIVITY?
 Hope’s story
                       6 teens charged in sexting case




                                Ally's Story

 EDUC W200 Week 13
CAN’T WE DO ANYTHING ABOUT IT?
 •   Parental Controls




 •   The apps for parental monitoring:
     o Web Safety, Inc.’s “Cell Safety”
     o GOGOSTAT
     o uKnowKids
 DEMO:
 • iOS: Understanding Restrictions (Parental Controls for ipad, iphone,
    ipod touch)

 EDUC W200 Week 13
THE MOM CONTRACT




                     Video link
 EDUC W200 Week 13
CLASS PREP Q1&Q2 DISCUSSION

• What role should the school have regarding to
  online arguments, and issues such as that
  experienced by Ryan Halligan?

• STUDENTS’ IDEAS




http://www.indiana.edu/~educw200/week13.html

  EDUC W200 Week 13
CYBERBULLYING




EDUC W200 Week 13
CYBERBULLYING STORIES



                           Girls accused of cyber-bullying
                           classmate on Instagram




Amanda’s story



                        What a bullied life looks like

 EDUC W200 Week 13
TECHNOLOGY FUELS CYBERBULLYING




 EDUC W200 Week 13
DISCUSSION

• Some high school students created a “We hate
  Ashley” profile on a popular social networking
  profile. On this “slam book” profile, they have
  posted cruel and vicious comments about
  Ashley. They invite students to send Ashley
  email messages telling her how ugly she is and
  how no one likes her.
• Have you ever heard of any similar stories?

 EDUC W200 Week 13
SOME SIGNS A CHILD IS BEING BULLIED

•    Withdrawal
•    Drop in grades
•    Lost or destroyed clothing, books, electronics, or jewelry
•    Sudden loss of friends
•    Avoidance of school and other activities
•    Bruises or Unexplainable injuries
•    Need for extra money or supplies
•    Self-destructive behaviors such as running away from home,
     harming themselves, or talking about suicide


                           Source:1.National Crime Prevention Council “Spot the clues””
                        2. http://www.stopbullying.gov/at-risk/warning-signs/index.html

    EDUC W200 Week 13
WHAT SCHOOL & PARENTS CAN DO?

• Schools:
  o School Messenger's Anonymous
    Communication “Talk About It”
  o Social Net Watcher
  o What about your school? Did they do something to
    prevent bullying?
• Parents
  o Parenting Suggestions Regarding Technology
  o Resources for prarents
 EDUC W200 Week 13
TALKING A STAND AGAINST BULLYING




 EDUC W200 Week 13                 Video link

Weitere ähnliche Inhalte

Was ist angesagt?

Digital Shepherds Presents: Parenting in the Digital Age
Digital Shepherds Presents: Parenting in the Digital AgeDigital Shepherds Presents: Parenting in the Digital Age
Digital Shepherds Presents: Parenting in the Digital AgeTshaka Armstrong
 
Dean Washington Keynote
Dean Washington KeynoteDean Washington Keynote
Dean Washington KeynoteClaire LaBeaux
 
Generation Next- Keeping Kids Safe Online
Generation Next- Keeping Kids Safe OnlineGeneration Next- Keeping Kids Safe Online
Generation Next- Keeping Kids Safe Onlinemarkfash
 
Tech For Teachers In 30 Seconds
Tech For Teachers In 30 SecondsTech For Teachers In 30 Seconds
Tech For Teachers In 30 SecondsRichard Voltz
 
Parenting In A Media Driven World Slideshare
Parenting In A Media Driven World SlideshareParenting In A Media Driven World Slideshare
Parenting In A Media Driven World Slidesharechrisweber
 

Was ist angesagt? (7)

Artsonia so much more
Artsonia so much moreArtsonia so much more
Artsonia so much more
 
Digital Shepherds Presents: Parenting in the Digital Age
Digital Shepherds Presents: Parenting in the Digital AgeDigital Shepherds Presents: Parenting in the Digital Age
Digital Shepherds Presents: Parenting in the Digital Age
 
Dean Washington Keynote
Dean Washington KeynoteDean Washington Keynote
Dean Washington Keynote
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Generation Next- Keeping Kids Safe Online
Generation Next- Keeping Kids Safe OnlineGeneration Next- Keeping Kids Safe Online
Generation Next- Keeping Kids Safe Online
 
