SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
Cyber
                          ICT/Counseling Parent Workshop
                                                           Information and Communication Technology and Counseling at the International School of Tanganyika - Elementary Campus
                                                                                                                                                                                     Bullying
                                                                                                                                                                                   Hurting someone with a simple click
                                                                                                                                                                                   Spreading rumors and bullying is nothing new. Kids have
                                                                                                                                                                                   always found ways to be cruel to one another. But today’s kids
                                                                                                                                                                                   are dealing with something much more sinister: Cyber Bullying.
                                                                                                                                                                                   Kids are now using their cell phones and computers to hurt,
                                                                                                                                                                                   humiliate, and harass each other.

                                                                                                                                                                                   This type of bullying is especially disturbing because it is
                                                                                                                                                                                   constant, pervasive, and very, very public. As part of !our
                                                                                                                                                                                   continuing discussion on positive digital citizenship, come learn
                                                                                                                                                                                   more about cyber bullying and steps you can take to protect
                                                                                                                                                                                   your child.



                                                                                                                                                                                      Elementary Campus Staffroom
                                                                                                                                                                                       Monday, 26 March - 7.20 AM


Tuesday, March 27, 2012
Tuesday, March 27, 2012
bullying




Tuesday, March 27, 2012
bullying
       defined
        Bullying is an act of
        repeated aggressive
        behavior in order to
        intentionally hurt another
        person, physically or
        mentally. Bullying is
        characterized by an
        individual behaving in a
        certain way to gain power
        over another person.
        Besag V.E.

Tuesday, March 27, 2012
cyber
       bullying




Tuesday, March 27, 2012
cyber
       bullying
       defined

       The use of information
       and communication
       technologies to support
       deliberate, repeated, and
       hostile behavior by an
       individual or group, that is
       intended to harm others.
       Bill Belsey

Tuesday, March 27, 2012
What’s the
                          vs
       difference?




Tuesday, March 27, 2012
What’s the
                                                    vs
       difference?
               •Can be annonymous
               •Can occur in your own home
               •Can be 24/7
               •No witnessing by teachers or parents
               •Can be viewed by an entire class, friendship
               group or community instantly

Tuesday, March 27, 2012
video - cyber bullying
       http://www.youtube.com/watch?v=S03Br1dwJR8




                                                    Childnet International

Tuesday, March 27, 2012
discussion

         • How did this film make you feel as a parent?

         • How was what you saw in this film different
         than what you experienced?




Tuesday, March 27, 2012
mum’s perspective
       http://www.youtube.com/watch?v=Y6XIPogWZPU




                                                    Childnet International

Tuesday, March 27, 2012
questions

              • At your child's current age, can you identify
              possible ways that cyber bullying could occur?


              • How are our children interacting online?




Tuesday, March 27, 2012
video - social media
       http://www.commonsensemedia.org/advice-for-parents/social-networking-tips   Common Sense Media




Tuesday, March 27, 2012
Here are      that should be considered about
                                        social networking sites.




                          introducing   Stay positive about social networking sites – try to strike a balance between
                                        educating children and young people to behave safely and trusting them to
                                        get on with it. Get involved – ask them how to create a profile, get them to
                                        show you theirs and ask them to add you to their friends list!




                               the      Make sure that children know how to protect themselves on social
                                        networking sites through the tools provided. It’s important to discuss the
                                        value of privacy with children. Encourage your child to keep their passwords
                                        private and work with them to check the privacy settings on their account




                            5Ps
                                        which limit how much of their information can be seen by others – for
                                        example, encourage your child to change their settings to private so that
                                        only people they allow can see what they post and comment on their space,
                                        rather than public which leaves their site open to be viewed by anyone.




                                        It’s natural that children will want to include a photo on their site or profile,
                                        but help them think about the implications of posting photos and what is
                                        suitable. It is important to think about the type of picture and the kind of
                                        attention it might attract, the information it could divulge and who could see
                                        it. Suggest that your child ask permission of other people in the images that
                                        they post. Also, be aware that photos can be easily copied, changed, shared,
                                        used elsewhere, and can potentially stay online forever. One question to ask




             about
                                        your child is “would they want a future employer to see this photo?”




                                        The ability to interact with this media and comment on other people’s sites
                                        is part of what makes these sites so attractive. However, make sure you




       social networking
                                        help your child to think before they post. Set some ground rules about what
                                        is and isn’t OK to say in a blog or profile. This relates to what the child says
                                        about others as much as about themselves. What starts off as a joke or
                                        gossip can quickly escalate to cause real pain which cannot be taken back.




