SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Leah Lack
Debbie Austin
Amber Frasco
What is Digital Crime/Security?
Here are some Examples:
 Internet safety procedures for
the classroom and home
 AUP (Acceptable Use Policy) in
the classroom
 Computer Hacking
 Use of Security Software for
protection
While at school or home a child may wonder on to sites that are
not appropriate for their age which ultimately can lead to their
safety being put in jeopardy. Without being aware a child can
enter a site that contains inappropriate material or sexual
predators.
In one survey research claims that
“58% of students admit to using the
Internet unsafely, inappropriately, or
illegally.” (Feldman, 2007)
Fortunately there are several tools available for schools and
parents that can prevent a child from wondering to such sites.
 Educate- No matter how much protection is provided on a
computer there is no way to block all unsuitable information.
 Apply the “Don’t talk to strangers” motto while the online.
 Time limits on the computer
 Enforce punishments for when computer rules are broken
All information provided by Feldman, 2007.
• Monitoring Software- At any time a
report can be printed out to show
exactly what sites have been visited and
when.
•Personalize programs to require
each student to enter their own
password to ensure individual
responsibility.
•Filters- Stops students from entering
sites that may contain inappropriate
material.
•Keep the computer in an area that
can easily be monitored.
Computers are in use in classrooms across the country
and it has become imperative that schools protect
themselves from user liability.
Enforcing Acceptable User Policies
How schools can enforce the AUP
 If an AUP states that all users’ activities will be monitored,
then the school IT staff needs to be sure that it is doing just
that. Maintain an Internet log. Update regularly and
employ the use of filters to block unacceptable content.
 Use clear and precise language: be sure to carefully list all
circumstances in which a violation may occur and avoid
generalities.
 Explain the AUP to students in an open discussion forum,
how to use the Internet effectively, and involve parents in
their child’s computer usage.
All information is provided by Fitzer, 2002
Computer Hacking
Definition Prevention
 Intentionally accessing a
computer without
authorization or exceeding
authorization in order to
access restricted
information
 The unauthorized use of
computer and network
resources
 Privacy infringement
 Varies from being an
annoyance to being illegal
*All information provided by Coakley, 2010.
 The best way to prevent
hacking is the use of security
software
 Use secure passwords and
keep them private
 Be aware of your digital
environment
 Explain to students and
others the repercussions and
illegal nature of hacking
Resources
 Coakley, M. 2010. Hacking.
http://www.mass.gov/?pageID=cagoterminal&L=4&L0=Home&L1=Community+Safety&L2=Cyber+Cr
ime+%26+Internet+Safety&L3=Computer+%26+Online+Privacy&sid=Cago&b=terminalcontent&f=co
mmunity_hacking&csid=Cago
 Feldman, B. 2007. Surfing the Net with Kids.
http://www.surfnetkids.com/safety/need_to_know_internet_safety_in_the_classroom-16975.htm
 Feldman, B. 2007. Surfing the Net with Kids.
http://www.surfnetkids.com/safety/safeguard_your_students_internet_usage-16974.htm
 Fitzer, K. 2002. Enforcing Acceptable Use Policies. http://www/ed/uiuc.edu/wp/crime-2002/aup.htm
 Writing an Effective Acceptable Use Policy. 2009. http://www.stbernard.com/forms/switch/internet-
policy.asp?oc=19.htm
 Acceptable Use Policy: Ligon Middle School. http://www.ncsu.edu/ligon/au.policy.html
Three Questions about Digital
Crime/Security
1. Because there is no way to monitor and filter everything on the Internet,
_________ your students and children on Internet safety is the best prevention.
2. Give one example of how a school can enforce an AUP (Accepted User Policy).
3. What is the unauthorized use of a computer called?
Answers
 Educating
 Monitor all users’ activities, keep an Internet log, and
explain the AUP to all users.
 Computer Hacking

Weitere ähnliche Inhalte

Was ist angesagt?

Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)
MMHoward
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in i
Hassan Nasir
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
thowell
 

Was ist angesagt? (20)

Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
MISD Cyber Safety
MISD Cyber Safety MISD Cyber Safety
MISD Cyber Safety
 
Week 15 ppt eme2040
Week 15 ppt eme2040Week 15 ppt eme2040
Week 15 ppt eme2040
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Parent ed is_mh
Parent ed is_mhParent ed is_mh
Parent ed is_mh
 
Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in i
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
InfraGard Cyber Tips: October, 2015
InfraGard Cyber Tips: October, 2015InfraGard Cyber Tips: October, 2015
InfraGard Cyber Tips: October, 2015
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICT
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
 

Andere mochten auch (8)

up to 90% off my Real Estate commission
up to 90% off my Real Estate commissionup to 90% off my Real Estate commission
up to 90% off my Real Estate commission
 
Vwl training slides 1 28
Vwl training slides 1   28Vwl training slides 1   28
Vwl training slides 1 28
 
Prevenire meglio che curare v 1
Prevenire meglio che curare v 1Prevenire meglio che curare v 1
Prevenire meglio che curare v 1
 
Vwl training slides 29 44
Vwl training slides 29   44Vwl training slides 29   44
Vwl training slides 29 44
 
Prevenire meglio che curare
Prevenire meglio che curarePrevenire meglio che curare
Prevenire meglio che curare
 