Tech For Teachers In 30 Seconds
Tech For Teachers In 30 SecondsTech For Teachers In 30 Seconds
Tech For Teachers In 30 Seconds
 
Parenting In A Media Driven World Slideshare
Parenting In A Media Driven World SlideshareParenting In A Media Driven World Slideshare
Parenting In A Media Driven World Slideshare
 

Andere mochten auch

Week 13 w200_spring2013_part4
Week 13 w200_spring2013_part4Week 13 w200_spring2013_part4
Week 13 w200_spring2013_part4educw200
 
Week 13 w200_spring2013_part5
Week 13 w200_spring2013_part5Week 13 w200_spring2013_part5
Week 13 w200_spring2013_part5educw200
 
Week 13 w200_spring2013_part7
Week 13 w200_spring2013_part7Week 13 w200_spring2013_part7
Week 13 w200_spring2013_part7educw200
 
Kazakhstan regulatory documents 104
Kazakhstan regulatory documents 104Kazakhstan regulatory documents 104
Kazakhstan regulatory documents 104Angelo Ratliff
 
Week 13 w200_spring2013_part8
Week 13 w200_spring2013_part8Week 13 w200_spring2013_part8
Week 13 w200_spring2013_part8educw200
 
Kazakhstan regulatory laws 135
Kazakhstan regulatory laws 135Kazakhstan regulatory laws 135
Kazakhstan regulatory laws 135Angelo Ratliff
 
Week 13 w200_spring2013_part3
Week 13 w200_spring2013_part3Week 13 w200_spring2013_part3
Week 13 w200_spring2013_part3educw200
 
El cómic: un mundo en viñetas
El cómic: un mundo en viñetasEl cómic: un mundo en viñetas
El cómic: un mundo en viñetasArte_Factory
 
Corporate Security Workforce Locator for Personnel
Corporate Security Workforce Locator for PersonnelCorporate Security Workforce Locator for Personnel
Corporate Security Workforce Locator for PersonnelAndrew Dailey, CPP
 
Presentación1
Presentación1Presentación1
Presentación1Sai Leon
 
Med safety nj ph a 10 10 11 final 3 (97-2003)
Med safety nj ph a 10 10 11 final 3 (97-2003)Med safety nj ph a 10 10 11 final 3 (97-2003)
Med safety nj ph a 10 10 11 final 3 (97-2003)Shaukat Patel MS R.Ph.
 
Medication errors powerpoint
Medication errors powerpointMedication errors powerpoint
Medication errors powerpointlexie_daryan
 
Lecture patient safety
Lecture patient safetyLecture patient safety
Lecture patient safetyRenelda Tugade
 
Urainski narodni kazky
Urainski narodni kazkyUrainski narodni kazky
Urainski narodni kazkyAlexey Kostyk
 

Andere mochten auch (20)

Week 13 w200_spring2013_part4
Week 13 w200_spring2013_part4Week 13 w200_spring2013_part4
Week 13 w200_spring2013_part4
 
Week 13 w200_spring2013_part5
Week 13 w200_spring2013_part5Week 13 w200_spring2013_part5
Week 13 w200_spring2013_part5
 
Week 13 w200_spring2013_part7
Week 13 w200_spring2013_part7Week 13 w200_spring2013_part7
Week 13 w200_spring2013_part7
 
Kazakhstan regulatory documents 104
Kazakhstan regulatory documents 104Kazakhstan regulatory documents 104
Kazakhstan regulatory documents 104
 
Week 13 w200_spring2013_part8
Week 13 w200_spring2013_part8Week 13 w200_spring2013_part8
Week 13 w200_spring2013_part8
 
Kazakhstan regulatory laws 135
Kazakhstan regulatory laws 135Kazakhstan regulatory laws 135
Kazakhstan regulatory laws 135
 
Week 13 w200_spring2013_part3
Week 13 w200_spring2013_part3Week 13 w200_spring2013_part3
Week 13 w200_spring2013_part3
 
Exámenes
ExámenesExámenes
Exámenes
 
El cómic: un mundo en viñetas
El cómic: un mundo en viñetasEl cómic: un mundo en viñetas
El cómic: un mundo en viñetas
 