                                        It’s really important that you encourage your child to tell you about
                                        inappropriate or illegal activity they may come across. If you suspect your
                                        child is being groomed by someone with a sexual interest in children, it’s
                                        vital that you help them keep a copy of the offending images or messages
                                        and report them to the police via the Child Exploitation and Online Protection
                                        Centre website                                      . If they are being harassed
                                        by another user, report that person’s screen name to the SN provider which
                                        hopefully will act on violations to its terms of service.




Tuesday, March 27, 2012
Here are      that should be considered about



               positive
                                       social networking sites.


                                       Stay positive about social networking sites – try to strike a balance between
                                       educating children and young people to behave safely and trusting them to
                                       get on with it. Get involved – ask them how to create a profile, get them to
                                       show you theirs and ask them to add you to their friends list!




                            privacy
                                       Make sure that children know how to protect themselves on social
                                       networking sites through the tools provided. It’s important to discuss the
                                       value of privacy with children. Encourage your child to keep their passwords
                                       private and work with them to check the privacy settings on their account
                                       which limit how much of their information can be seen by others – for
                                       example, encourage your child to change their settings to private so that
                                       only people they allow can see what they post and comment on their space,
                                       rather than public which leaves their site open to be viewed by anyone.




                          photos
                                       It’s natural that children will want to include a photo on their site or profile,
                                       but help them think about the implications of posting photos and what is
                                       suitable. It is important to think about the type of picture and the kind of
                                       attention it might attract, the information it could divulge and who could see
                                       it. Suggest that your child ask permission of other people in the images that
                                       they post. Also, be aware that photos can be easily copied, changed, shared,
                                       used elsewhere, and can potentially stay online forever. One question to ask
                                       your child is “would they want a future employer to see this photo?”




                             posting   The ability to interact with this media and comment on other people’s sites
                                       is part of what makes these sites so attractive. However, make sure you
                                       help your child to think before they post. Set some ground rules about what
                                       is and isn’t OK to say in a blog or profile. This relates to what the child says
                                       about others as much as about themselves. What starts off as a joke or
                                       gossip can quickly escalate to cause real pain which cannot be taken back.




                   police
                                       It’s really important that you encourage your child to tell you about
                                       inappropriate or illegal activity they may come across. If you suspect your
                                       child is being groomed by someone with a sexual interest in children, it’s
                                       vital that you help them keep a copy of the offending images or messages
                                       and report them to the police via the Child Exploitation and Online Protection
                                       Centre website                                      . If they are being harassed
                                       by another user, report that person’s screen name to the SN provider which
                                       hopefully will act on violations to its terms of service.




Tuesday, March 27, 2012
video - cyber bullying happens
       http://www.youtube.com/watch?v=D7uyScK3-CU




Tuesday, March 27, 2012
smart rules        Childnet has produced 5 key SMART rules which
                          remind young people to be SMART online.
                          It can be helpful to go through these tips with
                          your children.



                                            Keep safe by being careful not to give
                                  out personal information, – such as your full name,
                                  e-mail address, phone number, home address,
                                  photos or school name – either to people you are
                                  chatting with online or by posting it online where
                                  other people can see it.


                                                   Meeting someone you have only
                                  been in touch with online can be dangerous. Only
                                  do so with your parents’ or carers’ permission and
                                  even then only when they can be present.




                                                      Accepting e-mails, IM
                                  messages, or opening files, pictures or texts
                                  from people you don’t know or trust can lead to
                                  problems – they may contain viruses or
                                  nasty messages!



                                                   Information you find on the
                                  internet may not be true, or someone online may be
                                  lying about who they are.




                                            Tell your parent, carer or a trusted
                                  adult if someone or something makes you feel
                                  uncomfortable or worried, or if you or someone you
                                  know is being bullied online.




Tuesday, March 27, 2012
smart rules                   Childnet has produced 5 key SMART rules which
                                     remind young people to be SMART online.
                                     It can be helpful to go through these tips with
                                     your children.




             Safe
                                                       Keep safe by being careful not to give
                                             out personal information, – such as your full name,
                                             e-mail address, phone number, home address,
                                             photos or school name – either to people you are
                                             chatting with online or by posting it online where
                                             other people can see it.




              Meeting                                         Meeting someone you have only
                                             been in touch with online can be dangerous. Only
                                             do so with your parents’ or carers’ permission and
                                             even then only when they can be present.




