SlideShare uma empresa Scribd logo
1 de 22
Kimberly Guerrazzi
Central Michigan University – EDU 653
 Internet as an educational tool
 Cyberbullying
 Texting for Dummies
 Criminal Law & Michigan Penal
Code
 Questions & Answers
 As of September 2009, 93% of American teens between
the ages of 12 and 17 went online, a number that has
remained stable since November 2006. In comparison,
adults are less likely than teens to be online.  As of
December 2009, 74% of adults use the internet.
(Lenhart, 2010)
 Some 75% of American teens ages 12-17 have a cell
phone. (Lenhart, 2010)
Students Actually Use the Internet for Education
New research released by the
National School Boards Association reveals data
showing we all might need to reevaluate our
assumptions: It turns out kids are actually using
the Internet for educational purposes. In fact,
according to the study, "Creating & Connecting:
Research and Guidelines on Online Social--and
Educational--Networking," the percentage of
children specifically discussing schoolwork
online outpaces the percentage that spend time
downloading music.
Students Actually Use the Internet for Education
Sample: 1,277 9- to 17-year-olds, 1,039 parents,
and 250 school district leaders
Source: NSBA Study: “Creating & Connecting: Research and Guidelines
on Online Social-and Educational-Networking.” July 2007
Students Actually Use the Internet for Education
Further, these students are spending almost as much
time on the Internet visiting websites and social
networking services (nine hours per week for teens)
as they spend watching television (10 hours).
A full 96 percent of students surveyed responded that
they use the Internet for social networking purposes,
including Facebook, MySpace, Webkins, and
Nick.com chat. Seventy-one percent said they use
these services at least on a weekly basis.
Source: NSBA Study: “Creating & Connecting: Research and
Guidelines on Online Social-and Educational-Networking.” July 2007
Students Actually Use the Internet for Education
Source: NSBA Study: “Creating & Connecting: Research and Guidelines on
Online Social-and Educational-Networking.” July 2007
The National Crime Prevention Council's definition
of cyber-bullying is "when the Internet, cell phones
or other devices are used to send or post text or
images intended to hurt or embarrass another
person. Cyberbullying is a problem that affects
almost half of all American teens. “ (NCPC, 2010)
Images from Microsoft ClipArt
 With cyber bullying, there isn’t physical violence. However,
cyber bullying may lead down that path.
 Research has shown that cyber bullying has longer lasting and
detrimental effects.
 Virtually everyone has been a victim of bullying at some point
in their life. And think about the impact it had on you.
Bullying had short-term side effects. In a week, you may have
forgotten about the whole situation.
 With cyberbullying, it is different. Hurtful words written in
online blogs do not disappear. Provocative pictures that a
fellow classmate has created of you and posted on the web
will continue being downloaded from computer to computer
or forwarded from cell phone to cell phone. You cannot hide
yourself from it.
1) A web site about teenager David Knight of Burlington, Ontario had been active for
several months before a classmate told him about it. "I went there and sure enough
there's my photo on this web site saying 'Welcome to the web site that makes fun of
Dave Knight' and just pages of hateful comments directed at me and everyone in my
family." Whoever created the web site asked others to join in, posting lewd, sexual
comments and smearing David's reputation. "I was accused of being a pedophile. I was
accused of using the date rape drug on little boys," says David. Along with the web
site, there were nasty e-mails too. "Here's an e-mail, 'You're gay, don't ever talk again,
no one likes you, you're immature and dirty, go wash your face.'
2) Amanda Marcuson, 14, of Birmingham, Michigan, reported some girls in her eighth-
grade class for stealing a pencil case filled with makeup that belonged to her. As soon
as she got home, the instant messages started popping up on her computer screen. She
was a tattletale and a liar, they said. Shaken, she typed back, ''You stole my stuff!'' She
was a ''stuck-up bitch,'' came the instant response in the box on the screen, followed by
a series of increasingly ugly insults. That evening, Amanda went to a basketball game
with her family. But the barrage of electronic insults did not stop. Like a lot of other
teenagers, Amanda has her Internet messages automatically forwarded to her cell
phone, and by the end of the game she had received 50 - the limit of its capacity. ''It
seems like people can say a lot worse things to someone online than when they're
actually talking to them,'' said Amanda. The girls never said another word to her in
