SlideShare a Scribd company logo
1 of 56
Encyclomedia 2007 Facebook,  YouTube, and eBay:  Teaching Responsibility and Internet Safety for the 21st Century Quyen Arana and Perri Applegate
Internet Safety and Responsibility
[object Object],How to Behave in a Responsible Manner in the Online Community
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],How to Behave in a Responsible Manner in the Online Community
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Social Networking Sites
Creating and Connecting//Research and Guidelines on Online Social and Educational Networking,  National School Boards Association, 2007 Almost all 9-17 y/o’s have used social networking sites
Think! So, What Do We Tell Kids?
Forever Is a Long, Long Time By Brad Stone Newsweek Aug. 21-28, 2006 issue
No One Is Really Anonymous
No One Is Really Anonymous
Criminal Prosecution or School Sanctions
[object Object],[object Object],[object Object],Copyright Violations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Cyberbullying
[object Object],[object Object],[object Object],Cyberstalking
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object]
Trends from 2000 to 2005 ,[object Object],[object Object],[object Object]
1 in 3 children report having friends that they have never met in person.  The majority of children share personal information online including their real name, phone number, and address.  Dimitri A. Christakis, MD, MPH,  ARCH PEDIATR ADOLESC MED / VOL 161, FEB 2007
Risk factors for victimization offline include talking about sex with strangers and being rude or nasty oneself. Dimitri A. Christakis, MD, MPH,  ARCH PEDIATR ADOLESC MED / VOL 161, FEB 2007 “ Online victimization appears to be about as prevalent as in-person bullying, suggesting that  it is not a new or added harassment but rather uses a different format .” “ The ways children put themselves at risk in the virtual world appears to mirror the ways they do in the real one.”
“ The increase in exposure to unwanted sexual material occurred  despite increased use of filtering, blocking, and monitoring software  in households of youth Internet users.“ Online Victimization of Youth Five Years Later , 2006, National Center for Missing & Exploited Children. “ Some youth who  did not disclose exposure incidents  to parents or guardians said these incidents happened all the time.”
Other findings: Youth are still not telling adults about negative online experiences. “ Some youth who did not disclose exposure incidents to parents or guardians said these incidents happened all the time.”
Power of social networking
“ Safety policies remain important, as does teaching students about online safety and responsible online expression  -- but students may learn these lessons better while they’re actually using social networking tools.”
 
Creating and Connecting//Research and Guidelines on Online Social and Educational Networking,  National School Boards Association, 2007 Most students use social networking sites
What are they doing?
MySpace Facebook Ning Virb Webkinz Online Social Networks Twitter
 
 
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Recommendations for school board members
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Recommendations for school board members educators
Do this ,[object Object],[object Object],[object Object],[object Object]
 
 
MySpace
MySpace
 
 
And do this ,[object Object],[object Object],[object Object],[object Object]
http://slideshare.net
http://teachertube.com
http://voicethread.com
http://www.wikispaces.com
“ Safety policies remain important, as does teaching students about online safety and responsible online expression  -- but students may learn these lessons better while they’re actually using social networking tools.”
Thank you! ,[object Object],[object Object],[object Object],[object Object]
Resources
Text Text http://www.csriu.org /
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Resources for Educators and Parents
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Resources for Educators and Parents
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Resources for Educators and Parents
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Resources for Educators and Parents
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Resources for Educators and Parents
[object Object],[object Object],[object Object],[object Object],[object Object],Resources for Educators and Parents

More Related Content

What's hot

Lifespan Communication In Cmc
Lifespan Communication In CmcLifespan Communication In Cmc
Lifespan Communication In CmcDaywalk3r
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspectiveConnectSafely
 
Wolverhampton - Recent developments in the UK and overseas
Wolverhampton - Recent developments in the UK and overseasWolverhampton - Recent developments in the UK and overseas
Wolverhampton - Recent developments in the UK and overseasdaveyp
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentConnectSafely
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Larry Magid
 
Social Media Training March 2010
Social Media Training March 2010Social Media Training March 2010
Social Media Training March 2010amira13
 
Children and Online Safety
Children and Online SafetyChildren and Online Safety
Children and Online Safetyalandang
 