                Accepting                                        Accepting e-mails, IM
                                             messages, or opening files, pictures or texts
                                             from people you don’t know or trust can lead to
                                             problems – they may contain viruses or
                                             nasty messages!




                          Reliable                            Information you find on the
                                             internet may not be true, or someone online may be
                                             lying about who they are.




                            Tell                       Tell your parent, carer or a trusted
                                             adult if someone or something makes you feel
                                             uncomfortable or worried, or if you or someone you
                                             know is being bullied online.




Tuesday, March 27, 2012
Additional
            Resources:




                          http://isttech.wordpress.com/
Tuesday, March 27, 2012
Additional
            Resources:




                          http://isttech.wordpress.com/
Tuesday, March 27, 2012
references
                          http://questgarden.com
              images      http://artistsinspireartists.com/graphic_design/awesome-illustrations-gary-taxali



                          http://www.youtube.com/watch?v=S03Br1dwJR8

               videos     http://www.youtube.com/watch?v=Y6XIPogWZPU
                          http://www.youtube.com/watch?v=4B89yPghS6w
                          http://www.youtube.com/watch?v=D7uyScK3-CU



                          http://www.commonsensemedia.org/
         information      http://www.digizen.org/

                                                                                   Mikey McKillip          Glen Blair
                                                                                   ICT Coordinator         Counselor/Vice Principal
                                                                                   IST Elementary Campus   IST Elementary Campus



Tuesday, March 27, 2012

Mais conteúdo relacionado

Mais procurados

The good the bad and the gamer | EDUCATION REVIEW 2012
The good the bad and the gamer | EDUCATION REVIEW 2012The good the bad and the gamer | EDUCATION REVIEW 2012
The good the bad and the gamer | EDUCATION REVIEW 2012Jocelyn Brewer
 
Ideas for Vancouver Secondary Schools - Technology for Learning [Dec2012]
Ideas for Vancouver Secondary Schools - Technology for Learning [Dec2012]Ideas for Vancouver Secondary Schools - Technology for Learning [Dec2012]
Ideas for Vancouver Secondary Schools - Technology for Learning [Dec2012]Brian Kuhn
 
Online reputation management survey presentation
Online reputation management survey presentationOnline reputation management survey presentation
Online reputation management survey presentationJosep Claret
 
Case study Cyberhus
Case study CyberhusCase study Cyberhus
Case study CyberhusLinks-up
 
Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyCTIC Technology Centre
 
Web 2.0 and Instructional Leadership
Web 2.0 and Instructional LeadershipWeb 2.0 and Instructional Leadership
Web 2.0 and Instructional Leadershipddesroches
 
Giftedkids.ie - Gifted Advocacy & Support for Gifted Children
Giftedkids.ie - Gifted Advocacy & Support for Gifted ChildrenGiftedkids.ie - Gifted Advocacy & Support for Gifted Children
Giftedkids.ie - Gifted Advocacy & Support for Gifted ChildrenGiftedkids.ie
 
Cyberstalking dangers
Cyberstalking dangersCyberstalking dangers
Cyberstalking dangersrangashree
 
Towards Digital Fluency
Towards Digital FluencyTowards Digital Fluency
Towards Digital FluencyAlec Couros
 
Robyn Treyvaud 21CLHK 2012 keynote
Robyn Treyvaud 21CLHK 2012 keynote Robyn Treyvaud 21CLHK 2012 keynote
Robyn Treyvaud 21CLHK 2012 keynote Paul White
 
Research In New Media Learning
Research In New Media LearningResearch In New Media Learning
Research In New Media LearningJason Hando
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipAndrew Kohl
 
Developing a Digital Citizenship Program
Developing a Digital Citizenship ProgramDeveloping a Digital Citizenship Program
Developing a Digital Citizenship ProgramCathy Oxley
 
LA Congress Social Media Workshop 2012 by Dr. Charlotte McCorquodale, Ministr...
LA Congress Social Media Workshop 2012 by Dr. Charlotte McCorquodale, Ministr...LA Congress Social Media Workshop 2012 by Dr. Charlotte McCorquodale, Ministr...
LA Congress Social Media Workshop 2012 by Dr. Charlotte McCorquodale, Ministr...charmccor
 
Harnessing the Power of Social Networks in Teaching & Learning - OUIT Keynote
Harnessing the Power of Social Networks in Teaching & Learning - OUIT KeynoteHarnessing the Power of Social Networks in Teaching & Learning - OUIT Keynote
Harnessing the Power of Social Networks in Teaching & Learning - OUIT KeynoteAlec Couros
 

