Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 18

By: Jill Rueter, ATC

https://www.cyberstreetwise.com/#!/street

INTRODUCTION
Acceptable Use Policy (AUP) Is a code of conduct for users are
connected to the internet/network
CyberBullying- The use of online technology to harm another person
Cyberpredators- Is an adult to who uses the internet to exploit or
take advantage of a child or teen
Identity Safety- protecting yourself and your identity on the internet
Inappropriate Content- Is defined by visual depictions that are
obscene or material that is otherwise harmful to
minors
Plagiarism and Piracy- the unauthorized use of anothers words or
ideas
ACCEPTABLE USE POLICIES
According to Mitchell, AUPs are
Very Common among schools, libraries and business
It is a written agreement of acceptable use of the internet while on the
schools network.
A good AUP would include :
Network etiquette
Mentions limits on the use of network resources,
Clearly indicates the level of privacy a member on the network
should expect
Continue educating students on digital safety and citizenship

Sample AUP -
St.Colmcilles
Its a privilege and there are
consequences
The main point
..SAFETY!
Do we have an AUP?
What does it include?



ACCEPTABLE USE POLICIES
Teachers should do the
following:
Lets
take a
look
Education Technology. (n.d.)
StColmcilles, 2010
CYBERBULLYING
Common Sense Media, 2011
CYBERBULLYING STATISTICS

33%
67%
Experienced Cyber Threats
Adolescents and Teens
25%
75%
bullied repeatedly
by a cell phone or
internet
Adolescents and
teens
67%
33%
% of teen who
DO NOT tell an
adult
adolescents and
Teen
53%
47%
teens being bullied
online
teens engaging in cyber
bullying
https://www.mysecurecyberspa
ce.com/
(Wolak, Mitchell & Finkelhor, 2006)
CYBERPREDATORS
According to Wolak, Mitchell & Finkelhor,
2006
Sexual solicitations of youth occur:
Chatrooms (37%)
Instant Messaging (40%)
Other, like gaming devices (21%)
1 in 7 kids received a sexual solicitation
online.
Over half (56%) of kids sexually solicited
online were asked to send a picture
27% of the pictures were sexually-
oriented in nature.
In 82% of online sex crimes
against minors, the offender
used the victim's
social networking site
to gain information about the
victim's likes and dislikes.
(Wolak, Mitchell & Finkelhor,
2007)

(Federal Bureau of Investigation Cyber Division , n.d)
CYBERPREDATORS

What Fuels Internet
Predators?
Easy and anonymous
access to children
Risky online behavior of
youth
Virtual validation
Law enforcement
challenges
East access to child
pornography
ChildHelp, 2011



Keep the lines of communication open by listening to
what your kids say and what they dont say.

Ways we can help:
Educate students and parents
about online safety
The Anonymous Factor
Appropriate Sharing
Open line of
communication
Keep computers in a
public spot at home
Federal Bureau of Investigation Cyber
Division, n.d

IDENTITY SAFETY
Tips for Students:
Don't give out personal information,
for example:
- your address, phone number, or school name unless you
have permission from you parents.
Look out for scams, especially in emails, that ask for your personal
information.
Never agree to meet with anyone you meet on the web. You never know
who is on the other end.
Use passwords that only you can remember.

("Identity safety," n.d.)
IDENTITY SAFETY
Tips for Educators:
Use complicated passwords that only you can remember.
Do not use your birthdate or last name.
Change your passwords often.
Understand that online photos and videos CAN be copied and
altered.
Do not download files or links in emails sent to you by people
you do not know.
Your students safety is important to you. Advise them on how to
be safe on the Internet as well.