person.
(Jackson, 2005)
 42% of kids have been bullied while online. 1 in 4 have had it
happen more than once.
 35% of kids have been threatened online. Nearly 1 in 5 have
had it happen more than once.
 21% of kids have received mean or threatening e-mail or other
messages.
 58% of kids admit someone has said mean or hurtful things to
them online. More than 4 out of 10 say it has happened more
than once.
 53% of kids admit having said something mean or hurtful to
another person online. More than 1 in 3 have done it more
than once.
 58% have not told their parents or an adult about something
mean or hurtful that happened to them online.
Based on 2004 i-SAFE survey of 1,500 students grades 4-8 (i-Safe, 2004)
 Tell a trusted adult about the bullying, and keep telling until
the adult takes action.
 Don’t open or read messages by cyber bullies.
 Tell your school if it is school related. Schools have a bullying
solution in place.
 Don’t erase the messages—they may be needed to take action.
 Protect yourself—never agree to meet with the person or with
anyone you meet online.
 If bullied through chat or instant messaging, the “bully” can
often be blocked.
 If you are threatened with harm, inform the local police.
Based on 2004 i-SAFE survey of 1,500 students grades 4-8 (i-Safe, 2004)
4COL
For Crying Out Loud
BTW
By the Way
G/F
Girlfriend
G2CU
Good to see you
GR8
Great
IDTS
I don’t think so
IRMC
I rest my case
LOL
Laugh out loud
NBD
No big deal
NOYB
None of your business
RME
Rolling my eyes
ROFL
Rolling on the floor laughing
TMI
Too much information
TSTB
The sooner the better
U
You
UR
You Are
The following are examples of cyber bullying that
are classified under criminal law:
Threats of violence Obscene telephone
calls
Stalking Child pornography
But how can victims of cyber bullying tell who is behind
the computer screen or cellphone?
Images from Microsoft Clip Art
 Section 750.145a. Accosting, enticing or
soliciting child for immoral purpose:
 Distribution of any child sexually abusive material –
guilty of a felony punishable by 7 years imprisonment
and a fine of $50,000.
 Possession of child sexually abusive material – guilty
of a felony punishable by 4 years imprisonment and a
fine of $10,000.
 Subpoena phone records, chat logs.
(Michigan Legislature, 2002)
 Approximately one in seven youth online (10 to 17-years-old)
received a sexual solicitation or approach over the Internet.
 Four percent (4%) received an aggressive sexual solicitation - a
solicitor who asked to meet them somewhere; called them on the
telephone; or sent them offline mail, money, or gifts.
 Thirty-four percent (34%) had an unwanted exposure to sexual
material -- pictures of naked people or people having sex.
 Twenty-seven percent (27%) of the youth who encountered
unwanted sexual material told a parent or guardian. If the encounter
was defined as distressing - episodes that made them feel very or
extremely upset or afraid - forty-two percent (42%) told a parent or
guardian.
(National Center for Missing and Exploited Children, 2006)
 Sometimes good kids make bad choices…
 Don’t assume what is sent is private and can’t
be forwarded or edited.
 “Techno Toughness!”
Teachers
Law Enforcement
Parents
1. Communicate with your children, discuss consequences
2. Be aware of the computers your kids are using, keep them in
a public area. If they shut the computer when you enter the
room – be suspicious.
3. Let children show you what they can do online, visit their
favorite sites. Check the Internet history.
4. Ensure your kids keep their identity private, and they
remember who they are talking to may not be who they state
they are.
5. Limit/monitor texting, check text logs & photos.
6. Love your kids. It is a whole lot different growing up today.
“There is nothing more difficult to take in hand, more
perilous to conduct, or more uncertain in its success,
than to take the lead in the introduction of a new
order of things.”
-Machiavelli, The Prince
 Social Media and Young Adults. Lenhart, Amanda; Purcell, Kristen; Smith,
Aaron; and Kathryn Zickuhr. Pew Internet and American Life Project.
February 2010. Retrieved 10-29-10.
 CREATING & CONNECTING - Research and Guidelines on Online
Social — and Educational — Networking. National School Boards
Association. July 2007. Retrieved 10-29-10.
 Cyberbullying. Jackson, Drew. April 2005. Retrieved 10-30-10.
 Cyberbullying. National Crime Prevention Council. Retrieved 10-29-10.
 Cyber Bulling: Statistics and Tips. i-Safe. 2004 Survey. Retrieved 10-29-10.
 Michigan Penal Code (An Excerpt): Act 328 of 1931. Michigan Legislature.
Effective June 2002. Retrieved 10-30-10.
 Online Victimization of Youth: Five Years Later. David Finkelhor,
Kimberly J. Mitchell, and Janis Wolak. National Center for Missing &
Exploited Children, 2006, pages 7-8, 33. Retrieved 10-29-10.