Corporate Security Workforce Locator for Personnel
Corporate Security Workforce Locator for PersonnelCorporate Security Workforce Locator for Personnel
Corporate Security Workforce Locator for Personnel
 
Presentación1
Presentación1Presentación1
Presentación1
 
Técnicas narrativas
Técnicas narrativasTécnicas narrativas
Técnicas narrativas
 
Med safety nj ph a 10 10 11 final 3 (97-2003)
Med safety nj ph a 10 10 11 final 3 (97-2003)Med safety nj ph a 10 10 11 final 3 (97-2003)
Med safety nj ph a 10 10 11 final 3 (97-2003)
 
Global communication
Global communication Global communication
Global communication
 
Medication errors powerpoint
Medication errors powerpointMedication errors powerpoint
Medication errors powerpoint
 
Lecture patient safety
Lecture patient safetyLecture patient safety
Lecture patient safety
 
Medication error
Medication errorMedication error
Medication error
 
ALLA ROADS LEAD TO ROME
ALLA ROADS LEAD TO ROMEALLA ROADS LEAD TO ROME
ALLA ROADS LEAD TO ROME
 
Epae 09367
Epae 09367Epae 09367
Epae 09367
 
Urainski narodni kazky
Urainski narodni kazkyUrainski narodni kazky
Urainski narodni kazky
 

Ähnlich wie Week 13 w200_spring2013_part6

Sexting & cyberbullying
Sexting & cyberbullyingSexting & cyberbullying
Sexting & cyberbullyingeducw200
 
Your digital footprint
Your digital footprintYour digital footprint
Your digital footprintdsansford
 
Cyber Bulling On School Grounds
Cyber Bulling On School GroundsCyber Bulling On School Grounds
Cyber Bulling On School Groundskerr1va
 
Sp13 w200-w11-sl
Sp13 w200-w11-slSp13 w200-w11-sl
Sp13 w200-w11-sleducw200
 
Week 13 part 5
Week 13 part 5Week 13 part 5
Week 13 part 5educw200
 
Week 13 part5
Week 13 part5Week 13 part5
Week 13 part5educw200
 
6 8-unit3-cyberbullyingcrossingtheline
6 8-unit3-cyberbullyingcrossingtheline6 8-unit3-cyberbullyingcrossingtheline
6 8-unit3-cyberbullyingcrossingthelinesgarza05
 
Blue Whale Challenge Awareness
Blue Whale Challenge Awareness Blue Whale Challenge Awareness
Blue Whale Challenge Awareness awanadil
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010paul
 
Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)Bex Lewis
 
Week 13 part 6
Week 13 part 6Week 13 part 6
Week 13 part 6educw200
 
Iowa Bullying Prevention
Iowa Bullying Prevention Iowa Bullying Prevention
Iowa Bullying Prevention emilyensign
 
Bully presentation family_meeting_final
Bully presentation family_meeting_finalBully presentation family_meeting_final
Bully presentation family_meeting_finalJake Boula
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullyinganwidener
 
Effective Communication & Discipline Matters for Aspiring Administrators
Effective Communication & Discipline Matters for Aspiring AdministratorsEffective Communication & Discipline Matters for Aspiring Administrators
Effective Communication & Discipline Matters for Aspiring AdministratorsDr. Gregory A. McCord
 
Youth And Social Media: It's All About Them
Youth And Social Media: It's All About ThemYouth And Social Media: It's All About Them
Youth And Social Media: It's All About ThemLaura Solomon
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 
The ABCs Of Facebook
The ABCs Of FacebookThe ABCs Of Facebook
The ABCs Of FacebookAmy P
 

Ähnlich wie Week 13 w200_spring2013_part6 (20)

Sexting & cyberbullying
Sexting & cyberbullyingSexting & cyberbullying
Sexting & cyberbullying
 
Your digital footprint
Your digital footprintYour digital footprint
Your digital footprint
 
Cyber Bulling On School Grounds
Cyber Bulling On School GroundsCyber Bulling On School Grounds
Cyber Bulling On School Grounds
 
Sp13 w200-w11-sl
Sp13 w200-w11-slSp13 w200-w11-sl
Sp13 w200-w11-sl
 
Week 13 part 5
Week 13 part 5Week 13 part 5
Week 13 part 5
 
Week 13 part5
Week 13 part5Week 13 part5
Week 13 part5
 
6 8-unit3-cyberbullyingcrossingtheline
6 8-unit3-cyberbullyingcrossingtheline6 8-unit3-cyberbullyingcrossingtheline
6 8-unit3-cyberbullyingcrossingtheline
 
