Transcript (cont.) To

Cybersafety 4 Kids:
Smart Moves in an Online World
Goals of Presentation

To unravel the fear and hype surrounding
the online lives of our cyber kids
while also

considering strategies to help ensure that
our children have a safe, positive
experience with technology
Topics for Today
SBCUSD’s Cybersafety Plan
 The Cybersafety Big 6 (not to be confused with

the Big6 info literacy model)
Identity Safety
 Social Networks
 Cyberbullying
 Cyber Predators
 Piracy and Plagiarism
 Inappropriate Content

SBCUSD’s Cybersafety Plan

2009-2010 District Tech Plan
Objective 3g.1: All students will be trained to
apply Internet safety rules, including how to
protect their online privacy and avoid online
predators when they are using the Internet.
 Year 1 Benchmark: 25% of students
 Year 2 Benchmark: 75% of students
 Year 3 Benchmark: 100% of students

SBCUSD’s Cybersafety Plan
(cont.)
“Trainer of Trainers” Model
• District
trains tech
liaisons
Step 1
Step 2
• Tech liaisons
train site
teachers
• Teachers
train
students
Step 3
SBCUSD’s Cybersafety Plan

(cont.)
How will you get the word out at your site?
Classroom lessons
 Assemblies
 Track change days/minimum days
 SSC/ELAC Meetings


The proof’s in the agenda
Or sign-in sheet…
 Or lesson plan…
 Or flyer
 Or…?

Documentation is critical
for audit purposes!
Cybersafety Resources
http://www.ctap4.net/projects/cybersafety.html
SBCUSD Cybersafety Resources

Available on Tech Liaison Intranet site
Go to http://www.sbcusd.com  Staff Only 
Research & Technology Intranet  Research
Intranet  Tech Liaison Intranet  Meeting
Resources and Newsletters
 PowerPoint presentations
 Handouts
 Activities

SBCUSD Cybersafety Resources (cont.)



Notes available
for most slides
May have to
turn on Notes
view to see
them
Print slides
with notes for
reference
during
presentation
Part 1:
IDENTITY SAFETY
Identity Safety
Definition: Personal information identifies you,
your location or your financial assets.



Obvious: name, age, sex, picture, phone number,
address
Less obvious: hobbies, interests, school mascot,
gaming and IM identities
Used for phishing scams
Think Before You Post!
Identity Safety
(cont.)
Unraveling the facts…

Identity thieves are clever, posing as friends,
relatives and banks, to get people to reveal
personal information. Watch for https and URL
posers like paypa1.

Kids are just as likely as adults to become
victims of identity theft -- when applying for a
driver's license they may find one already has
been issued using their name and SSN.
Phishy Home
Identity Theft Prevention
Identity Safety
(cont.)
To-Dos: Remember to share
guidelines with your students:
• Do not share personal information such as
your name, age, sex, picture, location/
address, phone number, hobbies, interests,
and Social Security/bank account numbers.
• Create nicknames that do not reflect your own
name or anything personal.
Tracking Teresa01
How to protect your privacy on Facebook
Identity Safety
(cont.)
To-Dos (cont.)
• Never respond to online communication that
is inappropriate or makes you feel
uncomfortable.
• Never agree to meet in person someone you
met online.
• Always talk with your parents or a responsible
adult about your online activities.
Identity Safety
(cont.)
To-Dos (cont.)
• Create strong passwords and keep
them secret.
Part 2:
SOCIAL NETWORKS
Social Networks
Definition: Social network sites (MySpace
and Facebook) are services that use the
Internet to create an interactive network of
photos, videos, web logs (blogs) and groups.

Social networking sites gather data submitted
by members as “profiles”

Profiles can then be shared among members
Social Networks
(cont.)
TMI!!!
How much information is
too much?

Risky info (beyond A/S/L)





Screen names
Group photos
Hobbies
Hangouts
School
Social Networks
(cont.)
What’s the problem with these screen
names???
BurgerDude
 SoccerChick13
 GerberLA
 CavsFan
 ArroyoFullback
 LadiesMan217

Social Networks
(cont.)
Social Networks
But we block it…
(cont.)
Social Networks

(cont.)
Posting a picture on MySpace is like posting it
on a public campus bulletin board, that
anyone can access and deface
Think Before You Post

Although there has been a lot of negative
media around social networks, most users are
just “hanging out” and teachers are using
them in innovative ways
Social Networks
(cont.)
To-Dos: Remember to share
guidelines with your students:
• Know that sexual predators disguise
themselves as friendly and often hunt for
victims through social networking sites.
• Be careful about adding strangers to your
“friends” list.
You Never Know
Social Networks
(cont.)
To-Dos (cont.)
• Never share your personal information or
anything about your friends--especially your
cell phone number.
• Don’t be shy; report inappropriate
postings/profiles to the social networking
provider and to the police.
Part 3:
CYBERBULLYING
Cyberbullying
Definition: Cyberbullying is the use of
technology for harassment, impersonation,
denigration, trickery, exclusion and stalking.

