SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Cyber Safety, Cyber Ethics and
       Cyber Security




  Presented by Dr. Julia VanderMolen
Today’s World
• Full of …
  – wonder
  – fun
  – scary places
  – scary people
• Need to stay safe even when having fun
C3
• Cyber Safety
• Cyber Ethics
• Cyber Security




• Created by the National Cyber Security
  Alliance in Washington, DC
Cyber Safety
• Responsible rules and behaviors designed
  to keep individuals safe whenever
  connected to the Internet
• Ask student what are some examples of
  “safety rules” that parents ask them to
  follow while using the Internet
Cyber Safety Terms
•   Privacy
•   Children’s Online Privacy Protection Act (COPPA)
•   Cyber Safety Contract
•   C3 Strategy
     – The three key components all Internet users should
       understand and promise to use whenever they go
       online so keep themselves, others, and their computer
       safe!
         • Cyber Security
         • Cyber Safety
         • Cyber Ethics
Cyber Ethics
• Informal code of positive conduct used
  whenever someone is using the Internet
• “Doing the right thing even when no one is
  looking or watching”
• Ask students of wise and poor Internet
  use choices and discuss
• What are some good strategies for being a
  good digital citizen who behaves ethically
  online.
Cyber Ethics Terms
•   Cyber Smart Citizen
•   Copyright Laws
•   Illegal Downloads
•   Netiquette
•   Digital Citizenship
Cyber Security
• The protection of information and computer
  systems and networks while connected to the
  Internet
• Common strategies that people use to protect
  their computer and personal information
   –   Antivirus
   –   Firewalls
   –   Malware protection
   –   Never give out personal information
   –   Always use a secure site when doing any
       transactions
• List some security tips that people should know
Cyber Security Terms
•   Adware
•   Anti-virus software
•   Browser hijacker
•   Exposure
“WWW Decision Tool”
• Decision checklist to help reinforce
  strategies to behave responsibly and
  remain safe and secure during all Internet
  activities
  – W – Who is asking for this personal
    information?
  – W – What information is being requested?
  – W – Why do they need this personal
    information?
Terms that to know
• Cyber Ethics
• Cyber Security
• Cyber Safety
National Cyber Security Alliance
              (NCSA)
• A Washington DC based national non-profit
  organization that collaborates with the federal
  government, corporate, non-profit and academic
  sectors, to create a culture of cyber security and
  safety awareness by providing the knowledge
  and tools necessary to prevent cyber crime and
  attacks to ensure that everyone remains safe
  while online.
  www.staysafeonline.org
Let’s do this ourselves
•   Break into groups
•   Each group will have a scenario to read and evaluate
•   Write down your findings
•   Report back to the group
•   Open ended discussion
Additional Sources
• NCSA
  (www.usatodayeducate.com/wordpress/i
  ndex.php/technology-syber-security
  – Cyber security
  – NCSA has teamed up with USA Today
    Education Foundation and the Department of
    Homeland Security to develop four lesson
    plans using recent news stories about cyber
    security issues. These lesson plans are
    targeted to 8th through 12th grade
Additional Resources
• CyberSmart! (www.cybersmart.org)
  – Safety and Security Online
  – Manners, Bullying and Ethics
  – The free CyberSmart! Student Curriculum
    empowers students to use the Internet safely,
    responsibly, and effectively. The free CyberSmart!
    Educator Toolbar puts 21st century skills into
    practice every day, with just-in-time 24/7 access
    to annotated essential resources to support
    student learning.
Additional Resources
• Department of Justice
  (www.cybercrime.gov/rules/lessonplan
  1.htm)
  – The Department of Justice has developed a
    kids page focused on lesson plans for
    elementary and middle school children
Additional resources
• IKEEPSAFE (www.ikeepsafe.org)
  – Internet Keep Safe Coalition – Faux Paw the Techno Cat
  – Internet Safety basics
  – How to handle cyber-bullying
  – Balancing real life with screen time
  – The risks and dangers of downloading
  – The Faux Paw® curriculum is based on research from
    Harvard’s Center on Media and Child Health and
    created in partnership with the iKeepSafe Global
    Research Team, Penn State University Department of
    Education, and the University of Maryland.
  – Most iKeepSafe resources are available for free
    download
Additional Resources
• i-Safe (www.isafe.org)
  –   Personal safety
  –   Predator Identification
  –   Intellectual Property
  –   Cyber Citizenship
  –   Cyber Bullying
  –   i-Safe offers internet safety curriculum for
      grades K-8 and webcasts for grades 9. Lessons
      are broken down by grades (K-8) and each
      grade’s lesson focuses on a different topic.
Additional resources
• James Madison University
  (www.jmu.edu/iiia/cybercitz)
  – A guide to responsible technology use
  – Safety
  – Security
  – Ethics
Additional resources
• NetSmartz Workship (www.netsmartz.org)
  – Internet Safety
  – Cyber Bullying
  – NetSmartz offers free, multimedia Internet
    safety presentations for use with children of
    all ages and adults. Resources include a Back
    to School kit, videos, worksheets and activity
    cards on online safety, texting, and
    cyberbullying. The NetSmartz Workshop is an
    interactive, educational safety resource from
    the National Center for Missing and Exploited
    Children® (NCMEC) and Boys & Girls Clubs of
    America (BGCA).
Additional Resources
• Play It CyberSafe
  (www.playitcybersafe.com)
  – Cyber ethics
  – Cyber crime
  – The Business Software Alliance has
    developed a web site that teaches how to
    prevent cyber crime through knowledge of
    the law, their rights, and how to avoid
    misuse of the Internet.
Additional Resources
• WebWise Kids (www.webwisekids.org)
   –   Online safety
   –   Cyber security
   –   Spyware
   –   Bullying
   –   Ethics
   –   Social Networking
   –   E-mail
   –   Cell phone dangers
   –   Emerging technology
   –   Chat rooms and instant messaging safety
   –   Personal website Danger Zones
   –   Web Wise Kids is a unique organization that offers fun, challenging
       and interactive simulations based on real-life criminal cases. Each
       program has been designed specifically for use with young people
       in classrooms and computer labs (special version of the programs
       are also available for home use)