Blue Whale Challenge Awareness
Blue Whale Challenge Awareness Blue Whale Challenge Awareness
Blue Whale Challenge Awareness
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010
 
Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)Children, Church and the Digital Age (#DigitalParenting with @drbexl)
Children, Church and the Digital Age (#DigitalParenting with @drbexl)
 
Week 13 part 6
Week 13 part 6Week 13 part 6
Week 13 part 6
 
Iowa Bullying Prevention
Iowa Bullying Prevention Iowa Bullying Prevention
Iowa Bullying Prevention
 
Bully presentation family_meeting_final
Bully presentation family_meeting_finalBully presentation family_meeting_final
Bully presentation family_meeting_final
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Cyber-bullying
Cyber-bullyingCyber-bullying
Cyber-bullying
 
Effective Communication & Discipline Matters for Aspiring Administrators
Effective Communication & Discipline Matters for Aspiring AdministratorsEffective Communication & Discipline Matters for Aspiring Administrators
Effective Communication & Discipline Matters for Aspiring Administrators
 
Youth And Social Media: It's All About Them
Youth And Social Media: It's All About ThemYouth And Social Media: It's All About Them
Youth And Social Media: It's All About Them
 
Youth And Social Media: It's All About Them
Youth And Social Media: It's All About ThemYouth And Social Media: It's All About Them
Youth And Social Media: It's All About Them
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
The ABCs Of Facebook
The ABCs Of FacebookThe ABCs Of Facebook
The ABCs Of Facebook
 

Mehr von educw200

8. tip 1 week 1
8. tip 1 week 18. tip 1 week 1
8. tip 1 week 1educw200
 
5. course overview and purpose week 1
5. course overview and purpose week 15. course overview and purpose week 1
5. course overview and purpose week 1educw200
 
10. what's due week 1
10. what's due week 110. what's due week 1
10. what's due week 1educw200
 
9. digital story week 1
9. digital story week 19. digital story week 1
9. digital story week 1educw200
 
7. create accounts week 1
7. create accounts week 17. create accounts week 1
7. create accounts week 1educw200
 
6. shift week 1
6. shift week 16. shift week 1
6. shift week 1educw200
 
3. course expectations week 1
3. course expectations week 13. course expectations week 1
3. course expectations week 1educw200
 
2. today's agenda week 1
2. today's agenda week 12. today's agenda week 1
2. today's agenda week 1educw200
 
4. ttl week 1
4. ttl week 14. ttl week 1
4. ttl week 1educw200
 
9. digital story week 1
9. digital story week 19. digital story week 1
9. digital story week 1educw200
 
10. what's due week 1
10. what's due week 110. what's due week 1
10. what's due week 1educw200
 
7. create accounts week 1
7. create accounts week 17. create accounts week 1
7. create accounts week 1educw200
 
8. tip 1 week 1
8. tip 1 week 18. tip 1 week 1
8. tip 1 week 1educw200
 
4. ttl week 1
4. ttl week 14. ttl week 1
4. ttl week 1educw200
 
2. today's agenda week 1
2. today's agenda week 12. today's agenda week 1
2. today's agenda week 1educw200
 
3. course expectations week 1
3. course expectations week 13. course expectations week 1
3. course expectations week 1educw200
 
5. course overview and purpose week 1
5. course overview and purpose week 15. course overview and purpose week 1
5. course overview and purpose week 1educw200
 
6. shift week 1
6. shift week 16. shift week 1
6. shift week 1educw200
 

Mehr von educw200 (20)

8. tip 1 week 1
8. tip 1 week 18. tip 1 week 1
8. tip 1 week 1
 
5. course overview and purpose week 1
5. course overview and purpose week 15. course overview and purpose week 1
5. course overview and purpose week 1
 
10. what's due week 1
10. what's due week 110. what's due week 1
10. what's due week 1
 
9. digital story week 1
9. digital story week 19. digital story week 1
9. digital story week 1
 
7. create accounts week 1
7. create accounts week 17. create accounts week 1
7. create accounts week 1
 