Bigger Than Myspace 2 1 08
Bigger Than  Myspace 2 1 08Bigger Than  Myspace 2 1 08
Bigger Than Myspace 2 1 08bneligan
 
The Effects on Social Networking on Education
The Effects on Social Networking on EducationThe Effects on Social Networking on Education
The Effects on Social Networking on EducationNash Nash
 
Turning the Corner: From Cybersafety to Digital Citizenship
Turning the Corner: From Cybersafety to Digital Citizenship Turning the Corner: From Cybersafety to Digital Citizenship
Turning the Corner: From Cybersafety to Digital Citizenship Catherine Hainstock
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)amalgarn
 

What's hot (20)

ASS3SUM2
ASS3SUM2ASS3SUM2
ASS3SUM2
 
Lifespan Communication In Cmc
Lifespan Communication In CmcLifespan Communication In Cmc
Lifespan Communication In Cmc
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
Wolverhampton - Recent developments in the UK and overseas
Wolverhampton - Recent developments in the UK and overseasWolverhampton - Recent developments in the UK and overseas
Wolverhampton - Recent developments in the UK and overseas
 
Ana Trpovska En
Ana Trpovska EnAna Trpovska En
Ana Trpovska En
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...
 
Teens and Social Media: An Overview
Teens and Social Media: An OverviewTeens and Social Media: An Overview
Teens and Social Media: An Overview
 
Social Media Training March 2010
Social Media Training March 2010Social Media Training March 2010
Social Media Training March 2010
 
Flipbook
FlipbookFlipbook
Flipbook
 
Teens and social media
Teens and social mediaTeens and social media
Teens and social media
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Children and Online Safety
Children and Online SafetyChildren and Online Safety
Children and Online Safety
 
Bigger Than Myspace 2 1 08
Bigger Than  Myspace 2 1 08Bigger Than  Myspace 2 1 08
Bigger Than Myspace 2 1 08
 
Flipbook
FlipbookFlipbook
Flipbook
 
The Effects on Social Networking on Education
The Effects on Social Networking on EducationThe Effects on Social Networking on Education
The Effects on Social Networking on Education
 
Turning the Corner: From Cybersafety to Digital Citizenship
Turning the Corner: From Cybersafety to Digital Citizenship Turning the Corner: From Cybersafety to Digital Citizenship
Turning the Corner: From Cybersafety to Digital Citizenship
 
13 Things to Know About Teens and Technology
13 Things to Know About Teens and Technology13 Things to Know About Teens and Technology
13 Things to Know About Teens and Technology
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)
 
Flipbook (3) (1)
Flipbook (3) (1)Flipbook (3) (1)
Flipbook (3) (1)
 

Viewers also liked

KAEFER KIPS Safety Presentation
KAEFER KIPS Safety PresentationKAEFER KIPS Safety Presentation
KAEFER KIPS Safety PresentationMitchell Harris
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentationISTE
 
Safety presentation isolation and tagging
Safety presentation isolation and taggingSafety presentation isolation and tagging
Safety presentation isolation and taggingWarwick Bursey
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 

Viewers also liked (8)

safe children film
safe children filmsafe children film
safe children film
 
KAEFER KIPS Safety Presentation
KAEFER KIPS Safety PresentationKAEFER KIPS Safety Presentation
KAEFER KIPS Safety Presentation
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Safety presentation isolation and tagging
Safety presentation isolation and taggingSafety presentation isolation and tagging
Safety presentation isolation and tagging
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
McCarthyism
McCarthyismMcCarthyism
McCarthyism
 
Acid Rain....
Acid Rain....Acid Rain....
Acid Rain....
 