Weitere ähnliche Inhalte

Was ist angesagt?

Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
Whitney Bolton
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
Hajarul Cikyen
 

Was ist angesagt? (20)

Cyber security-presentation
Cyber security-presentationCyber security-presentation
Cyber security-presentation
 
Krishna cyber safety
Krishna cyber safetyKrishna cyber safety
Krishna cyber safety
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 

Andere mochten auch

Copyright and ethics in relation to the internet
Copyright and ethics in relation to the internetCopyright and ethics in relation to the internet
Copyright and ethics in relation to the internet
Penni Coon
 
BTree, Data Structures
BTree, Data StructuresBTree, Data Structures
BTree, Data Structures
Jibrael Jos
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
ikmal91
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 

Andere mochten auch (20)

Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Copyright and ethics in relation to the internet
Copyright and ethics in relation to the internetCopyright and ethics in relation to the internet
Copyright and ethics in relation to the internet
 
Wireless security
Wireless securityWireless security
Wireless security
 
M tech2
M tech2M tech2
M tech2
 
Design
DesignDesign
Design
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 
BTree, Data Structures
BTree, Data StructuresBTree, Data Structures
BTree, Data Structures
 
B tree
B treeB tree
B tree
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Encryption
EncryptionEncryption
Encryption
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in Education
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 

Ähnlich wie C3 and digital citizenship

Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentation
Sarah Sell
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
Johan Koren
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
emilyensign
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
Johan Koren
 
Promoting and modeling digital citizenship and responsibility no wf
 Promoting and modeling digital citizenship and responsibility no wf Promoting and modeling digital citizenship and responsibility no wf
Promoting and modeling digital citizenship and responsibility no wf
E Robertson
 

Ähnlich wie C3 and digital citizenship (20)

Cybersafety
Cybersafety Cybersafety
Cybersafety
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and Resources
 
Etl523 pres jj jarick
Etl523 pres jj jarickEtl523 pres jj jarick
Etl523 pres jj jarick
 
Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... GloballyProtecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... Globally
 
Course Tech 2013, Mark Ciampa, Helping Students Stay Secure
Course Tech 2013, Mark Ciampa, Helping Students Stay SecureCourse Tech 2013, Mark Ciampa, Helping Students Stay Secure
Course Tech 2013, Mark Ciampa, Helping Students Stay Secure
 
Apps and Young Users.pptx
Apps and Young Users.pptxApps and Young Users.pptx
Apps and Young Users.pptx
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentation
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Promoting and Modeling Digital Citizenship and Responsibility
 Promoting and Modeling Digital Citizenship and Responsibility Promoting and Modeling Digital Citizenship and Responsibility
Promoting and Modeling Digital Citizenship and Responsibility
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
 
DeepNines CIPA Whitepaper
DeepNines CIPA WhitepaperDeepNines CIPA Whitepaper
DeepNines CIPA Whitepaper
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Promoting and modeling digital citizenship and responsibility no wf
 Promoting and modeling digital citizenship and responsibility no wf Promoting and modeling digital citizenship and responsibility no wf
Promoting and modeling digital citizenship and responsibility no wf
 
