SlideShare a Scribd company logo
1 of 8
Cybersafety
What is this ?

April 2010
A Suggested School Checklist

Has everyone who has access to your school computers signed a cybersafety agreement?


Have all students signed a media release?


Has there been professional development on cybersafety?


Does the school have policies and procedures in place?


Is there an identified cybersafety person?


Does the school actively teach about cyber issues?


Does the school have guidelines on blogs and wikis?


Do you have a net nanny?
For the class
An Example of a poster for class
use
What Parents Can Do


Cyber bully?
               •    “Bullying in all forms – including cyberbullying – is unacceptable, and it is vital to develop
                    effective strategies both for addressing and preventing it.”

               •      Teachers and parents are only just beginning to understand that phone/ internet is a social
                      lifeline within peer groups.



The home ?
               o Friendships are made and broken over these mediums.
               o The current generation is desensitized by reality TV.
               o Keep the computer in a well-travelled part of the home.
               o “With the widespread use among children of online diaries and social networking sites such as
               MySpace.com, the attacks are becoming more common.” Facebook / bebo/ myspace are all age
               restricted. When your child is old enough then if you so wish allow them to have a profile but make
               sure that you can access it. You should have their passwords and login’s, or join the site yourself
               and ensure you are listed as 1 of your child’s friends.
               o If the child engages in unacceptable behaviour online, make certain that there are immediate
               consequences.

               •     Parents should ensure that they and their child understand how to use technology safely,
                     including the use of moderated chat rooms and parental control software, as well as the risks
                     and consequences of misuse
               o Importance of not erasing messages/emails.
               o Despite anonymity, Internet Service Providers can track computers through a unique digital
               signature. Every computer connected to the internet has a unique string of identifying numbers.

               •     Unacceptable behaviour includes:
               o Sending email, instant or text messages to others disguising yourself as another person. o
               Spreading rumors or false information about others.
               o Sending rude, harassing or threatening messages. o Creating websites that ridicule, humiliate or
               intimidate others.
               o Posting on websites or disseminating embarrassing or inappropriate pictures or images of others.
               o Restriction/confiscation of technology is not the answer. Kids are smart – they will find other
               options.
               o Advise the child that cyberbullying may be a criminal offense - electronically communicated
               threats are crimes.
               o Tell the child to never reveal his or her password to anyone, including friends.

               •     Warning Signs:
               o Your child has withdrawn from normal interaction with family and friends to spend an inordinate
               amount of time engaged in Internet activity.
               o Your child turns the computer off or quickly changes the screen when you enter the room.
               o Your child suddenly avoids using the computer or drastically changes internet use habits.
               o Your child demonstrates a marked change in behaviour, beliefs, self-esteem or attitudes. o Your
               child’s academic performance or school attendance decreases significantly.
               “A third of those who experience cyberbullying do not report it. If we are to succeed in preventing
               bullying, we need to break the climate of silence in which it thrives by empowering children and
               young people to speak out and seek help.”
Examples from Hectors World
               
               
               
               
                   
                   
                              
                               
                                   
                   
                   
                   
                             
                   
                   
                   
                                
                                
                                 
                             
                   
                   
               
               
                                
                   
                   
                                  
                   
                                 
                   
                   
                                  
                   
                                 
                   
               
               
                                  
                   
                   
                                     
                   

                   
                                 
                                  
                   

                                 
                                  
                   
               
Whats out there ...????
Whats out there ...????


  http://educationalsoftware.wikispaces.com/
           Internet+Safety+Resources

  http://hectorsworld.netsafe.org.nz/teachers/

          http://www.thegrid.org.nz/

More Related Content

Similar to Cybersafety

Table 4 Elements Related To Diversity In The Graduate Proficiency
Table 4 Elements Related To Diversity In The Graduate ProficiencyTable 4 Elements Related To Diversity In The Graduate Proficiency
Table 4 Elements Related To Diversity In The Graduate ProficiencyDocencia
 
Sa presentation 071411
Sa presentation 071411Sa presentation 071411
Sa presentation 071411Cara Rousseau
 
User Experience Portfolio
User Experience PortfolioUser Experience Portfolio
User Experience Portfoliojngo
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingLiz V
 