6. shift week 1
6. shift week 16. shift week 1
6. shift week 1
 
3. course expectations week 1
3. course expectations week 13. course expectations week 1
3. course expectations week 1
 
2. today's agenda week 1
2. today's agenda week 12. today's agenda week 1
2. today's agenda week 1
 
4. ttl week 1
4. ttl week 14. ttl week 1
4. ttl week 1
 
Shift 3
Shift 3Shift 3
Shift 3
 
9. digital story week 1
9. digital story week 19. digital story week 1
9. digital story week 1
 
10. what's due week 1
10. what's due week 110. what's due week 1
10. what's due week 1
 
7. create accounts week 1
7. create accounts week 17. create accounts week 1
7. create accounts week 1
 
8. tip 1 week 1
8. tip 1 week 18. tip 1 week 1
8. tip 1 week 1
 
4. ttl week 1
4. ttl week 14. ttl week 1
4. ttl week 1
 
2. today's agenda week 1
2. today's agenda week 12. today's agenda week 1
2. today's agenda week 1
 
3. course expectations week 1
3. course expectations week 13. course expectations week 1
3. course expectations week 1
 
5. course overview and purpose week 1
5. course overview and purpose week 15. course overview and purpose week 1
5. course overview and purpose week 1
 
6. shift week 1
6. shift week 16. shift week 1
6. shift week 1
 
8. tip#15
8. tip#158. tip#15
8. tip#15
 

Kürzlich hochgeladen

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 

Kürzlich hochgeladen (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 

Week 13 w200_spring2013_part6

  • 1. Sexting & Cyberbullying SAFETY EDUC W200 Week 13
  • 2. SEXTING AND CELL PHONE POLICY EDUC W200 Week 13
  • 3. HAVE YOU SEXTED? • Sexting : sending and receiving sexually explicit cell phone photos EDUC W200 Week 13
  • 4. WHAT ARE THE POTENTIAL CONSEQUENCES OF THIS ACTIVITY? Hope’s story 6 teens charged in sexting case Ally's Story EDUC W200 Week 13
  • 5. CAN’T WE DO ANYTHING ABOUT IT? • Parental Controls • The apps for parental monitoring: o Web Safety, Inc.’s “Cell Safety” o GOGOSTAT o uKnowKids DEMO: • iOS: Understanding Restrictions (Parental Controls for ipad, iphone, ipod touch) EDUC W200 Week 13
  • 6. THE MOM CONTRACT Video link EDUC W200 Week 13
  • 7. CLASS PREP Q1&Q2 DISCUSSION • What role should the school have regarding to online arguments, and issues such as that experienced by Ryan Halligan? • STUDENTS’ IDEAS http://www.indiana.edu/~educw200/week13.html EDUC W200 Week 13
  • 9. CYBERBULLYING STORIES Girls accused of cyber-bullying classmate on Instagram Amanda’s story What a bullied life looks like EDUC W200 Week 13
  • 10. TECHNOLOGY FUELS CYBERBULLYING EDUC W200 Week 13
  • 11. DISCUSSION • Some high school students created a “We hate Ashley” profile on a popular social networking profile. On this “slam book” profile, they have posted cruel and vicious comments about Ashley. They invite students to send Ashley email messages telling her how ugly she is and how no one likes her. • Have you ever heard of any similar stories? EDUC W200 Week 13
  • 12. SOME SIGNS A CHILD IS BEING BULLIED • Withdrawal • Drop in grades • Lost or destroyed clothing, books, electronics, or jewelry • Sudden loss of friends • Avoidance of school and other activities • Bruises or Unexplainable injuries • Need for extra money or supplies • Self-destructive behaviors such as running away from home, harming themselves, or talking about suicide Source:1.National Crime Prevention Council “Spot the clues”” 2. http://www.stopbullying.gov/at-risk/warning-signs/index.html EDUC W200 Week 13
  • 13. WHAT SCHOOL & PARENTS CAN DO? • Schools: o School Messenger's Anonymous Communication “Talk About It” o Social Net Watcher o What about your school? Did they do something to prevent bullying? • Parents o Parenting Suggestions Regarding Technology o Resources for prarents EDUC W200 Week 13
  • 14. TALKING A STAND AGAINST BULLYING EDUC W200 Week 13 Video link