Cyberbullies may use email, chat rooms,
discussion forums, instant messaging, text
messaging (cell phones), or social networking
sites.
You Can’t Take It Back
Cyberbullying
(cont.)
An Example Close to Home
February 7, 2007
“Danville girl's plight now lawmaker's bill”
In-Person vs. Cyberbullying
“The difference between being
bullied at school and being bullied
on the Internet is that you cannot
get away from cyberbullying as
easily. Cyberbullying follows you,
even after you get home from
school.”
Cyberbullying
(cont.)
Studies estimate between 33% and 43%
of teenagers have been victims of
cyberbullying
 Discrepancies are due primarily to varying
definitions of cyberbullying and the
sometimes-hazy line between harassment
and “kids being kids”
 Despite all of that, cyberbullying is the
most common online risk children face

Cyberbullying



(cont.)
Of surveyed teens who said they had been
cyberbullied, only about 10% reported it.
The MYTH: “If I tell someone about bullying,
it will just make it worse.” Research shows
that bullying will stop when peers or adults
get involved.
Headline news provides opportunities for
discussion and “teachable moments”
Educator’s Guide to Cyberbullying and Cyberthreats
Cyberbullying
To-Dos
(cont.)
for Students
• Don’t respond to or meet with a cyberbully.
• Save proof of the harassment like e-mail
messages, screen shots, IM logs, blogs, etc.
Cyberbullying
To-Dos
(cont.)
for Students (cont.):
• Tell a trusted adult who can:
 Call law enforcement.
 File a complaint with the ISP or send an
email to the host of the web site where
the abuse was posted.
 Contact the cyberbully’s parents.
 Contact an attorney or file a small claims
action.
Cyberbullying
To-Dos
(cont.)
for Parents/Teachers:
• Use web sites that translate online lingo so
you can understand words being used in emails, chat rooms, IMs, etc.
• If a child continues to receive harassing emails, have him/her delete the current
accounts and open a new one. Give the new
e-mail address only to a few trusted people.
Dealing with Cyberthreats

Online threat can be
Joke, parody, or game
 Rumor
 Someone trying out a fictitious online character
 Final salvos of a “flame war”
 Posted by an “impersonator”
 Violent/suicidal intention posted by depressed
or angry person
 Legitimate imminent threat

Dealing with Cyberthreats
1st priority – protect against possible
legitimate threat
 2nd priority – determine legitimacy of threat


Messages to students:
Don’t make threats online
 Report threats or distressing material

Part 4:
CYBER PREDATORS
Cyber Predators
Definition: A Cyber predator uses the Internet
to hunt for victims to take advantage of in ANY
way, including sexually, emotionally,
psychologically or financially

Cyber predators know how to manipulate
kids, creating trust and friendship where none
should exist
Netsmartz Video: Amy’s Choice
(go to bottom of website)
Cyber Predators
(cont.)

Cyber predators can be sent to prison.

What children need to look out for is not a
certain stereotype of a dangerous person but
certain types of behavior

Use teachable moments, even headline news,
to make discussion and education relevant.
CBS News Article
Cyber Predators
To-Dos
(cont.)
for students:
• Encourage your schools to add a small cyber
tips section to their school newsletters.
• Remind student to think twice before sharing
any information about themselves.
Cyber Predators
(cont.)
To-Dos (cont.):
• If you suspect that you are being stalked or
the victim of inappropriate communication,
report it to a trusted adult or to the
CyberTipline.
http://cybertipline.com
1-800-843-5678
Cybertipline video
Quiz Time

http://www.missingkids.com/adcouncil/

Click on Online Lingo tab
Internet Safety Quiz for Adults
 Internet Safety Quiz for Kids

Part 5:
PIRACY & PLAGIARISM
Piracy and Plagiarism
Definition: Piracy refers to the unauthorized
reproduction or use of materials, created,
written, designed or expressed by
individuals

Includes music, games, movies, photos,
writing, patented invention, trademarked
product
Piracy and Plagiarism
(cont.)
Definition: Plagiarism is the unauthorized
use or close imitation of the language and
thoughts of another author and the
representation of them as one's own
original work
Includes “recycling fraud” or self-plagiarism
 Different from copyright infringement