Reliablity vs Authority, IAMCR Paper
Reliablity vs Authority, IAMCR PaperReliablity vs Authority, IAMCR Paper
Reliablity vs Authority, IAMCR PaperAxel Maireder
 
Dissertation final draft
Dissertation   final draft Dissertation   final draft
Dissertation final draft Rodrigue Eid
 
Waito Report 2011: Counterfeiting Crime a major challenge
Waito Report 2011: Counterfeiting Crime a major challengeWaito Report 2011: Counterfeiting Crime a major challenge
Waito Report 2011: Counterfeiting Crime a major challengeWAITO Foundation
 
Place Making and the Politics of Planning: Jennifer Keesmaat
Place Making and the Politics of Planning: Jennifer KeesmaatPlace Making and the Politics of Planning: Jennifer Keesmaat
Place Making and the Politics of Planning: Jennifer KeesmaatCityRegionStudies
 
PR Coverage: 15 August - 31 August, 2012
PR Coverage: 15 August - 31 August, 2012PR Coverage: 15 August - 31 August, 2012
PR Coverage: 15 August - 31 August, 2012marcombuzz
 
GlobalPulse_CrimsonHex_MethodsPaper2011
GlobalPulse_CrimsonHex_MethodsPaper2011GlobalPulse_CrimsonHex_MethodsPaper2011
GlobalPulse_CrimsonHex_MethodsPaper2011UN Global Pulse
 
BiologyExchange.co.uk Shared Resource
BiologyExchange.co.uk Shared ResourceBiologyExchange.co.uk Shared Resource
BiologyExchange.co.uk Shared Resourcebiologyexchange
 
Boom startup overview
Boom startup overviewBoom startup overview
Boom startup overviewbjb84
 
PhD Defense - Awareness Support for Knowledge Workers in Research Networks
PhD Defense - Awareness Support for Knowledge Workers in Research NetworksPhD Defense - Awareness Support for Knowledge Workers in Research Networks
PhD Defense - Awareness Support for Knowledge Workers in Research NetworksWolfgang Reinhardt
 
A 4 A Prods. And Services1lgmc
A 4 A Prods. And Services1lgmcA 4 A Prods. And Services1lgmc
A 4 A Prods. And Services1lgmcjollyroll59
 

Similar to Cybersafety (20)

Content strategy for library websites
Content strategy for library websitesContent strategy for library websites
Content strategy for library websites
 
Table 4 Elements Related To Diversity In The Graduate Proficiency
Table 4 Elements Related To Diversity In The Graduate ProficiencyTable 4 Elements Related To Diversity In The Graduate Proficiency
Table 4 Elements Related To Diversity In The Graduate Proficiency
 
Sa presentation 071411
Sa presentation 071411Sa presentation 071411
Sa presentation 071411
 
User Experience Portfolio
User Experience PortfolioUser Experience Portfolio
User Experience Portfolio
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Reliablity vs Authority, IAMCR Paper
Reliablity vs Authority, IAMCR PaperReliablity vs Authority, IAMCR Paper
Reliablity vs Authority, IAMCR Paper
 
Dissertation final draft
Dissertation   final draft Dissertation   final draft
Dissertation final draft
 
Waito Report 2011: Counterfeiting Crime a major challenge
Waito Report 2011: Counterfeiting Crime a major challengeWaito Report 2011: Counterfeiting Crime a major challenge
Waito Report 2011: Counterfeiting Crime a major challenge
 
Senior Grad Slides
Senior Grad SlidesSenior Grad Slides
Senior Grad Slides
 
Quick start
Quick startQuick start
Quick start
 
Quick start
Quick startQuick start
Quick start
 
Place Making and the Politics of Planning: Jennifer Keesmaat
Place Making and the Politics of Planning: Jennifer KeesmaatPlace Making and the Politics of Planning: Jennifer Keesmaat
Place Making and the Politics of Planning: Jennifer Keesmaat
 
PR Coverage: 15 August - 31 August, 2012
PR Coverage: 15 August - 31 August, 2012PR Coverage: 15 August - 31 August, 2012
PR Coverage: 15 August - 31 August, 2012
 
GlobalPulse_CrimsonHex_MethodsPaper2011
GlobalPulse_CrimsonHex_MethodsPaper2011GlobalPulse_CrimsonHex_MethodsPaper2011
GlobalPulse_CrimsonHex_MethodsPaper2011
 