Hinweis der Redaktion

  1. Add clicker question- have you sexting?Change the studyof sextingPoll: Have you sexted?infograohic source: http://visual.ly/truth-about-teen-sextingStatistics from: http://www.covenanteyes.com/2012/01/10/sexting-statistics-what-do-the-surveys-say/Some companies, such as WebSafety Inc., have developed software that parents can use to monitor certain activity on cell phones and computers. They can, for instance, block X-rated texting terms or be alerted when their child is using them, says Mike Adler, the company's CEO. Photos are trickier, though, and often require a parent to manually check a child's phone. According to a 2008 survey by CosmoGirl.com and The National Campaign to Prevent Teen and Unplanned Pregnancy (http://www.thenationalcampaign.org/sextech/PDF/SexTech_Summary.pdf), 20 percent of the 653 teens who responded to the survey said they had sent nude or semi-nude photos of themselves via cell phone. Thirty-eight percent of girls and 39 percent of boys surveyed reported having seen a nude or semi-nude image that had originally been sent to someone else.So she reminds her young patients: "Even though it seems like fun and so exciting right now, that person may not always feel the same way about you. And you may not feel the same way about that person either." WHAT ARE SOME EXAMPLES OF SEXTING?A few middle school girls are at a slumber party and use their cell phones to take and send topless photos of themselves to their friends. A high school boy e-mails a nude photo of himself to a high school girl he met on a social networking website.WHAT ARE SOME EXAMPLES OF SEXTING THAT CLEARLY INDICATE ILLEGAL CONDUCT?A high school boy sends a partially nude photo of himself to his high school girlfriend. When they break up a few months later, she forwards the photo to all of her friends. A high school junior tells a freshman girl that he will take her to the prom if she sends him sexually explicit photos of herself. Because she wants to attend the prom, she uses a digital camera to take partially nude photos of herself and e-mails them to the boy.
  2. Choose one of the videos to show. The right video: http://www.kcci.com/news/central-iowa/6-teens-charged-in-sexting-case/-/9357080/17484238/-/95e5u2/-/index.html6 teens charged in sexting caseA teen girl taking her own picture with a cellphone and sending it to a teenage boy at Independence Junior/Senior High School in Independence. He forwarded it to several friends, who sent it on to several others.-------------------------The middle video: http://www.commonsensemedia.org/videos/allys-story-video-second-thoughts-on-sextingAlly's Story Video - Second Thoughts on SextingProfiles a high school sophomore who suffers the consequences of sending naked photos, or sexts, to her ex-boyfriend.-------------------------The leftvideo: CNN's Randi Kaye has the story of Hope Witsell, a 13-year-old girl who committed suicide after being bullied.------------------------This is something could affect your life in the future. Maybe the kids see this just for fun, but they don’t know how serious it is. You as a teacher, you need to help your students be aware of this.
  3. Related news: http://www.cnn.com/2013/01/03/tech/mobile/snapchat/?hpt=te_t1Snapchat is a mobile app which lets users share images or videos that disappear after a few seconds. Not bad for a mobile tool which, rightly or wrongly, is often cited for one very specific ability -- the "sexting" of naughty images to other users. In an age when young people are constantly being warned not to post inappropriate things online, Snapchat offers a degree of freedom by letting users share unfiltered thoughts or images without much fear of reprisal.Snapchat users may think their naughty images will never come back to haunt them. But people can still grab screenshots from their phones, even though both Snapchat and Facebook Poke notify the sender if the recipient of an image takes a shot of it.
  4. The left image: Apple Patents Technology that May Stop Sexting by KidsThe right image:My Mobile Watchdog - parental controls for the cell phoneWeb Safety, Inc.’s “Cell Safety”: An application for smart phones designed to help parents monitor their child’s cell phone activity. Parents receive alerts when their children are sent certain problematic keywords (which, Web Safety says, is the world’s largest database of its kind, with 4,000 terms that “indicate a child is in harm’s way.”) Cell Safety also features a slew of other child-monitoring tools, from GPS tracking to one that prevents texting while driving.GoGoStat Parental Guidance: The GoGoStat iPhone app was developed by Schakra, one of the sponsors of the International Bullying Prevention Association Conference, and alerts parents when kids post or receive inappropriate messages, displays the age and location of anyone their child intends to friend on Facebook, and has a panic button feature that automatically sends a report to the police in case of emergency.AI demo how to do thisApple IOS :Parents can enable Restrictionson an iPhone, iPad, or iPod touch to prevent access to specific features. Learn more about the types of Restrictions that are available, as well as how to enable or disable Restrictions on your device.