ICT and young people... the road ahead
ICT and young people... the road aheadICT and young people... the road ahead
ICT and young people... the road ahead
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Common sense ppt
Common sense pptCommon sense ppt
Common sense ppt
 
Esafety in the curriculum October 2014
Esafety in the curriculum October 2014Esafety in the curriculum October 2014
Esafety in the curriculum October 2014
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Safer Internet Day 2023 Know Theme, History, Significance..docx
Safer Internet Day 2023 Know Theme, History, Significance..docxSafer Internet Day 2023 Know Theme, History, Significance..docx
Safer Internet Day 2023 Know Theme, History, Significance..docx
 

Mehr von JuliaHoesingVanderMolen (8)

BITS Session Tools for Creating Audio Lecture
BITS Session Tools for Creating Audio LectureBITS Session Tools for Creating Audio Lecture
BITS Session Tools for Creating Audio Lecture
 
What is the Info on Infographics?
What is the Info on Infographics?What is the Info on Infographics?
What is the Info on Infographics?
 
Flipped Classroom for the Sciences
Flipped Classroom for the SciencesFlipped Classroom for the Sciences
Flipped Classroom for the Sciences
 
MACUL 2013 Bloom’s Taxonomy is Blooming Technology
MACUL 2013 Bloom’s Taxonomy is Blooming TechnologyMACUL 2013 Bloom’s Taxonomy is Blooming Technology
MACUL 2013 Bloom’s Taxonomy is Blooming Technology
 
Blooming with Technology
Blooming with TechnologyBlooming with Technology
Blooming with Technology
 
Story Telling in the Clouds
Story Telling in the CloudsStory Telling in the Clouds
Story Telling in the Clouds
 
What’s a Rubric?
What’s a Rubric?What’s a Rubric?
What’s a Rubric?
 
Adding audio lectures
Adding audio lecturesAdding audio lectures
Adding audio lectures
 

