Teacherinternetsafetytraining

46
Internet Safety Avoiding Chances

description

Internet Safety training for HCPS teachers

Transcript of Teacherinternetsafetytraining

Page 1: Teacherinternetsafetytraining

Internet Safety

Avoiding Chances

Page 2: Teacherinternetsafetytraining

Why we’re doing this

It’s a state law

Page 3: Teacherinternetsafetytraining

What this reviews

Page 4: Teacherinternetsafetytraining

What this reviews

Social Networking

Page 5: Teacherinternetsafetytraining

What this reviews

Internet Predators

Page 6: Teacherinternetsafetytraining

What this reviews

Cyberbullying

Page 7: Teacherinternetsafetytraining

How to do this

Page 8: Teacherinternetsafetytraining

How to do this

Read this presentation

Page 9: Teacherinternetsafetytraining

How to do this

Notice the question numbers

Page 10: Teacherinternetsafetytraining

How to do this

Take the quiz

Page 11: Teacherinternetsafetytraining

Why we’re doing this

1. What is the teacher's responsibility in educating his/her students on Internet Safety in the classroom?

Page 12: Teacherinternetsafetytraining

Why we’re doing this

A1. to help reinforce Internet Safety within the context of using the laptops in the classroom

Page 13: Teacherinternetsafetytraining

Why we’re doing this

2. Where can teachers find additional Internet safety resources?

Page 14: Teacherinternetsafetytraining

Why we’re doing this

A2. http://staffdev.henrico.k12.va.us/netsafety/index.htm

Page 15: Teacherinternetsafetytraining

Why we’re doing this

3. Instead of trying to teach students what NOT to do when they are online, we need to help them:

Page 16: Teacherinternetsafetytraining

Why we’re doing this

A3. 1) learn to make responsible choices, 2) understand how their actions can hurt others, and 3) understand how their own moral

values are reflected in what they post online

Page 17: Teacherinternetsafetytraining

Social Networking

4. Social network sites include:

Page 18: Teacherinternetsafetytraining

Social Networking

A4. MySpace, Facebook, Friendster, Bebo

Page 19: Teacherinternetsafetytraining

Social Networking

5. An important point to remember about posting pictures online is:

Page 20: Teacherinternetsafetytraining

Social Networking

A5. The Internet is the real world. Once you post a picture, anyone can have access to it and do anything they want with it.

Page 21: Teacherinternetsafetytraining

Social Networking

6. What is a teen's favorite way to communicate?

Page 22: Teacherinternetsafetytraining

Social Networking

A6. Chatting online, texting, and Instant Messaging

Page 23: Teacherinternetsafetytraining

Social Networking

7. When you post information online, which of the following might be ways that your information could potentially be used?

Page 24: Teacherinternetsafetytraining

Social Networking

A7. by an internet predator, by a potential employer, or by a college admissions counselor

Page 25: Teacherinternetsafetytraining

Social Networking

8. What percent of your students do you think have a social networking website?

Page 26: Teacherinternetsafetytraining

Social Networking

A8. 65%

Page 27: Teacherinternetsafetytraining

Internet Predators

9. Grooming is:

Page 28: Teacherinternetsafetytraining

Internet Predators

A9. the techniques Internet Predators use to get children to trust them

Page 29: Teacherinternetsafetytraining

Internet Predators

10. One popular place Internet Predators hang out online to meet children is:

Page 30: Teacherinternetsafetytraining

Internet Predators

A10. Online gaming sites

Page 31: Teacherinternetsafetytraining

Internet Predators

11. The main goal of an Internet Predator is:

Page 32: Teacherinternetsafetytraining

Internet Predators

A11. Meeting the child in person

Page 33: Teacherinternetsafetytraining

General Rule

12. Why is it important to keep your password secure?

Page 34: Teacherinternetsafetytraining

General Rule

A12. other people could assume your identity

Page 35: Teacherinternetsafetytraining

Cyberbullying

13. What is cyberbullying?

Page 36: Teacherinternetsafetytraining

Cyberbullying

A13. sending or posting harmful or cruel information about someone online

Page 37: Teacherinternetsafetytraining

Cyberbullying

14. What are examples of cyberbullying?

Page 38: Teacherinternetsafetytraining

Cyberbullying

A14. sending cruel messages online, flaming (harrassing) someone online, impersonating someone online, tricking people

into revealing personal information

Page 39: Teacherinternetsafetytraining

Cyberbullying

15. What should you do if you suspect a child in your class is being bullied online?

Page 40: Teacherinternetsafetytraining

Cyberbullying

A15. Save any evidence you have and try to identify the cyberbully. Contact a guidance counselor or administrator.

Page 41: Teacherinternetsafetytraining

Cyberbullying

16. What could be said to help a student understand why cyberbullying is wrong?

Page 42: Teacherinternetsafetytraining

Cyberbullying

A16. What would happen if your actions were on the front page of the newspaper? How would you feel if someone did this to you? What would you parents say? Would it be OK if you did this in

real life?

Page 43: Teacherinternetsafetytraining

Cyberbullying

17. Why is it easier to be a cyberbully than just a bully?

Page 44: Teacherinternetsafetytraining

Cyberbullying

A17. It's easier to say things on line than it would be face to face because you don't have to see the hurt you are causing.

Page 45: Teacherinternetsafetytraining

Cyberbullying

18. Which of these tips could help your students think before they bully?

Page 46: Teacherinternetsafetytraining

Cyberbullying

A18. Take 5- close the computer and walk away for 5 minutes before you respond