Teacherinternetsafetytraining
-
Upload
mike-hasley -
Category
Technology
-
view
984 -
download
0
description
Transcript of Teacherinternetsafetytraining
Internet Safety
Avoiding Chances
Why we’re doing this
It’s a state law
What this reviews
What this reviews
Social Networking
What this reviews
Internet Predators
What this reviews
Cyberbullying
How to do this
How to do this
Read this presentation
How to do this
Notice the question numbers
How to do this
Take the quiz
Why we’re doing this
1. What is the teacher's responsibility in educating his/her students on Internet Safety in the classroom?
Why we’re doing this
A1. to help reinforce Internet Safety within the context of using the laptops in the classroom
Why we’re doing this
2. Where can teachers find additional Internet safety resources?
Why we’re doing this
A2. http://staffdev.henrico.k12.va.us/netsafety/index.htm
Why we’re doing this
3. Instead of trying to teach students what NOT to do when they are online, we need to help them:
Why we’re doing this
A3. 1) learn to make responsible choices, 2) understand how their actions can hurt others, and 3) understand how their own moral
values are reflected in what they post online
Social Networking
4. Social network sites include:
Social Networking
A4. MySpace, Facebook, Friendster, Bebo
Social Networking
5. An important point to remember about posting pictures online is:
Social Networking
A5. The Internet is the real world. Once you post a picture, anyone can have access to it and do anything they want with it.
Social Networking
6. What is a teen's favorite way to communicate?
Social Networking
A6. Chatting online, texting, and Instant Messaging
Social Networking
7. When you post information online, which of the following might be ways that your information could potentially be used?
Social Networking
A7. by an internet predator, by a potential employer, or by a college admissions counselor
Social Networking
8. What percent of your students do you think have a social networking website?
Social Networking
A8. 65%
Internet Predators
9. Grooming is:
Internet Predators
A9. the techniques Internet Predators use to get children to trust them
Internet Predators
10. One popular place Internet Predators hang out online to meet children is:
Internet Predators
A10. Online gaming sites
Internet Predators
11. The main goal of an Internet Predator is:
Internet Predators
A11. Meeting the child in person
General Rule
12. Why is it important to keep your password secure?
General Rule
A12. other people could assume your identity
Cyberbullying
13. What is cyberbullying?
Cyberbullying
A13. sending or posting harmful or cruel information about someone online
Cyberbullying
14. What are examples of cyberbullying?
Cyberbullying
A14. sending cruel messages online, flaming (harrassing) someone online, impersonating someone online, tricking people
into revealing personal information
Cyberbullying
15. What should you do if you suspect a child in your class is being bullied online?
Cyberbullying
A15. Save any evidence you have and try to identify the cyberbully. Contact a guidance counselor or administrator.
Cyberbullying
16. What could be said to help a student understand why cyberbullying is wrong?
Cyberbullying
A16. What would happen if your actions were on the front page of the newspaper? How would you feel if someone did this to you? What would you parents say? Would it be OK if you did this in
real life?
Cyberbullying
17. Why is it easier to be a cyberbully than just a bully?
Cyberbullying
A17. It's easier to say things on line than it would be face to face because you don't have to see the hurt you are causing.
Cyberbullying
18. Which of these tips could help your students think before they bully?
Cyberbullying
A18. Take 5- close the computer and walk away for 5 minutes before you respond