نشاط 3
نشاط 3نشاط 3
نشاط 3
 
BiologyExchange.co.uk Shared Resource
BiologyExchange.co.uk Shared ResourceBiologyExchange.co.uk Shared Resource
BiologyExchange.co.uk Shared Resource
 
Boom startup overview
Boom startup overviewBoom startup overview
Boom startup overview
 
PhD Defense - Awareness Support for Knowledge Workers in Research Networks
PhD Defense - Awareness Support for Knowledge Workers in Research NetworksPhD Defense - Awareness Support for Knowledge Workers in Research Networks
PhD Defense - Awareness Support for Knowledge Workers in Research Networks
 
A 4 A Prods. And Services1lgmc
A 4 A Prods. And Services1lgmcA 4 A Prods. And Services1lgmc
A 4 A Prods. And Services1lgmc
 

More from Beth Lamb

Rowena ict presentation
Rowena ict presentationRowena ict presentation
Rowena ict presentationBeth Lamb
 
Maia 2010 elearning inquiry
Maia 2010 elearning inquiryMaia 2010 elearning inquiry
Maia 2010 elearning inquiryBeth Lamb
 
Inquiry. michelle
Inquiry. michelleInquiry. michelle
Inquiry. michelleBeth Lamb
 
Inquiry heather whaikawa
Inquiry heather whaikawaInquiry heather whaikawa
Inquiry heather whaikawaBeth Lamb
 
Ict enquiry dave smith t4 2010
Ict enquiry dave smith t4 2010Ict enquiry dave smith t4 2010
Ict enquiry dave smith t4 2010Beth Lamb
 
Initial vision
Initial visionInitial vision
Initial visionBeth Lamb
 
Inquiry i chat. helen
Inquiry i chat. helenInquiry i chat. helen
Inquiry i chat. helenBeth Lamb
 
Digital e portfolios
Digital e portfoliosDigital e portfolios
Digital e portfoliosBeth Lamb
 
Using peripheral toys
Using peripheral toysUsing peripheral toys
Using peripheral toysBeth Lamb
 
Presentation
PresentationPresentation
PresentationBeth Lamb
 
Miss Kingi 4
Miss Kingi 4Miss Kingi 4
Miss Kingi 4Beth Lamb
 
I C T - marama
I C T - maramaI C T - marama
I C T - maramaBeth Lamb
 
Tracy's Inquiry Presentation
Tracy's Inquiry PresentationTracy's Inquiry Presentation
Tracy's Inquiry PresentationBeth Lamb
 
Using Voice Thread in a Jnr Classroom
Using Voice Thread in a Jnr ClassroomUsing Voice Thread in a Jnr Classroom
Using Voice Thread in a Jnr ClassroomBeth Lamb
 
Rowena Inquiry Presentation
Rowena Inquiry PresentationRowena Inquiry Presentation
Rowena Inquiry PresentationBeth Lamb
 
Donna Pulupaki inquiry presentation
Donna Pulupaki inquiry presentationDonna Pulupaki inquiry presentation
Donna Pulupaki inquiry presentationBeth Lamb
 
Michelle - Using imovie in a media class
Michelle - Using imovie in a media classMichelle - Using imovie in a media class
Michelle - Using imovie in a media classBeth Lamb
 

More from Beth Lamb (20)

Rowena ict presentation
Rowena ict presentationRowena ict presentation
Rowena ict presentation
 
Maia 2010 elearning inquiry
Maia 2010 elearning inquiryMaia 2010 elearning inquiry
Maia 2010 elearning inquiry
 
Inquiry. michelle
Inquiry. michelleInquiry. michelle
Inquiry. michelle
 
Inquiry heather whaikawa
Inquiry heather whaikawaInquiry heather whaikawa
Inquiry heather whaikawa
 
Inquiry
InquiryInquiry
Inquiry
 
Ict enquiry dave smith t4 2010
Ict enquiry dave smith t4 2010Ict enquiry dave smith t4 2010
Ict enquiry dave smith t4 2010
 
Initial vision
Initial visionInitial vision
Initial vision
 
Inquiry i chat. helen
Inquiry i chat. helenInquiry i chat. helen
Inquiry i chat. helen
 
Digital e portfolios
Digital e portfoliosDigital e portfolios
Digital e portfolios
 
