1 / 50

Parents Workshop

Parents Workshop. On-Line Safety and Awareness. Objectives . To share information on student use and related concerns Share school strategies Develop awareness on use and misuse of ICT tools Practical suggestions. Agenda . Introduction Brief outline of general issues – 20-25 min

faxon
Télécharger la présentation

Parents Workshop

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Parents Workshop On-Line Safety and Awareness

  2. Objectives • To share information on student use and related concerns • Share school strategies • Develop awareness on use and misuse of ICT tools • Practical suggestions

  3. Agenda • Introduction • Brief outline of general issues – 20-25 min • Short practical workshops – 5 x 10 min • General summary of ideas and actions – 10 min

  4. Setting the scene • Incredibly important area of development • Personal communication tool • Use within education • Internet – access the whole of mankind's knowledge!!! • On-line streaming • Video conferencing • Education software • Projectors and hardware in classes

  5. Issues • Incredible change • Head of Secondary – 8th year • Number of cellphones in last 3-4 years • With increased use the incidents of misuse have increased and diversified • Photos • Videos • Blogs • Anonymous messages and emails • Practical jokes • Plagiarism

  6. General Issues with On-line Safety and Awareness • Sensible ICT use - Cybersafety • Privacy • Predators • Pornography • Plagiarism • Cyberbullying

  7. Cyberbullying • ‘A cyberbully – defined as anyone who repeatedly misuses technology to harass, intimidate, bully or terrorise another person. Such behaviour usually takes the form of inappropriate and hurtful rumours or threats sent through e-mails, instant messages, texts messages, or website posts, with the sender often anonymous or disguised as someone else’ - Mark Franek, 2006, Ed Leadership

  8. Why is cyberbullying such an issue? • Very wide ranging • Not face-to-face • Often unexpected • Anonymous • No come back on results • Difficult to trace • New gadgets • Often outside school • State legislation?

  9. What can we do and have we done? • Raise awareness in whole community • Develop strategies for students to behave safely on-line • Develop more thoughtful and careful world citizens • Raise level of competence and knowledge of the ‘Immigrant’ population

  10. Awareness through Student Survey • April 2007

  11. Statistical Feedback Basic background information on you: • 97% have a computer in house • 53% on-line in bedroom • 80% have a cellphone

  12. ICT Issues or Concerns • 29% responded that they had been made to feel uncomfortable on line • 38% girls – 21% boys • 22% reported that they had posted unpleasant things • 50% approached by a stranger • 57% girls – 43% boys

  13. General Conclusions • Statistics show girls more aware, exposed or willing to express concerns • Younger students, particularly 7/8 see cyberbullying as a worrying issue • Especially photologs and comments • Bullying on-line

  14. Sample of Year 7/8 CommentsWhat concerns me . . .? • ‘That now everybody posts things in photologs, hurting people, bullying has become a common thing thanks to all the new technology’ • ‘Something that happens to me very often: some people bully me because they are bored, they say bad words and insult me, they find it fun to do, it hurts me with the unpleasant things they wrote. I think that the people who are cyber bullied may feel very bad’

  15. Older Students • Generally see cyberbullying as of less of an issue • Also many students voice opinions that school should not be involved

  16. What concerns me . . .? • ‘We cannot do anything about it and it is difficult to catch the bully’ • ‘The school should worry about other things rather than the ones that should be learned at home’ • ‘I think this is un-useful (sic), it is not going to solve anything’ • ‘It does not really exist’

  17. Older Students also said . . . • Significant number express concerns • Privacy and personal information • Hurt it can cause

  18. What concerns me . . ? • ‘That a joke is exposed to thousands of people’ • ‘People outside school that know and have information of students - Hackers eg someone had the information of [my friends], including addresses, phone numbers, DNI, etc.’ • ‘Accessing information about someone is easy, and risky, so personal data should be kept private’ • ‘Any kind of stalking or harassment is quite worrying’

  19. School Strategies • Increase school use • IT and Departments • Control of phones • School Policy - Código Convivencia and Plagiarism • PSE Programme – awareness, citizenship and ‘what to if . . .’ steps • Increase knowledge and competence of Immigrants • Raise awareness of possible misuse, cyberbullying and steps to control

  20. Types of Cyberbullying • Direct • Warning Wars/text wars • Stealing passwords • Blogs • Websites • Photos • Internet polling • Malicious codes • Porn/junk mail • Impersonation

  21. Types of Cyberbullying • Proxy - Getting someone else to do your dirty work • Notifying war – complaining to an ISP of harassment when nothing has happened. Victim may retaliate and be removed. • Impersonation – posing as someone else they post comments possible casting themselves as the victim. Friends then may gang up against the presumed ‘aggressor’.