Mais procurados (19)

The good the bad and the gamer | EDUCATION REVIEW 2012
The good the bad and the gamer | EDUCATION REVIEW 2012The good the bad and the gamer | EDUCATION REVIEW 2012
The good the bad and the gamer | EDUCATION REVIEW 2012
 
Ideas for Vancouver Secondary Schools - Technology for Learning [Dec2012]
Ideas for Vancouver Secondary Schools - Technology for Learning [Dec2012]Ideas for Vancouver Secondary Schools - Technology for Learning [Dec2012]
Ideas for Vancouver Secondary Schools - Technology for Learning [Dec2012]
 
Linda Burch: Framing a New Conversation: Digital Media and Learning
Linda Burch: Framing a New Conversation: Digital Media and LearningLinda Burch: Framing a New Conversation: Digital Media and Learning
Linda Burch: Framing a New Conversation: Digital Media and Learning
 
Online reputation management survey presentation
Online reputation management survey presentationOnline reputation management survey presentation
Online reputation management survey presentation
 
Case study Cyberhus
Case study CyberhusCase study Cyberhus
Case study Cyberhus
 
Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and Safety
 
Essay 4
Essay 4Essay 4
Essay 4
 
Web 2.0 and Instructional Leadership
Web 2.0 and Instructional LeadershipWeb 2.0 and Instructional Leadership
Web 2.0 and Instructional Leadership
 
Giftedkids.ie - Gifted Advocacy & Support for Gifted Children
Giftedkids.ie - Gifted Advocacy & Support for Gifted ChildrenGiftedkids.ie - Gifted Advocacy & Support for Gifted Children
Giftedkids.ie - Gifted Advocacy & Support for Gifted Children
 
Cyberstalking dangers
Cyberstalking dangersCyberstalking dangers
Cyberstalking dangers
 
Towards Digital Fluency
Towards Digital FluencyTowards Digital Fluency
Towards Digital Fluency
 
Robyn Treyvaud 21CLHK 2012 keynote
Robyn Treyvaud 21CLHK 2012 keynote Robyn Treyvaud 21CLHK 2012 keynote
Robyn Treyvaud 21CLHK 2012 keynote
 
Research In New Media Learning
Research In New Media LearningResearch In New Media Learning
Research In New Media Learning
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Safer internet
Safer internetSafer internet
Safer internet
 
Developing a Digital Citizenship Program
Developing a Digital Citizenship ProgramDeveloping a Digital Citizenship Program
Developing a Digital Citizenship Program
 
Putting your life online
Putting your life onlinePutting your life online
Putting your life online
 
LA Congress Social Media Workshop 2012 by Dr. Charlotte McCorquodale, Ministr...
LA Congress Social Media Workshop 2012 by Dr. Charlotte McCorquodale, Ministr...LA Congress Social Media Workshop 2012 by Dr. Charlotte McCorquodale, Ministr...
LA Congress Social Media Workshop 2012 by Dr. Charlotte McCorquodale, Ministr...
 
Harnessing the Power of Social Networks in Teaching & Learning - OUIT Keynote
Harnessing the Power of Social Networks in Teaching & Learning - OUIT KeynoteHarnessing the Power of Social Networks in Teaching & Learning - OUIT Keynote
Harnessing the Power of Social Networks in Teaching & Learning - OUIT Keynote
 

Destaque

Technology in School Counseling
Technology in School CounselingTechnology in School Counseling
Technology in School Counselingaires66
 
Working Towards a Peaceful & Friendly Campus
Working Towards a Peaceful & Friendly CampusWorking Towards a Peaceful & Friendly Campus
Working Towards a Peaceful & Friendly CampusGabbie Glam
 
"The Effects of Bullying Among Middle School Gifted and Talented Childre...
"The Effects of Bullying Among Middle School Gifted and Talented Childre..."The Effects of Bullying Among Middle School Gifted and Talented Childre...
"The Effects of Bullying Among Middle School Gifted and Talented Childre...Helen Tsipliareles-Pryor
 
Word chapter 2 research paper with references
Word chapter 2   research paper with referencesWord chapter 2   research paper with references
Word chapter 2 research paper with referencesWilmington High School
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullyingMelissa
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?AJ Tivol
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingbuech1cj
 
Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentationamate1cl
 
Aet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingAet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingcschoeneman
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingKatie_Waters
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingJoe Gauder
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...HDCH
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.katnaylan
 

Destaque (20)

Technology in School Counseling
Technology in School CounselingTechnology in School Counseling
Technology in School Counseling
 
Working Towards a Peaceful & Friendly Campus
Working Towards a Peaceful & Friendly CampusWorking Towards a Peaceful & Friendly Campus
Working Towards a Peaceful & Friendly Campus
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
"The Effects of Bullying Among Middle School Gifted and Talented Childre...
"The Effects of Bullying Among Middle School Gifted and Talented Childre..."The Effects of Bullying Among Middle School Gifted and Talented Childre...
"The Effects of Bullying Among Middle School Gifted and Talented Childre...
 