Using peripheral toys
Using peripheral toysUsing peripheral toys
Using peripheral toys
 
Podcasting
PodcastingPodcasting
Podcasting
 
Presentation
PresentationPresentation
Presentation
 
Miss Kingi 4
Miss Kingi 4Miss Kingi 4
Miss Kingi 4
 
I C T - marama
I C T - maramaI C T - marama
I C T - marama
 
Elton
EltonElton
Elton
 
Tracy's Inquiry Presentation
Tracy's Inquiry PresentationTracy's Inquiry Presentation
Tracy's Inquiry Presentation
 
Using Voice Thread in a Jnr Classroom
Using Voice Thread in a Jnr ClassroomUsing Voice Thread in a Jnr Classroom
Using Voice Thread in a Jnr Classroom
 
Rowena Inquiry Presentation
Rowena Inquiry PresentationRowena Inquiry Presentation
Rowena Inquiry Presentation
 
Donna Pulupaki inquiry presentation
Donna Pulupaki inquiry presentationDonna Pulupaki inquiry presentation
Donna Pulupaki inquiry presentation
 
Michelle - Using imovie in a media class
Michelle - Using imovie in a media classMichelle - Using imovie in a media class
Michelle - Using imovie in a media class
 

Cybersafety

  • 2. A Suggested School Checklist Has everyone who has access to your school computers signed a cybersafety agreement? Have all students signed a media release? Has there been professional development on cybersafety? Does the school have policies and procedures in place? Is there an identified cybersafety person? Does the school actively teach about cyber issues? Does the school have guidelines on blogs and wikis? Do you have a net nanny?
  • 4. An Example of a poster for class use
  • 5. What Parents Can Do Cyber bully? • “Bullying in all forms – including cyberbullying – is unacceptable, and it is vital to develop effective strategies both for addressing and preventing it.” • Teachers and parents are only just beginning to understand that phone/ internet is a social lifeline within peer groups. The home ? o Friendships are made and broken over these mediums. o The current generation is desensitized by reality TV. o Keep the computer in a well-travelled part of the home. o “With the widespread use among children of online diaries and social networking sites such as MySpace.com, the attacks are becoming more common.” Facebook / bebo/ myspace are all age restricted. When your child is old enough then if you so wish allow them to have a profile but make sure that you can access it. You should have their passwords and login’s, or join the site yourself and ensure you are listed as 1 of your child’s friends. o If the child engages in unacceptable behaviour online, make certain that there are immediate consequences. • Parents should ensure that they and their child understand how to use technology safely, including the use of moderated chat rooms and parental control software, as well as the risks and consequences of misuse o Importance of not erasing messages/emails. o Despite anonymity, Internet Service Providers can track computers through a unique digital signature. Every computer connected to the internet has a unique string of identifying numbers. • Unacceptable behaviour includes: o Sending email, instant or text messages to others disguising yourself as another person. o Spreading rumors or false information about others. o Sending rude, harassing or threatening messages. o Creating websites that ridicule, humiliate or intimidate others. o Posting on websites or disseminating embarrassing or inappropriate pictures or images of others. o Restriction/confiscation of technology is not the answer. Kids are smart – they will find other options. o Advise the child that cyberbullying may be a criminal offense - electronically communicated threats are crimes. o Tell the child to never reveal his or her password to anyone, including friends. • Warning Signs: o Your child has withdrawn from normal interaction with family and friends to spend an inordinate amount of time engaged in Internet activity. o Your child turns the computer off or quickly changes the screen when you enter the room. o Your child suddenly avoids using the computer or drastically changes internet use habits. o Your child demonstrates a marked change in behaviour, beliefs, self-esteem or attitudes. o Your child’s academic performance or school attendance decreases significantly. “A third of those who experience cyberbullying do not report it. If we are to succeed in preventing bullying, we need to break the climate of silence in which it thrives by empowering children and young people to speak out and seek help.”
  • 6. Examples from Hectors World                                                                                                                                                                                                                                                                                                                        
  • 7. Whats out there ...????
  • 8. Whats out there ...???? http://educationalsoftware.wikispaces.com/ Internet+Safety+Resources http://hectorsworld.netsafe.org.nz/teachers/ http://www.thegrid.org.nz/

Editor's Notes