  22. Important Step • Understand • Various ICT Tools • Their use and misuse • by your child • against your child • Controls that can be used • Simple tips

  23. Practical Workshops • Blogs and Social Networking • Instant Messenger and Chat • Email and virus control • YouTube • Cellphones Only 10 minutes per workshop and the move around

  24. Social Networks

  25. Social Networks • Myspace, Facebook, Photolog • Fun for kids to talk about with friends • Show off pictures • “Like working on a yearbook”

  26. Social Network Risks • Strangers • Privacy issues, such as photo distribution • Risks to reputation

  27. Social Network Tips • Choose the photos with care • To make them aware of the consequences of posting photos—they can be copied and used by anyone • Suggest that they are familiar with their “friends”

  28. Instant Messaging and Chat

  29. IM Risks • Strangers can contact your kids • It’s hard to monitor • Kids spend too much time on it • Online profiles that are searchable • Trouble with peers/school • Cyber-bullying

  30. IM Parent Tips • Check your son/daughter’s screen name, profile information, picture (discuss good choices) • Talk with your child about IM habits • Limit time • Set rules and monitor carefully

  31. Chat Risks • Risk of child revealing information that can personally identify him/her • Chat rooms and “one-on-one” conversation flow easily – to offline private space • Unmonitored chat can have language and sexual content • Predators • Anonymity

  32. Chat Tips • Discuss risks of chat rooms with your children • Encourage children to only chat with friends they know • Encourage children to only chat in moderated environment • Teach children to not give away any personal information • Teach child to be very careful about meeting online friends offline • Set rules and monitor carefully

  33. Electronic Mail

  34. Electronic Mail • Transmission of text messages and optional file attachments. • Users can send mail to a single recipient or broadcast it to multiple users. • Messages can include pictures, sound, video, or text attachments. • Software or Web-based.

  35. E-mail Risks • Spam (Junk e-mail or bulk e-mail) • Not private: Can be easily be distributed to whole world. • Computer viruses • Spyware • Bullying • School or Social trouble

  36. E-mail Tips • Have different accounts for different levels of privacy. • Teach children to do the following: • Protect Passwords • Guard personal information • Never open e-mails or attachments from an unknown person. • Never open attachments with an .exe or .com extension. • Delete chain letters. • Remember that e-mail can be shared widely. • Think before sending an e-mail. • Ways to secure a PC: • Update the antivirus frequently. • Keep the spyware updated. • Do not tell your password to others. • Verify frequently the state of the firewall. • Update your Windows periodically through Windows Update. • Use Antispam programs. • Pay attention to pop-up blockers and to the famous “cookies”.

  37. Videos Online

  38. Sitios de Descarga de Videos • YouTube.com, Google • UnitedStreaming, Discovery Channel • Learner.org • VxV, del Grupo Clarín • Mixplay.tv • Otros…

  39. Características de Uso • Fácil Acceso • Fácil subida y bajada de videos • Accesible a cualquiera con una conexión sin firewall. • En algunos casos, tienen filtros automáticos para material registrado o inapropiado. • Acepta formatos de cualquier tipo o fuente (celular, cámara de fotos, videocámara, etc.).

  40. Usos • Educativos • Recreacionales • Seinfeld (sobre nada) • Comunicacionales • Aspectos Positivos • Mayores posibilidades de expresión • Disponibilidad inmediata y global. • Aspectos Negativos • Videos Ofensivos • Excesiva Violencia

  41. Precauciones a considerar • Existencia de sitios similares para contenido pornográfico libre. • La facilidad de subida exige un ejercicio más firme de criterio en la elección del material. • Ser cuidadosos en no caer en una sobrexposición, o uso fuera de contexto. • Recurrir a controles online para dar de baja contenido que sea ofensivo (►)

  42. Cell Phones

  43. Cellphone uses • Talk • Photos • Film • Music • E-mail • Internet • Record Audio • Personal Agenda

  44. Cellphone Risks • Theft of huge amount of personal information • Positive unless missused • Not focusing on what one should be doing • Become target for carrying expensive devise

  45. Cellphone tips • Address book • What level of communication technology does your child need now? • Think of it as carrying expensive jewelry • Stored photos

  46. Golden Rules for Parents • Keep Internet in public space as much as possible. • Spend “cybertime” with your child. • Teach Internet rules & consequences – adults to model values online. • Limit time – young people should be busy beyond screens. • Talk to your child about what they are doing. • Stay involved.

  47. Possible Items for Home On-line Agreement • ‘Real’ life rules apply: courtesy, kindness, modesty, dignity, respect for the law and for others. • Don’t talk to strangers. • Keep your private information private. • Never agree to meet an online friend without your parents knowledge. • There are no guarantees that what you say or post on the Internet is private.

  48. Information, including photos, videos, etc, posted on the Internet can last forever. • Tell an adult if you encounter something uncomfortable. • Don’t reply to unknown screen names on IM. • Never open e-mail from strangers or click on any attachments. • Find the ‘good’ online – good friends, good Web sites, good games – and enjoy.

  49. In Conclusion • It is about your child, not technology • Tech tools and tips can help, but they’re not failsafe • Our job is to equip kids with knowledge, build independence and create responsible citizens • Let’s not lose sight of the wonderful opportunity and future that awaits!!!

  50. Acknowledgements • WiredKids. Inc • www.cyberbullying.org • Parents Guide to the Internet US Dept of Ed. • ‘Foiling Cyberbullies in the New Wild West’ – Mark Franek, ASCD Magazine

More Related