Word chapter 2 research paper with references
Word chapter 2   research paper with referencesWord chapter 2   research paper with references
Word chapter 2 research paper with references
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying Presentation
Cyber Bullying PresentationCyber Bullying Presentation
Cyber Bullying Presentation
 
Aet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingAet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber Bullying
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
491 nasilje na internetu
491 nasilje na internetu491 nasilje na internetu
491 nasilje na internetu
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 

Semelhante a cyber bullying parent workshop 2012

Pink Pecha kucha
Pink Pecha kuchaPink Pecha kucha
Pink Pecha kuchamrparslow
 
"Bullying" for #YC14
"Bullying" for #YC14"Bullying" for #YC14
"Bullying" for #YC14Bex Lewis
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Joyce Hirsh
 
Define cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdfDefine cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdfalshaikhkhanzariarts
 
Vickyy delfi ingles, cyberbullying
Vickyy delfi ingles, cyberbullyingVickyy delfi ingles, cyberbullying
Vickyy delfi ingles, cyberbullyingvictoriapp
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpscl
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 
Ciberbullying alfio el mas raro
Ciberbullying alfio el mas raroCiberbullying alfio el mas raro
Ciberbullying alfio el mas rarojuanpi1
 
Ciberbullying alfio el mas raro
Ciberbullying alfio el mas raroCiberbullying alfio el mas raro
Ciberbullying alfio el mas raroAlfio Alfieri
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingcrulien
 
JPWMC Co.- Cyber Bullying
JPWMC Co.- Cyber BullyingJPWMC Co.- Cyber Bullying
JPWMC Co.- Cyber Bullyingcrulien
 
Cyber Bullying- JPWMC
Cyber Bullying- JPWMCCyber Bullying- JPWMC
Cyber Bullying- JPWMCcrulien
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009bermandry
 
CYBER-BULLYING FINAL PRESENTATION.pptx
CYBER-BULLYING FINAL PRESENTATION.pptxCYBER-BULLYING FINAL PRESENTATION.pptx
CYBER-BULLYING FINAL PRESENTATION.pptxCrisAnnChattoII
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 

Semelhante a cyber bullying parent workshop 2012 (20)

Pink Pecha kucha
Pink Pecha kuchaPink Pecha kucha
Pink Pecha kucha
 
"Bullying" for #YC14
"Bullying" for #YC14"Bullying" for #YC14
"Bullying" for #YC14
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02
 
Define cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdfDefine cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdf
 
Vickyy delfi ingles, cyberbullying
Vickyy delfi ingles, cyberbullyingVickyy delfi ingles, cyberbullying
Vickyy delfi ingles, cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Ciberbullying alfio el mas raro
Ciberbullying alfio el mas raroCiberbullying alfio el mas raro
Ciberbullying alfio el mas raro
 
Ciberbullying alfio el mas raro
Ciberbullying alfio el mas raroCiberbullying alfio el mas raro
Ciberbullying alfio el mas raro
 
Bullying vs cyber bullying italy
Bullying vs cyber bullying italyBullying vs cyber bullying italy
Bullying vs cyber bullying italy
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
JPWMC Co.- Cyber Bullying
JPWMC Co.- Cyber BullyingJPWMC Co.- Cyber Bullying
JPWMC Co.- Cyber Bullying
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 
Cyber Bullying- JPWMC
Cyber Bullying- JPWMCCyber Bullying- JPWMC
Cyber Bullying- JPWMC
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009
 
CYBER-BULLYING FINAL PRESENTATION.pptx
CYBER-BULLYING FINAL PRESENTATION.pptxCYBER-BULLYING FINAL PRESENTATION.pptx
CYBER-BULLYING FINAL PRESENTATION.pptx
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
CaddiganD
CaddiganDCaddiganD
CaddiganD
 