("Identity safety," n.d.)
INAPPROPRIATE CONTENT
Has been defined in the Children's Internet
Protection Act as
- visual depictions that are obscene, child pornography, or
material that is "harmful to minors."
Teachers make sure and block all inappropriate websites
Increase Privacy and Security by limiting downloads, using
antivirus and antispyware software, individual user accounts,
also double check web browser security settings, and
MONITOR students online
If you suspect something review the History list to see what
sites the student has visited.
Carnegie Mellon University , 2014
INAPPROPRIATE CONTENT
Each time students are allowed on the
computer remind them
to Avoid going to sites that may lead to inappropriate images
of any kind.
Do not use sites that they have not heard of.
Do not search for any explicit topics in a search engine.
Do not use any internet portal instead of using the assigned
web browser that your school has provided for you.
(center for safe schools, 2014)
**Staff remember that whatever you post online in your personal life
can be copied by anyone who sees it. So please do diligence
when posting on social media sites. It can COST YOU your job!**

PIRACY & PLAGIARISM
Causes of plagiarism in secondary school setting:
May fear failure or fear taking risks in their own work.
Poor time-management skills
Students may not know how to integrate the ideas of others and document
the sources of those ideas appropriately in their texts.


PIRACY & PLAGIARISM
According to the Council of Writing program Administrators,
2010, We can help by
Administrators need to foster a campus-wide climate that values academic
honesty
Faculty need to design contexts that encourage students not to simply recycle
information
Explain Plagiarism and Develop Clear Policies to the
students
If you suspect plagiarism ask students for documentation.
Take Appropriate Disciplinary Actions, but understand
there is a difference between misuse of sources
and plagiarism.

CONCLUSION - 10 COMMANDMENTS
OF COMPUTER ETHICS
(Yeremiah, 2010)
REFERENCES
A free educational resource created . Informally published manuscript, Carnegie
Mellon University, . Retrieved from https://www.mysecurecyberspace.com/
Center for safe schools. (2014). Internet safety. Retrieved from
http://www.safeschools.info/internet-safety
ChildHelp. (2011). How to avoid bullies and predators online. Retrieved from
http://www.childhelp.org/blog/entry/how-to-avoid-bullying-and-predators-online
Common Sense Media (August 24, 2011). Cyberbullying Toolkit for Educators: Stand
Up, Don't Stand By Retrieved from https://www.youtube.com/watch?v=dygyi96-
amM
council of writing program administrators. (2010). Defining and avoiding plagiarism.
Retrieved from http://wpacouncil.org/positions/WPAplagiarism.pdf
http://wpacouncil.org/positions/WPAplagiarism.pdf
Education Technology. (n.d.). Education Technology. Retrieved June 19, 2014, from
https://www.k12.wa.us/edtech/InternetSafety/AcceptableUsePolicyInfo.aspx
Federal Bureau of Investigation Cyber Division (n.d). Fbi -parent guide to internet
safety. Retrieved from http://www.fbi.gov/stats-services/publications/parent-guide






REFERENCES
Identity safety. (n.d.). Retrieved from
https://sites.google.com/site/cybersafetysite422/home/identity-safety
Mitchell, B. (n.d.). Introduction to Acceptable Use Policies (AUP). About.com
Wireless / Networking. Retrieved June 19, 2014, from
http://compnetworking.about.com/od/filetransferprotocol/a/aup_use_policy.htm
St. Colmcilles Community School. (2010). Acceptable use policy. Manuscript
submitted for publication, Administration, Knocklyon, Dublin. Retrieved from
http://stcolmcilles.ie/policies/ict.pdf
Wolak, J., Mitchell, K., & Finkelhor, D. (2006). Online victimization of youth: Five
years later. Manuscript submitted for publication, CRIME AGAINST CHILDREN
RESEARCH CENTER University of New Hampshire, University of New
Hampshire, Durham, NH, . Retrieved from
http://www.missingkids.com/en_US/publications/NC167.pdf
Wolak, J., Mitchell, K., & Finkelhor, D. (2007). Internet -initiated sex crimes against
minors; implications for prevention based on findings from a national study.
Journal of Adolescent Health., 35(5), Retrieved from
http://www.jahonline.org/article/S1054-139X(04)00171-5/
Yeremiah. (2010, May 29). 10 commandments of computer usage [Online forum
comment]. Retrieved from http://yeremiahsocietalthoughts.blogspot.com/

THANK YOU

You might also like