Kürzlich hochgeladen

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

C3 and digital citizenship

  • 1. Cyber Safety, Cyber Ethics and Cyber Security Presented by Dr. Julia VanderMolen
  • 2. Today’s World • Full of … – wonder – fun – scary places – scary people • Need to stay safe even when having fun
  • 3. C3 • Cyber Safety • Cyber Ethics • Cyber Security • Created by the National Cyber Security Alliance in Washington, DC
  • 4. Cyber Safety • Responsible rules and behaviors designed to keep individuals safe whenever connected to the Internet • Ask student what are some examples of “safety rules” that parents ask them to follow while using the Internet
  • 5. Cyber Safety Terms • Privacy • Children’s Online Privacy Protection Act (COPPA) • Cyber Safety Contract • C3 Strategy – The three key components all Internet users should understand and promise to use whenever they go online so keep themselves, others, and their computer safe! • Cyber Security • Cyber Safety • Cyber Ethics
  • 6. Cyber Ethics • Informal code of positive conduct used whenever someone is using the Internet • “Doing the right thing even when no one is looking or watching” • Ask students of wise and poor Internet use choices and discuss • What are some good strategies for being a good digital citizen who behaves ethically online.
  • 7. Cyber Ethics Terms • Cyber Smart Citizen • Copyright Laws • Illegal Downloads • Netiquette • Digital Citizenship
  • 8. Cyber Security • The protection of information and computer systems and networks while connected to the Internet • Common strategies that people use to protect their computer and personal information – Antivirus – Firewalls – Malware protection – Never give out personal information – Always use a secure site when doing any transactions • List some security tips that people should know
  • 9. Cyber Security Terms • Adware • Anti-virus software • Browser hijacker • Exposure
  • 10. “WWW Decision Tool” • Decision checklist to help reinforce strategies to behave responsibly and remain safe and secure during all Internet activities – W – Who is asking for this personal information? – W – What information is being requested? – W – Why do they need this personal information?
  • 11. Terms that to know • Cyber Ethics • Cyber Security • Cyber Safety
  • 12. National Cyber Security Alliance (NCSA) • A Washington DC based national non-profit organization that collaborates with the federal government, corporate, non-profit and academic sectors, to create a culture of cyber security and safety awareness by providing the knowledge and tools necessary to prevent cyber crime and attacks to ensure that everyone remains safe while online. www.staysafeonline.org
  • 13. Let’s do this ourselves • Break into groups • Each group will have a scenario to read and evaluate • Write down your findings • Report back to the group • Open ended discussion
  • 14. Additional Sources • NCSA (www.usatodayeducate.com/wordpress/i ndex.php/technology-syber-security – Cyber security – NCSA has teamed up with USA Today Education Foundation and the Department of Homeland Security to develop four lesson plans using recent news stories about cyber security issues. These lesson plans are targeted to 8th through 12th grade
  • 15. Additional Resources • CyberSmart! (www.cybersmart.org) – Safety and Security Online – Manners, Bullying and Ethics – The free CyberSmart! Student Curriculum empowers students to use the Internet safely, responsibly, and effectively. The free CyberSmart! Educator Toolbar puts 21st century skills into practice every day, with just-in-time 24/7 access to annotated essential resources to support student learning.
  • 16. Additional Resources • Department of Justice (www.cybercrime.gov/rules/lessonplan 1.htm) – The Department of Justice has developed a kids page focused on lesson plans for elementary and middle school children
  • 17. Additional resources • IKEEPSAFE (www.ikeepsafe.org) – Internet Keep Safe Coalition – Faux Paw the Techno Cat – Internet Safety basics – How to handle cyber-bullying – Balancing real life with screen time – The risks and dangers of downloading – The Faux Paw® curriculum is based on research from Harvard’s Center on Media and Child Health and created in partnership with the iKeepSafe Global Research Team, Penn State University Department of Education, and the University of Maryland. – Most iKeepSafe resources are available for free download
  • 18. Additional Resources • i-Safe (www.isafe.org) – Personal safety – Predator Identification – Intellectual Property – Cyber Citizenship – Cyber Bullying – i-Safe offers internet safety curriculum for grades K-8 and webcasts for grades 9. Lessons are broken down by grades (K-8) and each grade’s lesson focuses on a different topic.
  • 19. Additional resources • James Madison University (www.jmu.edu/iiia/cybercitz) – A guide to responsible technology use – Safety – Security – Ethics
  • 20. Additional resources • NetSmartz Workship (www.netsmartz.org) – Internet Safety – Cyber Bullying – NetSmartz offers free, multimedia Internet safety presentations for use with children of all ages and adults. Resources include a Back to School kit, videos, worksheets and activity cards on online safety, texting, and cyberbullying. The NetSmartz Workshop is an interactive, educational safety resource from the National Center for Missing and Exploited Children® (NCMEC) and Boys & Girls Clubs of America (BGCA).
  • 21. Additional Resources • Play It CyberSafe (www.playitcybersafe.com) – Cyber ethics – Cyber crime – The Business Software Alliance has developed a web site that teaches how to prevent cyber crime through knowledge of the law, their rights, and how to avoid misuse of the Internet.
  • 22. Additional Resources • WebWise Kids (www.webwisekids.org) – Online safety – Cyber security – Spyware – Bullying – Ethics – Social Networking – E-mail – Cell phone dangers – Emerging technology – Chat rooms and instant messaging safety – Personal website Danger Zones – Web Wise Kids is a unique organization that offers fun, challenging and interactive simulations based on real-life criminal cases. Each program has been designed specifically for use with young people in classrooms and computer labs (special version of the programs are also available for home use)

Hinweis der Redaktion

  1. PrivacyIn relation to internet use this refers to personal information you are entitled to protect from others accessing online.Social networking sites have special “privacy controls” that all children should set to high so that information they post is only by those they wish to share itChildren’s Online Privacy Protection Act (COPPA)A national law that protects the privacy of children under the age of 13 by requesting parental consent for the collection or use of any personal information of the usersCyber Safety ContractA contract you design with your parents or guardian – AND COMMIT TO FOLLOW – that outlines specific rules and guidelines for computer use in the home, at school, or at another locationC3 StrategyThe three key components all Internet users should understand and promise to use whenever they go online so keep themselves, others, and their computer safe!Cyber SecurityCyber SafetyCyber Ethics
  2. Cyber Smart CitizenA computer user who follows all of the C3 Concepts and commits to always acting safely, ethically, and responsibly while using the InternetCopyright LawsLaws that protect the online material of a creator or composer from a computer user illegally downloading, copying, scanning or otherwise distributing their material without prior approval or consentIllegal DownloadsInformation (most commonly songs or music) downloaded by an individual either for themselves or to share with others that is not authorized by the original creator or composer’s license.NetiquetteThe informal rules of Internet courtesy, enforced exclusively by other internet users.Digital Citizenship
  3. AdwareA type of software that often comes with free downloads. Some adware displays ads on your computer, while some monitors your computer use (including websites visited) and displays targeted ads based on your use.Anti-virus softwareProtects your computer from viruses that can destroy your data, slow your computer’s performance, cause a crash, or even allow spammers to send email through your account.Browser hijackerA common spyware program that changes your web browser’s home page without the user’s knowledge, even if you change it backExposureWhen sensitive information on your computer is released to someone without authorization