CaddiganD
CaddiganDCaddiganD
CaddiganD
 

Mais de atomikey

Athena zoë
Athena zoëAthena zoë
Athena zoëatomikey
 
Ec blog sep 14
Ec blog sep 14Ec blog sep 14
Ec blog sep 14atomikey
 
Blog sep 14
Blog sep 14Blog sep 14
Blog sep 14atomikey
 
Grade 2 open house
Grade 2 open houseGrade 2 open house
Grade 2 open houseatomikey
 
2012 8-parent open house for emailing
2012 8-parent open house for emailing2012 8-parent open house for emailing
2012 8-parent open house for emailingatomikey
 
Open house
Open houseOpen house
Open houseatomikey
 
2012 pyp for parents
2012 pyp for parents2012 pyp for parents
2012 pyp for parentsatomikey
 
Open house pp 2012
Open house pp 2012Open house pp 2012
Open house pp 2012atomikey
 
Ict parent workshop web 2.0 feb 2011
Ict parent workshop web 2.0 feb 2011Ict parent workshop web 2.0 feb 2011
Ict parent workshop web 2.0 feb 2011atomikey
 
G2P Fables
G2P FablesG2P Fables
G2P Fablesatomikey
 
Mikumi trip slide show for parents 2010
Mikumi trip slide show for parents 2010Mikumi trip slide show for parents 2010
Mikumi trip slide show for parents 2010atomikey
 
Earth Friendly Fabrics
Earth Friendly FabricsEarth Friendly Fabrics
Earth Friendly Fabricsatomikey
 
A Blue Stork in Germany
A Blue Stork in GermanyA Blue Stork in Germany
A Blue Stork in Germanyatomikey
 
Box jelly fish
Box jelly fishBox jelly fish
Box jelly fishatomikey
 
Aliyah's Volcano Presentation
Aliyah's Volcano PresentationAliyah's Volcano Presentation
Aliyah's Volcano Presentationatomikey
 
Current Events by Diya
Current  Events by DiyaCurrent  Events by Diya
Current Events by Diyaatomikey
 
Haiti Presentation by Lenno
Haiti Presentation by LennoHaiti Presentation by Lenno
Haiti Presentation by Lennoatomikey
 
Ist G2 Monster Descriptions
Ist G2 Monster DescriptionsIst G2 Monster Descriptions
Ist G2 Monster Descriptionsatomikey
 
SCIS G5 Memory Book 2009
SCIS G5 Memory Book 2009SCIS G5 Memory Book 2009
SCIS G5 Memory Book 2009atomikey
 
SCIS Pudong Grade 5 Memory Book 2008
SCIS Pudong Grade 5 Memory Book 2008SCIS Pudong Grade 5 Memory Book 2008
SCIS Pudong Grade 5 Memory Book 2008atomikey
 

Mais de atomikey (20)

Athena zoë
Athena zoëAthena zoë
Athena zoë
 
Ec blog sep 14
Ec blog sep 14Ec blog sep 14
Ec blog sep 14
 
Blog sep 14
Blog sep 14Blog sep 14
Blog sep 14
 
Grade 2 open house
Grade 2 open houseGrade 2 open house
Grade 2 open house
 
2012 8-parent open house for emailing
2012 8-parent open house for emailing2012 8-parent open house for emailing
2012 8-parent open house for emailing
 
Open house
Open houseOpen house
Open house
 
2012 pyp for parents
2012 pyp for parents2012 pyp for parents
2012 pyp for parents
 
Open house pp 2012
Open house pp 2012Open house pp 2012
Open house pp 2012
 
Ict parent workshop web 2.0 feb 2011
Ict parent workshop web 2.0 feb 2011Ict parent workshop web 2.0 feb 2011
Ict parent workshop web 2.0 feb 2011
 
G2P Fables
G2P FablesG2P Fables
G2P Fables
 
Mikumi trip slide show for parents 2010
Mikumi trip slide show for parents 2010Mikumi trip slide show for parents 2010
Mikumi trip slide show for parents 2010
 
Earth Friendly Fabrics
Earth Friendly FabricsEarth Friendly Fabrics
Earth Friendly Fabrics
 
A Blue Stork in Germany
A Blue Stork in GermanyA Blue Stork in Germany
A Blue Stork in Germany
 
Box jelly fish
Box jelly fishBox jelly fish
Box jelly fish
 
Aliyah's Volcano Presentation
Aliyah's Volcano PresentationAliyah's Volcano Presentation
Aliyah's Volcano Presentation
 
Current Events by Diya
Current  Events by DiyaCurrent  Events by Diya
Current Events by Diya
 