Mais conteúdo relacionado

Mais procurados

Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointhmorrell1
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullyingMelissa
 
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...Andy Jeter
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingzackkay
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Larry Magid
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson Martinez
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012kschermerhorn
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullyingseswear9388
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullyingkschermerhorn
 
Cyberbullying class symposium
Cyberbullying class symposiumCyberbullying class symposium
Cyberbullying class symposiumkschermerhorn
 

Mais procurados (20)

Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Week 5
Week 5Week 5
Week 5
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullying
 
Presentation1
Presentation1Presentation1
Presentation1
 
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
A Parent and Teacher Training Program for Cyberbullying Detection and Interve...
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshare
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´MooreCyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
 
Cyber-bullying for Attorneys June2012
Cyber-bullying for Attorneys June2012Cyber-bullying for Attorneys June2012
Cyber-bullying for Attorneys June2012
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying class symposium
Cyberbullying class symposiumCyberbullying class symposium
Cyberbullying class symposium
 
NSBA2010
NSBA2010NSBA2010
NSBA2010
 
Web safety
Web safetyWeb safety
Web safety
 

Destaque

Adding google link to wiki
Adding google link to wikiAdding google link to wiki
Adding google link to wikikguerrazzi
 
Audience profiling
Audience profilingAudience profiling
Audience profilingEmilyNorman
 
how to enjoy your eco-life with fijian coconut oil
how to enjoy your eco-life with fijian coconut oilhow to enjoy your eco-life with fijian coconut oil
how to enjoy your eco-life with fijian coconut oilREBULA & co.ltd
 
Evaluation question 4
Evaluation question 4Evaluation question 4
Evaluation question 4EmilyNorman
 
ココナッツオイル講座 11.jul.2014
ココナッツオイル講座 11.jul.2014ココナッツオイル講座 11.jul.2014
ココナッツオイル講座 11.jul.2014REBULA & co.ltd
 
Evaluation question 2
Evaluation question 2Evaluation question 2
Evaluation question 2EmilyNorman
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Node 学園祭 2012 用
Node 学園祭 2012 用Node 学園祭 2012 用
Node 学園祭 2012 用Rei Kawai
 

Destaque (16)

Adding google link to wiki
Adding google link to wikiAdding google link to wiki
Adding google link to wiki
 
Target audience
Target audienceTarget audience
Target audience
 
Audience profiling
Audience profilingAudience profiling
Audience profiling
 
Proposal
ProposalProposal
Proposal
 
how to enjoy your eco-life with fijian coconut oil
how to enjoy your eco-life with fijian coconut oilhow to enjoy your eco-life with fijian coconut oil
how to enjoy your eco-life with fijian coconut oil
 
Evaluation question 4
Evaluation question 4Evaluation question 4
Evaluation question 4
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
ココナッツオイル講座 11.jul.2014
ココナッツオイル講座 11.jul.2014ココナッツオイル講座 11.jul.2014
ココナッツオイル講座 11.jul.2014
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Evaluation question 2
Evaluation question 2Evaluation question 2
Evaluation question 2
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Proposal
ProposalProposal
Proposal
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Node 学園祭 2012 用
Node 学園祭 2012 用Node 学園祭 2012 用
Node 学園祭 2012 用
 

Semelhante a Internetsafety

Digital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyMann Rentoy
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentationjpl17
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetinganniebee3509
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensAndrew Kohl
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullyingsepulvedamd
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationjpl17
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 

Semelhante a Internetsafety (20)

Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
 
Digital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann Rentoy
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
102009
102009102009
102009
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentation
 
Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meeting
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital Citizens
 
Bullying in the digital age
Bullying in the digital ageBullying in the digital age
Bullying in the digital age
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 

Mais de kguerrazzi

Mais de kguerrazzi (11)

Weebly project1 061613
Weebly project1 061613Weebly project1 061613
Weebly project1 061613
 
Kowalski project
Kowalski projectKowalski project
Kowalski project
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
EDU 590 - Introduction
EDU 590 - IntroductionEDU 590 - Introduction
EDU 590 - Introduction
 