  5. BYOD(BRING YOUR OWN DEVICES)-ask students about this issue from a teacher perspective, how many of you have smartphoneMom Has Son Sign 18-point Agreement for iPhonenews: http://abcnews.go.com/US/massachusetts-mom-son-sign-18-point-agreement-iphone/story?id=18094401#.UOUYU4njnfc
  6. After viewing the video about Ryan Halligan's ordeal and considering last week's topics of online behavior, is there a balance that could have prevented this? What do you think of the potential of programs like Stop, Block, and Tell? What aspects of it do you feel would be the most and least successful? Considering the different online and offline aspects of the MySpace fight, which areas do you feel the school has jurisdiction?-What the school should do about this? Awareness, support, report systems, policy: the procedure, even outside the school, the consequencesIf it is not happen in school, what should school do? http://www.indiana.edu/~educw200/week13.html
  7. http://www.stopbullying.gov/cyberbullying/what-is-it/index.html
  8. Left video:Amanda Todd committed suicide on October 10, 2012 at her home in Port Coquitlam, British Columbia, Canada. Prior to her death, Todd posted a video on YouTube in which she used a series of flash cards to tell of her experience of being blackmailed, bullied, and physically assaulted. News source: http://www.nydailynews.com/news/world/cyberbullied-teen-commits-suicide-article-1.1181875http://abcnews.go.com/International/bullied-teen-amanda-todd-leaves-chilling-youtube-video/story?id=17463266#.UOUPaInjnfcAmanda’s original video: http://www.youtube.com/watch?feature=player_embedded&v=vOHXGNx-E7E--------Right up video: several girls allegedly hacked a social media site of a 12-year-old Jefferson School student and injected "sexually derogatory information" on the account.News source: http://www.latimes.com/local/lanow/la-me-ln-girls-accused-of-cyberbullying-classmate-on-instagram-20130328,0,7433474.story--------Right bottom video: cbs news what a bullied life looks likehttp://www.cbsnews.com/8301-500172_162-20107216.htmlThe completeepisode: bullying:wordscankill http://www.cbsnews.com/video/watch/?id=7381364nWhat’s the most important thing that you got from this video?It’s all your fault.Doing nothing can be bad.
  9. infographic source: McAfee, May 3, 2012, http://blogs.mcafee.com/?attachment_id=18245CyberbullyingAlmost 25% of teens claimed to be targets of cyber bullying and 2/3 of all teens have witnessed cruel behavior onlineOnly 10% of parents are aware of their teens are targets of cyber bullyingFacebook has become the new school yard for bullies with 92.6% of teens saying that cruel behavior takes place on Facebook, and 23.8% on Twitter, 17.7% on MySpace and 15.2% via Instant MessengerWhen witnessing others being attacked, 40% of teens have told the person to stop, 21% have told an adult and 6% joined inWhen being attacked themselves, 66% of teens responded to the attacker (with 35% responding in person), 15.4% avoided school, and an alarming 4.5% have been in a physical fight with their attacker
  10. Type in a chat room (anonymous)The following are some examples of cyberbullying and its possible impact at school: In the first incident, there is clearly a significant risk that Ashley will have difficulties in school, resulting in school failure and avoidance. Further, she could respond by attacking the bullies at school or by committing suicide.
  11. http://www.ncpc.org/newsroom/current-campaigns/bully-prevention/spot-the-clues
  12. Other resources: http://www.ryanpatrickhalligan.org/resources/resources.htmSocial net watcher: Once installed, The SoNet App runs inconspicuously in the background of the Facebook page. Any posts that may potentially harm students at school will immediately be forwarded to school administrators for their review. SoNet does not read student’s posts.
  13. After reading about cyber bullying, Jeremiah Anthony, 17, a junior at Iowa City West High School, has taken to social media to tweet daily compliments to his classmates in an effort to build them up. NBC’s Kevin Tibbles reports.http://video.today.msnbc.msn.com/today/50395735#50395735