Haiti Presentation by Lenno
Haiti Presentation by LennoHaiti Presentation by Lenno
Haiti Presentation by Lenno
 
Ist G2 Monster Descriptions
Ist G2 Monster DescriptionsIst G2 Monster Descriptions
Ist G2 Monster Descriptions
 
SCIS G5 Memory Book 2009
SCIS G5 Memory Book 2009SCIS G5 Memory Book 2009
SCIS G5 Memory Book 2009
 
SCIS Pudong Grade 5 Memory Book 2008
SCIS Pudong Grade 5 Memory Book 2008SCIS Pudong Grade 5 Memory Book 2008
SCIS Pudong Grade 5 Memory Book 2008
 

Último

Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 

Último (20)

Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 

cyber bullying parent workshop 2012

  • 1. Cyber ICT/Counseling Parent Workshop Information and Communication Technology and Counseling at the International School of Tanganyika - Elementary Campus Bullying Hurting someone with a simple click Spreading rumors and bullying is nothing new. Kids have always found ways to be cruel to one another. But today’s kids are dealing with something much more sinister: Cyber Bullying. Kids are now using their cell phones and computers to hurt, humiliate, and harass each other. This type of bullying is especially disturbing because it is constant, pervasive, and very, very public. As part of !our continuing discussion on positive digital citizenship, come learn more about cyber bullying and steps you can take to protect your child. Elementary Campus Staffroom Monday, 26 March - 7.20 AM Tuesday, March 27, 2012
  • 4. bullying defined Bullying is an act of repeated aggressive behavior in order to intentionally hurt another person, physically or mentally. Bullying is characterized by an individual behaving in a certain way to gain power over another person. Besag V.E. Tuesday, March 27, 2012
  • 5. cyber bullying Tuesday, March 27, 2012
  • 6. cyber bullying defined The use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others. Bill Belsey Tuesday, March 27, 2012
  • 7. What’s the vs difference? Tuesday, March 27, 2012
  • 8. What’s the vs difference? •Can be annonymous •Can occur in your own home •Can be 24/7 •No witnessing by teachers or parents •Can be viewed by an entire class, friendship group or community instantly Tuesday, March 27, 2012
  • 9. video - cyber bullying http://www.youtube.com/watch?v=S03Br1dwJR8 Childnet International Tuesday, March 27, 2012
  • 10. discussion • How did this film make you feel as a parent? • How was what you saw in this film different than what you experienced? Tuesday, March 27, 2012
  • 11. mum’s perspective http://www.youtube.com/watch?v=Y6XIPogWZPU Childnet International Tuesday, March 27, 2012
  • 12. questions • At your child's current age, can you identify possible ways that cyber bullying could occur? • How are our children interacting online? Tuesday, March 27, 2012
  • 13. video - social media http://www.commonsensemedia.org/advice-for-parents/social-networking-tips Common Sense Media Tuesday, March 27, 2012
  • 14. Here are that should be considered about social networking sites. introducing Stay positive about social networking sites – try to strike a balance between educating children and young people to behave safely and trusting them to get on with it. Get involved – ask them how to create a profile, get them to show you theirs and ask them to add you to their friends list! the Make sure that children know how to protect themselves on social networking sites through the tools provided. It’s important to discuss the value of privacy with children. Encourage your child to keep their passwords private and work with them to check the privacy settings on their account 5Ps which limit how much of their information can be seen by others – for example, encourage your child to change their settings to private so that only people they allow can see what they post and comment on their space, rather than public which leaves their site open to be viewed by anyone. It’s natural that children will want to include a photo on their site or profile, but help them think about the implications of posting photos and what is suitable. It is important to think about the type of picture and the kind of attention it might attract, the information it could divulge and who could see it. Suggest that your child ask permission of other people in the images that they post. Also, be aware that photos can be easily copied, changed, shared, used elsewhere, and can potentially stay online forever. One question to ask about your child is “would they want a future employer to see this photo?” The ability to interact with this media and comment on other people’s sites is part of what makes these sites so attractive. However, make sure you social networking help your child to think before they post. Set some ground rules about what is and isn’t OK to say in a blog or profile. This relates to what the child says about others as much as about themselves. What starts off as a joke or gossip can quickly escalate to cause real pain which cannot be taken back. It’s really important that you encourage your child to tell you about inappropriate or illegal activity they may come across. If you suspect your child is being groomed by someone with a sexual interest in children, it’s vital that you help them keep a copy of the offending images or messages and report them to the police via the Child Exploitation and Online Protection Centre website . If they are being harassed by another user, report that person’s screen name to the SN provider which hopefully will act on violations to its terms of service. Tuesday, March 27, 2012