English group 2 1
English group 2 1English group 2 1
English group 2 1
 
Wave Petunia Tower
Wave Petunia TowerWave Petunia Tower
Wave Petunia Tower
 
Sep. 2011 IIBA DC Event
Sep. 2011 IIBA DC EventSep. 2011 IIBA DC Event
Sep. 2011 IIBA DC Event
 

Ähnlich wie Digital citizenship project[1]

Et 508 week 3 faculty and staff training session
Et 508 week 3 faculty and staff training sessionEt 508 week 3 faculty and staff training session
Et 508 week 3 faculty and staff training session
Michelle Abee
 
Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Online
dgieseler1
 
Internet Publication
Internet PublicationInternet Publication
Internet Publication
Dré Davis
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
sheenau
 
Parent meeting
Parent meetingParent meeting
Parent meeting
lightb
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
ronak56
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Paul Berryman
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
ayerssaa
 

Ähnlich wie Digital citizenship project[1] (20)

Et 508 week 3 faculty and staff training session
Et 508 week 3 faculty and staff training sessionEt 508 week 3 faculty and staff training session
Et 508 week 3 faculty and staff training session
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Online
 
E safety training
E safety trainingE safety training
E safety training
 
Internet Publication
Internet PublicationInternet Publication
Internet Publication
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 B
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Parent meeting
Parent meetingParent meeting
Parent meeting
 
KIAParentsPresentation.ppt
KIAParentsPresentation.pptKIAParentsPresentation.ppt
KIAParentsPresentation.ppt
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
McKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullyingMcKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullying
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Safety Net: A Parent's Guide (Infographic)
Safety Net: A Parent's Guide (Infographic)Safety Net: A Parent's Guide (Infographic)
Safety Net: A Parent's Guide (Infographic)
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 

Kürzlich hochgeladen

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Kürzlich hochgeladen (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

Digital citizenship project[1]

  • 2. What is Digital Crime/Security? Here are some Examples:  Internet safety procedures for the classroom and home  AUP (Acceptable Use Policy) in the classroom  Computer Hacking  Use of Security Software for protection
  • 3. While at school or home a child may wonder on to sites that are not appropriate for their age which ultimately can lead to their safety being put in jeopardy. Without being aware a child can enter a site that contains inappropriate material or sexual predators. In one survey research claims that “58% of students admit to using the Internet unsafely, inappropriately, or illegally.” (Feldman, 2007)
  • 4. Fortunately there are several tools available for schools and parents that can prevent a child from wondering to such sites.  Educate- No matter how much protection is provided on a computer there is no way to block all unsuitable information.  Apply the “Don’t talk to strangers” motto while the online.  Time limits on the computer  Enforce punishments for when computer rules are broken All information provided by Feldman, 2007. • Monitoring Software- At any time a report can be printed out to show exactly what sites have been visited and when. •Personalize programs to require each student to enter their own password to ensure individual responsibility. •Filters- Stops students from entering sites that may contain inappropriate material. •Keep the computer in an area that can easily be monitored.
  • 5. Computers are in use in classrooms across the country and it has become imperative that schools protect themselves from user liability.
  • 6. Enforcing Acceptable User Policies How schools can enforce the AUP  If an AUP states that all users’ activities will be monitored, then the school IT staff needs to be sure that it is doing just that. Maintain an Internet log. Update regularly and employ the use of filters to block unacceptable content.  Use clear and precise language: be sure to carefully list all circumstances in which a violation may occur and avoid generalities.  Explain the AUP to students in an open discussion forum, how to use the Internet effectively, and involve parents in their child’s computer usage. All information is provided by Fitzer, 2002
  • 7. Computer Hacking Definition Prevention  Intentionally accessing a computer without authorization or exceeding authorization in order to access restricted information  The unauthorized use of computer and network resources  Privacy infringement  Varies from being an annoyance to being illegal *All information provided by Coakley, 2010.  The best way to prevent hacking is the use of security software  Use secure passwords and keep them private  Be aware of your digital environment  Explain to students and others the repercussions and illegal nature of hacking
  • 8. Resources  Coakley, M. 2010. Hacking. http://www.mass.gov/?pageID=cagoterminal&L=4&L0=Home&L1=Community+Safety&L2=Cyber+Cr ime+%26+Internet+Safety&L3=Computer+%26+Online+Privacy&sid=Cago&b=terminalcontent&f=co mmunity_hacking&csid=Cago  Feldman, B. 2007. Surfing the Net with Kids. http://www.surfnetkids.com/safety/need_to_know_internet_safety_in_the_classroom-16975.htm  Feldman, B. 2007. Surfing the Net with Kids. http://www.surfnetkids.com/safety/safeguard_your_students_internet_usage-16974.htm  Fitzer, K. 2002. Enforcing Acceptable Use Policies. http://www/ed/uiuc.edu/wp/crime-2002/aup.htm  Writing an Effective Acceptable Use Policy. 2009. http://www.stbernard.com/forms/switch/internet- policy.asp?oc=19.htm  Acceptable Use Policy: Ligon Middle School. http://www.ncsu.edu/ligon/au.policy.html
  • 9. Three Questions about Digital Crime/Security 1. Because there is no way to monitor and filter everything on the Internet, _________ your students and children on Internet safety is the best prevention. 2. Give one example of how a school can enforce an AUP (Accepted User Policy). 3. What is the unauthorized use of a computer called?
  • 10. Answers  Educating  Monitor all users’ activities, keep an Internet log, and explain the AUP to all users.  Computer Hacking