Similar to Encyclomedia 2007 Internet Safety Presentation

Parenting the MySpace Generation
Parenting the MySpace GenerationParenting the MySpace Generation
Parenting the MySpace Generationdlevin
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking SafetyJEM JEM
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingDr. Conrath
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
Safe kids – connected to web 2
Safe kids – connected to web 2Safe kids – connected to web 2
Safe kids – connected to web 2Oliver Mittl
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
 
W200 Powerpoint, Katie Fallis
W200 Powerpoint, Katie FallisW200 Powerpoint, Katie Fallis
W200 Powerpoint, Katie Fallisguest9c7c134
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
Aurora - Social media
Aurora - Social mediaAurora - Social media
Aurora - Social mediaMike North
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Youth and Social Media
Youth and Social MediaYouth and Social Media
Youth and Social MediaAnne Adrian
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingckeeling
 

Similar to Encyclomedia 2007 Internet Safety Presentation (20)

Parenting the MySpace Generation
Parenting the MySpace GenerationParenting the MySpace Generation
Parenting the MySpace Generation
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking Safety
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullying
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Life in the_digital_world
Life in the_digital_worldLife in the_digital_world
Life in the_digital_world
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Safe kids – connected to web 2
Safe kids – connected to web 2Safe kids – connected to web 2
Safe kids – connected to web 2
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
W200 Powerpoint, Katie Fallis
W200 Powerpoint, Katie FallisW200 Powerpoint, Katie Fallis
W200 Powerpoint, Katie Fallis
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Aurora - Social media
Aurora - Social mediaAurora - Social media
Aurora - Social media
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Youth and Social Media
Youth and Social MediaYouth and Social Media
Youth and Social Media
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Recently uploaded

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 

Recently uploaded (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 

Encyclomedia 2007 Internet Safety Presentation

  • 1. Encyclomedia 2007 Facebook, YouTube, and eBay: Teaching Responsibility and Internet Safety for the 21st Century Quyen Arana and Perri Applegate
  • 2. Internet Safety and Responsibility
  • 3.
  • 4.  
  • 5.
  • 6.
  • 7. Creating and Connecting//Research and Guidelines on Online Social and Educational Networking, National School Boards Association, 2007 Almost all 9-17 y/o’s have used social networking sites
  • 8. Think! So, What Do We Tell Kids?
  • 9. Forever Is a Long, Long Time By Brad Stone Newsweek Aug. 21-28, 2006 issue
  • 10. No One Is Really Anonymous
  • 11. No One Is Really Anonymous
  • 12. Criminal Prosecution or School Sanctions
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.  
  • 18.
  • 19.
  • 20. 1 in 3 children report having friends that they have never met in person. The majority of children share personal information online including their real name, phone number, and address. Dimitri A. Christakis, MD, MPH, ARCH PEDIATR ADOLESC MED / VOL 161, FEB 2007
  • 21. Risk factors for victimization offline include talking about sex with strangers and being rude or nasty oneself. Dimitri A. Christakis, MD, MPH, ARCH PEDIATR ADOLESC MED / VOL 161, FEB 2007 “ Online victimization appears to be about as prevalent as in-person bullying, suggesting that it is not a new or added harassment but rather uses a different format .” “ The ways children put themselves at risk in the virtual world appears to mirror the ways they do in the real one.”
  • 22. “ The increase in exposure to unwanted sexual material occurred despite increased use of filtering, blocking, and monitoring software in households of youth Internet users.“ Online Victimization of Youth Five Years Later , 2006, National Center for Missing & Exploited Children. “ Some youth who did not disclose exposure incidents to parents or guardians said these incidents happened all the time.”
  • 23. Other findings: Youth are still not telling adults about negative online experiences. “ Some youth who did not disclose exposure incidents to parents or guardians said these incidents happened all the time.”
  • 24. Power of social networking
  • 25. “ Safety policies remain important, as does teaching students about online safety and responsible online expression -- but students may learn these lessons better while they’re actually using social networking tools.”
  • 26.  
  • 27. Creating and Connecting//Research and Guidelines on Online Social and Educational Networking, National School Boards Association, 2007 Most students use social networking sites
  • 28. What are they doing?
  • 29. MySpace Facebook Ning Virb Webkinz Online Social Networks Twitter
  • 30.  
  • 31.  
  • 32.  
  • 33.
  • 34.
  • 35.
  • 36.  
  • 37.  
  • 40.  
  • 41.  
  • 42.
  • 47. “ Safety policies remain important, as does teaching students about online safety and responsible online expression -- but students may learn these lessons better while they’re actually using social networking tools.”
  • 48.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.