Piracy and Plagiarism

(cont.)
Examples
Turning in someone else's work as your own
 Copying without giving credit
 Failing to put quotation in quotation marks
 Giving incorrect source info about a quote
 Changing words but copying sentence structure
of a source without giving credit
 Copying so many words or ideas from a source
that it makes up the majority of your work

Piracy and Plagiarism
(cont.)
But what about Weird Al???
Parody is not legally
considered plagiarism
 Parody is covered under
Fair Use provision of US
Copyright

“You’re Pitiful” vs. “You’re Beautiful”
Piracy and Plagiarism
(cont.)
Intellectual Property
A term referring to ownership rights over materials,
created, written, designed or expressed by individuals.
Copyright
A form of protection provided by the laws of the United
states to the authors of original works of authorship
including literary, dramatic, musical, artistic, and certain
other intellectual works.
Fair Use
The legal guidelines which exempt educators from certain
copyright restrictions. Fair use allows some media
products to be used to a limited degree in the classroom.
Basically, copyright law was
created in this country to protect
individuals and companies from
having their work ripped off.
True
False
False
The purpose of copyright was to
support the “advancement of
Science and the useful arts.”
“Science” at the time was
synonymous with “knowledge.”
A student finds a photo online dramatizing
a pre-Columbian Viking landing in America.
Since the school symbol is the Viking, he
posts this photo on the school web page.
It links back to the original website. This is
fair use.
True
False
False
Internet pages are copyrighted
automatically. The student cannot
safely post (and therefore re-copyright)
anything without permission. Use in a
classroom report or multimedia project
would have been okay, as would a
nonposted page.
A student brings in a CD copy of the
national anthem that he copied from a
CD lent to him by a friend. Another
student digitizes this into a multimedia
project. This is fair use.
True
False
False
For Fair Use, the material to be used
must be legally obtained. The student
was using an unauthorized copy. Francis
Scott Key may be dead, but the
orchestra that created the arrangement
and created the tape is probably still
around.
A middle school science class studying
ocean ecosystems must gather material
for multimedia projects. The teacher
downloads pictures and information on
marine life from various commercial and
noncommercial sites to store in a folder
for students to access. This is fair use.
True
False
True
The Web may be mined for resources.
Download away (of course, don’t hack
into subscription sites)!
Remember…you can’t put these
projects back up on the Web without
permission from the copyright holders.
Piracy and Plagiarism



(cont.)
Let’s be CLEAR: plagiarism is
STEALING
Terms like “borrowing” and
“copying” can downplay the
seriousness of the offense
In a 2009 survey, twice as many
high school students identified
talking loudly on a cell phone as
inappropriate as identified copying
music, movies, or games to give to
a friend as inappropriate
Piracy and Plagiarism
(cont.)

File-sharing represents 60% of all US
Internet traffic

Illegally downloading or sharing intellectual
property without the permission of the
creator is a crime punishable by law
Don’t Copy That 2
Piracy and Plagiarism

(cont.)
Headline news provides opportunities for
discussion and “teachable moments”
Jury awards $675K in music downloading case
Minnesota woman loses music-sharing retrial
Illegal downloaders face web ban in France
Piracy and Plagiarism
(cont.)
To-Dos: Remember to share
guidelines with your students:
• Don’t download, copy, or share music, games,
movies, photos, or other property without
permission of the creator.
• Use only legitimate sites (those that request
payment or are copyright free) when
downloading online media.
Part 6:
INAPPROPRIATE CONTENT
Inappropriate Content
Definition: Inappropriate content has been
defined in CIPA* as visual depictions that are
obscene, child pornography, or material
"harmful to minors"

It can also include images of violence, hate group
or extremist material, illegal activities and online
advertising
Inappropriate Content
(cont.)

A white supremacist group registered the
domain name www.martinlutherking.org in
order to masquerade as a legitimate resource

Federal policies created to protect our
children include CIPA, COPPA and DOPA
Inappropriate Content
(cont.)

Inappropriate content can occur on any
computer by accident

Only a small fraction of the materials on the
Internet could reasonably be classified as
inappropriate for children…

Unfortunately, that small fraction is highly
visible and controversial
Parent Controls Video
Inappropriate Content
(cont.)
To-Dos: Remember to share
guidelines with your students:
• Tell a trusted adult, teacher or parent if you
come across inappropriate content.
• Know how to use the back button or log off
immediately when you find material that
makes you feel uncomfortable.
Inappropriate Content
(cont.)
To-Dos (cont.):
• Don’t download files from people you don’t
know.
• Use filtered searches and systems; ask your
teacher or librarian for help
• Set your search engine preferences for strict
filtering or use Google’s SafeSearch lock
Questions or Comments?