  • 15. Here are that should be considered about positive social networking sites. Stay positive about social networking sites – try to strike a balance between educating children and young people to behave safely and trusting them to get on with it. Get involved – ask them how to create a profile, get them to show you theirs and ask them to add you to their friends list! privacy Make sure that children know how to protect themselves on social networking sites through the tools provided. It’s important to discuss the value of privacy with children. Encourage your child to keep their passwords private and work with them to check the privacy settings on their account which limit how much of their information can be seen by others – for example, encourage your child to change their settings to private so that only people they allow can see what they post and comment on their space, rather than public which leaves their site open to be viewed by anyone. photos It’s natural that children will want to include a photo on their site or profile, but help them think about the implications of posting photos and what is suitable. It is important to think about the type of picture and the kind of attention it might attract, the information it could divulge and who could see it. Suggest that your child ask permission of other people in the images that they post. Also, be aware that photos can be easily copied, changed, shared, used elsewhere, and can potentially stay online forever. One question to ask your child is “would they want a future employer to see this photo?” posting The ability to interact with this media and comment on other people’s sites is part of what makes these sites so attractive. However, make sure you help your child to think before they post. Set some ground rules about what is and isn’t OK to say in a blog or profile. This relates to what the child says about others as much as about themselves. What starts off as a joke or gossip can quickly escalate to cause real pain which cannot be taken back. police It’s really important that you encourage your child to tell you about inappropriate or illegal activity they may come across. If you suspect your child is being groomed by someone with a sexual interest in children, it’s vital that you help them keep a copy of the offending images or messages and report them to the police via the Child Exploitation and Online Protection Centre website . If they are being harassed by another user, report that person’s screen name to the SN provider which hopefully will act on violations to its terms of service. Tuesday, March 27, 2012
  • 16. video - cyber bullying happens http://www.youtube.com/watch?v=D7uyScK3-CU Tuesday, March 27, 2012
  • 17. smart rules Childnet has produced 5 key SMART rules which remind young people to be SMART online. It can be helpful to go through these tips with your children. Keep safe by being careful not to give out personal information, – such as your full name, e-mail address, phone number, home address, photos or school name – either to people you are chatting with online or by posting it online where other people can see it. Meeting someone you have only been in touch with online can be dangerous. Only do so with your parents’ or carers’ permission and even then only when they can be present. Accepting e-mails, IM messages, or opening files, pictures or texts from people you don’t know or trust can lead to problems – they may contain viruses or nasty messages! Information you find on the internet may not be true, or someone online may be lying about who they are. Tell your parent, carer or a trusted adult if someone or something makes you feel uncomfortable or worried, or if you or someone you know is being bullied online. Tuesday, March 27, 2012
  • 18. smart rules Childnet has produced 5 key SMART rules which remind young people to be SMART online. It can be helpful to go through these tips with your children. Safe Keep safe by being careful not to give out personal information, – such as your full name, e-mail address, phone number, home address, photos or school name – either to people you are chatting with online or by posting it online where other people can see it. Meeting Meeting someone you have only been in touch with online can be dangerous. Only do so with your parents’ or carers’ permission and even then only when they can be present. Accepting Accepting e-mails, IM messages, or opening files, pictures or texts from people you don’t know or trust can lead to problems – they may contain viruses or nasty messages! Reliable Information you find on the internet may not be true, or someone online may be lying about who they are. Tell Tell your parent, carer or a trusted adult if someone or something makes you feel uncomfortable or worried, or if you or someone you know is being bullied online. Tuesday, March 27, 2012
  • 19. Additional Resources: http://isttech.wordpress.com/ Tuesday, March 27, 2012
  • 20. Additional Resources: http://isttech.wordpress.com/ Tuesday, March 27, 2012
  • 21. references http://questgarden.com images http://artistsinspireartists.com/graphic_design/awesome-illustrations-gary-taxali http://www.youtube.com/watch?v=S03Br1dwJR8 videos http://www.youtube.com/watch?v=Y6XIPogWZPU http://www.youtube.com/watch?v=4B89yPghS6w http://www.youtube.com/watch?v=D7uyScK3-CU http://www.commonsensemedia.org/ information http://www.digizen.org/ Mikey McKillip Glen Blair ICT Coordinator Counselor/Vice Principal IST Elementary Campus IST Elementary Campus Tuesday, March 27, 2012