Último

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 

Último (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 

Internetsafety

  • 1. Kimberly Guerrazzi Central Michigan University – EDU 653
  • 2.  Internet as an educational tool  Cyberbullying  Texting for Dummies  Criminal Law & Michigan Penal Code  Questions & Answers
  • 3.  As of September 2009, 93% of American teens between the ages of 12 and 17 went online, a number that has remained stable since November 2006. In comparison, adults are less likely than teens to be online.  As of December 2009, 74% of adults use the internet. (Lenhart, 2010)  Some 75% of American teens ages 12-17 have a cell phone. (Lenhart, 2010)
  • 4. Students Actually Use the Internet for Education New research released by the National School Boards Association reveals data showing we all might need to reevaluate our assumptions: It turns out kids are actually using the Internet for educational purposes. In fact, according to the study, "Creating & Connecting: Research and Guidelines on Online Social--and Educational--Networking," the percentage of children specifically discussing schoolwork online outpaces the percentage that spend time downloading music.
  • 5. Students Actually Use the Internet for Education Sample: 1,277 9- to 17-year-olds, 1,039 parents, and 250 school district leaders Source: NSBA Study: “Creating & Connecting: Research and Guidelines on Online Social-and Educational-Networking.” July 2007
  • 6. Students Actually Use the Internet for Education Further, these students are spending almost as much time on the Internet visiting websites and social networking services (nine hours per week for teens) as they spend watching television (10 hours). A full 96 percent of students surveyed responded that they use the Internet for social networking purposes, including Facebook, MySpace, Webkins, and Nick.com chat. Seventy-one percent said they use these services at least on a weekly basis. Source: NSBA Study: “Creating & Connecting: Research and Guidelines on Online Social-and Educational-Networking.” July 2007
  • 7. Students Actually Use the Internet for Education Source: NSBA Study: “Creating & Connecting: Research and Guidelines on Online Social-and Educational-Networking.” July 2007
  • 8. The National Crime Prevention Council's definition of cyber-bullying is "when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person. Cyberbullying is a problem that affects almost half of all American teens. “ (NCPC, 2010) Images from Microsoft ClipArt
  • 9.  With cyber bullying, there isn’t physical violence. However, cyber bullying may lead down that path.  Research has shown that cyber bullying has longer lasting and detrimental effects.  Virtually everyone has been a victim of bullying at some point in their life. And think about the impact it had on you. Bullying had short-term side effects. In a week, you may have forgotten about the whole situation.  With cyberbullying, it is different. Hurtful words written in online blogs do not disappear. Provocative pictures that a fellow classmate has created of you and posted on the web will continue being downloaded from computer to computer or forwarded from cell phone to cell phone. You cannot hide yourself from it.
  • 10. 1) A web site about teenager David Knight of Burlington, Ontario had been active for several months before a classmate told him about it. "I went there and sure enough there's my photo on this web site saying 'Welcome to the web site that makes fun of Dave Knight' and just pages of hateful comments directed at me and everyone in my family." Whoever created the web site asked others to join in, posting lewd, sexual comments and smearing David's reputation. "I was accused of being a pedophile. I was accused of using the date rape drug on little boys," says David. Along with the web site, there were nasty e-mails too. "Here's an e-mail, 'You're gay, don't ever talk again, no one likes you, you're immature and dirty, go wash your face.' 2) Amanda Marcuson, 14, of Birmingham, Michigan, reported some girls in her eighth- grade class for stealing a pencil case filled with makeup that belonged to her. As soon as she got home, the instant messages started popping up on her computer screen. She was a tattletale and a liar, they said. Shaken, she typed back, ''You stole my stuff!'' She was a ''stuck-up bitch,'' came the instant response in the box on the screen, followed by a series of increasingly ugly insults. That evening, Amanda went to a basketball game with her family. But the barrage of electronic insults did not stop. Like a lot of other teenagers, Amanda has her Internet messages automatically forwarded to her cell phone, and by the end of the game she had received 50 - the limit of its capacity. ''It seems like people can say a lot worse things to someone online than when they're actually talking to them,'' said Amanda. The girls never said another word to her in person. (Jackson, 2005)
  • 11.  42% of kids have been bullied while online. 1 in 4 have had it happen more than once.  35% of kids have been threatened online. Nearly 1 in 5 have had it happen more than once.  21% of kids have received mean or threatening e-mail or other messages.  58% of kids admit someone has said mean or hurtful things to them online. More than 4 out of 10 say it has happened more than once.  53% of kids admit having said something mean or hurtful to another person online. More than 1 in 3 have done it more than once.  58% have not told their parents or an adult about something mean or hurtful that happened to them online. Based on 2004 i-SAFE survey of 1,500 students grades 4-8 (i-Safe, 2004)
  • 12.  Tell a trusted adult about the bullying, and keep telling until the adult takes action.  Don’t open or read messages by cyber bullies.  Tell your school if it is school related. Schools have a bullying solution in place.  Don’t erase the messages—they may be needed to take action.  Protect yourself—never agree to meet with the person or with anyone you meet online.  If bullied through chat or instant messaging, the “bully” can often be blocked.  If you are threatened with harm, inform the local police. Based on 2004 i-SAFE survey of 1,500 students grades 4-8 (i-Safe, 2004)
  • 13. 4COL For Crying Out Loud BTW By the Way G/F Girlfriend G2CU Good to see you GR8 Great IDTS I don’t think so IRMC I rest my case LOL Laugh out loud
  • 14. NBD No big deal NOYB None of your business RME Rolling my eyes ROFL Rolling on the floor laughing TMI Too much information TSTB The sooner the better U You UR You Are
  • 15. The following are examples of cyber bullying that are classified under criminal law: Threats of violence Obscene telephone calls Stalking Child pornography But how can victims of cyber bullying tell who is behind the computer screen or cellphone? Images from Microsoft Clip Art
  • 16.  Section 750.145a. Accosting, enticing or soliciting child for immoral purpose:  Distribution of any child sexually abusive material – guilty of a felony punishable by 7 years imprisonment and a fine of $50,000.  Possession of child sexually abusive material – guilty of a felony punishable by 4 years imprisonment and a fine of $10,000.  Subpoena phone records, chat logs. (Michigan Legislature, 2002)
  • 17.  Approximately one in seven youth online (10 to 17-years-old) received a sexual solicitation or approach over the Internet.  Four percent (4%) received an aggressive sexual solicitation - a solicitor who asked to meet them somewhere; called them on the telephone; or sent them offline mail, money, or gifts.  Thirty-four percent (34%) had an unwanted exposure to sexual material -- pictures of naked people or people having sex.  Twenty-seven percent (27%) of the youth who encountered unwanted sexual material told a parent or guardian. If the encounter was defined as distressing - episodes that made them feel very or extremely upset or afraid - forty-two percent (42%) told a parent or guardian. (National Center for Missing and Exploited Children, 2006)
  • 18.  Sometimes good kids make bad choices…  Don’t assume what is sent is private and can’t be forwarded or edited.  “Techno Toughness!”
  • 20. 1. Communicate with your children, discuss consequences 2. Be aware of the computers your kids are using, keep them in a public area. If they shut the computer when you enter the room – be suspicious. 3. Let children show you what they can do online, visit their favorite sites. Check the Internet history. 4. Ensure your kids keep their identity private, and they remember who they are talking to may not be who they state they are. 5. Limit/monitor texting, check text logs & photos. 6. Love your kids. It is a whole lot different growing up today.
  • 21. “There is nothing more difficult to take in hand, more perilous to conduct, or more uncertain in its success, than to take the lead in the introduction of a new order of things.” -Machiavelli, The Prince
  • 22.  Social Media and Young Adults. Lenhart, Amanda; Purcell, Kristen; Smith, Aaron; and Kathryn Zickuhr. Pew Internet and American Life Project. February 2010. Retrieved 10-29-10.  CREATING & CONNECTING - Research and Guidelines on Online Social — and Educational — Networking. National School Boards Association. July 2007. Retrieved 10-29-10.  Cyberbullying. Jackson, Drew. April 2005. Retrieved 10-30-10.  Cyberbullying. National Crime Prevention Council. Retrieved 10-29-10.  Cyber Bulling: Statistics and Tips. i-Safe. 2004 Survey. Retrieved 10-29-10.  Michigan Penal Code (An Excerpt): Act 328 of 1931. Michigan Legislature. Effective June 2002. Retrieved 10-30-10.  Online Victimization of Youth: Five Years Later. David Finkelhor, Kimberly J. Mitchell, and Janis Wolak. National Center for Missing & Exploited Children, 2006, pages 7-8, 33. Retrieved 10-29-10.